Upload
tripwire
View
391
Download
1
Tags:
Embed Size (px)
DESCRIPTION
We will cover… Perfect Storm of Compliance and Security Demands View into the Future of IT Compliance Next Practices for Security & Compliance Visibility, Intelligence, and Automation are Key
Citation preview
A Perfect Storm: MoreSecurity Threats andMore ComplianceCosts
A Perfect Storm: More Security Threats and More Compliance Costs Paul Reymann, CEO, ReymannGroup, Inc.
IT SECURITY & COMPLIANCE AUTOMATION
We will cover…
Perfect Storm of Compliance and Security Demands
View into the Future of IT Compliance
Next Practices for Security & Compliance
Visibility, Intelligence, and Automation are Key
IT SECURITY & COMPLIANCE AUTOMATION
Perfect Storm of Legislation & Compliance
Increasing role of NIST;
Licensing & certification standards;
Off-the-shelf product certification;
Automated & continuous security to detect, report, respond to, contain, & mitigate incidents.
SOX, FISMA, HIPAA,
GLBA, PCI
JSOX, MITS, EU,
ISO
HITECH Act, Dodd-Frank Act
Cyber Security Act
Cyber Enhancement Act
ICE Act
DATA
IT SECURITY & COMPLIANCE AUTOMATION5
IT SECURITY & COMPLIANCE AUTOMATION6
A More Challenging Environment
IT SECURITY & COMPLIANCE AUTOMATION
Des
ired
Sta
te
No Visibility
Drifting
High-riskTemporary
Success
Time
What Hasn’t Worked:Periodic Assessments Create Data But Limited Intelligence
IT SECURITY & COMPLIANCE AUTOMATION
Assess & Achieve
Maintain
Non-stop monitoring & collectionDynamic analysis to find suspicious activitiesAlert on impact to policyRemediate options to speed remedy
Maintain: Security, Compliance & Operations
Des
ired
Sta
te
Time
IT SECURITY & COMPLIANCE AUTOMATION
6 Steps for Managing Compliance
Step 1. Obtain security and compliance best practice expertise and resources.
Step 2. Quantify the effect of compliance and each security event.
Step 3. Cost-effectively build a security and compliance management program.
Step 4. Address specific and immediate short-term risk.
Step 5. Automate and standardize best practices for managed compliance.
Step 6. Consolidate compliance requirements into a “golden standard,” creating a swift and repeatable audit reporting process.
IT SECURITY & COMPLIANCE AUTOMATION
How do you get started?
Select the right technologies for:• Log Management• Security Event Monitoring• Tracking & monitoring access to the network• File Integrity, Policy Compliance, and Remediation Management
Automate & centralize the compliance process and technologies
Visibility Intelligence Automation
IT SECURITY & COMPLIANCE AUTOMATION
Additional Thought Leadership
• Summarizes key points• Describes the affect of compliance
vs. noncompliance• Explains how to consolidate
compliance requirements into a “golden standard,” creating a swift and repeatable audit reporting process.
• Offers a Due Diligence Checklist• Complimentary copy
Questions
Paul Reymann
(410) 956-7336
www.verticalenabler.com
Cindy Valladares
www.tripwire.comTripwire Americas: 1.800.TRIPWIRETripwire EMEA: +44 (0) 20 7382 5420Tripwire Japan: +812.53206.8610Tripwire Singapore: +65 6733 5051Tripwire Australia-New Zealand: +61 (0) 402 138 980
THANK YOU!
Cindy [email protected]