13
Endpoint Security Fundamentals: Part 3 Building the Endpoint Security Program

Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

Embed Size (px)

DESCRIPTION

In the final part of this series, Mike Rothman, analyst with Securosis, takes the steps and enforcement controls discussed from parts 1 and 2 and examines how to build a real-world, defense-in-depth security program – one that is sustainable and one the does not impede business productivity.

Citation preview

Page 1: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

Endpoint Security Fundamentals: Part 3Building the Endpoint

Security Program

Page 2: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

Today’s Speakers

2

Mike RothmanAnalyst and PresidentSecurosis, LLC

Jeff HughesDirector, Solution MarketingLumension

Page 3: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

Endpoint Security Fundamentals

Page 4: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

http://www.flickr.com/photos/rock_creek/2127667538/

The Endpoint Security Program

•Managing Expectations

•Defining Success

Page 5: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

http://www.flickr.com/photos/quinnanya/3516196398/

User Training

Can we get them through the hoop?

Page 6: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

The world is a dynamic place. Feedback Loops keep things current.

http://www.flickr.com/photos/fish2000/2040347358/

Feedback Loops

Page 7: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

•Confirm the Attack

•Contain the Damage

•Post-Mortem

Incident Response

http://www.flickr.com/photos/tripleman/3379489159/

Page 8: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

What will make the auditor go away as quickly as

possible?http://www.flickr.com/photos/bourgeoisbee/2037138405/

Compliance Reporting

Page 9: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

Summary•Technology nor controls are effective without

the structure of a program

•Your success is based on how well you manage expectations (and how well you respond to incidents)

•The Program must evolve through constant assessment of feedback

•Unless you can substantiate it, it didn’t happen

Page 10: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

[email protected]

http://securosis.com

Twitter: @securityincite

Securosis LLC

Mike Rothman

Page 11: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

Q&A

Page 12: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

Resources and Tools

• Endpoint Security Fundamentals Resource Center• http://www.lumension.com/Resources/eBooks/Endpoint-Security-Fundamentals.aspx

• Other Resources» Podcasts, Videos, Webcasts

» On-Demand Demos

» Scanners

• Product Evaluations» Virtual Environment

» Full Software Download

12

Page 13: Endpoint Security Fundamentals Part 3: Building the Endpoint Security Program

Global Headquarters8660 East Hartford Drive

Suite 300

Scottsdale, AZ 85255

1.888.725.7828

[email protected]

blog.lumension.com