Upload
hosting
View
796
Download
0
Embed Size (px)
Citation preview
1
HOW TO SPEND YOUR CLOUD SECURITY DOLLARTricia Pattee | HOSTING Product Manager
• This webinar is being recorded and an on-demand version will be available at the same URL at the conclusion of the webinar
• Please submit questions via the button on the upper left of the viewer• If we don’t get to your question during the
webinar, we will follow up with you via email• Download related resources via the
“Attachments” button above the viewing panel• On Twitter? Join the conversation
@HOSTINGdotcom
2
Housekeeping
• Today’s Obstacles• 5 most common security mistakes• Security Risk Management Process• How to determine the right amount to
spend• Security Checklist• Hidden cloud security costs
3
Agenda
4
Today’s Obstacles
Key findings from The Global State of Information Security Survey 2015 by PWC
5
Key findings from The Global State of Information Security Survey 2015 by PWC
6
Key findings from The Global State of Information Security Survey 2015 by PWC
How is security reflected in your overall IT budget?
7
Key findings from The Global State of Information Security Survey 2015 by PWC
Security budget
Review roles/responsibilities of security organization
Security policies
Security technologies
Overall security strategy
Review of current security and privacy risks
40%
20%
30%
36%
42%
25%
The Board of Directors remain uninvolved in most organizations
1. “We have to achieve 100 percent security.”
8
5 Most Common Security Mistakes That Impact Budgets
1. “We have to achieve 100 percent security.”
2. “Our weapons have to be better than those of the hackers.”
9
5 Most Common Security Mistakes That Impact Budgets
1. “We have to achieve 100 percent security.”
2. “Our weapons have to be better than those of the hackers.”
3. “Investing in best-of-class technical tools will keep us safe.”
10
5 Most Common Security Mistakes That Impact Budgets
1. “We have to achieve 100 percent security.”
2. “Our weapons have to be better than those of the hackers.”
3. “Investing in best-of-class technical tools will keep us safe.”
4. “We are secure because we are compliant.”
11
5 Most Common Security Mistakes That Impact Budgets
1. “We have to achieve 100 percent security.”
2. “Our weapons have to be better than those of the hackers.”
3. “Investing in best-of-class technical tools will keep us safe.”
4. “We are secure because we are compliant.”
5. “Defending ourselves requires recruiting the best professionals.”
12
5 Most Common Security Mistakes That Impact Budgets
• How big is the risk for your organization and the organizations you do business with?
13
Understanding Your Risk
• How big is the risk for your organization and the organizations you do business with?
• Do your processes and culture enable effective risk management?
14
Understanding Your Risk
• How big is the risk for your organization and the organizations you do business with?
• Do your processes and culture enable effective risk management?
• How large should your security budget be and how should you spend it? 15
Understanding Your Risk
16
Reducing Your Risk
Prevention
17
Reducing Your Risk
Detection
Prevention
18
Reducing Your Risk
Response
Detection
Prevention
19
Where to…
20
Top Six Areas of Security Spend
PatchingVulnerabilit
y Manageme
nt
Malware/Antivirus Backups
Threat Detection
Log Monitoring
21
Top Six Areas of Security Spend
PatchingVulnerabilit
y Manageme
nt
Malware/Antivirus Backups
Threat Detection
Log Monitoring
Training
People
Process
22
Hidden Cloud Security Costs & Risks
• Purchasing a la carte
23
Hidden Cloud Security Costs & Risks
• Purchasing a la carte• Security-in-a-box
24
Hidden Cloud Security Costs & Risks
• Purchasing a la carte• Security-in-a-box• Investing in tools, not people
and processes
25
Hidden Cloud Security Costs & Risks
• Purchasing a la carte• Security-in-a-box• Investing in tools, not people
and processes• Assuming risk responsibility
26
Q&ATricia Pattee | HOSTING Product Manager
For more information about threat management solutions by HOSTING, please contact our team at 888.894.4678.