14
Managing Risk and Vulnerabilities in a Business Context

Managing risk and vulnerabilities in a business context

  • Upload
    algosec

  • View
    227

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Managing risk and vulnerabilities in a business context

Managing Risk and Vulnerabilities

in a Business Context

Page 2: Managing risk and vulnerabilities in a business context

Corey BodzinVP of Product Management

Qualys

Nimmy ReichenbergVP of Strategy

AlgoSec

Kevin BeaverCISSP

Principle Logic, LLC

Page 3: Managing risk and vulnerabilities in a business context

Tennyson would be impressed…

• NVD 60,865 CVEs since 1999

• 7,322 published in 2013 alone

• 385 Severity 5’s published by Qualys in 2013

• 4 iDefense Exclusive Zero-Day vulnerabilities in

just February alone!

Page 4: Managing risk and vulnerabilities in a business context

“Risk and the accountability for risk

acceptance are — and should be —

owned by the business units creating

and managing those risks.”- Paul Proctor, VP, Distinguished Analyst

Page 5: Managing risk and vulnerabilities in a business context

Severity Threat Path Analysis Asset Tagging

Cri!cal ≠ ImportantAssume everything is

“Hackable”

VERY difficult to maintain

with pace of change

Page 6: Managing risk and vulnerabilities in a business context

Byserver/device22%

By network segment

30%

By business application

48%

What is your ideal method for prioritizing network vulnerabilities?

Source: Examining the Impact of Security

Management on the Business, AlgoSec, Oct 2013

Page 7: Managing risk and vulnerabilities in a business context

The Impact of the Cloud and SDN

on IT Risk and Policy Management

Page 8: Managing risk and vulnerabilities in a business context

Integration between

Qualys and AlgoSec

Page 9: Managing risk and vulnerabilities in a business context

QualysGuard Integrated Suite

of Security & Compliance Solutions

*In Beta

Vulnerability

Management

Policy

Compliance

Customizable

QuestionnairesPCI

DSS

Web Application

Scanning

Malware

DetectionWeb Application

FirewallWeb Application

Log Analysis

Continuous

Monitoring

* **

Asset

Management

* *

Page 10: Managing risk and vulnerabilities in a business context

Qualys Drives Visibility

VMware ESX and ESXi

Physical Scanners

BrowserPlugins

MobileAgents

VirtualScanners

Hypervisor

IaaS/PaaS

PerimeterScanners

Page 11: Managing risk and vulnerabilities in a business context

Analysis Drives Action

Who is the owner?What business processes does it support?Are there regulatory requirements?

Who is the last logged on user?Is there customer data present?What is the SLA for patching?

Physical Scanners

MobileAgents

Page 12: Managing risk and vulnerabilities in a business context

Firewall Analyzer

Security Policy

Analysis & Audit

FireFlow

Security Policy

Change Automation

BusinessFlow

Business Application

Connectivity MgmtBusiness Applications

Security Infrastructure

Application Owners

AlgoSec Security Management Suite

SecurityNetwork Operations

AlgoSec Security Management Suite

Page 13: Managing risk and vulnerabilities in a business context

Next Steps and Q&A

Security Policy

Management in the

Data Center for

Dummies:

Available at

www.algosec.com

Read Kevin’s Books, blogs and

columns at

www.principlelogic.com/resources

and blog.algosec.com/author/kbeaver

Follow Kevin’s musings on

Twittter at @kevinbeaverRequest an Evaluation of the

AlgoSec Suite:

www.algosec.com/eval

Visit us at

www.qualys.com

QualysGuard Free Trial

www.qualys.com/trials

For future webcasts visit us at

www.qualys.com/webcasts

Page 14: Managing risk and vulnerabilities in a business context

Managing Risk and Vulnerabilities

in a Business Context