how to spend your cloud security dollar

Post on 13-Apr-2017

796 Views

Category:

Technology

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

1

HOW TO SPEND YOUR CLOUD SECURITY DOLLARTricia Pattee | HOSTING Product Manager

• This webinar is being recorded and an on-demand version will be available at the same URL at the conclusion of the webinar

• Please submit questions via the button on the upper left of the viewer• If we don’t get to your question during the

webinar, we will follow up with you via email• Download related resources via the

“Attachments” button above the viewing panel• On Twitter? Join the conversation

@HOSTINGdotcom

2

Housekeeping

• Today’s Obstacles• 5 most common security mistakes• Security Risk Management Process• How to determine the right amount to

spend• Security Checklist• Hidden cloud security costs

3

Agenda

4

Today’s Obstacles

Key findings from The Global State of Information Security Survey 2015 by PWC

5

Key findings from The Global State of Information Security Survey 2015 by PWC

6

Key findings from The Global State of Information Security Survey 2015 by PWC

How is security reflected in your overall IT budget?

7

Key findings from The Global State of Information Security Survey 2015 by PWC

Security budget

Review roles/responsibilities of security organization

Security policies

Security technologies

Overall security strategy

Review of current security and privacy risks

40%

20%

30%

36%

42%

25%

The Board of Directors remain uninvolved in most organizations

1. “We have to achieve 100 percent security.”

8

5 Most Common Security Mistakes That Impact Budgets

1. “We have to achieve 100 percent security.”

2. “Our weapons have to be better than those of the hackers.”

9

5 Most Common Security Mistakes That Impact Budgets

1. “We have to achieve 100 percent security.”

2. “Our weapons have to be better than those of the hackers.”

3. “Investing in best-of-class technical tools will keep us safe.”

10

5 Most Common Security Mistakes That Impact Budgets

1. “We have to achieve 100 percent security.”

2. “Our weapons have to be better than those of the hackers.”

3. “Investing in best-of-class technical tools will keep us safe.”

4. “We are secure because we are compliant.”

11

5 Most Common Security Mistakes That Impact Budgets

1. “We have to achieve 100 percent security.”

2. “Our weapons have to be better than those of the hackers.”

3. “Investing in best-of-class technical tools will keep us safe.”

4. “We are secure because we are compliant.”

5. “Defending ourselves requires recruiting the best professionals.”

12

5 Most Common Security Mistakes That Impact Budgets

• How big is the risk for your organization and the organizations you do business with?

13

Understanding Your Risk

• How big is the risk for your organization and the organizations you do business with?

• Do your processes and culture enable effective risk management?

14

Understanding Your Risk

• How big is the risk for your organization and the organizations you do business with?

• Do your processes and culture enable effective risk management?

• How large should your security budget be and how should you spend it? 15

Understanding Your Risk

16

Reducing Your Risk

Prevention

17

Reducing Your Risk

Detection

Prevention

18

Reducing Your Risk

Response

Detection

Prevention

19

Where to…

20

Top Six Areas of Security Spend

PatchingVulnerabilit

y Manageme

nt

Malware/Antivirus Backups

Threat Detection

Log Monitoring

21

Top Six Areas of Security Spend

PatchingVulnerabilit

y Manageme

nt

Malware/Antivirus Backups

Threat Detection

Log Monitoring

Training

People

Process

22

Hidden Cloud Security Costs & Risks

• Purchasing a la carte

23

Hidden Cloud Security Costs & Risks

• Purchasing a la carte• Security-in-a-box

24

Hidden Cloud Security Costs & Risks

• Purchasing a la carte• Security-in-a-box• Investing in tools, not people

and processes

25

Hidden Cloud Security Costs & Risks

• Purchasing a la carte• Security-in-a-box• Investing in tools, not people

and processes• Assuming risk responsibility

26

Q&ATricia Pattee | HOSTING Product Manager

For more information about threat management solutions by HOSTING, please contact our team at 888.894.4678.

top related