qualis - how to reduce business risk
DESCRIPTION
Qualis - How to reduce business riskTRANSCRIPT
![Page 1: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/1.jpg)
How to reduce business risksby implementing VULNERABILITY MANAGEMENT process?
Edvinas Pranculis MM, CISA, CISMEdvinas Pranculis MM, CISA, CISMRegional Account Manager – Eastern Europe & Central Asia
![Page 2: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/2.jpg)
Agenda
� Risk Management
� Vulnerability Management
� QualysGuard & SaaS Model
� Q&A
![Page 3: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/3.jpg)
Risk Management ProcessHow to treat risk?
Risk Treatment Techniques
� Risk Transference
� Risk Acceptance / Tolerance� Risk Acceptance / Tolerance
� Risk Mitigation / Reduction
� Risk Avoidance
� Risk Containment* AS/NZS 4360:2004
![Page 4: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/4.jpg)
Defining Risk & Risk MitigationWhat is most effective way to reduce risk?
Risk Mitigation Techniques
� Reduce Threats
� Reduce Vulnerabilities
EFF
EC
TIV
EN
ESS
Level of Risk = f (BI, LoT, LoV)
� Reduce Vulnerabilities
� Reduce Asset Value
� Detect
� RecoverEFF
EC
TIV
EN
ESS
![Page 5: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/5.jpg)
Need for Vulnerability Management
� Vulnerabilities on network are GOLD to cyber criminals:
– Provide unauthorized entry to networks
Sources of Vulnerabilities
� Programming errors� Unintentional mistakes� Intentional malware software� Improper system configurations
– Can expose confidential information, fuel stolen identities, violate privacy laws, or paralyze operations
– Exposure is extreme for networks with vulnerable devices connected by IP
� Improper system configurations� Remote users sidestepping
perimeter security� Rising attacks through viewing
popular websites� Flaws in algorithms� etc.
![Page 6: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/6.jpg)
Key to Security?Fixing problems before bad guys find them…
Hacking Linux Exposed
“… the countermeasure that will protect you, should a hacker scan your machines with a scanner, is to your machines with a scanner, is to scan your own systems first.
Make sure to address any problemsand then a scan by a hacker will give him no edge…”
![Page 7: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/7.jpg)
Security + Compliance Lifecycle Workflow
Under this new paradigm, a system is deemed out of compliance if it is:
� Vulnerable to attacks� Improperly configured� In violation of internal policies or external regulations
![Page 8: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/8.jpg)
Security + Compliance Delivered as a Service
Bringing Security and Compliance Audits in a Single Solution,Operationalising it and
Delivering it as a Service
NO SOFTWARE TO INSTALL AND MAINTAIN
![Page 9: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/9.jpg)
ReportingCommunicate and consult
And Delivering it as a Service
Leveraging CobIT, ISO, ITIL and NIST Security & Compliance Frameworks
The Security + Compliance Conundrum
![Page 10: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/10.jpg)
QualysGuard Global InfrastructureSecurity + Compliance
� Annual Volume of Scans: 500+ millions IP audit scans with 7,000 scanner appliances in over 85 countries
� The world's largest VM enterprise deployment at a Forbes Global 50 with 220+ scanner appliances deployed in 52 countries scanning ~700 000 IPs
End to End Security
![Page 11: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/11.jpg)
QualysGuard Adoptionby Industry Verticals Page 2 of 2
Health CareMedia Energy/Utilities Consumer Products
Manufacturing Education Transportation Government
![Page 12: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/12.jpg)
QualysGuard Adoptionby Industry Verticals Page 1 of 2
Financial Services ChemicalInsurance Financial Services
Portals/Internet Retail Technology Consulting
![Page 13: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/13.jpg)
Qualys Strategic PartnersGlobal Partner Network
Media
![Page 14: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/14.jpg)
Benefits of Vulnerability Management
� Vulnerability management gives you control and visibility to manage your networks security effectively and document compliance
� Vulnerability management is PROACTIVE approach � Vulnerability management is PROACTIVE approach to security
![Page 15: Qualis - How to reduce business risk](https://reader034.vdocuments.us/reader034/viewer/2022042823/568bdcc51a28ab2034b369fb/html5/thumbnails/15.jpg)
Q&A
Thank [email protected]
Please visit www.qualys.com for a 14-day FREE trial
- NO SOFTWARE TO INSTALL OR MAINTAIN -