vulnerability voodoo and the convergence of foundational security controls

29
Vulnerability Voodoo: The Convergence of Foundational Security Controls CHARLES KOLODGY, RESEARCH VICE PRESIDENT FOR IDC'S SECURITY PRODUCTS SERVICE, EDWARD SMITH, PRODUCT MARKETING MANAGER AT TRIPWIRE

Upload: tripwire

Post on 05-Dec-2014

1.001 views

Category:

Technology


1 download

DESCRIPTION

In this, our final webcast of 2013, we’ll show you how Vulnerability Management at “The New Tripwire” benefits you and your organization and how an intelligent approach to performance reporting and visualization enables better business decisions. Charles Kolodgy, Research Vice President for IDC's Security Products service, and Edward Smith, Product Marketing Manager at Tripwire discuss: - Integrating Vulnerability Management with other security controls to improve compliance and security posture - Leveraging Vulnerability Management beyond the server room to reduce risk across the entire enterprise - Combining business intelligence from Vulnerability Management with other security controls to make better business decisions A recording of the webcast that accompanies this slide deck can be found here: http://www.tripwire.com/register/vulnerability-voodoo-the-convergence-of-foundational-security-controls/

TRANSCRIPT

Page 1: Vulnerability Voodoo and the Convergence of Foundational Security Controls

Vulnerability Voodoo:The Convergence of Foundational Security Controls

CHARLES KOLODGY, RESEARCH VICE PRESIDENT FOR IDC'S SECURITY PRODUCTS SERVICE, EDWARD SMITH, PRODUCT MARKETING MANAGER AT TRIPWIRE

Page 2: Vulnerability Voodoo and the Convergence of Foundational Security Controls

Vulnerability Voodoo: The Convergence of

Foundational Security Controls

Page 3: Vulnerability Voodoo and the Convergence of Foundational Security Controls

3

The leading provider of risk-based security and compliance management solutions, enabling enterprises

to effectively connect security to their business

• Broadest set of foundational security controls

• Business context with blended asset and risk scoring

• Security business intelligence with performance reporting and visualization to make better decisions

• Covering the extended enterprise

TRIPWIRECONFIDENCE: SECURED

Page 4: Vulnerability Voodoo and the Convergence of Foundational Security Controls

4

Inventory Hardware1 Inventory Software2

Secure Configurations for Network Devices

10

20 CSCDELIVERING THE ‘FIRST FOUR’

4

Secure Configurations for Servers & Endpoints

3

Application Security

6

Boundary Defense13 Maintain & Monitor Audit Logs

14

Vulnerability Assessment

4

5: Malware Protection7: Wireless Device Control11: Limit & Control Net Ports

Additional Support

12: Control Admin Privileges15: ‘Need to Know’ Access16: Account Monitoring & Control

Page 5: Vulnerability Voodoo and the Convergence of Foundational Security Controls

5

Tripwire Delivers Foundational Security Controls

System Integrity

SecurityConfiguration Management

Continuous

Periodic

Vulnerability Management& Log Management

Asset Discovery & Reconciliation

Fre

qu

en

cy

HighLow Number of Devices

CRITICAL DATA

Risk & Business Criticality

BUSINESS PARTNERS

Servers Applications BYODDatabases DesktopsFirewalls Net Devices Printer Wireless

Page 6: Vulnerability Voodoo and the Convergence of Foundational Security Controls

6

Tripwire Product Suite

• Vulnerability Management

• Security Configuration Management

• Log Intelligence

• Reporting and Analytics

Page 7: Vulnerability Voodoo and the Convergence of Foundational Security Controls

Vulnerability Voodoo: The Convergence of Foundational Security Controls

Charles KolodgyResearch VP

Security Products

Page 8: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 8

Page 9: Vulnerability Voodoo and the Convergence of Foundational Security Controls

Agenda

• Pain• Brain v. Brawn• VRM Program• Security Policy• Value• Analyst Closing Comments

9© IDC Visit us at IDC.com and follow us on Twitter: @IDC

Page 10: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 10

Pain

Expanding Business Requirements Data Overload Lack of visibility Budget Constraints Consumerization Bad Users Compliance Straightjacket Malware Professional Attackers

Page 11: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 11

Regulatory Controls

• Straight Jacket on IT Operations• Drives Operations and Budgets• Compliance not equal to Security• Brake on Innovative Business Opportunities• Can’t be Avoided• Auditors require PROOF

“Hackers may find you, auditors WILL find you.”

Page 12: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 12

Compliance DrivenWhat percentage of your overall IT budget is associated with

regulatory compliance?

What percentage of your overall IT budget is associated with regulatory compliance?

On average, 13% of respondents’ overall IT budget is associated with regulatory compliance

None

Less than 10%

10% - 24%

25% or more

0% 5% 10% 15% 20% 25% 30% 35% 40% 45%

2011 2009 2007

Source: IDC’s Enterprise Security Surveys for 2007 & 2009 & 2011

Page 13: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 13

Security Gap

TIME

Expanding Security

GapCumulative Growth

Page 14: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 14

Vulnerabilities

Majority of security breaches exploit known vulnerabilities

Vulnerabilities in software and configurations Window of Exposure Expanding

Vulnerability Patch Released

ExploitWritten Exploit

Popularized

PatchTesting

50%PatchesInstalled

All PatchesInstalled

Window of Exposure

Page 15: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 15

Polling Question

How is your company’s Vulnerability Assessment program perceived?

It is a Tactical solution

It is a Strategic solution

It is only for Compliance (check box)

We do not have a corporate side VA program

Page 16: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 16

Brain v. Brawn

• Multi-layers of security products• Brawn products address specific threats• Brain products used to Manage & Assess• Brain products (VA, P&C, SIEM) only 11%

security spend• Managing and Assessing can be force

multiplier• Integrate with Other Security Controls• Starts with Vulnerability Risk Management

Program

Page 17: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 17

Vulnerability Risk Management:

Vulnerability Risk Management is a Process to determine the probability and impact of an event

Ties together What, How and Why Improve capabilities to make intelligent IT security

investment decisions Risk-prioritized issues drive action Relies on accurate, correlated information Align security reality with business goals

Basic Security Assessment

Stay ahead of threats

Focus on top priorities

Build sustainable risk program

Connect to business

Page 18: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 18

Vulnerability Risk Management: The Process Assess Threats Assess Vulnerabilities Estimate Value of Vulnerable Asset Estimate Frequency of Exploitability Rank Vulnerability Estimate Cost to Remediate Prioritize Initiatives Implement Improvements

Page 19: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 19

Vulnerability Risk Management:The Benefits

2

• Draw data driven conclusions which are defensible

• Prioritize remediation based on exploitability not just vulnerability

• Have quantifiable measurement with which to remediate risks

Risk Prioritization

1

• Identify vulnerabilities to systems and networks

• Identify what systems have drifted from a known “good state”

• Drive awareness, action and accountability with targeted metrics

Better Visibility

3

• Automate assessment and remediation lifecycle

• Facilitate continual assessments for better data accuracy

• Convey impact of IT risk in business-relevant terms

Automation

Page 20: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 20

Enterprise Security Policy

Vulnerability Risk Management isn’t solved with just technology, but rules

Policies are a mechanism for dealing with the most difficult problems in computer security

What, How and Why? Knowing why something needs to be protected it becomes easier to

describe potential risks within the context of business objectives.

Implementing security according to a “master plan” results in consistency

Measurement and Enforcement required to make policies real

Policy bridges the gap between technology and reality!

Page 21: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 21

Top IT Initiatives

Source: IDC CIO Agenda Survey. November-December, 2011Data shows % of respondents who listed as a top 3 initiative. n= 36

Page 22: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 22

Vulnerability Risk Management: Competitive Advantage Drive up cost for adversaries Improve capability to make intelligent IT security

investment decisions• Security solutions protect what needs to be protected• Saving time and money on security

Reduce security “fire fighting” enables strategic monitoring and prevention

Improve confidence in security Measure Status and Progress for auditors and executives IT Security can intelligently support business innovation

Page 23: Vulnerability Voodoo and the Convergence of Foundational Security Controls

© IDC Visit us at IDC.com and follow us on Twitter: @IDC 23

Analyst Final Thoughts

Considerable stakes to the business Work smarter (Brain) not harder (Brawn) Vulnerability Risk Management puts YOU in control

• Identify and respond quickly• Adjust to ever-change

Select the RIGHT security solutions that secures and improves business efficiency

Policy needs to be part of the solution Ultimately align IT Security to Business Operations

Page 24: Vulnerability Voodoo and the Convergence of Foundational Security Controls

24

Tripwire IP360 provides actionable vulnerability intelligence to efficiently and effectively manage the constant change of security risk in complex computing environments.

Enterprise Vulnerability Management

Page 25: Vulnerability Voodoo and the Convergence of Foundational Security Controls

25

PRIORITIZE

Prioritization of vulnerabilities using business context

Up-to-date and accurate vulnerability research from the Tripwire VERT team

Continuous and on-demand vulnerability detection

Understand which vulnerability you should fix right now

Page 26: Vulnerability Voodoo and the Convergence of Foundational Security Controls

26

DISCOVER

Take inventory of devices and software to manage or reduce attack surface

Detect unpublished vulnerabilities in web applications

Scan the “hard to reach places” like your network perimeter and remote offices

Detect vulnerabilities, devices, software, and lost/hidden devices on your network

Page 27: Vulnerability Voodoo and the Convergence of Foundational Security Controls

27

MEASURE

Measure, analyze, and communicate proactively and effectively with key stakeholders

Measure how effectively you are reducing risk

Executives Auditors

Security & IT Ops

Page 28: Vulnerability Voodoo and the Convergence of Foundational Security Controls

28

Q&A

Questions?

Page 29: Vulnerability Voodoo and the Convergence of Foundational Security Controls

tripwire.com | @TripwireInc

THANK YOU