13
Endpoint Security Fundamentals: Part 1 Finding and Fixing the Leaky Buckets

Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

Embed Size (px)

DESCRIPTION

In Chapter 1 of this series, we discuss the first steps to understanding your IT risk and gain the visibility to set up a healthy endpoint security program.

Citation preview

Page 1: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

Endpoint Security Fundamentals: Part 1Finding and Fixing the

Leaky Buckets

Page 2: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

Today’s Speakers

2

Mike RothmanAnalyst and PresidentSecurosis, LLC

Jeff HughesDirector, Solution MarketingLumension

Page 3: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

Endpoint Security Fundamentals

Page 4: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

•Do you know what’s important?

http://www.flickr.com/photos/thebees/4644864402/

Before You Start

Page 5: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

• Assessment

• Endpoints

• Users

• Data

• Network

• Policies

• Prioritize Based on Risks

http://www.flickr.com/photos/redvers/532076662/

Page 6: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

•Risk Confirmation

•Remediation Plan

Triage

http://www.flickr.com/photos/thunderchild5/4489404902/

Page 7: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

How can you get a QUICK Win?

http://www.flickr.com/photos/jayneandd/4450623309/

Page 8: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

Don’t minimize the importance of communications!

http://www.flickr.com/photos/mrbill/40588740/

Page 9: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

Summary•Knowing what to protect is as important

as protecting it

• Priorities are driven by risk, and you need to figure out what that means to your organization

•Triage is about figuring out what can be fixed quickly (and cheaply)

•Communication is about managing expectations

Page 10: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

[email protected]

http://securosis.com

Twitter: @securityincite

Securosis LLC

Mike Rothman

Page 11: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

Q&A

Page 12: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

Resources and Tools

• Endpoint Security Fundamentals Resource Center• http://www.lumension.com/Resources/eBooks/Endpoint-Security-Fundamentals.aspx

• Other Resources» Podcasts, Videos, Webcasts

» On-Demand Demos

» Scanners

• Product Evaluations» Virtual Environment

» Full Software Download

12

Page 13: Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

Global Headquarters8660 East Hartford Drive

Suite 300

Scottsdale, AZ 85255

1.888.725.7828

[email protected]

blog.lumension.com