Upload
lumension
View
729
Download
1
Tags:
Embed Size (px)
DESCRIPTION
In Chapter 1 of this series, we discuss the first steps to understanding your IT risk and gain the visibility to set up a healthy endpoint security program.
Citation preview
Endpoint Security Fundamentals: Part 1Finding and Fixing the
Leaky Buckets
Today’s Speakers
2
Mike RothmanAnalyst and PresidentSecurosis, LLC
Jeff HughesDirector, Solution MarketingLumension
Endpoint Security Fundamentals
•Do you know what’s important?
http://www.flickr.com/photos/thebees/4644864402/
Before You Start
• Assessment
• Endpoints
• Users
• Data
• Network
• Policies
• Prioritize Based on Risks
http://www.flickr.com/photos/redvers/532076662/
•Risk Confirmation
•Remediation Plan
Triage
http://www.flickr.com/photos/thunderchild5/4489404902/
How can you get a QUICK Win?
http://www.flickr.com/photos/jayneandd/4450623309/
Don’t minimize the importance of communications!
http://www.flickr.com/photos/mrbill/40588740/
Summary•Knowing what to protect is as important
as protecting it
• Priorities are driven by risk, and you need to figure out what that means to your organization
•Triage is about figuring out what can be fixed quickly (and cheaply)
•Communication is about managing expectations
Q&A
Resources and Tools
• Endpoint Security Fundamentals Resource Center• http://www.lumension.com/Resources/eBooks/Endpoint-Security-Fundamentals.aspx
• Other Resources» Podcasts, Videos, Webcasts
» On-Demand Demos
» Scanners
• Product Evaluations» Virtual Environment
» Full Software Download
12
Global Headquarters8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255
1.888.725.7828
blog.lumension.com