18
FROM 2016 BROUGHT TO YOU BY industry insights

Industry Insights from Infosecurity Europe 2016

Embed Size (px)

Citation preview

Page 1: Industry Insights from Infosecurity Europe 2016

FROM

2016 BROUGHT TO YOU BY

industry insights

Page 2: Industry Insights from Infosecurity Europe 2016

PAUL EDON

BRIEFING THE GENERAL: 10

QUICK TIPS FOR IMPROVING

YOUR BOARD’S CYBER LITERACY

Many boards can improve the knowledge, awareness and confidence to connect security to the business.

Edon shared tips on how to effectively interact with the board to bring security issues front and center.

@ T R I P W I R E I N C / # I N F O S E C 1 6

Page 3: Industry Insights from Infosecurity Europe 2016

NEXT-GEN CISO: HOW TO BE A SUCCESSFUL SECURITY LEADER OF THE FUTURE

This session featuring industry-leading CISOs discussed the evolution of this role, including the

critical skills and qualities of an effective, next-generation CISO.

@ T R I P W I R E I N C / # I N F O S E C 1 6

Page 4: Industry Insights from Infosecurity Europe 2016

PAUL EDON

IS SECURITY YOUR

COMPETITIVE

ADVANTAGE?

@ T H O M L A N G F O R D / # I N F O S E C 1 6

Langford discussed how organisations can

differentiate themselves by ensuring employees are fully aware of what security means to the

company, and creating a security-focused culture.

Page 5: Industry Insights from Infosecurity Europe 2016

PAUL EDON

CHASING RAINBOWS – FORGETTING ABOUT

THE RAIN

@ Q U E N T Y N B L O G / # I N F O S E C 1 6

Taylor highlighted some of the recent headline-grabbing stories, and

what organisations can do to proactively address the potential of losing valuable information.

Page 6: Industry Insights from Infosecurity Europe 2016

PAUL EDON

COMPLETE DEFENSE:

GROUND TROOPS WITH

AIR SUPPORT

@ T R I P W I R E I N C / # I N F O S E C 1 6

Ebrahimi discussed how to eliminate “blind spots”

from network to endpoint, respond faster to incidents through

tighter integration, and create stronger security through partnerships.

Page 7: Industry Insights from Infosecurity Europe 2016

PAUL EDON

CONNECTING SECURITY TO THE BUSINESS

@ A M I S E C U R E D / # I N F O S E C 1 6

In this session, Singh created a mind map of Endpoint Detection and

Response (EDR), including the critical components of threat

intelligence, vulnerability management, software discovery and more.

Page 8: Industry Insights from Infosecurity Europe 2016

PAUL EDON

CRYPTOGRAPHY, QUANTAM

COMPUTING & THE FUTURE

OF CYBER SECURITY

CONTROLS

@ J A Y A B A L O O / # I N F O S E C 1 6

Jaya discussed the evolution of cyber

security controls against a background of

increasingly complex risk and vulnerabilities, multiple attack vectors and sophisticated threat

actors.

Page 9: Industry Insights from Infosecurity Europe 2016

DATA BREACH SURVIVOR: REAL WORLD TRIPS, TRICKS

& ADVICE

Edon shared practical strategies security

professionals can utilise to effectively recover

from security incidents, as well as key

information that must be communicated to

business stakeholders.

@ T R I P W I R E I N C / # I N F O S E C 1 6

Page 10: Industry Insights from Infosecurity Europe 2016

ENDPOINT DETECTION

AND RESPONSE

FOR DUMMIES

@ T R I P W I R E I N C / # I N F O S E C 1 6

In this session, Hermosillo provided valuable tips and

advice on how to approach the basics for building a strong EDR

platform that aligns with your organisation’s security program.

Page 11: Industry Insights from Infosecurity Europe 2016

HEADLINES, BREACHES & THE

BOARD: YOU’VE GOT THEIR

ATTENTION – NOW WHAT?

@ T R I P W I R E I N C / # I N F O S E C 1 6

In this panel discussion, industry experts gave

real-world insight into how to engage senior management in a way that focuses on the most important aspects of

cybersecurity.

Page 12: Industry Insights from Infosecurity Europe 2016

ICS SECURITY: PROTECTING YOUR CRITICAL

INFRASTRUCTURE

Davies described the growing threat

landscape of industrial control system

environments, as well as approaches and

strategies for protecting mission-critical systems.

@ S T E P H E N F D A V I E S / # I N F O S E C 1 6

Page 13: Industry Insights from Infosecurity Europe 2016

PAUL EDON

KNOWING THE UNKOWN:

MONITOR YOUR

ENDPOINTS FOR ENEMIES

@ M R T R A V / # I N F O S E C 1 6

Although we can prepare for zero-days, new

tactics or techniques are, by definition, “unknown

unknowns.” In this presentation, Smith

shined a light on how to bring these unknown

attacks to light.

Page 14: Industry Insights from Infosecurity Europe 2016

PAUL EDON

INCREASING INSIGHT: IMPROVING INCIDENT

RESPONSE CAPABILITIES WITH DYNAMIC FILE ANALYSIS

@ T R I P W I R E I N C / # I N F O S E C 1 6

Wood demonstrated how sandboxing capabilities allow

automatic detection of zero-day threats and give unprecedented

access to global threat intelligence for faster incident response.

Page 15: Industry Insights from Infosecurity Europe 2016

UNDERSTANDING & AVOIDING

THE THREAT OF

RANSOMWARE

Ransomware is increasingly targeting organisations of all sizes, and many

businesses have no strategy for defence or

recovery. Wood highlighted the 7 key defenences to adopt.

@ P E T E R W O O D X / # I N F O S E C 1 6

Page 16: Industry Insights from Infosecurity Europe 2016

PAUL EDON

INTEGRATING BREACH DETECTION & ENDPOINT

PROTECTION TO WIN THE CYBER WAR

@ T R I P W I R E I N C / # I N F O S E C 1 6

In this case study, Moles explained how a

technology integration of Tripwire and Lastline

allowed an organisation to adequately detect and

defend against new threats.

Page 17: Industry Insights from Infosecurity Europe 2016

SECURE CODING &

DEVELOPMENT: EMBEDDING

APPLICATION SECURITY INTO

BUSINESS PROCESSES

@ T R I P W I R E I N C / # I N F O S E C 1 6

Panelists discussed the reasons for the

disconnect between security & development, as well as the steps that can be taken to drive a

secure application development process.

Page 18: Industry Insights from Infosecurity Europe 2016

FOR THE LATEST SECURITY NEWS, TRENDS AND INSIGHTS, VISIT US AT:

TRIPWIRE.COM/BLOG

GRAPHIC RECORDINGS BY: MEETING MAGIC @MEETINGMAGICLTD