Endpoint Security Fundamentals Series - Part 1: Finding and Fixing the Leaky Buckets

Preview:

DESCRIPTION

In Chapter 1 of this series, we discuss the first steps to understanding your IT risk and gain the visibility to set up a healthy endpoint security program.

Citation preview

Endpoint Security Fundamentals: Part 1Finding and Fixing the

Leaky Buckets

Today’s Speakers

2

Mike RothmanAnalyst and PresidentSecurosis, LLC

Jeff HughesDirector, Solution MarketingLumension

Endpoint Security Fundamentals

•Do you know what’s important?

http://www.flickr.com/photos/thebees/4644864402/

Before You Start

• Assessment

• Endpoints

• Users

• Data

• Network

• Policies

• Prioritize Based on Risks

http://www.flickr.com/photos/redvers/532076662/

•Risk Confirmation

•Remediation Plan

Triage

http://www.flickr.com/photos/thunderchild5/4489404902/

How can you get a QUICK Win?

http://www.flickr.com/photos/jayneandd/4450623309/

Don’t minimize the importance of communications!

http://www.flickr.com/photos/mrbill/40588740/

Summary•Knowing what to protect is as important

as protecting it

• Priorities are driven by risk, and you need to figure out what that means to your organization

•Triage is about figuring out what can be fixed quickly (and cheaply)

•Communication is about managing expectations

mrothman@securosis.com

http://securosis.com

Twitter: @securityincite

Securosis LLC

Mike Rothman

Q&A

Resources and Tools

• Endpoint Security Fundamentals Resource Center• http://www.lumension.com/Resources/eBooks/Endpoint-Security-Fundamentals.aspx

• Other Resources» Podcasts, Videos, Webcasts

» On-Demand Demos

» Scanners

• Product Evaluations» Virtual Environment

» Full Software Download

12

Global Headquarters8660 East Hartford Drive

Suite 300

Scottsdale, AZ 85255

1.888.725.7828

info@lumension.com

blog.lumension.com

Recommended