21
1 © 2017 ServiceNow All Rights Reserved © 2017 ServiceNow All Rights Reserved MYKE LYONS Head of Security Strategy, Security Business Unit ServiceNow Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ServiceNow

Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

1© 2017 ServiceNow All Rights Reserved© 2017 ServiceNow All Rights Reserved

MYKE LYONSHead of Security Strategy, Security Business Unit

ServiceNow

Resolve Real Security Threats Fast

DEVON WINKWORTHAdvisory Solution Consultant

ServiceNow

Page 2: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

2© 2017 ServiceNow All Rights Reserved

Agenda

• The Power of Security Operations

• Trusted Security Circles

• Vendor Risk Management

Page 3: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

3© 2017 ServiceNow All Rights Reserved 3© 2017 ServiceNow All Rights Reserved

The Power of Security Operations

Page 4: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

4© 2017 ServiceNow All Rights Reserved

Organisations Have Invested in a LOT of Security Products

PROTECT: DETECT: RESPOND:

[NOT SO MUCH]

Page 5: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

5© 2017 ServiceNow All Rights Reserved

Organisations Are Struggling to Find and Stop Breaches

Source: Ponemon Institute 2017

On average, it took respondents 191 days to spot a breach caused by a malicious attacker, and 66 days to contain it.

Page 6: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

6© 2017 ServiceNow All Rights Reserved

And the Vulnerability Backlog is Piling Up

• 61% of vulnerabilities are patched within a month

• Leftovers are likely NEVER to be patched

source: Verizon Data Breach Investigations Report 2017

Page 7: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

7© 2017 ServiceNow All Rights Reserved

Top 10 Vulnerabilities Exploited in 2015 Were Over a Year OldAnd 48% were five or more years old

source: HPE Cyber Security Report, 2016

Page 8: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

8© 2017 ServiceNow All Rights Reserved

The Need: Enterprise Security Response

Security Incident

Response

Vulnerability

ResponseWorkflow

Automation &

Orchestration

Deep IT

Integration

Threat

Intelligence

ENTERPRISE SECURITY RESPONSE

Page 9: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

9© 2017 ServiceNow All Rights Reserved 9© 2017 ServiceNow All Rights Reserved Confidential

DEMO

Page 10: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

10© 2017 ServiceNow All Rights Reserved 10© 2017 ServiceNow All Rights Reserved

Trusted Security Circles

Page 11: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

11© 2017 ServiceNow All Rights Reserved

Threat Intelligence Sharing Improves Orchestration Accuracy

Complete Current Relevant

Page 12: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

12© 2017 ServiceNow All Rights Reserved

Make People More Effective

Shared intelligence fills in the skill gaps

Page 13: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

13© 2017 ServiceNow All Rights Reserved

Share Intelligence with ServiceNow Trusted Security Circles

• Anonymous sharing

• Automatic sightings searches

• Circles based on commonality

• Sharing stays with your company

• Supports industry standards – STIX, TAXII

• Early warning of potential attacks

Page 14: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

14© 2017 ServiceNow All Rights Reserved 14© 2017 ServiceNow All Rights Reserved Confidential

DEMO

Page 15: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

15© 2017 ServiceNow All Rights Reserved 15© 2017 ServiceNow All Rights Reserved

Vendor Risk Management

Page 16: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

16© 2017 ServiceNow All Rights Reserved

Your Enterprise Doesn’t Exist In Isolation

IT softwarevendors

Outsourcers

Consultants Affiliates

Distributors

Resellers

Page 17: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

17© 2017 ServiceNow All Rights Reserved

Today’s Vendor Risk Management Processes & Tools Can’t Keep Up

Manual Processes

Manual and time consuming processes make it difficult to provide adequate coverage for all critical vendors; leaving the enterprise open to loss events and unnecessary risk.

PoorVisibility

The inability to see what needs to get done, by when, and who is working on it means we can’t get visibility into program activities and overall risk posture; so we don’t get the type, depth, or timely information we want.

Siloed & Rudimentary

Tools

Siloed and antiquated risk management tools make it difficult to operate effectively within the extended enterprise; making it hard to prioritize and remediate issues.

Page 18: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

18© 2017 ServiceNow All Rights Reserved

Introducing ServiceNow Vendor Risk Management

Policy & Compliance Management Risk Management Audit Management Vendor Risk Management

SingleDatabase

ContextualCollaboration

ServiceCatalog

ServicePortal

Subscription & Notification

KnowledgeBase

OrchestrationDeveloperTools

Reports & Dashboards

Workflow

Intelligent Automation Engine

Predictive Modeling

Anomaly Detection

PeerBenchmarks

PerformanceForecasting

Nonstop Cloud

Page 19: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

19© 2017 ServiceNow All Rights Reserved

Transform Inefficient Processes into a Unified Vendor Risk Program

AutomateGain

VisibilityUnify and Prioritize

Gain visibility & transparency for you and your vendor into the status of assessments, issues, and tasks; and track changes across your vendor ecosystem.

Easily prioritize risks andeffortlessly drive them to closure when you integrate disparate siloes of information and technology with a user friendly experience across the extended enterprise.

Replace unstructured work patterns with intelligent workflows. Assessments, issues, notifications, and other work items can be automatically generated, assigned, and easily actioned.

Page 20: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

20© 2017 ServiceNow All Rights Reserved 20© 2017 ServiceNow All Rights Reserved Confidential

DEMO

Page 21: Resolve Real Security Threats Fast - ServiceNow · 2020. 7. 27. · Resolve Real Security Threats Fast DEVON WINKWORTH Advisory Solution Consultant ... Easily prioritize risks and

21© 2017 ServiceNow All Rights Reserved

1 2 3

Summary

Security Operations can help you build

an Enterprise Security Response

Program

Trusted Security Circles can invert the

threat intelligence model, allowing you to proactively stop

threats

Vendor Risk Management

monitors, prioritizes and automates

response to third-party risk