SlideShare a Scribd company logo
RETHINKINGYour Endpoint Security StrategyPaul Henry | Security and Forensics Analyst
The Threat Landscape has Evolved…
Shift in Information that is TargetedMarket for stolen data is saturatedThen - Stolen personally identifiable information sold on the black market for up to $15 per recordNow - Credit card data has dropped to about 20 cents per recordNew, more valuable target is now intellectual property (IP)Revenue-generating informationMuch larger impact and value – organization versus individuals3
Data Breaches Impact Your Bottom Line4
No Longer a Microsoft WorldThen-Priority on patching servers and Windows O/S
Now-PC and 3rd party apps are the biggest source of enterprise risk5
Continued Increase of Cyber CrimeRise in malicious attacksRoot cause of 31% of the data breaches studied (up from 24% YoY)*Cyber attacks impact business97% of respondents consider cyber attacks as the most severe threat to their ability to carry out their missionsHarder to detect and more difficult to contain and remediateFinancially motivated cyber criminals* Ponemon Institute, Annual Cost of Data Breach 20116
Rising Cyber Terrorism… Impact of WikiLeaks7
The Reality of Advanced Persistent ThreatsMore Sophisticated Threats Leveraging Multiple Attack VectorsZero-day and third party application vulnerabilities
Physical access through data ports
Web-based attacks through the browserThe Rise of APTs… Highly targeted, constantly evolving, custom-developed malware
Sony
Stuxnet
RSA8
APT Example… Stuxnet9
Trusted Insiders Open the Door to RiskNegligence remains the most common threat - and an increasingly expensive oneNegligence is root cause of 41% of the data breaches studied – the #1 cause*
Social media opens the door to even more risk of social engineering
The applications we use for productivity open networks and information to risk
Removable devices provide easy access, data mobility and… risk if not managed* Ponemon Institute, Annual Cost of Data Breach 201110
Security Status Quo is No Longer Effective
The New Endpoint RealitySecurity Best Practices Still Not Universally FollowedPatch and configuration management
Data protection practices
User rights managementIneffectiveness of Anti-VirusIncreasing malware sophistication
Only19% of new malware is detected on first day
50% of IT professionals point to malware as the leading cause of rising endpoint TCO12
Traditional Endpoint Security StrategyTraditional “Threat Centric” Endpoint SecurityIs No Longer Relevant “Basic security protection is not good enough.” Rowan Trollope SVPBlacklistingAs The Core Endpoint ProtectionVolume of Malware“You can’t just rely on antivirus software – and we’re an antivirus company.” George Kurtz Worldwide CTOZero DayMalwareAs a Service3rd Party Application Risk13
Challenges of Endpoint ManagementIT OperationsIT SecurityLack of integration across technologies is the#1 IT security risk*ChallengesChallengesLack of common management console
Increasing agent bloat
Increasing and costly back-end Integration
Lack of visibility and collaboration with IT security
Need for better accuracy

More Related Content

PDF
Jonathan raymond 2010 rotman telus - atlseccon2011
Atlantic Security Conference
 
PDF
Guide to high volume data sources for SIEM
Joseph DeFever
 
PDF
"Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my wh...
e-SIDES.eu
 
PDF
Wp evolving-threats-endpoint-security
Ai K
 
PPTX
SAM05_Barber PW (7-9-15)
Norm Barber
 
PDF
Symantec Intelligence Report - October 2014
Symantec
 
PDF
Best practices for_implementing_security_awareness_training
wardell henley
 
PDF
Protective Intelligence
wbesse
 
Jonathan raymond 2010 rotman telus - atlseccon2011
Atlantic Security Conference
 
Guide to high volume data sources for SIEM
Joseph DeFever
 
"Towards Value-Centric Big Data" e-SIDES Workshop - “You’re monitoring my wh...
e-SIDES.eu
 
Wp evolving-threats-endpoint-security
Ai K
 
SAM05_Barber PW (7-9-15)
Norm Barber
 
Symantec Intelligence Report - October 2014
Symantec
 
Best practices for_implementing_security_awareness_training
wardell henley
 
Protective Intelligence
wbesse
 

What's hot (20)

PPTX
Information security trends and concerns
John Napier
 
PDF
Countering Advanced Persistent Threats
Booz Allen Hamilton
 
DOCX
Creating And Enforcing Anti Malware Practices
Diane M. Metcalf
 
PDF
Tripwire_UK_Executive_Cybersecurity_Literacy_Survey
Melloney Jewell
 
PPTX
Gp2 Public Policy Assign8 644 Sp10
Deepa Devadas
 
PDF
Ey Asia-Pacific Cyber Case Competition 2019
Pinzhang Chen 陈品璋
 
PPT
Shaping Your Future in Banking Cybersecurity
Dawn Yankeelov
 
PDF
Impacts cloud remote_workforce
Rodrigo Varas
 
PDF
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
NetworkCollaborators
 
PPTX
Banks and cybersecurity v2
Semir Ibrahimovic
 
PDF
OverseeCyberSecurityAsHackersSeekToInfiltrate
Kashif Ali
 
PPTX
ISACA ISSA Presentation
Marc Crudgington, MBA
 
PDF
Aon Ransomware Response and Mitigation Strategies
CSNP
 
PDF
Pivotal Role of HR in Cybersecurity
Matthew Rosenquist
 
PDF
2010 Annual Study: U.S. Cost of a Data Breach
Symantec
 
PPTX
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security
 
PDF
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
 
PDF
Dell Technologies Cyber Security playbook
Margarete McGrath
 
PDF
Cybersecurity in the Boardroom
Marko Suswanto
 
PDF
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Citrin Cooperman
 
Information security trends and concerns
John Napier
 
Countering Advanced Persistent Threats
Booz Allen Hamilton
 
Creating And Enforcing Anti Malware Practices
Diane M. Metcalf
 
Tripwire_UK_Executive_Cybersecurity_Literacy_Survey
Melloney Jewell
 
Gp2 Public Policy Assign8 644 Sp10
Deepa Devadas
 
Ey Asia-Pacific Cyber Case Competition 2019
Pinzhang Chen 陈品璋
 
Shaping Your Future in Banking Cybersecurity
Dawn Yankeelov
 
Impacts cloud remote_workforce
Rodrigo Varas
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
NetworkCollaborators
 
Banks and cybersecurity v2
Semir Ibrahimovic
 
OverseeCyberSecurityAsHackersSeekToInfiltrate
Kashif Ali
 
ISACA ISSA Presentation
Marc Crudgington, MBA
 
Aon Ransomware Response and Mitigation Strategies
CSNP
 
Pivotal Role of HR in Cybersecurity
Matthew Rosenquist
 
2010 Annual Study: U.S. Cost of a Data Breach
Symantec
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
IBM Security
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
 
Dell Technologies Cyber Security playbook
Margarete McGrath
 
Cybersecurity in the Boardroom
Marko Suswanto
 
Not-For-Profit Cybersecurity and Privacy Disrupters During COVID-19
Citrin Cooperman
 
Ad

Similar to It's Time to Rethink Your Endpoint Strategy (20)

PPTX
Evolving State of the Endpoint Webinar
Lumension
 
PPTX
Select and Implement a Next Generation Endpoint Protection Solution
Info-Tech Research Group
 
PPTX
Protecting endpoints from targeted attacks
AppSense
 
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Napier University
 
PPTX
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
Adrian Sanabria
 
PPT
State of endpoint risk v3
Lumension
 
PPT
State of endpoint risk v3
Lumension
 
PPT
State of endpoint risk v3
Lumension
 
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
PDF
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
Mighty Guides, Inc.
 
PPTX
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
Lumension
 
PPTX
State of endpoint risk v3
Lumension
 
PPTX
State of endpoint risk v3
Lumension
 
PDF
You Can't Stop The Breach Without Prevention And Detection
CrowdStrike
 
PPT
Paul Henry’s 2011 Malware Trends
Lumension
 
PPT
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
PDF
REAL TIME ENDPOINT INSIGHTS
Accelerite
 
PPTX
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
 
PDF
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
John D. Haden
 
PDF
Carbon Black: Justifying the Value of Endpoint Security
Mighty Guides, Inc.
 
Evolving State of the Endpoint Webinar
Lumension
 
Select and Implement a Next Generation Endpoint Protection Solution
Info-Tech Research Group
 
Protecting endpoints from targeted attacks
AppSense
 
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Napier University
 
451 and Endgame - Zero breach Tolerance: Earliest protection across the attac...
Adrian Sanabria
 
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
Lumension
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Andris Soroka
 
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
Mighty Guides, Inc.
 
The Shifting State of Endpoint Risk: Key Strategies to Implement in 2011
Lumension
 
State of endpoint risk v3
Lumension
 
State of endpoint risk v3
Lumension
 
You Can't Stop The Breach Without Prevention And Detection
CrowdStrike
 
Paul Henry’s 2011 Malware Trends
Lumension
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Lumension
 
REAL TIME ENDPOINT INSIGHTS
Accelerite
 
Check Point Corporate Overview 2020 - Detailed
Moti Sagey מוטי שגיא
 
Evolving Threats Call For Integrated Endpoint Security Solutions With Holisti...
John D. Haden
 
Carbon Black: Justifying the Value of Endpoint Security
Mighty Guides, Inc.
 
Ad

More from Lumension (20)

PPTX
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
PPTX
2015 Endpoint and Mobile Security Buyers Guide
Lumension
 
PPTX
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
PPTX
2014 BYOD and Mobile Security Survey Preliminary Results
Lumension
 
PPTX
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
PPTX
Careto: Unmasking a New Level in APT-ware
Lumension
 
PPTX
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Lumension
 
PPTX
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
PPTX
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
PDF
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Lumension
 
PPTX
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
PPTX
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
PPTX
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
PPTX
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
PPTX
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
PPTX
Data Protection Rules are Changing: What Can You Do to Prepare?
Lumension
 
PPTX
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 
PPTX
BYOD & Mobile Security: How to Respond to the Security Risks
Lumension
 
PPTX
3 Executive Strategies to Reduce Your IT Risk
Lumension
 
PDF
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Lumension
 
Using SCCM 2012 r2 to Patch Linux, UNIX and Macs
Lumension
 
2015 Endpoint and Mobile Security Buyers Guide
Lumension
 
Top 10 Things to Secure on iOS and Android to Protect Corporate Information
Lumension
 
2014 BYOD and Mobile Security Survey Preliminary Results
Lumension
 
Using SCUP (System Center Updates Publisher) to Security Patch 3rd Party Apps...
Lumension
 
Careto: Unmasking a New Level in APT-ware
Lumension
 
Securing Your Point of Sale Systems: Stopping Malware and Data Theft
Lumension
 
2014 Security Trends: SIEM, Endpoint Security, Data Loss, Mobile Devices and ...
Lumension
 
2014 Data Protection Maturity Survey: Results and Analysis
Lumension
 
Greatest It Security Risks of 2014: 5th Annual State of Endpoint Risk
Lumension
 
Windows XP is Coming to an End: How to Stay Secure Before You Migrate
Lumension
 
Adobe Hacked Again: What Does It Mean for You?
Lumension
 
Real World Defense Strategies for Targeted Endpoint Threats
Lumension
 
APTs: The State of Server Side Risk and Steps to Minimize Risk
Lumension
 
2014 Ultimate Buyers Guide to Endpoint Security Solutions
Lumension
 
Data Protection Rules are Changing: What Can You Do to Prepare?
Lumension
 
Java Insecurity: How to Deal with the Constant Vulnerabilities
Lumension
 
BYOD & Mobile Security: How to Respond to the Security Risks
Lumension
 
3 Executive Strategies to Reduce Your IT Risk
Lumension
 
The Evolution of Advanced Persistent Threats_The Current Risks and Mitigation...
Lumension
 

Recently uploaded (20)

PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
The-Ethical-Hackers-Imperative-Safeguarding-the-Digital-Frontier.pptx
sujalchauhan1305
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Software Development Methodologies in 2025
KodekX
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 

It's Time to Rethink Your Endpoint Strategy

Editor's Notes

  • #5: $7.2 million per breach$214 per record
  • #6: Vulnerabilities affecting a typical end-user PC from 2007-2009 almost doubled from 220 to 420 and its expected to double again in 2010 (Secunia Half Year Report 2010)A PC with 50 programs installed had 3.5 times more vulnerabilities in the 24 third party programs installed than in the 26 Microsoft programs installed. It is expected that this ratio will increase to 4.4 in 2010. (Secunia Half Year Report 2010)Discover: Gain complete visibility of all IT assets, both managed and unmanaged.Assess: Perform a deep analysis and thorough OS, application and security configuration vulnerability assessments.Prioritize: Focus on your most critical security risks first.Remediate: Automatically deploy patches to an entire network per defined policy to support all OS’s and applications.Report: Provide operational and management reports that consolidate discovery, assessment and remediation information on a single management console.
  • #13: Stuxnet changed the risk landscapeMulti vector attack routesPhysical entry via USB port4 zero day vulnerabilities exploitedFrom espionage to sabotage50% of IT professionals cite endpoint complexity as #1 risk factor3-5 Consoles used in the day to day management of IT Operations and Security workflows, and 3-6 agents per endpointMalware has increased by 500% and major AV firms are falling behind on documenting known signatures.11M malware signatures identified monthlyNearly 90% of vulnerabilities could be exploited remotely 2.19 new vulnerabilities are released per day. 3Average cost of a data breach $6.75M. 470% of all serious data incidents sparked by an insider. 5
  • #14: Core security defense is still blacklistingPatch is someone else’s issue (IT ops)
  • #15: 49% of endpoint TCO is associated with security and operational management** Complex system managementDecreased endpoint performance and lack of scalability-Agent BloatCostly integration, and maintenance Limited visibility and collaboration
  • #19: The First 6 months of 2010 was the most active malware creation in history: Over 10Million samplesMore than 1.5M malware samples are identified each month.57,000 new malware websites are created every weekObfuscationVirus Trojan-USB MediaDedicated WebsiteSemi Legitimate Web PagesTargeted-Intellectual PropertyOn average AV vendors detect less than 19% of malware attacks*
  • #22: Key strategies to improve endpoint security and reduce complexity in the new threat environment.1. Rethink Endpoint Security – to address from the outside in as opposed to inside out. What does this mean? Instead of focusing solely on the datacenter, endpoints, mobile devices, third party apps and users have become the vulnerability points to get at sensitive information.2. Shift from threat based approach to one based on trust. Balances the old axiom of more security equals less productivity to “who do I need to empower and at what level of trust?”3. Depth in defense – no holy grail. No single one technology can address risk.4. Reduce complexity through integration and standardization – that’s the value of the LEMSS platform.5. People, policy and technology all must play into your security strategy. Policy without technology is useless. People without process is chaos. Technology that doesn’t support people is not operational/functional.
  • #24: On top of defense-in-depth, time to shift from threat-centric approach to one based on trust….
  • #25: Defense in Depth StrategyAddress the core IT Risk with Patch & Configuration ManagementStop unwanted / untrusted change with Application ControlProtect against insider risk Device ControlDeploy a broad defensive perimeter with AntiVirusReduce endpoint complexity with an Endpoint Management and Security Suite
  • #30: I have given you sense of the shifts taking place in the endpoint environmenthow we need to change our approach to endpoint management and security what Lumension vision is and the steps we are already taking