SlideShare a Scribd company logo
1
HOW TO SPEND YOUR CLOUD
SECURITY DOLLAR
Tricia Pattee | HOSTING Product Manager
• This webinar is being recorded and an on-demand
version will be available at the same URL at the
conclusion of the webinar
• Please submit questions via the button on the upper left
of the viewer
• If we don’t get to your question during the webinar,
we will follow up with you via email
• Download related resources via the “Attachments”
button above the viewing panel
• On Twitter? Join the conversation @HOSTINGdotcom
2
Housekeeping
• Today’s Obstacles
• 5 most common security mistakes
• Security Risk Management Process
• How to determine the right amount to spend
• Security Checklist
• Hidden cloud security costs
3
Agenda
4
Today’s Obstacles
Key findings from The Global State of Information Security Survey 2015 by PWC
5
Key findings from The Global State of Information Security Survey 2015 by PWC
6
Key findings from The Global State of Information Security Survey 2015 by PWC
How is security
reflected in your
overall IT budget?
7
Key findings from The Global State of Information Security Survey 2015 by PWC
Security budget
Review roles/responsibilities
of security organization
Security policies
Security technologies
Overall security strategy
Review of current security
and privacy risks
40%
20%
30%
36%
42%
25%
The Board of Directors remain uninvolved in most organizations
1. “We have to achieve 100 percent
security.”
8
5 Most Common Security Mistakes
That Impact Budgets
1. “We have to achieve 100 percent
security.”
2. “Our weapons have to be better than
those of the hackers.”
9
5 Most Common Security Mistakes
That Impact Budgets
1. “We have to achieve 100 percent
security.”
2. “Our weapons have to be better than
those of the hackers.”
3. “Investing in best-of-class technical
tools will keep us safe.”
10
5 Most Common Security Mistakes
That Impact Budgets
1. “We have to achieve 100 percent
security.”
2. “Our weapons have to be better than
those of the hackers.”
3. “Investing in best-of-class technical
tools will keep us safe.”
4. “We are secure because we are
compliant.”
11
5 Most Common Security Mistakes
That Impact Budgets
1. “We have to achieve 100 percent
security.”
2. “Our weapons have to be better than
those of the hackers.”
3. “Investing in best-of-class technical
tools will keep us safe.”
4. “We are secure because we are
compliant.”
5. “Defending ourselves requires recruiting
the best professionals.”
12
5 Most Common Security Mistakes
That Impact Budgets
• How big is the risk for your
organization and the organizations you
do business with?
13
Understanding Your Risk
• How big is the risk for your
organization and the organizations you
do business with?
• Do your processes and culture enable
effective risk management?
14
Understanding Your Risk
• How big is the risk for your
organization and the organizations you
do business with?
• Do your processes and culture enable
effective risk management?
• How large should your security budget
be and how should you spend it?
15
Understanding Your Risk
16
Reducing Your Risk
Prevention
17
Reducing Your Risk
Detection
Prevention
18
Reducing Your Risk
Response
Detection
Prevention
19
Where to…
20
Top Six Areas of Security Spend
Patching
Vulnerability
Management
Malware/
Antivirus
Backups
Threat
Detection
Log
Monitoring
21
Top Six Areas of Security Spend
Patching
Vulnerability
Management
Malware/
Antivirus
Backups
Threat
Detection
Log
Monitoring
22
Hidden Cloud Security Costs & Risks
• Purchasing a la carte
23
Hidden Cloud Security Costs & Risks
• Purchasing a la carte
• Security-in-a-box
24
Hidden Cloud Security Costs & Risks
• Purchasing a la carte
• Security-in-a-box
• Investing in tools, not people and
processes
25
Hidden Cloud Security Costs & Risks
• Purchasing a la carte
• Security-in-a-box
• Investing in tools, not people and
processes
• Assuming risk responsibility
26
Q&A
Tricia Pattee | HOSTING Product Manager
For more information about threat management solutions by HOSTING, please
contact our team at 888.894.4678.

More Related Content

PDF
Risk Management Metrics That Matter
PDF
Amateur Hour: Why APTs Are The Least Of Your Worries
PDF
Its time to grow up by Eric C.
PDF
Cyber strategies stack the odds in your favor
PPTX
ciso-platform-annual-summit-2013-defending-against-APT
PDF
Why is Security Management So Hard?
PPTX
High Performance Security Report - High Technology
PDF
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
Risk Management Metrics That Matter
Amateur Hour: Why APTs Are The Least Of Your Worries
Its time to grow up by Eric C.
Cyber strategies stack the odds in your favor
ciso-platform-annual-summit-2013-defending-against-APT
Why is Security Management So Hard?
High Performance Security Report - High Technology
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...

What's hot (20)

PDF
Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217
PDF
Top 20 Public Bug Bounty Programs
PDF
Security Testing for Test Professionals
PPTX
Evolving Cybersecurity Threats
PPTX
The Dark Side of Events
PPSX
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
PPT
Pdc Fall World Final
PDF
Ops Happen: Improve Security Without Getting in the Way
PDF
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
PDF
Planning a move from Perspective to CORE
PPTX
One login enemy at the gates
PPTX
BIS "Is Your Company at Risk for a Security Breach?"
PDF
(Open Sourced) Cyber Scavenger Hunt - Gamified Security Awareness, even on a ...
PDF
ISC2_Omaha_WarGaming_6.6.16
PDF
(Open Sourced) Cyber Scavenger Hunt - Gamified Security Awareness, even on a ...
PDF
Security Awareness: The Best Defence
PPTX
Minding the Metacognitive Gap - BSides NOLA
PDF
Erica Hardinge - CSO Perspectives Roadshow 2016
PDF
Collaborated cyber defense in pandemic times
PDF
Ponemon - Cost of Failed Trust: Threats and Attacks
Digital crimescene emv_update_nrfprotect17_skipmyersbethprovenzano_final061217
Top 20 Public Bug Bounty Programs
Security Testing for Test Professionals
Evolving Cybersecurity Threats
The Dark Side of Events
Caveon Webinar Series - The Art of Test Security - Know Thy Enemy - November ...
Pdc Fall World Final
Ops Happen: Improve Security Without Getting in the Way
Hexis Cybersecurity Mission Possible: Taming Rogue Ghost Alerts
Planning a move from Perspective to CORE
One login enemy at the gates
BIS "Is Your Company at Risk for a Security Breach?"
(Open Sourced) Cyber Scavenger Hunt - Gamified Security Awareness, even on a ...
ISC2_Omaha_WarGaming_6.6.16
(Open Sourced) Cyber Scavenger Hunt - Gamified Security Awareness, even on a ...
Security Awareness: The Best Defence
Minding the Metacognitive Gap - BSides NOLA
Erica Hardinge - CSO Perspectives Roadshow 2016
Collaborated cyber defense in pandemic times
Ponemon - Cost of Failed Trust: Threats and Attacks
Ad

Similar to How to Spend Your Cloud Security Dollar (20)

PDF
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
PPTX
Threat Intelligence + SIEM: A Force to be Reckoned With
PPTX
WANTED - People Committed to Solving Our Information Security Language Problem
PDF
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
PPTX
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
PPTX
Information security challenges in today’s banking environment
PDF
BLACKOPS_USCS CyberSecurity Literacy
PPTX
WANTED – People Committed to Solving our Information Security Language Problem
PDF
2015 Atlanta CHIME Lead Forum
PDF
2015 Atlanta CHIME Lead Forum
PDF
2015 Atlanta CHIME Lead Forum
PPTX
People Committed to Solving our Information Security Language Problem
PPTX
ISSA-OC and Webster University Cybersecurity Seminar Series Presentation
PPTX
Keynote @ ECMECC School Security Summit
PPTX
Intro to a Data-Driven Computer Security Defense
PPTX
Cybersecurity Risk Governance
PDF
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
PDF
Windstream Cloud Security Checklist
PPTX
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
PPTX
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Banning Whining, Avoiding Cyber Wolves, and Creating Warrior
Threat Intelligence + SIEM: A Force to be Reckoned With
WANTED - People Committed to Solving Our Information Security Language Problem
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Everything is not awesome: The rising threat of Cyber-attack and what to do a...
Information security challenges in today’s banking environment
BLACKOPS_USCS CyberSecurity Literacy
WANTED – People Committed to Solving our Information Security Language Problem
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
2015 Atlanta CHIME Lead Forum
People Committed to Solving our Information Security Language Problem
ISSA-OC and Webster University Cybersecurity Seminar Series Presentation
Keynote @ ECMECC School Security Summit
Intro to a Data-Driven Computer Security Defense
Cybersecurity Risk Governance
"Security on the Brain" Security & Risk Psychology Workshop Nov 2013
Windstream Cloud Security Checklist
I am the Cavalry (The Cavalry Is Us) Sourceconf September 2015
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Ad

More from Hostway|HOSTING (20)

PPTX
Compliance-as-a-Crisis: Managing Cloud Compliance
PPTX
SQL Server 2016: Just a Few of Our DBA's Favorite Things
PPTX
KPIs: Aligning Your IT and Business Objectives
PPTX
Ransomware: Mitigation Through Preparation
PPTX
Cyber Threat Hunting with Phirelight
PPTX
Hacking Airwaves with Pineapples
PPTX
5 Cloud Migration Experiences Not to Be Repeated
PPTX
Caveat Emptor: 10 Questions to Ask a Managed Service Provider Before You Sign
PPTX
Cloud Migration: Tales from the Trenches
PPTX
Protecting Against Disaster: Plan for the Inevitable Before it Happens
PPTX
Don’t Get Caught with An Out of Support MS SQL Server…
PPTX
Content Delivery in an On-Demand Age
PPTX
High Performance Security: Mitigating DDoS Attacks Without Losing Your Edge
PPTX
Finding Success with Managed Services in the Azure Environment
PPTX
DR in the Cloud: Finding the Right Tool for the Job
PPTX
Safeguarding PCI Data in the Cloud
PPTX
Understanding Your Cloud Service Provider’s BAA
PPTX
Azure: Finding Success Beyond Test/Dev
PPTX
New Business Models in Behavioral Health IT
PPTX
Introducing HOSTING Labs - Ed Schaefer
Compliance-as-a-Crisis: Managing Cloud Compliance
SQL Server 2016: Just a Few of Our DBA's Favorite Things
KPIs: Aligning Your IT and Business Objectives
Ransomware: Mitigation Through Preparation
Cyber Threat Hunting with Phirelight
Hacking Airwaves with Pineapples
5 Cloud Migration Experiences Not to Be Repeated
Caveat Emptor: 10 Questions to Ask a Managed Service Provider Before You Sign
Cloud Migration: Tales from the Trenches
Protecting Against Disaster: Plan for the Inevitable Before it Happens
Don’t Get Caught with An Out of Support MS SQL Server…
Content Delivery in an On-Demand Age
High Performance Security: Mitigating DDoS Attacks Without Losing Your Edge
Finding Success with Managed Services in the Azure Environment
DR in the Cloud: Finding the Right Tool for the Job
Safeguarding PCI Data in the Cloud
Understanding Your Cloud Service Provider’s BAA
Azure: Finding Success Beyond Test/Dev
New Business Models in Behavioral Health IT
Introducing HOSTING Labs - Ed Schaefer

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Getting Started with Data Integration: FME Form 101
PPTX
1. Introduction to Computer Programming.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
A Presentation on Artificial Intelligence
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Machine Learning_overview_presentation.pptx
PDF
August Patch Tuesday
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
Tartificialntelligence_presentation.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
OMC Textile Division Presentation 2021.pptx
Group 1 Presentation -Planning and Decision Making .pptx
Getting Started with Data Integration: FME Form 101
1. Introduction to Computer Programming.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Unlocking AI with Model Context Protocol (MCP)
A comparative analysis of optical character recognition models for extracting...
A Presentation on Artificial Intelligence
Network Security Unit 5.pdf for BCA BBA.
Univ-Connecticut-ChatGPT-Presentaion.pdf
Empathic Computing: Creating Shared Understanding
Encapsulation_ Review paper, used for researhc scholars
gpt5_lecture_notes_comprehensive_20250812015547.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Machine Learning_overview_presentation.pptx
August Patch Tuesday
Digital-Transformation-Roadmap-for-Companies.pptx

How to Spend Your Cloud Security Dollar

  • 1. 1 HOW TO SPEND YOUR CLOUD SECURITY DOLLAR Tricia Pattee | HOSTING Product Manager
  • 2. • This webinar is being recorded and an on-demand version will be available at the same URL at the conclusion of the webinar • Please submit questions via the button on the upper left of the viewer • If we don’t get to your question during the webinar, we will follow up with you via email • Download related resources via the “Attachments” button above the viewing panel • On Twitter? Join the conversation @HOSTINGdotcom 2 Housekeeping
  • 3. • Today’s Obstacles • 5 most common security mistakes • Security Risk Management Process • How to determine the right amount to spend • Security Checklist • Hidden cloud security costs 3 Agenda
  • 4. 4 Today’s Obstacles Key findings from The Global State of Information Security Survey 2015 by PWC
  • 5. 5 Key findings from The Global State of Information Security Survey 2015 by PWC
  • 6. 6 Key findings from The Global State of Information Security Survey 2015 by PWC How is security reflected in your overall IT budget?
  • 7. 7 Key findings from The Global State of Information Security Survey 2015 by PWC Security budget Review roles/responsibilities of security organization Security policies Security technologies Overall security strategy Review of current security and privacy risks 40% 20% 30% 36% 42% 25% The Board of Directors remain uninvolved in most organizations
  • 8. 1. “We have to achieve 100 percent security.” 8 5 Most Common Security Mistakes That Impact Budgets
  • 9. 1. “We have to achieve 100 percent security.” 2. “Our weapons have to be better than those of the hackers.” 9 5 Most Common Security Mistakes That Impact Budgets
  • 10. 1. “We have to achieve 100 percent security.” 2. “Our weapons have to be better than those of the hackers.” 3. “Investing in best-of-class technical tools will keep us safe.” 10 5 Most Common Security Mistakes That Impact Budgets
  • 11. 1. “We have to achieve 100 percent security.” 2. “Our weapons have to be better than those of the hackers.” 3. “Investing in best-of-class technical tools will keep us safe.” 4. “We are secure because we are compliant.” 11 5 Most Common Security Mistakes That Impact Budgets
  • 12. 1. “We have to achieve 100 percent security.” 2. “Our weapons have to be better than those of the hackers.” 3. “Investing in best-of-class technical tools will keep us safe.” 4. “We are secure because we are compliant.” 5. “Defending ourselves requires recruiting the best professionals.” 12 5 Most Common Security Mistakes That Impact Budgets
  • 13. • How big is the risk for your organization and the organizations you do business with? 13 Understanding Your Risk
  • 14. • How big is the risk for your organization and the organizations you do business with? • Do your processes and culture enable effective risk management? 14 Understanding Your Risk
  • 15. • How big is the risk for your organization and the organizations you do business with? • Do your processes and culture enable effective risk management? • How large should your security budget be and how should you spend it? 15 Understanding Your Risk
  • 20. 20 Top Six Areas of Security Spend Patching Vulnerability Management Malware/ Antivirus Backups Threat Detection Log Monitoring
  • 21. 21 Top Six Areas of Security Spend Patching Vulnerability Management Malware/ Antivirus Backups Threat Detection Log Monitoring
  • 22. 22 Hidden Cloud Security Costs & Risks • Purchasing a la carte
  • 23. 23 Hidden Cloud Security Costs & Risks • Purchasing a la carte • Security-in-a-box
  • 24. 24 Hidden Cloud Security Costs & Risks • Purchasing a la carte • Security-in-a-box • Investing in tools, not people and processes
  • 25. 25 Hidden Cloud Security Costs & Risks • Purchasing a la carte • Security-in-a-box • Investing in tools, not people and processes • Assuming risk responsibility
  • 26. 26 Q&A Tricia Pattee | HOSTING Product Manager For more information about threat management solutions by HOSTING, please contact our team at 888.894.4678.

Editor's Notes