SlideShare a Scribd company logo
KEEPING THREATS AT BAY
“A secure storage solution
is one that reliably stores
data and allows authorized
users to quickly access that
data, while also preventing
those unauthorized from
doing so...Ultimately, the
solution must protect the
confidentiality, integrity, and
availability of all data.”1
- Leviathan Security Group
1 Leviathan Security Group, “Value of Cloud Security: Vulnerability”
2 OECD, Economic oUtlook No. 95, May 2014, eMarketer, Smartphone Users Worldwide will Total 1.75 Billion in 2014, January 16, 2014; “The Global State of Information Sercurity” Survey 2015
3 Data Center Knowledge, “Data Center Security: Controlling Threat in Your Facility,” March 3, 2015
COMPREHENSIVE CLOUD SECURITY
Is your data secure?
“To sum up, there are three things any CSO or CIO should keep top of
mind: the perimeter is gone, visibility is key, and current security practices
are obsolete.”3
Security incidents outpace GDP and mobile phone growth2
Year-over-year growth, 2013-2014
Global security incidents
(GSISS 2015)
Global smartphone users
(eMarketer)
Global GDP
(OECD)
48%
22%
21%
4 PWC, Regulatory and Compliance Reporting, http://www.pwc.com/gx/en/audit-services/regulatory-compliance/index.html
5 Bureau Van Dijk, “Spread of regulatory action outside US 'the top compliance issue of 2014”
http://www.bvdinfo.com/industrynews/compliance-and-due-diligence/spread-of-regulatory-action-outside-us-the-top-compliance-issue-of-2014-/801768161#sthash.XyASNoN0.dpuf
6 Bloomberg, “A Regulatory Compliance Program Should be Top Concern, Advisors Say
COMPLIANCE – LIMITING RISKS
“Compliance is about
more than prevention.
It’s also about navigating
opportunities.”4
Are you confident you’re compliant?
Are you certain of all of your
compliance obligations?
“[The compliance plan] is not a document that you create and
put on the shelf and never deal with again. It needs to be a
living, breathing document that is tested and updated.”6
- Brian C. Ong, Sr. Managing Director,
FTI Consulting, New York
28%35%
COMPREHENSIVE CLOUD SECURITY
spread of regulatory action
outside of the US.5
anti-money
laundering rules.5
Top compliance issues of 2014:
7 Dept. of Homeland Security, “Increase in Insider Threat Cases Highlight Significant Risks to Business Networks and Proprietary Information
8 PRNewsire, “Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase”
POTENTIAL THREATS WITHIN
“There has been an
increase in computer
network exploitation and
disruption by disgruntled
and/or former employees.
The FBI and DHS assess
that disgruntled and former
employees pose a
significant cyber threat to
US businesses due to their
authorized access to
sensitive information and
the networks businesses
rely on.”7
stated their security tools don't provide
enough contextual information to determine
intent behind reported incidents.8
COMPREHENSIVE CLOUD SECURITY
recognize insider threats as a cause for
alarm but have difficulty identifying specific
threatening actions by insiders.8
How easy is it for users to abuse access privileges?
say it is likely social engineers from outside
the organization will target privileged users
to obtain their access rights.845%
69%
88%
PROCESSES AND PRACTICES
“Having a regularly
scheduled internal or
external vulnerability
assessment and penetration
test performed is a good
way to inform executive
leadership of the threats
facing the company,
determine the Company’s
adherence to industry
standards and best
practices, and to test ITs
ability to respond to
intrusion attempts and
other incidents.”9
9 Protivity, “Cybersecurity Concerns Rise as a Risk Factor for Board Members and Senior Executives in 2015”
http://www.prnewswire.com/news-releases/cybersecurity-concerns-rise-as-a-risk-factor-for-board-members-and-senior-executives-in-2015-300032571.html
10 SSAE – 16, “Vulnerability Assessment and Penetration Testing”
11 ITproportal, “New cloud survey reveals shadow IT dangers, and cloud policy adoption levels.
12 TechTarget, “Report finds poor security communication among executives”
COMPREHENSIVE CLOUD SECURITY
Do you track and report shadow I.T. and
other vulnerabilities?
Compliance regulations that require regular vulnerability assessments include
SOX; SSAE 16/SOC 1; PCI DSS; HIPAA, GLBA; FISCAM10
What IT professionals say:
Almost 1/3indicated that their organizations’ IT security teams
never discuss security with executives, and another
23% only communicate with executives on an annual
basis.12
72%
didn’t know the
number of shadow IT
apps running in their
company.11

More Related Content

PDF
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
PDF
5 Key Findings on Advanced Threats
PDF
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
PDF
10 things you should know about cybersecurity
PDF
Cognitive Security: How Artificial Intelligence is Your New Best Friend
PDF
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
PDF
The top challenges to expect in network security in 2019 survey report
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
5 Key Findings on Advanced Threats
Ponemon Report: Cyber Security Incident Response: Are we as prepared as we th...
10 things you should know about cybersecurity
Cognitive Security: How Artificial Intelligence is Your New Best Friend
CYBERSECURITY: Game Planning for Success lunch and learn event, April 10th
The top challenges to expect in network security in 2019 survey report

What's hot (20)

PDF
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
PPTX
Wearables and Internet of Things (IoT) - MWC15
PDF
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
PDF
Data exfiltration so many threats 2016
PDF
Symantec 2011 Encryption Flash Poll Global Results
PDF
Building a Mobile Security Model
PDF
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
PPTX
SC Magazine eSymposium: SIEM
DOCX
Why security is the kidney not the tail of the dog v3
PPTX
Imperva ppt
KEY
Introduction to MicroSolved, Inc.
PDF
Device discovery for vulnerability assessment: Automating the Handoff
PPTX
User Behavior Analytics And The Benefits To Companies
PPTX
Webinar Ivanti Neurons For Patch Intelligence
PDF
Spe security and privacy enhancement framework for mobile devices
PPTX
Security and Wearables: Success starts with security
PPTX
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
PDF
The Seven Kinds of Security
PDF
Data Safety And Security
PPT
Information Technology Security Basics
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
Wearables and Internet of Things (IoT) - MWC15
Five Reasons to Look Beyond Math-based Next-Gen Antivirus
Data exfiltration so many threats 2016
Symantec 2011 Encryption Flash Poll Global Results
Building a Mobile Security Model
Why You’ll Care More About Mobile Security in 2020 - Tom Bain
SC Magazine eSymposium: SIEM
Why security is the kidney not the tail of the dog v3
Imperva ppt
Introduction to MicroSolved, Inc.
Device discovery for vulnerability assessment: Automating the Handoff
User Behavior Analytics And The Benefits To Companies
Webinar Ivanti Neurons For Patch Intelligence
Spe security and privacy enhancement framework for mobile devices
Security and Wearables: Success starts with security
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?
The Seven Kinds of Security
Data Safety And Security
Information Technology Security Basics
Ad

Viewers also liked (15)

PDF
PDF
Symantec Consulting Infographic
ODP
Introduzione a Riak
PPTX
Veritas Managed Enterprise Vault Presentation
PPTX
Veritas Managed Backup Services Presentation
PPTX
Slider new saree desing
PDF
Personnel Management in MNE
PPTX
Presentation airmove milestone 201402
PPTX
Mantenimiento de teclado
PDF
EAI Non-Compliance Infographic
DOC
Time table no._2_actual
PDF
Financing Agriculture Technology Transfer in Bangladesh
PPTX
E government by lito
PPT
Automobile suspension system
PDF
Case Study: Starbucks
Symantec Consulting Infographic
Introduzione a Riak
Veritas Managed Enterprise Vault Presentation
Veritas Managed Backup Services Presentation
Slider new saree desing
Personnel Management in MNE
Presentation airmove milestone 201402
Mantenimiento de teclado
EAI Non-Compliance Infographic
Time table no._2_actual
Financing Agriculture Technology Transfer in Bangladesh
E government by lito
Automobile suspension system
Case Study: Starbucks
Ad

Similar to Windstream Cloud Security Checklist (20)

PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
idg_secops-solutions
PPTX
A guide to Sustainable Cyber Security
PDF
Building an Intelligence-Driven Security Operations Center
 
PDF
The Trust Paradox: Access Management and Trust in an Insecure Age
 
PPTX
Secure Iowa Oct 2016
PDF
Avoiding Limitations of Traditional Approaches to Security
PPTX
IT Security Essentials
PDF
Managed Security For A Not So Secure World Wp090991
PPTX
Top Cybersecurity Challenges Facing Your Business
PDF
User_Access_IIA-LA_3-9-2016
PDF
Foley-Cybersecurity-White-Paper_3.9.15
PDF
Biznesa infrastruktūras un datu drošības juridiskie aspekti
PPTX
Securing your digital world cybersecurity for sb es
PPTX
Securing your digital world - Cybersecurity for SBEs
PDF
Threat Hunting, Detection, and Incident Response in the Cloud
PDF
The State of Data Security
PDF
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
PPTX
CSA Atlanta Q1'2016 Chapter Meeting
PDF
Cybersecurity in the Cloud: Safer Than You Think
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
idg_secops-solutions
A guide to Sustainable Cyber Security
Building an Intelligence-Driven Security Operations Center
 
The Trust Paradox: Access Management and Trust in an Insecure Age
 
Secure Iowa Oct 2016
Avoiding Limitations of Traditional Approaches to Security
IT Security Essentials
Managed Security For A Not So Secure World Wp090991
Top Cybersecurity Challenges Facing Your Business
User_Access_IIA-LA_3-9-2016
Foley-Cybersecurity-White-Paper_3.9.15
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Securing your digital world cybersecurity for sb es
Securing your digital world - Cybersecurity for SBEs
Threat Hunting, Detection, and Incident Response in the Cloud
The State of Data Security
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
CSA Atlanta Q1'2016 Chapter Meeting
Cybersecurity in the Cloud: Safer Than You Think

More from Ideba (20)

PDF
Kaufman Hall Healthcare Infographic
PDF
Kaufman Hall Finance Infographic
PDF
Kaufman Hall Education Infographic
PDF
Kaufman Hall Axiom Software - Emory Case Study
PDF
Microsoft Teams Infographic
PPTX
C4 Database Management Onboarding
PDF
C4 Database Management Website
PDF
FINEOS Booth
PDF
FINEOS Website
PDF
Kaufman Hall Axiom Booth (2/2)
PDF
Kaufman Hall Axiom Booth (1/2)
PDF
Greenway Health Amicus Case Study
PDF
Greenway Health Dr. Randolph Lamberson Case Study
PDF
Cortez Health Case Study
PDF
Greenway Health Primary Care Internists Case Study
PDF
Greenway Health EHR Satisfaction Infographic
PDF
Greenway Health Cow Creek Case Study
PDF
Greenway Health Case Study Infographic
PDF
Ideba Uganda 2020 Logo Options
PPTX
Ideba Creative Portfolio
Kaufman Hall Healthcare Infographic
Kaufman Hall Finance Infographic
Kaufman Hall Education Infographic
Kaufman Hall Axiom Software - Emory Case Study
Microsoft Teams Infographic
C4 Database Management Onboarding
C4 Database Management Website
FINEOS Booth
FINEOS Website
Kaufman Hall Axiom Booth (2/2)
Kaufman Hall Axiom Booth (1/2)
Greenway Health Amicus Case Study
Greenway Health Dr. Randolph Lamberson Case Study
Cortez Health Case Study
Greenway Health Primary Care Internists Case Study
Greenway Health EHR Satisfaction Infographic
Greenway Health Cow Creek Case Study
Greenway Health Case Study Infographic
Ideba Uganda 2020 Logo Options
Ideba Creative Portfolio

Recently uploaded (20)

PPTX
hnk joint business plan for_Rooftop_Plan
PDF
Pay-Per-Click Marketing: Strategies That Actually Work in 2025
PPTX
"Best Healthcare Digital Marketing Ideas
PPTX
Presentation - GreenPantry – Instagram-First Home Kitchen Brand.pptx
PPTX
Best Digital marketing service provider in Chandigarh.pptx
PPTX
Choose the Right SEO Agency India - 7 Key Tips by Clickbold Media
PPT
Market research before Marketing Research .PPT
PPTX
Tea and different types of tea in India
PDF
Unit 1 -2 THE 4 As of RURAL MARKETING MIX.pdf
PPTX
Ranking a Webpage with SEO (And Tracking It with the Right Attribution Type a...
PDF
Branding Basics: Building a Strong Brand Identity, Positioning, Storytelling ...
PPTX
Fixing-AI-Hallucinations-The-NeuroRanktm-Approach.pptx
PDF
EVOLUTION OF RURAL MARKETING IN INDIAN CIVILIZATION
PDF
20K Btc Enabled Cash App Accounts – Safe, Fast, Verified.pdf
PPTX
Ipsos+Protocols+Playbook+V1.2+(DEC2024)+final+IntClientUseOnly.pptx
PDF
E_Book_Customer_Relation_Management_0.pdf
PDF
UNIT 1 -4 Profile of Rural Consumers (1).pdf
PDF
Digital Marketing Agency vs Freelancers and VAs: Which Should You Hire in 2025
PDF
SEO vs. AEO: Optimizing for Google vs AI-Powered Search Assistants
PDF
You Need SEO for Your Business. Here’s Why..pdf
hnk joint business plan for_Rooftop_Plan
Pay-Per-Click Marketing: Strategies That Actually Work in 2025
"Best Healthcare Digital Marketing Ideas
Presentation - GreenPantry – Instagram-First Home Kitchen Brand.pptx
Best Digital marketing service provider in Chandigarh.pptx
Choose the Right SEO Agency India - 7 Key Tips by Clickbold Media
Market research before Marketing Research .PPT
Tea and different types of tea in India
Unit 1 -2 THE 4 As of RURAL MARKETING MIX.pdf
Ranking a Webpage with SEO (And Tracking It with the Right Attribution Type a...
Branding Basics: Building a Strong Brand Identity, Positioning, Storytelling ...
Fixing-AI-Hallucinations-The-NeuroRanktm-Approach.pptx
EVOLUTION OF RURAL MARKETING IN INDIAN CIVILIZATION
20K Btc Enabled Cash App Accounts – Safe, Fast, Verified.pdf
Ipsos+Protocols+Playbook+V1.2+(DEC2024)+final+IntClientUseOnly.pptx
E_Book_Customer_Relation_Management_0.pdf
UNIT 1 -4 Profile of Rural Consumers (1).pdf
Digital Marketing Agency vs Freelancers and VAs: Which Should You Hire in 2025
SEO vs. AEO: Optimizing for Google vs AI-Powered Search Assistants
You Need SEO for Your Business. Here’s Why..pdf

Windstream Cloud Security Checklist

  • 1. KEEPING THREATS AT BAY “A secure storage solution is one that reliably stores data and allows authorized users to quickly access that data, while also preventing those unauthorized from doing so...Ultimately, the solution must protect the confidentiality, integrity, and availability of all data.”1 - Leviathan Security Group 1 Leviathan Security Group, “Value of Cloud Security: Vulnerability” 2 OECD, Economic oUtlook No. 95, May 2014, eMarketer, Smartphone Users Worldwide will Total 1.75 Billion in 2014, January 16, 2014; “The Global State of Information Sercurity” Survey 2015 3 Data Center Knowledge, “Data Center Security: Controlling Threat in Your Facility,” March 3, 2015 COMPREHENSIVE CLOUD SECURITY Is your data secure? “To sum up, there are three things any CSO or CIO should keep top of mind: the perimeter is gone, visibility is key, and current security practices are obsolete.”3 Security incidents outpace GDP and mobile phone growth2 Year-over-year growth, 2013-2014 Global security incidents (GSISS 2015) Global smartphone users (eMarketer) Global GDP (OECD) 48% 22% 21%
  • 2. 4 PWC, Regulatory and Compliance Reporting, http://www.pwc.com/gx/en/audit-services/regulatory-compliance/index.html 5 Bureau Van Dijk, “Spread of regulatory action outside US 'the top compliance issue of 2014” http://www.bvdinfo.com/industrynews/compliance-and-due-diligence/spread-of-regulatory-action-outside-us-the-top-compliance-issue-of-2014-/801768161#sthash.XyASNoN0.dpuf 6 Bloomberg, “A Regulatory Compliance Program Should be Top Concern, Advisors Say COMPLIANCE – LIMITING RISKS “Compliance is about more than prevention. It’s also about navigating opportunities.”4 Are you confident you’re compliant? Are you certain of all of your compliance obligations? “[The compliance plan] is not a document that you create and put on the shelf and never deal with again. It needs to be a living, breathing document that is tested and updated.”6 - Brian C. Ong, Sr. Managing Director, FTI Consulting, New York 28%35% COMPREHENSIVE CLOUD SECURITY spread of regulatory action outside of the US.5 anti-money laundering rules.5 Top compliance issues of 2014:
  • 3. 7 Dept. of Homeland Security, “Increase in Insider Threat Cases Highlight Significant Risks to Business Networks and Proprietary Information 8 PRNewsire, “Raytheon-commissioned Ponemon Institute Survey: 88 percent believe privileged user abuse will increase” POTENTIAL THREATS WITHIN “There has been an increase in computer network exploitation and disruption by disgruntled and/or former employees. The FBI and DHS assess that disgruntled and former employees pose a significant cyber threat to US businesses due to their authorized access to sensitive information and the networks businesses rely on.”7 stated their security tools don't provide enough contextual information to determine intent behind reported incidents.8 COMPREHENSIVE CLOUD SECURITY recognize insider threats as a cause for alarm but have difficulty identifying specific threatening actions by insiders.8 How easy is it for users to abuse access privileges? say it is likely social engineers from outside the organization will target privileged users to obtain their access rights.845% 69% 88%
  • 4. PROCESSES AND PRACTICES “Having a regularly scheduled internal or external vulnerability assessment and penetration test performed is a good way to inform executive leadership of the threats facing the company, determine the Company’s adherence to industry standards and best practices, and to test ITs ability to respond to intrusion attempts and other incidents.”9 9 Protivity, “Cybersecurity Concerns Rise as a Risk Factor for Board Members and Senior Executives in 2015” http://www.prnewswire.com/news-releases/cybersecurity-concerns-rise-as-a-risk-factor-for-board-members-and-senior-executives-in-2015-300032571.html 10 SSAE – 16, “Vulnerability Assessment and Penetration Testing” 11 ITproportal, “New cloud survey reveals shadow IT dangers, and cloud policy adoption levels. 12 TechTarget, “Report finds poor security communication among executives” COMPREHENSIVE CLOUD SECURITY Do you track and report shadow I.T. and other vulnerabilities? Compliance regulations that require regular vulnerability assessments include SOX; SSAE 16/SOC 1; PCI DSS; HIPAA, GLBA; FISCAM10 What IT professionals say: Almost 1/3indicated that their organizations’ IT security teams never discuss security with executives, and another 23% only communicate with executives on an annual basis.12 72% didn’t know the number of shadow IT apps running in their company.11