SlideShare a Scribd company logo
Sponsored by
Security
Experts4
Justifying the Value of
Endpoint Security
on Changing Endpoint Security
INTRODUCTION: ENDPOINT SECURITY
Without a doubt, endpoint security has become an urgent priority for many organizations,
and it’s not hard to see why. Industry research by IDC is showing that 70 percent of successful
breaches enter through an endpoint. Other research shows that more than half of companies
have been hit with successful attacks, and more than three-quarters of those attacks were
fileless.
For many companies, the modern business environment has become a mobile workplace in
which employees work from wherever they happen to be. The fact that people continue to
be the weakest security link has made mobile PCs and extended networks a sweet spot for
attackers. So how are companies responding?
To find out, we drilled into the question of endpoint security with the generous support of
Carbon Black. We approached 4 security experts to discuss these aspects of endpoint security:
• Keys to shutting down attacks
• Rethinking your network strategy
• Justifying the value of endpoint security
• Moving to a cloud-based next-generation platform for endpoint security
In speaking to security experts from a number of different industries, two things are clear.
Endpoint security has become a critical piece of a broader security strategy, and securing the
traditional network perimeter alone will not save you. One contributor observed that endpoints
are in fact the new perimeter.
These essays contain useful and practical insights into evaluating endpoint security needs and
implementing endpoint strategies. Regardless of how you think about the role of endpoint
security in your overall strategy, I highly recommend that you read what these experts have to say.
© 2017 Mighty Guides, Inc. I 62 Nassau Drive I Great Neck, NY 11021 I 516-360-2622 I www.mightyguides.com
Mighty Guides make you stronger.
These authoritative and diverse
guides provide a full view of a topic.
They help you explore, compare,
and contrast a variety of viewpoints
so that you can determine what will
work best for you. Reading a Mighty
Guide is kind of like having your own
team of experts. Each heartfelt and
sincere piece of advice in this guide
sits right next to the contributor’s
name, biography, and links so that
you can learn more about their work.
This background information gives
you the proper context for each
expert’s independent perspective.
Credible advice from top experts
helps you make strong decisions.
Strong decisions make you mighty.
2
All the best,
David Rogelberg
Publisher,
Mighty Guides, Inc.
Sponsored by
FOREWORD: ENDPOINT SECURITY
3
Regards,
Mike Viscuso
CTO and Cofounder of Carbon Black
Everyday companies put more of their assets in digital form. Healthcare records,
retail purchases and personnel files are just some of the many examples of how
our entire lives have moved online. While this makes our interconnected lives
more convenient, it also makes them more vulnerable to attack. The monetary
benefits of exploiting these vulnerabilities have created an extremely profitable
underground economy; one that mimics the same one we all participate in and
has led to an increase in the sophistication and frequency of attacks.
At the same time, mobility and cloud are changing the security landscape. We’ve
moved from a centralized to a decentralized model as end users increasingly
work on-the-go and access critical business applications and resources from
anywhere. As such there is more emphasis on the endpoint and individual
identities - from both the defender and the attacker - than ever before.
As endpoints become smarter, new challenges emerge: emerging ransomware
and 0-day exploits infect all kinds of systems with ease, while many attackers
use no malware at all to accomplish their malicious goals. With all this change,
we spoke to 4 leading security experts to identify what’s working and how
they’ve influenced their organization to make the necessary changes before
becoming the next victim.
Sponsored by
Carbon Black (NASDAQ:CBLK) is a
leading provider of next-generation
endpoint security. Carbon Black
serves more than 3,700 customers
globally, including 33 of the Fortune
100. As a cybersecurity innovator,
Carbon Black has pioneered multiple
endpoint security categories,
including application control,
endpoint detection and response
(EDR), and next-generation antivirus
(NGAV). Leveraging its big data and
analytics cloud platform – the Cb
Predictive Security Cloud – Carbon
Black solutions enable customers to
defend against the most advanced
cyber threats, including malware,
ransomware, and non-malware
attacks. Deployed via the cloud, on
premise, or as a managed service,
customers use Carbon Black solutions
to lock down critical systems, hunt
threats, and replace legacy antivirus.
To learn more about Carbon Black
visit www.carbonblack.com.
JUSTIFYING THE VALUE OF
ENDPOINT SECURITY
Catharina “Dd” Budiharto
In Selling Management on Security Needs, Scare
Tactics Only Go So Far..........................................................5
Mike Santos
To Secure Security Funding, Get 			
Quantitative.................................................................................11
Harshil Parikh
Making the Case for an Endpoint Security 		
Solution...........................................................................................8
4Sponsored by
CATHARINA “DD”
BUDIHARTO
During her 20-plus years in the security
field, Catharina “Dd” Budiharto has
upgraded information security practices to
next-generation programs and developed
information security systems from the
ground up. She is a co-chair, speaker, and
moderator for Evanta CISO Executive,
CIO magazine, and various IT security
conferences. She is a former chair of the
American Petroleum Institute IT Security
committee, and actively participates in
the information-security community’s
intelligence-sharing network.
Director, Information Security,
CB&I
“In talking about securing endpoints, you must recognize that threat vectors come from
many different angles,” says Catharina Budiharto, IT security director at CB&I, a global
logistics company. “My general rule is that prevention is the first line of defense, whether at
the network layer, at the perimeter, or at the endpoint. Prevention is better than having to do
the detection and response later.”
Having said that, Budiharto recognizes there are many reasons why prevention alone is not
enough. There may be budget or organizational challenges that limit a preventive strategy,
and just as in cases where precautionary measures do not always stop the spread of disease,
a security practice must also have the means to detect and respond to cyber incidents that
get past its defenses. “Then you must have people trained to respond to incidents, and you
need tools to monitor and detect. Those capabilities can be used to strengthen prevention.
Implementing these things varies depending on different states of maturity of a company,”
she says.
We now have a metric that proves my team spends
less time chasing those incidents.It’s become such
a low-maintenance thing that now we can focus on
maturing the other areas.
5
IN SELLING MANAGEMENT ON SECURITY NEEDS, SCARE TACTICS ONLY GO SO FAR
Sponsored by
LinkedIn
Download the full e-book: Security Experts on Changing Endpoint Security
Finding the right balance in any organization depends on assessing risk and
then convincing executive management to fund what’s needed. Budiharto
has been in situations ranging from organizations where she had to
transform a security practice that paid scant attention to endpoints, to a new
organization where she had an almost unlimited budget to build the practice
from the ground up. More recently she has faced the necessity of adjusting
a security practice to operate with a significant budget reduction. Regardless
of the circumstances, you need to justify the security expense and use the
resources at your disposal to deliver the best level of cyber risk-management
possible.
Budiharto says in some organizations it is difficult to make the case in terms
that management understands. Real examples are useful to a point, but after
a while it’s not so effective. “You can use examples like ransomware that
encrypts all the data in a health-care business, and how they lost their data
and it disrupted their business, etc. But you can only use that scenario so
much,” she says.
Budiharto believes a better approach is to use actual metrics that show the
effectiveness of something that’s been deployed. “I implemented a next-
generation tool, and we’ve not had any ransomware or outbreak of malware.
We now have a metric that proves my team spends less time chasing those
incidents. It’s become such a low-maintenance thing that now we can focus
on maturing the other areas.”
IN SELLING MANAGEMENT ON SECURITY NEEDS, SCARE TACTICS ONLY GO SO FAR
6
“By presenting it in
terms of service level
you can deliver, when
funds become available,
you have already shown
how you can build up
the practice to meet the
cyber risks you face.”
Sponsored by
IN SELLING MANAGEMENT ON SECURITY NEEDS, SCARE TACTICS ONLY GO SO FAR
Finding the right balance in any organization depends
on assessing risk and then convincing executive
management to fund what’s needed.
To sell the need for a security solution, use actual metrics
that show the effectiveness of something that’s been
deployed.
1 2
KEY POINTS
7Sponsored by
Facing a budget reduction, which can come as an across-the-board fiscal-management policy, can be trickier. “In that
case we need to reset expectations,” Budiharto says. “I tell them our service-level agreement, for example, our response
time is not going to be immediate as before. There are certain services we won’t have the resources for. It might change
our level of risk.” Management can accept these trade-offs, or not, in which case they must find the resources to support
the level of security they need. Budiharto points out the positive side of this situation. “By presenting it in in terms of
service level you can deliver, when more funds become available, you have already shown how you can build the
practice up to meet the cyber risks you face,” she says.
HARSHIL PARIKH
Harshil Parikh is versatile security
professional with experience in building
enterprise-wide security function at global
organizations. Currently, Parikh leads the
Trust and Assurance Group at Medallia,
Inc. His responsibilities include strategy,
execution, and operations of various
security functions including application
security, infrastructure security, security
operations, and response. Parikh spent
a number of years leading and advising
security teams at large organizations in
high-tech, finance, and insurance verticals.
Director of Security,
Medallia, Inc
As Harshil Parikh knows, it can be challenging to secure adequate resources for an endpoint-
security solution. When making the case, he says, it’s important to demonstrate the risk that
the business faces in terms that the CIO or CFO can understand so they can make a fully
informed decision. “Demonstrating an actual exploit that shows that your company’s laptops
are really vulnerable, and what could actually happen as a result,” is a good way to achieve
this, he says.
Parikh and his colleagues typically perform such demonstrations for executive leadership
using a team exercise in which an extremely skilled penetration tester compromises a
laptop and extracts company data in front of a CIO or CFO. “It brings the reality to them
that, ‘Hey, my data is really exposed, this can happen any day,’” he explains. Sharing a few
real-life examples of how such vulnerabilities have actually led to incidents—whether in a
high-profile case such as the Target breach or another company whose security has been
jeopardized through laptop incidents—also tends to bring home the seriousness of the
threat as well as its potential consequences.
Parikh’s firm, Medallia, where he is the director of security and compliance, is a software-as-
a-service company catering to Fortune 500 organizations. Considering that his organization
operates in a DevOps model, a developer or an engineer could potentially have access to
critical parts of the company infrastructure, which is an industry-specific concern he and his
colleagues must factor in when advocating for resources devoted to endpoint security.
A lot of the work that starts on one of our developers’
laptops impacts our platform because we operate in a
DevOps lifecycle.
8
MAKING THE CASE FOR AN ENDPOINT SECURITY SOLUTION
Sponsored by
LinkedIn
Download the full e-book: Security Experts on Changing Endpoint Security
A real-world demonstration can be helpful in making
the case for why an endpoint-security solution is
necessary from a risk-management perspective.
Highlighting risk factors that are specific to the business
is another effective way of making the argument for an
endpoint-security solution.
1 2
KEY POINTS
Medallia works with enterprises that have incredibly strong restrictions
surrounding the handling and management of their data. “Our customers are
very sensitive to requirements, all the way from how we secure software to
how we manage our endpoints,” Parikh says. “So just for us to be able to be
in business, we need to implement a lot of the controls that our customers
require—especially those in the financial and telecommunications sectors.”
Accordingly, he often directly ties a specific endpoint-security request to a
contractual requirement, which provides a solid justification to decision-
makers at the company.
When making the case for an endpoint-security solution, it’s important to
remember that collaboration between the security team and IT is essential
for ensuring successful implementation. “Typically, most security teams are
not responsible when endpoint-security software runs amok and ends up
impacting the performance of the laptop significantly,” Parikh notes. “So the
IT teams are usually on the hook for making sure that endpoint-security
software is doing its job within proper bounds and controls, and that it’s
not affecting the user experience.” For this reason, he recommends closely
aligning any proposal for an endpoint-security solution with IT’s expectations
so that the deployment and operationalization is as effective for the company
as possible.
MAKING THE CASE FOR AN ENDPOINT SECURITY SOLUTION
9
“Our customers are
very sensitive to
requirements, all the
way from how we secure
software to how we
manage our endpoints.”
Sponsored by
AHMER BHATTY
Field Solutions Engineer -
Networking and Security,
SHI International Corp.
LinkedIn
10
I can’t begin to stress how important early detection
and response is when it comes to mitigating threats
and minimizing damage. Being proactive to prevent
damage in the first place is always better than fixing
it after the damage has already taken place. By
implementing early detection and response (EDR)
solutions in a corporate environment, companies can
proactively detect a threat and take the appropriate
actions needed to resolve it. Pair the EDR solution with
endpoint protection platform (EPP) solutions, and you
have got yourself a very robust endpoint security!
Sponsored by
Download the full e-book: Security Experts on Changing Endpoint Security
MIKE SANTOS
Mike Santos is the director of security
and information governance at Cooley
LLP. He works with firm leadership and
information services to establish and
maintain policies, frameworks, systems,
and controls to govern and secure
Cooley’s information assets. Santos has
over 20 years of experience in leadership,
team building, information technology
operations, risk and security governance,
and management. At Cooley, Santos built
and is responsible for maintaining an ISO
27001:2013-certified information security
management system.
Director of Security &
Information Governance,
Cooley LLP
Mike Santos, director of security and information governance at Cooley LLP, believes that
when making the case for an investment in endpoint security, it’s best to share actionable
information with leadership about the state of your company’s security and its readiness
relative to industry standards rather than using a fear-based argument to secure funding.
“It’s especially helpful to present security information in the form of metrics and useful data
points—after all, when having a conversation with business leaders, numbers provide an
effective common language” says Santos.
Security professionals can and should continue to communicate the value of endpoint
security with decision-makers even after the security budget has been approved. “You’ve
got to show your colleagues that once you put these tools in, they’re really working. That’s
what sells things,” says Santos. Reviewing statistics like how many links are clicked every
month provides a useful starting point for a conversation about how best to halt and reverse
that trend: is it a question of process, does the security team have to increase employee
awareness, or should they tweak the tool? By engaging in such dialogue, the business can
decide what goals to set and how best to go about achieving them. This is far more effective
than simply referring to a study or a recent news article about attacks originating from a
nation-state such as China, which may or may not be relevant to your own business and the
unique threat environment it faces.
It’s especially helpful to present security information
in the form of metrics and useful data points—after
all,when having a conversation with business leaders,
numbers provide an effective common language.
11
TO SECURE SECURITY FUNDING, GET QUANTITATIVE
Sponsored by
Website I LinkedIn
Download the full e-book: Security Experts on Changing Endpoint Security
During annual security awareness training, Santos showed his colleagues
exactly the types of threats their business encountered in an information
sheet called A Day In The Life at Cooley, which presented a wide range of
daily security metrics broken down on a daily basis. “I asked, ‘Do you know
how much malware we stop a day? Do you know how many malicious links
get blocked? And do you know how much legitimate email we receive in one
day?’” he says. Upon seeing the big-picture view of the company’s security
environment at the firm for the first time, his colleagues were incredibly
surprised. They had no idea of the complexity and vastness of the threats
already being faced and prevented every day.
Using quantitative analysis and gap analysis, Santos and his team are able
to provide recommendations on how to improve certain metrics, allowing
leadership to make more informed decisions. He thinks this approach could
be beneficial for other organizations. “I think it would be great if the industry
did that as a whole by performing gap analyses against standards like NIST,
ISO, and PCI. The business should be able to ask, ‘How do I stand up against
these standards and where are my gaps? That’s what the business likes to
talk about,’” Santos explains.
TO SECURE SECURITY FUNDING, GET QUANTITATIVE
12
“You’ve got to show your
colleagues that once
you put these tools in,
they’re really working.
That’s what sells things.”
Sponsored by
TO SECURE SECURITY FUNDING, GET QUANTITATIVE
When making the case for security funding, it’s often
effective to share quantitative information about
specific risks that the business faces.
Business conversations about how best to manage
security risks should be ongoing, continuing after the
tools have been implemented.
1 2
KEY POINTS
13Sponsored by
This is how security professionals can engage the business in a higher-level strategic conversation about how best to
manage risk. Rather than using fear-based arguments or describing security threats in confusing qualitative terms such
as “Very high” or “High,” which business leaders understandably may not know how to interpret, it’s more effective to
provide quantitative data and actionable recommendations for improving metrics that the business deems important. In
doing so, the security team can make a more persuasive case for funding by ensuring decision-makers fully understand
both the nature of the risks and how to address them.

More Related Content

PDF
Amazon Cloud | Amazon Cloud Computing Tutorial | AWS Tutorial | AWS Training ...
PPTX
Aws multi-region High Availability
PPTX
SNMP(Simple Network Management Protocol)
PPTX
AWS Cloud Security
PPTX
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
PPTX
7 Steps to Threat Modeling
PDF
Enterprise Security Architecture for Cyber Security
PPTX
Cloud Computing Design Considerations
Amazon Cloud | Amazon Cloud Computing Tutorial | AWS Tutorial | AWS Training ...
Aws multi-region High Availability
SNMP(Simple Network Management Protocol)
AWS Cloud Security
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
7 Steps to Threat Modeling
Enterprise Security Architecture for Cyber Security
Cloud Computing Design Considerations

What's hot (20)

PPTX
Private Equity Value Creation Carve Outs, Divestitures and mergers
PPTX
IT governance and Information System Security
PDF
금융 X 하이브리드 클라우드 플랫폼 - 한화생명 디지털 트랜스포메이션 전략 - 김나영 AWS 금융부문 사업개발 담당 / 박인규 AWS 금융...
PPTX
network monitoring system ppt
PDF
Cloud security
PDF
Developing useful metrics
PDF
Defence in Depth Architectural Decisions
PPTX
CLOUD NATIVE SECURITY
PDF
CISSP Cheatsheet.pdf
PDF
Tenable Solutions for Enterprise Cloud Security
PDF
Compliance 101 HITRUST Update.pdf
PDF
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
PPTX
Cloud Security
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
PPTX
A practical guides to PCI compliance
PPTX
Firewall in Network Security
PPTX
Cybersecurity Framework - Introduction
PPTX
Security operation center (SOC)
PPTX
Identity and Access Management (IAM)
Private Equity Value Creation Carve Outs, Divestitures and mergers
IT governance and Information System Security
금융 X 하이브리드 클라우드 플랫폼 - 한화생명 디지털 트랜스포메이션 전략 - 김나영 AWS 금융부문 사업개발 담당 / 박인규 AWS 금융...
network monitoring system ppt
Cloud security
Developing useful metrics
Defence in Depth Architectural Decisions
CLOUD NATIVE SECURITY
CISSP Cheatsheet.pdf
Tenable Solutions for Enterprise Cloud Security
Compliance 101 HITRUST Update.pdf
Cloud Security Tutorial | Cloud Security Fundamentals | AWS Training | Edureka
Cloud Security
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
A practical guides to PCI compliance
Firewall in Network Security
Cybersecurity Framework - Introduction
Security operation center (SOC)
Identity and Access Management (IAM)
Ad

Similar to Carbon Black: Justifying the Value of Endpoint Security (20)

PDF
Carbon Black: Keys to Shutting Down Attacks
PDF
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
PDF
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
PDF
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
PDF
Carbon Black: 32 Security Experts on Changing Endpoint Security
PDF
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
PDF
REDUCING CYBER EXPOSURE From Cloud to Containers
PDF
Challenging Insecurity: A Roadmap to Cyber Confidence
PDF
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
PDF
CounterTack: 10 Experts on Active Threat Management
PDF
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
PDF
Ms think-tank-coffee-table-book
PDF
Azure Security.pdf
PDF
Using Security Metrics to Drive Action
PDF
Building Security Into Your Cloud IT Practices
PDF
4-lessons-of-security-leaders-for-2022.pdf
PDF
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
PDF
Fortinet: The New CISO – From Technology to Business Focused Leadership
PDF
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Moving to a Cloud Based Next Generation Platform for Endpoint S...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Tenable: Economic, Operational and Strategic Benefits of Security Framework A...
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security - Quotes from...
REDUCING CYBER EXPOSURE From Cloud to Containers
Challenging Insecurity: A Roadmap to Cyber Confidence
BlueVoyant: 7 Experts Share Key Questions To Ask When Evaluating Providers
CounterTack: 10 Experts on Active Threat Management
Trustwave: 7 Experts on Transforming Your Threat Detection & Response Strategy
Ms think-tank-coffee-table-book
Azure Security.pdf
Using Security Metrics to Drive Action
Building Security Into Your Cloud IT Practices
4-lessons-of-security-leaders-for-2022.pdf
Using Security Metrics to Drive Action in Asia Pacific - 22 Experts Share How...
Fortinet: The New CISO – From Technology to Business Focused Leadership
EMEA: Using Security Metrics to Drive Action - 22 Experts Share How to Commun...
Ad

More from Mighty Guides, Inc. (20)

PDF
7 Experts on Implementing Microsoft 365 Defender
PDF
7 Experts on Implementing Azure Sentinel
PDF
7 Experts on Implementing Microsoft Defender for Endpoint
PDF
8 Experts on Flawless App Delivery
PDF
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
PDF
Sharktower: Will AI change the way you manage change?
PDF
Workfront: 7 Experts on Flawless Campaign Execution
PDF
Workfront - 9 Experts on How to Align IT's Work to Company Strategy
PDF
Citrix: 7 Experts on Transforming Employee Experience
PDF
7 Experts on Transforming Customer Experience with Data Insights (1)
PDF
15 Experts on Reimagining Field Marketing
PDF
Kyriba: 7 Experts on Activating Liquidity
PDF
11 Experts on Using the Content Lifecycle to Maximize Content ROI
PDF
Defining Marketing Success- 28 Experts Tell You How
PDF
7 Experts on Using the Content Lifecycle to Maximize Content ROI
PDF
Iron Mountain: 8 Experts on Workplace Transformation
PDF
Avoiding Limitations of Traditional Approaches to Security
PDF
Avoiding Container Vulnerabilities
PDF
Resetting Your Security Thinking for the Public Cloud
PDF
Ntiva: 8 Experts on Outsourcing IT for Strategic Advantage
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Microsoft Defender for Endpoint
8 Experts on Flawless App Delivery
7 Experts on How to Deliver a Secure, Productive Remote Employee Experience
Sharktower: Will AI change the way you manage change?
Workfront: 7 Experts on Flawless Campaign Execution
Workfront - 9 Experts on How to Align IT's Work to Company Strategy
Citrix: 7 Experts on Transforming Employee Experience
7 Experts on Transforming Customer Experience with Data Insights (1)
15 Experts on Reimagining Field Marketing
Kyriba: 7 Experts on Activating Liquidity
11 Experts on Using the Content Lifecycle to Maximize Content ROI
Defining Marketing Success- 28 Experts Tell You How
7 Experts on Using the Content Lifecycle to Maximize Content ROI
Iron Mountain: 8 Experts on Workplace Transformation
Avoiding Limitations of Traditional Approaches to Security
Avoiding Container Vulnerabilities
Resetting Your Security Thinking for the Public Cloud
Ntiva: 8 Experts on Outsourcing IT for Strategic Advantage

Recently uploaded (20)

PDF
Digital Strategies for Manufacturing Companies
PPTX
L1 - Introduction to python Backend.pptx
PDF
Odoo Companies in India – Driving Business Transformation.pdf
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPTX
Transform Your Business with a Software ERP System
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
top salesforce developer skills in 2025.pdf
PDF
System and Network Administraation Chapter 3
PPTX
CHAPTER 2 - PM Management and IT Context
PDF
medical staffing services at VALiNTRY
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Introduction to Artificial Intelligence
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
AI in Product Development-omnex systems
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 41
Digital Strategies for Manufacturing Companies
L1 - Introduction to python Backend.pptx
Odoo Companies in India – Driving Business Transformation.pdf
VVF-Customer-Presentation2025-Ver1.9.pptx
Transform Your Business with a Software ERP System
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
top salesforce developer skills in 2025.pdf
System and Network Administraation Chapter 3
CHAPTER 2 - PM Management and IT Context
medical staffing services at VALiNTRY
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
How Creative Agencies Leverage Project Management Software.pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Introduction to Artificial Intelligence
Navsoft: AI-Powered Business Solutions & Custom Software Development
Odoo POS Development Services by CandidRoot Solutions
AI in Product Development-omnex systems
Internet Downloader Manager (IDM) Crack 6.42 Build 41

Carbon Black: Justifying the Value of Endpoint Security

  • 1. Sponsored by Security Experts4 Justifying the Value of Endpoint Security on Changing Endpoint Security
  • 2. INTRODUCTION: ENDPOINT SECURITY Without a doubt, endpoint security has become an urgent priority for many organizations, and it’s not hard to see why. Industry research by IDC is showing that 70 percent of successful breaches enter through an endpoint. Other research shows that more than half of companies have been hit with successful attacks, and more than three-quarters of those attacks were fileless. For many companies, the modern business environment has become a mobile workplace in which employees work from wherever they happen to be. The fact that people continue to be the weakest security link has made mobile PCs and extended networks a sweet spot for attackers. So how are companies responding? To find out, we drilled into the question of endpoint security with the generous support of Carbon Black. We approached 4 security experts to discuss these aspects of endpoint security: • Keys to shutting down attacks • Rethinking your network strategy • Justifying the value of endpoint security • Moving to a cloud-based next-generation platform for endpoint security In speaking to security experts from a number of different industries, two things are clear. Endpoint security has become a critical piece of a broader security strategy, and securing the traditional network perimeter alone will not save you. One contributor observed that endpoints are in fact the new perimeter. These essays contain useful and practical insights into evaluating endpoint security needs and implementing endpoint strategies. Regardless of how you think about the role of endpoint security in your overall strategy, I highly recommend that you read what these experts have to say. © 2017 Mighty Guides, Inc. I 62 Nassau Drive I Great Neck, NY 11021 I 516-360-2622 I www.mightyguides.com Mighty Guides make you stronger. These authoritative and diverse guides provide a full view of a topic. They help you explore, compare, and contrast a variety of viewpoints so that you can determine what will work best for you. Reading a Mighty Guide is kind of like having your own team of experts. Each heartfelt and sincere piece of advice in this guide sits right next to the contributor’s name, biography, and links so that you can learn more about their work. This background information gives you the proper context for each expert’s independent perspective. Credible advice from top experts helps you make strong decisions. Strong decisions make you mighty. 2 All the best, David Rogelberg Publisher, Mighty Guides, Inc. Sponsored by
  • 3. FOREWORD: ENDPOINT SECURITY 3 Regards, Mike Viscuso CTO and Cofounder of Carbon Black Everyday companies put more of their assets in digital form. Healthcare records, retail purchases and personnel files are just some of the many examples of how our entire lives have moved online. While this makes our interconnected lives more convenient, it also makes them more vulnerable to attack. The monetary benefits of exploiting these vulnerabilities have created an extremely profitable underground economy; one that mimics the same one we all participate in and has led to an increase in the sophistication and frequency of attacks. At the same time, mobility and cloud are changing the security landscape. We’ve moved from a centralized to a decentralized model as end users increasingly work on-the-go and access critical business applications and resources from anywhere. As such there is more emphasis on the endpoint and individual identities - from both the defender and the attacker - than ever before. As endpoints become smarter, new challenges emerge: emerging ransomware and 0-day exploits infect all kinds of systems with ease, while many attackers use no malware at all to accomplish their malicious goals. With all this change, we spoke to 4 leading security experts to identify what’s working and how they’ve influenced their organization to make the necessary changes before becoming the next victim. Sponsored by Carbon Black (NASDAQ:CBLK) is a leading provider of next-generation endpoint security. Carbon Black serves more than 3,700 customers globally, including 33 of the Fortune 100. As a cybersecurity innovator, Carbon Black has pioneered multiple endpoint security categories, including application control, endpoint detection and response (EDR), and next-generation antivirus (NGAV). Leveraging its big data and analytics cloud platform – the Cb Predictive Security Cloud – Carbon Black solutions enable customers to defend against the most advanced cyber threats, including malware, ransomware, and non-malware attacks. Deployed via the cloud, on premise, or as a managed service, customers use Carbon Black solutions to lock down critical systems, hunt threats, and replace legacy antivirus. To learn more about Carbon Black visit www.carbonblack.com.
  • 4. JUSTIFYING THE VALUE OF ENDPOINT SECURITY Catharina “Dd” Budiharto In Selling Management on Security Needs, Scare Tactics Only Go So Far..........................................................5 Mike Santos To Secure Security Funding, Get Quantitative.................................................................................11 Harshil Parikh Making the Case for an Endpoint Security Solution...........................................................................................8 4Sponsored by
  • 5. CATHARINA “DD” BUDIHARTO During her 20-plus years in the security field, Catharina “Dd” Budiharto has upgraded information security practices to next-generation programs and developed information security systems from the ground up. She is a co-chair, speaker, and moderator for Evanta CISO Executive, CIO magazine, and various IT security conferences. She is a former chair of the American Petroleum Institute IT Security committee, and actively participates in the information-security community’s intelligence-sharing network. Director, Information Security, CB&I “In talking about securing endpoints, you must recognize that threat vectors come from many different angles,” says Catharina Budiharto, IT security director at CB&I, a global logistics company. “My general rule is that prevention is the first line of defense, whether at the network layer, at the perimeter, or at the endpoint. Prevention is better than having to do the detection and response later.” Having said that, Budiharto recognizes there are many reasons why prevention alone is not enough. There may be budget or organizational challenges that limit a preventive strategy, and just as in cases where precautionary measures do not always stop the spread of disease, a security practice must also have the means to detect and respond to cyber incidents that get past its defenses. “Then you must have people trained to respond to incidents, and you need tools to monitor and detect. Those capabilities can be used to strengthen prevention. Implementing these things varies depending on different states of maturity of a company,” she says. We now have a metric that proves my team spends less time chasing those incidents.It’s become such a low-maintenance thing that now we can focus on maturing the other areas. 5 IN SELLING MANAGEMENT ON SECURITY NEEDS, SCARE TACTICS ONLY GO SO FAR Sponsored by LinkedIn Download the full e-book: Security Experts on Changing Endpoint Security
  • 6. Finding the right balance in any organization depends on assessing risk and then convincing executive management to fund what’s needed. Budiharto has been in situations ranging from organizations where she had to transform a security practice that paid scant attention to endpoints, to a new organization where she had an almost unlimited budget to build the practice from the ground up. More recently she has faced the necessity of adjusting a security practice to operate with a significant budget reduction. Regardless of the circumstances, you need to justify the security expense and use the resources at your disposal to deliver the best level of cyber risk-management possible. Budiharto says in some organizations it is difficult to make the case in terms that management understands. Real examples are useful to a point, but after a while it’s not so effective. “You can use examples like ransomware that encrypts all the data in a health-care business, and how they lost their data and it disrupted their business, etc. But you can only use that scenario so much,” she says. Budiharto believes a better approach is to use actual metrics that show the effectiveness of something that’s been deployed. “I implemented a next- generation tool, and we’ve not had any ransomware or outbreak of malware. We now have a metric that proves my team spends less time chasing those incidents. It’s become such a low-maintenance thing that now we can focus on maturing the other areas.” IN SELLING MANAGEMENT ON SECURITY NEEDS, SCARE TACTICS ONLY GO SO FAR 6 “By presenting it in terms of service level you can deliver, when funds become available, you have already shown how you can build up the practice to meet the cyber risks you face.” Sponsored by
  • 7. IN SELLING MANAGEMENT ON SECURITY NEEDS, SCARE TACTICS ONLY GO SO FAR Finding the right balance in any organization depends on assessing risk and then convincing executive management to fund what’s needed. To sell the need for a security solution, use actual metrics that show the effectiveness of something that’s been deployed. 1 2 KEY POINTS 7Sponsored by Facing a budget reduction, which can come as an across-the-board fiscal-management policy, can be trickier. “In that case we need to reset expectations,” Budiharto says. “I tell them our service-level agreement, for example, our response time is not going to be immediate as before. There are certain services we won’t have the resources for. It might change our level of risk.” Management can accept these trade-offs, or not, in which case they must find the resources to support the level of security they need. Budiharto points out the positive side of this situation. “By presenting it in in terms of service level you can deliver, when more funds become available, you have already shown how you can build the practice up to meet the cyber risks you face,” she says.
  • 8. HARSHIL PARIKH Harshil Parikh is versatile security professional with experience in building enterprise-wide security function at global organizations. Currently, Parikh leads the Trust and Assurance Group at Medallia, Inc. His responsibilities include strategy, execution, and operations of various security functions including application security, infrastructure security, security operations, and response. Parikh spent a number of years leading and advising security teams at large organizations in high-tech, finance, and insurance verticals. Director of Security, Medallia, Inc As Harshil Parikh knows, it can be challenging to secure adequate resources for an endpoint- security solution. When making the case, he says, it’s important to demonstrate the risk that the business faces in terms that the CIO or CFO can understand so they can make a fully informed decision. “Demonstrating an actual exploit that shows that your company’s laptops are really vulnerable, and what could actually happen as a result,” is a good way to achieve this, he says. Parikh and his colleagues typically perform such demonstrations for executive leadership using a team exercise in which an extremely skilled penetration tester compromises a laptop and extracts company data in front of a CIO or CFO. “It brings the reality to them that, ‘Hey, my data is really exposed, this can happen any day,’” he explains. Sharing a few real-life examples of how such vulnerabilities have actually led to incidents—whether in a high-profile case such as the Target breach or another company whose security has been jeopardized through laptop incidents—also tends to bring home the seriousness of the threat as well as its potential consequences. Parikh’s firm, Medallia, where he is the director of security and compliance, is a software-as- a-service company catering to Fortune 500 organizations. Considering that his organization operates in a DevOps model, a developer or an engineer could potentially have access to critical parts of the company infrastructure, which is an industry-specific concern he and his colleagues must factor in when advocating for resources devoted to endpoint security. A lot of the work that starts on one of our developers’ laptops impacts our platform because we operate in a DevOps lifecycle. 8 MAKING THE CASE FOR AN ENDPOINT SECURITY SOLUTION Sponsored by LinkedIn Download the full e-book: Security Experts on Changing Endpoint Security
  • 9. A real-world demonstration can be helpful in making the case for why an endpoint-security solution is necessary from a risk-management perspective. Highlighting risk factors that are specific to the business is another effective way of making the argument for an endpoint-security solution. 1 2 KEY POINTS Medallia works with enterprises that have incredibly strong restrictions surrounding the handling and management of their data. “Our customers are very sensitive to requirements, all the way from how we secure software to how we manage our endpoints,” Parikh says. “So just for us to be able to be in business, we need to implement a lot of the controls that our customers require—especially those in the financial and telecommunications sectors.” Accordingly, he often directly ties a specific endpoint-security request to a contractual requirement, which provides a solid justification to decision- makers at the company. When making the case for an endpoint-security solution, it’s important to remember that collaboration between the security team and IT is essential for ensuring successful implementation. “Typically, most security teams are not responsible when endpoint-security software runs amok and ends up impacting the performance of the laptop significantly,” Parikh notes. “So the IT teams are usually on the hook for making sure that endpoint-security software is doing its job within proper bounds and controls, and that it’s not affecting the user experience.” For this reason, he recommends closely aligning any proposal for an endpoint-security solution with IT’s expectations so that the deployment and operationalization is as effective for the company as possible. MAKING THE CASE FOR AN ENDPOINT SECURITY SOLUTION 9 “Our customers are very sensitive to requirements, all the way from how we secure software to how we manage our endpoints.” Sponsored by
  • 10. AHMER BHATTY Field Solutions Engineer - Networking and Security, SHI International Corp. LinkedIn 10 I can’t begin to stress how important early detection and response is when it comes to mitigating threats and minimizing damage. Being proactive to prevent damage in the first place is always better than fixing it after the damage has already taken place. By implementing early detection and response (EDR) solutions in a corporate environment, companies can proactively detect a threat and take the appropriate actions needed to resolve it. Pair the EDR solution with endpoint protection platform (EPP) solutions, and you have got yourself a very robust endpoint security! Sponsored by Download the full e-book: Security Experts on Changing Endpoint Security
  • 11. MIKE SANTOS Mike Santos is the director of security and information governance at Cooley LLP. He works with firm leadership and information services to establish and maintain policies, frameworks, systems, and controls to govern and secure Cooley’s information assets. Santos has over 20 years of experience in leadership, team building, information technology operations, risk and security governance, and management. At Cooley, Santos built and is responsible for maintaining an ISO 27001:2013-certified information security management system. Director of Security & Information Governance, Cooley LLP Mike Santos, director of security and information governance at Cooley LLP, believes that when making the case for an investment in endpoint security, it’s best to share actionable information with leadership about the state of your company’s security and its readiness relative to industry standards rather than using a fear-based argument to secure funding. “It’s especially helpful to present security information in the form of metrics and useful data points—after all, when having a conversation with business leaders, numbers provide an effective common language” says Santos. Security professionals can and should continue to communicate the value of endpoint security with decision-makers even after the security budget has been approved. “You’ve got to show your colleagues that once you put these tools in, they’re really working. That’s what sells things,” says Santos. Reviewing statistics like how many links are clicked every month provides a useful starting point for a conversation about how best to halt and reverse that trend: is it a question of process, does the security team have to increase employee awareness, or should they tweak the tool? By engaging in such dialogue, the business can decide what goals to set and how best to go about achieving them. This is far more effective than simply referring to a study or a recent news article about attacks originating from a nation-state such as China, which may or may not be relevant to your own business and the unique threat environment it faces. It’s especially helpful to present security information in the form of metrics and useful data points—after all,when having a conversation with business leaders, numbers provide an effective common language. 11 TO SECURE SECURITY FUNDING, GET QUANTITATIVE Sponsored by Website I LinkedIn Download the full e-book: Security Experts on Changing Endpoint Security
  • 12. During annual security awareness training, Santos showed his colleagues exactly the types of threats their business encountered in an information sheet called A Day In The Life at Cooley, which presented a wide range of daily security metrics broken down on a daily basis. “I asked, ‘Do you know how much malware we stop a day? Do you know how many malicious links get blocked? And do you know how much legitimate email we receive in one day?’” he says. Upon seeing the big-picture view of the company’s security environment at the firm for the first time, his colleagues were incredibly surprised. They had no idea of the complexity and vastness of the threats already being faced and prevented every day. Using quantitative analysis and gap analysis, Santos and his team are able to provide recommendations on how to improve certain metrics, allowing leadership to make more informed decisions. He thinks this approach could be beneficial for other organizations. “I think it would be great if the industry did that as a whole by performing gap analyses against standards like NIST, ISO, and PCI. The business should be able to ask, ‘How do I stand up against these standards and where are my gaps? That’s what the business likes to talk about,’” Santos explains. TO SECURE SECURITY FUNDING, GET QUANTITATIVE 12 “You’ve got to show your colleagues that once you put these tools in, they’re really working. That’s what sells things.” Sponsored by
  • 13. TO SECURE SECURITY FUNDING, GET QUANTITATIVE When making the case for security funding, it’s often effective to share quantitative information about specific risks that the business faces. Business conversations about how best to manage security risks should be ongoing, continuing after the tools have been implemented. 1 2 KEY POINTS 13Sponsored by This is how security professionals can engage the business in a higher-level strategic conversation about how best to manage risk. Rather than using fear-based arguments or describing security threats in confusing qualitative terms such as “Very high” or “High,” which business leaders understandably may not know how to interpret, it’s more effective to provide quantitative data and actionable recommendations for improving metrics that the business deems important. In doing so, the security team can make a more persuasive case for funding by ensuring decision-makers fully understand both the nature of the risks and how to address them.