SlideShare a Scribd company logo
5
Most read
6
Most read
17
Most read
Dave Gruber, Principal Industry Analyst
Chandrashekhar, CEO, SecPod
Cybersecurity Strategies for
Effective Attack Surface
Reduction
© 2022 TechTarget, Inc. All Rights Reserved. 2
Speaker Introductions
Chandra
SecPod Founder, CEO
Dave Gruber
ESG Principal Analyst
© 2022 TechTarget, Inc. All Rights Reserved. 3
Today’s Agenda
• Understanding Your Attack Surface
• Security Strategies for Attack Surface Reduction
• Asset Visibility
• The Role of Automation in Vulnerability Management
• SecPod Solution Introduction
• Q&A
© 2022 TechTarget, Inc. All Rights Reserved.
4
10 Common Attack Vectors
© 2022 TechTarget, Inc. All Rights Reserved.
Understanding Your Attack Surface
Your attack surface = the sum of all exposed IT assets across all attack vectors.
oThe entire area of IT infrastructure that is susceptible or exposed to potential compromise.
oProtecting an organization requires careful review of every attack vector, and a detailed
understanding of all assets associate with every attack vector, and what vulnerabilities exist in
them.
© 2022 TechTarget, Inc. All Rights Reserved.
6
Question text: In general, how would you characterize growth in your organization’s attack surface over the past two years? (Percent of respondents,
N=398)
Attack Surfaces are Growing!
…especially among organizations with more IT assets
22%
45%
23%
5% 4%
The attack surface at my
organization has increased
substantially over the past 2
years
The attack surface at my
organization has increased
slightly over the past 2 years
The attack surface is about
the same size today as it was
2 years ago
The attack surface at my
organization has decreased
slightly over the past 2 years
The attack surface at my
organization has decreased
substantially over the past 2
years
12%
20%
26%
The attack surface at my organization has increased
substantially over the past 2 years
1,000 or fewer IT assets (N=43)
1,001 to 10,000 IT assets (N=142)
More than 10,000 IT assets (N=210)
67%
ESG Research: 2021 Security Hygiene and Posture Management
© 2022 TechTarget, Inc. All Rights Reserved.
7
Reasons Why the Attack
Surface is Increasing
Data reflects business and IT
infrastructure changes
Question text:
You indicated that your organization’s attack surface has increased over the past two years. What
are the primary reasons for this increase? (Percent of respondents, N=269, three responses
accepted)
© 2021 TechTarget, Inc. All Rights Reserved.
15%
17%
23%
25%
25%
26%
28%
30%
32%
32%
32%
My organization has grown through…
My organization has increased the…
My organization has increased the…
My organization has increased its…
My organization has increased the…
My organization made changes to its…
My organization has increased its…
My organization has increased its…
My organization has increased its…
My organization has increased user…
My organization has increased its IT…
© 2022 TechTarget, Inc. All Rights Reserved.
8
Detection &
Response
Security Strategies: Changing the Shape of the Threat Funnel
Attack Surface Reduction
Active Security Controls
Detection
&
Response
IR
Recovery
Prevention
© 2022 TechTarget, Inc. All Rights Reserved.
9
Types of Vulnerabilities..
oHere are some common vulnerabilities found in IT
infrastructure:
Vuln software, vuln configs (includes open
ports, etc.), assets void of required security
monitoring and prevention software (includes
rouge/unknown assets), misconfigured security
software, unauthorized or unwanted software
operating on an asset,
Misconfigured network assets
APIs that lack strict access controls
Over-privileged accounts
Application functions that provide unauthorized
access to the wrong people. (over-privileged
access)
Sensitive data with open network access
© 2022 TechTarget, Inc. All Rights Reserved.
10
The Vulnerability Management Process
Identify
Assess Risk
Prioritize
Patch
Report
© 2022 TechTarget, Inc. All Rights Reserved.
11
Question text: If you were to give your organization a grade for its vulnerability management program, what would it be? (Percent of
respondents, N=398)
Grading Vulnerability Management
65% admit that there is work to be
done – and the work is cumbersome
and significant
35%
46%
15%
3% 1%
(complete understanding of our asset inventory & can identify, analyze, & prioritize internal/external vulnerabilities & remediate them in an
acceptable timeframe for risk mitigation in all cases)
B (good understanding of most of our asset inventory & can identify, analyze, & prioritize internal/external vulnerabilities & remediate them in an
acceptable timeframe for risk mitigation in most cases, but there is room for improvement in some areas)
C (some understanding of most of our asset inventory & can identify, analyze, & prioritize internal/external vulnerabilities & remediate them in an
acceptable timeframe for risk mitigation in some cases, but there is room for improvement in many areas)
D (limited understanding of most of our asset inventory & cannot identify, analyze, & prioritize internal/external vulnerabilities & remediate them
in an acceptable timeframe for risk mitigation & needs improvement in many areas)
F (very limited understanding of most of our asset inventory & cannot identify, analyze, & prioritize internal/external vulnerabilities & remediat
them in an acceptable timeframe for risk mitigation & needs improvement in all areas)
© 2022 TechTarget, Inc. All Rights Reserved.
12
Biggest Vulnerability Management Challenges
© 2021 TechTarget, Inc. All Rights Reserved.
© 2022 TechTarget, Inc. All Rights Reserved.
13
Vulnerable Software
and
Misconfigurations
Most Common Points
of Entry for
Successful
Ransomware Attacks
Question text:
What was the initial point of compromise for the successful
ransomware attack on your organization? (Percent of respondents,
N=368, three responses accepted)
© 2022 TechTarget, Inc. All Rights Reserved.
15%
17%
24%
26%
27%
31%
31%
33%
36%
Reinjected from an old data…
A business partner network
Web search or web browsing
Software supply chain
Email
Misconfiguration of…
Application user permissions…
Systems software vulnerability
Application software…
ESG Research: 2022 The Long Road
Ahead to Ransomware Preparedness
© 2022 TechTarget, Inc. All Rights Reserved.
14
Vulnerability
Management
Challenges
Question text:
Which of the following are the biggest challenges
associated with vulnerability management at your
organization? (Percent of respondents, N=398,
multiple responses accepted)
© 2021 TechTarget, Inc. All Rights Reserved. 4%
17%
18%
21%
21%
24%
24%
25%
25%
26%
26%
28%
28%
29%
29%
30%
None of the above
Conducting/scheduling vulnerability scans
Lack of understanding of business risk due to…
Inability to understand asset exploitability,…
Patching vulnerabilities in a timely manner
Tracking vulnerability and patch management over…
Coordinating vulnerability scans across multiple…
Tracking the cost and efficiency of the vulnerability…
Prioritizing which vulnerabilities could be exploited…
Tracking software vulnerabilities for which no patch…
Identifying all assets that need to be scanned
Analyzing the results of vulnerability scans
Coordinating vulnerability management processes…
Coordinating vulnerability management processes…
Automating the process of vulnerability discovery,…
Keeping up with the volume of open vulnerabilities
The data backs up
assumptions about the
overwhelming nature of
vulnerability management.
Are We Uncovering the entire risks in
the IT security landscape?
Is vulnerability assessment integrated with
vulnerability remediation?
Are vulnerabilities continuously &
automatically managed from a single console?
IT SECURITY TEAMS
ARE LEFT TO PONDER
Very Low Certainty
Poor Control
No Continuity
MODERN IT SECURITY TEAMS NEED A
SINGLE SOLUTION THAT EXPOSES
EVOLVING ATTACK SURFACE AND TAKES
OWNERSHIP OF REMEDIATION
• Continuous visibility into computing
environment
• Risk identification beyond software
vulnerabilities
• Continuous mitigation of risks to reduce
attack-surface
• Automating preventive routines
ADVANCED
VULNERABILITY
MANAGEMENT
FRAMEWORK
Gain Visibility into IT
Infrastructure
REPORT
VISIBILITY IDENTIFY
ASSESS
REMEDIATE PRIORITIZE
Vulnerabilities Misconfigurations Missing Patches Other Security
Risk Exposures
Assess security
risk from single
console and
insightful reports
Prioritise
vulnerabilities and
missing patches
based on severity
Patch
Vulnerabilities
Fix
Misconfigurations
Apply Security Controls
• Manage Vulnerabilities &
Security Risks Beyond CVEs
• Mitigate Vulnerabilities
On-time with Integrated
Remediation Controls
• Execute everything from a
truly integrated,
centralized console
• Automate end-to-end
tasks and establish a
continuous routine
Perform strategic
analysis with
insightful and
customizable
reports
Centralised
Management Console
APIs
APIs
Certainty
Control
Continuity
TRADITIONAL
VULNERABILITY
MANAGEMENT
ADVANCED
VULNERABILITY
MANAGEMENT
019
SANERNOW CYBERHYGIENE
PLATFORM
SanerNow CM
Compliance
Management
SanerNow AE
Asset
Exposure
SanerNow EQR
Endpoint Query
Response
SanerNow VM
Vulnerability
Management
SanerNow EM
Endpoint
Management
SanerNow PM
Patch
Management
WORKSTATIONS SERVERS
VIRTUAL
DEVICES
ALL MAJOR
OSs
NETWORK
DEVICES
SanerNow CyberHygiene Platform Single-Console
Single-Agent
On-Cloud
On-Premise
PREVENTION | AUTOMATION | CONTINUOUS
Advanced Vulnerability Management
SanerNow Tools
Single screen to query, analyze, detect, respond,
automate and prevent attacks
For inquiries, contact us at: Email: info@secpod.com
WWW.SECPOD.COM
PREVENT CYBER ATTACKS.
CONTINUOUS. AUTOMATED.
TRY SANERNOW FREE

More Related Content

PDF
SIEM Architecture
PPTX
Security Operation Center Fundamental
PDF
Vulnerability Management
PDF
How To Present Cyber Security To Senior Management Complete Deck
PDF
Security operations center-SOC Presentation-مرکز عملیات امنیت
PDF
INCIDENT RESPONSE NIST IMPLEMENTATION
PDF
What is SIEM? A Brilliant Guide to the Basics
PDF
Zero Trust Model Presentation
SIEM Architecture
Security Operation Center Fundamental
Vulnerability Management
How To Present Cyber Security To Senior Management Complete Deck
Security operations center-SOC Presentation-مرکز عملیات امنیت
INCIDENT RESPONSE NIST IMPLEMENTATION
What is SIEM? A Brilliant Guide to the Basics
Zero Trust Model Presentation

What's hot (20)

PPSX
Next-Gen security operation center
PPTX
Siem solutions R&E
PPTX
An introduction to SOC (Security Operation Center)
PPTX
The Zero Trust Model of Information Security
PPTX
QRadar, ArcSight and Splunk
PPTX
Cyber kill chain
PDF
IBM Qradar
PPTX
Security Information and Event Management (SIEM)
PDF
Enterprise Security Architecture for Cyber Security
PDF
Cybersecurity Basics - Aravindr.com
PPTX
Introduction to Incident Response Management
PDF
Building Security Operation Center
PPTX
SEIM-Microsoft Sentinel.pptx
PDF
Cybersecurity Roadmap Development for Executives
PPTX
Security Information and Event Management (SIEM)
PPTX
Zero Trust Framework for Network Security​
PPTX
Optimizing Security Operations: 5 Keys to Success
PPTX
Symantec Data Loss Prevention 9
PDF
Threat-Based Adversary Emulation with MITRE ATT&CK
PDF
Cisco Cyber Security Essentials Chapter-1
Next-Gen security operation center
Siem solutions R&E
An introduction to SOC (Security Operation Center)
The Zero Trust Model of Information Security
QRadar, ArcSight and Splunk
Cyber kill chain
IBM Qradar
Security Information and Event Management (SIEM)
Enterprise Security Architecture for Cyber Security
Cybersecurity Basics - Aravindr.com
Introduction to Incident Response Management
Building Security Operation Center
SEIM-Microsoft Sentinel.pptx
Cybersecurity Roadmap Development for Executives
Security Information and Event Management (SIEM)
Zero Trust Framework for Network Security​
Optimizing Security Operations: 5 Keys to Success
Symantec Data Loss Prevention 9
Threat-Based Adversary Emulation with MITRE ATT&CK
Cisco Cyber Security Essentials Chapter-1
Ad

Similar to Cybersecurity Strategies for Effective Attack Surface Reduction (20)

PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
PPTX
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
PPTX
2022-customer-planning-template Rapid7 PPTX
PDF
ESG-Economic-Validation-Fortinet-Automated-SOC-Jul-2023.pdf
PPTX
PPTX
The Next Normal: CTEK's New Services to Support Adapting in 2020 & Beyond
PPTX
The 2018 Threatscape
PDF
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
PDF
OT Security Architecture & Resilience: Designing for Security Success
PDF
Comodo SOC service provider
PDF
Executive Perspective Building an OT Security Program from the Top Down
PPTX
How to present information security risks to Board)
PDF
End-to-End OT SecOps Transforming from Good to Great
PPTX
Monotype Cybersecurity Security Report 2022
PDF
ICS Cyber Security Effectiveness Measurement
PPTX
2018 State of Cyber Resilience Insurance
PDF
Applicaiton Security - Building The Audit Program
PDF
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
PPTX
Government and Education Webinar: How the New Normal Could Improve your IT Op...
PPTX
Cse it seminar ppt1, An Approach To IT Project Management
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
Closing Often Missed Vulnerabilities that Leave Organizations Exposed
2022-customer-planning-template Rapid7 PPTX
ESG-Economic-Validation-Fortinet-Automated-SOC-Jul-2023.pdf
The Next Normal: CTEK's New Services to Support Adapting in 2020 & Beyond
The 2018 Threatscape
idsecconf2023 - Mangatas Tondang, Wahyu Nuryanto - Penerapan Model Detection ...
OT Security Architecture & Resilience: Designing for Security Success
Comodo SOC service provider
Executive Perspective Building an OT Security Program from the Top Down
How to present information security risks to Board)
End-to-End OT SecOps Transforming from Good to Great
Monotype Cybersecurity Security Report 2022
ICS Cyber Security Effectiveness Measurement
2018 State of Cyber Resilience Insurance
Applicaiton Security - Building The Audit Program
Top 10 Ways To Win Budget For Application Security - Cenzic.2013.05.22
Government and Education Webinar: How the New Normal Could Improve your IT Op...
Cse it seminar ppt1, An Approach To IT Project Management
Ad

More from SecPod (17)

PPTX
Annual Vulnerability Report Insights - 2022
PPTX
Align Your ITSM and SecOps Strategy for Unstoppable IT
PDF
Uncover Vulnerabilities Beyond Software Vulnerabilities
PPTX
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
PPTX
How can SMEs combat cyberattacks through automated vulnerability management?
PPTX
Security automation architecture principles for effective vulnerability manag...
PPTX
Uncovering Vulnerabilities Beyond Software Vulnerabilities
PPTX
How to Implement Organization Wide Cyber Hygiene?
PPTX
How to Achieve NIST Compliance using SanerNow?
PPTX
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
PPTX
How to effectively monitor and manage IT assets in real-time using SanerNow
PPTX
How to securely manage endpoints using SanerNow
PPTX
How to implement security compliance with SanerNow
PPTX
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
PPTX
The Art of Managing and Securing Endpoints with SanerNow Patch Management
PPTX
The Art of Managing and Securing Endpoints
PPTX
Cybersecurity Strategies for Effective Attack Surface Reduction
Annual Vulnerability Report Insights - 2022
Align Your ITSM and SecOps Strategy for Unstoppable IT
Uncover Vulnerabilities Beyond Software Vulnerabilities
ProxyLogon - MS Exchange Server Vulnerabilities - JS Edited.pptx
How can SMEs combat cyberattacks through automated vulnerability management?
Security automation architecture principles for effective vulnerability manag...
Uncovering Vulnerabilities Beyond Software Vulnerabilities
How to Implement Organization Wide Cyber Hygiene?
How to Achieve NIST Compliance using SanerNow?
How Mid Size Enterprises Can Automate Vulnerability Management and Prevent Cy...
How to effectively monitor and manage IT assets in real-time using SanerNow
How to securely manage endpoints using SanerNow
How to implement security compliance with SanerNow
How to detect, assess, prioritize, and remediate vulnerabilities using SanerNow?
The Art of Managing and Securing Endpoints with SanerNow Patch Management
The Art of Managing and Securing Endpoints
Cybersecurity Strategies for Effective Attack Surface Reduction

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Network Security Unit 5.pdf for BCA BBA.
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Big Data Technologies - Introduction.pptx
PPTX
MYSQL Presentation for SQL database connectivity
PDF
KodekX | Application Modernization Development
PPT
Teaching material agriculture food technology
PPTX
Cloud computing and distributed systems.
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Machine learning based COVID-19 study performance prediction
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
NewMind AI Weekly Chronicles - August'25 Week I
Network Security Unit 5.pdf for BCA BBA.
The AUB Centre for AI in Media Proposal.docx
“AI and Expert System Decision Support & Business Intelligence Systems”
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Understanding_Digital_Forensics_Presentation.pptx
Big Data Technologies - Introduction.pptx
MYSQL Presentation for SQL database connectivity
KodekX | Application Modernization Development
Teaching material agriculture food technology
Cloud computing and distributed systems.
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
The Rise and Fall of 3GPP – Time for a Sabbatical?

Cybersecurity Strategies for Effective Attack Surface Reduction

  • 1. Dave Gruber, Principal Industry Analyst Chandrashekhar, CEO, SecPod Cybersecurity Strategies for Effective Attack Surface Reduction
  • 2. © 2022 TechTarget, Inc. All Rights Reserved. 2 Speaker Introductions Chandra SecPod Founder, CEO Dave Gruber ESG Principal Analyst
  • 3. © 2022 TechTarget, Inc. All Rights Reserved. 3 Today’s Agenda • Understanding Your Attack Surface • Security Strategies for Attack Surface Reduction • Asset Visibility • The Role of Automation in Vulnerability Management • SecPod Solution Introduction • Q&A
  • 4. © 2022 TechTarget, Inc. All Rights Reserved. 4 10 Common Attack Vectors
  • 5. © 2022 TechTarget, Inc. All Rights Reserved. Understanding Your Attack Surface Your attack surface = the sum of all exposed IT assets across all attack vectors. oThe entire area of IT infrastructure that is susceptible or exposed to potential compromise. oProtecting an organization requires careful review of every attack vector, and a detailed understanding of all assets associate with every attack vector, and what vulnerabilities exist in them.
  • 6. © 2022 TechTarget, Inc. All Rights Reserved. 6 Question text: In general, how would you characterize growth in your organization’s attack surface over the past two years? (Percent of respondents, N=398) Attack Surfaces are Growing! …especially among organizations with more IT assets 22% 45% 23% 5% 4% The attack surface at my organization has increased substantially over the past 2 years The attack surface at my organization has increased slightly over the past 2 years The attack surface is about the same size today as it was 2 years ago The attack surface at my organization has decreased slightly over the past 2 years The attack surface at my organization has decreased substantially over the past 2 years 12% 20% 26% The attack surface at my organization has increased substantially over the past 2 years 1,000 or fewer IT assets (N=43) 1,001 to 10,000 IT assets (N=142) More than 10,000 IT assets (N=210) 67% ESG Research: 2021 Security Hygiene and Posture Management
  • 7. © 2022 TechTarget, Inc. All Rights Reserved. 7 Reasons Why the Attack Surface is Increasing Data reflects business and IT infrastructure changes Question text: You indicated that your organization’s attack surface has increased over the past two years. What are the primary reasons for this increase? (Percent of respondents, N=269, three responses accepted) © 2021 TechTarget, Inc. All Rights Reserved. 15% 17% 23% 25% 25% 26% 28% 30% 32% 32% 32% My organization has grown through… My organization has increased the… My organization has increased the… My organization has increased its… My organization has increased the… My organization made changes to its… My organization has increased its… My organization has increased its… My organization has increased its… My organization has increased user… My organization has increased its IT…
  • 8. © 2022 TechTarget, Inc. All Rights Reserved. 8 Detection & Response Security Strategies: Changing the Shape of the Threat Funnel Attack Surface Reduction Active Security Controls Detection & Response IR Recovery Prevention
  • 9. © 2022 TechTarget, Inc. All Rights Reserved. 9 Types of Vulnerabilities.. oHere are some common vulnerabilities found in IT infrastructure: Vuln software, vuln configs (includes open ports, etc.), assets void of required security monitoring and prevention software (includes rouge/unknown assets), misconfigured security software, unauthorized or unwanted software operating on an asset, Misconfigured network assets APIs that lack strict access controls Over-privileged accounts Application functions that provide unauthorized access to the wrong people. (over-privileged access) Sensitive data with open network access
  • 10. © 2022 TechTarget, Inc. All Rights Reserved. 10 The Vulnerability Management Process Identify Assess Risk Prioritize Patch Report
  • 11. © 2022 TechTarget, Inc. All Rights Reserved. 11 Question text: If you were to give your organization a grade for its vulnerability management program, what would it be? (Percent of respondents, N=398) Grading Vulnerability Management 65% admit that there is work to be done – and the work is cumbersome and significant 35% 46% 15% 3% 1% (complete understanding of our asset inventory & can identify, analyze, & prioritize internal/external vulnerabilities & remediate them in an acceptable timeframe for risk mitigation in all cases) B (good understanding of most of our asset inventory & can identify, analyze, & prioritize internal/external vulnerabilities & remediate them in an acceptable timeframe for risk mitigation in most cases, but there is room for improvement in some areas) C (some understanding of most of our asset inventory & can identify, analyze, & prioritize internal/external vulnerabilities & remediate them in an acceptable timeframe for risk mitigation in some cases, but there is room for improvement in many areas) D (limited understanding of most of our asset inventory & cannot identify, analyze, & prioritize internal/external vulnerabilities & remediate them in an acceptable timeframe for risk mitigation & needs improvement in many areas) F (very limited understanding of most of our asset inventory & cannot identify, analyze, & prioritize internal/external vulnerabilities & remediat them in an acceptable timeframe for risk mitigation & needs improvement in all areas)
  • 12. © 2022 TechTarget, Inc. All Rights Reserved. 12 Biggest Vulnerability Management Challenges © 2021 TechTarget, Inc. All Rights Reserved.
  • 13. © 2022 TechTarget, Inc. All Rights Reserved. 13 Vulnerable Software and Misconfigurations Most Common Points of Entry for Successful Ransomware Attacks Question text: What was the initial point of compromise for the successful ransomware attack on your organization? (Percent of respondents, N=368, three responses accepted) © 2022 TechTarget, Inc. All Rights Reserved. 15% 17% 24% 26% 27% 31% 31% 33% 36% Reinjected from an old data… A business partner network Web search or web browsing Software supply chain Email Misconfiguration of… Application user permissions… Systems software vulnerability Application software… ESG Research: 2022 The Long Road Ahead to Ransomware Preparedness
  • 14. © 2022 TechTarget, Inc. All Rights Reserved. 14 Vulnerability Management Challenges Question text: Which of the following are the biggest challenges associated with vulnerability management at your organization? (Percent of respondents, N=398, multiple responses accepted) © 2021 TechTarget, Inc. All Rights Reserved. 4% 17% 18% 21% 21% 24% 24% 25% 25% 26% 26% 28% 28% 29% 29% 30% None of the above Conducting/scheduling vulnerability scans Lack of understanding of business risk due to… Inability to understand asset exploitability,… Patching vulnerabilities in a timely manner Tracking vulnerability and patch management over… Coordinating vulnerability scans across multiple… Tracking the cost and efficiency of the vulnerability… Prioritizing which vulnerabilities could be exploited… Tracking software vulnerabilities for which no patch… Identifying all assets that need to be scanned Analyzing the results of vulnerability scans Coordinating vulnerability management processes… Coordinating vulnerability management processes… Automating the process of vulnerability discovery,… Keeping up with the volume of open vulnerabilities The data backs up assumptions about the overwhelming nature of vulnerability management.
  • 15. Are We Uncovering the entire risks in the IT security landscape? Is vulnerability assessment integrated with vulnerability remediation? Are vulnerabilities continuously & automatically managed from a single console? IT SECURITY TEAMS ARE LEFT TO PONDER Very Low Certainty Poor Control No Continuity
  • 16. MODERN IT SECURITY TEAMS NEED A SINGLE SOLUTION THAT EXPOSES EVOLVING ATTACK SURFACE AND TAKES OWNERSHIP OF REMEDIATION • Continuous visibility into computing environment • Risk identification beyond software vulnerabilities • Continuous mitigation of risks to reduce attack-surface • Automating preventive routines
  • 17. ADVANCED VULNERABILITY MANAGEMENT FRAMEWORK Gain Visibility into IT Infrastructure REPORT VISIBILITY IDENTIFY ASSESS REMEDIATE PRIORITIZE Vulnerabilities Misconfigurations Missing Patches Other Security Risk Exposures Assess security risk from single console and insightful reports Prioritise vulnerabilities and missing patches based on severity Patch Vulnerabilities Fix Misconfigurations Apply Security Controls • Manage Vulnerabilities & Security Risks Beyond CVEs • Mitigate Vulnerabilities On-time with Integrated Remediation Controls • Execute everything from a truly integrated, centralized console • Automate end-to-end tasks and establish a continuous routine Perform strategic analysis with insightful and customizable reports Centralised Management Console APIs APIs
  • 19. 019 SANERNOW CYBERHYGIENE PLATFORM SanerNow CM Compliance Management SanerNow AE Asset Exposure SanerNow EQR Endpoint Query Response SanerNow VM Vulnerability Management SanerNow EM Endpoint Management SanerNow PM Patch Management WORKSTATIONS SERVERS VIRTUAL DEVICES ALL MAJOR OSs NETWORK DEVICES SanerNow CyberHygiene Platform Single-Console Single-Agent On-Cloud On-Premise PREVENTION | AUTOMATION | CONTINUOUS Advanced Vulnerability Management
  • 20. SanerNow Tools Single screen to query, analyze, detect, respond, automate and prevent attacks
  • 21. For inquiries, contact us at: Email: info@secpod.com WWW.SECPOD.COM PREVENT CYBER ATTACKS. CONTINUOUS. AUTOMATED. TRY SANERNOW FREE

Editor's Notes

  • #3: Secureworks is a leader in cybersecurity providing best-in-class cybersecurity solutions and threat intelligence that reduces risk, optimizes IT and security investments, and fills security team talent gaps. Secureworks Taegis™, a cybersecurity analytics cloud platform built on 20+ years of real-world threat intelligence and research, improves your ability to detect advanced threats, streamline and collaborate on investigations, and automate the right actions.
  • #6: The term attack surface is often confused with the term attack vector, but they are not the same thing. The surface is what is being attacked; the vector is the means by which an intruder gains access. Your attack surface is the totality of all vulnerabilities in connected hardware and software. The combination of all attack vectors and all vulnerable assets within them is known as an organization’s attack surface. Attack vectors Specific paths that attackers use to gain unauthorized access to your environment. A simple analogy would be leaving a door or window to a building unlocked or open. While not always exploited, these openings provide an opportunity for unauthorized entry and therefore creates risk for malicious or unwanted activities that may take place. Common cyber-attack vectors include firewalls, DDoS attacks, malware, passwords, misconfigured APIs, and phishing – however organizations often have 100 or more attack vectors, adding lots of opportunity for risk. Protecting an organization requires careful review of every attack vector, and a detailed understanding of all assets associate with every attack vector, and what vulnerabilities exist in them. The combination of all attack vectors and all vulnerable assets within them is known as an organization’s attack surface. Your attack surface therefore reflects the entire area of IT infrastructure that is susceptible or exposed to potential compromise.
  • #9: Vulnerability management. Prioritization, and Remediation. Attack surface reduction begins with an attack surface analysis. Vulnerability assessment tools are a core component of operationalizing attack surface analysis, automating the process of capturing a comprehensive list of know assets and any associated vulnerabilities associated with them. This list is constantly changing, so this process must be continuous to reflect an accurate view of potential risk. Attack simulation (pen testing, red teaming, etc.) – Expose externally-facing weaknesses. Attack Surface Management tools – automated assessment tools that identify and classify externally facing access to systems, data, and networks. Find assets and check for vulnerabilities. Continuously monitor and discover the external assets attackers can see and evaluate them against commercial, open source and proprietary threat intelligence feeds to generate security ratings for an organization's overall security posture. Risk assessment. Assessing potential risk associated with vulnerable assets requires an understanding of who or what systems are utilizing each asset, and what data is stored or processed on each asset. Risk prioritization. Once vulnerabilities and risk are assessed, both can be prioritized, focusing on highest-risk assets that need to be secured first. All of these processes must be operationalized – meaning that they must happen continuously, and automatically. Link to typical vuln definition…
  • #16: - Software Vulnerabilities with CVE - Misconfigurations with CVE - Asset Exposures - Missing Security Patches - Security Control Deviations or Risk Exposures
  • #17: - Software Vulnerabilities with CVE - Misconfigurations with CVE - Asset Exposures - Missing Security Patches - Security Control Deviations or Risk Exposures
  • #19: What’s the talk track for this graphic?