Endpoint Security Fundamentals: Part 3Building the Endpoint
Security Program
Today’s Speakers
2
Mike RothmanAnalyst and PresidentSecurosis, LLC
Jeff HughesDirector, Solution MarketingLumension
Endpoint Security Fundamentals
http://www.flickr.com/photos/rock_creek/2127667538/
The Endpoint Security Program
•Managing Expectations
•Defining Success
http://www.flickr.com/photos/quinnanya/3516196398/
User Training
Can we get them through the hoop?
The world is a dynamic place. Feedback Loops keep things current.
http://www.flickr.com/photos/fish2000/2040347358/
Feedback Loops
•Confirm the Attack
•Contain the Damage
•Post-Mortem
Incident Response
http://www.flickr.com/photos/tripleman/3379489159/
What will make the auditor go away as quickly as
possible?http://www.flickr.com/photos/bourgeoisbee/2037138405/
Compliance Reporting
Summary•Technology nor controls are effective without
the structure of a program
•Your success is based on how well you manage expectations (and how well you respond to incidents)
•The Program must evolve through constant assessment of feedback
•Unless you can substantiate it, it didn’t happen
Q&A
Resources and Tools
• Endpoint Security Fundamentals Resource Center• http://www.lumension.com/Resources/eBooks/Endpoint-Security-Fundamentals.aspx
• Other Resources» Podcasts, Videos, Webcasts
» On-Demand Demos
» Scanners
• Product Evaluations» Virtual Environment
» Full Software Download
12
Global Headquarters8660 East Hartford Drive
Suite 300
Scottsdale, AZ 85255
1.888.725.7828
blog.lumension.com