the business of battle readiness
play

The Business of Battle Readiness: Over-the-Horizon Threat Management - PowerPoint PPT Presentation

The Business of Battle Readiness: Over-the-Horizon Threat Management for Companies and Agencies + Roland Cloutier ADP Staff Vice President, Chief Security Officer A Responsibility to Protect Historical Cyber Defensive Operation Practices Im


  1. The Business of Battle Readiness: Over-the-Horizon Threat Management for Companies and Agencies + Roland Cloutier ADP Staff Vice President, Chief Security Officer

  2. A Responsibility to Protect

  3. Historical Cyber Defensive Operation Practices

  4. Im Imagine fi fighting fr from this position

  5. 3 Incredible Shifts Since the Rainbow Series The Business of the Black The Interconnected Mission Speed of Technical Cyber World Space Manipulation

  6. The Real Battle Field

  7. Over the Horizon Threat Management Pillars • Threat Transparency • Threat Impact Analysis • Threat Decision Support & Action

  8. Over the Horizon Threat Transparency Tactics, Techniques & Who is harming who? Industry / Agency Alignment Procedures

  9. Joint Intelligence Operational Requirements Integrated Third Party Intel Trusted Enclave Intelligence Platforms Government to Automation Commercial

  10. Automating Threat

  11. Im Impact Analysis 1. Know Your Business 2. Risk Management

  12. The Success of their Business

  13. The Success of your “Security” Business Threat Surface Business Process Creating Your Acknowledgment Documentation Sense of “Normal” – Knowing Your and Threat Limits Analysis

  14. Defining the What If: Risk Articulation Assessment & Validation • Enabling the “What If” – Path Vector Analysis etc • How Big is My Problem • Probability Alignment Risk Articulation • Defining Impact • Make it Repeatable • Automate it

  15. Decision Support – Making Your Horizon Actionable

  16. Battle Space Decision Support Mature Your Prioritization Process • Line Level Actionability • Transparency: The What & Why • Documented and Easily Followed

  17. Move the Cheese Methodology – Willful Control Obfuscation Partner Selection Burstable Cloud Advanced Response

  18. Don’t Go It Alone Law Incident Technical Enforcement Threat Management & Response Specialties Law Firms

  19. Opps; I Changed it again 😏

  20. The Cloud is Your Friend • Attacking the Defenders • Don’t Size for “The Big One” • Shared Response Capabilities

  21. Enabling The Next Generation Defender Advanced Condition Analytics Collection and Expertise – Next Generation Security Defense Security Intelligence Big Data Platform Force Multiplier Business Response Assessment Cyber Process Intelligence & and Investigation Protection Automation Assurance

  22. Getting There: Progressive Improvement Through Action Take Inventory Establish Legal Alignment Create You Business View Develop a Core Big Data Plan Prioritize on Prevent, Detect, Contain, Response

  23. Questions?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend