sans 2017 cyber security trend report checklist

1
AIM AHEAD OF THE ATTACK TARGET INCREASE SECURITY IN 2017 RANSOMWARE ATTACKS SHOW HIGH GROWTH a Do you have malware detection tools to quickly identify and eradicate malware infections? a Do you have the ability to continuously monitor your IT environment for vulnerabilities, and immediately remediate them? 70% OF THE WORKFORCE WILL BE MOBILE BY 2020 a Do you know where all of your IT assets reside, who controls them, and their associated security risks? a Do your security processes for continuous monitoring, vulnerability management, and compliance monitoring extend to cloud services? 70% OF BOARDS WILL REQUIRE CISOS TO BRIEF THEM QUARTERLY ON SECURITY BY 2018 Will you be ready? See how Qualys’ cloud-based security and compliance solutions can give you unprecedented visibility and control over global IT assets, wherever they reside – on-premises, on endpoints, or in elastic clouds. Visit qualys.com/2017SecurityTrends 80% OF ATTACKS EXPLOIT KNOWN VULNERABILITIES a Do you have the ability to quickly detect and mitigate vulnerabilities? a Do you have shielding capabilities – like intrusion prevention and application-layer firewall techniques – in place for instances where mitigation is not possible? a Do you have continuous monitoring in place to enable rapid detection of attacks and compromises? 4TH PARTY ATTACKS ARE RISING a Is your security team involved in the supplier selection process? a Do you have processes for continuous monitoring of the vulnerability and compromise status of business partners and suppliers? a Do you have a centralized vendor and IT risk audit tool? ATTACKS EXPLOITING IOT VULNERABILITIES ARE A REALITY a Do you know which IoT devices are connected to your network at any given time? a Do you have the ability to detect vulnerabilities at the API level? a Can you programmatically scale rapid scanning and patching of web application vulnerabilities across browser-based, mobile and IoT services, and quickly deploy patches? SANS CYBERSECURITY TREND REPORT CHECKLIST

Upload: qualys

Post on 11-Apr-2017

4.160 views

Category:

Technology


0 download

TRANSCRIPT

AIM AHEAD OF THE ATTACK TARGET INCREASE SECURITY IN 2017

RANSOMWARE ATTACKSSHOW HIGH GROWTHa Do you have malware detection

tools to quickly identify and eradicate malware infections?

a Do you have the ability to continuously monitor your IT environment for vulnerabilities, and immediately remediate them?

70% OF THE WORKFORCE WILL BE MOBILE BY 2020a Do you know where all of your IT

assets reside, who controls them, and their associated security risks?

a Do your security processes for continuous monitoring, vulnerability management, and compliance monitoring extend to cloud services?

70% OF BOARDS WILL REQUIRE CISOS TO BRIEF THEM QUARTERLY ON SECURITY BY 2018Will you be ready? See how Qualys’ cloud-based security and compliance solutions can give you unprecedented visibility and control over global IT assets, wherever they reside – on-premises, on endpoints, or in elastic clouds.

Visit qualys.com/2017SecurityTrends

80% OF ATTACKS EXPLOIT KNOWN VULNERABILITIESa Do you have the

ability to quickly detect and mitigate vulnerabilities?

a Do you have shielding capabilities – like intrusion prevention and application-layer firewall techniques – in place for instances where mitigation is not possible?

a Do you have continuous monitoring in place to enable rapid detection of attacks and compromises?

4TH PARTY ATTACKS ARE RISINGa Is your security team

involved in the supplier selection process?

a Do you have processes for continuous monitoring of the vulnerability and compromise status of business partners and suppliers?

a Do you have a centralized vendor and IT risk audit tool?

ATTACKS EXPLOITING IOT VULNERABILITIES ARE A REALITYa Do you know which IoT devices are

connected to your network at any given time?

a Do you have the ability to detect vulnerabilities at the API level?

a Can you programmatically scale rapid scanning and patching of web application vulnerabilities across browser-based, mobile and IoT services, and quickly deploy patches?

SANS CYBERSECURITY TREND REPORT CHECKLIST