SANS 2017 Cyber Security Trend Report Checklist

1
AIM AHEAD OF THE ATTACK TARGET INCREASE SECURITY IN 2017 RANSOMWARE ATTACKS SHOW HIGH GROWTH a Do you have malware detection tools to quickly identify and eradicate malware infections? a Do you have the ability to continuously monitor your IT environment for vulnerabilities, and immediately remediate them? 70% OF THE WORKFORCE WILL BE MOBILE BY 2020 a Do you know where all of your IT assets reside, who controls them, and their associated security risks? a Do your security processes for continuous monitoring, vulnerability management, and compliance monitoring extend to cloud services? 70% OF BOARDS WILL REQUIRE CISOS TO BRIEF THEM QUARTERLY ON SECURITY BY 2018 Will you be ready? See how Qualys’ cloud-based security and compliance solutions can give you unprecedented visibility and control over global IT assets, wherever they reside – on-premises, on endpoints, or in elastic clouds. Visit qualys.com/2017SecurityTrends 80% OF ATTACKS EXPLOIT KNOWN VULNERABILITIES a Do you have the ability to quickly detect and mitigate vulnerabilities? a Do you have shielding capabilities – like intrusion prevention and application-layer firewall techniques – in place for instances where mitigation is not possible? a Do you have continuous monitoring in place to enable rapid detection of attacks and compromises? 4TH PARTY ATTACKS ARE RISING a Is your security team involved in the supplier selection process? a Do you have processes for continuous monitoring of the vulnerability and compromise status of business partners and suppliers? a Do you have a centralized vendor and IT risk audit tool? ATTACKS EXPLOITING IOT VULNERABILITIES ARE A REALITY a Do you know which IoT devices are connected to your network at any given time? a Do you have the ability to detect vulnerabilities at the API level? a Can you programmatically scale rapid scanning and patching of web application vulnerabilities across browser-based, mobile and IoT services, and quickly deploy patches? SANS CYBERSECURITY TREND REPORT CHECKLIST

Transcript of SANS 2017 Cyber Security Trend Report Checklist

AIM AHEAD OF THE ATTACK TARGET INCREASE SECURITY IN 2017

RANSOMWARE ATTACKSSHOW HIGH GROWTHa Do you have malware detection

tools to quickly identify and eradicate malware infections?

a Do you have the ability to continuously monitor your IT environment for vulnerabilities, and immediately remediate them?

70% OF THE WORKFORCE WILL BE MOBILE BY 2020a Do you know where all of your IT

assets reside, who controls them, and their associated security risks?

a Do your security processes for continuous monitoring, vulnerability management, and compliance monitoring extend to cloud services?

70% OF BOARDS WILL REQUIRE CISOS TO BRIEF THEM QUARTERLY ON SECURITY BY 2018Will you be ready? See how Qualys’ cloud-based security and compliance solutions can give you unprecedented visibility and control over global IT assets, wherever they reside – on-premises, on endpoints, or in elastic clouds.

Visit qualys.com/2017SecurityTrends

80% OF ATTACKS EXPLOIT KNOWN VULNERABILITIESa Do you have the

ability to quickly detect and mitigate vulnerabilities?

a Do you have shielding capabilities – like intrusion prevention and application-layer firewall techniques – in place for instances where mitigation is not possible?

a Do you have continuous monitoring in place to enable rapid detection of attacks and compromises?

4TH PARTY ATTACKS ARE RISINGa Is your security team

involved in the supplier selection process?

a Do you have processes for continuous monitoring of the vulnerability and compromise status of business partners and suppliers?

a Do you have a centralized vendor and IT risk audit tool?

ATTACKS EXPLOITING IOT VULNERABILITIES ARE A REALITYa Do you know which IoT devices are

connected to your network at any given time?

a Do you have the ability to detect vulnerabilities at the API level?

a Can you programmatically scale rapid scanning and patching of web application vulnerabilities across browser-based, mobile and IoT services, and quickly deploy patches?

SANS CYBERSECURITY TREND REPORT CHECKLIST