halloween special: top horrors of it security€¦ · halloween special: top horrors of it security...
TRANSCRIPT
Halloween Special:
Top Horrors of IT Security
Presenter:
Roy Lopez
Pre-Sales Engineer
Type your question
here
Click “Send”
Housekeeping
o All attendees are on mute
o Ask your questions!
o Questions will be answered during
the session or at the Q&A at the end
o You will receive a copy of slides and
webinar recording in the follow-up
o Duration: Up to 60 minutes
o We hope you enjoy!
Win one of three $100 Amazon Vouchers
We will randomly draw 3 people’s names at the
end of the Webinar
You must be present at the end of the webinar to
be eligible
We will contact all winners after the webinar
Ask your questions and be active!
$100
Agenda
o Threats Landscape
o Horror Today
o Account Abuse
o Ransomware/Malware
o Compliance Regulations
o Combatting the Threats
o Live-Demo of Netwrix Auditor
o Live Q&A
Threats Landskape
Traditional Threat Landscape
o Firewall
o Virus Scanners
o Group Policies
Currently in 2017
o Insider Threats
o Data Breaches
o Malware|Ransomware
Compliance Regulations
o Impromptu Audits
o GDPR
Currently in 2017Horror Today
Insider Threats
o Privilege Users going Rogue
o Regular Users going Rogue
o Non-Domain Authenticated Activities
o Alerts
o Reports
o User Activity Reporting
Risk mitigation
Data Breaches
o Awareness of their Activity
o Shortening the Mean Time to Detect
o Setup Internal CyberSecurity HoneyPots
o Alerts, Reports, Change Summaries
Minimizing the risk of Data Breach
MalWare|RansomWare:
o Excessive Access Permissions in Active Directory
o Excessive Access Permissions in File Systems
o Determine Permissions, and Adjust
o Alerts
Solution:
Solution
Horrors• Insider Threats
– Privilege Users going Rogue– Regular Users going Rogue– Non-Domain Authenticated Activities
• Data Breaches– Awareness of their Activity– Shortening the Mean Time to Detect
• MalWare|RansomWare– Excessive Access Permissions in AD– Excessive Access Permissions in File
Systems
Solutions• Insider Threats
– Alerts, Reports, User Activity Reporting
• Data Breaches– Setup Internal CyberSecurity
HoneyPots– Alerts, Reports, Change Summaries
• MalWare|RansomWare– Determine Permissions, and Adjust– Alerts
Demonstration
Netwrix Auditor
Netwrix Auditor Applications
Netwrix Auditor for Active Directory
Netwrix Auditor for Windows File Servers
Netwrix Auditor for Oracle Database
Netwrix Auditor for Azure AD
Netwrix Auditor for EMC
Netwrix Auditor for SQL Server
Netwrix Auditor for Exchange
Netwrix Auditor for NetApp
Netwrix Auditor for Windows Server
Netwrix Auditor forOffice 365
Netwrix Auditor for SharePoint
Netwrix Auditor for VMware
GA
Financial
Healthcare & Pharmaceutical
Federal, State, Local, Government
Industrial/Technology/Other
Netwrix Customers
All awards: www.netwrix.com/awards
Industry Awards and Recognition
Next Steps
Free Trial: setup in your own test environment:
On-premises: netwrix.com/freetrial
Virtual: netwrix.com/go/appliance
Cloud: netwrix.com/go/cloud
Test Drive: run a virtual POС in a Netwrix-hosted test lab netwrix.com/testdrive
Webinars: join our upcoming webinars and watch the recorded sessions netwrix.com/webinars