SlideShare a Scribd company logo
From Reactive To Automated:Reducing Costs Through Mature Security ProcessesJörn DierksChiefSecurityStrategist EMEAjoern.dierks@netiq.com
Solving Cross-Discipline Problems2ProcessPeopleTechnologyInfrastructure & ApplicationsProvisioningHRComplianceHelpdeskNetIQNOCIncidentSecurityChangeBusinessOwnersOther Mgmt VendorsBusiness Processes
ProcessPeopleTechnologyInfrastructure & ApplicationsProvisioningHRCross-Product Integration ComplianceHelpdeskNetIQNOCIncidentSecurityChangeBusinessOwnersOther Mgmt VendorsBusiness ProcessesSolving Cross-Discipline Problems3
The Role of IT Process Automation –Bridging Silos Between Business and ITToolsToolsBusinessConfiguration & Identity AuditingService  / Help DeskSecurity Info & Event ManagementEvent Correlation & AnalysisIT GRCMSLMIT ProcessAutomationVulnerability AssessmentSystems & App Monitoring Perimeter & Network SecurityNetwork MonitoringContent Monitoring /  DLPResponse TimeMonitoringOperationsSecurityPolicyAwarenessConfiguration & Patch ManagementCMDBAV / Malware ProtectionIdentity ManagementResponsibilities Shared between Security & OperationsContinuityManagementCapacity & AvailabilityManagementReleaseManagementIncident & Problem Management Configuration & ChangeManagement
5Security & CompliancePerformance & Availability Identity & Access5© 2010 NetIQ Corporation. All rights reserved.About NetIQManage and audit user entitlements
Track privileged user activity
Protect the integrity of key systems and files
Monitor access to sensitive information
Simplify compliance reportingIT ProcessAutomationMonitor and manage heterogeneous environments including custom applications
IT Service validation and end-user performance  monitoring
Dynamic provisioning of  large-scale monitoring with exceptions
Functional and hierarchical Incident escalation
Deliver & manage differentiated service levels
User Provisioning Lifecycle Management
Centralize Unix account management through Active Directory
Reduce number of privileged users
Secure delegated administration
Windows and Exchange MigrationAddressing Insider ThreatPrivileged User MonitoringAddressing Compliance RequirementsBusiness Exception ManagementEnd-User Policy Management andAwarenessUse-Cases In This Presentation

More Related Content

What's hot (18)

PDF
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identity Defined Security Alliance
 
PDF
2021 English Part One Anti-phishing Webinar Presentation Slides
Ivanti
 
PDF
Why Executives Underinvest In Cybersecurity
HackerOne
 
PPTX
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
 
PPT
IBM Security Strategy Intelligence,
Information Security Awareness Group
 
PDF
Securing Your Cloud Applications
IBM Security
 
PDF
Total Digital Security Introduction 4.2
Brad Deflin
 
PPTX
New CISO - The First 90 Days
Resilient Systems
 
PPTX
SANS Critical Security Controls Summit London 2013
Wolfgang Kandek
 
PPTX
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
PDF
"Thinking diffrent" about your information security strategy
Jason Clark
 
PDF
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Ignyte Assurance Platform
 
PPTX
A Non-Salesy Intro to the Ivanti Porfolio
Ivanti
 
PDF
Kista watson summit final public version
IBM Sverige
 
PPTX
Security Management in the Cloud
GaryArdito
 
PDF
Bring Your Own Device (BYOD)
Murray Security Services
 
PPTX
Cloud security - Auditing and Compliance
Josh Tullo
 
PDF
Energy Industry Organizational Strategies to Increase Cyber Resiliency
EnergySec
 
Identiverse Zero Trust Customer Briefing, Identiverse 2019
Identity Defined Security Alliance
 
2021 English Part One Anti-phishing Webinar Presentation Slides
Ivanti
 
Why Executives Underinvest In Cybersecurity
HackerOne
 
You are Doing IT Security Wrong - Understanding the Threat of Modern Cyber-at...
Michael Noel
 
IBM Security Strategy Intelligence,
Information Security Awareness Group
 
Securing Your Cloud Applications
IBM Security
 
Total Digital Security Introduction 4.2
Brad Deflin
 
New CISO - The First 90 Days
Resilient Systems
 
SANS Critical Security Controls Summit London 2013
Wolfgang Kandek
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
"Thinking diffrent" about your information security strategy
Jason Clark
 
Fortifying Cyber Defense: How to Act Now to Protect Global Supply Chains
Ignyte Assurance Platform
 
A Non-Salesy Intro to the Ivanti Porfolio
Ivanti
 
Kista watson summit final public version
IBM Sverige
 
Security Management in the Cloud
GaryArdito
 
Bring Your Own Device (BYOD)
Murray Security Services
 
Cloud security - Auditing and Compliance
Josh Tullo
 
Energy Industry Organizational Strategies to Increase Cyber Resiliency
EnergySec
 

Similar to From reactive to automated reducing costs through mature security processes info security europe 2011 (20)

PPT
How much does it cost to be Secure?
mbmobile
 
PDF
Security a Revenue Center: How Security Can Drive Your Business
shira koper
 
PPTX
Security Baselines and Risk Assessments
Priyank Hada
 
PPTX
Infosec policies to appsec standards ed final
eadams2330
 
PDF
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
 
PDF
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
PDF
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
PDF
Security Change Management: Agility vs. Control
AlgoSec
 
PDF
BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...
BetterCloud
 
PDF
Defcon 22-tim-mcguffin-one-man-shop
Priyanka Aash
 
PPTX
ISStateGovtProposal
Dale White
 
PPTX
Information security trends and concerns
John Napier
 
PPTX
5 Clear Signs You Need Security Policy Automation
Tufin
 
PPT
Cyber crime with privention
Manish Dixit Ceh
 
PDF
5 things you didn't know you could do with security policy management
AlgoSec
 
PPTX
Enterprise IT Security| CIO Innovation and Leadership
RedZone Technologies
 
DOCX
Security Policies and Implementation IssuesLecture 5How to D.docx
jeffreye3
 
PPTX
Continuous Compliance 14.9.2016
Digia Plc
 
PPT
Lunch and Learn: June 29, 2010
prevalentnetworks
 
PDF
CNIT 160: Ch 2b: Security Strategy Development
Sam Bowne
 
How much does it cost to be Secure?
mbmobile
 
Security a Revenue Center: How Security Can Drive Your Business
shira koper
 
Security Baselines and Risk Assessments
Priyank Hada
 
Infosec policies to appsec standards ed final
eadams2330
 
IT General Controls Presentation at IIA Vadodara Audit Club
Kaushal Trivedi
 
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Emerging Trends in Information Privacy and Security
Jessica Santamaria
 
Security Change Management: Agility vs. Control
AlgoSec
 
BetterCloud Whitepaper: Fixing IT's Blindspots – 8 Critical Security and Mana...
BetterCloud
 
Defcon 22-tim-mcguffin-one-man-shop
Priyanka Aash
 
ISStateGovtProposal
Dale White
 
Information security trends and concerns
John Napier
 
5 Clear Signs You Need Security Policy Automation
Tufin
 
Cyber crime with privention
Manish Dixit Ceh
 
5 things you didn't know you could do with security policy management
AlgoSec
 
Enterprise IT Security| CIO Innovation and Leadership
RedZone Technologies
 
Security Policies and Implementation IssuesLecture 5How to D.docx
jeffreye3
 
Continuous Compliance 14.9.2016
Digia Plc
 
Lunch and Learn: June 29, 2010
prevalentnetworks
 
CNIT 160: Ch 2b: Security Strategy Development
Sam Bowne
 
Ad

More from NetIQ (20)

PDF
Open Enterprise Server With Windows
NetIQ
 
PDF
Big Payoffs With BYOD and Mobility
NetIQ
 
PDF
Mobile Apps in Your Business
NetIQ
 
PPTX
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
 
PPTX
BrainShare 2014
NetIQ
 
PDF
Paraca Inc.
NetIQ
 
PDF
The University of Westminster Saves Time and Money with Identity Manager
NetIQ
 
PDF
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
NetIQ
 
PDF
Swisscard Saves Time and Effort in Managing User Access
NetIQ
 
PDF
Vodacom Tightens Security with Identity Manager from NetIQ
NetIQ
 
PDF
University of Dayton Ensures Compliance with Sentinel Log Manager
NetIQ
 
PDF
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
NetIQ
 
PDF
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
NetIQ
 
PDF
Netiq css huntington_bank
NetIQ
 
PDF
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
NetIQ
 
PDF
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ
 
PDF
Handelsbanken Takes Control of Identity Management with NetIQ
NetIQ
 
PDF
Millions of People Depend on Datang Xianyi Technology and NetIQ
NetIQ
 
PDF
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
NetIQ
 
PDF
Central Denmark Region Strengthens Administrative Security with Identity Mana...
NetIQ
 
Open Enterprise Server With Windows
NetIQ
 
Big Payoffs With BYOD and Mobility
NetIQ
 
Mobile Apps in Your Business
NetIQ
 
Advanced Persistent Threat - Evaluating Effective Responses
NetIQ
 
BrainShare 2014
NetIQ
 
Paraca Inc.
NetIQ
 
The University of Westminster Saves Time and Money with Identity Manager
NetIQ
 
The London School of Hygiene & Tropical Medicine Accelerates and Streamlines ...
NetIQ
 
Swisscard Saves Time and Effort in Managing User Access
NetIQ
 
Vodacom Tightens Security with Identity Manager from NetIQ
NetIQ
 
University of Dayton Ensures Compliance with Sentinel Log Manager
NetIQ
 
Nippon Light Metal Forges a Disaster Recovery Solution with NetIQ
NetIQ
 
Nexus Differentiates Itself and Grows Its Capabilities with Operations Center
NetIQ
 
Netiq css huntington_bank
NetIQ
 
Professional Services Company Boosts Security, Facilitates Compliance, Automa...
NetIQ
 
NetIQ Identity Manager Unites Hanshan Normal University
NetIQ
 
Handelsbanken Takes Control of Identity Management with NetIQ
NetIQ
 
Millions of People Depend on Datang Xianyi Technology and NetIQ
NetIQ
 
bluesource Uses NetIQ AppManager to Offer Standout Managed Service
NetIQ
 
Central Denmark Region Strengthens Administrative Security with Identity Mana...
NetIQ
 
Ad

Recently uploaded (20)

PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PPTX
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
PPTX
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
PDF
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
PDF
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
PDF
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PPTX
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
PPTX
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
introduction to computer hardware and sofeware
chauhanshraddha2007
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Farrell_Programming Logic and Design slides_10e_ch02_PowerPoint.pptx
bashnahara11
 
AVL ( audio, visuals or led ), technology.
Rajeshwri Panchal
 
Tea4chat - another LLM Project by Kerem Atam
a0m0rajab1
 
Economic Impact of Data Centres to the Malaysian Economy
flintglobalapac
 
GDG Cloud Munich - Intro - Luiz Carneiro - #BuildWithAI - July - Abdel.pdf
Luiz Carneiro
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
Agile Chennai 18-19 July 2025 Ideathon | AI Powered Microfinance Literacy Gui...
AgileNetwork
 
Introduction to Flutter by Ayush Desai.pptx
ayushdesai204
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
Priyanka Aash
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
introduction to computer hardware and sofeware
chauhanshraddha2007
 

From reactive to automated reducing costs through mature security processes info security europe 2011