Вадим Галлямшин (СКБ-Контур) - Как безопасное облако...

Preview:

Citation preview

ВАДИМ ГАЛЛЯМШИНРУКОВОДИТЕЛЬ ПРОЕКТОВ

PHONE 8 800 500-10-58

КАК БЕЗОПАСНОЕ ОБЛАКО ПОМОГЛО ДИРЕКТОРУ УВИДЕТЬ

МОРЕ#URALCIO

#URALCIO

ОБЛАКА – ЭТО ОПАСНО?

#URALCIO

ОБЛАКА?

#URALCIO

МАЛЕНЬКАЯ КОМПАНИЯМНОГО КОММЕРЧЕСКОЙ ТАЙНЫ

#URALCIO

ЗАЩИЩАТЬ – ТАК ПО ПОЛНОЙ

#URALCIO

ЧТО СТАЛО ЧЕРЕЗ 2 ГОДА?

#URALCIO

ВСЁ ГЕНИАЛЬНОЕ - ПРОСТО

#URALCIO

ИСХОДНЫЕ ДАННЫЕКАК БУДЕМ ЗАЩИЩАТЬ?

#URALCIO

SANS TOP 20 CRITICAL SECURITY CONTROLS

1: Inventory of Authorized and Unauthorized Devices

2: Inventory of Authorized and Unauthorized Software

3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops,

Workstations, and Servers

4: Continuous Vulnerability Assessment and Remediation

5: Malware Defenses

6: Application Software Security

7: Wireless Access Control

13: Boundary Defense

11: Limitation and Control of Network Ports, Protocols, and

Services

17: Data Protection

18: Incident Response and Management

19: Secure Network Engineering14: Maintenance, Monitoring, and Analysis of Audit Logs

12: Controlled Use of Administrative Privileges

15: Controlled Access Based on the Need to Know

20: Penetration Tests and Red Team Exercises

8: Data Recovery Capability

10: Secure Configurations for Network Devices such as

Firewalls, Routers, and Switches

9: Security Skills Assessment and Appropriate Training to Fill Gaps

16: Account Monitoring and Control

17: Data Protection

#URALCIO

СНОВА DLP???

ИНТЕРНЕТ

ОФИС ЦОД

RDP

RDP RDP

RDP

RDP

#URALCIO

НАЧНЕМ С ПЕРЕСТРОЙКИ

17: Data Protection

1: Inventory of Authorized and Unauthorized Devices

2: Inventory of Authorized and Unauthorized Software

3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops,

Workstations, and Servers

4: Continuous Vulnerability Assessment and Remediation

5: Malware Defenses

6: Application Software Security

7: Wireless Access Control

13: Boundary Defense

11: Limitation and Control of Network Ports, Protocols, and

Services

17: Data Protection

18: Incident Response and Management

19: Secure Network Engineering14: Maintenance, Monitoring, and Analysis of Audit Logs

12: Controlled Use of Administrative Privileges

15: Controlled Access Based on the Need to Know

20: Penetration Tests and Red Team Exercises

8: Data Recovery Capability

10: Secure Configurations for Network Devices such as

Firewalls, Routers, and Switches

9: Security Skills Assessment and Appropriate Training to Fill Gaps

16: Account Monitoring and Control

#URALCIO

17.DATA PROTECTION- КАК ЭТО РАБОТАЕТ?

ИНТЕРНЕТ

ОФИС ЦОД

#URALCIO

17.DATA PROTECTION- ВЫБИРАЕМ IRM

#URALCIO

А ГДЕ ЖЕ ОБЛАКО?

ИНТЕРНЕТ

ОФИС ЦОД

#URALCIO

ОБЛАКА – ЭТО БЕЗОПАСНО

#URALCIO

ОТПУСК!!!

СПАСИБО ЗА ВНИМАНИЕ!

ВАДИМ ГАЛЛЯМШИН

PHONE

#URALCIO

РУКОВОДИТЕЛЬ ПРОЕКТОВ

8 800 500-10-58

Recommended