Upload
expolink
View
83
Download
3
Embed Size (px)
Citation preview
ВАДИМ ГАЛЛЯМШИНРУКОВОДИТЕЛЬ ПРОЕКТОВ
PHONE 8 800 500-10-58
КАК БЕЗОПАСНОЕ ОБЛАКО ПОМОГЛО ДИРЕКТОРУ УВИДЕТЬ
МОРЕ#URALCIO
#URALCIO
ОБЛАКА – ЭТО ОПАСНО?
#URALCIO
ОБЛАКА?
#URALCIO
МАЛЕНЬКАЯ КОМПАНИЯМНОГО КОММЕРЧЕСКОЙ ТАЙНЫ
#URALCIO
ЗАЩИЩАТЬ – ТАК ПО ПОЛНОЙ
#URALCIO
ЧТО СТАЛО ЧЕРЕЗ 2 ГОДА?
#URALCIO
ВСЁ ГЕНИАЛЬНОЕ - ПРОСТО
#URALCIO
ИСХОДНЫЕ ДАННЫЕКАК БУДЕМ ЗАЩИЩАТЬ?
#URALCIO
SANS TOP 20 CRITICAL SECURITY CONTROLS
1: Inventory of Authorized and Unauthorized Devices
2: Inventory of Authorized and Unauthorized Software
3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops,
Workstations, and Servers
4: Continuous Vulnerability Assessment and Remediation
5: Malware Defenses
6: Application Software Security
7: Wireless Access Control
13: Boundary Defense
11: Limitation and Control of Network Ports, Protocols, and
Services
17: Data Protection
18: Incident Response and Management
19: Secure Network Engineering14: Maintenance, Monitoring, and Analysis of Audit Logs
12: Controlled Use of Administrative Privileges
15: Controlled Access Based on the Need to Know
20: Penetration Tests and Red Team Exercises
8: Data Recovery Capability
10: Secure Configurations for Network Devices such as
Firewalls, Routers, and Switches
9: Security Skills Assessment and Appropriate Training to Fill Gaps
16: Account Monitoring and Control
17: Data Protection
#URALCIO
СНОВА DLP???
ИНТЕРНЕТ
ОФИС ЦОД
RDP
RDP RDP
RDP
RDP
#URALCIO
НАЧНЕМ С ПЕРЕСТРОЙКИ
17: Data Protection
1: Inventory of Authorized and Unauthorized Devices
2: Inventory of Authorized and Unauthorized Software
3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops,
Workstations, and Servers
4: Continuous Vulnerability Assessment and Remediation
5: Malware Defenses
6: Application Software Security
7: Wireless Access Control
13: Boundary Defense
11: Limitation and Control of Network Ports, Protocols, and
Services
17: Data Protection
18: Incident Response and Management
19: Secure Network Engineering14: Maintenance, Monitoring, and Analysis of Audit Logs
12: Controlled Use of Administrative Privileges
15: Controlled Access Based on the Need to Know
20: Penetration Tests and Red Team Exercises
8: Data Recovery Capability
10: Secure Configurations for Network Devices such as
Firewalls, Routers, and Switches
9: Security Skills Assessment and Appropriate Training to Fill Gaps
16: Account Monitoring and Control
#URALCIO
17.DATA PROTECTION- КАК ЭТО РАБОТАЕТ?
ИНТЕРНЕТ
ОФИС ЦОД
#URALCIO
17.DATA PROTECTION- ВЫБИРАЕМ IRM
#URALCIO
А ГДЕ ЖЕ ОБЛАКО?
ИНТЕРНЕТ
ОФИС ЦОД
#URALCIO
ОБЛАКА – ЭТО БЕЗОПАСНО
#URALCIO
ОТПУСК!!!
СПАСИБО ЗА ВНИМАНИЕ!
ВАДИМ ГАЛЛЯМШИН
PHONE
#URALCIO
РУКОВОДИТЕЛЬ ПРОЕКТОВ
8 800 500-10-58