For any large company, regulated or not, it is essential to have a mechanism or process for detecting vulnerabilities. For this purpose, various scanners exist that can automatically scan the company's IT assets for known and new vulnerabilities. However, this is where the big challenge begins: most scanners tend to find a large number of vulnerabilities. This is important and good, but not every vulnerability is equally relevant for every company.
Typically, most organizations drown quickly with the number of vulnerabilities they have. Different specific scanners for compliance, containers, source code, operating systems and applications deliver a hardly manageable number of different potential problems per asset.
For vulnerability management to work, you need to build a sustainable vulnerability management, define intelligent processes and specify intelligent bundling and prioritization.
In this presentation, Christopher Schütze will show how this was achieved in a successful project.
Corporate IT/IoT/OT networks are becoming increasingly complex and distributed. At every given moment, millions, if not billions, of data points are communicating through multiple servers, applications and endpoints. This complexity not only expands the attack surface for cyber adversaries, but also makes the analysis of network traffic increasingly challenging. So, how do you detect a potential cyberthreat among all these network activities?
The Network Detection & Response solution ExeonTrace allows companies to monitor corporate networks through automated, ML-driven security analytics – quickly, reliably and completely hardware-free. By analysing log data from multiple network sources (NetFlow/IPFIX, firewall, DNS, proxy and application logs), ExeonTrace is able to automatically detect network vulnerabilities and potential cyber threats in on-premise, cloud and hybrid network environments, offering security teams intuitive visualisation and drill-downs to investigate security alerts.
ExeonTrace requires no traffic mirroring, is completely hardware-free, unaffected by encryption and compatible with the leading network device vendors. Consequently, we are trusted by industry leaders across Europe in the finance, logistics, manufacturing, healthcare and aviation sectors.
As the intensity and sophistication of cyber-attacks continues to increase amidst an uncertain threat landscape, enterprises are actively looking to embrace security automation as a potential solution. With machine learning developments maturing at a rapid pace, security automation has become increasingly practical and is the need of the hour to stem the tide of cyber attacks that are becoming bigger, faster and stealthier. Amidst the backdrop of state-sponsored attacks that can circumvent traditional defense systems, this panel will explore the need for security automation and automated threat intelligence, and will dive into best practices for implementing such initiatives in enterprise.