Journey through Enterprise IT Services
In Journey through Enterprise IT Services, Nadhan, HP Distinguished Technologist, explores the IT Services industry, and discusses technology trends in simplified terms.

Protecting your enterprise against “Adversaries ‘R’ Us”

A federal indictment from the United States Attorney's Office charges five men with conspiring in a worldwide hacking and data breach scheme to steal more than 160 million credit card numbers (a scheme akin to a global enterprise) with a strategy to fraudulently get to the most valued asset — information. Legitimate enterprises must stay up-to-date on various concepts, techniques and tools required to proactively safeguard their enterprises against such schemes, which can be loosely labeled as “Adversaries ‘R’ Us.” The sessions at HP Protect 2013 offer a diverse array of topics to that end. Here are some of my picks in the context of this security breach — the largest such scheme ever prosecuted in the United States.

Adversary HP Protect.png

 

HP Protect 2013 offers nearly 150 technical sessions – 100+ hours of content with 8 hours of networking with 1,000+ security professionals and 16+ hours of one-on-one access to HP security experts. There are various tracks that span Software, Data and Network security among others. Here is a list of sessions that highlight concepts and techniques that enterprises can use to prevent and combat the next attack from “Adversaries R Us.”I have also highlighted my own thoughts on each session in italics.

 

1.       1447 - Software security touch point: architectural risk analysis. Beginning with the development of a forest-level view of your code, a simple three-step process can be used to find both well-understood flaws and absolutely new flaws.

There is a lot more to software security than malicious code through SQL injection and cross-site scripting.

 

2.       1342 - Big security arrives just in time to protect your Big Data. Financial transactions include sensitive information that must be protected under strict mandates and controls.

Securing Big Data includes securing distributed server storage with strong security and continual compliance.

 

3.       1343 - When network security fails: shield your sensitive information assets where they live. Network security is vital but not adequate.

Sensitive information must still be protected where it actually lives using latest storage technologies.

 

4.       1299 - Application visibility and control from HP TippingPoint's next-generation firewall. Live demonstration ofnext-generation firewall allows enterprises to improve visibility and control of applications running on the network.

The five defendants penetrated the computer networks to get to the credit card information.

 

5.       1300 - Reverse engineering exploits. DV Labs team reverse engineers exploits to get in front of upcoming threats and vulnerabilities.

If the first exploit has already happened, use that incident to learn more and get ahead of the game.

 

Have you taken a look at the vast array of sessions at HP Discover 2013? Are there other sessions that would apply better to your environment from an enterprise security perspective? Please let me know.

 

“Adversaries R Us” representatives do not call ahead to get an appointment before setting foot in your enterprise.

 

Team up with HP Technology Expert, E.G.Nadhan

 

Connect with Nadhan on: Twitter, Facebook, Linkedin and Journey Blog.

 

References

 

Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the community guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Search
Showing results for 
Search instead for 
Do you mean 
About the Author


Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation