Overview
Explore model-driven security approaches to combat rapidly evolving cyber threats in this 48-minute RSA Conference talk. Discover how organizations can move beyond simple anomaly detection to implement dynamic, automated security controls. Learn about the concept of model-driven security, its applications in dynamic provisioning, and strategies for implementation. Gain insights into identity and access management, security data analytics, and how to leverage data warehouses and rule-based security systems. Examine real-world examples, risk scoring methodologies, and the role of password vaulting and Data Loss Prevention (DLP) in a comprehensive security strategy. Understand the importance of security orchestration, third-party risk management, and performance metrics in building a robust cybersecurity framework. Ideal for security professionals seeking to enhance their organization's ability to respond swiftly and effectively to emerging threats like NotPetya.
Syllabus
Introduction
NotPetya
Model Driven Security
Data Warehouse
RuleBased Security
Example
Risk Scores
Password Vaulting
DLP
Security orchestration
Dynamic provisioning
Not Petya
Models
Questions
ThirdParty Risk
Scoring Base
Performance Management
SIM
Clarification
Taught by
RSA Conference