効果的なインシデント・レスポンス 体制の構築

セキュリティ関係者のさまざまな努力にもかかわらず、コンピュータやネットワークへの侵入を許して、セキュリティ侵害を受ける組織が後を絶ちません。その結果、数百万ドルもの損失や組織の信用失墜、エンドユーザーの個人情報流出などの深刻な被害が相次いでいます。

今日、「セキュリティ侵害の阻止」を目的にしたセキュリティ対策だけではもはや不十分です。セキュリティ侵害の発生を前提に、効果的なインシデント・レスポンス計画を策定する対応が欠かせません。

インシデント・レスポンス計画を策定する際には、インシデント・レスポンス体制の詳細な評価を実施し、セキュリティ侵害の発生時に実行すべき手順を定めます。これにより、セキュリティ侵害による被害が最小限に食い止められ、迅速な復旧作業の実施が可能となります。

効果的なインシデント・レスポンス体制の構築

このレポートの主な内容は次のとおりです。

  • 基幹業務に影響を与えることなく、重要なシステムや情報を保護するためのインシデント・レスポンス計画を策定する方法
  • メンバーの役割と責任を明確に規定したコンピュータ・インシデント・レスポンス・チーム(CIRT)を組織し、セキュリティ侵害に素早く対応できる体制を整える方法
  • インシデント・レスポンス計画を改善し、ネットワークへの侵入の検知に要する時間、セキュリティ脅威の駆除および被害の復旧に要する時間を短縮する方法
  • 組織の成長やネットワーク・エンドポイントの増加、新たなセキュリティ脅威の出現に合わせたインシデント・レスポンス計画の見直しが欠かせない理由

セキュリティ強化の第一歩として、この無料レポートをぜひお役立てください。

Get Whitepaper

自社に最適な セキュリティ水準とは

ネットワークをサイバー攻撃から保護するためにセキュリティ製品やサービスを導入したにもかかわらず、結局はセキュリティ侵害を受けてしまった──。 このような場合には、既存のセキュリティ対策全体を冷静に見直し、評価し直す必要があります。

既存のセキュリティ対策で何が保護でき、何が保護できないのかを評価し、 ネットワーク・アクセス制御やデータ保護、インシデント・レスポンス計画、リソース割り当ての状況を分析します。

一連の評価作業によって、セキュリティ対策のギャップを見つけ出し、ギャップ解消に必要な対策を実施するためのロードマップを策定できます。 そして、対策の優先度と予算の確保状況に応じて、改善計画を作成します。

このホワイトペーパーの主な内容は次のとおりです。

  • セキュリティ対策やインシデント・レスポンス計画を定期的に診断して、想定どおりに機能するかどうかを評価する方法
  • コンプライアンスとセキュリティは必ずしもイコールではなく、コンプライアンスを徹底していてもセキュリティ侵害が起こりうる理由
  • 組織全体の利益になるよう、ビジネス目標、IT 目標、セキュリティ目標をすり合わせる重要性
  • テクノロジーの進化や新たなセキュリティ脅威に合わせて、セキュリティを継続的に強化すべき理由
Get Whitepaper

The Total Economic Impact™ Of FireEye: Efficiently Improving Asset Protect with FireEye Network Security

According to a recent Total Economic Impact (TEI) study conducted by Forrester Consulting, FireEye Network Security customers can expect a 152% ROI with total benefits of $1.3M from cost savings over 3 years, and payback on their initial investment in just 9.7 months.
 
Based on interviews with FireEye customers, Forrester utilized their TEI framework to identify the benefits, costs, flexibility and risks associated with an investment in FireEye Network Security (NX Series) products for a composite organization.
 
FireEye Network Security solutions can deliver business outcomes, cost savings and rapid payback for their organization. Visionary business and IT leaders who want to secure critical infrastructure and data should read this study today.

Download the commissioned study, The Total Economic Impact™ Of FireEye, now.

Get Whitepaper

Follow the Money: Dissecting the Operations of the Cyber Crime Group FIN6

Cybercrime operations can be intricate and elaborate, with careful planning needed to navigate the various obstacles separating an attacker from a payout. Yet reports on these operations are often fragmentary, as the full scope of attacker activity typically occurs beyond the view of any one group of investigators.

FireEye Threat Intelligence and iSIGHT Partners recently combined our research to provide a unique and extensive look into the activities of one particular threat group: FIN6.

FIN6 is a cyber criminal group that steals payment card data for monetization from targets predominately in the hospitality and retail sectors. The group was observed aggressively targeting and compromising point-of-sale (POS) systems and making off with millions of payment card numbers. These card numbers were later sold on a particular underground “card shop,” potentially earning FIN6 hundreds of millions of dollars.

This report provides wide-ranging, end-to-end visibility into FIN6’s cybercrime operations, detailing initial intrusion, methods used to navigate the victim network, other tactics, techniques, and procedures (TTPs), and the sale of stolen payment card data in an underground marketplace.

Get Whitepaper

M-Trends 2016

M-Trends 2016 provides trends, statistics and case studies to illustrate how advanced threat actors have evolved over the past year.

The annual report was compiled by consultants at Mandiant, a FireEye company, and is based on hundreds of Mandiant incident response investigations in more than 30 industry sectors. It offers recommendations on how organizations can improve the way they prevent, detect, analyze and respond to cyber attacks.

Download the special report to learn:

  • How cyber attackers are holding data for ransom, stealing personally identifiable information and destroying critical systems
  • Why enterprise networking devices, such as routers, switches and firewalls, are being targeted
  • What trends that started years ago are still going strong
  • 10 key insights to help organizations deal with disruptive attacks
Get Whitepaper

Ransomware Response Strategies

Ransomware can bring your business to a halt and cause significant financial damage. This type of malware encrypts your critical data, file servers, or system files. The attackers then refuse to release the encryption, or they threaten to go public with your data unless you meet the ransom demands.

In such situations, your choices will be limited. There is no single solution to ransomware, and no clear guidance on post-infection best practices.

The Ransomware Response Strategies white paper explains:

  • What types of ransomware are currently in use and the damage they can cause
  • Why and how to determine the infection path to mount a long-term defense
  • How to identify and build strong security solutions for web and email that can protect you from ransomware 
Get Whitepaper

Reduce Audit Risk and Lower Costs with Data Center Discovery

To fulfill the strategic role expected of IT in the modern digital enterprise, it’s essential to take a holistic approach to asset management with full visibility into dependencies.

By applying discovery and dependency automation at scale to gain complete information into assets, configurations, and dependencies, IT can:

  • Respond to audits more quickly and accurately
  • Eliminate waste in the software budget
  • Make better decisions about data center consolidation and the cloud

Get Whitepaper

4 Ways to Empower your IT Service Management

Find out how IT Service Management (ITSM) can bring order and relief to an overwhelmed IT department, giving the team more time to focus on big-picture initiatives and help drive the whole business faster.

In this eBook, Salesforce shares 4 elements of ITSM that are critical to IT empowerment, including:

  • Self-service options
  • Low–friction communication
  • Reporting and dashboards
  • A future-ready platform
Get Whitepaper

IT Service Brokering for Dummies

Your business users want an easy to access, intuitive way to use the services IT provides. Discover how an IT service broker model can help you deliver a great experience for users and increase productivity for your business.

This ebook presents everything you need to know, including:

  • Trends and concepts redefining today’s IT
  • What to look for in an enterprise IT service brokering solution
  • Next-level methods for reducing costs and increasing productivity

Get Whitepaper

Hosted VoIP: What does that mean to my business?

Learn how with Hosted VoIP you can get the benefits of outsourcing the management of your phone system, which means you’ll need fewer resident experts to handle things. What’s more, Hosted VoIP expands communications and productivity by providing a range of advanced features and functionality. And it does so without straining your budget.

This guide provides answers and useful insights on how Hosted VoIP can impact business communications immediately––and for years to come––by providing more features and more flexibility, all for significantly lower costs than you might expect.
Get Whitepaper

Hosted VoIP: What does that mean to my business?

Learn how with Hosted VoIP you can get the benefits of outsourcing the management of your phone system, which means you’ll need fewer resident experts to handle things. What’s more, Hosted VoIP expands communications and productivity by providing a range of advanced features and functionality. And it does so without straining your budget.

This guide provides answers and useful insights on how Hosted VoIP can impact business communications immediately––and for years to come––by providing more features and more flexibility, all for significantly lower costs than you might expect.
Get Whitepaper

SAS®: A Comprehensive Platform for Big Data Governance, Data Management and Analytics

With the amount of information in the digital universe doubling every two years, big data governance issues will continue to inflate. This backdrop calls for organizations to ramp up efforts to establish a broad data governance program that formulates, monitors and enforces policies related to big data. Find out how a comprehensive platform from SAS supports multiple facets of big data governance, management and analytics in this white paper by Sunil Soares of Information Asset.
Get Whitepaper

The Future of Model Risk Management for Financial Services Firms

Banks have been using credit scoring models for decades, but since the financial crisis of 2008, regulators have formalized the discipline of model risk management (MRM), driving the need for more rigorous, enterprise-level model information management. Regulators now want to evaluate bank models to access their trustworthiness – not blindly accept the numbers they generate. This paper explores how next-generation MRM is integral to successfully running a financial services business – both for compliance and decision making purposes. Learn why decision makers today are judged not just on outcomes, but on the processes and decision support tools they use to realize them. And see why it’s absolutely critical that your firm be able to manage ever-growing numbers of models – what’s needed to do that effectively.
Get Whitepaper

Discovering the Business Value of Streaming Analytics

Many analytics and BI tools limit your ability to get insight in time to make a critical business decision. Once you detect a pattern, you have to work with a data scientist to choose data sets for more analysis, clean the data of noise, and code a query, all while the data becomes less and less relevant with passing time.

This resource explains streaming analytics and describes how it can enable real-time decision-making based on current evidence. Learn how you can resolve business problems more quickly and make data-driven decisions.
Get Whitepaper

Thirsting for Insight? Quench It With 5 Data Management for Analytics Best Practices

“Unpolluted” data is core to a successful business – particularly one that relies on analytics to survive. But preparing data for analytics is full of challenges. In fact, most data scientists spend 50 to 80 percent of their model development time simply preparing data. SAS adheres to five data management best practices that provide access to all types of raw data and let you cleanse, transform and shape it for any analytic purpose. As a result, you can gain deeper insights, embed that knowledge into models, share new discoveries and automate decision-making processes across your business.
Get Whitepaper