整理您的安全数据:网络安全作为数据管理问题.pdf

编号:139157 PDF 19页 2.76MB 下载积分:VIP专享
下载报告请您先登录!

整理您的安全数据:网络安全作为数据管理问题.pdf

1、Wrangling Your Security Data:Cybersecurity As A Data Management ProblemJacolon WalkerCo-founder,CTO,MonadDatabricks2023Today,the average Fortune 500 enterprise manages 40+cybersecurity vendorsEach tool has its own format for logs,outputs,and databasesCommon DISPARATE DATA FORMATS-Examples of column

2、headers that are formatted different ways by different data sources-WIZ /TENABLE-IP Addresses-Domain names-Vulnerability typeThe sheer volume and complexity of security data prevents enterprises from meaningfully understanding their security postureCybersecurity is a data management problemThe singl

3、e highest-leverage improvement to enterprise security efficiency and speed:Make disparate security data sources queryable with a standard schemaIP Address:Domain name:Vulnerability type:Wiz:ip_addressescloud_native_jsonName-(cve)AWS:instance_metadatainstance_metadataN/ATenable:ipv4fqdnscve/descripti

4、on/pluginWhich models are used today?Data modelRAW-JSON structureData Model-CustomBuilt-in(CSV models)1_DAIS_Title_SlideNow we join them!Phase 1:DiscoveryJoin vulnerability data with asset data:-See where vulnerabilities exist;are they actually exposed?Phase 2:ContextJoin above with threat intellige

5、nce data:-See which vulnerabilities are actively being targeted in the real worldPhase 3:Threat detection-Identify and prioritize assets with vulns that are being targetedHow do we identify which vulnerabilities are worth fixing?A mega-joinCombine data sources to create clarityPhase 1:DiscoveryJoin

6、vulnerability data with asset data:Phase 1:DiscoveryJoin vulnerability data with asset data:See which vulnerabilities are actively being targeted in the real worldPhase 2:ContextJoin vulns+assets with threat intelligence data:Identify and p

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(整理您的安全数据:网络安全作为数据管理问题.pdf)为本站 (2200) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
客服
商务合作
小程序
服务号
折叠