Time
2 hours 13 minutes
Difficulty
Beginner
CEU/CPE
2

Video Transcription

00:07
Welcome to the Palo Alto Networks. Cyber Security Academy, Secure Business Systems Administration Cyberattack Lifecycle Mitigation Presentation.
00:20
Cyber Attack mitigation is the act of reducing the severity of an attack.
00:25
Effective attack mitigation requires a thorough understanding of the vulnerabilities that exist within the business units. Assets and resource is
00:34
some of the common risk mitigation tasks. Administrators would routinely perform our systems patching and updating firewalls and security software monitoring, network analysis and reporting and communications.
00:50
As risk management is one of the fundamental tenets of any security model. It goes without saying that administrators need to define comprehensive risk mitigation plans.
01:00
Once an asset is defined and its vulnerabilities are assessed, a threat analysis of the asset will need to its risk assessment.
01:08
That risk assessment will then provide the information upon which a risk mitigation plan can be defined.
01:15
Risk mitigation plans should also be regularly evaluated.
01:21
New asset deployments and system updates should trigger a risk on it and potential changes to the risk mitigation plan.
01:30
Risk management is approached in several ways.
01:34
Risk assumption is the most common approach. Where administrators have responsibility for complete risk mitigation and controls.
01:44
The risk avoidance approach is often a business level. Decision
01:48
avoidance is acceptable where the likelihood of an exploit is deemed to be very glow or the asset valuation is less than the cost of its security protection measures.
02:00
Risk limitation can also be a business level decision. It can be determined by an inherent condition of a resource. Sometimes risk limitation is the best mitigation we can have. Accepting limited risk sometimes may be the only business level decision that we can make.
02:16
Risk Transference moves the asset loss compensation model to another party, such as an insurance coverage plan. In some instances, asset replacement is the most cost effective mitigation strategy.
02:31
Advanced Network and Firewall analytics can be used to determine traffic classification, which can then be ineffective. Risk mitigation tools.
02:42
Network segmentation rules can also be defined via classifications. An analytics
02:46
by segmentation weaken significantly reduce the risk posture of the particular structure of application services.
02:55
Overall, risk mitigation is best achieved through risk and exploit prevention. Yet additional risks are always emerging as users and endpoints participate Maurin mawr in inter networking services. One solution is of the presence of an intelligent platform that utilizes machine warning
03:13
and securely adjust to workplace changes in demands.
03:17
Palo Alto Networks, Traps and Cortex X ER services provides such enterprise level threat awareness and risk mitigation.
03:28
And as the everyday work space expands to include cloud based services that are accessed via a variety of endpoint products, risk mitigation can be significantly enhanced by deploying a centralized, intelligent security management component.
03:45
Mind meld from Pamela Auto Networks is designed to compile and integrate the data derived from traffic and endpoint metrics and deliver that into prevention based security controls that effectively diminish the number of security events that administrators need to address.
04:02
Magnifier is another tool from Paolo Alto Networks that applies machine warning to rich network and point and cloud data.
04:12
Magnifier can precisely detect and prevent targeted attacks, insider abuse and endpoint compromise.
04:19
Magnifier delivers powerful behavior based protection. It augments the security operating platform and significantly can help stop attacks across the attack. Lifecycle

Up Next