T.E.N. Knowledge Base


ISE® Northeast 2014

Adobe Creative Cloud for enterprise Security Overview > Download Whitepaper
Creative Cloud for enterprise includes the entire collection of Creative Cloud applications plus services and business features for organizations with large deployments that require centralized provisioning and customized deployment of apps and services. Enterprises also receive Enterprise Support and Expert Services. Learn more about the specific capabilities provided to secure data and the user experience for Creative Cloud for enterprise deployments.

Adobe Marketing Cloud Security > Download Whitepaper
At Adobe, the security of your digital experiences is our priority. From our rigorous integration of security into our internal software development process and tools to our cross-functional incident response teams, we strive to be proactive, nimble, and accurate in all aspects of security. What’s more, our collaborative work with partners, researchers, and other industry organizations helps us understand the latest security best practices and trends and continually build security into the products and services we offer. This white paper describes the proactive approach and procedures implemented by Adobe to increase the security of your Adobe Marketing Cloud experience and your data.

Adobe Digital Publishing Suite, Enterprise Edition Security Overview > Download Whitepaper
Learn about the security features like Secure Content that help increase the security of your Adobe Digital Publishing Suite experience and your data included in applications built with Digital Publishing Suite.

Adobe Experience Manager Cloud-Hosted Security Overview > Download Whitepaper
Find out about the array of measures targeted at securing instances of Adobe Experience Manager in four key areas: physical, network, data, and access security.

Adobe Connect Hosted Deployment Security Overview > Download Whitepaper
Explore how the set of security features built into Adobe Connect enable secure meetings, eLearning, and webinars on this secure web conferencing platform.

EMAIL TRUST INDEX > Download Whitepaper
As phishing attacks get more sophisticated and harder to distinguish, consumers should know who’s putting them at risk – where malicious email links are lurking that lead to the installation of malware that can record keystrokes and steal consumer information, from online credentials to actual money. That’s why we publish the Agari TrustIndex™, to show consumers and business alike where consumers are most protected or vulnerable to email attack across industry sectors including Financial Services, E-Commerce, Social Media, Travel, Logistics and Gaming.

Utilizing Security Ratings for Enterprise IT Risk Mitigation  > Download Whitepaper
What do large enterprises need in order to address increasingly dangerous cyber threats? Actionable, objective, and continuous intelligence into security risk across their ecosystems. They need objective metrics to measure risk and benchmark performance as well as detailed information to mitigate known threats. Furthermore, this intelligence must help them recognize risks to internal networks, their partners’ networks, and their industries. BitSight Technologies provides security ratings that measure company and industry security performance and can help CISOs and Chief Risk Officers mitigate risk, streamline security operations, and engage business executives in their cybersecurity strategies.

State of Infections Report Q2 2014  > Download Whitepaper
First, ransomware appeared nearly everywhere, grabbing international headlines and showing vigorous activity. Unlike traditional malware, which conducts its criminal activity in the background, ransomware is essentially a cyber stick-up. The victim is immediately locked out of their computer. Most will not regain control even if they pay the ransom demand. In addition to ransomware run amok, Damballa also observed big swings in infection rates among enterprises large and small. The diversity of data serves as a reminder that organizations of every size must vigilantly defend against advanced threats.

Comprehensive Advanced Threat Defense  > Download Whitepaper
The hot topic in the information security industry these days is “Advanced Threat Defense” (ATD). There are many definitions, and plenty of marketing hype and spin on the topic, but it’s the science – and the art – of defending yourself against sophisticated, persistent adversaries who can get past (or have already gotten past) your security defenses. We like to define advanced threat defense in terms of the adversary rather than the attack technique used to remind ourselves that what we are really up against is a person or, more likely, a group of people who are specifically targeting your organization, and will use whatever attack vectors and techniques necessary to achieve their objectives. This paper describes a comprehensive, network-­‐based approach to Advanced Threat Defense.

A vision for cyber security detection analytics  > Download Whitepaper
Organizations are in the midst of considering how Big Data can assist in their plans to detect advanced cyber adversaries. Many are starting to build Big Data infrastructure and feed it both structured and unstructured data, but few have determined exactly what they will do with the data after they have collected it. This paper outlines the vision of what to do with all this security data; a vision for detecting advanced adversaries through pairing Big Data and data science.

Get the most from the move to a next-generation firewall  > Download Whitepaper
If application controls and intrusion prevention systems (IPS) are table stakes in the next-generation firewall (NGFW) competition, what else do you put on your requirements list? This white paper will help network and cybersecurity teams understand the things they can and should demand from NGFWs.

Advanced Persistant Threats  > Download Whitepaper
These days having an identity and access management solution is a must. Businesses cannot operate without knowing who their employees are and granting appropriate access. However, this begs the question: are you sure the user credentials used to access your systems are being used by the correct individual?

Leveraging Threat Intelligence in Security Monitoring  > Download Whitepaper
This paper will go into depth on how to update your security monitoring process to integrate malware analysis and threat intelligence. We will be using parts of our Network Security Operations Quant5 and Malware Analysis Quant6 process maps to present an updated Threat Intelligence + Security Monitoring Process Model which brings the two ideas together.

CONTINUOUS MONITORING: A New Approach to Proactively Protecting Your Global Perimeter  > Download Whitepaper
This guide describes the need for continuous monitoring and offers a blueprint for creating a continuous security practice. As a result, continuous monitoring will give your organization the most comprehensive view of its global perimeter, and empower you to proactively identify and address potential threats enabled by vulnerabilities in software or weak system configurations.

A New Security Reality: The Secure Breach  > Download Whitepaper
According to the 2014 Verizon Data Breach Investigations Report there were 63,437 reported security incidents and 1,367 confirmed data breaches in 2013. This total represents the highest amount of data breaches over the entire ten-year range of this study. According to Forrester Research, security spending in 2013 represented 17.5% of total IT spending.

Preparing for Future Attacks  > Download Whitepaper
The Stuxnet worm is believed to have significantly affected Iranian nuclear processing, and was widely considered to be the first operational cyber weapon. Shamoon was able to compromise and incapacitate 30,000 work stations within an oil producing organization. Another targeted malware attack against a public corporation resulted in the company declaring a $66 million loss relating to the attack. Such attacks may not necessarily be successful, but when attackers do find their way inside an organization’s systems, a swift, well-prepared response can quickly minimize damage and restore systems before significant harm can be caused. In order to prepare such a response, organizations must understand how attacks can progress, develop a counteractive strategy, decide who will carry out which actions and then practice and refine the plan.

Continuous Monitoring for the New IT Landscape  > Download Whitepaper
Recent breaches have targeted a fatal flaw in the way organizations have approached security over the last two decades. While the focus has been on investing in multiple preventive security technologies—centralized authentication, desktop virus prevention, automated patching, next generation firewalls, sandboxes for zero-day malware, and security event management—adversaries have taken advantage of blind spots that have widened as the IT landscape has evolved. The recent breaches occurred not because of unknown weaknesses in the defensive technologies. They occurred because of gaps in coverage, due to the fact that the defensive technologies were not aligned with any security policy or business practices.

CISOs Misunderstood and Underappreciated by Their C-Level Peers  > Download Whitepaper
C-level executives regard the role of CISO primarily as a target for fingerpointing in the event of a data breach, and have little faith that individuals in the role could hold other leadership positions. Confusion about the role indicates that organizations must do a better job of understanding and elevating a position that is vital in the fight against cybercrime.

Addressing the Scalability Challenge with Cloud-Based Application Security  > Download Whitepaper
Every enterprise is now a technology company. Business trends driven by mobile, cloud, social media and Big Data technologies are dramatically changing the way global organizations deliver innovation. Time-to-market is as important as ever, exposing some information security approaches as woefully deficient. Many enterprises are not adequately protecting the software that runs their business. Ad-hoc application security programs and regimens have led to inconsistent policies across organizational business units and software development teams. Traditional on premise solutions have proven difficult for IT staff to correctly configure. The result: enterprises end up with a fragmented approach to application-layer security. Millions are spent on one-off or manual testing and tools, but they end up covering only a fraction of the organization’s global application threat surface.

David Corlette

David Corlette
Product Manager

When Tinfoil Hats Aren't Enough: Effective Defenses Against Advanced Persistent Threats (APTs) > Download Presentation
You probably know about the threat posed by APTs. You also may know that most experts will tell you that there are no cost-effective ways to completely prevent a determined attacker from getting into your systems. So what to do? Since returning to an agrarian society is likely not a viable option, this presentation will cover common APT techniques and ways to detect those techniques in action and rapidly react. We'll talk about how to leverage the Identity-powered enterprise to improve the accuracy and effectiveness of prevention, detection, and response.

Jim Hong

Jim Hong
Director, SPLC (Secure Product Lifecycle) Program Management

Maintaining a Security Organization That Can Adapt to Change  > Download Presentation
According to Forrester Research, 51% of organizations say it’s a challenge or major challenge to hire and keep security staff with the right skills. This becomes especially challenging in a constantly changing organization managing acquisitions, changing business objectives, and rapid growth. While investing in security technology is important to stay ahead of threats, failure to invest properly in your people can introduce systemic and cultural risk that can be more challenging to manage than technical threats. This presentation will discuss the keys to not only getting the best people, but keeping them. Mr. Lenoe will share Adobe’s experiences in managing this very challenging problem along with what we have learned as we have built up our security organization to adapt to our cloud-focused future.

Wayne Proctor

Wayne Proctor
Director, Information Security and IT Risk Management
ISE® Southeast Executive Award Finalist 2005


Using Security Intelligence for a Competitive Advantage  > Read Summary
Harnessing the power of analytics is nothing new for today’s enterprise IT organizations. The same practices can be put to work for security — analyzing vast quantities of data to find the types of clues and irregularities that could signal an attack. This approach to security analytics is becoming a central aspect of enterprise security as organizations learn they must extend far beyond the traditional perimeter approach to gain complete visibility across the IT infrastructure in order to detect and disrupt attacks. Join the conversation to learn more about this shifting approach to security and why mining Big Data for clues to enable enterprise security action can give you a competitive advantage.

Matthew McKeever
VP of Security and Compliance
Reed Elsevier


Secrets to Achieving End-to-End Email Security  > Read Summary
Securing your infrastructure is essential in protecting your customers, but malicious attacks can affect users without even entering your network. The Anti-Phishing Working Group reported 72,758 phishing attacks targeting more than 700 institutions worldwide during the first half of 2013 alone. As Verizon's Data Breach Report shows, 95% of all data breaches begin with a phishing email — evidence that comprehensive ecosystem visibility, email intelligence, and real-time alerting and reporting are imperative to thwarting these attacks. Join our conversation to take a deep dive into advanced email security methodology and learn best practices to achieving end-to-end email security in order to protect your customers and enable business.


Stacey Halota
Vice President, Information Security and Privacy
Graham Holdings
ISE® Mid-Atlantic Commercial Executive Award Winner 2009

The Growing Complexity of IT Security: How Do We Manage?  > Read Summary
IT Security is undoubtedly a cat and mouse game. As technology threats grow in complexity, security leaders work tirelessly to develop new methods for identifying and thwarting attacks. But the fact remains— there is no such thing as absolute security. In the future, IT-dependent societies must be capable of withstanding an attack, or surviving an attack and recovering, without the descent into chaos. Join us to take a deep dive into the concept of developing and maintaining resilience as a central focus for your contemporary security strategy.

Larry Wilson

Larry Wilson
Chief Information Security Officer
University of Massachusetts

CISO as a Salesman: Win Support for Your Key Initiatives  > Read Summary
Major information security initiatives can be costly. InfoSec executives too often find that their organization’s leadership may not see the initial financial investment in security as business critical…at least not until data or infrastructure is compromised. A CISO must lead efforts to build consensus for security as a priority in the enterprise by selling the board and c-suite on the benefits of a proactive approach. Join our conversation to learn how to build your business plan, engage the different stakeholders and influence key decision makers — who may not have a technology or security background — in order to gain support and approval for the investment and implementation of vital security initiatives.