NIS2 – Why and What
Itay Mesholam
Field CTO of EMEA Cybersecurity Services
Copyright © Dell Inc. All Rights Reserved.
1
Internal Use - Confidential
ENISA and the NIS2 Directive
Directive (EU) 2022/2555 �(known as NIS2) is amending Regulation (EU) No 910/2014 and Directive (EU) 2018/1972, and is repealing Directive (EU) 2016/1148
The NIS2 directive is intended to be much more dissuasive than its predecessor
����ENISA �European Agency for Cybersecurity
Copyright © Dell Inc. All Rights Reserved.
2
Internal Use - Confidential
Background
NIS2 supersedes the first NIS (Network and Information Security) Directive, adopted in July 2016.
Member States have until Autumn / Fall 2024 to become compliant.
Copyright © Dell Inc. All Rights Reserved.
3
Internal Use - Confidential
Content Overview
Scope
Fines
Measures to be implemented
Competences of national authorities
Copyright © Dell Inc. All Rights Reserved.
4
Internal Use - Confidential
Who Does NIS2 Apply To?
Indicative list of sectors affected by NIS2
SECTORS
Essential Entities (EE)
EMPLOYEES�~250
ANNUAL TURNOVER�€50M
BALANCE SHEET�€43M
Energy
Transport
Finance
Public Administration
Health
Space
Water supply (drinking & wastewater)
Digital Infrastructure
SECTORS
Important Entities (IE)
EMPLOYEES�~50
ANNUAL TURNOVER�€10M
BALANCE SHEET�€10M
Postal Services
Waste Management
Chemicals
Research
Foods
Manufacturing
Digital Providers
Size threshold varies by sector. �Figures are a guideline based on Articles 3.1 a & 3.2 of the NIS2 Regulation.
Copyright © Dell Inc. All Rights Reserved.
5
Internal Use - Confidential
Operator duties
Key articles to know
Cybersecurity Measures
Standards
Reporting
Registration
Copyright © Dell Inc. All Rights Reserved.
6
Internal Use - Confidential
Technical and organizational measures to manage risks
Business continuity and crisis management
Risk analysis and information system security policies
Incident handling (prevention, detection, and response to and recovery from incidents
Supply chain security including and information security-related aspects concerning acquisition, the relationships, development and including handling and disclosure
Security in network and information systems acquisition, development and maintenance including vulnerability handling and discloser
Policies and procedures (testing and auditing) to assess the effectiveness of cybersecurity risk management measures
Copyright © Dell Inc. All Rights Reserved.
7
Internal Use - Confidential
Reporting Obligations
Notify without undue delay and in any event within 24 hours after having become aware of the incident
Ensure that the exchange of information takes place within trusted communities of essential and important entities
Copyright © Dell Inc. All Rights Reserved.
8
Internal Use - Confidential
Central Registry��Entities are required to submit information to the competent authorities. The Member States single points of contact shall forward the information to ENISA. Based on the information received, ENISA shall create and maintain a registry for the entities. Upon request of Member States, ENISA shall enable access of relevant competent authorities to the registry.�
Information sharing arrangements
Copyright © Dell Inc. All Rights Reserved.
9
Internal Use - Confidential
Article 21 of the directive
This covers the cybersecurity risk management measures and lists the following (this is where to start!)
�10 areas as �the minimum recommendation -�information sharing arrangements
Copyright © Dell Inc. All Rights Reserved.
10
Internal Use - Confidential
Dell Cybersecurity and Resiliency Services
Dell’s Resiliency & Security Services help organizations to prepare for NIS2
Chapter II, Coordinated cybersecurity regulatory frameworks
Chapter III, Cooperation
Chapter IV, Cybersecurity risk management and reporting obligations.
Cybersecurity
Assessment
Penetration Testing
and Breach Attack Simulation (MDR)
Resiliency Program Management, Business Impact Assessment, Crisis & Incident Response
Application
Dependency & Business Assessments/Zero Trust
Vulnerability Assessment (MDR)
Cybersecurity�Advisory
Managed Detection�& Response (MDR)
Dell Education�Services
Dell Data Protection Solutions, Ransomware, Cyber Recovery
Zero Trust Advisory
Maturity / Capability Assessments
Copyright © Dell Inc. All Rights Reserved.
11
Internal Use - Confidential
NIS2
Strengthening the role of the CISO/CIO
Copyright © Dell Inc. All Rights Reserved.
12
Internal Use - Confidential
How to start?
Copyright © Dell Inc. All Rights Reserved.
13
Internal Use - Confidential
10 Key cybersecurity measures mandated by the NIS2 directive
Risk Analysis and information security policies ex. ISO27001
Incident handling (prevention, detection, and response to incidents)
Business continuity and crisis management
Supply chain security
Security in network and information systems acquisition, development and maintenance, including vulnerability handling and disclosure
Policies and procedures (testing and auditing) to assess the effectiveness of cybersecurity risk management measures
Basic cyber hygiene practices and cybersecurity training
Policies and procedures regarding the use of cryptography and, where appropriate, encryption
Human resources security, access control policies and asset management
The use of multi-factor authentication or continuous authentication solutions, secured voice, video and text communications and secured emergency communication systems within the entity, where appropriate.
1
2
3
4
5
6
7
8
9
10
Copyright © Dell Inc. All Rights Reserved.
14
Internal Use - Confidential
Response and Recovery
Copyright © Dell Inc. All Rights Reserved.
15
Internal Use - Confidential
Response and recovery
Copyright © Dell Inc. All Rights Reserved.
16
Internal Use - Confidential
Resiliency Services Offers
Analyze Program Maturity
Define Business Requirements
Evaluate Alternatives
Service Catalog Definition
Design & Implementation PP4 & PP5
PP1
Program Management & Integration
Resiliency Program Management (RPM)
Advisory PP2 & PP3
Design Deployment Solution (App/Infra)
Conduct Implementation Planning
Optimize PP6
Develop/Update Program Definition
Incremental Improvement
Metrics & Reporting
Resiliency Strategy
Resiliency Service Catalog
Application Dependency Mapping
Business Impact Analysis
IT Continuity Advisory
Resiliency Health Check
Resiliency Detailed Design
Resiliency Continuity Implementation
Test & Implement
Demonstrate Capability
Resiliency Program Refresh
Resiliency Implementation Tech (SDRF, RP, SRM…)
Resiliency Site
Resiliency Process Updates
Resiliency Runbooks/DR Orchestration
Cloud Suitability
Cloud Migration
IT Continuity Exercise
Copyright © Dell Inc. All Rights Reserved.
17
Internal Use - Confidential
RPM – Resiliency Program Management �(IT BC/DR & DR for Ransomware attacks)
Helps with maturity assessment and building on an ICT/IT BC/DR program and capability. �Aligns to ISO22301, which in turn aligns with NIS2/DORA regulations and sustain
IMPROVE (6mths)
Validate readiness and establish recoverability requirements
ENHANCE (12mths)
Foundational infrastructure recoverability
TRANSFORM (18mths)
Alternate site recoverability
Copyright © Dell Inc. All Rights Reserved.
18
Internal Use - Confidential
Crisis and incident management
Copyright © Dell Inc. All Rights Reserved.
19
Internal Use - Confidential
Dell Crisis and Incident Response Services
| IRRS – Incident Recovery Retainer Services | IRR- Incident Response & Recovery |
| Proactive Offer | Reactive Offer |
What ? | Phase 1: 40hrs (one week) assessment of the client's existing disaster recovery plans:
Carried out remotely (on-site possible but additional costs), with delivery of the summary and recommendations at the end of the week. Phase 2: Provision of 120 or 240 hours of IRR in case of an attack (to be used within the year). If the hours are not used during the year, the client can transform them into workshops (type assessment, disaster recovery planning, tabletop exercises...) targeted around cybersecurity. | Customized, tailored offering through which our certified experts, with strong experience, can help our customers to face cyber attacks. We can perform threat identification, eradication, data recovery, data sanitization and infrastructure rebuilding, remotely or onsite. Contact IRR Team on the address: incident.recovery@dell.com or by phone. In less than 2 hours the customer is contacted for a scoping call. A SOW (statement of work), a tailor-made service offer, with an estimate of the profiles and the number of hours of work required, is sent to the client as soon as possible. As soon as the client signs the SOW, we put in place the teams to accompany him urgently (within 6hrs max in remote or TBD if in face-to- face). |
How ? | Standard offer, Flat rate, depending on the package chosen (120 or 240 hours of RRI). | Custom offer, subject to a SOW, Offer under the Technical Assistance format: only the hours consumed will be invoiced. |
Copyright © Dell Inc. All Rights Reserved.
20
Internal Use - Confidential
At a Glance, What is Dell Doing?
Incident Response
Forensics
Help Desk Rapid Standup
Forensics
Firewall/ Network�
AD/Email/Office Restoration
Virtual CISO
Networking
Deployment/ Imaging
Monitoring and
Threat Hunting
Digital Forensics
Encryption Recovery
Data Discovery
Forensic Preservation
Drive Sanitization
and Recovery
Copyright © Dell Inc. All Rights Reserved.
21
Internal Use - Confidential
Copyright © Dell Inc. All Rights Reserved.
22
Internal Use - Confidential
Digital Forensics
Investigations & Response
Copyright © Dell Inc. All Rights Reserved.
22
Internal Use - Confidential
Backup policies and procedures, restoration and recovery procedures and methods�
Copyright © Dell Inc. All Rights Reserved.
23
Internal Use - Confidential
Data Protection Services | OA – RapidRom
Positioning Data Protection Strategic Advisory Services
Descriptions | 4 weeks MVP | 6-8 Weeks MVP Plus | 12 weeks MVP Advanced |
Finalize data protection design based on capacity (size and performance) Multi site 1 Primary and 2 backup replication sites (sites includes each cloud site) | ⬤ | ⬤ | ⬤ |
Conduct DPS Strategic, Architecture / Technical Data & Operations Workshops, Manual Questionnaire and workshops Live Optics Scope dependent on offer level | ⬤ | ⬤ | ⬤ |
C – Cloud or OP – On-Premise or Both | ⬤ | ⬤ | ⬤ |
Most Common Backup technologies or Least Common | ⬤ | ⬤ | ⬤ |
A - Quadrant SWOT & Scorecard, Roadmap, (SWOT Strengths, Weakness, Opportunities & Threats) B - CMM, Capability Maturity Model analysis (1 interview metric, 5-10 interviews , group workshop) Use Dell Data Protection Advisor in the analysis of the current customer DPS environment | ⬤ | ⬤ | ⬤ |
Backup Surfaces also including Cloud (AWS, Azure, GCS) | | ⬤ | ⬤ |
Data Protection Operational model, SLAs, Training, ITSMS/ITIL alignment, Service catalogues / definitions Analysis of Data Protection Processes, Operational procedures, Staffing / Training Programs | | | ⬤ |
Copyright © Dell Inc. All Rights Reserved.
24
Internal Use - Confidential
Ransomware Recovery Solution (Dell CRS - Cyber Recovery Solution)
Copyright © Dell Inc. All Rights Reserved.
25
Internal Use - Confidential
Defining Cyber Recovery
Multiple reports following real world events have indicated that technology alone is simply not enough.
The perception is that this is enough…
Dell Technologies Cyber Recovery Capabilities:
End-to-end Services
Incident Response Plan
Secure Supply Chain
Recovery Focused
Cleanroom technology
No external access
Isolation
Intelligence
Immutability
Isolation
Intelligence
Immutability
Copyright © Dell Inc. All Rights Reserved.
26
Internal Use - Confidential
Three Lines of Defense Model
Risk Management
Line of Defence I
Line of Defence II
Line of Defence III
Dell software
Fully automated
Single solution
Security Operation Centre
Cyber Recovery Vault
Production Backup System
Internal Audit
Operational Management
Copyright © Dell Inc. All Rights Reserved.
27
Internal Use - Confidential
PowerProtect Cyber Recovery
Automate data vaulting and recovery path
Cyber Recovery Vault
Automated operational air gap
Data center
Vault will contain only a subset of
production backup data
Production
Backup
data domain
Data to be cyber protected
1
Sync
Use case driven recovery considerations
2
Copy
5
Recover
3
Lock
4
Analyze
4
Monitoring & Reporting
Minimum Viable Company
Clean Room
Landing Zone
Copyright © Dell Inc. All Rights Reserved.
28
Internal Use - Confidential
Finding Indicators of Compromise in Your Backup
Copyright © Dell Inc. All Rights Reserved.
28
Internal Use - Confidential
Analytics
More than 40 statistics generated from each observation. Statistics include analysis of file entropy, similarity, corruption, mass deletion/creations, and much more.
Repeat
The process repeats and a new observation is created by scanning network or backup data. New observations are compared to previous observations to see how data changes.
Scan
CyberSense scans critical data sources, including unstructured files and databases to create an observation. Data can be located on network file systems, or in backup images.
Analysis
Machine learning algorithms are used to analyze the statistics to indicate if an attack on the data has occurred.
Investigate
Forensic reporting and analysis tools are available after an attack to find corrupted files and diagnose the type of ransomware.
Copyright © Dell Inc. All Rights Reserved.
29
Internal Use - Confidential
CyberSense Optimizes Restore Time
Cyber Recovery Maturity
Time To Recovery
How to optimize MTTR?
Basic Data Protection
Production Immutability
Basic Isolation
Cyber Vault & Analytics
Restart
Room
Time
Copyright © Dell Inc. All Rights Reserved.
30
Internal Use - Confidential
Macro architecture: 1- Getting Data into the Vault
Backup
Software
Backup Software
Inner Vault Isolated / Immutable Automated Enhanced Analytics
Backup Storage
Vital Data Copies
Compute
VMs
Vault Services
Production Backup Storage
Primary Backup
Data Domain
Vital apps Storage
Block / File / Others
Vital Data
Isolation
DR Storage
Block / File / Others
Storage & Backup replication for DR
DR Backup Storage
Automation / low touch management
InfoSec
Reporting & Auditability
Scalability
Vault Management
DT Remote Access
Platform Management
Security Management
Compute VMs
Non-vital Data
Copyright © Dell Inc. All Rights Reserved.
31
Internal Use - Confidential
Macro architecture: 2 - Advanced Analytics
Backup
Software
Backup Software
Automation / low touch management
Enhanced Analytics
Reporting & Auditability
Scalability
Vault Management
DT Remote Access
Platform Management
Security Management
Compute VMs
Inner Vault Isolated / Immutable Automated Enhanced Analytics
Backup Storage
Vital Data Copies
Compute
VMs
Vault Services
Analytics
Production Backup Storage
Primary Backup
Data Domain
Vital apps Storage
Block / File / Others
Vital Data
DR Storage
Block / File / Others
Storage & Backup replication for DR
DR Backup Storage
Non-vital Data
Copyright © Dell Inc. All Rights Reserved.
32
Internal Use - Confidential
Macro architecture: 3.1 – Restore Data from Vault
Production Backup Storage
Primary Backup
Data Domain
Vital apps Storage
Block / File / Others
Backup
Software
Vital Data
DR Storage
Block / File / Others
Storage & Backup replication for DR
DR Backup Storage
Vault Management
DT Remote Access
Platform Management
Security Management
Compute VMs
Non-vital Data
Data
Landing
Zone
FC
iSCSI
IP
Storage
Block / File / Others
Inner Vault Isolated / Immutable Automated Enhanced Analytics
Backup Storage
Vital Data Copies
Compute
VMs
Vault Services
Analytics
Backup / Restore
Data restore
Backup Software
Copyright © Dell Inc. All Rights Reserved.
33
Internal Use - Confidential
Macro architecture: 3.2 – Get Copies from Production
Backup
Software
Backup Software
Production Backup Storage
Primary Backup
Data Domain
Vital Data
DR Storage
Block / File / Others
Storage & Backup replication for DR
DR Backup Storage
Vault Management
DT Remote Access
Platform Management
Security Management
Compute VMs
Non-vital Data
Data
Landing
Zone
FC
iSCSI
IP
Storage
Block / File / Others
Inner Vault Isolated / Immutable Automated Enhanced Analytics
Backup Storage
Vital Data Copies
Compute
VMs
Vault Services
Analytics
Backup / Restore
WORM Replication
Block / File / Others
Data Copies from Production
storage
FC
iSCSI
IP
Vital apps Storage
Block / File / Others
Copyright © Dell Inc. All Rights Reserved.
34
Internal Use - Confidential
Macro architecture: 4 – Data Cleaning
Backup
Software
Backup Software
Production Backup Storage
Primary Backup
Data Domain
Vital Data
Storage & Backup replication for DR
Vault Management
DT Remote Access
Platform Management
Security Management
Compute VMs
Non-vital Data
Data
Landing
Zone
FC
iSCSI
IP
Storage
Block / File / Others
Inner Vault Isolated / Immutable Automated Enhanced Analytics
Backup Storage
Vital Data Copies
Compute
VMs
Vault Services
Analytics
Backup / Restore
WORM Replication
Block / File / Others
Clean Room
Security Tests and extended Forensics / Test and validate before recovery
Test and
Cleaning Tools
Compute
VMs
Compute
BareMetal
FC
iSCSI
IP
CR Testing
Data Cleaning
Arbitrate which version of data to use
DR Storage
Block / File / Others
DR Backup Storage
FC
iSCSI
IP
Vital apps Storage
Block / File / Others
Copyright © Dell Inc. All Rights Reserved.
35
Internal Use - Confidential
Macro architecture: 5 – Service Restart in MVB
Backup
Software
Backup Software
Production Backup Storage
Primary Backup
Data Domain
Vital Data
Storage & Backup replication for DR
Vault Management
DT Remote Access
Platform Management
Security Management
Compute VMs
Non-vital Data
Data
Landing
Zone
FC
iSCSI
IP
Storage
Block / File / Others
Inner Vault Isolated / Immutable Automated Enhanced Analytics
Backup Storage
Vital Data Copies
Compute
VMs
Vault Services
Analytics
Backup / Restore
WORM Replication
Block / File / Others
Clean Room
Security Tests and extended Forensics / Test and validate before recovery
Test and
Cleaning Tools
Compute
VMs
Compute
BareMetal
FC
iSCSI
IP
DR Storage
Block / File / Others
DR Backup Storage
Restart Room Minimum Vital DC Isolated / Rebuilt
Near-ready for production
Network services AD / DNS / NTP / KMS / others |
Vital Apps Rebuilt environments |
Compute VMs |
Compute BareMetal |
Rebuild
Vital apps Storage
Block / File / Others
Restart Minimum Vital Applications
environment is available in the Data
Landing Zone
FC
iSCSI
IP
|
Copyright © Dell Inc. All Rights Reserved.
36
Internal Use - Confidential
Resiliency and Program Management (RPM)
IT BC DR
Ransomware / Cyber Recovery
Data Protection (Backup & Recovery)
Mature programs incorporate secure technologies with people and processes to increase conventional resilience & cyber resilience
Identify
Respond
Recover
Protect
Detect
Governance
Copyright © Dell Inc. All Rights Reserved.
37
Internal Use - Confidential
Important business processes inform critical data
To recover important business processes, a business needs to protect the applications and materials that support each process.
Below details how data will influence the availability and recovery of a process.
Business services and processes run on applications.
To maintain key services and processes, businesses need to protect critical application data.
Important applications are built on key infrastructure materials like Active Directories or DNS. To recover applications and make them available, Critical Materials need to be protected in the vault alongside critical applications.
Critical Materials
Active Directories: AD authenticates and authorizes all users and computers in a Windows domain type network—assigning and enforcing security policies for all computers and installing or updating software.
Domain Name System or DNS: is a distributed directory that resolves human-readable hostnames, such as www.dyn.com, into machine-readable IP addresses like 50.16.
Important Business Services (IBS)
Defines Minimum Viable Company (MVC)
Business Critical Applications and Data
ERP or enterprise resource planning system: process management software that manages and integrates a company’s financials, supply chain, operations, reporting, manufacturing, and human resource activities.
CRM of Customer Relationship Management or CRM System: System that manages company relationships
Copyright © Dell Inc. All Rights Reserved.
38
Internal Use - Confidential
What to Protect in a Cyber Vault
Best practice guidance to select your most important data and applications to protect
Authentication, Identity & Security
Networking
Storage
Host and Build Tools
Intellectual Property
Supporting infrastructure
Documentation
Applications
Copyright © Dell Inc. All Rights Reserved.
39
Internal Use - Confidential
Strategy and Design
Advisory Services deliver proven methodologies, collaborative approaches and�industry best practices to help you accelerate security initiatives and become more resilient
Create a roadmap to drive program maturity and support your organization cross-functionally
Speed solution design through optimizing architecture
Build consensus between key stakeholders
Identify data and applications to protect in the cyber recovery vault
Tie agile and incremental activities to the bigger picture
Copyright © Dell Inc. All Rights Reserved.
40
Internal Use - Confidential
Building a runbook tailored for business recovery
Cyber Recovery Solution Runbook
Table of Contents:
Cyber Recovery Vault Runbook overview ………………………………....4 Section 1: Plan Activation and Criteria ……………………………………..8 Section 2: Perform Forensics ……………………………………………....12 Section 3: Invoke Cyber Recovery Plan …………………………………..14 Section 4: Prepare for Recovery/ Restore Operations …………………..16 Section 5: Recovery Procedures……………………………………………17 Section 6: Backup Recovery………………………………………………...20 Section 7: Event Recording Log…………………………………………….24
<Customer Name>
CR Vault Recovery Runbook
CONFIDENTIAL
Restore
Restore data from known Point in Time
Repair
Restore data and apply known fixes
Rebuild
Assume nothing, rebuild new environment, restore transactional configs and data
Critical Rebuild
Materials
OS Images
Applications
Business
Processes
Gather recovery requirements
What How
Create tailored documentation
Copyright © Dell Inc. All Rights Reserved.
41
Internal Use - Confidential
Large Telecom in EMEA
Business needs
Expected business results
NEXT Steps
Resiliency AIOPs to integrate into the reporting service and operations plane
Solutions at a glance
alerting, reporting wrap
Taking steps to Orchestrate & Automate recovery their core from Disaster & Cyber Ransomware events
Business Resiliency and Cyber Recovery | Industry: Telco | Country: EMEA / Global
Copyright © Dell Inc. All Rights Reserved.
42
Internal Use - Confidential
Ransomware Readiness Assessment
Gain broad visibility of readiness against an attack with a comprehensive assessment and recommendations
Assess your tools, technology and processes to identify, protect, detect, respond and recover from ransomware attacks
Receive a risk maturity profile and actionable insights on weaknesses in security controls
Gain technical recommendations to enhance your security posture and how to mature your readiness for a ransomware attack
Alignment to Security frameworks: NIST CSF, NISTIR 8374 Ransomware Profile, Mitre ATT&CK
MATURITY PROFILE CATEGORIZED BETWEEN BASIC, INTERMEDIATE AND ADVANCED CONTROLS
Assess Readiness
Actionable Insights
Enhance Maturity
Storage
Systems
Backup +
Restore
Remote
Access
Risk
Assessment
Monitoring
Response
Plan
Copyright © Dell Inc. All Rights Reserved.
43
Internal Use - Confidential
Conduct regular security tests and audits
Copyright © Dell Inc. All Rights Reserved.
44
Internal Use - Confidential
Conduct regular security tests and audits
Copyright © Dell Inc. All Rights Reserved.
45
Internal Use - Confidential
Attack simulation services�
In today's dynamic environment, the boundaries of network security encompass cloud infrastructure, Bring Your Own Device (BYOD) policies, and remote work arrangements.
This expansive and diverse attack surface provides ample opportunities for rapidly evolving and persistent adversaries to exploit vulnerabilities.
Vulnerability
Assessment
Internal
External
Penetration testing
Internal pen-test |
External pen-test |
Wi-Fi Network pen-test |
Phishing simulation |
Ransomware simulation |
Application Security Testing
Web Application security assessment |
Web Service/ API Assessment |
Mobile Application security Assessment |
Goal Based Testing
Red Team
Purple Team
Continuous
Monitoring
Breach and Attack Simulation
OFFENSIVE SERVICE STACK
OSINT
Report
Recommendations
Remediation Support
Optimized Operations
Area
Service
Deliverables
Expected Outcome
Copyright © Dell Inc. All Rights Reserved.
46
Internal Use - Confidential
Conclusion
Copyright © Dell Inc. All Rights Reserved.
47
Internal Use - Confidential
Reference Architecture NIS2.0
Business Mission
Organizational Risk MGMT
Financial Risk
Vendor 3rd party risk
Legal
Business Input
ICT Risk Framework Development
Governance
Risk Mgmt
Data Privacy
Regulatory & Compliance | | Strategy | | Education & Awareness | |
| Security Leadership | ||||
Threat
Intel
Vulnerability
Management
Incident Response
Data Classification
Application Dependency
BC\DR
Asset Management
Cyber Resilience
Security Operations
Users
Devices
Network
Applications
Data
Automation Visibility
Edge
On Prem
Cloud
Tabletop
BAS
Pen Test
Advanced Threat Hunting Monitor
KPI & Monitoring
Architecture
Validation & Continuous Improvement
Security leadership
Copyright © Dell Inc. All Rights Reserved.
48
Internal Use - Confidential
End logo slide
Copyright © Dell Inc. All Rights Reserved.
49
Internal Use - Confidential