Architektura bezpieczeństwa dla otwartych zintegrowanych systemów administracji publicznej Robert Michalski, Security Tiger Team, Central & Eastern Europe robert.michalski@pl.ibm.com
Agenda 1 2 3 Threats on a smarter planet Towards security intelligence How IBM can help
The planet is getting more instrumented, interconnected, intelligent Smart Supply Chains Smart Countries INSTRUMENTED Smart Oil Field Technologies 3 Smart Regions Smart Retail Smart Water Management INTERCONNECTED Smart Healthcare Smart Traffic Systems Smart Weather Smart Energy Grids INTELLIGENT Smart Cities Smart Food Systems
The impact on public safety is real and growing External threats Sharp rise in external attacks from non-traditional sources Internal threats Ongoing risk of careless and malicious insider behavior Compliance Growing need to address an increasing number of mandates Cyber attacks Organized crime Corporate espionage State-sponsored attacks Social engineering Administrative mistakes Careless inside behavior Internal breaches Disgruntled employee actions Mix of private / corporate data National regulations Industry standards Local mandates Mobility Cloud / Virtualization Social Business Business Intelligence 4
Threats affect every enterprise, every industry, every region Internal abuse of key sensitive information Complexity of malware, ability to slowly leak data and affect critical business processes External data breach of third party data and theft of customer information Wikileaks Unauthorized release of classified records Stuxnet Targeted changes to process controllers refining uranium Epsilon Theft of customer data affected more than 100 companies IMPACT Close to $100M for the U.S. Army alone; damaged foreign relations worldwide Impact Degraded ability to safely process and control highly volatile materials Impact Up to $4 billion in costs for initial clean-up and longer term litigation risks 5
Making security a top concern, from the boardroom down Business results Brand image Supply chain Legal exposure Impact of hacktivism Audit risk Sony estimates potential $1B long term impact $171M / 100 customers HSBC data breach discloses 24K private banking customers Epsilon breach impacts 100 national brands TJX estimates $150M class action settlement in release of credit / debit card info Lulzsec 50-day hack-at-will spree impacts Nintendo, CIA, PBS, UK NHS, UK SOCA, Sony Zurich Insurance fined $3.8M for the loss and exposure of 46K customer records Can this happen to us? 6
Agenda 1 Threats on a smarter planet 2 Towards security intelligence 3 How we can help
Increased threats and compliance requirements require more automated and proactive approaches to security Organizations employ perimeter protection, which regulates access and feeds manual reporting Au utomated Manual Reactive Proactive Organizations use predictive and automated security analytics Security is layered into the IT fabric and business operations 8
And require a layered approach to managing physical, technology and human assets Security Domains Today Tomorrow: Security Intelligence People Data Manage identities per application Deploy access control and encryption Security Gap Employ role-based dashboard and privileged user management Monitor usage and control leakage Applications Scan for vulnerabilities Build securely from day one Infrastructure Block unwanted network access and viruses Execute real-time advanced threat detection and forensics Apply advanced correlation and deep analytics Reactive Proactive 9
What does it meant to get smart Use analytics to proactively highlight risks and identify, monitor and address threats Hello People Data Applications Infrastructure Governance, risk and compliance Advanced correlation and deep analytics Optimized Role based analytics Identity governance Privileged user controls Data flow analytics Data governance Secure application development Fraud detection Advanced network monitoring / forensics Secure systems Proficient Identity management Strong authentication Activity monitoring Data loss prevention Application firewall Source code scanning Asset management Endpoint / network security management Basic Passwords and user identities Encryption Access control Vulnerability scanning Perimeter security Anti-virus 10
Agenda 1 Threats on a smarter planet 2 Towards security intelligence 3 How we can help
We manage security for thousands of customers across the world, giving us a unique and current picture of threats and attacks 9 Security Operations Centers 9 Security Research Centers 11 Security Solution Development Centers 3 Institutes for Advanced Security (IAS) 133 Monitored Countries IAS Americas IAS Europe 3,700+ clients 9+ billion events per day IAS Asia Pacific IBM has unmatched global and local presence and expertise to help you manage the cost and complexity of security 12
IBM is committed to lead in the security marketplace The only vendor in the market with end-to-end coverage of the security foundation 15,000+ researchers, developers, and SMEs on security initiatives 3,000+ security and risk management patents 200+ security customer references and 50+ published case studies 40+ years of proven success securing the zseries environment 600+ security certified employees (CISSP,CISM,CISA,..) Security Acquisitions: DASCOM 13
IBM Security Solutions reach Professional Services Managed Services Products Cloud Delivered New Offerings GRC Security Governance, Risk and Compliance Identity & Access Management Data Security E-mail Security Identity Management Data Loss Prevention Encryption & Key Lifecycle Management Database Monitoring & Protection Security Information and Event Management (SIEM) & Log Management Access Management Data Entitlement Management Messaging Security Data Masking Application Security Application Vulnerability Scanning Web Application Firewall Web / URL Filtering Access & Entitlement Management SOA Security Infrastructure Security Vulnerability Assessment Virtual System Security Endpoint Protection Threat Analysis Security Event Management Managed Mobility Svcs Intrusion Prevention System Firewall, IDS/IPS MFS Management Mainframe Security Audit, Admin & Compliance Security Configuration & Patch Management Physical Security 14
We invest heavily in security research The mission of the IBM X-Force research and development team is to: Collaborate with world class security researchers from IBM on a wide range of advanced security topics: cyber security, cloud security, mobile security, security analytics, Understand the changing threat landscape by leveraging IBM's security intelligence developed from our broad monitoring and deep analysis research 10B analyzed Web pages & images 150M intrusion attempts daily 40M spam & phishing attacks 46K documented vulnerabilities Millions of unique malware samples 15
There is plenty of information available about IBM security solutions IBM Security Framework Business View Security Domains Issues & Drivers Foundational Security Mgmt Services Technical View Standards & principles IBM Security Blueprint Common Security Infrastructure features IBM Security Solutions Solution Architecture View Platforms Components Configurations Technologies and Practices Describes security issues from a business perspective. Describes a product agnostic view of security, based on client experience and common principles Catalogs of integrated products, services and solutions Client Briefings White Papers Guidance, Consulting RedBooks, RedGuides Solution Architectures Product Documentation 16
Trusted Advisor Security Company Solution Provider The Company Helping customers build smarter cities, grids, healthcare systems and more. A leading provider of security software and services across all market segments. A leading provider of smart software and hardware solutions around the world. systems and more. market segments. around the world. 400,000 employees across 130 countries with private data to protect and secure. IBM Security Solutions 17
Dziękuję Gracias Spanish Traditional Chinese Polish Thai Merci French Russian Obrigado Brazilian Portuguese Danke German Arabic Tack Swedish Simplified Chinese Japanese Grazie Italian