IBM Future of Work Forum

Similar documents
Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Securing Your Cloud Introduction Presentation

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security

May the (IBM) X-Force Be With You

Go mobile. Stay in control.

C1: Define Security Requirements

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

How to Secure Your Cloud with...a Cloud?

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

IBM Security Network Protection Solutions

Building a Resilient Security Posture for Effective Breach Prevention

Passwords Are Dead. Long Live Multi-Factor Authentication. Chris Webber, Security Strategist

Weak Spots Enterprise Mobility Management. Dr. Johannes Hoffmann

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

AKAMAI CLOUD SECURITY SOLUTIONS

RHM Presentation. Maas 360 Mobile device management

Mobile Malfeasance. Exploring Dangerous Mobile Code. Jason Haddix, Director of Penetration Testing

Cloud Customer Architecture for Securing Workloads on Cloud Services

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

Securing Digital Transformation

IBM Internet Security Systems Proventia Management SiteProtector

IBM Security Access Manager

Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER

Aligning with HIPAA mandates in healthcare

Securing Your Most Sensitive Data

Spotlight Report. Information Security. Presented by. Group Partner

Detect Fraud & Financial Crime

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Cyber Resilience. Think18. Felicity March IBM Corporation

align security instill confidence

Modern Database Architectures Demand Modern Data Security Measures

Students should have an understanding and a working knowledge in the following topics, or attend these courses as a pre-requisite:

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Students should have an understanding and a working knowledge in the following topics, or attend these courses as a pre-requisite:

Copyright

"Charting the Course to Your Success!" Securing.Net Web Applications Lifecycle Course Summary

IBM services and technology solutions for supporting GDPR program

locuz.com SOC Services

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

IoT & SCADA Cyber Security Services

Securing Office 365 with SecureCloud

Notice on Names and Logos Used in This Presentation

MaaS360 Secure Productivity Suite

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

What matters in Cyber Security

Secure & Unified Identity

Zero Trust in Healthcare Centrify Corporations. All Rights Reserved.

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

SECURITY SERVICES SECURITY

Next Generation Privilege Identity Management

Security Readiness Assessment

Identity Management as a Service

OWASP Top 10 The Ten Most Critical Web Application Security Risks

Mitigating Security Breaches in Retail Applications WHITE PAPER

Managed Application Security trends and best practices in application security

MITIGATE CYBER ATTACK RISK

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

WHITEPAPER. How to secure your Post-perimeter world

McAfee MVISION Mobile epo Extension Product Guide

CLEARPASS EXCHANGE. Open third party integration for endpoint controls, policy and threat prevention SOLUTION OVERVIEW MAKE BETTER-INFORMED DECISIONS

DIGITAL TRUST Making digital work by making digital secure

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

with Advanced Protection

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Bank Infrastructure - Video - 1

Threat Modeling for System Builders and System Breakers!! Dan Copyright 2014 Denim Group - All Rights Reserved

Best Practices for Augmenting IDaaS in a Cloud IAM Architecture PAM DINGLE, PING IDENTITY OFFICE OF THE CTO

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Mapping BeyondTrust Solutions to

Consolidated Edition. 5th Annual State of Application Security Report Perception vs. Reality

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

BETTER Mobile Threat Defense (BMTD)

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

RiskSense Attack Surface Validation for Web Applications

CAN MICROSOFT HELP MEET THE GDPR

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

SIEM: Five Requirements that Solve the Bigger Business Issues

Microsoft 365 Security & Compliance For Small- and Mid-Sized Businesses

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

01/02/2014 SECURITY ASSESSMENT METHODOLOGIES SENSEPOST 2014 ALL RIGHTS RESERVED

Next Generation Authentication

Accelerating growth and digital adoption with seamless identity trust

10 FOCUS AREAS FOR BREACH PREVENTION

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

Part 2: How to Detect Insider Threats

Cybersecurity Auditing in an Unsecure World

CompTIA Security+ Study Guide (SY0-501)

Security Communications and Awareness

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

Transcription:

IBM Cognitive IBM Future of Work Forum The Engaged Enterprise Comes Alive Improving Organizational Collaboration and Efficiency While Enhancing Security on Mobile and Cloud Apps Chris Hockings IBM Master Inventor

Smartphones bring great opportunity to help drive better IT process Utilize the best aspects of the device to drive better engagement Good design incorporates new platform elements Trusted computing modules GPS and geolocational data Behavioral elements Profile/sandbox 2 9/9/2016 2016 IBM

Allowing users to bring their own Apps for their Mobile from Cloud Bring your own Apps Bring your own Authentication Bring your own Data Bring your own Network Bring your own Social Bring your own Expectations! 3 9/9/2016 2016 IBM

Today s IBM Security focus areas ADVANCED ATTACKS INNOVATION SKILLS GAP HUMAN ERROR COMPLIANCE We re focusing today on Innovation 4 9/9/2016 2016 IBM

Yes, Mobiles and Clouds have security problems The Cloud Security Alliance (CSA) recently published Cloud Computing s Top Threats in 2016 report: Threat No. 1: Data breaches #2 Cloud Security Concern: Insufficient Identity, Credential and Access Management Threat No. 3: Hacked interfaces and APIs Threat No. 4: Exploited system vulnerabilities Threat No. 5: Account hijacking #6 Cloud Security Concern: Malicious Insiders Threat No. 7: The APT parasite The list below represents the OWASP Mobile Top Ten 2016: #8 Cloud Security Concern: Permanent data loss Threat No. 9: Inadequate diligence Threat No. 10: Cloud service abuses Threat No. 1: Weak Server Side Controls Threat No. 11: DoS attacks Threat No. 2: Insecure Data Storage Threat No. 12: Shared technology, shared dangers Threat No. 3: Insufficient Transport Layer Protection #4 Mobile Security Concern: Unintended Data Leakage #5 Mobile Security Concern: Poor Authorization and Authentication Threat No. 6: Broken Cryptography Threat No. 7: Client Side Injection Threat No. 8: Security Decisions Via Untrusted Inputs #9 Mobile Security Concern: Improper Session Handling Threat No. 10: Lack of Binary Protection 5 9/9/2016 2016 IBM

Why IBM and Box The Security Perspective 1 2 3 Transform work for your industry by delivering the right information to your people, customers and partners wherever they are Reduce risk with best in-class security, compliance, and global availability Joint development activities to deliver new innovation for content rich applications 6 9/9/2016 2016 IBM

Which basic security technology domains help the enterprise? 7 9/9/2016 2016 IBM

Engagement is a critical aspect of security programs of work QRadar Incident Forensics BigFix QRadar Risk Manager zsecure Trusteer Apex MobileFirst Protect (MaaS360) Network Protection XGS Endpoint SiteProtector Network Mobile AppScan QRadar SIEM Trusteer Mobile Applications Security Intelligence QRadar Log Manager Advanced Fraud Trusteer Pinpoint Web Security Gateways Guardium Data Key Lifecycle Manager IBM X-Force Research Consulting Services Managed Services QRadar Vulnerability Manager Identity Manager Access Manager Identity and Access Trusteer Rapport Privileged Identity Manager Identity Governance and Intelligence 8 9/9/2016 2016 IBM

Identify your users, secure and retain identity controls Access Management for user preferred authentication and Single Sign-on capability On-premise employee or customer authentication scenarios Identity governance and privileged identity management Lifecycle management of your employees as they enter and leave the organization #5 Mobile Security Concern: Poor Authorization and Authentication #6 Cloud Security Concern: Malicious Insiders 9 9/9/2016 2016 IBM

Keep enterprise mobile content secure Single console to control and manage all apps, including Box Enforces policies to ensure data is secure based on a user s role or device security posture Pre-integrated with Box APIs #8 Cloud Security Concern: Permanent data loss #4 Mobile Security Concern: Unintended Data Leakage #9 Mobile Security Concern: Improper Session Handling 10 9/9/2016 2016 IBM

Let s see them in action 11 9/9/2016 2016 IBM

Securely understand and then deploy cloud services EMPLOYEES BYOD RISKY APPS Detect and track approved services while blocking shadow apps ON PREM APPROVED APPS Leverage standard Box protocols for single sign on (SSO) for seamless user experience MOBILE DETECT CONNECT PROTECT App catalog to connect users to approved cloud apps Discovery and Visibility Identity and Access Control Cloud Event Correlation Threat Prevention Policy Enforcement Know what your users are doing both on premise and from the cloud #2 Cloud Security Concern: Insufficient Identity, Credential and Access Management #4 Mobile Security Concern: Unintended Data Leakage 12 9/9/2016 2016 IBM

box and IBM Cloud Security Enforcer in action Connect Users with Enterprise Box instance, provide SSO, provide governance 13 9/9/2016 2016 IBM

box and IBM MaaS360 MDM in action Open a File on box, authenticate to the Enterprise 14 9/9/2016 2016 IBM

Office365, IBM MaaS360 MDM and box in action Select to edit the file using Office365 15 9/9/2016 2016 IBM

Summary Employees expect the same engagement at work as in life Cloud and Mobile is helping enterprise achieve similar levels of engagement Threat actors are focusing efforts to exploit vulnerabilities in cloud and mobile services Enterprise collaboration can be enabled by applying identity and mobile security controls Standardizing on services such as Box for storage and help concentrate investment and therefore optimize spend 16 9/9/2016 2016 IBM

THANK YOU. 17 9/9/2016 2016 IBM