What Storage Managers Need To Know About Security

Similar documents
Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Cyber Criminal Methods & Prevention Techniques. By

What It Takes to be a CISO in 2017

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

ANATOMY OF AN ATTACK!

IOT Security More than just the network..

Hearing Voices: The Cybersecurity Pro s View of the Profession

10 FOCUS AREAS FOR BREACH PREVENTION

Designing and Building a Cybersecurity Program

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Assessing Your Incident Response Capabilities Do You Have What it Takes?

ENDNOTE SECURITY OVERVIEW INCLUDING ENDNOTE DESKTOP AND ONLINE

May 14, :30PM to 2:30PM CST. In Plain English: Cybersecurity and IT Exam Expectations

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER

RSA IT Security Risk Management

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Initiative. Copyright Techdemocracy, 2017

CoreMax Consulting s Cyber Security Roadmap

CSP 2017 Network Virtualisation and Security Scott McKinnon

Cisco Self Defending Network

ClearPath OS 2200 System LAN Security Overview. White paper

REAL-WORLD STRATEGIES FOR MEDICAL DEVICE SECURITY

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

Today s Security Threats: Emerging Issues Keeping CFOs Up at Night Understanding & Protecting Against Information Security Breaches

CompTIA Exam CAS-002 CompTIA Advanced Security Practitioner (CASP) Version: 6.0 [ Total Questions: 532 ]

Securing Your Cloud Introduction Presentation

Take Risks in Life, Not with Your Security

Chapter 1 B: Exploring the Network

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Attacking Networks. Joshua Wright LightReading LIVE! October 1, 2003

Future-ready security for small and mid-size enterprises

2017 Annual Meeting of Members and Board of Directors Meeting

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Security Architecture

Best Practices in Securing a Multicloud World

CS 356 Operating System Security. Fall 2013

CYBERSECURITY TRAINING EXERCISE KMU TRAINING CENTER NOVEMBER 7, 2017

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

Cyber Security Program

LESSONS LEARNED IN SMART GRID CYBER SECURITY

Healthcare HIPAA and Cybersecurity Update

External Supplier Control Obligations. Cyber Security

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Session ID: CISO-W22 Session Classification: General Interest

CA Security Management

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

CYBER SECURITY AND MITIGATING RISKS

II. Information Security Infrastructure and Environment 2. III. Information Security Incident Prevention 6. Ⅳ. Security Incidents Responses 13

Isaca EXAM - CISM. Certified Information Security Manager. Buy Full Product.

CompTIA E2C Security+ (2008 Edition) Exam Exam.

ICS Security Rapid Digital Risk Assessment

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Plant Security Services Protecting productivity in the digital era October

Information Security in Corporation

Cybersecurity Panel: Cutting through Cybersecurity Hype with Practical Tips to Protect your Bank

The Need for Confluence

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

Is Your Information Safe? Presented by: Jake Gibson IT Director, Eurofins

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

ISC2. Exam Questions CISSP. Certified Information Systems Security Professional (CISSP) Version:Demo

The Value of Automated Penetration Testing White Paper

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

SOLUTION BRIEF Virtual CISO

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Navigate IT Security with a Framework as Your Guide

Cyber security tips and self-assessment for business

HikCentral V1.3 for Windows Hardening Guide

The NextGen cyber crime battlefield. Why organizations will always lose this battle

ForeScout ControlFabric TM Architecture

Protect Your End-of-Life Windows Server 2003 Operating System

A Practical Guide to Efficient Security Response

THE LIFE AND TIMES OF CYBERSECURITY PROFESSIONALS

align security instill confidence

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Survey Results: Virtual Insecurity

Protect Your End-of-Life Windows Server 2003 Operating System

NetDefend Firewall UTM Services

Mastering The Endpoint

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Cyber Security Update. Bennett L. Gaines Senior Vice President, Corporate Services, CIO, FirstEnergy 2012 Summer Seminar August 5-7, 2012

CompTIA Security+ E2C (2011 Edition) Exam.

Industrial Control Systems Providing Advanced Threat Detection

THALES DATA THREAT REPORT

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

Security

Click to edit Master title style. DIY vs. Managed SIEM

Exam4Tests. Latest exam questions & answers help you to pass IT exam test easily

Data Protection. Plugging the gap. Gary Comiskey 26 February 2010

Building Resilience in a Digital Enterprise

The CIS Security Metrics & Benchmarking Service. Clint Kreitner The Center for Internet Security

Position Title: IT Security Specialist

Changing face of endpoint security

Cybersecurity Auditing in an Unsecure World

Transcription:

What Storage Managers Need To Know About Jon Oltsik Senior Analyst Enterprise Strategy Group in the mainstream Britney Spears: Singing, Sex, and Richard Clarke: Homeland, Shmomeland: Hot White House Stories Agenda Trends Storage Current Issues Future Considerations

Audience Response: Please raise your hand Over the next few years, information security will: A. Get more attention throughout my organization B. Get the same attention that it does today C. Get less attention than today D. Don t know E. Hey, go back to the picture of Brittany Spears, stupid! Trends First the good news Now, the bad news Incidents UP Budgets Up Vulnerabilities Down What s Driving? Regulatory Compliance Liabilities Threats New Technologies Internet Business Opportunities

CISO Priorities Put Out The Fires Align With The Business Integrate Into The Corporate Culture Architectural Changes Firewall VPN IDS Internet Internal Network Anti-Virus 2000 Firewall VPN Anti-virus IDS/IPS Content (Spam, URL, IM P2P, spyware, adware) Application security Honeypot Internet 2006 Internal Network Packet filtering VLAN ACL Anti-virus IDS/IPS Application security Firewall Network behavior monitoring End-point security Vulnerability Scanning Patch Management... Audience Response: Please raise your hand I believe that storage security is an issue that: A. Impacts the business B. Impacts IT but not the business C. Impacts the storage group but not IT or the business D. Don t know E. Hey, go back to the picture of Brittany Spears, stupid!

Which of the following factors would most likely influence your company s decision to purchase storage security products (choose all that apply): Regulatory Compliance 57% Auditor's Recommendation 56% Adherence to security policy 48% Reaction to security event 46% Don't Know 4% Other 2% 0 20 40 60 Has your company experienced a storage security breach? We can't tell if we have a breach or not 8% Don't know 12% Yes 7% No 73% Storage Vulnerabilities Storage Management 1. Management Interfaces Server/HBA 2. Weak Authentication SAN Fabric 3. Fabric Configuration Storage IP Storage 5. IP Storage Exposed 4. Data in Cleartext

I believe my company is most vulnterable to a storage security breach through: Technical flaw 11% Don't know 10% A deliberat e attack by an employee 42% Human error/ Mis-configuration 33% An attack by an outsider 4% Storage Strategy Adopt Policies and Training Physical Storage Risk Analysis Employees Policies Storage Technology Harden All Storage Management Interfaces Purchase Secure Fabrics Monitor Impending Standards Investigate Storage Technologies Utilize IP MAKE YOUR VENDORS WORK!!!

What approaches do you believe your company will take to improve the security of your storage infrastructure? No plans 5% Improve policies and procedures 44% Don't know 5% Buy new storagespecific security products 12% Look to add security features from existing storage products 34% I believe my storage vendors' commitment to security is: Don't Know 11% Weak 7% Marginal 39% Strong 43% Future Considerations ILM More intelligence, data movement, geographical distribution More security headaches! IP Storage Shared infrastructure IP security issues More security headaches!

Summary Elevated status with business and IT More money, more focus Storage FC SANs introduce lots of vulnerabilities Solution: Policies, Organization, Technologies Future Directions Demand Storage Knowledge, Architecture, Cooperation Thank you. Questions? Jon Oltsik Senior Analyst Enterprise Strategy Group jono@enteprisestrategygroup.com 978.501.0862 Mr. Oltsik is unable to attend the Ask-the-Experts booth. Please send additional questions to jglossner@techtarget.com.