A Data-Centric Approach to Endpoint Security

Similar documents
Operationalizing Cybersecurity in Healthcare IT Security & Risk Management Study Quantitative and Qualitative Research Program Results

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Spotlight Report. Information Security. Presented by. Group Partner

Combating Cyber Risk in the Supply Chain

SECOPS: NAVIGATE THE NEW LANDSCAPE FOR PREVENTION, DETECTION AND RESPONSE

Microsoft Security Management

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

RSA NetWitness Suite Respond in Minutes, Not Months

The Gartner Security Information and Event Management Magic Quadrant 2010: Dealing with Targeted Attacks

Session ID: CISO-W22 Session Classification: General Interest

PEOPLE CENTRIC SECURITY THE NEW

What matters in Cyber Security

FOR FINANCIAL SERVICES ORGANIZATIONS

ForeScout Extended Module for Splunk

The State of Cybersecurity and Digital Trust 2016

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

RSA Advanced Cyber Defence Summit

Managed Endpoint Defense

How To Build or Buy An Integrated Security Stack

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

EDITORIAL CALENDARS. Key topics that will shape our discussions

Cloud Computing. January 2012 CONTENT COMMUNITY CONVERSATION CONVERSION

Helping the C-Suite Define Cyber Risk Appetite. The executive Imperative

EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

EU GDPR & NEW YORK CYBERSECURITY REQUIREMENTS 3 KEYS TO SUCCESS

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

CISO View: Top 4 Major Imperatives for Enterprise Defense

with Advanced Protection

IBM Security Systems. IBM X-Force 2012 & CISO Survey. Cyber Security Threat Landscape IBM Corporation IBM Corporation

Building a Resilient Security Posture for Effective Breach Prevention

State of Cloud Survey GERMANY FINDINGS

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

RSA IT Security Risk Management

Uncovering the Risk of SAP Cyber Breaches

Reinvent Your 2013 Security Management Strategy

The Third Annual Study on the Cyber Resilient Organization

PT Unified Application Security Enforcement. ptsecurity.com

2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB)

The Deloitte-NASCIO Cybersecurity Study Insights from

Building a Threat Intelligence Program

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Securing Digital Transformation

Mastering The Endpoint

Structuring Security for Success

Securing Your Most Sensitive Data

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

From Managed Security Services to the next evolution of CyberSoc Services

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

RSA INCIDENT RESPONSE SERVICES

The Resilient Incident Response Platform

Sophos. Allan Widell Channel Account Executive. 24. August 2017

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

PRODUCT OVERVIEW. On-demand threat investigation, root cause analysis and remediation advice without the need for extra internal resources

Introducing Cyber Observer

Oracle bakes security into its DNA

Moving from Prevention to Detection March 2017

Reducing Cybersecurity Costs & Risk through Automation Technologies

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

Intelligent Building and Cybersecurity 2016

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

Understanding Persistent Connectivity: How IoT and Data Will Impact the Connected Data Center

White Paper. How to Write an MSSP RFP

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst

Cyber Diligence. EY Deals Forum Ian McCaw EY Transaction Advisory Services

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

THE POWER OF TECH-SAVVY BOARDS:

SIEM Solutions from McAfee

Endpoint Security Can Be Much More Effective and Less Costly. Here s How

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

A Methodology to Build Lasting, Intelligent Cybersecurity Programs

Security Metrics Framework

Cloud Connections SEE Partner Summit Janos Strausz Product Sales Specialist, DC

IDC FutureScape: Worldwide Security Products and Services 2017 Predictions

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

Securing the Modern Data Center with Trend Micro Deep Security

GDPR COMPLIANCE REPORT

SIEM: Five Requirements that Solve the Bigger Business Issues

Managed Security Services - Endpoint Managed Security on Cloud

Best wishes for 2018! Bryan Ware, CEO. Haystax Technology INSIDER THREAT PREDICTIONS FOR

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

Copyright 2011 Trend Micro Inc.

Business continuity management and cyber resiliency

Services solutions for Managed Service Providers (MSPs)

Simplifying Endpoint Management and Security For an Evolving and Complex Mobile Workforce

CIO Forum Maximize the value of IT in today s economy

Incident Response Lessons From the Front Lines. Session 276, March 8, 2018 Nolan Garrett, CISO, Children s Hospital Los Angeles

Preparing your network for the next wave of innovation

Digital Service Management (DSM)

BUILT TO STOP BREACHES. Cloud-Delivered Endpoint Protection

NEXT GENERATION SECURITY OPERATIONS CENTER

Security-as-a-Service: The Future of Security Management

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Building an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO

Transcription:

A Data-Centric Approach to Endpoint Security September 28, 2017 Eric Ogren Senior Analyst, Security 451 Research Bill Bradley Director of Product Marketing Digital Guardian

About Eric Ogren Eric Ogren is a Senior Analyst with the Information Security team. Eric has extensive experience in software development, technology marketing, and as a security industry analyst. Eric Ogren Senior Analyst, Security Eric contributes pragmatic perspectives for security clients on emerging market trends, company and product strategies, differentiated vendor messaging and positioning, and meeting enterprise solution purchase criteria. Prior to joining 451 Research, Eric held marketing leadership positions with security vendors such as RSA Security and OKENA, and technology vendors such as Digital Equipment. 2

About Bill Bradley Leads Product Marketing Data Loss Prevention 20 Years of Marketing & Sales Experience Field Sales, Competitive Analysis, Product Marketing & Management Previously at Rapid7 and General Electric Bill Bradley Director, Product Marke6ng 3

Basic structure for today s conversation State of enterprise security The information security debt Evolving to datacentric approaches Transforming security with the infrastructure 4

Average Size and Ratio of Security Team By Company Size Information Security Respondents INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017 Average Number of Employees in Information Security Average Ratio of Security Employees to IT employees 60 54 25.0% 50 20.0% 40 15.0% 14.1% 30 11.1% 20 10.0% 7.6% 10 5 9 5.0% 0 1-999 employees 1,000-9,999 employees 10,000+ employees 0.0% 1-999 employees 1,000-9,999 employees 10,000+ employees Q11. How many full time employees (FTEs) does your IT organization currently employ? Q12. How many full time employees (FTEs) does your organization currently employ that are dedicated to information security tasks? Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017 5

INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017 Services 14.7% Average Ratio of Security Employees to IT employees By Industry Information Security Respondents B2B Software, IT and Computer Services Retail Healthcare 10.8% 11.9% 14.2% Govt/Educ 10.8% Manufacturing 10.7% Finance 10.5% Telecommunications 9.7% Communications, Media and Publishing 6.1% Utilities 4.1% Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017 Other 8.0% Mean 6

INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017 Information Security Reporting Chain Respondents with a Single Information Security Executive Leader in Their Organizations Q40. Who does the head of Information Security report to? CIO, Head of Information Technology CEO CTO Board of Directors COO 5.2% 8.3% 5.2% 7.9% 4.4% 7.0% 21.9% 20.1% 46.6% 43.2% CFO 3.3% 4.8% Chief Risk Officer 3.8% 2.6% Other 9.6% 6.1% Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017 Q2 2016 (n=479) Q2 2017 (n=229) Percent of Sample 7

How did we get here? It all starts with your business Your Business 8

How did we get here? Need to bolt on security! Your Business 9

How did we get here? New threats? New products! Your Business 10

We re catching on to the problems with this picture An attack can go anywhere once inside security defenses Security teams get bogged down managing all those products and all the data they produce Security teams get isolated from the rest of IT and special skills keep us isolated 11

INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017 Hackers/Crackers with Malicious Intent 52.5% Top Information Security Concerns Past 90 Days Information Security Respondents Q3. What were your top general information security concerns during the last 90 days? Please select all that apply. Compliance Internal Audit Deficiencies Based on Findings Preventing/Detecting Insider Espionage 19.8% 31.7% 49.1% Cyber-Warfare 19.6% Other 7.3% Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017 n = 495 Percent of Sample 12

INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017 Risk Assessment 21.6% Reasons for Implementing Security Projects Information Security Respondents Compliance Requirement Business Requirement Championed by a Senior Leader (e.g., Sacred Cow) 11.1% 9.9% 21.4% Q2. For the top information security projects currently being implemented within your organization, what was the key determinant in their approval? Driven by Due Diligence (e.g., Customer Requirement) Audit Response Reputational/Brand Risk 9.1% 8.9% 8.7% Return on Investment (ROI) 5.5% Other 3.8% Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017 n = 495 Percent of Sample 13

INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017 User Behavior 34.1% Organizational Politics/Lack of Attention to Information Security 21.0% Staffing Information Security 20.6% Lack of Budget 20.4% Top Security Pain Points Information Security Respondents Q1. What are your organization s top information security pain points? Please select up to three. Security Awareness Training (Ineffectiveness or Difficulty) Accurate, Timely Monitoring of Security Events Endpoint Security Malicious Software (Malware) Cloud Security Application Security Data Loss/Theft 19.0% 18.4% 17.2% 17.0% 16.6% 16.0% 14.7% Mobile Security 12.1% Ransomware 11.9% Third-Party/Supplier Security 11.7% Keeping Up with New Technology 11.5% Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017 Firewall/Edge Network Security Other 4.6% 9.3% Percent of Sample n = 495 14

INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017 Metrics To Manage Security Information Security Respondents Q44. Which of the following metrics does your organization use/track for information security staff? Please select all that apply. Security Incidents Resolved Tickets Resolved (e.g., Trouble Tickets ) Audit Issues Resolved Application Availability (e.g., Uptime/Downtime) Project Completion Time to Recovery/Restore from an Outage Lack of Data Breaches 53.0% 47.5% 42.8% 39.0% 44.9% 34.4% 34.2% 34.2% 34.4% 32.3% 31.2% 29.2% 32.4% 28.3% We Don t Use Metrics 21.9% 21.9% Other 2.2% 4.0% Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017 Q2 2016 (n=837) Q2 2017 (n=421) Percent of Sample 15

Security Analytics Information Security Respondents INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017 Security Analytics Status Key Benefit of Security Analytics Better Able To Detect and Address External Attacks 24.5% In Use 38.7% Better Anomaly Detection on Our Network 23.9% Improved Incident Response/Forensics Evidence Data Capture 14.5% We re Detecting Security Incidents Not Previously Captured 13.8% Planned for the Next 12 Months 34.7% Better Ability To Understand and Respond to Anomalous User Behavior 11.3% Better Able To Detect and Address Internal Attacks 6.3% Not In Plan 26.5% No Benefit 2.5% Other 3.1% Percent of Sample Percent of Sample n = 426 n = 159 Q16. What s the status of the use of security analytics in your information security program? Q17. What has been the key benefit of your use of security analytics? 16 Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017

Security analytics dimensions User Data Network Business 17

What are CISOs doing about it? Consolidating product portfolios Investing in security analytics Shifting attention to operations 18

INFORMATION SECURITY: ORGANIZATIONAL DYNAMICS 2017 Significant Project(s) Driving Additional Demand 49.6% 48.7% Staff Increase Reasons Respondents with Increasing Security Staff New Skills Are Required Overall Business Growth 49.1% 45.1% 44.2% 40.0% Q15. What are the key reasons for increasing information security focused staff? Please select all that apply. IT Organizational Changes (e.g., Restructuring teams) Company Merger/Acquisition 9.0% 7.7% 25.3% 25.1% Information Security Functions being In-Sourced from a Third-Party Provider or Managed Security Service Provider (MSSP) 7.7% 10.5% Other 7.2% 12.3% Source: 451 Research, Voice of the Enterprise: Information Security, Organizational Dynamics 2017 Q2 2016 (n=391) Q2 2017 (n=195) Percent of Sample 19

Thank You! 20

Smart Consolidation on the Endpoint Digital Guardian for Data Protection

Triad of Roles InfoSec Analyst Incident Responder Threat Hunter 22

Triad of Needs Data Response Threat 23

Myriad Solutions at the Endpoint 24

Myriad Solutions at the Endpoint 25

Myriad Solutions at the Endpoint 26

WELCOME TO The Convergence of DLP & EDR STOP DATA THEFT From Insiders & Outside Attackers DETECT THREATS Ransomware, Malware and Non-Malware Based 27

WELCOME TO The Convergence of DLP & EDR STOP DATA THEFT From Insiders & Outside Attackers DETECT THREATS Ransomware, Malware and Non-Malware Based 28

WELCOME TO The Convergence of DLP & EDR STOP DATA THEFT From Insiders & Outside Attackers DETECT THREATS Ransomware, Malware and Non-Malware Based 29

The Digital Guardian Data Protection Platform SOLUTIONS Data Classifica7on Data Discovery Data Loss Preven7on Cloud Data Protec7on Endpoint Detec7on & Response DIGITAL GUARDIAN PLATFORM DG Management Console DG Agent(s) DG Appliance DG Analy7cs & Repor7ng Cloud Confidential 30

Visibility to All Threats One Console Endpoint Storage Cloud Network 31

Visibility to All Threats One Console Endpoint Data Events Storage User Events Cloud System Events Network 32

Visibility to All Threats One Console Endpoint Data Events Storage User Events Cloud Network System Events Combining system, user and data insights provides the visibility to protect against ALL THREATS. 33

Enable Your Security Team 34

Enable Your InfoSec Analysts 35

Enable Your Incident Responders 36

Enable Your Threat Hunters 37

So What? 38

Enable Business Growth 39

Questions 40

Register today for our upcoming webinar: Insights from the Gartner 2017 Magic Quadrant for Enterprise DLP October 26, 2017 1PM ET 41