SECURITY REDEFINED. Managing risk and securing the business in the age of the third platform. Copyright 2014 EMC Corporation. All rights reserved.

Similar documents
TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

Copyright 2012 EMC Corporation. All rights reserved. Obrigado

IT Redefined. Hans Timmerman CTO EMC Nederland. Copyright 2015 EMC Corporation. All rights reserved.

EMC Solutions are Powered by Intel Xeon Processor Technology

EMC FORUM Vic Bhagat. Executive Vice President & Chief Information Officer EMC Corporation

in Action Delivering the digital enterprise Human Centric Innovation Ralf Salzmann Manager OEM

Cloud Computing Private Cloud

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

Securing Digital Transformation

Redefining Enterprise Storage: EMC Storage Strategy

Cloud Computing: The Next Wave. Matt Jonson Connected Architectures Lead Cisco Systems US and Canada Partner Organization

REDEFINING THE ENTERPRISE

EMC FORUM Vic Bhagat. Executive Vice President & Chief Information Officer EMC Corporation

How Hybrid Cloud Accelerates IT Transformation

Your Data Center is Everywhere. Unified Computing System Data Center Campaign Overview Marketing Cheat Sheet

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

The Software-Defined Enterprise

Government IT Modernization and the Adoption of Hybrid Cloud

Building a Data Strategy for a Digital World

Accelerate Your Enterprise Private Cloud Initiative

Virtustream Managed Services Drive value from technology investments through IT management solutions. Tim Calahan, Manager Managed Services

Securing Your Digital Transformation

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Transforming your network for the digital economy

Run the business. Not the risks.

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

I D C T E C H N O L O G Y S P O T L I G H T

locuz.com SOC Services

WHITE PAPER AUTHENTICATION YOUR WAY SECURING ACCESS IN A CHANGING WORLD

Optimisation drives digital transformation

Vscale: Real-World Deployments of Next-Gen Data Center Architecture

EUROPEAN ICT PROFESSIONAL ROLE PROFILES VERSION 2 CWA 16458:2018 LOGFILE

Transforming IT: From Silos To Services

WHAT CIOs NEED TO KNOW TO CAPITALIZE ON HYBRID CLOUD

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

SD-WAN. Enabling the Enterprise to Overcome Barriers to Digital Transformation. An IDC InfoBrief Sponsored by Comcast

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Micro Focus Partner Program. For Resellers

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Evolution of connectivity in the era of cloud

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

CenturyLink for Microsoft

CDW PARTNER REVIEW GUIDE SERVER VIRTUALIZATION

An Aflac Case Study: Moving a Security Program from Defense to Offense

Copyright 2012 EMC Corporation. All rights reserved.

FOR FINANCIAL SERVICES ORGANIZATIONS

Healthcare IT Modernization and the Adoption of Hybrid Cloud

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

align security instill confidence

Why Converged Infrastructure?

IT Consulting and Implementation Services

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Intelligence for the connected world How European First-Movers Manage IoT Analytics Projects Successfully

PREPARE FOR TAKE OFF. Accelerate your organisation s journey to the Cloud.

Transforming your IT infrastructure Journey to the Cloud Mike Sladin

SIEM: Five Requirements that Solve the Bigger Business Issues

CIAM: Need for Identity Governance & Assurance. Yash Prakash VP of Products

Sales Transformation - from v1.0 to 3.0

Leading in the compute era. Delivering the right compute, for the right workload, at the right economics every time.

BRING EXPERT TRAINING TO YOUR WORKPLACE.

Benefits of Implementing a SaaS Cybersecurity Solution Andras Cser, VP Principal Analyst

IT Security: Managing a New Reality

Cloud Strategies for Addressing IT Challenges

Hybrid IT Managed Services

Cyber Resilience. Think18. Felicity March IBM Corporation

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

vrealize Introducing VMware vrealize Suite Purpose Built for the Hybrid Cloud

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

Get more out of technology starting day one. ProDeploy Enterprise Suite

VMware Cloud Operations Management Technology Consulting Services

SIEMLESS THREAT DETECTION FOR AWS

MODERNIZE INFRASTRUCTURE

Machine-Based Penetration Testing

THE JOURNEY OVERVIEW THREE PHASES TO A SUCCESSFUL MIGRATION ADOPTION ACCENTURE IS 80% IN THE CLOUD

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

An Aflac Case Study: Moving a Security Program from Defense to Offense

NEXT GENERATION SECURITY OPERATIONS CENTER

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Helping the C-Suite Define Cyber Risk Appetite. The executive Imperative

Incident Response Services

Anything-as-a-Service. Name

Gain Control Over Your Cloud Use with Cisco Cloud Consumption Professional Services

Cisco Start. IT solutions designed to propel your business

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

CYBERSECURITY FOR STARTUPS AND SMALL BUSINESSES OVERVIEW OF CYBERSECURITY FRAMEWORKS

EMC s IT TRANSFORMATION

Anything-as-a-Service. Mike Pilbeam Director of Presales UKI

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

Cisco Software-Defined Access

Fast Innovation requires Fast IT

PEOPLE INNOVATION CAPITAL INFRASTRUCTURE AGILITY. New Brunswick Growth Opportunity. Cybersecurity

DATACENTER SERVICES DATACENTER

AKAMAI CLOUD SECURITY SOLUTIONS

WHITE PAPER. Applying Software-Defined Security to the Branch Office

MITIGATE CYBER ATTACK RISK

112 th Annual Conference May 6-9, 2018 St. Louis, Missouri

THE BUGGIE WHIP MISNOMER 2016 PRESIDIO

Transcription:

SECURITY REDEFINED Managing risk and securing the business in the age of the third platform 1

BILLIONS OF USERS MILLIONS OF APPS 2010 HUNDREDS OF MILLIONS OF USERS Mobile Cloud Big Data Social Mobile Devices LAN/Internet 1990 PC Client/Server TENS OF THOUSANDS OF APPS Source: IDC, 2012 MILLIONS OF USERS 1970 Mainframe, Mini Computer Terminals THOUSANDS OF APPS 2

BUSINESS IT 3

Old IT New IT Infrastructure & Applications Designed For A Different Era Customers & Employees Want Immediate, Frictionless Access Through Mobile Devices 4

Old IT New IT HELP THE CFO Build New Customer-Centric Applications & Rapidly Iterate Based On Community Feedback. 5

Old IT New IT IT Systems Focused On Data Warehousing 10101010100101010 011001010101110010 1101010100101011111 IT Skills Focused On Reporting Historical Internal Data Process Vast Quantities Of Customer & Partner Data In Real Time & Build Predictive Models Of The Future 6

Old IT New IT IT Infrastructure Is Siloed & Labor Intensive To Manage IT Infrastructure Is Slow To Provision Immediate Access To Low Cost, Elastic Compute, Storage & Network Infrastructure 7

ITaaS Management Copyright 2012 EMC Corporation. All rights reserved. 8 Security Disruptors in the Third Platform Enterprise Admins Users User Access Transformation Mobile Computing Data Center Applications Threat Landscape Transformation Advanced Threats Information Big Data Infrastructure Infrastructure Transformation Cloud Computing

We Must REDEFINE Security 9

A New Security Strategy 2 ND PLATFORM LAN/Internet PC Client/Server 3 RD PLATFORM Mobile Cloud Big Data Social Mobile Devices IT CONTROLLED PERIMETER-BOUND PREVENTION SIGNATURE-BASED USER-CENTRIC BORDERLESS DETECTION INTELLIGENCE-DRIVEN 10

Intelligence-Driven Security Reactive Historical Traditional Roles Computer Scientists Silos of responsibility People Intelligence-Driven New Cross-functional roles Social engineers, data scientists and business analysts Shared responsibility (not accountability) 11

Intelligence-Driven Security Model Reactive Historical Static policy/procedures Traditional delivery cycles Siloed governance Intelligence-Driven New Continuous monitoring and improvement Rapid/agile delivery Cross-functional / interactive governance Process 12

Intelligence-Driven Security Model Reactive Historical Perimeter-based Static controls deployed in silos Ad hoc/limited threat intelligence Technology Intelligence-Driven New Risk / Context-based Dynamic/flexible controls across IT systems Real-time actionable intelligence Intelligence must include session, network, external 13

Intelligence-Driven Security VISIBILITY ANALYSIS ACTION Collect data about what matters Risk Network Traffic Identities - Transactions Detect anomalies that indicate threats Act to mitigate business damage or loss 14

Transforming Budgets Monitoring 15% Response 5% Monitoring 33% Response 33% Prevention 80% Prevention 33% Today s Priorities Intelligence-Driven Security 15

http://www.emc.com/microsites/rsa/security-for-business-innovation-council.htm 16

Focus Areas For Technology Investment 1. Cyber-threat Resilience Detection and response to minimize damage or loss 2. End-user Experience Optimization Improved UX of security feature / function 3. Cloud Security Enhanced visibility and control 17

People / Staff Recommendations 1. Redefine and strengthen core competencies 2. Delegate routine operations 3. Borrow or rent experts 4. Lead risk owners in risk management 5. Hire process optimization specialists 6. Build key relationships 7. Think out-of-the-box for future talent 18

Process Improvement Recommendations 1. Shift Focus from Technical Assets to Critical Business Processes 2. Institute Business Estimates of Cybersecurity Risks 3. Establish Business-Centric Risk Assessments 4. Set a Course for Evidence-Based Controls Assurance 5. Develop Informed Data Collection Techniques 19

What You Can Achieve Risk-driven Prioritize activity and resources appropriately Incremental, Steady Progress New capabilities improve your maturity over time Future proof Enables response to changes in landscape not based on adding new products Agile Enables the business to take advantage of new technology and IT-driven opportunities 20