FROM SECURITY DATA TO SECURITY INTELLIGENCE ZULFIKAR RAMZAN, CTO, RSA.

Slides:



Advertisements
Similar presentations
2012 Taking Complexity out of Information Security …allowing you to focus on your business.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
FIVE STEPS TO REDUCE THE RISK OF CYBERCRIME TO YOUR BUSINESS.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
Dell Connected Security Solutions Simplify & unify.
The Changing World of Endpoint Protection
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Take back control: taming rogue device, user and application exposures Mark Blake, Capita Secure Managed Services Chris Gothard, Colt Technology Services.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
NADAV PELEG HEAD OF MOBILE SECURITY The Mobile Threat: Consumer Devices Business Risks David Parkinson MOBILE SECURITY SPECIALIST, NER.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
Protect your Digital Enterprise
Your Partner for Superior Cybersecurity
Protect your organization against external threats (Security)
Six Steps to Secure Access for Privileged Insiders and Vendors
Threat Scan (ETS) for Office 365
Cybersecurity - What’s Next? June 2017
Secure Modern Enterprise
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
The next frontier in Endpoint security
Journey to Microsoft Secure Cloud
Cyber Security: State of the Nation
Introduction to a Security Intelligence Maturity Model
Improving Security By Embracing The Cloud
Board Concerns About Cyber Security
Advanced Threat Protection
Cybersecurity Reference Architecture
Six Steps to Secure Access for Privileged Insiders and Vendors
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Advanced Borderless Network Architecture Sales Exam practice-questions.html.
Company Overview & Strategy
Securing Your Digital Transformation
Understanding IDENTITY Assurance
Strong Security for Your Weak Link:
Cyber Security 2017 Trends and Start Ups.
cyberopsalliance.com |
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
We want to hear from you! chime16.org/evals
Shifting from “Incident” to “Continuous” Response
Securing the Threats of Tomorrow, Today.
Brandon Traffanstedt Systems Engineer - Southeast
Panda Adaptive Defense Platform and Services
Healthcare Cloud Security Stack for Microsoft Azure
How to Mitigate the Consequences What are the Countermeasures?
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
National Information Assurance (NIA) Policy
Managing IT Risk in a digital Transformation AGE
THE CYBER LANDSCAPE UNCLASSIFIED CROSS DOMAIN NETWORK & INFO SHARING
Information Protection
Security intelligence: solving the puzzle for actionable insight
Information Protection
Protecting Knowledge Assets – Case & Method for New CISO Portfolio
Streamline your move to the cloud
Presentation transcript:

FROM SECURITY DATA TO SECURITY INTELLIGENCE ZULFIKAR RAMZAN, CTO, RSA

2 Paper Towns and

3 What Came First: the Map or the

4

WALLS TALLER WON’T SOLVE OUR PROBLEM

6 Attacks are targeted (e.g., via repeated use of polymorphism and metamorphism); Macro-distribution supplanted by micro-distribution. Powerful attack toolkits available w/ tiered pricing, 24x7 customer support. Ecosystem for buying and selling tools and cybercriminal services democratizes advanced attacks Why Intrusions Are Successful Why are intrusions

Visibility Identity Risk Three Strategic

8 is the foundation for mitigating the risk of advanced threats visibility If you really want to protect your network, you really have to know your network. You have to know the devices, the security technologies, and the things inside it. -Rob Joyce, NSA TAO Chief, Usenix Enigma

9 Cloud Key Visibility Points Logs NetflowPackets Endpoints

10 12 TIME Attack Identified Response Advanced Attacks: Where to Focus 1 TARGETED SPECIFIC OBJECTIVE STEALTHY LOW AND SLOW 23 INTERACTIVE HUMAN

11 identity is foundational and will matter even more as the threat landscape

12 Advanced breaches don’t have to involve malware: SQL Injection -> Web Shell -> RDP Advanced breaches can be very simple – e.g., credential theft Every breach involves co-opting of identity (authentication isn’t the same as identity assurance) Malware Reality

13 Identity is More Than Authentication Governance Access / Auth Lifecycle

14 embrace and own your risk Supply chain risk Financial risk Operational risk IT Security risk Physical risk Currency fluctuation risk Regulatory

15 How we spend Prevention 80% Monitoring 15% Response 5% Prevention 80% Monitoring 15% Response 5% Prevention 33% How we should spend Monitoring 33% Response 33% Shift Priorities and

16 Takeaways We need pervasive and true visibility Identity and authentication matter even more Embrace and own your risk

17 Thank You