EU GDPR a Cyber Security Perspective

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Advertisements

Gefördert durch das Kompetenzzentrenprogramm DI Alfred Wertner 19. September 2014 Ubiquitous Personal Computing © Know-Center Security.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Chapter 12 Strategies for Managing the Technology Infrastructure.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Website Hardening HUIT IT Security | Sep
An Analysis of Security and Privacy Issues in Smart Grid Software Architectures on Clouds Dresden, 22/05/2014 Felipe de Sousa Silva Simmhan, Kumnhare,
Information Security Issues at Casinos and eGaming
Dell Connected Security Solutions Simplify & unify.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
From Information Assurance to Trusted Systems – A Strategic Shift Patricia A. Muoio Chief, NSA Trusted Systems Research (formerly known as National Information.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Implementing Secure Docker Environments At Scale Ben Bernstein CEO Twistlock (NOTE: PASTE IN PORTRAIT AND SEND BEHIND FOREGROUND GRAPHIC FOR CROP)
Surveillance and Security Systems Cyber Security Integration.
Identity and Access Management Market to Global Analysis and Forecasts by Industries, Services No of Pages: 150 Publishing Date: Feb 2017 Single.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Your Partner for Superior Cybersecurity
Chapter 6: Securing the Cloud
3 Do you monitor for unauthorized intrusion activity?
Cloud App Security vs. O365 Advanced Security Management
COMP532 IT INFRASTRUCTURE
AT&T Premises-Based Firewall Enhanced SBS Solution
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Accelerate GDPR compliance with Microsoft 365
Challenges facing Enterprise Mobility
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Cybersecurity EXERCISE (CE) ATD Scenario intro
Dissecting the Cyber Security Threat Landscape
H3 Solutions and the Azure Government Cloud Team Up to Power Contextual Intelligence Platform – Where Big Data Meets Business Productivity MICROSOFT AZURE.
Securing Your Digital Transformation
Cyber Security in Ports Business as Usual?
Threat Landscape for Data Security
Join In Be Secure Presentation
Understanding IDENTITY Assurance
Strong Security for Your Weak Link:
Healthcare Cloud Security Stack for Microsoft Azure
Cyber Security 2017 Trends and Start Ups.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
ResourceFirst Puts Emphasis on Communication, Uses Power of Azure to Bring Successful Resource and Portfolio Management to Companies Globally MICROSOFT.
Software-Defined Secure Networks in Action
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Crypteron is a Developer-Friendly Data Breach Solution that Allows Organizations to Secure Applications on Microsoft Azure in Just Minutes MICROSOFT AZURE.
BigDataRevealed Secure/Sequester and Encrypt
Securing the Threats of Tomorrow, Today.
ITP Maturity Model Survey 2018
12 STEPS TO A GDPR AWARE NETWORK
Healthcare Cloud Security Stack for Microsoft Azure
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
How to address security, cost, IT and migration concerns
Technology Convergence
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Securely run and grow your business
Microsoft Data Insights Summit
Considerations for End-to-End Trust
Plan and design the solution
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Cloud Computing for Wireless Networks
Presentation transcript:

EU GDPR a Cyber Security Perspective Tim Brown Dell Fellow and Executive Director Security

2016 : We’re in the middle of a perfect storm. Technology Innovation Ever-changing Adversaries Organizational Evolution Ask the audience to call out answers to the question... What are the three storms we are weathering today, (storms of strength in their own right), that are collectively creating the perfect storm? 1. Technology is driving innovation + explain 2. Limited resources + explain 3. Advanced adversaries + explain

Regulatory compliance should be an outcome of a security program not the goal Photo by Sam Schooler, unsplash https://unsplash.com/photos/E9aetBe2w40

#1 Change the conversation from security to risk #2 Understand the adversaries’ focus and their attack model Utilize external sources and partners for information. What components will be under attack? Why? How? By whom? #3 Understand your crown jewels Focus security efforts on the most important areas, Data, Brand, Privacy, Applications, People. Photo by Sam Schooler, unsplash https://unsplash.com/photos/E9aetBe2w40

#4. Take care of good Hygiene Keep current on patches. Utilize the network as an inspection, data gathering and control point. Not just a port blocker. Manage Identities, especially the privileged users they are your weakest link. Utilize stronger authentication and adaptive authentication. Move from Roles to Rules and develop a dynamic approach to identity management. Schedule annual big picture security reviews. Develop strong remediation plans and have appropriate resources on retainer. Photo by Sam Schooler, unsplash https://unsplash.com/photos/E9aetBe2w40

#5. Reduce the attack aperture Design patterns to minimize trust boundaries Isolate solutions when possible and created trust zones in untrusted environments #6. Utilize encryption As a regulatory enabler. As an access enabler. As a privacy enabler. #7. Decrypt as necessary and inspect critical data Dell Threat report shows 64.6 % of web traffic now SSL/TLS. The adversaries are using this to their advantage. Photo by Sam Schooler, unsplash https://unsplash.com/photos/E9aetBe2w40

#9. Look for new technologies that significantly change the landscape #8. Utilize intelligent solutions that off load work and use intelligence of others No matter your size you can not do everything on your own. Look for strong research teams and autonomous updates. #9. Look for new technologies that significantly change the landscape Advanced Malware Detection. Multi Sandbox approaches. #10. Move towards Security analytics, make data available and accessible for analysis IOT, Insider threat detection move us to a new era of security and also a new era of privacy concerns. Photo by Sam Schooler, unsplash https://unsplash.com/photos/E9aetBe2w40

Security Intelligence R&D The future of security Prescriptive Analytics Non-malware based attack detection Dynamic Identity and Risk Analysis Security Intelligence R&D Advanced Data Protection and Classification Insider Threat Advanced Malware detection and personalization Human-Centric Security IOT Security We are addressing many of these challenges with our solutions today. As well as our research areas for tomorrow…. Security Orchestration Deception