Intel - Public Get Rich or Get Thin: The Secure Client Jeff Moriarty, CISSP Security Program Manager Intel Information Risk and Security.

Slides:



Advertisements
Similar presentations
Software & Services Group Developer Products Division Copyright© 2011, Intel Corporation. All rights reserved. *Other brands and names are the property.
Advertisements

Bring Your Own Device (BYOD) Security By Josh Bennett & Travis Miller.
Incident Response Managing Security at Microsoft Published: April 2004.
4 Information Security.
Software & Services Group Developer Products Division Copyright© 2013, Intel Corporation. All rights reserved. *Other brands and names are the property.
1 Vladimir Knežević Microsoft Software d.o.o.. 80% Održavanje 80% Održavanje 20% New Cost Reduction Keep Business Up & Running End User Productivity End.
Lloyds 360 Risk Insight Dec 2010 Malcolm Harkins Malcolm Harkins Chief Information and Security Officer General Manager Intel Information Risk and Security.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Backup Modernization with NetBackup Appliances
1 Telstra in Confidence Managing Security for our Mobile Technology.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
March 2010 Zero Client Maximum Savings, Maximum Flexibility Copyright 2010 FUJITSU TECHNOLOGY SOLUTIONS.
100% Security “ The only system which is truly secure is one which is switched off and unplugged, locked in a titanium lined safe, buried in a concrete.
A Move Toward Agile APM: Application Performance Management Frank Ober, Performance Engineer June 2012.
Windows XP Professional Deployment and Support Microsoft IT Shares Its Experiences Published: May 2002 (Revised October 2004)
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Version 1.0 digitaloffice.intel.com Intel ® vPro ™ Technology Intel ® Active Management Technology Setup and Configuration Toshiba Laptop –Tecra A9 Small.
Norman SecureSurf Protect your users when surfing the Internet.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Will you need your umbrella?.  Objective: Explain the Cloud In business terms, so you can see if it will benefit you.  Agenda: 12:00 – Welcome and Introductions.
BUILDING HYBRID APPS WITH DYNAMICS CRM & WINDOWS AZURE Guy Riddle & George Doubinski Dynamics CRM MVP’s SESSION CODE: DEV-DYN-MID306 (c) 2011 Microsoft.
November 2009 Network Disaster Recovery October 2014.
Software & Services Group, Developer Products Division Copyright © 2010, Intel Corporation. All rights reserved. *Other brands and names are the property.
Introduction to Cloud Computing
Introduction to Honeypot, Botnet, and Security Measurement
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Change Agent Role: A Successful Transformation into Agile Organization (Intel® MKL Case Study) Intel Agile and Lean Development Conference Presenter:
Viruses & Destructive Programs
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Kay-Ulrich Scholl Applying agile SW development methods in a non-agile friendly environment. May 22, Agile and Lean Development Conference 2014.
Partner Logo Overcoming Buyer Objections Q
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Copyright © 2006 Intel Corporation. WiMAX Wireless Broadband Access: The World Goes Wireless Michael Chen Director of Product & Platform Marketing Group.
Results of self-organization in the service oriented team
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
Copyright© 2011, Intel Corporation. All rights reserved. *Other brands and names are the property of their respective owners. 1 How Does The Intel® Parallel.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Topic 5: Basic Security.
Product Owner Evolution Agile and Lean Development Conference Walter Pruchnic May 2014.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
Changing Developer Behavior Using Automatic Test Intel Agile and Lean Development Conference Chris Gearing 23 rd May 2014 Version 1.0.
Copyright © 2015 Cyberlight Global Associates Cyberlight GEORGIAN CYBER SECURITY & ICT INNOVATION EVENT 2015 Tbilisi, Georgia19-20 November 2015 Hardware.
Safe’n’Sec IT security solutions for enterprises of any size.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Application Migration Fritz Ohman Alphageek
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 11 Network Security.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
가상화 기반의 Workload 관리솔루션 : FORGE PlateSpin Virtualization and Workload Management 나영관 한국노벨 /
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Work smarter, keep connected with Lotus Software Jon Crouch | Senior Technical Specialist, Lotus Software Matt Newton | Senior Technical Specialist, Lotus.
Pro-I Open Source Security Monitoring
Rootkit Detection and Mitigation
PowerApps and Microsoft Flow for Business Users
Securing Information Systems
Modeling Parallelism with Intel® Parallel Advisor
Microsoft Ignite NZ October 2016 SKYCITY, Auckland.
Faculty of Science IT Department By Raz Dara MA.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Computer Security By: Muhammed Anwar.
Microsoft Virtual Academy
Microsoft Data Insights Summit
In the attack index…what number is your Company?
Microsoft Virtual Academy
Presentation transcript:

Intel - Public Get Rich or Get Thin: The Secure Client Jeff Moriarty, CISSP Security Program Manager Intel Information Risk and Security

Intel - Public This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. BunnyPeople, Celeron, Celeron Inside, Centrino, Centrino logo, Core Inside, Dialogic, FlashFile, i960, InstantIP, Intel, Intel logo, Intel386, Intel486, Intel740, IntelDX2, IntelDX4, IntelSX2, Intel Core, Intel Inside, Intel Inside logo, Intel. Leap ahead., Intel. Leap ahead. logo, Intel NetBurst, Intel NetMerge, Intel NetStructure, Intel SingleDriver, Intel SpeedStep, Intel StrataFlash, Intel Viiv, Intel vPro, Intel XScale, IPLink, Itanium, Itanium Inside, MCS, MMX, Oplus, OverDrive, PDCharm, Pentium, Pentium Inside, skoool, Sound Mark, The Journey Inside, VTune, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright © 2007, Intel Corporation. All rights reserved.

Intel - Public Agenda  Evolution of Attacks  No Easy Answers  Parity  Rich Client Model  Thin Client Model  SFF Model  SAAS & Virtualization  Actions You Can Take

Intel - Public Required Attacker Knowledge Maximum Attack Severity 1980Mid-1990s2004Now Low High 1 st Generation Attacks Motive:Prestige, notoriety Target: Specific systems Impact:Cosmetic, noisy Future:Denial of service, virus sophistication 2 nd Generation Attacks Motive:Financial Target: Compute availability Impact:Subtle, serious Future:Rootkits, destructive code, zero day exploits 3 rd Generation Attacks Motive:Financial, political Target: Data Impact:Widespread disruption Future:Next-generation rootkits [BIOS, firmware], small form factor (SFF) malware Simple Attacks Basic contagion, replicates to others, password guessing, back doors DOS, DDOS, stealth technology, Code Red worm, SQL Slammer worm Multiple attack vectors, social engineering, stealth, active payload, zero day Evolution of Attacks

Intel - Public No Easy Answers  Today’s world is challenging  Attacks are based on Financial Motivations  Clients and User actions are the primary attack vector  Legal and Regulatory Climate –Executive Culpability –Due Diligence –Fiduciary Responsibility

Intel - Public Model Parity MoreLess Thin Client Availability Thin Client Integrity Client Vulnerability Thin Clients are more vulnerable to attacks on availability due to their heavy reliance on network based services and connectivity Thin Clients are less vulnerable to attacks against integrity due to lack of local storage and software Thin Client

Intel - Public Model Parity MoreLess Rich Client Integrity Rich Client Availability Client Vulnerability Thin Clients are more vulnerable to attacks on availability due to their heavy reliance on network based services and connectivity Thin Clients are less vulnerable to attacks against integrity due to lack of local storage and software Thin Client Rich Clients are more vulnerable to attacks against integrity due to software installed local and available local to the device Rich Clients are less vulnerable to attacks on availability due to local storage and software availability Rich Client

Intel - Public Intel Environment Trending  Your current client mix shows your present business model.  Changing business models may be more costly than changing hardware purchases.

Intel - Public  Encrypted Data Management  Patching  Users Cons Rich Client Model MoreLess Integrity Availability Client Vulnerability  Engineering teams and support staff are trained  Greater availability of data  Greater mobility  Rich Client can mimic Thin Client, but not vice versa Pros

Intel - Public Mobility Aids Business Continuity  Moving away from disaster –Employees can take the “office” with them, out of harm’s way  Flood hits Folsom, CA building –Burst water main floods office space –Wireless laptops easy to relocate –No customer impacts  Snow shuts down Portland, OR –5,000+ Intel employees simply work from home using laptops

Intel - Public Thin Client Model  Trade Data Availability and Mobility for Security  Single Point of Access, Single Point of Failure Server MUST be impeccably secure  Reduce functionality to really lock down (USB, CDROM) Cons MoreLess Availability Integrity Client Vulnerability  Potential control of Data Leaving Network  Potential for consolidated Security Controls  Patching  Prevent Users from Installing Misc Apps Pros 1.Still be comprised by hackers 2.End users can still fall prey to social engineering

Intel - Public  Greater theft rate  Carrier access to data  Potential attack vector into corporate network  Applications not fully supported  Attacks are ramping very rapidly compared to other models  Security is trailing functionality Cons  Hyper-mobile  Good connectivity Pros Small Form Factor Model

Intel - Public SAAS and Virtualization  Software As A Service (SAAS) –Both models can benefit from SAAS –Provides the some of the benefits of a Thin Client solution to Rich Clients  Virtualization –OS Virtualization (Software and Hardware) –Application Virtualization –Application Wrapping

Intel - Public Take Action!  Document Usage Models  Evaluate threat/vulnerability vectors –Don’t believe the hype… do your own due diligence  Conduct Internal War Games  Prioritize Risks and Needs

Intel - Public Access More IT Best Practices Resources  Exclusive content for senior IT managers and executives in organizations with more than 100 employees  Local seminars, webinars, podcasts, presentations, articles, white papers and more  Optional Intel Premier IT magazine and best practices eNewsletter  Join today at ipip.intel.com with Priority Code 482ipip.intel.com

Intel - Public