Brian Dye - Keynote Address

20

description

 

Transcript of Brian Dye - Keynote Address

Page 1: Brian Dye - Keynote Address
Page 2: Brian Dye - Keynote Address

Eight Big Ideasfor Next Generation Environments

Brian DyeSenior Vice President

Page 3: Brian Dye - Keynote Address

3

EscalatingThreat Landscape

Growing IT Complexity

Page 4: Brian Dye - Keynote Address

Growing IT Complexity

Page 5: Brian Dye - Keynote Address

Organizations Are Left Unprepared…Data Explosion Causing Missed SLAs

Huge Data Growth

Infrastructure Strain

Point Solution Adoption

Increased Complexity/Risk

Decreased Efficiency

Missed SLAs 49% Of companies say they can’t meet backup SLAs because of too much data.

data data data data data data data datadata data data data data data data

data data data data data datadata data data data data

data data data datadata data data

data datadata

Page 6: Brian Dye - Keynote Address

with Higher Expectations

• Expectation is IT services are always on

• Software-defined-data center

• Disasters happen!

“The cost of downtime is $1.1 million per hour for

organizations with more than 1,000 employees, and

even higher for large organizations in selected

industries: $6.5 million per hour for brokerage firms, $2

million for telecom companies, and $1.6 million for

manufacturers.”

“Why Mid-Sized Enterprises Should Consider Using Disaster Recovery-as-a-Service,” Aberdeen

Group, April 19, 2012

Page 7: Brian Dye - Keynote Address

Escalating Threat Landscape: Its Everywhere

Page 8: Brian Dye - Keynote Address

Escalating Threat Landscape: What is it?

New Attackers• Attackers have a career path• Insiders have unprecedented access

New Techniques• Targeted customized malware, multi-staged, multi-vector, low and slow,

watering holes, hidden C&C channels, etc.

New Targets• Ultimate targets are key intellectual property and critical infrastructure

• The endpoint PCs, servers and gateways that we currently defend are just stepping stones

Page 9: Brian Dye - Keynote Address

Public Sector Responsibility

Managing Data

Optimizing Infrastructure

Enabling Efficiency

Technology Transformation

Accelerating Innovation

Initiatives Policy

Data Center Optimization

Cloud Connectivity

FDCCI

Cloud First, 2010: NSTIC, 2004

Threat Protection

Continuous Monitoring, 2012; OMB-14-03 “On-going Authorization”

Page 10: Brian Dye - Keynote Address

How does industry change in partnership with government to

get to the right outcomes?

Page 11: Brian Dye - Keynote Address

Partnering to address IT Complexity:First, change the game

Realizations

The root cause of IT complexity is the explosion of data

Mindset Shift Just store it Store it AND use it

Data has value for IT, not just the organization

Page 12: Brian Dye - Keynote Address

Who can use our data to meet our goals?Fu

nctio

n

Store

How can I store my data for fast access in a cost effective way?

CIO

Classify

How can I understand where content lives and govern it appropriately?

CISO

Protect

How can I ensure that all my businesses are able to run without unneeded risk and exposure?

CEO / CMO

Search & Discover

How can I can discover relevant content while remaining compliant?

CCO/ CRO/ GC

Page 13: Brian Dye - Keynote Address

Acting on that Insight: Four Big Ideas to Use our Data

1 Backup as an insurance policy Backup as an asset

Historical Viewing: Going Forward:

2 Recovery focused on components Recovery focused on business services

3 Information silos Intelligent information fabric

4 Connect to SAN Eliminate SAN

Page 14: Brian Dye - Keynote Address

Partnering to Address the Threat Landscape:First, change the game

Realization Breach is Inevitable

Mindset Shift From Protection (only) To Protection +

Detection and Response

Page 15: Brian Dye - Keynote Address

The new NIST Cybersecurity Framework encodes that mindset shift

Asset mgmt

Business environment

Governance

Risk assessment

Risk mgmt strat

Access control

Training

Data security

Processes

Maintenance

Protective Tech

Anomalies and Events

Continuous Monitoring

Detection Processes

Response Planning

Communications

Analysis

Mitigation

Improvement

Recovery planning

Improvements

Communications

NIS

T Ca

tego

ries

Detect Respond Recover

Func

tion What are my

assets, risks, and business goals?

What are my safeguards to block attackers?

How do I know when a security event has happened?

How do I respond to a cyber security event?

How do I restore services after an event?

Identify Protect

Page 16: Brian Dye - Keynote Address

Acting on that insight: Four Big Ideas to Change the Game

1 Alert me only if you’re sure Detect both confirmed attacks and suspicious activities

Our Mantra Before: Our Mantra Going Forward:

2 Detect bad behaviors Detect bad behaviors and anomalies to normal behavior

3 Attack-time protection Attack-time protection and Retroactive detection

4 Big data is an input Big data is the new platform

Page 17: Brian Dye - Keynote Address

Centers of Excellence: STAR, DLP, Encryption, Appliances, etc.Plus Key Enablers: Identity, Authentication, Storage

Symantec Integrated Offerings . . .With Technologies Across Teams

Unified Security Ecosystem SYMC + Partners

Unified Information ManagementSYMC + Partners

Information Availability and Intelligence

Backup and Recovery

Information Security

User Protection & Productivity

Point Solutions + Integrated Offering Within Teams

Page 18: Brian Dye - Keynote Address

Unified Information ManagementIntegrated Across Store, Protect, Classify, Search & Discover

• “I have more information”

• “I can bring the information together”

• “I make better decisions”

CloudOn-Premise

Page 19: Brian Dye - Keynote Address

• “I have more knowledge”

• “I have more expertise”

• “I have sufficient coverage”

• “I’m ready to respond”

Unified Information SecurityIntegrated Across Key Control Points

Page 20: Brian Dye - Keynote Address

Symantec Supporting Public Sector