Brian Dye - Keynote Address
-
Upload
fedscoop -
Category
Technology
-
view
771 -
download
2
description
Transcript of Brian Dye - Keynote Address
Eight Big Ideasfor Next Generation Environments
Brian DyeSenior Vice President
3
EscalatingThreat Landscape
Growing IT Complexity
Growing IT Complexity
Organizations Are Left Unprepared…Data Explosion Causing Missed SLAs
Huge Data Growth
Infrastructure Strain
Point Solution Adoption
Increased Complexity/Risk
Decreased Efficiency
Missed SLAs 49% Of companies say they can’t meet backup SLAs because of too much data.
data data data data data data data datadata data data data data data data
data data data data data datadata data data data data
data data data datadata data data
data datadata
with Higher Expectations
• Expectation is IT services are always on
• Software-defined-data center
• Disasters happen!
“The cost of downtime is $1.1 million per hour for
organizations with more than 1,000 employees, and
even higher for large organizations in selected
industries: $6.5 million per hour for brokerage firms, $2
million for telecom companies, and $1.6 million for
manufacturers.”
“Why Mid-Sized Enterprises Should Consider Using Disaster Recovery-as-a-Service,” Aberdeen
Group, April 19, 2012
Escalating Threat Landscape: Its Everywhere
Escalating Threat Landscape: What is it?
New Attackers• Attackers have a career path• Insiders have unprecedented access
New Techniques• Targeted customized malware, multi-staged, multi-vector, low and slow,
watering holes, hidden C&C channels, etc.
New Targets• Ultimate targets are key intellectual property and critical infrastructure
• The endpoint PCs, servers and gateways that we currently defend are just stepping stones
Public Sector Responsibility
Managing Data
Optimizing Infrastructure
Enabling Efficiency
Technology Transformation
Accelerating Innovation
Initiatives Policy
Data Center Optimization
Cloud Connectivity
FDCCI
Cloud First, 2010: NSTIC, 2004
Threat Protection
Continuous Monitoring, 2012; OMB-14-03 “On-going Authorization”
How does industry change in partnership with government to
get to the right outcomes?
Partnering to address IT Complexity:First, change the game
Realizations
The root cause of IT complexity is the explosion of data
Mindset Shift Just store it Store it AND use it
Data has value for IT, not just the organization
Who can use our data to meet our goals?Fu
nctio
n
Store
How can I store my data for fast access in a cost effective way?
CIO
Classify
How can I understand where content lives and govern it appropriately?
CISO
Protect
How can I ensure that all my businesses are able to run without unneeded risk and exposure?
CEO / CMO
Search & Discover
How can I can discover relevant content while remaining compliant?
CCO/ CRO/ GC
Acting on that Insight: Four Big Ideas to Use our Data
1 Backup as an insurance policy Backup as an asset
Historical Viewing: Going Forward:
2 Recovery focused on components Recovery focused on business services
3 Information silos Intelligent information fabric
4 Connect to SAN Eliminate SAN
Partnering to Address the Threat Landscape:First, change the game
Realization Breach is Inevitable
Mindset Shift From Protection (only) To Protection +
Detection and Response
The new NIST Cybersecurity Framework encodes that mindset shift
Asset mgmt
Business environment
Governance
Risk assessment
Risk mgmt strat
Access control
Training
Data security
Processes
Maintenance
Protective Tech
Anomalies and Events
Continuous Monitoring
Detection Processes
Response Planning
Communications
Analysis
Mitigation
Improvement
Recovery planning
Improvements
Communications
NIS
T Ca
tego
ries
Detect Respond Recover
Func
tion What are my
assets, risks, and business goals?
What are my safeguards to block attackers?
How do I know when a security event has happened?
How do I respond to a cyber security event?
How do I restore services after an event?
Identify Protect
Acting on that insight: Four Big Ideas to Change the Game
1 Alert me only if you’re sure Detect both confirmed attacks and suspicious activities
Our Mantra Before: Our Mantra Going Forward:
2 Detect bad behaviors Detect bad behaviors and anomalies to normal behavior
3 Attack-time protection Attack-time protection and Retroactive detection
4 Big data is an input Big data is the new platform
Centers of Excellence: STAR, DLP, Encryption, Appliances, etc.Plus Key Enablers: Identity, Authentication, Storage
Symantec Integrated Offerings . . .With Technologies Across Teams
Unified Security Ecosystem SYMC + Partners
Unified Information ManagementSYMC + Partners
Information Availability and Intelligence
Backup and Recovery
Information Security
User Protection & Productivity
Point Solutions + Integrated Offering Within Teams
Unified Information ManagementIntegrated Across Store, Protect, Classify, Search & Discover
• “I have more information”
• “I can bring the information together”
• “I make better decisions”
CloudOn-Premise
• “I have more knowledge”
• “I have more expertise”
• “I have sufficient coverage”
• “I’m ready to respond”
Unified Information SecurityIntegrated Across Key Control Points
Symantec Supporting Public Sector