Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015...

40
Security Intelligence for business data and IS protection Andris Soroka 10.11.2015, Vilnius Riga, Latvia

Transcript of Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015...

Page 1: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Security Intelligence for business data and

IS protection

Andris Soroka10.11.2015, Vilnius

Riga, Latvia

Page 2: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

“Data Security Solutions” business cardWhat We Do?

DSS

Cyber Security

OnlyFull IT

Security Services Lifecycle

Most Innovative Portfolio in

BalticsMember–

ships, Awareness

Rising

Technology &

Knowledge Transfer

ICT Security

Evangelists

Endpoints

Applications

Networks

Data

Identity

Mobility

Managem

ent

Cloud

Page 3: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

DSS Global Partnerships

Page 4: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

DSS Delivering Excellent ICT Security Operatitions to its Customers

Customer ICT Security

Operations Excellence

Cooperation with Industry

Top Technology

Leaders Recognised by Gartner, IDC,

Forester

Top level ICT

Security Professiona

ls

Selected Cutting Edge ICT Security Innovative

Technology Integration

Pan-Baltic

Projects

Particular Focus

on Securit

y

Page 5: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Our international cyber security conference 6th annual since 2010

70+ presentations

8 parallel sessions

700 on-site visitors

2500 online watchers

http://event.dss.lv

Page 6: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Remarks from Cybersecurity Month - October

Page 7: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Future is now. We live in future.3D Printers (Terminator 2 style)Google Glasses (..and “glassh**es)Cloud ComputingBig Data & Supercomputers (quantum)Mobile Payment & Virtual MoneyeCasino’s, eBetting, eShops, eAnythingRobotics and Intraday DeliveriesInternet of things & smart citiesAugmented RealityExtreme development of App’sDigital prototypingGadgets (devices) & MobilityTechnology replaced jobs (automation)Geo-location powerBiometricsHealth bands and mHealthElectronic carsAvegant Glymph and much, much more

Page 8: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Opportunity every business should see and seek

Page 9: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Trends of the digital future

Page 10: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Cyber security future is now ..

Page 11: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November
Page 12: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

The Raise of Threats and Attacks

Source: IBM X-Force Threat Intelligence Quarterly – 1Q 2015

Attack types

201240% increase

2013800,000,000+ records

2014Unprecedented impact

XSS SQLiMisconfig. Watering Hole

BruteForce

Physical Access

Heartbleed Phishing DDoS Malware Undisclosed

$6.5Maverage cost of a U.S. data breachaverage time to detect APTs

256 daysSource: 2015 Cost of Data Breach Study, Ponemon Institute

Page 13: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Sophisticated attacks of today’s cybercrimeTargeted professional attacksMassive Denials of ServicesWatering hole attacksAdvanced persistent threatsMobile incidentsCyber warsHacktivistsGlobal virus outbreaksShadow IT and dark netInsane data leakagesIdentity theftsCyber espionageAnd so on...

Page 14: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

“You take the blue pill, the story ends. You wake up in your bed and believe whatever you want to believe. You take the red pill, you stay in wonderland, and I show you how deep the rabbit hole goes.”

~Morpheus @Matrix

Page 15: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Rabbit hole versus wonderland...Blue pill option e.g. «wonderland»

Don’t invest nowBelieve in security of Your data&IS’sIgnore it all despite reality to contrary

that every business is affected

Red pill «rabbit hole»Stop functioning under illusion of

securityImplement effective and innovative

security technologiesLearn how deep rabbit hole goes...

Page 16: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Impact of Cyber Security Risks to «C’s»

Loss of market share and reputation

Legal exposure

Business continuity

Audit failure

Fines and enforcement impact

Financial loss

Impact to data and systems,

(confidentiality, integrity and / or availability)

Violation of employee

privacy

Loss of sensitive data

Loss of customer

trust

Loss ofbrand reputation

CEO / COO CCO / CFO CIO CHRO / CDO CMO

Your board and CEO demand a strategy

Page 17: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Political (external and internal)

Technological (risks, threats, fraud, attacks, leaks)

Economical (budget reality, competition, costs…)

Legal (compliances, regulations etc.)

Professional (HR, information quantity)

Psychological ( traditions / knowledge / trust)

Challenges of CIO’s & CSO’s

Page 18: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November
Page 19: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Security myth #2 – old security works well

Page 20: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Compliant and secure are two different things....

Compliance does great job to help elevate awareness of security concerns

And also help to enforce minimum baseline standards

However checking right boxes to get through every next audit leaves organization exposed to any new technologically advanced threat, sophisticated targeted attack and so on

If organization has automated risk management (GRC) solution in place that’s also significantly better than a manual teamwork (XLS’s)

Page 21: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November
Page 22: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Cyber Criminals Also Use BI or MIS Dashboards

Page 23: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Every example in main stream movies now

Page 24: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Summary before «silver bullet»Cybercrime is real deal, everyone is affected and it is

next door if haven’t been knocking at Yours already yet – and you do not want to get famous...

All traditional securities invented decades ago aren’t any more efficient, as well all compliances, regulas and security standards without innovative technologies and investment in cyber security always remain one step behind bad guys

World is short on enough smart good guys that know both – business and IT security – and can translate IT into business language and manage the risks with ellegance

Don’t take blue pill – that might cost lot more later

Page 25: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

How to establish security as imune system?Security Intelligence & Integration is

mandatory

HR training / awareness raising (corporate cyber security driver’s license)

Compliance and risk management

Cyber Security as business enabler

Page 26: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Business partBusiness processes analysis from tech perspectiveAssessment and management of cyber security risks

Related technological part Inventory of devices and softwareSecure configuration of everything (end-users, devices)Vulnerability assessment and managementMalware defenses, application security, pen testsWifi securityMobile securityData securityContinuos skills training and learningAccess control and visibilityAudit, monitoring, analysis, incident response and more

Business & technology common risk language

Page 27: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Complexity of security challenges

Page 28: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Prevent. Detect. Respond.

Page 29: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

LogManageme

nt

Security Intelligence

Network Activity

Monitoring

RiskManageme

nt

Vulnerability

Management

Network Forensics

Page 30: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

SuspectedIncidents

Prioritized Incidents

Servers and mainframes

Data activity

Network and virtual activity

Application activity

Configuration information

Security devices

Users and identities

Vulnerabilities and threats

Global threat intelligence

Extensive Data Sources

AutomatedOffenseIdentification

•Massive data reduction (millions to one)

•Automated data collection, asset discovery and profiling

•Automated, real-time, and integrated analytics

•Activity baselining and anomaly detection

•Out-of-the box rules and templates

Embedded Intelligence

Security intelligence for automated offense detection

Page 31: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Our proposal with Security Intelligence & IntegrationAdvantages and immediate gains

Intelligence & Visibility (real time risk identification and management, continous automated audit, forensics, increased quality of services, alerts, privilleged users control, real time topology&inventory etc.)Centralized intelligent storage (of business, user, IT event data for auditors, reports, improved analysis of anythingCurrent and future costs saving (technology and HR efficiency perspective)If used now of in future as integrated solution – the whole SOC (security operations centre)

Page 32: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November
Page 33: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Integrated and Intelligent – IBM Security Systems

Page 34: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Our proposal with Security Intelligence & Integration

Page 35: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

How we can helpAnalyze and detect risksFulfill auditBuild security action planTrain the employeesPass compliance regulationsSave from data leakageProtect critical assetsGet rid of passwordsConsult Your professionalsProtect from attacksHelp creating RFP docs

Be Your IT Security Advisor!

Business value of «Data Security Solutions»

Page 36: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Balancing costs and risk – floods happen..

Page 37: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Our vision and goal for our Customers!

Page 38: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Contact UsAndris [email protected] Mob. +371 29162784Riga, Latviawww.dss.lvLinkedIn: http://lv.linkedin.com/in/andsor Twitter: @andris_soroka / @dss_it_securityFacebook: http://www.facebook.com/lvdss Youtube: http://ow.ly/FAfENSlideShare: http://www.slideshare.net/andsor

Page 39: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Thank YouMerci

Grazie

Gracias

Obrigado

Danke

Japanese

English

French

Russian

GermanItalian

Spanish

Brazilian PortugueseArabic

Traditional Chinese

Simplified Chinese

Thai

Korean

Page 40: Data Security Solutions - Cyber Security & Security Intelligence - @ Lithuania CIO Forum 2015 November

Think Security FirstThank you