Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

26
Insert Your Name Insert Your Title Insert Date Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure? Jason Hart – VP, Authentication and Cloud Visionary, SafeNet - Moderator Panellists: Gargi Mitra Keeling, Group Product Manager, Networking and Security, VMware Jofre Palau, Principal Product Manager, Security, Vodafone Patrick McBride , VP Marketing, Xceedium Leonor Martins, Principal Solutions Specialist, Virtualization & Cloud, SafeNet PANEL SESSION

description

As companies migrate to the virtual datacenter, executives must deal with security, audit, and visibility of their environment which has grown beyond their physical datacenter. Because of this, hesitancy remains and many questions are still being asked. What is a next-gen datacenter? What changes as businesses take steps toward a hybrid datacenter? When they move to a virtualized environment, how does their data remain secured and in their control? Will encrypting data in this environment achieve visibility and control of who is accessing it? Plus despite more knowledge on virtual risks, cloud services are still being purchased without authentication, adopting cloud first and then thinking about security second. So how can organisations win the struggle with authentication in the cloud? Join your fellow professionals for this lively and insightful discussion providing a complete vision on virtual risks in a virtual world. Then understand a way to manage risk, maintain compliance, accelerate and protect business from evolving security threats. Panelists: Gargi Mitra Keeling, VMware; Jofre Palau, Vodafone; Patrick McBride, Xceedium, Leonor Martins, SafeNet Moderator: Jason Hart, SafeNet Watch the full webcast: https://www.brighttalk.com/webcast/2037/73021

Transcript of Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Page 1: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Insert Your Name

Insert Your Title

Insert Date

Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Jason Hart – VP, Authentication and Cloud Visionary, SafeNet - Moderator

Panellists:

Gargi Mitra Keeling, Group Product Manager, Networking and Security, VMware

Jofre Palau, Principal Product Manager, Security, Vodafone

Patrick McBride , VP Marketing, Xceedium

Leonor Martins, Principal Solutions Specialist, Virtualization & Cloud, SafeNet

PANEL SESSION

Page 2: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Introductions

Jason Hart – Moderator. VP, Authentication and Cloud, SafeNet

Panellists: Gargi Mitra Keeling, Group Product Manager, Networking and

Security, VMware Jofre Palau, Principal Product Manager, Security, Vodafone Patrick McBride , VP Marketing, Xceedium Leonor Martins, Principal Solutions Specialist, Virtualization &

Cloud, SafeNet

Page 3: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Agenda

Meeting Format Introduction and Welcome 3 questions for the panel discussion 3 polling questions for the audience

Quick analysis of results

Summary Q & A

Page 4: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?
Page 5: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

With the adoption of cloud and migration to the

virtual data center, do you believe customers are

aware of the virtual risks?

What do you see as the cause of the hesitancy

remaining in customers?

Do customers realise they are in the cloud/hybrid

cloud ie. SFDC, Dropbox etc?

Question 1

Page 6: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Today’s issues

Data breaches are rampant

Data is moving everywhere

The approach to protecting data must change

Page 7: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

State of Data Security

2012: 855 data breach

incidents 174 million

records affected Second-worst

year ever

*Based on a SafeNet Survey of 800+ security professionals.

Source: 2012 Verizon Data Breach Investigations Report

Page 8: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

What are your main concerns or reasons for hesitation to move into the cloud?

Compliance Loss of control Ownership

Polling Question 1

Page 9: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

State of Data Security

Security professionals believe they will suffer a breach.

*Based on a SafeNet Survey of 800 security professionals.

Page 10: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

State of Data Security

Organizations continue to rely on the same technologies.

*Based on a SafeNet Survey of 800 security professionals.

Page 11: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

State of Data Security

Doubt in security industry’s ability to detect and prevent breaches.

*Based on a SafeNet Survey of 800 security professionals.

Page 12: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

State of Data Security

Recognition that if perimeters failed, high value data would not be safe.

*Based on a SafeNet Survey of 800 security professionals.

Page 13: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

A new prescription for the “Secure Breach” era

Introspection

• Its time to try something new…

Acceptance

• You can’t prevent a perimeter breach…

Understanding

• Know your enemies and what they are after…

Action

• Protect What Matters…THE DATA!

Page 14: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

What are your beliefs on a new security paradigm, ie. no perimeter existing and securing the actual data, instead of the vector which no longer exists?

• Breach acceptance and securing the data in view of:

• 800 IT professionals surveyed globally • Survey shows they are continuing to secure the

perimeter and not the data, although they are expecting a breach

Question 2 and discussion points

Page 15: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Verizon’s annual Data Breach Investigations Report (DBIR) published last week

Quoted from the report: 

“Not one breach in this sample happened to data that was ‘in transit’. In fact, two-thirds of breaches involved data ‘at rest’ (in databases and on file servers), and the rest was being processed when compromised.”

Question 2 discussion points

Page 16: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Verizon’s annual Data Breach Investigations Report (DBIR) published last week, 80% of data-breaches could have been eliminated just by using strong-authentication.

Quoted from the report: 

“So, it really comes as no surprise that authentication based attacks (guessing, cracking, or reusing valid credentials) factored into about four of every five breaches involving hacking in our 2012 dataset. …

Question 2 discussion points

Page 17: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

• Many threats are invisible:• insider threats and passwords have been

compromised for a considerable time and the data exposed, without the organisation being aware

Quoted from the Verizon report:  “... 66% of the breaches in our 2013 report took months or even years to discover (62% months, 4% years).”

• What is your view on Killing the Data?

Question 2 discussion cont...

Page 18: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Polling question 2

Where/why do you think your data breach would occur?• Data center/Virtual data center• Unapproved hardware• Weak credentials• Phishing attacks• Insider threat/disgruntled employees

18

Page 19: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Should it be mandatory for a cloud provider to make 2 Factor Authentication an option?

• Cloud alliance sets standards. Should this be a standard?

• Should it be clients choice to enable 2FA?

Question 3 and discussion points

Page 20: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Polling question 3

If you had the option to enable 2 Factor AUT for a cloud application, would you use it?

20

Page 21: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Summary

Where encryption can be deployed

The implications of each of those places

The types of threats associated with those

locations

The importance of Key Management

Page 22: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Protect the target, not the perimeter

Controlling access to resources: authentication

At the core: key management, key vaulting, root of trust

In the data center: databases, applications, mainframes, and storage

Into the cloud: virtual servers, applications and storage

Page 23: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

The Importance of Key Management

Your data is only as secure as your keys

Keys (and data) may have a life of many decades

Disaster recovery support is essential

Policy driven with role management

Key rotation/Rekeying

Secure destruction

Auditing

System recover

If your data is now encrypted, then losing the keys would be a significant and unrecoverable disaster!

Page 24: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Who We Are

Trusted to protect the world’s most sensitive data for the world’s most trusted brands.

We protect the most money that moves in the world, $1 trillion daily.

We protect the most digital identities in the world.

We protect the most classified information in the world.

FOUNDED

1983

REVENUE

~330m

EMPLOYEES

+1,400In 25 countries

OWNERSHIP

Private

GLOBAL FOOTPRINT

+25,000Customers in100 countries

ACCREDITED

Products certifiedto the highest security standard

Page 26: Panel: Virtual World with Virtual Risks. Can it be Cloudy and Clearly Secure?

Thank you for attending

Any questions?