Download - Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Transcript
Page 1: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Driving Digital Transformation While Mitigating Risks And Ensuring Compliance

Terry Ray

SVP and Imperva Fellow

Page 2: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Agenda

2

● Challenges with Digital Transformation

● Traditional Security Approach

● Risk Assessment Approach

● How Imperva can Help

● Q&A

Page 3: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Challenges with Digital Transformation

3

Page 4: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Transformation is Happening

Drive revenue vs. Reduce cost

4

Methods Waterfall Agile DevOps

Architecture Monolithic Tiers Micro-Services

Servers Physical Virtual Containers

Infrastructure Datacenter Hosted Cloud

Methods Waterfall Agile DevOps

Architecture Monolithic Tiers Micro-Services

Servers Physical Virtual Containers

Infrastructure Datacenter Hosted Cloud

Risks

• Unnoticed attacks

• Too much data, EVERYWHERE

• Lack of visibility into who accesses what data, how

• No assurance in existing controls

• Security isn’t part of DevOps

Page 5: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Pressures in Financial Services Industry

Risk Mitigation, Transformation, Compliance

5

Risk Mitigation

Transformation

Compliance • Innovative Fintech

models

• Big Tech

• Open Banking

• Complex legacy system

• Digital application

• Cloud adoption

• More data, EVERYWHERE

• Increased competition

• Stricter regulations

Page 6: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

6

Compliance

Data Breach Risks

Page 7: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute. 7

Why is Detection so Difficult

Incident overload and alert fatigue

54% of companies

admitted that they tend to ignore security alerts2

Lack of skilled security professional

70% of CISOs consider

it their top concern3

Source: 1 https://www.techradar.com/uk/news/the-dangers-of-password-sharing-at-work 2 Security Operations Challenges, Priorities, and Strategies, ESG, 2017 3 What CISOs worry about in 2018, Ponemon Institute, 2018 4 CERT National Insider Threat Center, 2019

Insider threats

Fraud is the most

frequent insider threat incident type for financial services4

More legitimate data access

34% of workers said

they share passwords or accounts with their

coworkers1

Page 8: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Traditional Security Approach

8

Page 9: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Security Spending

Spending in Perimeter-based & Identity-based security continues to grow

9

Page 10: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Challenges of Traditional Security Approach

10

Perimeter-based

Security

Identity & Access

Management • Ex: Endpoint, network security

• False assumption: “Trusted” internal

network where data is safe

• Can’t protect against insider threats

• Fail to empower a digital workforce to

better serve customers while

protecting data

• Ex: User authentication

• Identity-aware is a must but not

sufficient

• Not designed to detect breaches but to

make decisions whether to enable

access

• Can’t protect against insider threats

Page 11: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Data Breaches Still Happen

11

Page 12: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Risk Assessment Approach

12

Page 13: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Taking a Risk Assessment Approach

• Most organizations are evaluating the value of their security investments based on Ability to lower risk

Source: Dark Reading Report, 2018

13

Compliance related

Security related

Page 14: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Example: Gartner Risk Assessment Framework

Source: Develop a Financial Risk Assessment for Data Using Infonomics, Gartner 2018

14

• Get alignment with key stakeholders

• Priority = Identify assets + Assess liabilities

• Security = Mitigate prioritized risks

Page 15: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Example: Gartner Risk Assessment Framework

Source: Develop a Financial Risk Assessment for Data Using Infonomics, Gartner 2018

15

• Start with balancing between business needs and risks

• Don’t jump to security products/solutions

• Enforce consistent policies across

hybrid environment

Page 16: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

To Keep or not to Keep

16

Maintaining and securing data here is a no-brainer

The Problem is:

• Is there any data that you truly

don’t care?

• If so, can you delete it?

Source: Develop a Financial Risk Assessment for Data Using Infonomics, Gartner 2018

Page 17: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Enabling Digital Transformation while Mitigating Risks

17

Page 18: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Data Security is a Must

As the business becomes

digital, security must become

Data-Centric” – Forrester Research, 2018

18

Page 19: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

On-Prem Hybrid Cloud

DATA APIs

APPs

Outside the Organization

External Partners

Customers

Contractors

Bad bots

Hackers

Inside the Organization

Trusted

Internal Partners

Malicious

Careless

Compromised

App & Data Security

WAF (Cloud and On-Prem)

RASP

CDN & LB

DDoS

Bot Protection

API Security

App & Data Security

Data Security

Data Insights

Data Audit & Compliance

Data

Classification & masking

WAF Gateway

RASP

Machine Learning & Analytics

Machine Learning

& Analytics

SIEM

*Internal API Security is planned for 2020

Imperva Security Defense In Depth Architecture

19

Page 20: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Example: Buy Down Risks with Data Security

20

Financial Services

Exposure of 100 million unique customer records (e.g. PII) If a breach happens…

All users in the system have to be notified

A physical mail costs $0.5

Fines (e.g. GDPR non-compliant)

Lawsuit

Loss of clients/vital data/productivity

Damage to reputation

Damage to business relationships

= $50 M

= >$50M

− Single query should not exceed 10,000 PII records

Result: Buying down ~$50M

Limits application

compromise down to

10,000 PII records

Improve breach

prevention

= $20,000

Prevent data breach

risks in non-prod.

environments

‒ Service account abuse

‒ Massive data records access

‒ Sensitive data access

‒ Reduce attack surface in non-production environment

• Data access control

• Identify suspicious data access

• Masking sensitive data

Page 21: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Proprietary and confidential. Do not distribute.

Key Takeaways- Start with What Matters Most

• Do you detect and and mitigate application vulnerabilities?

• Are vulnerable apps taken offline or is the risk accepted?

• Can your organization tolerate a DDoS longer than hours?

• Does your app security strategy up level periodically to detect

changing attack methods (i.e. Crypto-Jacking, ransomware)?

APPS

• Do you know where your sensitive data is?

• Can you tell who accesses what data, and how that data is used?

• Can you determine which data access is appropriate?

• Can you detect suspicious data access with high confidence?

• Do you have the necessary records for incident response?

DATA Compliance &

3rd Party Framework

GDPR

Art 5

Art 25

Art 32

Art 33

Art 34

Art 35

Art 44

PCI

DSS

Req. 2

Req. 3

Req.

6.1

Req.

6.6

Req. 7

Req.

8.5

Req. 10

Req. 12

MAS

TRM 2.0.1

2.0.5

5.1.2

5.1.7

12.1.6

SOX

302

404

409

NIST SANS

NYDFS

HIPAA

FISMA

GLBA

HITECH

CCPA

ISO etc.

Page 22: Driving Digital Transformation While Mitigating …...Proprietary and confidential. Do not distribute. Transformation is Happening Drive revenue vs. Reduce cost 4 Methods Waterfall

Q&A Thank You

22

Terry Ray

[email protected]