30
0 DRAFT © Copyright FUJITSU 2017 Advanced cyber-threats need advanced solutions Andy Herrington Darren Thomson

Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

0DRAFT © Copyright FUJITSU 2017

Advanced cyber-threats need advanced solutions

Andy Herrington

Darren Thomson

Page 2: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

1DRAFT

Page 3: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

2DRAFT

Page 4: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

3DRAFT

Page 5: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

4DRAFT

Page 6: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

5DRAFT

Sector Specifics

Automotive Telematics

In-vehicle entertainment

Navigation

Safety services

Concierge services

Remote diagnostics

Personalized insurance

Manufacturing Supply chain

management

Geo-fencing

Machine diagnostics

Inventory control

Industrial automation control

Equipment monitoring

Retail & Finance Smart payments,

cards

Point of Sale terminals

ATM

Vending machine monitoring

Digital signage and electronic billboards

Healthcare Home healthcare

and hospital patient monitoring

Remote telemedicine & physician consultation

Body sensor monitoring

Utilities Meter reading

Industrial controls

Pro-active alerts

Smart Grid applications

Remote temperature control

Consumer Services Smart home

appliances

Connected home

Video feed monitoring

Page 7: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

6DRAFT

Applications and Data Are Moving to The Cloud

Salesforce

Box

MicrosoftOffice 365

Amazon Web Services

Azure

Page 8: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

7DRAFT

Privacy Most Important When Customers Choose Products or Services

Delivering great customer service 82%

Delivering quality products / services 86%

Keeping your data safe and secure 88%

Being environmentally friendly 56%

Treating their employees and suppliers fairly 69%

Page 9: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

8DRAFT

Consumer Trust and Technology

69% 66%

45%

22% 20%

10%

Hospitals / medicalservices

Banks Government Technologycompanies (i.e.

Google, Microsoft)

Retailers (Includingonline shops)

Social media sites(i.e. Facebook,

Twitter)

Organisations whose business models are based

on data (tech companies and social media

companies) appear less trusted to keep customer data completely secure

Data Trust Chain

Page 10: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

9DRAFT

Cloud Security Considerations

Ensure Governance and Compliance

Protect Cloud Interactions

Protect Information

Protect & Manage Infrastructure

9

Private

Public / IaaS

Public / PaaS

Public / SaaS

Page 11: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

10DRAFT

It’s all good, it’s all under control…

Page 12: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

11DRAFT

…. mostly

Page 13: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

12DRAFT

What should the focus be – objectivity

“It’s all about organisational objectives .. but it always has been”

The object is still to be more successful than your competitors.. It’s just that the ecosystems have evolved out of all recognition:

Organisational complexity Permeability Pace Loss of direct control Barriers to entry for challengers lowered Opportunities for change

The risk surface is expanding… and there is no sign it is about to let up

anytime soon.

Page 14: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

13DRAFT

Next Gen Threat – is it new and improved?

Non-malicious Malicious

External

Internal

• Accidental Pen test (Wrong IP block entry)

• Accidental service provider take-down

• Failure of service provision

• External attacks to penetrate• External attacks to disrupt• Reputational attacks• Ransom / Blackmail• Phishing• Business E-mail Fraud

• Mistake• Out of band /out of policy /

out of procedure change• Upstream take down /change

affecting other dependent systems

• Vendetta!• Disgruntled employee• Legitimate insider route

for malicious intent• Paid to share / reveal• Blackmail

Old World – one of the below … usually cock-up or attack

New World – all of the above… plus hostile presence

Page 15: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

14DRAFT

Taking a different approach

Page 16: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

15DRAFT

Symantec and Fujitsu together deliver Intelligence Led

Security

Integrated Cyber Defence Platform

Local

Intelligence

File

UR

L

Whi

telis

t

Bla

cklis

t

Cer

tific

ate

Mac

hine

Le

arni

ng

On

Pre

mis

es

SIEM Integration

Data Center

Security

EncryptionContent

Analysis

Web Protection

Performance

Endpoint Cloud

Cloud Web

Protection

VIP

Identity

Cloud

DLP CASB

Managed

PKIMessaging

Data Center Security

Cloud Sandbox

Cyber Security Services

Encryption

Compliance Advanced Threat ProtectionEndpoint

Encrypted

Traffic

ManagementDLP Security

Analytics

Management Malware Analysis

SOC Workbench

Third Party Ecosystem

Clo

ud

Enterprise & Cyber Security

Page 17: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

16DRAFT

How Fujitsu can help

Technical Professional Services

Advisory Consulting Services

Architect, design and implementation of Third Party Alliance Partner Security technologies.

Independent, objective advice to support our customers in understanding security requirements and setting the strategy to

address them. Consultants discuss Business problems and work

with you to define enhanced Business solutions addressing security needs

Page 18: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

17DRAFT

What does this look like?

‘Build it in’ … we are getting to the point where it is not possible to ‘bolt it on’

Orchestration … knowing when to take greater care and integrating activities

Dynamic .. Expect to change … plan for change

Hygiene & Resilience … sensible cleanliness and ‘business immune systems’

Looking for the needle in the stack of needles

Biomimicry and the rise of the machines

Paradox: Going faster over unknown ground

Most important - the ability to take a step back and gain a further levelof context to the decision making process.

Page 19: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

18DRAFT

Page 20: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

19DRAFT

Complications of Cloud Adoption

• Who Owns the Comprehensive Service Level Agreements

• Single Pane of Glass?

• Redundancy & High-Availability?

• Vendor Compatibility?

Innovation for the Cloud Generation

Cloud Web Gateway

Provider

Cloud DLP Provider

Cloud Data Encryption

Provider

Cloud Access Control

Provider

Cloud SandboxProvider

Cloud Breach Analysis

Cloud Forensic / Recording

Cloud EmailScanning

Cloud DDoS

UBA

Industry Has Created Cloud Security Chaos

Page 21: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

20DRAFT

Visibility

Authentication

Data Protection

Secure Environment

Adaptive Security

Automation

Ease of Use

…know what is running / stored where…

…ensure only right users can access the right apps/data…

…safeguard my data everywhere and at all times…

…ensure the environment is protected from malware and advanced threats…

…security stays in-sync and scales with my constantly changing Cloud environment…

…be able to automatically apply the right security with minimal human intervention…

…manage my complex hybrid world from single control point…

Gaining Control of the Cloud

Page 22: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

21DRAFT

Building An Integrated Cyber Defence Platform

For The Cloud Generation

Page 23: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

22DRAFT

Secure Web

Gateway

Endpoint Protection

EDR

Endpoint Cloud

File

UR

L

Wh

ite

list

Bla

cklist

Cert

ific

ate

Ma

ch

ine

L

ea

rnin

g

Cloud Secure Web

Gateway

Email Security

Page 24: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

23DRAFT

Secure Web

Gateway

Cyber SecurityServices

Endpoint Protection

EDR

Endpoint Cloud

LocalIntelligence

File

UR

L

Wh

ite

list

Bla

cklist

Cert

ific

ate

Ma

ch

ine

L

ea

rnin

g

Cloud Secure Web

Gateway

Email Security

ON

P

RE

MIS

ES

CL

OU

D

Page 25: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

24DRAFT

Secure Web

Gateway

Cyber SecurityServices

Endpoint Protection

EDR

Endpoint Cloud

LocalIntelligence

File

UR

L

Wh

ite

list

Bla

cklist

Cert

ific

ate

Ma

ch

ine

L

ea

rnin

g

SIEM Integration

Cloud Secure Web

Gateway

Email Security

Third Partys

ON

P

RE

MIS

ES

CL

OU

D

Page 26: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

25DRAFT

Secure Web

Gateway

Cyber SecurityServices

Endpoint Protection

EDR

Endpoint Cloud

LocalIntelligence

File

UR

L

Wh

ite

list

Bla

cklist

Cert

ific

ate

Ma

ch

ine

L

ea

rnin

g

SIEM Integration

Cloud Secure Web

Gateway

Email Security

Third Partys

ON

P

RE

MIS

ES

CL

OU

D

SOC Workbench

Page 27: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

26DRAFT

DLPSecure Web

Gateway

RiskInsight

Secure Mail Gateway

Web Application Firewall

Advanced Threat Protection

MalwareAnalysis

Cyber SecurityServices

IT SystemManagement

Endpoint Protection

EDR

Endpoint Cloud

VIP

Identity

LocalIntelligence

File

UR

L

Wh

ite

list

Bla

cklist

Cert

ific

ate

Ma

ch

ine

L

ea

rnin

g

SIEM Integration

Data CenterSecurity

EncryptionContent Analysis

Performance Optimization

Cloud Secure Web

GatewayCloud DLP CASB

Managed PKI

Email Security

Data Center

Security

Cloud Sandbox

WebsiteSecurity

Encryption

Compliance Management

EncryptedTraffic

ManagementSecurity Analytics

SOC Workbench

Third Partys

ON

P

RE

MIS

ES

CL

OU

D Cloud Data

Protection

Integrated Cyber Defence Platform

Page 28: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

27DRAFT

182Mweb attacks

blocked last year

Discovered

430 millionnew unique pieces

of malware last year

12,000+Cloud

applications

discovered and

protected

Innovation for the Cloud Generation:Protecting Against Advanced Threats – Global Intelligence Network

175MConsumer and

Enterprise endpoints protected

9 global threat response centers

with

3000 Researchers and Engineers

2 Billionemails scanned per

day

1 Billionpreviously unseen

web requests scanned daily

Cloud Global Intelligence

Sourced From:

100Msocial engineering

scams blocked

last year

1Bmalicious emails

stopped last year

Page 29: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

28Copyright © 2017 Symantec Corporation

Ensuring Safe Cloud Usage

RegionalOffice

Headquarters Data Center

RoamingUsers IOT DevicesPersonal Devices

Page 30: Advanced cyber-threats need advanced solutions 17 session 1 - advanced cy… · Cyber Security Services Encryption Endpoint Compliance Advanced Threat Protection Encrypted Traffic

29DRAFT