16
GDPR OPPORTUNITY FOR SECURITY TRANSFORMATION 1 © Intel Corporation © Intel Corporation © Intel Corporation GDPR Opportunity for Security Transformation Mo Cashman Director, Enterprise Architects Intel Principle Engineer EMEA

How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 1© Intel Corporation© Intel Corporation© Intel Corporation

GDPROpportunity for Security Transformation

Mo Cashman

Director, Enterprise Architects

Intel Principle Engineer

EMEA

Page 2: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 2© Intel Corporation

Threats Defenses Environments

How is Your Strategy Evolving?

Page 3: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 3© Intel Corporation

Threat Evolution - Changing and Familiar Face of Hacking

Cybercriminals /Organized Crime

Recreational / Vandals

State SponsoredCyberespionage

Cyberattacks

Hacktivism / Reputation Attacks

Page 4: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 4© Intel Corporation

Digital Transformation and GDPR

Increased Attack and Loss

Surface as users go mobile

and businesses become

more data rich

Device and

Data

Proliferation

Increase risk of loss as

more data and services

are moved to or

delivered from the cloud

Cloud

ServicesDevOps

Applications are developed

and put into production with

vulnerabilities that can lead to

data exposure

Page 5: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 5© Intel Corporation

Cloud Services and GDPR

What are the key questions I need

to ask of my CSP?

What are my responsibilities for

security?

I don’t have expertise, I need

security as a service

Page 6: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 6© Intel Corporation

*internal testing **with SIA Partners

Defining Your Journey

Think like an Auditor1

Think like the Attacker2

Think like an Executive3

COMPLIANCE

CENTRIC

FOUNDATION1

THREAT

DRIVEN

OPERATIONAL2

BUSINESS

ALIGNED

TRUSTED3

Page 7: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 7© Intel Corporation

ESM

DETECT – Continuous processes and orchestrated

workflows to identify, analyze and validate key indicators of a

data breach and understand the full scope of a data breach

ADAPT – Orchestrate protection updates and automated

intelligence-sharing to identify or prevent a reoccurrence of

an attack in the enterprise, cloud or industry partnerships

CORRECT – Efficient processes and orchestrated

workflows to contain a breach through pre-planned response

actions such as privilege and data isolation

PROTECT – Continuous discovery and attack surface

reduction against accidental, intentional and unintentional

incidents across enterprise and cloud operating

environments.

Operational Data Security – Capability Strategy

Page 8: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 8© Intel Corporation

Operational Data Security Considerations

Lost

Devices

About 40% of all data

exfiltration incidents are

reportedly carried out

with the use of physical

media.

About 59% of data loss

incidents are the result of

malware or application

exploits from external

attackers

External

Attackers

Employees and

Suppliers

About 57% of data loss

incidents are the result of

accidental or malicious

insider activity

Over 50% of data loss incidents discovered externally!

Page 9: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 9© Intel Corporation

9

Discovery

and

Classification

Identity and

Access

Management

Application

Security

DB DB

Breach

ReportingCompliance

Reporting

Operational Data Security - Key Processes

Page 10: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 10© Intel Corporation

1

0

Covering the Attack Surface

Mobile Devices and

Office Services

Cloud Storage Databases

DB DB

SaaS Services Apps and API

DB DB

Privileges

Cloud ServicesAccidental Device

Loss

Covering Loss Vectors

Policy Violations Malicious

Exfiltration

Insider Threat

Operational Data Security – Prevention Strategy

Page 11: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 11© Intel Corporation

1

1

ADAPTTriage Workflow

Response Actions

Operational Data Security – SOC Strategy

Analytics

Visibility

Remediation

Page 12: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 12© Intel Corporation

1

2

Think Security Outcomes

Protect Critical Environments

Advanced Threat Protection, Detection and Response

Neutralize Advanced Persistent Threats

Threat Protection and Visibility for Datacenter, Cloud servers and apps

Protect Customer and Business Data

1010011101101

0111001001001

10011010101010

101010

Data Loss Protection for Data in Use, At Rest, in Motion anywhere

Optimize Security Operations

Fast Threat Detection and

Response

Page 13: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 13© Intel Corporation

Endpoint Security

Platforms

Intelligence

Security Analytics

Cloud and Network

Security Platforms

Partner Ecosystem

Orc

hestr

ati

on

Think Security Systems

Page 14: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 14© Intel Corporation

Think Collaboration

14

Page 15: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

GDPR – OPPORTUNITY FOR SECURITY TRANSFORMATION 15© Intel Corporation

Call to Action

Opportunity for Real Change

Think Security Systems

Positive Culture

Page 16: How is Your Strategy Evolving? · Persistent Threats Threat Protection and Visibility for Datacenter, Cloud servers and apps Protect Customer and Business Data 1010011101101 0111001001001

Intel and the Intel and McAfee logos are trademarks of Intel Corporation in the US and/or other countries. Other marks and brands may be claimed as the property of others. The product

plans, specifications and descriptions herein are provided for information only and subject to change without notice, and are provided without warranty of any kind, express or implied.

Copyright © 2017 Intel Corporation.