9
MT 39: Best-practice sharing How Dell stays secure and compliant worldwide

Dell best-practice sharing: How Dell stays secure and compliant worldwide - Daines

Embed Size (px)

Citation preview

MT 39: Best-practice sharingHow Dell stays secure and compliant worldwide

Alan DainesChief Information Security Officer (CISO),

Executive Director, Cybersecurity

Welcome

#1 RankedSecurity company in Security 500

30K+ ConcurrentConnections on SonicWALL Aventail

250+SonicWALL Supermassive firewalls deployed

117KSystems encrypted with Credant

63B Dell EventsAnalyzed by SecureWorks monthly

250k Identities managed by D1IM

Top of mind threats

• Identity & Access Management

• Data Loss

• Product vulnerabilities

Dell - Restricted - Confidential6

Organizational Structure

Security Infrastructure

Security Consulting

Governance, Policy & Risk

Cyber Response Services

• 4 components: Network Security, Security Tools, Identity & Directory Services, and Technology Strategists

• Engineering & Operations combined in each component (except Strategists)

• Supported Technologies: Firewalls, IPS, Proxies, DDOS Protection, VPN, Antivirus, HIPS, DLP, PKI, RMS, SIEM, Password Vault, Hard Drive Encryption, Active Directory, Single Sign-On, etc.

• Provides security design/architecture advice for product development, software development, infrastructure deployments, services delivery, and 3rd party relationships.

• Oversees secure development lifecycle utilizing source code analysis and threat modeling.

• 3 Components: eForensics, Threat & Vulnerability Management, and Incident Response

• Key Activities: Litigation Support, Ethics Investigations, Pen Testing, Vulnerability Scanning & Remediation Oversight, Incident Management, 1st Level Security Helpdesk, etc.

• Responsible for Compliance and Risk Management for the IT organization.

• Key Areas: PCI, SOX/Financial Reporting, Self-Assessments, Risk Assessment, Policies & Standards, and Data Classification.

CISO

Securing Dell with Dell – leveraging our strengths

SonicWALL

• 30,000 concurrent users enjoy quick, reliable SonicWall VPN access

• Manage changes across more than 700 firewalls worldwide.

Dell IAM

• Simplifying IAM and automated provisioning using Dell One Identity

• Protection against Insider Threats using Dell Change Auditor

KACE

• Deployed KACE K1000Management Appliance

• Full patch management in Dell’s highly secure, segmented PKIenvironment

DDP | E

• 111,000 Dell endpoints encrypted to keep data safe in case a device is lost or stolen

SecureWorks

• Security monitoring for all Dell Firewalls and IPS

• Monthly 60 billion events monitored for Dell

Q & A

Thanks!