1
CYBERSECURITY: ARE YOU PREPARED FOR WHAT’S NEXT?
January 23, 2018
1
CYBERSECURITY: ARE YOU PREPARED FOR WHATS NEXT? January 23, 2018 1 - - PDF document
CYBERSECURITY: ARE YOU PREPARED FOR WHATS NEXT? January 23, 2018 1 Com Combat ating Cyb g Cyber Thr r Threat ats Cyber Security Seminar January 23, 2018 Dan Desko Eric Wright 1 Eric W Eric Wright ight Technology Advisors
1
3
4
5
6
1. Human error 2. Outside hackers
7
– Stolen User Credentials – User Error – Physical Access – Incorrect Privileges
8
– Firewall technology has come a long way, humans are now the weakest link in your security – Traditional AV alone isn’t great at spotting malware
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
Demand of the network is driving exponentially faster then compute Smartphone is a Trigger Processor Performance
P E R F O R M A N C E DEMAND Network of Users
P E R F O R M A N C E TIME
Code Repositories
Briefcases File Servers GIT
Development
Waterfall Agile Continuous Integration Continuous Development
Programming
Punch Card Tape Object Oriented Web Application
Network
TCP/IP DNS DHCP
Infrastructure
Mainframe Physical X86 Server Virtual X86 Server Container Function
Base Application 1.0 Update 1.1 Update 1.2 Update 1.3 Update 1.4 Application 2.0 Application 3.0 LINES OF CODE A G I L I T Y C O M P L E X I T Y
Application Load Balancing Firewall Backup Replication Hardware OS Compliance
make all of the changes
for running apps developers give
communication
Container(s ) Load Balancing Firewall Code Repository Geographic Distribution Hardware OS Complianc e Rules Analytics Logging Relational Database Key/Value Store Message Queue Scaling Engine CI/C D Global DNS Container(s ) Hardware OS Container(s ) Hardware OS
Server Hardware Hypervisor Guest OS Windows Guest OS Ubuntu Guest OS Centos Libraries Drivers Libraries Drivers Libraries Drivers App 1 App 2 App 3 VM Server Hardware Hypervisor(Optional) Guest OS Linux or Windows App 1 App 2 App 3 Container Docker
Wordpress From Pub Internet on Port 8000 MySQL Hardware Docker Storage and Network
Server Hardware Hypervisor(Optional) Guest OS Containe r Containe r Containe r Container Framework Function 1 Function 2 Function 3 Functions
Packaging Updates Execution Run Time Unit of Cost VM VMDK/VHD Patching Multi‐threaded, Multi‐ task Hours to Months Per VM per Hour/Month Container Container File Versioning Multi‐threaded, single‐ task Minutes to Days Per VM per Hour Function Code Versioning Single‐threaded, single‐ task Microseconds to Seconds Per Memory/Second Per Request
Management Software Hypervisor CPU RAM Disk
Customer Premises
‐ Attend conferences, webinars, and more
‐ Find local groups, attend meetups and seminars ‐ Learn from your peers!
‐ Social media, industry experts, solution providers – learn from us, stay on top of industry trends
‐ Work with partners like Expedient who can help you along the way. While you will own the application, we can help with the infrastructure.
@johna_whit e /in/iamjohn
High Performance Medicine
Source: GSMA Intelligence Source: Northeastern University
Source: IBM Marketing Cloud
Source: WSJ “