#MicroFocusCyberSummit Preparing for When Your Organization Will be - - PowerPoint PPT Presentation

microfocuscybersummit
SMART_READER_LITE
LIVE PREVIEW

#MicroFocusCyberSummit Preparing for When Your Organization Will be - - PowerPoint PPT Presentation

#MicroFocusCyberSummit Preparing for When Your Organization Will be Breached: Prioritizing and Protecting Paulo Veloso Shogo Cottrell #MicroFocusCyberSummit Whats happening in the market? Approximately 40,000 Tesco Bank accounts were


slide-1
SLIDE 1

#MicroFocusCyberSummit

slide-2
SLIDE 2

#MicroFocusCyberSummit

Preparing for When Your Organization Will be Breached: Prioritizing and Protecting

Paulo Veloso Shogo Cottrell

slide-3
SLIDE 3

98% companies were victims of cyber attack in the year 2016. Ponemon Institute Study

What’s happening in the market?

3

“Approximately 40,000 Tesco Bank accounts were compromised in a cyberattack” November 2016 66% of consumers will stop doing business with a company that has suffered a cyber breach. Study by Centrify

slide-4
SLIDE 4

4

The World is Feeling the Economic Pressures

World Economic Forum – 2018 Global Risk Report

2015

Attack on Ukraine’s power grid shut down 30 substations, interrupting power to 230,000 people

2016

SWIFT attack led to the theft of US$81 million from the central bank of Bangladesh

Today

European Aviation Safety Agency has stated their systems are subject to an average of 1,000 attacks each month

Global interconnectedness continues to expand the attack surface

Top 10 risks in terms of likelihood

#3 – Cyber attacks

slide-5
SLIDE 5

90% CFOs claim cyber-security concerns as the primary reason to implement

new software security tools BDO Survey, 2015

40% increase in

data breach last year

  • Identity Theft Resource Center

Cost of breach as high as

$74 million

  • Ponemon Institute study

5

What is the Impact?

slide-6
SLIDE 6

6

Cyber Risk Increased

The new battlefield Patch or perish Monetization of malware

Vanishing perimeter Perimeter in your pocket Defending interactions between users, apps, and data Back to the basics Unintended consequences Vendor transparency Ransomware ATM-malware Banking Trojans

slide-7
SLIDE 7

Cycle of Security – Breaking the Cyber Kill Chain

slide-8
SLIDE 8

8

slide-9
SLIDE 9

Security Focus Areas – What to Prioritize and Protect

9

ANALYTICS & MACHINE LEARNING APP SECURITY DATA SECURITY SECURITY OPERATIONS IDENTITY & ACCESS ENDPOINT SECURITY

  • Data de-identification

(encryption/tokenization)

  • Key management
  • Hardware-based trust assurance
  • Messaging security
  • Static, Dynamic, & Runtime

application testing

  • Application security-as-a-

service

  • Lifecycle management
  • Patching & containerization
  • Application virtualization
  • Mobile & server management
  • Adaptive Identity governance
  • Adaptive access management
  • Adaptive privileged users
  • Real-time detection
  • Workflow automation
  • Open source data ingestion
  • Hunt and investigation

GOVERNANCE, RISK & COMPLIANCE

  • eDiscovery & Classification
  • Information Management
slide-10
SLIDE 10

Security Focus Areas – What to Prioritize and Protect

10

ANALYTICS & MACHINE LEARNING APP SECURITY IDENTITY & ACCESS

  • Static, Dynamic, & Runtime

application testing

  • Application security-as-a-

service

  • Adaptive Identity governance
  • Adaptive access management
  • Adaptive privileged users

DATA SECURITY

  • Data de-identification

(encryption/tokenization)

  • Key management
  • Hardware-based trust assurance
  • Messaging security

SECURITY OPERATIONS

  • Real-time detection
  • Workflow automation
  • Open source data ingestion
  • Hunt and investigation

ENDPOINT SECURITY

  • Lifecycle management
  • Patching & containerization
  • Application virtualization
  • Mobile & server management
slide-11
SLIDE 11

Identity Powers the Future of IT

Access Identity Insight

  • Governance
  • Provisioning
  • Privileged Identity
  • Self Service
  • Social Registration
  • Unified Identity
  • Roles
  • Analytics
  • Data Security
  • Risk Based Access
  • SSO
  • Privileged Access
  • Federation
  • Multi-Factor
  • Mobile
  • Social Access
  • Analytics
  • Data Security
  • SIEM
  • File Integrity
  • Privileged Monitoring
  • Configuration

Monitoring

  • Change Monitoring
  • Analytics
  • Data Security

Users Devices Things Services Cloud On-Premise Hybrid

Salesforce Workday Office365 SAP … Azure AWS …

slide-12
SLIDE 12

Identity Manager Identity Governance Self Service Password Reset

Identity, Governance & Administration

Identity Management Identity Self Services Governance & Compliance

Identity Powered Security

slide-13
SLIDE 13

Secure Login Access Manager

Access

WebAccess Enterprise Access

Identity Powered Security

slide-14
SLIDE 14

Advanced Authentication

Authentication

Identity Powered Security

slide-15
SLIDE 15

Privileged Account Manager Directory & Resource Administrator Group Policy Administrator

Security Secure Administration

Privileged Accounts

Identity Powered Security

slide-16
SLIDE 16

Sentinel Change Guardian

Reporting and Logging

SIEM

Activity Monitoring

Identity Powered Security

slide-17
SLIDE 17

SIEM Secure Login Identity Manager Advanced Authentication Identity Governance Privileged Account Manager Self Service Password Reset Access Manager Directory & Resource Administrator Group Policy Administrator

Access

WebAccess Enterprise Access

Identity, Governance & Administration

Identity Management Identity Self Services Governance & Compliance

Authentication

Reporting and Logging

SIEM

Activity Monitoring Security Secure Administration

Privileged Accounts

Identity Powered Security

slide-18
SLIDE 18

Security Focus Areas – What to prioritize and protect

18

ANALYTICS & MACHINE LEARNING DATA SECURITY SECURITY OPERATIONS IDENTITY & ACCESS ENDPOINT SECURITY

  • Data de-identification

(encryption/tokenization)

  • Key management
  • Hardware-based trust assurance
  • Messaging security
  • Lifecycle management
  • Patching & containerization
  • Application virtualization
  • Mobile & server management
  • Adaptive Identity governance
  • Adaptive access management
  • Adaptive privileged users
  • Real-time detection
  • Workflow automation
  • Open source data ingestion
  • Hunt and investigation

APP SECURITY

  • Static, Dynamic, & Runtime

application testing

  • Application security-as-a-

service

slide-19
SLIDE 19

19

Best Approach: Build It In

The only way to keep up is to build security into your processes and tools

Source: 1U.S. Department of Homeland Security’s U.S. Computer Emergency Response Team (US-CERT)

22017 Application Security Research Update” by the HPE Software Security Research team, 2017

  • Business requires an increasing number of applications and faster release cycles – hard for

security to keep up

  • Development and security teams are not integrated
  • Tools across different teams are not standardized

Key Concerns

90 90%

Percentage of security incidents from exploits against defects in the design or code of software.1 Percentage of applications containing at least one critical or high vulnerability.2

80 80%

slide-20
SLIDE 20

20

Best Approach: Build It In

The only way to keep up is to build security into your processes and tools

Source: 12017 Ponemon Institute Cost of Data Breach Study

2National Institute of Standards & Technology (NIST)

Solution Discussion

  • The average cost of a security

breach is $3.62M1

  • The key to effective application

security is to build it in to the development process

− Vulnerabilities found in the

production/post-release phase are 30 times more costly to fix than vulnerabilities found earlier in the lifecycle.2

slide-21
SLIDE 21

21

The Only Way to Keep Up is to “Build It In”

Source: “10 Things to Get Right for Successful DevSecOps,” Gartner, Inc., 2017

DevSecOps

Static Code Analysis

Static Code Analyzer (SCA)

Dynamic Application Security Testing Real-time Application Self Protection

Create Plan Verify Preprod Prevent Detect Predict Respond

Continuous Integration Continuous Monitoring Monitoring and Analytics Monitoring and Analytics Continuous Improvement Continuous Deployment Continuous Configuration Continuous Learning

Continuous Delivery

Dev Ops

21

slide-22
SLIDE 22

22

Implementing an End-to-End AppSec Strategy

Web Dynamic Testing (DAST) Runtime Protection (RASP) Static Code Analysis (SAST)

Production

App Defender

Application Development

Test, Integration & Staging

Code Design

IT Operations

WebInspect Management Console Static Code Analyzer (SCA)

slide-23
SLIDE 23

Security Focus Areas – What to prioritize and protect

23

ANALYTICS & MACHINE LEARNING DATA SECURITY SECURITY OPERATIONS IDENTITY & ACCESS

  • Data de-identification

(encryption/tokenization)

  • Key management
  • Hardware-based trust assurance
  • Messaging security
  • Adaptive Identity governance
  • Adaptive access management
  • Adaptive privileged users
  • Real-time detection
  • Workflow automation
  • Open source data ingestion
  • Hunt and investigation

APP SECURITY

  • Static, Dynamic, & Runtime

application testing

  • Application security-as-a-

service

ENDPOINT SECURITY

  • Lifecycle management
  • Patching & containerization
  • Application virtualization
  • Mobile & server management
slide-24
SLIDE 24

Service Desk, Mobile Workspace, Desktop Containers

24

Endpoint Security

Securing the digital workspace

Automation | configuration Single pane of glass Security Compliance User self-services

USER WORKSPACE

Self-services Data BYOD Apps Devices

Self-services Data BYOD Apps Devices User Based

Configuration Management, Endpoint Security, Mobile Workspace, Service Desk, Patch Management, Desktop Containers, Asset Management The ZENworks Control Center / Common End User Portal Asset Management, Patch Management, FDE, Endpoint Security Full Disk Encryption, Endpoint Security, Mobile Workspace, Desktop Containers, Patch Management

slide-25
SLIDE 25

Security Focus Areas – What to prioritize and protect

25

ANALYTICS & MACHINE LEARNING DATA SECURITY IDENTITY & ACCESS ENDPOINT SECURITY

  • Data de-identification

(encryption/tokenization)

  • Key management
  • Hardware-based trust assurance
  • Messaging security
  • Lifecycle management
  • Patching & containerization
  • Application virtualization
  • Mobile & server management
  • Adaptive Identity governance
  • Adaptive access management
  • Adaptive privileged users

APP SECURITY

  • Static, Dynamic, & Runtime

application testing

  • Application security-as-a-

service

SECURITY OPERATIONS

  • Real-time detection
  • Workflow automation
  • Open source data ingestion
  • Hunt and investigation
slide-26
SLIDE 26

Security Operations

Modular, Open, Intuitive

Workbench

Investigation

Real Time Correlation

Event Prioritization

Detection Analytics

minutes 30 days 7 years Reporting

& Compliance

7 years

Message Bus

Connectors

Hunt Exploration Engines

30-180 days

R ML BI Tools

3rd Party

BI Tools

Shared content

UEBA

Data Lake

IT | OT | IOT | Cloud | Physical | Flow Vuln | Intel | Asset | Users Data Sources Temporal Enrichment

Workbench

Investigation, integration, case management

Workbench

Investigation

Risk Prioritization

Archive, Search

Data Sources

(Structured & Unstructured)

+ Control points Security Operations

(On-prem & Managed) Users Cloud Apps Servers & Workloads Network Endpoints IoT Security Analysts Level 1 Security Analysts Level 2 Hunt Team

slide-27
SLIDE 27

From Data Chaos to Security Insight

SIEM Hadoop UBA Advanced Analytics Hunt Visualization OT IOT Physical IT SIEM Hadoop UBA Advanced Analytics Hunt

Visualization

OT IOT Physical IT

Event Broker

Traditional N : 1 Architecture Open N : M Architecture

slide-28
SLIDE 28

More Use Cases More Secure More Sources

Intelligent SOC Solution

slide-29
SLIDE 29

Security Focus Areas – What to Prioritize and Protect

29

ANALYTICS & MACHINE LEARNING SECURITY OPERATIONS IDENTITY & ACCESS ENDPOINT SECURITY

  • Lifecycle management
  • Patching & containerization
  • Application virtualization
  • Mobile & server management
  • Adaptive Identity governance
  • Adaptive access management
  • Adaptive privileged users
  • Real-time detection
  • Workflow automation
  • Open source data ingestion
  • Hunt and investigation

APP SECURITY

  • Static, Dynamic, & Runtime

application testing

  • Application security-as-a-

service

DATA SECURITY

  • Data de-identification

(encryption/tokenization)

  • Key management
  • Hardware-based trust assurance
  • Messaging security
slide-30
SLIDE 30

30

New Best Practice: “Data-centric” Security

Data-centric Security

End-to-end Protection

30 Threats to Data Traditional IT Infrastructure Security Security Gaps

Malware, Insiders SQL injection, Malware Traffic Interceptors Malware, Insiders Credential Compromise Disk encryption Database encryption SSL/TLS/ firewalls SSL/TLS/ firewalls Authentication Management

Data security coverage Data Ecosystem

Data and applications Middleware Databases File systems Storage

Security gap Security gap Security gap Security gap

slide-31
SLIDE 31

Protect your data by using FPE

Live data capture & protection at source Controlled granular access to sensitive data by policy Useful pseudonymised data in applications, storage, analytics…

Governance & Use - central policy controlled granular data access and audit Discovery, Classification, Conversion, Protection

slide-32
SLIDE 32

32

Secure Stateless Tokenization (SST)

  • Stateless - redundancy, failover, scalability are easy
  • Customized token formats
  • Token multiplexing

Credit Card

4171 5678 8765 4321 SST 8736 5533 4678 9453 Partial SST 4171 5633 4678 4321 Obvious SST 4171 56AZ UYTZ 4321 BIN Mapping 1236 5533 4678 4321

slide-33
SLIDE 33
  • Guaranteed referential integrity or fully randomized output by policy
  • Enables data protection and data de-identification from one framework

− Can be used to generate test data for QA, training, etc.

Data Protection with FPE and SST

Name SS# Credit Card # Street Address Customer ID James Potter 385-12-1199 3712 3456 7890 1001 1279 Farland Avenue G8199143 Ryan Johnson 857-64-4190 5587 0806 2212 0139 111 Grant Street S3626248 Carrie Young 761-58-6733 5348 9261 0695 2829 4513 Cambridge Court B0191348 Brent Warner 604-41-6687 4929 4358 7398 4379 1984 Middleville Road G8888767 Anna Berman 416-03-4226 4556 2525 1285 1830 2893 Hamilton Drive S9298273

Name SS# Credit Card # Street Address Customer ID

Kwfdv Cqvzgk 161-82-1292 3712 3486 3545 1001 2890 Ykzbpoi Clpppn S7202483 Veks Iounrfo 200-79-7127 5587 0856 7634 0139 406 Cmxto Osfalu B0928254 Pdnme Wntob 095-52-8683 5348 9209 2367 2829 1498 Zejojtbbx Pqkag G7265029 Eskfw Gzhqlv 178-17-8353 4929 4333 0934 4379 8261 Saicbmeayqw Yotv G3951257 Jsfk Tbluhm 525-25-2125 4556 2545 6223 1830 8412 Wbbhalhs Ueyzg B6625294 FPE FPE FPE FPE SST Name SS# Credit Card # Street Address Customer ID Anna Berman 416-03-4226 4556 2525 1285 1830 2893 Hamilton Drive S9298273

Secured data access under strict policy controls

slide-34
SLIDE 34

34

ANALYTICS & MACHINE LEARNING APP SECURITY DATA SECURITY SECURITY OPERATIONS IDENTITY & ACCESS ENDPOINT SECURITY

  • Data de-identification

(encryption/tokenization)

  • Key management
  • Hardware-based trust assurance
  • Messaging security
  • Static, Dynamic, & Runtime

application testing

  • Application security-as-a-

service

  • Lifecycle management
  • Patching & containerization
  • Application virtualization
  • Mobile & server management
  • Adaptive Identity governance
  • Adaptive access management
  • Adaptive privileged users
  • Real-time detection
  • Workflow automation
  • Open source data ingestion
  • Hunt and investigation
slide-35
SLIDE 35

Thank You.

#MicroFocusCyberSummit

slide-36
SLIDE 36

#MicroFocusCyberSummit