Stop Thinking IT Security Think Business Risk! Simon Piff, Vice - - PowerPoint PPT Presentation

stop thinking it security think business risk
SMART_READER_LITE
LIVE PREVIEW

Stop Thinking IT Security Think Business Risk! Simon Piff, Vice - - PowerPoint PPT Presentation

Stop Thinking IT Security Think Business Risk! Simon Piff, Vice President, Security Practice IDC Asia Pacific @spiffatidc www.cloudsec.com | #CLOUDSEC IDC FutureScape: IT Security Products and Services APeJ Implications By


slide-1
SLIDE 1
slide-2
SLIDE 2

www.cloudsec.com | #CLOUDSEC

Stop Thinking IT Security – Think Business Risk!

Simon Piff, Vice President, Security Practice IDC Asia Pacific @spiffatidc

slide-3
SLIDE 3

IDC FutureScape: IT Security Products and Services ‐ APeJ Implications

IDC FutureScape: Worldwide IT Security Products and Services 2017 Predictions – Asia/Pacific Excluding Japan Implications. Doc #AP42209917

3

1 2 3 4 5 6 7 8 9 10

By 2019, 50% of all online transactions will incorporate biometric authentication driven by a ubiquitous technology infrastructure that enables low implementation costs and broad user acceptance. By 2019, more than 75% of IOT device manufacturers will use security and privacy as competitive positioning to capture the attention of security and privacy advocates and earn consumer trust. By 2019, nearly every major multinational corporation with ties to the U.S. or Europe will face significant cybersecurity attacks aimed at disruption of commodities. Over the next two years, 80% of consumers in developed nations will defect from a business because their personally identifiable information is impacted in a security breach. By 2018, 30% of enterprise cybersecurity environments will incorporate cognitive/AI technologies to assist humans in dealing with the vastly increasing scale and complexity of cyber threats. By 2018, 30% of enterprise customers will leverage analytics‐as‐a‐service to help solve the challenge of combing through security related data and events By 2020, cloud security gateway functionality begins to be integrated as part of web service offerings to entice IT leaders to move offerings to the cloud. By 2020 30% of U.S. broadband homes will have at least one IP enabled home automation

  • r security monitoring sensor/device

Reactive security services such as Incident Response and Forensics services will marginally increase by 2020 but still overshadowing proactive services By 2025, on premises security management will be a thing of the past subsumed by SaaS security and Network‐based security. TIME (MONTHS) TO MAINSTREAM ORGANIZATIONAL IMPACT

A single department

  • r a business

unit Multiple departments

  • r business units

Companywide 0‐12 12‐24 24+ Cloud Security Gateways Biometric Authentication Consumer PII Cloud, Hosted, & SaaS Security Services Analytics‐as‐a‐Service IOT Security and Privacy Incident Response Retainers Cyberattack Disruption IP enabled Home Automation Cognitive Cybersecurity

2 1 4 5 6 9 10 3 7 8

Doc #AP42209917

slide-4
SLIDE 4

Getting Past The Eye Test (on Previous Slide)

  • Mobile biometrics
  • IoT
  • Cyber‐terrorism/warfare
  • Consumer reaction
  • Machine learning/ AI
  • Analytics
  • Cloud security
  • Incident response and

Forensics

  • Security as a service
slide-5
SLIDE 5

So Much For The Future. What about today?

slide-6
SLIDE 6

43.8% 40.2% 9.2% 6.1% 0.7%

Naïve Novice Employ basic operational security measures and act on security needs as they arise

Reactive Responder Full-time staff address most significant security requirements but look to external sources to provide guidance in compliance-

  • riented program

Compliant Companion S

  • lid security program and control

framework address all regulator needs and internal risk assessments Proactive Partner Robust security program with strong compliance and early exploration of the cost effectiveness of solutions Predictive Professional Risk recognized as an element

  • f overall business value

proposition for technology, and the security strategy approach seeks most efficient and effective ways to manage enterprise security

Business Outcome Organization unknowingly accepts large risks that leave it extremely vulnerable Business Outcome Organization keeps auditors at bay but can be challenged in a breach scenario and

  • verspends on

ineffective measures Business Outcome Organization invests significant resources and money but has difficulty describing value proposition in strategic terms Business Outcome Organization successfully manages risk but lacks understanding of critical overarching business context Business Outcome Organization has an efficient and effective economics driven security strategy, including risk returned per unit cost, for entire portfolio

n= 852

IDC IT Security MaturityScape Benchmark Report ‐ APeJ

  • 84% at

Stage 1&2

slide-7
SLIDE 7

42.5% 51.5% 4.6% 1.3% 0.1%

Naïve Novice Employ basic operational security measures and act

  • n security needs as they

arise Reactive Responder Full-time staff address most significant security requirements but look to external sources to provide guidance in compliance-

  • riented program

Compliant Companion S

  • lid security program and

control framework address all regulator needs and internal risk assessments Proactive Partner Robust security program with strong compliance and early exploration of the cost effectiveness of solutions Predictive Professional Risk recognized as an element of overall business value proposition for technology, and the security strategy approach seeks most efficient and effective ways to manage enterprise security Business Outcome Organization unknowingly accepts large risks that leave it extremely vulnerable Business Outcome Organization keeps auditors at bay but can be challenged in a breach scenario and

  • verspends on ineffective

measures Business Outcome Organization invests significant resources and money but has difficulty describing value proposition in strategic terms Business Outcome Organization successfully manages risk but lacks understanding of critical

  • verarching business

context Business Outcome Organization has an efficient and effective economics driven security strategy, including risk returned per unit cost, for entire portfolio

IDC IT Security MaturityScape Benchmark Report - India

  • 94% at

Stages 1&2

slide-8
SLIDE 8

8

Source: IDC Asia/Pacific C-suite Barometer Research 2017 India

31.4% 19.4%

slide-9
SLIDE 9

The Critical Issue for all organizations

  • It’s not about IT security – this limits the view

and places all the resolution onto over‐stretched IT teams.

  • It is about Business Risk – this engages the

business units, the executive and the board, and helps define the role IT play in the process.

slide-10
SLIDE 10

Attacks are Everywhere!

slide-11
SLIDE 11

A Highly Transformed Industry

  • Niche engineers design advanced products
  • One organization employs hundreds of malware designers, linguists and
  • ther professionals
  • Key products will the keyboard language before choosing to execute, or not
  • Avoidance technology embedded in many “applications” (seeking bare metal, and not a

VM before executing

  • Use social engineering for targeted campaigns
  • Extensive use of big data and analytics to identify further opportunities
  • Delivers 24x7 helpdesk support
  • Offers a range of offerings “as a service”
  • Leverages Cryptocurrency for global transactions
slide-12
SLIDE 12

However … old habits die hard

slide-13
SLIDE 13

Distributed Integrity

Endpoint, AV, firewalls, patches, Monitoring, analytics, IDS, DLP, user training, 2FA, gateways, tags and tethers micro-segmentation

Prevention Detection Mitigation

Mesh, Hub & Spoke. More process driven than technological

Response

IT response Crisis Management response Legal mitigation, press & PR strategy

slide-14
SLIDE 14

Essential Guidance

slide-15
SLIDE 15

Re‐Format the Issue

  • It’s not IT security. It’s what IT can do to limit business risk
  • Engages other parts of the organization that need to have a stake
  • Ensure the CEO/Board understand there is no such thing as being

connected, and 100% secure

  • Drives the conversation from protection, to risk management and mitigation
  • IT security has at least two distinct mindsets
  • Hunters – who are constantly tasked with seeking threats across the internal

systems

  • Remediation team – who respond to and remediate the threats that the

Hunters detect

slide-16
SLIDE 16

Military Spending

The funding model for IT Security is more akin to Military Spending that traditional IT metrics of ROI

slide-17
SLIDE 17

Understand Your Unique Environment

  • What is at stake for the business?
  • Legislative compliance
  • Core Intellectual Property
  • Personally Identifiable Information (customers, employees, partners)
  • Business Continuity
  • Understand the Threatscape
  • What do you own that is of value to the hacking community?
  • How equipped are you to protect this from a persistent threat?
  • How well do you monitor you internal systems and critical employees?
  • What level of access do you provide to customers, partners and contractors?
slide-18
SLIDE 18

Resourcing!!

  • The future is SecDevOps
  • Embed security at the outset, no more bolting‐on after the fact
  • Chief Security Officer
  • Have one!
  • Not reporting into IT!
  • The “Hunter” team only reports into the CSO (Remediation team is part of

the CIO, COO remit)

  • CEO engagement
  • If the CEO does not have a KPI for security, then it will never get the attention

it requires

slide-19
SLIDE 19

Changing the Rules

  • Business continuity and data integrity
  • Compliance is not the goal, compliance is part of the journey to excellence
  • Risk appetite of the business is in a constant state of flux
  • Consider re‐evaluation of key risk indicators for Digital Security
  • Control efficacy that leverages well‐established concepts like confusion matrices and

sensitivity and specificity measures to compare controls.

  • Infection/compromise rate to identify the number of infections per individual assets, such as

endpoints.

  • Controls per transaction that identifies the number of inline security tests performed on

average for every event on the network.

  • Incidents per billion events to identify the number of unwanted outcomes that occur for

every billion events evaluated.

  • Relative risk ratio of one environment to another, again leveraging established concepts in

epidemiology.

slide-20
SLIDE 20

St State Of Of Wa War Has Has Been Been Declar Declared ed

  • The bad guys are not playing by the
  • rules. This is a particular problem

because security as a whole is too reactive and slow to adapt.

  • We need to do a better job at

protecting ourselves.

20

Eric Michael O'Neill is an American former FBI counter‐terrorism and counterintelligence operative

slide-21
SLIDE 21

www.cloudsec.com | #CLOUDSEC

THANK YOU

Simon Piff, Vice President, Security Practice IDC Asia Pacific spiff@idc.com