cyber event prepers

10
Effective Strategies for Managing Cyber Security Risks 06/17/1 5 1 NTE Business Services LLC Owner Independent Agent for IT 585-314-1824 My Digital Link LLC Reseller CTO Next Generation IT Specialty 585-314-1824 With credits to: 1- paloalto NETWOR KS 2- Aruba Networks 3- DataGravity 2 - Nutanix

Upload: norm-erwin

Post on 16-Aug-2015

101 views

Category:

Data & Analytics


1 download

TRANSCRIPT

Effective Strategies for ManagingCyber Security Risks

06/17/15 1

NTE Business Services LLCOwnerIndependent Agent for IT585-314-1824

My Digital Link LLCReseller CTONext Generation IT Specialty585-314-1824

With credits to:1- paloalto NETWORKS2- Aruba Networks3- DataGravity2 - Nutanix

1980s

Cloud Generation

Client-Server Generation

Virtualization Generation

The Evolution to Generation CLOUD

Public Cloud

x86

2000s 2010>

x86 x86x86 x86 x86

x86 x86x86

Intelligent Software

06/17/15 2

1990s

Cloud Generation

Client-Server Generation

Virtualization Generation

INTRUSION 1.0 - Circa 1970 - 2000

Public Cloud

x86

2000s 2010>

x86 x86x86 x86 x86

x86 x86x86

Intelligent Software

PORTS

PROTOCOLS

IP ADDRESSES

06/17/15 3

The Cyber-Kids of Yesterday

06/17/15 4

• Simplistic• Competing for Street Cred• Honing Skills• Having Fun• Signature Based Attacks

1990s

Intrusion 2.0

2000s 2010>

x86

PP

• Hop from Port to Port• Traffic Encryption• Exploiting Open Ports• Tunneling through

approved applications

State of the Art(and Acceptable)

CLOUD

06/17/15 5

Modern Day Cyber Threat Actors

06/17/15 6

• Nation States

• Organized Crime

• Well Financed

• Global Actors

• Cyber Warfare

• Internal & Experts

• Zero Day Malware

• Polymorphic Protocols

• Embedded Malware

• Command & Control Protocols

Sophisticated Weapons

AttacksAttacks

Mobility Factor

Virtualization Generation

x86 x86x86

PP

PUBLIC CLOUDPrivate Cloud

Payroll

HR Benefits

Traditional DATA CENTER

BYOD

Visitors

??

MS ExchangeCollab Site

??

??

06/17/15 7

Cyber Security 2.0

06/17/15

8

PORTS

PROTOCOLS

IP ADDRESSES

PRIVATE – PUBLIC – CLOUD

WORK – MOBILITY - PERSONAL

Preparing for Cloud Security

06/17/15 9

• Engage External Providerso Due Diligence / Cloud Provider o Deep Analytics Services Provider

• Establish Detection / Response Team

• Create / Elevate CISO Function

• Include Mobility

• Engage / Select Vendor-Partnerso Strategic Relationshipo Roadmaps Reviews

• Time is of the essence

Call to Action

Effective Strategies for ManagingCyber Security Risks

A Cloud Services Perspective

06/17/15 10

NTE Business Services LLCOwnerIndependent Agent for IT

My Digital Link LLCReseller CTONext Generation IT Specialty