dbs2016: the digital transformation of security

17
© 2016 Information Services Group, Inc. All Rights Reserved.

Upload: information-services-group-isg

Post on 06-Jan-2017

90 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Page 2: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Jim Hurley, Research Director, ISG Insights

The Digital Transformation of SecurityWhat the CIO Needs to Know

Page 3: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Agenda

1. Enterprise Security Today2. IoT and Boom!3. Why Deception Fabrics4. Why Cloud “Security as a Service”5. Why Data Science and Security6. Summary and Guidance

Page 4: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Enterprise Security TodayFragmented on-premises technical controls resulting from cleaning up yesterday’s successful threats – up and down the technology stack – and across procedural control towers

Technology controls stack

Users Applications Data Networks Devices

Process control towers Identity Access Detect Respond Recover Comply

Page 5: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Enterprise Security Today

Detect &recover

Identify & prevent

Security is

1. Too fragmented

2. Too reactive

3. Always recovering from Boom!

Boom!

Page 6: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Enterprise Security Today

Detect &recoverBoom!

When is boom! heard, on average?A.Never?B.220 days later?C.143 days later?D.A month to a week

later?E. A day later?F. As soon at it happens?

Page 7: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Enterprise Security Today

RATPhishing

Drive-by injection

XSS

TrickbotMambaQuadrooter

Mirai

Hancitor

Fairware

Angler

Banking trojanIt’s all about Boom!

Page 8: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Going Beyond Boom!

Strategic TechnologyIoT

Deception fabrics

Cloud

Data science

ImpactBoom! Gets BIG!

Put attackers on defense

NexGen Security – Today

Security ~ Predictive

Page 9: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

IoT Boom!

What to Do?1.Move out of harms

way?2.Re-Solve the problem!

IoT Boom!

Page 10: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Deception Fabrics – Put Attackerson the Defensive

Example providers: Acalvio, Attivo Networks, Cymmetria, Guardicore, Illusive Networks, SafeBreach, TopSpin Security, TrapX,

Deception fabrics

Decoys

Alerts on ALL Booms! Real-time Mimics the environment Lures/decoys augment reality Touched lures/decoys – 100%

bad 0% false positives Scalable, On-prem and Cloud

Page 11: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Where Deception Fabrics Fit

Whatabout?

IdentityAccessRespondRecoverComply

Cloudbaseddigital

deceptionfabrics

Page 12: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Identity Access Detect Respond Recover Comply

NexGen “Security as a Service”

Stop Managing TechStart Managing Risk and SaaS Vendors Better and more

comprehensive coverage Integration up and down

the tech-stack Integration across

procedural towers Reduces CapEx Pay as you use Reinterpretations of

existing tech-controls

Clouddigital

deceptionfabrics

Cloud SOC &

RespondCloud

BU & DRCloud

complyCloud IAMClouddata

protection

IN and FOR the Cloud

TO the Cloud FROM the Cloud

Page 13: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Data Science and Security

SIEM: Yesterday’s orchestration Log collection Log analysis Event correlation Log forensics IT compliance Log monitoring Auditing

Real-time alerting User activity

monitoring Dashboards Reporting File integrity

monitoring System/device log

monitoring Log retention

Data science: Tomorrow’s learning platform

What we thinkis going on

What is Really going

on

Learning

Learning

Page 14: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Data Science and Security

Data science makes security

predictable

Page 15: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Summary

IoT and Boom! Deception Fabrics Cloud “Security as a

Service” Data Science and Security

Page 16: DBS2016: The Digital Transformation of Security

© 2016 Information Services Group, Inc. All Rights Reserved.

Guidance

Assess current state Identity “to-be” objectives and

operating model Decide what stays, what goes,

and what changes Develop and manage plan Assess progress and benchmarks

Risks/benefits PoliciesSourcing/VMO

ForecastsControls/Indicators

Outcomes/qualityimprovement

Page 17: DBS2016: The Digital Transformation of Security

www.isg-one.comimagine your future™

let’s connect…