3. Conclusions Gartner
• Cloud demands have driven changes in application development,
integration and infrastructure
• The move from static to real-time security analytics has taken on new
urgency due to new threats
• Identity and access management must evolve to scale and external
use
• Industrial automation, the Internet of Things and physical security
automation will rewrite rules on how security technology is used
3
4. Security Playground
4
DDOS
HTTPS
IPV4 IPV6
Hacktivism
Bandwidth
Espionage
Secure Access
Loadbalancing
Firewall
IPS
SDN
CLOUDS
INTERNET
SAAS
DMZ
LAN
WiFi
DATACENTERS
WAN
MPLS
VPN
DNS
BYOD
SECURITY
Compliance
Authentication
UTM
Logging
Botnet
Sabotage
MOBILITY
WAF
Encryption
Agility
Connectivity User Identity
Carrier services
Global presence
5. • Increasingly dynamic and advanced threats,
including targeted Cyber Attacks by Foreign
Governments (Advanced Persistent Threat -
APT)
Changing Threats
• Threat and risk advances leading to increased
technology and process complexity
Increasing
Complexity
• Proactive vs. Reactive Approach
Need to be Ahead
of the Threat
5
Challenges
8. Way Ahead
• Include Cyber Security in Risk Management processes
• Be proactive instead of responding to incidents
• Start educate business owners in fundamental Cyber Security
knowledge
• Develop a Cyber Security Strategic plan – migrate that plan into
business processes.
8