SlideShare une entreprise Scribd logo
1  sur  30
IBM & Deloitte Joint Webinar
Breaking Down the Cyber Security Framework:
Closing Critical IT Security Gaps
Oct 22, 2013

© 2013 IBM Corporation
1

© 2012 IBM Corporation
IBM Security Systems

Speakers: IBM & Deloitte Joint Webinar
Harry D. Raduege, Jr., Lt. General (USAF, Ret) Chairman,
Deloitte Center for Cyber Innovation
Topic of discussion: Breaking down the Cyber Security
Framework

Tom Turner , VP, Marketing & Business Development, IBM
Security Division
Topic of discussion: Closing Critical IT Security Gaps

2

© 2013 IBM Corporation
Breaking Down the Cyber Security
Framework
Cyber – A phenomenon that changed the world

Cyberspace

Cyber Attack

Cyber Insurance

Cyber War Cyberattack
Cyber-Alert
Cyber Bullying
Cyber crime
Cyber-ethics
Cyber FININT
Cyberpower

Cybersecurity

Cyber-Commerce

Cyber Law
4

Cyber Espionage

Cyber Communication
Copyright © 2013 Deloitte Development LLC. All rights reserved.
The world of cybersecurity
Threats

Targets

Counters

• Identity theft
• Information manipulation
(e.g. Malware)
• Cyber Assaults/Bullying
• Advanced Persistent
Threats (APTs)
• Information theft
• Crime
(e.g., Credit card fraud)
• Insider
• Espionage
• Cyber attack
• Transnational
• Attack of software
“boomerangs”
• Terrorism

• Government (Federal,
State, and Local); e.g.,
– E-Government
– E-Commerce
• Industry; e.g.,
– Aerospace & Defense
– Banking & finance
– Health care
– Insurance
– Manufacturing
– Oil & Gas
– Power Grid
– Retail
– Telecommunications
– Utilities
• Universities/Colleges
• Individuals

• Cyber workforce
• Advanced network and
resilience controls
• Outbound traffic monitoring
• Dynamic situational
awareness
• Open source Information
• Risk intelligence &
management
− Forensic analysis
− Data analytics
• Financial intelligence
(FININT)
• Tighter laws & enforcement
• Expanded diplomacy
• Legislation?

You should assume that your information network has been or will
be compromised.
5

Copyright © 2013 Deloitte Development LLC. All rights reserved.
Cybersecurity – Key points and impacts of the U.S.
President’s Executive Order (February 2013)

Information
Sharing

Privacy

• Opens up information-sharing program to other sectors
• Requires Federal government information-sharing programs with
private sector
• Mandates strong privacy and civil liberties protections
• Directs regular assessments of agency activities
• Requires development of a Cybersecurity Framework

Cybersecurity
Standards

• Develops voluntary critical infrastructure cybersecurity program
and adoption incentives
• Identifies regulatory gaps

Critical
Infrastructure
Review
6

• Identifies critical infrastructure at greatest risk
• Changes the definition of critical infrastructure

Copyright © 2013 Deloitte Development LLC. All rights reserved.
Currently, there are 16 U.S. industry sectors defined
as critical infrastructure
85% of critical infrastructure is in private sector hands 1
Trends exposing industry to increased risk
• Interconnectedness of sectors
• Proliferation of exposure points
• Concentration of assets
Critical infrastructure sectors

Agriculture and Food

Dams

Information Technology

Banking and Financial
Services

Defense Industrial
Base

Nuclear Reactors,
Materials and Waste

Chemical

Emergency Services

Transportation
Systems

Commercial Facilities

Energy

Water and Wastewater
Systems

Communications

Government Facilities

Critical Manufacturing

Healthcare and Public
Health
1 GAO Report, Critical Infrastructure Protection: Sector Plans and Sector Councils Continue to Evolve. July 2007, http://www.gao.gov/assets/100/95010.pdf

7

Copyright © 2013 Deloitte Development LLC. All rights reserved.
Helping the CISO respond to Cyber
Security: Closing Critical IT Security
Gaps
IBM Security Systems

Evolving CISO Landscape

9

© 2013 IBM Corporation
IBM Security Systems

CISO Challenge: Competing priorities

14%increase

83% of

in Web application
vulnerabilities

enterprises have
difficulty filling
security roles

from 2011 to 2012

Common
Vulnerabilities
and Exposures

10

Increase in
compliance
mandates

© 2013 IBM Corporation
IBM Security Systems

CISO Challenge: Inadequate tools

85 tools
from
45 vendors
1

45

Only
out of
malware samples
detected

11

© 2013 IBM Corporation
IBM Security Systems

CISO Challenge: Business pressures

75%+of organizations
are using at least one
cloud platform

70% of CISOs are
concerned about Cloud
and mobile security
12

© 2013 IBM Corporation
IBM Security Systems

CISO Challenge: Evolving Threats
INTERNAL

43%

of C-level execs
say that negligent
insiders are their
biggest concern

13

EXTERNAL

PAYOFFS

59
%

increase
in critical
web browser
vulnerabilities

$78
M
stolen from
bank accounts
in Operation
High Roller

© 2013 IBM Corporation
IBM Security Systems

Q:

A:

Have you had an
attack that was
difficult to detect?

45% Yes

+ 21% Don’t
know

66% Don’t have

Why is this happening?
• Not collecting right security data
• Don’t have context
• Don’t have baseline for normal
• Lack vulnerability awareness

visibility needed
to stop advanced
attacks

14

© 2013 IBM Corporation
IBM Security Systems

Advantage:

15

Attacker

© 2013 IBM Corporation
IBM Security Systems

CISO:Your move

16

© 2013 IBM Corporation
IBM Security Systems

Focus

17

Intelligence

Innovation

© 2013 IBM Corporation
IBM Security Systems

USERS

Focus
TRANSACTIONS

18

ASSETS

© 2013 IBM Corporation
IBM Security Systems

Focus on users,
not devices

Implement identity
intelligence

Pay special attention
to trusted insiders

60,000 employees
Provisioning took up to 2 weeks
No monitoring of privileged users
USERS

Privileged Identity Management
Monitoring and same-day
de-provisioning
for
privileged users 

100+

19

© 2013 IBM Corporation
IBM Security Systems

Discover critical
business data

Harden and
secure repositories

Monitor and prevent
unauthorized access

Thousands of databases containing
HR, ERP, credit card, and other PII
in a world where 98%
of breaches hit databases
ASSETS

Database Access and Monitoring
Secured

2,000

$21M

critical databases
20

Saved

in compliance costs
© 2013 IBM Corporation
IBM Security Systems

Identify most
critical transactions

Monitor sessions,
users, and devices

Look for anomalies
and attacks

30 Million customers in an industry where
$3.4B industry losses from online fraud
85% of breaches go undetected
TRANSACTIONS

Advanced Fraud Protection
on over 1 million customer endpoints

Zero instances of fraud
occurred
21

© 2013 IBM Corporation
IBM Security Systems

ANALYTICS

Intelligence

INTEGRATION

22

VISIBILITY

© 2013 IBM Corporation
IBM Security Systems

Don’t rely on
signature detection

Use baselines
and reputation

Fully inspect content
and communications

Identify entire classes of
ANALYTICS by analyzing

Pattern
matching

23

Mutated threats

250+ protocols and file types

Context, clustering, baselining,
machine learning, and heuristics

© 2013 IBM Corporation
IBM Security Systems

Get full coverage,
No more blind spots

Reduce
VISIBILITY

24

Reduce and
prioritize alerts

Produce detailed
activity reports

2 Million logs and events per day
to 25 high priority offenses

© 2013 IBM Corporation
IBM Security Systems

Eliminate silos and
point solutions

Build upon a
common platform

Share information
between controls

8 Million subscribers
with an integrated Platform

Monitor threats across
INTEGRATION

Siloed
Point Products

25

Integrated
Platforms

© 2013 IBM Corporation
IBM Security Systems

IBM Security Framework

Intelligence
Integration
Expertise
Professional, Managed,
and Cloud Services
26

© 2013 IBM Corporation
IBM Security Systems

CISO:

Checkmate!

27

© 2013 IBM Corporation
+

Smart apart. Smarter together.
Copyright© 2013
Thank you.
For more information, you can contact:
Paul Avallone – pavallone@deloitte.com
Charlie Kenney – Charles.kenney@us.ibm.com
This presentation contains general information only and is based on the experiences and
research of Deloitte practitioners. Deloitte is not, by means of this presentation, rendering
business, financial, investment, or other professional advice or services. This presentation is not
a substitute for such professional advice or services, nor should it be used as a basis for any
decision or action that may affect your business. Before making any decision or taking any action
that may affect your business, you should consult a qualified professional advisor. Deloitte, its
affiliates, and related entities shall not be responsible for any loss sustained by any person who
relies on this presentation.

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of
member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description
of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see www.deloitte.com/us/about for a detailed
description of the legal structure of Deloitte LLP and its subsidiaries.

Copyright © 2011 Deloitte Development LLC. All rights reserved.
Member of Deloitte Touche Tohmatsu Limited

Contenu connexe

Tendances

Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
Stephen Lahanas
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
OurCrowd
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
 

Tendances (20)

Challenges in implementating cyber security
Challenges in implementating cyber securityChallenges in implementating cyber security
Challenges in implementating cyber security
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
Cyber security threats and its solutions
Cyber security threats and its solutionsCyber security threats and its solutions
Cyber security threats and its solutions
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Cyber security-report-2017
Cyber security-report-2017Cyber security-report-2017
Cyber security-report-2017
 
2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security2015: The year-ahead-in-cyber-security
2015: The year-ahead-in-cyber-security
 
Cyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 minsCyber Security vs IT Security in 2 mins
Cyber Security vs IT Security in 2 mins
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 

Similaire à Breaking down the cyber security framework closing critical it security gaps

Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
John Palfreyman
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 

Similaire à Breaking down the cyber security framework closing critical it security gaps (20)

IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
IBM X-Force Threat Intelligence: Why Insider Threats Challenge Critical Busin...
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenbergIbm ofa ottawa_ how_secure_is_your_data_eric_offenberg
Ibm ofa ottawa_ how_secure_is_your_data_eric_offenberg
 
Cyber Security at CTX15, London
Cyber Security at CTX15, LondonCyber Security at CTX15, London
Cyber Security at CTX15, London
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know10 Security Essentials Every CxO Should Know
10 Security Essentials Every CxO Should Know
 
What CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber SecurityWhat CIOs and CFOs Need to Know About Cyber Security
What CIOs and CFOs Need to Know About Cyber Security
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise3 Steps to Security Intelligence - How to Build a More Secure Enterprise
3 Steps to Security Intelligence - How to Build a More Secure Enterprise
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 

Plus de IBM Security

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 

Plus de IBM Security (20)

Automation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOpsAutomation: Embracing the Future of SecOps
Automation: Embracing the Future of SecOps
 
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
Leaders & Laggards: The Latest Findings from the Ponemon Institute’s Study on...
 
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
Bridging the Gap between Privacy and Security: Using Technology to Manage Com...
 
Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 

Dernier

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Breaking down the cyber security framework closing critical it security gaps

  • 1. IBM & Deloitte Joint Webinar Breaking Down the Cyber Security Framework: Closing Critical IT Security Gaps Oct 22, 2013 © 2013 IBM Corporation 1 © 2012 IBM Corporation
  • 2. IBM Security Systems Speakers: IBM & Deloitte Joint Webinar Harry D. Raduege, Jr., Lt. General (USAF, Ret) Chairman, Deloitte Center for Cyber Innovation Topic of discussion: Breaking down the Cyber Security Framework Tom Turner , VP, Marketing & Business Development, IBM Security Division Topic of discussion: Closing Critical IT Security Gaps 2 © 2013 IBM Corporation
  • 3. Breaking Down the Cyber Security Framework
  • 4. Cyber – A phenomenon that changed the world Cyberspace Cyber Attack Cyber Insurance Cyber War Cyberattack Cyber-Alert Cyber Bullying Cyber crime Cyber-ethics Cyber FININT Cyberpower Cybersecurity Cyber-Commerce Cyber Law 4 Cyber Espionage Cyber Communication Copyright © 2013 Deloitte Development LLC. All rights reserved.
  • 5. The world of cybersecurity Threats Targets Counters • Identity theft • Information manipulation (e.g. Malware) • Cyber Assaults/Bullying • Advanced Persistent Threats (APTs) • Information theft • Crime (e.g., Credit card fraud) • Insider • Espionage • Cyber attack • Transnational • Attack of software “boomerangs” • Terrorism • Government (Federal, State, and Local); e.g., – E-Government – E-Commerce • Industry; e.g., – Aerospace & Defense – Banking & finance – Health care – Insurance – Manufacturing – Oil & Gas – Power Grid – Retail – Telecommunications – Utilities • Universities/Colleges • Individuals • Cyber workforce • Advanced network and resilience controls • Outbound traffic monitoring • Dynamic situational awareness • Open source Information • Risk intelligence & management − Forensic analysis − Data analytics • Financial intelligence (FININT) • Tighter laws & enforcement • Expanded diplomacy • Legislation? You should assume that your information network has been or will be compromised. 5 Copyright © 2013 Deloitte Development LLC. All rights reserved.
  • 6. Cybersecurity – Key points and impacts of the U.S. President’s Executive Order (February 2013) Information Sharing Privacy • Opens up information-sharing program to other sectors • Requires Federal government information-sharing programs with private sector • Mandates strong privacy and civil liberties protections • Directs regular assessments of agency activities • Requires development of a Cybersecurity Framework Cybersecurity Standards • Develops voluntary critical infrastructure cybersecurity program and adoption incentives • Identifies regulatory gaps Critical Infrastructure Review 6 • Identifies critical infrastructure at greatest risk • Changes the definition of critical infrastructure Copyright © 2013 Deloitte Development LLC. All rights reserved.
  • 7. Currently, there are 16 U.S. industry sectors defined as critical infrastructure 85% of critical infrastructure is in private sector hands 1 Trends exposing industry to increased risk • Interconnectedness of sectors • Proliferation of exposure points • Concentration of assets Critical infrastructure sectors Agriculture and Food Dams Information Technology Banking and Financial Services Defense Industrial Base Nuclear Reactors, Materials and Waste Chemical Emergency Services Transportation Systems Commercial Facilities Energy Water and Wastewater Systems Communications Government Facilities Critical Manufacturing Healthcare and Public Health 1 GAO Report, Critical Infrastructure Protection: Sector Plans and Sector Councils Continue to Evolve. July 2007, http://www.gao.gov/assets/100/95010.pdf 7 Copyright © 2013 Deloitte Development LLC. All rights reserved.
  • 8. Helping the CISO respond to Cyber Security: Closing Critical IT Security Gaps
  • 9. IBM Security Systems Evolving CISO Landscape 9 © 2013 IBM Corporation
  • 10. IBM Security Systems CISO Challenge: Competing priorities 14%increase 83% of in Web application vulnerabilities enterprises have difficulty filling security roles from 2011 to 2012 Common Vulnerabilities and Exposures 10 Increase in compliance mandates © 2013 IBM Corporation
  • 11. IBM Security Systems CISO Challenge: Inadequate tools 85 tools from 45 vendors 1 45 Only out of malware samples detected 11 © 2013 IBM Corporation
  • 12. IBM Security Systems CISO Challenge: Business pressures 75%+of organizations are using at least one cloud platform 70% of CISOs are concerned about Cloud and mobile security 12 © 2013 IBM Corporation
  • 13. IBM Security Systems CISO Challenge: Evolving Threats INTERNAL 43% of C-level execs say that negligent insiders are their biggest concern 13 EXTERNAL PAYOFFS 59 % increase in critical web browser vulnerabilities $78 M stolen from bank accounts in Operation High Roller © 2013 IBM Corporation
  • 14. IBM Security Systems Q: A: Have you had an attack that was difficult to detect? 45% Yes + 21% Don’t know 66% Don’t have Why is this happening? • Not collecting right security data • Don’t have context • Don’t have baseline for normal • Lack vulnerability awareness visibility needed to stop advanced attacks 14 © 2013 IBM Corporation
  • 16. IBM Security Systems CISO:Your move 16 © 2013 IBM Corporation
  • 19. IBM Security Systems Focus on users, not devices Implement identity intelligence Pay special attention to trusted insiders 60,000 employees Provisioning took up to 2 weeks No monitoring of privileged users USERS Privileged Identity Management Monitoring and same-day de-provisioning for privileged users  100+ 19 © 2013 IBM Corporation
  • 20. IBM Security Systems Discover critical business data Harden and secure repositories Monitor and prevent unauthorized access Thousands of databases containing HR, ERP, credit card, and other PII in a world where 98% of breaches hit databases ASSETS Database Access and Monitoring Secured 2,000 $21M critical databases 20 Saved in compliance costs © 2013 IBM Corporation
  • 21. IBM Security Systems Identify most critical transactions Monitor sessions, users, and devices Look for anomalies and attacks 30 Million customers in an industry where $3.4B industry losses from online fraud 85% of breaches go undetected TRANSACTIONS Advanced Fraud Protection on over 1 million customer endpoints Zero instances of fraud occurred 21 © 2013 IBM Corporation
  • 23. IBM Security Systems Don’t rely on signature detection Use baselines and reputation Fully inspect content and communications Identify entire classes of ANALYTICS by analyzing Pattern matching 23 Mutated threats 250+ protocols and file types Context, clustering, baselining, machine learning, and heuristics © 2013 IBM Corporation
  • 24. IBM Security Systems Get full coverage, No more blind spots Reduce VISIBILITY 24 Reduce and prioritize alerts Produce detailed activity reports 2 Million logs and events per day to 25 high priority offenses © 2013 IBM Corporation
  • 25. IBM Security Systems Eliminate silos and point solutions Build upon a common platform Share information between controls 8 Million subscribers with an integrated Platform Monitor threats across INTEGRATION Siloed Point Products 25 Integrated Platforms © 2013 IBM Corporation
  • 26. IBM Security Systems IBM Security Framework Intelligence Integration Expertise Professional, Managed, and Cloud Services 26 © 2013 IBM Corporation
  • 28. + Smart apart. Smarter together. Copyright© 2013
  • 29. Thank you. For more information, you can contact: Paul Avallone – pavallone@deloitte.com Charlie Kenney – Charles.kenney@us.ibm.com
  • 30. This presentation contains general information only and is based on the experiences and research of Deloitte practitioners. Deloitte is not, by means of this presentation, rendering business, financial, investment, or other professional advice or services. This presentation is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte, its affiliates, and related entities shall not be responsible for any loss sustained by any person who relies on this presentation. Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/about for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Copyright © 2011 Deloitte Development LLC. All rights reserved. Member of Deloitte Touche Tohmatsu Limited

Notes de l'éditeur

  1. http://www.dhs.gov/critical-infrastructure-sectors Homeland Security Presidential Directive (HSPD) 7 established a national policy for Federal departments and agencies to identify and prioritize U.S. critical infrastructure and key resources, and to protect them from terrorist attacks. Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. This directive supersedes Homeland Security Presidential Directive 7. PPD-21 identifies 16 critical infrastructure sectors. Chemical, Commercial Facilities, Communications, Critical Manufacturing, Dams, Defense Industrial Base, Emergency Services, Energy, Financial Services, Food and Agriculture, Government Facilities, Healthcare and Public Health, Information Technology, Nuclear Reactors, Materials, and Waste, Transportation Systems, and Water& Wastewater Systems
  2. Let’s take a look at the “CISO Landscape” The role of the CISO is changing. It’s not just a technologist role. The CISO is just as likely to have an MBA as a degree in computer science. Building a team, forecasting, budgeting, understanding the regulatory environment, managing to metrics all become a factor. And the CISO has to be able to go in front of the board and explain how the importance of security strategy and how it is aligned to the business strategy of the organization. But… there are challenges…
  3. 1