SlideShare une entreprise Scribd logo
1  sur  29
Télécharger pour lire hors ligne
SECURITY INDUSTRY 2.0:
SURVIVAL IN THE BOARDROOM
David Poarch VP, Security Solutions
AGENDA
• Who is Forsythe?
• Shift is Happening
• Spending Trends
• Relationships Matter
• Adapting Defenses
• An Effective Program
• Q&A / Wrap Up
3
Forsythe is one of the largest security integrators in North America.
With 44 years of deep data center expertise, we use a security lens to
help clients make smart IT investment decisions.
FORSYTHE FACTS
Migration capabilities:
• 1,400 data center
migrations
• 150 per year
• 325,000 workload
migrations
Technology Evaluation Center:
• Independent, multi-vendor test bed
• 150+ technologies
• 40+ leading manufacturers and vendors
Serve 1,000+ clients.
Retention rates:
• 100% for
top 50 clients
• 97% for
top 200 clients
Worked with 20
of the Fortune
100 companies
in 2014
1,000+ employees
• 500 engineers
and consultants
• 2,500+ certifications
• 15+ average
years of experience
$1B revenue
in 2014 and
profitable for 44
consecutive years
One of the largest
security
integrators in
North America
4
FORSYTHE SECURITY BY THE NUMBERS
one of the top
security integrators
in North America
$260M practice inside
a $1.1B integrator
4 acquisitions in
the security space,
rounding out or portfolio
and expanding our
geographical footprint
13 years of experience
evaluating, managing
and delivering leading
information security
technologies
60 leading security
technology partners
and 10 leading
advisory boards
have active Forsythe
participation
100+ managed security
services clients
300 professional services
engagements per year
with 60,000 hours logged to
client work
300+ certifications
with leading security
manufacturers
$40M state-of-the-art
Technology Evaluation
Center, with over 50
engagements annually
5
OPTIMIZED SECURITY PROGRAM
Processes are
monitored and
measured with
trending
Best practices
are followed
Continuous
improvements
identified and
applied
Formal
global IT risk
management
process
SHIFT IS HAPPENING
Metrics and Mindset
7
8
Time
Security“Stuff“STATISTICS
TRADITIONAL
CONTROLS
• FW
• IPS
• AV
• SIEM
Boom
SecurityBreach
9
229205
Median number of
days attackers were
present on a victim’s
network before they
were discovered
STATISTICS
32 64
Number of days
to resolution if
an INSIDER
was involved
Number of days it
took to resolve an
incident
Source: https://www2.fireeye.com/rs/fireye/images/rpt-m-trends-2015.pdf
256
10
Time
Security“Stuff“STATISTICS
ADVANCED
CONTROLS & SERVICES
• Incident Response
• 3rd Party Risk
• Behavioral Analysis
• Application Security
• Access Control
• Data Mgt.
TRADITIONAL
CONTROLS
• FW
• IPS
• AV
• SIEM
SecurityBreach
Boom
11
PREVENT,
PROTECT &
DEFEND
FROM PREVENT, PROTECT & DEFEND
TO DETECT, RESPOND & NEUTRALIZE
DETECT RESPOND NEUTRALIZE
12
INDUSTRY MATURITY
RETAIL
HEALTHCARE
BANKING/FINANCIAL
SERVICES
SPENDING
Building a Program
14
2012 2013 2014 2015 2016 2017 2018
SECURITY SPENDING THROUGH 2018
(In Billions Of Dollars)
90B
80B
70B
60B
50B
40B
GLOBAL & NORTH AMERICA
SPENDING
Global
NA
CAGR 8.1%
100B
30B
20B
10B
0
The annual cost of cyber
attacks is an average of
$11.6M. The time it takes to
resolve an attack averages
32 days, with a cost of over
$32K per day (over $1M
total).
The global economic cost of
cybercrime is currently
estimated at $400 billion* per
year; by 2020, that number
could top $3 trillion*
COST OF A
BREACH
16
10 “KEY SHIFTS”
GARTNER FORESEES
1. Prevention is futile: Advanced Persistent Security Programs
2. The Post-Signature Era: Pervasive Monitoring and Detection
3. Security Big Data Analytics
4. Context-Aware Security
5. Reputation Services and “Trustability”
6. The Growing Role of Collective Intelligence
7. The Shift to Information-centric Security Strategies
8. Virtualized and x86 Software-based Security Controls
9. The Shift to Cloud-based security controls
10. The Software Defined Data Center comes
17
TOP 10 SEGMENTS THROUGH 2018
21B
18B
15B
12B
9B
6B
3B
0
Top 10 Fastest Growing Segments 2014
2018
CAGR%
DAST/SAST = Dynamic/Static Application Security Testing
Other IAM = Other than Provisioning & Web Access management
18
HEADCOUNT
AND SKILLS
ESCALATING
THREATS
BUSINESS
DEMANDS
CLIENT CHALLENGES
RELATIONSHIPS MATTER
People and Applications
20
TRADITIONAL DC HYBRID DC CLOUD
ENTERPRISE DATA APPLICATIONS
DATA SPRAWL
21
HOTEL
EMPLOYEESPARTNERS
OFFICE CAR COFFEE SHOP
CUSTOMERS
HOME
CHANGING
USER LANDSCAPE
22
OPERATIONAL
SECURITY
HEADCOUNT
AND SKILLS
ESCALATING
THREATS
BUSINESS
DEMANDS
OPERATIONALIZING
IT RISK
23
Reconnaissance Weaponization Delivery Exploitation
Command
and Control
Exfiltration
THE INTRUSION
KILL CHAIN
24
Network Security
AV IPS
Email
Security
Web
Security
C&C
Servers
Master
Server
Endpoint
Security Suite
Application
Whitelisting
Enhanced
APT Security
SIEM &
Analytics
Forensic
Tools
Advanced Threat
Network Protection
Enhanced Content Security
Data Loss
Protection
Database
Monitoring
Two Factor Authentication
& Privileged User Control
Firewall
Security Program
FAST: Forsythe
Accelerated
Security Tool
Patch &
Vulnerability
Mgmt
Incident
Response
Security
Awareness
Training
DDoS
Protection
Enhanced
Network
Security
Next-
Generation
Firewall
ADAPT DEFENSES
Standard Network &
Content Security
25
Reconnaissance Weaponization Delivery Exploitation
Command
and Control
Exfiltration
Observe Detect Identify Neutralize
Hardware Inventory Secure Config. – Host
Monitoring of
Audit Logs
Network & Host
Data Forensics
Software Inventory
Secure Config. –
Network Devices
Boundary Defense
Data Recovery
Capability
Continuous
Vulnerability Assessment
Application Software
Security
Admin Privileges Data Loss Prevention
Secure Network
Engineering
Wireless Control
Controlled
Access
Penetration Tests
Penetration Tests
Advanced Threat
Protection, Security
Analytics & NGFW
Inspection
Advanced Threat
Protection, Security
Analytics & NGFW
Advanced Threat Protection,
Security Analytics & NGFW
Limitation of Ports,
Protocols & Services
Counter -
Intelligence
Processes
Mitigative
counter-strikes
Operational Effectiveness, Security Skills & Training, Incident Response Capability
Detect Attack Early
Prevent Attack Propagation
and Persistence
Minimize Impact of Attack
ATTACK MITIGATION MATRIX
26
Core Risk
Reduction
Enhanced
Risk
Reduction
Core Security
State
Enhanced
Security State
Optimized
Security
• Processes are
ad hoc and
disorganized
• Security is not
defined
• No mgmt
reporting
metrics
• Security is a
reactive
process
• Processes
follow a regular
pattern
• Security is
defined but not
aligned with
business
objectives
• No mgmt
reporting
• Security
involvement in
projects and
initiatives are
ad hoc
• Processes are
documented and
communicated
• Formal integrated
policy suite,
with links to
workforce
awareness,
education,
and training
programs
• From a risk mgmt
committee
• Limited mgmt
reporting
• Processes are
monitored and
measured
• Formal global IT
risk mgmt
process
• Full mgmt
reporting
• Consistent and
repeatable
process
• Processes are
monitored and
measured with
trending
• Best practices are
followed
• Continuous
improvements
identified and
applied
• Formal global
IT risk mgmt
process
PROGRAM
MATURITY MODEL
27
Core Infrastructure
Security
Data
Protection
Threat & Vulnerability
Management
Identity & Access
Management
Security Program
Governance
Application
Security
• Firewall
• IPS
• Proxy
• Network Access Control
• Email Security
• Secure Web Gateway
• DDOS Protection
• DLP
• Encryption
• Endpoint protection
• Mobility
• Database Monitoring
• Security Analytics
• Threat Intelligence
• Security Monitoring
• Network-based Malware
Protection
• Incident Response
(Action)
• Federation
• Privileged Access
• Audit & Accountability
• Incident Response
(Program)
• Security Operations
Center (SOC) Consulting
• GRC Consulting
• Security Strategy
• Audit Readiness
• Database Security
• Secure SDLC
• Web Application
Security
• Securing DevOps
EFFECTIVE SECURITY PROGRAM
28
QUESTIONS
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David Poarch

Contenu connexe

Tendances

Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOC
Fuad Khan
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
EnclaveSecurity
 

Tendances (20)

IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Roadmap to security operations excellence
Roadmap to security operations excellenceRoadmap to security operations excellence
Roadmap to security operations excellence
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Skill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOCSkill Set Needed to work successfully in a SOC
Skill Set Needed to work successfully in a SOC
 
Vulnerability management - beyond scanning
Vulnerability management - beyond scanningVulnerability management - beyond scanning
Vulnerability management - beyond scanning
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Overview of the 20 critical controls
Overview of the 20 critical controlsOverview of the 20 critical controls
Overview of the 20 critical controls
 
GDPR: The Application Security Twist
GDPR: The Application Security TwistGDPR: The Application Security Twist
GDPR: The Application Security Twist
 
Top 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure InfrastructureTop 20 Security Controls for a More Secure Infrastructure
Top 20 Security Controls for a More Secure Infrastructure
 
IT Cyber Security Operations
IT Cyber Security OperationsIT Cyber Security Operations
IT Cyber Security Operations
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
Identifying Code Risks in Software M&A
Identifying Code Risks in Software M&AIdentifying Code Risks in Software M&A
Identifying Code Risks in Software M&A
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
Cybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect MatchCybersecurity Frameworks and You: The Perfect Match
Cybersecurity Frameworks and You: The Perfect Match
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
The Economics of Cyber Security
The Economics of Cyber SecurityThe Economics of Cyber Security
The Economics of Cyber Security
 

Similaire à Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David Poarch

Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
Jyothi Satyanathan
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
VictoriaChavesta
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
sucesuminas
 

Similaire à Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David Poarch (20)

Smart security solutions for SMBs
Smart security solutions for SMBsSmart security solutions for SMBs
Smart security solutions for SMBs
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and compliance
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Fortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptxFortify-Application_Security_Foundation_Training.pptx
Fortify-Application_Security_Foundation_Training.pptx
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
MCGlobalTech Service Presentation
MCGlobalTech Service PresentationMCGlobalTech Service Presentation
MCGlobalTech Service Presentation
 
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdfCISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
CISO_Mind_Map_and_Vulnerability_Management_Maturity_Model_1643375178.pdf
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
ComResource Business Solutions
ComResource Business SolutionsComResource Business Solutions
ComResource Business Solutions
 
IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
ComResource Agency Solutions
ComResource Agency SolutionsComResource Agency Solutions
ComResource Agency Solutions
 
MCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service PresentationMCGlobalTech Consulting Service Presentation
MCGlobalTech Consulting Service Presentation
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
RMS Security Breakfast
RMS Security BreakfastRMS Security Breakfast
RMS Security Breakfast
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 

Plus de North Texas Chapter of the ISSA

Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
North Texas Chapter of the ISSA
 

Plus de North Texas Chapter of the ISSA (20)

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from  incident to continuous response bill whiteNtxissacsc5 blue 3-shifting from  incident to continuous response bill white
Ntxissacsc5 blue 3-shifting from incident to continuous response bill white
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
 

Dernier

Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
Kayode Fayemi
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
Sheetaleventcompany
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
raffaeleoman
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
Kayode Fayemi
 

Dernier (20)

Uncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac FolorunsoUncommon Grace The Autobiography of Isaac Folorunso
Uncommon Grace The Autobiography of Isaac Folorunso
 
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night EnjoyCall Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
Call Girl Number in Khar Mumbai📲 9892124323 💞 Full Night Enjoy
 
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 93 Noida Escorts >༒8448380779 Escort Service
 
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, YardstickSaaStr Workshop Wednesday w/ Lucas Price, Yardstick
SaaStr Workshop Wednesday w/ Lucas Price, Yardstick
 
Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)Introduction to Prompt Engineering (Focusing on ChatGPT)
Introduction to Prompt Engineering (Focusing on ChatGPT)
 
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdfThe workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
The workplace ecosystem of the future 24.4.2024 Fabritius_share ii.pdf
 
My Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle BaileyMy Presentation "In Your Hands" by Halle Bailey
My Presentation "In Your Hands" by Halle Bailey
 
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
Re-membering the Bard: Revisiting The Compleat Wrks of Wllm Shkspr (Abridged)...
 
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara ServicesVVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
VVIP Call Girls Nalasopara : 9892124323, Call Girls in Nalasopara Services
 
Dreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio IIIDreaming Music Video Treatment _ Project & Portfolio III
Dreaming Music Video Treatment _ Project & Portfolio III
 
Report Writing Webinar Training
Report Writing Webinar TrainingReport Writing Webinar Training
Report Writing Webinar Training
 
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
No Advance 8868886958 Chandigarh Call Girls , Indian Call Girls For Full Nigh...
 
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort ServiceBDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
BDSM⚡Call Girls in Sector 97 Noida Escorts >༒8448380779 Escort Service
 
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docxANCHORING SCRIPT FOR A CULTURAL EVENT.docx
ANCHORING SCRIPT FOR A CULTURAL EVENT.docx
 
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptxChiulli_Aurora_Oman_Raffaele_Beowulf.pptx
Chiulli_Aurora_Oman_Raffaele_Beowulf.pptx
 
Dreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video TreatmentDreaming Marissa Sánchez Music Video Treatment
Dreaming Marissa Sánchez Music Video Treatment
 
Air breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animalsAir breathing and respiratory adaptations in diver animals
Air breathing and respiratory adaptations in diver animals
 
Presentation on Engagement in Book Clubs
Presentation on Engagement in Book ClubsPresentation on Engagement in Book Clubs
Presentation on Engagement in Book Clubs
 
If this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New NigeriaIf this Giant Must Walk: A Manifesto for a New Nigeria
If this Giant Must Walk: A Manifesto for a New Nigeria
 
Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510Thirunelveli call girls Tamil escorts 7877702510
Thirunelveli call girls Tamil escorts 7877702510
 

Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David Poarch

  • 1. SECURITY INDUSTRY 2.0: SURVIVAL IN THE BOARDROOM David Poarch VP, Security Solutions
  • 2. AGENDA • Who is Forsythe? • Shift is Happening • Spending Trends • Relationships Matter • Adapting Defenses • An Effective Program • Q&A / Wrap Up
  • 3. 3 Forsythe is one of the largest security integrators in North America. With 44 years of deep data center expertise, we use a security lens to help clients make smart IT investment decisions. FORSYTHE FACTS Migration capabilities: • 1,400 data center migrations • 150 per year • 325,000 workload migrations Technology Evaluation Center: • Independent, multi-vendor test bed • 150+ technologies • 40+ leading manufacturers and vendors Serve 1,000+ clients. Retention rates: • 100% for top 50 clients • 97% for top 200 clients Worked with 20 of the Fortune 100 companies in 2014 1,000+ employees • 500 engineers and consultants • 2,500+ certifications • 15+ average years of experience $1B revenue in 2014 and profitable for 44 consecutive years One of the largest security integrators in North America
  • 4. 4 FORSYTHE SECURITY BY THE NUMBERS one of the top security integrators in North America $260M practice inside a $1.1B integrator 4 acquisitions in the security space, rounding out or portfolio and expanding our geographical footprint 13 years of experience evaluating, managing and delivering leading information security technologies 60 leading security technology partners and 10 leading advisory boards have active Forsythe participation 100+ managed security services clients 300 professional services engagements per year with 60,000 hours logged to client work 300+ certifications with leading security manufacturers $40M state-of-the-art Technology Evaluation Center, with over 50 engagements annually
  • 5. 5 OPTIMIZED SECURITY PROGRAM Processes are monitored and measured with trending Best practices are followed Continuous improvements identified and applied Formal global IT risk management process
  • 7. 7
  • 9. 9 229205 Median number of days attackers were present on a victim’s network before they were discovered STATISTICS 32 64 Number of days to resolution if an INSIDER was involved Number of days it took to resolve an incident Source: https://www2.fireeye.com/rs/fireye/images/rpt-m-trends-2015.pdf 256
  • 10. 10 Time Security“Stuff“STATISTICS ADVANCED CONTROLS & SERVICES • Incident Response • 3rd Party Risk • Behavioral Analysis • Application Security • Access Control • Data Mgt. TRADITIONAL CONTROLS • FW • IPS • AV • SIEM SecurityBreach Boom
  • 11. 11 PREVENT, PROTECT & DEFEND FROM PREVENT, PROTECT & DEFEND TO DETECT, RESPOND & NEUTRALIZE DETECT RESPOND NEUTRALIZE
  • 14. 14 2012 2013 2014 2015 2016 2017 2018 SECURITY SPENDING THROUGH 2018 (In Billions Of Dollars) 90B 80B 70B 60B 50B 40B GLOBAL & NORTH AMERICA SPENDING Global NA CAGR 8.1% 100B 30B 20B 10B 0
  • 15. The annual cost of cyber attacks is an average of $11.6M. The time it takes to resolve an attack averages 32 days, with a cost of over $32K per day (over $1M total). The global economic cost of cybercrime is currently estimated at $400 billion* per year; by 2020, that number could top $3 trillion* COST OF A BREACH
  • 16. 16 10 “KEY SHIFTS” GARTNER FORESEES 1. Prevention is futile: Advanced Persistent Security Programs 2. The Post-Signature Era: Pervasive Monitoring and Detection 3. Security Big Data Analytics 4. Context-Aware Security 5. Reputation Services and “Trustability” 6. The Growing Role of Collective Intelligence 7. The Shift to Information-centric Security Strategies 8. Virtualized and x86 Software-based Security Controls 9. The Shift to Cloud-based security controls 10. The Software Defined Data Center comes
  • 17. 17 TOP 10 SEGMENTS THROUGH 2018 21B 18B 15B 12B 9B 6B 3B 0 Top 10 Fastest Growing Segments 2014 2018 CAGR% DAST/SAST = Dynamic/Static Application Security Testing Other IAM = Other than Provisioning & Web Access management
  • 20. 20 TRADITIONAL DC HYBRID DC CLOUD ENTERPRISE DATA APPLICATIONS DATA SPRAWL
  • 21. 21 HOTEL EMPLOYEESPARTNERS OFFICE CAR COFFEE SHOP CUSTOMERS HOME CHANGING USER LANDSCAPE
  • 23. 23 Reconnaissance Weaponization Delivery Exploitation Command and Control Exfiltration THE INTRUSION KILL CHAIN
  • 24. 24 Network Security AV IPS Email Security Web Security C&C Servers Master Server Endpoint Security Suite Application Whitelisting Enhanced APT Security SIEM & Analytics Forensic Tools Advanced Threat Network Protection Enhanced Content Security Data Loss Protection Database Monitoring Two Factor Authentication & Privileged User Control Firewall Security Program FAST: Forsythe Accelerated Security Tool Patch & Vulnerability Mgmt Incident Response Security Awareness Training DDoS Protection Enhanced Network Security Next- Generation Firewall ADAPT DEFENSES Standard Network & Content Security
  • 25. 25 Reconnaissance Weaponization Delivery Exploitation Command and Control Exfiltration Observe Detect Identify Neutralize Hardware Inventory Secure Config. – Host Monitoring of Audit Logs Network & Host Data Forensics Software Inventory Secure Config. – Network Devices Boundary Defense Data Recovery Capability Continuous Vulnerability Assessment Application Software Security Admin Privileges Data Loss Prevention Secure Network Engineering Wireless Control Controlled Access Penetration Tests Penetration Tests Advanced Threat Protection, Security Analytics & NGFW Inspection Advanced Threat Protection, Security Analytics & NGFW Advanced Threat Protection, Security Analytics & NGFW Limitation of Ports, Protocols & Services Counter - Intelligence Processes Mitigative counter-strikes Operational Effectiveness, Security Skills & Training, Incident Response Capability Detect Attack Early Prevent Attack Propagation and Persistence Minimize Impact of Attack ATTACK MITIGATION MATRIX
  • 26. 26 Core Risk Reduction Enhanced Risk Reduction Core Security State Enhanced Security State Optimized Security • Processes are ad hoc and disorganized • Security is not defined • No mgmt reporting metrics • Security is a reactive process • Processes follow a regular pattern • Security is defined but not aligned with business objectives • No mgmt reporting • Security involvement in projects and initiatives are ad hoc • Processes are documented and communicated • Formal integrated policy suite, with links to workforce awareness, education, and training programs • From a risk mgmt committee • Limited mgmt reporting • Processes are monitored and measured • Formal global IT risk mgmt process • Full mgmt reporting • Consistent and repeatable process • Processes are monitored and measured with trending • Best practices are followed • Continuous improvements identified and applied • Formal global IT risk mgmt process PROGRAM MATURITY MODEL
  • 27. 27 Core Infrastructure Security Data Protection Threat & Vulnerability Management Identity & Access Management Security Program Governance Application Security • Firewall • IPS • Proxy • Network Access Control • Email Security • Secure Web Gateway • DDOS Protection • DLP • Encryption • Endpoint protection • Mobility • Database Monitoring • Security Analytics • Threat Intelligence • Security Monitoring • Network-based Malware Protection • Incident Response (Action) • Federation • Privileged Access • Audit & Accountability • Incident Response (Program) • Security Operations Center (SOC) Consulting • GRC Consulting • Security Strategy • Audit Readiness • Database Security • Secure SDLC • Web Application Security • Securing DevOps EFFECTIVE SECURITY PROGRAM