The document discusses the need for organizations to adopt a strategy of cyber resilience in response to the growing threats posed by the digital environment. It emphasizes that while complete risk elimination is impossible, cyber resilience involves managing security through a multi-layered approach across people, processes, and technology. This can help organizations better prepare for, detect, respond to, and recover from cyber attacks in order to minimize potential damage and disruption. Symantec is presented as uniquely qualified to help organizations achieve cyber resilience through its security solutions, intelligence capabilities, scale, expertise and infrastructure.
Vector Databases 101 - An introduction to the world of Vector Databases
Symantec cyber-resilience
1. CYBER RESILIENCE
A NEW PERSPECTIVE ON SECURITY
With this many people online, there are as many risks as
benefits to our digital life. In this sophisticated threat
environment, traditional security tactics are failing.
Symantec encourages organizations to revisit their
security posture to build a more cyber resilient
enterprise.
2.4 BILLION PEOPLE
USE THE INTERNET
34%
OF WORLD
POPULATION
Cyber resilience does not promise immunity from cyber
attacks nor does it purport to eliminate risk. Eliminating
all cyber risk is impossible. In fact, it could impede
agility, for an environment with an acceptable level of
risk enables innovation. Cyber resilience is about
managing security with a multi-layered approach that
encompasses people, processes, and technology.
THE UNKNOWN
UNKNOWNS
As desktop computer operating systems give
way to web-based and mobile platforms and
applications, the workplace is changing at an
exponential rate.
IN ITS NEXUS
OF FORCES
Gartner defines this phenomenon as
The convergence and mutual reinforcement of
four interdependent trends: social interaction,
mobility, cloud, and information that combine to
empower individuals as they interact with each
other and their information through well
designed ubiquitous technology 1.
“
Figure 1. Agenda Overview
for Nexus of Forces1
Source: Gartner ( January 2014 )
” 41% of attacks affect organizations with fewer than 500 employees
1Source: Agenda Overview for the Nexus of Forces,
20 January 2014 G00261499
There are many unknown unknowns. It is literally impossible to predict all the online
threats your organization will face, so your best hope of combating them is to prepare for
any possibility.
WHAT WE DO KNOW
Digital technology is inextricably woven into our daily lives.
USES[ ]
THE RISE OF MOBILITY IS ONLY
ACCELERATING THESE TRENDS.
1/3 of all cell phones
are internet-enabled
smartphones
15% of mobile devices are not
secured and are used
for work and play
500 million photos sent daily check messages 23X a day
ONLINE ATTACKS claim
1.5 Million Victims Daily = $110 Million in Losses
MALWARE ATTACKS have increased in 2013
up 23% on Web & up 139% on Mobile
67% come from legitimate sites
THE HUMAN EFFECT
DATA BREACHES
2/3
84%
Are Not Contained for
Months or Even Years
Occur in Hours
or Less
Aren’t Discovered
for Month
THE CYBER RESILIENT ENTERPRISE
The best way to prepare is to assess your level
of cyber resilience, and security intelligence is
the key. Security Intelligence is more than just
threat intelligence or technology; it’s the data
on an enterprise’s vulnerabilities and threats,
which is analyzed in a way that enables the
prioritization of action to maximize risk
reduction. Better security intelligence enables
better business decision-making, better
organizational processes, increased protection
from cyber attacks, and better preparation when
they do occur — resulting in a business that is
more resilient and agile.
HARNESS YOUR SECURITY INTELLIGENCE
FINE-TUNE PROCESSES, POLICIES, AND PROCEDURES
<<<<<<<<<<<<<<<<<<<< Correlate and Analyze >>>>>>>>>>>>>>>>>>
RECORD ENDPOINT AND
MONITOR ACCESS ATTEMPTS
NETWORK ACTIVITIES
EDUCATE USERS – DEVELOP EMPLOYEE SECURITY IQ
ASSESS STATE OF SECURITY TO
Protect Your
Organization
TRACK ADHERENCE TO DATA
IDENTIFY GLOBAL THREATS
GOVERNANCE POLICIES
TO MY BUSINESS
IDENTIFY VULNERABILITIES
BECOME CYBER RESILIENT
THE FIVE PILLARS
The evaluation process utilizes best practice-based approaches recommended for
minimizing cyber risk. These are arranged across five pillars: prepare/identify, protect,
detect, respond, and recover. Using this framework, you can evaluate each pillar of your
organization’s cyber security strategy - specific actions to be performed by identifiable IT
jobs are associated with each pillar.
PREPARE PROTECT DETECT RESPOND RECOVER
an attack, you must thoroughly understand
your company’s security and risk posture.
Begin by painstakingly identifying the
organization’s vital information. Conduct an
infrastructure and information assessment
what's out there, where it lives, its level of
sensitivity, how vulnerable it is, and your
risk tolerance, you can begin to take the
necessary steps to protect it. The second
developing and implementing the
appropriate activities to rapidly identify an
attack, assess the systems that may be
affected, and ensure a timely response. In
on the types of activities that can accelerate
time to remediation and contain the impact
of the attack once it’s detected. For the
detection process to have any value, there
addressed — critical to any resilient
security strategy — is recovery. This stage
involves developing and implementing the
appropriate systems and plans to restore
any data and services that may have been
impacted during a cyber attack. As much as
we prepare and protect our organizations,
RECOVER RESPOND DETECT PROTECT PREPARE
TIMELINE
To successfully face and overcome
that includes all known security
vulnerabilities. Establish a baseline and
compare the results to those of your peers.
Spotting and addressing the most urgent
issues first will make your organization a
less appealing target for attackers.
Once you have a good handle on
pillar is all about developing and
implementing safeguards for critical
infrastructure and services in order to limit
or contain the impact of
an attack.
The Detect pillar focuses on
addition, this stage is concerned with
continuing to monitor the network for other
attack indicators related to that attack and
making sure the safeguards you had in
place were effective.
The Respond pillar provides guidance
must be a timely response. While there are
many solutions and services available to
help, much of what is needed in terms of
response involves people and processes
internal to the organization.
The final pillar that needs to be
we may not be able to avoid certain types of
attacks. Even if you respond quickly to a
cyber breach, an attack may have
consequences. No matter the outcome,
organizations must be able to restore their
people, processes, and systems as quickly
as possible. An effective recovery depends
on a clear and thorough recovery plan.
PREPARE PROTECT DETECT RESPOND RECOVER
Prepare for Attacks Implement Response Plan Refine Plan
ATTACKER INGRESS
ATTACKER DETECTED
SYSTEMS SECURED
NORMAL RESPONSE PLAN
ACHIEVING RESILIENCE
THE IMPACTS OF A MAJOR CYBER ATTACK
CAN BE DEVASTATING TO ANY ORGANIZATION.
Unfortunately, no silver bullet exists to
prevent attacks, and breaches will occur in
spite of an organization’s best efforts at
preparation and protection. Many customers
lack the sophistication and expertise they
need to address these new, more advanced
threats. To minimize the potential
devastation of a cyber attack, you must
change the way you think about security.
Think in terms of not eliminating cyber risk
but of creating cyber resilience.
To create cyber resilience, organizations
must begin by changing the conversation
about cyber risk. It’s crucial to align IT and
the business and encourage regular,
productive discussions to identify the
benefits and risks associated with a cyber
resilient strategy. Find and use a common
language. IT security must accept that the
business will be tempted to take risks in
order to succeed and must empower the
business to make informed decisions on how
they manage cyber risk.
22%
Figure 2
The Targeted-Attack
Hierarchy of Needs
An Integrated Portfolio
that Enables Orchestration
A Focus on the Fundamentals
A Dedication to Recruiting and Retaining Staff
An Actual Security Strategy
Source: Forrester Research, Inc
Detection
and response
Prevention
SYMANTEC IS UNIQUELY QUALIFIED TO DELIVER
ON THE PROMISE OF BEING THE VENDOR TO HELP ORGANIZATIONS
ACHIEVE CYBER RESILIENCE.
WE HAVE:
SOLUTIONS:
Our extensive security portfolio
helps you create a layered
approach to security so you can
identify internal threats, stay
informed of the external security
issues that threaten your
organization, and take action
against them quickly and
comprehensively. Our solutions
help organizations discover,
track, and protect data and
users. And our managed security
service offerings provide
monitoring and big data analysis.
SECURITY INTELLIGENCE
IS THE KEY:
We operate the largest civilian
cyber intelligence threat network
anywhere, giving us unrivaled
insight to what attackers will try
next.
Our Symantec Global Intelligence
Network maintains worldwide
visibility into the threat
landscape via 65 million attack
sensors that constantly monitor
networks and vulnerabilities. The
network gathers data from one of
the most extensive antifraud
communities of enterprises and
security vendors. It checks more
than 1.4 billion web requests and
8 billion emails a day. We track
3.7 trillion “threat indicators”
annually across the Internet and
continuously collect new
telemetry from hundreds of
millions of mobile devices,
endpoints, and servers around
the globe, coverage that’s
unrivaled in the industry.
SCALE, EXPERTISE,
AND INFRASTRUCTURE:
We have the scale and global
security architecture. Thousands
of employees including 1000
security analysts and researchers
worldwide based in 50 different
countries, 5 PCI-certified
Security Operations Centers, and
secure datacenters including a
4-tier military grade datacenter
for our authentication solutions.
We have the scale to protect
information wherever it’s stored
or accessed. And we have the
capacity to respond to attacks
immediately.
Contact your Symantec account representative or reseller partner
today to discuss how you can start building cyber resilience into your
security strategy. Get more information about cyber resilience and
stay informed at the Symantec cyber resilience microsite.
go.symantec.com/cyber-resilience