converged security - protect your digital enterprise€¦ · 2015 cost of cyber crime study:...

30
Converged Security - Protect your Digital Enterprise May 24, 2016 © Copyright 2016 Vivit Worldwide

Upload: others

Post on 08-Jun-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Converged Security - Protect your Digital EnterpriseMay 24, 2016

© Copyright 2016 Vivit Worldwide

Page 2: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Brought to you by

© Copyright 2016 Vivit Worldwide

Page 3: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Hosted By

© Copyright 2016 Vivit Worldwide

Richard Bishop

Vivit Board

United Kingdom Chapter Leader

HPE Software Education SIG Leader

Page 4: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Today’s Speakers

© Copyright 2016 Vivit Worldwide

Gerben Verstraete

Chief Technologist Software Services

Hewlett Packard EnterpriseGerben Verstraete@GerbenVerstraet

Guest Speaker John Kindervag

Vice President/ Principal Analyst

ForresterJohn Kindervag

@Kindervag

Page 5: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

• This “LIVE” session is being recorded

Recordings are available to all Vivit members

• Session Q&A:

Please type questions in the Questions Pane

Housekeeping

© Copyright 2016 Vivit Worldwide

Page 6: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Webinar Control Panel

Toggle View Window between

Full screen/window mode.

Questions

© Copyright 2016 Vivit Worldwide

Page 7: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Converged Security -protect your digital enterprise HPE Software ServicesGerben Verstraete (HPE Software Services) with guest speakerJohn Kindervag (Forrester)

Page 8: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Polling question #1What is your current role?

1. IT Operations2. Security Operations3. Application Development 4. External Consultant5. Other

8

Page 9: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations
Page 10: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

© 2015 Forrester Research, Inc. Reproduction Prohibited 10

Which one goes to the internet?

Untrusted Trusted

Page 11: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

© 2015 Forrester Research, Inc. Reproduction Prohibited 11

Zero Trust

Untrusted Untrusted

Page 12: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

© 2015 Forrester Research, Inc. Reproduction Prohibited 12

› A new model of information security that identifies the fundamental problem

as a broken trust model where users and traffic inside the network are

trusted, and those external to the network are untrusted.

Zero Trust is . . .

Page 13: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

> 50%

Old school vs. new school

33%

20%

16%

13%

10%

7%

0%

5%

10%

15%

20%

25%

30%

35%

Budgeted or earmarked spending according to six IT security layers

Network

Data

Application

Human

Physical

Host

Ponemon Institute 2014 Cost of Cyber Crime Study, based on survey of 257 organizations in six countries

Our enterprise

Discovery

Their

ecosystem

Infiltration

Exfiltration

Research

Capture

Page 14: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Ignoring applications

2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations Report, Verizon,

2015 / Akamai's State of The

Internet / Security, Akamai, 2015 / The State of Mobile Application Security, Ponemon, 2015

57% of IT leaders test less than half of

their web applications

Only 32%of IT leaders test more than three

quarters of web applications

65% of companies

admit application security is often

put at risk because of customer

demand or need

77% of company

leaders cite rush-to-release

pressures as a primary reason

why mobile apps contain

vulnerable code

Page 15: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Overlaps and gapsIT

OperationsIT Security

Budget

We can’t automate remediation

We maintain a security configuration DB

We monitor the environment, find issues and fix them

We maintain an asset configuration DB

We have automation tools

We monitor the environment, find issues and fix them

Page 16: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Polling question #2Which of the below is your top security concern?

1. Securing my applications (secure code, runtime protection)2. Real time visibility into the compliance state of the IT environment3. Speed and effort involved in compliance remediation (e.g. patching)4. Ability to identify and track slow moving threats5. Lack of coordination between security, operations and applications

16

Page 17: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

DevOps “Continuous everything”

Continuous Integration and Testing Continuous Operations

Continuous Delivery & Deployment

Continuous Assessment

DEVELOPMENT TESTING RELEASE DEPLOY

Page 18: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Converged SecurityThe art of building bridges

Page 19: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Security Compliance &

Automated Remediation

Secure

Application Lifecycle

Management

Augmented Cyber

OperationsSecurity Asset Lifecycle

Management

Security

Analytics

The pillars of Converged Security

Page 20: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Security by designFrom overlay to embedded

Strategy to Portfolio Requirement to Deploy Request to Fulfill Detect to Correct

Secure application lifecycle management

Security Asset Lifecycle Management

Security Compliance & Automated Remediation

Augmented Cyber Operations

Security analytics

Page 21: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Polling question #3From which use case do you see potential benefit (check all that apply)?

21

Secure application lifecycle management

Security compliance & automated remediation

Augmented cyber operations

Security analytics

Security asset lifecycle management

Page 22: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

The vulnerable digital enterprise

22

Traditional approach

Evolving problem

Lack of threat

prioritization

Siloed

organizations+ + +

= vulnerable digital enterprise

Page 23: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Do we have the right focus?

Base: 692 security technology final purchase decision-makers at the manager level or above at organizations with 500+ employees in North America, Europe, and Asia Pacific

(selected variables shown)

Source: Global Business Technographics® Security Survey, 2015, Forrester Research, Inc.

Page 24: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Enhance, not replace

Base: 270 IT managers involved in security decisions in enterprises in North America, Europe, and APAC

(percentages may not total 100 because of rounding)

Source: A commissioned study conducted by Forrester Consulting on behalf of Hewlett Packard Enterprise, October 2015

Page 25: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Benefits realized

Base: 270 IT managers involved in security decisions in enterprises in North America, Europe, and

APAC

Source: A commissioned study conducted by Forrester Consulting on behalf of Hewlett Packard

Enterprise, October 2015

Base: 247 IT managers involved in security decisions in enterprises in North America, Europe, and

APAC with widespread adoption of at least one converged security best practice

Source: A commissioned study conducted by Forrester Consulting on behalf of Hewlett Packard

Enterprise, October 2015

Page 26: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Summary

26

1 Zero Trust Model

2

3

Challenges: silos, old school approach, evolving threats, application neglect, lack of focus

Converged Security: use case oriented, security-by-design

Reduce Risk

Cost

MTTR

IncreaseCompliance

Productivity

Page 27: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Find out more

27

http://www.hpe.com/software/convergedsecurity

Page 28: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Thank you

28

Page 29: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Discover 2016 is Hewlett Packard Enterprise’s must-attend global customer and partner event. Why attend?

• Explore how Hewlett Packard Enterprise is delivering IT solutions for the New Style of Business to help you go further, faster

• Network with 10,000+ attendees, including C-level executives, IT directors, engineers and HPE experts

• Find content for you, choosing from our broad array of technical and business sessions

• Explore the latest innovations from HPE in the Transformation Zone

• Find thousands of experts on hand to answer your questions and address your challenges

• Exchange ideas, information and best practices with other IT professionals and industry leaders

Register Now and receive your member discount with this

Vivit registration link:https://www.hpe.com/events/discoverSWVivit

Page 30: Converged Security - protect your digital enterprise€¦ · 2015 Cost of Cyber Crime Study: Global, Ponemon, 2015 / Cost of a Data Breach, Ponemon, 2015 / Verizon Data Breach Investigations

Thank you

• Complete the short survey and opt-in for more information from Hewlett Packard Enterprise.

www.hpe.com

www.vivit-worldwide.org

© Copyright 2016 Vivit Worldwide