cyber security threatsisaca.or.ke/resources2017/isaca presentation - handling...addresses security...

17
Identity Driven Security Comprehensive solution Managed mobile productivity Cyber Security Threats

Upload: others

Post on 13-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

Identity Driven Security

Comprehensive solution

Managed mobile productivity

Cyber Security Threats

Page 2: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

The world we live in is

increasingly complex

Page 3: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

Challenges Facing Our Connected World

Page 4: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

Shadow

IT

Data breach

IDENTITY – DRIVEN SECURITY

Employees

Partners

Customers

Cloud apps

Identity Devices Apps & Data

Transition tocloud & mobility

New attack landscape

Current defenses not sufficient

Identity breach On-premises apps

SaaS

AWS, Azure

Page 5: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

CRIT ICAL ASSETS SEPARATED AND PROTECTED

© 2016 HERE

CARCASSONNE, FRANCE

Page 6: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises
Page 7: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

Volume and Impact

Script Kiddies

BLASTER, SLAMMER

Motive: Mischief

2003-2004

Page 8: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

2005-PRESENT

Organized Crime

RANSOMWARE, CLICK-FRAUD,

IDENTITY THEFT

Motive: Profit

Script Kiddies

BLASTER, SLAMMER

Motive: Mischief

2003-2004

Page 9: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

2005-PRESENT

Organized Crime

RANSOMWARE, CLICK-FRAUD,

IDENTITY THEFT

Motive: Profit

Script Kiddies

BLASTER, SLAMMER

Motive: Mischief

2012 - Beyond

Nation States, Activists,

Terror Groups

BRAZEN, COMPLEX,

PERSISTENT

Motives:IP Theft,Damage,

Disruption

2003-2004

Page 10: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises
Page 11: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

How do they get in? How do they get privilege's?

Page 12: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

ANATOMY OF AN ATTACK

Malicious Attachment Execution

Browser or Doc Exploit Execution

Stolen Credential Use

Internet Service Compromise

Kernel-mode Malware

Kernel Exploits

Pass-the-Hash

Malicious Attachment Delivery

Browser or Doc Exploit Delivery

Phishing Attacks / Watering Hole

ESPIONAGE, LOSS OF IPDATA THEFT RANSOMLOST PRODUCTIVITYBUSINESS DISRUPTION

ENTER

ESTABLISH

EXPAND

ENDGAME

NETWORK

DEVICE

USER

Page 13: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

HOW DO BREACHES OCCUR?

Malware and vulnerabilities are not the only thing

to worry about

99.9%of exploited Vulnerabilities were used more than a year after the CVE was published

46%of compromised systems had no malware on them

Fast and effective phishing attacks

give you little time to react

If an attacker sends

an email to 100

people in your

company…

…23 people will

open it…

…11 people will

open the

attachment…

…and six will do it

in the first hour.

Page 14: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

ADDRESSING THE THREATS REQUIRES A NEW APPROACH:

RUIN THE ATTACKERS ECONOMIC MODEL

BREAK THE ATTACK PLAYBOOK

ELIMINATE THE VECTORS OF ATTACK

Page 15: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

IntelligentInnovativeHolistic Identity-driven

Addresses security challenges across users

(identities), devices, data, apps, and

platforms―on-premises and in the cloud

Offers one protected common identity for secure access to all

corporate resources, on-premises and in the

cloud, with risk-based conditional access

Protects your data from new and changing

cybersecurity attacks

Enhances threat and

anomaly detection with

the Microsoft Intelligent

Security Graph driven by

a vast amount of

datasets and machine

learning in the cloud.

IDENTITY – DRIVEN SECURITY

Page 16: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

IDENTITY – DRIVEN SECURITY

1. Protect at the front doorSafeguard your resources at the front door with innovative

and advanced risk-based conditional accesses

2. Protect your data against user mistakesGain deep visibility into user, device, and data activity on-

premises and in the cloud.

3. Detect attacks before they cause damageUncover suspicious activity and pinpoint threats with deep

visibility and ongoing behavioral analytics.

Page 17: Cyber Security Threatsisaca.or.ke/resources2017/ISACA Presentation - Handling...Addresses security challenges across users (identities), devices, data, apps, and platforms―on-premises

Identity-driven security

Protect against advanced threats