intelligence driven security
TRANSCRIPT
1RSA CONFIDENTIAL—INTERNAL USE ONLY
Intelligence Driven Security07.10.2015
Lara MAIER Distribution
Manager G,A, CEE&SEE
2RSA CONFIDENTIAL—INTERNAL USE ONLY
RSA is about delivering a Trusted Digital World and we do that by applying our Intelligence Driven Security Strategy
RSAWhat do we stand for and why?
3RSA CONFIDENTIAL—INTERNAL USE ONLY
Agenda Evolving IT Infrastructure The Changing Threat Landscape Kill Chain Intelligence Driven Security Benefits of Intelligence Driven Security
4RSA CONFIDENTIAL—INTERNAL USE ONLY
Mainframe, Mini ComputerTerminals
LAN/Internet Client/ServerPC
Mobile Cloud Big Data SocialMobile Devices
1ST PLATFORM
2ND PLATFORM
3RD PLATFORM
MILLIONS OF USERS
THOUSANDSOF APPS
HUNDREDS OF MILLIONS OF USERS
TENS OF THOUSANDSOF APPS
BILLIONSOF USERS
MILLIONSOF APPS
Source: IDC, 2012
2010
1990
1970
5RSA CONFIDENTIAL—INTERNAL USE ONLY
CustomersPartners
Third-Parties
On-Prem
MobileEmployees
BYOD
Cloud
Shadow IT
THE EVOLVING IT INFRASTRUCTURE
6RSA CONFIDENTIAL—INTERNAL USE ONLY
SECURITY & RISK CHALLENGES
CustomersPartners
Third-Parties
On-Prem
MobileEmployees
BYOD
Cloud
Shadow IT
Managing Identities & Access
Detecting & StoppingThreats
Preventing Fraud &Cybercrime
EnsuringCompliance
7RSA CONFIDENTIAL—INTERNAL USE ONLY
Emergence of New Attackers
Nation state
actors
PII, government, defense industrial base, IP rich organizations
Criminals
Petty criminals Organized crimeOrganized, sophisticated supply chains (PII, financial services, retail)
Unsophisticated
Non-state actors
Terrorists Anti-establishment vigilantes“Hacktivists”Targets of opportunity
PII, Government, critical infrastructure
11RSA CONFIDENTIAL—INTERNAL USE ONLY
SHIFT PRIORITIES AND CAPABILITIES
Today’sPriorities
Prevention80%
Monitoring15%
Response5%
Prevention80%
Monitoring15%
Response5%
Prevention33%
Intelligence-DrivenSecurity
Monitoring33%
Response33%
12RSA CONFIDENTIAL—INTERNAL USE ONLY
RSA’S PRODUCT PORTFOLIO
IDENTITY & ACCESS
SecurID – Adaptive Authentication – Identity Mgmt & Gov
GOVERNANCE, RISK, & COMPLIANCEArcher GRC
MONITORING & ANALYTICSSecurity Analytics – ECAT
Web Threat Detection
RSA Research
13RSA CONFIDENTIAL—INTERNAL USE ONLY
• Risk-driven– Prioritize activity and resources
appropriately• Incremental and achievable
– New capabilities improve your maturity over time
• Future-proof– Enables response to changes in landscape
not based on adding new products• Agile
– Enables the business to take advantage of new technology and IT-driven opportunities
THE BENEFITS OF OUR APPROACH