shadow it security gaps and 7 resolutions...shadow it security gaps and 7 resolutions ben cody |...

17
Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP

Upload: others

Post on 27-Jun-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Shadow IT Security Gaps and 7 ResolutionsBen Cody | Head of Product Management for DLP

Page 2: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Shadow IT consists of SaaS

applications used by

employees for business,

which have not been

approved by the IT

department or obtained

according to IT policies.

2

Page 3: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Research Undertaken

• Contents based on McAfee / Intel Security Commissioned Report on Shadow IT

• Research conducted by Stratecast | Frost and Sullivan

• Includes 167 respondent companies, and 600 individuals (equal number LOB & IT)

3

Page 4: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

What’s driving Shadow IT?

1. Ease of access

2. Ease of maintenance

3. Free or low cost

4. Quick deployment

People want to get their job done.

4

Page 5: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

How pervasive is the problem?

5

0%

10%

20%

30%

40%

50%

60%

70%

80%

None 1 to 5 6 to 10 11 to 19

Number of Apps used by Respondent

IT LOB

9%

66%

20%

6%

15%

78%

5%2%

0%

10%

20%

30%

40%

50%

60%

70%

80%

90%

None 1 to 5 6 to 10 11 to 19

Non Approved App Usage by Dept

IT LOB

Source: Frost and Sullivan

Everyone does it, but IT is even more likely to use shadow IT!

Page 6: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Corporate Policies are not clear or well understood. IT and LOB have different views.

What exacerbates the problem?

0% 5% 10% 15% 20% 25% 30%

LOB has full authority

LOB has authority but must consult with IT

IT has full authority

IT offers a marketplace of options

IT researches options but LOB has final decision

LOB has limited authority for non-critical systems

Not sure

No policy whatsoever

Which statement best describes your organizations SaaS usage policy?

LOB IT

6

Source: Frost and Sullivan

Page 7: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Here’s the Top Five Reasons

Why do they do it?

1. They are more familiar with it (the SaaS application).

2. IT process for new application requests is too cumbersome.

3. The non-approved solution meets my needs better than the approved solution.

4. I tried to get approval first, was denied, but am using it anyway.

5. It’s free.

7

Source: Frost and Sullivan

Page 8: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

It’s not just Facebook…

What are they using it for?

Business Productivity is largest category, closely followed by social media.

Fastest growing category of apps are HR, Finance,

Legal, and CRM/ERP.

8Source: Frost and Sullivan

Page 9: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

The Top 5 Security Concerns Users Cited for Shadow IT

They recognize the risk, but do it anyway!

1. Sensitive corporate or personal data will be accessed or stolen by unauthorized actors

2. Sensitive corporate or personal data will be accidentally exposed

3. Account information will be compromised

4. Corporate reputation will suffer

5. Data will be lost or deleted

9

Source: Frost and Sullivan

Page 10: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

And the risk is real!

10Source: Frost and Sullivan

0%

5%

10%

15%

20%

25%

30%

35%

40%

Faceb

ook

Lin

ked

In

Tw

itte

r

YouT

ube

Da

ilym

otion

Goo

gle

+

Tum

blr

Blo

gger

Word

pre

ss

Dro

pbox

Box v

ia

Goo

gle

Drive

Mic

roso

ft S

kydri

ve

Apple

iC

loud

YouS

en

dIt/H

igh

tail

Mo

zy v

ia

Goo

gle

Ap

ps

Mic

roso

ft O

ffic

e 3

65

Zoh

o

Adob

e C

rea

tive C

loud

Clo

ud

On

Ope

n X

ch

ang

e

Goo

gle

Docs

Mic

roso

ft S

hare

poin

t

IBM

Sm

art

Clo

ud

Goo

gle

Cha

t

AO

L Insta

nt M

esse

nge

r

Trilli

an

Jiv

e

Webe

x

Citrix

Co

nfe

ren

ce

Plu

s

Adob

e C

onne

ct

Skype

Inte

rCall

Goo

gle

Vo

ice

Join

.me

Social Media File Sharing, Storage, andBackup

Business productivity Collaboration Web Conferencing

Security Incidents by Category / Application

Page 11: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Here’s what to do

Seven Steps to Address Shadow IT

1. Establish a clear policy that aligns with your business objectives and culture

2. Allow users a degree of choice – e.g. 2 or 3 options in each category

3. Consider single sign on tools to reduce password re-use risk

4. Make sure you have an end user awareness and engagement program (no FUD!)

5. Make sure you’ve got the technology basics in place – email & web gateways, DLP, etc.

11

Page 12: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Technology Maturity Model – Draft

Improved Breach Security, Usability, Cost, Operations

Enhanced+ Anti-theft: remote locate, lock,

wipe

+Client SSD with encryption

+ Policy based encryption for files and folders

+ Endpoint DLP

+NDLP monitoring & capture

+Multi-factor authentication with timeout

+ Secure remote administration, HW enabled

+ Server / database / backup encryption, HW accelerated

Advanced+ Server SSD with encryption

+NDLP “prevent”

+ Endpoint detection and response

+Database activity monitoring

+Digital forensics capabilities

+ SIEM

+ Threat intelligence exchange / collaboration

+MFA with walk-away lock

Baseline+ Anti-malware

+ Endpoint device encryption with HW acceleration

+Mobile device management

+ DLP discovery

+ Device control

+ Email and web gateways

+ Single factor access control

+ Penetration testing / vulnerability scanning

NoneNo security controls

12

Page 13: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Here’s what to do

Seven Steps to Address Shadow IT

1. Establish a clear policy that aligns with your business objectives

2. Allow users a degree of choice – e.g. 2 or 3 options in each category

3. Develop clear metrics for measuring your initiative’s success

4. Make sure you have an end user awareness and engagement program (no FUD!)

5. Make sure you’ve got the technology basics in place – email & web gateways, DLP, etc.

6. Implement rules gradually to reduce risk without undue business impact

7. Develop a comprehensive data protection program

13

Page 14: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Successful Data Protection

14

Examples of Key Elements of Program Success

Risk Based Approach

Clear Governance

Structure

Defined Policies and Principles

Centralized IT Event Triage

Business units own Data

Business units own and resolve

incidents

Business units provide priorities

Senior Management

Support

Effective end-user awareness

and training

Technology shapes end-

user behavior

Page 15: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Be more responsive to the business. There’s a reason why shadow IT is popular.

Step Eight – Bonus

• If you are not responsive, you are not relevant. Do you have good processes in place for dealing with demand management? Above and beyond break fix?

• Getting these in place is perhaps the best answer for proactively addressing the problems of shadow IT.

15

Page 16: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

Find Out More

16

For the full report visit

http://mcafee.com/shadowit

Contact Ben at

[email protected]

Page 17: Shadow IT Security Gaps and 7 Resolutions...Shadow IT Security Gaps and 7 Resolutions Ben Cody | Head of Product Management for DLP Shadow IT consists of SaaS applications used by

17