Data Governance Program September, 2015 “ Better data is everyone’s job! ”
In the IT world, security enables TRUST · INNOVATION CONFIDENTIAL DATA DEVICES ACCESS NETWORK DATA...
Transcript of In the IT world, security enables TRUST · INNOVATION CONFIDENTIAL DATA DEVICES ACCESS NETWORK DATA...
In the IT world, security enables TRUST
“TRUST is like the air we breathe. When it’s present, nobody really notices. But when it’s absent, everybody notices.” - Warren Buffet
Cyber Security The Unknown IntruderShwetha RamuInformation Security Technology Consultant
Oracle Corporation
Agenda
• What is Cyber Security? - Why is it Important?
• Market Trends and Challenges
• Common Perceptions
• Key Enablers and Need for end-to-end Security
• Detective Vs Preventive approach
• Tools and Best Practices
• Q & A
What is Cyber Security?Why is it Important?
RISK
COST
IDENTITY
CROSS BORDERS
VULNERABILITY
INNOVATION
CONFIDENTIAL DATA
DEVICES
ACCESS
NETWORK
DATA LEAKS
ATTACKS
DATA BREACH
PENETRATION
INTERNET OF THINGS (IoT)
THEFT
REGULATORY COMPLIANCE
LEGAL
AUDITS SAFETY
Market Trends and Challenges
Extended Enterprise
Applications,LOB
SocialCollaboration
Mobile Cloud
Transformation
DATA SECURITY BREACH
HOPE IS NOT A STRATEGY
Data Breaches in 2015
Source: Gemalto
Data Breaches in 2015
Source: Gemalto
Source: Gemalto
Data Breaches in 2015
Security Challenges – more than breaches to worry about
Confidentiality / Data-breach
Integrity / Fraud Availability / Sabotage
Cybercrime Trends for 2016
• Onion-Layered Security Incidents
• Ransomware
• Malicious Insider Attacks
• Greater Management Awareness **
Source: IBM Security
Cloud Adoption – Demand for Security
• Changing Threat Vectors
• Everything is driven by Security
• Embracing Security-as-a-Service
• Geographical Boundaries
• Customers taking Responsibility
• Mobile & Cloud convergence
• Top-Down approach
Challenges of Digital Transformation
As Peter Steiner rightly illustrated....
Common PerceptionsAssumptions & Myths
Network Security is Self-Sufficient
Antivirus software prevents Attacks
Fraudsters are always Outsiders
Awareness is individual responsibility
Some Interesting Factoids on Breaches
Source: Mandiant ThreatLandscape
100% of Victims had a Firewall
100% of Victims had Up-To-Date Anti-virus Software
100% of Breaches Involve Stolen Credentials
63% of Breaches Reported by Third Parties
60% of Breaches Took Only Minutes to Compromise
Key Enablers & Need for End-to-End Security
Cyber Security Attacks
• Denial of Service (DoS, DDoS)
• Sabotage
• Phishing & Spoofing
• Malwares (Viruses, Trojans)
• Man-in-the-Middle (MITM)
• Social Engineering
• Privileged Users
• Backdoors / Loopholes
• and many more...
The Impact
£4.1Million per
year in the UK
Source: HP Enterprise Security & The Ponemon Institute
14%Increase year-
on-year average
90%Companies not
prepared
Enterprise-Wide Security practices moderate Costs by an average of more
than
£1.3Million
£1,104
to £232per capita costs
Key Enablers for Cyber Security
• Customer Trust
• Compliance
• Risk Mitigation
• Cost Savings
• Enterprise Security Initiatives from C Level
• Security has NO Geographical Borders
Detective vs. Preventive
Preventive Security
• Anticipate the Threats
• Security Strategy and Architecture
• Deploy Preventive Tools and Controls
• Continuous Monitoring
Intended to PREVENT any unwanted users, activities or incidents
Detective Security
• Identify any on-going incidents
• Analyze and Categorize
• Alerts and Notifications
• Logging
• Auditing and Reporting
• Monitoring Activities
Intended to DETECT any unwanted users, activities or incidents
Corrective Security
• Corrective Actions
• Recovery
• Plan for the Future
LIMIT the DAMAGE from any unwanted users, activities or incidents
As the saying goes,
However... there are some exceptions!!
The Approach to Adopt
DEFENCE-IN-DEPTH
DETECTIVEPREVENTIVE +
Tools & Best Practices
Security By Design
Network SecurityHardware Security
Data SecurityDevice Security
End-User SecurityOperating Systems Security
Security by Design• Security designed from
Ground Up
• Defence in Depth strategy
• Security Architectures
• Least Privilege Model
• Reducing Vulnerabilities
• Risk Mitigation
• Monitoring Effectiveness
Security for the End Users
User Lock Down Controls
• Access Controls
• Roles and Privileges
• Privileged Users – “Break Glass”
• Efficient Passwords
• Segregation of Duties (SoD)
• Multi-Factor Authentication
User Experience Controls
• Single Sign-On
• Self-Service
• Context-Aware Security
• Social Sign-On
• Awareness & Education
Security for the Data
• Encryption, a Must Do! (Data-at-Rest)
• Key Management
• Redaction and Masking
• Privilege Analysis and Controls (Ex: DBA)
• Data Access Controls
• Activity Monitoring
• Firewalls
• Up-to-Date Configurations and Patching
Securing the Network
• Encryption (Data-in-Motion)
• Firewalls, Routers, Ports & Switches
• Demilitarized Zones (DMZ)
• IP Whitelisting and IP Blacklisting
• SSH, TLS/SSL, VPN
• Network Traffic Monitoring
• Intrusion Detection Systems (IDS)
• Security Incident and Event Management (SIEM)
Devices and Hardware Security
• Strong Authentication & Device Lock Policies
• VPN Access / Secure Tunnels
• Remote Access Policies (For Confidential Data, Documents)
• Antivirus, Antimalware Software
• Secure Microchips & Silicon
• Security for external hardware (USB, external Hard Drives, Media etc.,)
• Physical Security
Operating System & Other Security
• Security Certifications
• System Hardening
• Hypervisors
• Monitoring and Audits
• Up-to-Date Configurations and Patching
Some further considerations
• Secure Coding practices
• Security by Design for Applications
Cyber Security – A Necessity or Luxury?
To Summarize
• Cyber Security is Everyone’s Responsibility
• Business transformations driving Security to the Forefront
• Awareness and Education is the Key to Success
Needless to say..
Cyber Security in today’s world is a definite NECESSITY !!
AT THE END IT’S ALL ABOUT......
PROTECTING WHAT MATTERS MOST!!