Relentless 7 steps for cyber security operation

70
RELENTLESS Why your cyber security operation can never rest and seven ways to keep it one step ahead

Transcript of Relentless 7 steps for cyber security operation

Page 1: Relentless 7 steps for cyber security operation

RELENTLESSWhy your cyber security operation can never rest and seven ways to keep it one step ahead

Page 2: Relentless 7 steps for cyber security operation

SAY WHAT YOU WANT ABOUT CYBER SECURITY

Page 3: Relentless 7 steps for cyber security operation

IT

Page 4: Relentless 7 steps for cyber security operation

NEVER

Page 5: Relentless 7 steps for cyber security operation

GETS

Page 6: Relentless 7 steps for cyber security operation

BORING

Page 7: Relentless 7 steps for cyber security operation

On the one hand, you’re dealing with a threat landscape that won’t stop changing, with new hackers and tactics and threats emerging every day.

Page 8: Relentless 7 steps for cyber security operation

On the other, you’re dealing with rapid change in your own infrastructure, with new users and apps and data and devices…

Page 9: Relentless 7 steps for cyber security operation

IN SHORT,

CYBER SECURITY NEVER STOPS.

Page 10: Relentless 7 steps for cyber security operation

You can’t stop your business from developing the new applications it needs.

Page 11: Relentless 7 steps for cyber security operation

You can’t stop attackers from discovering and distributing new ways to breach your defenses.

Page 12: Relentless 7 steps for cyber security operation

And you certainly can’t afford to stop patching your systems and learning from the latest threat intelligence.

Page 13: Relentless 7 steps for cyber security operation

IF YOU SLOW DOWN YOU’RE JUST MAKING YOURSELF AN EASY TARGET.

Page 14: Relentless 7 steps for cyber security operation

It’s what makes cyber security so endlessly interesting and ruthlessly challenging all at once.

Page 15: Relentless 7 steps for cyber security operation

But even though change is the only constant, cyber defenses are often still too rigid.

Page 16: Relentless 7 steps for cyber security operation

MOBILE + DYNAMICEndpoints are

but the ability to monitor and manage them has struggled to keep up.

Page 17: Relentless 7 steps for cyber security operation

HUMAN + VERSATILEAttackers are

but too many defenses are automated and homogenous.

Page 18: Relentless 7 steps for cyber security operation

+ USER PRODUCTIVITY

Processes get in the way of

so it’s no surprise that people find ways around them.

Page 19: Relentless 7 steps for cyber security operation

HERE’S THE CHALLENGE: CYBER SECURITY CAN’T BE TREATED LIKE A STATIC, PREVENTATIVE DISCIPLINE.

Page 20: Relentless 7 steps for cyber security operation

And it can’t be seen as just an IT thing, either. If you’re going to deliver innovative new services, cyber security needs to be at the heart of everything you do. This is about growth, too.

Page 21: Relentless 7 steps for cyber security operation

Cyber security must be treated like a never-ending process of continuous improvement.

Page 22: Relentless 7 steps for cyber security operation

A process that evolves and adapts as rapidly as the criminals trying so hard to beat us.

Page 23: Relentless 7 steps for cyber security operation

predict

respond

preventdetect

One that takes a holistic approach to every aspect of cyber security, to predict, prevent, detect and respond to emerging threats with confidence and speed.

Page 24: Relentless 7 steps for cyber security operation

And one that supports businesses to meet their evolving strategic goals.

Page 25: Relentless 7 steps for cyber security operation

WE CALL THIS APPROACH LIVE SECURITY.

Page 26: Relentless 7 steps for cyber security operation

And we believe it takes a tacit commitment to seven fundamental principles to effectively predict, prevent, detect and respond to attacks.

Page 27: Relentless 7 steps for cyber security operation

1. IT TAKES MAN AND MACHINE TO WIN.

Page 28: Relentless 7 steps for cyber security operation

Attackers combine people, process and technology to get past your defences. You need the same thing

the right combination of people, process and technology to fend them off.

Page 29: Relentless 7 steps for cyber security operation

It takes the scalability of software to secure all your endpoints and constantly incorporate the latest threat intelligence.

Page 30: Relentless 7 steps for cyber security operation

But it takes real-world human and hacker expertise to assess your operations, find vulnerabilities, configure your software the right way and then respond to the right signs.

Page 31: Relentless 7 steps for cyber security operation

2 LOCAL AND INDUSTRY-SPECIFIC EXPERTISE MATTERS

Page 32: Relentless 7 steps for cyber security operation

Different industries need to deal with different types of attacks and regulations.

Page 33: Relentless 7 steps for cyber security operation

It takes a very different approach to cyber security to protect a global brand’s intellectual property than it does to protect a bank’s sensitive data in a highly regulated environment.

Page 34: Relentless 7 steps for cyber security operation

You can deliver effective security because you understand your industry’s unique needs. So any partners you work with will need to have the same, specific expertise your industry needs.

Page 35: Relentless 7 steps for cyber security operation

When you move into new markets, your cyber security operations need to adapt to the situation on the ground.

For example, the new EU General Data Protection Regulation (GDPR) changes the way businesses handle EU citizens’ data.

Page 36: Relentless 7 steps for cyber security operation

Unless you can take these regional and industry-specific nuances into account, you can’t appropriately organize and prioritize your cyber strategy.

Page 37: Relentless 7 steps for cyber security operation

3 YOU CANNOT IGNORE THE LATEST THREAT INTELLIGENCE

Page 38: Relentless 7 steps for cyber security operation

Every single week of every single month, new threats, tactics and malware emerge to exploit vulnerabilities.

From Sony to Yahoo to Ashley Madison, we’ve already seen the level of all-out extortion tactics hackers will increasingly use. And IoT botnets, for example, will only become a bigger problem as businesses make strategic moves into IoT technology.

Page 39: Relentless 7 steps for cyber security operation

The trouble is that too many cyber security operations don’t have the time or infrastructure to deal with this rate of change.

Page 40: Relentless 7 steps for cyber security operation

Keeping up with the latest threat intelligence can be a struggle. Applying it across the cyber security operation can be even tougher. But it’s a vital foundation for constantly improving your defenses.

Page 41: Relentless 7 steps for cyber security operation

4 CYBER SECURITY MUST BE AGILE

Page 42: Relentless 7 steps for cyber security operation

Attackers can pivot in an instant, seizing new opportunities the moment they open up.

Page 43: Relentless 7 steps for cyber security operation

It’s essential that you have at least as much agility to stay ahead of them.

That starts with a versatile foundation of processes.

Page 44: Relentless 7 steps for cyber security operation

To get it right, you need to be able to predict potential incidents, prevent the vast majority from ever happening, detect them when they do happen and then respond quickly and appropriately once you’ve been breached.

predict

respond

preventdetect

Page 45: Relentless 7 steps for cyber security operation

That calls for everything from patch management to crisis management to be prepared. A lot of which might seem like very basic cyber security for most of us but it can also be very effective.

Page 46: Relentless 7 steps for cyber security operation

Starting with a solid foundation of endpoint protection and adding advanced technology such as analytics and vulnerability management on top makes sense to help predict and prevent incidents.

Page 47: Relentless 7 steps for cyber security operation

But equally, unless you’ve got a predetermined and rehearsed plan for things like breach detection or incident response, you’ll find your company in a state of chaos when something does go wrong.

Page 48: Relentless 7 steps for cyber security operation

5 A DISTRIBUTED ATTACK SURFACE CALLS FOR DISTRIBUTED SECURITY

Page 49: Relentless 7 steps for cyber security operation

Attackers should never know your own infrastructure better than you do.

A successful business relies on clear, constant visibility across complex organizational and IT infrastructures. And today’s mobile workforces depend on constant access to data and services through an ever-growing array of devices.

Page 50: Relentless 7 steps for cyber security operation

But the increasingly distributed and dynamic nature of corporate infrastructures makes it incredibly hard for IT and security leaders to see the edges of their attack surface and even harder to protect it.

Page 51: Relentless 7 steps for cyber security operation

Until you prioritize a centralized view of every endpoint in your networks, you’ll always be flying blind.

But just seeing every endpoint isn’t enough you’ve also got to harden every potentially vulnerable device.

Page 52: Relentless 7 steps for cyber security operation

80%80%

In fact, in 80% of the incidents we’ve responded to, patch management would’ve prevented access. This kind of endpoint protection should be second nature for cyber security operations.

It’s low-hanging fruit and it gets the job done.

Page 53: Relentless 7 steps for cyber security operation

6 COMPLIANCE IS TABLE STAKES

Page 54: Relentless 7 steps for cyber security operation

Regulatory compliance is vital for any business – it’s an essential safeguard for the entire organization, from the boardroom to the shopfloor.

Regulators set the minimum requirements. But that’s just the starting point, not the end goal.

Page 55: Relentless 7 steps for cyber security operation

Most large companies will be compliant but it hasn’t prevented them from being breached. Take Yahoo, for example, regulatory compliance didn’t stop hackers stealing 500 million user accounts.1

1. http://fortune.com/2016/09/22/yahoo-hack/

Page 56: Relentless 7 steps for cyber security operation

For instance, payment regulations such as PCI-DSS don’t cover the full spectrum of preventative defences you could need, let alone the predictive, responsive and detection capabilities you should also consider.

Regulators will react to known issues and compel businesses to fix them, but it takes a proactive approach to keep ahead of the persistent innovation of attackers.

Page 57: Relentless 7 steps for cyber security operation

Regulations are an important starting point for cyber security. But cyber attackers move faster than regulators do. So a relentlessly proactive approach to cyber security is essential.

Page 58: Relentless 7 steps for cyber security operation

7

7 YOU’RE NEVER DONE

Page 59: Relentless 7 steps for cyber security operation

If you take one thing away from this, we’d hope it is this in cyber security, you’re never done.

Page 60: Relentless 7 steps for cyber security operation

THIS MUCH

WE KNOW:

Page 61: Relentless 7 steps for cyber security operation

Your attackers will never relent. So your cyber security operation can never relent. That means it must constantly evolve and improve.

Page 62: Relentless 7 steps for cyber security operation

So rather than expecting a silver bullet technology to come and save the day, it’s important to confront the fundamental reality of cyber security…

Page 63: Relentless 7 steps for cyber security operation

REACTING ISN’T ENOUGH.

Page 64: Relentless 7 steps for cyber security operation

You need a proactive process that’s designed to continuously improve and adapt.

Only then can you effectively predict, prevent, detect and respond to incidents.

Page 65: Relentless 7 steps for cyber security operation

The average cost of a data breach is now $4 million3.

2. 2014 Cyber attack to cost Sony $35 million in IT repairs, Computer World, 20153. 2016 Cost of Data Breach study, Ponemon Institute, sponsored by IBM

THE STAKES

HAVE NEVER BEEN HIGHER²

Page 66: Relentless 7 steps for cyber security operation

The corporate victims have never been more varied.

From retail giants and global financial institutions to hospitals and universities.

Page 67: Relentless 7 steps for cyber security operation

And the role of the cyber security professional has never been harder.

But when you’re armed with the right people, processes and tools

there’s nothing more rewarding

Page 68: Relentless 7 steps for cyber security operation

AND NOTHING MORE IMPORTANT.

Page 69: Relentless 7 steps for cyber security operation

BEHIND THE SCENES OF A REAL WORLD BREACH

Breaches are inevitable. But most companies are worryingly underprepared to handle the consequences of one.

Read ‘The Chaos of a Corporate Attack’ to find out how one company was breached and how they reacted.

Read the eBook

Use our stress test to learn more about the current state of your cyber security operations. Find out what you’re getting right – and where you need to make changes.

Take the stress test

AND PUT YOUR SECURITY OPERATION TO THE TEST

Page 70: Relentless 7 steps for cyber security operation

And our cyber security experts (and white-hat hackers) are constantly bringing back new insights, tactics and lessons learned from their experiences out on the frontline of cyber security. It’s how our Live Security approach powers scalable software that continuously improves to predict, prevent, detect and respond to breaches. So if you’re looking for an approach to cyber security that’s relentlessly moving forward, we should talk.

WE’RE F-SECURE