Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
IBM Security A New Era of Security for a New Era of Computing Pelin Konakcı IBM Security Software Sales Leader.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Website Hardening HUIT IT Security | Sep
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
© 2014 PayPal Inc. All rights reserved. Confidential and proprietary. Leveraging Information to Detect and Prevent Insider Attacks Phoram Mehta Senior.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
The Changing World of Endpoint Protection
(CISCO) Self-Defending Networks Ben Sangster. Agenda (CISCO) Self-Defending Network Concept Why do we need SDN’s? Foundation of the CSDN? Endpoint Protection.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Built on Azure, Moodle Helps Educators Create Proprietary Private Web Sites Filled with Dynamic Courses that Extend Learning Anytime, Anywhere MICROSOFT.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
DenyAll Delivering Next-Generation Application Security to the Microsoft Azure Platform to Secure Cloud-Based and Hybrid Application Deployments MICROSOFT.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
ProcessFrame QMS Is a Quality Management System that Supports ISO 9001:2015 Standard and Runs on the Microsoft Azure Cloud Platform MICROSOFT AZURE ISV.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Enterprise Network Security Threats that are Overlooked.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Central for partners and customers: overview and new features
OIT Security Operations
The time to address enterprise mobility is now
Chapter 6: Securing the Cloud
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Accelerate GDPR compliance with Microsoft 365
Security Training and Certification A look at why security should become a part of your DNA
Journey to Microsoft Secure Cloud
Strategies & Tactics for Data Security
Trends in Ransomware Distribution
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Matt G change over point ?
Making Information Security Manageable with GRC
Securing Your Digital Transformation
Threat Landscape for Data Security
Strong Security for Your Weak Link:
Cyber Security 2017 Trends and Start Ups.
EU GDPR a Cyber Security Perspective
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
ResourceFirst Puts Emphasis on Communication, Uses Power of Azure to Bring Successful Resource and Portfolio Management to Companies Globally MICROSOFT.
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Carl Data Solutions Collects Utility Sensor and Meter Data to Provide Advanced Reporting, Alarming, and Analytics with Microsoft Azure MICROSOFT AZURE.
BigDataRevealed Secure/Sequester and Encrypt
Securing the Threats of Tomorrow, Today.
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
12 STEPS TO A GDPR AWARE NETWORK
Secure once, run anywhere Simplify your security with Sophos
Improve Patient Experience with Saama and Microsoft Azure
Windows 10 Enterprise subscriptions in CSP – Messaging Summary
The MobileIron® Threat Detection difference:
Securely run and grow your business
Microsoft Data Insights Summit
Introduction to Symantec Security Service
Plan and design the solution
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions

“May you live in interesting times.” –Chinese Curse I always thought it was a blessing!

10 Steps to manage security in this new world 1.Change the conversation from security to risk 2.Understand the adversaries focus and their attack model –Utilize external sources and partners for information –What components will be under attack? –Why? How? By whom? 3.Understand your crown jewels –Focus security efforts on the most important areas –Data, Brand, Privacy, Applications, People

10 Steps to manage security in this new world 4.Take care of good Hygiene –Keep current on patches –Utilize the network as an inspection, data gathering and control point. Not just a port blocker –Manage Identities, especially the privileged users they are your weakest link –Utilize stronger authentication and adaptive authentication –Move from Roles to Rules and develop a dynamic approach to identity management –Schedule annual big picture security reviews –Develop strong remediation plans and have appropriate resources on retainer

10 Steps to manage security in this new world 5.Reduce the attack aperture –Design patterns to minimize trust boundaries –Isolate solutions when possible and created trust zones in untrusted environments 6.Utilize encryption –As a regulatory enabler –As an access enabler –As a privacy enabler 7.Decrypt as necessary and inspect critical data –Dell Threat report shows 64.6 % of web traffic now SSL/TLS –The adversaries are using this to their advantage

10 Steps to manage security in this new world 8.Utilize intelligent solutions that off load work and use intelligence of others –No matter your size you can not do everything on your own –Look for strong research teams and autonomous updates 9.Don’t just enable collection of data. Enable intelligence gathering and knowledge –Turn data into actionable knowledge –Model the behavior of the system and understand deviations 10.Move towards Security analytics, make data available and accessible for analysis –IOT, Insider threat detection move us to a new era of security and also a new era of privacy concerns

How to select the correct vendor/partner Security vendor landscape is crowded and growing –551 Vendors at RSA this year over 30,000 Attendees –100’s of new vendors and startups Everyone wants your time and to sell you the greatest new thing Look for vendors –That will be your partner or have a strong eco system of partners –That understand the critical nature of your business –That don’t just want to sell you a product but want to provide you a solution –That provide ideas and guidance not silver bullets Look for products –That have intelligence and research behind them that protect you automatically and grow with you –That solve security problems while enabling you to do more with your business –That provide appropriate risk reduction vs cost –That have appropriate teams surrounding them –That show innovation and have a path to the future

The Future Prescriptive Analytics Dynamic Identity and Risk Analysis Insider Threat Advanced Malware detection and personalization Advanced Data Protection and Classification Human-Centric Security Security Intelligence R&D IOT Security Security Orchestration

Network Deep protection and control without impacting network performance Next Gen Firewall Secure Mobile Access Security Dell SonicWALL Server, Data, Endpoints Protect data wherever it goes Encryption Configuration and Patch Management Secure Cloud Client Protected Workspace DDPE (Credant), Dell KACE, Windows Mgmt User Identity and access mgmt for the real world Identity Governance Privileged Management Access Management Compliance and IT Governance Dell One Identity Solutions Services Protect, predict and respond to threats Incident Response Managed Security Services Security and Risk consultation Threat Intelligence Dell SecureWorks Dell’s Security Portfolio Our approach allows customers to align security strategy to business needs.

Q&A