A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations.

Slides:



Advertisements
Similar presentations
Digital Investigations of Any Kind ONE COMPANY Cyber Intelligence Response Technology (CIRT)
Advertisements

1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Jinhyun CHO Senior Researcher Korea Internet and Security Agency.
SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
Sponsored by Lumension Ponemon Institute© Private & Confidential Document Page Security Mega Trends Survey Independently conducted by Ponemon Institute.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Information Security in Higher Education Today Current Threats
16254_08_2002 © 2002, Cisco Systems, Inc. All rights reserved. Cisco’s Security Vision Mario Mazzola Chief Development Officer August 29, 2002.
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Building Trust in Digital Online World Dr. Shekhar Kirani Vice President VeriSign India 5th June 2009 IBA Conference.
The New World of Security for Business Travellers Anurag Lal Senior Vice President Strategic Services & Business Development Wi-Fi Business Development.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Symantec Security Intelligence Internet Security Threat Report Volume XVI June, 2011 Tiffany Jones Director – Programs and Strategy Symantec Public.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Storage Security: The Next Frontier Jim Anderson Vice President, Marketing Networking and Storage Products Group May 2008.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
1 Internet Security Threat Report X Internet Security Threat Report VI Figure 1.Distribution Of Attacks Targeting Web Browsers.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Robbie Upcroft Sales Manager - SMB & Distribution, Asia-Pacific
Jonathan Baulch  A worm that spreads via USB drives  Exploits a previously unknown vulnerability in Windows  Trojan backdoor that looks for a specific.
Dell Connected Security Solutions Simplify & unify.
Computer Science and Engineering 1 Cloud ComputingSecurity.
1.Too many users 2.Technical factors 3.Organizational factors 4.Environmental factors 5.Poor management decisions Which of the following is not a source.
44 Montgomery Street Suite 960 San Francisco, CA USA Tel Cell
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
Maintaining a Secure Messaging Environment Across , IM, Web and Other Protocols Jim Jessup Regional Manager, Information Risk Management Specialist.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Lessons from Stuxnet Matthew McNeill. Quick Overview Discovered in July 2011 Sophisticated worm - many zero-day exploits, Siemens programmable logic controller.
The Changing World of Endpoint Protection
Where in the world is your data? Data Breach Analysis Angelbeat Seminar Billy Austin, President iScan Online, Inc.
Maritime Cyber Security: An Overview May | | What is Maritime Cyber Security?
Emerging Security Trends & Technologies Presented by Santhosh Koratt Head Consulting & Compliance SecureSynergy Pvt.Ltd.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Randy Beavers CS 585 – Computer Security February 19, 2009.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
The Internet of Things, WTF? Rik Ferguson Vice President, Security Research Trend #CLOUDSEC.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Reach us at Call: | Visit:
Securing Information Systems
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Understanding DATA LOSS PREVENTION
Executive Director and Endowed Chair
TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES NAMED AFTER MUHAMMAD AL-KHWARIZMI THE SMART HOME IS A BASIC OF SMART CITIES: SECURITY AND METHODS OF.
Journey to Microsoft Secure Cloud
Compliance with hardening standards
Securing Information Systems
CIS 560 Education for Service-- snaptutorial.com.
CIS 560Competitive Success/tutorialrank.com
CIS 560 Education for Service-- tutorialrank.com.
Virtual Private Network (VPN) Market
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
CIS 560 Teaching Effectively-- snaptutorial.com
Cyber Security and Consumer Financial Transactions Data Security
Internet Security Threat Status
Overview of Electronic Commerce
Securing the Threats of Tomorrow, Today.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Computer Science and Engineering
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
Presentation transcript:

A New Security Blueprint Shantanu Ghosh Vice President, Enterprise Security & India Product Operations

On July 13, 2010 a unique form of malware was discovered that was attempting to take control of industrial infrastructure around the world... THREAT

SCADA Stuxnet Stealthy malware Propagates through USB drives Exploits 4 zero-day vulnerabilities

Challenges Sophisticated Attackers Hydraq or “Google attacks”, ShadowNet, Zeus Shift in nature of threats distinct bot-infected computers in India in ’09 India ranks high for viruses, worms and trojans

Poorly Enforced IT Policies Challenges Explosion of Information 50% Growth Structured Unstructured Costs Unsecured information is a liability Growth of unstructured data pegged at over 60% per year Total volume of digital information to reach 1,773 exabytes by 2011

Challenges Complex Heterogeneous Infrastructure Multiple vendor and device environment Consumerization of IT and the increasing use of employee-owned endpoints Need for actionable intelligence 1 bn mobile devices will access internet by end of yr Over 3 mn iPads sold till June 2010

Poorly Managed Systems Challenges Cost of a Data Breach Competition, compliance and credibility black hole All Indian enterprises surveyed lost revenue due to cyber attacks Average enterprise is exploring 17 standards and frameworks Cost of a data breach $204 per compromised record 50 % information residing in enterprises is sensitive

Symantec Enterprise Vision and Strategy Consumerization of IT Partners Employees Customers Society Social Mobile Cloud & Virtualization New Demands of a Connected Enterprise

Organiz ed Criminal Malici ous Insider Organiz ed Crimina l Malicio us Insider Risk Based and Policy Driven Information Centric Information Centric Actionable Intelligence A Holistic Information Approach to Security Well Managed Infrastructure

The Information-Centric Model Symantec Enterprise Vision and Strategy Classification Ownership Threats Discovery Encryption Compliance Reporting Remediation Policy Identity

Poorly Managed Systems Thank You