Presentation is loading. Please wait.

Presentation is loading. Please wait.

CIO Perspectives on Security Marcos Alves Regional Sales Manager Protegendo seu Ambiente em tempo de Ameaças modernas.

Similar presentations


Presentation on theme: "CIO Perspectives on Security Marcos Alves Regional Sales Manager Protegendo seu Ambiente em tempo de Ameaças modernas."— Presentation transcript:

1 CIO Perspectives on Security Marcos Alves Regional Sales Manager Protegendo seu Ambiente em tempo de Ameaças modernas

2 Key Perspectives 2 | ©2014, Palo Alto Networks. Confidential and Proprietary. Think Strategically about Security Safely Enable the Business – Safe Enablement Apply Innovative Thinking to Security Challenges

3 3 | ©2014, Palo Alto Networks. Confidential and Proprietary. Table of Contents CIO Perspectives on Security Changing IT and CIO Role Good/Bad News Story Rethinking Security Strategically CIO Considerations for the Future 1 2 3 4

4 Suddenly, Your Board is (More) Interested in Security 4 | ©2014, Palo Alto Networks. Confidential and Proprietary. What Are You Telling Your Board?  Key threats  Key risks  Key assets  Breach “inevitable,” acceptable?  Risk/security posture adequate?  Required investments?

5 Business Opportunities Security Risks SaaS Mobility + BYOD Social + Consumerization Cloud + Virtualization Opportunity or Challenge? IT Must be a Strategic Business Enabler The Role of IT and the CIO is Changing 5 | ©2014, Palo Alto Networks. Confidential and Proprietary. Tectonic Shifts in Business Give Rise to a New Era of Advanced Cyber Threats

6 The CIO Must Make Security a Top Priority 6 | ©2014, Palo Alto Networks. Confidential and Proprietary.  IT service model changing  Security is higher priority for CIO  Sophisticated attackers, evolving tactics  Spotlight is on CIO in the face of breaches  Cannot delegate security any longer  No one is immune to advanced threats  A new approach is needed

7 Emerging CIO Priorities – Are You Prepared? 7 | ©2014, Palo Alto Networks. Confidential and Proprietary. Service/Performance Traditional Emerging Priorities Cloud/Disintermediation Secure Cloud Visibility – Network and Data Zero Trust Model Disruptive “Kill Chain” Solutions Close Monitoring and Analytics Perimeter Security Application Proliferation Uncontrolled Data Movement Data Center and Endpoint Security Ineffective Endpoint and Silo’d Network Protection

8 Challenges and Change Introduce Tremendous Risks 8 | ©2014, Palo Alto Networks. Confidential and Proprietary. Reliance on Multiple Layers of Service Providers Application Economy Consumerization of IT Internet of Things Social, Mobile, Analytics, Cloud Organizational Risk Risk Exposure Rate of Change/Complexity Decreasing Visibility and Control

9 Security Can Also be an Enabler 9 | ©2014, Palo Alto Networks. Confidential and Proprietary.  Effective outreach to customers  Collaboration and information sharing  Creation of forums and communities of interest  Data analytics for insight and competitive advantage  Faster time-to-market of information and products Safe Enablement Principles Organization Needs and Requirements Objectives  Growth  Efficiency  Profitability  Flexibility  Product  Costs Risks  Brand/Image  Financial  Competitive  Operational  Regulatory External Drivers  Market/Industry  Technology  Competitors Adopt Emerging Security Faster Robust Enterprise Security Architecture Enable with the Right Security Outcomes Design for Prevention, Prepare for Remediation Prevent Lateral Attacker Movement Protect the Data Center  Improve patient care and access to records/information  Improve doctor-patient communications  Improve clinical research/ discovery thru better information integration

10 10 | ©2014, Palo Alto Networks. Confidential and Proprietary. Table of Contents CIO Perspectives on Security Changing IT and CIO Role Good/Bad News Story Rethinking Security Strategically CIO Considerations for the Future 1 2 3 4

11 Good News 11 | ©2014, Palo Alto Networks. Confidential and Proprietary. The Basics Are Still Critically Important Governance Security Frameworks PoliciesStandards Risk and Compliance Management Identity and Access SSO Strong Password Multi-Factor Authentication Certificates Data Protection Encryption Key Management Data Leak Protection Backup and Archive Logging and Monitoring Audit LogsMeasurementsCorrelationRetention

12 Bad News – Line of Security Products Anti-APT for Port 80 APTs Anti-APT for Port 25 APTs Endpoint AV DNS Protection Cloud Network AV DNS Protection for Outbound DNS Anti-APT Cloud Internet Enterprise Network UTM/ Blades DNS Alert Endpoint Alert Web Alert SMTP Alert Web Alert DNS Alert SMTP Alert APT Web Alert AV Alert Web Alert DNS Alert SMTP Alert Endpoint Alert Lacks IntegrationAlert OverloadManual Response Vendor 1 Vendor 2 Internet Connection Malware Intelligence Vendor 3 Vendor 4 Limited Visibility AV – Anti Virus APT – Advanced Persistent Threat UTM – Unified Threat Manager Failing Security Architectures Provide a False Sense of Security 12 | ©2014, Palo Alto Networks. Confidential and Proprietary.

13 Understanding the Attack Kill Chain Methodology ReconnaissanceWeaponization and Delivery ExploitationCommand-and-ControlActions on the Objective Unauthorized AccessUnauthorized Use Installation 13 | ©2014, Palo Alto Networks. Confidential and Proprietary.

14 14 | ©2014, Palo Alto Networks. Confidential and Proprietary. Table of Contents CIO Perspectives on Security Changing IT and CIO Role Good/Bad News Story Rethinking Security Strategically CIO Considerations for the Future 1 2 3 4

15 New Strategic Approaches to Security Are Needed 15 | ©2014, Palo Alto Networks. Confidential and Proprietary. Security Organizations Are Not Innovating Fast Enough  Existing controls ineffective against new threats  Controls not evolving fast enough Attackers Are Innovating Faster  Sophistication of global attackers  Increasing value of information  Easier targets Vulnerability Gap Continues to Widen  Goal: reduce threat exposure by strengthening controls

16 Preventing Attacks at Every Stage of the Kill Chain 16 | ©2014, Palo Alto Networks. Confidential and Proprietary. ReconnaissanceWeaponization and Delivery ExploitationCommand-and-ControlActions on the Objective Unauthorized AccessUnauthorized Use Installation Exfiltrate Data 4 Lateral Movement 3 Deliver the Malware 2 Breach the Perimeter 1

17 Requirements for the Future At the Internet Edge Between Employees and Devices within the LAN At the Data Center Edge and between VMs At the Mobile Device Cloud Within Private, Public and Hybrid Clouds Detect AND Prevent Threats at Every Point Across the Organization  Prevent attacks, both known and unknown  Protect all users and applications, in the cloud or virtualized  Integrate network and endpoint security  Analytics that correlate across the cloud 17 | ©2014, Palo Alto Networks. Confidential and Proprietary.

18 Advanced Security Approaches Identify all applications, users, content, devices Isolate application/service to prevent lateral movement Threat detection/ prevention through policies and rules “Never trust, always verify” architecture Automated Threat analysis eliminates costly, manual processes Leverage power of global community Actionable security intelligence Cross-solution threat intelligence sharing Network Segmentation Correlation Zero Trust Reduce Breach Landscape Threat Intelligence Exchange Analytics Threat Prevent and Detection Automation Visibility 18 | ©2014, Palo Alto Networks. Confidential and Proprietary.

19 Increase Visibility and Reduce Breach Landscape  Identify and define legitimate use with leadership  Align security policies with those legit government and business uses  Isolate critical internal applications  Determine policies that protect cloud and VM use cases  Tie applications to users/groups Allow Relevant Applications Monitor Dangerous Applications Block Unwanted Applications 1 Eliminate Known Threats 2 Eliminate Unknown Threats 3 Focus on Relevant 4 19 | ©2014, Palo Alto Networks. Confidential and Proprietary.

20 Strengthen Correlation with Next-Generation Security Platform NATIVELY INTEGRATED EXTENSIBLE AUTOMATED THREAT INTELLIGENCE CLOUD NEXT-GENERATION FIREWALL ADVANCED ENDPOINT PROTECTION 20 | ©2014, Palo Alto Networks. Confidential and Proprietary.

21 The Evolution of The Network 21 | ©2014 Palo Alto Networks. Confidential and Proprietary. Attacker often moving among you VNC SMB pop3 snmp dns telnet LDAP ftp SSL

22 344KB 172.16.1.10 source IP 64.81.2.23 destination IP tcp/443 destination port file-sharing URL category pdf file type roadmap.pdf file name bjacobs user prodmgmt group canada destination country SSL protocol HTTP protocol slideshare application slideshare-uploading application function Complete Context Means Tighter Security Policies 22 | © 2015, Palo Alto Networks. Confidential and Proprietary. bjacobs user slideshare-uploading application function slideshare application

23 Intelligent architecture WildFire TM URL intelligence Dynamic DNS 50+ 3 rd party feeds WildFire detects unknown threats on NGFW & Traps WildFire intelligence correlated 24,000 devices worldwide 2.5M samples per day 15k unique malware per day 360M session 240M samples 30B artifacts Palo Alto Networks threat intelligence cloud Intelligence with context

24 24 | ©2014, Palo Alto Networks. Confidential and Proprietary. Table of Contents CIO Perspectives on Security Changing IT and CIO Role Good/Bad News Story Rethinking Security Strategically CIO Considerations for the Future 1 2 3 4

25 The Future of Cyber Security  Visibility and inspection across entire network and into “the cloud”  Network-segmentation and micro-segmentation  Advanced security that prevents indicators of threats and kill chain in their tracks  Mobile and BYOD security  Internet of things and embedded device endpoint security  Advanced analytics and Big Data for security analytics  Interpol-like exchanges for sharing advanced threats and campaign intelligence 25 | ©2014, Palo Alto Networks. Confidential and Proprietary.

26 Key Perspectives 26 | ©2014, Palo Alto Networks. Confidential and Proprietary. Think Strategically about Security Safely Enable the Business – Safe Enablement Apply Innovative Thinking to Security Challenges

27 27 | ©2014, Palo Alto Networks. Confidential and Proprietary.


Download ppt "CIO Perspectives on Security Marcos Alves Regional Sales Manager Protegendo seu Ambiente em tempo de Ameaças modernas."

Similar presentations


Ads by Google