Tom Heiser President, RSA The Security Division of EMC Intelligence-based Security TODAY’S REALITY © Copyright 2012 EMC Corporation. All rights reserved. 28 Intelligence-based Security TODAY’S REALITY © Copyright 2012 EMC Corporation. All rights reserved. 29 Reconsider OUR RISKS © Copyright 2012 EMC Corporation. All rights reserved. 30 Re-think DETECTION STRATEGIES & DEPLOY CONTINUOUS MONITORING © Copyright 2012 EMC Corporation. All rights reserved. 31 Harden Authentication & TIGHTEN ACCESS CONTROLS © Copyright 2012 EMC Corporation. All rights reserved. 32 EDUCATE… EDUCATE… EDUCATE © Copyright 2012 EMC Corporation. All rights reserved. 33 Inevitability of Compromise DOESN’T EQUATE TO ACCEPTING LOSS © Copyright 2012 EMC Corporation. All rights reserved. 34 UBIQUITY NATION STATES CRIMINALS TIME © Copyright 2012 EMC Corporation. All rights reserved. 35 Flame and Stuxnet Cousin Targets Lebanese Bank Customers, Carries Mysterious Payload -Wired Magazine Changing Models © Copyright 2012 EMC Corporation. All rights reserved. 37 Changing Models Traditional Security SignatureBased © Copyright 2012 EMC Corporation. All rights reserved. Perimeter Oriented Compliance Driven 38 Changing Models Advanced Security Agile © Copyright 2012 EMC Corporation. All rights reserved. Contextual Risk-Based 39 Changing Models to Intelligence–Based Security © Copyright 2012 EMC Corporation. All rights reserved. 40 Four Levels of Cyber Maturity Control Compliance IT Risk Business Risk MATURITY © Copyright 2012 EMC Corporation. All rights reserved. 41 © Copyright 2012 EMC Corporation. All rights reserved. 42 Effectiveness Advanced Security Solutions Traditional Spend Savings New Spend Time Re-allocate Spend to More Advanced Security Solutions © Copyright 2012 EMC Corporation. All rights reserved. 43 © Copyright 2012 EMC Corporation. All rights reserved. 44 Nation States & Cyber Criminals have a better framework for sharing CRIMINALS © Copyright 2012 EMC Corporation. All rights reserved. NATION STATE ACTORS 45 “Cyber gang seeks botmasters to wage massive wave of trojan attacks against U.S. Banks” © Copyright 2012 EMC Corporation. All rights reserved. 46 STANDARDIZE SHARE ACT . © Copyright 2012 EMC Corporation. All rights reserved. 47 © Copyright 2012 EMC Corporation. All rights reserved. 48 © Copyright 2012 EMC Corporation. All rights reserved. 49 Balancing Compliance & Risk Compliance & Security Talent © Copyright 2012 EMC Corporation. All rights reserved. 51 The Digital World © Copyright 2012 EMC Corporation. All rights reserved. 52 Intelligence-based Security TODAY’S REALITY © Copyright 2012 EMC Corporation. All rights reserved. 54 analytics Incident response Adaptive controls © Copyright 2012 EMC Corporation. All rights reserved. 55 © Copyright 2012 EMC Corporation. All rights reserved. 56
© Copyright 2026 Paperzz