Intelligence-Driven Security

Tom Heiser
President, RSA
The Security Division of EMC
Intelligence-based Security
TODAY’S REALITY
© Copyright 2012 EMC Corporation. All rights reserved.
28
Intelligence-based Security
TODAY’S REALITY
© Copyright 2012 EMC Corporation. All rights reserved.
29
Reconsider
OUR RISKS
© Copyright 2012 EMC Corporation. All rights reserved.
30
Re-think
DETECTION STRATEGIES & DEPLOY CONTINUOUS MONITORING
© Copyright 2012 EMC Corporation. All rights reserved.
31
Harden Authentication &
TIGHTEN ACCESS CONTROLS
© Copyright 2012 EMC Corporation. All rights reserved.
32
EDUCATE…
EDUCATE… EDUCATE
© Copyright 2012 EMC Corporation. All rights reserved.
33
Inevitability of Compromise
DOESN’T EQUATE TO ACCEPTING LOSS
© Copyright 2012 EMC Corporation. All rights reserved.
34
UBIQUITY
NATION
STATES
CRIMINALS
TIME
© Copyright 2012 EMC Corporation. All rights reserved.
35
Flame and Stuxnet Cousin Targets
Lebanese Bank Customers, Carries
Mysterious Payload
-Wired Magazine
Changing Models
© Copyright 2012 EMC Corporation. All rights reserved.
37
Changing Models
Traditional Security
SignatureBased
© Copyright 2012 EMC Corporation. All rights reserved.
Perimeter
Oriented
Compliance
Driven
38
Changing Models
Advanced Security
Agile
© Copyright 2012 EMC Corporation. All rights reserved.
Contextual
Risk-Based
39
Changing Models
to Intelligence–Based Security
© Copyright 2012 EMC Corporation. All rights reserved.
40
Four Levels of Cyber Maturity
Control
Compliance
IT Risk
Business
Risk
MATURITY
© Copyright 2012 EMC Corporation. All rights reserved.
41
© Copyright 2012 EMC Corporation. All rights reserved.
42
Effectiveness
Advanced Security Solutions
Traditional Spend
Savings
New Spend
Time
Re-allocate Spend
to More Advanced Security Solutions
© Copyright 2012 EMC Corporation. All rights reserved.
43
© Copyright 2012 EMC Corporation. All rights reserved.
44
Nation States & Cyber Criminals
have a better framework for sharing
CRIMINALS
© Copyright 2012 EMC Corporation. All rights reserved.
NATION
STATE
ACTORS
45
“Cyber gang seeks botmasters to wage
massive wave of trojan attacks
against U.S. Banks”
© Copyright 2012 EMC Corporation. All rights reserved.
46
STANDARDIZE
SHARE
ACT
.
© Copyright 2012 EMC Corporation. All rights reserved.
47
© Copyright 2012 EMC Corporation. All rights reserved.
48
© Copyright 2012 EMC Corporation. All rights reserved.
49
Balancing
Compliance
& Risk
Compliance
& Security
Talent
© Copyright 2012 EMC Corporation. All rights reserved.
51
The Digital World
© Copyright 2012 EMC Corporation. All rights reserved.
52
Intelligence-based Security
TODAY’S REALITY
© Copyright 2012 EMC Corporation. All rights reserved.
54
analytics
Incident response
Adaptive controls
© Copyright 2012 EMC Corporation. All rights reserved.
55
© Copyright 2012 EMC Corporation. All rights reserved.
56