610 likes | 621 Views
Discover the right way to think about cybersecurity. Explore the latest trends, challenges, and threat vectors, and learn how to improve visibility and control over your network.
E N D
Are You Thinking About CybersecurityThe Wrong Way? Darin R. Haines, SVP Global Consulting
Supply Chain VP CIO/CFO IT Consultant We know a lot,because we’ve seen a lot.
Data is the NEW OIL.
Mega Trends Make Security Concerns & Risk Matter by 2020 35 BILLION Devices 350,000 Tweets 44 TRILLION GB uploaded Cloud Social 669,710 Apps downloaded 3,800,000 Searches 10 MILLION App uploads Big data Mobility 8 BILLION People 65,970 Photos Pervasive connectivity Smart Device Expansion Explosion of Information
Aadhar 1.8B
191 days
69 days
>$1,000,000 30 days vs more than 30 days
>200,000 Computers 150 Countries $4,000,000,000
THREAT VECTORS BRUTE FORCE RANSOMWARE CREDENTIAL THEFT SOCIAL ENGINEERING/PHISHING WEB DRIVE-BY
EVERY ENDPOINT… IS AN ENTRY POINT.
56% IT purchases made at BU level 30% Of those purchases don’t consult with IT at all
2018 Most Compromised Endpoints 82% desktops 69% corporate laptops 42% employee-owned laptops 38% servers LOB 37% servers other (SANS June 2018)
90% 75% 50% 25% Yikes!
OK – Good – Better – Best The 99% Solution
430 AIRCRAFT WOULD FALL
3,700 BABIES WOULD BE DROPPED
STRATEGY Baseline
STRATEGY Risk Assessment Baseline
STRATEGY Visibility Risk Assessment Baseline
STRATEGY Compliance Visibility Risk Assessment Baseline
STRATEGY Compliance Proof-of- Performance Visibility Risk Assessment Baseline
STRATEGY Compliance Proof-of- Performance Visibility Risk Assessment Lifecycle Assurity Baseline
<75% employer owned <40% employee owned (laptops <25%) <50% printers <12% IoT <??%what you don’t know
47% dump 70%2% = 70% 60% no policy
Completeness of Vision Ability to Execute
MY CYBER MATURITY SCORE 1 Do you provide proof of performance to deliver hardened endpoints?