1 / 61

Are You Thinking About Cybersecurity The Wrong Way?

Discover the right way to think about cybersecurity. Explore the latest trends, challenges, and threat vectors, and learn how to improve visibility and control over your network.

desmondk
Download Presentation

Are You Thinking About Cybersecurity The Wrong Way?

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Are You Thinking About CybersecurityThe Wrong Way? Darin R. Haines, SVP Global Consulting

  2. Supply Chain VP CIO/CFO IT Consultant We know a lot,because we’ve seen a lot.

  3. Are you thinking about cybersecurity the WRONG WAY?

  4. Data is the NEW OIL.

  5. Mega Trends Make Security Concerns & Risk Matter by 2020 35 BILLION Devices 350,000 Tweets 44 TRILLION GB uploaded Cloud Social 669,710 Apps downloaded 3,800,000 Searches 10 MILLION App uploads Big data Mobility 8 BILLION People 65,970 Photos Pervasive connectivity Smart Device Expansion Explosion of Information

  6. Aadhar 1.8B

  7. 191 days

  8. 69 days

  9. >$1,000,000 30 days vs more than 30 days

  10. >200,000 Computers 150 Countries $4,000,000,000

  11. THREAT VECTORS BRUTE FORCE RANSOMWARE CREDENTIAL THEFT SOCIAL ENGINEERING/PHISHING WEB DRIVE-BY

  12. EVERY ENDPOINT… IS AN ENTRY POINT.

  13. Employer And Employee Owned Devices

  14. 56% IT purchases made at BU level 30% Of those purchases don’t consult with IT at all

  15. 2018 Most Compromised Endpoints 82% desktops 69% corporate laptops 42% employee-owned laptops 38% servers LOB 37% servers other (SANS June 2018)

  16. 90% 75% 50% 25% Yikes!

  17. OK – Good – Better – Best The 99% Solution

  18. 430 AIRCRAFT WOULD FALL

  19. 3,700 BABIES WOULD BE DROPPED

  20. BETTER SECURITY = LESS PAIN

  21. STRATEGY

  22. STRATEGY Baseline

  23. STRATEGY Risk Assessment Baseline

  24. STRATEGY Visibility Risk Assessment Baseline

  25. STRATEGY Compliance Visibility Risk Assessment Baseline

  26. STRATEGY Compliance Proof-of- Performance Visibility Risk Assessment Baseline

  27. STRATEGY Compliance Proof-of- Performance Visibility Risk Assessment Lifecycle Assurity Baseline

  28. SEE. MEASURE. IMPROVE.

  29. VISIBILITY + CONTROL

  30. <75% employer owned <40% employee owned (laptops <25%) <50% printers <12% IoT <??%what you don’t know

  31. VISIBILITY + CONTROL

  32. VISIBILITY + CONTROL

  33. 47% dump 70%2% = 70% 60% no policy

  34. VISIBILITY + CONTROL

  35. Completeness of Vision Ability to Execute

  36. MY CYBER MATURITY SCORE 1 Do you provide proof of performance to deliver hardened endpoints?

More Related