220 likes | 367 Views
Security Trends. The Case for Intelligence-Driven Security. Attack Surface and Threat Environment. 40-60?. 2. ¼. ZETTABYTES. ZETTABYTES. ZETTABYTE. 2007. 2013. 2020. Digital Content. Attack Surface and Threat Environment. Big Data Apps Everywhere! . Web Front Ended apps.
E N D
Security Trends The Case for Intelligence-Driven Security
Attack Surface and Threat Environment 40-60? 2 ¼ ZETTABYTES ZETTABYTES ZETTABYTE 2007 2013 2020 Digital Content
Attack Surface and Threat Environment Big Data Apps Everywhere! Web Front Ended apps There’s an “app” for that 2007 2013 2020 Apps
Attack Surface and Threat Environment Internetof things (not just PCs, not just mobile) Dawn of Smartphones Smartphone/tablet ubiquity 2007 2013 2020 Devices
Attack Surface and Threat Environment MySpace Focus onmonetizing Total Commercialization of social media: absence of privacy 2007 2013 2020 Social Media
Attack Surface and Threat Environment NO direct control over physical infrastructure 2007 2013 2020 Perimeter
Attack Surface and Threat Environment Complex Intrusion Attacks DisruptiveAttacks Destructive attacks 2007 2013 2020 Threats
Historic Security Model • Perimeter based • Static/Signature based • Siloed Reactive
New Model • Risk-based • Dynamic/agile • Contextual Intelligence Driven
Impediments to Change Budget Inertia: Reactive model 70% 34% 20% Prevention Response 33% 10% 33% Detection & Monitoring
Impediments to Change BudgetInertia Skilled personnel shortage Information sharing at scale Technology Maturity
Shift In Focus. Shift In Spend $ Monitoring 33% Prevention 34% Monitoring 15% Prevention 80% Response 5% Response 33% MATURITY BusinessRisk Control Compliance IT Risk
IS WHERE SECURITY MEETS BIG DATA Intelligence-Driven Security SOC | GRC | Identity | Anti-Fraud
BIG DATA FUELS INTELLIGENCE-DRIVEN SECURITY
Intelligence-Driven Security Risk-Based, Contextual, & Agile Risk IntelligenceThorough Understanding Of Risk To Prioritize Activity Advanced Analyticsprovide context and visibility to detect threats Adaptive Controlsadjusted dynamically basedon risk and threat level Information SharingActionable Intel From Trusted Sources & COIs
Identity Ensuring Trusted Interaction Between People, Application, & Data 1 Assess Risk 2 Take Action
Next-Generation Identity Auth. Manager 8.0 | Adaptive Authentication | Cloud Trust Authority Big Data Analytics Step Up Authentication Action Two-Factor Investigate Out Of Band Txt Device Profile Data Collection Change/Block Access Risk Engine Challenge Q’s High Risk User Behavior Profile Geo Location Proceed As Normal Fraud Network RSA eFraud Network
Security Analytics Big Data Analytics Governance RSA Security Analytics Platform | RSA Archer GRC Suite Compliance&BusinessContext Network Packets Alerting & Reporting Data Collection Log Files Investigations Incident Management& Workflow Big Data Store Malware Analytics IT Assets Visualization Active Defense & Remediation Data Leakage Information Assets RSA Live
Fraud Prevention and Web Security Silver Tail Separating Customers from Criminals Web Threat Landscape Transaction Logout Login Begin Session In the Wild • Advanced Malware (e.g. Trojans) • Phishing • Rogue Mobile App • Site Scraping • Vulnerability Probing • Layer 7 DDoS Attacks • Man in the Middle/Browser • Password Cracking/Guessing • Parameter Injection • New Account Registration Fraud • Account Takeover • New Account Registration Fraud • Promotion Abuse • Unauthorized Account Activity • Fraudulent Money Movement Fraud Action Adaptive Authentication Transaction Monitoring
Next-Generation Anti-Fraud & Web Security Silver Tail, Fraud Action, Adaptive Authentication, Transaction Monitoring Big Data Analytics Response Web Traffic Alerting & Reporting Compliance&BusinessPolicy Data Collection Big Data Store Investigations Fraud Analytics Adaptive Authentication Transaction Monitoring Active Defense Visualization RSA eFraud Network + Fraud Action
Risk Management & Governance Governance BusinessContinuity Management IT ComfitManagement Compliance & BusinessContext ThreatManagement ComplianceManagement Incident Management& Workflow Active Defense & Remediation Single eGRC Platform
Summary • Transformation of Infrastructure, Business and Threat Makes Traditional Security Less Relevant • New Strategies Must be Based on Risk, Context and be Responsive To Rapidly Changing Environments • Big Data, Analytics Can Be Leveraged to Create Intelligence-Driven Security Models that Meet These Needs