Winning The Red Queens Race - Mapyourshow

Transcription

Winning The RedQueens RaceCandace WorleyChief Technical Strategist, McAfee LLC

“Well, in OUR country,” said Alice, stillpanting a little, “you'd generally get tosomewhere else— if you ran very fastfor a long time, as we've been doing.”“A slow sort of country!” said theQueen. “Now, HERE, you see, it takes allthe running YOU can do, to keep in thesame place. If you want to getsomewhere else, you must run at leasttwice as fast as that!”– Lewis Carol2

The Red Queens Effect

The Growing Consumption Gap

5

The“LifeBlood”ofInnovationSecurity Must Embrace & AdaptCrime as aServiceFraudAdvancedTargeted AttacksGeo PoliticalIndustrial EspionageIdentityTheftRansomwareIP Theft

7Newsworthysofar Threats, Breaches, Issues, Politics, and CybercrimeVault 7Shadowbrokers@JoshT Thurston

Transformation: The New Era of SecuritySecuritySocialMobile & IoTA “once every 100 years” periodof unprecedented change New economic models, newbusiness models, new social models Disruptive - Businesses are rushing tore-invent themselvesAutoCloud Everything is connected@JoshT Thurston8

ary societal, business and technology advancements at a priceBy 2020, a corporate "no-cloud" policywill be as rare as a "no-internet" policyis today25% of corporate data traffic willbypass perimeter security and flowdirectly from mobile devices to thecloud by 2018Corp.BoundarySource: Gartner@JoshT Thurston9

10HowExposedAreYou?Your Digital Architecture is Mission CriticalSafeguardAssetsBaseline ProtectionTacticalBusiness ResilienceStrategicCompetitive ViabilityDigitalAssetsSpeed ofAttack

Tech SprawlThe Typical Enterprise Security Architecture is UnsustainableROAMING USERMANAGEMENT AND ANALYTICSMgmtSIEMTRADITIONAL DATA CENTERFirewallEmailIPSFirewallPRIVATE CLOUDBRANCH OFFICEFirewallPUBLIC CLOUDIPSCAMPUS OFFICEWebFirewallNETWORKSAAS SERVICESIPS

The Red Queen’s RaceUnscalable complexityleaves organizationscombat-ineffectiveInefficientsecurity gysprawlProcurenew techComplexity CostShort-livedefficacyEfficiency Efficacy Agility

EfficacyThreat Defense Efficacy vs. TimeTimeInvention

EfficacyThreat Defense Efficacy vs. TimeTimeDeployment

EfficacyThreat Defense Efficacy vs. TimeTimeInitial Countermeasures

EfficacyThreat Defense Efficacy vs. TimeTimeDiminished Sustaining Cycle of Innovation

Threat Defense Efficacy vs. TimeEfficacyBayesian SpamDetectionInitial CountermeasuresTimeInventionDeploymentDiminished Sustaining Cycle ofInnovation

Threat Defense Efficacy vs. TimeEfficacyHash BasedConvictionInitial CountermeasuresTimeInventionDeploymentDiminished Sustaining Cycle ofInnovation

SandboxDetonationEfficacyThreat Defense Efficacy vs. TimeInitial CountermeasuresTimeInventionDeploymentDiminished Sustaining Cycle ofInnovation

Threat Defense Efficacy vs. TimeEfficacyDeep LearningInitial CountermeasuresTimeInventionDeploymentDiminished Sustaining Cycle ofInnovation

Threat Defense Efficacy vs. TimeEfficacyMachine Learningand Artificial IntelligenceNew Vender withNew Technologyor ModelInitial Go ToMarketInitial CountermeasuresTimeInventionDeploymentDiminished Sustaining Cycle ofInnovation

Threat Defense Efficacy vs. TimeMachine Learningand Artificial IntelligenceDisruptionTime

Changing The RacecourseEDRWebThreat Defense Efficacy vs. sManagementMachine Learningand Artificial IntelligenceTimeDisruptionSecurity PlatformAn architecture made up of products orservices that are enhanced by the numberof connected & integrated technologiesworking together for a compoundingvalue.

Strategic Platform Security DesignCONTEXT & ORCHESTRATIONDatabase SecurityWeb GatewayIdentity ManagementMail GatewayVulnerability ManagementApp & Change ControlWeb GatewayIdentity ManagementVulnerability ManagementMail GatewayIPSIPSData ProtectionNetwork FirewallDatabase SecurityAnti-MalwareApp & Change ControlNetwork FirewallSIEM & Log ManagementMobile SecurityMobile SecurityHIPSHIPSVirtualizationData ProtectionVirtualizationCommon Security CommunicationsEncryptionAnti-MalwareAccess ControlAccess ControlThreat Analysis

How Do You Get There? Transformational Approach – Technology is Only Part of the Answer12STRATEGICALIGNMENTAligning businessstrategy, enablinginfrastructure& security3SECURITYBUSINESSINTELLIGENCEIntelligence gathering &analysis from operational andsecurity systemsCULTURECulture is thestrongest formof control

Better Outcomes With Integrated Platforms Decision makers with platforms indicate better outcomes than their counterpartsIntegratedPlatform Source: Penn Schoen Berland, 2016Are betterprotected78%suffered under 5 breaches lastyear, compared to 55%Have fasterresponse times80%discover threats in8 hours, versus 54%Are more confident30%lose sleep weekly, comparedto 57%

The Value of a Unified Architecture Applied integration, automation, and orchestration62%reductionof technology sprawl85%lesssecurity techon the endpoint Source: *McAfee Internal Benchmark testing applied to Advanced Malware cyber defense capability70%reductionof manual efforts65%automation 1000%in event handling capacitytriage90%moreactionable intelligence indicatorsincrease

The Value of a Sustainable Defensive Advantage Applied integration, automation, and orchestrationReduce ComplexityAct RapidlyOptimize ResourcesReduceReduceIncreasetechnology sprawlmanual effortshandling capacityResolve more risk, faster and with fewer resources

The Time is NowThe Faster and Smarter You Move, the More Effective Your Security Posture

McAfee, the McAfee logo and [insert other relevant McAfee Names ] are trademarks or registered trademarks of McAfee LLC or its subsidiaries in the U.S. and/or other countries.Other names and brands may be claimed as the property of others.Copyright 2017 McAfee LLC.

Baseline Protection How Exposed Are You? 10 Speed of Attack Safeguard Assets . CAMPUS OFFICE MANAGEMENT AND ANALYTICS TRADITIONAL DATA CENTER PUBLIC CLOUD SAAS SERVICES PRIVATE CLOUD Firewall Email Firewall IPS Firewall Firewall IPS IPS Web Mgmt SIEM NETWORK. Unscalable complexity leaves organizations combat-ineffective Efficiency .