17
CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY METHODS ARE FALLING SHORT. RALF KALTENBACH DIRECTOR DACH & EASTERN EUROPE (ASOC)

CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY METHODS ARE FALLING SHORT.

RALF KALTENBACHDIRECTOR DACH & EASTERN EUROPE (ASOC)

Page 2: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

22

Organizations’ overall assessment of their risk / security capabilities:Cybersecurity Poverty Index

Current security approaches are failing

Significant Cybersecurity Risk Exposure

75%AdvantagedCapabilities

5%Mature Security

Strategies

20%

2

Page 3: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

3

55%

3

Breach Readiness

do not have a formal incident response plan in place

do not have an active vulnerability management program in place

lack capability to gather data from across their environment and provide centralized alerting of suspicious activity

40% 30%

Page 4: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

4

The threat landscape continues to evolve

TargetsThreat Actors

Nation States

HacktivistsCriminals FinancialInformation

Intellectual Property

Personally Identifiable Information

HACKS

ATTACKS

ATTACK CAMPAIGNS

Page 5: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

5

Our attack surface continues to expand

Mobile Employees

BYOD

On Premise

Cloud

ThirdPartiesCustomersPartners

Shadow IT

5

Page 6: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

6 VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT

Attacker Capabilities

Defender Capabilities

The defender-detection deficit

Increasing gap between attacker and defender capabilities

Page 7: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

7

Two critical success factors to be considered…

React faster2Reduce Dwell Time1

TIME

Attack Identified Response

SystemIntrusion

AttackBegins

Cover-UpComplete

Cover-Up DiscoveryLeap Frog Attacks

1 TARGETEDSPECIFIC OBJECTIVE

STEALTHYLOW AND SLOW2 3 INTERACTIVE

HUMAN INVOLVEMENT

Dwell Time Response Time

Page 8: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

88

The security paradigm must change

PREVENTION DETECTION & RESPONSE

Page 9: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

9

Shift priorities and capabilities

Today’s Priorities

PreventionResponse

MonitoringMonitoring

Prevention

Response

Future State

9

Page 10: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

1010

The capabilities that matter most now

Visibility & Analytics

establish foundation /make respondersfaster & smarter

Identity Assurance

& Governanceaddress the

most consequentialattack vector

Risk Intelligence

prioritizeeffectively

Page 11: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

11

At first, there were HACKS Preventative controls filter known attack paths

Evolution of Threat Actors & Detection Implications

Malicious

Traffic

Firewall

Threat Actors

IDS/IPS

AntiVirus

Corporate Assets

Whitespace Successful HACKS

Page 12: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

12

At first, there were HACKS Preventative controls filter known attack paths

Then, ATTACKSDespite increased investment in controls, including

SIEM

Evolution of Threat Actors & Detection Implications

Malicious

Traffic

Firewall

Threat Actors

IDS/IPS

AntiVirus

More Logs

Corporate Assets

S

I

E

M

Blocked Session

Blocked Session

Blocked Session

Alert

Whitespace Successful ATTACKS

Page 13: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

13

Now, successful ATTACK CAMPAIGNS target any and all whitespace.

Complete visibility into every process and network sessions is required to eradicate the attacker

opportunity.

Unified platform for advanced threat detection & investigations,

Evolution of Threat Actors & Detection Implications

Malicious

Traffic

Firewall

Threat Actors

IDS/IPS

AntiVirus

Logs

Endpoint VIsibility

Corporate Assets

Blocked Session

Blocked Session

Blocked Session

Alert

Process

Network VIsibility Network Sessions

Secu

rity

Anal

ytic

s

Page 14: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

1414

RSA Security Analytics Architecture

OnPrem

Cloud

SecurityOperations

LIVE

Action

SecurityOperations

Analysis

Threat Intelligence | Rules | Parsers | Feeds | Reports | RSA ResearchRSA LIVEINTELLIGENCE

Capture Time Data

Enrichment

Visibility

NetFlow

Packets

Logs

Endpoint

LIVE

LIVE

Page 15: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

15

RSA in action

Cloud

Security Analytics

Governance, Risk, & Compliance

Identity

logs, packets, netflow,endpoint, identity,threat, vulernability

DataEnterprise

Page 16: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

16

RSA’s product and service portfolio

Logs, packets, netflow,Endpoint, id, vulns, Threat (ext & int)

Data

Security Analytics

Governance, Risk, & Compliance

Identity & Access

SECURITY OPERATIONSSecurity Analytics

ECATSecurity Operations Management

Advanced Cyber Defense / Incident Response Services

GOVERNANCE, RISK & COMPLIANCEArcher GRC

IDENTITYVia Access – Via Lifecycle & Governance

SecurID

Cloud Enterprise

Page 17: CEBIT 2016: MODERN CYBER RISKS - WHY TRADITIONAL SECURITY …files.messe.de/abstracts/69527_HADI14_00Kaltenbach.pdf · VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT ... Unified platform

17

Thank You