28
welcome to our cybersecurity webinar

welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

welcome to ourcybersecurity webinar

Page 2: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

our peoplewe call ourselves groovers

Groovin’ with our customers and partners since 2000

Best in TOLA market experience and customer service

Customer-centric philosophy, shared sense of urgency

Available, responsive and agile

Page 3: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

exceptional sales supportand project management

Competitive proposals delivered in a timely manner

Dedicated Team: Account Executive (single point of contact), Account Manager, Service Delivery Manager, and team of Solutions Architects

Responsive, accurate and accountable

We position ourselves as an extension of your team

who we are

Page 4: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

deep technical expertise across the entire IT value chain and all customer segments

Certified Solutions Architects on staff with customer/manufacturer experience

Ownership and accountability

who we are

Page 5: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

alignment with customer needsFlexible to fit the needs of our customers – we say YES…a lot!

We think outside the box, flexible payment and contract terms

Certified Minority-Owned Vendor/Supplier

who we are

Page 6: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

what we do

Page 7: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

CYBER CRIME DURING CRISES

7

James Morrison ‐ Distinguished Technologist, Cyber Security

Page 8: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

THE ENTERPRISEOF THE FUTURE Edge‐centric Cloud‐enabled Data‐driven

Page 9: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

WHERE DATA FLOWS, SECURITY MUST GO

Maintaining control in a world where every device is storing and computing data means building trust into every touchpoint

9

Page 10: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

CYBER SECURITY REQUIRES A MORE HOLISTIC APPROACH

101. https://www.bleepingcomputer.com/news/security/iot‐attacks‐escalating‐with‐a‐2175‐percent‐increase‐in‐volume/2. IBM’s 2019 Cost Of A Data Breach Report

Loss of function is the new weaponWith many intelligent devices independently processing,

data and control must be secured at every point

Protectnew vulnerabilities

Detectintruders fast

Recoverquickly from an attack

217% increasein attacks on IoT devices 

from 2017 to 20181

245 daysmedian time an attacker stays within a network without 

detection2

73 daysto recover from a breach2

$8 milaverage cost of a breach2

Data is the new currency

CONFIDENTIAL | AUTHORIZED HPE PARTNER USE ONLY

Page 11: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

11

THE RISE OF CYBER CRIME

Page 12: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

12

COMPANY DATA

Page 13: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

CAN THE THREAT BE MITIGATED THROUGH INNOVATION?

•Massive Change is underway• Hyper‐connected world• Incredible data growth• Hybrid IT the new “normal”

•Cyber threats are everywhere• We can’t eliminate the threat• Firmware is now a target• Supply chains are now a target• Threat is from the outside – and – from within

•What’s the answer? •Can continued innovation mitigate the threat?

13

Page 14: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

PROPER INVESTMENT IS KEY

Accenture

Source: https://www.accenture.com/t20171006T095146Z__w__/us‐en/_acnmedia/PDF‐62/Accenture‐2017CostCybercrime‐US‐FINAL.pdf

Page 15: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

ENTERPRISE SECURITY REFERENCE ARCHITECTUREDefines security domains, sub‐domains, elements aligned to standards

Data security & protection

Risk, compliance and continuity

Cyber defense and security operations

Secure Infrastructure, applications and access

Physical Security

Peop

le

Process

Policy

Prod

ucts

Proo

f

Secure Applications

Secure Infrastructure

Identity & Access Mgmt

Aligned to ISO 27001/002, ESRA, CSA and NIST 800 standards

Page 16: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

Effective security is built on a foundation of trustDATA CENTER SECURITY

16

Page 17: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

17

WHY HARDWARE BASED SECURITY

Page 18: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

OS & APPS

HPE ZERO TRUST

Zero Trust SecurityNever trusting, continuously verifying

FIREWALL

FIRMWARESILICON

Protect from the inside outIdentity aware, data‐driven, workload 

relevant

Many edges, data centers and clouds

Many edges, data centers and clouds

HARDWARE

FIREWALL

Page 19: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

ARUBA ZERO TRUST (360 SECURE FABRIC)

Page 20: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

Attack ResponseEvent‐triggered actions

One Role, One NetworkWired, Wireless and Remote Access

Precision Access PrivilegesIdentity and context‐based rules

Device Discovery and ProfilingCustom Fingerprinting

Visibility Authorization

EnforcementAuthentication

CLEARPASS: END-TO-END VISIBILITY, CONTROL AND AUTOMATION

Page 21: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

UNDERSTANDING HPE SECURE VM ISOLATIONRESOURCE SEGMENTATION

21

Devices

Firmware

Memory

Cache

CPU Cores

VM1

VM3

VM2

Hardened KVM‐based Hypervisor

FIREWALLEDRESOURCES

Devices

Firmware

Hypervisor

Memory

Cache

CPU Cores

VM1

VM3

VM2

SHARED RESOURCES

STANDARD CLOUD OPERATION HPE SECURE VM ISOLATION

Page 22: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

Firm

ware

Hardw

are

(Silicon)

System

Authen

ticate

Authen

ticate

Authen

ticate

HPE Silicon Root of Trust

iLO 5 Chip

UEFI BIOS

iLO 5 Firmware

Option ROMs & OS Boot loader

HPE UNIQUE SECURITY WITH AMD SECURE PROCESSOR 

HPE AMD Secure ProcessorHPE Silicon Root of Trust checks processor & processor 

checks BIOS 

Secure Memory Encryption (SME)

Secure Encrypted Virtualization (SEV)

DL385/325 Servers Not Susceptible Meltdown Variant 3, Rogue Data Cache*

Foreshadow‐NG (OS Kernal/SMM Attack)

Foreshadow‐NG (VMM Attack)*

Foreshadow‐ (SGX Attack)

Zombie Load

Spoiler

*Potential performance reduction associated with patching

Page 23: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

17 CYBERSECURITY SOLUTIONS DESIGNATED AS CYBER CATALYSTINSURERS BELIEVE THESE CAN HELP REDUCE CYBER RISK.

The inaugural class of Cyber CatalystSMdesignated solutions features 17 cybersecurity products and services identified by leading cyber insurers as able to have a meaningful impact on cyber risk. 

The products span a range of cybersecurity functions, including application, data, endpoint, hardware, messaging, network, infrastructure security; identity and access management; IoT devices; risk and compliance. 

www.marsh.com/cybercatalyst

Page 24: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

THANK YOU

CONFIDENTIAL 24

Page 25: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

security & analytics

areas of expertise services case studies

• Network access control

• User/entity behavior analytics

• Endpoint Security

• Application and data security

• Micro-segmentation

• Cloud security and governance

• Analytics driven security – SIEM, SOAR

• Predictive analytics

• Vulnerability assessments

• Application security testing

• DevOps CI/CD security planning and tooling

• Governance & compliance enablement

• Planning, design, deployment, and ongoing support

• Managed service options

• Major Grocery Store

• Large Beverage Distributor

• Rent-A-Center

• Texas Christian University

Page 26: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

strategic services

frameworks we use:

areas of expertise services case studies

• Program management

• Project management

• Resource management

• Sourcing & vendor management

• Support contact management

• ITIL & IT4IT methodologies

• Governance & compliance

• Current state assessments

• Future state recommendations

• ROI analysis

• Solution design and delivery

• B2B marketplace

• Staff augmentation

• Customized managed services

• Major grocery store

• Large retail store

• Oil and gas

• Large utility

Page 27: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

what we do

Page 28: welcome to our cybersecurity webinar · 2020. 4. 4. · alignment with customer needs Flexible to fit the needs of our customers – we say YES…a lot! We think outside the box,

thank you.mobiuspartners.com

Scott King, CTO – [email protected] Vazzola, COO – [email protected]

questions?