Upload
others
View
3
Download
0
Embed Size (px)
Citation preview
welcome to ourcybersecurity webinar
our peoplewe call ourselves groovers
Groovin’ with our customers and partners since 2000
Best in TOLA market experience and customer service
Customer-centric philosophy, shared sense of urgency
Available, responsive and agile
exceptional sales supportand project management
Competitive proposals delivered in a timely manner
Dedicated Team: Account Executive (single point of contact), Account Manager, Service Delivery Manager, and team of Solutions Architects
Responsive, accurate and accountable
We position ourselves as an extension of your team
who we are
deep technical expertise across the entire IT value chain and all customer segments
Certified Solutions Architects on staff with customer/manufacturer experience
Ownership and accountability
who we are
alignment with customer needsFlexible to fit the needs of our customers – we say YES…a lot!
We think outside the box, flexible payment and contract terms
Certified Minority-Owned Vendor/Supplier
who we are
what we do
CYBER CRIME DURING CRISES
7
James Morrison ‐ Distinguished Technologist, Cyber Security
THE ENTERPRISEOF THE FUTURE Edge‐centric Cloud‐enabled Data‐driven
WHERE DATA FLOWS, SECURITY MUST GO
Maintaining control in a world where every device is storing and computing data means building trust into every touchpoint
9
CYBER SECURITY REQUIRES A MORE HOLISTIC APPROACH
101. https://www.bleepingcomputer.com/news/security/iot‐attacks‐escalating‐with‐a‐2175‐percent‐increase‐in‐volume/2. IBM’s 2019 Cost Of A Data Breach Report
Loss of function is the new weaponWith many intelligent devices independently processing,
data and control must be secured at every point
Protectnew vulnerabilities
Detectintruders fast
Recoverquickly from an attack
217% increasein attacks on IoT devices
from 2017 to 20181
245 daysmedian time an attacker stays within a network without
detection2
73 daysto recover from a breach2
$8 milaverage cost of a breach2
Data is the new currency
CONFIDENTIAL | AUTHORIZED HPE PARTNER USE ONLY
11
THE RISE OF CYBER CRIME
12
COMPANY DATA
CAN THE THREAT BE MITIGATED THROUGH INNOVATION?
•Massive Change is underway• Hyper‐connected world• Incredible data growth• Hybrid IT the new “normal”
•Cyber threats are everywhere• We can’t eliminate the threat• Firmware is now a target• Supply chains are now a target• Threat is from the outside – and – from within
•What’s the answer? •Can continued innovation mitigate the threat?
13
PROPER INVESTMENT IS KEY
Accenture
Source: https://www.accenture.com/t20171006T095146Z__w__/us‐en/_acnmedia/PDF‐62/Accenture‐2017CostCybercrime‐US‐FINAL.pdf
ENTERPRISE SECURITY REFERENCE ARCHITECTUREDefines security domains, sub‐domains, elements aligned to standards
Data security & protection
Risk, compliance and continuity
Cyber defense and security operations
Secure Infrastructure, applications and access
Physical Security
Peop
le
Process
Policy
Prod
ucts
Proo
f
Secure Applications
Secure Infrastructure
Identity & Access Mgmt
Aligned to ISO 27001/002, ESRA, CSA and NIST 800 standards
Effective security is built on a foundation of trustDATA CENTER SECURITY
16
17
WHY HARDWARE BASED SECURITY
OS & APPS
HPE ZERO TRUST
Zero Trust SecurityNever trusting, continuously verifying
FIREWALL
FIRMWARESILICON
Protect from the inside outIdentity aware, data‐driven, workload
relevant
Many edges, data centers and clouds
Many edges, data centers and clouds
HARDWARE
FIREWALL
ARUBA ZERO TRUST (360 SECURE FABRIC)
Attack ResponseEvent‐triggered actions
One Role, One NetworkWired, Wireless and Remote Access
Precision Access PrivilegesIdentity and context‐based rules
Device Discovery and ProfilingCustom Fingerprinting
Visibility Authorization
EnforcementAuthentication
CLEARPASS: END-TO-END VISIBILITY, CONTROL AND AUTOMATION
UNDERSTANDING HPE SECURE VM ISOLATIONRESOURCE SEGMENTATION
21
Devices
Firmware
Memory
Cache
CPU Cores
VM1
VM3
VM2
Hardened KVM‐based Hypervisor
FIREWALLEDRESOURCES
Devices
Firmware
Hypervisor
Memory
Cache
CPU Cores
VM1
VM3
VM2
SHARED RESOURCES
STANDARD CLOUD OPERATION HPE SECURE VM ISOLATION
Firm
ware
Hardw
are
(Silicon)
System
Authen
ticate
Authen
ticate
Authen
ticate
HPE Silicon Root of Trust
iLO 5 Chip
UEFI BIOS
iLO 5 Firmware
Option ROMs & OS Boot loader
HPE UNIQUE SECURITY WITH AMD SECURE PROCESSOR
HPE AMD Secure ProcessorHPE Silicon Root of Trust checks processor & processor
checks BIOS
Secure Memory Encryption (SME)
Secure Encrypted Virtualization (SEV)
DL385/325 Servers Not Susceptible Meltdown Variant 3, Rogue Data Cache*
Foreshadow‐NG (OS Kernal/SMM Attack)
Foreshadow‐NG (VMM Attack)*
Foreshadow‐ (SGX Attack)
Zombie Load
Spoiler
*Potential performance reduction associated with patching
17 CYBERSECURITY SOLUTIONS DESIGNATED AS CYBER CATALYSTINSURERS BELIEVE THESE CAN HELP REDUCE CYBER RISK.
The inaugural class of Cyber CatalystSMdesignated solutions features 17 cybersecurity products and services identified by leading cyber insurers as able to have a meaningful impact on cyber risk.
The products span a range of cybersecurity functions, including application, data, endpoint, hardware, messaging, network, infrastructure security; identity and access management; IoT devices; risk and compliance.
www.marsh.com/cybercatalyst
THANK YOU
CONFIDENTIAL 24
security & analytics
areas of expertise services case studies
• Network access control
• User/entity behavior analytics
• Endpoint Security
• Application and data security
• Micro-segmentation
• Cloud security and governance
• Analytics driven security – SIEM, SOAR
• Predictive analytics
• Vulnerability assessments
• Application security testing
• DevOps CI/CD security planning and tooling
• Governance & compliance enablement
• Planning, design, deployment, and ongoing support
• Managed service options
• Major Grocery Store
• Large Beverage Distributor
• Rent-A-Center
• Texas Christian University
strategic services
frameworks we use:
areas of expertise services case studies
• Program management
• Project management
• Resource management
• Sourcing & vendor management
• Support contact management
• ITIL & IT4IT methodologies
• Governance & compliance
• Current state assessments
• Future state recommendations
• ROI analysis
• Solution design and delivery
• B2B marketplace
• Staff augmentation
• Customized managed services
• Major grocery store
• Large retail store
• Oil and gas
• Large utility
what we do
thank you.mobiuspartners.com
Scott King, CTO – [email protected] Vazzola, COO – [email protected]
questions?