1
With this many people online, there are as many risks as benefits to our digital life. In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Cyber resilience does not promise immunity from cyber attacks nor does it purport to eliminate risk. Eliminating all cyber risk is impossible. In fact, it could impede agility, for an environment with an acceptable level of risk enables innovation. Cyber resilience is about managing security with a multi-layered approach that encompasses people, processes, and technology. CYBER RESILIENCE THE FIVE PILLARS THE UNKNOWN UNKNOWNS As desktop computer operating systems give way to web-based and mobile platforms and applications, the workplace is changing at an exponential rate. WHAT WE DO KNOW Digital technology is inextricably woven into our daily lives. There are many unknown unknowns. It is literally impossible to predict all the online threats your organization will face, so your best hope of combating them is to prepare for any possibility. IN ITS NEXUS OF FORCES Gartner defines this phenomenon as The convergence and mutual reinforcement of four interdependent trends: social interaction, mobility, cloud, and information that combine to empower individuals as they interact with each other and their information through well designed ubiquitous technology 1 . 41% of attacks affect organizations with fewer than 500 employees THE RISE OF MOBILITY IS ONLY ACCELERATING THESE TRENDS. 1/3 of all cell phones are internet-enabled smartphones 15 % of mobile devices are not secured and are used for work and play 500 million photos sent daily check messages 23X a day 2 / 3 MALWARE ATTACKS have increased in 2013 up 23 % on Web & up 139 % on Mobile 67 % come from legitimate sites 1.5 Million Victims Daily = $ 110 Million in Losses ONLINE ATTACKS claim 84 % Are Not Contained for Months or Even Years The best way to prepare is to assess your level of cyber resilience, and security intelligence is the key. Security Intelligence is more than just threat intelligence or technology; it’s the data on an enterprise’s vulnerabilities and threats, which is analyzed in a way that enables the prioritization of action to maximize risk reduction. Better security intelligence enables better business decision-making, better organizational processes, increased protection from cyber attacks, and better preparation when they do occur — resulting in a business that is more resilient and agile. THE CYBER RESILIENT ENTERPRISE R E C O R D E N D P O I N T A N D T R A C K A D H E R E N C E T O D A T A I D E N T I F Y G L O B A L T H R EA T S M O N I T O R A C C E S S A T T E M P T S E D U C A T E U S E R S D E V E L O P E M P L O Y E E S E C U R I T Y I Q A S S E S S S T A T E O F S E C UR I T Y T O F I N E - T U N E P R O C E S S E S , P O L I C I E S , A N D P R O C E D U R E S B E C O M E C Y B E R R E S I L I E N T H A R N E S S Y O U R S E C U R I T Y I N T E L L I G E N C E G OV E R N A N C E P O L I C I E S N E T W O R K A C T I V I T I E S T O M Y B U S I N E S S I D E N T I F Y V U L N E R A B I L I T I E S < < << < < < < < < < < < < < < < < < < C o r r e l a t e a n d A n a l y z e > > > > > > > > > > > > > > > > > > Protect Your Organization PREPARE DETECT RESPOND RECOVER PROTECT Prepare for Attacks Implement Response Plan Refine Plan TIMELINE To successfully face and overcome an attack, you must thoroughly understand your company’s security and risk posture. Begin by painstakingly identifying the organization’s vital information. Conduct an infrastructure and information assessment that includes all known security vulnerabilities. Establish a baseline and compare the results to those of your peers. Spotting and addressing the most urgent issues first will make your organization a less appealing target for attackers. Once you have a good handle on what's out there, where it lives, its level of sensitivity, how vulnerable it is, and your risk tolerance, you can begin to take the necessary steps to protect it. The second pillar is all about developing and implementing safeguards for critical infrastructure and services in order to limit or contain the impact of an attack. The Detect pillar focuses on developing and implementing the appropriate activities to rapidly identify an attack, assess the systems that may be affected, and ensure a timely response. In addition, this stage is concerned with continuing to monitor the network for other attack indicators related to that attack and making sure the safeguards you had in place were effective. The Respond pillar provides guidance on the types of activities that can accelerate time to remediation and contain the impact of the attack once it’s detected. For the detection process to have any value, there must be a timely response. While there are many solutions and services available to help, much of what is needed in terms of response involves people and processes internal to the organization. The final pillar that needs to be addressed — critical to any resilient security strategy — is recovery. This stage involves developing and implementing the appropriate systems and plans to restore any data and services that may have been impacted during a cyber attack. As much as we prepare and protect our organizations, we may not be able to avoid certain types of attacks. Even if you respond quickly to a cyber breach, an attack may have consequences. No matter the outcome, organizations must be able to restore their people, processes, and systems as quickly as possible. An effective recovery depends on a clear and thorough recovery plan. PREPARE PROTECT RESPOND RECOVER DETECT ATTACKER INGRESS ATTACKER DETECTED SYSTEMS SECURED NORMAL RESPONSE PLAN The evaluation process utilizes best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars: prepare/identify, protect, detect, respond, and recover. Using this framework, you can evaluate each pillar of your organization’s cyber security strategy - specific actions to be performed by identifiable IT jobs are associated with each pillar. Unfortunately, no silver bullet exists to prevent attacks, and breaches will occur in spite of an organization’s best efforts at preparation and protection. Many customers lack the sophistication and expertise they need to address these new, more advanced threats. To minimize the potential devastation of a cyber attack, you must change the way you think about security. Think in terms of not eliminating cyber risk but of creating cyber resilience. To create cyber resilience, organizations must begin by changing the conversation about cyber risk. It’s crucial to align IT and the business and encourage regular, productive discussions to identify the benefits and risks associated with a cyber resilient strategy. Find and use a common language. IT security must accept that the business will be tempted to take risks in order to succeed and must empower the business to make informed decisions on how they manage cyber risk. ACHIEVING RESILIENCE PREPARE PROTECT RESPOND RECOVER DETECT A NEW PERSPECTIVE ON SECURITY Occur in Hours or Less Aren’t Discovered for Month DATA BREACHES 22 % Contact your Symantec account representative or reseller partner today to discuss how you can start building cyber resilience into your security strategy. Get more information about cyber resilience and stay informed at the Symantec cyber resilience microsite. go.symantec.com/cyber-resilience SYMANTEC IS UNIQUELY QUALIFIED TO DELIVER ON THE PROMISE OF BEING THE VENDOR TO HELP ORGANIZATIONS ACHIEVE CYBER RESILIENCE. WE HAVE: SOLUTIONS: Our extensive security portfolio helps you create a layered approach to security so you can identify internal threats, stay informed of the external security issues that threaten your organization, and take action against them quickly and comprehensively. Our solutions help organizations discover, track, and protect data and users. And our managed security service offerings provide monitoring and big data analysis. SECURITY INTELLIGENCE IS THE KEY: We operate the largest civilian cyber intelligence threat network anywhere, giving us unrivaled insight to what attackers will try next. Our Symantec Global Intelligence Network maintains worldwide visibility into the threat landscape via 65 million attack sensors that constantly monitor networks and vulnerabilities. The network gathers data from one of the most extensive antifraud communities of enterprises and security vendors. It checks more than 1.4 billion web requests and 8 billion emails a day. We track 3.7 trillion “threat indicators” annually across the Internet and continuously collect new telemetry from hundreds of millions of mobile devices, endpoints, and servers around the globe, coverage that’s unrivaled in the industry. SCALE, EXPERTISE, AND INFRASTRUCTURE: We have the scale and global security architecture. Thousands of employees including 1000 security analysts and researchers worldwide based in 50 different countries, 5 PCI-certified Security Operations Centers, and secure datacenters including a 4-tier military grade datacenter for our authentication solutions. We have the scale to protect information wherever it’s stored or accessed. And we have the capacity to respond to attacks immediately. [ ] USES THE IMPACTS OF A MAJOR CYBER ATTACK CAN BE DEVASTATING TO ANY ORGANIZATION. THE HUMAN EFFECT Figure 1. Agenda Overview for Nexus of Forces 1 Source: Gartner ( January 2014 ) Figure 2 The Targeted-Attack Hierarchy of Needs Source: Forrester Research, Inc Detection and response Prevention An Integrated Portfolio that Enables Orchestration A Focus on the Fundamentals A Dedication to Recruiting and Retaining Staff An Actual Security Strategy 1 Source: Agenda Overview for the Nexus of Forces, 20 January 2014 G00261499 2 . 4 BILLION PEOPLE USE THE INTERNET 34 % OF WORLD POPULATION

Symantec cyber-resilience

Embed Size (px)

DESCRIPTION

Internet, Cyber-attacks and threats are becoming more prevalent. This Infographic explains the current state, and things to consider for yourself and your business.

Citation preview

Page 1: Symantec cyber-resilience

With this many people online, there are as many risks as benefits to our digital life. In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise.

Cyber resilience does not promise immunity from cyber attacks nor does it purport to eliminate risk. Eliminating all cyber risk is impossible. In fact, it could impede agility, for an environment with an acceptable level of risk enables innovation. Cyber resilience is about managing security with a multi-layered approach that encompasses people, processes, and technology.

CYBER RESILIENCE

THE FIVE PILLARS

THE UNKNOWNUNKNOWNSAs desktop computer operating systems give way to web-based and mobile platforms and applications, the workplace is changing at an exponential rate.

WHAT WE DO KNOWDigital technology is inextricably woven into our daily lives.

There are many unknown unknowns. It is literally impossible to predict all the online threats your organization will face, so your best hope of combating them is to prepare for any possibility.

IN ITS NEXUSOF FORCESGartner defines this phenomenon as

The convergence and mutual reinforcement of four interdependent trends: social interaction, mobility, cloud, and information that combine to empower individuals as they interact with each other and their information through well designed ubiquitous technology 1.

“ ” 41% of attacks affect organizations with fewer than 500 employees

THE RISE OF MOBILITY IS ONLYACCELERATING THESE TRENDS.

1/3 of all cell phones are internet-enabled

smartphones

15% of mobile devices are not secured and are used

for work and play

500 million photos sent daily check messages 23X a day

2/3

MALWARE ATTACKS have increased in 2013

up 23% on Web & up 139% on Mobile 67% come from legitimate sites

1.5 Million Victims Daily = $110 Million in Losses

ONLINE ATTACKS claim

84%Are Not Contained forMonths or Even Years

The best way to prepare is to assess your level of cyber resilience, and security intelligence is the key. Security Intelligence is more than just threat intelligence or technology; it’s the data on an enterprise’s vulnerabilities and threats, which is analyzed in a way that enables the prioritization of action to maximize risk

reduction. Better security intelligence enables better business decision-making, better organizational processes, increased protection from cyber attacks, and better preparation when they do occur — resulting in a business that is more resilient and agile.

THE CYBER RESILIENT ENTERPRISE

RECORD ENDPOINT AND

TRACK ADHERENCE TO DATA

IDEN

TIFY G

LOBAL THREATS

MONITOR ACCESS ATTEMPTS

EDU

CA

TE US

ERS – D

EVELOP EM

PLOYEE SECURITY IQ

ASSESS STATE

OF

SEC

UR

ITY

TO

FINE-TUNE PROCESSES, POLICIES, AND PROCEDURES

BECOME CYBER RESILIENT

HARNESS YOUR SECURITY INTELLIGENCE

GOVERNANCE POLICIE

S

NETWORK ACTIVITIES

TO M

Y B

USIN

ESS

IDENTIFY V

ULNER

ABI

LITI

ES

<<<<<<<<<<<<<<<

<<<<< Correlate and Analyze >>>>>>>>>>>>>>>>>>

Protect YourOrganization

PREPARE DETECT RESPOND RECOVERPROTECTPrepare for Attacks Implement Response Plan Refine Plan

TIMELINE

To successfully face and overcome an attack, you must thoroughly understand your company’s security and risk posture. Begin by painstakingly identifying the organization’s vital information. Conduct an infrastructure and information assessment

that includes all known security vulnerabilities. Establish a baseline and compare the results to those of your peers. Spotting and addressing the most urgent issues first will make your organization a less appealing target for attackers.

Once you have a good handle on what's out there, where it lives, its level of sensitivity, how vulnerable it is, and your risk tolerance, you can begin to take the necessary steps to protect it. The second

pillar is all about developing and implementing safeguards for critical infrastructure and services in order to limit or contain the impact ofan attack.

The Detect pillar focuses on developing and implementing the appropriate activities to rapidly identify an attack, assess the systems that may be affected, and ensure a timely response. In

addition, this stage is concerned with continuing to monitor the network for other attack indicators related to that attack and making sure the safeguards you had in place were effective.

The Respond pillar provides guidance on the types of activities that can accelerate time to remediation and contain the impact of the attack once it’s detected. For the detection process to have any value, there

must be a timely response. While there are many solutions and services available to help, much of what is needed in terms of response involves people and processes internal to the organization.

The final pillar that needs to be addressed — critical to any resilient security strategy — is recovery. This stage involves developing and implementing the appropriate systems and plans to restore any data and services that may have been impacted during a cyber attack. As much as we prepare and protect our organizations,

we may not be able to avoid certain types of attacks. Even if you respond quickly to a cyber breach, an attack may have consequences. No matter the outcome, organizations must be able to restore their people, processes, and systems as quickly as possible. An effective recovery depends on a clear and thorough recovery plan.

PREPARE PROTECT RESPOND RECOVERDETECT

ATTACKER INGRESSATTACKER DETECTED

SYSTEMS SECUREDNORMAL RESPONSE PLAN

The evaluation process utilizes best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars: prepare/identify, protect, detect, respond, and recover. Using this framework, you can evaluate each pillar of your organization’s cyber security strategy - specific actions to be performed by identifiable IT jobs are associated with each pillar.

Unfortunately, no silver bullet exists to prevent attacks, and breaches will occur in spite of an organization’s best efforts at preparation and protection. Many customers lack the sophistication and expertise they need to address these new, more advanced threats. To minimize the potential devastation of a cyber attack, you must change the way you think about security. Think in terms of not eliminating cyber risk but of creating cyber resilience.

To create cyber resilience, organizations must begin by changing the conversation about cyber risk. It’s crucial to align IT and the business and encourage regular, productive discussions to identify the benefits and risks associated with a cyber resilient strategy. Find and use a common language. IT security must accept that the business will be tempted to take risks in order to succeed and must empower the business to make informed decisions on how they manage cyber risk.

ACHIEVING RESILIENCE

PR

EPA

RE

PR

OTE

CT

RES

PO

ND

REC

OV

ERD

ETEC

T

A NEW PERSPECTIVE ON SECURITY

Occur in Hoursor Less

Aren’t Discoveredfor Month

DATA BREACHES

22%

Contact your Symantec account representative or reseller partner today to discuss how you can start building cyber resilience into your security strategy. Get more information about cyber resilience and stay informed at the Symantec cyber resilience microsite.

go.symantec.com/cyber-resilience

SYMANTEC IS UNIQUELY QUALIFIED TO DELIVERON THE PROMISE OF BEING THE VENDOR TO HELP ORGANIZATIONS ACHIEVE CYBER RESILIENCE.

WE HAVE:

SOLUTIONS:

Our extensive security portfolio helps you create a layered approach to security so you can identify internal threats, stay informed of the external security issues that threaten your organization, and take action against them quickly and comprehensively. Our solutions help organizations discover, track, and protect data and users. And our managed security service offerings provide monitoring and big data analysis.

SECURITY INTELLIGENCE IS THE KEY:

We operate the largest civilian cyber intelligence threat network anywhere, giving us unrivaled insight to what attackers will try next.

Our Symantec Global Intelligence Network maintains worldwide visibility into the threat landscape via 65 million attack sensors that constantly monitor networks and vulnerabilities. The network gathers data from one of the most extensive antifraud communities of enterprises and security vendors. It checks more than 1.4 billion web requests and 8 billion emails a day. We track 3.7 trillion “threat indicators” annually across the Internet and continuously collect new telemetry from hundreds of millions of mobile devices, endpoints, and servers around the globe, coverage that’s unrivaled in the industry.

SCALE, EXPERTISE,AND INFRASTRUCTURE:

We have the scale and global security architecture. Thousands of employees including 1000 security analysts and researchers worldwide based in 50 different countries, 5 PCI-certified Security Operations Centers, and secure datacenters including a 4-tier military grade datacenter for our authentication solutions. We have the scale to protect information wherever it’s stored or accessed. And we have the capacity to respond to attacks immediately.

[ ]U S E S

THE IMPACTS OF A MAJOR CYBER ATTACKCAN BE DEVASTATING TO ANY ORGANIZATION.

THE HUMAN EFFECT

Figure 1. Agenda Overview

for Nexus of Forces1

Source: Gartner ( January 2014 )

Figure 2The Targeted-AttackHierarchy of Needs

Source: Forrester Research, Inc

Detectionand response

Prevention

An Integrated Portfoliothat Enables Orchestration

A Focus on the Fundamentals

A Dedication to Recruiting and Retaining Staff

An Actual Security Strategy

1Source: Agenda Overview for the Nexus of Forces,20 January 2014 G00261499

2.4BILLION PEOPLE

USE THE INTERNET

34%

OF WORLDPOPULATION