Secure Business Collaboration Do It Now!



Similar documents
Position Paper. Collaboration Oriented Architectures

Cloud Cube Model: Selecting Cloud Formations for Secure Collaboration

Cloud s Illusions: Jericho Forum future direction

Jericho Forum Report Back

Security Architecture Principles A Brief Introduction. Mark Battersby , Oslo

IT Audit and Compliance

PENETRATION TESTING GUIDE. 1

Policy Driven Practices for SOA

JOURNAL OF OBJECT TECHNOLOGY

Cyber security. Cyber Security. Digital Employee Experience. Digital Customer Experience. Digital Insight. Payments. Internet of Things

Security Practices for Online Collaboration and Social Media

WEB 2.0 AND SECURITY

API Management: Powered by SOA Software Dedicated Cloud

JOURNAL OF OBJECT TECHNOLOGY

CYBER SECURITY, A GROWING CIO PRIORITY

Addressing Cyber Risk Building robust cyber governance

BPM Perspectives Positioning and Fitment drivers

The IBM Solution Architecture for Energy and Utilities Framework

IBM Information Management

Architecting Security for the Private Cloud. Todd Thiemann

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

How service-oriented architecture (SOA) impacts your IT infrastructure

Logically Securing a Public Cloud Service

Approach to Information Security Architecture. Kaapro Kanto Chief Architect, Security and Privacy TeliaSonera

Chief Information Security Officer

SOA and BPO SOA orchestration with flow. Jason Huggins Subject Matter Expert - Uniface

2014. All Rights Reserved. Information and Communications Technology

Embrace the G-Cloud. Ultra Secure Colocation Services for the Public Sector. thebunker.net Phone: Fax:

HP SOA Systinet software

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

WHITEPAPER. An ECM Journey. Abstract

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Draft v0.7 July 27th. The Nature of Cloud

Accenture Software for Banking Agile development platforms for an agile multichannel bank

ECM AS A CLOUD PLATFORM:

Address C-level Cybersecurity issues to enable and secure Digital transformation

Data governance in the connected enterprise Simon Wright. Star Wars: The Empire Strikes Back

Gold study sponsor: Is cyber security now too hard for enterprises? Cyber security trends in the UK. Executive Summary

How To Manage Risk On A Scada System

HP Private Cloud Solutions

The Cadence Partnership Service Definition

White Paper. Enabling Sales and Distribution with the Cloud. Abstract. - Rafee Tarafdar, Subramanian Radhakrishnan (Subra)

Strategies for assessing cloud security

Enterprise SOA Strategy, Planning and Operations with Agile Techniques, Virtualization and Cloud Computing

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

How To Write A Pca Dss Compliance Solution For Gameplan Group Ltd

White paper. Secure Cloud Services: An Integrated Approach

Compliance and Unified Communication

Author: Sarah Taghavi

DYNAMIC INFRASTRUCTURE Helping build a smarter planet

Capgemini and Pegasystems: Delivering Business Value through Partnership

2012 Bit9 Cyber Security Research Report

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

G-Cloud IV Services Service Definition Accenture Cloud Security Services

Client Technology Solutions Suresh Kumar Chief Information Officer

locuz.com Professional Services Security Audit Services

Transformation to a ITaaS Model & the Cloud

Wilhelmenia Ravenell IT Manager Eli Lilly and Company

Domain 1 The Process of Auditing Information Systems

Data as a Service Virtualization with Enzo Unified

Tufts University. Department of Computer Science. COMP 116 Introduction to Computer Security Fall 2014 Final Project. Guocui Gao

Neustar Intelligent Cloud Services

Cloud security architecture

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Cloud and Data Center Security

Information security controls. Briefing for clients on Experian information security controls

KM road map. Technology Components of KM. Chapter 5- The Technology Infrastructure. Knowledge Management Systems

5 Pillars of API Management with CA Technologies

Responding to the de-perimeterisation of corporate networks A practical guide Paul Simmonds

OPC & Security Agenda

Selecting the right Cloud. Three steps for determining the most appropriate Cloud strategy

Cloud Roadmap to Success. October, 2014

Information Technology Strategic Plan

Trend Micro. Secure virtual, cloud, physical, and hybrid environments easily and effectively INTRODUCTION

Specialist Cloud Services Lot 4 Cloud EDRM Consultancy Services

Responding to the de-perimeterisation of corporate networks A practical guide Paul Simmonds

Master Data Management Architecture

Cybersecurity Strategic Consulting

NNIT Cybersecurity. A new threat landscape requires a new approach

Transform Your Bank in Measurable Steps

The Next Generation of Security Leaders

Security - A Holistic Approach to SMBs

Work Process Management

Secure Thinking Bigger Data. Bigger risk?

Cordys Business Operations Platform

CYBER SECURITY Audit, Test & Compliance

Requirements and Challenges for Securing Cloud Applications and Services

IBM Software IBM Business Process Management Suite. Increase business agility with the IBM Business Process Management Suite

Data Access Request Service

INFORMATION SECURITY GUIDE. Cloud Computing Outsourcing. Information Security Unit. Information Technology Services (ITS) July 2013

Zak Khan Director, Advanced Cyber Defence

STRATEGIC WHITE PAPER. The next step in server virtualization: How containers are changing the cloud and application landscape

Information Security Management System for Microsoft s Cloud Infrastructure

Choosing the Right Master Data Management Solution for Your Organization

Ubertas Cloud Services: Service Definition

Data Governance Implementation

IBM Software A Journey to Adaptive MDM

Securing The Cloud With Confidence. Opinion Piece

Transcription:

Secure Business Collaboration Do It Now! Collaboration Oriented Architecture as it pertains to FIPNet Adrian Seccombe CISO, Eli Lilly

Why Worry: Security Environment 2005 > 2008 Changing Threats Changing Perpetrators Covert Phishing Targeted Attacks < Creates Loss Criminals Individuals High Impact Overt 2005 Worms < Created Noise Foreign States Teenage Hackers Activists Low Impact Untargeted Targeted Target Industries Unlikely Likely Changing Means High Profit Defence Pharma Banks Retail Extrusion: Mobile Devices Extrusion: Physical High Impact Low Profit Farming Intrusion Denial Extrusion: Logical Low Impact Low IT Use High IT Use Unlikely Likely Author: Adrian Seccombe

Remember De-Perimeterisation! A pointer from HISTORY!

Backgrounder The journey so far Defined the issue, and created noise around We don t apologise for the controversy! Created the Commandments, there are 11! Created a generic Roadmap Trademarked: Jericho Forum Created Inherently Secure Communications Paper Published the COA Position Paper Collaboration Oriented Architectures

We need to shift our mindset! A fundamental shift in thinking is required, moving from the thinking of a Hedgehog, an animal that rolls into a tight ball at any sign of threat, to that of a Strawberry Plant, which puts all its key genetic material securely on its outside, as well as sending out suckers to extend the plants domain.

The Lilly Frame We are changing from a FIPCo to a FIPNet. Fully Integrated Pharmaceutical Company Fully Integrated Pharmaceutical Network Collaboration will be a core capability. The moral: Virtual Size does matter! Goals: Lower Cost, More Flexibility, Managed Risk!

Properties of 2.0 Enterprises Low- Barrier, Self Service Networked, Cost Effective Open, Decentralised Customer Centric Workforce Enterprise 2.0 Intranet Internal Network Effects External Network Effects 2-way flow of content Cloud Computing Customers Web 2.0 Web

SEARCH LINKS AUTHORSHIP TAGS Discoverability of information drives reuse, leverage and ROI Using URIs to forge thousands of deep interconnections between enterprise and external content Ensuring that every worker has easy access to, and knowledge of content tools Allowing natural organic, on-the-fly organisation of data from every point of view EXTENSIONS Extend knowledge by mining patterns and user activity SIGNALLING Make information consumption easy by pushing news of changes Enterprise 2.0 Capabilities According to Professor Andrew McAffee The The trick trick is is designing designing each each of of these these capabilities capabilities as as Securely Securely Collaboration Collaboration Oriented Oriented

Collaboration Oriented Architectures Why? We had defined the Problem We had developed a set of Principles in the Commandments We had created a roadmap in 2007 (Though not rich with content) We realised we needed to provide more details around the Solution.

COA: The Papers Framework Introduction Problem Why Should I Care? Components of COA Recommended Solution/Response Conclusion The Way Forward

Why Should I care? De-Perimeterisation is happening NOW! COA is the framework that will allow appropriately architected business-driven solutions to be developed and delivered. Adopting COA allows the added value of externalisation while mitigating the additional risks to your organizations.

Components of COA Principles - Known parties - Assurance -Trust - Risk - Compliance - Legal, Regulatory, Contractual - Privacy Trustworthy! Services - Federated Identity - Policy Management - Data/Information Management - Classification - Audit (Standards based & Shared) Secure! Processes People Risk Information Devices Enterprise Technologies - End Point Security/Assurance - Secure Communications - Secure Protocols -Secure Data/Information - Content Monitoring - Content Protection Reliable! Solution Attributes Usability/Manageability Availability Efficiency/Performance Effectiveness Agility An Architects View

More on the PRIDE Control Processes P R I D E People People processes that enable the life cycle management of the new externalised workforce and empowered customers, including on-boarding, role management and off-boarding. Risk Management Risk Management Processes that can enable the management of Information Risk across multiple partners and collaborators. Information Asset (Data and Records) Information Asset (Data and Records) life cycle management processes that ensure the Identity, Confidentiality, Integrity, Availability of Data, including Data and Record Retention in Collaborations. Device Device life cycle management processes that ensure the appropriate trust state and identity of technical entities (Clients, Servers, and Services) accessing the information assets. Enterprises The life cycle that manages the on-boarding, role management and off-boarding of Enterprises (Suppliers, Partners and Collaborators)

Conclusion Implementing COA builds upon existing standards and practises to enable effective and secure collaboration COA recognises that the Web 2.0, Mobility, Cloud and SOA patterns enables collaboration and allow legacy applications to be re-architected. It will take a different Web 2.0 and Externalising Mindset, and new services, both in clouds and around the data.

The way forward Read and Internalize the Jericho Forum Commandments so you can Externalize Read and Understand the Collaboration Oriented Architectures Papers Get ready for the Cloud and Web 2.0 waves they will REALLY help you understand the De-Perimeterisation Problem hopefully not too late!!! Papers available at : https://www.opengroup.org/jericho/publications.htm

Genetic Verification Pointers from Nature Compartmentalisation Macro-Perimeterisation (Security Services in the cloud) Segmentation Micro-Perimeterisation An Enterprise (Information Centric Security)

Questions. Please!

Enterprise 2.0 some links http://blogs.zdnet.com/hinchcliffe/ http://dealarchitect.typepad.com/deal_arch itect/2006/08/the_bionic_ente.html

and the Jericho Forum 2009 Focus: Securely Collaborating in Clouds Cloud Types External Internal Proprietary Open Outsourced Insourced Watch out for communications about the 2009 launch on the Jericho Forum Website

Discover the truth about Cloud Layers Orchestration A b s t r a c t I o n o c c u r s h e r e! Last! 3rd 2nd 1st Outcome / Value Process Software Platform Infrastructure Security and IdAM That s the order we are doing it in, but is it the best?