W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s



Similar documents
W H I T E P A P E R P r e p a r i n g f o r D i s a s t e r R e c o v e r y i n Q a t a r

How To Understand Cloud Economics

Hosting and cloud services both provide incremental and complementary benefits to the organization

W H I T E P A P E R T h e I m p a c t o f A u t o S u p p o r t: Leveraging Advanced Remote and Automated Support

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Caretower s SIEM Managed Security Services

DNS Server Security Survey

Cloud security architecture

The Benefits of an Integrated Approach to Security in the Cloud

Perspective: Cloud Solutions and Deployment for Healthcare Payers in 2014

Global Headquarters: 5 Speen Street Framingham, MA USA P F

The End of a Cost Centre - Transform Enterprise Printing into Competitive Advantage

Preemptive security solutions for healthcare

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Managed Services. Business Intelligence Solutions

How To Protect Your Network From Attack From A Network Security Threat

Cyberprivacy and Cybersecurity for Health Data

Managed Security Services for Data

2011 Forrester Research, Inc. Reproduction Prohibited

HP and netforensics Security Information Management solutions. Business blueprint

Using Converged Infrastructure to Enable Rapid, Cost-Effective Private Cloud Deployments

A COMPLETE APPROACH TO SECURITY

CYBER SECURITY, A GROWING CIO PRIORITY

Leveraging security from the cloud

Assessing the Business Value of SDN Datacenter Security Solutions

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

How To Manage Cloud Management

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

SecureData: A Fast-Growing, U.K.-Headquartered Security Services Vendor

Business Continuity & Disaster Recovery

Managed Security Protection & Outsourcing Services

Allstate Getting Much More from Its IT Services with ServiceNow Cloud-Based IT Service Management Solution

Impact of Juniper Training and Certification on Network Management Activities

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

Middle East I.T. Security Business Survey

MANAGED SECURITY SERVICES (MSS)

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

WHITE PAPER Hitachi Data Systems Optimizes Storage Management Through ITIL-Based Consulting Services

Data Management: Foundational Technologies for Health Insurance Exchange Success

NGA Paper. Act and Adjust: A Call to Action for Governors. for cybersecurity;

Accenture Risk Management. Industry Report. Life Sciences

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

Security. Security consulting and Integration: Definition and Deliverables. Introduction

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Address C-level Cybersecurity issues to enable and secure Digital transformation

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Equinix Increases IT and Employee Productivity with ServiceNow Cloud-Based IT Service Automation Solution

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Nokia Siemens Networks Network management to service management - A paradigm shift for Communications Service Providers

Achieving Control: The Four Critical Success Factors of Change Management. Technology Concepts & Business Considerations

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

WHITE PAPER Linux Management with Red Hat Network Satellite Server: Measuring Business Impact and ROI

The Business Value of IT Certification

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Remote Management Services Portfolio Overview

WHITE PAPER Risk, Cost and Quality: Key Factors for Outsourcing QA and Testing

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

RESEARCH Recruiting Online

White Paper Achieving HIPAA Compliance through Security Information Management. White Paper / HIPAA

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

I D C A N A L Y S T C O N N E C T I O N

CASSIDIAN CYBERSECURITY

Separating Security and Information Management into Two Industry-Leading Technology Companies

How To Protect Your It Infrastructure

Leveraging Network and Vulnerability metrics Using RedSeal

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

C A S E S T UDY The Path Toward Pervasive Business Intelligence at an Asian Telecommunication Services Provider

Cisco Unified Communications and Collaboration technology is changing the way we go about the business of the University.

W H I T E P A P E R T h e R O I o f C o n s o l i d a t i n g B a c k u p a n d A r c h i v e D a t a

How To Buy Nitro Security

W H I T E P A P E R S A P E R P L i f e - C y c l e M a n a g e m e n t O v e r c o m i n g t h e D o w n s i d e o f U p g r a d i n g

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

2015 VORMETRIC INSIDER THREAT REPORT

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Network Management Services: A Cost-Effective Approach to Complexity

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Payment Card Industry Data Security Standard

Outsourcing in the Financial Services Industry: Finding Opportunities and Managing Risk. New York. OCC and FRB Guidance on Managing Third-Party Risk

2012 North American Managed Security Service Providers Growth Leadership Award

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Defining Data Security in 2015 and Beyond

Continuous Network Monitoring

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

COMBATING CYBER THREATS: A HOW TO FOR THE CISO.

W H I T E P A P E R A u t o m a t i n g D a t a c e n t e r M a nagement: Consolidating Physical and Virtualized Infrastructures

Best Practices for Building a Security Operations Center

Securing Your Journey to the Cloud. Managing security across platforms today and for the future. Table of Contents

Global Headquarters: 5 Speen Street Framingham, MA USA P F

Sempra Energy Utilities response Department of Commerce Inquiry on Cyber Security Incentives APR

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Global Headquarters: 5 Speen Street Framingham, MA USA P F

W H I T E P A P E R T h e B u s i n e s s V a l u e o f P r o a c t i v e S u p p o r t S e r v i c e s

Transcription:

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s IDC Middle East, Africa, and Turkey, Al Thuraya Tower 1, Level 15, Dubai Media City, P.O. Box 500615, Dubai, United Arab Emirates (UAE). Tel: +971 4 391 2741 Fax: +971 4 391 1922 Sponsored by: MEEZA Megha Kumar March 2014 I D C O P I N I O N Targeted cyberattacks in the Gulf Cooperation Council (GCC) countries, including Qatar, have increased in frequency and complexity over the past two years. The recent spate of attacks on energy and media organizations emphasizes the fact that these intrusions now have broader political and economic agendas. Organizations in Qatar are beginning to acknowledge that cyberattacks have more severe consequences than just downtime. Companies can face financial loss and experience loss of customer or corporate data and loss of reputation; further, they can also be held liable for loss of data or services by business partners and customers. The need for robust security solutions is now more critical than ever. These attacks have caused businesses to acknowledge the need for better information security strategies and solutions to help mitigate these incidents. Consequently, companies are looking into security and vulnerability solutions, including vulnerability assessments, security event and incident management, and digital forensic solutions. In addition, they have increased network monitoring; currently, they manage this task in house due to the limited availability of Security Operations Center (SOC) providers in these countries. Organizations in most vertical markets are susceptible to cybercrime, and companies need to leverage threat intelligence to improve security and use SOCs to protect themselves better.

I N T H I S W H I T E P A P E R This IDC White Paper explores the evolving threat landscape, the challenges organizations face, and the need to leverage threat intelligence from SOCs to establish metric-based information security strategies. Additionally, it describes how MEEZA's SOC services are designed to alleviate some of the challenges organizations in this region encounter when establishing a robust security infrastructure. Methodology This IDC White Paper presents the results of a special IDC study commissioned by MEEZA. In preparation for this White Paper, IDC utilized its continuous research on information security practices in the region. IDC conducted a few in-depth analystdriven interviews across the region with customers and information security vendors. On the vendor side, IDC interviewed major security solution providers. The customers were a mix of large banks, aviation companies, and oil and gas organizations. The objective of these interviews was to understand the drivers behind growing customer interest in security and to gain insight into the solutions they are adopting. S I T U A T I O N O V E R V I E W Over the past decade, the threat landscape in Qatar has evolved dramatically with the growing frequency and increasingly sophisticated nature of cyberattacks. In addition, companies in Qatar have to work with the complications of securing new applications, mobile devices, and confidential corporate data while complying with the regulations of local and international authorities. 2 #CEMA20098 2014 IDC

F I G U R E 1 The Evolving Threat Landscape Complex and frequent threats Protecting company and personal mobile devices Pressure to comply with local and international regulations Exponential data growth Rise in cybercrime Source: IDC Information security has grown in importance for CIOs and IT decision makers in Qatar. Companies are beginning to acknowledge that, if they want to remain competitive and sustain uptime, they need to ensure the protection of their internal and external assets. Qatar has been one of the most proactive countries in the GCC in terms of corporate security, implementing security directives from the Supreme Council of Information and Communication Technology (ictqatar) and the establishment of the Qatar Computer Emergency Response Team (Q-CERT). However, despite all these factors driving information security adoption in Qatar, investment in IT security solutions tends to lag, as organizations face numerous challenges in establishing a secure environment. In a recent study conducted by IDC, nearly 200 organizations across the GCC (including Qatar) were asked about the obstacles for IT decision makers in establishing secure IT infrastructure. 2014 IDC #CEMA20098 3

F I G U R E 2 Top 10 Challenges for Information Security in the GCC, 2012 Employees' lack of adherence to IT security policies Increasing sophistication of attacks 60% 59% Shortage of IT security personnel 39% Lack of information security strategy Increasing number of mobile clients and unmanaged devices Controlling use of IM and Web 2.0 apps Securing new software additions in your environment Managing security in a 24/7 environment Lack of executive management support Lack of budget 38% 38% 37% 36% 35% 32% 29% 0% 10% 20% 30% 40% 50% 60% 70% Source: IDC, 2012 The results clearly highlight a lack of employee adherence to policies as a major deterrent to the establishment of a secure environment. Several companies in the region do not even have adequate security strategies in place; in addition, IT decision makers lack financial support from the business side of the organization and are forced to do more with shrinking budgets. These challenges lead to a very reactive attitude to security and vulnerable IT environments. "While protecting the organization from external and internal threats is critical, some organizations in Qatar tend to ignore internal security and do not enforce proper security policies. Internal vulnerabilities should be a major concern, as these are the access points that lead to security incidents." CIO, transportation vertical, Qatar While Qatar is, without doubt, home to a number of progressive and proactive organizations, other companies in the country tend to ignore the effectiveness of having a security strategy in place and do not understand the repercussions of a lack of security during a cyberattack. Most companies do not realize that these attacks cause far more damage than just shutting down services and compromising the effectiveness of security investments. 4 #CEMA20098 2014 IDC

F I G U R E 3 The Impact of a Cyberattack on an Organization Source: IDC Rise in Cybercrime Cyberattacks have long since evolved from simple denial-of-service attacks to Advanced Persistent Threats (APTs). These threats are usually targeted, well timed, and aimed at impacting an organization or country on financial and political levels. In 2012, Qatar became one of the first countries in the Middle East region to be subjected to cyberwarfare, with targeted attacks geared toward impeding the nation's energy and media sectors, creating economic and political repercussions. APTs of this nature are expected only to increase in frequency, and they attempt to cause the maximum damage possible. Governments will also need to play a critical role when it comes to cybercrime, since they are among the main targets of APTs and are the main entities securing countries' telecommunications networks. Organizations, including ictqatar, have taken steps to secure the country and the business network by setting up cybersecurity research centers, establishing committees to investigate cybersecurity issues in key industries (e.g., energy) and running conferences and campaigns to educate users on the need for secure organizations and best practices. Now more than ever, CIOs need to evaluate the cost of being compromised by a lack of a secure environment or proactive security strategy. Susceptibility to risk will 2014 IDC #CEMA20098 5

provide justification for increased security budgets, leading to the establishment of proactive metric-based security strategies. "Given the recent attacks in the country, the attitude among executives in Qatar has changed; they now realize the need for security and internal training." CIO, finance vertical, Qatar Implication of Cybercrime on Security Software Spending in Qatar While it is accepted that cybersecurity threats will grow at an exponential rate in frequency and sophistication around the globe, the level of security spending in the GCC remains far more conservative than in mature economies. For example, in Western Europe, many companies have already undertaken high levels of spending on security software and will now seek to optimize their investments while working to achieve higher efficiency levels and ensure business availability. Qatari organizations will invest significantly in security software solutions over the next three or four years, at a faster rate than the rest of the GCC. Although the motivation for this spending has arisen from the recent attacks on energy and media organizations in the country, Qatari organizations realize the need to ensure data security and privacy while investing in solutions to mitigate APTs better. Organizations in the country are beginning to acknowledge that the liability of not being well protected is not limited to downtime; it can have the additional repercussions of customer loss, failure to meet service-level agreements (SLAs), financial losses, and, most of all, loss of reputation and trust. An overall upward trend in security software spending is expected in the GCC in general and Qatar in particular. F I G U R E 4 Year-on-Year Growth of Security Software, 2012 2016 Source: IDC 2013 6 #CEMA20098 2014 IDC

E S S E N T I A L G U I D A N C E Creating a Metrics-Based Information Security Strategy While Containing Costs A proper information security strategy will help an organization to remain proactive in managing threats and, most importantly, in ensuring business continuity. Information security strategies need to be planned, executed, and reviewed periodically. An effective information strategy must address three major questions: How do we measure the value of IT security to the business? What is the risk portfolio of our business? How can IT security help in achieving business objectives? How do we manage the security and privacy of sensitive data when it resides outside of the corporate environment? F I G U R E 5 The Three Technology Pillars for Information Security Planning People Who can access what, and why? How many employees are on-premise versus mobile workers? What can be accessed by business partners? How will we train employees and create awareness? Process What is our risk management process? How will we report and manage incidents? What is our strategy in the event of large-scale system downtime? Technology How will we deploy the solutions? Will we invest more in appliances, software, or services? Which security-monitoring tools do we implement? Do we have the right solutions to adhere to regulations? Source: IDC By answering these questions, organizations will not only establish an information security strategy, but they will also create a risk profile. Risk has become the single biggest driver for IT security planning, and, now more than ever, companies need to have more in-depth visibility into, and intelligence of, their IT infrastructures so as to ensure they can anticipate advanced threats and contain them accordingly. 2014 IDC #CEMA20098 7

Threat intelligence will become critical, and, by deploying the right tools and solutions, IT departments will be able to gather the necessary metrics to identify and understand: The security level of a network The number of open endpoints Out-of-date patches The impact of an incident The level of compliance with regulations Application vulnerabilities The documentation of these findings will provide the justification needed to improve information security policies and help establish proper strategic and financial support from executive management, an issue that has been highlighted as a major challenge for IT decision makers in Qatar. These metrics form the cornerstone of an informed and proactive information security strategy. "We perform quarterly reviews of our IT security policies and carry out both internal and external audits of our security environments on an annual basis." IT director, finance vertical, Qatar This need for threat intelligence leads to the expansion of the technology pillar shown in Figure 5, above, as companies will need to adopt solutions that enable them to be more proactive in mitigating threats, including vulnerability assessment solutions, security incident/event management tools, and establishing an SOC. Security Operation Centers SOCs are usually teams dedicated to addressing information security concerns and monitoring an organization's networks for vulnerabilities and attacks. SOCs can be established internally or the work can be outsourced to a vendor or an IT services provider with an established SOC. 8 #CEMA20098 2014 IDC

F I G U R E 6 In-House SOC Versus Outsourced SOC In-House SOC Data integrity and privacy Control of applications scans Can realign as per changes in business strategy Can take action in case of attacks Can be modified to fulfil regulatory requirements Requires investment in risk monitoring and management solutions Need to find and invest in proper IT security analysis skills Outsourced SOC Cost-effective for solutions and skill set. Available threat intelligence and situation awareness information Constant monitoring services and dedicated staff Reduced infrastructure cost Guidance from threat intelligence experts Vendor agnostic Services are bound by servicelevel agreement Issues around data privacy Lack of dedicated infrastructure to one customer Source: IDC Cost is one of the most critical factors for an SOC. While regulatory considerations, the threat landscape, and the need for new technology solutions have all increased, budgets have not. Organizations are under cost constraints and need to evaluate the feasibility of keeping certain activities in house versus outsourcing them to a service provider. The same is true for SOCs; companies need to decide if they want them in house or use the services of an outside provider. Large organizations in the region, especially those in the telecommunications and banking verticals, have been investing in their own SOCs. However, several companies IDC interviewed (apart from telecommunications providers) stated that network monitoring and conducting vulnerability assessments are two functions they are willing to outsource to a service provider. Currently, the GCC (including Qatar) has a limited number of regional-level SOC providers available, forcing these organizations to carry out these functions themselves. The use of SOC services would make the monitoring of internal and nationwide networks easier to manage and more cost effective, enabling resources to be dedicated to other major IT-related activities. Given the low availability of skilled IT workers, companies should consider using the services of an SOC provider to monitor their network's health and raise awareness of any threats among business stakeholders. It should be kept in mind that, if a targeted attack occurs, most solutions help organizations mitigate the impact or prevent an impact to a certain extent. 2014 IDC #CEMA20098 9

MEEZA Solutions MEEZA, a Qatar Foundation joint venture, is a provider of managed IT services in the Middle East and spans several vertical markets, including finance, government, telecommunications, energy, healthcare, education, and manufacturing, with an endto-end solution delivery approach. MEEZA is becoming a recognized Systems Integrator and continues to establish itself with Smart City expertise. MEEZA has Tier III-certified datacenters located in Qatar; these are known as M- VAULT 1, M-VAULT 2, and M-VAULT 3. M-VAULT 1 was launched in 2008, followed by M-VAULT 3 in 2012. M-VAULT 2 was launched in Q1 2014. MEEZA's value proposition is its provision of the first commercial SOC services to the Qatari market. Through its SOC, MEEZA will be able to offer insight into the vulnerabilities and strengths of its clients' networks. The SOC will cover four major services: Threat Intelligence: This service will analyze networks and gauge the advanced threats prevalent within the GCC, warning clients on how vulnerable their networks are to these APTs. Advanced Security Monitoring: This service performs a correlation exercise on the customer's network at intervals, looking for instances during which the network security can be compromised. Log Management: This service will allow customers to keep a log of all activities on their networks. It will benefit audit- and compliance-related activities. It will also provide customers with the necessary information to perform detailed analyses of their security environments for planning purposes and forensics in the case of a security breach. Vulnerability Scanning: This service enables the customer's IT infrastructure to be scanned on a weekly and monthly basis. It can be provided/delivered from MEEZA's facilities or even the customer's on-premises facilities. MEEZA also provides security consulting services. MEEZA's SOC is one of the first commercially available SOCs in the Gulf States. Previously, these services were available to local customers from providers located outside of the region. MEEZA is aiming to expand its market coverage outside of Qatar by making its SOC services portfolio available throughout the Middle East. Challenges Customers face various challenges in information security, including, but not limited to, the adoption and implementation of information security solutions and services: Complexity of IT Environments and Security-Related Tasks: Information security solutions are deployed either as point solutions or integrated solutions, creating diverse and complex IT environments that are not easy to manage. 10 #CEMA20098 2014 IDC

Adopting an SOC service will create concerns around the ownership of information on networks, as well as concerns around the type of SLA that will be agreed between the customer and the SOC provider. Views on the Use of an SOC: Many large organizations in the region tend to invest in having an in-house SOC. This is largely due to privacy concerns around their own networks and data systems. The issue of who manages incidents is a major concern, and the perception is that incidents can be better managed when the SOC is available in house. Compliance and Policies Impacting Security Adoption: The number of regulations impacting a wide range of verticals is expected to increase. The use of an SOC will create additional requirements that companies will have to ensure are in place in order to remain compliant with regulations. Conclusion Cybercrime is now more prevalent than ever. With the growing frequency of advanced persistent threats, the need for effective threat intelligence is extremely critical. Since attacks are being launched with the aim of causing broader political and economic repercussions, companies need to leverage their threat intelligence to better protect themselves from attacks and mitigate the damage. In light of these developments, IDC recommends the following:- Companies in Qatar need to re-evaluate their current security environments and decide on either setting up their own SOC or utilizing the services of an existing one. If companies decide to setup their own SOC, they need to keep in mind the high level of CAPEX required not just to setup the infrastructure but the time to setup the SOC as well as finding and developing the right people with the right skill sets. People and processes are key for any successful SOC monitoring. When choosing to adopt security services, companies should engage with partners that can provide a holistic view of security and can ensure real time support in case of incidents. The service provider should have a team of local security professionals who are industry certified. Companies should approach SOC providers who are transparent about the level of security being provided and how they adhere to industry best practices and standards. Organizations should also evaluate the level of data and network privacy being provided by the SOC provider. Lastly, the SOC provider should be able to provide detailed reports at defined time intervals that can be shared by clients with their internal stakeholders. 2014 IDC #CEMA20098 11

Copyright Notice External Publication of IDC Information and Data Any IDC information that is to be used in advertising, press releases, or promotional materials requires prior written approval from the appropriate IDC Vice President or Country Manager. A draft of the proposed document should accompany any such request. IDC reserves the right to deny approval of external usage for any reason. Copyright 2014 IDC. Reproduction without written permission is completely forbidden. 12 #CEMA20098 2014 IDC