The Evolving Threat Landscape: Protecting Your Mobile and Virtual Environment from Emerging Security Threats



Similar documents
The Evolving Security Landscape. Andreas M Antonopoulos Senior Vice President & Founding Partner

Business Risk Assessment - A Primer

Cyber Security. John Leek Chief Strategist

BYOD: Should Convenience Trump Security? Francis Tam, Partner Kevin Villanueva, Senior Manager

Cyber Exploits: Improving Defenses Against Penetration Attempts

Top Ten Technology Risks Facing Colleges and Universities

Cisco on Cisco Best Practice Security Practices for Online Collaboration and Social Media

Security Practices for Online Collaboration and Social Media

[Company Name] HIPAA Security Awareness and Workforce Training Program Manual

SECURITY. Risk & Compliance Services

Business Case for Voltage Secur Mobile Edition

Laptops, Tablets, Smartphones and HIPAA: An Action Plan to Protect your Practice

If you can't beat them - secure them

The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013

Mobile Security: The good, the bad, the way forward

Web Application Security

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

HIPAA Privacy and Information Security Management Briefing

Hands on, field experiences with BYOD. BYOD Seminar

Mobile Application Security Sharing Session May 2013

900 Walt Whitman Road, Suite 304 Melville, NY Office:

Protecting Sensitive Data Reducing Risk with Oracle Database Security

of firms with remote users say Web-borne attacks impacted company financials.

Certified Cyber Security Analyst VS-1160

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Marble & MobileIron Mobile App Risk Mitigation

Nine Network Considerations in the New HIPAA Landscape

Information Security for the Rest of Us

plantemoran.com What School Personnel Administrators Need to know

Auditing the Security and Management of Smart Devices. ISACA Dallas Meeting February 13, 2014

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

2012 Data Breach Investigations Report

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Is your business prepared for Cyber Risks in 2016

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

Cisco SAFE: A Security Reference Architecture

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

BYOD: End-to-End Security

Mobile Security and Management Opportunities for Telcos and Service Providers

Klickstart Business Solutions & Services

OVERVIEW. Enterprise Security Solutions

Enterprise Mobility Management Migration Migrating from Legacy EMM to an epo Managed EMM Environment. Paul Luetje Enterprise Solutions Architect

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

PCI Compliance for Cloud Applications

Data Security Best Practices & Reasonable Methods

How to Secure Your Environment

Enterprise Mobile Management

Information Security Services

FORBIDDEN - Ethical Hacking Workshop Duration

Guideline on Safe BYOD Management

Secure Your Mobile Workplace

Privilege Gone Wild: The State of Privileged Account Management in 2015

Privilege Gone Wild: The State of Privileged Account Management in 2015

Mobile Security BYOD and Consumer Apps

The Business Case for Security Information Management

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Cloud Based Secure Web Gateway

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

perspective The battle between MDM and MAM: Where MAM fills the gap? Abstract - Payal Patel, Jagdish Vasishtha (Jags)

Mobile Medical Devices and BYOD: Latest Legal Threat for Providers

Security and Privacy

Deploying Firewalls Throughout Your Organization

Information Technology Risk Management

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

Cyber Security and Critical Information Infrastructure

Network Security & Privacy Landscape

Evolving Threats and Attacks: A Cloud Service Provider s viewpoint. John Howie Senior Director Online Services Security and Compliance

Check Point and Security Best Practices. December 2013 Presented by David Rawle

Payment Card Industry Data Security Standard

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Intelligent Security Design, Development and Acquisition

Security Solution Architecture for VDI

FERPA: Data & Transport Security Best Practices

CEH Version8 Course Outline

Lot 3 Service Specification MANAGED MOBILE SERVICE

Practical Legal Aspects of BYOD

Mobile Security & BYOD Policy

Enterprise Security Solutions

Countering Insider Threats Jeremy Ho

Big Data, Big Risk, Big Rewards. Hussein Syed

Cyber Security for SCADA/ICS Networks

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Website Security: It s Not all About the Hacker Anymore

Bringing Cloud Security Down to Earth. Andreas M Antonopoulos Senior Vice President & Founding Partner

Information Security Addressing Your Advanced Threats

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Into the cybersecurity breach

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

The SMB Cyber Security Survival Guide

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Bad Romance: Three Reasons Hackers <3 Your Web Apps & How to Break Them Up

F G F O A A N N U A L C O N F E R E N C E

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Transcription:

The Evolving Threat Landscape: Protecting Your Mobile and Virtual Environment from Emerging Security Threats John Burke Principal Research Analyst Nemertes Research www.nemertes.com

Agenda About Nemertes Security and Compliance Trends Addressing the Evolving Security Threat Landscape Conclusion and Recommendations

Nemertes: Bridging the Gap Between Business & IT Quantifies the business impact of emerging technologies Conducts in-depth interviews with IT professionals Advises businesses on critical issues such as: Unified Communications Social Computing Data Centers & Cloud Computing Security Next-generation WANs Cost models, RFPs, Architectures, Strategies

Security and Compliance Trends

The Evolving Threat Landscape Phishing/Identity Theft Website Defacement XSS and SQL Injection Viruses Worms/Trojans Polymorphic Attacks/ Malware DOS RISE OF THE BOTNETS/ DDOS Silent BOTNETS Hacking for Fun and Fame Organized Cybercrime Cyber Warfare 1990-2000 2001-2010 2011+ Breach Notification PCI-DSS HITECH HIPAA, GLBA, Sarbanes Oxley Amended FRCP National Breach Disclosure

The Evolving Vulnerability Landscape Revolutionary Social Computing Mobility Virtualization/Cloud People 1990-2000 2001-2010 2011+ Network Browsers Operating System and Apps Evolutionary Web Apps

Single Criminal The Good Old Days Key Characteristics: Slow, single threaded High risk for hacker

Criminal Black Market IDTHEFT $10.75 2% STRM $16.32 0.17% BOTNET $4.75 26.2% STLNAMEX $5.6 3% LEAKDTA $5.25 7% LPTPTAXI $4.20 3% PHISH $52.58 0.4% Vulnerability Marketplace Vulnerability Discovery Toolkit Marketplace Create Exploit Zombie Armies Create Attack Vehicle Key Characteristics: Fast, distributed Less exposure at each step Data Collection Attack Target Retrieve Information Financing/Laundering

The Changing End-User Landscape Employee personal use of technology influences IT decisions for 46% of organizations About 67% of organizations have a formal telework policy The line between personal and work computing is blurring 11% of organizations have some staff using mobiles instead of PCs Demand for social computing is high If you asked from a percentage standpoint: can do 60-70% of all the work I need to do from a mobile device, but I still need that laptop for other small pieces. CIO, very large manufacturer

The Changing Data Center Landscape Server virtualization is ubiquitous with up to 68% of workloads virtualized (depending on company size) Networks are flattening as organizations move from traditional 3-tier to 2-, or 1-tier networks Virtualization contributes as virtual switches create huge layer 2 networks Data center expansion into the cloud is coming Currently < 10% organizations using Infrastructure as a Service (IaaS) with additional 27% evaluating

New Pressures on Security Virtualization/Cloud Mobility Social Computing

Challenges and Risks of Virtualization Organizational: Security staffs are not organized around virtualized environments Netsec teams don t fully grasp virtsec Security teams are engaged too late in the process Operational: Virtualization blurs separation of duties (SoD) Server admins can reconfigure virtual server, storage and virtual network Functional: Virtualization affects network defense and compliance Virtualization can put you out of compliance 60% of security practitioners say it s the primary justification Virtualization flattens the network, reducing defense-in-depth

Security/Compliance of Virtual Infrastructure VirtSec adoption is less than 20% of organizations Despite low adoption, there is confidence in existing security controls providing sufficient compliance and security protection 51.9% of organizations rate the compliance and security of their virtual infrastructure EXCELLENT

Mobility: Vulnerability on The Move! Targeted attacks emerging for Apple IOS and Android Employee ownership raises significant liability and security issues Policies around sensitive data leakage Remote wipe options Primary vector for data loss Increasing use of mobile device as security token raises the exploit value Most security management systems are blind to mobile devices

Risk Points for Social Computing Inside Enterprise Outside Enterprise FW does not provide granular social computing controls LinkedIN Internet FaceBook Twitter Social computing is primary vector for data loss Blogs Skype Enterprise is blind to mobile user social computing activities

Social Networking Compliance Issues Privacy Area Regulations Requirement Financial Regulations HIPAA, GLBA, PCI, FERPA,HITECH, State breach notification laws SEC(17a-3,4), 206(4), FINRA 10-6, 2210, 3010, Comm. Rule 13 Prevention of breach of Personally Identifiable (PII) or Protected Health (PHI) Information Audit and control of all external communications by investment advisors. Explicit requirements for social networking e-discovery FRCP (34,37) Discovery of Electronically Stored Information (ESI). Must be reasonably accessible. Retention implications for social networking

Addressing the Evolving Security Threat Landscape

Technology Architecture & Evolution Application and Endpoint Application Security Identity Layer Data Encryption and Inspection Network Security Virtualized Security Management Application Policy Identity Mgt PKI Incident and Event Mgt Network Mgt

Virtualization Security

Securing Social Computing Inside Enterprise Outside Enterprise LinkedIN Web 2.0/IM/P2P Gateway Proxy as a Service Internet FaceBook Twitter Blogs Skype

10 Steps to Social Networking Compliance Step 1 Take ownership Step 2 Establish policy Step 3 Engage compliance function early Step 4 Formal education program Step 5 Strong password management Step 6 Content monitoring and logging Step 7 Education Step 8 Selective blocking of content Step 9 Routine audits and review of logs Step 10 Regular policy review

Mobility Security Touch Points Mobile Device Management (MDM) Automated configuration OTA Updates/Backup Policy enforcement Remote wipe Mobile Service Management (MSM) Carrier monitoring/slas Application monitoring Trouble ticket management Key metrics- KPI Mobile Application Management (MAM) Remote OTA provisioning Application configuration OTA Updates/Backup Policy enforcement Application removal Application black/white lists Application monitoring Risk Management Anti-X support Authentication Remote lock/wipe Key metrics- KPI Secure container Sensitive data control Provisioning Employee owned Allocation policies Activation/deactivation End User Support Remote OTA maintenance Remote OTA support

Conclusion and Recommendations

Recommendations: What Should You Be Doing? Urgent: Act Now Technology has become mainstream. R&D for predecessor technology has dried up. Competitors will gain advantage. Short-Term Plans Technology is becoming mainstream. Business benefit too large to ignore. Implement within 1 year. Long-Term Plans Specific Needs Technology can provide some benefits. Some may be too new for business adoption. Implement in 1-3 years Technology is relevant for certain companies. Implementation is case-bycase, depending on industry or size.

Security Roadmap Establish a mobility policy and council Inventory end-user devices Review virtualization security controls Establish social networking policy Urgent: Act Now

Security Roadmap Complete audit of security controls for virtualization, mobility and social computing Implement strong configuration management for virtualization Implement mobility governance and security controls Implement social computing granular controls Implement VirtSec Short-Term Plans

Security Roadmap Evaluate OS choices Harden OS Implement Application Security Implement Virtualized Security Prepare for de-perimeterization Prepare for continuous mobility Long-Term Plans

Conclusions The data center is undergoing transformation enabled by virtualization Securing the virtual infrastructure requires a new security approach Mobility is transforming the way users work Puts the organization at significant risk of data loss and exposure to attack Social computing is a here to stay get over it! Just blocking is not acceptable or effective Implement granular security controls

Thank You!