Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported



Similar documents
Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Applications and data are the main targets for modern attacks. Adoption of dedicated application and data security concepts, technologies and

New EU Data Protection legislation comes into force today. What does this mean for your business?

Data Management Policies. Sage ERP Online

Mitigating and managing cyber risk: ten issues to consider

Securing SharePoint 101. Rob Rachwald Imperva

Factsheet on the Right to be

The potential legal consequences of a personal data breach

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

Overview. Data protection in a swirl of change Cloud computing. Software as a service. Infrastructure as a service. Platform as a service

We Secure What Matters Most: The Data Center. In physical, virtual, and cloud environments

Securing and protecting the organization s most sensitive data

Using AWS in the context of Australian Privacy Considerations October 2015

IBX Business Network Platform Information Security Controls Document Classification [Public]

The Cloud App Visibility Blindspot

Cloud Contact Center. Security White Paper

ITAR Compliance Best Practices Guide

Brainloop Cloud Security

Imperva Cloud WAF. How to Protect Your Website from Hackers. Hackers. *Bots. Legitimate. Your Websites. Scrapers. Comment Spammers

IAAS REFERENCE ARCHITECTURES: FOR AWS

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

10 Building Blocks for Securing File Data

The reform of the EU Data Protection framework - Building trust in a digital and global world. 9/10 October 2012

Security Landscape of Cloud Computing

"choose your own device" : the employer still provides the hardware and the employee can choose e.g. the model.

Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Information Resources Security Guidelines

White Paper. Imperva Data Security and Compliance Lifecycle

White Paper. Data Security. journeyapps.com

SQL Injection 2.0: Bigger, Badder, Faster and More Dangerous Than Ever. Dana Tamir, Product Marketing Manager, Imperva

Institute for Judicial and Legal Studies

Enterprise-Grade Security from the Cloud

Cloud Security Introduction and Overview

Third Party Security Requirements Policy

10 Things Every Web Application Firewall Should Provide Share this ebook

Paxata Security Overview

COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS

End-to-End Application Security from the Cloud

INFORMATION SECURITY Humboldt State University

The Data Protection Landscape. Before and after GDPR: General Data Protection Regulation

Cloud Computing and Records Management

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

Privacy in the Cloud A Microsoft Perspective

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Security Issues in Cloud Computing

PCI-DSS Penetration Testing

Supplier IT Security Guide

Ayla Networks, Inc. SOC 3 SysTrust 2015

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Position of the retail and wholesale sector on the Draft Data Protection Regulation in view of the trilogue 2015

White Paper. Managing Risk to Sensitive Data with SecureSphere

Cutting the Cost of Application Security

SANS Top 20 Critical Controls for Effective Cyber Defense

Passing PCI Compliance How to Address the Application Security Mandates

ALERT LOGIC FOR HIPAA COMPLIANCE

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

White Paper. Five Steps to Firewall Planning and Design

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Website Security. End-to-End Application Security from the Cloud. Cloud-Based, Big Data Security Approach. Datasheet: What You Get. Why Incapsula?

Security Solutions for HIPAA Compliance

APHIS INTERNET USE AND SECURITY POLICY

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

A practical guide to IT security

RMS. Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles

Security and Data Protection for Online Document Management Software

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

Data Access Request Service

AB 1149 Compliance: Data Security Best Practices

Data Security Incident Response Plan. [Insert Organization Name]

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Solving data residency and privacy compliance challenges Delivering business agility, regulatory compliance and risk reduction

Securing and Monitoring Access to Office 365

Cyber Security and Cloud Computing. Dr Daniel Prince Course Director MSc in Cyber Security

Transcription:

Protecting What Matters Most Christian Fahlke, Regional Sales Manager ALPS March 2015

Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) 2014: 245 incidents reported (Source: https://ics-cert.us-cert.gov/sites/default/files/monitors/ics-cert_monitor_sep2014-feb2015.pdf) 2015 Imperva, Inc. All rights reserved.

OUR GLOBAL BUSINESS Founded in 2002 Global operations; HQ in Redwood Shores, CA 750+ employees Customers in 90+ countries

OUR CUSTOMERS 3,700+ direct; thousands Cloud-Based 275+ government agencies and departments 400+ Global 2000 companies 7 of the top 10 global telecommunications providers 5 of the top 10 US commercial banks 3 of the top 5 - global financial services firms - global computer hardware companies - global biotech companies - global diversified insurance services

Imperva s view - Business driver 2015 in ALPS Audit / Monitoring / Prevent access to DATA not applications Identifying critical data in DB s and File structure's Who did what when OR proof that no one accessed these data Identifying and preventing unauthorized access to important data in the datacenter (DCAP) Preventing excessive data access Identifying unused access rights Identifying shadow IT and if legitimate monitor / protect dataflow Data across border compliance monitoring / prevention Actual Compliance needs for Alps 2015 - ~2018: PCI-DSS 3.0 compliance requirements (WAF) EU Data Protection Directive (DAM/FAM) see following slides 6 2015 Imperva, Inc. All rights reserved. Confidential

Everyone has the right to the protection of personal data 7 2015 Imperva, Inc. All rights reserved. Confidential

Background (1) The Data Protection Directive 95/46/EC defines the basics elements of data protection that member states must transpose into national law. Each state manages the regulation of data protection and its enforcement within its jurisdiction, and data protection commissioners from the EU states participate in a working group at the community level, pursuant to Article 29 of the Directive. In 2009, the European Commission launched a review of the current legal framework on data protection By March 12 th, 2014, the European Parliament voted in favor to the European Commission's data protection reform (MEMO/13/923 and MEMO/14/60), extending some of it s suggestion 8 2015 Imperva, Inc. All rights reserved. Confidential

Background (2) Next steps: To become law the proposed Regulation has to be adopted by the Council of Ministers using the "ordinary legislative procedure" (co-decision). European heads of state and government committed to a "timely" adoption of the new data protection legislation at a summit on 24 and 25 October 2013, which focused on the digital economy 9 2015 Imperva, Inc. All rights reserved. Confidential

Major changes for EU & Switzerland One continent, one law: The Regulation will establish a single, pan-european law for data protection, replacing the current inconsistent patchwork of national laws. Companies will deal with one law, not 28. One-stop-shop: The Regulation will establish a 'one-stop-shop' for businesses: companies will only have to deal with one single supervisory authority, not 28, making it simpler and cheaper for companies to do business in the EU. The same rules for all companies regardless of their establishment: Today European companies have to adhere to stricter standards than their competitors established outside the EU but also doing business on our Single Market. 10 2015 Imperva, Inc. All rights reserved. Confidential

Impact of the reform for citizens (1) A right to be forgotten: When you no longer want your data to be processed and there are no legitimate grounds for retaining it, the data will be deleted. This is about empowering individuals, not about erasing past events or restricting freedom of the press. Easier access to your own data: A right to data portability will make it easier for you to transfer your personal data between service providers. 11 2015 Imperva, Inc. All rights reserved. Confidential

Impact of the reform for citizens (2) Putting you in control: When your consent is required to process your data, you must be asked to give it explicitly. It cannot be assumed. Saying nothing is not the same thing as saying yes. Businesses and organizations will also need to inform you without undue delay about data breaches that could adversely affect you. Data protection first, not an afterthought: Privacy by design and privacy by default will also become essential principles in EU data protection rules this means that data protection safeguards should be built into products and services from the earliest stage of development, and that privacy-friendly default settings should be the norm for example on social networks. 12 2015 Imperva, Inc. All rights reserved. Confidential

A regulation with POWER The European Parliament agrees that the new data protection law for the private and public sector should be a Regulation, and no longer a Directive. The European Parliament agrees that national data protection authorities need to be able to impose effective sanctions in case of breach of the law. It has proposed strengthening the Commission's proposal by making sure that fines can go up to 5% of the annual worldwide turnover of a company (up from 2% in the Commission's proposal): 13 2015 Imperva, Inc. All rights reserved. Confidential

Traditional security

Protect what s

Protecting is exactly what Imperva does

APPLICATION Protects structured and unstrucutred data where it resides: databases and fileservers Protects where it s accessed: Web applications Guards against both outside threats and internal actors

User Rights Management for File Data Loss Prevention SecureSphere File Firewall File Activity Monitor Incapsula Infrastructure Protection Incapsula Website Protection Incapsula Name Server Protection SecureSphere WAF SecureSphere Database Assessment Server SecureSphere Database Firewall SecureSphere for Big Data SecureSphere Database Activity Monitor User Rights Management Data Masking Skyfence Cloud Discovery Skyfence Cloud Analytics Skyfence Cloud Protection Skyfence Cloud Governance Vulnerability Assessment Incapsula Back Door Detection Imperva products Products that cover both Protect and Comply Partners SecureSphere WAF ThreatRadar Incapsula Website Security

2015 Imperva, Inc. All rights reserved.

Onsite: SecureShpere Data Center Security Attack Protection Auditing and Reporting External Customers Staff, Partners Hackers Tech. Attack Protection Logic Attack Protection Fraud Prevention Usage Audit User Rights Management Access Control Internal Employees Malicious Insiders Compromised Insiders Vulnerability Scanning Virtual Patching Data Center Systems and Admins Discovery & Classification Privileged User Monitoring Assessment & Risk Management 20 2015 Imperva, Inc. All rights reserved. Confidential

21 2015 Imperva, Inc. All rights reserved. Confidential

Offsite: Comprehensive Coverage for the Cloud Customer-Facing Applications SaaS Applications SecureSphere WAF for AWS 22 Physical Data Center 2015 Imperva, Inc. All rights reserved. Confidential

Gartner: Big Data Needs a Data-Centric Security Focus Gartner: Organizations that have not developed datacentric security policies to coordinate management processes and security controls across data silos need to act. Source: Market Guide for Data-Centric Audit and Protection, November 2014 2015 Imperva, Inc. All rights reserved.

24 2015 Imperva, Inc. All rights reserved. Confidential

Security and compliance are our ONLY focus