Security Trends The Case for Intelligence-Driven Security 1
Attack Surface and Threat Environment ¼ ZETTABYTE 2 40-60? ZETTABYTES ZETTABYTES 2007 2013 2020 Digital Content 2
Attack Surface and Threat Environment Web Front Ended apps There s an app for that Big Data Apps Everywhere! Apps 2007 2013 2020 3
Attack Surface and Threat Environment Dawn of Smart phones Smartphone/tablet ubiquity Internet of things (not just PCs, not just mobile) 2007 2013 2020 Devices 4
Attack Surface and Threat Environment MySpace Focus on monetizing Total Commercialization of social media: absence of privacy 2007 2013 2020 Social Media 5
Attack Surface and Threat Environment 2007 2013 2020 Perimeter NO direct control over physical infrastructure 6
Attack Surface and Threat Environment Disruptive Destructive Attacks attacks 2007 2013 2020 Complex Intrusion Attacks Threats 7
Historic Security Model Reactive Perimeter based Static/Signature based Siloed 8
New Model Intelligence Driven Risk-based Dynamic/agile Contextual 9
Impediments to Change Budget Inertia: Reactive model Prevention 34% 70% Detection & Monitoring 20% 33% Response 10% 33% 10
Impediments to Change Budget Inertia Skilled personnel shortage Information sharing at scale Technology Maturity 11
Shift In Focus. Shift In Spend Prevention 80% Monitoring 15% Response 5% $ Prevention 34% Response 33% Monitoring 33% Control Compliance IT Risk Business Risk 12
IS WHERE SECURITY MEETS BIG DATA Intelligence-Driven Security SOC GRC Identity Anti-Fraud 13
BIG DATA FUELS INTELLIGENCE-DRIVEN SECURITY
Intelligence-Driven Security Risk-Based, Contextual, & Agile Risk Intelligence Thorough Understanding Of Risk To Prioritize Activity Adaptive Controls adjusted dynamically based on risk and threat level Advanced Analytics provide context and visibility to detect threats Information Sharing Actionable Intel From Trusted Sources & COIs 15
Identity Ensuring Trusted Interaction Between People, Application, & Data 1 Assess Risk 2 Take Action 16
Next-Generation Identity Auth. Manager 8.0 Adaptive Authentication Cloud Trust Authority Big Data Analytics Action Device Profile User Behavior Profile Geo Location Risk Engine Investigate Change/Block Access Step Up Authentication Two-Factor Out Of Band Txt Challenge Q s Fraud Network Proceed As Normal RSA efraud Network 17
Security Analytics RSA Security Analytics Platform RSA Archer GRC Suite Big Data Analytics Governance Network Packets Alerting & Reporting Compliance & Business Context Log Files IT Assets Information Assets Big Data Store Investigations Malware Analytics Visualization Data Leakage Incident Management & Workflow Active Defense & Remediation RSA Live 18
Fraud Prevention and Web Security Separating Customers from Criminals Fraud Action Silver Tail Adaptive Authentication Transaction Monitoring In the Wild Begin Session Login Transaction Logout Web Threat Landscape Advanced Malware (e.g. Trojans) Phishing Rogue Mobile App Site Scraping Vulnerability Probing Layer 7 DDoS Attacks Man in the Middle/Browser Password Cracking/Guessing Parameter Injection New Account Registration Fraud Account Takeover New Account Registration Fraud Promotion Abuse Unauthorized Account Activity Fraudulent Money Movement 19
Next-Generation Anti-Fraud & Web Security Silver Tail, Fraud Action, Adaptive Authentication, Transaction Monitoring Big Data Analytics Response Web Traffic Big Data Store Alerting & Reporting Investigations Fraud Analytics Compliance & Business Policy Adaptive Authentication Transaction Monitoring Visualization Active Defense RSA efraud Network + Fraud Action 20
Risk Management & Governance Threat Management Business Continuity Management IT Comfit Management Compliance Management Governance Compliance & Business Context Incident Management & Workflow Active Defense & Remediation Single egrc Platform 21
Summary Transformation of Infrastructure, Business and Threat Makes Traditional Security Less Relevant New Strategies Must be Based on Risk, Context and be Responsive To Rapidly Changing Environments Big Data, Analytics Can Be Leveraged to Create Intelligence-Driven Security Models that Meet These Needs 22