Enterprise Strategy Group | Getting to the bigger truth.™ Jon Oltsik, ESG Senior Principal Analyst October, 2014 Enterprise Security Problems, Solutions, & Opportunities
Enterprise Strategy Group | Getting to the bigger
truth.™
Jon Oltsik, ESG Senior Principal Analyst
October, 2014
Enterprise Security Problems, Solutions, &
Opportunities
© 2014 by The Enterprise Strategy Group, Inc.
The Current State of Information Security
Infosec Drivers
Enterprise Strategies and Tactics
The Bigger Truth
Agenda
© 2014 by The Enterprise Strategy Group, Inc.
I Promise. . . Not to use any of the following unabashed and vapid cybersecurity marketing statements or terms. . .
1. “Hackers are no longer alienated teenagers in their parent’s
basements.”
2. “Security can’t get in the way of business processes.”
3. “Perimeter security is no longer enough.”
4. “AV (or any other security technology) is dead.”
5. “Software-defined Security”
Jon Oltsik ESG Senior
Principal Analyst
© 2014 by The Enterprise Strategy Group, Inc.
Infosec Is Getting More Difficult How has security management changed over the past 24 months?
Significantly more difficult than it was 24 months ago,
18%
Somewhat more difficult than it was 24 months ago,
44%
About the same as it was 24 months ago, 30%
Somewhat less difficult than it was 24 months ago,
3%
Significantly less difficult than it was 24 months ago,
2%
Don’t know / no opinion, 2%
Key Finding:
of respondents say
security is more difficult than two years
ago
62%
© 2014 by The Enterprise Strategy Group, Inc.
Primary Reasons for Infosec Difficulties
The Increasingly Dangerous Threat Landscape
IT Complexity
Status Quo Security
The Cybersecurity Skills Gap
© 2014 by The Enterprise Strategy Group, Inc.
What are the best
practices?
How can Symantec and its
Partners capitalize on security
market transitions?
What are Enterprises Doing?
© 2014 by The Enterprise Strategy Group, Inc.
Security Budget Changes Has your organization increased its security budget over the past 24 months in direct response to malware threats like APTs (i.e., advanced persistent threats), targeted attacks, hacktivism, etc.?
Key Finding:
of respondents say
YES
74%
Yes, significantly, 17%
Yes, somewhat, 57%
No, 25%
Don’t know, 2%
© 2014 by The Enterprise Strategy Group, Inc.
CISO Infosec Triad
Security Efficacy
Operational
Efficiency
Business
Enablement
© 2014 by The Enterprise Strategy Group, Inc.
Planned Security Technology Strategy Changes In which of the following ways will your organization change its security technology strategy decisions over 24 months in order to respond to the current cybersecurity and threat landscape?
3%
12%
15%
23%
24%
41%
44%
49%
51%
None of the above
Actively decrease the number of vendors we buy from
Buy more security suites from a single vendor
Rely on more external managed and professional services to supplement or replace your organization’s reliance on the internal security staff
Demand more product integration from our security vendors
Design and build a more integrated data center security architecture
Automate more security operations tasks
Collect and analyze more security data
Add new layers of endpoint security software to protect against zero-day/polymorphic malware
Design and build a more integrated security architecture
© 2014 by The Enterprise Strategy Group, Inc.
Use of Threat Intelligence Does your organization use external threat intelligence as part of its information security analytics activities?
Yes, 65% No, 32%
Don't know, 3%
© 2014 by The Enterprise Strategy Group, Inc.
Gaining Better Control
Identity
Everything else
Data
Policy
Network Security
Application Security
Anti-malware
Security Analytics
GRC
© 2014 by The Enterprise Strategy Group, Inc.
Beyond the Status Quo Which of the following are the most important drivers that would encourage your organization to undertake a “big data” security project?
30%
31%
39%
40%
41%
43%
47%
Need to share security data collection and analysis with businesspartners
Need to capture/analyze more data to improve GRC
We need to collect/analyze more data in an effort to automate moresecurity tasks
Need to capture/analyze more data to improve incident detection,queries, or investigations
Need to collect/analyze more data to better align security with businessprocesses
Need to centralize security data monitoring/visualization of all securitydata in one place
A “big data” security is a logical progression to the amount of data we collect/analyze today and our future needs
© 2014 by The Enterprise Strategy Group, Inc.
Beyond the Status Quo
Security architecture integration
• Central command-and-control • Distributed enforcement • Message and data exchange
Project planning
• Leverage existing assets • Integration plan • Metrics
Extends to virtual assets and the cloud
© 2014 by The Enterprise Strategy Group, Inc.
Security Skills Shortage Use of managed and professional security services
Yes, extensively,
17%
Yes, somewhat,
45%
No, 33%
Don’t know, 5%
Increased substantially,
16%
Increased somewhat,
42%
Remained about the same, 35%
Decreased somewhat, 6%
Decreased substantially,
1%
Don’t know / no opinion, 1%
NOW FUTURE
© 2014 by The Enterprise Strategy Group, Inc.
Security Skills Shortage
Technology Intelligence
Ease-of-use
Operations Automation
© 2014 by The Enterprise Strategy Group, Inc.
The Bigger Truth
Information security is hard and getting harder
Increased focus • Board-level discussions, budget increases, hiring . . .
Major transition in progress
• Integration, automation, analytics, services, etc.
Great opportunity for Symantec and its partners!
© 2014 by The Enterprise Strategy Group, Inc.
Thank You Please contact us for more
information
http://www.twitter.com/esg-global
http://www.facebook.com/ESGglobal
https://www.linkedin.com/company/enterprise-strategy-
group
http://www.youtube.com/user/ESGglobal
Jon Oltsik, ESG
508.381-5166 (office)
978.501.0862 (cell)
@joltsik (Twitter)