Top Banner
The Future of Cybersecurity Mark Cohn Need title The Future of Cyber Security Mark Cohn Chief Technology Officer, Unisys
17

Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

Apr 12, 2017

Download

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

The Future of Cybersecurity

Mark Cohn

Need title

The Future of Cyber Security

Mark Cohn

Chief Technology Officer, Unisys

Page 2: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 2

It’s Not Just an IT Problem

• Impact on Society

• People and Process Challenges

• Technology Leap Forward

“Hawaii consumers who

believe they may be at

risk are urged to take

immediate steps to

protect their personal

credit information as well

unauthorized access to

their credit or debit card

accounts.”

In the News…

Source: Hawaii News Now

Page 3: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 3

Global Cyber Threats are Pervasive

Page 4: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 4

Cyber Has Proven to Cause Widespread Disruption

Page 5: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 5

The “Advanced Persistent Threat” Continues

Page 6: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 6

Can You Recognize the Counterfeit?

Page 7: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 7

INFORMATION TECHNOLOGY

OPERATIONAL TECHNOLOGY

PERSONAL TECHNOLOGY

Internet of Things (IoT) Increases Vulnerabilities

Page 8: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 8

Cyber is not just an IT challenge—

it’s a Leadership Challenge

Page 9: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 9

Cyber Requires Integrated Risk Management

Page 10: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 10

Moving forward

Where Do We Go From Here?

Page 11: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 11

Key Action Areas in Cyber

• Cyber workforce development

• Adaptive security architecture from prevent—to detect

and respond

• Strong authentication, device hardening, and reduced

attack surface

• Micro-segmentation—augmenting or replacing

perimeter protection with identity services and strong

encryption

Page 12: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 12

Cyber Leap Forward

• The pay-off from the cloud – provides a

foundation for a “leap forward”

improvement in cyber protection posture

• The move to a software-defined enterprise

will enable a break-through in the data

center and the cloud

• Virtualization today is primarily focused

on computing not storage networking or

security

• Virtualization + software-defined security

provides new paradigm for how cyber

assets can be protected in the enterprise

• Automated workload movement for active

defense

Page 13: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 13

Safeguarding High Value Assets

• Hiding virtual devices

and assets

• Dynamically changing

location to hinder

attacker access

• Using advanced

intrusion and

protection

technologies to move

assets prior to

successful penetration

Critical Benefits

Orchestration

Engine

Movement Between Data Centers & Commercial Clouds

Data Center

CryptoFirewall

SDN

SwitchStorageServer

VM VSt VN VFWAPDS

APPS

VC

App

Workload Movement

Commercial Cloud

CryptoFirewall

SDN

SwitchStorageServer

VM VSt VN VFW

ADPS

VC

App

APDS

Page 14: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 14

Resources

Center for Internet Security

https://www.cisecurity.org

NSA’s Top 10 Mitigation Strategies

https://www.iad.gov/iad/library/ia-guidance/iads-top-10-

information-assurance-mitigation-strategies.cfm

NIST Cyber Security Framework

http://www.nist.gov/cyberframework

Navigating the Digital Age:

The Definitive Cybersecurity Guide for Directors and Officers

https://www.securityroundtable.org/the-boOK/

Page 15: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 15

Moving to New Normal

• Cybercrime sophistication

• Critical infrastructure resiliency

• Innovation with security baked in:

new technologies, IoT, and digital

cities

• Evolving workplace of the future

Page 16: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 16

Questions?

Page 17: Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

© 2016 Unisys Corporation. All rights reserved. 17

Thank You!