Top Banner
1 RSA CONFIDENTIAL—INTERNAL USE ONLY Intelligence Driven Security 07.10.2015 Lara MAIER Distribution Manager G,A, CEE&SEE
14

Intelligence Driven Security

Apr 13, 2017

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Intelligence Driven Security

1RSA CONFIDENTIAL—INTERNAL USE ONLY

Intelligence Driven Security07.10.2015

Lara MAIER Distribution

Manager G,A, CEE&SEE

Page 2: Intelligence Driven Security

2RSA CONFIDENTIAL—INTERNAL USE ONLY

RSA is about delivering a Trusted Digital World and we do that by applying our Intelligence Driven Security Strategy

RSAWhat do we stand for and why?

Page 3: Intelligence Driven Security

3RSA CONFIDENTIAL—INTERNAL USE ONLY

Agenda Evolving IT Infrastructure The Changing Threat Landscape Kill Chain Intelligence Driven Security Benefits of Intelligence Driven Security

Page 4: Intelligence Driven Security

4RSA CONFIDENTIAL—INTERNAL USE ONLY

Mainframe, Mini ComputerTerminals

LAN/Internet Client/ServerPC

Mobile Cloud Big Data SocialMobile Devices

1ST PLATFORM

2ND PLATFORM

3RD PLATFORM

MILLIONS OF USERS

THOUSANDSOF APPS

HUNDREDS OF MILLIONS OF USERS

TENS OF THOUSANDSOF APPS

BILLIONSOF USERS

MILLIONSOF APPS

Source: IDC, 2012

2010

1990

1970

Page 5: Intelligence Driven Security

5RSA CONFIDENTIAL—INTERNAL USE ONLY

CustomersPartners

Third-Parties

On-Prem

MobileEmployees

BYOD

Cloud

Shadow IT

THE EVOLVING IT INFRASTRUCTURE

Page 6: Intelligence Driven Security

6RSA CONFIDENTIAL—INTERNAL USE ONLY

SECURITY & RISK CHALLENGES

CustomersPartners

Third-Parties

On-Prem

MobileEmployees

BYOD

Cloud

Shadow IT

Managing Identities & Access

Detecting & StoppingThreats

Preventing Fraud &Cybercrime

EnsuringCompliance

Page 7: Intelligence Driven Security

7RSA CONFIDENTIAL—INTERNAL USE ONLY

Emergence of New Attackers

Nation state

actors

PII, government, defense industrial base, IP rich organizations

Criminals

Petty criminals Organized crimeOrganized, sophisticated supply chains (PII, financial services, retail)

Unsophisticated

Non-state actors

Terrorists Anti-establishment vigilantes“Hacktivists”Targets of opportunity

PII, Government, critical infrastructure

Page 8: Intelligence Driven Security

8RSA CONFIDENTIAL—INTERNAL USE ONLY

Intrusion Kill Chain

Page 9: Intelligence Driven Security

9RSA CONFIDENTIAL—INTERNAL USE ONLY

THE SOLUTION: INTELLIGENCE DRIVEN SECURITY

Page 10: Intelligence Driven Security

10RSA CONFIDENTIAL—INTERNAL USE ONLY

OnPrem

Cloud

Page 11: Intelligence Driven Security

11RSA CONFIDENTIAL—INTERNAL USE ONLY

SHIFT PRIORITIES AND CAPABILITIES

Today’sPriorities

Prevention80%

Monitoring15%

Response5%

Prevention80%

Monitoring15%

Response5%

Prevention33%

Intelligence-DrivenSecurity

Monitoring33%

Response33%

Page 12: Intelligence Driven Security

12RSA CONFIDENTIAL—INTERNAL USE ONLY

RSA’S PRODUCT PORTFOLIO

IDENTITY & ACCESS

SecurID – Adaptive Authentication – Identity Mgmt & Gov

GOVERNANCE, RISK, & COMPLIANCEArcher GRC

MONITORING & ANALYTICSSecurity Analytics – ECAT

Web Threat Detection

RSA Research

Page 13: Intelligence Driven Security

13RSA CONFIDENTIAL—INTERNAL USE ONLY

• Risk-driven– Prioritize activity and resources

appropriately• Incremental and achievable

– New capabilities improve your maturity over time

• Future-proof– Enables response to changes in landscape

not based on adding new products• Agile

– Enables the business to take advantage of new technology and IT-driven opportunities

THE BENEFITS OF OUR APPROACH

Page 14: Intelligence Driven Security

EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.