davitt potter - csa arrow

16
www.cloudsecurityalliance.o Copyright © 2016 Cloud Security Alliance The Edge is Everywhere Security and Risk Considerations of a Completely Connected World Davitt J. Potter Director, Engineering & Technical Services, Arrow Security

Upload: trish-mcginity

Post on 11-Jan-2017

18 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Davitt Potter - CSA Arrow

www.cloudsecurityalliance.orgCopyright © 2016 Cloud Security Alliance

The Edge is EverywhereSecurity and Risk Considerations of a Completely Connected World

Davitt J. PotterDirector, Engineering & Technical Services, Arrow Security

Page 2: Davitt Potter - CSA Arrow

www.cloudsecurityalliance.orgCopyright © 2011 Cloud Security Alliance www.cloudsecurityalliance.orgCopyright © 2015 Cloud Security Alliance

What Edge?!

Page 3: Davitt Potter - CSA Arrow
Page 4: Davitt Potter - CSA Arrow

Security: Not just a buzzword anymore!

When everything is connected to everything else, for better or for worse, everything matters.Source: Bruce Mau, Massive Change

Any business that fails to invest heavily in the IoT in the next 10 years is unlikely to be able to remain competitive.Source: McKinsey

A network of physical objects (things) that contain embedded technology to sense or interact with their internal state or external environment. The IoT comprises an ecosystem that includes things, communication, applications and data analysis.

Source: Gartner

Page 5: Davitt Potter - CSA Arrow

…Mind the gap!

Meaning… what?

Page 6: Davitt Potter - CSA Arrow

The Architecture of IoT

Page 7: Davitt Potter - CSA Arrow

…Mind the gap!

Meaning… what?

Page 8: Davitt Potter - CSA Arrow

…Mind the gap!

Meaning… what?

Gaps in visibility Gaps in knowledge of the devices Gaps in knowledge of activity

Page 9: Davitt Potter - CSA Arrow

Who drives this bus, anyway?

We still don’t do simple things well.

“Security is a process, not a product. Products provide some protection, but the only way to effectively do business in an insecure world is to put processes in place that recognize the inherent insecurity in the products. The trick is to reduce your risk of exposure regardless of the products or patches.”

- Bruce Schneier, Information Security

Page 10: Davitt Potter - CSA Arrow

Who drives this bus, anyway?

We still don’t do simple things well.

“There is no patch for human stupidity.” – Various

Page 11: Davitt Potter - CSA Arrow
Page 12: Davitt Potter - CSA Arrow

Security cannot be an afterthought!

In the mad rush to connect everything, proper security controls and designs must be considered.

SHOULD a device be able to be seen by other devices? What is ‘proper’ traffic? What does normal traffic look like? Should it be segregated? Should it be encrypted?

Slow down – just a second.

Page 13: Davitt Potter - CSA Arrow

Security cannot be an afterthought!

Have you designed a security strategy? What policy or procedure does it fall under? Who controls it? Who does it talk to? When does it talk? What happens when you’re breached?

Page 14: Davitt Potter - CSA Arrow

“This is what we call a target-rich environment…”

Look at all the edge devices to poke at! If your edge device is breached, how do you know? Can you

stop it at the gateway? Can you stop it at the device? Can you identify the data that was exfiltrated? Can you show me the ingress and egress paths?

Collector/aggregation points Devices Cloud-based systems

Page 15: Davitt Potter - CSA Arrow

Or a security officer, or a network administrator, or…

I’m a Security Analyst!

Is security awareness part of your organization at each level of IT? Do you provide options for visibility into security data for other roles, where relevant?

More eyes can discover “ah ha” moments. Automation helps cull the anomalies, but the human brain (thus far) still can make that intuitive leap.

Page 16: Davitt Potter - CSA Arrow

Questions?

Thank you!

Davitt J. [email protected] Twitter: @DavittJPotter

http://www.linkedin.com/in/davittjpotter