enterprise security - veritasvox.veritas.com/legacyfs/online/veritasdata/is...rely on more external...

17
Enterprise Strategy Group | Getting to the bigger truth.Jon Oltsik, ESG Senior Principal Analyst October, 2014 Enterprise Security Problems, Solutions, & Opportunities

Upload: others

Post on 13-Jun-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

Enterprise Strategy Group | Getting to the bigger

truth.™

Jon Oltsik, ESG Senior Principal Analyst

October, 2014

Enterprise Security Problems, Solutions, &

Opportunities

Page 2: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

The Current State of Information Security

Infosec Drivers

Enterprise Strategies and Tactics

The Bigger Truth

Agenda

Page 3: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

I Promise. . . Not to use any of the following unabashed and vapid cybersecurity marketing statements or terms. . .

1. “Hackers are no longer alienated teenagers in their parent’s

basements.”

2. “Security can’t get in the way of business processes.”

3. “Perimeter security is no longer enough.”

4. “AV (or any other security technology) is dead.”

5. “Software-defined Security”

Jon Oltsik ESG Senior

Principal Analyst

Page 4: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Infosec Is Getting More Difficult How has security management changed over the past 24 months?

Significantly more difficult than it was 24 months ago,

18%

Somewhat more difficult than it was 24 months ago,

44%

About the same as it was 24 months ago, 30%

Somewhat less difficult than it was 24 months ago,

3%

Significantly less difficult than it was 24 months ago,

2%

Don’t know / no opinion, 2%

Key Finding:

of respondents say

security is more difficult than two years

ago

62%

Page 5: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Primary Reasons for Infosec Difficulties

The Increasingly Dangerous Threat Landscape

IT Complexity

Status Quo Security

The Cybersecurity Skills Gap

Page 6: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

What are the best

practices?

How can Symantec and its

Partners capitalize on security

market transitions?

What are Enterprises Doing?

Page 7: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Security Budget Changes Has your organization increased its security budget over the past 24 months in direct response to malware threats like APTs (i.e., advanced persistent threats), targeted attacks, hacktivism, etc.?

Key Finding:

of respondents say

YES

74%

Yes, significantly, 17%

Yes, somewhat, 57%

No, 25%

Don’t know, 2%

Page 8: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

CISO Infosec Triad

Security Efficacy

Operational

Efficiency

Business

Enablement

Page 9: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Planned Security Technology Strategy Changes In which of the following ways will your organization change its security technology strategy decisions over 24 months in order to respond to the current cybersecurity and threat landscape?

3%

12%

15%

23%

24%

41%

44%

49%

51%

None of the above

Actively decrease the number of vendors we buy from

Buy more security suites from a single vendor

Rely on more external managed and professional services to supplement or replace your organization’s reliance on the internal security staff

Demand more product integration from our security vendors

Design and build a more integrated data center security architecture

Automate more security operations tasks

Collect and analyze more security data

Add new layers of endpoint security software to protect against zero-day/polymorphic malware

Design and build a more integrated security architecture

Page 10: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Use of Threat Intelligence Does your organization use external threat intelligence as part of its information security analytics activities?

Yes, 65% No, 32%

Don't know, 3%

Page 11: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Gaining Better Control

Identity

Everything else

Data

Policy

Network Security

Application Security

Anti-malware

Security Analytics

GRC

Page 12: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Beyond the Status Quo Which of the following are the most important drivers that would encourage your organization to undertake a “big data” security project?

30%

31%

39%

40%

41%

43%

47%

Need to share security data collection and analysis with businesspartners

Need to capture/analyze more data to improve GRC

We need to collect/analyze more data in an effort to automate moresecurity tasks

Need to capture/analyze more data to improve incident detection,queries, or investigations

Need to collect/analyze more data to better align security with businessprocesses

Need to centralize security data monitoring/visualization of all securitydata in one place

A “big data” security is a logical progression to the amount of data we collect/analyze today and our future needs

Page 13: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Beyond the Status Quo

Security architecture integration

• Central command-and-control • Distributed enforcement • Message and data exchange

Project planning

• Leverage existing assets • Integration plan • Metrics

Extends to virtual assets and the cloud

Page 14: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Security Skills Shortage Use of managed and professional security services

Yes, extensively,

17%

Yes, somewhat,

45%

No, 33%

Don’t know, 5%

Increased substantially,

16%

Increased somewhat,

42%

Remained about the same, 35%

Decreased somewhat, 6%

Decreased substantially,

1%

Don’t know / no opinion, 1%

NOW FUTURE

Page 15: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Security Skills Shortage

Technology Intelligence

Ease-of-use

Operations Automation

Page 16: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

The Bigger Truth

Information security is hard and getting harder

Increased focus • Board-level discussions, budget increases, hiring . . .

Major transition in progress

• Integration, automation, analytics, services, etc.

Great opportunity for Symantec and its partners!

Page 17: Enterprise Security - Veritasvox.veritas.com/legacyfs/online/veritasdata/IS...Rely on more external managed and professional services to supplement or replace your organization’s

© 2014 by The Enterprise Strategy Group, Inc.

Thank You Please contact us for more

information

http://www.twitter.com/esg-global

http://www.facebook.com/ESGglobal

https://www.linkedin.com/company/enterprise-strategy-

group

http://www.youtube.com/user/ESGglobal

Jon Oltsik, ESG

[email protected]

508.381-5166 (office)

978.501.0862 (cell)

@joltsik (Twitter)