the security ecosystem

48
CHANCES ARE YOU WILL BE BREACHED. It’s a matter of when and how bad. START

Upload: anthony-bertuzzi

Post on 22-Jan-2018

503 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: The Security Ecosystem

CHANCES ARE YOU WILL BE BREACHED.It’s a matter of when and how bad.

START

Page 2: The Security Ecosystem

ARE YOUPREPARED?

STOP

Page 3: The Security Ecosystem

YOU CAN BE IF YOU...

ARE ACCOUNTABLE TO THE BUSINESS

PERFORM DUE DILIGENCE

TURN DATA INTO ACTIONABLE INSIGHT

Page 4: The Security Ecosystem

ACCOUNTABLE TO THE BUSINESS? YES, THROUGH STRATEGY.

Relate your security efforts to your business – organizational objectives, industry context, compliance requirements, critical assets, business processes and risksyou’re willing to take.

Page 5: The Security Ecosystem

DUE DILIGENCE? YES, BY INVOLVING THE BUSINESS.

Interview the people on the front lines of the business, the ones who own process. They know what business-critical data really is and what really has value.

Ask them, “If someone were to come in and steal something from you, what would freak you out the most? What would have the most impact on YOUR line of business?”

Page 6: The Security Ecosystem

DATA INTO ACTIONABLE INSIGHT? YES, YOU’LL BECOME MORE AWARE AND MAKE BETTER DECISIONS.

When you get to the right data, you’ll have understanding and visibility. In other words, AWARENESS.

When you take everything you know and learn, focus and prepare, you’ll have better control and the foundation for resiliency. In other words, INTELLIGENCE.

Page 7: The Security Ecosystem

SO HOW DO YOU GET THERE? It’s not a destination, rather a constant iteration.iteration.

Page 8: The Security Ecosystem

IT’S BUILDING CAPABILITIES. You don’t have to be a superstar in all of them. But you should be doing all of them.

Capabilities

Bu

ildPrepare

Opera

te

Respond

Page 9: The Security Ecosystem

IT’S WORKING TOWARD DEFINED OUTCOMES — strategic, proactive, ongoing and restored security

CapabilitiesOutcomes

Bu

ildPrepare

Opera

te

Respond

Strat

egic Proactive

Ongoin

g

Restored

Page 10: The Security Ecosystem

BUILD: focus on strategy, compliance, policies, business context, technology controls and implementation.

Capabilities

Bu

ild

Respond

Page 11: The Security Ecosystem

CapabilitiesOutcomes

Bu

ild

Opera

te

Strat

egic

IF YOU BUILD RIGHT, YOUR SECURITY WILL BE STRATEGIC

compliant; policy driven; aligned with the business; having the right controls, from the right vendors, implemented properly

Page 12: The Security Ecosystem

Capabilities

PREPARE: gather constant insight, test and identify vulnerabilities.

Bu

ildPrepare

Stratata

egic

Page 13: The Security Ecosystem

CapabilitiesOutcomes

Bu

ildPrepare

Stratata

egic Proactive

IF YOU PREPARE RIGHT, YOUR SECURITY WILL BE PROACTIVE

constant insight, testing and vulnerability identification

Page 14: The Security Ecosystem

Capabilities

Bu

ildPrerer parerer

Opera

te

Stratata

egic Proror active

OPERATE: focus on monitoring the process, health and analytics.

Page 15: The Security Ecosystem

CapabilitiesOutcomes

Bu

ildPrerer parerer

Opera

te

Stratata

egic Proror active

Ongoin

g

IF YOU OPERATE RIGHT, YOUR SECURITY WILL BE ONGOING devices and analysis

Page 16: The Security Ecosystem

Capabilities

Bu

ildPrerer parerer

Opera

te

Respond

Stratata

egic Proror active

Ongoin

g

RESPOND: act quickly, with insight when events do occur.

Page 17: The Security Ecosystem

CapabilitiesOutcomes

Bu

ildPrerer parerer

Opera

te

Respond

Stratata

egic Proror active

Ongoin

g

Restored

IF YOU RESPOND RIGHT, YOUR SECURITY WILL BE RESTORED.

And you’ll have the insight you need to pivot and adapt in the build, prepare and operate stages until you need to respond again.

Page 18: The Security Ecosystem

THINK ABOUT THIS: if you have great operations, but your strategy is off, you’re probably going to fail to achieve business outcomes and protect critical assets.

Page 19: The Security Ecosystem

YOU CAN HAVE AWESOME STRATEGY AND OPERATIONS, but without the ability to respond, you’ll probably kick yourself if something does happen.

Page 20: The Security Ecosystem

ANY ONE WEAKNESS, IN ANY AREA,

can impact your overall security.

Page 21: The Security Ecosystem

FIND YOUR BALANCE,

and you’ll find better outcomes.

Page 22: The Security Ecosystem

WHY SHOULD I CARE? Glad you asked.

Page 23: The Security Ecosystem

Bu

ildPrepare

Operate

Respond

Strat

egic Proactive

Ongoin

g

Restored

WHY SHOULD I CARE? Glad you asked.

If your wheel (we like to call it an ecosystem) is in balance…

CapabilitiesOutcomes

Page 24: The Security Ecosystem

Bu

ildPrepare

Operate

Respond

Strat

egic Proactive

Ongoin

g

Restored

WHY SHOULD I CARE? Glad you asked.

If your wheel (we like to call it an ecosystem) is in balance...

…then you’re running a MATURE security practice.

CapabilitiesOutcomes

Page 25: The Security Ecosystem

WHAT’S THE VALUE OF MATURITY?

Page 26: The Security Ecosystem

WHAT’S THE VALUE OF MATURITY?

In security, a lot.

Page 27: The Security Ecosystem

WHAT’S THE VALUE OF MATURITY?

In security, a lot. ■ You’ll be realizing business outcomes more consistently

Page 28: The Security Ecosystem

WHAT’S THE VALUE OF MATURITY?

In security, a lot. ■ You’ll be realizing business outcomes more consistently■ You’ll be more aware

Page 29: The Security Ecosystem

WHAT’S THE VALUE OF MATURITY?

In security, a lot. ■ You’ll be realizing business outcomes more consistently■ You’ll be way more aware■ That big, bad breach won’t seem so big and bad after all

Page 30: The Security Ecosystem

WHAT’S THE VALUE OF MATURITY?

In security, a lot. ■ You’ll be realizing business outcomes more consistently■ You’ll be way more aware■ That big, bad breach won’t seem so big and bad after all■ You’ll constantly be getting better

Page 31: The Security Ecosystem

WHAT’S THE VALUE OF MATURITY?

In security, a lot. ■ You’ll be realizing business outcomes more consistently■ You’ll be way more aware■ That big, bad breach won’t seem so big and bad after all■ You’ll constantly be getting better■ You’ll have the info you need to change your strategy, how you operate and what you test for

Page 32: The Security Ecosystem

WHAT’S THE VALUE OF MATURITY?

In security, a lot. ■ You’ll be realizing business outcomes more consistently■ You’ll be way more aware■ That big, bad breach won’t seem so big and bad after all■ You’ll constantly be getting better■ You’ll have the info you need to change your strategy, how you operate and what you test for■ And you’ll be kicking some benchmarking butt

Page 33: The Security Ecosystem

GREAT, SO NOW WHAT DO I DO?

Page 34: The Security Ecosystem

GREAT, SO NOW WHAT DO I DO?

We’d thought you’d never ask.

Page 35: The Security Ecosystem

CALL TELUS. NOT the phone guys.

The security experts. Yes, the security experts. US.

Page 36: The Security Ecosystem

We have really strong capabilities to help you build, prepare, operate and/or respond.

JUST ASK IDC! IDC recognized TELUS as a leader in the managed security services market in Canada.

Page 37: The Security Ecosystem

Don’t believe the phone guys are also the security pros? Check out what we offer.

Stage Customer Responsibilities

Security Services Outcomes

BuildIdentify business need, determine risktolerance, develop governance and management frameworks, build security roadmap, align budgets, develop strategy, determine resources, align tactical controls to business needs, identify required controls and associated capabilities, compare options, design security infrastructure/architecture, deploy tactical controls.

■ Security Governance Review■ Security Framework Optimization■ Design and Architecture■ Controlled Delivery

Strategic Security – sound security investments, risk management, reasonable controls

PrepareMonitor compliance with regulatory and internal standards, monitor policy framework, threat and vulnerability testing, demonstrate the evidence

■ Security exposure identification■ Validation of existing controls■ Recommendations for exposure resolution

Proactive Security – the security that was built and that is operating is working as intended; insight to amend policies, procedures and controls to get to adequate and effective security

OperateProgram management, monitor activity, track incidents (trends and metrics), detect anomalies and malicious threats, counteract threats (technical or procedural controls), security status reporting (metrics).

■ Next Gen Firewalls■ IPS■ SIEM■ Email & Web Security■ Security Monitoring & IA■ Program Management

Ongoing Security -- auditable, repeatable, outcome-focused security that enables continuous improvement

RespondRestore security, respond to cyber risk, remediate, perform retrospective, communications plan, revisit security strategy.

■ Forensic Investigation■ Data analysis■ Incident handling and recovery■ Damage assessment

Restored Security – back to business and more resilient, aware security

Page 38: The Security Ecosystem

WE CAN PROVIDE THE ELEMENTS OF A MATURE SECURITY PRACTICE, AND DO PROVIDE ALL OF THE ELEMENTS FOR MANY ORGANIZATIONS.

Page 39: The Security Ecosystem

WE CAN PROVIDE THE ELEMENTS OF A MATURE SECURITY PRACTICE, AND DO PROVIDE ALL OF THE ELEMENTS FOR MANY ORGANIZATIONS.

Why? Because we have: track record (proven approaches and solutions); partnership (learn, fail and win with you); substance (all this great security stuff from ONE provider); specialists (recognized experts with specific focus).

Page 40: The Security Ecosystem

WE CAN PROVIDE THE ELEMENTS OF A MATURE SECURITY PRACTICE, AND DO PROVIDE ALL OF THE ELEMENTS FOR MANY ORGANIZATIONS.

Why? Because we have: track record (proven approaches and solutions); partnership (learn, fail and win with you); substance (all this great security stuff from ONE provider); specialists (recognized experts with specific focus).

And most importantly: WE’VE BEEN THERE. We’ve been where you are, doing what you’re doing – we’ve faced the day-to-day realities of what we’re selling.

Page 41: The Security Ecosystem

SECURITY TRULY IS A JOURNEY. AND EVERYONE MATURES AT A DIFFERENT RATE.

We can help to guide your journey.To be aware. To be intelligent. To be resilient. To be prepared.

Page 42: The Security Ecosystem

SECURITY TRULY IS A JOURNEY. AND EVERYONE MATURES AT A DIFFERENT RATE.

We can help to guide your journey.To be aware. To be intelligent. To be resilient. To be prepared.

■ It’s more than a product or a service

Page 43: The Security Ecosystem

SECURITY TRULY IS A JOURNEY. AND EVERYONE MATURES AT A DIFFERENT RATE.

We can help to guide your journey.To be aware. To be intelligent. To be resilient. To be prepared.

■ It’s more than a product or a service■ It’s more specialist than generalist

Page 44: The Security Ecosystem

SECURITY TRULY IS A JOURNEY. AND EVERYONE MATURES AT A DIFFERENT RATE.

We can help to guide your journey.To be aware. To be intelligent. To be resilient. To be prepared.

■ It’s more than a product or a service■ It’s more specialist than generalist■ It’s finding the gaps and filling them

Page 45: The Security Ecosystem

SECURITY TRULY IS A JOURNEY. AND EVERYONE MATURES AT A DIFFERENT RATE.

We can help to guide your journey.To be aware. To be intelligent. To be resilient. To be prepared.

■ It’s more than a product or a service■ It’s more specialist than generalist■ It’s finding the gaps and filling them■ It’s partnering. It’s speaking the same language

Page 46: The Security Ecosystem

SECURITY TRULY IS A JOURNEY. AND EVERYONE MATURES AT A DIFFERENT RATE.

We can help to guide your journey.To be aware. To be intelligent. To be resilient. To be prepared.

■ It’s more than a product or a service■ It’s more specialist than generalist■ It’s finding the gaps and filling them■ It’s partnering. It’s speaking the same language ■ It’s more than a sale. It’s making the right short-term decisions for the right long term outcomes

Page 47: The Security Ecosystem

SECURITY TRULY IS A JOURNEY. AND EVERYONE MATURES AT A DIFFERENT RATE.

We can help to guide your journey.To be aware. To be intelligent. To be resilient. To be prepared.

■ It’s more than a product or a service■ It’s more specialist than generalist■ It’s finding the gaps and filling them■ It’s partnering. It’s speaking the same language ■ It’s more than a sale. It’s making the right short-term decisions for the right long term outcomes■ It’s TELUS Security Solutions. One security provider. One focus. Making sure you’re prepared for the inevitable

Page 48: The Security Ecosystem

Become more aware, resilient and prepared. Find out more at telus.com/talkssecurity