1 / 10

Managing Threats in Changing World

Managing Threats in Changing World. John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012. Trends Canada’s auditor general report on cyber-security Failure to pass US 2012 Cybersecurity Act Cyber attack on Canadian government in 2011

Download Presentation

Managing Threats in Changing World

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012

  2. Trends • Canada’s auditor general report on cyber-security • Failure to pass US 2012 Cybersecurity Act • Cyber attack on Canadian government in 2011 • DDOS attacks on US banks • Many others

  3. Evolution of Threats

  4. What is changing? • APT – Advanced Persistent Threats • Targeted • Highly motivated • Well-financed • Coordinated across attack points • Will try multiple times using multiple methods • Cloud computing and mobility increase complexity and attack surface Evolutionary, not revolutionary change

  5. What is the same? • Same bad guys • Same motivation Using new tools, operating in IT world, leveraging the cloud

  6. Where are the gaps? • Defenses are strongly attack-oriented • Signature-based defenses geared to single general attacks • Controls are strongly people-oriented • Awareness programs, discretionary security, application development • Defenses often deployed in silos • Security “bolted on” • Defense in Depth • Layers rather than breadth

  7. Integrated Defense 7

  8. Toward Integrated Defense • Acknowledge reality • The bad guys are already in • Denial of service attacks will cause outages • You will be attacked • Understand your business • Integrate with operational risk management • Proactive approach to threat management • Threat modeling and predictive analysis • What does a coordinated attack look like? • Prepare for attack and test your response • Behavior analysis – good and bad

  9. Toward Integrated Defense • Security by design • Embed security into processes, applications, data, and infrastructure • Move from discretionary to policy-driven security • Simplify and automate • Virtual security operations centre • Provide complete visibility into operational environment • Provide useful and relevant information • Provide effective intelligence – inside and out • Share information and services • Invest in people with threat management skills

  10. Thank You 10

More Related