SlideShare a Scribd company logo
1 of 23
Cyber Security
Directions
Russ Dietz
Chief Security Officer – GE Digital
2PREDIX TRANSFORM
Agenda
Security is a GOOD
word…
2
Shrink vulnerabilities
& cost
3
Application to
infrastructure
4
Isolating BAD stuff
5
Coordinating security
6
Advancement of
Cyber threat
globalization
1
3PREDIX TRANSFORM
Say goodbye to
Cyber-crime…
Life changing
scenario
Collateral damage –
risk-based approach
Global Cyber War
Forget about user-based
devices
Internet of Things
Machine-to-machine cyber
attacks
Data and Analytics
Standard processes &
get Certified…
Security & Privacy
Moving from
Defense to Risk…
New Cyber Solutions
4PREDIX TRANSFORM
Significant Increase…
Cyber Espionage & Warfare
(well under-reported!)
UNKNOWN
*HACKMAGEDDON.COM - 2016
*
*
*
5PREDIX TRANSFORM
Crime
Activism
Terrorism
State
Sponsored
Weaponized
Globalized
Complexity & Cost
6PREDIX TRANSFORM
Source: IDC IIoT - 2016
7PREDIX TRANSFORM
High
Impact
Low
Common “data” attacks…
Source: IDC IIoT - 2016
8PREDIX TRANSFORM
9PREDIX TRANSFORM
Even with massive OT connected growth…
… only an 2 – 8% of power generation data is used today.
Energy Processing & Production automation
will drive higher use of data across Industrial Internet
10PREDIX TRANSFORM
Attack the problem…
Content Images © 2015
11PREDIX TRANSFORM
Machine-to-Machine – Data Security
Content Images © 2015
12PREDIX TRANSFORM
Predix Cyber & Operational
SecurityEnd-to-end Trust – Machine – IT – App -
User
PROTECT
OT/IT IN AN
APP FACTORY
DELIVERY
MODEL
SECURE &
CERTIFY
OPERATIONAL
INFRASTRUCTU
RE
BRING
OPERATIONAL
AVAILBILITY &
GOVERNANCE
WITH “IT”
ESTABLISH
USER-BASED
WORLD FOR
INDUSTRIAL
APPS
… app users to operational … at every connection & layer … automated secure apps … absolute visibility
13PREDIX TRANSFORM
Inspection, Detection and Monitoring
Visibility across the stack
Continuous
Monitoring
Network
Web Tier
CF Platform
VM Platform
Access
• DDoS Mitigation (16Q1)
• DNS Protection (16Q1)
• Edge ACLs & NG FW
• Multiple Layers IDS/IPS
• SDN Cross Boundary
FWs
Inspection & Detection
• Web Application FW
• Runtime Application
Security Protection
(16Q1)
• CF App Containerization
and Security Groups
Host and OS
• VM and ESXi Host Logs
• Linux and Windows Logs
• Host AV
• Host IPS , FIM, etc.
(16Q1)
• PAM – CF UAA/ACS
• PAM –
Apps/Infrastructure
Monitoring
Point of
Presence
SOC
SIEM
Predix SOC
Predix
Security Analytics
Predix Cyber
Security Analysts
Division of Labor
Predix Application Security
Predix Platform
Core Infrastructure, Services & GE Enterprise
• Business-specific response team
• Deal with inbound infections from customers and data spill
• Secure by design, development and deployment
• Face to the Customers & Product Engineering teams
• Predix Ecosystem Defense
• Responsible for East/West microservice defense
• Growing Security Operations “Muscle Mass”
• Joint SOC Operations with GE
• Leverage of GE Parent where needed
• Defense of the Enterprise focused
• Scaffolding Predix defense needs where appropriate
• Threat Intelligence and SIEM integration
• Incident Response coordination where needed (multi-business impact)
PREDIX
15PREDIX TRANSFORM
Security Operations Center
 The SOC Offers
• 24 x 7 x 365 network security monitoring for the following
technologies:
o Integrated Security Information & Event Management (SIEM)
o Signature-based Intrusion Detection & Prevention
o Behavioral-based enterprise network security
o Log monitoring & management
• Incident Response (Security Alert and Response Procedure)
& Forensics
• Research Alerts, Events, Vulnerabilities
• Reporting – Weekly, Monthly, Quarterly,
Ad-hoc, Compliance, and Custom
• Vulnerability Scanning & Reporting
• Signature Updates
• Custom Signatures
• Tuning
Predix SOC
16PREDIX TRANSFORM
Secure by Design - SecDevOps
17PREDIX TRANSFORM
Secure by Deploy – Strong Chain
Identity
Individuals
Devices
Software
Data
18PREDIX TRANSFORM
Predix – Universal Compliance & Governance
All customer engagements begin with a Predix Controls Matrix (PCM) mapping
exercise based on the controls requested by the customer and their regulatory needs
 Predix leverages the Cloud Security Alliance
Common Control Matrix (CCM) as the
baseline for our controls in order to meet
shared and cloud security requirements with
visibility and transparency.
 Our underlying policies, procedures,
processes, practices & TSRs are
implemented around ISO/IEC 27001/2,
AICPA 2014 TSC (SOC), NIST 800-53 &
HIPAA – built into 133 policy controls across
these 16 areas:
Application & Interface Security 4
Audit Assurance & Compliance 3
Business Continuity Management & Operational Resilience 11
Change Control & Configuration Management 5
Data Security & Information Lifecycle Management 7
Datacenter Security 9
Encryption & Key Management 4
Governance and Risk Management 11
Human Resources 11
Identity & Access Management 13
Infrastructure & Virtualization Security 13
Interoperability & Portability 5
Mobile Security 20
Security Incident Management, E-Discovery & Cloud Forensics 5
Supply Chain Management, Transparency and Accountability 9
Threat and Vulnerability Management 3
Grand Total 133
All customer engagements begin with a Predix Controls Matrix (PCM) mapping
exercise based on the controls requested by the customer and their regulatory needs
19PREDIX TRANSFORM
Solution areas of focus
Micro-
containerization &
Micro-segmentation
Data heritage and
lineage
Standardized
controls &
certifications
Analytic proofing &
verification
Multi-party
Security
Operations
Risk-based
defensive
systems
Incident profiling
Anomaly
Detection &
Modeling
20PREDIX TRANSFORM
Wrap it up…
Cyber
landscape
evolving,
increased
complexity &
cost
Globalization of
cyber patterns
driving high
impact
collateral
damage
IIoT –
Machines
making
decisions on
data – sweet
spot
Pure data set &
clean analytics
– next
generation of
cyber
Get yourself
cyber-aware,
certified &
SecDevOps
Cyber areas
are risk-
focused going
forward – full
defense in
depth
21PREDIX TRANSFORM
Any questions?
22PREDIX TRANSFORM
Rate Sessions, Submit Questions
Using your Mobile App (event code ‘pt2016’)
General Electric reserves the right to make changes in specifications and features, or discontinue the product or service described at any time, without notice or obligation. These materials do not constitute a
representation, warranty or documentation regarding the product or service featured. Illustrations are provided for informational purposes, and your configuration may differ. This information does not
constitute legal, financial, coding, or regulatory advice in connection with your use of the product or service. Please consult your professional advisors for any such advice. GE, Predix and the GE Monogram are
trademarks of General Electric Company. ©2016 General Electric Company – All rights reserved.

More Related Content

What's hot

Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?IBM Security
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceXenith Document Systems Ltd
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityHackerOne
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksMatthew Rosenquist
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
Security Meetup Scotland - August 2017 (Deconstructing SIEM)
Security Meetup Scotland - August 2017 (Deconstructing SIEM)Security Meetup Scotland - August 2017 (Deconstructing SIEM)
Security Meetup Scotland - August 2017 (Deconstructing SIEM)Harry McLaren
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationMcKonly & Asbury, LLP
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?Nixu Corporation
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraKnowledge Group
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?PECB
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...PECB
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityDell EMC World
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachOmar Khawaja
 

What's hot (20)

Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – FinanceDigital Transformation and Security for the Modern Business Part 1 – Finance
Digital Transformation and Security for the Modern Business Part 1 – Finance
 
IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,IBM Security Strategy Intelligence,
IBM Security Strategy Intelligence,
 
Why Executives Underinvest In Cybersecurity
Why Executives Underinvest In CybersecurityWhy Executives Underinvest In Cybersecurity
Why Executives Underinvest In Cybersecurity
 
Strategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity RisksStrategic Leadership for Managing Evolving Cybersecurity Risks
Strategic Leadership for Managing Evolving Cybersecurity Risks
 
Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014Symantec Intelligence Report - October 2014
Symantec Intelligence Report - October 2014
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Security Meetup Scotland - August 2017 (Deconstructing SIEM)
Security Meetup Scotland - August 2017 (Deconstructing SIEM)Security Meetup Scotland - August 2017 (Deconstructing SIEM)
Security Meetup Scotland - August 2017 (Deconstructing SIEM)
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?What has changed in Corporate Cybersecurity?
What has changed in Corporate Cybersecurity?
 
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl PereiraCyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
Cyber Security Transformation - A New Approach for 2015 & Beyond - Daryl Pereira
 
How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?How to Build a Successful Cybersecurity Program?
How to Build a Successful Cybersecurity Program?
 
How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...How an Integrated Management system helps you comply with new Cyber Laws and ...
How an Integrated Management system helps you comply with new Cyber Laws and ...
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in CybersecurityMT118 Risk Intelligence - Making the Right Choices in Cybersecurity
MT118 Risk Intelligence - Making the Right Choices in Cybersecurity
 
Mobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric ApproachMobility Security - A Business-Centric Approach
Mobility Security - A Business-Centric Approach
 

Viewers also liked

Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy servergreatbury
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server WorksMer Joyce
 
PEM2: Control Applications Portfolio from GE Power
PEM2: Control Applications Portfolio from GE PowerPEM2: Control Applications Portfolio from GE Power
PEM2: Control Applications Portfolio from GE PowerPredix
 
E5: Predix Security with ACS & UAA (Predix Transform 2016)
E5: Predix Security with ACS & UAA (Predix Transform 2016)E5: Predix Security with ACS & UAA (Predix Transform 2016)
E5: Predix Security with ACS & UAA (Predix Transform 2016)Predix
 
My Top Five DevOps Learnings
My Top Five DevOps LearningsMy Top Five DevOps Learnings
My Top Five DevOps LearningsPredix
 
PAN1: Thermal Imaging Analysis ( Predix Transform 2016)
PAN1: Thermal Imaging Analysis ( Predix Transform 2016)PAN1: Thermal Imaging Analysis ( Predix Transform 2016)
PAN1: Thermal Imaging Analysis ( Predix Transform 2016)Predix
 
PAM1: Managing Assets at Scale
PAM1: Managing Assets at ScalePAM1: Managing Assets at Scale
PAM1: Managing Assets at ScalePredix
 
GE Predix Transform 2016 - UX & Customer Engagement
GE Predix Transform 2016 - UX & Customer EngagementGE Predix Transform 2016 - UX & Customer Engagement
GE Predix Transform 2016 - UX & Customer EngagementDavid Bingham
 
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
PEM1:  Device Authentication in IIOT ( Predix Transform 2016)PEM1:  Device Authentication in IIOT ( Predix Transform 2016)
PEM1: Device Authentication in IIOT ( Predix Transform 2016)Predix
 
E3: Edge and Cloud Connectivity (Predix Transform 2016)
E3: Edge and Cloud Connectivity (Predix Transform 2016)E3: Edge and Cloud Connectivity (Predix Transform 2016)
E3: Edge and Cloud Connectivity (Predix Transform 2016)Predix
 
E1: Building the Digital Twin (Predix Transform 2016)
E1: Building the Digital Twin (Predix Transform 2016)E1: Building the Digital Twin (Predix Transform 2016)
E1: Building the Digital Twin (Predix Transform 2016)Predix
 
Predix Builder Roadshow
Predix Builder RoadshowPredix Builder Roadshow
Predix Builder RoadshowPredix
 
JSON: The Basics
JSON: The BasicsJSON: The Basics
JSON: The BasicsJeff Fox
 
PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)
PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)
PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)Predix
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 

Viewers also liked (20)

Advantages of proxy server
Advantages of proxy serverAdvantages of proxy server
Advantages of proxy server
 
How a Proxy Server Works
How a Proxy Server WorksHow a Proxy Server Works
How a Proxy Server Works
 
PEM2: Control Applications Portfolio from GE Power
PEM2: Control Applications Portfolio from GE PowerPEM2: Control Applications Portfolio from GE Power
PEM2: Control Applications Portfolio from GE Power
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
E5: Predix Security with ACS & UAA (Predix Transform 2016)
E5: Predix Security with ACS & UAA (Predix Transform 2016)E5: Predix Security with ACS & UAA (Predix Transform 2016)
E5: Predix Security with ACS & UAA (Predix Transform 2016)
 
My Top Five DevOps Learnings
My Top Five DevOps LearningsMy Top Five DevOps Learnings
My Top Five DevOps Learnings
 
PAN1: Thermal Imaging Analysis ( Predix Transform 2016)
PAN1: Thermal Imaging Analysis ( Predix Transform 2016)PAN1: Thermal Imaging Analysis ( Predix Transform 2016)
PAN1: Thermal Imaging Analysis ( Predix Transform 2016)
 
PAM1: Managing Assets at Scale
PAM1: Managing Assets at ScalePAM1: Managing Assets at Scale
PAM1: Managing Assets at Scale
 
GE Predix Transform 2016 - UX & Customer Engagement
GE Predix Transform 2016 - UX & Customer EngagementGE Predix Transform 2016 - UX & Customer Engagement
GE Predix Transform 2016 - UX & Customer Engagement
 
Proxy Servers
Proxy ServersProxy Servers
Proxy Servers
 
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
PEM1:  Device Authentication in IIOT ( Predix Transform 2016)PEM1:  Device Authentication in IIOT ( Predix Transform 2016)
PEM1: Device Authentication in IIOT ( Predix Transform 2016)
 
E3: Edge and Cloud Connectivity (Predix Transform 2016)
E3: Edge and Cloud Connectivity (Predix Transform 2016)E3: Edge and Cloud Connectivity (Predix Transform 2016)
E3: Edge and Cloud Connectivity (Predix Transform 2016)
 
E1: Building the Digital Twin (Predix Transform 2016)
E1: Building the Digital Twin (Predix Transform 2016)E1: Building the Digital Twin (Predix Transform 2016)
E1: Building the Digital Twin (Predix Transform 2016)
 
Predix Builder Roadshow
Predix Builder RoadshowPredix Builder Roadshow
Predix Builder Roadshow
 
JSON: The Basics
JSON: The BasicsJSON: The Basics
JSON: The Basics
 
PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)
PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)
PAM3: Machine Learning in the Railway Industry ( Predix Transform 2016)
 
Industrial IoT bootcamp
Industrial IoT bootcampIndustrial IoT bootcamp
Industrial IoT bootcamp
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Proxy Server
Proxy ServerProxy Server
Proxy Server
 
JSON and REST
JSON and RESTJSON and REST
JSON and REST
 

Similar to D5_Cyber Security Directions-Transform2016-FINAL

IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overviewxband
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityNetworkCollaborators
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Marco Casassa Mont
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceTrend Micro
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingSPI Conference
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016Francisco González Jiménez
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016IBM Security
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security TrendsTerra Verde
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattssonUlf Mattsson
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Arushi00
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyEryk Budi Pratama
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew RosenquistMatthew Rosenquist
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutionsharman041
 

Similar to D5_Cyber Security Directions-Transform2016-FINAL (20)

IBM Security Strategy
IBM Security StrategyIBM Security Strategy
IBM Security Strategy
 
IBM Security Strategy Overview
IBM Security Strategy OverviewIBM Security Strategy Overview
IBM Security Strategy Overview
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...Cyber security within Organisations: A sneaky peak of current status, trends,...
Cyber security within Organisations: A sneaky peak of current status, trends,...
 
Solutions for PCI DSS Compliance
Solutions for PCI DSS ComplianceSolutions for PCI DSS Compliance
Solutions for PCI DSS Compliance
 
A New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm ApproachingA New Remedy for the Cyber Storm Approaching
A New Remedy for the Cyber Storm Approaching
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 20165 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
5 Ways to Get Even More from Your IBM Security QRadar Investment in 2016
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Where data security and value of data meet in the cloud ulf mattsson
Where data security and value of data meet in the cloud   ulf mattssonWhere data security and value of data meet in the cloud   ulf mattsson
Where data security and value of data meet in the cloud ulf mattsson
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025Data Center Security Market — Explore latest facts on networking 2025
Data Center Security Market — Explore latest facts on networking 2025
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist
 
Big Data Analytics Solutions
Big Data Analytics SolutionsBig Data Analytics Solutions
Big Data Analytics Solutions
 

D5_Cyber Security Directions-Transform2016-FINAL

  • 1. Cyber Security Directions Russ Dietz Chief Security Officer – GE Digital
  • 2. 2PREDIX TRANSFORM Agenda Security is a GOOD word… 2 Shrink vulnerabilities & cost 3 Application to infrastructure 4 Isolating BAD stuff 5 Coordinating security 6 Advancement of Cyber threat globalization 1
  • 3. 3PREDIX TRANSFORM Say goodbye to Cyber-crime… Life changing scenario Collateral damage – risk-based approach Global Cyber War Forget about user-based devices Internet of Things Machine-to-machine cyber attacks Data and Analytics Standard processes & get Certified… Security & Privacy Moving from Defense to Risk… New Cyber Solutions
  • 4. 4PREDIX TRANSFORM Significant Increase… Cyber Espionage & Warfare (well under-reported!) UNKNOWN *HACKMAGEDDON.COM - 2016 * * *
  • 7. 7PREDIX TRANSFORM High Impact Low Common “data” attacks… Source: IDC IIoT - 2016
  • 9. 9PREDIX TRANSFORM Even with massive OT connected growth… … only an 2 – 8% of power generation data is used today. Energy Processing & Production automation will drive higher use of data across Industrial Internet
  • 10. 10PREDIX TRANSFORM Attack the problem… Content Images © 2015
  • 11. 11PREDIX TRANSFORM Machine-to-Machine – Data Security Content Images © 2015
  • 12. 12PREDIX TRANSFORM Predix Cyber & Operational SecurityEnd-to-end Trust – Machine – IT – App - User PROTECT OT/IT IN AN APP FACTORY DELIVERY MODEL SECURE & CERTIFY OPERATIONAL INFRASTRUCTU RE BRING OPERATIONAL AVAILBILITY & GOVERNANCE WITH “IT” ESTABLISH USER-BASED WORLD FOR INDUSTRIAL APPS … app users to operational … at every connection & layer … automated secure apps … absolute visibility
  • 13. 13PREDIX TRANSFORM Inspection, Detection and Monitoring Visibility across the stack Continuous Monitoring Network Web Tier CF Platform VM Platform Access • DDoS Mitigation (16Q1) • DNS Protection (16Q1) • Edge ACLs & NG FW • Multiple Layers IDS/IPS • SDN Cross Boundary FWs Inspection & Detection • Web Application FW • Runtime Application Security Protection (16Q1) • CF App Containerization and Security Groups Host and OS • VM and ESXi Host Logs • Linux and Windows Logs • Host AV • Host IPS , FIM, etc. (16Q1) • PAM – CF UAA/ACS • PAM – Apps/Infrastructure Monitoring Point of Presence SOC SIEM Predix SOC Predix Security Analytics Predix Cyber Security Analysts
  • 14. Division of Labor Predix Application Security Predix Platform Core Infrastructure, Services & GE Enterprise • Business-specific response team • Deal with inbound infections from customers and data spill • Secure by design, development and deployment • Face to the Customers & Product Engineering teams • Predix Ecosystem Defense • Responsible for East/West microservice defense • Growing Security Operations “Muscle Mass” • Joint SOC Operations with GE • Leverage of GE Parent where needed • Defense of the Enterprise focused • Scaffolding Predix defense needs where appropriate • Threat Intelligence and SIEM integration • Incident Response coordination where needed (multi-business impact) PREDIX
  • 15. 15PREDIX TRANSFORM Security Operations Center  The SOC Offers • 24 x 7 x 365 network security monitoring for the following technologies: o Integrated Security Information & Event Management (SIEM) o Signature-based Intrusion Detection & Prevention o Behavioral-based enterprise network security o Log monitoring & management • Incident Response (Security Alert and Response Procedure) & Forensics • Research Alerts, Events, Vulnerabilities • Reporting – Weekly, Monthly, Quarterly, Ad-hoc, Compliance, and Custom • Vulnerability Scanning & Reporting • Signature Updates • Custom Signatures • Tuning Predix SOC
  • 16. 16PREDIX TRANSFORM Secure by Design - SecDevOps
  • 17. 17PREDIX TRANSFORM Secure by Deploy – Strong Chain Identity Individuals Devices Software Data
  • 18. 18PREDIX TRANSFORM Predix – Universal Compliance & Governance All customer engagements begin with a Predix Controls Matrix (PCM) mapping exercise based on the controls requested by the customer and their regulatory needs  Predix leverages the Cloud Security Alliance Common Control Matrix (CCM) as the baseline for our controls in order to meet shared and cloud security requirements with visibility and transparency.  Our underlying policies, procedures, processes, practices & TSRs are implemented around ISO/IEC 27001/2, AICPA 2014 TSC (SOC), NIST 800-53 & HIPAA – built into 133 policy controls across these 16 areas: Application & Interface Security 4 Audit Assurance & Compliance 3 Business Continuity Management & Operational Resilience 11 Change Control & Configuration Management 5 Data Security & Information Lifecycle Management 7 Datacenter Security 9 Encryption & Key Management 4 Governance and Risk Management 11 Human Resources 11 Identity & Access Management 13 Infrastructure & Virtualization Security 13 Interoperability & Portability 5 Mobile Security 20 Security Incident Management, E-Discovery & Cloud Forensics 5 Supply Chain Management, Transparency and Accountability 9 Threat and Vulnerability Management 3 Grand Total 133 All customer engagements begin with a Predix Controls Matrix (PCM) mapping exercise based on the controls requested by the customer and their regulatory needs
  • 19. 19PREDIX TRANSFORM Solution areas of focus Micro- containerization & Micro-segmentation Data heritage and lineage Standardized controls & certifications Analytic proofing & verification Multi-party Security Operations Risk-based defensive systems Incident profiling Anomaly Detection & Modeling
  • 20. 20PREDIX TRANSFORM Wrap it up… Cyber landscape evolving, increased complexity & cost Globalization of cyber patterns driving high impact collateral damage IIoT – Machines making decisions on data – sweet spot Pure data set & clean analytics – next generation of cyber Get yourself cyber-aware, certified & SecDevOps Cyber areas are risk- focused going forward – full defense in depth
  • 22. 22PREDIX TRANSFORM Rate Sessions, Submit Questions Using your Mobile App (event code ‘pt2016’)
  • 23. General Electric reserves the right to make changes in specifications and features, or discontinue the product or service described at any time, without notice or obligation. These materials do not constitute a representation, warranty or documentation regarding the product or service featured. Illustrations are provided for informational purposes, and your configuration may differ. This information does not constitute legal, financial, coding, or regulatory advice in connection with your use of the product or service. Please consult your professional advisors for any such advice. GE, Predix and the GE Monogram are trademarks of General Electric Company. ©2016 General Electric Company – All rights reserved.