SlideShare a Scribd company logo
1 of 22
Security as the foundation of DX
1. The impact of security on management
2. Security measures for DX
3. Expected effects of Zero Trust
a. Security Requirements in the Context of Business Trends
b. Case study zoom
c. Measure
c-1 "Perimeter Protection" and "Zero Trust" methods compared
c-2 Design
Appendix
Masaaki Murakami
masaaki-murakami@funaisoken.co.jp
Funai Soken Holdings Inc.
2020/12
1. The impact of security on management
a) Security is involved in all business activities
Digitized Business
Cloud
security
linkage linkage linkage
security
securitysecurity securitysecurity
securitysecurity
Customer-
owned
Information
In-house information
and
employee information
In-House Business
Site for customers
company-internal
information
In a digitized business world
a) Security is involved in all business activities
b) Impact of security on management = market capitalization of the
company
1 2
The cloud is all about "internal operations" and "digitized business," and attackers can
exploit the cloud to leak information, exploit employee, internal, and customer information
in the cloud, and hold the information hostage to demand money and goods.
Protect customer-
owned information
Protecting employee and
company information
b) Impact of security on management = market capitalization of the company
The "market capitalization" of digital businesses is sensitive to security troubles.
The most important factors are "rumors" and "reputation of security experts".
 The "rumors" will lower the market cap.
 Returning to the original trend of market capitalization is "cyber-security experts'
evaluation".
2月 3月 4月 5月 6月
1.5 trillion yen
Jan. 2
3.5 trillion yen
March 23
3.7 trillion yen
Apr. 23
April 8
2.6 trillion yen
4.9 trillion yen
Jun. 3
Market capitalization down by 25%
The zoom bomb led to accusations of
security in the media and SNS.
(Mostly speculation and
misrepresentation of facts)
Back to the trend before the
trouble
zoom solves encryption
technology problems pointed out
by security experts
Market capitalization will return in
the short term, but will go down
again.
zoom fixes features that lead to
speculation and factual errors
<Analysis of the zoom case study>
3Protecting market
capitalization
2. Security measures for DX
Protecting employee and
company information
① Protecting employee and company information
Since the conventional "perimeter defense" method is "ineffective" and "very low
investment efficiency," change to the "zero trust" method, which is "highly effective" and
"high investment efficiency.
Approx. XXXXX yen/year
Effectiveness against threats 18%
Remote work rate is 70%.
Cost
90%
Approx. XXXXX yen/year
Investment efficiency
Cost per 10% threat coverage
Cost
XX% Down
coverage ratio
500% Up
Investment efficiency
increased by X times
Threat Coverage *1
1
1 2 3
Protect customer-
owned information
zero trust Multi-layered protection
of service sites
Use industry-known
curatorial services
and integrators.
Protecting market
capitalization
perimeter defense zero trust
Approx. XXXXX yen/year Approx. XXXXX yen/year
*1 ; Calculated using Bayesian statistics based on IPA's “10 Major Security Threats 2020”.
https://www.ipa.go.jp/files/000084114.pdf
③ Protecting market capitalization
② Protecting customer-owned information
integrators
Security Services >>> Use the services of the world's top security companies
>>> TOP level security integrator in Japan
Use "security services" and "integrators" that security experts agree on.
"Cloud services that handle sensitive personal and employee information of customers"
require a higher level of security than general cloud services ⇒ "Multi-layered defense".
3
2
WAF
IPS
FW
Multi-layered
defense
IdaaSspoofing
Attacks that
exploit
weaknesses
Infection
that
turned
our
company
into a
cluster
Spoofing, using
our company as
a springboard
Damage to
customers' personal
information on our
website.
Damage to personal
and internal information
on customers' and
partners' sites
3. Expected effects of Zero Trust
The risk of internal information leaks (risk of misuse of the cloud) and the risk
of external attacks can both be reduced to close to zero.
1
2
The risks in this area are expected to increase.
With hacking tools circulating in the underworld, multi-layered defenses are capable
of handling the latest attacks.
3
1
2
is highly effective against a variety of risks that become rumor.
is directly related to the company's credibility and is highly effective in reducing
the risk of a decline in market capitalization.
Protecting employee and company information
Protect customer-owned information
Protecting market capitalization
2019 2020 2021 2022 2023 2019 2020 2021 2022 2023
Almost no risk of
internal information
leaks by misusing the
cloud
Risk of internal information leakage
(risk of misuse of the cloud)
Anticipated risks
Almost no risk from external attacks
on terminals.
External attack risk
2019 2020 2021 2022 2023
Conventional defenses currently in use
will be even less effective in the future.
Effectiveness MDR
2019 2020 2021 2022 2023
Anticipated risks
The risk of internal information leaks increases in
proportion to the number of employees.
1 1
Effectiveness IdaaS+CASB
untreatedtreated
untreatedtreated
a. Security Requirements in the Context of Business Trends
b. Case study zoom
c. Measure
c-1 "Perimeter Protection" and "Zero Trust" methods compared
c-2 Design
Appendix
a. Security Requirements in the Context of Business Trends
manufacture
Before-Coronatrend
What
happened
withthe
Corona
disaster
post-corona
LogisticsLabourEconomic Trends distribution ICT
subscription
Expansion of online
shopping
Further expansion of
online shopping
No parts, no production
National and regional bloc
policies
Logistics over-optimized for
individual supply chains
Decline in
productive
population
Even if the product exists,
it is not distributed.
Layoffs and
labor shortagesCurrency is not
circulating in the
market.
remote work
Work style
reform
foreign worker
Foreign workers
are not allowed to
enter the country.
Cloudification
Rapid expansion of SaaS
blocking
A lot of currency was
dropped into the
market.
Money out of circulation
Expectations for Digital
A New Economic
Balance
Growth generated by
complexity of industrial
structure
Next Generation Supply Chains
New forms of
work
E-commerce
Return to
domestic
production
Flexible
Logistics
Collaborated SaaS
remote work
Requirements for the Cloud
Know-how
to use the cloud
Cloud integration
for the supply chain
Security
for cloud computing
with peace of mind
Expectations of the society
The technology that is the engine of the pump is
CloudAI
Securely share employee information between
clouds
Preventing threats and exploitation by
external attacks on PCs and clouds
Prevent external attacks from harming
customers and collaborating partners.
Site for customers
company-internal information
Requirements for security
Economic Trends Next Generation Supply Chains
DX = A pump to channel stagnant money under the new economic order
Prevent leakage of internal information
 Market capitalization was about 1.5 trillion yen on January 2, but rose to about 3.5 trillion yen on March 23,
thanks to Corona's tailwind.
 In the wake of the zoom bomb, rumors of security problems spread, and the market capitalization fell to about
2.6 trillion yen on April 8.
 Various security issues were pointed out, but the only real trouble was the zom bomb. The zoom bomb was
also not a vulnerability in zoom, but a standard feature that was exploited by users.
 Most of the problems were the result of misinterpretations and misunderstandings of facts that spread through
the media and social networking sites.
 The first round of countermeasures paid off, and a month later, on April 23, the market capitalization returned
to the level of a month earlier.
The first round of measures focuses on counteracting rumors and zoom bombs.
 Due to the effect of the second round of measures, the market capitalization rose to about 4.9 trillion yen on
June 2, about two months later.
The second measure is a countermeasure to the encryption problem pointed out by security experts.
b. zoom case study
March
April
May
June
security expertMassmedia,
social networking sites
U.S. Government rumor
zoom bombing
Actual
troubl
e
No real trouble, but problems pointed out.
zoom is being bugged by the Chinese government.
Meeting in zoom will be hijacked by hackers.
zoom is a Chinese service
zoom is a Chinese company
zoom is lying about its security.
Personal information has been leaked from zoom.
Zoom's end-to-end encryption is not
end-to-end encryption by security
experts' definition
Government officials banned
from usingzoom for someof
their official duties.
Items with factual errors
fact
zoom
security is
vulnerable
90-day security plan
Sequential
implementation of
measures for -
Corporate
takeover for
Measure
Change all
distributed apps
to prevent
Action
Market capitalization
(in Japanese yen)
Dec. 8, 9 trillion yen
Jan. 2, 1.5 trillion yen
March 23, 3.5 trillion yen
April 8, 2.57 trillion yen
Jun. 3, 4.9 trillion yen
Apr. 23, 3.7 trillion yen
1 2 3 4 5 6 7
8
1 6
7
7
perimeter defense Zero Trust
perimeter defense
Build a wall to protect the "people",
"systems", and "PCs" inside.
We're safe inside.
Management of "people", "systems", and "PCs and
smartphones" as a means of information leakage
people systems "PCs
information leak , Information loss
Manage directly
Unprotected against internal
information leaks
Protect against internal information leaks
 Effectiveness against threats 500% increase in coverage
 Annual cost XX% Down
 Investment efficiency up X times
c-1 "Perimeter Protection" and "Zero Trust" methods compared
Changing to Zero Trust would "greatly improve our defenses" and "lower our costs
c. Measure
0
1,000
2,000
3,000
4,000
5,000
Cost per 10% threat coverage
Approx. XXXX million yen/year
Effects on threats
18%
If the remote work rate is 30%.
Cost
90%
Investment efficiency
Cost per 10% threat coverage
Annual Cost
XX% Down
Threat Coverage
500% Up
Investment efficiency
increased by X times
Threat Coverage
Approx. XXXX million yen/year
Approx. YYY million yen/year Approx. YYY million yen/year
perimeter defense Zero Trust
i. Zero Trust / "Countermeasures against internal information leaks
C-2 Design
Basic design
Intensive monitoring, regulation, and warning of (former) employees
with high risk of internal information leakage
Most employees who contribute to
business performance
(Former) employees at
high risk of internal
information leakage
≒ retired person
Alerted to change
in action
Centralized monitoring,
regulation, and warning
Regulation
&
leave evidence of fraud.
IdaaS + CASB
Stage1 ;
Stage2 ;
Stage3 ;
Employees are notified that this policy is being implemented.
(only black sites are restricted)
Regulate sites with low trust levels.
Use only whitelisted sites.
For most employees who contribute to business performance, use Stage 1 as
the normal operation and raise or lower the level depending on the situation.
Security measures are disclosed to employees.
Operation
Conventional general security measures (regulations for all employees)
Most employees who contribute
to business performance
Strict regulation
Reference
(Former) employees at high
risk of internal information
leakage
❶ Minimize the risk of personal information and ID/PW leaks from the cloud you use.
❷ Steadily identify, analyze, and take measures against employee misconduct
❸ Restrict access to sites that you do not want our employees to use.
Technical
Requirements
Design
❷-3 Evidence of legal action against misuse by
employees
❷-1 Analysis and alerting of suspicious
employee use
❸ Restrict access to sites that you don't want
our employees to use.
❷-2 Automatically take action when an employee
uses the system in a suspicious manner.
CASB
IdaaS
Web site
Cloud
・・・In-house systems
Cloud in the
world
Log storage
UEBA
Standard
Adaptive
Standard
❶ Minimize the risk of personal information and
ID/PW leaks from the cloud you use.
Functional design
Cloud
computing as
an internal
system
In-house Cloud Web site
Employees
Analyze employee site access
behavior.
Block employee access to the site.
c
d
Control what employees can use in the
cloud.
a
b
CASB
IdaaS
Dedicated employee
credit information DB
for our company
UEBA
Analyze employee behavior
and score their trust level.
CCI
SaaS Credit InformationDB
Approximately 30,000 to 40,000 security evaluated clouds
Number of newly evaluated clouds: several thousand per year
Cloud version of Teikoku Databank
List of Dangerous Sites
In-house system
Non-Certified Clouds
Personal Cloud
Web site
Control employee "login" to the cloud
MDR = EPP + EDR + SOC
❹ Protect all PCs and smartphones from attacks.
❹-1 Waterfront measures
Note: Not effective against non-malware attacks,
which account for more than half of all attacks.
❹-2 Measures to prevent pathogens from
slipping past waterfront measures
Effective against most attacks because it detects
symptoms after the onset of the disease.
PC, smartphone
MDR
EPP
EDR/SOC
ii. Zero Trust / Countermeasures against external attacks (ransom, exploitation, etc.)
for PC, smartphone
Technical
Requirements
Design
Infection and extermination
attack (disease)
isolation
extermination
water's edge
Undetectable
Cloud Web siteMail USB
Conventional attacks
attacks by conventional viruses, etc.
New type of attack
new type of fileless attack
2018 2019
60%
40%
49%
51%
Traditional anti-
virus protection MDR
Extermination area
Conventional attacks
New type of attack
MDR
MDR
EPP EDR/SOC
attack (disease)
isolation
extermination
❺ To prevent all attacks from outside
❺-1 Measures against unauthorized access by
parties other than customers
❺-2 Preventing direct attacks on a site
Service website
IdaaS
WAF
IPS
FW
MDR = EPP + EDR + SOC
iii. Multi-layered protection for service sites / Countermeasures against external attacks
(ransom, exploitation, etc.) for Service website
Technical
Requirements
Design
Applications
developed for each site
OS, middleware
Network
WAF
IPS
FW
Multi-layered
defense
IdaaS
Applications developed
for each site
OS, middleware
Network
spoofing
Attacks that
exploit
weaknesses
Infection
that
turned
our
company
into a
cluster
Our Wes site customers' and partners' sites
Spoofing, using
our company as
a springboard
Damage to
customers' personal
information on our
website.
Damage to personal
and internal information
on customers' and
partners' sites
vulnerability

More Related Content

What's hot

IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Securityinside-BigData.com
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.Merry D'souza
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseShwetank Jayaswal
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew RosenquistMatthew Rosenquist
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew RosenquistMatthew Rosenquist
 
Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3Alexander SAMARIN
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelKoen Maris
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technologyijtsrd
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...IBM Security
 
Cognitive security
Cognitive securityCognitive security
Cognitive securityIqra khalil
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...IBM Security
 
Policies to mitigate cyber risk
Policies to mitigate cyber riskPolicies to mitigate cyber risk
Policies to mitigate cyber riskG Prachi
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Janghyuck Choi
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Global Business Events
 

What's hot (20)

IDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber SecurityIDC Best Practices in Private Sector Cyber Security
IDC Best Practices in Private Sector Cyber Security
 
The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.The 5 most trusted cyber security companies to watch.
The 5 most trusted cyber security companies to watch.
 
IBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, ExpertiseIBM Security Products: Intelligence, Integration, Expertise
IBM Security Products: Intelligence, Integration, Expertise
 
Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist2017 K12 Educators Security Briefing - Matthew Rosenquist
2017 K12 Educators Security Briefing - Matthew Rosenquist
 
2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist2017 InfraGard Atlanta Conference - Matthew Rosenquist
2017 InfraGard Atlanta Conference - Matthew Rosenquist
 
Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3Mini-course at VFU - Architecting modern digital systems - 3
Mini-course at VFU - Architecting modern digital systems - 3
 
Information Security Governance at Board and Executive Level
Information Security Governance at Board and Executive LevelInformation Security Governance at Board and Executive Level
Information Security Governance at Board and Executive Level
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
Fundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest TechnologyFundamental Areas of Cyber Security on Latest Technology
Fundamental Areas of Cyber Security on Latest Technology
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
Cognitive security
Cognitive securityCognitive security
Cognitive security
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Policies to mitigate cyber risk
Policies to mitigate cyber riskPolicies to mitigate cyber risk
Policies to mitigate cyber risk
 
Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016Ibm cognitive security_white_paper_04_2016
Ibm cognitive security_white_paper_04_2016
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
16231
1623116231
16231
 
Looking into the future of security
Looking into the future of securityLooking into the future of security
Looking into the future of security
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?Trend Micro - Targeted attacks: Have you found yours?
Trend Micro - Targeted attacks: Have you found yours?
 

Similar to Security as the foundation of DX

Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...Arbp Worldwide
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistMatthew Rosenquist
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksIRJET Journal
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity TrendsIRJET Journal
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01ijmnct
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy onijmnct
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowDharmendra Rama
 
Security economics
Security economicsSecurity economics
Security economicsYansi Keim
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2Donald Jennings
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich TopCyberNewsMAGAZINE
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2Donald Jennings
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry BrianHuntMSFCPACRISC
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 

Similar to Security as the foundation of DX (20)

Drivelock modern approach of it security & amp; encryption solution -whitep...
Drivelock   modern approach of it security & amp; encryption solution -whitep...Drivelock   modern approach of it security & amp; encryption solution -whitep...
Drivelock modern approach of it security & amp; encryption solution -whitep...
 
Future of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.RosenquistFuture of Cybersecurity 2016 - M.Rosenquist
Future of Cybersecurity 2016 - M.Rosenquist
 
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber AttacksA Comprehensive Review of Cyber Security, Threats and Cyber Attacks
A Comprehensive Review of Cyber Security, Threats and Cyber Attacks
 
Latest Cybersecurity Trends
Latest Cybersecurity TrendsLatest Cybersecurity Trends
Latest Cybersecurity Trends
 
4514ijmnct01
4514ijmnct014514ijmnct01
4514ijmnct01
 
Security attacks taxonomy on
Security attacks taxonomy onSecurity attacks taxonomy on
Security attacks taxonomy on
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 
The top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdowThe top cybersecurity challenges post-lockdow
The top cybersecurity challenges post-lockdow
 
Security economics
Security economicsSecurity economics
Security economics
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 
Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich Top Cyber News Magazine Daniel Ehrenreich
Top Cyber News Magazine Daniel Ehrenreich
 
Jennings it security overview 1 2
Jennings it security overview 1 2Jennings it security overview 1 2
Jennings it security overview 1 2
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 

More from masaaki murakami

DXを企画・実行する為の基礎知識
DXを企画・実行する為の基礎知識DXを企画・実行する為の基礎知識
DXを企画・実行する為の基礎知識masaaki murakami
 
DXのケース・スタディ / MaaS 
DXのケース・スタディ / MaaS DXのケース・スタディ / MaaS 
DXのケース・スタディ / MaaS masaaki murakami
 
ビジネスモデルに求められるもの
ビジネスモデルに求められるものビジネスモデルに求められるもの
ビジネスモデルに求められるものmasaaki murakami
 
MaaSを活用した関連ビジネス
MaaSを活用した関連ビジネスMaaSを活用した関連ビジネス
MaaSを活用した関連ビジネスmasaaki murakami
 
日本の“MaaS”の状況を知る
日本の“MaaS”の状況を知る日本の“MaaS”の状況を知る
日本の“MaaS”の状況を知るmasaaki murakami
 
“CASE”から、日本のモビリティ技術の状況を知る
“CASE”から、日本のモビリティ技術の状況を知る“CASE”から、日本のモビリティ技術の状況を知る
“CASE”から、日本のモビリティ技術の状況を知るmasaaki murakami
 
DXの展開モデルのスタディ/モビリティ編
DXの展開モデルのスタディ/モビリティ編DXの展開モデルのスタディ/モビリティ編
DXの展開モデルのスタディ/モビリティ編masaaki murakami
 
DXの展開モデルのスタディ/モビリティ編
DXの展開モデルのスタディ/モビリティ編DXの展開モデルのスタディ/モビリティ編
DXの展開モデルのスタディ/モビリティ編masaaki murakami
 
3. “5G”の 「ビジネス・モデル」
3. “5G”の 「ビジネス・モデル」3. “5G”の 「ビジネス・モデル」
3. “5G”の 「ビジネス・モデル」masaaki murakami
 
§2 DXを進めるための“5G”の基礎知識
§2 DXを進めるための“5G”の基礎知識§2 DXを進めるための“5G”の基礎知識
§2 DXを進めるための“5G”の基礎知識masaaki murakami
 
§1 デジタル市場を分析する
§1 デジタル市場を分析する§1 デジタル市場を分析する
§1 デジタル市場を分析するmasaaki murakami
 
1.ガートナー ハイプ・サイクルの読み方
1.ガートナー ハイプ・サイクルの読み方1.ガートナー ハイプ・サイクルの読み方
1.ガートナー ハイプ・サイクルの読み方masaaki murakami
 
3. “5G”の 「ビジネス・モデル」
3. “5G”の 「ビジネス・モデル」3. “5G”の 「ビジネス・モデル」
3. “5G”の 「ビジネス・モデル」masaaki murakami
 
2. “5G”に「いつ着手するか?」
2. “5G”に「いつ着手するか?」2. “5G”に「いつ着手するか?」
2. “5G”に「いつ着手するか?」masaaki murakami
 
1. “5G”で「何ができるか?」
1. “5G”で「何ができるか?」1. “5G”で「何ができるか?」
1. “5G”で「何ができるか?」masaaki murakami
 
§2 DXを進めるための“5G”の基礎知識
§2 DXを進めるための“5G”の基礎知識§2 DXを進めるための“5G”の基礎知識
§2 DXを進めるための“5G”の基礎知識masaaki murakami
 
§1 デジタル市場を分析する  ガートナー ハイプサイクル から読み取る
§1 デジタル市場を分析する  ガートナー ハイプサイクル から読み取る§1 デジタル市場を分析する  ガートナー ハイプサイクル から読み取る
§1 デジタル市場を分析する  ガートナー ハイプサイクル から読み取るmasaaki murakami
 
“5G”で「何ができるか?」 “インターネット”で出来なかったことが“5G”で出来る!
“5G”で「何ができるか?」 “インターネット”で出来なかったことが“5G”で出来る!“5G”で「何ができるか?」 “インターネット”で出来なかったことが“5G”で出来る!
“5G”で「何ができるか?」 “インターネット”で出来なかったことが“5G”で出来る!masaaki murakami
 
DXを進めるための5Gの基礎知識
DXを進めるための5Gの基礎知識DXを進めるための5Gの基礎知識
DXを進めるための5Gの基礎知識masaaki murakami
 

More from masaaki murakami (20)

DXを企画・実行する為の基礎知識
DXを企画・実行する為の基礎知識DXを企画・実行する為の基礎知識
DXを企画・実行する為の基礎知識
 
DXのケース・スタディ / MaaS 
DXのケース・スタディ / MaaS DXのケース・スタディ / MaaS 
DXのケース・スタディ / MaaS 
 
ビジネスモデルに求められるもの
ビジネスモデルに求められるものビジネスモデルに求められるもの
ビジネスモデルに求められるもの
 
MaaSを活用した関連ビジネス
MaaSを活用した関連ビジネスMaaSを活用した関連ビジネス
MaaSを活用した関連ビジネス
 
日本の“MaaS”の状況を知る
日本の“MaaS”の状況を知る日本の“MaaS”の状況を知る
日本の“MaaS”の状況を知る
 
“CASE”から、日本のモビリティ技術の状況を知る
“CASE”から、日本のモビリティ技術の状況を知る“CASE”から、日本のモビリティ技術の状況を知る
“CASE”から、日本のモビリティ技術の状況を知る
 
DXの展開モデルのスタディ/モビリティ編
DXの展開モデルのスタディ/モビリティ編DXの展開モデルのスタディ/モビリティ編
DXの展開モデルのスタディ/モビリティ編
 
DXの展開モデルのスタディ/モビリティ編
DXの展開モデルのスタディ/モビリティ編DXの展開モデルのスタディ/モビリティ編
DXの展開モデルのスタディ/モビリティ編
 
3. “5G”の 「ビジネス・モデル」
3. “5G”の 「ビジネス・モデル」3. “5G”の 「ビジネス・モデル」
3. “5G”の 「ビジネス・モデル」
 
§2 DXを進めるための“5G”の基礎知識
§2 DXを進めるための“5G”の基礎知識§2 DXを進めるための“5G”の基礎知識
§2 DXを進めるための“5G”の基礎知識
 
§1 デジタル市場を分析する
§1 デジタル市場を分析する§1 デジタル市場を分析する
§1 デジタル市場を分析する
 
2. 分析例 RPA vs 5G
2. 分析例 RPA vs 5G2. 分析例 RPA vs 5G
2. 分析例 RPA vs 5G
 
1.ガートナー ハイプ・サイクルの読み方
1.ガートナー ハイプ・サイクルの読み方1.ガートナー ハイプ・サイクルの読み方
1.ガートナー ハイプ・サイクルの読み方
 
3. “5G”の 「ビジネス・モデル」
3. “5G”の 「ビジネス・モデル」3. “5G”の 「ビジネス・モデル」
3. “5G”の 「ビジネス・モデル」
 
2. “5G”に「いつ着手するか?」
2. “5G”に「いつ着手するか?」2. “5G”に「いつ着手するか?」
2. “5G”に「いつ着手するか?」
 
1. “5G”で「何ができるか?」
1. “5G”で「何ができるか?」1. “5G”で「何ができるか?」
1. “5G”で「何ができるか?」
 
§2 DXを進めるための“5G”の基礎知識
§2 DXを進めるための“5G”の基礎知識§2 DXを進めるための“5G”の基礎知識
§2 DXを進めるための“5G”の基礎知識
 
§1 デジタル市場を分析する  ガートナー ハイプサイクル から読み取る
§1 デジタル市場を分析する  ガートナー ハイプサイクル から読み取る§1 デジタル市場を分析する  ガートナー ハイプサイクル から読み取る
§1 デジタル市場を分析する  ガートナー ハイプサイクル から読み取る
 
“5G”で「何ができるか?」 “インターネット”で出来なかったことが“5G”で出来る!
“5G”で「何ができるか?」 “インターネット”で出来なかったことが“5G”で出来る!“5G”で「何ができるか?」 “インターネット”で出来なかったことが“5G”で出来る!
“5G”で「何ができるか?」 “インターネット”で出来なかったことが“5G”で出来る!
 
DXを進めるための5Gの基礎知識
DXを進めるための5Gの基礎知識DXを進めるための5Gの基礎知識
DXを進めるための5Gの基礎知識
 

Recently uploaded

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 

Recently uploaded (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 

Security as the foundation of DX

  • 1. Security as the foundation of DX 1. The impact of security on management 2. Security measures for DX 3. Expected effects of Zero Trust a. Security Requirements in the Context of Business Trends b. Case study zoom c. Measure c-1 "Perimeter Protection" and "Zero Trust" methods compared c-2 Design Appendix Masaaki Murakami masaaki-murakami@funaisoken.co.jp Funai Soken Holdings Inc. 2020/12
  • 2. 1. The impact of security on management a) Security is involved in all business activities Digitized Business Cloud security linkage linkage linkage security securitysecurity securitysecurity securitysecurity Customer- owned Information In-house information and employee information In-House Business Site for customers company-internal information In a digitized business world a) Security is involved in all business activities b) Impact of security on management = market capitalization of the company 1 2 The cloud is all about "internal operations" and "digitized business," and attackers can exploit the cloud to leak information, exploit employee, internal, and customer information in the cloud, and hold the information hostage to demand money and goods. Protect customer- owned information Protecting employee and company information
  • 3. b) Impact of security on management = market capitalization of the company The "market capitalization" of digital businesses is sensitive to security troubles. The most important factors are "rumors" and "reputation of security experts".  The "rumors" will lower the market cap.  Returning to the original trend of market capitalization is "cyber-security experts' evaluation". 2月 3月 4月 5月 6月 1.5 trillion yen Jan. 2 3.5 trillion yen March 23 3.7 trillion yen Apr. 23 April 8 2.6 trillion yen 4.9 trillion yen Jun. 3 Market capitalization down by 25% The zoom bomb led to accusations of security in the media and SNS. (Mostly speculation and misrepresentation of facts) Back to the trend before the trouble zoom solves encryption technology problems pointed out by security experts Market capitalization will return in the short term, but will go down again. zoom fixes features that lead to speculation and factual errors <Analysis of the zoom case study> 3Protecting market capitalization
  • 4. 2. Security measures for DX Protecting employee and company information ① Protecting employee and company information Since the conventional "perimeter defense" method is "ineffective" and "very low investment efficiency," change to the "zero trust" method, which is "highly effective" and "high investment efficiency. Approx. XXXXX yen/year Effectiveness against threats 18% Remote work rate is 70%. Cost 90% Approx. XXXXX yen/year Investment efficiency Cost per 10% threat coverage Cost XX% Down coverage ratio 500% Up Investment efficiency increased by X times Threat Coverage *1 1 1 2 3 Protect customer- owned information zero trust Multi-layered protection of service sites Use industry-known curatorial services and integrators. Protecting market capitalization perimeter defense zero trust Approx. XXXXX yen/year Approx. XXXXX yen/year *1 ; Calculated using Bayesian statistics based on IPA's “10 Major Security Threats 2020”. https://www.ipa.go.jp/files/000084114.pdf
  • 5. ③ Protecting market capitalization ② Protecting customer-owned information integrators Security Services >>> Use the services of the world's top security companies >>> TOP level security integrator in Japan Use "security services" and "integrators" that security experts agree on. "Cloud services that handle sensitive personal and employee information of customers" require a higher level of security than general cloud services ⇒ "Multi-layered defense". 3 2 WAF IPS FW Multi-layered defense IdaaSspoofing Attacks that exploit weaknesses Infection that turned our company into a cluster Spoofing, using our company as a springboard Damage to customers' personal information on our website. Damage to personal and internal information on customers' and partners' sites
  • 6. 3. Expected effects of Zero Trust The risk of internal information leaks (risk of misuse of the cloud) and the risk of external attacks can both be reduced to close to zero. 1 2 The risks in this area are expected to increase. With hacking tools circulating in the underworld, multi-layered defenses are capable of handling the latest attacks. 3 1 2 is highly effective against a variety of risks that become rumor. is directly related to the company's credibility and is highly effective in reducing the risk of a decline in market capitalization. Protecting employee and company information Protect customer-owned information Protecting market capitalization
  • 7. 2019 2020 2021 2022 2023 2019 2020 2021 2022 2023 Almost no risk of internal information leaks by misusing the cloud Risk of internal information leakage (risk of misuse of the cloud) Anticipated risks Almost no risk from external attacks on terminals. External attack risk 2019 2020 2021 2022 2023 Conventional defenses currently in use will be even less effective in the future. Effectiveness MDR 2019 2020 2021 2022 2023 Anticipated risks The risk of internal information leaks increases in proportion to the number of employees. 1 1 Effectiveness IdaaS+CASB untreatedtreated untreatedtreated
  • 8. a. Security Requirements in the Context of Business Trends b. Case study zoom c. Measure c-1 "Perimeter Protection" and "Zero Trust" methods compared c-2 Design Appendix
  • 9. a. Security Requirements in the Context of Business Trends manufacture Before-Coronatrend What happened withthe Corona disaster post-corona LogisticsLabourEconomic Trends distribution ICT subscription Expansion of online shopping Further expansion of online shopping No parts, no production National and regional bloc policies Logistics over-optimized for individual supply chains Decline in productive population Even if the product exists, it is not distributed. Layoffs and labor shortagesCurrency is not circulating in the market. remote work Work style reform foreign worker Foreign workers are not allowed to enter the country. Cloudification Rapid expansion of SaaS blocking A lot of currency was dropped into the market. Money out of circulation Expectations for Digital A New Economic Balance Growth generated by complexity of industrial structure Next Generation Supply Chains New forms of work E-commerce Return to domestic production Flexible Logistics Collaborated SaaS remote work
  • 10. Requirements for the Cloud Know-how to use the cloud Cloud integration for the supply chain Security for cloud computing with peace of mind Expectations of the society The technology that is the engine of the pump is CloudAI Securely share employee information between clouds Preventing threats and exploitation by external attacks on PCs and clouds Prevent external attacks from harming customers and collaborating partners. Site for customers company-internal information Requirements for security Economic Trends Next Generation Supply Chains DX = A pump to channel stagnant money under the new economic order Prevent leakage of internal information
  • 11.  Market capitalization was about 1.5 trillion yen on January 2, but rose to about 3.5 trillion yen on March 23, thanks to Corona's tailwind.  In the wake of the zoom bomb, rumors of security problems spread, and the market capitalization fell to about 2.6 trillion yen on April 8.  Various security issues were pointed out, but the only real trouble was the zom bomb. The zoom bomb was also not a vulnerability in zoom, but a standard feature that was exploited by users.  Most of the problems were the result of misinterpretations and misunderstandings of facts that spread through the media and social networking sites.  The first round of countermeasures paid off, and a month later, on April 23, the market capitalization returned to the level of a month earlier. The first round of measures focuses on counteracting rumors and zoom bombs.  Due to the effect of the second round of measures, the market capitalization rose to about 4.9 trillion yen on June 2, about two months later. The second measure is a countermeasure to the encryption problem pointed out by security experts. b. zoom case study
  • 12. March April May June security expertMassmedia, social networking sites U.S. Government rumor zoom bombing Actual troubl e No real trouble, but problems pointed out. zoom is being bugged by the Chinese government. Meeting in zoom will be hijacked by hackers. zoom is a Chinese service zoom is a Chinese company zoom is lying about its security. Personal information has been leaked from zoom. Zoom's end-to-end encryption is not end-to-end encryption by security experts' definition Government officials banned from usingzoom for someof their official duties. Items with factual errors fact zoom security is vulnerable 90-day security plan Sequential implementation of measures for - Corporate takeover for Measure Change all distributed apps to prevent Action Market capitalization (in Japanese yen) Dec. 8, 9 trillion yen Jan. 2, 1.5 trillion yen March 23, 3.5 trillion yen April 8, 2.57 trillion yen Jun. 3, 4.9 trillion yen Apr. 23, 3.7 trillion yen 1 2 3 4 5 6 7 8 1 6 7 7
  • 13. perimeter defense Zero Trust perimeter defense Build a wall to protect the "people", "systems", and "PCs" inside. We're safe inside. Management of "people", "systems", and "PCs and smartphones" as a means of information leakage people systems "PCs information leak , Information loss Manage directly Unprotected against internal information leaks Protect against internal information leaks  Effectiveness against threats 500% increase in coverage  Annual cost XX% Down  Investment efficiency up X times c-1 "Perimeter Protection" and "Zero Trust" methods compared Changing to Zero Trust would "greatly improve our defenses" and "lower our costs c. Measure
  • 14. 0 1,000 2,000 3,000 4,000 5,000 Cost per 10% threat coverage Approx. XXXX million yen/year Effects on threats 18% If the remote work rate is 30%. Cost 90% Investment efficiency Cost per 10% threat coverage Annual Cost XX% Down Threat Coverage 500% Up Investment efficiency increased by X times Threat Coverage Approx. XXXX million yen/year Approx. YYY million yen/year Approx. YYY million yen/year perimeter defense Zero Trust
  • 15. i. Zero Trust / "Countermeasures against internal information leaks C-2 Design Basic design Intensive monitoring, regulation, and warning of (former) employees with high risk of internal information leakage Most employees who contribute to business performance (Former) employees at high risk of internal information leakage ≒ retired person Alerted to change in action Centralized monitoring, regulation, and warning Regulation & leave evidence of fraud. IdaaS + CASB
  • 16. Stage1 ; Stage2 ; Stage3 ; Employees are notified that this policy is being implemented. (only black sites are restricted) Regulate sites with low trust levels. Use only whitelisted sites. For most employees who contribute to business performance, use Stage 1 as the normal operation and raise or lower the level depending on the situation. Security measures are disclosed to employees. Operation Conventional general security measures (regulations for all employees) Most employees who contribute to business performance Strict regulation Reference (Former) employees at high risk of internal information leakage
  • 17. ❶ Minimize the risk of personal information and ID/PW leaks from the cloud you use. ❷ Steadily identify, analyze, and take measures against employee misconduct ❸ Restrict access to sites that you do not want our employees to use. Technical Requirements Design ❷-3 Evidence of legal action against misuse by employees ❷-1 Analysis and alerting of suspicious employee use ❸ Restrict access to sites that you don't want our employees to use. ❷-2 Automatically take action when an employee uses the system in a suspicious manner. CASB IdaaS Web site Cloud ・・・In-house systems Cloud in the world Log storage UEBA Standard Adaptive Standard ❶ Minimize the risk of personal information and ID/PW leaks from the cloud you use. Functional design
  • 18. Cloud computing as an internal system In-house Cloud Web site Employees Analyze employee site access behavior. Block employee access to the site. c d Control what employees can use in the cloud. a b CASB IdaaS Dedicated employee credit information DB for our company UEBA Analyze employee behavior and score their trust level. CCI SaaS Credit InformationDB Approximately 30,000 to 40,000 security evaluated clouds Number of newly evaluated clouds: several thousand per year Cloud version of Teikoku Databank List of Dangerous Sites In-house system Non-Certified Clouds Personal Cloud Web site Control employee "login" to the cloud
  • 19. MDR = EPP + EDR + SOC ❹ Protect all PCs and smartphones from attacks. ❹-1 Waterfront measures Note: Not effective against non-malware attacks, which account for more than half of all attacks. ❹-2 Measures to prevent pathogens from slipping past waterfront measures Effective against most attacks because it detects symptoms after the onset of the disease. PC, smartphone MDR EPP EDR/SOC ii. Zero Trust / Countermeasures against external attacks (ransom, exploitation, etc.) for PC, smartphone Technical Requirements Design
  • 20. Infection and extermination attack (disease) isolation extermination water's edge Undetectable Cloud Web siteMail USB Conventional attacks attacks by conventional viruses, etc. New type of attack new type of fileless attack 2018 2019 60% 40% 49% 51% Traditional anti- virus protection MDR Extermination area Conventional attacks New type of attack MDR MDR EPP EDR/SOC attack (disease) isolation extermination
  • 21. ❺ To prevent all attacks from outside ❺-1 Measures against unauthorized access by parties other than customers ❺-2 Preventing direct attacks on a site Service website IdaaS WAF IPS FW MDR = EPP + EDR + SOC iii. Multi-layered protection for service sites / Countermeasures against external attacks (ransom, exploitation, etc.) for Service website Technical Requirements Design
  • 22. Applications developed for each site OS, middleware Network WAF IPS FW Multi-layered defense IdaaS Applications developed for each site OS, middleware Network spoofing Attacks that exploit weaknesses Infection that turned our company into a cluster Our Wes site customers' and partners' sites Spoofing, using our company as a springboard Damage to customers' personal information on our website. Damage to personal and internal information on customers' and partners' sites vulnerability

Editor's Notes

  1. (2)これからすべき事/ゼロトラスト防御 リモートワーク、クラウドの下でも、securityが保てる! 【基本的な考え方】 信用できる人」 と 「信用できる人」 の “取引は信用できる”
  2. (2)これからすべき事/ゼロトラスト防御 リモートワーク、クラウドの下でも、securityが保てる! 【基本的な考え方】 信用できる人」 と 「信用できる人」 の “取引は信用できる”