SlideShare a Scribd company logo
1 of 6
Download to read offline
ADOPTING INTELLIGENCE DRIVEN SECURITY
A Security Strategy to Help Build Trust in the Digital World
RSA Whitepaper
INTELLIGENCE DRIVEN SECURITY
Today’s changing business requirements, exciting IT innovations, and the dynamic
threat landscape underscore the need for a modern security strategy that updates
security processes to achieve a more effective approach to cyber-defense. This paper
provides guidance for how to adopt an Intelligence Driven Security strategy that delivers
three essential capabilities; visibility, analysis, and action. These capabilities can help
detect, investigate, and respond to advanced threats, confirm and manage identities,
and prevent online fraud and cybercrime. This strategy empowers organizations to
effectively address the challenges they have today and those still beyond the horizon.
Adopting Intelligence Driven Security
INTRODUCTION
It’s a classic example of a double-edged sword -- the very same IT innovations that
increased enterprise efficiency over the past decade have created opportunities for
dangerous, nuanced cyber threats to damage the organization. As enterprise processes
grew in sophistication, so too did attacker tactics; evolving beyond rudimentary mass
malware into precisely targeted, devastatingly advanced attacks. As IT plays an
increasingly central role in fundamentally transforming business operations and
creating new opportunities and advantages, IT risk and security challenges have never
been more important to address.
RSA’s Intelligence Driven Security strategy helps organizations mitigate the risk of
operating in a digital world. Organizations can employ this strategy to deliver the
visibility, analysis, and action they need to detect, investigate, and respond to advanced
threats, confirm and manage identities, and prevent online fraud and cybercrime.
THE CHANGING BUSINESS
Not so long ago, IT’s reach was well-defined and well-controlled. Most applications
required a comparatively small amount of access, little or no information was shared
externally, and IT had near-complete control over the infrastructure for applications and
access. Then things changed. Organizations recognized they could lower costs and
increase productivity by granting third-party access to applications, and as a result,
introduced a greater number of digital identities corresponding to employees,
suppliers, and partners. To further complicate matters, the workforce brought a host of
new personal mobile devices (mobile phones, laptops, and tablets) that all required
access. Many business processes, including core functions such as IP development or
financial transaction processing transitioned partially or fully to the cloud. Today, many
former in-house tasks are conducted outside the organization’s traditional “four walls.”
Further, the explosion of digital data created by new applications and new digital
business processes dispersed over multiple silos resulted in a significantly expanded
attack surface. Potential points of vulnerability increased, and the newly hyper-
extended business struggled to adequately secure what it suddenly didn’t own,
manage, or control.
Simultaneously, hackers, politically motivated “hacktivists,” and fraudsters capitalized
on this evolution, developing more advanced attack tactics, such as moving “low and
slow” to mimic the behaviors of a normal user, while their motivations transformed
from largely notoriety-driven to objectives like stealing intellectual property. With more
points of vulnerability and a lethal combination of hacker motivation and know-how,
the possibility of a breach today is unprecedented. In fact, most authorities agree that
yesterday’s goal of preventing every intrusion is impossible, and today’s security
imperative is to detect and stop intruders before they can cause damage or loss to the
organization.
Against this backdrop of a changing business, IT, and threat landscape, there’s a
fundamental disconnect between most organizations’ in-place security processes and
an effective, contemporary approach to cyber-defense. Intelligence Driven Security is
that new strategy.
page 2
Adopting Intelligence Driven Security
“In order to keep pace with the rapidly growing number of users, devices,
and internal and external threats, intelligence driven security has evolved
from a conceptual theory to a must-have strategy for today’s enterprise. This
proliferation of access requirements by people and devices has dramatically
increased security risk; ensuring that the right systems are accessed only by
those who are authorized is driving the need for intelligence around those
behaviors.”
Chris Christiansen, IDC
WHAT MAKES AN INTELLIGENCE DRIVEN SECURITY STRATEGY
INTELLIGENT?
An Intelligence Driven Security strategy delivers three essential capabilities designed to
prevent inevitable breaches from causing damage or loss: visibility, analysis, and action.
Visibility
Organizations gain visibility by collecting data about what matters. But what matters
today and what control points still exist in today’s hyper-extended enterprises?
First is risk -- What are the risks to the organization? What are its vulnerabilities? How
well is it defending against those at any given point in time? Without visibility into risk,
organizations can’t design optimal defense strategies or appropriately prioritize
activities. Second is what’s happening on the network. Network visibility needs to go
beyond what we have today, from logs and events down to the packet and session level
to spot faint signals that indicate advanced threats. Third is digital identities.
Organizations need to understand who/what are on their networks, what they are
doing, and is that behavior appropriate. And finally, transactions – organizations need
to know what’s happening inside key applications that drive the business.
Analysis
All the data gathered to gain visibility is useless without the ability to extrapolate
insight and meaning from it. Analysis involves understanding normal state behavior
and then looking for anomalies. By knowing what is “normal,” an organization can then
spot, investigate, and root out anomalies that result from malicious activity. Once
anomalies are discovered, additional, more detailed, contextual analysis may be
required to determine the appropriate response.
Action
Action is the response to confirmed malicious anomalies. Rapid action allows
organizations to mitigate potential threats by enforcing controls such as access
restrictions or additional authentication. Action also results in remediation processes
and activity. The key to success is keeping action consistent, so each time an analysis
finds something potentially threatening; the organization can “operationalize” the
response.
page 3
Adopting Intelligence Driven Security
WHAT WOULD AN INTELLIGENCE DRIVEN SECURITY STRATEGY
LOOK LIKE?
An Intelligence Driven Security strategy places emphasis on detection, analysis, and
action while deemphasizing static, signature-based, perimeter detection. This “even-
split” approach understands the modern threat landscape and allocates resources
accordingly. This includes creating a better balance between monitoring, response
and prevention.
“Securing today’s global enterprise is a massive undertaking. With the
dissolution of the security perimeter, organizations need to take a more
intelligence-driven approach to security. Using data from systems and users to
drive decision-making can help improve the speed and efficiency of spotting
and responding to attacks and ultimately safeguard an organization’s most
important digital assets.”
William Boni, Corporate Information Security Officer (CISO) and Vice President,
Enterprise Information Security
The following charts demonstrate the difference in priorities between many of today’s
security strategies and an Intelligence Driven Security strategy.
WHAT ARE THE BENEFITS?
Aside from the critical capability to combat today’s increasingly dangerous threat
landscape, an Intelligence Driven Security strategy provides additional benefits:
Focus
Because Intelligence Driven Security drives action based on mitigating the most
pressing risks to the business, it ensures that organizations prioritize activity and
resources appropriately.
page 4
Monitoring
15%
Response
5%
Prevention
80%
Today’s Priorities
Monitoring
33%
Response
33%
Prevention
33%
Intelligence Driven
Security
Source RSA
Adopting Intelligence Driven Security
Operational Benefits
Most organizations’ in-place security systems rely on a significant number of disparate
solutions; malware analysis, identity and access management, governance, risk, and
compliance, etc. Intelligence Driven Security reduces the number of point products and
fuses together otherwise disjointed data sets and tools, increasing both security and
operational efficiency.
Risk Avoidance
With the ability to identify attacks in a more timely fashion, Intelligence Driven Security
reduces bottom line loss that often results from an undetected breach.
Staffing Benefits
It’s no secret that there exists a dearth of needed talent in the IT Security industry. An
Intelligence Driven Security strategy can aid in attracting top performers, empower them
with the right set of technologies and tools, and make their efforts more extensible
throughout the organization. Automation and sophistication aids in freeing already
overburdened employees, focusing them on what matters to defend the organization,
and can elevate average performers into vital components of a winning IT security staff.
CONSEQUENCES OF NOT ADOPTING AN INTELLIGENCE DRIVEN
SECURITY STRATEGY
While the upside is clear, there is also a significant downside for organizations who fail
to adopt an Intelligence Driven Security strategy:
Level of Exposure Rises
Every organization has something of value, including its brand, intellectual property,
and the bottom line. The inability to effectively manage today’s digital risks significantly
increases the potential for damage to this value. One devastating breach can wipe out
years of establishing steady revenue, cutting-edge research, or a trusted brand.
Falling Behind
Even if a breach never occurs, an organization that does not adopt an Intelligence
Driven Security strategy is at serious risk of jeopardizing competitiveness. An
organization that is able to effectively manage its digital risks can confidently channel
resources into growing, expanding, and differentiating via new IT initiatives, leaving
competitors behind.
Getting Started
Regardless of your current technology implementations or organizational security
maturity, a roadmap towards an Intelligence Driven Security strategy can be developed.
Current investments can be used as building blocks to a more sophisticated model.
Nearly every organization has the potential to gain the required capabilities for
visibility, analysis, and action. What’s important is not precisely where you are today,
but what next steps you take to improve. The goal should be a roadmap across people,
process, and technology to comprehensively increase maturity. The key is committing to
adopting a more Intelligence Driven Security strategy.
page 5
EMC2
, EMC, the EMC logo, RSA, Archer, FraudAction, NetWitness and the RSA logo are registered trademarks or
trademarks of EMC Corporation in the United States and other countries. Microsoft and Outlook are registered
trademarks of Microsoft. All other products or services mentioned are trademarks of their respective companies.
© Copyright 2014 EMC Corporation. All rights reserved.
H13235
ABOUT RSA
RSA, The Security Division of EMC, is the premier provider of intelligence-driven
security solutions. RSA helps the world’s leading organizations solve their most
complex and sensitive security challenges: managing organizational risk,
safeguarding mobile access and collaboration, preventing online fraud, and
defending against advanced threats. RSA delivers agile controls for identity
assurance, fraud detection, and data protection, robust Security Analytics and
industry-leading GRC capabilities, and expert consulting and advisory services.
For more information, please visit www.RSA.com.
www.rsa.com
Adopting Intelligence Driven Security
CONCLUSION
The ineffectiveness of perimeter-based security strategies and today’s increasingly
dangerous threat landscape requires a new strategy. RSA’s Intelligence Driven Security
strategy helps organizations mitigate the risk of operating in a digital world. With its
emphasis on visibility, analysis, and action, an Intelligence Driven Security strategy can
help organizations reap extraordinary benefits:
•	A balanced, modern approach to cyber security that mitigates risk
•	Deeper, granular insight into the IT environment
•	The amalgamation of previously disparate data, applications, and solutions
•	Cost savings
•	Increase employee productivity
•	Improve competitiveness
To survive, thrive, and build trust in today’s digital world, organizations need to turn to
an Intelligence Driven Security strategy.

More Related Content

What's hot

Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionTripwire
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax Technology
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureLee Dalton
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRBill Besse
 
Information security governance
Information security governanceInformation security governance
Information security governanceKoen Maris
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeErnst & Young
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationNexon Asia Pacific
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEnterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEMC
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analyticsChristian Have
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...at MicroFocus Italy ❖✔
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governancedigitallibrary
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential InformationKim Jensen
 

What's hot (20)

Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
 
Haystax Technology - About Us
Haystax Technology - About UsHaystax Technology - About Us
Haystax Technology - About Us
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEnterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governance
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
 

Viewers also liked

Block mexico conquest
Block mexico conquestBlock mexico conquest
Block mexico conquestTravis Klein
 
Wealth creation and academic health science networks emc aridhia and pivotal 0
Wealth creation and academic health science networks emc aridhia and pivotal  0Wealth creation and academic health science networks emc aridhia and pivotal  0
Wealth creation and academic health science networks emc aridhia and pivotal 0EMC
 
Thurs review latin amer and europe
Thurs review latin amer and europeThurs review latin amer and europe
Thurs review latin amer and europeTravis Klein
 
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...Dr. Raju M. Mathew
 
ISTE Ignite: Educating digital youth
ISTE Ignite: Educating digital youthISTE Ignite: Educating digital youth
ISTE Ignite: Educating digital youthTech with Intent
 
New Skills for the Service-Oriented IT Organization
New Skills for the Service-Oriented IT OrganizationNew Skills for the Service-Oriented IT Organization
New Skills for the Service-Oriented IT OrganizationEMC
 
Answer f4-learning-area-3-ict
Answer f4-learning-area-3-ictAnswer f4-learning-area-3-ict
Answer f4-learning-area-3-ictzahrahar
 
Introduction To Maxtable
Introduction To MaxtableIntroduction To Maxtable
Introduction To Maxtablemaxtable
 
Mobile Innovations Workshop
Mobile Innovations WorkshopMobile Innovations Workshop
Mobile Innovations WorkshopResearch Now
 
Seize ICT enabledTransformation
Seize ICT enabledTransformationSeize ICT enabledTransformation
Seize ICT enabledTransformationRene Summer
 
Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012htisnj
 
Spending multipliers
Spending multipliersSpending multipliers
Spending multipliersTravis Klein
 
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...EMC
 
The Industrial Internet@Work
The Industrial Internet@WorkThe Industrial Internet@Work
The Industrial Internet@WorkEMC
 
Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013Rene Summer
 

Viewers also liked (20)

Block mexico conquest
Block mexico conquestBlock mexico conquest
Block mexico conquest
 
Wealth creation and academic health science networks emc aridhia and pivotal 0
Wealth creation and academic health science networks emc aridhia and pivotal  0Wealth creation and academic health science networks emc aridhia and pivotal  0
Wealth creation and academic health science networks emc aridhia and pivotal 0
 
Thurs review latin amer and europe
Thurs review latin amer and europeThurs review latin amer and europe
Thurs review latin amer and europe
 
Webdays blida mobile top 10 risks
Webdays blida   mobile top 10 risksWebdays blida   mobile top 10 risks
Webdays blida mobile top 10 risks
 
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
 
ISTE Ignite: Educating digital youth
ISTE Ignite: Educating digital youthISTE Ignite: Educating digital youth
ISTE Ignite: Educating digital youth
 
New Skills for the Service-Oriented IT Organization
New Skills for the Service-Oriented IT OrganizationNew Skills for the Service-Oriented IT Organization
New Skills for the Service-Oriented IT Organization
 
Answer f4-learning-area-3-ict
Answer f4-learning-area-3-ictAnswer f4-learning-area-3-ict
Answer f4-learning-area-3-ict
 
отчётммо 3
отчётммо  3отчётммо  3
отчётммо 3
 
Introduction To Maxtable
Introduction To MaxtableIntroduction To Maxtable
Introduction To Maxtable
 
Eq price monday
Eq price mondayEq price monday
Eq price monday
 
Mobile Innovations Workshop
Mobile Innovations WorkshopMobile Innovations Workshop
Mobile Innovations Workshop
 
Seize ICT enabledTransformation
Seize ICT enabledTransformationSeize ICT enabledTransformation
Seize ICT enabledTransformation
 
Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012
 
Spending multipliers
Spending multipliersSpending multipliers
Spending multipliers
 
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
 
Min wage 2014
Min wage 2014Min wage 2014
Min wage 2014
 
13 tipos de_memoria
13 tipos de_memoria13 tipos de_memoria
13 tipos de_memoria
 
The Industrial Internet@Work
The Industrial Internet@WorkThe Industrial Internet@Work
The Industrial Internet@Work
 
Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013
 

Similar to Adopting Intelligence-Driven Security

security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfgokuforhelp
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilienceSymantec
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Accenture Technology
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfAnil
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfforladies
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk ManagementDMIMarketing
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptxCompanySeceon
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementDMIMarketing
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent ThreatsBooz Allen Hamilton
 
Threat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperThreat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperDuncan Hart
 
threat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperthreat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperRudy Piekarski
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data securityKeith Braswell
 
Risk Management
Risk ManagementRisk Management
Risk Managementijtsrd
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessSecurityOn-Demand
 

Similar to Adopting Intelligence-Driven Security (20)

security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdf
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptx
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
Threat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperThreat Lifecycle Management_Whitepaper
Threat Lifecycle Management_Whitepaper
 
threat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperthreat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaper
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security Success
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 

Adopting Intelligence-Driven Security

  • 1. ADOPTING INTELLIGENCE DRIVEN SECURITY A Security Strategy to Help Build Trust in the Digital World RSA Whitepaper INTELLIGENCE DRIVEN SECURITY Today’s changing business requirements, exciting IT innovations, and the dynamic threat landscape underscore the need for a modern security strategy that updates security processes to achieve a more effective approach to cyber-defense. This paper provides guidance for how to adopt an Intelligence Driven Security strategy that delivers three essential capabilities; visibility, analysis, and action. These capabilities can help detect, investigate, and respond to advanced threats, confirm and manage identities, and prevent online fraud and cybercrime. This strategy empowers organizations to effectively address the challenges they have today and those still beyond the horizon.
  • 2. Adopting Intelligence Driven Security INTRODUCTION It’s a classic example of a double-edged sword -- the very same IT innovations that increased enterprise efficiency over the past decade have created opportunities for dangerous, nuanced cyber threats to damage the organization. As enterprise processes grew in sophistication, so too did attacker tactics; evolving beyond rudimentary mass malware into precisely targeted, devastatingly advanced attacks. As IT plays an increasingly central role in fundamentally transforming business operations and creating new opportunities and advantages, IT risk and security challenges have never been more important to address. RSA’s Intelligence Driven Security strategy helps organizations mitigate the risk of operating in a digital world. Organizations can employ this strategy to deliver the visibility, analysis, and action they need to detect, investigate, and respond to advanced threats, confirm and manage identities, and prevent online fraud and cybercrime. THE CHANGING BUSINESS Not so long ago, IT’s reach was well-defined and well-controlled. Most applications required a comparatively small amount of access, little or no information was shared externally, and IT had near-complete control over the infrastructure for applications and access. Then things changed. Organizations recognized they could lower costs and increase productivity by granting third-party access to applications, and as a result, introduced a greater number of digital identities corresponding to employees, suppliers, and partners. To further complicate matters, the workforce brought a host of new personal mobile devices (mobile phones, laptops, and tablets) that all required access. Many business processes, including core functions such as IP development or financial transaction processing transitioned partially or fully to the cloud. Today, many former in-house tasks are conducted outside the organization’s traditional “four walls.” Further, the explosion of digital data created by new applications and new digital business processes dispersed over multiple silos resulted in a significantly expanded attack surface. Potential points of vulnerability increased, and the newly hyper- extended business struggled to adequately secure what it suddenly didn’t own, manage, or control. Simultaneously, hackers, politically motivated “hacktivists,” and fraudsters capitalized on this evolution, developing more advanced attack tactics, such as moving “low and slow” to mimic the behaviors of a normal user, while their motivations transformed from largely notoriety-driven to objectives like stealing intellectual property. With more points of vulnerability and a lethal combination of hacker motivation and know-how, the possibility of a breach today is unprecedented. In fact, most authorities agree that yesterday’s goal of preventing every intrusion is impossible, and today’s security imperative is to detect and stop intruders before they can cause damage or loss to the organization. Against this backdrop of a changing business, IT, and threat landscape, there’s a fundamental disconnect between most organizations’ in-place security processes and an effective, contemporary approach to cyber-defense. Intelligence Driven Security is that new strategy. page 2
  • 3. Adopting Intelligence Driven Security “In order to keep pace with the rapidly growing number of users, devices, and internal and external threats, intelligence driven security has evolved from a conceptual theory to a must-have strategy for today’s enterprise. This proliferation of access requirements by people and devices has dramatically increased security risk; ensuring that the right systems are accessed only by those who are authorized is driving the need for intelligence around those behaviors.” Chris Christiansen, IDC WHAT MAKES AN INTELLIGENCE DRIVEN SECURITY STRATEGY INTELLIGENT? An Intelligence Driven Security strategy delivers three essential capabilities designed to prevent inevitable breaches from causing damage or loss: visibility, analysis, and action. Visibility Organizations gain visibility by collecting data about what matters. But what matters today and what control points still exist in today’s hyper-extended enterprises? First is risk -- What are the risks to the organization? What are its vulnerabilities? How well is it defending against those at any given point in time? Without visibility into risk, organizations can’t design optimal defense strategies or appropriately prioritize activities. Second is what’s happening on the network. Network visibility needs to go beyond what we have today, from logs and events down to the packet and session level to spot faint signals that indicate advanced threats. Third is digital identities. Organizations need to understand who/what are on their networks, what they are doing, and is that behavior appropriate. And finally, transactions – organizations need to know what’s happening inside key applications that drive the business. Analysis All the data gathered to gain visibility is useless without the ability to extrapolate insight and meaning from it. Analysis involves understanding normal state behavior and then looking for anomalies. By knowing what is “normal,” an organization can then spot, investigate, and root out anomalies that result from malicious activity. Once anomalies are discovered, additional, more detailed, contextual analysis may be required to determine the appropriate response. Action Action is the response to confirmed malicious anomalies. Rapid action allows organizations to mitigate potential threats by enforcing controls such as access restrictions or additional authentication. Action also results in remediation processes and activity. The key to success is keeping action consistent, so each time an analysis finds something potentially threatening; the organization can “operationalize” the response. page 3
  • 4. Adopting Intelligence Driven Security WHAT WOULD AN INTELLIGENCE DRIVEN SECURITY STRATEGY LOOK LIKE? An Intelligence Driven Security strategy places emphasis on detection, analysis, and action while deemphasizing static, signature-based, perimeter detection. This “even- split” approach understands the modern threat landscape and allocates resources accordingly. This includes creating a better balance between monitoring, response and prevention. “Securing today’s global enterprise is a massive undertaking. With the dissolution of the security perimeter, organizations need to take a more intelligence-driven approach to security. Using data from systems and users to drive decision-making can help improve the speed and efficiency of spotting and responding to attacks and ultimately safeguard an organization’s most important digital assets.” William Boni, Corporate Information Security Officer (CISO) and Vice President, Enterprise Information Security The following charts demonstrate the difference in priorities between many of today’s security strategies and an Intelligence Driven Security strategy. WHAT ARE THE BENEFITS? Aside from the critical capability to combat today’s increasingly dangerous threat landscape, an Intelligence Driven Security strategy provides additional benefits: Focus Because Intelligence Driven Security drives action based on mitigating the most pressing risks to the business, it ensures that organizations prioritize activity and resources appropriately. page 4 Monitoring 15% Response 5% Prevention 80% Today’s Priorities Monitoring 33% Response 33% Prevention 33% Intelligence Driven Security Source RSA
  • 5. Adopting Intelligence Driven Security Operational Benefits Most organizations’ in-place security systems rely on a significant number of disparate solutions; malware analysis, identity and access management, governance, risk, and compliance, etc. Intelligence Driven Security reduces the number of point products and fuses together otherwise disjointed data sets and tools, increasing both security and operational efficiency. Risk Avoidance With the ability to identify attacks in a more timely fashion, Intelligence Driven Security reduces bottom line loss that often results from an undetected breach. Staffing Benefits It’s no secret that there exists a dearth of needed talent in the IT Security industry. An Intelligence Driven Security strategy can aid in attracting top performers, empower them with the right set of technologies and tools, and make their efforts more extensible throughout the organization. Automation and sophistication aids in freeing already overburdened employees, focusing them on what matters to defend the organization, and can elevate average performers into vital components of a winning IT security staff. CONSEQUENCES OF NOT ADOPTING AN INTELLIGENCE DRIVEN SECURITY STRATEGY While the upside is clear, there is also a significant downside for organizations who fail to adopt an Intelligence Driven Security strategy: Level of Exposure Rises Every organization has something of value, including its brand, intellectual property, and the bottom line. The inability to effectively manage today’s digital risks significantly increases the potential for damage to this value. One devastating breach can wipe out years of establishing steady revenue, cutting-edge research, or a trusted brand. Falling Behind Even if a breach never occurs, an organization that does not adopt an Intelligence Driven Security strategy is at serious risk of jeopardizing competitiveness. An organization that is able to effectively manage its digital risks can confidently channel resources into growing, expanding, and differentiating via new IT initiatives, leaving competitors behind. Getting Started Regardless of your current technology implementations or organizational security maturity, a roadmap towards an Intelligence Driven Security strategy can be developed. Current investments can be used as building blocks to a more sophisticated model. Nearly every organization has the potential to gain the required capabilities for visibility, analysis, and action. What’s important is not precisely where you are today, but what next steps you take to improve. The goal should be a roadmap across people, process, and technology to comprehensively increase maturity. The key is committing to adopting a more Intelligence Driven Security strategy. page 5
  • 6. EMC2 , EMC, the EMC logo, RSA, Archer, FraudAction, NetWitness and the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. Microsoft and Outlook are registered trademarks of Microsoft. All other products or services mentioned are trademarks of their respective companies. © Copyright 2014 EMC Corporation. All rights reserved. H13235 ABOUT RSA RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats. RSA delivers agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services. For more information, please visit www.RSA.com. www.rsa.com Adopting Intelligence Driven Security CONCLUSION The ineffectiveness of perimeter-based security strategies and today’s increasingly dangerous threat landscape requires a new strategy. RSA’s Intelligence Driven Security strategy helps organizations mitigate the risk of operating in a digital world. With its emphasis on visibility, analysis, and action, an Intelligence Driven Security strategy can help organizations reap extraordinary benefits: • A balanced, modern approach to cyber security that mitigates risk • Deeper, granular insight into the IT environment • The amalgamation of previously disparate data, applications, and solutions • Cost savings • Increase employee productivity • Improve competitiveness To survive, thrive, and build trust in today’s digital world, organizations need to turn to an Intelligence Driven Security strategy.