SlideShare a Scribd company logo
ADOPTING INTELLIGENCE DRIVEN SECURITY
A Security Strategy to Help Build Trust in the Digital World
RSA Whitepaper
INTELLIGENCE DRIVEN SECURITY
Today’s changing business requirements, exciting IT innovations, and the dynamic
threat landscape underscore the need for a modern security strategy that updates
security processes to achieve a more effective approach to cyber-defense. This paper
provides guidance for how to adopt an Intelligence Driven Security strategy that delivers
three essential capabilities; visibility, analysis, and action. These capabilities can help
detect, investigate, and respond to advanced threats, confirm and manage identities,
and prevent online fraud and cybercrime. This strategy empowers organizations to
effectively address the challenges they have today and those still beyond the horizon.
Adopting Intelligence Driven Security
INTRODUCTION
It’s a classic example of a double-edged sword -- the very same IT innovations that
increased enterprise efficiency over the past decade have created opportunities for
dangerous, nuanced cyber threats to damage the organization. As enterprise processes
grew in sophistication, so too did attacker tactics; evolving beyond rudimentary mass
malware into precisely targeted, devastatingly advanced attacks. As IT plays an
increasingly central role in fundamentally transforming business operations and
creating new opportunities and advantages, IT risk and security challenges have never
been more important to address.
RSA’s Intelligence Driven Security strategy helps organizations mitigate the risk of
operating in a digital world. Organizations can employ this strategy to deliver the
visibility, analysis, and action they need to detect, investigate, and respond to advanced
threats, confirm and manage identities, and prevent online fraud and cybercrime.
THE CHANGING BUSINESS
Not so long ago, IT’s reach was well-defined and well-controlled. Most applications
required a comparatively small amount of access, little or no information was shared
externally, and IT had near-complete control over the infrastructure for applications and
access. Then things changed. Organizations recognized they could lower costs and
increase productivity by granting third-party access to applications, and as a result,
introduced a greater number of digital identities corresponding to employees,
suppliers, and partners. To further complicate matters, the workforce brought a host of
new personal mobile devices (mobile phones, laptops, and tablets) that all required
access. Many business processes, including core functions such as IP development or
financial transaction processing transitioned partially or fully to the cloud. Today, many
former in-house tasks are conducted outside the organization’s traditional “four walls.”
Further, the explosion of digital data created by new applications and new digital
business processes dispersed over multiple silos resulted in a significantly expanded
attack surface. Potential points of vulnerability increased, and the newly hyper-
extended business struggled to adequately secure what it suddenly didn’t own,
manage, or control.
Simultaneously, hackers, politically motivated “hacktivists,” and fraudsters capitalized
on this evolution, developing more advanced attack tactics, such as moving “low and
slow” to mimic the behaviors of a normal user, while their motivations transformed
from largely notoriety-driven to objectives like stealing intellectual property. With more
points of vulnerability and a lethal combination of hacker motivation and know-how,
the possibility of a breach today is unprecedented. In fact, most authorities agree that
yesterday’s goal of preventing every intrusion is impossible, and today’s security
imperative is to detect and stop intruders before they can cause damage or loss to the
organization.
Against this backdrop of a changing business, IT, and threat landscape, there’s a
fundamental disconnect between most organizations’ in-place security processes and
an effective, contemporary approach to cyber-defense. Intelligence Driven Security is
that new strategy.
page 2
Adopting Intelligence Driven Security
“In order to keep pace with the rapidly growing number of users, devices,
and internal and external threats, intelligence driven security has evolved
from a conceptual theory to a must-have strategy for today’s enterprise. This
proliferation of access requirements by people and devices has dramatically
increased security risk; ensuring that the right systems are accessed only by
those who are authorized is driving the need for intelligence around those
behaviors.”
Chris Christiansen, IDC
WHAT MAKES AN INTELLIGENCE DRIVEN SECURITY STRATEGY
INTELLIGENT?
An Intelligence Driven Security strategy delivers three essential capabilities designed to
prevent inevitable breaches from causing damage or loss: visibility, analysis, and action.
Visibility
Organizations gain visibility by collecting data about what matters. But what matters
today and what control points still exist in today’s hyper-extended enterprises?
First is risk -- What are the risks to the organization? What are its vulnerabilities? How
well is it defending against those at any given point in time? Without visibility into risk,
organizations can’t design optimal defense strategies or appropriately prioritize
activities. Second is what’s happening on the network. Network visibility needs to go
beyond what we have today, from logs and events down to the packet and session level
to spot faint signals that indicate advanced threats. Third is digital identities.
Organizations need to understand who/what are on their networks, what they are
doing, and is that behavior appropriate. And finally, transactions – organizations need
to know what’s happening inside key applications that drive the business.
Analysis
All the data gathered to gain visibility is useless without the ability to extrapolate
insight and meaning from it. Analysis involves understanding normal state behavior
and then looking for anomalies. By knowing what is “normal,” an organization can then
spot, investigate, and root out anomalies that result from malicious activity. Once
anomalies are discovered, additional, more detailed, contextual analysis may be
required to determine the appropriate response.
Action
Action is the response to confirmed malicious anomalies. Rapid action allows
organizations to mitigate potential threats by enforcing controls such as access
restrictions or additional authentication. Action also results in remediation processes
and activity. The key to success is keeping action consistent, so each time an analysis
finds something potentially threatening; the organization can “operationalize” the
response.
page 3
Adopting Intelligence Driven Security
WHAT WOULD AN INTELLIGENCE DRIVEN SECURITY STRATEGY
LOOK LIKE?
An Intelligence Driven Security strategy places emphasis on detection, analysis, and
action while deemphasizing static, signature-based, perimeter detection. This “even-
split” approach understands the modern threat landscape and allocates resources
accordingly. This includes creating a better balance between monitoring, response
and prevention.
“Securing today’s global enterprise is a massive undertaking. With the
dissolution of the security perimeter, organizations need to take a more
intelligence-driven approach to security. Using data from systems and users to
drive decision-making can help improve the speed and efficiency of spotting
and responding to attacks and ultimately safeguard an organization’s most
important digital assets.”
William Boni, Corporate Information Security Officer (CISO) and Vice President,
Enterprise Information Security
The following charts demonstrate the difference in priorities between many of today’s
security strategies and an Intelligence Driven Security strategy.
WHAT ARE THE BENEFITS?
Aside from the critical capability to combat today’s increasingly dangerous threat
landscape, an Intelligence Driven Security strategy provides additional benefits:
Focus
Because Intelligence Driven Security drives action based on mitigating the most
pressing risks to the business, it ensures that organizations prioritize activity and
resources appropriately.
page 4
Monitoring
15%
Response
5%
Prevention
80%
Today’s Priorities
Monitoring
33%
Response
33%
Prevention
33%
Intelligence Driven
Security
Source RSA
Adopting Intelligence Driven Security
Operational Benefits
Most organizations’ in-place security systems rely on a significant number of disparate
solutions; malware analysis, identity and access management, governance, risk, and
compliance, etc. Intelligence Driven Security reduces the number of point products and
fuses together otherwise disjointed data sets and tools, increasing both security and
operational efficiency.
Risk Avoidance
With the ability to identify attacks in a more timely fashion, Intelligence Driven Security
reduces bottom line loss that often results from an undetected breach.
Staffing Benefits
It’s no secret that there exists a dearth of needed talent in the IT Security industry. An
Intelligence Driven Security strategy can aid in attracting top performers, empower them
with the right set of technologies and tools, and make their efforts more extensible
throughout the organization. Automation and sophistication aids in freeing already
overburdened employees, focusing them on what matters to defend the organization,
and can elevate average performers into vital components of a winning IT security staff.
CONSEQUENCES OF NOT ADOPTING AN INTELLIGENCE DRIVEN
SECURITY STRATEGY
While the upside is clear, there is also a significant downside for organizations who fail
to adopt an Intelligence Driven Security strategy:
Level of Exposure Rises
Every organization has something of value, including its brand, intellectual property,
and the bottom line. The inability to effectively manage today’s digital risks significantly
increases the potential for damage to this value. One devastating breach can wipe out
years of establishing steady revenue, cutting-edge research, or a trusted brand.
Falling Behind
Even if a breach never occurs, an organization that does not adopt an Intelligence
Driven Security strategy is at serious risk of jeopardizing competitiveness. An
organization that is able to effectively manage its digital risks can confidently channel
resources into growing, expanding, and differentiating via new IT initiatives, leaving
competitors behind.
Getting Started
Regardless of your current technology implementations or organizational security
maturity, a roadmap towards an Intelligence Driven Security strategy can be developed.
Current investments can be used as building blocks to a more sophisticated model.
Nearly every organization has the potential to gain the required capabilities for
visibility, analysis, and action. What’s important is not precisely where you are today,
but what next steps you take to improve. The goal should be a roadmap across people,
process, and technology to comprehensively increase maturity. The key is committing to
adopting a more Intelligence Driven Security strategy.
page 5
EMC2
, EMC, the EMC logo, RSA, Archer, FraudAction, NetWitness and the RSA logo are registered trademarks or
trademarks of EMC Corporation in the United States and other countries. Microsoft and Outlook are registered
trademarks of Microsoft. All other products or services mentioned are trademarks of their respective companies.
© Copyright 2014 EMC Corporation. All rights reserved.
H13235
ABOUT RSA
RSA, The Security Division of EMC, is the premier provider of intelligence-driven
security solutions. RSA helps the world’s leading organizations solve their most
complex and sensitive security challenges: managing organizational risk,
safeguarding mobile access and collaboration, preventing online fraud, and
defending against advanced threats. RSA delivers agile controls for identity
assurance, fraud detection, and data protection, robust Security Analytics and
industry-leading GRC capabilities, and expert consulting and advisory services.
For more information, please visit www.RSA.com.
www.rsa.com
Adopting Intelligence Driven Security
CONCLUSION
The ineffectiveness of perimeter-based security strategies and today’s increasingly
dangerous threat landscape requires a new strategy. RSA’s Intelligence Driven Security
strategy helps organizations mitigate the risk of operating in a digital world. With its
emphasis on visibility, analysis, and action, an Intelligence Driven Security strategy can
help organizations reap extraordinary benefits:
•	A balanced, modern approach to cyber security that mitigates risk
•	Deeper, granular insight into the IT environment
•	The amalgamation of previously disparate data, applications, and solutions
•	Cost savings
•	Increase employee productivity
•	Improve competitiveness
To survive, thrive, and build trust in today’s digital world, organizations need to turn to
an Intelligence Driven Security strategy.

More Related Content

What's hot

Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
Tripwire
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
at MicroFocus Italy ❖✔
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
Haystax Technology
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
Accenture Insurance
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summarypatmisasi
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureLee Dalton
 
Haystax Technology - About Us
Haystax Technology - About UsHaystax Technology - About Us
Haystax Technology - About Us
Haystax Technology
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRBill Besse
 
Information security governance
Information security governanceInformation security governance
Information security governance
Koen Maris
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Ernst & Young
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
Nexon Asia Pacific
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
Bala Guntipalli ♦ MBA
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
Hewlett Packard Enterprise Business Value Exchange
 
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEnterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
EMC
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
Christian Have
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
at MicroFocus Italy ❖✔
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
Edinburgh Napier University
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governance
digitallibrary
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
Kim Jensen
 

What's hot (20)

Sans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business MissionSans 20 CSC: Connecting Security to the Business Mission
Sans 20 CSC: Connecting Security to the Business Mission
 
A data-centric program
A data-centric program A data-centric program
A data-centric program
 
Haystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence PlatformHaystax: Actionable Intelligence Platform
Haystax: Actionable Intelligence Platform
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary2015 Scalar Security Study Executive Summary
2015 Scalar Security Study Executive Summary
 
clearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochureclearswift-adaptive-redaction-brochure
clearswift-adaptive-redaction-brochure
 
Haystax Technology - About Us
Haystax Technology - About UsHaystax Technology - About Us
Haystax Technology - About Us
 
AI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LRAI-Cyber-Security-White-Papers-06-15-LR
AI-Cyber-Security-White-Papers-06-15-LR
 
Information security governance
Information security governanceInformation security governance
Information security governance
 
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of CybercrimeCyber Threat Intelligence − How to Get Ahead of Cybercrime
Cyber Threat Intelligence − How to Get Ahead of Cybercrime
 
Whitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformationWhitepaper | Cyber resilience in the age of digital transformation
Whitepaper | Cyber resilience in the age of digital transformation
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Plan for the Worst; Fight for the Best
Plan for the Worst; Fight for the BestPlan for the Worst; Fight for the Best
Plan for the Worst; Fight for the Best
 
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is HereEnterprise Strategy Group: The Big Data Security Analytics Era is Here
Enterprise Strategy Group: The Big Data Security Analytics Era is Here
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...State of Security Operations 2016 report of capabilities and maturity of cybe...
State of Security Operations 2016 report of capabilities and maturity of cybe...
 
Security, Audit and Compliance: course overview
Security, Audit and Compliance: course overviewSecurity, Audit and Compliance: course overview
Security, Audit and Compliance: course overview
 
Developing Metrics for Information Security Governance
Developing Metrics for Information Security GovernanceDeveloping Metrics for Information Security Governance
Developing Metrics for Information Security Governance
 
Get Prepared
Get PreparedGet Prepared
Get Prepared
 
Protecting Essential Information
Protecting Essential InformationProtecting Essential Information
Protecting Essential Information
 

Viewers also liked

Block mexico conquest
Block mexico conquestBlock mexico conquest
Block mexico conquestTravis Klein
 
Wealth creation and academic health science networks emc aridhia and pivotal 0
Wealth creation and academic health science networks emc aridhia and pivotal  0Wealth creation and academic health science networks emc aridhia and pivotal  0
Wealth creation and academic health science networks emc aridhia and pivotal 0EMC
 
Thurs review latin amer and europe
Thurs review latin amer and europeThurs review latin amer and europe
Thurs review latin amer and europeTravis Klein
 
Webdays blida mobile top 10 risks
Webdays blida   mobile top 10 risksWebdays blida   mobile top 10 risks
Webdays blida mobile top 10 risks
Islam Azeddine Mennouchi
 
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...Dr. Raju M. Mathew
 
ISTE Ignite: Educating digital youth
ISTE Ignite: Educating digital youthISTE Ignite: Educating digital youth
ISTE Ignite: Educating digital youth
Tech with Intent
 
New Skills for the Service-Oriented IT Organization
New Skills for the Service-Oriented IT OrganizationNew Skills for the Service-Oriented IT Organization
New Skills for the Service-Oriented IT Organization
EMC
 
Answer f4-learning-area-3-ict
Answer f4-learning-area-3-ictAnswer f4-learning-area-3-ict
Answer f4-learning-area-3-ictzahrahar
 
Introduction To Maxtable
Introduction To MaxtableIntroduction To Maxtable
Introduction To Maxtable
maxtable
 
Mobile Innovations Workshop
Mobile Innovations WorkshopMobile Innovations Workshop
Mobile Innovations Workshop
Research Now
 
Seize ICT enabledTransformation
Seize ICT enabledTransformationSeize ICT enabledTransformation
Seize ICT enabledTransformationRene Summer
 
Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012htisnj
 
Spending multipliers
Spending multipliersSpending multipliers
Spending multipliersTravis Klein
 
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
EMC
 
13 tipos de_memoria
13 tipos de_memoria13 tipos de_memoria
13 tipos de_memoria
Diana Sanchez
 
The Industrial Internet@Work
The Industrial Internet@WorkThe Industrial Internet@Work
The Industrial Internet@Work
EMC
 
Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013
Rene Summer
 

Viewers also liked (20)

Block mexico conquest
Block mexico conquestBlock mexico conquest
Block mexico conquest
 
Wealth creation and academic health science networks emc aridhia and pivotal 0
Wealth creation and academic health science networks emc aridhia and pivotal  0Wealth creation and academic health science networks emc aridhia and pivotal  0
Wealth creation and academic health science networks emc aridhia and pivotal 0
 
Thurs review latin amer and europe
Thurs review latin amer and europeThurs review latin amer and europe
Thurs review latin amer and europe
 
Webdays blida mobile top 10 risks
Webdays blida   mobile top 10 risksWebdays blida   mobile top 10 risks
Webdays blida mobile top 10 risks
 
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
TECHNIQUES TO KEEP MEN AND WOMEN YOUNG, SEXY AND HAPPY FOR PEACE AND PROSPERI...
 
ISTE Ignite: Educating digital youth
ISTE Ignite: Educating digital youthISTE Ignite: Educating digital youth
ISTE Ignite: Educating digital youth
 
New Skills for the Service-Oriented IT Organization
New Skills for the Service-Oriented IT OrganizationNew Skills for the Service-Oriented IT Organization
New Skills for the Service-Oriented IT Organization
 
Answer f4-learning-area-3-ict
Answer f4-learning-area-3-ictAnswer f4-learning-area-3-ict
Answer f4-learning-area-3-ict
 
отчётммо 3
отчётммо  3отчётммо  3
отчётммо 3
 
Introduction To Maxtable
Introduction To MaxtableIntroduction To Maxtable
Introduction To Maxtable
 
Eq price monday
Eq price mondayEq price monday
Eq price monday
 
Mobile Innovations Workshop
Mobile Innovations WorkshopMobile Innovations Workshop
Mobile Innovations Workshop
 
Seize ICT enabledTransformation
Seize ICT enabledTransformationSeize ICT enabledTransformation
Seize ICT enabledTransformation
 
Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012Holy Trinity School HSA Overview 2012
Holy Trinity School HSA Overview 2012
 
Spending multipliers
Spending multipliersSpending multipliers
Spending multipliers
 
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
Analyst Report: EMA - The Industrialization of Fraud Demands a Dynamic Intell...
 
Min wage 2014
Min wage 2014Min wage 2014
Min wage 2014
 
13 tipos de_memoria
13 tipos de_memoria13 tipos de_memoria
13 tipos de_memoria
 
The Industrial Internet@Work
The Industrial Internet@WorkThe Industrial Internet@Work
The Industrial Internet@Work
 
Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013Ict policy for Networked Society - GCC Dec 2013
Ict policy for Networked Society - GCC Dec 2013
 

Similar to Adopting Intelligence-Driven Security

security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdf
gokuforhelp
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
Symantec
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
SAHANAHK
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Accenture Technology
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
Anil
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
forladies
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
Skillmine Technology Consulting
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
Skillmine Technology Consulting
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
DMIMarketing
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptx
CompanySeceon
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
DMIMarketing
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
SOCVault
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
Booz Allen Hamilton
 
Threat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperThreat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperDuncan Hart
 
threat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperthreat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperRudy Piekarski
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
Sirius
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
Keith Braswell
 
Risk Management
Risk ManagementRisk Management
Risk Management
ijtsrd
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security Success
SecurityOn-Demand
 

Similar to Adopting Intelligence-Driven Security (20)

security-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdfsecurity-team-guide-reducing-operational-risk.pdf
security-team-guide-reducing-operational-risk.pdf
 
Symantec cyber-resilience
Symantec cyber-resilienceSymantec cyber-resilience
Symantec cyber-resilience
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
Continuous Cyber Attacks: Engaging Business Leaders for the New Normal - Full...
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Cyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdfCyber-Security-Whitepaper.pdf
Cyber-Security-Whitepaper.pdf
 
Information Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdfInformation Securityfind an article online discussing defense-in-d.pdf
Information Securityfind an article online discussing defense-in-d.pdf
 
Measures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacksMeasures to Avoid Cyber-attacks
Measures to Avoid Cyber-attacks
 
Measure To Avoid Cyber Attacks
Measure To Avoid Cyber AttacksMeasure To Avoid Cyber Attacks
Measure To Avoid Cyber Attacks
 
5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management5 Steps to Mobile Risk Management
5 Steps to Mobile Risk Management
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptx
 
Mobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk ManagementMobile Security: 5 Steps to Mobile Risk Management
Mobile Security: 5 Steps to Mobile Risk Management
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
Threat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperThreat Lifecycle Management_Whitepaper
Threat Lifecycle Management_Whitepaper
 
threat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperthreat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaper
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
3 guiding priciples to improve data security
3 guiding priciples to improve data security3 guiding priciples to improve data security
3 guiding priciples to improve data security
 
Risk Management
Risk ManagementRisk Management
Risk Management
 
Understanding the 8 Keys to Security Success
Understanding the 8 Keys to Security SuccessUnderstanding the 8 Keys to Security Success
Understanding the 8 Keys to Security Success
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
EMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
EMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
EMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
EMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
EMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
EMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
EMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
EMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 

Recently uploaded (20)

Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

Adopting Intelligence-Driven Security

  • 1. ADOPTING INTELLIGENCE DRIVEN SECURITY A Security Strategy to Help Build Trust in the Digital World RSA Whitepaper INTELLIGENCE DRIVEN SECURITY Today’s changing business requirements, exciting IT innovations, and the dynamic threat landscape underscore the need for a modern security strategy that updates security processes to achieve a more effective approach to cyber-defense. This paper provides guidance for how to adopt an Intelligence Driven Security strategy that delivers three essential capabilities; visibility, analysis, and action. These capabilities can help detect, investigate, and respond to advanced threats, confirm and manage identities, and prevent online fraud and cybercrime. This strategy empowers organizations to effectively address the challenges they have today and those still beyond the horizon.
  • 2. Adopting Intelligence Driven Security INTRODUCTION It’s a classic example of a double-edged sword -- the very same IT innovations that increased enterprise efficiency over the past decade have created opportunities for dangerous, nuanced cyber threats to damage the organization. As enterprise processes grew in sophistication, so too did attacker tactics; evolving beyond rudimentary mass malware into precisely targeted, devastatingly advanced attacks. As IT plays an increasingly central role in fundamentally transforming business operations and creating new opportunities and advantages, IT risk and security challenges have never been more important to address. RSA’s Intelligence Driven Security strategy helps organizations mitigate the risk of operating in a digital world. Organizations can employ this strategy to deliver the visibility, analysis, and action they need to detect, investigate, and respond to advanced threats, confirm and manage identities, and prevent online fraud and cybercrime. THE CHANGING BUSINESS Not so long ago, IT’s reach was well-defined and well-controlled. Most applications required a comparatively small amount of access, little or no information was shared externally, and IT had near-complete control over the infrastructure for applications and access. Then things changed. Organizations recognized they could lower costs and increase productivity by granting third-party access to applications, and as a result, introduced a greater number of digital identities corresponding to employees, suppliers, and partners. To further complicate matters, the workforce brought a host of new personal mobile devices (mobile phones, laptops, and tablets) that all required access. Many business processes, including core functions such as IP development or financial transaction processing transitioned partially or fully to the cloud. Today, many former in-house tasks are conducted outside the organization’s traditional “four walls.” Further, the explosion of digital data created by new applications and new digital business processes dispersed over multiple silos resulted in a significantly expanded attack surface. Potential points of vulnerability increased, and the newly hyper- extended business struggled to adequately secure what it suddenly didn’t own, manage, or control. Simultaneously, hackers, politically motivated “hacktivists,” and fraudsters capitalized on this evolution, developing more advanced attack tactics, such as moving “low and slow” to mimic the behaviors of a normal user, while their motivations transformed from largely notoriety-driven to objectives like stealing intellectual property. With more points of vulnerability and a lethal combination of hacker motivation and know-how, the possibility of a breach today is unprecedented. In fact, most authorities agree that yesterday’s goal of preventing every intrusion is impossible, and today’s security imperative is to detect and stop intruders before they can cause damage or loss to the organization. Against this backdrop of a changing business, IT, and threat landscape, there’s a fundamental disconnect between most organizations’ in-place security processes and an effective, contemporary approach to cyber-defense. Intelligence Driven Security is that new strategy. page 2
  • 3. Adopting Intelligence Driven Security “In order to keep pace with the rapidly growing number of users, devices, and internal and external threats, intelligence driven security has evolved from a conceptual theory to a must-have strategy for today’s enterprise. This proliferation of access requirements by people and devices has dramatically increased security risk; ensuring that the right systems are accessed only by those who are authorized is driving the need for intelligence around those behaviors.” Chris Christiansen, IDC WHAT MAKES AN INTELLIGENCE DRIVEN SECURITY STRATEGY INTELLIGENT? An Intelligence Driven Security strategy delivers three essential capabilities designed to prevent inevitable breaches from causing damage or loss: visibility, analysis, and action. Visibility Organizations gain visibility by collecting data about what matters. But what matters today and what control points still exist in today’s hyper-extended enterprises? First is risk -- What are the risks to the organization? What are its vulnerabilities? How well is it defending against those at any given point in time? Without visibility into risk, organizations can’t design optimal defense strategies or appropriately prioritize activities. Second is what’s happening on the network. Network visibility needs to go beyond what we have today, from logs and events down to the packet and session level to spot faint signals that indicate advanced threats. Third is digital identities. Organizations need to understand who/what are on their networks, what they are doing, and is that behavior appropriate. And finally, transactions – organizations need to know what’s happening inside key applications that drive the business. Analysis All the data gathered to gain visibility is useless without the ability to extrapolate insight and meaning from it. Analysis involves understanding normal state behavior and then looking for anomalies. By knowing what is “normal,” an organization can then spot, investigate, and root out anomalies that result from malicious activity. Once anomalies are discovered, additional, more detailed, contextual analysis may be required to determine the appropriate response. Action Action is the response to confirmed malicious anomalies. Rapid action allows organizations to mitigate potential threats by enforcing controls such as access restrictions or additional authentication. Action also results in remediation processes and activity. The key to success is keeping action consistent, so each time an analysis finds something potentially threatening; the organization can “operationalize” the response. page 3
  • 4. Adopting Intelligence Driven Security WHAT WOULD AN INTELLIGENCE DRIVEN SECURITY STRATEGY LOOK LIKE? An Intelligence Driven Security strategy places emphasis on detection, analysis, and action while deemphasizing static, signature-based, perimeter detection. This “even- split” approach understands the modern threat landscape and allocates resources accordingly. This includes creating a better balance between monitoring, response and prevention. “Securing today’s global enterprise is a massive undertaking. With the dissolution of the security perimeter, organizations need to take a more intelligence-driven approach to security. Using data from systems and users to drive decision-making can help improve the speed and efficiency of spotting and responding to attacks and ultimately safeguard an organization’s most important digital assets.” William Boni, Corporate Information Security Officer (CISO) and Vice President, Enterprise Information Security The following charts demonstrate the difference in priorities between many of today’s security strategies and an Intelligence Driven Security strategy. WHAT ARE THE BENEFITS? Aside from the critical capability to combat today’s increasingly dangerous threat landscape, an Intelligence Driven Security strategy provides additional benefits: Focus Because Intelligence Driven Security drives action based on mitigating the most pressing risks to the business, it ensures that organizations prioritize activity and resources appropriately. page 4 Monitoring 15% Response 5% Prevention 80% Today’s Priorities Monitoring 33% Response 33% Prevention 33% Intelligence Driven Security Source RSA
  • 5. Adopting Intelligence Driven Security Operational Benefits Most organizations’ in-place security systems rely on a significant number of disparate solutions; malware analysis, identity and access management, governance, risk, and compliance, etc. Intelligence Driven Security reduces the number of point products and fuses together otherwise disjointed data sets and tools, increasing both security and operational efficiency. Risk Avoidance With the ability to identify attacks in a more timely fashion, Intelligence Driven Security reduces bottom line loss that often results from an undetected breach. Staffing Benefits It’s no secret that there exists a dearth of needed talent in the IT Security industry. An Intelligence Driven Security strategy can aid in attracting top performers, empower them with the right set of technologies and tools, and make their efforts more extensible throughout the organization. Automation and sophistication aids in freeing already overburdened employees, focusing them on what matters to defend the organization, and can elevate average performers into vital components of a winning IT security staff. CONSEQUENCES OF NOT ADOPTING AN INTELLIGENCE DRIVEN SECURITY STRATEGY While the upside is clear, there is also a significant downside for organizations who fail to adopt an Intelligence Driven Security strategy: Level of Exposure Rises Every organization has something of value, including its brand, intellectual property, and the bottom line. The inability to effectively manage today’s digital risks significantly increases the potential for damage to this value. One devastating breach can wipe out years of establishing steady revenue, cutting-edge research, or a trusted brand. Falling Behind Even if a breach never occurs, an organization that does not adopt an Intelligence Driven Security strategy is at serious risk of jeopardizing competitiveness. An organization that is able to effectively manage its digital risks can confidently channel resources into growing, expanding, and differentiating via new IT initiatives, leaving competitors behind. Getting Started Regardless of your current technology implementations or organizational security maturity, a roadmap towards an Intelligence Driven Security strategy can be developed. Current investments can be used as building blocks to a more sophisticated model. Nearly every organization has the potential to gain the required capabilities for visibility, analysis, and action. What’s important is not precisely where you are today, but what next steps you take to improve. The goal should be a roadmap across people, process, and technology to comprehensively increase maturity. The key is committing to adopting a more Intelligence Driven Security strategy. page 5
  • 6. EMC2 , EMC, the EMC logo, RSA, Archer, FraudAction, NetWitness and the RSA logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries. Microsoft and Outlook are registered trademarks of Microsoft. All other products or services mentioned are trademarks of their respective companies. © Copyright 2014 EMC Corporation. All rights reserved. H13235 ABOUT RSA RSA, The Security Division of EMC, is the premier provider of intelligence-driven security solutions. RSA helps the world’s leading organizations solve their most complex and sensitive security challenges: managing organizational risk, safeguarding mobile access and collaboration, preventing online fraud, and defending against advanced threats. RSA delivers agile controls for identity assurance, fraud detection, and data protection, robust Security Analytics and industry-leading GRC capabilities, and expert consulting and advisory services. For more information, please visit www.RSA.com. www.rsa.com Adopting Intelligence Driven Security CONCLUSION The ineffectiveness of perimeter-based security strategies and today’s increasingly dangerous threat landscape requires a new strategy. RSA’s Intelligence Driven Security strategy helps organizations mitigate the risk of operating in a digital world. With its emphasis on visibility, analysis, and action, an Intelligence Driven Security strategy can help organizations reap extraordinary benefits: • A balanced, modern approach to cyber security that mitigates risk • Deeper, granular insight into the IT environment • The amalgamation of previously disparate data, applications, and solutions • Cost savings • Increase employee productivity • Improve competitiveness To survive, thrive, and build trust in today’s digital world, organizations need to turn to an Intelligence Driven Security strategy.