The Agile IT security
Everything changed 
Mobile 
Outsource 
Social 
Consumerization 
Business 
IT User
Today: overweight of control 
Tomorrow: contextual security 
CONTROL 
OBSERVATION 
External 
Internal
The benefits of contextual security 
Bureaucracy 
Costs 
Staff Morale 
IT Agility 
Security 
Source: Gartner
eCSI principles 
1 Transparency 
2 Accountability 
3 Responsibility 
4 Proportionality 
5 Adaptability 
WHAT YOU NEED IS: 
Real-time 
monitoring
How 
monitoring 
complements 
control? 
HIGH-QUALITY 
MONITORING 
REAL-TIME 
REACTION 
INTELLIGENT 
DATA ANALYSIS
Prevention by monitoring 
1 2 3 4 5 6 7 8 9 
Prevention Forensics
BalaBit eCSI Suite 
Blindspotter 
Syslog-ng Shell Control Box 
• Reliable logging 
• Wide range of sources 
• High-performance 
• Independent data source 
• Detailed footage 
• Control functions 
• Social network model 
• Real-time dashboards 
• Priority list 
• Zoom function 
• Run-on authentication 
• Privacy warranty
END

eCSI - The Agile IT security

  • 1.
    The Agile ITsecurity
  • 2.
    Everything changed Mobile Outsource Social Consumerization Business IT User
  • 3.
    Today: overweight ofcontrol Tomorrow: contextual security CONTROL OBSERVATION External Internal
  • 4.
    The benefits ofcontextual security Bureaucracy Costs Staff Morale IT Agility Security Source: Gartner
  • 5.
    eCSI principles 1Transparency 2 Accountability 3 Responsibility 4 Proportionality 5 Adaptability WHAT YOU NEED IS: Real-time monitoring
  • 6.
    How monitoring complements control? HIGH-QUALITY MONITORING REAL-TIME REACTION INTELLIGENT DATA ANALYSIS
  • 7.
    Prevention by monitoring 1 2 3 4 5 6 7 8 9 Prevention Forensics
  • 8.
    BalaBit eCSI Suite Blindspotter Syslog-ng Shell Control Box • Reliable logging • Wide range of sources • High-performance • Independent data source • Detailed footage • Control functions • Social network model • Real-time dashboards • Priority list • Zoom function • Run-on authentication • Privacy warranty
  • 9.

Editor's Notes

  • #3 The megatrends of consumerization, mobile, social, and cloud are radically transforming the relationship between IT, the business, and individual users. Nowadays, IT security is the biggest obstacle in adopting new information technologies while they are the most important factor of competitiveness.
  • #4 Nowadays, companies concentrate their IT security resources to controlling tools and to external risk factors. But the ‘control’ itself isn’t enough, sometimes even harmful. We will show that you should put more emphasis on observation and - in case of internal users - mitigation of control. We present you the eCSI, an out-of-the-box security concept for facing this problem and to solve it business-friendly without bad compromises. Access control defeats its own purpose way too often. Because of its inflexibility it is not able to eliminate breaches, though it can seem a very appropriate response. In most cases, IT security is set into a bad compromise where it cannot encumber a determined attacker but moderately push the business back.
  • #5 Our eCSI concept is very similar to Gartner’s “Security Free State” concept. They also name it people centric security. I borrowed this slide from Gartner to present you the benefits of a monitoring based security concept.
  • #6 What you need is a written policy with sanctions and the knowledge what is happening.
  • #7 Control tools are the most simple and popular tools for prevention. But as we mentioned
  • #8 The observation (or intelligence) system can be used both for forensics and prevention. The different is only in the data processing. A quick forensics of a suspicious event opens the door to prevent a real incident.