SlideShare a Scribd company logo
1 of 33
Download to read offline
EYES WIDE
SHUT:
Cybersecurity Smoke & Mirrors
and the
Dawn of Cyber Transparency
A Stash Global Presentation
www.stash.global
STASH Datacentric
Technology Solution
Eradicating Data Compromise
& Delivering Protected Data
Management at the Data Byte Level
• Proactive
• Agnostic
• Persistent
• Autonomous
• Controlled Access
• Zero Trust
• Quantum-resistant
• Security
• Privacy
• Resilience
• Governance
State of the State
“The trends fueling the data-centric world include
a proliferation of cloud computing, the growth of
AI and analytics, and cloudification of the
network and the edge.”
- Intel 2019
Security Drivers 2020 >
4. Talent deficit in both
cloud and security fuels
product-for- people
substitutions
• 69% of enterprise
executives believe artificial
intelligence will be
necessary to respond to
cyber attacks
• Pro-serv, Managed
Services, and AI/ML
automation critical to
augment or stretch
available resources
1. Increasing
enterprise
vulnerability due to
growth of cloud
migration, mobile
endpoints, and IoT
devices
• Forcing evolution
of entire security
stack, deployment,
and purchasing
models
2. Resurgent privacy
and other regulations
fueled by the
surveillance economy
backlash, third party
risk awareness, and
unrelenting hacks
• GDPR, CCPA, and
CMMC are
harbingers of more
to come
3. Attack surface
expansion accelerates
with IoT/OT
proliferation, DevOps
adoption, and third-
party relationships
• Porous perimeters,
poor IT hygiene, failure
to accept cloud
responsibility, and
security awareness
deficits enable exploits
AGC Partners 2020
Digital Revolution Security Impact
1. Security is eroding as
an inhibitor of cloud
deployment
• Cloud currently supports
49% of enterprise
workloads, increasing to
74% by 2021
• More enterprises are
using cloud services for
complex, mission-critical,
and high-risk
applications
2. Enterprise & cloud providers
must manage security together
• Cloud providers are
responsible for physical hosts,
networks, and data centers
• Enterprises retain
responsibility for user identity
and access management
rules, data security and
handling policies, and
application security practices
3. Hyperscalers increasingly
add functionality and eye
on-prem incursion
• Most enterprises look outside
of hyperscalers for their
security options, but
hyperscalers (AWS, Google,
Microsoft et. al.) are looking to
penetrate and capture on-
prem environments with
‘cloud to ground’ initiatives
AGC Partners 2020
More is Less
(the downside to too many increasingly pervasive, intelligent,
contextual technology applications and tools)
More Choice
• Integration Issues
• Compatibility
• New Holes
More Intrusive
• Less Willing to Use
• Privacy Backlash
• Weakened Security
Integrity
More Connected
• Increased Threat
Frontier
• New Attack Vectors
• Elevated Attack
Severity
Where
We’ve Been
DEFENSE
DEFENSE
DEFENSE!
Where We Are At
Higher Walls | Deeper Moats | Wider Fences | Trickier Traps
Exuberantly
Abundant
Cybersecurity
Marketplace
Tools
• Analytical
• Predictive
• Reactive
• Deflection
• Defensive
What do these tools actually do?
(protect the pipes. not the water.)
“Perimeter”? Nope.
Endpoint Infrastructure Network Cloud
Servers Platforms Applications
People (we are
our own worst
enemies)
Cyber Fatigue
• 5,000 Security Companies Launched in
the last 4 years
• 185+ Million Reported Breaches
• According to the FBI’s Internet Crime
Complaint Center (IC3) the number of
cybercrimes reported account for only
10-12% of the actual number
occurring.
Smoke &
Mirrors
• More of the same Mantras
• Options masquerading as
Solutions
• Claims ≠ Proof
• One way in, no way Out
• Complicated
• Expensive
• Trust
156
Enterprise average # of
tools in use
Where We Are Going
Datacentric | Governance | Zero Trust | Consolidation
Buzz
AI
Combines large amounts
of data through iterative
processing and intelligent
algorithms to help
computer learn more
efficiently
Applications Examples:
Chatbots
Google Maps
Voice Assistant
ML
Uses efficient programs
that use data to ‘self-
learn’ without having to
be explicitly instructed
Application Examples:
Recommendation
Engines
Email Spam Detection
Self-driving Vehicles
Blockchain
Digital ledger used to
record transactions across
many computers so that
transactions become
static and cannot be
altered retroactively
Application Examples:
Real Estate
Digital Currency
Airlines
“Most of the stack we've spent decades trying to
maintain is just a big, unmanageable pile of
duplicative, inflexible code.”
- Alan Morrison, Sr. Research Fellow,
New Services and Emerging Tech, PwC on Dave McComb’s
(Semantic Arts) articulation of the problem in 'Software Wasteland’
and the solution in 'The Data-Centric Revolution’
Application Centric vs Datacentric
The same kind of sprawl is
affecting Cybersecurity
• What does it mean to be application-centric?
• In the case of data breaches, we’re getting in
the way of solving the problem
• We support the status quo, by perpetuating
methods that cause sprawl, error proliferation,
vulnerability proliferation and a lack of
transparency.
• It means we are a part of the problem we’ve
had for nearly 30 years.
• Making data the central theme of business
will make it proactively more useable,
protectable, less expensive to interact with
and shorten our paths to profitable discovery.
Alan Morrison PwC
The consequence of App Centric system level complexity and
disconnectedness: table and code sprawl, integration
insecurity, business inertia
Application
Centric
Security Risk? Yes.
But that’s not all.
Business becomes about
the system, not the data.
Compound
Complexity
Integration
Tax
Arbitrary Data
Models
Unsupportable
Costs
Data Centric
Minimizes $ loss
expectancy from data
compromise to lowest
possibility.
Business shifts from
building, integrating,
testing, upgrading
systems to focus on the
money maker: your
unique business data.
Non-disruptive
Higher
Productivity/
Reduced Effort
Bolster or
Replace Legacy
System Costs:
High ROI
Streamlined
Expand/Claw
Back Market
Share
Security Influencers
32B connected devices.
80B soon.
2020-2025
80% Internet of Objects
12% Connected Information Devices
6% M2M
2% Wearables
Users, Windows,
and Websites,
Oh My
62%
51%
Sources: Spotlight | Cisco | Alert Logic
McAfee | Symantec
Things Change.
Things Stay
the Same.
Sources: Spotlight | Cisco | Alert Logic
McAfee | Symantec
The Majority of
Business Data is
Unstructured
It will be 80-95% in a few years
Breaches Up
Records Exposed Down?
Who is Responsible?
Cloud Vendors
Security OF the Cloud
Organizations
Security of What’s IN the Cloud
Holy Grail
Backdoors
Who Holds the Keys
Never Trust Always Verify
Least Access
Trends 2020 >
What Enterprise Wants
• Data Focused Security
• Consolidated All-in-One
• Buy and Consume not Build
• No Integration Required
• Agnostic
• Autonomous
• Bolsters or Replaces Legacy Tools
• Minimal Latency
• Cost Effective
• Minimal Friction Deployment
• Business as Usual UX
Security Market
Disruption
(simplify to excel)
The security landscape is highly
crowded and fragmented with
one off tools that are ‘more of
the same’
• More than 5,000 vendors are in
the market today, most that
recede to features far more often
than expand to solutions.
• Commercial CEOs, CISOs, DSOs,
CDOs and Government
counterparts who are informed
and agile buyers will seize a
golden opportunity to activate
data centric security solutions now
to reap earliest and on-going
rewards.
Find Out More About What a Datacentric
Solution Can Do For Your Organization
Read:
stash.global
Watch:
National Security Begins With Data Security
Write or Call:
john.dundas@stash.global | +1.774.216.1375
2018 2019 2020
2020 WINNER
PRESENTED BY:
www.bintelligence.com
STASH®
Quantum-Resistant
Data Security Solution

More Related Content

What's hot

A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things NetIQ
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security Inside Analysis
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityDell EMC World
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big dataPeter Wood
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Keith Kraus
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanNetIQ
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramNetIQ
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBookPablo Junco
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...FaithWestdorp
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaborationcentralohioissa
 
Mobile Unified Communications - Mitel
Mobile Unified Communications - MitelMobile Unified Communications - Mitel
Mobile Unified Communications - MitelMarcoTechnologies
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Frameworkcentralohioissa
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIAhmed Banafa
 
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Intralinks
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Kenneth de Brucq
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene Microsoft
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715Jim Romeo
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid finalDevOps.com
 

What's hot (20)

Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...Insights success the 10 most trusted networking solution provider companies 2...
Insights success the 10 most trusted networking solution provider companies 2...
 
A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things A Smarter, More Secure Internet of Things
A Smarter, More Secure Internet of Things
 
To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security To Serve and Protect: Making Sense of Hadoop Security
To Serve and Protect: Making Sense of Hadoop Security
 
MT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in CybersecurityMT 117 Key Innovations in Cybersecurity
MT 117 Key Innovations in Cybersecurity
 
Advanced threat protection and big data
Advanced threat protection and big dataAdvanced threat protection and big data
Advanced threat protection and big data
 
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
Streaming Cyber Security into Graph: Accelerating Data into DataStax Graph an...
 
Scrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky CleanScrubbing Your Active Directory Squeaky Clean
Scrubbing Your Active Directory Squeaky Clean
 
Building A Cloud-Ready Security Program
Building A Cloud-Ready Security ProgramBuilding A Cloud-Ready Security Program
Building A Cloud-Ready Security Program
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...Elastic's recommendation on keeping services up and running with real-time vi...
Elastic's recommendation on keeping services up and running with real-time vi...
 
Helen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry CollaborationHelen Patton - Cross-Industry Collaboration
Helen Patton - Cross-Industry Collaboration
 
Mobile Unified Communications - Mitel
Mobile Unified Communications - MitelMobile Unified Communications - Mitel
Mobile Unified Communications - Mitel
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
First line of defense for cybersecurity : AI
First line of defense for cybersecurity : AIFirst line of defense for cybersecurity : AI
First line of defense for cybersecurity : AI
 
IoT in industry
IoT in industryIoT in industry
IoT in industry
 
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
Direct Edge and BATS Global Markets Trusts Intralinks Dealspace™
 
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
Dell Solutions Tour 2015 - Security in the cloud, Ramses Gallego, Security St...
 
7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 

Similar to Eyes Wide Shut: Cybersecurity Smoke & Mirrors...

Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving servicesCloudMask inc.
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? Jorge García
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Tudor Damian
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance InstituteHenrique Centieiro
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurityMatthew Rosenquist
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7Mark Interrante
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainDavid J Rosenthal
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityEnterprise Management Associates
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Minh Le
 
IBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Software India
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckPrecisely
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 

Similar to Eyes Wide Shut: Cybersecurity Smoke & Mirrors... (20)

Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
Protect your confidential information while improving services
Protect your confidential information while improving servicesProtect your confidential information while improving services
Protect your confidential information while improving services
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity -  Chartered Insurance InstituteInsurtech, Cloud and Cybersecurity -  Chartered Insurance Institute
Insurtech, Cloud and Cybersecurity - Chartered Insurance Institute
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity2014 the future evolution of cybersecurity
2014 the future evolution of cybersecurity
 
HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7HP2065_TieCon_Presentation_V7
HP2065_TieCon_Presentation_V7
 
Protect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chainProtect your hybrid workforce across the attack chain
Protect your hybrid workforce across the attack chain
 
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. RealityNavigating Today’s Threat Landscape: Discussing Hype vs. Reality
Navigating Today’s Threat Landscape: Discussing Hype vs. Reality
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
Empowering the business while efficiently mitigating risks - Eva Chen (Trend ...
 
IBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day KeynoteIBM Solutions Connect 2013 IT Day Keynote
IBM Solutions Connect 2013 IT Day Keynote
 
Navigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar DeckNavigating Cloud Trends in 2024 Webinar Deck
Navigating Cloud Trends in 2024 Webinar Deck
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 

Recently uploaded

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Recently uploaded (20)

Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Eyes Wide Shut: Cybersecurity Smoke & Mirrors...

  • 1. EYES WIDE SHUT: Cybersecurity Smoke & Mirrors and the Dawn of Cyber Transparency A Stash Global Presentation www.stash.global
  • 2. STASH Datacentric Technology Solution Eradicating Data Compromise & Delivering Protected Data Management at the Data Byte Level • Proactive • Agnostic • Persistent • Autonomous • Controlled Access • Zero Trust • Quantum-resistant • Security • Privacy • Resilience • Governance
  • 3. State of the State
  • 4. “The trends fueling the data-centric world include a proliferation of cloud computing, the growth of AI and analytics, and cloudification of the network and the edge.” - Intel 2019
  • 5. Security Drivers 2020 > 4. Talent deficit in both cloud and security fuels product-for- people substitutions • 69% of enterprise executives believe artificial intelligence will be necessary to respond to cyber attacks • Pro-serv, Managed Services, and AI/ML automation critical to augment or stretch available resources 1. Increasing enterprise vulnerability due to growth of cloud migration, mobile endpoints, and IoT devices • Forcing evolution of entire security stack, deployment, and purchasing models 2. Resurgent privacy and other regulations fueled by the surveillance economy backlash, third party risk awareness, and unrelenting hacks • GDPR, CCPA, and CMMC are harbingers of more to come 3. Attack surface expansion accelerates with IoT/OT proliferation, DevOps adoption, and third- party relationships • Porous perimeters, poor IT hygiene, failure to accept cloud responsibility, and security awareness deficits enable exploits AGC Partners 2020
  • 6. Digital Revolution Security Impact 1. Security is eroding as an inhibitor of cloud deployment • Cloud currently supports 49% of enterprise workloads, increasing to 74% by 2021 • More enterprises are using cloud services for complex, mission-critical, and high-risk applications 2. Enterprise & cloud providers must manage security together • Cloud providers are responsible for physical hosts, networks, and data centers • Enterprises retain responsibility for user identity and access management rules, data security and handling policies, and application security practices 3. Hyperscalers increasingly add functionality and eye on-prem incursion • Most enterprises look outside of hyperscalers for their security options, but hyperscalers (AWS, Google, Microsoft et. al.) are looking to penetrate and capture on- prem environments with ‘cloud to ground’ initiatives AGC Partners 2020
  • 7. More is Less (the downside to too many increasingly pervasive, intelligent, contextual technology applications and tools) More Choice • Integration Issues • Compatibility • New Holes More Intrusive • Less Willing to Use • Privacy Backlash • Weakened Security Integrity More Connected • Increased Threat Frontier • New Attack Vectors • Elevated Attack Severity
  • 9. Where We Are At Higher Walls | Deeper Moats | Wider Fences | Trickier Traps
  • 11. Tools • Analytical • Predictive • Reactive • Deflection • Defensive
  • 12. What do these tools actually do? (protect the pipes. not the water.)
  • 13. “Perimeter”? Nope. Endpoint Infrastructure Network Cloud Servers Platforms Applications People (we are our own worst enemies)
  • 14. Cyber Fatigue • 5,000 Security Companies Launched in the last 4 years • 185+ Million Reported Breaches • According to the FBI’s Internet Crime Complaint Center (IC3) the number of cybercrimes reported account for only 10-12% of the actual number occurring.
  • 15. Smoke & Mirrors • More of the same Mantras • Options masquerading as Solutions • Claims ≠ Proof • One way in, no way Out • Complicated • Expensive • Trust
  • 16. 156 Enterprise average # of tools in use
  • 17. Where We Are Going Datacentric | Governance | Zero Trust | Consolidation
  • 18. Buzz AI Combines large amounts of data through iterative processing and intelligent algorithms to help computer learn more efficiently Applications Examples: Chatbots Google Maps Voice Assistant ML Uses efficient programs that use data to ‘self- learn’ without having to be explicitly instructed Application Examples: Recommendation Engines Email Spam Detection Self-driving Vehicles Blockchain Digital ledger used to record transactions across many computers so that transactions become static and cannot be altered retroactively Application Examples: Real Estate Digital Currency Airlines
  • 19. “Most of the stack we've spent decades trying to maintain is just a big, unmanageable pile of duplicative, inflexible code.” - Alan Morrison, Sr. Research Fellow, New Services and Emerging Tech, PwC on Dave McComb’s (Semantic Arts) articulation of the problem in 'Software Wasteland’ and the solution in 'The Data-Centric Revolution’
  • 20. Application Centric vs Datacentric The same kind of sprawl is affecting Cybersecurity • What does it mean to be application-centric? • In the case of data breaches, we’re getting in the way of solving the problem • We support the status quo, by perpetuating methods that cause sprawl, error proliferation, vulnerability proliferation and a lack of transparency. • It means we are a part of the problem we’ve had for nearly 30 years. • Making data the central theme of business will make it proactively more useable, protectable, less expensive to interact with and shorten our paths to profitable discovery. Alan Morrison PwC The consequence of App Centric system level complexity and disconnectedness: table and code sprawl, integration insecurity, business inertia
  • 21. Application Centric Security Risk? Yes. But that’s not all. Business becomes about the system, not the data. Compound Complexity Integration Tax Arbitrary Data Models Unsupportable Costs
  • 22. Data Centric Minimizes $ loss expectancy from data compromise to lowest possibility. Business shifts from building, integrating, testing, upgrading systems to focus on the money maker: your unique business data. Non-disruptive Higher Productivity/ Reduced Effort Bolster or Replace Legacy System Costs: High ROI Streamlined Expand/Claw Back Market Share
  • 24. 32B connected devices. 80B soon. 2020-2025 80% Internet of Objects 12% Connected Information Devices 6% M2M 2% Wearables
  • 25. Users, Windows, and Websites, Oh My 62% 51% Sources: Spotlight | Cisco | Alert Logic McAfee | Symantec
  • 26. Things Change. Things Stay the Same. Sources: Spotlight | Cisco | Alert Logic McAfee | Symantec
  • 27. The Majority of Business Data is Unstructured It will be 80-95% in a few years
  • 29. Who is Responsible? Cloud Vendors Security OF the Cloud Organizations Security of What’s IN the Cloud
  • 30. Holy Grail Backdoors Who Holds the Keys Never Trust Always Verify Least Access
  • 31. Trends 2020 > What Enterprise Wants • Data Focused Security • Consolidated All-in-One • Buy and Consume not Build • No Integration Required • Agnostic • Autonomous • Bolsters or Replaces Legacy Tools • Minimal Latency • Cost Effective • Minimal Friction Deployment • Business as Usual UX
  • 32. Security Market Disruption (simplify to excel) The security landscape is highly crowded and fragmented with one off tools that are ‘more of the same’ • More than 5,000 vendors are in the market today, most that recede to features far more often than expand to solutions. • Commercial CEOs, CISOs, DSOs, CDOs and Government counterparts who are informed and agile buyers will seize a golden opportunity to activate data centric security solutions now to reap earliest and on-going rewards.
  • 33. Find Out More About What a Datacentric Solution Can Do For Your Organization Read: stash.global Watch: National Security Begins With Data Security Write or Call: john.dundas@stash.global | +1.774.216.1375 2018 2019 2020 2020 WINNER PRESENTED BY: www.bintelligence.com STASH® Quantum-Resistant Data Security Solution