4. “The trends fueling the data-centric world include
a proliferation of cloud computing, the growth of
AI and analytics, and cloudification of the
network and the edge.”
- Intel 2019
5. Security Drivers 2020 >
4. Talent deficit in both
cloud and security fuels
product-for- people
substitutions
• 69% of enterprise
executives believe artificial
intelligence will be
necessary to respond to
cyber attacks
• Pro-serv, Managed
Services, and AI/ML
automation critical to
augment or stretch
available resources
1. Increasing
enterprise
vulnerability due to
growth of cloud
migration, mobile
endpoints, and IoT
devices
• Forcing evolution
of entire security
stack, deployment,
and purchasing
models
2. Resurgent privacy
and other regulations
fueled by the
surveillance economy
backlash, third party
risk awareness, and
unrelenting hacks
• GDPR, CCPA, and
CMMC are
harbingers of more
to come
3. Attack surface
expansion accelerates
with IoT/OT
proliferation, DevOps
adoption, and third-
party relationships
• Porous perimeters,
poor IT hygiene, failure
to accept cloud
responsibility, and
security awareness
deficits enable exploits
AGC Partners 2020
6. Digital Revolution Security Impact
1. Security is eroding as
an inhibitor of cloud
deployment
• Cloud currently supports
49% of enterprise
workloads, increasing to
74% by 2021
• More enterprises are
using cloud services for
complex, mission-critical,
and high-risk
applications
2. Enterprise & cloud providers
must manage security together
• Cloud providers are
responsible for physical hosts,
networks, and data centers
• Enterprises retain
responsibility for user identity
and access management
rules, data security and
handling policies, and
application security practices
3. Hyperscalers increasingly
add functionality and eye
on-prem incursion
• Most enterprises look outside
of hyperscalers for their
security options, but
hyperscalers (AWS, Google,
Microsoft et. al.) are looking to
penetrate and capture on-
prem environments with
‘cloud to ground’ initiatives
AGC Partners 2020
7. More is Less
(the downside to too many increasingly pervasive, intelligent,
contextual technology applications and tools)
More Choice
• Integration Issues
• Compatibility
• New Holes
More Intrusive
• Less Willing to Use
• Privacy Backlash
• Weakened Security
Integrity
More Connected
• Increased Threat
Frontier
• New Attack Vectors
• Elevated Attack
Severity
14. Cyber Fatigue
• 5,000 Security Companies Launched in
the last 4 years
• 185+ Million Reported Breaches
• According to the FBI’s Internet Crime
Complaint Center (IC3) the number of
cybercrimes reported account for only
10-12% of the actual number
occurring.
15. Smoke &
Mirrors
• More of the same Mantras
• Options masquerading as
Solutions
• Claims ≠ Proof
• One way in, no way Out
• Complicated
• Expensive
• Trust
17. Where We Are Going
Datacentric | Governance | Zero Trust | Consolidation
18. Buzz
AI
Combines large amounts
of data through iterative
processing and intelligent
algorithms to help
computer learn more
efficiently
Applications Examples:
Chatbots
Google Maps
Voice Assistant
ML
Uses efficient programs
that use data to ‘self-
learn’ without having to
be explicitly instructed
Application Examples:
Recommendation
Engines
Email Spam Detection
Self-driving Vehicles
Blockchain
Digital ledger used to
record transactions across
many computers so that
transactions become
static and cannot be
altered retroactively
Application Examples:
Real Estate
Digital Currency
Airlines
19. “Most of the stack we've spent decades trying to
maintain is just a big, unmanageable pile of
duplicative, inflexible code.”
- Alan Morrison, Sr. Research Fellow,
New Services and Emerging Tech, PwC on Dave McComb’s
(Semantic Arts) articulation of the problem in 'Software Wasteland’
and the solution in 'The Data-Centric Revolution’
20. Application Centric vs Datacentric
The same kind of sprawl is
affecting Cybersecurity
• What does it mean to be application-centric?
• In the case of data breaches, we’re getting in
the way of solving the problem
• We support the status quo, by perpetuating
methods that cause sprawl, error proliferation,
vulnerability proliferation and a lack of
transparency.
• It means we are a part of the problem we’ve
had for nearly 30 years.
• Making data the central theme of business
will make it proactively more useable,
protectable, less expensive to interact with
and shorten our paths to profitable discovery.
Alan Morrison PwC
The consequence of App Centric system level complexity and
disconnectedness: table and code sprawl, integration
insecurity, business inertia
21. Application
Centric
Security Risk? Yes.
But that’s not all.
Business becomes about
the system, not the data.
Compound
Complexity
Integration
Tax
Arbitrary Data
Models
Unsupportable
Costs
22. Data Centric
Minimizes $ loss
expectancy from data
compromise to lowest
possibility.
Business shifts from
building, integrating,
testing, upgrading
systems to focus on the
money maker: your
unique business data.
Non-disruptive
Higher
Productivity/
Reduced Effort
Bolster or
Replace Legacy
System Costs:
High ROI
Streamlined
Expand/Claw
Back Market
Share
31. Trends 2020 >
What Enterprise Wants
• Data Focused Security
• Consolidated All-in-One
• Buy and Consume not Build
• No Integration Required
• Agnostic
• Autonomous
• Bolsters or Replaces Legacy Tools
• Minimal Latency
• Cost Effective
• Minimal Friction Deployment
• Business as Usual UX
32. Security Market
Disruption
(simplify to excel)
The security landscape is highly
crowded and fragmented with
one off tools that are ‘more of
the same’
• More than 5,000 vendors are in
the market today, most that
recede to features far more often
than expand to solutions.
• Commercial CEOs, CISOs, DSOs,
CDOs and Government
counterparts who are informed
and agile buyers will seize a
golden opportunity to activate
data centric security solutions now
to reap earliest and on-going
rewards.
33. Find Out More About What a Datacentric
Solution Can Do For Your Organization
Read:
stash.global
Watch:
National Security Begins With Data Security
Write or Call:
john.dundas@stash.global | +1.774.216.1375
2018 2019 2020
2020 WINNER
PRESENTED BY:
www.bintelligence.com
STASH®
Quantum-Resistant
Data Security Solution