View
1.776
Download
2
Category
Preview:
DESCRIPTION
Internet, Cyber-attacks and threats are becoming more prevalent. This Infographic explains the current state, and things to consider for yourself and your business.
Citation preview
With this many people online, there are as many risks as benefits to our digital life. In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise.
Cyber resilience does not promise immunity from cyber attacks nor does it purport to eliminate risk. Eliminating all cyber risk is impossible. In fact, it could impede agility, for an environment with an acceptable level of risk enables innovation. Cyber resilience is about managing security with a multi-layered approach that encompasses people, processes, and technology.
CYBER RESILIENCE
THE FIVE PILLARS
THE UNKNOWNUNKNOWNSAs desktop computer operating systems give way to web-based and mobile platforms and applications, the workplace is changing at an exponential rate.
WHAT WE DO KNOWDigital technology is inextricably woven into our daily lives.
There are many unknown unknowns. It is literally impossible to predict all the online threats your organization will face, so your best hope of combating them is to prepare for any possibility.
IN ITS NEXUSOF FORCESGartner defines this phenomenon as
The convergence and mutual reinforcement of four interdependent trends: social interaction, mobility, cloud, and information that combine to empower individuals as they interact with each other and their information through well designed ubiquitous technology 1.
“ ” 41% of attacks affect organizations with fewer than 500 employees
THE RISE OF MOBILITY IS ONLYACCELERATING THESE TRENDS.
1/3 of all cell phones are internet-enabled
smartphones
15% of mobile devices are not secured and are used
for work and play
500 million photos sent daily check messages 23X a day
2/3
MALWARE ATTACKS have increased in 2013
up 23% on Web & up 139% on Mobile 67% come from legitimate sites
1.5 Million Victims Daily = $110 Million in Losses
ONLINE ATTACKS claim
84%Are Not Contained forMonths or Even Years
The best way to prepare is to assess your level of cyber resilience, and security intelligence is the key. Security Intelligence is more than just threat intelligence or technology; it’s the data on an enterprise’s vulnerabilities and threats, which is analyzed in a way that enables the prioritization of action to maximize risk
reduction. Better security intelligence enables better business decision-making, better organizational processes, increased protection from cyber attacks, and better preparation when they do occur — resulting in a business that is more resilient and agile.
THE CYBER RESILIENT ENTERPRISE
RECORD ENDPOINT AND
TRACK ADHERENCE TO DATA
IDEN
TIFY G
LOBAL THREATS
MONITOR ACCESS ATTEMPTS
EDU
CA
TE US
ERS – D
EVELOP EM
PLOYEE SECURITY IQ
ASSESS STATE
OF
SEC
UR
ITY
TO
FINE-TUNE PROCESSES, POLICIES, AND PROCEDURES
BECOME CYBER RESILIENT
HARNESS YOUR SECURITY INTELLIGENCE
GOVERNANCE POLICIE
S
NETWORK ACTIVITIES
TO M
Y B
USIN
ESS
IDENTIFY V
ULNER
ABI
LITI
ES
<<<<<<<<<<<<<<<
<<<<< Correlate and Analyze >>>>>>>>>>>>>>>>>>
Protect YourOrganization
PREPARE DETECT RESPOND RECOVERPROTECTPrepare for Attacks Implement Response Plan Refine Plan
TIMELINE
To successfully face and overcome an attack, you must thoroughly understand your company’s security and risk posture. Begin by painstakingly identifying the organization’s vital information. Conduct an infrastructure and information assessment
that includes all known security vulnerabilities. Establish a baseline and compare the results to those of your peers. Spotting and addressing the most urgent issues first will make your organization a less appealing target for attackers.
Once you have a good handle on what's out there, where it lives, its level of sensitivity, how vulnerable it is, and your risk tolerance, you can begin to take the necessary steps to protect it. The second
pillar is all about developing and implementing safeguards for critical infrastructure and services in order to limit or contain the impact ofan attack.
The Detect pillar focuses on developing and implementing the appropriate activities to rapidly identify an attack, assess the systems that may be affected, and ensure a timely response. In
addition, this stage is concerned with continuing to monitor the network for other attack indicators related to that attack and making sure the safeguards you had in place were effective.
The Respond pillar provides guidance on the types of activities that can accelerate time to remediation and contain the impact of the attack once it’s detected. For the detection process to have any value, there
must be a timely response. While there are many solutions and services available to help, much of what is needed in terms of response involves people and processes internal to the organization.
The final pillar that needs to be addressed — critical to any resilient security strategy — is recovery. This stage involves developing and implementing the appropriate systems and plans to restore any data and services that may have been impacted during a cyber attack. As much as we prepare and protect our organizations,
we may not be able to avoid certain types of attacks. Even if you respond quickly to a cyber breach, an attack may have consequences. No matter the outcome, organizations must be able to restore their people, processes, and systems as quickly as possible. An effective recovery depends on a clear and thorough recovery plan.
PREPARE PROTECT RESPOND RECOVERDETECT
ATTACKER INGRESSATTACKER DETECTED
SYSTEMS SECUREDNORMAL RESPONSE PLAN
The evaluation process utilizes best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars: prepare/identify, protect, detect, respond, and recover. Using this framework, you can evaluate each pillar of your organization’s cyber security strategy - specific actions to be performed by identifiable IT jobs are associated with each pillar.
Unfortunately, no silver bullet exists to prevent attacks, and breaches will occur in spite of an organization’s best efforts at preparation and protection. Many customers lack the sophistication and expertise they need to address these new, more advanced threats. To minimize the potential devastation of a cyber attack, you must change the way you think about security. Think in terms of not eliminating cyber risk but of creating cyber resilience.
To create cyber resilience, organizations must begin by changing the conversation about cyber risk. It’s crucial to align IT and the business and encourage regular, productive discussions to identify the benefits and risks associated with a cyber resilient strategy. Find and use a common language. IT security must accept that the business will be tempted to take risks in order to succeed and must empower the business to make informed decisions on how they manage cyber risk.
ACHIEVING RESILIENCE
PR
EPA
RE
PR
OTE
CT
RES
PO
ND
REC
OV
ERD
ETEC
T
A NEW PERSPECTIVE ON SECURITY
Occur in Hoursor Less
Aren’t Discoveredfor Month
DATA BREACHES
22%
Contact your Symantec account representative or reseller partner today to discuss how you can start building cyber resilience into your security strategy. Get more information about cyber resilience and stay informed at the Symantec cyber resilience microsite.
go.symantec.com/cyber-resilience
SYMANTEC IS UNIQUELY QUALIFIED TO DELIVERON THE PROMISE OF BEING THE VENDOR TO HELP ORGANIZATIONS ACHIEVE CYBER RESILIENCE.
WE HAVE:
SOLUTIONS:
Our extensive security portfolio helps you create a layered approach to security so you can identify internal threats, stay informed of the external security issues that threaten your organization, and take action against them quickly and comprehensively. Our solutions help organizations discover, track, and protect data and users. And our managed security service offerings provide monitoring and big data analysis.
SECURITY INTELLIGENCE IS THE KEY:
We operate the largest civilian cyber intelligence threat network anywhere, giving us unrivaled insight to what attackers will try next.
Our Symantec Global Intelligence Network maintains worldwide visibility into the threat landscape via 65 million attack sensors that constantly monitor networks and vulnerabilities. The network gathers data from one of the most extensive antifraud communities of enterprises and security vendors. It checks more than 1.4 billion web requests and 8 billion emails a day. We track 3.7 trillion “threat indicators” annually across the Internet and continuously collect new telemetry from hundreds of millions of mobile devices, endpoints, and servers around the globe, coverage that’s unrivaled in the industry.
SCALE, EXPERTISE,AND INFRASTRUCTURE:
We have the scale and global security architecture. Thousands of employees including 1000 security analysts and researchers worldwide based in 50 different countries, 5 PCI-certified Security Operations Centers, and secure datacenters including a 4-tier military grade datacenter for our authentication solutions. We have the scale to protect information wherever it’s stored or accessed. And we have the capacity to respond to attacks immediately.
[ ]U S E S
THE IMPACTS OF A MAJOR CYBER ATTACKCAN BE DEVASTATING TO ANY ORGANIZATION.
THE HUMAN EFFECT
Figure 1. Agenda Overview
for Nexus of Forces1
Source: Gartner ( January 2014 )
Figure 2The Targeted-AttackHierarchy of Needs
Source: Forrester Research, Inc
Detectionand response
Prevention
An Integrated Portfoliothat Enables Orchestration
A Focus on the Fundamentals
A Dedication to Recruiting and Retaining Staff
An Actual Security Strategy
1Source: Agenda Overview for the Nexus of Forces,20 January 2014 G00261499
2.4BILLION PEOPLE
USE THE INTERNET
34%
OF WORLDPOPULATION
Recommended