10
Managing Threats in Changing Managing Threats in Changing World World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012

Managing Threats in Changing World

Embed Size (px)

DESCRIPTION

Managing Threats in Changing World. John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012. Trends Canada’s auditor general report on cyber-security Failure to pass US 2012 Cybersecurity Act Cyber attack on Canadian government in 2011 - PowerPoint PPT Presentation

Citation preview

Page 1: Managing Threats in Changing World

Managing Threats in Changing Managing Threats in Changing WorldWorld

John DeGrootLead Architect – Security, RBC

Federation of Security Professionals – October 26, 2012

Page 2: Managing Threats in Changing World

Trends

• Canada’s auditor general report on cyber-security• Failure to pass US 2012 Cybersecurity Act• Cyber attack on Canadian government in 2011• DDOS attacks on US banks• Many others

Page 3: Managing Threats in Changing World

Evolution of Threats Evolution of Threats

Organized Crime,

Nation States

Fraudsters

“Script Kiddies”, Individuals

Increasing sophistication

and impact

Number of attackers

Page 4: Managing Threats in Changing World

What is changing?

• APT – Advanced Persistent Threats Targeted Highly motivated Well-financed Coordinated across attack points Will try multiple times using multiple methods

• Cloud computing and mobility increase complexity and attack surface

Evolutionary, not revolutionary change

Page 5: Managing Threats in Changing World

What is the same?

• Same bad guys• Same motivation

Using new tools, operating in IT world, leveraging the cloud

Page 6: Managing Threats in Changing World

Where are the gaps?

• Defenses are strongly attack-oriented Signature-based defenses geared to single general attacks

• Controls are strongly people-oriented Awareness programs, discretionary security, application development

• Defenses often deployed in silos • Security “bolted on”• Defense in Depth

Layers rather than breadth

Page 7: Managing Threats in Changing World

7

Integrated Defense

Page 8: Managing Threats in Changing World

Toward Integrated Defense

• Acknowledge reality The bad guys are already in Denial of service attacks will cause outages You will be attacked

• Understand your business• Integrate with operational risk management• Proactive approach to threat management

Threat modeling and predictive analysis What does a coordinated attack look like?

Prepare for attack and test your response Behavior analysis – good and bad

Page 9: Managing Threats in Changing World

Toward Integrated Defense

• Security by design Embed security into processes, applications, data, and infrastructureMove from discretionary to policy-driven securitySimplify and automate

• Virtual security operations centreProvide complete visibility into operational environment Provide useful and relevant informationProvide effective intelligence – inside and out Share information and services

• Invest in people with threat management skills

Page 10: Managing Threats in Changing World

10

Thank You