17
The Future of Cybersecurity Mark Cohn Need title The Future of Cyber Security Mark Cohn Chief Technology Officer, Unisys

Hawaii DGS 16 presentation - Future of Cybersecurity - Cohn

Embed Size (px)

Citation preview

The Future of Cybersecurity

Mark Cohn

Need title

The Future of Cyber Security

Mark Cohn

Chief Technology Officer, Unisys

© 2016 Unisys Corporation. All rights reserved. 2

It’s Not Just an IT Problem

• Impact on Society

• People and Process Challenges

• Technology Leap Forward

“Hawaii consumers who

believe they may be at

risk are urged to take

immediate steps to

protect their personal

credit information as well

unauthorized access to

their credit or debit card

accounts.”

In the News…

Source: Hawaii News Now

© 2016 Unisys Corporation. All rights reserved. 3

Global Cyber Threats are Pervasive

© 2016 Unisys Corporation. All rights reserved. 4

Cyber Has Proven to Cause Widespread Disruption

© 2016 Unisys Corporation. All rights reserved. 5

The “Advanced Persistent Threat” Continues

© 2016 Unisys Corporation. All rights reserved. 6

Can You Recognize the Counterfeit?

© 2016 Unisys Corporation. All rights reserved. 7

INFORMATION TECHNOLOGY

OPERATIONAL TECHNOLOGY

PERSONAL TECHNOLOGY

Internet of Things (IoT) Increases Vulnerabilities

© 2016 Unisys Corporation. All rights reserved. 8

Cyber is not just an IT challenge—

it’s a Leadership Challenge

© 2016 Unisys Corporation. All rights reserved. 9

Cyber Requires Integrated Risk Management

© 2016 Unisys Corporation. All rights reserved. 10

Moving forward

Where Do We Go From Here?

© 2016 Unisys Corporation. All rights reserved. 11

Key Action Areas in Cyber

• Cyber workforce development

• Adaptive security architecture from prevent—to detect

and respond

• Strong authentication, device hardening, and reduced

attack surface

• Micro-segmentation—augmenting or replacing

perimeter protection with identity services and strong

encryption

© 2016 Unisys Corporation. All rights reserved. 12

Cyber Leap Forward

• The pay-off from the cloud – provides a

foundation for a “leap forward”

improvement in cyber protection posture

• The move to a software-defined enterprise

will enable a break-through in the data

center and the cloud

• Virtualization today is primarily focused

on computing not storage networking or

security

• Virtualization + software-defined security

provides new paradigm for how cyber

assets can be protected in the enterprise

• Automated workload movement for active

defense

© 2016 Unisys Corporation. All rights reserved. 13

Safeguarding High Value Assets

• Hiding virtual devices

and assets

• Dynamically changing

location to hinder

attacker access

• Using advanced

intrusion and

protection

technologies to move

assets prior to

successful penetration

Critical Benefits

Orchestration

Engine

Movement Between Data Centers & Commercial Clouds

Data Center

CryptoFirewall

SDN

SwitchStorageServer

VM VSt VN VFWAPDS

APPS

VC

App

Workload Movement

Commercial Cloud

CryptoFirewall

SDN

SwitchStorageServer

VM VSt VN VFW

ADPS

VC

App

APDS

© 2016 Unisys Corporation. All rights reserved. 14

Resources

Center for Internet Security

https://www.cisecurity.org

NSA’s Top 10 Mitigation Strategies

https://www.iad.gov/iad/library/ia-guidance/iads-top-10-

information-assurance-mitigation-strategies.cfm

NIST Cyber Security Framework

http://www.nist.gov/cyberframework

Navigating the Digital Age:

The Definitive Cybersecurity Guide for Directors and Officers

https://www.securityroundtable.org/the-boOK/

© 2016 Unisys Corporation. All rights reserved. 15

Moving to New Normal

• Cybercrime sophistication

• Critical infrastructure resiliency

• Innovation with security baked in:

new technologies, IoT, and digital

cities

• Evolving workplace of the future

© 2016 Unisys Corporation. All rights reserved. 16

Questions?

© 2016 Unisys Corporation. All rights reserved. 17

Thank You!