27
Avoiding Data Breaches in 2016: What You Need to Know David Monahan Research Director Enterprise Management Associates (EMA) David Cramer VP of Product Management BMC

Avoiding Data Breaches in 2016: What You Need to Know

Embed Size (px)

Citation preview

Page 1: Avoiding Data Breaches in 2016: What You Need to Know

Avoiding Data Breaches in 2016:

What You Need to Know

David Monahan

Research Director

Enterprise Management Associates (EMA)

David Cramer

VP of Product Management

BMC

Page 2: Avoiding Data Breaches in 2016: What You Need to Know

Today’s Presenters

Slide 2 © 2016 Enterprise Management Associates, Inc.

David Monahan – Research Director, Risk and SecurityDavid is a senior information security executive with several years of experience.

He has organized and managed both physical and information security programs,

including security and network operations (SOCs and NOCs) for organizations

ranging from Fortune 100 companies to local government and small public and

private companies.

David Cramer, VP of Product Management, BMCDavid joined BMC in 2015 and serves as Vice President of Product Management for

the Cloud/DCA business unit. Prior to BMC, David was head of product management

for CA Technologies. During his tenure at CA, David was responsible for application

delivery, cloud management, virtualization and Infrastructure automation solutions.

Before joining CA, David held executive positions at AlterPoint, Motive, NetSolve, and

Nortel Networks.

Page 3: Avoiding Data Breaches in 2016: What You Need to Know

Logistics for Today’s Webinar

Slide 3 © 2016 Enterprise Management Associates, Inc.

Questions

• An archived version of the event recording

will be available at

www.enterprisemanagement.com

• Log questions in the Q&A panel located on the

lower right corner of your screen

• Questions will be addressed during the Q&A

session of the event

Event recording

Event presentation

• A PDF of the PowerPoint presentation will be

emailed to you as part of the follow-up email.

Page 4: Avoiding Data Breaches in 2016: What You Need to Know

Avoiding Data Breaches in 2016:

What You Need to Know

David Monahan

Research Director

Enterprise Management Associates (EMA)

David Cramer

VP of Product Management

BMC

Page 5: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc5

WE LIVE IN AN INCREASINGLYDIGITAL WORLD

Page 6: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc6© 2016 Enterprise Management Associates, Inc.

• Cyber-security/ Information Security was an afterthought, Obligation, or low priority insurance policy

• 51%: Spending Between 10%-24% of IT Budget on Security

• 26%: Spending Between 20% and 30% (They are Playing Catchup)

Have We Been Sitting in a Pot Coming to a Boil?

Page 7: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc7

Keeping Organizations Secure Against Cyber Criminals Has Never Been Tougher

97% of executives expect a rise in data breach

attempts in the next 12 months

As a result, 99% plan to invest more in security in the

next 12 months than they did in 2015.

Page 8: Avoiding Data Breaches in 2016: What You Need to Know

BMC Study Shows:Many Breaches Are Avoidable

of executives say security

breaches occur even when

vulnerabilities and their

remediation have already been

identified

44% “There’s so many more vectors that are easier, less risky and quite often more productive than going down that route. This includes, of course, known vulnerabilities for which a patch is available but the owner hasn’t installed it.” Rob Joyce, Chief of NSA’s Tailored Access Operations

Page 9: Avoiding Data Breaches in 2016: What You Need to Know

Decline of Baselines and Asset Prioritization

© 2016 Enterprise Management Associates, Inc.

Page 10: Avoiding Data Breaches in 2016: What You Need to Know

Decline in Monitoring High Value Assets

© 2016 Enterprise Management Associates, Inc.

Page 11: Avoiding Data Breaches in 2016: What You Need to Know

Decline in Security Confidence

© 2016 Enterprise Management Associates, Inc.

79% of organizations were only “somewhat confident” to “highly doubtful” that their security program could detect a security incident before it had a significant impact on their environment.

Page 12: Avoiding Data Breaches in 2016: What You Need to Know

CVE®(Common Vulnerabilities and Exposures)

Total Count (Oct 8, 2015): 71,951

Total Count (Nov 15, 2015): 72,805

854(New bulletins)

38 Days

22(per day)

8030(per year)

“A dictionary of common security exposures and vulnerabilities”

What you know and don’t fix can hurt you

Page 13: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc13

Even “small” threats can cause “BIG” issues……

ATTACKS

80%

More than 80% of attacks target known vulnerabilities

99.9%

FIX READY

99.9% of exploits were compromised over a year after the CVE was published

Page 14: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc14

Visibility – you can’t patch what you don’t know

Downtime – hard to schedule maintenance times with users

Complexity –dependencies make it hard to isolate actions

So Why Do Vulnerabilities Go Unaddressed?

193Days to resolve

average vulnerability

Page 15: Avoiding Data Breaches in 2016: What You Need to Know

Complexity and Lack of Visibility

Slide 15 © 2014 Enterprise Management Associates, Inc.

Drivers for Lack of Value in Tools #2 Tools do not provide adequate correlation of data to

business impact

#5 Tools do not provide enough visibility into the ways

threats appear and/or propagate in the environment

Over 90% of Outages Caused by Unscheduled or

Undocumented Changes #2 Tools do not provide adequate correlation of data to

business impact

Complexity is the bane of Security Complexity in Tools = shelf-ware, thus lack of ROI

Complexity in Architectures= Security Gaps and failures

Page 16: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc16

OperationsSecurityReduce downtime

80% of downtime due to

misconfigurations

Close the window of

vulnerability

43% of companies have

had a data breach

Page 17: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc17

A Three-Pronged Game Plan

To stay on top of today’s complexities, threats and opportunities,

large enterprises are developing SecOps strategies that focus on

three core areas:

PeopleSecurity and operations professionals share aligned goals for

making business systems more secure and reliable

ProcessesGuide and integrate the activities and data sets of key

stakeholders in security and IT operations

TechnologyEnable efficient, consistent and integrated processes to enable IT

Operations and Security efforts

Page 18: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc18

People Problems

© 2016 Enterprise Management Associates, Inc.

68% of Organizations are Experiencing Security Staffing Problems!

Page 19: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc19

Integration and Scalability are Crucial for Security!

• We Can’t Just Throw People at the Problem!

• 95% Organizations with 10 or less FTE Experienced More Than 100 Severe/Critical security alerts PER DAY

• 70%: Scalability of Automation is Important to Meet Compliance Needs

• 93%: Integration is Important for Security

© 2016 Enterprise Management Associates, Inc.

Page 20: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc20

Where Do Organization Stand

© 2016 Enterprise Management Associates, Inc.

• 88%: Integration is important for Vulnerability Mgmt.

• 71%: Ease of Use Important for Vulnerability Mgmt.

• 82%: Scalability is Important for Automation solutions

• 87% : Scalability is Important when dealing with Vulnerability Mgmt.

Page 21: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc21

Page 22: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc22

BMC BladeLogic: Relentless Remediation

Drag picture to placeholder or click icon to add

Automate to eliminate threats before they become a breach

entry point

• Automatic correlation of discovered vulnerabilities and BSA patches

— Filter to systems through operational views

— Deploy remediation actions

• Network vulnerability identification and remediation action capabilities

• Direct integration with Change Management

Reduce cost and time associated with remediating

vulnerabilities

Page 23: Avoiding Data Breaches in 2016: What You Need to Know

Threats are neutralized….is that it?

52% of enterprise leaders equateregulatory compliance with tighter security.

“We must sustain our operations and defenses before, during, and after an attack by reducing the attack surface, continually improving defensive cyberspace operations, and effectively commanding and controlling the DODIN.” DISA Strategic Plan

Page 24: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc24

BMC BladeLogic: Vigilant Compliance

Drag picture to placeholder or click icon to add

Manage by policy, not just by alert…

Page 25: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc25

Criteria That Decision Makers Consider Important in

SecOps Solutions

62% 58% 50%Want flexibility to tailor the

solution to the specific

regulations in their industry

want integration with

service desks and change-

management processes

Share that they want

reporting for compliance

audits

Page 26: Avoiding Data Breaches in 2016: What You Need to Know

© Copyright 5/20/2016 BMC Software, Inc26

Customer Success with SECOPS

State of Michigan

Reduced time for Audit report creation from

32 hours to 15 minutes

Reduced time for server provisioning from

2 months to 5 days

Reduced 9,000+ staff hours by

automatically remediating 94,273 events

Page 27: Avoiding Data Breaches in 2016: What You Need to Know

Log Your Questions in the Q&A Panel

Learn More About Leading IT Analyst Firm Enterprise

Management Associates:

http://www.enterprisemanagement.com

Slide 27 © 2016 Enterprise Management Associates, Inc.