30
Chaos, Complexity & Other Current Conundrums John McClurg Chief Security Officer

Chaos, Complexity & Other Current Conundrums

Embed Size (px)

DESCRIPTION

John McClurg, Dell’s CSO, often speaks about the chaos, complexity and current conundrums that characterize our times. He advocates for holistic security management across the enterprise. One of the roadblocks to implementing a holistic approach is the challenge faced by CISOs and CIOs in having to choose between meeting the needs of security and the needs of the business. These should align and work in tandem. For many companies, they don’t. Read more: http://del.ly/dU8Dj3

Citation preview

Page 1: Chaos, Complexity & Other Current Conundrums

Chaos, Complexity & Other CurrentConundrums

John McClurgChief Security Officer

Page 2: Chaos, Complexity & Other Current Conundrums

Confidential2

Page 3: Chaos, Complexity & Other Current Conundrums

Confidential3

“May you live in interesting times” –Chinese Curse

I always thought it was a blessing!

Page 4: Chaos, Complexity & Other Current Conundrums

4

cha·otic/adjective 1. characterized by a state of utter confusion or disorder

com·plex/adjective 1. composed of many interconnected parts

co·nun·drum/noun 1. anything that puzzles

Characterizing our times

Pollack

Wolfram Escher

Page 5: Chaos, Complexity & Other Current Conundrums

5

Chaos is inherent in all compounded things. Strive on with diligence.

Buddha

While not new concepts, their presence in our lives seem to be exponentially increasing…..

Page 6: Chaos, Complexity & Other Current Conundrums

6

I accept chaos, I'm not sure whether it accepts me.

Bob Dylan ….carrying with them no smallquantities of ambiguity andgeneral uncertainty….

Page 7: Chaos, Complexity & Other Current Conundrums

7

The battlefield is a scene of constant chaos. The winner will be the one who controls that chaos, both his own and the enemies.

Napoleon Bonaparte

…which if not properly addressed can carry with them consequences of no small magnitude….Potentially…even FATAL!

Page 8: Chaos, Complexity & Other Current Conundrums

8

Civilization begins with order, grows with liberty and dies with chaos.

Will DurantChaos & Complexity thenare not to be taken lightly.

Page 9: Chaos, Complexity & Other Current Conundrums

9

There's chaos out there, and chaos means opportunity.

Marc Ostrofsky

Even in the dark clouds of chaosand complexity there’s a sliver lining….even…anOpportunity!

Page 10: Chaos, Complexity & Other Current Conundrums

10

Fools ignore complexity. Pragmatists suffer it. Some can avoid it. Geniuses remove it.

Alan Perlis

But how we can best do thatremains that about which rational mindscan and do differ!

…More Art perhaps than it is Science

Page 11: Chaos, Complexity & Other Current Conundrums

11

We need to shift the paradigm from reactive technologies to more integrative solutions that deal with the variety and complexity of the threats that are out there today.

John W. Thompson --Chairman, Microsoft

“Quantum Security”….managing and mitigating in a realm of frequently non-discrete, evolving possibilities that can present themselves at any moment as either a potential harm or a benefit to an enterprise.

Page 12: Chaos, Complexity & Other Current Conundrums

Confidential12

Myth:Real threats are few and far between.

Fact: 73% of organizations say they experienced a security breach in the last year.

Dell Global Security Study

Page 13: Chaos, Complexity & Other Current Conundrums

Confidential13

Myth:Businesses are ready for any threat.

Fact: 40% do not believe their IT solutions fully equip them to prevent security breaches.

Dell Global Security Study

Page 14: Chaos, Complexity & Other Current Conundrums

14

The Reality: Cyber Security is a global issue

556 million people per year becoming victims of cybercrime

1.5 million per hour (15 X Mons)

18 people per second

annual price of $110 billion

Cybercrime costs the world more than the global black market in marijuana, cocaine & heroin combined

US Department of Homeland Security

Page 15: Chaos, Complexity & Other Current Conundrums

Cost to resolve issues from single

cyberattack against Target in 2014

$148M

$5.9MAverage cost of a data

breach in 2013, according to Ponemon Institute

research

New malware samples discovered by

researchers every day, according to

Georgia Tech

100,000

3M

19%New malware samples detected by Antivirus

solutions

Indications of malicious activity in

US Government Civilian agency

networks each year

33%Increase in number of

cyber incidents reported by Federal agencies between fiscal years

2011 and 2013

Page 16: Chaos, Complexity & Other Current Conundrums

In a connected world there is opportunity…

$

… and it is IT’s job to enable the business.

Page 17: Chaos, Complexity & Other Current Conundrums

Security and risk

of the surveyed companies experienced some type of significant security incident within the past year that resulted in financial and/or reputational impact

79%

of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 85%Cloud

MobilityMobility source shifts from 62% corporate owned and 38% personal owned to 37% corporate owned and 63% personal owned

5X

Big Data By 2020 volume of data stored will reach 35 Zettabytes - KMGTPEZ35

Powerful Disruptors:

Page 18: Chaos, Complexity & Other Current Conundrums

• Recently Briefed U.S. – China Business Council (Reality Check: ‘93 State Security Law)

• …the CONUNDRUM…How to deal with the complexities of the Global Marketplace

• Implementing a Converged-House Security Model, Physical and Cyber integrated together, optimally positioned to address vulnerability interdependencies

• Leveraging the lessons learned from the Dark days at Lucent• Minimally essential core - SecureWorks Integration Goal: “Be our own best

customer”• Together with new insights on the meaning of Holistic and Integrated

B`The New Dell Global Security Organization:Optimum positioning for 21st Century Risk

Design Plan and price

Procure build and deliver

Sell and market

Service and

support

18

Security

End-to-end transformation, characteristic of many of today’s corporations

Converged, Cored and Connected

Page 19: Chaos, Complexity & Other Current Conundrums

B`Dell Global Security – Converged , Cored and Connected

“To assure & enhance the integrity, people, processes, and assets by which Dell achieves its greater mission.”by managing unacceptable risk to the Corporation under the protective umbrella of a “converged” security organization

– including both Cyber & Federal Security Not just your traditional “Guns, Gates, Guards & Geeks…”

Nor “Distasteful cost”…but “Aspect of Advancing”

Vision remains“To see DGS and its services engaged as both an inextricable and indispensible aspect of advancing the business.”

by grounding our security policies and practices not only in the most current voice of the Threat, but in the laws and regulations of the countries we do business at a price point that enhances our bottom line.

Mission remains

19

BUSINESS ASSURANCE

Page 20: Chaos, Complexity & Other Current Conundrums

2014 Dell Full-Spectrum Risk Horizon

20

Exposure Mitigation Strategy

Supply Chain: complex processes subject to country specific regulations and vulnerable to disruptions

DGS Service: Policy and Standards; Risk Management and Assessments; Physical Security - Assure distribution centers & channels are properly secured

Emerging Markets: highly interconnected geopolitical risks such as terrorism, nuclear proliferation, corruption & organized crime.

DGS Service: Assure adequate regional staffing; monitor high risk travel; integrate risk reduction activities; leverage global contracts.

Cyber Espionage (APT): advanced clandestine activities to gain persistent intelligence on an individual, group of individuals, companies and governments.

DGS Service: CI Pilot – Federal Enclave; Cyber Threat Team; Coordinate cyber-intrusion, counterintelligence, and espionage investigations; advance self inspections and audits.

Transnational Crime: organized crime and narco- terrorism weaken states’ authority

DGS Service: Physical Security; Risk Management and Assessment; Investigations; Awareness and Training; Collaboration with the Anti-corruption Team;

Regulatory & Compliance Diversity: if not balanced, regulation can have unintended consequences for industry structures and market competition.

DGS Service: Policy and Standards; Classified Security Management; Perennial Policy review.

M&As, JVs: these activities represent significant opportunities and risk if not properly managed. Due diligence is key.

DGS Service: Risk Management & Assessment –Perform measured risk analyses. Support due diligence.

Contract/Procurement Security: increased dependence on external suppliers and sole source suppliers; assuring contract language related to internal controls and compliance has impact.

DGS Service: Contract & Procurement Security Services; Policy & Standards; Risk Management & Assessments

Work Place Violence: however it manifests itself, is disruptive to Dell operations.

DGS Service: Investigations; Contract Guards; Policy and Standards; Awareness products ; training tools.

BCM: natural disasters continue to impact production, disrupt supply chains. DGS Collaboration: BCM - Standardize and simplify requirements to develop,

test and maintain emergency response and recovery capabilities.

Page 21: Chaos, Complexity & Other Current Conundrums

21

B`A Good Year: From Obscurity to 4th to 2nd to 1st

Minimally Essential Core Surrounded by a Constellation of Trusted Partners

Page 22: Chaos, Complexity & Other Current Conundrums

Dell security evolution2011 Q1

Managed security services

Security & risk consulting

Incident response

Threat intelligence

Pre-2010

BIOS, driver and embedded security for endpoints

2010 Q1

Endpoint security, patch management

Mobile Device Management

2012 Q3

AD consolidation & migration

Identity & access management

2012 Q2

Next-generation firewall, UTM

SSL VPN for mobile security

Email & web security

2012 Q4

Data encryption & protection

2013 Q3/4

Launch Connected Security startingin North America

Page 23: Chaos, Complexity & Other Current Conundrums

Securing Dell with Dell – Leveraging our Strengths

23

• Managed Security Services offering – All Dell Firewalls & IPS• Monthly average of 22 billion events – 148 escalations back to Dell

IT Security team for investigation (top 10% of SecureWorks customer base)

• Deployed the Aventail solution to replace incumbent• Started joint development with Firewall business unit.

• KACE K1000 Management Appliance• Deployed in Dell’s highly secure, segmented PKI

environment for full patch management

• Deploying on Dell internal notebooks• Pilot started in March, with a deployment starting in Q2

• Quest Authentication Services & Recovery Manager• Partnering to displace incumbent for Quest account provisioning

Page 24: Chaos, Complexity & Other Current Conundrums

24

Dell SecureWorks Security Services

• Threat, vulnerability &

advisory feeds

• Emerging threat bulletins

• Targeted Threat Intelligence

• Microsoft update analysis

• Weekly intelligence

summary

• Cybersecurity news

roundup

• Live intelligence briefings

• CTU support

• Attacker database feed

Threat Intelligence

Managed Security

• 24/7 security monitoring

• Security device mgmt.

• Log Management

• SIM On-demand

• Vulnerability management

• Web application scanning

• Managed SIEM

• Managed Advanced

Malware Protection

• Testing & assessments

• Mobile & cloud security

• Compliance and

certification

• Program development &

governance

• Architecture design and

implementation

• Expert residency

• Physical Security

• Wireless security testing

• Social engineering

Security and RiskConsulting

• CIRP development

• CIRP Gap Analysis

• CIRP training

• Tabletop exercises & “War

Gaming”

• Incident handling

• Digital forensics

• Incident management

• Malware analysis

• Eradication & recovery

• Postmortem analysis

• Documentation

Incident Response

04/13/2023

Page 25: Chaos, Complexity & Other Current Conundrums

Risky

Security silos create risk that impedes business innovation

Complexity

Threats Compliance

Lack of Resources

Web 2.0

VirtualizationCloud Mobility

Big Data

Ch

allen

ges

Op

port

un

iti

es

Expensive

Inefficient

Page 26: Chaos, Complexity & Other Current Conundrums

The Dell difference: Security designed for a connected world

• Integrated, comprehensive portfolio secures from device to datacenter to cloud

• Shared intelligence across silos eliminates proprietary islands of information that create security gaps

• Considers the human factor to “keep the good guys good” without getting in the way of user productivity

Enablethe enterprise to embrace new technologies faster

than the competition

Complywith regulations and achieve consistent, reliable governance

Protectthe whole enterprise –

outside in and inside out – efficiently and proactively

Page 27: Chaos, Complexity & Other Current Conundrums

27

Dell delivers best-in class security solutions

Identity & Access MgmtIdentity GovernancePrivileged MgmtAccess MgmtCompliance & IT Gov

Security ServicesIncident ResponseManaged Security SvcsSecurity & Risk ConsultThreat Intelligence

Data/EndpointEncryptionProtected

WorkspaceConfiguration &

Patch ManagementSecure Cloud ClientEnterprise Mobility

Mgmt

NetworkNext Gen Firewall

Secure Mobile AccessEmail Security

Page 28: Chaos, Complexity & Other Current Conundrums

Risk Scoring Framework

SummaryThe risk scoring methodology will provide Dell visibility into specific components (Composite Risk Score, Domains and Business Logic) that contribute to the overall individual risk score.

I. Composite Score: Represents the highest level risk designation and factors risk scores from across the domains. II. Domain: A level below the composite score, the domain includes business logic categorized into similar categories. (i.e., 8 domains are displayed to the right).III. Business Logic / Rules: Statements that measure virtual, non-virtual behavior and contextual factors and assign a predetermined risk score (e.g., if individual receives a failed access attempt, then business rule risk score is high).

Methodology Overview

Risk Scoring PrinciplesVarying Degrees of Risk: Based on patterns of behaviors, certain individuals have an elevated risk and will be the focus of risk mitigation efforts.Risk-Based Monitoring: As the perceived risk increases, the amount of technical and behavioral monitoring also increases. Continuous Improvement: Dell will routinely evaluate its risk scoring business rules as new threats arise from historical cases, Dell SME input, and technology and as workplace practices evolve.

Risk Scoring Methodology

Next Steps

In order to refine and institutionalize the analytical capabilities, Dell will focus on the following next steps:

1 Facilitate conversations with Dell data owners to identify key data sources 5 Capture lessons learned and business reqs to expand to all Federal business segments

2 Document data capture process and data availability for key Dell systems 6 Evaluate decision to expand to all of Federal business segments

3 Prioritize additional PRIs that should be considered for the advanced analytics tool 7 Integrate future data sources once the Dell Federal Network is established in November

4 Validate the use of PRIs with Dell privacy and legal personnel on the ITWG 8 Move forward with the decision to incorporate all Federal business segments

III. Business Logic Level

Business Logic Score Weight Adj. Score

Business Rule 1 6 40% 3.6

Business Rule 2 6 40% 3.6

Business Rule 3 9 10% 0.9

Business Rule 4 10 10% 1.0

Score Total 9.1

Risk Scoring Methodology

I. Composite Risk Score Level Individual Risk Score High

*The individual risk score will be a weighted total of each domain

II. Domain Level Risk ScoreDomain I: Financial Policy Violation 9

IX. AdditionalRisk

Indicators*• Business

Expenses Paid by Credit Card or Cash Alert

• Business or First Class Travel Alert

• Group Meals Alert

• Recurring Expenses Alert

• Tips Alert

I. Financial Policy

Violations• Terminatio

n Date (i.e., Date Employee is Separating From Dell)

II. Separation Status

• Access Granted Anomalies

• Access Denied Anomalies

• Invalid Access Level

• Invalid Card Format

• Invalid Pin #

• Invalid Facility Code

IV. Physical Security

Alerts• Destinatio

n Country• Pre-Travel

Brief (Yes/No)

• Post-Travel Brief (Yes/No)

III. Foreign Travel

• Security Clearance Level

• Special Access Level

• Classification

• Knowledge of Safe Combination

• Physical Access Privilege Profile Data

V. SpecializedAccess Levels

• Issue Summary

• Report Type

• Primary and Secondary Allegation Classification (8 total)

• Primary and Secondary Allegation Type (31 total)

• Primary and Secondary Priority (Severity)

VI. Security Incidents

• Issue Summary

• Report Type

• Primary and Secondary Allegation Classification (8 total)

• Primary and Secondary Allegation Type (31 total)

• Primary and Secondary Priority (Severity)

VII. Ethics Incidents

• Performance Rating

• Employee Review – Dimension Comments (Parts 1 -4) – Manager

• Performance Improvement Plan

VIII. Performance

History

Concur: Financial Compliance & Analysis System

PeopleSoft: Human Resources System of Record

Access Commander: Personnel Management System of Record

Lenel OnGuard: Physical Security System of Record

IntegriLink: Ethics and Security Case Tracking System

Taleo: Human

Resources Performanc

e Rating Appraisal System

HR Analytics:

Performance Improvement Plan Data

WeightWeight Weight

Weight Weight

Weight Weight

Weight

Dell BAP Pilot Domains Insider threats are influenced by a combination of virtual, non-virtual, and organizational factors (e.g., access and clearance level). In order to quantify risk, an individual’s behavior across each landscape

must be evaluated and weighted, based on the drivers of risk. The following eight domain areas have been identified for the pilot.

Initial Pilot Data Sources*An analysis of historical insider threat cases and interviews with Dell data owners identified seven target systems that could supply the PRIs outlined above. Security

Information and Event

Management (SIEM) System

Data Loss Prevention

(DLP) System

• As Dell decides to expand the pilot to all Federal business segments, additional data sources and PRIs will be critical to the success of the detection capability.

*Insider Threat Program for a large defense contractor uses upwards of 25 data sources for their advanced analytics capability. Dell is currently utilizing seven data sources in the proof of concept pilot. **Percentages will be determined in coordination with the Algorithm Working Group and will be based on Dell’s risk tolerance.

%**

%

%

%

%

% %

%

%

%

%

%

%

%%

%

%

%%

%

%

%%

%

%

%

%%

%

%

%

%

%

Page 29: Chaos, Complexity & Other Current Conundrums

Tools and technology powered with human intelligence

The world’s best security minds

researching our protection

Security for what’s next, not

just for today

Complete lifecycle protection from device to cloud

29

The result: successful collaboration

Security is no longer a distasteful cost of doing business…

it is now an indispensable aspect of advancing business

Page 30: Chaos, Complexity & Other Current Conundrums

Thank you• John E. McClurg

CSO & Vice-PresidentDell Inc.

[email protected]