2019年IDC企業安全建設.pdf

編號:96421 PDF 42頁 13.94MB 下載積分:VIP專享
下載報告請您先登錄!

2019年IDC企業安全建設.pdf

1、Enterprise Security Trends IDCPete LindstromOver 25 years in InfoSec,IT,Finance Tech Risk Pro performing reading,writing,rithmetic on risk and security mattersFormer Marine(Gulf War veteran),Big Six IT Auditor(PwC),Internal Auditor(GMAC Mortgage),Security Architect&Director(Wyeth)BBA Finance,Univers

2、ity of Notre Dame;former CISSP and CISAVice President,Security StrategiesIT Executive Program,IDC“To enable digital transformation through proper IT risk management by making efficient and effective economic decisions supported by evidence and outcome analysis leading to the strongest cybersecurity

3、program possible.”The Cybersecurity Mission StatementDigital Transformation(DX)DefinedThe application of 3rdPlatform and related technologies to fundamentally improve all aspects of society.For business this means:$1.2T in 2017$2.0T in 2020$1.4T in 2018$1.7T in 2019$6.3T Direct DX InvestmentNew sour

4、ces of innovation and creativity to enhance experiences and improve financial performance.Simply modernizing the technology underpinning existing systems is not transformation.TRANSFORMUsing information to create an evidence based culture.Companies should plan on doubling the productivity of their k

5、nowledge workers by using information more effectively.DECISION MAKINGDigital transformation is not to be confused with digital technologies,however,it does use 3rdPlatform technologies such as Cloud,mobility,Big Data,and social as well as Innovation Accelerators including IoT,robotics,and 3D printi

6、ng.WITH TECHNOLOGYCybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSDX Security PerformanceScorecard Critical Success Metrics and KRIsDX Trust PlatformAligning Security with Business PartnersDX Risk RoadmapsPrioritizing the Industry Risk JourneyDX Security Organiz

7、ationOvercome the IT Security Skills GapDX Security CapabilitiesReshaping Security and Technology ExpertiseCybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSIDC Energy Insights:Energy as a ServiceDistributed EnergyPredictive GridDigital GridDistributed Energy Mana

8、gementIntelligent Grid ManagementMicrogridsPredictive Grid ControlSmart AssetsStrategic Asset ManagementConnected AssetsAsset InstrumentationFailure Models&Effects Analysis(FMEA)AutomationPredictive Underground Line ServicesDrone-Based Line InspectionSelf-Healing AssetsAsset Performance ManagementCo

9、nnected ConsumerReliability as a ServiceCustomer TransparencyPublic SafetyDER as a Reliability Enabler360 Connected Customer ManagementService Safety AlertsDevise-Based Energy ProgramsWater QualityClosed Loop Outage ManagementPersonalized MarketingLeak DetectionEnhanced Personal SafetyNext-Gen Safet

10、yVirtual MusterConnected Safety WearEnhanced Process SafetyProcess Self InspectionProcess Condition MonitoringVirtual Power PlantEquipment Health CommunicationOrchestrated Demand ResponseGlobal Trade AutomationDigital Grid SimulationDigital Corrosion ManagementAugmented MaintenanceRevenue Protection

11、PROGRAMSUSE CASESStrategic PrioritiesIDC Energy Insights:Energy as a ServiceDistributed EnergyPredictive GridDigital GridDistributed Energy ManagementIntelligent Grid ManagementMicrogridsPredictive Grid ControlSmart AssetsStrategic Asset ManagementConnected AssetsAsset InstrumentationFailure Models&

12、Effects Analysis(FMEA)AutomationPredictive Underground Line ServicesDrone-Based Line InspectionSelf-Healing AssetsAsset Performance ManagementConnected ConsumerReliability as a ServiceCustomer TransparencyPublic SafetyDER as a Reliability Enabler360 Connected Customer ManagementService Safety Alerts

13、Devise-Based Energy ProgramsWater QualityClosed Loop Outage ManagementPersonalized MarketingLeak DetectionEnhanced Personal SafetyNext-Gen SafetyVirtual MusterConnected Safety WearEnhanced Process SafetyProcess Self InspectionProcess Condition MonitoringVirtual Power PlantEquipment Health Communicat

14、ionOrchestrated Demand ResponseGlobal Trade AutomationDigital Grid SimulationDigital Corrosion ManagementAugmented MaintenanceRevenue ProtectionPROGRAMSUSE CASESStrategic PrioritiesManufacturing InsightsDX Use Cases:where the value is!IDC Energy InsightsAgile EnergyAgile MiningEnergy-as-a-ServiceIDC

15、 Financial InsightsConnected BankingContextual and Value Centric InsuranceIDC Government InsightsEffective National GovernmentSmart Cities and CommunitiesIDC Health InsightsKnowledge-Based MedicineValue-Based HealthIDC Manufacturing InsightsCollaborative Innovation(AOVC)Engaging Consumer Experience

16、at Scale(BOVC)Creating Experience Ecosystems(EOVC)Technology-as-a-Service(TOVC)IDC Retail InsightsExperiential Hospitality,Dining&TravelExperiential RetailIDC Telecommunications InsightsCommunications Service-Enabled Connected CommunitiesLearn more at Use Cases:where the value is!IDC Energy Insights

17、Agile EnergyAgile MiningEnergy-as-a-ServiceIDC Financial InsightsConnected BankingContextual and Value Centric InsuranceIDC Government InsightsEffective National GovernmentSmart Cities and CommunitiesIDC Health InsightsKnowledge-Based MedicineValue-Based HealthIDC Manufacturing InsightsCollaborative

18、 Innovation(AOVC)Engaging Consumer Experience at Scale(BOVC)Creating Experience Ecosystems(EOVC)Technology-as-a-Service(TOVC)IDC Retail InsightsExperiential Hospitality,Dining&TravelExperiential RetailIDC Telecommunications InsightsCommunications Service-Enabled Connected CommunitiesLearn more at th

19、e RISK!and the RISK!DX Risk Roadmaps Key to SuccessSuccessful cybersecurity programs strategically align with the risks associated with their organizations digital transformation use cases.Cybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSThe Many Faces of Cyberse

20、curityTECHCONTROLSBIZCOMMERCECOPCRIMELAWCOUNSELCyberPOLICYFRAUDRISKCOMPLYFRAUDIRPRIVACYFORENSICSBridging the Technology Skills GapDX Security Organization Key to Success Successful cybersecurity programs address the cybersecurity skills gap through internal training,security-at-scale,and strategic o

21、utsourcing.Cybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSDigital Security FunctionsIDENTITY MGTValidate human identities.Create,modify,and revoke user accounts/credentials.Define and assign user access rules.Monitor user behavior.Account ProvisioningPassword R

22、esetKnowledge-based Identity ValidationIdentity Access GovernanceUser Session RecordingPassword AuthnOTP Hard Token AuthnSmartcard AuthnSoft Token AuthnStatic Biometric AuthnBehavioral Biometric AuthnSingle Sign-on(federation)Authn Triggers(stepup)Web Access Mgt(authz)Shared Credential MgtPrivilege

23、RestrictionsVULN MGTEliminate services and processes.Reduce known weaknesses.Identify and patch vulnerabilities.Reduce coding errors.Filter connection attempts.Vuln ScanningApply Update/PatchStatic AnalysisDynamic AnalysisFirewall Policy MgtPolicy OrchestrationStatic Network FiltersDynamic Network F

24、iltersURL FiltersAPI FiltersMicrosegmentationApplication IsolationRemote BrowsersWhitelist(known good)Runtime App Self-ProtectionTRUST MGTManage overall digital security program.Manage usage policies.Manage IT policies and procedures.Classify and harden data and systems.Key Management3rdParty Assess

25、mentsPolicy ManagementRisk Register ManagementRisk AnalyticsCompliance ManagementRemote Access VPNSite-Site VPNSession VPN(app)Endpoint EncryptionBasic File EncryptionPolicy-based File EncryptionDatabase EncryptionFile Integrity CheckingDigital SignaturesTrusted BootHardware Security ModulesTrusted

26、Platform ModulesSecure ElementsRemote AttestationTHREAT MGTMonitor usage activity.Determine whether activity is malicious or inappropriate.Block/alert on inappropriate activity.Conduct forensic analysis.Manage incidents.Contextual Analysis(SIEM)Algorithmic Analysis(big data)System ForensicsNetwork F

27、orensicsIncident MgtBreach Patterns(IoC feeds)Malware SignaturesFile Behavior Analysis(sandbox)System Anomaly DetectionIP/URL BlacklistsNet Intruder SignaturesNetwork Anomaly DetectionDenial of Service ProtectionEmail Anti-SpamBreach DetectionRegEx Data Leak DetectionDocument FingerprintingDeception

28、(honeypots,etc)SERVICEPROCESSTECHNOLOGYDigital Security FunctionsIDENTITY MGTValidate human identities.Create,modify,and revoke user accounts/credentials.Define and assign user access rules.Monitor user behavior.Account ProvisioningPassword ResetKnowledge-based Identity ValidationIdentity Access Gov

29、ernanceUser Session RecordingPassword AuthnOTP Hard Token AuthnSmartcard AuthnSoft Token AuthnStatic Biometric AuthnBehavioral Biometric AuthnSingle Sign-on(federation)Authn Triggers(stepup)Web Access Mgt(authz)Shared Credential MgtPrivilege RestrictionsVULN MGTEliminate services and processes.Reduc

30、e known weaknesses.Identify and patch vulnerabilities.Reduce coding errors.Filter connection attempts.Vuln ScanningApply Update/PatchStatic AnalysisDynamic AnalysisFirewall Policy MgtPolicy OrchestrationStatic Network FiltersDynamic Network FiltersURL FiltersAPI FiltersMicrosegmentationApplication I

31、solationRemote BrowsersWhitelist(known good)Runtime App Self-ProtectionTRUST MGTManage overall digital security program.Manage usage policies.Manage IT policies and procedures.Classify and harden data and systems.Key Management3rdParty AssessmentsPolicy ManagementRisk Register ManagementRisk Analyti

32、csCompliance ManagementRemote Access VPNSite-Site VPNSession VPN(app)Endpoint EncryptionBasic File EncryptionPolicy-based File EncryptionDatabase EncryptionFile Integrity CheckingDigital SignaturesTrusted BootHardware Security ModulesTrusted Platform ModulesSecure ElementsRemote AttestationTHREAT MG

33、TMonitor usage activity.Determine whether activity is malicious or inappropriate.Block/alert on inappropriate activity.Conduct forensic analysis.Manage incidents.Contextual Analysis(SIEM)Algorithmic Analysis(big data)System ForensicsNetwork ForensicsIncident MgtBreach Patterns(IoC feeds)Malware Sign

34、aturesFile Behavior Analysis(sandbox)System Anomaly DetectionIP/URL BlacklistsNet Intruder SignaturesNetwork Anomaly DetectionDenial of Service ProtectionEmail Anti-SpamBreach DetectionRegEx Data Leak DetectionDocument FingerprintingDeception(honeypots,etc)SERVICEPROCESSTECHNOLOGY38%32%30%30%Top Can

35、didates for Automation Password Resets Provisioning Single Sign-on Advanced AuthTRUST Patch Management Continuous Assessments FW Policy Orchestration Alert Context/Aggregation Attack Identification Incident ManagementIDENTITY Policy/Governance 3rdParty Risk Certificate ManagementVULNERABILITYTHREATB

36、uilding Blocks of Digital TransformationDistributed Integrity Model(Zero Trust)Focused on users,data,and workloads Virtual elements dynamically tied to the“channels and containers”world of network/operating platform.Integrity validated by roots of trust or“tethers”that leverage cryptography.TPMs,HSM

37、s,Secure Elements,etc.As users,data,compute objects travel through channels and containers,they are“traced”through gateways and across trust zones.DX Security Innovations(Risk)Intelligent Core Data ServicesIntegration&OrchestrationDeveloper ServicesEngagementIDMultifactor Auth&FederationRisk-basedAu

38、thenticationUser BehaviorAnalyticsFederation&NotificationHardenedSecurity PostureSecurityOrchestrationPaaS/API SecDevSecOpsSDN Security3rdParty ScoresCognitive&AnalyticsMonitoring&AutomationThreat ModelingIntelligence&DeceptionBlockchain&Rights MgtPKI/Certificates&Roots of TrustSW SecurityData Sheet

39、sCompliance&CyberinsuranceDX Security Capabilities Key to SuccessSuccessful cybersecurity programs automate their security processes and innovatetheir architectures for dynamic technology environments.Cybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSDigital trust

40、 enables decisions to be made between two or more entities that reflect their level of confidence in each other;these decisions are based on each entitys digital reputation as well as the risk levels provided by each entitys cybersecurityprograms for any proposed digital activity.IDC Digital Trust F

41、rameworkBigger Picture Risk in DX WorldPerson(“Public”)BusinessMachineP2PIntoleranceMob JusticeB2CPrivacy BreachesEmployee TrustG2CitizenDisinformationSurveillanceM2PBias OutPerson(“Public”)BusinessMachineC2BBot FraudB2BSupply Chain Issues3rd/4thPartiesG2BRegulations/BansM2BBias OutCitizen2GPolitica

42、l ActionsActivismB2GLobbyistsG2GCyberwarfareInternet SanctionsM2GBias OutP2MBias InB2MBias InG2MBias InM2M?Person(“Public”)BusinessMachineP2PSocial MediaLI endorsementsB2CLoyalty/FICOBackground ChecksG2CitizenPassports/Valid IDSocial ScoreM2PSSO/MFAUBAPerson(“Public”)BusinessMachineC2BProvider Ratin

43、gsDigital Trust IndexB2BContractsDigital Trust IndexG2BRegulationsM2B3rdParty Risk ScoresCitizen2GMediaWatchdog GroupsB2GLegal EntitiesG2GTreatiesM2GEncryptionP2MDevice IDRoot of TrustB2MCybersecuritySW Bill of MaterialsG2MDevice RegistryCryptoM2MBlockchainIntegrityDigital Trust Platform Key to Succ

44、essSuccessful cybersecurity programs automate their security processes and innovatetheir architectures for dynamic technology environments.Cybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSSecurity spending vs.total incidentsRelative security valueThe Best Email S

45、ecurity Single Sign-on Firewalls User Awareness Training File EncryptionThe Worst 3rdParty Risk Scoring Audit/Vendor Risk Mgt Incident ResponseKey Risk Indicators(KRIs)Control OutcomePopulationEfficacy/ErrorsNormalizedEndpoint Antimalware allowed/deniedFirewall connections allowed/deniedIntrusion Pr

46、evention flows allowed/deniedEmail Security messages allowed/deniedSecure Web Gateway sessions allowed/deniedFile ObjectsNetwork Flows/ConnectionsNetwork Flows/Connections File ObjectsEmail MessagesWeb Sessions(outbound)Malware blocked(TP);Legitimate file allowed(TN);Legitimate file blocked(FP);Malw

47、are allowed(FN)Connection blocked(TP);Legitimate connection allowed(TN);Legitimate connection blocked(FP);Connection allowed(FN)Connection/malware blocked(TP);Legitimate connection/file allowed(TN);Legitimate connection/file blocked(FP);Connection/malware allowed(FN)Phish/malware blocked(TP);Legitim

48、ate email allowed(TN);Legitimate email blocked(FP);Phish/malware allowed(FN)Malicious/inappropriate Web blocked(TP);Legit Web session allowed(TN);Legit Web session blocked(FP);Malicious/inappropriate Web allowed(FN)Number of files transmittedTotal filesNumber of endpointsNumber of usersBusiness Unit

49、/DepartmentNumber of flowsNumber of active IP addressNumber of open portsNumber of applicationsBusiness unit/DepartmentNumber of flowsNumber of active IP addressNumber of open portsNumber of files transmittedNumber of applicationsBusiness unit/DepartmentNumber of messagesNumber of usersNumber of Web

50、 sessionsNumber of usersSuccess AreasBusiness DecisionEssentialKPIIDCRecommended TargetDX Security Performance Key to SuccessSuccessful cybersecurity programs develop digital KPIs to measure the efficiency and effectiveness of their programs.Cybersecurity for Digital TransformationKEY TRENDS AND PAT

51、HWAYS FOR DIGITAL DISRUPTORSDX Security PerformanceScorecard Critical Success Metrics and KRIsDX Trust PlatformAligning Security with Business PartnersDX Risk RoadmapsPrioritizing the Industry Risk JourneyDX Security OrganizationOvercome the IT Security Skills GapDX Security CapabilitiesReshaping Se

52、curity and Technology ExpertisePete LindstromVice President,Security StrategiesIDCPLIDC is the premier global provider of market intelligence,advisory services,and events for the information technology,telecommunications,and consumer technology markets.IDC helps IT professionals,business executives,

53、and the investment community make fact-based decisions on technology purchases and business strategy.More than 1,100 IDC analysts provide global,regional,and local expertise on technology and industry opportunities and trends in over 110 countries worldwide.For more than 50 years,IDC has provided st

54、rategic insights to help our clients achieve their key business objectives.IDC is a subsidiary of IDG,the worlds leading technology media,research,and events company.Terms of Use:Except as otherwise noted,the information enclosed is the intellectual property of IDC,copyright 2016.Reproduction is forbidden unless authorized;contact for information.All rights reserved.感 謝 聆 聽感 謝 聆 聽感 謝 聆 聽

友情提示

1、下載報告失敗解決辦法
2、PDF文件下載后,可能會被瀏覽器默認打開,此種情況可以點擊瀏覽器菜單,保存網頁到桌面,就可以正常下載了。
3、本站不支持迅雷下載,請使用電腦自帶的IE瀏覽器,或者360瀏覽器、谷歌瀏覽器下載即可。
4、本站報告下載后的文檔和圖紙-無水印,預覽文檔經過壓縮,下載后原文更清晰。

本文(2019年IDC企業安全建設.pdf)為本站 (云閑) 主動上傳,三個皮匠報告文庫僅提供信息存儲空間,僅對用戶上傳內容的表現方式做保護處理,對上載內容本身不做任何修改或編輯。 若此文所含內容侵犯了您的版權或隱私,請立即通知三個皮匠報告文庫(點擊聯系客服),我們立即給予刪除!

溫馨提示:如果因為網速或其他原因下載失敗請重新下載,重復下載不扣分。
客服
商務合作
小程序
服務號
折疊
午夜网日韩中文字幕,日韩Av中文字幕久久,亚洲中文字幕在线一区二区,最新中文字幕在线视频网站