IBM Security

Report 3 Downloads 110 Views
Integrated Security: Enabling Government to fight a new era of threats

Andy MacIsaac IBM Government

February, 2017

Imagine if you could…

Transform citizen experience and enhance service delivery, while protecting data and operations against tomorrow’s risks, today 2

2IBM Security

Today the scope and scale of government creates a velocity of cyber security threats that can not be ignored

Financial Markets

Citizens

13K US Financial Institutions 122M Taxpayers

Employees

Operational Data

22M

Volume equal to

Employees

250K Libraries of Congress

Infrastructure

National Security

381M Connected 400 Zettabytes of Vehicles IoT Data

created everyday

ADVANCED ATTACKS

INNOVATION HUMAN ERROR

3

IBM Security

SKILLS GAP COMPLIANCE

Conventional approaches to security are breached every day 2013 800+ Million records

2014 1+ Billion records

2015 Unprecedented Impact

average time to identify data breach

average cost of a U.S. data breach

201 days

$7M

For government the level of threat, impacts and costs can be even greater…

4

IBM Security

Recent attacks highlight the unprecedented threats and costs that poor cyber security postures create for government

Fiscal Costs • Fraud • Litigation • Remediation

5

IBM Security

Operational Costs • System Downtime • Service Delivery Disputation • Emergency Repair and Recovery

Extreme Costs • Loss of Trust • Political Disruption • National Security • Loss of Life

Even after high profile incidents (OPM, FBI, etc) the US Federal Government still faces significant cyber security challenges

Consistent security weakness for federal agencies still remains in the areas of • Network Security • Patching Cadence • Malware

6

IBM Security

Digital transformation is driving connectivity to more users, devices, and data than ever before…creating a greater for opportunity for threats Employees Employees

Partners

Auditors

Users

Consultants

Citizens

Contractors

Data

Structured Structured

Unstructured

On Premises

Applications

Systems Systems Applications Applications

Web Applications

APIs

Infrastructure and Devices

Datacenters

PCs

Laptops

Other Govt Agencies (State, Regional, Local)

Suppliers

Mobile

Off Premises

Mobile Applications

Cloud Services

IoT

Multi Channel

Service Delivery

Data Exchanges

Government agencies must expand from infrastructure to information-centric security

7

IBM Security

Government leaders require a strategic approach with appropriate governance to meet today’s threats Yesterday’s Attacks

Today’s Attacks

Indiscriminate malware, spam and DDoS activity

Advanced, persistent, organized, politically or financially motivated

Tactical Approach

Strategic Approach

Compliance-driven, reactionary

Intelligent, orchestrated, automated

• Build multiple perimeters

• Assume constant compromise

• Protect all systems

• Prioritize high-risk assets

• Use signature-based methods

• Use behavioral-based methods

• Periodically scan for known threats

• Continuously monitor activity

• Shut down systems

• Gather, preserve, retrace evidence

It takes power and precision to stop adversaries and unknown threats

8

IBM Security

As government agencies move towards digital transformation they must also transform their cyber security capability Access the right skills

Reduce complexity

• Advisors, responders, testers, analysts and engineers • 24x7x365 global expertise

• Provide programmatic, automated and integrated outcomes • Consolidate point products to an integrated solution

Build strategy that accelerates new IT trends

Gain access to global threat intelligence

• BYoD, Cloud, Mobile, IoT • SaaS and Cloud based services

• Greater control in real time with actionable insights • Improved visibility to manage the threat lifecycle

Implement Optimize security programs • Modernize Identity and access, application development, privacy policies, data security • Manage and protect against latest threats

9

IBM Security

Governance Strategy

Elevate Governance Strategy • Create influence and authority across the enterprise • Collaborate across agencies, legislators and partners • Communicate urgency to stakeholders and citizens latest threats

Build protected and connected systems • Increase productivity • Grant stakeholders access to the right data without introducing risk

The US Federal Government is taking proactive steps to improve its cybersecurity posture •

Dedicated $19B investment for Cybersecurity in FY 2017 a 35% Increase



Calling for High Adaptive Cyber Security Services (HACS) w/ Special Item Numbers in Schedule 70 Contracts



Adapting Agile procurement protocols requiring vendors to demonstrate capabilities



Setting Clear Strategic Cybersecurity Goals with Cross Agency Priorities (CAP) focused in key areas • • • •

10

Information Security with Continuous Monitoring and Mitigation (ISCM) Identity Credential Management / User Authentication (ICAM) Anti-Phishing and Malware Mitigation, process and training A government wide, cross agency shared services approach

IBM Security

With CAP the US Government is building towards an integrated and intelligent security posture Indicators of compromise IP reputation

Threat sharing

Endpoint detection and response

Network forensics and threat management Firewalls Sandboxing Virtual patching Network visibility and segmentation

Endpoint patching and management Malware protection

Anti-Phishing and Malware Mitigation

Information Security with Continuous Monitoring and Mitigation

Threat and anomaly detection Transaction protection

Vulnerability management

User behavior analysis Fraud protection

Incident response

Device management Content security

Criminal detection Cognitive security

Threat hunting and investigation

Identity Credential Management / User Authentication

Data monitoring Data access control Application scanning Application security management

Cloud access security broker

Workload protection

Cross Agency Shared Services 11

IBM Security

Privileged identity management Entitlements and roles Access management Identity management

Today government leaders need to invest in capabilities that ENABLE Digital Transformation Information and Analytics

Cloud

Mobile and Internet of Things

Ensure Compliance

ACCELERATE innovation to build for the future Blockchain

Open Data

Cognitive

Cloud

Enhance Service Delivery

Agile

Collaboration

Information Security with Continuous Monitoring and Mitigation

ACHIEVE CAP goals for Cyber Security

Identity Credential Management / User Authentication

Anti-Phishing and Malware Mitigation Cross Agency Shared Services

Security Transformation Services Management Consulting | Systems Integration | Managed Security

The IBM Security portfolio creates an agile integrated approach to Cyber Security

Security Operations and Response

Information Risk and Protection Cloud Security

Incident Response Cyber Threat Analysis

Identity Governance and Access Management

Security Intelligence and Analytics

Advanced Fraud Prevention

Vulnerability and Patch Management

Endpoint and Network Protection

User Behavior Analytics

Data Protection

Security Research and Threat Intelligence 12

IBM Security

Mobile Security

Application Security

IBM’s deep security portfolio maps to the CAP goals of the Federal Government App Exchange

X-Force Exchange

Information Security with Continuous Monitoring and Mitigation BigFix

Network Protection XGS QRadar Incident Forensics

SECURITY OPERATIONS AND RESPONSE Anti-Phishing and Malware Mitigation

QRadar SIEM

QRadar Vulnerability / Risk Manager

QRadar User Behavior Analytics Resilient Incident Response

MaaS360

Trusteer Pinpoint Trusteer Mobile

QRadar Advisor with Watson

i2 Enterprise Insight Analysis

Trusteer Rapport

Identity Credential Management / User Authentication

INFORMATION RISK AND PROTECTION Guardium Key Manager AppScan Cloud Security

Cross Agency Shared Services

SECURITY TRANSFORMATION SERVICES Management consulting | Systems integration | Managed security 13

IBM Security

Identity Governance and Access Privileged Identity Manager Cloud Identity Service zSecure

With IBM Security government leaders can transform citizen experience and service delivery, while protecting data and operations against tomorrow’s risks, today

Deep Threat Intelligence and Analysis • Put threat matrix in context allowing you to inspect events, flows, users, and more across the enterprise, agencies and operations • Fast analysis with visuals, query, and auto-discovery across multiple points • Machine learning algorithms to spot unusual behaviors and vulnerabilities

14

IBM Security

An Open Agile Ecosystem

Cognitive Analytics

• Better security without disrupting operations and service delivery

• Natural language processing to speed interaction and insight

• Agile Out-of-the-box allowing integration with 500+ third-party security products

• Intelligent analytics that understands, reasons, and learns at speed and scale

• Open APIs allow for custom integrations and apps

• Augmented intelligence allowing your analysts to stay ahead of the latest threats and attacks

Integrated Service Delivery • Deep government industry service delivery experience across numerous types of operations • 35 billion+ security events analyzed daily across 4,500+ global clients • Integrated portfolio of security services and technology • Vast experience in strategy and change management implementation

THANK YOU FOLLOW US ON: ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2017. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.

Background Additional Reading Commission on Enhancing National Cybersecurity: https://www.nist.gov/sites/default/files/documents/2016/12/02/cybersecurity-commissionreport-final-post.pdf

Security Scorecard: 2016 US Government Cybersecurity Report: https://cdn2.hubspot.net/hubfs/533449/SecurityScorecard_2016_Govt_Cybersecurity_Rep ort.pdf

16

IBM Security

IBM Security product portfolio Security Operations and Response

Information Risk and Protection

Incident Response

Cloud Security

Mobile Security

Resilient Incident Response Platform

Cloud Identity Service and IBM SaaS, PaaS, and IaaS security products

MaaS360

Cyber Threat Analysis Identity Governance and Access Management

i2 Enterprise Insight Analysis

Identity Governance and Intelligence | Access Manager Security Intelligence and Analytics

Privileged Identity Manager | Directory Suite

QRadar SIEM | QRadar on Cloud | QRadar Incident Forensics

Identity Manager | zSecure suite

QRadar Advisor with Watson Advanced Fraud Prevention Vulnerability and Patch Management

Endpoint and Network Protection

User Behavior Analytics

QRadar Vulnerability Manager

BigFix

QRadar User Behavior Analytics

BigFix

Carbon Black Protection / Response

Trusteer Rapport | Trusteer Fraud Protection Trusteer Pinpoint Malware Detection | Trusteer Mobile Data Protection

Application Security

Guardium

AppScan

Key Lifecycle Manager

Application Security on Cloud

Network Protection

Arxan App Protection

Security Research and Threat Intelligence X-Force | X-Force Exchange | App Exchange

17

IBM Security

IBM Security offers the industry’s first integrated, end-to-end Security Operations and Response Platform Prevent, detect, and respond to threats with an intelligent, orchestrated, automated platform HR

LEGAL

CEO

CISO

IT

• See, understand, and act on all endpoint threats IBM BigFix • Prevent network exploits and limit malware communications IBM Security Network Protection

SECURITY OPERATIONS AND RESPONSE Incident Response

Security Intelligence and Analytics Endpoint and Network Protection

User Behavior Analytics

Security Operations and Incident Response Services

IDS | NIPS | AV | DLP | FW | DBs | Apps | …

18

IBM Security

• Significantly reduce threat research and response time IBM QRadar Advisor with Watson

• Use cyber analysis to hunt for attackers and predict threats IBM i2 Enterprise Insight Analysis

Cyber Threat Analysis

Vulnerability and Patch Management

• Use advanced analytics to discover and eliminate threats IBM QRadar Security Intelligence

• Orchestrate and automate the incident response process IBM Resilient Incident Response Platform • Enhance attack detection and investigation with threat intelligence IBM X-Force Exchange

• Quickly defend your organization with apps and add-ons IBM App Exchange • Deliver operations consulting to help implement processes and response experts when something goes wrong IBM Security Services

IBM Security has the industry’s most comprehensive solution for Information Risk and Protection Keep your information protected while securely interacting with employees and consumers LOB

RISK

CISO

AUDIT

IT

• Deliver visibility, control and protection of cloud apps IBM Cloud Security • Mobile productivity and enterprise security without compromise IBM MaaS360

INFORMATION RISK AND PROTECTION

• Govern and enforce context-based access to critical assets IBM Identity Governance and Access Management • Protect crown jewels across the enterprise and cloud IBM Guardium

Cloud Security

Mobile Security

Identity Governance and Access Management Advanced Fraud Prevention Data Protection

Application Security

Governance, Risk and Compliance Services

19

IBM Security

• Scan and remediate vulnerabilities in modern applications IBM AppScan • Stop financial and phishing fraud, and account takeovers IBM Trusteer • Deliver governance, risk and compliance consulting, systems integration and managed security services IBM Security Services

With proven global expertise, IBM Security Transformation Services deploys and manages optimized security programs • Automate governance, risk and compliance programs Security Strategy, Risk and Compliance CEO

CIO

CISO

CRO

CCO

CLO

• Build security operations and security fusion centers Security Intelligence and Operations • Take a programmatic approach to security testing X-Force Red Offensive Security

SECURITY TRANSFORMATION SERVICES Management Consulting

Systems Integration

Security Strategy, Risk and Compliance Security Intelligence and Operations X-Force Red Offensive Security X-Force Incident Response and Intelligence Identity and Access Management Data and Application Security Infrastructure and Endpoint Security

20

IBM Security

Managed Security

• Establish proactive incident response programs X-Force Incident Response and Intelligence • Modernize identity and access management for the cloud and mobile era Identity and Access Management • Deploy robust critical data protection programs Data and Application Security • Redefine infrastructure and endpoint solutions with secure software-defined networks Infrastructure and Endpoint Security