O slideshow foi denunciado.
Utilizamos seu perfil e dados de atividades no LinkedIn para personalizar e exibir anúncios mais relevantes. Altere suas preferências de anúncios quando desejar.

Securely Enabling the Digital Age

316 visualizações

Publicada em

Securely Enabling the Digital Age

Publicada em: Tecnologia
  • Seja o primeiro a comentar

  • Seja a primeira pessoa a gostar disto

Securely Enabling the Digital Age

  1. 1. World® ’16 Securely Enabling the Digital Age Andrew McCullough - Security Consultant - Hewlett Packard Enterprise SCT74S SECURITY
  2. 2. 2 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2016 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2016 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  3. 3. 3 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract The digital reality is already upon us, and making a successful move to digital requires a coordinated effort and a comprehensive view of supporting technologies. To become a digital enabler, rather than focus security simply on providing digital resilience, your security must enable the business to securely transform applications into the digital age and foster clients’ trust. How can security become the accelerator for digital transformation, while providing the resilience required for the digital age? In this session, you’ll learn how security will enable the business and play a key role in transforming applications—safely and securely. Andrew McCullough Hewlett Packard Enterprise Security Consultant
  4. 4. 4 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda DIGITAL AGE DIGITAL ENABLER DIGITAL RESILIENCE 1 2 3
  5. 5. 5 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda DIGITAL AGE1
  6. 6. 6 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Digital Age Systems of Engagement & Interaction Systems of Control Systems of Record Monetize Interaction User/ Consumer is king Atoms Bits Photons Digital
  7. 7. 7 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Fully interconnected world 2020 7.6 Billion world population1 100 Billion connected devices1 1 HPE Internal Research Cyber sabotage in the physical world is a reality Identity is the new perimeter “Users just want to access data” Fully Interconnected supply chains means interconnected users & risks IoT attack surface can be used to launch massive scale attacks
  8. 8. 8 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda DIGITAL ENABLER2
  9. 9. 9 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Security as a Digital Enabler? Better interaction (CX) More interactionsSource of differentiation – Privacy and security focus – Customer’s choice – Adaptive – Biometrics – Federated – Social media Attract and retain more customers | Charge premium for privacy/security
  10. 10. 10 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Example: Enable the business with better customer experience Identity Federation Tweet: The loyalty points from the purchase I did last Wednesday weren’t credited yet Tweet: Thank you! Tweet: Apologies for the inconvenience. Just credited the respective 325 points. Retail Tweet: I just missed my flight Tweet: Perfect! Tweet: Mr. Smith, I just rebooked your flight. Please proceed to gate 9. Your flight departs in 40 minutes. Travel and Transportation
  11. 11. 11 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Today’s Digital Enterprise Needs a New Style of Protection Traditional Ultimate state – Impregnable Messaging – Fear, uncertainty, doubt Business proximity – None Accountability and leadership – IT/risk department Focus – Perimeter and information Approach – Complicate, obstruct, say no SOC focus – Regional, isolated, servers, network & security devices Protect Your Digital Enterprise – Assume a state of compromise. Digital resilience – Stop exfiltration and business disruption – Detect early. Quick and effective response – Confidence, Assurance, Visibility, prepared to respond – Enabler. Provider of business outcomes – Board, CEO, business – Protect your most critical assets and the interactions between them, regardless of device or location – Use a Risk Based Approach to address cyber maturity gaps – Includes value chain and value creation ecosystem – Lean, agile. Maximize interaction opportunities at lowest risk – Full Cyber Situational Awareness – Global, sharing threat intelligence – All devices including ICS/SCADA
  12. 12. 12 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda DIGITAL RESILIENCE3
  13. 13. 13 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Understand Today – Cyber Maturity Review (CMR) Cyber Defense (CD)
  14. 14. 14 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Accelerate tomorrow – Cyber Reference Architecture 12 in total 63 in total 345 in total Cyber Defense (CD) Risk & Compliance Management (RCM) Resilient Workforce (RW) Strategy, Leadership & Governance (SLG) Security Resilient Architecture (SRA) Physical Security (PS) Security Resilient Architecture (SRA) Cyber Defense (CD) Identity and Access Management (IAM) Infrastructure and Endpoint Security (IES) Applications Security (AS) Data Protection and Privacy (DPP) Converged Security (CS) Risk and Compliance Management (RCM) Resilient Workforce (RW) Security Orchestration and Management (SOM) Strategy, Leadership and Governance (SLG) Domain Sub -domain Sub -domain Capability Capability Capability Capability Cyber defense blueprint Identity and access management blueprint Infrastructure and endpoint security blueprint Applications security blueprint Data protection and privacy security blueprint Resilient workforce blueprint Risk and compliance management blueprint Cloud security blueprint (consumption) Cloud security blueprint (provider) Internet of things security blueprint Connected vehicle security blueprint Industrial control systems security blueprint GDPR security blueprint Collaboration security blueprint Mobility security blueprint Framework Highly structured and granular Single Domain Multi Domain 15 Blueprints
  15. 15. 15 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Don’t Miss Our INTERACTIVE Security Demo Experience! SNEAK PEEK! World® ’16© 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD15
  16. 16. 16 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Questions?
  17. 17. 17 © 2016 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Stay connected at communities.ca.com Thank you.
  18. 18. @CAWORLD #CAWORLD © 2016 CA. All RIGHTS RESERVED.18 @CAWORLD #CAWORLD Security For more information on Security, please visit: http://cainc.to/EtfYyw

×