2. 2PREDIX TRANSFORM
Agenda
Security is a GOOD
word…
2
Shrink vulnerabilities
& cost
3
Application to
infrastructure
4
Isolating BAD stuff
5
Coordinating security
6
Advancement of
Cyber threat
globalization
1
3. 3PREDIX TRANSFORM
Say goodbye to
Cyber-crime…
Life changing
scenario
Collateral damage –
risk-based approach
Global Cyber War
Forget about user-based
devices
Internet of Things
Machine-to-machine cyber
attacks
Data and Analytics
Standard processes &
get Certified…
Security & Privacy
Moving from
Defense to Risk…
New Cyber Solutions
9. 9PREDIX TRANSFORM
Even with massive OT connected growth…
… only an 2 – 8% of power generation data is used today.
Energy Processing & Production automation
will drive higher use of data across Industrial Internet
12. 12PREDIX TRANSFORM
Predix Cyber & Operational
SecurityEnd-to-end Trust – Machine – IT – App -
User
PROTECT
OT/IT IN AN
APP FACTORY
DELIVERY
MODEL
SECURE &
CERTIFY
OPERATIONAL
INFRASTRUCTU
RE
BRING
OPERATIONAL
AVAILBILITY &
GOVERNANCE
WITH “IT”
ESTABLISH
USER-BASED
WORLD FOR
INDUSTRIAL
APPS
… app users to operational … at every connection & layer … automated secure apps … absolute visibility
13. 13PREDIX TRANSFORM
Inspection, Detection and Monitoring
Visibility across the stack
Continuous
Monitoring
Network
Web Tier
CF Platform
VM Platform
Access
• DDoS Mitigation (16Q1)
• DNS Protection (16Q1)
• Edge ACLs & NG FW
• Multiple Layers IDS/IPS
• SDN Cross Boundary
FWs
Inspection & Detection
• Web Application FW
• Runtime Application
Security Protection
(16Q1)
• CF App Containerization
and Security Groups
Host and OS
• VM and ESXi Host Logs
• Linux and Windows Logs
• Host AV
• Host IPS , FIM, etc.
(16Q1)
• PAM – CF UAA/ACS
• PAM –
Apps/Infrastructure
Monitoring
Point of
Presence
SOC
SIEM
Predix SOC
Predix
Security Analytics
Predix Cyber
Security Analysts
14. Division of Labor
Predix Application Security
Predix Platform
Core Infrastructure, Services & GE Enterprise
• Business-specific response team
• Deal with inbound infections from customers and data spill
• Secure by design, development and deployment
• Face to the Customers & Product Engineering teams
• Predix Ecosystem Defense
• Responsible for East/West microservice defense
• Growing Security Operations “Muscle Mass”
• Joint SOC Operations with GE
• Leverage of GE Parent where needed
• Defense of the Enterprise focused
• Scaffolding Predix defense needs where appropriate
• Threat Intelligence and SIEM integration
• Incident Response coordination where needed (multi-business impact)
PREDIX
15. 15PREDIX TRANSFORM
Security Operations Center
The SOC Offers
• 24 x 7 x 365 network security monitoring for the following
technologies:
o Integrated Security Information & Event Management (SIEM)
o Signature-based Intrusion Detection & Prevention
o Behavioral-based enterprise network security
o Log monitoring & management
• Incident Response (Security Alert and Response Procedure)
& Forensics
• Research Alerts, Events, Vulnerabilities
• Reporting – Weekly, Monthly, Quarterly,
Ad-hoc, Compliance, and Custom
• Vulnerability Scanning & Reporting
• Signature Updates
• Custom Signatures
• Tuning
Predix SOC
18. 18PREDIX TRANSFORM
Predix – Universal Compliance & Governance
All customer engagements begin with a Predix Controls Matrix (PCM) mapping
exercise based on the controls requested by the customer and their regulatory needs
Predix leverages the Cloud Security Alliance
Common Control Matrix (CCM) as the
baseline for our controls in order to meet
shared and cloud security requirements with
visibility and transparency.
Our underlying policies, procedures,
processes, practices & TSRs are
implemented around ISO/IEC 27001/2,
AICPA 2014 TSC (SOC), NIST 800-53 &
HIPAA – built into 133 policy controls across
these 16 areas:
Application & Interface Security 4
Audit Assurance & Compliance 3
Business Continuity Management & Operational Resilience 11
Change Control & Configuration Management 5
Data Security & Information Lifecycle Management 7
Datacenter Security 9
Encryption & Key Management 4
Governance and Risk Management 11
Human Resources 11
Identity & Access Management 13
Infrastructure & Virtualization Security 13
Interoperability & Portability 5
Mobile Security 20
Security Incident Management, E-Discovery & Cloud Forensics 5
Supply Chain Management, Transparency and Accountability 9
Threat and Vulnerability Management 3
Grand Total 133
All customer engagements begin with a Predix Controls Matrix (PCM) mapping
exercise based on the controls requested by the customer and their regulatory needs
19. 19PREDIX TRANSFORM
Solution areas of focus
Micro-
containerization &
Micro-segmentation
Data heritage and
lineage
Standardized
controls &
certifications
Analytic proofing &
verification
Multi-party
Security
Operations
Risk-based
defensive
systems
Incident profiling
Anomaly
Detection &
Modeling
20. 20PREDIX TRANSFORM
Wrap it up…
Cyber
landscape
evolving,
increased
complexity &
cost
Globalization of
cyber patterns
driving high
impact
collateral
damage
IIoT –
Machines
making
decisions on
data – sweet
spot
Pure data set &
clean analytics
– next
generation of
cyber
Get yourself
cyber-aware,
certified &
SecDevOps
Cyber areas
are risk-
focused going
forward – full
defense in
depth