上海品茶

您的当前位置:上海品茶 > 报告分类 > PDF报告下载

2019年IDC企业安全建设.pdf

编号:96421 PDF 42页 13.94MB 下载积分:VIP专享
下载报告请您先登录!

2019年IDC企业安全建设.pdf

1、Enterprise Security Trends IDCPete LindstromOver 25 years in InfoSec,IT,Finance Tech Risk Pro performing reading,writing,rithmetic on risk and security mattersFormer Marine(Gulf War veteran),Big Six IT Auditor(PwC),Internal Auditor(GMAC Mortgage),Security Architect&Director(Wyeth)BBA Finance,Univers

2、ity of Notre Dame;former CISSP and CISAVice President,Security StrategiesIT Executive Program,IDC“To enable digital transformation through proper IT risk management by making efficient and effective economic decisions supported by evidence and outcome analysis leading to the strongest cybersecurity

3、program possible.”The Cybersecurity Mission StatementDigital Transformation(DX)DefinedThe application of 3rdPlatform and related technologies to fundamentally improve all aspects of society.For business this means:$1.2T in 2017$2.0T in 2020$1.4T in 2018$1.7T in 2019$6.3T Direct DX InvestmentNew sour

4、ces of innovation and creativity to enhance experiences and improve financial performance.Simply modernizing the technology underpinning existing systems is not transformation.TRANSFORMUsing information to create an evidence based culture.Companies should plan on doubling the productivity of their k

5、nowledge workers by using information more effectively.DECISION MAKINGDigital transformation is not to be confused with digital technologies,however,it does use 3rdPlatform technologies such as Cloud,mobility,Big Data,and social as well as Innovation Accelerators including IoT,robotics,and 3D printi

6、ng.WITH TECHNOLOGYCybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSDX Security PerformanceScorecard Critical Success Metrics and KRIsDX Trust PlatformAligning Security with Business PartnersDX Risk RoadmapsPrioritizing the Industry Risk JourneyDX Security Organiz

7、ationOvercome the IT Security Skills GapDX Security CapabilitiesReshaping Security and Technology ExpertiseCybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSIDC Energy Insights:Energy as a ServiceDistributed EnergyPredictive GridDigital GridDistributed Energy Mana

8、gementIntelligent Grid ManagementMicrogridsPredictive Grid ControlSmart AssetsStrategic Asset ManagementConnected AssetsAsset InstrumentationFailure Models&Effects Analysis(FMEA)AutomationPredictive Underground Line ServicesDrone-Based Line InspectionSelf-Healing AssetsAsset Performance ManagementCo

9、nnected ConsumerReliability as a ServiceCustomer TransparencyPublic SafetyDER as a Reliability Enabler360 Connected Customer ManagementService Safety AlertsDevise-Based Energy ProgramsWater QualityClosed Loop Outage ManagementPersonalized MarketingLeak DetectionEnhanced Personal SafetyNext-Gen Safet

10、yVirtual MusterConnected Safety WearEnhanced Process SafetyProcess Self InspectionProcess Condition MonitoringVirtual Power PlantEquipment Health CommunicationOrchestrated Demand ResponseGlobal Trade AutomationDigital Grid SimulationDigital Corrosion ManagementAugmented MaintenanceRevenue Protection

11、PROGRAMSUSE CASESStrategic PrioritiesIDC Energy Insights:Energy as a ServiceDistributed EnergyPredictive GridDigital GridDistributed Energy ManagementIntelligent Grid ManagementMicrogridsPredictive Grid ControlSmart AssetsStrategic Asset ManagementConnected AssetsAsset InstrumentationFailure Models&

12、Effects Analysis(FMEA)AutomationPredictive Underground Line ServicesDrone-Based Line InspectionSelf-Healing AssetsAsset Performance ManagementConnected ConsumerReliability as a ServiceCustomer TransparencyPublic SafetyDER as a Reliability Enabler360 Connected Customer ManagementService Safety Alerts

13、Devise-Based Energy ProgramsWater QualityClosed Loop Outage ManagementPersonalized MarketingLeak DetectionEnhanced Personal SafetyNext-Gen SafetyVirtual MusterConnected Safety WearEnhanced Process SafetyProcess Self InspectionProcess Condition MonitoringVirtual Power PlantEquipment Health Communicat

14、ionOrchestrated Demand ResponseGlobal Trade AutomationDigital Grid SimulationDigital Corrosion ManagementAugmented MaintenanceRevenue ProtectionPROGRAMSUSE CASESStrategic PrioritiesManufacturing InsightsDX Use Cases:where the value is!IDC Energy InsightsAgile EnergyAgile MiningEnergy-as-a-ServiceIDC

15、 Financial InsightsConnected BankingContextual and Value Centric InsuranceIDC Government InsightsEffective National GovernmentSmart Cities and CommunitiesIDC Health InsightsKnowledge-Based MedicineValue-Based HealthIDC Manufacturing InsightsCollaborative Innovation(AOVC)Engaging Consumer Experience

16、at Scale(BOVC)Creating Experience Ecosystems(EOVC)Technology-as-a-Service(TOVC)IDC Retail InsightsExperiential Hospitality,Dining&TravelExperiential RetailIDC Telecommunications InsightsCommunications Service-Enabled Connected CommunitiesLearn more at Use Cases:where the value is!IDC Energy Insights

17、Agile EnergyAgile MiningEnergy-as-a-ServiceIDC Financial InsightsConnected BankingContextual and Value Centric InsuranceIDC Government InsightsEffective National GovernmentSmart Cities and CommunitiesIDC Health InsightsKnowledge-Based MedicineValue-Based HealthIDC Manufacturing InsightsCollaborative

18、 Innovation(AOVC)Engaging Consumer Experience at Scale(BOVC)Creating Experience Ecosystems(EOVC)Technology-as-a-Service(TOVC)IDC Retail InsightsExperiential Hospitality,Dining&TravelExperiential RetailIDC Telecommunications InsightsCommunications Service-Enabled Connected CommunitiesLearn more at th

19、e RISK!and the RISK!DX Risk Roadmaps Key to SuccessSuccessful cybersecurity programs strategically align with the risks associated with their organizations digital transformation use cases.Cybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSThe Many Faces of Cyberse

20、curityTECHCONTROLSBIZCOMMERCECOPCRIMELAWCOUNSELCyberPOLICYFRAUDRISKCOMPLYFRAUDIRPRIVACYFORENSICSBridging the Technology Skills GapDX Security Organization Key to Success Successful cybersecurity programs address the cybersecurity skills gap through internal training,security-at-scale,and strategic o

21、utsourcing.Cybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSDigital Security FunctionsIDENTITY MGTValidate human identities.Create,modify,and revoke user accounts/credentials.Define and assign user access rules.Monitor user behavior.Account ProvisioningPassword R

22、esetKnowledge-based Identity ValidationIdentity Access GovernanceUser Session RecordingPassword AuthnOTP Hard Token AuthnSmartcard AuthnSoft Token AuthnStatic Biometric AuthnBehavioral Biometric AuthnSingle Sign-on(federation)Authn Triggers(stepup)Web Access Mgt(authz)Shared Credential MgtPrivilege

23、RestrictionsVULN MGTEliminate services and processes.Reduce known weaknesses.Identify and patch vulnerabilities.Reduce coding errors.Filter connection attempts.Vuln ScanningApply Update/PatchStatic AnalysisDynamic AnalysisFirewall Policy MgtPolicy OrchestrationStatic Network FiltersDynamic Network F

24、iltersURL FiltersAPI FiltersMicrosegmentationApplication IsolationRemote BrowsersWhitelist(known good)Runtime App Self-ProtectionTRUST MGTManage overall digital security program.Manage usage policies.Manage IT policies and procedures.Classify and harden data and systems.Key Management3rdParty Assess

25、mentsPolicy ManagementRisk Register ManagementRisk AnalyticsCompliance ManagementRemote Access VPNSite-Site VPNSession VPN(app)Endpoint EncryptionBasic File EncryptionPolicy-based File EncryptionDatabase EncryptionFile Integrity CheckingDigital SignaturesTrusted BootHardware Security ModulesTrusted

26、Platform ModulesSecure ElementsRemote AttestationTHREAT MGTMonitor usage activity.Determine whether activity is malicious or inappropriate.Block/alert on inappropriate activity.Conduct forensic analysis.Manage incidents.Contextual Analysis(SIEM)Algorithmic Analysis(big data)System ForensicsNetwork F

27、orensicsIncident MgtBreach Patterns(IoC feeds)Malware SignaturesFile Behavior Analysis(sandbox)System Anomaly DetectionIP/URL BlacklistsNet Intruder SignaturesNetwork Anomaly DetectionDenial of Service ProtectionEmail Anti-SpamBreach DetectionRegEx Data Leak DetectionDocument FingerprintingDeception

28、(honeypots,etc)SERVICEPROCESSTECHNOLOGYDigital Security FunctionsIDENTITY MGTValidate human identities.Create,modify,and revoke user accounts/credentials.Define and assign user access rules.Monitor user behavior.Account ProvisioningPassword ResetKnowledge-based Identity ValidationIdentity Access Gov

29、ernanceUser Session RecordingPassword AuthnOTP Hard Token AuthnSmartcard AuthnSoft Token AuthnStatic Biometric AuthnBehavioral Biometric AuthnSingle Sign-on(federation)Authn Triggers(stepup)Web Access Mgt(authz)Shared Credential MgtPrivilege RestrictionsVULN MGTEliminate services and processes.Reduc

30、e known weaknesses.Identify and patch vulnerabilities.Reduce coding errors.Filter connection attempts.Vuln ScanningApply Update/PatchStatic AnalysisDynamic AnalysisFirewall Policy MgtPolicy OrchestrationStatic Network FiltersDynamic Network FiltersURL FiltersAPI FiltersMicrosegmentationApplication I

31、solationRemote BrowsersWhitelist(known good)Runtime App Self-ProtectionTRUST MGTManage overall digital security program.Manage usage policies.Manage IT policies and procedures.Classify and harden data and systems.Key Management3rdParty AssessmentsPolicy ManagementRisk Register ManagementRisk Analyti

32、csCompliance ManagementRemote Access VPNSite-Site VPNSession VPN(app)Endpoint EncryptionBasic File EncryptionPolicy-based File EncryptionDatabase EncryptionFile Integrity CheckingDigital SignaturesTrusted BootHardware Security ModulesTrusted Platform ModulesSecure ElementsRemote AttestationTHREAT MG

33、TMonitor usage activity.Determine whether activity is malicious or inappropriate.Block/alert on inappropriate activity.Conduct forensic analysis.Manage incidents.Contextual Analysis(SIEM)Algorithmic Analysis(big data)System ForensicsNetwork ForensicsIncident MgtBreach Patterns(IoC feeds)Malware Sign

34、aturesFile Behavior Analysis(sandbox)System Anomaly DetectionIP/URL BlacklistsNet Intruder SignaturesNetwork Anomaly DetectionDenial of Service ProtectionEmail Anti-SpamBreach DetectionRegEx Data Leak DetectionDocument FingerprintingDeception(honeypots,etc)SERVICEPROCESSTECHNOLOGY38%32%30%30%Top Can

35、didates for Automation Password Resets Provisioning Single Sign-on Advanced AuthTRUST Patch Management Continuous Assessments FW Policy Orchestration Alert Context/Aggregation Attack Identification Incident ManagementIDENTITY Policy/Governance 3rdParty Risk Certificate ManagementVULNERABILITYTHREATB

36、uilding Blocks of Digital TransformationDistributed Integrity Model(Zero Trust)Focused on users,data,and workloads Virtual elements dynamically tied to the“channels and containers”world of network/operating platform.Integrity validated by roots of trust or“tethers”that leverage cryptography.TPMs,HSM

37、s,Secure Elements,etc.As users,data,compute objects travel through channels and containers,they are“traced”through gateways and across trust zones.DX Security Innovations(Risk)Intelligent Core Data ServicesIntegration&OrchestrationDeveloper ServicesEngagementIDMultifactor Auth&FederationRisk-basedAu

38、thenticationUser BehaviorAnalyticsFederation&NotificationHardenedSecurity PostureSecurityOrchestrationPaaS/API SecDevSecOpsSDN Security3rdParty ScoresCognitive&AnalyticsMonitoring&AutomationThreat ModelingIntelligence&DeceptionBlockchain&Rights MgtPKI/Certificates&Roots of TrustSW SecurityData Sheet

39、sCompliance&CyberinsuranceDX Security Capabilities Key to SuccessSuccessful cybersecurity programs automate their security processes and innovatetheir architectures for dynamic technology environments.Cybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSDigital trust

40、 enables decisions to be made between two or more entities that reflect their level of confidence in each other;these decisions are based on each entitys digital reputation as well as the risk levels provided by each entitys cybersecurityprograms for any proposed digital activity.IDC Digital Trust F

41、rameworkBigger Picture Risk in DX WorldPerson(“Public”)BusinessMachineP2PIntoleranceMob JusticeB2CPrivacy BreachesEmployee TrustG2CitizenDisinformationSurveillanceM2PBias OutPerson(“Public”)BusinessMachineC2BBot FraudB2BSupply Chain Issues3rd/4thPartiesG2BRegulations/BansM2BBias OutCitizen2GPolitica

42、l ActionsActivismB2GLobbyistsG2GCyberwarfareInternet SanctionsM2GBias OutP2MBias InB2MBias InG2MBias InM2M?Person(“Public”)BusinessMachineP2PSocial MediaLI endorsementsB2CLoyalty/FICOBackground ChecksG2CitizenPassports/Valid IDSocial ScoreM2PSSO/MFAUBAPerson(“Public”)BusinessMachineC2BProvider Ratin

43、gsDigital Trust IndexB2BContractsDigital Trust IndexG2BRegulationsM2B3rdParty Risk ScoresCitizen2GMediaWatchdog GroupsB2GLegal EntitiesG2GTreatiesM2GEncryptionP2MDevice IDRoot of TrustB2MCybersecuritySW Bill of MaterialsG2MDevice RegistryCryptoM2MBlockchainIntegrityDigital Trust Platform Key to Succ

44、essSuccessful cybersecurity programs automate their security processes and innovatetheir architectures for dynamic technology environments.Cybersecurity for Digital TransformationKEY TRENDS AND PATHWAYS FOR DIGITAL DISRUPTORSSecurity spending vs.total incidentsRelative security valueThe Best Email S

45、ecurity Single Sign-on Firewalls User Awareness Training File EncryptionThe Worst 3rdParty Risk Scoring Audit/Vendor Risk Mgt Incident ResponseKey Risk Indicators(KRIs)Control OutcomePopulationEfficacy/ErrorsNormalizedEndpoint Antimalware allowed/deniedFirewall connections allowed/deniedIntrusion Pr

46、evention flows allowed/deniedEmail Security messages allowed/deniedSecure Web Gateway sessions allowed/deniedFile ObjectsNetwork Flows/ConnectionsNetwork Flows/Connections File ObjectsEmail MessagesWeb Sessions(outbound)Malware blocked(TP);Legitimate file allowed(TN);Legitimate file blocked(FP);Malw

47、are allowed(FN)Connection blocked(TP);Legitimate connection allowed(TN);Legitimate connection blocked(FP);Connection allowed(FN)Connection/malware blocked(TP);Legitimate connection/file allowed(TN);Legitimate connection/file blocked(FP);Connection/malware allowed(FN)Phish/malware blocked(TP);Legitim

48、ate email allowed(TN);Legitimate email blocked(FP);Phish/malware allowed(FN)Malicious/inappropriate Web blocked(TP);Legit Web session allowed(TN);Legit Web session blocked(FP);Malicious/inappropriate Web allowed(FN)Number of files transmittedTotal filesNumber of endpointsNumber of usersBusiness Unit

49、/DepartmentNumber of flowsNumber of active IP addressNumber of open portsNumber of applicationsBusiness unit/DepartmentNumber of flowsNumber of active IP addressNumber of open portsNumber of files transmittedNumber of applicationsBusiness unit/DepartmentNumber of messagesNumber of usersNumber of Web

50、 sessionsNumber of usersSuccess AreasBusiness DecisionEssentialKPIIDCRecommended TargetDX Security Performance Key to SuccessSuccessful cybersecurity programs develop digital KPIs to measure the efficiency and effectiveness of their programs.Cybersecurity for Digital TransformationKEY TRENDS AND PAT

51、HWAYS FOR DIGITAL DISRUPTORSDX Security PerformanceScorecard Critical Success Metrics and KRIsDX Trust PlatformAligning Security with Business PartnersDX Risk RoadmapsPrioritizing the Industry Risk JourneyDX Security OrganizationOvercome the IT Security Skills GapDX Security CapabilitiesReshaping Se

52、curity and Technology ExpertisePete LindstromVice President,Security StrategiesIDCPLIDC is the premier global provider of market intelligence,advisory services,and events for the information technology,telecommunications,and consumer technology markets.IDC helps IT professionals,business executives,

53、and the investment community make fact-based decisions on technology purchases and business strategy.More than 1,100 IDC analysts provide global,regional,and local expertise on technology and industry opportunities and trends in over 110 countries worldwide.For more than 50 years,IDC has provided st

54、rategic insights to help our clients achieve their key business objectives.IDC is a subsidiary of IDG,the worlds leading technology media,research,and events company.Terms of Use:Except as otherwise noted,the information enclosed is the intellectual property of IDC,copyright 2016.Reproduction is forbidden unless authorized;contact for information.All rights reserved.感 谢 聆 听感 谢 聆 听感 谢 聆 听

友情提示

1、下载报告失败解决办法
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站报告下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。

本文(2019年IDC企业安全建设.pdf)为本站 (云闲) 主动上传,三个皮匠报告文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知三个皮匠报告文库(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。
会员购买
客服

专属顾问

商务合作

机构入驻、侵权投诉、商务合作

服务号

三个皮匠报告官方公众号

回到顶部