And so the commonalities:
- Improperly segmented networks
- detection deficit disorder (ignoring or looking at incidents in wrong places)
- Failure to white list
- Not monitoring critical systems
- Poor awareness
- No multi-factor authentication
- Phishing messages
Can’t have an IT discussion without, The Cloud – Companies should be responsible for their data and so warrants should be issued to the individual organization not to the cloud service providers. Yes, worth more than a few words but does allow and command more transparency for customers and their clients to have the level of “trust” and necessary attestation upon signing-up for cloud services. Matters of privacy is a timeless value and a balance between right to privacy and personal data, public value, and safety will be in the hot seat in legal, courts as the laws try to catch up with technology.
RSA’s key note heightened the privacy issues and how that would related to opening pandora’s box for allowing backdoors, etc. revealed without textual diligence, modern technological construct and consideration of its impact, both fundamental practices in the past as well as decisions for the future.
So, what’s the long-and-short? Defense in Depth is Dead. The source is not connecting data elements and lack of collaboration within teams and outside company boundaries. Solutioning is based on now based on integration and not layers! The 6 key domains are
- Discovery-got to know what’s on networks not just servers but cloud providers, IOT
- State of security for each asset we own – not just vulnerability , malicious file e.g. phishing exploiting client-side vulnerability
- Need ability to monitor activity across the network – packet inspection integration
- Analyze – pulling domains together (event correlation, behavior analysis) to prioritize
- Response – typically the SOC and effectively response
- Protect – proactively protect devices (NOT prevent) and can it be done in an automated way – longest item for industry to solve since it’s based on trust of ability to do this
As a result, the upshot is (1) results will be visibility (for all state of assets including shadow), (2) understanding critical context (to prioritize threats/weaknesses), and (3) ability to take appropriate action in a decisive manner. Conclusion instead is Long Live Depth in Defense.
More recap / notes...as RSAC comes to a close
No comments:
Post a Comment