Security Strategies - Security Operation Optimization

16
CONFIDENTIAL | www.mobily.com.sa Security Strategies Security Operation Optimization www.mobily.com.sa

description

Presented by Rami Abu-aqlin (Security Services Product Manager, Mobily) at the Security and Resiliency Conference 2014 in Jeddah, KSA.

Transcript of Security Strategies - Security Operation Optimization

Page 1: Security Strategies - Security Operation Optimization

CONFIDENTIAL | www.mobily.com.sa

Security Strategies

Security Operation Optimization

www.mobily.com.sa

Page 2: Security Strategies - Security Operation Optimization

2 01-May-14

Agenda

Security Outlook

Security Importance & Challenges

Security Indexing

Why Mobily-IBM?

Security Solutions

Page 3: Security Strategies - Security Operation Optimization

3 01-May-14

Security Outlook

All websites had at least one

serious vulnerability

Organizations perform some amount of application testing

193 days for resolving serious

vulnerabilities from first notification

organizations have a Web Application Firewall (WAF)

Organizations perform amount software security training for programmers

11% more

vulnerabilities

8% Resolved

Slower

7% Lower

Remediation

Rate

#1 driver for resolving vulnerabilities

was “COMPLIANCE”, narrowly ahead

of "RISK REDUCTION"

Source: White Hat Report, May 2013

Page 4: Security Strategies - Security Operation Optimization

4 01-May-14

Brand

Reputation

& Business

Results

Board Discussion Attacks Become More Sophisticated & Targeted

CEO

Business

Continuity &

Audit Risk

COO

Improve

Security

Posture &

Systems

Availability

CTO/CIO

Cost

Reduction

CFO

Maintaining

Skilled

Personnel

CHRO

Page 5: Security Strategies - Security Operation Optimization

5 01-May-14

Security Challenges

Compliance

Expenses Addressing Risk Skilled Personnel

Complexity of

Controlling Agile Operation

Mobility Cloud / Virtualization Social Business

Impacting Speed to Innovation

Business Intelligence

Page 6: Security Strategies - Security Operation Optimization

6 01-May-14

Do You Think, You Are Secured?! Bad-Good Real Life Example

MANAGE, MONITOR, CORRELATE, REPORT, & REMEDIATE

REVISIT YOUR SECURITY ENVIRONMENT

PEOPLE PROCESSES TECHNOLOGY

Page 7: Security Strategies - Security Operation Optimization

7 01-May-14

Do You Think, You Are Secured?! Security Breaches

7th April Attacks “On April 7, 2014, we call upon our brothers and sisters to hack, deface, hijack, database leak, admin takeover, and DNS terminate Israeli cyberspace by any means necessary,” … following this threaten statement in March-2014, many warnings were executed, and many websites went down for sometime The first cyber-attacks under the name OpIsrael were launched by Anonymous during and Israeli assault on Gaza in November 2012. Around 700 Israeli websites, including high-profile government setups such as the Foreign Ministry and the Israeli President's official website, were taken down. Following the attack, Anonymous posted the personal data of 5,000 Israeli officials online. The websites of the Israeli parliament, ministries and other government organizations stopped operating for some time on April 7, 2013.

Page 8: Security Strategies - Security Operation Optimization

8 01-May-14

Do You Think, You Are Secured?! Security Attacks

2012 2013 2014 2011

Page 9: Security Strategies - Security Operation Optimization

9 01-May-14

Respond Faster and Smarter

The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows anyone on the Internet stealing the information protected, under normal conditions, by the SSL/TLS encryption used to secure the Internet.

Page 10: Security Strategies - Security Operation Optimization

10 01-May-14

1. Most comprehensive Vulnerability Database in the world • Over 68,000 unique vulnerabilities

cataloged • Entries date back to the 1990’s

2. Updated daily by a dedicated research team 3. The X-Force database currently tracks over…

• 8000 Vendors • 17,000 Products • 40,000 Versions

Security Intelligence Service

IBM X-Force® Threat Analysis Service (XFTAS) is a security intelligence service that delivers customized information about a wide array of threats that could affect your

network security.

Page 11: Security Strategies - Security Operation Optimization

11 01-May-14

World-Class Security Technology Services Provider Leader in the market

Security Consulting Services Managed Security Services

Provider (MSSP)

Source: Gartner & Forrester

SIEM Solution

Page 12: Security Strategies - Security Operation Optimization

12 01-May-14

State of Art SOC

• 10 Security Operations Centers • 3,700+ MSS clients worldwide • 20,000+ security devices • 15B+ security events daily

• Recording over 30k incident daily • Monitoring in 133 countries • Using a grid of 725+ systems • Maintaining 99.9+% availability

MSS Global Facts and Figures

Riyadh, KSA

Riyadh Malga 2 Data Center

Page 13: Security Strategies - Security Operation Optimization

13 01-May-14

Cloud Security Services

Hosted vulnerability management services

Hosted security event and log management services

X-Force® Threat Analysis System

Security

Requirements

Managed and monitored firewall services

Managed Intrusion Protection System (IPS) and Intrusion Detection System (IDS) services

Managed Unified Threat Management (UTM) services

Managed Security Services

The Managed Security Services (MSS) provide 24/7/365 monitoring and management of security technologies and threat analysis, and single management console of the client’s

entire security infrastructure

Managed Security Services

Professional Security Services

Page 14: Security Strategies - Security Operation Optimization

14 01-May-14

Vulnerability Management

Service

Security Information

& Event Management

(SIEM)

Security Event & Log

Management (SELM)

Source Code Review

Managed Network Security Service

(FW, IPS/IDS, UTM)

Penetration Testing

SOC Assessment

Data Classification

and DLP

Identity & Access

Management

ISO 27001

Certification

Fortify Your Business

Turnkey Security Solutions

Page 15: Security Strategies - Security Operation Optimization

15 01-May-14

360o Security

Protection

People

Applications

Data

Infrastructure

Threat Intelligence

Intelligent Security Monitoring

"Managed Security Services

(MSS) will allow MoE to turn an in-house security daily operations management into hybrid turnkey security solution. In addition, MSS will improve the security posture, and keep MoE updated with the worldwide security landscape; so we can respond proactively to potential

threats." Mr. Abdullah Aleid,

GM information Security, Ministry of Education (MoE), KSA

Page 16: Security Strategies - Security Operation Optimization

CONFIDENTIAL | www.mobily.com.sa

THANK YOU

CONFIDENTIAL | www.mobily.com.sa