hawaii dgs 16 presentation - future of cybersecurity - cohn
TRANSCRIPT
The Future of Cybersecurity
Mark Cohn
Need title
The Future of Cyber Security
Mark Cohn
Chief Technology Officer, Unisys
© 2016 Unisys Corporation. All rights reserved. 2
It’s Not Just an IT Problem
• Impact on Society
• People and Process Challenges
• Technology Leap Forward
“Hawaii consumers who
believe they may be at
risk are urged to take
immediate steps to
protect their personal
credit information as well
unauthorized access to
their credit or debit card
accounts.”
In the News…
Source: Hawaii News Now
© 2016 Unisys Corporation. All rights reserved. 7
INFORMATION TECHNOLOGY
OPERATIONAL TECHNOLOGY
PERSONAL TECHNOLOGY
Internet of Things (IoT) Increases Vulnerabilities
© 2016 Unisys Corporation. All rights reserved. 8
Cyber is not just an IT challenge—
it’s a Leadership Challenge
© 2016 Unisys Corporation. All rights reserved. 11
Key Action Areas in Cyber
• Cyber workforce development
• Adaptive security architecture from prevent—to detect
and respond
• Strong authentication, device hardening, and reduced
attack surface
• Micro-segmentation—augmenting or replacing
perimeter protection with identity services and strong
encryption
© 2016 Unisys Corporation. All rights reserved. 12
Cyber Leap Forward
• The pay-off from the cloud – provides a
foundation for a “leap forward”
improvement in cyber protection posture
• The move to a software-defined enterprise
will enable a break-through in the data
center and the cloud
• Virtualization today is primarily focused
on computing not storage networking or
security
• Virtualization + software-defined security
provides new paradigm for how cyber
assets can be protected in the enterprise
• Automated workload movement for active
defense
© 2016 Unisys Corporation. All rights reserved. 13
Safeguarding High Value Assets
• Hiding virtual devices
and assets
• Dynamically changing
location to hinder
attacker access
• Using advanced
intrusion and
protection
technologies to move
assets prior to
successful penetration
Critical Benefits
Orchestration
Engine
Movement Between Data Centers & Commercial Clouds
Data Center
CryptoFirewall
SDN
SwitchStorageServer
VM VSt VN VFWAPDS
APPS
VC
App
Workload Movement
Commercial Cloud
CryptoFirewall
SDN
SwitchStorageServer
VM VSt VN VFW
ADPS
VC
App
APDS
© 2016 Unisys Corporation. All rights reserved. 14
Resources
Center for Internet Security
https://www.cisecurity.org
NSA’s Top 10 Mitigation Strategies
https://www.iad.gov/iad/library/ia-guidance/iads-top-10-
information-assurance-mitigation-strategies.cfm
NIST Cyber Security Framework
http://www.nist.gov/cyberframework
Navigating the Digital Age:
The Definitive Cybersecurity Guide for Directors and Officers
https://www.securityroundtable.org/the-boOK/
© 2016 Unisys Corporation. All rights reserved. 15
Moving to New Normal
• Cybercrime sophistication
• Critical infrastructure resiliency
• Innovation with security baked in:
new technologies, IoT, and digital
cities
• Evolving workplace of the future