it’s secure! or is it … how do you know for sure? · it’s secure! or is it … how do you...

16
It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

Upload: others

Post on 06-Jun-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

It’s Secure!

Or is it … how do you know for sure?

Carey Frey

VP, TELUS Security & Chief Security Officer

February 9, 2016

Page 2: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

2

Security | There is No Privacy Without It

“strong security measures are essential to

privacy - from start to finish”

Page 3: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

3

Security | It’s Complicated (We’ve Done it to Ourselves)

Page 4: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

4

The Digital Economy | Security Must Evolve with the Threats

New

vendors

each

week

Resulting in

Complex

Integrations

FirewallWeb

Filter

Anti-Virus

Intrusion Prevention

System

Anti-

Spam Anti-Malware

(Near Zero Day threat detection)

Applic

ation F

irew

all

Security

Incid

ent &

Event M

anagem

ent

Th

rea

t

Fe

ed

ERM

CLOUD IAM

Not enough

visibility!

Is all this stuff

actually

effective?

Page 5: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

5

• Secure by Design (SbD)

formalizes the security

practice at TELUS

• SbD invests earlier in the

project phase and “bakes

in” security to the overall

project design

• SbD creates fewer (to no)

last-minute security

overlays

• SbD can support traditional

and more modern project

management as well as

DevOps

• SbD considers the full

lifecycle of a system or

program, ensuring

linkages with Change

Management, asset

inventories, patching,

risk/threat/vulnerability

assessments, compliance

activities, etc.

• SbD improves tracking

and documentation to

thereby improves

evidence to demonstrate

for internal and external

audits.

Culture of Security

Security Framework

Threat Modelling

Encourages

thinking of security

in day-to-day work

Be deliberate,

methodical in

design, build,

operations

Identify “bad

things” and how

to address them

Identify

Protect

DetectRespond

Recover

Secure-by-Design | What it Means for TELUS

Secure by Design fosters a culture of security

Page 6: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

6

• Hosted in Quebec

Intelligence Internet Data

Centre

• Capacity

• 72 Cores

• 768 GB RAM

• 144 TB Storage

• ~30TB data/month

• ~2-4 Billion events/hour

• Log Retention

• 90 days raw logs

• 180 days of

authentication events

• 7 years for incident

data

Use Case Library

• Rogue Device Detection

• Brute Force

• Denial-of-Service Alarm

• Non-Active Employee

Activity

• Foreign VPN Access

• Service Account Abuse

• Malware payload

detonation

• …..

• Customer Use Cases

Case Study | Innovative Cyber Security Solutions Powered by Big Data & Analytics

Secure by Design fosters a culture of security

Page 7: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

7

TELUS Access

Network

Target Services

Malware Command &

Control

Compromised Device

Security App

Infected Smartphone

Detection and

Mitigation Tools

TELUS Security

Argus Security Analytics

WESP 2.0

WESP 1.0 &

3.0

Innovative Cyber Security Solutions | Wireless Edge Security Program

WESP 1.0 Incident Detection

• Detected over 1,110 Sierra Wireless

GX450 LTE modems participating in

DNS attack and interrupting traffic

• Identified ~20 customers infected

with ADUPS malware which sends

private information outside the

TELUS network

• Monitor the iOS Pegasus malware

targeting iPhone users

Page 8: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

8

Case Study | Wireless Edge Security Program

Secure by Design fosters a culture of security

Page 9: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

9

Case Study | 5G Network Function Virtualization e.g. ‘Network Slicing’

Communications

& Internet

Health

Monitoring

Big Data

Activity Function

Dynamic, Separate, Activity Specific & Secure

High Performance

Global NetworkAccessCompute, Storage,

Management

Page 10: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

10

Products & Services | Driving Security Outcomes for TELUS Customers

Threat Vulnerability Incident

Exploits

How are TELUS

Security Products &

Services designed?

To help reduce the

impact and likelihood

of security incident.

Most of the time

you have low

control on

threats.

Most of the time

you have good

control on

vulnerabilities.

You can act on

them.

You have

limited control

on security

incidents. You

can reduce the

likelihood and

the impact.

Page 11: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

11

Products & Services | Driving Security Outcomes for TELUS Customers

How do you know if

they are effective?

TELUS Security

products and services

leverage the NIST

Cyber Security

Framework.

Identify

Risk Management

Asset management

Governance

Protect

Data Security

Access Control

Network Security

Content Security

Detect

SIEM

Monitoring

Detection Process

Respond

Analysis

Mitigation

Response Planning

Improvements

Communication

Recover

Improvements

Communications

Page 12: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

12

Products & Services | Driving Security Outcomes for TELUS Customers

What is the TELUS

differentiator?

The TELUS Security

ecosystem leverages

the TELUS Network and

the TELUS Security

Intelligence Platform to

integrate all NIST

recommended functions

in a comprehensive

integrated tool box

Page 13: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

13

Products & Services | Meeting the Mid-Market Affordability Challenge

The Technology the

Security Industry Builds

• Leading edge global capabilities

• Targeted at big government & fortune 500 market

• Expensive to operate

• Based on global cyber threat intelligence

What the Canadian Mid-Market

can Afford & Needs

• Manageable security solutions

• Properly sized solutions

• Easy to operate

• Based on Canadian cyber threat intelligence

Page 14: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

14

Products & Services | TELUS Security Bundles

Essentials EnterpriseAdvanced

Page 15: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016

15

Integrated managed security services affordable for the mid-market

Secure-by Design for next wave services : SDN/NFV, 5G & IoT

Proven and verifiable

Greater transparency for certification, assessment & audit

Enabling Canadians to securely embrace the digital economy+

Outcomes | How do You know it’s Secure?

Page 16: It’s Secure! Or is it … how do you know for sure? · It’s Secure! Or is it … how do you know for sure? Carey Frey VP, TELUS Security & Chief Security Officer February 9, 2016