la gestión del riesgo en nuevos entornos

22
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. La Gestión del Riesgo en Nuevos Entornos Karen Gaines HP Security Services

Upload: hp-enterprise

Post on 25-Dec-2014

337 views

Category:

Technology


0 download

DESCRIPTION

Presentación realizada por Karen Gaines, Sales executive HP Enterprise Securtity Services, en el Evento de Ciberseguridad 2014 organizado por IDC

TRANSCRIPT

Page 1: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

La Gestión del Riesgo en Nuevos Entornos

Karen Gaines

HP Security Services

Page 2: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Page 3: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3

Crecimiento Online

Page 4: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 4

Crecimiento Online

2010

32.7% online 2,270,000,000

Page 5: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 5

Crecimiento Online

2020

60% online 4,800,000,000

Page 6: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 6

50 billones Dispositivos

Smart Cities

Personas conectadas

Hogares Automatizados

Page 7: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 7

50 billones Dispositivos

Smart Cities

Personas conectadas

Hogares Automatizados

Connected Individuals Efecto

Internet

Smart Cities

Personas conectadas

Hogares Automatizados

Page 8: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 8

Creamos muchísimos datos…

Page 9: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 9

Cyber Altruism Individuals and groups driven by their social conscience, hacktivism, whistleblowing

Loss/Stolen Data Rise of CyberCrime Professional Hacktivism Advanced Persistent Threat

2010 2011 2003 2012 2004 2005 2006 2008 2007 2009 2013 2014

StuxNet 2010

AOL 2010

TJ Maxx 2010

UK Revenue & Customs 2006

Heartland 2009

Evernote 2013

NASA Shuttle Plans Dec 2006

Estonia Dark May 2007

Buckshot Yankee Nov 2008

GhostNet Mar 2009

Sony PSN Dec 2010

.CN Aug 2013

WSJ - SEA Aug 2013

Apple Aug 2011

Red October Dec 2010

Facebook 2013

Living Social 2013

Yahoo 2013

Shamoon Aug 2012

Tamper Data June 2012

Video Conferencing Aug 2012

DigiNotar Sept 2011

Kernel.org Aug 2011

HP Cyber timeline Stuxnet, was designed to seek out certain industrial control systems made by Siemens. Stuxnet took advantage of four zero-day vulnerabilities and appeared to be targeted at a uranium enrichment program in Iran.

The Russian firm Kaspersky discovered a worldwide cyber-attack dubbed “Red October,” that had been operating since at least 2007. Hackers gathered information through vulnerabilities in Microsoft’s Word and Excel programmes

Syrian Electronic Army continues to take down, hack and redirect Wall Street Journal Websites and internet facing traffic.

Facebook founder Mark Zuckerberg had his profile hacked into by an IT worker in Palestine.

Heartland, was designed to seek out certain industrial control systems made by Siemens. Stuxnet took advantage of four zero-day vulnerabilities and appeared to be targeted at a uranium enrichment program in Iran.

Shamoon - The virus has been noted as unique for having differing behaviour from other malware cyber espionage attacks. Shamoon is capable of spreading to other computers on the network, through exploitation of shared hard drives

Tamper serious vulnerability in the Hotmail service which allowed hackers to access 13 million hotmail accounts. In the same period the services Yahoo and AOL were affected by the Tamper Data hack.

The most significant breach of U.S. computer security occurred, apparently when someone working with the Pentagon's Central Command inserted an infected flash drive into a military laptop computer at a base in the Middle East.

hackers had penetrated the PlayStation network, stealing or misusing the personal information of at least 77 million users. Sony estimated that fallout from the hack cost at least $170 million.

Page 10: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 10

Cyber Cartels Continued development of sophisticated cybercriminals, convergence of traditional- and cyber-crime

Cyber Militia Active use of cyberspace as a sub-nationstate battle ground, terrorism…

Cyber Altruism Individuals and groups driven by their social conscience, hacktivism, whistleblowing

Professional Hacktivism Advanced Persistent Threat

2010 2011 2012 2009 2013 2014

StuxNet 2010

Heartland 009

Evernote 2013

ostNet 2009

Sony PSN Dec 2010

.CN Aug 2013

WSJ - SEA Aug 2013

Apple Aug 2011

Red October Dec 2010

Facebook 2013

Living Social 2013

Yahoo 2013

Shamoon Aug 2012

Tamper Data June 2012

Video Conferencing Aug 2012

DigiNotar Sept 2011

Kernel.org Aug 2011

HP Cyber timeline

Page 11: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 11

..de media para detectar que datos han sido comprometidos 243

días

2013 Enero…………. Octubre

..de las incidencias ocurren en las aplicaciones

Desde 2010, el tiempo en resolver un ataque ha aumentado…

de las incidencias son reportados por terceros

Page 12: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 12 © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Page 13: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 13

Desafíos Principales para un CISO

Riesgo Comité Marca Digital

Madurez Confianza Reputación Activos

Cumplimiento & Regulación

Nuevo Estilo de TI

Motivación de los Ataques

Las actividades más complejas para un CISO gestionar*:

34%

21%

17%

14%

5%

1%

7%

Organization’s leaders

Specific users

My own team

Regulators

Vendors/consultants

Outside hackers

Other

*Source: IDG Research

Page 14: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 14

Enfoque de HP para completar la seguridad de la información

Una Seguridad Íntegra

Asesorar: Riesgos inherentes a la cadena de suministro, contratos

actuales y rendimiento de los proveedores

Transformar: Describir la estrategia y el marco integrales o toma de control

Gestionar: Implementar y reportar el marco de gobierno del cumplimiento de seguridad del proveedor

Moverse desde una gestión del riesgo y seguridad de la información reactiva a una proactiva

Inteligencia de

Seguridad Procesable

Page 15: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 15

Los Objetivos de HP Security

Gestionar el Riesgo

Aumentar Alcance

Bloquear el Adversario

• Bloquear los adversarios internos y externos

• Interrumpir la amenaza en tiempo real

• Inteligencia de la seguridad integral

• Responder rápidamente a incidencias

• Mejorar la postura del riesgo

• Conocimientos de estándares locales y globales

• Reducir coste y complejidad

• Acceso a +5000 profesionales de seguridad

• Asesoramiento a Gestión Integral

Page 16: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 16

Los Objetivos de HP Security

Gestionar el Riesgo

Aumentar Alcance

Bloquear el Adversario

• Bloquear los adversarios internos y externos

• Interrumpir la amenaza en tiempo real

• Inteligencia de la seguridad integral

• Responder rápidamente a incidencias

• Mejorar la postura del riesgo

• Conocimientos de estándares locales y globales

• Reducir coste y complejidad

• Acceso a +5000 profesionales de seguridad

• Asesoramiento a Gestión Integral

Servicios Gestionados de Seguridad

Consultoría de Seguridad

Tecnología de Seguridad

Page 17: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 17

Soluciones Respaldados por una Investigación Global

Ecosystem Partner

FSRG

ESS

• SANS, CERT, NIST, OSVDB, software & fabricantes de reputación

• 1650+ Investigadores

• 2000+ Clientes compartiendo datos

• Líder en Investigación de Seguridad

• Encontramos más vulnerabilidades que el resto del Mercado combinado

• Colaboración con equipo líderes en el mercados: DV Labs, ArcSight, Fortify, HPLabs, Application Security Center

• Colecta datos de red y seguridad globales

HP Global Research

Page 18: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

18

HP detecta y protege contra 4 veces más vulnerabilidades críticas que el resto del mercado combinado, Facilitando a nuestros clientes beneficiarse de la experiencia de un proveedor global.

Page 19: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

19

5,000 Profesionales de la Seguridad 8 Centros de Operaciones de Seguridad #1 Investigación de la Seguridad

Page 20: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 20

IT Management Framework

Cloud Platform

SaaS PaaS IaaS

Change Management Patch Management

Configuration Management Capacity Management

Availability Management Incident Management

Virtualization Management

Network Security

Virtualization Security

Server Security

Storage Security

Malware Protection

Client Security

Data Protection

Access Devices

Network Security

App Security

Malware Protection

Client Security

Data Protection

Application Security

Application Security

Vulnerability Management Security Info & Event Management

Compliance Management

HP Cloud Protection. Arquitectura de Referencia. Security Solution Mapping

Account Management Access Control Management

Authentication

Key Management

Identity Provisioning Federation

Auditing

Page 21: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 21

IT Management Framework

Cloud Platform

SaaS PaaS IaaS

Change Management Patch Management

Configuration Management Capacity Management

Availability Management Incident Management

Virtualization Management

Network Security

Virtualization Security

Server Security

Storage Security

Malware Protection

Client Security

Data Protection

Access Devices

Network Security

App Security

Malware Protection

Client Security

Data Protection

Application Security

Application Security

Vulnerability Management Security Info & Event Management

Compliance Management

HP Cloud Protection. Arquitectura de Referencia. Security Solution Mapping

• Endpoint Protection • Data Loss Prevention

Account Management Access Control Management

Authentication

Key Management

Identity Provisioning Federation

Auditing

• Endpoint Protection • Critical Systems Protection • Web Gateway • Data Loss Prevention • Control Compliance Suite

Consulting

Support

Strategy

Consulting

Support

Strategy

• Control Compliance Suite

• Ozone

Page 22: La Gestión del Riesgo en Nuevos Entornos

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

¡Gracias!