Professional Documents
Culture Documents
Shi 2020 Virtual Cybersecurity Summit
Shi 2020 Virtual Cybersecurity Summit
CYBERSECURITY SUMMIT
#SHIVirtualSummit
5 CYBERSECURITY
TRENDS TO
WATCH OUT FOR
IN 2021
CLAY WALLACE
Sr. Security Solutions Architect,
Stratascale, SHI
YOUR
SPEAKERS
BILL WILLIS
Security Solutions Architect,
SHI
#SHIVirtualSummit
#SHIVirtualSummit
3 Q&A
#SHIVirtualSummit
2020 IN REVIEW
THE NEW NORMAL
How confident are you in your
organization’s ability to address the
current threat landscape?
B Somewhat confident
#SHIVirtualSummit
CHALLENGES
SECURITY CHALLENGES
— ISACA State of Cybersecurity 2020 — Ponemon Institute Consequences of Gaps in Vulnerability Response
#SHIVirtualSummit
1 RANSOMWARE RAMPAGE
KEYS TO DEFENSE
› Security awareness
› Least privilege
› Email security
› EDR/EPP/XDR
› Early detection; AI/ML
› Patch management
› Enabling zero trust
› Backup strategies
› Incident response
#SHIVirtualSummit
› Nearly 80% of
companies experienced at least
one cloud data breach in the past
18 months (Ermetic).
Security Your
IN the Applications and Content
Responsibility
Cloud
Network Inventory Access Data
Security Configuration Controls Security
2 Take responsibility for securing applications, data and identities in the cloud.
4 Consider SASE services, cloud security posture management and CASB solutions.
A Yes
C No
C Not sure
#SHIVirtualSummit
#SHIVirtualSummit
› Organizations demanding
uninterrupted access no matter where
users are located will start
implementing secure access service
edge (SASE) solutions.
#SHIVirtualSummit
Image Source: Gartner
SASE CONVERGENCE
#SHIVirtualSummit
Image Source: Gartner
SASE IDENTITY-CENTRIC ARCHITECTURE
#SHIVirtualSummit
Image Source: Gartner
BEST RECOMMENDATIONS
PRACTICES FOR SUCCESS
Know your user base: Determine who needs access to which services, and how your users can be
1 categorized by their required access rights so you can establish different policies for different types
of users.
Identify user destinations: Consider where your users want to go, what they need access to, and
2
where the application is hosted? This is particularly important in multi-cloud infrastructures.
Group service categories and understand their topology: Determine where services are located,
3 and how users can be routed to them. As modern applications can be hosted in any cloud, you
need to be aware of what belongs where.
Define the rules: Decide which access rules apply in each scenario. Apply SASE rules first and
4
foremost to what is already known and observe over time where else rules should be applied.
Optimize the path: Steer user traffic to the application via the shortest possible route, bearing
5 mobility in mind; modern users must be dynamically routed from any location. And optimize
bandwidth by giving priority to business-critical applications.
#SHIVirtualSummit
4 PROGRAM VALIDATION
› 53% of 2019 attacks successfully
infiltrated environments without
detection (Mandiant).
Address increasing legal and regulatory action related to data privacy by taking a
2
privacy-by-design approach when handling personal data.
Evaluate security validation/breach and attack simulation tools that test the efficacy of
4
controls and facilitate cybersecurity risk reporting.
Consider security scoring solutions to help predict your organization’s (and your
5 partners’) likelihood of a breach.
#SHIVirtualSummit
EVALUATE AWARENESS
› Establish baseline vulnerability
measurements (phishing susceptibility and
cybersecurity knowledge levels).
EVALUATE SOLUTIONS
Objectively assess current-state capabilities
and test potential solutions:
› Data classification
› Email security
NEXT STEPS
We’re here to help evaluate
your cybersecurity and devise
a workable plan of action for
maturing your posture in 2021
and beyond.
Contact your SHI Account
Executive to learn more.
LINKS & RESOURCES