Download as pdf or txt
Download as pdf or txt
You are on page 1of 30

2020 VIRTUAL

CYBERSECURITY SUMMIT
#SHIVirtualSummit

5 CYBERSECURITY
TRENDS TO
WATCH OUT FOR
IN 2021
CLAY WALLACE
Sr. Security Solutions Architect,
Stratascale, SHI

YOUR
SPEAKERS
BILL WILLIS
Security Solutions Architect,
SHI

#SHIVirtualSummit
#SHIVirtualSummit

1 The New Normal


• Security Challenges
• 2020 Disruptions

2 5 Trends for 2021


• Ransomware
AGENDA • Cloud Data Breaches
• Cloud Network Security
• Security Validation
• Insider Incidents

3 Q&A
#SHIVirtualSummit

2020 IN REVIEW
THE NEW NORMAL
How confident are you in your
organization’s ability to address the
current threat landscape?

POLL #1 A Very confident

B Somewhat confident

C Not at all confident

#SHIVirtualSummit
CHALLENGES
SECURITY CHALLENGES

51% of cybersecurity professionals


42% of the U.S. labor force is
said their organization is at
now working from home full
moderate or extreme risk due to
time.
staff shortages.
— Stanford University — (ISC)2

41% of organizations say their 52% of organizations are at a


security budget is “somewhat disadvantage in responding to
underfunded;” another
. 19% say it’s vulnerabilities because they use
“significantly underfunded.” manual processes.

— ISACA State of Cybersecurity 2020 — Ponemon Institute Consequences of Gaps in Vulnerability Response
#SHIVirtualSummit

Shifting IT priorities pulled resources


away from security.

Unexpected remote workforce expansion led


to surge in attacks on employees.

Projects meant to advance cyber maturity IMPACT OF


were set aside as fundamentals took priority.
DISRUPTION
Cloud collaboration service adoption
exploded.

Increased workload is leading to security


staff burnout.
#SHIVirtualSummit

5 TRENDS FOR 2021


#SHIVirtualSummit

1 RANSOMWARE RAMPAGE

› 715% jump in ransomware attacks


over the past 12 months alone
(Bitdefender).

› The targeted pay-or-get-breached


attack method will continue well into
and beyond 2021.

› Trust that stolen data will be deleted


is eroding as data is increasingly
made public despite the victim
paying.

› Watch out for attacks from groups


such as REvil, Ryuk, Tycoon,
Sodinokibi, NetWalker and Egregor (a
fork of Maze).
AVERAGE RANSOM PAYMENTS

— Coveware Quarterly Ransomware Report, Q3 2020 #SHIVirtualSummit


#SHIVirtualSummit

KEYS TO DEFENSE
› Security awareness
› Least privilege
› Email security
› EDR/EPP/XDR
› Early detection; AI/ML
› Patch management
› Enabling zero trust
› Backup strategies
› Incident response
#SHIVirtualSummit

2 CLOUD DATA BREACHES


› Use of cloud collaboration services
shot up 600% from January to April,
and external attacks on cloud
accounts increased 630% (McAfee).

› Nearly 80% of
companies experienced at least
one cloud data breach in the past
18 months (Ermetic).

› Many organizations still don’t fully


understand the shared responsibility
model for cloud security.

› Most security failures are caused by


misconfigurations, lack of visibility
into access settings, and identity and
access management (IAM)
permission errors.
CLOUD SECURITY IS A SHARED RESPONSIBILITY

Host Next-Gen Outbound


WAF IPS VPN
Security Firewall Proxy

Security Your
IN the Applications and Content
Responsibility
Cloud
Network Inventory Access Data
Security Configuration Controls Security

Security Cloud Provider


Foundational
OF the Services Compute Network Storage Availability Responsibility
Cloud Zones
AWS, Azure, Google
BEST RECOMMENDATIONS
PRACTICES FOR SUCCESS
1 Evaluate the current state of your cloud security posture.

2 Take responsibility for securing applications, data and identities in the cloud.

3 Align provider’s security capabilities with third-party controls.

4 Consider SASE services, cloud security posture management and CASB solutions.

5 Implement continuous threat and vulnerability management processes.


Do your network security controls provide
immediate, uninterrupted access for your
users, no matter where they are located?

A Yes

POLL #2 B To a reasonable degree

C No

C Not sure

#SHIVirtualSummit
#SHIVirtualSummit

3 CLOUD NETWORK SECURITY


› Increases in SaaS applications, cloud
data, and traffic going to public cloud
services have created the need to shift
portions of network architecture to the
cloud.

› Organizations demanding
uninterrupted access no matter where
users are located will start
implementing secure access service
edge (SASE) solutions.

› Gartner predicts by 2024, at least 40%


of enterprises will have explicit
strategies to adopt secure access
service edge (SASE), up from less than
1% at the end of 2018.
TRADITIONAL ARCHITECTURE

#SHIVirtualSummit
Image Source: Gartner
SASE CONVERGENCE

#SHIVirtualSummit
Image Source: Gartner
SASE IDENTITY-CENTRIC ARCHITECTURE

#SHIVirtualSummit
Image Source: Gartner
BEST RECOMMENDATIONS
PRACTICES FOR SUCCESS
Know your user base: Determine who needs access to which services, and how your users can be
1 categorized by their required access rights so you can establish different policies for different types
of users.

Identify user destinations: Consider where your users want to go, what they need access to, and
2
where the application is hosted? This is particularly important in multi-cloud infrastructures.

Group service categories and understand their topology: Determine where services are located,
3 and how users can be routed to them. As modern applications can be hosted in any cloud, you
need to be aware of what belongs where.

Define the rules: Decide which access rules apply in each scenario. Apply SASE rules first and
4
foremost to what is already known and observe over time where else rules should be applied.

Optimize the path: Steer user traffic to the application via the shortest possible route, bearing
5 mobility in mind; modern users must be dynamically routed from any location. And optimize
bandwidth by giving priority to business-critical applications.
#SHIVirtualSummit

4 PROGRAM VALIDATION
› 53% of 2019 attacks successfully
infiltrated environments without
detection (Mandiant).

› Boards are asking for improved data


around what they have achieved after
years of heavy security investment.

› The need to secure more with less will be


the new reality for many in 2021.

› Security teams will pursue reliable data


that tells them if their security
investments are delivering real value.

› It’s time to rationalize, optimize and


consolidate.
BESTRECOMMENDATIONS
PRACTICES FOR SUCCESS
Assess your security posture with vendor-independent services that leverage
1
frameworks such as ISO, NIST CSF and/or CIS Controls.

Address increasing legal and regulatory action related to data privacy by taking a
2
privacy-by-design approach when handling personal data.

3 Implement continuous threat and vulnerability management processes with regular


vulnerability assessment and penetration testing services.

Evaluate security validation/breach and attack simulation tools that test the efficacy of
4
controls and facilitate cybersecurity risk reporting.

Consider security scoring solutions to help predict your organization’s (and your
5 partners’) likelihood of a breach.
#SHIVirtualSummit

5 INCREASING INSIDER THREATS

› Insider incidents, accidental or


malicious, will be a factor in a third of
all data breaches in 2021, up from
25% today (Forrester).

› This will be caused by a combination


of rapid evolution to remote working,
fear of job loss, and the ease with
which data can be moved.

› 59% of recently surveyed employees


are not fully confident they could
identify a social engineering attack
(Osterman Research).
#SHIVirtualSummit

EVALUATE AWARENESS
› Establish baseline vulnerability
measurements (phishing susceptibility and
cybersecurity knowledge levels).

› Assess the number of malware infections.

› How many lost or stolen devices have


been reported in the last year?

› How often are suspicious emails identified?

› How many security-related calls do help


desk analysts receive in general?

› Are separation of duties and least privilege


being enforced?
#SHIVirtualSummit

EVALUATE SOLUTIONS
Objectively assess current-state capabilities
and test potential solutions:

› Data classification

› Email security

› Endpoint detection and response


(EDR)/XDR

› Next-Gen Data loss prevention (DLP)

› Privileged access management (PAM)

› User and entity behavior analytics (UEBA)

› Security awareness training platforms


#SHIVirtualSummit

NEXT STEPS
We’re here to help evaluate
your cybersecurity and devise
a workable plan of action for
maturing your posture in 2021
and beyond.
Contact your SHI Account
Executive to learn more.
LINKS & RESOURCES

IDC Cloud Security Survey Highlights

Coveware Quarterly Ransomware Report

Gartner: The Future of Network Security Is in the Cloud

The Path to a New Normal in 2021 Requires Increased Cyber Resilience

The SHI Blog: 12 Ways To Protect Your Organization From Ransomware

Osterman Research 2020 State of Privacy and Security Awareness Report

Forrester Releases Privacy & Cybersecurity Predictions for 2021


Q A
&
THANK YOU

You might also like