Professional Documents
Culture Documents
Downloadpresentation 1633452897139
Downloadpresentation 1633452897139
Webinar Logistics
Optimize your experience today
Featured Presenters
Our knowledgeable speakers today are:
• Wrap Up
2
Hybrid Cloud vs. Multi-Cloud
Cloud Cloud Cloud
Solution Solution Solution
Provider 1 Provider 2 Provider 3
Private
Cloud
Risk & Strategy Decision Making
CEO
Digital Set Company Business Strategy
Transformation Responsible for risk management process
Incident
Response
Incident
Management
Threat
Hunting
Cloud Shared Responsibility Model
Be Clear on Your Responsibilities and those of the CSP
Due Diligence,
Notification, Right to
Audit
• In the Shared Security Model there are
numerous areas the CSP is directly
responsible for.
• Do your diligence to
monitor and audit whether
those activities are happening
as expected.
• You may not have enough leverage
in the relationship to audit your CSP, but
at least ensure you are reviewing their
compliance reports (e.g. SOC2) and
following any news/announcements
regarding their security posture or events.
(Note: Your business customers likely require
this.)
11
The digitized world is interconnected and dynamic
Aspects to consider –
10
Operational Considerations
• Cloud agnostic
7
Threats to Data in the Cloud
• Exposed storage containers/buckets
• Supply chain
Data Exposure 36% (24 of 67) of error- related
• As of 2020on-prem
breaches involved
• Traditional @)% of Cyber Attacks are through
compromises in the Cloud
pivot misconfigurations on databases,
often cloud storage – not good.
8
CSP Data Management Decision Points
• Set clear standards for data protection.
• Are you comfortable with the native encryption offerings, or do you want to encrypt before
storage in the CSP?
• Do you have the right visibility and access logging everywhere sensitive data is
stored?
14
Wrap Up
• Start with policy first: define the types of data appropriate for a public vs. private cloud
• Maintain an inventory of your data and the cloud assets that have access to the data
• Understand common threats to cloud workloads and implement controls to prevent/limit their occurrence
15
Cyber Resilience is Critical to Safeguard your Enterprise
Sam Werner
$1.59M
portion of data breach costs attributable to
lost business, including business
disruption, system downtime, lost
customers and reputation losses.1
23%
of all security attacks in 2020 were the
result of ransomware, up 15% from
2019.2
20%
Share of breaches initially caused by
compromised credentials, the most
common initial attack vector. 1
1 IBM Security Cost of a Data Breach Report 2021
IBM Security / © 2021 IBM Corporation 2 IBM 19
Security X-Force Threat Intelligence Index 2021
Ransomware has evolved to become the most prevalent threat
Revil
Ryuk Double extortion: Business is
Nefilim Occurs about 60 booming:
RagnarLocker
percent of the time We estimate
Netwalker
attackers couple Sodinokibi/Revil
ransomware with
Maze
stealing data
alone earned
CLOP $120M
Waiting
SNAKE/EKANS
PJX
Shift to Ransomware- Supply chain is a
as-a-Service: new attack surface:
Phobos
Affiliate or franchise Ransomware attacks
Medusa
operations, enables originated from supply
Locky
multiple infection chain and living-off-
Egregor
vectors using the same the-land
Crysis/Dharma ransomware
Cerber
Storage based
Snapshots Cyber Resilience:
(local & isolated) Backup enabled Snapshots Requires short- and long-term retention capability
(local & isolated)
- High snapshot frequency & fastest restore for
short-term recovery
Policy Governed Application Aware Snapshots (local & isolated)
- RPO policy governed snapshot frequency for
long-term retention and fast recovery
1 2 3 4 5 6
Manage credentials Malware, ransomware End to end data System snapshots / Logical – Object, Orchestration of
and acquisition of detection encryption to render it backup snapshots disaster testing and
data unusable Traditional backups WORM, Cloud failover processes
AI-based pattern Isolated environment across heterogeneous
Roles and rights for anomaly detection Physical – Tape systems for
data copy reliable, speedy, and
management error-free recovery
Immutable Snapshots provide the means to recover in hours
rather than weeks – Same capability on-prem or Cloud
IBM Safeguarded Copy prevents point-in-time copies of data from being modified or deleted by user
errors, malicious destruction, or ransomware attacks – Logical Air Gap of Data
Additional security capabilities to Capabilities to regularly create Functionality that enables different
prevent non-privileged users secure, immutable point in time use cases to restore corrupted
from compromising production copies data in minutes or hours vs days
data or weeks
VALIDATION
recovery
OFFLINE BACKUP
CATASTROPHIC
SURGICAL
25
We cannot only design backup for traditional events
26
@InformationWeek
Questions?
Submit questions to the presenters via the on-screen text box