Sie sind auf Seite 1von 24

Cyber threat: Is your team up to

the challenge?
August 2017
Our presenters for this webcast

Lee Fisher Laurence Pitt


Head of Security Sales, EMEA Director, Security Strategy - EMEA
Before we get started
Are you confident in
the skills of your team Yes : 55%
for countering the
threat landscape?
No : 45%

Do you have a funded Yes : 51%


plan to develop/recruit
needed cyber-skills? No : 49%

From 92 people responding to our poll


DATA THE MOST VALUABLE RESOURCE
CHALLENGE INCREASES WITH VALUE

80 2.1 357M
of black-hat Cybercrime will become a
% hackers are
affiliated with $
organized TRILLION
New unique pieces of
crime business By 2019 malware in 2016

1 IN131 1.1B
In 2016

emails contained malware, identities were exposed in 2017


the highest rate in five years

Source: Symantec Internet Security Threat Report 2017, Verizon 2016 Data Breach Investigations Report
CHALLENGE INCREASES WITH VALUE

1,500,000 million

Predicted shortage of staff in cybersecurity by 2019

Source: Symantec Internet Security Threat Report 2017, Verizon 2016 Data Breach Investigations Report
CYBERSECURITY CONTINUES TO EVOLVE
Static LANs; Limited Users Mobility; All Users Cybercrime, IoT and Cloud

INDUSTRY
CONTEXT

Firewall Endpoint Security Network, A.I. and Automation

SECURITY
SOLUTIONS
FOUR STEPS TO SUCCESS

Step 1 Review existing investment

Step 2
Build the team

Step 3
Grow the team

Step 4
Bringing it together
1. REVIEW EXISTING INVESTMENT

HOW TO IDENTIFY

HOW TO IMPLEMENT

Is your security team


in balance?

MORE TECHNOLOGY DOES NOT EQUAL BETTER PROTECTION


CONSIDERATIONS FOR CYBER TEAM
What do I need to consider when
balancing business and a happy
team with the needs of
cybersecurity?

What is the ideal team split for


team utilization? What key skills do I need to
How about 80% focus on tasks Consider for my team?
and 20% on research?
2. BUILD THE TEAM
Senior Principal Analyst SOC Manager Lead Investigator

Principal Analyst Manager, Analysts Investigator

TECHNICAL PATH MANAGEMENT PATH INCIDENT RESPONSE PATH

Senior Analyst

Analyst

Service Desk
COMPENSATION AS A MOTIVATOR

Career
Salary Training
Path

Tactical Employee Strategic Employee


3. GROW THE TEAM
DEPTH BREADTH RECENCY
Limited Resources Limited Time Limited Exposure

Need the ability to respond, do not have Need to focus on whats important, but Need to stay sharp, but cannot see everything
enough specialists available whats urgent takes up all available time everywhere

PEOPLE

TECHNOLOGY

EDUCATION

Tools and services allowing you to Provide intelligence for relevant


Specialists on demand focus on whats important actions
EXTENDING/STAFFING THE TEAM

Insource Staff Augmentation

Out Task Outsource


EXTENDING/STAFFING THE TEAM
Insource Staff Augmentation
Hiring staff and/or technology
Time sensitive
Staff retention can be a challenge
Expensive to provide 24x7 cover

Out Task Outsource


EXTENDING/STAFFING THE TEAM
Insource Staff Augmentation
Hiring staff and/or technology Source skilled staff from a partner
Time sensitive Buys time to build skills in-house
Staff retention can be a challenge Buys skills on a temporary basis
Expensive to provide 24x7 cover Sourced staff need to learn environment

Out Task Outsource


EXTENDING/STAFFING THE TEAM
Insource Staff Augmentation
Hiring staff and/or technology Source skilled staff from a partner
Time sensitive Buys time to build skills in-house
Staff retention can be a challenge Buys skills on a temporary basis
Expensive to provide 24x7 cover Sourced staff need to learn environment

Out Task Outsource


Use OPEX to extend the team
Select the right expertise
Look for broad cover to cover gaps
Look for recommendations from peers
EXTENDING/STAFFING THE TEAM
Insource Staff Augmentation
Hiring staff and/or technology Source skilled staff from a partner
Time sensitive Buys time to build skills in-house
Staff retention can be a challenge Buys skills on a temporary basis
Expensive to provide 24x7 cover Sourced staff need to learn environment

Out Task Outsource


Use OPEX to extend the team Entire Security functions
Select the right expertise Cannot outsource Security
Look for broad cover to cover gaps Cannot outsource accountability
Look for recommendations from peers Changes to the agreement can be costly
4. BRINGING IT TOGETHER

Security Team

Artificial Intelligence

Big Data
Automation
SECURITY TEAM

Delivering human intelligence from years experience


Moving from firefighting to strategic security
Researchers with planet-eye view of the real world
BIG DATA CAN PREDICT THE FUTURE

Used to Build Wisdom


Yields Competitive Advantage
Provides Planet Eye View
AUTOMATION KILLER APP FOR SECURITY

Inevitable & Good


Unknown Known Widely Known
Effective Use of Human Resources
SOFTWARE-DEFINED SECURE NETWORKS

Artificial
Automation
Intelligence
An Intelligent, Automated Secure Network
platform

Single detection & enforcement domain


Integrate intelligence from across the business
Secure the data, the brand, the business, the customers

Software Defined Secure Networks

Das könnte Ihnen auch gefallen