SlideShare a Scribd company logo
CONFIDENTIAL AND PROPRIETARY
This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other intended recipients. This presentation may contain
information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates.
© 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Top Security Trends
and Take-Aways
Jie Zhang
1 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Security for the Next Generation of Threat
 A pervasive digital presence is expanding into business, industry
and society
 Once networked, this digital presence substantively alters risk
for digital businesses
 Digital security is the next evolution in cybersecurity
to protect this pervasive digital presence
2 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Security Macro Trends You Face in the Age
of the Pervasive Digital Presence
 Risk and Resilience Seek Balance
 Security Disciplines Converge
 Secure Digital Supply Chain Needs Grow
 Security Skills Options Expand
 Adaptive Security Architecture Embraced
 Data Security Governance Arrives
 Digital Business Drives Digital Security
3 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Risk and Resilience
Seek Balance
4 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Security Moves to an Embedded State in the Organization
 Governance
 Compliance
 Control
 Protection
 Reliability
 Speed
 Assurance
 Transparency
RISK RESILIENCE
Privacy
Safety
Value
Cost
5 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Security Principles for Trust and Resilience
Business Outcomes
Risk-Based
Data Flow
Facilitator
Detect and
Respond
Principle of
Trust and Resilience
People-Centric
6 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Take-Aways for Risk and Resilience Balance
 Revisit the security organizational structure to ensure it reflects
current mission
 Revise the methods used to calculate IT risk to incorporate
new variables and factors
 Refine the security communication and education process to
emphasize agility
7 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Security Disciplines
Converge
8 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Digital Security for the Pervasive Digital Presence
Defense
Offense
Reactive
Proactive
IoT Security
Information Security
IT Security
OT
Security
Physical
Security
You Are Here
Digital Security
9 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
"Digital Safety" Becomes a New Force and Responsibility
The CIAS Model of Digital Security
Integrity
Data
People
Environments
Confidentiality
Availability
Safety
Graphics: Can Stock Photo
10 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Take-Aways for Security Convergence
 Establish security governance and
planning relationships with physical
and industrial counterparts
 Improve cross-discipline procurement
methods for security requirements
 Modify security architecture to include
additional layers where required
 Investigate changes in security
management and operations that may
be required to accommodate
convergence
11 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Secure Digital
Supply Chain
12 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Integrated Digital Security for the Supply Chain(s)
SUPPLY
CHAIN
DIGITAL
SUPPLY
CHAIN
DIGITAL SECURITY FOR THE
SUPPLY CHAIN(S)
IoT Security
Information Security
IT Security
OT
Security
Physical
Security
Digital Security
13 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
SIEM
Software Asset
Management
Expanding (and Confusing) SaaS Control Add-On Markets
Today's enterprise suffers from coordination frustration.
Encouraging evolution of multicloud, multifunction management consoles.
Activity Threat Control
Archive and Recovery
Cloud Access
Security Broker
EMM
Confidentiality
IDaaS
SaaS
Aggregation
Tool
Mobile Device
Management
Before and During Login
After Login
Service Monitoring
Malware Control
14 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Take-Aways for Securing the Cloud (Supply Chain)
 Develop an enterprise public cloud
strategy.
 Implement and enforce policies
on usage responsibility and cloud
risk acceptance.
 Follow a cloud life cycle
governance approach.
 Develop expertise in the security
and control each cloud
model used.
 Implement technologies to fight
cloud diffusion complexity.
Conduct Risk
Assessment
(decision
establishes
requirements
for technical and
process
controls)
Medium
Exposure
Potential Impact of Security Failure
BusinessContribution
(ValueofService)
Low High
Always Allowed
Low
High
DoNotAllowDoNotAllow
15 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Security Skills
Options Expand
16 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Assess the Most Critical Skills Impacts of Digital Security
Already, Traditional Security Strategies Are Shifting To:
Contextual Security
Monitoring and
Response
Ubiquitous Identity
Management
Data Classes,
Data
Governance
Security
Awareness,
Privacy & Behavior
01011 Embedded
Security
Network
Segmentation,
Engineering
Physical
Security
Automation
17 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Key Take-Aways to Accelerate Skills Generation
and Convergence
 Build a long-term security
workforce plan.
 Make coaching and skills development
first task.
 Embed security skills within
the lines-of-business.
 Change security specialists
to "versatilists."
 Mix traditional and agile
recruitment techniques.
 Evaluate current skills gaps.
18 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Adaptive Security
Architecture Is
Embraced
19 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Software-Defined Everything, Including Security
"Data Plane"
"Control Plane"
APIAPI API API
APIAPI API
Southboun
d APIs
Northboun
d APIs
Layers of Abstraction
API
Platform
APIs
Applications
20 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Respond Detect
Detect incidents
Prevent attacks
Confirm and prioritize risk
Contain incidents
Isolate systems
Predict Prevent
Harden systems
Compliance
Policy
Monitor posture
Adjust
posture
Implement
posture
Adjust posture
Continuous
Visibility and
Verification
Users
Systems
System activity
Payload
Network
Investigate incidents/
retrospective analysis
Remediate
Anticipate threats/
attacks
Risk-prioritized
exposure assessment
Design/Model policy change
Baseline systems
and security
posture
Develop an Adaptive Security Architecture
21 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Threat Intelligence Platforms Allow You to Visualize,
Correlate and Gain Context
Emerging
Threats
Shadowserver
ZeuS
Tracker
Abuse.ch
Open-Source MRTI Feeds
Norse
IID
Cyveillance
Malcovery
Commercial Feeds
GeoIP Malware
Lookup
Domain Tools
Enrichment Services
News RSS
Feeds
Websites
OSINT Sources
Threat Intelligence Platform
Analytics Threat Intelligence
Processing
Visualization
Reporting
Forensics
Threat Intelligence
Sharing
Incident
Response
SOC
Analyst
Fraud Threat
Analyst
Management Malware
Analyst
Help
Desk
People
Process
Circle of
Trust Sharing
Workflow/
Escalation
Communication Fraud
Technology
Secure Web
Gateway
NGFW
IPS/IDS Logs
22 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Take-Aways for Adaptive Security Architecture
 Shift security mindset from "incident
response" to "continuous response"
 Spend less on prevention; invest in detection,
response and predictive capabilities
 Favor context-aware network, endpoint
and application security protection platforms
 Develop a security operations center
 Architect for comprehensive, continuous monitoring at all layers
of the IT stack.
23 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Data Security
Governance Arrives
24 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Develop a Data-Centric Audit and Protection Approach
Activity
Monitoring
Assessment
of Users
and Permissions
User Monitoring
and Auditing
Data Security
Policy
Data Classification
and Discovery Policy
Data Security
Controls
Protection
Analysis and
Reporting
Blocking, Encryption,
Tokenization
and Data Masking
25 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Take-Aways for Data Security Governance
 Prioritize organization-wide data security
governance and policy.
 Identify and implement risk-appropriate
data security controls by data type
where possible.
 Implement a DCAP strategy that includes
disciplined and formal product selection.
 Incorporate big data plans and unique
requirements into security strategy.
26 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Digital Business
Drives Digital
Security
27 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Securing a Pervasive Digital Presence
(the Internet of Things)
Gateways
Things Agents
Analytics
Applications
Data
Cloud Mobile MES,
ERP
Partners
IoT Platform Middleware
Core Business Processes
IoT Edge Processing
CommunicationsIntegration
Integration Communications
 Security requirements:
– Policy creation and management
– Monitoring, detection and response
– Access control and management
– Data protection
– Network segmentation
 Key challenges:
– Scale
– Diversity (age and type)
– Function
– Regulation
– Privacy
– Standardization
Recommendations: Focus on small scenarios. Use risk-based prioritization. Emphasize segmentation and access initially.
28 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Enterprise
Consumer
 Business Disruption
 Espionage and Fraud
 Financial Waste
Cyber Risks and Consequences in an IoT Solution
IoT
Platform
 Platform Hacking
 Data Snooping
and Tampering
 Sabotaging Automation
and Devices
Edge
 Device Impersonation
 Device Hacking
 Device Counterfeiting
 Snooping, Tampering,
Disruption, Damage
Dev. Prod.
29 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
IAM Trends of 2015-2016 That Include an Identity
of Things
IAM Program Management
and Governance
(Digital)
Business and Operational Needs
(Digital)
Risk Management and Compliance
Things
People
Apps and
Data
Relationships
Interactions
30 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved.
Take-Aways for Digital Security
 Balance Risk and Resilience
 Make the Security Discipline Decision
 Enhance Digital Security Supply Chains
 Retool Security Skills
 Embrace Adaptive Security Architecture
 Selective Improve Security Infrastructure
 Embrace Data Security Governance

More Related Content

PDF
Google peter logli & jake shea
PDF
Microsoft john weigelt 2016
PDF
Cyber Security Services & Solutions - Zymr
PDF
Cisco Addresses the Full Attack Continuum
PPTX
The State Of Information and Cyber Security in 2016
PDF
Windstream Managed Network Security Infographic
PPTX
Windstream Managed Network Security Presentation
PDF
Windstream Managed Network Security Ebook
Google peter logli & jake shea
Microsoft john weigelt 2016
Cyber Security Services & Solutions - Zymr
Cisco Addresses the Full Attack Continuum
The State Of Information and Cyber Security in 2016
Windstream Managed Network Security Infographic
Windstream Managed Network Security Presentation
Windstream Managed Network Security Ebook

What's hot (20)

PDF
Debunked: 5 Myths About Zero Trust Security
PPTX
MCGlobalTech Consulting Service Presentation
PDF
Securing the Cloud by Matthew Rosenquist 2016
PDF
Close the Security Gaps of a Remote Workforce
PDF
Aujas Cyber Security
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PPTX
Cybersecurity: How to Use What We Already Know
PDF
Cyber Security - Maintaining Operational Control of Critical Services
PPTX
Smoothwall and Ampliphae - Networkshop46
PPTX
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
PPTX
10 Critical Corporate Cyber Security Risks
PPTX
Windstream Cloud Security Presentation
PDF
Cloud Computing & Cybersecurity
PDF
Cyber Security and Cloud Security
PDF
THE ESSENTIAL ELEMENT OF YOUR SECURITY
PDF
Dealing with Information Security, Risk Management & Cyber Resilience
PPTX
Advantages Of Using Cyber Security Solution
PPTX
The Benefits of Security From a Managed Services Provider
PPTX
Mobility Security - A Business-Centric Approach
PPTX
Global Cybersecurity Consulting Firm
Debunked: 5 Myths About Zero Trust Security
MCGlobalTech Consulting Service Presentation
Securing the Cloud by Matthew Rosenquist 2016
Close the Security Gaps of a Remote Workforce
Aujas Cyber Security
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Cybersecurity: How to Use What We Already Know
Cyber Security - Maintaining Operational Control of Critical Services
Smoothwall and Ampliphae - Networkshop46
PCI Breach Scenarios and the Cyber Threat Landscape with Brian Honan
10 Critical Corporate Cyber Security Risks
Windstream Cloud Security Presentation
Cloud Computing & Cybersecurity
Cyber Security and Cloud Security
THE ESSENTIAL ELEMENT OF YOUR SECURITY
Dealing with Information Security, Risk Management & Cyber Resilience
Advantages Of Using Cyber Security Solution
The Benefits of Security From a Managed Services Provider
Mobility Security - A Business-Centric Approach
Global Cybersecurity Consulting Firm
Ad

Similar to Gartner presentation risq dec 2016 jie zhang (20)

PDF
New technologies - Amer Haza'a
PPTX
Evolution security controls towards Cloud Services
PPTX
Maturing Endpoint Security: 5 Key Considerations
PDF
2024-gartner-top-strategic-technology-trends-ebook.pdf
PPTX
Splunk Discovery Day Dubai 2017 - Security Keynote
PPTX
Accenture Security Services: Defending and empowering the resilient digital b...
PPT
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
PDF
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
PDF
Prevention is futile in 2020 - Gartner Report in Retrospect
PDF
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
PDF
Cisco Award Write Up
PPSX
Meraj Ahmad - Information security in a borderless world
PDF
Plan for the Worst; Fight for the Best
PPTX
Expert Compliance Solutions by Ispectra Technologies.pptx
PDF
RA TechED 2019 - SS16 - Security Where and Why do I start
PDF
Protecting Your Business Best Practices for Data Security Management.pdf
PDF
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
PDF
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
PPT
Convergence innovative integration of security
PPTX
HPE Security Keynote from Istanbul 20th Jan 2016
New technologies - Amer Haza'a
Evolution security controls towards Cloud Services
Maturing Endpoint Security: 5 Key Considerations
2024-gartner-top-strategic-technology-trends-ebook.pdf
Splunk Discovery Day Dubai 2017 - Security Keynote
Accenture Security Services: Defending and empowering the resilient digital b...
For the CISO: Continuous Cyber Attacks - Achieving Operational Excellence for...
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
Prevention is futile in 2020 - Gartner Report in Retrospect
#askSAP GRC Innovations Community Call: Cybersecurity Risk and Governance
Cisco Award Write Up
Meraj Ahmad - Information security in a borderless world
Plan for the Worst; Fight for the Best
Expert Compliance Solutions by Ispectra Technologies.pptx
RA TechED 2019 - SS16 - Security Where and Why do I start
Protecting Your Business Best Practices for Data Security Management.pdf
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Convergence innovative integration of security
HPE Security Keynote from Istanbul 20th Jan 2016
Ad

More from ColloqueRISQ (20)

PDF
Blockchain Technologies : Landscape and Future Directions
PPT
Béluga : un super-ordinateur pour la science de demain
PPTX
Why SD-WAN as it Moves to Mainstream Adoption?
PPTX
La révolution 5G et le projet ENCQOR
PPTX
Travailler TOUS ensemble lors d’une cybercrise!
PPTX
Audit 101 - Un guide de survie
PPTX
Votre meilleure protection est un internet canadien
PPTX
Office 365 : Sécuritaire?
PPTX
What Nature Can Tell Us About IoT Security at Scale
PPTX
The Power of the NREN
PPTX
L’hyperconvergence au cœur du Software-defined data center
PDF
Plus de darkweb, moins de problèmes pour les pirates informatiques?
PDF
L'humain dans la cybersécurité - Problèmes et réflexions
PDF
L'internet des objets et la cybersécurité
PDF
Au-delà du réseau - une défense simple en profondeur
PDF
Threat Landscape for Education
PDF
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
PDF
Sécuriser votre environnement de l'Internet des objets (IoT)
PDF
The 2018 Threat Landscape
PDF
Cybersecurity Through Collaboration
Blockchain Technologies : Landscape and Future Directions
Béluga : un super-ordinateur pour la science de demain
Why SD-WAN as it Moves to Mainstream Adoption?
La révolution 5G et le projet ENCQOR
Travailler TOUS ensemble lors d’une cybercrise!
Audit 101 - Un guide de survie
Votre meilleure protection est un internet canadien
Office 365 : Sécuritaire?
What Nature Can Tell Us About IoT Security at Scale
The Power of the NREN
L’hyperconvergence au cœur du Software-defined data center
Plus de darkweb, moins de problèmes pour les pirates informatiques?
L'humain dans la cybersécurité - Problèmes et réflexions
L'internet des objets et la cybersécurité
Au-delà du réseau - une défense simple en profondeur
Threat Landscape for Education
Comment sécuriser les centres de données virtuels ou infonuagiques avec NSX
Sécuriser votre environnement de l'Internet des objets (IoT)
The 2018 Threat Landscape
Cybersecurity Through Collaboration

Recently uploaded (20)

PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Electronic commerce courselecture one. Pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPT
Teaching material agriculture food technology
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Monthly Chronicles - July 2025
The AUB Centre for AI in Media Proposal.docx
Electronic commerce courselecture one. Pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
MYSQL Presentation for SQL database connectivity
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The Rise and Fall of 3GPP – Time for a Sabbatical?
Teaching material agriculture food technology
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Chapter 3 Spatial Domain Image Processing.pdf

Gartner presentation risq dec 2016 jie zhang

  • 1. CONFIDENTIAL AND PROPRIETARY This presentation, including any supporting materials, is owned by Gartner, Inc. and/or its affiliates and is for the sole use of the intended Gartner audience or other intended recipients. This presentation may contain information that is confidential, proprietary or otherwise legally protected, and it may not be further copied, distributed or publicly displayed without the express written permission of Gartner, Inc. or its affiliates. © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Top Security Trends and Take-Aways Jie Zhang
  • 2. 1 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Security for the Next Generation of Threat  A pervasive digital presence is expanding into business, industry and society  Once networked, this digital presence substantively alters risk for digital businesses  Digital security is the next evolution in cybersecurity to protect this pervasive digital presence
  • 3. 2 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Security Macro Trends You Face in the Age of the Pervasive Digital Presence  Risk and Resilience Seek Balance  Security Disciplines Converge  Secure Digital Supply Chain Needs Grow  Security Skills Options Expand  Adaptive Security Architecture Embraced  Data Security Governance Arrives  Digital Business Drives Digital Security
  • 4. 3 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Risk and Resilience Seek Balance
  • 5. 4 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Security Moves to an Embedded State in the Organization  Governance  Compliance  Control  Protection  Reliability  Speed  Assurance  Transparency RISK RESILIENCE Privacy Safety Value Cost
  • 6. 5 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Security Principles for Trust and Resilience Business Outcomes Risk-Based Data Flow Facilitator Detect and Respond Principle of Trust and Resilience People-Centric
  • 7. 6 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Risk and Resilience Balance  Revisit the security organizational structure to ensure it reflects current mission  Revise the methods used to calculate IT risk to incorporate new variables and factors  Refine the security communication and education process to emphasize agility
  • 8. 7 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Security Disciplines Converge
  • 9. 8 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Digital Security for the Pervasive Digital Presence Defense Offense Reactive Proactive IoT Security Information Security IT Security OT Security Physical Security You Are Here Digital Security
  • 10. 9 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. "Digital Safety" Becomes a New Force and Responsibility The CIAS Model of Digital Security Integrity Data People Environments Confidentiality Availability Safety Graphics: Can Stock Photo
  • 11. 10 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Security Convergence  Establish security governance and planning relationships with physical and industrial counterparts  Improve cross-discipline procurement methods for security requirements  Modify security architecture to include additional layers where required  Investigate changes in security management and operations that may be required to accommodate convergence
  • 12. 11 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Secure Digital Supply Chain
  • 13. 12 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Integrated Digital Security for the Supply Chain(s) SUPPLY CHAIN DIGITAL SUPPLY CHAIN DIGITAL SECURITY FOR THE SUPPLY CHAIN(S) IoT Security Information Security IT Security OT Security Physical Security Digital Security
  • 14. 13 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. SIEM Software Asset Management Expanding (and Confusing) SaaS Control Add-On Markets Today's enterprise suffers from coordination frustration. Encouraging evolution of multicloud, multifunction management consoles. Activity Threat Control Archive and Recovery Cloud Access Security Broker EMM Confidentiality IDaaS SaaS Aggregation Tool Mobile Device Management Before and During Login After Login Service Monitoring Malware Control
  • 15. 14 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Securing the Cloud (Supply Chain)  Develop an enterprise public cloud strategy.  Implement and enforce policies on usage responsibility and cloud risk acceptance.  Follow a cloud life cycle governance approach.  Develop expertise in the security and control each cloud model used.  Implement technologies to fight cloud diffusion complexity. Conduct Risk Assessment (decision establishes requirements for technical and process controls) Medium Exposure Potential Impact of Security Failure BusinessContribution (ValueofService) Low High Always Allowed Low High DoNotAllowDoNotAllow
  • 16. 15 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Security Skills Options Expand
  • 17. 16 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Assess the Most Critical Skills Impacts of Digital Security Already, Traditional Security Strategies Are Shifting To: Contextual Security Monitoring and Response Ubiquitous Identity Management Data Classes, Data Governance Security Awareness, Privacy & Behavior 01011 Embedded Security Network Segmentation, Engineering Physical Security Automation
  • 18. 17 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Key Take-Aways to Accelerate Skills Generation and Convergence  Build a long-term security workforce plan.  Make coaching and skills development first task.  Embed security skills within the lines-of-business.  Change security specialists to "versatilists."  Mix traditional and agile recruitment techniques.  Evaluate current skills gaps.
  • 19. 18 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Adaptive Security Architecture Is Embraced
  • 20. 19 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Software-Defined Everything, Including Security "Data Plane" "Control Plane" APIAPI API API APIAPI API Southboun d APIs Northboun d APIs Layers of Abstraction API Platform APIs Applications
  • 21. 20 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Respond Detect Detect incidents Prevent attacks Confirm and prioritize risk Contain incidents Isolate systems Predict Prevent Harden systems Compliance Policy Monitor posture Adjust posture Implement posture Adjust posture Continuous Visibility and Verification Users Systems System activity Payload Network Investigate incidents/ retrospective analysis Remediate Anticipate threats/ attacks Risk-prioritized exposure assessment Design/Model policy change Baseline systems and security posture Develop an Adaptive Security Architecture
  • 22. 21 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Threat Intelligence Platforms Allow You to Visualize, Correlate and Gain Context Emerging Threats Shadowserver ZeuS Tracker Abuse.ch Open-Source MRTI Feeds Norse IID Cyveillance Malcovery Commercial Feeds GeoIP Malware Lookup Domain Tools Enrichment Services News RSS Feeds Websites OSINT Sources Threat Intelligence Platform Analytics Threat Intelligence Processing Visualization Reporting Forensics Threat Intelligence Sharing Incident Response SOC Analyst Fraud Threat Analyst Management Malware Analyst Help Desk People Process Circle of Trust Sharing Workflow/ Escalation Communication Fraud Technology Secure Web Gateway NGFW IPS/IDS Logs
  • 23. 22 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Adaptive Security Architecture  Shift security mindset from "incident response" to "continuous response"  Spend less on prevention; invest in detection, response and predictive capabilities  Favor context-aware network, endpoint and application security protection platforms  Develop a security operations center  Architect for comprehensive, continuous monitoring at all layers of the IT stack.
  • 24. 23 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Data Security Governance Arrives
  • 25. 24 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Develop a Data-Centric Audit and Protection Approach Activity Monitoring Assessment of Users and Permissions User Monitoring and Auditing Data Security Policy Data Classification and Discovery Policy Data Security Controls Protection Analysis and Reporting Blocking, Encryption, Tokenization and Data Masking
  • 26. 25 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Data Security Governance  Prioritize organization-wide data security governance and policy.  Identify and implement risk-appropriate data security controls by data type where possible.  Implement a DCAP strategy that includes disciplined and formal product selection.  Incorporate big data plans and unique requirements into security strategy.
  • 27. 26 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Digital Business Drives Digital Security
  • 28. 27 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Securing a Pervasive Digital Presence (the Internet of Things) Gateways Things Agents Analytics Applications Data Cloud Mobile MES, ERP Partners IoT Platform Middleware Core Business Processes IoT Edge Processing CommunicationsIntegration Integration Communications  Security requirements: – Policy creation and management – Monitoring, detection and response – Access control and management – Data protection – Network segmentation  Key challenges: – Scale – Diversity (age and type) – Function – Regulation – Privacy – Standardization Recommendations: Focus on small scenarios. Use risk-based prioritization. Emphasize segmentation and access initially.
  • 29. 28 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Enterprise Consumer  Business Disruption  Espionage and Fraud  Financial Waste Cyber Risks and Consequences in an IoT Solution IoT Platform  Platform Hacking  Data Snooping and Tampering  Sabotaging Automation and Devices Edge  Device Impersonation  Device Hacking  Device Counterfeiting  Snooping, Tampering, Disruption, Damage Dev. Prod.
  • 30. 29 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. IAM Trends of 2015-2016 That Include an Identity of Things IAM Program Management and Governance (Digital) Business and Operational Needs (Digital) Risk Management and Compliance Things People Apps and Data Relationships Interactions
  • 31. 30 © 2016 Gartner, Inc. and/or its affiliates. All rights reserved. Take-Aways for Digital Security  Balance Risk and Resilience  Make the Security Discipline Decision  Enhance Digital Security Supply Chains  Retool Security Skills  Embrace Adaptive Security Architecture  Selective Improve Security Infrastructure  Embrace Data Security Governance