SlideShare a Scribd company logo
1 of 68
Download to read offline
© 2017 VMware Inc. All rights reserved.
Come sviluppare un approccio strategico alla cyber security
nell'era del mobile-cloud e degli oggetti interconnessi
Difendere tutto... difendere niente!
VMUG Italia Meeting – Lecce – 5 aprile 2018
Rodolfo Rotondo
Senior Business Solution Strategist | Advisory Services | SEMEA
@RodolfoRotondo
2
3
4
Expectations have changed
5
The Magic of Scale
6
7-10
“Meat-safe”
temperature
points
A change of 1ºF
7
A change of
300,000ºF
Power
67,517
homes in a year
8
New Expectations and Scale – Digital Transformation Agenda
Business Agility
and Innovation
Exceptional Mobile
Experiences
Protection of Brand
and Customer Trust
Integrate
Public
Clouds
Transform
SecurityEmpower
Digital
Workspaces
Modernize
Data
Centers
B U S I N E S S O U T C O M E S
S T R AT E G I C I T P R I O R I T I E S
9
Digital Transformation – VMware Vision
Any
Cloud
Private Clouds Public Clouds
Any
App
Any
Device
Traditional SaaSCloud Native
10
TransformSecurity
Do Non-Technical Business Leaders Look at Security
Differently than CIOs and CISOs?
11
Only 8% of Business Decision-Makers consider
cyber security as the number one corporate issue
vs.
CEO & CFO
Business
Decision-Makers
CIO & CISO
Technology
Decision-Makers
But…
12
The Only Thing Outpacing Growth in Security Spend is
Growth in Security Breaches
13
IT Spend Security Spend Security Breaches
Annual Cost of Security
Breaches: $445B
(Source: Center for Strategic and Int’l Studies)
Security as a % of IT
Spend:
2012: 11%
2015: 21 %
(Source: Forrester)
Projected Growth Rate
in IT Spend from 2014-
2019: Zero (Flat)
(Source: Gartner)
World's Biggest Data Breaches
Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/
14
15
Breaches
Have
Consequences
Bad Publicity
Lose Business Partners
Lose Existing Customers
Deter New Customers
Disrupt Business Operations
Increased Costs
Financial Loss
Litigation
15
Some Notable Data Breaches
Not the latest…
16
• 78.8 million patient
records has been stolen
• Highly sensitive data
exposed (ssn, birth’s date,
home addresses, …)
• Agreed to pay $115M
• 70 million CC
data stolen
• $200M damages
• Sales drop 4%
• CEO & CIO
resigns
• Sensitive personal
identifiable information of
145M people
• $90M cost so far,
forecasting $75M
spending, subject to 240
class-action lawsuits
• CEO resigned
• 21.5 million
records hacked
• 4 million people
affected with
personal identifiable
information
And what about the ”Thinks”?
17
And what about the ”Thinks”?
18
And what about the ”Thinks”?
19
And what about the ”Thinks”?
20
And what about the ”Thinks”?
How to manage
and secure
any “thing”
connected to the
Internet?
21
The Old World
22
Devices
Infrastructure
Apps Traditional Apps Cloud-Native AppsAPP APP APP APP APP APP
The New World
23
APP APP APPAPP APP APP
APP APPAPP APP APP
APP
Managed
Clouds
Private
Clouds
Public
Clouds
APP
APP APP APPAPP APP APP
APP APPAPP APP APP APP
Who is ultimately responsible in
the event of a security breach?
Legal Department Business
Users
Mix of IT and
Business Users
IT
Department
4.4% 5.2%
23.0%
67.5%
2016
IT Must Secure Everything
24
Legal Department Business
Users
Mix of IT and
Business Users
IT
Department
4.4% 5.2%
23.0%
67.5%
90.5%
2016
IT Must Secure Everything
25
The Core Challenge
Stitch Together Silos of Innovation
26
Next-Gen User Experience
Network
Security
Real-Time
App Delivery
IoT Management
Hybrid Cloud Architecture
Identity
Management
Device
Management
Application
Management
Content
Management
Storage
Virtualization
Mobile
Security
Cloud
Services
Data Security
Network
Analytics
Software Defined
Networking
Operations
Management
Dev Ops
Mobility
Management
Log
Management
Desktop
Virtualization
Threat
Intelligence
Security is an Architectural Issue
27
28
1.Prep
Attack Vector
R&D
Human
Recon
Delivery
Mechanism
21 3
29
2. Intrusion
Strain B
Dormant
Strain A
ActiveCompromise
Primary Entry
Point
4
Install
Command
& Control I/F
5
30
Install C2 I/F Wipe
Tracks Escalate Priv
Strain A
Active
Escalate Privileges on
Primary Entry Point
6
Lateral
Movement
7
8
3. Recon
31
4. Recovery
Strain B Active
Strain C Dormant
Strain A
Active
Attack
Identified
Response Wake Up & Modify
Next Dormant Strain
9
Strain D Dormant
32
5. Act on intent & Exfiltration
Attack
Identified
10
Parcel &
Obfuscate
11
Exfiltration
12 13
Cleanup
33
A Timeline of Government Data Breaches
34
April May June July Aug Sept Oct Nov Dec Jan Feb March April May June July Aug Sept Oct Nov Dec Jan Feb March April May June
April May June July Aug Sept Oct Nov Dec Jan Feb March April May June July Aug Sept Oct Nov Dec Jan Feb March April May June
USIS breach
about 25,000
records stolen
First OPM breach
no records stolen
First KeyPoint breach
about 48,000 stolen
Second
KeyPoint
breach
as many as
390,000
stolen
Second OPM
breach
about 21.5
million stolen
Third OPM
breach
about
4.6 million
stolen
breach start date not public
Although this breach was
originally announced in
June, the full extent of the
data stolen was not made
public until July
3.6 million individuals
were affected by both
the second and third
OPM breaches
No breaches have
been detected
since June 8
Breach discovered Breach made public
2013 2014 2015
2013 2014 2015
OPM hack
contractor hack
breach made public
height of bar repre-
sents size of hack
Source: http://www.theatlantic.com/politics/archive/2015/07/a-timeline-of-government-data-breaches/458352/
Modern attack: targeted, interactive, stealthy
35
• Perimeter-centric
• Managing Compliance
• Application and User-centric
• Managing Risk
Shift from… Shift to…
Stop infiltration Lack visibility, control to stop exfiltration
80% of investments
focus on
intrusion prevention.
The attack surface is
simply too broad
Only 20% of the investments focus on
addressing the
propagation, extraction and exfiltration.
Organizations do not have the visibility and
control within their infrastructure.
Old Way of Thinking
36
Leverage the unique properties of identity,
mobility, cloud, and virtualization to add
security everywhere
RecoverIdentify Protect Detect Respond
37
Context – Isolation: where to apply security?
38
• Lack application context
• Isolation from the attack
surface
Network Control Points Endpoint Control Points
• Great context
• No Isolation from the attack
surface
The perfect place for an ubiquitous Security Layer
Too Hot Too Cold
The “Goldilocks Zone” of security
39
40
New apps and
delivery models can’t
be easily protected
with perimeter-
centric network
security.
Proliferating and
diverse endpoints
access a range of
apps and IT services.
Increasingly complex
regulatory
compliance
requires more of
organizations.
VMware’s New Approach to Security
VMware’s New Approach to Security
41
TRANSFORM SECURITY
New apps and
delivery models can’t
be easily protected
with perimeter-
centric network
security.
Proliferating and
diverse endpoints
access a range of
apps and IT services.
Increasingly complex
regulatory
compliance
requires more of
organizations.
Secure Application
Infrastructure
Secure Identity
and Endpoints
Streamline
Compliance
Intrinsic Security from Device to Data Center to Cloud
Secure Infrastructure
StorageNetwork ComputeDevicesUsers
42
The picture can't be displayed.
Secure Infrastructure
StorageNetwork ComputeDevicesUsers
Integrated Ecosystem
43
The picture can't be displayed.
Cyber Hygiene
Secure Infrastructure
StorageNetwork ComputeDevicesUsers
Integrated Ecosystem
Transforming Cyber Security
44
Secure Infrastructure
StorageNetwork ComputeDevicesUsers
Integrated Ecosystem
Cyber Hygiene
Cyber Hygiene
In a Mobile and Cloud World
CONFIDENTIAL 45
Least
Privilege
Micro-
Segmentation
Encryption Multi-Factor
Authentication
Patching
5 Pillars of Cyber Hygiene
46
47
• Highly complex and noisy
• Exposed, i.e., untrusted monitoring, limited context
• Manual and lacking orchestration
From our current model
Focused on malicious behavior
48
To a new model
Focused on good (intended) behavior
• Simpler and smaller problem set
• Better signal to noise ratio
• Actionable and behavior-based alerts and responses
Attack Vectors
Break the Kill Chain with Least Privilege
49
Propagation Extraction
Application
Network
Data Plane
ExfiltrationInfiltration
Attack Vectors: Network
50
Traditional Segmentation
51
Micro-Segmentation – Least Privilege for Network
DB
WEB
APP
APP
APP
52
Micro-Segmentation – Least Privilege for Network
DB
WEB
APP
APP
APP
53
Micro-Segmentation – Least Privilege for Network
FW
FW
DB
WEB
APP
APP
APP
Integrated Ecosystem
54
Attack Vectors: Data Plane
55
What About Exposure from the Physical Underlay?
Listening Inserting
DB
WEB
APP
APP
APP
56
You Can Solve that with Encryption
…. But that turns out to be enormously complex
DB
WEB
APP
APP
APP
57
You Can Solve that with Encryption
…. But that turns out to be enormously complex
DB
WEB
APP
APP
APP
58
Distributed Encryption – Least Privilege of Data
DB
WEB
APP
APP
APP
59
Attack Vectors: Application
60
The Application as a System of Components
Processes
Security Agents / Monitoring
OS
Inbound
Communications
Outbound
Communications
Processes
Security Agents / Monitoring
OS
Inbound
Communications
Outbound
Communications
Processes
Security Agents / Monitoring
OS
Inbound
Communications
Outbound
Communications
DB
WEB
APP
APP
APP
61
Least Privilege for the Application Layer
Intentional State Remediation
Untrusted Zone (Guest)
Processes
Security Agents / Monitoring
OS
Inbound
Communications
Outbound
Communications
Trusted Zone (Virtualization)
Runtime Attestation
Secure Context Store
62
CAPTURE DETECT RESPOND
Security Everywhere
63
IoT Security Threats
64
IoT Platform
(On-Prem, Private or Public Cloud)
Business AppsThings Edge
Destroy Sensor
Malicious Command
))))
))
Insert Fake Data
Eavesdropping
64
Issues:
• Scale
• Complexity
• Non-traditional computers
• Non-standard devices
• Variety of compute power
• Extreme heterogeneity
IoT Secure 3-Tier Architecture
65
IoT Platform
(On-Prem, Private or Public Cloud)
Business Apps
• Data Orchestrator
• Data Platform
• Device Management
• Platform Apps
• Operational Analysis
Things Edge
SimpleConnection
Three-Tier
Architecture
• Things Access
• Edge Gateway
• Gateway Agent
• Edge Apps
• Liota
• Operational Analysis
EDGE SYSTEMS ANALYTICS
65
Insert Security Everywhere
66
Visibility Policy
Service Insertion
Context
Ubiquitous Security Layer
Automation
Least Privilege
Context
An Architecture to Transform Cyber Security As We Know It
Ubiquitous
Security Layer
67
© 2017 VMware Inc. All rights reserved.
Grazie!
Come sviluppare un approccio strategico alla cyber security
nell'era del mobile-cloud e degli oggetti interconnessi
Difendere tutto... difendere niente!
VMUG Italia Meeting – Lecce – 5 aprile 2018
Rodolfo Rotondo
Senior Business Solution Strategist | Advisory Services | SEMEA
@RodolfoRotondo

More Related Content

What's hot

What's hot (20)

Cisco Connect Halifax 2018 Application insight and zero trust policies with...
Cisco Connect Halifax 2018   Application insight and zero trust policies with...Cisco Connect Halifax 2018   Application insight and zero trust policies with...
Cisco Connect Halifax 2018 Application insight and zero trust policies with...
 
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
Cisco connect winnipeg 2018   accelerating the secure digital business throug...Cisco connect winnipeg 2018   accelerating the secure digital business throug...
Cisco connect winnipeg 2018 accelerating the secure digital business throug...
 
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationThe Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
 
Management Cloud Oracle
Management Cloud OracleManagement Cloud Oracle
Management Cloud Oracle
 
20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers20160000 Cloud Discovery Event - Cloud Access Security Brokers
20160000 Cloud Discovery Event - Cloud Access Security Brokers
 
Windows for Raspberry Pi 2 Makers (and more!)
Windows for Raspberry Pi 2Makers (and more!)Windows for Raspberry Pi 2Makers (and more!)
Windows for Raspberry Pi 2 Makers (and more!)
 
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
Maturing IoT solutions with Microsoft Azure (Sam Vanhoutte & Glenn Colpaert a...
 
Introduction to Fog
Introduction to FogIntroduction to Fog
Introduction to Fog
 
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
Data Strategy – What Does an Enterprise Data Cloud Mean for Your Agency?
 
The secure, direct to-internet branch
The secure, direct to-internet branchThe secure, direct to-internet branch
The secure, direct to-internet branch
 
F5 Cloud Solutions
F5 Cloud SolutionsF5 Cloud Solutions
F5 Cloud Solutions
 
Rama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital businessRama Kolappan – The multi-cloud geared for the digital business
Rama Kolappan – The multi-cloud geared for the digital business
 
Keepler | IoT Analytics & AI on Edge Computing
Keepler | IoT Analytics & AI on Edge ComputingKeepler | IoT Analytics & AI on Edge Computing
Keepler | IoT Analytics & AI on Edge Computing
 
History of Data-Centric Transformation
History of Data-Centric TransformationHistory of Data-Centric Transformation
History of Data-Centric Transformation
 
Predix
PredixPredix
Predix
 
Cisco Connect Toronto 2018 DNA assurance
Cisco Connect Toronto 2018  DNA assuranceCisco Connect Toronto 2018  DNA assurance
Cisco Connect Toronto 2018 DNA assurance
 
Understand, verify, and act on the security of your Kubernetes clusters - Sca...
Understand, verify, and act on the security of your Kubernetes clusters - Sca...Understand, verify, and act on the security of your Kubernetes clusters - Sca...
Understand, verify, and act on the security of your Kubernetes clusters - Sca...
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of ThingsCisco Fog Computing Solutions: Unleash the Power of the Internet of Things
Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things
 
Computing solutions
Computing solutionsComputing solutions
Computing solutions
 

Similar to 06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware

kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
Onwubiko Emmanuel
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
SolarWinds
 

Similar to 06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware (20)

Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' MeetupChris Swan's presentation from the London Tech Entrepreneurs' Meetup
Chris Swan's presentation from the London Tech Entrepreneurs' Meetup
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoftHow Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
How Facility Controls Systems Present Cybersecurity Challenges - OSIsoft
 
kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.kaspersky presentation for palette business solution June 2016 v1.0.
kaspersky presentation for palette business solution June 2016 v1.0.
 
The New Style of Business
The New Style of Business The New Style of Business
The New Style of Business
 
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
Federal Webinar: Leverage IT Operations Monitoring and Log Data to Reduce Ins...
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
IAM for mobile and BYOD
IAM for mobile and BYODIAM for mobile and BYOD
IAM for mobile and BYOD
 
Aalto cyber-10.4.18
Aalto cyber-10.4.18Aalto cyber-10.4.18
Aalto cyber-10.4.18
 
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider ThreatsFederal Webinar: Best Practices and Tools for Reducing Insider Threats
Federal Webinar: Best Practices and Tools for Reducing Insider Threats
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.Your organization is at risk! Upgrade your IT security & IT governance now.
Your organization is at risk! Upgrade your IT security & IT governance now.
 
EMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the CloudEMEA10: Trepidation in Moving to the Cloud
EMEA10: Trepidation in Moving to the Cloud
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Security, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - JelecosSecurity, Compliance and Cloud - Jelecos
Security, Compliance and Cloud - Jelecos
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Retail Week: Cloud Security
Retail Week: Cloud SecurityRetail Week: Cloud Security
Retail Week: Cloud Security
 

More from VMUG IT

Luc Dekens - Italian vmug usercon
Luc Dekens - Italian vmug usercon Luc Dekens - Italian vmug usercon
Luc Dekens - Italian vmug usercon
VMUG IT
 

More from VMUG IT (20)

04 vmugit aprile_2018_raff_poltronieri
04 vmugit aprile_2018_raff_poltronieri04 vmugit aprile_2018_raff_poltronieri
04 vmugit aprile_2018_raff_poltronieri
 
03 vmugit aprile_2018_veeam
03 vmugit aprile_2018_veeam03 vmugit aprile_2018_veeam
03 vmugit aprile_2018_veeam
 
02 vmugit aprile_2018_il_restodelcarlino
02 vmugit aprile_2018_il_restodelcarlino02 vmugit aprile_2018_il_restodelcarlino
02 vmugit aprile_2018_il_restodelcarlino
 
01 vmugit aprile_2018_bologna_benvenuto
01 vmugit aprile_2018_bologna_benvenuto01 vmugit aprile_2018_bologna_benvenuto
01 vmugit aprile_2018_bologna_benvenuto
 
07 vmugit aprile_2018_massimiliano_moschini
07 vmugit aprile_2018_massimiliano_moschini07 vmugit aprile_2018_massimiliano_moschini
07 vmugit aprile_2018_massimiliano_moschini
 
06 vmugit aprile_2018_alessandro_tinivelli
06 vmugit aprile_2018_alessandro_tinivelli06 vmugit aprile_2018_alessandro_tinivelli
06 vmugit aprile_2018_alessandro_tinivelli
 
05 vmugit aprile_2018_7_layers
05 vmugit aprile_2018_7_layers05 vmugit aprile_2018_7_layers
05 vmugit aprile_2018_7_layers
 
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
07 - VMUGIT - Lecce 2018 - Antonio Gentile, Fortinet
 
05 - VMUGIT - Lecce 2018 - Raff Poltronieri, CloudItalia
05 - VMUGIT - Lecce 2018 - Raff Poltronieri, CloudItalia05 - VMUGIT - Lecce 2018 - Raff Poltronieri, CloudItalia
05 - VMUGIT - Lecce 2018 - Raff Poltronieri, CloudItalia
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 
03 - VMUGIT - Lecce 2018 - Massimiliano Mortillaro, Tech Unplugged
03 - VMUGIT - Lecce 2018 - Massimiliano Mortillaro, Tech Unplugged03 - VMUGIT - Lecce 2018 - Massimiliano Mortillaro, Tech Unplugged
03 - VMUGIT - Lecce 2018 - Massimiliano Mortillaro, Tech Unplugged
 
02 - VMUGIT - Lecce 2018 - Enrico Signoretti, OpenIO
02 - VMUGIT - Lecce 2018 - Enrico Signoretti, OpenIO02 - VMUGIT - Lecce 2018 - Enrico Signoretti, OpenIO
02 - VMUGIT - Lecce 2018 - Enrico Signoretti, OpenIO
 
01 - VMUGIT - Lecce 2018 - Fabio Rapposelli, VMware
01 - VMUGIT - Lecce 2018 - Fabio Rapposelli, VMware01 - VMUGIT - Lecce 2018 - Fabio Rapposelli, VMware
01 - VMUGIT - Lecce 2018 - Fabio Rapposelli, VMware
 
00 - VMUGIT - Lecce 2018 - Intro
00 - VMUGIT - Lecce 2018 - Intro00 - VMUGIT - Lecce 2018 - Intro
00 - VMUGIT - Lecce 2018 - Intro
 
Luca dell'oca - italian vmug usercon 2017
Luca dell'oca - italian vmug usercon 2017 Luca dell'oca - italian vmug usercon 2017
Luca dell'oca - italian vmug usercon 2017
 
Luc Dekens - Italian vmug usercon
Luc Dekens - Italian vmug usercon Luc Dekens - Italian vmug usercon
Luc Dekens - Italian vmug usercon
 
Gianni Resti
Gianni Resti  Gianni Resti
Gianni Resti
 
Frank Denneman keynote
Frank Denneman keynoteFrank Denneman keynote
Frank Denneman keynote
 
Vmug 2017 Guido Frabotti
Vmug 2017 Guido FrabottiVmug 2017 Guido Frabotti
Vmug 2017 Guido Frabotti
 
Claudio Panerai - Achab
Claudio Panerai - Achab Claudio Panerai - Achab
Claudio Panerai - Achab
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 

06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware

  • 1. © 2017 VMware Inc. All rights reserved. Come sviluppare un approccio strategico alla cyber security nell'era del mobile-cloud e degli oggetti interconnessi Difendere tutto... difendere niente! VMUG Italia Meeting – Lecce – 5 aprile 2018 Rodolfo Rotondo Senior Business Solution Strategist | Advisory Services | SEMEA @RodolfoRotondo
  • 2. 2
  • 3. 3
  • 4. 4
  • 6. The Magic of Scale 6
  • 9. New Expectations and Scale – Digital Transformation Agenda Business Agility and Innovation Exceptional Mobile Experiences Protection of Brand and Customer Trust Integrate Public Clouds Transform SecurityEmpower Digital Workspaces Modernize Data Centers B U S I N E S S O U T C O M E S S T R AT E G I C I T P R I O R I T I E S 9
  • 10. Digital Transformation – VMware Vision Any Cloud Private Clouds Public Clouds Any App Any Device Traditional SaaSCloud Native 10 TransformSecurity
  • 11. Do Non-Technical Business Leaders Look at Security Differently than CIOs and CISOs? 11 Only 8% of Business Decision-Makers consider cyber security as the number one corporate issue vs. CEO & CFO Business Decision-Makers CIO & CISO Technology Decision-Makers
  • 13. The Only Thing Outpacing Growth in Security Spend is Growth in Security Breaches 13 IT Spend Security Spend Security Breaches Annual Cost of Security Breaches: $445B (Source: Center for Strategic and Int’l Studies) Security as a % of IT Spend: 2012: 11% 2015: 21 % (Source: Forrester) Projected Growth Rate in IT Spend from 2014- 2019: Zero (Flat) (Source: Gartner)
  • 14. World's Biggest Data Breaches Source: http://www.informationisbeautiful.net/visualizations/worlds-biggest-data-breaches-hacks/ 14
  • 15. 15 Breaches Have Consequences Bad Publicity Lose Business Partners Lose Existing Customers Deter New Customers Disrupt Business Operations Increased Costs Financial Loss Litigation 15
  • 16. Some Notable Data Breaches Not the latest… 16 • 78.8 million patient records has been stolen • Highly sensitive data exposed (ssn, birth’s date, home addresses, …) • Agreed to pay $115M • 70 million CC data stolen • $200M damages • Sales drop 4% • CEO & CIO resigns • Sensitive personal identifiable information of 145M people • $90M cost so far, forecasting $75M spending, subject to 240 class-action lawsuits • CEO resigned • 21.5 million records hacked • 4 million people affected with personal identifiable information
  • 17. And what about the ”Thinks”? 17
  • 18. And what about the ”Thinks”? 18
  • 19. And what about the ”Thinks”? 19
  • 20. And what about the ”Thinks”? 20
  • 21. And what about the ”Thinks”? How to manage and secure any “thing” connected to the Internet? 21
  • 23. Devices Infrastructure Apps Traditional Apps Cloud-Native AppsAPP APP APP APP APP APP The New World 23 APP APP APPAPP APP APP APP APPAPP APP APP APP Managed Clouds Private Clouds Public Clouds APP APP APP APPAPP APP APP APP APPAPP APP APP APP
  • 24. Who is ultimately responsible in the event of a security breach? Legal Department Business Users Mix of IT and Business Users IT Department 4.4% 5.2% 23.0% 67.5% 2016 IT Must Secure Everything 24
  • 25. Legal Department Business Users Mix of IT and Business Users IT Department 4.4% 5.2% 23.0% 67.5% 90.5% 2016 IT Must Secure Everything 25
  • 26. The Core Challenge Stitch Together Silos of Innovation 26 Next-Gen User Experience Network Security Real-Time App Delivery IoT Management Hybrid Cloud Architecture Identity Management Device Management Application Management Content Management Storage Virtualization Mobile Security Cloud Services Data Security Network Analytics Software Defined Networking Operations Management Dev Ops Mobility Management Log Management Desktop Virtualization Threat Intelligence
  • 27. Security is an Architectural Issue 27
  • 28. 28
  • 30. 2. Intrusion Strain B Dormant Strain A ActiveCompromise Primary Entry Point 4 Install Command & Control I/F 5 30
  • 31. Install C2 I/F Wipe Tracks Escalate Priv Strain A Active Escalate Privileges on Primary Entry Point 6 Lateral Movement 7 8 3. Recon 31
  • 32. 4. Recovery Strain B Active Strain C Dormant Strain A Active Attack Identified Response Wake Up & Modify Next Dormant Strain 9 Strain D Dormant 32
  • 33. 5. Act on intent & Exfiltration Attack Identified 10 Parcel & Obfuscate 11 Exfiltration 12 13 Cleanup 33
  • 34. A Timeline of Government Data Breaches 34 April May June July Aug Sept Oct Nov Dec Jan Feb March April May June July Aug Sept Oct Nov Dec Jan Feb March April May June April May June July Aug Sept Oct Nov Dec Jan Feb March April May June July Aug Sept Oct Nov Dec Jan Feb March April May June USIS breach about 25,000 records stolen First OPM breach no records stolen First KeyPoint breach about 48,000 stolen Second KeyPoint breach as many as 390,000 stolen Second OPM breach about 21.5 million stolen Third OPM breach about 4.6 million stolen breach start date not public Although this breach was originally announced in June, the full extent of the data stolen was not made public until July 3.6 million individuals were affected by both the second and third OPM breaches No breaches have been detected since June 8 Breach discovered Breach made public 2013 2014 2015 2013 2014 2015 OPM hack contractor hack breach made public height of bar repre- sents size of hack Source: http://www.theatlantic.com/politics/archive/2015/07/a-timeline-of-government-data-breaches/458352/
  • 35. Modern attack: targeted, interactive, stealthy 35 • Perimeter-centric • Managing Compliance • Application and User-centric • Managing Risk Shift from… Shift to… Stop infiltration Lack visibility, control to stop exfiltration 80% of investments focus on intrusion prevention. The attack surface is simply too broad Only 20% of the investments focus on addressing the propagation, extraction and exfiltration. Organizations do not have the visibility and control within their infrastructure.
  • 36. Old Way of Thinking 36
  • 37. Leverage the unique properties of identity, mobility, cloud, and virtualization to add security everywhere RecoverIdentify Protect Detect Respond 37
  • 38. Context – Isolation: where to apply security? 38 • Lack application context • Isolation from the attack surface Network Control Points Endpoint Control Points • Great context • No Isolation from the attack surface
  • 39. The perfect place for an ubiquitous Security Layer Too Hot Too Cold The “Goldilocks Zone” of security 39
  • 40. 40 New apps and delivery models can’t be easily protected with perimeter- centric network security. Proliferating and diverse endpoints access a range of apps and IT services. Increasingly complex regulatory compliance requires more of organizations. VMware’s New Approach to Security
  • 41. VMware’s New Approach to Security 41 TRANSFORM SECURITY New apps and delivery models can’t be easily protected with perimeter- centric network security. Proliferating and diverse endpoints access a range of apps and IT services. Increasingly complex regulatory compliance requires more of organizations. Secure Application Infrastructure Secure Identity and Endpoints Streamline Compliance Intrinsic Security from Device to Data Center to Cloud
  • 43. The picture can't be displayed. Secure Infrastructure StorageNetwork ComputeDevicesUsers Integrated Ecosystem 43
  • 44. The picture can't be displayed. Cyber Hygiene Secure Infrastructure StorageNetwork ComputeDevicesUsers Integrated Ecosystem Transforming Cyber Security 44
  • 45. Secure Infrastructure StorageNetwork ComputeDevicesUsers Integrated Ecosystem Cyber Hygiene Cyber Hygiene In a Mobile and Cloud World CONFIDENTIAL 45
  • 47. 47 • Highly complex and noisy • Exposed, i.e., untrusted monitoring, limited context • Manual and lacking orchestration From our current model Focused on malicious behavior
  • 48. 48 To a new model Focused on good (intended) behavior • Simpler and smaller problem set • Better signal to noise ratio • Actionable and behavior-based alerts and responses
  • 49. Attack Vectors Break the Kill Chain with Least Privilege 49 Propagation Extraction Application Network Data Plane ExfiltrationInfiltration
  • 52. Micro-Segmentation – Least Privilege for Network DB WEB APP APP APP 52
  • 53. Micro-Segmentation – Least Privilege for Network DB WEB APP APP APP 53
  • 54. Micro-Segmentation – Least Privilege for Network FW FW DB WEB APP APP APP Integrated Ecosystem 54
  • 56. What About Exposure from the Physical Underlay? Listening Inserting DB WEB APP APP APP 56
  • 57. You Can Solve that with Encryption …. But that turns out to be enormously complex DB WEB APP APP APP 57
  • 58. You Can Solve that with Encryption …. But that turns out to be enormously complex DB WEB APP APP APP 58
  • 59. Distributed Encryption – Least Privilege of Data DB WEB APP APP APP 59
  • 61. The Application as a System of Components Processes Security Agents / Monitoring OS Inbound Communications Outbound Communications Processes Security Agents / Monitoring OS Inbound Communications Outbound Communications Processes Security Agents / Monitoring OS Inbound Communications Outbound Communications DB WEB APP APP APP 61
  • 62. Least Privilege for the Application Layer Intentional State Remediation Untrusted Zone (Guest) Processes Security Agents / Monitoring OS Inbound Communications Outbound Communications Trusted Zone (Virtualization) Runtime Attestation Secure Context Store 62 CAPTURE DETECT RESPOND
  • 64. IoT Security Threats 64 IoT Platform (On-Prem, Private or Public Cloud) Business AppsThings Edge Destroy Sensor Malicious Command )))) )) Insert Fake Data Eavesdropping 64 Issues: • Scale • Complexity • Non-traditional computers • Non-standard devices • Variety of compute power • Extreme heterogeneity
  • 65. IoT Secure 3-Tier Architecture 65 IoT Platform (On-Prem, Private or Public Cloud) Business Apps • Data Orchestrator • Data Platform • Device Management • Platform Apps • Operational Analysis Things Edge SimpleConnection Three-Tier Architecture • Things Access • Edge Gateway • Gateway Agent • Edge Apps • Liota • Operational Analysis EDGE SYSTEMS ANALYTICS 65
  • 66. Insert Security Everywhere 66 Visibility Policy Service Insertion Context Ubiquitous Security Layer
  • 67. Automation Least Privilege Context An Architecture to Transform Cyber Security As We Know It Ubiquitous Security Layer 67
  • 68. © 2017 VMware Inc. All rights reserved. Grazie! Come sviluppare un approccio strategico alla cyber security nell'era del mobile-cloud e degli oggetti interconnessi Difendere tutto... difendere niente! VMUG Italia Meeting – Lecce – 5 aprile 2018 Rodolfo Rotondo Senior Business Solution Strategist | Advisory Services | SEMEA @RodolfoRotondo