Malcolm Harkins Chief Information and Security Officer General Manager Intel Information Risk and Security Lloyds 360 Risk Insight Dec 2010 Legal Notices This presentation is for informational purposes only. INTEL MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY. BunnyPeople, Celeron, Celeron Inside, Centrino, Centrino logo, Core Inside, FlashFile, i960, InstantIP, Intel, Intel logo, Intel386, Intel486, Intel740, IntelDX2, IntelDX4, IntelSX2, Intel Core, Intel Inside, Intel Inside logo, Intel. Leap ahead., Intel. Leap ahead. logo, Intel NetBurst, Intel NetMerge, Intel NetStructure, Intel SingleDriver, Intel SpeedStep, Intel StrataFlash, Intel Viiv, Intel vPro, Intel XScale, IPLink, Itanium, Itanium Inside, MCS, MMX, Oplus, OverDrive, PDCharm, Pentium, Pentium Inside, skoool, Sound Mark, The Journey Inside, VTune, Xeon, and Xeon Inside are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other names and brands may be claimed as the property of others. Copyright © 2009, Intel Corporation. All rights reserved. “The Perfect Storm” exposing Assets to a loss of Confidentiality Integrity Availability Vulnerabilities exploit increase Business Risks causing causing Threats Legislation causing Business Impacts reduce which protect against Controls which are mitigated by Which requires Identity Mgmt Assurance That increase the need for Intrusion Cycle People Adversary Hacker Group Organized Crime Cyber Militia Nation State Cyber Terrorism Spyware Spam Phishing The Web Assets Technology Tradecraft, Tools, Methods – not that different but the motivation and purpose can differ Irrefutable Laws of Information Security 1) Information wants to be free – People want to talk, post, and share *Phil Venables 2008, adapted from Scott Culp 2000, Pete Lindstrom 2008, and other sources Irrefutable Laws of Information Security 1) Information wants to be free – People want to talk, post, and share 2) Code wants to be wrong – We will never have 100% error free s/w *Phil Venables 2008, adapted from Scott Culp 2000, Pete Lindstrom 2008, and other sources Irrefutable Laws of Information Security 1) Information wants to be free – People want to talk, post, and share 2) Code wants to be wrong – We will never have 100% error free s/w 3) Services want to be on – Some background processes will need to be on *Phil Venables 2008, adapted from Scott Culp 2000, Pete Lindstrom 2008, and other sources Irrefutable Laws of Information Security 1) Information wants to be free – People want to talk, post, and share 2) Code wants to be wrong – We will never have 100% error free s/w 3) Services want to be on – Some background processes will need to be on 4) Users want to click – If they are connected to the internet, people will click on things *Phil Venables 2008, adapted from Scott Culp 2000, Pete Lindstrom 2008, and other sources Irrefutable Laws of Information Security 1) Information wants to be free – People want to talk, post, and share 2) Code wants to be wrong – We will never have 100% error free s/w 3) Services want to be on – Some background processes will need to be on 4) Users want to click – If they are connected to the internet, people will click on things 5) Even a security feature can be used for harm – Laws 2, 3, 4 even apply to security capabilities *Phil Venables 2008, adapted from Scott Culp 2000, Pete Lindstrom 2008, and other sources Irrefutable Laws of Information Security 1) Information wants to be free – People want to talk, post, and share 2) Code wants to be wrong – We will never have 100% error free s/w 3) Services want to be on – Some background processes will need to be on 4) Users want to click – If they are connected to the internet, people will click on things 5) Even a security feature can be used for harm – Laws 2, 3, 4 even apply to security capabilities Compromise is inevitable under any compute model Managing the risk and surviving is the key *Phil Venables 2008, adapted from Scott Culp 2000, Pete Lindstrom 2008, and other sources So how do you manage the risk and survive? Predict Data Enclaving Endpoint Protection Prevent Risk Based Privileges Predictive Analytics Detect Identity & Access Mgmt Central Logging Service Data Correlation/Alerting Respond Infrastructure Protection Data Protection Browser Security Training & Awareness Security Business Intelligence Granular Trust Enablement Multi-Level Trust Key Messages The world has changed, it’s no longer flat – Mobility and Collaboration is dissolving the internet border – Cloud Computing is dissolving the Data Center border – Consumerization will dissolve the enterprise border The threat landscape is growing in complexity – Targeted intrusions and attacks leveraging wide-range of vulnerabilities and growing in sophistication – Government focus growing – “Industry can’t self-regulate” The dynamic nature of the ecosystem requires a more fluid but more granular security model Security investment needs to keep pace w/changing landscape Protect, Enable, and Manage the Risk