+ All Categories
Home > Technology > Enterprise IT Security| CIO Innovation and Leadership

Enterprise IT Security| CIO Innovation and Leadership

Date post: 06-Apr-2017
Category:
Upload: redzone-technologies
View: 100 times
Download: 4 times
Share this document with a friend
122
Exponential Technologies 101 Enterprise IT Security CIO Innovation and Leadership Presenter: Bill Murphy
Transcript
Page 1: Enterprise IT Security| CIO Innovation and Leadership

Exponential Technologies 101

Enterprise IT Security

CIO Innovation and Leadership

Presenter: Bill Murphy

Page 2: Enterprise IT Security| CIO Innovation and Leadership

Exponential Technologies 101

Page 3: Enterprise IT Security| CIO Innovation and Leadership

• Artificial Intelligence (AI)• Machine Learning & Deep Learning• Robotics• Biotechnology & Bioinformatics & Digital Biology• Virtual Reality & Augmented Reality• Energy & Environmental Systems• Medicine & Neuroscience• Nanotechnology & Digital Fabrication (3D Printing)• Blockchain• Networks & Computing Systems (IT Security)

What is an Exponential Technology?

Page 4: Enterprise IT Security| CIO Innovation and Leadership
Page 5: Enterprise IT Security| CIO Innovation and Leadership
Page 6: Enterprise IT Security| CIO Innovation and Leadership
Page 7: Enterprise IT Security| CIO Innovation and Leadership

Offense and Defense

Page 8: Enterprise IT Security| CIO Innovation and Leadership

Shola – United Therapeutics

Page 9: Enterprise IT Security| CIO Innovation and Leadership

BRANDING

Shola – United Therapeutics

Page 10: Enterprise IT Security| CIO Innovation and Leadership

Exponential vs Linear

Page 11: Enterprise IT Security| CIO Innovation and Leadership
Page 12: Enterprise IT Security| CIO Innovation and Leadership
Page 13: Enterprise IT Security| CIO Innovation and Leadership
Page 14: Enterprise IT Security| CIO Innovation and Leadership
Page 15: Enterprise IT Security| CIO Innovation and Leadership

15

4DS OF EXPONENTIALS

DECEPTIVETO

DISRUPTIVE

D I G I T I Z E D E M AT E R I A L I Z E D E M O N E T I Z E D E M O C R AT I Z E

Disruptive Stress /Opportunity

Page 16: Enterprise IT Security| CIO Innovation and Leadership

Awareness

Page 17: Enterprise IT Security| CIO Innovation and Leadership

Self Awareness

Page 18: Enterprise IT Security| CIO Innovation and Leadership
Page 19: Enterprise IT Security| CIO Innovation and Leadership

Examples of Disruption

Page 20: Enterprise IT Security| CIO Innovation and Leadership

Solid and Stable

Page 21: Enterprise IT Security| CIO Innovation and Leadership

Disruptive

Page 22: Enterprise IT Security| CIO Innovation and Leadership

What is a Disruptive Tech?

Page 23: Enterprise IT Security| CIO Innovation and Leadership
Page 24: Enterprise IT Security| CIO Innovation and Leadership
Page 25: Enterprise IT Security| CIO Innovation and Leadership
Page 26: Enterprise IT Security| CIO Innovation and Leadership

• Blackberry and Nokia• Tesla and Automotive

Page 27: Enterprise IT Security| CIO Innovation and Leadership
Page 28: Enterprise IT Security| CIO Innovation and Leadership

Books to Help + Resources• SU DC Chapter- singularityudc.com• Singularity University – su.org• Singularity HUB – singularityhub.com• Daniel Burrus - www.burrus.com• Exponential Organizations –

exponentialorgs.com

Page 29: Enterprise IT Security| CIO Innovation and Leadership

With all the opportunities that Exponentials bring there are Risks. Big Risks1. Governance2. Ethics3. Privacy4. Complexity

TRANSITION TO DEFENSE

Page 30: Enterprise IT Security| CIO Innovation and Leadership

DEFENSE – Enterprise IT Security

QualitativeVs

Quantitative

Page 31: Enterprise IT Security| CIO Innovation and Leadership

HealthDr Ordered - reluctantlyFood Panel – AllergyHematologyMetabolic ChemistryLipid profileHormonesUrinalysisVitamins etc

SymptomsMental FogMood VariabilityJoint Pain

Page 32: Enterprise IT Security| CIO Innovation and Leadership

Frontiers of Optimal Performance &Human Potential

• Firewalking 7x• Active Spartan race training• Cold water immersion via

Wim Hof• Blackbelt• Survival School• Kiting and windsurfing

• Coaching Travel Soccer• IronMan x2• 2 x ½ IronMans• Meditation/Mindfulness

(MBSR, Thich Nhat Han)• Personal and Team Flow

States Experiments (Steven Kotler)

• Innovation at the edge – Design Thinking (SU)

Page 33: Enterprise IT Security| CIO Innovation and Leadership
Page 34: Enterprise IT Security| CIO Innovation and Leadership
Page 35: Enterprise IT Security| CIO Innovation and Leadership
Page 36: Enterprise IT Security| CIO Innovation and Leadership

2015

Page 37: Enterprise IT Security| CIO Innovation and Leadership
Page 38: Enterprise IT Security| CIO Innovation and Leadership
Page 39: Enterprise IT Security| CIO Innovation and Leadership

The Plan

• Primary Target, Time Frame, Re-test• Diet to deal with inflammation• Exercise – Mobility, Strength• Vitamins• Meds• Testing• Execution• Follow-up and Follow-Thru

Page 40: Enterprise IT Security| CIO Innovation and Leadership

Am I Done?

• You only saw a 2015 Food Allergy Panel. Where is the 2016 Comparison?

• What about the stool sample?• Year after Year. Massively Proactive.• Rinse and Repeat

Page 41: Enterprise IT Security| CIO Innovation and Leadership

So What About Enterprise IT Security?

Page 42: Enterprise IT Security| CIO Innovation and Leadership

Back ToQualitative and Quantitative

• Marry Qualitative and Quantitative• Evidence Based• Building Defensible Arguments/Plans

Page 43: Enterprise IT Security| CIO Innovation and Leadership
Page 44: Enterprise IT Security| CIO Innovation and Leadership
Page 45: Enterprise IT Security| CIO Innovation and Leadership
Page 47: Enterprise IT Security| CIO Innovation and Leadership
Page 48: Enterprise IT Security| CIO Innovation and Leadership

COMPREHENSIVE IT SECURITY HEALTH PANEL

Page 49: Enterprise IT Security| CIO Innovation and Leadership
Page 51: Enterprise IT Security| CIO Innovation and Leadership

Second Priority

Page 52: Enterprise IT Security| CIO Innovation and Leadership

COMPREHENSIVE IT SECURITY HEALTH PANEL

(1)External Facing Systems(2)Firewall Internal Systems (systems used by employees, mail services, activesync, vpn, etc.)(3) Do your company PCs have an anti-virus program?

Page 53: Enterprise IT Security| CIO Innovation and Leadership

EXECUTION PLAN – IT ROADMAP - PRIORITIZATION

Page 54: Enterprise IT Security| CIO Innovation and Leadership
Page 55: Enterprise IT Security| CIO Innovation and Leadership

Year Over Year Comparison

When you spend a $ What boats are effected?

Page 56: Enterprise IT Security| CIO Innovation and Leadership

External Facing Systems (systems used by external public/customers)– Do you have an up to date list of all systems presented to the public or customers

including services in use?• How many are there? (answer the next set by # based on yes count)

– Are the front end user interfaces behind an application filter security device with active blocking capability beyond layer ¾ firewall?

– Does the application filter block all high risk issue?– Does the application filter block all medium risk issues?– Do you have any exceptions for sites or subsites on the application filter?– Does this system terminate ssl or encryption?– Is the application or db tier in a different zone/subnet/across a security boundary?– Is the communication between the front end and the next tier unencrypted so the

security systems can review cross tier traffic?– Do you formally audit to ensure that these settings are active and working:

• Monthly• Quarterly• Yearly

Page 57: Enterprise IT Security| CIO Innovation and Leadership

• Firewall Internal Systems (systems used by employees, mail services, activesync, vpn, etc.)– Are all non-security devices behind a firewall?– Is the firewall a full UTM with services active and in automated blocking

mode for high risk items?– Is the firewall a full UTM with services active and in automated blocking

mode for medium risk items?– Are all inbound rules configured explicit in at least two of the following:

source, destination and protocol.– Do you formally audit to ensure that these settings are active and

working:• Monthly• Quarterly• Yearly

Page 58: Enterprise IT Security| CIO Innovation and Leadership

Anti-Virus PC – Do your company PCs have an anti-virus program?– How often are definitions updated?

• Multiple times a day• Daily• Weekly or more

– Do you run centrally managed antivirus?– Are alerts for viruses, service failures, and update problem sent to staff?– Do you exclude any pc from AV?– What percent of systems are covered (I.e. do you skip Macs, Linux etc)– How often do you check for gaps in coverage

• Weekly• Monthly• Quarterly

– How often do you audit scanning exclusions for files and processes?• Quarterly• Twice a year• Yearly

– Is there an approval process prior to allowing exclusions?

Page 59: Enterprise IT Security| CIO Innovation and Leadership

• Email Encryption and DLP– Do you have a system that automatically audits mail messages for context

driven content (PII, PCI, Confidential, etc)– Do you formally audit to ensure that the system is are active and working:

• Monthly• Quarterly• Yearly

– Can anyone opt out of the system?– Does the system encrypt, reject, or redact ALL emails that fail the

automatic audit?– Does the system allow external parties to initiate and reply in an

encrypted fashion?– Do you formally audit to ensure that the policies used and look for gaps?

• Monthly• Quarterly• Yearly

Page 60: Enterprise IT Security| CIO Innovation and Leadership

My Vision for You is to Reign in Complexity

But this is only a Blood Panel……What do you do about it?

Page 61: Enterprise IT Security| CIO Innovation and Leadership

Overall Gaps

• Based on the review a lot of good mature security technologies exist however the following is required:– Additional implementation work is required to realize

the full impact of the solution– Review system X to ensure intended use is in line with

current state of the system. Currently this is not the case

– A proactive process of managing security systems A, B and C need to be developed in order to ensure security

Page 62: Enterprise IT Security| CIO Innovation and Leadership

Action Plan Step 1

• Concentrate on validating and hardening what is in place– Perform an user account audit– Perform an edge security audit– Enable Varonis to provide proactive security– Enable Secret Server to harden the environment

Page 63: Enterprise IT Security| CIO Innovation and Leadership

Action Plan Step 2

• Two technologies that can be added to bolster security, especially if HIPAA compliance is desired– Endpoint security for USB device security– ZixGateway for Email Encrytion and DLP

Page 64: Enterprise IT Security| CIO Innovation and Leadership

Sample Deliverables• Varonis Data Governance

(steps needed to complete the install)

• Thycotic Gap Comparison• Edge Assessment +• AD /Account Audit • Road Map – with Priority

Data Gov Eg

Thycotic Eg

Edge AD Account

Roadmap

Page 65: Enterprise IT Security| CIO Innovation and Leadership

Audit/Compliance

Regulators/Regulations

FFIEC, PCI, DoD,HIPPA, etc

Standards

Staff

Gartner

Vendors

Consultants

Business Framework

ExO CIO Business IT Framework

Page 66: Enterprise IT Security| CIO Innovation and Leadership

Framework

• What happens when you lose your CFO or Accounting Manager?

Versus

• What happens when you lose your CIO, CISO, VP IT, Manager IT, etc

Page 67: Enterprise IT Security| CIO Innovation and Leadership

Common Language of Business

• Debits and Credits• Income Statement and Balance Sheet• P&L

Page 68: Enterprise IT Security| CIO Innovation and Leadership

Align Proper Business Expectations

Does your VP of Sales guarantee revenue?Where in your business do you have guarantees?

Page 69: Enterprise IT Security| CIO Innovation and Leadership

Premiums to Mitigate Risk

Page 70: Enterprise IT Security| CIO Innovation and Leadership

The Role of Transparency

Page 71: Enterprise IT Security| CIO Innovation and Leadership

• Defensible• Logical

Page 72: Enterprise IT Security| CIO Innovation and Leadership

Powerful Leadership

Page 73: Enterprise IT Security| CIO Innovation and Leadership

Governance (Governing) and Risk

Page 74: Enterprise IT Security| CIO Innovation and Leadership
Page 75: Enterprise IT Security| CIO Innovation and Leadership
Page 76: Enterprise IT Security| CIO Innovation and Leadership

Forget Big Data – Think Little Data…..

With Context

Page 77: Enterprise IT Security| CIO Innovation and Leadership
Page 78: Enterprise IT Security| CIO Innovation and Leadership

Thunder & House & Squirrel

Page 79: Enterprise IT Security| CIO Innovation and Leadership

DAR Scan – Data at Rest Scan

Being GovernedVS

The Governor

Page 80: Enterprise IT Security| CIO Innovation and Leadership

How Data is lost?

Employee post to share drive Employee shares with vendor Employee theft Employee accident Malware/Virus Social Media Hacking attack (Spear Fishing) Social Engineering USB

Page 81: Enterprise IT Security| CIO Innovation and Leadership

Incidents by File Type Policy File Type Hits Number of Files

Customer List Adobe PDF 1846 90 Customer List Email Message File (MIME, EML) 1071 43 Customer List HTML 311 16 Customer List Microsoft Excel 73842 360 Customer List Microsoft PowerPoint 125 6 Customer List Microsoft Word 1258 34 Customer List Plain Text 7539 55 D_CCN (pattern) Adobe PDF 479 3 D_CCN (pattern) Microsoft Excel 146 144 D_CCN (pattern) Plain Text 1442 5 D_SSN (pattern) Adobe PDF 2264 7 D_SSN (pattern) Microsoft Excel 180 93 D_SSN (pattern) Microsoft PowerPoint 2 1 D_SSN (pattern) Microsoft Word 1 2 D_SSN (pattern) Other Word Processors 1 1 D_SSN (pattern) Plain Text 63 3

Example of Incidents

Page 82: Enterprise IT Security| CIO Innovation and Leadership

Example of IncidentsIncidents Made in the last 90 Days

File Creation Time File_Share Policy Hits Number of Files

7/28/2012 1:12:00 AM

BadFileServer\\customers\\BIGEFCU\\Audit Customer List 14 1

8/3/2012 2:43:00 PM BadFileServer\\customers\\NurseFirst Cor Customer List 87 1 8/29/2012 11:35:00

PM BadFileServer\\customers\\UniversityFCU\ Customer List 92 3

9/11/2012 11:44:00 PM

BadFileServer\\marketing\\Partners\\Blue Customer List 35 1

9/6/2012 11:49:00 PM

BadFileServer\\marketing\\Partners\\GTB D_SSN (pattern)

1 1

9/6/2012 11:50:00 PM

BadFileServer\\BLD \\_BLD_Reports \\XYZ\\C D_CCN (pattern)

239 1

9/6/2012 11:50:00 PM

BadFileServer\\BLD \\_BLD_Reports \\XYZ\\C D_SSN (pattern)

381 1

10/4/2012 5:55:00 PM

BadFileServer\\BLD \\_BLD_Reports \\XYZ\\C D_SSN (pattern)

500 1

10/4/2012 11:41:00 PM

BadFileServer\\BLD \\_BLD_Reports \\XYZ\\C D_SSN (pattern)

500 1

9/6/2012 11:50:00 PM

BadFileServer\\MKT\\_MKT_Reports\\XYZ\\S Customer List 16 1

10/2/2012 11:48:00 PM

BadFileServer\\MKT\\_MKT_Reports\\XYZ\\S Customer List 17 1

8/9/2012 11:45:00 PM

BadFileServer\\MKT\\MKT Customers\\123 F Customer List 38 1

9/6/2012 11:51:00 PM

BadFileServer\\MKT\\MKT Customers\\123 F Customer List 74 1

Page 83: Enterprise IT Security| CIO Innovation and Leadership

Example of Incidents

Full Incident Report

File_Share Policy Incidents Files File Path

BadFileServer \\ operations \\Docs \

D_SSN (pattern)

AprilMainZix.xlsx BadFileServer \\ operations \\

Docs\\ Documents.bak \\ ZixMain\\ 2010

BadFileServer \\ marketing \\CIOES

D_SSN (pattern)

Sales_OldStuff.zip/Golf Outing_June27.doc

BadFileServer \\ marketing \\ CIOES

BadFileServer \\ marketing \\CIOES

Customer List

Sales_OldStuff.zip/VMware Attendance List

CIOES.xls

BadFileServer \\ marketing \\ CIOES

BadFileServer \\ marketing \\CIOES

Customer List

Sales_OldStuff.zip/Sept Sales email blast.doc

BadFileServer \\ marketing \\ CIOES

BadFileServer \\ marketing \\CIOES

Customer List

Sales_OldStuff.zip/Rockville List from Vania

March 02.xls

BadFileServer \\ marketing \\ CIOES

Page 84: Enterprise IT Security| CIO Innovation and Leadership

Example of IncidentsIncidents by File Share

File_Share Policy Incidents Files

BadFileServer\\accounting Customer List 144 1 BadFileServer\\accounting\\Archive D_CCN (pattern) 139 139 BadFileServer\\accounting\\Archive D_SSN (pattern) 170 85 BadFileServer\\accounting\\Archive\\2005 D_SSN (pattern) 5 1 BadFileServer\\accounting\\Const_Assoc \ Customer List 288 18 BadFileServer\\accounting\\Sherrie Customer List 1000 1 BadFileServer\\accounting\\Sherrie D_SSN (pattern) 1 1 BadFileServer\\customers\\_InActive_Clie Customer List 276 13 BadFileServer\\customers\\_InActive_Clie D_CCN (pattern) 1 1 BadFileServer\\customers\\123FCU\\contra Customer List 70 4 BadFileServer\\customers\\ABC \\_Network_ Customer List 12 1 BadFileServer\\customers\\ABC \\Assessmen Customer List 60 2 BadFileServer\\customers\\Alpha Systems Customer List 15 1 BadFileServer\\customers\\XYZ\\SSL_VPN Customer List 12 1 BadFileServer\\customers\\StateDep \\ Statu Customer List 237 1

Page 85: Enterprise IT Security| CIO Innovation and Leadership

HIPPA/HIPAA, NIST/DOD since we are a downstream contractor, NCUA, PCI, SOC

compliance

Page 86: Enterprise IT Security| CIO Innovation and Leadership

Technical Framework

Page 87: Enterprise IT Security| CIO Innovation and Leadership
Page 88: Enterprise IT Security| CIO Innovation and Leadership

OFFENSE

• Study top Disruptors in your field

Page 89: Enterprise IT Security| CIO Innovation and Leadership

Exponential Technologies

• IT Security and Networks• Robotics• Artificial Intelligence• Virtual Reality/ Augmented

Reality• Deep Learning & Machine

Learning• Neuroscience• Biomedicine & Digital

Biology

• Energy and Environmental Systems

• Blockchain• 3D Manufacturing

Printing• IT Security and

Networks• Nanotechnology• IoT and Big Data• Algorithms & APIs

Page 90: Enterprise IT Security| CIO Innovation and Leadership
Page 91: Enterprise IT Security| CIO Innovation and Leadership
Page 92: Enterprise IT Security| CIO Innovation and Leadership

Exponentials in the Health Field

Page 93: Enterprise IT Security| CIO Innovation and Leadership
Page 94: Enterprise IT Security| CIO Innovation and Leadership

Pay Attention to Blockchain

Page 95: Enterprise IT Security| CIO Innovation and Leadership
Page 96: Enterprise IT Security| CIO Innovation and Leadership
Page 97: Enterprise IT Security| CIO Innovation and Leadership
Page 98: Enterprise IT Security| CIO Innovation and Leadership
Page 99: Enterprise IT Security| CIO Innovation and Leadership
Page 100: Enterprise IT Security| CIO Innovation and Leadership

“The Smartest People in the WorldDon’t Work for You”

Page 101: Enterprise IT Security| CIO Innovation and Leadership

Measure Your Organizational Readiness to Innovate

• Visualize this • Are you leaning into disruption or playing

afraid

10

5

1

Page 102: Enterprise IT Security| CIO Innovation and Leadership

Software is Eating the World

Quote “Everything that Humans are Inefficient at will be eaten by Software.”

Page 103: Enterprise IT Security| CIO Innovation and Leadership

APIs & Algorithms

NIH – Gut Health - Microbiome

Page 104: Enterprise IT Security| CIO Innovation and Leadership

Micro- Experiments

• NIH data sets – Gut Health example• Fail fast and forward• Push projects to the edge. Starve the edge.

Page 105: Enterprise IT Security| CIO Innovation and Leadership

• Start small with innovation pockets/ Labs• Apply Design Thinking & Lean Startup

Mentality• Align with people who have entrepreneurial

tendencies within the company• Principle of Innovation at the edge of the

company

Page 106: Enterprise IT Security| CIO Innovation and Leadership

Staffing to Build Expertise

Page 107: Enterprise IT Security| CIO Innovation and Leadership

Community and Crowds

Page 108: Enterprise IT Security| CIO Innovation and Leadership

Bigger Thinking - Exponential

World Wide Expansion

Page 109: Enterprise IT Security| CIO Innovation and Leadership

MTP – Massive Transformational Purpose

Page 110: Enterprise IT Security| CIO Innovation and Leadership

• Identify and avoid corporate anti-bodies• Pay attention to when you disbelieve to avoid

being disrupted during the curve when the technology seems odd or weird

What to Avoid

Page 111: Enterprise IT Security| CIO Innovation and Leadership
Page 112: Enterprise IT Security| CIO Innovation and Leadership
Page 113: Enterprise IT Security| CIO Innovation and Leadership

Summary – Offense Take-aways• Learn to play offense - Join an innovation group like mine or

someone else's• Be surrounded by ideas and people who think similar• You are the average of the 5 people you hang around• Build systems at the edge• Avoid corp anti-bodies• Pay attention to Lean and Design Thinking as it applies to

innovation (Joy, Inc, Exponential Org)• Forget Big Data – Think Little Data• Understand who your disruptors are? Technologies in Health?

Disruptive business practices, Communities, blockchain, algorithms, & APIs

Page 114: Enterprise IT Security| CIO Innovation and Leadership

Offense Take-aways

• You don’t need permission to add revenue….• Are you retiring in the next 5 years?• It is a mindset first (for you) then a culture thing• Neuroscience The Brain of a Leader thinking

Exponentially • IoT & Dashboards• Remember - role of offense and defense • Financial Statements of the business – Point in Time

versus Progress over Time.

Page 115: Enterprise IT Security| CIO Innovation and Leadership

Defense Take-aways

• Play defense hard. Don’t play ping pong. Settle into strategy and risk. Which will drive all tactical execution.

• Embrace IT Security complexity with strategy. Eliminate overlapping technology confusion. Data Governance, privacy, risk – understand context.

• Flush out unnecessary costs• Create Defensible Arguments/Plans• Forget Big Data – Think Little Data• Take a multi-year approach

Page 116: Enterprise IT Security| CIO Innovation and Leadership

Bill’s BIO & How to Contact Me?

Page 117: Enterprise IT Security| CIO Innovation and Leadership
Page 118: Enterprise IT Security| CIO Innovation and Leadership

World Class IT Security, Strategic and Tactical Thought Leadership for EnterpriseIT Business Leaders, Intra-preneurs, Entrepreneurs, Innovation, Design

Thinking, Creativity, Frontiers of Human Performance, Breakthroughs in Neuroscience, & Exponential Technologies

Page 119: Enterprise IT Security| CIO Innovation and Leadership

CIO Security Scoreboard

Page 120: Enterprise IT Security| CIO Innovation and Leadership

CIO Innovation InsiderGroup Meetings

Insider Updates Weekly Report

Page 121: Enterprise IT Security| CIO Innovation and Leadership

Singularity UniversityWashington DC Chapter

Ambassador

Examines Disruptive and Exponential Technologies

By looking at how they can be used to Improve the lives of a billion of People”


Recommended