26
Copyright © 2018 Forcepoint. | 1 2018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018 Human Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC [email protected]

Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC [email protected] 2018 臺灣資安大會TAIWAN

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 12018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

Human Centric SecurityRisk Adaptive Protection by User and Data Analytics

WILLIAM TAM

Director of Sales Engineering

Forcepoint LLC

[email protected]

Page 2: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 22018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

WHO WE ARE

INSIDER THREAT,

CROSS DOMAIN

WEB, EMAIL, DLP NGFW CASB UEBA

Page 3: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 32018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

HOW DO YOU SECURE A WORLD WHERE YOU OPERATE ON THE INTERNET BUT DON’T OWN THE INTERNET

Internet

Your Corporate Network

Employees

Suppliers

Partners

Customers

Page 4: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 42018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

Customers

Internet

Your Corporate Network

Employees

Suppliers

Partners

HOW DO YOU SECURE A WORLD WHERE YOU OPERATE ON THE INTERNET BUT DON’T OWN THE INTERNET?

Siloed Security Solutions A patchwork of offerings that create unintended gaps

Signals Become NoiseAn overload of events

Disparate Compliance Regulations Things just got a lot more complicated

Continuously Expanding Attack SurfaceDo you know where all your data lives?

Lack of VisibilityYou cannot secure what you cannot see

Disjointed Security PolicyFrom one perimeter to defend to many

Page 5: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 52018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

WHY TRADITIONAL CYBER FAILS IN NEW IT ENVIRONMENTNOT BUILT FOR VIRTUALIZED, DISTRIBUTED CLOUD OPERATING ENVIRONMENTS

1990-2010 2010 – Today Today’s (and Tomorrow’s) IT Reality

Perimeter

Employees

N

S

Security vendors focus

on monitoring north-south

network traffic and aim to

block suspicious traffic

Perimeter

E W

N

S

The perimeter is increasingly

penetrated by hackers

CIOs focus on east-west traffic to

block lateral movement

Employees

Traffic is now multi-directional across internal and external

clouds, suppliers, mobile employees and customers

CIOs lack visibility and control. Very difficult to understand

threats and how to block them

A new approach is needed

Employees

Page 6: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 62018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

Internet

Your Corporate Network

Employees

Data Center

Suppliers

Customers

Partners

FOCUS ON MANAGING PEOPLE AND DATA

Page 7: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 72018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

PEOPLE DATANETWORKS

Internet

FOCUS ON MANAGING PEOPLE AND DATA

Page 8: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 82018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

CHASING DATA WITHOUT UNDERSTANDING THE USER

Data at Rest

Data in Use

Data in Motion

Page 9: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 92018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

USER BEHAVIOR WITHOUT CONTEXT

PEOPLE

Page 10: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 102018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

WHY CONTEXT MATTERSU

ser

and E

ntity

Beha

vio

r

ThreatGood

Threat Determination

Lack Of Context

Not

Sure

What ?

Page 11: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 112018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

A NEW APPROACH NEEDED: HUMAN-CENTRIC SECURITY

Safeguards for users to be

productive on any device while

shielding corporations from risk

Deep insight into user behavior

and cloud application usage to

assess & control risk

ENABLING USERSVISIBILITY & CONTROL

Advanced real-time protection

to ensure data is not

compromised

PROTECTING VITAL DATA

the rhythm of your people the flow of your dataHuman Centric

Security

Page 12: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 122018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

THE HUMAN POINT SYSTEM

ANALYTICS MANAGEMENT ORCHESTRATION

THE FLOW

OF DATA

THE RHYTHM

OF PEOPLE

Forcepoint

UEBA

Forcepoint

NGFW

Forcepoint

Insider Threat

Forcepoint

Web & Email

Security

Forcepoint

Data Guard

Forcepoint

DLP

Forcepoint

CASB

Best in class capabilities in every category

Any module can be your starting point

Integrates together as a system with unified management and policy

Works with customer existing environment

Page 13: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 132018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

THE HUMAN POINT SYSTEM

Forcepoint

UEBA

Forcepoint

NGFW

Forcepoint

Insider Threat

Forcepoint

Web & Email

Security

Forcepoint

Data Guard

Forcepoint

DLP

Forcepoint

CASB

100x reduction in

malware incidents when

deploying Forcepoint.1

Eliminates costly and time-consuming

manual data transfers of highly-

regulated, sensitive data.

Cuts network expenses by 50%, reduces

cyberattacks by up to 86%, slashes

incident response time as much as 73%.

Broadest cloud application support with unique

customized risk assessment based on user

behavior and data access classification.

The most comprehensive

understanding of user intent,

trusted on over 1M endpoints.

Gartner Magic Quadrant

Leader in Enterprise DLP

9 consecutive times.

The leader in actionable

insights based on

risk-adaptive scoring.

Page 14: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

start with

Forcepoint DLP Forcepoint UEBA

add

+

USE CASE

1

IDENTIFY RISKY INSIDER BEFORE DATA EXFILTRATION HAPPEN

ENFORCE POLICIES TO PREVENT DATA LOSS

Forcepoint

NGFW

Forcepoint

Insider Threat

Forcepoint

Web/Email

Security

Forcepoint

Data Guard

Forcepoint

UEBA

Forcepoint

UEBA

Forcepoint

CASB

Forcepoint

DLP

Forcepoint

UEBA

Page 15: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 152018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

MAP, MANAGE & CONTROL

PERSONAL DATA FLOWS

THE FLOW OF YOUR DATA : DATA MOVEMENT BY FORCEPOINT DLP

DLP: Network, Endpoint

Web & Email Security modules

DLP: Discover,

Cloud, Endpoint

INVENTORY

PERSONAL DATA

Page 16: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 162018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

THE RHYTHM OF YOUR PEOPLE - USER BEHAVIOR ANALYTICS

Page 17: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 172018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

HUMAN CENTRIC SECURITY IN ACTION

Risk Adaptive

Protection

Page 18: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 182018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

Protect Data & Assets Adaptively by Understanding Risk to the Business

Forcepoint Unified EndpointReal-Time Policy

Enforcement

HighRisk Group

Policy: observe Kate’s every user & machine detail and block all data transfers or copies anywhere

LowRisk Group

Policy: encrypt fingerprinted files to USB drives but allow others to be copied.

Medium Risk Group

Policy: observe Kate much more closely with video from local cache.

Act

ion

s va

ry b

ased

on

th

e ri

sk le

vel o

f ac

tors

& v

alu

e o

f d

ata

Intellectual Property

SECRET

Kate hordes SECRET files slowly in various places and attempts to copy to Google drive

The Analytics Platform will aggressively increase Kate C’s risk score when she accesses SECRET fingerprinted files & classified data.

Kate begins to copy files to her local machine at off hours.

The Analytics Platform will determine Kate C’s risk score by user anomalies.

HUMAN CENTRIC SECURITY IN ACTION : RISK ADAPTIVE PROTECTION

Page 19: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 192018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

DLP TODAY: APPLYING ACTIONS TO POLICY RULES

Action plan (response) is applied based on sensitive

data matches

Incident severity is based on sensitive data matches

Page 20: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 202018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

DLP RAP : APPLYING ACTIONS TO POLICY RULES

Action plan (response) is applied based on user risk

level (1 – 5)

Incident severity is based on sensitive data matches

Applies to all DLP components: Endpoint;

Network and Cloud Apps

Page 21: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 212018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

RISK LEVEL CALCULATION BASED ON USER ACTIVITY

User risk score is calculated hourly by UEBA

Current risk levels computed by UEBA are are synced with

DLP management system

User risk level (1 - 5) is computed by UEBA

Page 22: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 222018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

UEBA: ENTITY TIMELINE1

Tier 2 analyst moves into Human Point UI to investigate

employee

Incident is escalated out-of-application (e.g., email

or chat) from Tier 1 to Tier 2 analyst

Page 23: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 232018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

ENDPOINT: RISK LEVEL 2 – POLICY ACTION ENCRYPT

Employee risk level 2. Sensitive data copied onto

USB drive

RAP applies file encryption action

Page 24: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 242018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

ENDPOINT: RISK LEVEL 3-5 – POLICY ACTION BLOCK

Employee risk level 3. Sensitive data copied onto

USB drive

RAP applies block action

Page 25: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 252018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

SE

CU

RIT

Y

EF

FE

CT

IVE

NE

SS

Data-centric Risk adaptiveThreat-centric

UEBA

Anti-Virus

Firewall

Secure Web Gateway

NGFW

Email Gateway

DLP

CASB

UEBA

Anti-Virus

Firewall

Secure Web Gateway

NGFW

Email Gateway

DLP

CASB

Source: Gartner, Cybersecurity Maturity Curve

Forcepoint

UEBA

Forcepoint

NGFW

Forcepoint

Insider

Threat

Forcepoint

Web/Email

Security

Forcepoint

Data Guard

Forcepoint

DLP

Forcepoint

CASB

THE

HUMAN POINT

SYSTEM

OUR JOURNEY TOGETHER

Page 26: Human Centric SecurityHuman Centric Security Risk Adaptive Protection by User and Data Analytics WILLIAM TAM Director of Sales Engineering Forcepoint LLC wtam@forcepoint.com 2018 臺灣資安大會TAIWAN

Copyright © 2018 Forcepoint. | 262018 臺灣資安大會TAIWAN CYBER SECURITY SUMMIT 2018

Copyright © 2018 Forcepoint. | 26

THANK YOU

[email protected]

linkedin.com/in/willitam/