SlideShare ist ein Scribd-Unternehmen logo
1 von 31
LEADINGTHEWAY 2019
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
PCM SECURITY
NEXT GEN –
EVERYTHING!
INTERNAL USE ONLY – DO NOT DISTRIBUTE
v
GARY MIGLICCO
SVP of Security, PCM Inc.
LEADINGTHEWAY 2019
INTERNAL USE ONLY – DO NOT DISTRIBUTE
 27% Threats from Cloud
Employees accessing cloud create high risk
 8-10% of Spam is Malicious
Spam makes up 66% of all email traffic
 Sophisticated Attacks Increasing
Ransomware Wanacry, Petya, Blueborne
increased sophistication
2018 CYBER SECURITY
Next Gen – Expanding Threat MatrixLEADINGTHEWAY 2019
INTERNAL USE ONLY – DO NOT DISTRIBUTE
 25% Traffic Avoiding Perimeter
Data Center penetration through 3rd
Parties, Printers, IOT devices, Mobile
devices
 60% of Traffic Encrypted
SSL encrypted traffic passes through
legacy defenses
 200,000 New Malware Daily
Zero day malware growing geometrically
2018 CYBER SECURITY
Next Gen – Expanding Threat MatrixLEADINGTHEWAY 2019
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019 NEXT GEN - BREACHES
Hackers gained access tokens
Facebook users:
• Vulnerability: Facebook
Developer APIs bugs
• Total users effected: 30 million
FACEBOOK- SEPT
An unauthorized party acquired the
information of users of UA’s
MyFitnessPal app:
• Vulnerability: Weak encryption
• Total users effected: 150 million
UNDER ARMOUR - MARCH EXACTIS - JUNE
Exactis left a database containing 340
million individual records unprotected
on the web:
• Vulnerability: Unsecured Database
- Misconfigurations
• Total users effected: 340 million
records exposed (2 Terabytes of
information)
BRITISH AIRWAYS - SEP
Hackers breached the mobile app and
website:
• Attack Vector: Digital Skimmers –
script injection
• Total users effected: 380,000
U.S. UNIVERSITIES -MARCH
9 Iranian hackers indicated for a series
of attacks on more than 300
universities:
• Attack Vector: Phishing emails
• Total users effected: Estimated $3
billion worth of intellectual
property
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019 NEXT GEN – TECHNOLOGIES
DECEPTION TECHNOLOGIES
Deception technologies become the
security enablers of IoT and OT.
AI, ML & DEEP LEARNING
Algorithms can learn from past events in
order to help predict and identify
vulnerabilities within a software system.
ZERO TRUST SECURITY
Increasingly sophisticated cyberattacks are
forcing organizations to turn to the zero trust
security model.
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
Imbedding security through Security Software Development Lifecycle Best Practices will
receive more attention as software complexity grows.
NEXT GEN – SECURITY SDLC
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
IT User
Cloud/On-Prem Hybrid
Operations
SaaS
Remote Users
Cloud Operations
NEXT GEN – CLOUD SECURITY
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019 CLOUD SHARED SECURITY
RESPONSIBILITY
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
NEXT GEN - ZERO TRUST
Traffic is routed into ”Zero Trust
Cloud” architecture, where
appropriate enforcement of Zero
Trust Policy is enforced based on
user, application and data types.
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
ALWAYS ON. ALWAYS
SECURE.
 Lack of security resources across the
industry
 Need for additional services extended
through the life of the incident.
 Automated Response
 Incident Response Management
 Device Management
 Governance Monitoring and Management
 Dark Web Monitoring
 Malware Threat Hunting
Will continue to be bundled and expand with
changing cyber security environment
MANAGED SECURITY SERVICES MODEL
REAL-TIME THREAT MONITORING
Basic Services
1
Governance Management
PLUS
Device Management
2
Vulnerability Scans
PLUS
PLUS
Incident Response
PLUS
Dark Web Monitoring
NEXT GEN - MANAGED SECURITY
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019 NEXT GEN - REGULATIONS
ENFORCEMENT EFFECTIVE JULY 1, 2020
UNIVERSE OF COVERAGE
 Businesses with $25 million in annual revenue, or
 Trade in data of 50,000 or more persons, or
 50%+ of revenue from selling consumers’ personal
information
TIGHTER PRIVACY DATA CONTROL
 Includes biometric data, internet activity, consumer profiles
 Covers unique identifiers such as IP address, mobile device
identifiers
 Applies to current and future data
PERSONAL INFORMATION DEFINED
Encompasses any information that “identifies, relates to,
describes, is capable of being associated/linked directly or
indirectly with a particular consumer or household”
 Signed June 2018, amended August 2018,
 Law becomes operative January 2020,
 Enforcement action commencing July 2020
PROVISIONS
 Right to Know – within 45 days of the request + 1
extension
 Right to Access – implied duty to preserve (last 12
months)
 Right to Opt Out – clear and conspicuous links
DATA BREACH NOTIFICATION
 Notification within 15 days to reduce
liability and business losses
ENFORCEMENT
 Damages $100 to $750 per person-incident
 Up to $2,500 per person-incident
 Up to $7,500 per person-incident if intentionally
not curing the issue
CA CONSUMER PRIVACY ACT 2018
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019
Provides Legal Defense to Data Breach
Requires Written Security Program
Allows Choice of Appropriate Industry Framework
Does Not Mandate Controls or Punish Non-Compliance
Must Show Administrative, Technical, and Physical Controls around Personal Information
Must Also Show Compliance with Sector-Specific Requirements such as PCI or HIPAA
In Effect Friday November 2, 2018
Compliance Achieves Safe Harbor
NEXT GEN – REGULATIONS ENVIRONMENT
Ohio Cybersecurity Law
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019
NETWORK
DATA CENTERVIRTUAL
ENVIRONMENT
VS
VS
VS
VS
VS
VS
Network
Server Storage
Desktop Servers
Trusted 3rd
Parties
Mobile
Email
Internet
Employees
Off Network
Cloud
Branch Ops
NEXT GEN – EXPANDING THREAT HORIZON
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019
NEXT GEN – EVERYTHING!
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019
NETWORK
DATA CENTERVIRTUAL
ENVIRONMENT
VS
VS
VS
VS
VS
VS
Network
Server Storage
Desktop Servers
Trusted 3rd
Parties
Mobile
Email
Internet
Employees
Off Network
Cloud
Branch Ops
NEXT GEN –
INTEGRATEDSECURITY
eMail Endpoint
Firewall
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019
NETWORK
DATA CENTERVIRTUAL
ENVIRONMENT
VS
VS
VS
VS
VS
VS
Network
Server Storage
Desktop Servers
Trusted 3rd
Parties
Mobile
Email
Internet
Employees
Off Network
Cloud
Branch Ops
Firewall
eMail Endpoint
Mobile
Network
Cloud
THREAT
INTELLIGENCE
SECURITY
ANALYTICS
NEXT GEN –
INTEGRATEDSECURITY
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019
NETWORK
DATA CENTERVIRTUAL
ENVIRONMENT
VS
VS
VS
VS
VS
VS
Network
Server Storage
Desktop Servers
Trusted 3rd
Parties
Mobile
Email
Internet
Employees
Off Network
Cloud
Branch Ops
Firewall
eMail Endpoint
Mobile
Network
Cloud
THREAT
INTELLIGENCE
SECURITY
ANALYTICS
IAM
SIEM
DNS
ENCRYPTION
DATA APPS
& STORAGEAutomated
Response
NEXT GEN –
INTEGRATEDPLATFORMS
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
PCM SECURITY
YOUR SECURITY
SYSTEMS INTEGRATOR
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019
HEALTHCARE RETAIL FINANCIAL SERVICES ENTERTAINMENT
PCM CUSTOMER FOCUS
Vertical Market Solutions
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
PCM SECURITY
TEAM
SECURITY
INTEGRATION
SECURITY
CONSULTING
SECURITY
VENDOR
INTELLIGENCE
CLIENT
ADVISORY
SUPPORT
BUILDING THE SECURITY INDUSTRY’S
TOP TEAM
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019
Security Incident Services
Security Integration Services
Security Vendor Intelligence
Multi-Discipline Security Systems Integrator
AREA SECURITY MANAGERS
SOLUTIONS & SERVICES
SECURITY
ARCHITECTS
SOLUTIONS
AREA DIRECTORS
SECURITY
CONSULTING
Client Area Support
SECURITY CLIENT SUPPORT
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
WE WORK WITH THE TOP SECURITY VENDORS IN THE INDUSTRY
PERIMETER SECURITY – Cisco Security, Palo Alto,
Fortinet, Check Point, Barracuda, Sonic Walls
ENDPOINT SECURITY – Symantec, Sophos, Trend
Micro, McAfee, Cylance, Crowdstrike, Carbon Black
SECURITY INFORMATION EVENT MANAGEMENT –
Splunk, QRadar, LogRythym, Alien Vault, HP ArcSight
CLOUD SECURITY – Azure, AWS, Netskope, Cloud
Lock,
MOBILE – Air Watch, Mobile Iron, Citrix
AND MORE - Over 100 other Security Vendors!
THE RIGHT SOLUTION PARTNERS
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019
ENVISION
• Security Program Assessments
• Incident Response Readiness
• Security Strategy & Roadmap
Planning/Review
• PCI Readiness Assessment
• HIPAA Readiness Assessment
• Sox Readiness Assessment
• Security Integrated Solution
Design
TRANSACT
• Penetration Testing
• Vulnerability Scanning
• Cloud Security
• Mobile Security
• IOT Security
IMPLEMENT
• Risk Control Gap Remediation
• PCI/HIPAA Remediation
• Forensic Investigation
MANAGE
• Virtual CISO
• Risk Governance
• Incident Response
• Third Party Risk Management
ENHANCE
• Security Operations Center
• Managed Security Services
• Board Level Services
• Cyber Insurance Review
ENHANCE
MANAGE
IMPLEMENT
ENVISION
TRANSACT
PCM SECURITY
Life Cycle of Services
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
GOVERNANCE RISK &
COMPLIANCE SERVICES
SECURITY
CONSULTING
SERVICES
SECURITY
PLATFORM
SERVICES
PCM SECURITY CONSULTING SERVICES
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
GOVERNANCE RISK & COMPLIANCE SERVICES
REGULATORY & COMPLIANCE ASSESSMENTS
 PCI Compliance Assessments
 HIPAA Compliance Assessments
 NIST Compliance Assessments
 FISMA Compliance Assessments
 FedRAMP Compliance Assessments
 ISO 2700x Compliance Assessments
 NYS DFS Compliance Assessments
 General Data Protection Regulation
(GDPR)
 2018 California Consumer Privacy Act
COMPLIANCE REMEDIATION SERVICES
PCM SECURITY SERVICES
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
SECURITY CONSULTING SERVICES
 Security Program Assessments
 Security Integrated Platform Design &
Architecture
 Security Staff Residence Services
 vCISO Services
 Compromise Assessments
 Third Party Risk Assessments
 Incident Response and Forensic
Services
PCM SECURITY SERVICES
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
SECURITY PLATFORM SERVICES
 Managed Security Services
 Security Integration Services
 Cloud Security Assessments
 Splunk Consulting Services
 Penetration, Phishing & Vulnerability
Test
 Infrastructure Assessments
 Firewall
 Network
 Endpoint
 eMail
 Mobile
PCM SECURITY SERVICES
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
LEADINGTHEWAY 2019
NEXT GEN – SECURITY PARTNER
 Working with industry leaders providing the right
solution for our customers.
 Delivering security with multi-disciplined teams to
address infrastructure, network, storage issues.
 Whether endpoint, cloud, mobile, we provide the
right expertise and the right solution.
 Dedicated security consulting and resources to
provide a full range of support.
 Working with over 150 security OEMs’ we are
truly agnostic, offering the right solution.
Your Security Systems Integrator
INTERNAL USE ONLY – DO NOT DISTRIBUTE
LEADINGTHEWAY 2019
THANK YOU
INTERNAL USE ONLY – DO NOT DISTRIBUTE

Weitere ähnliche Inhalte

Was ist angesagt?

50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015Marcos Ortiz Valmaseda
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Aarkstore Enterprise
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Jef Lacson
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCigniti Technologies Ltd
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them SrikanthRaju7
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析Jordan Pan
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019ImekDesign
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutBernard Marr
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services OfferedRachel Anne Carter
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence MarketDatsun Arnold
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Reportaccenture
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for InsuranceAccenture Insurance
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final ReportPhil Agcaoili
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber SecurityStephen Lahanas
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilienceaccenture
 

Was ist angesagt? (20)

50+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 201550+ facts about State of CyberSecurity in 2015
50+ facts about State of CyberSecurity in 2015
 
Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021Global Cybersecurity Market Industry Trends, Analysis Report 2021
Global Cybersecurity Market Industry Trends, Analysis Report 2021
 
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
Accounting for Cyber Risks - How much does Cyber actually cost the Industry?
 
Cybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out forCybersecurity 2020 the biggest threats to watch out for
Cybersecurity 2020 the biggest threats to watch out for
 
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
Cybersecurity 2020: Your Biggest Threats and How You Can Prevent Them
 
Cyber security
Cyber securityCyber security
Cyber security
 
RSA大会2009-2010分析
RSA大会2009-2010分析RSA大会2009-2010分析
RSA大会2009-2010分析
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know AboutThe 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
The 5 Biggest Cybersecurity Trends In 2020 Everyone Should Know About
 
The Security Circle- Services Offered
The Security Circle- Services OfferedThe Security Circle- Services Offered
The Security Circle- Services Offered
 
Threat Intelligence Market
Threat Intelligence MarketThreat Intelligence Market
Threat Intelligence Market
 
Cost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 ReportCost of Cybercrime Study in Financial Services: 2019 Report
Cost of Cybercrime Study in Financial Services: 2019 Report
 
2019 State of Cyber Security Report
2019 State of Cyber Security Report2019 State of Cyber Security Report
2019 State of Cyber Security Report
 
2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance2018 State of Cyber Resilience for Insurance
2018 State of Cyber Resilience for Insurance
 
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
2011 FCC CSRIC WG2A Cyber Security Best Practices Final Report
 
The Future of Cyber Security
The Future of Cyber SecurityThe Future of Cyber Security
The Future of Cyber Security
 
Innovate for Cyber Resilience
Innovate for Cyber ResilienceInnovate for Cyber Resilience
Innovate for Cyber Resilience
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
The State of Cyber
The State of CyberThe State of Cyber
The State of Cyber
 

Ähnlich wie PCM Vision 2019 Keynote: Gary Miglicco

Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...International Federation of Accountants
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptabilityitnewsafrica
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions OverviewJohn D. Haden
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz Asia Pte Ltd
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Team Finland Future Watch
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020Dharmendra Rama
 
I4ADA 2019 - Presentation Jacques Kruse Brandao
I4ADA 2019 - Presentation  Jacques Kruse BrandaoI4ADA 2019 - Presentation  Jacques Kruse Brandao
I4ADA 2019 - Presentation Jacques Kruse BrandaoPaul van Heel
 
Approaches to Cyber Resilience and Supply Chain Assurance
Approaches to Cyber Resilience and Supply Chain AssuranceApproaches to Cyber Resilience and Supply Chain Assurance
Approaches to Cyber Resilience and Supply Chain AssuranceLeonardo
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Next Dimension Inc.
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability reportSayali Sawant
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfBrafton
 
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...tonyStark925586
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfYamuna5
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaFaysal Ghauri
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016InvestorSymantec
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesMohamed Amine Belarbi
 

Ähnlich wie PCM Vision 2019 Keynote: Gary Miglicco (20)

Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune SystemCybersecurity In The Cognitive Era: Priming Your Digital Immune System
Cybersecurity In The Cognitive Era: Priming Your Digital Immune System
 
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
Responding to Cybersecurity Threats: What SMEs and Professional Accountants N...
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and AdaptabilityPat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
Pat Pather- Cyber Security Unchartered: Vigilance, Innovation and Adaptability
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
Netpluz | Protecting your Business with eSentinel | 360° Cyber Security Simpl...
 
Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa Future Watch: Cybersecurity market in South Africa
Future Watch: Cybersecurity market in South Africa
 
5 Security Trends to Watch in 2020
5 Security Trends to Watch in 20205 Security Trends to Watch in 2020
5 Security Trends to Watch in 2020
 
I4ADA 2019 - Presentation Jacques Kruse Brandao
I4ADA 2019 - Presentation  Jacques Kruse BrandaoI4ADA 2019 - Presentation  Jacques Kruse Brandao
I4ADA 2019 - Presentation Jacques Kruse Brandao
 
Approaches to Cyber Resilience and Supply Chain Assurance
Approaches to Cyber Resilience and Supply Chain AssuranceApproaches to Cyber Resilience and Supply Chain Assurance
Approaches to Cyber Resilience and Supply Chain Assurance
 
Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?Cybersecurity: What does Cyber Insurance Cover?
Cybersecurity: What does Cyber Insurance Cover?
 
Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022Top cybersecurity trends to adapt in 2022
Top cybersecurity trends to adapt in 2022
 
Cyber crime liability report
Cyber crime liability reportCyber crime liability report
Cyber crime liability report
 
White Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdfWhite Paper Example - Brafton for NIP Group.pdf
White Paper Example - Brafton for NIP Group.pdf
 
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
Analyzing the WEF’s 2024 Cybersecurity Report- Insights for Tackling Cyber In...
 
Cybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdfCybersecurity Predictions For 2022.pdf
Cybersecurity Predictions For 2022.pdf
 
Cybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabiaCybersecurity frameworks globally and saudi arabia
Cybersecurity frameworks globally and saudi arabia
 
Symantec investor presentation august 2016
Symantec investor presentation august 2016Symantec investor presentation august 2016
Symantec investor presentation august 2016
 
Cybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & OpportunitiesCybersecurity in Sudan: Challenges & Opportunities
Cybersecurity in Sudan: Challenges & Opportunities
 

Mehr von PCM

PCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPIPCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPIPCM
 
PCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: DellPCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: DellPCM
 
PCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: CiscoPCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: CiscoPCM
 
PCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd PekatsPCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd PekatsPCM
 
PCM Vision 2019 Keynote: Jeff Crume
PCM Vision 2019 Keynote: Jeff CrumePCM Vision 2019 Keynote: Jeff Crume
PCM Vision 2019 Keynote: Jeff CrumePCM
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM
 
PCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: VeritasPCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: VeritasPCM
 
PCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot BaretzPCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot BaretzPCM
 
PCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest SoftwarePCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest SoftwarePCM
 
PCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: SamsungPCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: SamsungPCM
 
PCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: SymantecPCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: SymantecPCM
 
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim WarmanPCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim WarmanPCM
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming SecurityPCM
 
#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel UnitePCM
 
#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud Solutions#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud SolutionsPCM
 
#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVity#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVityPCM
 
#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation Slides#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation SlidesPCM
 

Mehr von PCM (19)

PCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPIPCM Vision 2019 Breakout: HPI
PCM Vision 2019 Breakout: HPI
 
PCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: DellPCM Vision 2019 Breakout: Dell
PCM Vision 2019 Breakout: Dell
 
PCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: CiscoPCM Vision 2019 Breakout: Cisco
PCM Vision 2019 Breakout: Cisco
 
PCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd PekatsPCM Vision 2019 Keynote: Todd Pekats
PCM Vision 2019 Keynote: Todd Pekats
 
PCM Vision 2019 Keynote: Jeff Crume
PCM Vision 2019 Keynote: Jeff CrumePCM Vision 2019 Keynote: Jeff Crume
PCM Vision 2019 Keynote: Jeff Crume
 
PCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red HatPCM Vision 2019 Breakout: IBM | Red Hat
PCM Vision 2019 Breakout: IBM | Red Hat
 
PCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: VeritasPCM Vision 2019 Breakout: Veritas
PCM Vision 2019 Breakout: Veritas
 
PCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot BaretzPCM Vision 2019 Keynote: Elliot Baretz
PCM Vision 2019 Keynote: Elliot Baretz
 
PCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest SoftwarePCM Vision 2019 Breakout: Quest Software
PCM Vision 2019 Breakout: Quest Software
 
PCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: SamsungPCM Vision 2019 Breakout: Samsung
PCM Vision 2019 Breakout: Samsung
 
PCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: SymantecPCM Vision 2019 Breakout: Symantec
PCM Vision 2019 Breakout: Symantec
 
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim WarmanPCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
PCM Vision 2019 Keynote: Phil Mogavero | Jim Warman
 
PCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWarePCM Vision 2019 Breakout: VMWare
PCM Vision 2019 Breakout: VMWare
 
PCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: ZebraPCM Vision 2019 Breakout: Zebra
PCM Vision 2019 Breakout: Zebra
 
#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security#PCMVision: VMware NSX - Transforming Security
#PCMVision: VMware NSX - Transforming Security
 
#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite#PCMVision: Real-Time Collaboration: Intel Unite
#PCMVision: Real-Time Collaboration: Intel Unite
 
#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud Solutions#PCMVision: Oracle Hybrid Cloud Solutions
#PCMVision: Oracle Hybrid Cloud Solutions
 
#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVity#PCMVision: HPE Family: Numble Storage and SimpliVity
#PCMVision: HPE Family: Numble Storage and SimpliVity
 
#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation Slides#PCMVision Customer Day Presentation Slides
#PCMVision Customer Day Presentation Slides
 

Kürzlich hochgeladen

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Kürzlich hochgeladen (20)

SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

PCM Vision 2019 Keynote: Gary Miglicco

  • 1. LEADINGTHEWAY 2019 INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 2. LEADINGTHEWAY 2019 PCM SECURITY NEXT GEN – EVERYTHING! INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 3. v GARY MIGLICCO SVP of Security, PCM Inc. LEADINGTHEWAY 2019 INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 4.  27% Threats from Cloud Employees accessing cloud create high risk  8-10% of Spam is Malicious Spam makes up 66% of all email traffic  Sophisticated Attacks Increasing Ransomware Wanacry, Petya, Blueborne increased sophistication 2018 CYBER SECURITY Next Gen – Expanding Threat MatrixLEADINGTHEWAY 2019 INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 5.  25% Traffic Avoiding Perimeter Data Center penetration through 3rd Parties, Printers, IOT devices, Mobile devices  60% of Traffic Encrypted SSL encrypted traffic passes through legacy defenses  200,000 New Malware Daily Zero day malware growing geometrically 2018 CYBER SECURITY Next Gen – Expanding Threat MatrixLEADINGTHEWAY 2019 INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 6. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 NEXT GEN - BREACHES Hackers gained access tokens Facebook users: • Vulnerability: Facebook Developer APIs bugs • Total users effected: 30 million FACEBOOK- SEPT An unauthorized party acquired the information of users of UA’s MyFitnessPal app: • Vulnerability: Weak encryption • Total users effected: 150 million UNDER ARMOUR - MARCH EXACTIS - JUNE Exactis left a database containing 340 million individual records unprotected on the web: • Vulnerability: Unsecured Database - Misconfigurations • Total users effected: 340 million records exposed (2 Terabytes of information) BRITISH AIRWAYS - SEP Hackers breached the mobile app and website: • Attack Vector: Digital Skimmers – script injection • Total users effected: 380,000 U.S. UNIVERSITIES -MARCH 9 Iranian hackers indicated for a series of attacks on more than 300 universities: • Attack Vector: Phishing emails • Total users effected: Estimated $3 billion worth of intellectual property INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 7. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 NEXT GEN – TECHNOLOGIES DECEPTION TECHNOLOGIES Deception technologies become the security enablers of IoT and OT. AI, ML & DEEP LEARNING Algorithms can learn from past events in order to help predict and identify vulnerabilities within a software system. ZERO TRUST SECURITY Increasingly sophisticated cyberattacks are forcing organizations to turn to the zero trust security model. INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 8. LEADINGTHEWAY 2019 Imbedding security through Security Software Development Lifecycle Best Practices will receive more attention as software complexity grows. NEXT GEN – SECURITY SDLC INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 9. LEADINGTHEWAY 2019 IT User Cloud/On-Prem Hybrid Operations SaaS Remote Users Cloud Operations NEXT GEN – CLOUD SECURITY INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 10. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 CLOUD SHARED SECURITY RESPONSIBILITY INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 11. LEADINGTHEWAY 2019 NEXT GEN - ZERO TRUST Traffic is routed into ”Zero Trust Cloud” architecture, where appropriate enforcement of Zero Trust Policy is enforced based on user, application and data types. INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 12. LEADINGTHEWAY 2019 ALWAYS ON. ALWAYS SECURE.  Lack of security resources across the industry  Need for additional services extended through the life of the incident.  Automated Response  Incident Response Management  Device Management  Governance Monitoring and Management  Dark Web Monitoring  Malware Threat Hunting Will continue to be bundled and expand with changing cyber security environment MANAGED SECURITY SERVICES MODEL REAL-TIME THREAT MONITORING Basic Services 1 Governance Management PLUS Device Management 2 Vulnerability Scans PLUS PLUS Incident Response PLUS Dark Web Monitoring NEXT GEN - MANAGED SECURITY INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 13. LEADINGTHEWAY 2019 NEXT GEN - REGULATIONS ENFORCEMENT EFFECTIVE JULY 1, 2020 UNIVERSE OF COVERAGE  Businesses with $25 million in annual revenue, or  Trade in data of 50,000 or more persons, or  50%+ of revenue from selling consumers’ personal information TIGHTER PRIVACY DATA CONTROL  Includes biometric data, internet activity, consumer profiles  Covers unique identifiers such as IP address, mobile device identifiers  Applies to current and future data PERSONAL INFORMATION DEFINED Encompasses any information that “identifies, relates to, describes, is capable of being associated/linked directly or indirectly with a particular consumer or household”  Signed June 2018, amended August 2018,  Law becomes operative January 2020,  Enforcement action commencing July 2020 PROVISIONS  Right to Know – within 45 days of the request + 1 extension  Right to Access – implied duty to preserve (last 12 months)  Right to Opt Out – clear and conspicuous links DATA BREACH NOTIFICATION  Notification within 15 days to reduce liability and business losses ENFORCEMENT  Damages $100 to $750 per person-incident  Up to $2,500 per person-incident  Up to $7,500 per person-incident if intentionally not curing the issue CA CONSUMER PRIVACY ACT 2018 INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 14. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 Provides Legal Defense to Data Breach Requires Written Security Program Allows Choice of Appropriate Industry Framework Does Not Mandate Controls or Punish Non-Compliance Must Show Administrative, Technical, and Physical Controls around Personal Information Must Also Show Compliance with Sector-Specific Requirements such as PCI or HIPAA In Effect Friday November 2, 2018 Compliance Achieves Safe Harbor NEXT GEN – REGULATIONS ENVIRONMENT Ohio Cybersecurity Law INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 15. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 NETWORK DATA CENTERVIRTUAL ENVIRONMENT VS VS VS VS VS VS Network Server Storage Desktop Servers Trusted 3rd Parties Mobile Email Internet Employees Off Network Cloud Branch Ops NEXT GEN – EXPANDING THREAT HORIZON INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 16. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 NEXT GEN – EVERYTHING! INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 17. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 NETWORK DATA CENTERVIRTUAL ENVIRONMENT VS VS VS VS VS VS Network Server Storage Desktop Servers Trusted 3rd Parties Mobile Email Internet Employees Off Network Cloud Branch Ops NEXT GEN – INTEGRATEDSECURITY eMail Endpoint Firewall INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 18. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 NETWORK DATA CENTERVIRTUAL ENVIRONMENT VS VS VS VS VS VS Network Server Storage Desktop Servers Trusted 3rd Parties Mobile Email Internet Employees Off Network Cloud Branch Ops Firewall eMail Endpoint Mobile Network Cloud THREAT INTELLIGENCE SECURITY ANALYTICS NEXT GEN – INTEGRATEDSECURITY INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 19. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 NETWORK DATA CENTERVIRTUAL ENVIRONMENT VS VS VS VS VS VS Network Server Storage Desktop Servers Trusted 3rd Parties Mobile Email Internet Employees Off Network Cloud Branch Ops Firewall eMail Endpoint Mobile Network Cloud THREAT INTELLIGENCE SECURITY ANALYTICS IAM SIEM DNS ENCRYPTION DATA APPS & STORAGEAutomated Response NEXT GEN – INTEGRATEDPLATFORMS INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 20. LEADINGTHEWAY 2019 PCM SECURITY YOUR SECURITY SYSTEMS INTEGRATOR INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 21. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 HEALTHCARE RETAIL FINANCIAL SERVICES ENTERTAINMENT PCM CUSTOMER FOCUS Vertical Market Solutions INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 23. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 Security Incident Services Security Integration Services Security Vendor Intelligence Multi-Discipline Security Systems Integrator AREA SECURITY MANAGERS SOLUTIONS & SERVICES SECURITY ARCHITECTS SOLUTIONS AREA DIRECTORS SECURITY CONSULTING Client Area Support SECURITY CLIENT SUPPORT INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 24. LEADINGTHEWAY 2019 WE WORK WITH THE TOP SECURITY VENDORS IN THE INDUSTRY PERIMETER SECURITY – Cisco Security, Palo Alto, Fortinet, Check Point, Barracuda, Sonic Walls ENDPOINT SECURITY – Symantec, Sophos, Trend Micro, McAfee, Cylance, Crowdstrike, Carbon Black SECURITY INFORMATION EVENT MANAGEMENT – Splunk, QRadar, LogRythym, Alien Vault, HP ArcSight CLOUD SECURITY – Azure, AWS, Netskope, Cloud Lock, MOBILE – Air Watch, Mobile Iron, Citrix AND MORE - Over 100 other Security Vendors! THE RIGHT SOLUTION PARTNERS INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 25. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 ENVISION • Security Program Assessments • Incident Response Readiness • Security Strategy & Roadmap Planning/Review • PCI Readiness Assessment • HIPAA Readiness Assessment • Sox Readiness Assessment • Security Integrated Solution Design TRANSACT • Penetration Testing • Vulnerability Scanning • Cloud Security • Mobile Security • IOT Security IMPLEMENT • Risk Control Gap Remediation • PCI/HIPAA Remediation • Forensic Investigation MANAGE • Virtual CISO • Risk Governance • Incident Response • Third Party Risk Management ENHANCE • Security Operations Center • Managed Security Services • Board Level Services • Cyber Insurance Review ENHANCE MANAGE IMPLEMENT ENVISION TRANSACT PCM SECURITY Life Cycle of Services INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 26. LEADINGTHEWAY 2019 GOVERNANCE RISK & COMPLIANCE SERVICES SECURITY CONSULTING SERVICES SECURITY PLATFORM SERVICES PCM SECURITY CONSULTING SERVICES INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 27. LEADINGTHEWAY 2019 GOVERNANCE RISK & COMPLIANCE SERVICES REGULATORY & COMPLIANCE ASSESSMENTS  PCI Compliance Assessments  HIPAA Compliance Assessments  NIST Compliance Assessments  FISMA Compliance Assessments  FedRAMP Compliance Assessments  ISO 2700x Compliance Assessments  NYS DFS Compliance Assessments  General Data Protection Regulation (GDPR)  2018 California Consumer Privacy Act COMPLIANCE REMEDIATION SERVICES PCM SECURITY SERVICES INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 28. LEADINGTHEWAY 2019 SECURITY CONSULTING SERVICES  Security Program Assessments  Security Integrated Platform Design & Architecture  Security Staff Residence Services  vCISO Services  Compromise Assessments  Third Party Risk Assessments  Incident Response and Forensic Services PCM SECURITY SERVICES INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 29. LEADINGTHEWAY 2019 SECURITY PLATFORM SERVICES  Managed Security Services  Security Integration Services  Cloud Security Assessments  Splunk Consulting Services  Penetration, Phishing & Vulnerability Test  Infrastructure Assessments  Firewall  Network  Endpoint  eMail  Mobile PCM SECURITY SERVICES INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 30. LEADINGTHEWAY 2019 LEADINGTHEWAY 2019 NEXT GEN – SECURITY PARTNER  Working with industry leaders providing the right solution for our customers.  Delivering security with multi-disciplined teams to address infrastructure, network, storage issues.  Whether endpoint, cloud, mobile, we provide the right expertise and the right solution.  Dedicated security consulting and resources to provide a full range of support.  Working with over 150 security OEMs’ we are truly agnostic, offering the right solution. Your Security Systems Integrator INTERNAL USE ONLY – DO NOT DISTRIBUTE
  • 31. LEADINGTHEWAY 2019 THANK YOU INTERNAL USE ONLY – DO NOT DISTRIBUTE