Securing the Un-securable?

1.016 Aufrufe

Veröffentlicht am

Whether or not you believe that IT is experiencing a
revolution, it is clear that a number the fundamentals of how
the IT infrastructure is built are changing. Server and storage
virtualisation, cloud-based delivery models, data centre
convergence onto 10 Gigabit Ethernet and the unification of
voice communications mechanisms are all symptomatic of
this. But IT is a two-edged sword: with every innovation
come a new set of risks to be mitigated, holes to be filled,
policies to be set and compliance objectives to be stuck to. In
the face of such rapid change, how exactly should
organizations large and small be thinking about security?
What are the pot-holes along the road, and how can they be
avoided?

Veröffentlicht in: Technologie, Business
  • Als Erste(r) kommentieren

  • Gehören Sie zu den Ersten, denen das gefällt!

Securing the Un-securable?

  1. 1. Securing the Un-securable? Technology Convergence/Divergence and the Changing Face of Security Jon Collins, Managing Director Freeform Dynamics Ltd [email_address] www.freeformdynamics.com
  2. 2. Agenda <ul><li>What’s happening out there – and so what? </li></ul><ul><li>The new two-edged swords </li></ul><ul><li>What pot-holes to expect? </li></ul><ul><li>Where to start </li></ul>
  3. 3. Market remains turbulent...
  4. 4. Meanwhile, fragmentation is within...
  5. 5. What business drivers are having the most impact on how you architect and operate your server estate?
  6. 6. Same old, same old? VIRUSES AND TROJANS INTRUSION AND DENIAL SPAMMING AND PHISHING
  7. 7. How prominent are the following threats to [IT] security and how is this changing?
  8. 8. In fact, most organisations look more like this...
  9. 9. Have risk concerns held you back from taking advantage of the following?
  10. 10. What’s going on in technology?
  11. 11. What technical/operational drivers are having an impact?
  12. 12. No one size fits all for virtualisation Servers Storage Desktops
  13. 13. Adopters starting to appreciate architectural impact SERVER 1 SERVER 2 SERVER 3 STORAGE A STORAGE B STORAGE C VIRTUALISED SERVER WORKLOAD 1 WORKLOAD 2 WORKLOAD 3 INTERFACE STORAGE A STORAGE B STORAGE C
  14. 14. Meanwhile, what about Cloud?
  15. 15. Technological convergence is means to end
  16. 16. The new computing – back to the future? Web Servers Messaging Servers Security Server Directory. Servers ID Server Proxy Server App Servers Integration Servers Transaction Servers File Servers Database Servers Media Servers Portal Server Presentation Processing Data
  17. 17. Moving from technologies to services Email Internet Application Desktop Server Network VS TECHNOLOGY COMPONENTS SERVICES
  18. 18. Bottom-up vs Top-down Making everything “just work” Making a real difference to business IT as bottleneck IT as foundation IT as differentiator INCREASED EFFICIENCY INCREASED EFFECTIVENESS
  19. 19. What pot-holes to expect? <ul><li>More proliferation </li></ul><ul><li>More fragmentation </li></ul><ul><li>Knowable unknowns </li></ul><ul><li>Where’s the data? </li></ul><ul><li>Irresponsibility </li></ul><ul><li>Work smarter, not harder... and other cliches </li></ul>
  20. 20. <ul><li>What is the status of your capability in the following areas? </li></ul>Reality check
  21. 21. On fire fighting and fire extinguishers
  22. 22. Risk sensitivity/Management & technology capability
  23. 23. Integration and Co-ordination are Key – but there’s still a way to go!
  24. 24. So, where to start? <ul><li>Security exists to enable business </li></ul><ul><li>Make ownership, not buy-in, the first step </li></ul><ul><li>Balance trust with prevention </li></ul><ul><ul><li>Awareness training </li></ul></ul><ul><ul><li>Acceptable behaviour </li></ul></ul><ul><ul><li>Enforceable policy </li></ul></ul><ul><li>Risk mitigation with eyes wide open, not blinkered avoidance </li></ul>
  25. 25. Thank You Jon Collins, Managing Director Freeform Dynamics Ltd [email_address] March 2010 www.freeformdynamics.com

×