Cyber Security & Digital Transformation

Download as pdf or txt
Download as pdf or txt
You are on page 1of 13

Building Modern Cybersecurity Programs:

Using Digital Transformation Strategies

Abdelmajed Saeed
Cyber Security Consultant

Riyadh March 2022


Conditions on the ground today
Awareness for improved cyber security programs is at an all time high!
But…

More cybersecurity Too much


Talent shortage
tools information

1.8 million unfilled Possibly increases IoT $800 billion


positions, according complexity, distracts us, industry, with over
to the Center for drives more staffing 8.4 billion connected
Cyber Safety and needs devices online, and
Education by 2022 spending predicted
to reach nearly $1.4
trillion by 2021
On deck: IoT + 5G
Common Responses

Increase Transfer the Modernize


staff burden

Money… Managed Digital


services Transformation
Candidates… Cloud

Can one transfer


risk?

Insurance
Key Characteristics of a Digital Transformation

Scale compute on-demand, often built within


minutes

Automation speed and agility are often what we see,


but automation is the glue

Data Driven knowing your customer, analytics, data


analysis driving outcomes
Continuous Evolution
50% of CEOs expect their industries to be substantially or
unrecognizably transformed

Cloud Automation Analytics

Enablers of digital transformation

Distributed users, apps, and data | Delivers flexibility and speed; increases risk

IoT SaaS Cloud/Virtualization Mobility


Highly Automated Adversaries
Cyber Transformation: applying these Digital
Transformation strategies to your
cybersecurity program
SCALE
On-demand security is about building dynamic process into your cyber
program. Examples…
Regionalized “security towers”
often cloud-based allowing for flexible consumption, growth and change
to occur “locally” independent of security services.
“Data processing Offloading”
Balances security data collection (locally) with centralized processing. We
want to be agile with “sensors” that have a small foot print.
Balancing your talent with partnerships
“Right-Sizing” your technology and teams. Often organizations focus on
areas in cyber that are better left to on-demand talent.
AUTOMATION
The most important element of Cyber Transformation
• Adversarial Transformation
• They too have applied digital concepts.
• We need to our own defense automation.
• Play Books
• the act of identifying manual repetitive process and automating it
into an agile repeatable process
• Natively integrated platforms
• Automation + orchestration = leverage
Data Driven
Cyber Analytics
Machine learning & analytics are key to managing the
balance between reactive and proactive activities.
Your cyber analytics program needs to integrate data
generated from SIEM’s, external threat intelligence, forensics,
and hunting activities and become actionable.
With as little human handling as possible
Data lakes are key to a foundation, but don’t let them
become a liability
(data showing threats after the breach or incident).
Advanced Attacks Require Detection &
Response

Known threats Evasive Zero-day Fileless attacks • Targeted attacks


malware attacks • Low and slow
• Insider threats

99%+ of attacks can be <1% require analysis over time &


prevented with the right tools across layers with machine learning
The right approach requires three integrated
capabilities

Great Prevention AI & Machine Learning Automated Investigations

to stop everything you can to detect sophisticated to accelerate response


attacks

ACROSS NETWORK, ENDPOINT AND CLOUD DATA


Thank you!

Q&A

Abdelmajed Saeed
Cyber Security Consultant
Riyadh March 2022

You might also like