CyberResilience

Thrive with Cyber Resilience
Join this interactive Crowdchat with experts from #DellTech, #VMware and #Intel to discover what we mean by "intrinsic security" and how to thrive with the confidence of cyber resilience. Log in for a text-based chat at 4pm GMT!
Dell Technologies Forum
Let’s get started with a big question! What cybersecurity challenges are businesses facing today & how has this changed in 2020? https://www.crowdchat.net/s/365kp
https://www.crowdchat.net/s/365kp

Dell Technologies Forum
Cybersecurity. It is a complex and unrelenting challenge every company wrestles with as they embark on or continue their digital transformation. It is the “thing that keeps you up at night” and is the #1 subject on the minds of every public and private Board of Directors.
Scott McKinnon
I think it's fair to say that we've seen more attacks,with increasing sophistication and more high-profile breaches
Dell Technologies Forum
More so than in previous years?
Richard Hughes
The BIG quesiton is how do I recover when I have been attakced. We can help with this using our Cyber Recovery Vault.
Natalie Patterson
The cyber security landscape is constantly evolving, which makes it difficult to keep up with
Scott McKinnon
OS vulnerabilities were continually exploited, taking advantage of poor patching hygiene
Richard
For me , it was the ever expansion of data growth and how companies needed to secure it. This included PHI/PII , their IP etc.
James Alliband
The year of transformation! Enabling a remote workforce, for many overnight, but how do we do that securely?

(edited)

Dell Technologies Forum
How has the new "normal", working from home, impacted the need for businesses to tighten their #cybersecurity?
Richard Hughes
NIST framework is a useful guide - remember the 5th pillar - RECOVER needs to be considered as an equal part to Protect, defend and respond
Arash Ghazanfari
for many industries the nature of workplace has been redefined leading to distributed technology consumption at home. Considering Ransomware continues to be the most observed threat in 2020, protecting data at the edge and at endpoints is a huge challenge!
Scott McKinnon
The pandemic obvious caused a huge shift in worker behaviour from designated locations t home working
Natalie Patterson
Many companies had to move quickly to enable a remote workforce like you said. Itt seems like cyber threats also are moving quickly and constantly adapting. It's important to stay ahead.
Scott McKinnon
and this drove much in the way of increased phising attacks
James Alliband
Exploitations of home networks with an increased remote workforce! That along with increased phishing campaigns, which is up 667% over 2019.
yaniv harel
We have passed in 2020 a major milestone in the world's digital transformation. In a few weeks thousands of people turn to work from home and our organizations have succeeded to support this. This is impressive!! However, this brought up a new dramatic set of threats!!!
Arash Ghazanfari
another issue continues to be "dwell time". Existing security controls are deployed around specific threats and not in a context-centric and unified fashion. Bad actors continue to take advantage of this as average detection times continues to be too long.
Stephen Daborn
Yes, I think a lot of organizations have had to very quickly adjust their IT environments which has really opened up their systems to attack.
Dell Technologies Forum
Tell us more @yanivharel1 ! What new #cyberthreats have we had to deal with?
Richard Hughes
it's a huge challenge to move from managing 10's of endpoints to 10,000's as every home office becomes one and needs protecting
Scott McKinnon
Research by VMware has show that almost all CISOs in the survey company's experienced an attack of some type this year
Stephen Daborn
You only have to ask the people you know how many now have the ability to work from home that didn't a year ago.
Dell Technologies Forum
Can you share the #VMware research @smckinno ? Very interesting and disturbing.
James Alliband
Cyber Criminals are increasingly become more sophisticated. Demonstrating this year we are all vulnerable!
Arash Ghazanfari
We are also seeing misplaced beliefs around cloud being more secure than on-premises deployments or vice versa. Fundamentally, we need to move towards intrinsically secure blueprints for consumption of digital assets so that apps can be safely consumed wherever they are deployed.
yaniv harel
Organizations have started to work in a new architecture that we haven't prepared and to let many devices to connect, devices that the organizations are not familiar with, the people private computers.. a tough challenge to the security teams...
Scott McKinnon
Custom malware was the most common attach type
Dell Technologies Forum
Research from Forrester and Gartner confirmed that data breaches are on the rise and it’s clear that business-as-usual-security can’t keep pace https://www.crowdchat.net/s/565lx
https://www.crowdchat.net/s/565lx

James Alliband
It's becoming increasingly interesting, now our Security and IT teams are remote. How the silos between these teams aren't just operational but now social silos. How do we break these down to create operational success?
Scott McKinnon
Medical devices and their protection is a key concern in healthcare; typically these network endpoint types cannot be patched due to long service lifetimes, regulations relating to certified use and embedded OSs.
James Alliband
VMware Carbon Blacks own Threat Analytics Unit shows a 148% increase in ransomware attacks and that 52% of all cyber-attacks in March 2020 were finance related.
Arash Ghazanfari
Complexity continues to be the enemy of security hygiene!
yaniv harel
Correct, we should look at it as an arm-race, while the defenders proceed, the attackers do their progress as well..
Dell Technologies Forum
What did Dell Technologies announce on Dec. 3? To give you a hint, it was all about Intrinsic Security helping businesses build Cyber Resilience https://www.crowdchat.net/s/765m2
https://www.crowdchat.net/s/765m2

Dell Technologies Forum
The press release, FYI, is here: https://corporate.delltechnologies.com/en-us/newsr...
https://corporate.delltechnologies.com/en-us/newsroom/announcements/detailpage.press-releases~usa~2020~12~20201203-dell-technologies-intrinsic-security-helps-businesses-build-cyber-resilience.htm#/filter-on/Country:en-us
2020.12.03 | Dell Technologies Intrinsic Security Helps Businesses Build Cyber Resilience
2020.12.03 | Dell Technologies Intrinsic Security Helps Businesses Build Cyber Resilience
Dell Technologies Intrinsic Security Helps Businesses Build Cyber Resilience
Richard
To help the audience , can the team explain the difference between Zero Trust and Cyber Resilience?
Stephen Daborn
The announcement really showed the strength that Dell Technologies broad portfolio brings to security. It's not just from my side on the PowerEdge servers but across the whole portfolio as Dell Technologies knows security is more than a single solution.
Yannick Brancourt
Thrive with the Confidence of Cyber-resilience https://www.crowdchat.net/s/565mf
https://www.crowdchat.net/s/565mf

Natalie Patterson
Dell Technologies announced a portfolio of new intrinsic security solutions and capabilities across the entire company.
Arash Ghazanfari
@Curran_Richard Zero Trust is fundamentally about deploying your security controls and policies as close to and focused on what you want to protect as you possibly can. In a way, it's the opposite side of perimeter-centric approach to security.
Scott McKinnon
Zero-Trust is a mindset around workflow, system design and operations to improve security posture; creating the best defences possible. Cyber resilience is about capacity to recover in the event of a breach; an operational focus
Yannick Brancourt
Hey Natalie, great to see you on ;-)
Dell Technologies Forum
Our story is quite simple for this announcement – battling cybersecurity is about starting strong, staying strong, and outmaneuvering threats. It sounds simple on paper, but it is not simple in execution. https://www.crowdchat.net/s/765mo
https://www.crowdchat.net/s/765mo

Arash Ghazanfari
Zero trust is a fundamental guiding principal all organisations need to consider as the traditional perimeter is fast disappearing.
Stephen Daborn
Dell Technologies Secured Component Verification for PowerEdge is just one of the server solution we are bringing with this announcement. Our servers have a range of security features embedded to secure different aspects of the servers but this is now taking security up a level.
yaniv harel
We tend to think about security as "security products" or "security Services" however part of the security is built of the security of the products and not just security products! The security level that your products is super important to the entire security of the organization.
James Alliband
Staying strong is about being constantly vigilant, looking over the horizon for emerging threats, and providing solutions before there is a (big) problem. This involves systems going into production as well as live systems with critical customer data. (1/2)
James Alliband
Here we’re offering Dell EMC PowerEdge UEFI Secure Boot Customization to address industry-wide firmware certificate authenticity issues (2/2)
Arash Ghazanfari
Expression of architecture in software creates great opportunities for the implementation of a zero trust approach to security in the enterprise.
Dell Technologies Forum
So built-in security into the products is important, right @yanivharel1 ? That is exactly what was announced for #PowerEdge.
Stephen Daborn
This brings the ability to securely check the configuration that the server left the factory with is the same that is delivered to you to make sure nothing has been changed on route.
James Alliband
@smckinno When in theory we can utilise a strong Zero Trust framework with to improve cyber resiliancy.
Scott McKinnon
The announcement covered some foundational capabilities that add to good security hygiene; supply-chain, protection of assets in transit and validation on arrival
Yannick Brancourt
https://www.delltechnologies.com/en-us/solutions/o...
https://www.delltechnologies.com/en-us/solutions/openmanage/secure-component-authentication.htm?dgc=SM&cid=3497&lid=spr4274811861&linkId=106197996
Dell Technologies Secured Component Verification
Dell Technologies Secured Component Verification
Dell Technologies Secured Component Verification validates your hardware configuration, ensuring supply chain integrity.
Scott McKinnon
These really helps in building trust in the various security layers that follow. VMware picks up on this theme by supporting a Secure Boot process that leverages UEFI as well as hardware-based attestation to give higher degrees of confidence over the software stack
Arash Ghazanfari
Intrinsic security allows us to weaponise our systems, infrastructure and platforms against bad actors.
Stephen Daborn
https://www.delltechnologies.com/en-gb/solutions/o...
https://www.delltechnologies.com/en-gb/solutions/openmanage/secure-component-authentication.htm
Dell Technologies Secured Component Verification
Dell Technologies Secured Component Verification
Dell Technologies Secured Component Verification validates your hardware configuration, ensuring supply chain integrity.
Richard
@really good inputs. As a guiding principle with this framework , one needs to ensure a level of attestation so that workloads can run on a product that has not been compromised.
yaniv harel
The way your product is being developed, methodologies like SDL, the components that are being used, supply chain issues, and the way the vendor takes care of vulnerabilities are all important to security not less than the security systems that we will put on top later..
Stephen Daborn
84% of respondents to a Forrester Research survey considered hardware/supply chain security to be critically or very important to their business.
(Source: Forrester Research, Inc., The Next Frontier for Endpoint Protection)
Stephen Daborn
https://www.delltechnologies.com/en-za/collaterals...
https://www.delltechnologies.com/en-za/collaterals/unauth/white-papers/products/servers/cyber-resilient-security-with-poweredge-servers.pdf
https://www.delltechnologies.com/en-za/collaterals/unauth/white-papers/products/servers/cyber-resilient-security-with-poweredge-servers.pdf
Scott McKinnon
The Dell announcement focused on the hardware aspects of Intrinsic Security, VMware picks up that same theme from a software perspective. Intrinsic Security means enabling security controls within the software layer, with analytics, to leverage the infrastructure capabilities.
Stephen Daborn
iDRAC9 now also enhances the System Lockdown function. This allows you to secure a servers configuration and stop unplanned configuration changes. This also does NOT require a server reboot to lock and unlock which is a critical feature for a server.
Scott McKinnon
For example turning devices, identity, endpoints, workloads, networks and clouds into control points, creates the basis for Intrinsic Security.
Stephen Daborn
Even those with full admin privileges are limited to read-only access unless the lock is first disabled. This prevents server ‘drift’ and unwanted firmware changes.
Scott McKinnon
That's a great point James. Zero-trust requires operational processes to ensure that the controls deployed are effective. Being able to detect and respond to material events are part of the recovery process, but if there has been a compromise, say ransomware ...
Scott McKinnon
then having a resiliency solution as part of the ZT approach can support customers in recovering quickly