Cybersecurity ABCDv7.01 Public
Cybersecurity ABCDv7.01 Public
Cybersecurity ABCD
(Google keywords)
Tran Hong Quan Andy
People Firewall
Vice Director - FTI
Agendas
✓Cybersecurity basic ?
✓Cybersecurity Trend (2024-2029)
✓Selling what ?
✓Zero Trust architecture
✓SASE architecture
Cybersecurity basic
• Prevent, detect, response, remediation & rollbank from
cyberattack.
• Cyberattack: DDoS, ransomware (virus, malware, botnet,
trojan…), data breach, bank account stolen, crypto wallet hack,
personal information expose, fake social profile for love/Tinder…
• Why cybersecurity is so difficult to understand ?
Involve People + Business Process + Technology
Cybersecurity = Health = ERP
Cybersecurity basic
• People: complex, feeling, psychology, belief, education,
experience… cybersecurity knowledge/finance knowledge
• Process: Business process / QA / routine. Steps to do something
• Technology:
Defensive: Firewall (Network security) and Antivirus (Endpoint
security), Security Management. Average large Enterprise has 32
security vendors. (Mouse)
Cybersecurity basic
• Offensive: Linux, opensource, 0 day attack, social engineering,
master hacking tool and master code. “mastermind” = CAT
• Learning on hacking:
https://www.facebook.com/groups/hacking101
Cybersecurity Trend
• Cybersecurity trend for next 5 years (2024-2029)
• Defensive/Blue: Cloud anti-DDoS for stop and mitigation, Zero Trust
architecture + IAM /Identity Security + SASE(SDWAN+SSE) +
XDR(NGAV+EDR+XDR) + Security Awareness Training/SAT for
prevent, detect&response, remediation&rollback for anti-
Ransomware...
• SOC: XDR, SIEM&SOAR, TI, Attack Surface Management...
• Cloud Security: CNAPP (CSPM and CWPP)...
• Offensive/Red: OpenSource, Linux, 0 day exploitation and social
engineering (remain the same from day one)
Restructure in thinking for recent incident
Restructure in complex
The State of Cyber Defense Today
9
Cost of a Data Breach
$4.62m
Average total cost of a ransomeware breach
10
The Platform
Approach
Natural Migration from Standalone Tools to Platform
NGFW
FW DPI
More Prevention VPN IPS
Simplification Lower Routing Sandbox
TCO
12
Natural Migration from Standalone Tools to Platform
NGFW
Prevention Response
More Prevention Detection
Quick Response
Threat Hunting
Simplification
Prevention-only Anti-Virus Lower TCO Unified EDR Platform
13
Natural Migration from Standalone Tools to Platform
NGFW
NG SIEM UEBA
Efficacy NDR Malware
SOAR Sandbox
Automation/Efficiency
IDS TIP
Quick Response
Simplification
Single Hardware Applienace FW Lower TCO Unified Intelligent Platform
+ VPN + Routing
14
Isolated SecOps Tools Anchored on SIEM or SOAR
15
Unified Intelligent Platform Integrated with Environment
CASB
SOAR TIP
EDR
Malware
IDS
Sandbox
VM
= Alerts
Vendors
Licenses
How does an organization
defend itself efficiently
DevOps
and on-budget given this
complexity?
17
Selling what ?
• IAM ( Identity protection, users, power users and admin) Microsoft Entra ID
P2, E3, E5
• Anti-DDoS: Cloud anti-DDoS, CloudFlare (CF) Anti-Ransonware:
EDR&XDR, SentinelOne(S1)
• SOC: (SIEM, SOAR, NDR, TI…) Stellar OpenXDR
• Managed Service XDR (MDR) S1, Managed SOC
• Pentest
Alternative:
IAM protection: Cyberark, Beyondtrust, Okta, Wallix, One identity, ManageEngine….
Anti-DDoS: Akamai, Arbor, Radware, F5, Citrix, Incapsula, ClearDDoS….
Anti-Ransomware: Trendmicro, Trellix, Crowdstrike, Microsoft EMS3, Broadcom Symantec,
Kaspersky…
SOC: Splunk, IBM Qradar, Microsoft Sentinel, Palo Alto Cortex, Microfocus Arcsight….
Zero Trust history
Security Modernization with Zero Trust Principles
Business Enablement Security Strategy and Program
Align security to the organization’s
mission, priorities, risks, and processes
Verify Explicitly
Protect assets against attacker control by explicitly validating that all trust and security
decisions use all relevant available information and telemetry.
Secure Identities Infrastructure & IoT and OT Modern Security Data Security &
and Access Development Security Security Operations (SecOps/SOC) Governance
Zero Trust
architecture Policy Optimization
Governance
Compliance
Data
Classify,
Security Posture Assessment Emails & documents
label,
Productivity Optimization encrypt Structured data
Identities
Strong
Human authentication
Non-human
Apps
Zero Trust Policies Network
Request Adaptive SaaS
Public Access
enhancement Evaluation
On-premises
Traffic filtering Private
Enforcement
& segmentation
(as available)
Endpoints Infrastructure
Device Risk
compliance assessment Serverless
Corporate
Runtime Containers
Personal
control
IaaS
Threat Protection Paas
Continuous Assessment Internal Sites
Threat Intelligence
Forensics
Response Automation
Telemetry/analytics/assessment
architecture
Governance
Compliance
Data
Classify,
Security Posture Assessment Emails & documents
label,
Productivity Optimization encrypt Structured data
Microsoft Sentinel
Telemetry/analytics/assessment
Microsoft Defender • Security Information and Event
Management (SIEM)
JIT & Version Control • Security Orchestration, Automation,
Defender for Endpoint Defender for Office 365 Defender for Identity Defender for Cloud Apps Defender for Cloud and Response ( SOAR)
What is SASE (Secure Access Service Edge)?
Cloud-delivered network and security convergence solution for work-from-anywhere
FWaaS/SWG
—
ZTNA
—
SASE SD-WAN CASB
-----
DLP
------
…
Convergence Consistent
Security
Securi
ty SD
Servic WAN
es
• Network Firewall Edge • Application Aware
• Secure SD-WAN • Intrusion Prevention
• SD-Branch • Web Filtering
• Security Services Edge • DNS Protection
• Universal ZTNA • Sandboxing
SD-Branch • In-Line Sandboxing
• Network Access
Control (NAC)
• OT and IoT Security
Travel Home Campus Branch Factory
Securing Remote Users Cloud-delivered Security & Networking Improved User Experience
Cloud CASB
Thin Edge Managed
Single
Vendor SWG Secure Internet Access
Web
SASE
Extender
FWaaS
Secure Edges
Facebook/Linkedin/Zalo/Whatsup/Viber/Telegram.