1: Cybersecurity Context & Background
CYBERSECURITY
CONTEXT &
BACKGROUND
Cybersecurity | 2019 | 4
1: Cybersecurity Context & Background
Cybercrime alone costs nations more than
$1 trillion globally, far more than the record
$300 billion of damage due to natural disasters
in 2017. We ranked cyberattacks as the biggest
threat facing the business world today — ahead
of terrorism, asset bubbles, and other risks.” 2
Paul Mee & Til Schuermann
Harvard Business Review
Cybersecurity | 2019 | 5
1: Cybersecurity Context & Background
Cybersecurity in a Technology Dependent Society
In today’s always-on, always-connected economy, This time gap provides opportunity to map the network, escalate
businesses are under pressure to enhance their privileges and plan a devastating attack, ranging from extortion
cybersecurity strategy and prove to their customers (ransomware) to outright destruction of business-critical
that data protection is critical to their customer systems. These types of cyberattacks can disrupt a business,
engagement strategy. leading to costly remediation, revenue loss, negative publicity,
and lasting customer distrust.
As the world economy continues to digitise operations, supply
chains, business transactions, and employee and customer The average cost of a data breach is $3.86 million, an increase
services, cyberattacks are expected to continue to pose as of 6.4% compared to 2017 5. The likelihood of a breach recurring
one of the major threats to the world. over the next two years is 27.9%.
With ‘Cyberattacks’ and ‘Data Fraud and Theft’ taking Even with the most sophisticated security solutions, cyber
3rd and 4th place on the World Economic Forum 2018 list criminals are constantly learning from previous attacks and
of Global Risks, the spotlight is on organisations to ensure exploiting vulnerabilities. With continued advancements in
critical information remains secure and private 3. machine learning capabilities, the threat of an attack should
not be ignored.
The number of attacks is growing exponentially with hacking
and malware accounting for 48% and 30% of attack tactics 4. The following sections outline some of the motives behind
The likelihood that all malware will be discovered before harm cyberattacks, the types of cyberattacks and how they intrude
is done is low, and the discovery time for an attack is on on your business, and some of the common points of entry.
average 197 days 5.
Cybersecurity | 2019 | 6
1: Cybersecurity Context & Background
Cyberattacks Motives
Financial State Intelligence Hacktivism Terrorism
Sponsored Gathering
76% of breaches are Governments have quickly Cybercriminals leverage the The use of computers and Politically motivated extremist
financially motivated 6. realised that cyberattacks practice of scanning, monitoring, computer networks to promote groups and non-state actors
are quicker, cheaper and collecting, and exfiltrating political or social change. using computers to cause harm
In particular, there has been a easier than traditional sensitive information in order or fear pose a major threat to
huge increase in ransomware, warfare methods. to extort, blackmail or gain Hacktivist groups such as critical infrastructure,
with attackers entering an advantage over a rival business. WikiLeaks & Anonymous have
organisation’s systems to take With potentially detrimental shed light on some of the social Financial services, military,
control, sending alerts to users impacts to society, and even injustices that exist in the world energy, utilities, transportation
to notify them that their data harder to detect methods of and demand those responsible, and government offices are
has been ceased until receipt manipulation, government entities be held accountable for their highly attractive targets.
of ransom fee. are exploring the creative ways to actions. Hacktivism accounted
infect a rival state’s society. for 4.7% of cyberattacks in 2017 7.
Cybersecurity | 2019 | 7
1: Cybersecurity Context & Background
Types of Cyberattack
On average, advanced Data Integrity
cyberattacks go Malicious data manipulation can be detrimental
to a business. This is a highly sophisticated, and
197 days undetected 5. easily undetectable cyberattack that causes users to SQL Injection
doubt the accuracy of their information. Manipulating Deploying malicious code into an SQL-based
Being aware of how public opinion through smear campaigns or changing
information in a medical system are two examples of
server can force the server into revealing
information it wouldn’t normally reveal.
cyberattackers infect systems how this type of attack poses a huge threat to society. This type of attack can allow attackers
Malware
can help your business detect Malware refers to the practice of
to tamper with services enabling them to
pose as other individuals, void transactions,
abnormal activity and potentially deploying malicious software, including change data, destroy data and approve
ransomware, spyware, viruses and administrative access to users.
help detect an attack early on. worms to infect and breach a network.
This can result in blocked access to
Here are some of the common files and systems, criminals covertly
types of cyberattack: obtaining sensitive information, and
disruption to service, amongst others.
Cyber-Collection
Used by nation states to conduct espionage
Distributed Denial of Service and even corporate spies to gather intelligence
This type of attack uses multiple compromised on rivals, cyber collection is similar to snooping
systems to attack servers, networks, and but is with the intention to scan, collect and
systems to flood and exhaust resources Snooping exfiltrate sensitive information. An example
forcing the network to fail and deny service Similar to the act of eavesdropping, snooping is the of this is the famous Stuxnet computer
to legitimate users. practice of unauthorised access to systems and data. worm first uncovered in 2010.
This can include monitoring of keystrokes, passwords,
login information, communications, webcams etc.
Cybersecurity | 2019 | 8
1: Cybersecurity Context & Background
Points of Entry Unused Systems
Being aware of vulnerable
points of entry will help Social Media Outdated
protect the business. Platforms Infrastructure
Web Browser Third party applications, instant It is crucial to update and patch
Here are some common points Browsers are constantly connecting users messaging services and comments infrastructure. As technology Unused Systems
to the outside world. These browsers rely sections are all quick ways for continues to rapidly accelerate and Cybercriminals target unused
of entry for cybercriminals: on plugins (Flash, JavaScript etc.), but like cybercriminals to deploy malicious develop, cybercriminals will look to systems and resources because
other software, these plug-ins come with software to vulnerable users. exploit legacy infrastructure. In 2018 they typically aren’t monitored
security flaws that cybercriminals love to outdated security controls was the and it's easier to go undetected
take advantage of. 64% of companies have 2nd greatest vulnerability. (11) for longer.
experienced web-based attacks. (8) Perhaps
more worryingly, 77% of compromised Zero-Day Exploit
attacks in 2017 were file-less. (9)
Social Engineering
Insider
Zero-Day Exploit
28% of cyberattacks
When network vulnerabilities
come from an insider with
are announced, cybercriminals
legitimate access (4). These
will actively seek opportunities
attacks are particularly hard
to guard against.
Phishing Emails Social Engineering to exploit this before a patch is
issued and implemented.
Arguably the most commonly used point
Exploiting the human element of
of entry, phishing exploits the naivety of
IT, cybercriminals seek to deceive,
users by sending emails that appear to
manipulate, or intimidate people to
be from a reputable source but contain
hand over information and gain
malicious software. These emails require
access to information systems.
users to engage with a link or a login portal
In 2017, 43% of cyberattacks
etc. for the software to be deployed.
involved social engineering. (10)
Cybersecurity | 2019 | 9
1: Cybersecurity Context & Background
Dell Technologies Security Transformation
Dell Technologies unites seven technology
leaders in one company with the power
to drive digital and security transformation.
Dell Technologies provides a wide range of cybersecurity solutions
underpinned by a robust cybersecurity delivery methodology.
Dell Technologies' cybersecurity framework is focused on ensuring
our clients manage cyber risk to grow and protect business value.
Cybersecurity | 2019 | 10
1: Cybersecurity Context & Background
Dell Technologies Cybersecurity Capabilities
Dell Technologies deliver
the following capabilities
to our clients:
Deep expertise across the technology A world class threat intelligence network
stack from the datacentre right through that leverages machine learning and deep
to end-user devices learning technologies
International cyber skills and leading capability Commitment to a wider ecosystem
in cyber, digital trust and IT transformation of partners that leverages leading edge
cyber innovation
A focus on continued R&D in cyber, digital Shared commitment to sustainability
security and trust delivering technology solutions that are
sustainable and low carbon
Cybersecurity | 2019 | 11
1: Cybersecurity Context & Background
Dell Technologies Cybersecurity Delivers Key Business Outcomes
Dell Technologies Business Outcomes and
Cybersecurity Capabilities: Deliverables Include:
Deep expertise DEFINED STRATEGY
AND ROADMAP
Dell Technologies
Cybersecurity Methodology
International cyber skills
ADVANCED PROTECTION
A focus on continued R&D
RISK AND COMPLIANCE
LEADERSHIP & CULTURE
A world class threat
Define Implement Respond and
intelligence network Cyber Strategy Cyber Strategy Recover from
an attack
OPERATIONAL RESILIENCE
Commitment to a wider ecosystem
Leverage World Class Threat Intelligence Network
REAL TIME VISIBILITY
Shared commitment to sustainability OF EMERGING THREATS
Our proven methodology is supported by a portfolio of leading
cybersecurity solutions that protect and secure your IT environment.
Cybersecurity | 2019 | 12
1: Cybersecurity Context & Background
Dell Technologies Security Transformation Portfolio
Our methodology is enabled by our robust portfolio of cybersecurity solutions.
Assess Environment Implement Strategy Respond & Recover
& Define Strategy & Secure Environment
We assess our clients cybersecurity landscape and we We implement cybersecurity products and services in line We ensure our clients always have measures
work with them to define cyber strategies and actionable with business objectives to drive growth, protect value in place in the event of an attack.
roadmaps in line with strategic objectives. and stay on top of cyber threats.
Solutions include: Solutions include: Solutions include:
• Maturity Assessment • Infrastructure Security • Threat Detection & Response
• Adversarial Testing • Application Security • Incident Response
• Cloud Security Consulting • End-User Devices Security • Cyber Recovery Solution
• Governance, Risk, Compliance & Controls Operations
Leverage Advanced Threat Intelligence
We provide real time threat data to equip security teams to proactively detect
and manage cyber threats and respond more effectively to cyber incidents.
Cybersecurity | 2019 | 13
1: Cybersecurity Context & Background
Dell Technologies Cybersecurity Solutions Deliver Business Outcomes
In this document, we outline some of our leading cyber solutions. This diagram illustrates which solutions deliver the
relevant business outcomes.
DEFINED STRATEGY ADVANCED RISK AND COMPLIANCE OPERATIONAL REAL TIME VISIBILITY
AND ROADMAP PROTECTION LEADERSHIP & CULTURE RESILIENCE OF EMERGING THREATS
Maturity Assessment,
Governance, Risk, Advanced Threat
Cyber Strategy and Infrastructure Security Fraud Prevention
and Compliance Intelligence
Roadmap
Adversarial Assessment Applications Security Cybersecurity Operations Incident Response
Cloud Security End-User Device Security Cyber Recovery
Cybersecurity | 2019 | 14
1: Cybersecurity Context & Background
Delivery Models
Dell Technologies cybersecurity solutions are categorised under the following delivery models:
ASSESSMENT MANAGED SERVICE PRODUCT
SOLUTIONS SOLUTIONS SOLUTIONS
These include solutions that determine These include solutions that are provided These include solutions that can
the risk maturity, exposure and future by Dell Technologies' Managed Service be deployed and embedded within
cyber strategy and roadmap. capability on behalf of our clients. a client environment to protect,
secure and build resilience.
Working in Partnership with Consulting Firms
We work with leading Advisory, Consulting and Partner firms to support clients to deliver successful security
transformation, risk management and cyber strategy programmes.
Cybersecurity | 2019 | 15
67
Contact Details
www.DellTechnologies.com
@DellTech
Dayne Turbitt Margarete McGrath Chris Miller Simon Godfrey
Senior Vice President UKI Chief Digital Officer UKI RSA Regional Director, UKI Secureworks Regional Director, UKI
bit.ly/2xGgo0p bit.ly/2NGJdUq bit.ly/2V9Tl82 bit.ly/2V5J3pD
Cybersecurity | 2019 | 67