"It’s a tough job keeping a large company—with 100,000 employees and multiple facilities around the world—secure and compliant. In this session, you will hear from John McClurg, Dell’s Chief Security Officer (Oct. 21) and Alan Daines, Dell’s Chief Information Security Officer (Oct. 22), about the challenges and opportunities we face every day at Dell, and how their insights can help you put in place successful strategies to protect your entire organization and maintain compliance with internal policies and external regulations. They will discuss widespread threats that are top-of mind today and share best practices on how to approach them.
4. #1 Ranked
Security company in Security 500
30K+ Concurrent
Connections on SonicWALL Aventail
250+
SonicWALL Supermassive firewalls
deployed
117K
Systems encrypted with Credant
63B Dell Events
Analyzed by SecureWorks monthly
250k
Identities managed by D1IM
5. Top of mind
threats
• Identity &
Access
Management
• Data Loss
• Product
vulnerabilities
6. Dell - Restricted - Confidential6
Organizational Structure
Security
Infrastructure
Security
Consulting
Governance,
Policy & Risk
Cyber Response
Services
• 4 components: Network Security, Security
Tools, Identity & Directory Services, and
Technology Strategists
• Engineering & Operations combined in
each component (except Strategists)
• Supported Technologies: Firewalls, IPS,
Proxies, DDOS Protection, VPN, Antivirus,
HIPS, DLP, PKI, RMS, SIEM, Password Vault,
Hard Drive Encryption, Active Directory,
Single Sign-On, etc.
• Provides security design/architecture advice
for product development, software
development, infrastructure deployments,
services delivery, and 3rd party relationships.
• Oversees secure development lifecycle
utilizing source code analysis and threat
modeling.
• 3 Components: eForensics, Threat &
Vulnerability Management, and Incident
Response
• Key Activities: Litigation Support, Ethics
Investigations, Pen Testing, Vulnerability
Scanning & Remediation Oversight,
Incident Management, 1st Level Security
Helpdesk, etc.
• Responsible for Compliance and Risk
Management for the IT organization.
• Key Areas: PCI, SOX/Financial Reporting,
Self-Assessments, Risk Assessment, Policies
& Standards, and Data Classification.
CISO
7. Securing Dell with Dell – leveraging our strengths
SonicWALL
• 30,000
concurrent
users enjoy
quick, reliable
SonicWall VPN
access
• Manage
changes across
more than 700
firewalls
worldwide.
Dell IAM
• Simplifying IAM
and automated
provisioning
using Dell One
Identity
• Protection
against Insider
Threats using
Dell Change
Auditor
KACE
• Deployed
KACE K1000
Management
Appliance
• Full patch
management
in Dell’s highly
secure,
segmented PKI
environment
DDP | E
• 111,000 Dell
endpoints
encrypted to
keep data safe
in case a
device is lost
or stolen
SecureWorks
• Security
monitoring for all
Dell Firewalls and
IPS
• Monthly 60
billion events
monitored for
Dell