Presentation is loading. Please wait.

Presentation is loading. Please wait.

Proactive Cyber Defense Alper Botan, Ph.D.. 2 / 10 Targets of Cyber Attacks (2013)

Similar presentations


Presentation on theme: "Proactive Cyber Defense Alper Botan, Ph.D.. 2 / 10 Targets of Cyber Attacks (2013)"— Presentation transcript:

1 Proactive Cyber Defense Alper Botan, Ph.D.

2 2 / 10 Targets of Cyber Attacks (2013)

3 3 / 10 Average Discovery Timeline For Attacks (2013) Stastistics for cyber espionage BREAKING NEWS iPhone 6 Clone to Hit the Market Before Apple's Smartphone «X» is famous for releasing very similar looking clones of flagship smartphones, and its clone handset portfolio already includes «X» M8 (clone of the HTC One M8), «X» S5 (clone of the Samsung Galaxy S5), and «X» i5S (clone of the iPhone 5s).

4 4 / 10 Data / Information Systems Networks / Communications Cyber Intelligence Data/Info mining Large volume data analysis Electronic intelligence Attack perception Backdoor scanning Decision support systems..... Services Processes Cyber security team PRO-ACTIVE Cyber Defense Situational awareness Mapping DDOS prevention BOT prevention SIEM Network sensors Log, data, flow analysis..... Services Processes Cyber defense team ACTIVE Complete Cyber Security Approach Level of situational awareness and security Data / Information Systems Networks / Communications IT Security Firewall Anti-virus Spam filtering Anti-spyware Content analysis IDS/IPS UTM Password mgmt PKI Encryption VPN NAT Backup/recovery..... Services Processes IT team PASSIVE

5 5 / 10 It is all about …  Defense Systems (passive, active, proactive)  People (admins, info analysts, reaction teams)  Procedures (emergency, backup/recovery, …)

6 6 / 10 THALES Products Mistral Datacryptor ECHINOPS TCE 621 TEOPAD Cryptos & Mobile nShield connect nShield Solo nShield Edge HSMs THEMIS ELIPS Security GW Diodes and Gateways Sensing equipment CYBELS Map View Int - Decision Practice Cyber defense Sensors iStop ACTIVE AND PROACTIVEPASSIVE

7 7 / 10 THALES and YALTES Services “Secured by Thales” end-to-end security approach Training Security Risks analysis Security design Security implementation Residual risks analysis & evaluation Forensics & incident response Security testing

8 8 / 10 Proven solutions Thales products currently protect systems for:  21 NATO member countries  19 of the 20 largest banks in the world  3,000 financial institutions worldwide  Securing over 70% of the worldwide payment transactions  4 out of 5 top energy companies  4 out of 5 aerospace companies

9 9 / 10 Security via Intelligence: CYBELS

10 10 / 10 THANK YOU www.thalesgroup.com mustafa-alper.botan@thalesgroup.com


Download ppt "Proactive Cyber Defense Alper Botan, Ph.D.. 2 / 10 Targets of Cyber Attacks (2013)"

Similar presentations


Ads by Google