We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published byDenise Hornby
Modified over 2 years ago
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC Gintaras.email@example.com
2© Copyright 2014 EMC Corporation. All rights reserved. No Shortage of Hard Security Challenges! Infrastructure Transformation Mobile Cloud Less control over access device and back-end infrastructure Threat Landscape Transformation APTs Sophisticated Fraud Fundamentally different tactics, more formidable than ever Business Transformation More hyper-extended, more digital Extended Workforce Networked Value Chains Big Data
3© Copyright 2014 EMC Corporation. All rights reserved. Mainframe, Mini Computer Terminals LAN/Internet Client/Server PC Mobile Cloud Big Data Social Mobile Devices MILLIONS OF USERS THOUSANDS OF APPS HUNDREDS OF MILLIONS OF USERS TENS OF THOUSANDS OF APPS BILLIONS OF USERS MILLIONS OF APPS Source: IDC, 2012 2010 1990 1970 Emergence of the Third Platform
4© Copyright 2014 EMC Corporation. All rights reserved. Emergence of New Attackers Nation state actors PII, government, defense industrial base, IP rich organizations Criminals Petty criminals Organized crime Organized, sophisticated supply chains (PII, financial services, retail) Unsophisticated Non-state actors TerroristsAnti-establishment vigilantes “Hacktivists” Targets of opportunity PII, Government, critical infrastructure
5© Copyright 2014 EMC Corporation. All rights reserved. TIME Evolving Attack Goals and Methods Worms/ Viruses Simple DDoS Phishing Pharming APTs Multi-Stage Hacker Collaboration Disruptive Attacks Destructive Attacks Intrusive Attacks Advanced DDoS Sophisticated Mobile Attacks The Unknown??
6© Copyright 2014 EMC Corporation. All rights reserved. As the world goes mobile cyber crime will follow 1 TREND1 INTH3WILD http://www.emc.com/collateral/fraud-report/current-state-cybercrime-2013.pdf
7© Copyright 2014 EMC Corporation. All rights reserved. World wide Trojans are going deeper underground 2 TREND2 INTH3WILD
8© Copyright 2014 EMC Corporation. All rights reserved. Hacktivism and the ever targeted enterprise 3 TREND3 INTH3WILD
9© Copyright 2014 EMC Corporation. All rights reserved. Account takeover and increasing use of manual assisted cyber attacks 4 TREND4 INTH3WILD
10© Copyright 2014 EMC Corporation. All rights reserved. Fraud-as-a-Service Cybercriminals increase effectiveness of attacks - even leverage big data principles 5 TREND5 INTH3WILD
11© Copyright 2014 EMC Corporation. All rights reserved. Traditional Security Is Not Working Source: Verizon 2013 Data Breach Investigations Report 97% of breaches led to compromise within “days” or less with 72% leading to data exfiltration in the same time 78% of breaches took “weeks” or more to discover 66% took “months or more”
12© Copyright 2014 EMC Corporation. All rights reserved. “…prevention and preventative security controls will fail. Prevention fails on a daily basis at many organizations; it will suffice to look at antivirus tools and contrast their 99%-plus deployment rates with widespread ongoing malware infection rates.” Security Incident Response in the Age of APT, Dr. Anton Chuvakin, Gartner, September 25, 2013
13© Copyright 2014 EMC Corporation. All rights reserved. Intelligence is the Game Changer
14© Copyright 2014 EMC Corporation. All rights reserved. A New Security Approach Is Required IT CONTROLLED PERIMETER-BOUND PREVENTION SIGNATURE-BASED 3 RD PLATFORM 2 ND PLATFORM Mobile Cloud Big Data Social Mobile Devices LAN/Internet Client/Server PC USER-CENTRIC BORDERLESS DETECTION INTELLIGENCE-DRIVEN
15© Copyright 2014 EMC Corporation. All rights reserved. Perimeter-based Static Controls Siloed Management System Historical ReactiveIntelligence Driven Risk-based Dynamic/Agile Controls Contextual/Interactive Management System Shift in Security Models New
16© Copyright 2014 EMC Corporation. All rights reserved. SOC Manager Tier 2 Analyst Analysis & Tools Support Analyst Tier 1 Analyst Threat Intelligence Analyst Achieving Intelligence-Driven Security Critical Incident Response – process, people and technology
17© Copyright 2014 EMC Corporation. All rights reserved. Planning Your Journey Siloed compliance focus, disconnected risk, basic reporting Managed automated compliance, expanded risk focus, improved analysis/metrics Advantaged fully risk aware, exploit opportunity Reduce compliance cost Gain resource & risk visibility Manage known & unknown risks Identify new business opportunities
18© Copyright 2014 EMC Corporation. All rights reserved. Thank you
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
1 © Copyright 2013 EMC Corporation. All rights reserved. Intelligence-Driven Security Art Coviello, Jr. Chairman, RSA The Security Division of EMC.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA.
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
MIS323 – Business Telecommunications Chapter 10 Security.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Why SIEM – Why Security Intelligence??
Paul King Director, Threat Intelligence CiscoSystems.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Security Life Cycle for Advanced Threats
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Ali Alhamdan, PhD National Information Center Ministry of Interior
The shadow war: What policymakers need to know about cybersecurity Eric Miller Vice President, Policy, Innovation, and Competitiveness Canadian Council.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Sky Advanced Threat Prevention
Malware\Host Analysis for Level 1 Analysts “Decrease exposure time from detection to eradication” Garrett Schubert – EMC Corporation Critical Incident.
UNCLASSIFIED Cybercrime: The Australian Experience Australian Cybercrime Online Reporting Network (ACORN) Conference Assistant Commissioner Tim Morris.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Company Overview & Strategy Lance McAndrew Product Line Sales Engineer.
Insider Threat Nation States Cyber Crime Hactivist Cyber Terrorist IndustrializedHackers Dynamic Cyber Security Landscape Cyber Actors ThreatsThreats.
The Changing World of Endpoint Protection
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Cyber Security: Now and.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Dell Connected Security Solutions Simplify & unify.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Territory Insurance Conference, resilient future Mr Ralph Bönig, Special Counsel, Finlaysons Cyber Times and the Insurance Industry Territory Insurance.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
1. 2 A High Tech Crime Investigation Lessons learned by the National High Tech Crime Center Hans Oude Alink, project leader NHTCC November 2005.
1© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threat Sachin Deshmanya & Srinivas Matta.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Welcome HITRUST 2014 Conference April 22, The Evolving Information Security Organization – Challenges and Successes Jason Taule, Chief Security.
1 © Copyright, Risk Masters, Inc All rights reserved.Draft for Discussion Purposes Only RMI Risk Masters, Inc. Emerging Trends in Cyber-Security.
Computer Crime and Information Technology Security
Mobile Technology and Cyber Threats Deon Woods Bell Office of International Affairs The Fifth Annual African Consumer Protection Dialogue Conference Livingstone,
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Friday 22nd April 2016 DS Chris Greatorex SEROCU
1 | Company Confidential The Modern Cyber Threat Pandemic Cameron Erens LogRhythm.
A Layered Approach to Support Extranet Security Ralph Santitoro Director of Security Solutions - Nortel SUPERCOMM 2005 Panel 2 Session - June.
Cyber Security Discussion Craig D’Abreo – VP Security Operations.
1 Security & TWU Robert Placido Associate Provost for Technology and CIO Contents used with permission from FireEye.
Managing Threats in Changing World John DeGroot Lead Architect – Security, RBC Federation of Security Professionals – October 26, 2012.
Cyber Crime and Technology
Safe’n’Sec IT security solutions for enterprises of any size.
1 | Company Confidential The Modern Cyber Threat Pandemic Nate Traiser Mtn Region Ent Sales Engineer
Ch.5 It Security, Crime, Compliance, and Continuity
© 2017 SlidePlayer.com Inc. All rights reserved.