Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit.

Slides:



Advertisements
Similar presentations
Smart Identity Protection That Works for You and Your Users 2 Petri Ala-Annala Senior Principal, CISSP-ISSAP, CISA, CISM.
Advertisements

Symantec Education Skills Assessment SESA 3.0 Feature Showcase
IT Analytics for Symantec Endpoint Protection
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Online Shopping Self-Defense
1 Online Self-Defense: Avoiding Scams Chau Mai December 5, 2013.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Bill McClanahan – Principal Business Consultant LPS Integration.
Click to edit Master title style Click to edit Master subtitle style.
Ilias Chantzos Senior Director, Government Affairs - EMEA Symantec Cyber-security & cyber-resilience: Policy implications in smart cities.
Translation in the Community LRC Localisation in the Cloud Jason Rickard Principal Product Manager, Community.
Security for Today’s Threat Landscape Kat Pelak 1.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Symantec Tech Symposium Randy Cochran, Vice Present Channel Sales – Americas August 17, 2009.
Lloyds 360 Risk Insight Dec 2010 Malcolm Harkins Malcolm Harkins Chief Information and Security Officer General Manager Intel Information Risk and Security.
Backup Modernization with NetBackup Appliances
The Changing Face of Endpoint Security K Varadarajan Regional Manager, Enterprise Sales, Symantec Security Conference 2010_Bangalore.
Symantec De-Duplication Solutions Complete Protection for your Information Driven Enterprise Richard Hobkirk Sr. Pre-Sales Consultant.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Symantec Enterprise Vault Mailbox Continuity.cloud Service Overview
1 When Cloud Networking meets Cloud Computing: Software-Defined Networking (SDN) Customer Application Faan DeSwardt Infrastructure Architecture Manager.
GPS 2011 Slide - 1 COMPETITIVE STRATEGIES APAC Discussion.
Практические аспекты аутсорсинга ИБ Алексей Чередниченко Ведущий консультант, Symantec Services Group 28 апреля 2009.
President’s Forum and WSML 2012 INDSTRAT 02 Mobile Market Dynamics Brian Duckering, Deborah Clark, Evan Quinn “A Day in the Life of Mobile” 1.
Steve Bennett President & Chief Executive Officer NASDAQ OMX International Investor Program December 4, 2013.
Mobile Devices Carry Hidden Threats With Financial Consequences Hold StillInstalled.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
1 Safely Using Shared Computers Amanda Grady December 2013.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
The Changing World of Endpoint Protection
GPS 2011 Slide - 1 MS CERT KIT Microworld Nova. GPS 2011 Slide - 2 Presentation of Microworld Nova The MS Cert Kit MS Cert Kit presentation The backend.
Quick Thoughts on PGP Use Cases for KMIP 1 Michael Allen Sr. Technical Director.
The current state of Cybersecurity Targeted and In Your Pocket Dale “Dr. Z” Zabriskie CISSP CCSK Symantec Evangelist.
President’s Forum and WSML 2012 SYMSTRAT 03: Enterprise Sales Conversations for Virtualization Todd Zambrovitz with guest appearance by Kevin Fiedler 1.
WLAN Auditing Tools and Techniques Todd Kendall, Principal Security Consultant September 2007.
Innovation From the Ground Up Fred Hollowood, Martin Roche.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
The “Five W’s” of Mobile Device Malware: W ho, W hat, W hen, W here, and W hy? … and What Can be Done About It? Kevin McPeak, CISSP, ITILv3 Technical Architect,
Installation of Storage Foundation for Windows High Availability 5.1 SP2 1 Daniel Schnack Principle Technical Support Engineer.
1 APJ Curriculum Paths for Partners Specialization Accelerates Shirley Hoon APJ Partner Enablement Partner Enablement Oct
Copy to Tape TOI. 2 Copy to Tape TOI Agenda Overview1 Technical Feature Implementation2 Q&A3.
Shared Engineering Services APJ Ghostdetect ver 1.0 for SPC Donghyun Seo Dec 12, 2008.
Upstate NY Storage & High Availability User Group October 23, 2009.
FY16 Q3 Enterprise West QBR
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Optimized Synthetics 1 OpenStorage Optimized Synthetics.
Type presentation name here in slide master © 2007 SDL. Company Confidential. Forward-looking information is based upon multiple assumptions and uncertainties.
Partner Proctored Assessment Registration Process Ajit Jha 1 Partner Assessment.
OST Virtual Synthetics 1. Synthetics Overvier Definitions – Catalog – Image – Extent Process Overview (today) – Extent map derivation – Read agenda –
Editing Tons of Text? RegEx to the Rescue! Eric Cressey Senior UX Content Writer Symantec Corporation.
APIs related to NBU AIR Feature 1 OST APIs Related to NBU AIR Feature.
Maximize Profits Through Stronger Security Brook Chelmo Product Marketing
Advanced Endpoint Security Data Connectors-Charlotte January 2016
The time to address enterprise mobility is now
Deployment Planning Services
Now, let’s implement/trial Windows Defender Advanced Threat Protection
Journey to Microsoft Secure Cloud
Automated Response with Windows Defender ATP
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 1.1
Parallelspace PowerPoint Template for ArchiMate® 2.1 version 2.0
Microsoft Education Solutions - Partner Conversation Flow
SAM GDPR Assessment <Insert partner logo here>
Everything Windows User Group Meeting, Aug 2016
The complete developer's guide to the SkyDrive API
The new IT Roadmap planning tool
Microsoft Data Insights Summit
Azure AD Simon May Technical Evangelist.
Presentation transcript:

Cyber Security in the Post-AV Era Amit Mital Chief Technology Officer General Manager, Emerging Endpoints Business Unit

Software and Data powers the world Cyber Security in the Post-AV Era 2

Coffee Shop Office Home Industrial Devices Government Data Web Transactions From a security perspective there is more and more to protect in more and more places Airport … Corporate Assets 3

Cyber Security in the Post-AV Era We’re not succeeding in solving this today… >500M identities were exposed last year 4

Cyber Security in the Post-AV Era Why? There is an asymmetry between attackers and defenders ATTACKERSDEFENDERS Can focus on one target Only need to be right once Hack can be worth millions of dollars Focus only on getting in Attackers can buy and test security products Must defend everything Need to be right every time Blocks are expected & maintain status quo Must balance defense with business impact Defenders can’t pre-test targeted malware 5

If only we could use our collective defense technologies to watch activities, determine patterns, and find anomalies. Cyber Security in the Post-AV Era To balance this, we need an asymmetric advantage of our own 6

Cyber Security in the Post-AV Era To balance this, we need an asymmetric advantage of our own ! We can … Big Data Analytics 7

It’s impossible to implement an attack without leaving a trace Cyber Security in the Post-AV Era Big Data Approach Network Server Endpoint 8

CLOUD Cyber Security in the Post-AV Era What if … Apply Context Correlate & Prioritize We could collect info from every endpoint, network device, and server We could watch this data at the enterprise level – looking for patterns and anomalies We could apply knowledge and learning from across many customers Indicators of Breach Knowledge about URLs, file hashes Attack patterns & actors Correlation across ecosystem ENTERPRISE DEVICES 9

Cyber Security in the Post-AV Era We can do those things Data analysis value comes from ability to apply intelligence on premise & in cloud Data value comes from volume & variety ENTERPRISE CLOUD DEVICES 10

Cyber Security in the Post-AV Era Trace Correlate & Prioritize Connect to actions at other Enterprises ENTERPRISE CLOUD DEVICES Apply Context Correlate & Prioritize This allows us to … Unknown source received by XXX IoCs detected on device Connected to remote server Connection attempted to other higher value targets on enterprise network Link clicked, connection established Files downloaded 11

Cyber Security in the Post-AV Era Result We can apply our asymmetric advantage against theirs 12

Cyber Security in the Post-AV Era Self-Driving CarsMedical Devices“Internet of Things” We’re reaching a critical point – New technologies will require people to feel more secure Photo by: Steve Jurvetson/Wikipedia Creative Commons 13

Thank you! Copyright © 2014 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. Amit Mital “Google Car” Photo Credit: "Jurvetson Google driverless car trimmed" by Flckr user jurvetson (Steve Jurvetson). Trimmed and retouched with PS9 by Mariordo - oogle_driverless_car.jpg. Licensed under Creative Commons Attribution-Share Alike 2.0 via Wikimedia Commons - oogle_driverless_car_trimmed.jpg#mediaviewer/File: Jurvetson_Google_driverless_car_trimmed.jpg.