Mind the Security Gaps: Modern Cybersecurity Threats Mike Ruiz Systems Engineer.

Slides:



Advertisements
Similar presentations
Worry-Free Business Security 7
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
Web Traffic Offload of MPLS Networks
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Security for Today’s Threat Landscape Kat Pelak 1.
“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Taking Control of Cloud Security Travis Abrams. Consulting and Professional Services Health checks Deployment services Strategic Partner VAR Board Leadership.
Information Security in Real Business
Zscaler Web Security Services Your Name Contact Info August 2009 Zscaler Proprietary & Confidential.
LittleOrange Internet Security an Endpoint Security Appliance.
Mobility Methods for document access while away from the office.
Barracuda Networks Steve Scheidegger Commercial Account Manager
DIRECT-TO-CLOUD Issues & Implications Dale McCarty.
Cyber Security Finance Forum 2012 Michael DuBose Managing Director & Practice Leader Cyber Investigations.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
New Era of Live Streaming Live Smooth Streaming CDNetworks Bongseok Kim I Team Leader Marketing Div. Marketing Team.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Protecting Customer Websites and Web Applications Web Application Security.
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Chicago’s Global Status: Is Chicago a “global city”? GaWC: rates cities’ “global” status [Globalization and World Cities Study Group & Network: Loughborough.
Telling the right story Confidential © Bloor Research 2010 …optimise your IT investments Click to edit Master subtitle style Malware—taking protection.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
Hosted Security: Complete Protection With A Peace Of Mind Leonard Sim Client Services Manager – South Asia Symantec Hosted Services 1.
 INADEQUATE SECURITY POLICIES ›Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
Complete Security. Threats changing, still increasing Data everywhere, regulations growing Users everywhere, using everything We’re focused on protecting.
European Cities in the World City Network, 2010 Peter Taylor.
Abab The Challenges of L&D in a Global Environment 7 th Annual Corporate University Xchange Awards.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Changing World of Endpoint Protection
AWS Cloud Firewall Review Architecture Decision Group October 6, 2015 – HUIT-Holyoke-CR 561.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Security Version 6.1 | August Need for Complete Security Stop threats at the perimeter High volume spam, phishing, viruses and.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
Computer Security By Duncan Hall.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
10 th February, 2016 Retail in the era of the connected customer Retail Leadership Summit 2016 Principal, A.T. Kearney Subhendu Roy
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
GDPR Impact.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Your Partner for Superior Cybersecurity
Direct-to-cloud Issues & Implications Dale McCarty.
Exchange Online Advanced Threat Protection
Barracuda Web Security Flex
Comprehensive Security and Compliance at an Affordable Price.
Do you know who your employees are sharing their credentials with
Secrets to Optimize Office 365 Performance
Real-time protection for web sites and web apps against ATTACKS
Jon Peppler, Menlo Security Channels
Exchange Online Advanced Threat Protection
Check Point Connectra NGX R60
The Next Generation Cyber Security in the 4th Industrial Revolution
Secure once, run anywhere Simplify your security with Sophos
RRA introduction 14th July 2016 Prepared by: Puneet Kalra.
Cybersecurity Simplified: Phishing
Presentation transcript:

Mind the Security Gaps: Modern Cybersecurity Threats Mike Ruiz Systems Engineer

Disclosure: Mike is a Senior Systems Engineer at zscaler, the largest global internet Security as a Service provider. 1

Recent Major Data Breaches 2014 Breaches Reported2015 Breaches (So Far)

2016 Data Breaches as of 20 Jan 16

What are security threats today? Wyndam Hotel Group: $5B in Rev, 33k employees Fined by the FTC for inadequate protection of data. 500,000 Credit Card Numbers stolen, $10.6M in Fraud Losses Caused by malware on Wyndam Employee Computers Happened Three times 4

What are security threats today? Target Corporation, $72B in Rev, 347k employees 11GB of data stolen, affecting 110M people Undetected for three weeks despite advanced security systems Hackers phished a 3 rd party contactor outside Target perimeter Gained access to servers when the contractor entered Target’s network 5

6

Security threats have evolved Server Targets Worms Bots and RATs Malicious Code User Focused Via Flash, APK, Office Documents, PDF, JPG, etc. Bots and RATs 7

Your security must be in-line and stop both infections and exfiltration from happening Time to infection is seconds; time to exfiltration is minutes Data breaches can continue for months Days 246 Days ~180 Days 106 Days 18 Days Source: 2015 Verizon DBIR Timespan of events within POS Intrusions SecondsMinutesHoursDaysWeeksMonthsYearsNever Compromise n=169 Exfiltration n=169 Discovery n=178 0% 1% 85% 13% 1%0% 1% 88% 11% 0% 1% 11% 1%0% 36% 51%

9 Chart: Threats blocked for typical Zscaler client, 2015 Attacks are broader, deeper and more sophisticated than ever before. Attacks span multiple vectors – only security platforms can see this % APT 0.73% Cross-site Scripting 0.95% Virus 4.8% Peer to Peer 24% Botnet Calls 2.1% Cookie Stealing 0.8% Browse r Exploits 0.33 % Phishing 66.2% Malicious Content

Why have threats evolved? Endpoint AV/AS Endpoint firewalls Patch provisioning processes Sandboxing technologies …. But really, the perimeter and point solutions are leaky 10

Traditionally organizations secured their perimeter with security appliances in the data center HQRegional offices Data center Perimeter Internet Internet gateway

Reality Check: Can you Afford to Build This? Expensive to purchase and to operate, complexity introduces security gaps Slows Internet performance, fails open under load Often bypassed by mobile devices Source: Global 1000 network security diagram, August 2014 Flow management Load balancers Edge firewall SSL Server – side SSL tunnel Aggregation firewall SSL PAC File , , 16 Client - side SSL tunnel SSL Sandbox 6, 18 7, 12, 19, , 21 8, 20 4, 5 SSL 24, 25 Web Filter SSL 11 Log files Content Inspection

But with the new world of IT, there is no perimeter anymore On-the-goHome officeInternet of thingsMobile Internet HQRegional offices Data center

Shadow IT? ‣ Shadow IT is not shadow. It’s the real way IT works today. The term shadow IT is being used by people who want to stop that transition – the transition to cloud. ‣ The transition to cloud is a business driven decision, not a technology driven decision. ‣ CEO’s see Uber, AirBnB, Amazon, etc and realize they need to be in the game because growth is worth more than productivity. ‣ Cloud and Connectivity is the game. ‣ Bring the real IT out of the shadows. The business will force you to do it.w 14

Security appliances: Approach to the new world of IT HQ Slow, complex, & expensive Branches / stores Home office Internet of things Regional offices Branches / stores Home office Regional offices Too many gateways to buy, deploy & manage

Reality Check: Can you Afford to Build This ? Expensive to purchase and to operate, complexity introduces security gaps Slows Internet performance, fails open under load Often bypassed by mobile devices Source: Global 1000 network security diagram, August 2014 Flow management Load balancers Edge firewall SSL Server – side SSL tunnel Aggregation firewall SSL PAC File , , 16 Client - side SSL tunnel SSL Sandbox 6, 18 7, 12, 19, , 21 8, 20 4, 5 SSL 24, 25 Web Filter SSL 11 Log files Content Inspection

Today’s approaches and solutions are failing to protect you Security gaps Performance limitsCoverage gaps

You MUST Scan Everything, Always. HQ Regional offices Branches / storesFactories On-the-goHome officeMobile Internet of things Protect everything else Protect the data center Protect the device MDM, Device encryption, AV FW/IPS, WAF, DDOS, App sec.

A Global Checkpost between users and the Internet Branches / stores Home office Mobile Internet of things Always Connected Regional offices Consumer Cloud Private Cloud Commercial Cloud Public Cloud Scan EVERYTHING including SSL Block known and unknown threats Prevent IP leakage Enforce business policy Improve Internet performance Increase IT & user productivity

Zscaler Public Date Centers The Worlds Largest Security Cloud Los Angeles Dallas Denver Toronto New York Washington Atlanta Miami Paris Sao Paulo Johannesburg London Amsterdam Oslo Bern Frankfurt Gdansk Stockholm Moscow Mumbai Singapore Sydney Hong Kong Tokyo Madrid Taipei Dubai Riyadh Cairo Kuwait City Some DCs may incur premium charges. Contact Sales for details. Kuala Lumpur Cape Town Services in the Middle East are delivered by a Zscaler in-country Service Provider Partner. July 2015 San Francisco Sunnyvale Amman Marietta Herndon Ft. Worth Chicago Lagos Tel Aviv Milan * NOTES: Private ZEN option is available in China. Copenhagen Active Data Centers Upcoming DC’s (within 3 mos.) Underlined sites support future peering Melbourne Zurich

Zscaler is a comprehensive, unified Internet Security and Compliance platform 21 Global Software as a Service platform & operations Advanced persistent threat protection Data loss prevention Guest Wifi protection Cloud application visibility & control Next generation firewall Protecting all locations, all devices, all ports & all protocols Unified Policy management SSL inspectionReporting & analytics Web security

How Safe Are You? 22 “You’re as secure as the next employee who clicks a button and accidentally launches ransomware in your network” -Patricia Titus Former Security Expert at DoD, Former CISO Symantec, TSA, Unisys, Freddie Mac Now CISO at Markel Corporation

Thank You