Improving Security By Embracing The Cloud

Slides:



Advertisements
Similar presentations
1 SANS Technology Institute - Candidate for Master of Science Degree 1 Automating Crosswalk between SP 800, 20 Critical Controls, and Australian Government.
Advertisements

1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
APT in Corporate America and the Exposure to Foothold Scenarios Nathaniel Puffer Technical Lead, Neohapsis Labs.
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
1© Copyright 2011 EMC Corporation. All rights reserved. Crash Course: how to be become a successful Cyber Criminal Uri Rivner | Head of New Technologies.
SPEAKER BLITZ ERIC BROWN Senior Systems Engineer NICK JAVANOVIC DoD Regional Sales Manager.
1www.skyboxsecurity.com Skybox Cyber Security Best Practices Three steps to reduce the risk of Advanced Persistent Threats With continuing news coverage.
A Case Study: Citi-bank Asia- Pacific. Agenda Background Problems Strategies Implementation Conclusion.
Export Development Canada Presentation to Canadian Forage and Grasslands December 14, 2010.
World Cities Adapted from a presentation by David Palmer & Phil Kline.
Cyber Security Finance Forum 2012 Michael DuBose Managing Director & Practice Leader Cyber Investigations.
World Cities. Top Ten Cities,1950 (estimated from various sources) City Pop (in millions) Lat Long New York, USA N 74 W London, UK8.752 N 0 Tokyo,
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
November 2010 Your Partner for Exports and Investments in Latin America November 2010 Export Development Canada (EDC)
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
About Schroders At Schroders, asset management is our business and our goals are completely aligned with those of our clients - the creation of long-term.
Dell Connected Security Solutions Simplify & unify.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Abab The Challenges of L&D in a Global Environment 7 th Annual Corporate University Xchange Awards.
The Changing World of Endpoint Protection
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Ali Alhamdan, PhD National Information Center Ministry of Interior
TOP 10 TECHNOLOGY INITIATIVES © Robert G. Parker S-1 Issues Loss or theft of mobile devices Lack of MDM (mobile device management) software Cloud.
The Service-Based Enterprise Jonathan Wilkinson Director of Product Management, Websense.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Best Place in the World for Social Entrepreneurs Singapore as a Social Silicon Valley? Cross-Border Innovation & Entrepreneurship Global Symposium 4 December.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
AZURE ACTIVE DIRECTORY Abdullah Zaib Software Engineer Azure AD, Microsoft.
Urban Geography: overview Created by David Palmer Eaglecrest High School.
Web security | data security | security © 2010 Websense, Inc. All rights reserved. Strategy for Defense Against Web-based Advanced Persistent Threats.
FROM SECURITY DATA TO SECURITY INTELLIGENCE ZULFIKAR RAMZAN, CTO, RSA.
Azure in Education Improve your services and reduce your overhead at the same time.
WEBINAR Review- “Advanced Threat Protection – Can Technology alone deliver what’s needed?” Patrick Grillo, Senior Director, Security Strategy 1.From my.
White Paper: Enterprise Encryption and Key Management Strategy 1 Vormetric Contact: Name: Tina Stewart (send traffic.
Cybersecurity as a Business Differentiator
Best Practices from Top Outsourced Cities & Regions Outsource2LAC 2017
The Changing World of Endpoint Protection
Direct-to-cloud Issues & Implications Dale McCarty.
Information Security Program
Barracuda Web Security Flex
Comprehensive Security and Compliance at an Affordable Price.
FORCEPOINT Moving Your Business Forward Without Fear
Journey to Microsoft Secure Cloud
Real-time protection for web sites and web apps against ATTACKS
Global Cities Odd One Out
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
Variant Market Research
(1) All flows (2) International flows
Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği
Office 365 with confidence: security features for Office 365
Jon Peppler, Menlo Security Channels
بهترین راهکار را انتخاب کنید...
Web Application Development Company - Sara Analytics Pvt. Ltd.
Strong Security for Your Weak Link:
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
World Cities.
Skybox Cyber Security Best Practices
Secure once, run anywhere Simplify your security with Sophos
Strategic threat assessment
Information Protection
RRA introduction 14th July 2016 Prepared by: Puneet Kalra.
Security Trends and Threats Affecting Innovations in Technology
Threat Landscape Update
GLOBAL DIGITAL FORENSICS MARKET 2017 – 2025 Published by :Accurize Market Research Pvt. Ltd. Copyright © 2019 Accurize Market Research
Information Protection
To Pay or Not to Pay? Intelligent Ransomware Response
Presentation transcript:

Improving Security By Embracing The Cloud Jonathan Wilkinson Director, Product Management TRITON™ Web Security Email security Data Security

What is an APT? APTs Targeted Attacks Perpetrators Nation states Advanced cybercriminals Targets Governments and strategic corporations and organizations Mid-sized and large organizations Goals Political and large-scale economic gain from intellectual property theft Financial gain, through ID info to sell to fence, or anything of value to ransom Methods Custom developed, targeted, blended, patient, well-funded Very similar to APTs, but use off-the-shelf toolkits vs. custom ones Some are, but the majority are not The originator is different, but the method of attack is the same Regardless of name, the business impact is real The attacks need blended defenses, one single technology won’t stop it APT definition Perpetrator Generally a well-funded and highly talented government or group acting on behalf of a government. Target Usually another government’s top-secret data or an organization’s strategically guarded data. Goal Political or economic gain or advantage. Methods Advanced: Full spectrum of sophisticated intelligence-gathering technology and ever-changing combinations of the most advanced and off-the-shelf tools. Multiple vectors of attack, often including specifically crafted malware targeting unknown zero-day vulnerabilities. Persistent: Patient, steady, ongoing monitoring to find vulnerabilities; search for target data; repeated attempts, changing tactics if detected to try, try again; will rarely if ever give up.

FUD? Read about examples yourself: Search ‘RSA breach’, ‘Aurora’, ‘Epsilon breach’ Find out about the latest security threats: Sign-up to our RSS at securitylabs.websense.com

Websense Global Cloud Footprint Current Data Centers (ISO 27001 Certified) US (2) San Jose Ashburn Europe (6) Heathrow, Feltham, Dusseldorf, Paris, Frankfurt, Geneva APAC (2) Hong Kong, Sydney Mumbai, India New Data Centers 2011 Brazil, Sao Paulo 2012 (tentative) Mexico City, Mexico South Africa Singapore Central US Middle East

Cloud Roadmap Cloud Email & Web Security 2007 Hybrid Web Added in Web Security Gateway 2010 Hybrid Email Added in Email Security Gateway 1Q11 Websense Mobile Security Service 1H12 Cloud DLP (Enterprise DLP for Mobile & Cloud Customers) 2H12