Rules of Thumb to Mathematical Rule- A Cyber Security Journey

Slides:



Advertisements
Similar presentations
Welcome HITRUST 2014 Conference April 22, The Evolving Information Security Organization – Challenges and Successes Jason Taule, Chief Security.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
The Most Analytical and Comprehensive Defense Network in a Box.
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Web Defacement Anh Nguyen May 6 th, Organization Introduction How Hackers Deface Web Pages Solutions to Web Defacement Conclusions 2.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Department Of Computer Engineering
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
The Most Analytical and Comprehensive Defense Network in a Box.
What is FORENSICS? Why do we need Network Forensics?
Bots Used to Facilitate Spam Matt Ziemniak. Discuss Snort lab improvements Spam as a vehicle behind cyber threats Bots and botnets What can be done.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Advanced Targeted Malware or Advanced Persistent Threat without the marketing BS.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
1 COPYRIGHT © 2015 ALCATEL-LUCENT. ALL RIGHTS RESERVED. Cognitive Security: Security Analytics and Autonomics for Virtualized Networks Lalita Jagadeesan.
IT Security. What is Information Security? Information security describes efforts to protect computer and non computer equipment, facilities, data, and.
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
Network Security Major Problems Network Security Major Problems Why Firewall? Why Firewall? Problems with Firewalls Problems with Firewalls What is.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
FORESEC Academy FORESEC Academy Security Essentials (III)
Computer Security By Duncan Hall.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Sources of Network Intrusion Security threats from network intruders can come from both internal and external sources.  External Threats - External threats.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
© 2016 You Have Alerts. Now What? Brian Carrier VP of Digital Forensics Basis Technology 1.
1. ABSTRACT Information access through Internet provides intruders various ways of attacking a computer system. Establishment of a safe and strong network.
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
An Anatomy of a Targeted Cyberattack
Understanding and breaking the cyber kill chain
Proactive Incident Response
SIEM Rotem Mesika System security engineering
Advanced Endpoint Security Data Connectors-Charlotte January 2016
A Virtual Tour of SophosLabs Building next-generation protection
(A CORPORATE NETWORK APPROACH)
Emanuele Bianchi | EMEA Security GBB
Build AI for Next Generation Cyber Security
Intelligence Driven Defense, The Next Generation SOC
be the strong link in your
Cyber Security Types of Threats How an attack happens
Deep Dive into the Blue VCU Infosec Team.
Dr Paul Lewis Chief Technology Officer
GCED Exam Braindumps
Download Cisco Exam Dumps - Valid Cisco Question Answers - Dumpsprofessor.com
Threat Landscape for Data Security
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Artificial Intelligence Changes the Security Landscape
AKAMAI INTELLIGENT PLATFORM™
Intrusion Detection Systems (IDS)
ISMS Information Security Management System
Shifting from “Incident” to “Continuous” Response
The Next Generation Cyber Security in the 4th Industrial Revolution
Secure once, run anywhere Simplify your security with Sophos
Introduction to Systems Security
Chapter 4: Protecting the Organization
Firewalls and Security
A 5-minute overview of ADAudit Plus
Integrating Deep Learning with Cyber Forensics
Intrusion Detection system
Per Söderqvist Per Söderqvist Sales Engineer
Security intelligence: solving the puzzle for actionable insight
Houston Code Wars Bob Moore March 2, 2019 WWAS 2019 | Confidential.
Cybersecurity Simplified: Phishing
Presentation transcript:

Rules of Thumb to Mathematical Rule- A Cyber Security Journey Bryan Lillie, CTO Cyber QinetiQ

Agenda How did we get here? Today’s state of play SoC Architectures Cyber Security Data Analytics in Cyber AI, Machine Learning and Deep Learning SoC Architectures IDS SIEM Intelligence Led IoT and Industry 4.0 Opportunities for change?

The past….path to the future

Today

Anatomy of an Advanced Cyber Attack Reconnaissance Delivery Exploitation Control Act on intent Egress Find names of employees and set up email accounts in their name Sent a phishing email with a link to a malicious ZIP file sometimes hidden as a pdf Back door opened by link being clicked on by employees. Access through back door, then pass-the-hash or password dumping to escalate privileges Navigate laterally around the network and gather up IP, business contracts, negotiation tactics, internal comms. Extract info from network and share with companies / organisations to get commercial and diplomatic advantage.

Machine learning, AI, Deep learning picture + AV, Anomaly detection, Biological techniques – Attack/Defence Deep Learning Machine Learning Artificial Intelligence Heuristics Pattern Matching Anomaly detection Biological techniques Statistical technique Decision support Automated Attack Engine Data Engineering Data Analytics

Integrated Defences Internet of Evil™ Email Monitor Proxy IDS Firewall Packet Capture Internet of Evil™ Email Monitor Proxy IDS Firewall IPS Web Server Syslog Server NetflowCollector

IoT and Industry 4.0

The Beginning of a journey

Cyber Security Process Forensics Intrusion testing Protective Monitoring Intelligence

Security where next ? Technology Analysis Design Process People

summary Cyber has its roots in Security By Design It has evolved dynamically due to fast moving threat changes Computing power and analytical techniques will allow Machine learning including deep learning Enhanced decision support moving forward Improvements in all aspects of defence including Supply chain management IoT Notes of Caution Attackers can use these techniques Attackers can exploit these techniques

Questions and Discussion Bryan Lillie, CTO Cyber QinetiQ