Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Security Life Cycle for Advanced Threats
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Security for Today’s Threat Landscape Kat Pelak 1.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
[Name / Title] [Date] Effective Threat Protection Strategies.
Did You Hear That Alarm? The impacts of hitting the information security snooze button.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Friday 22nd April 2016 DS Chris Greatorex SEROCU
1Copyright © 2015 Blue Coat Systems Inc. All Rights Reserved. BLUE COAT SYSTEMS CORPORATE OVERVIEW May 2015.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
DHS Publishes Report Saying Low but Persistent Risk of Cyber Attack on Energy Sector DHS REPORT ON ENERGY CYBERSECURITY April 6, 2016 | Ben Booker Source:
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Surveillance and Security Systems Cyber Security Integration.
Threats & Challenges in the Digital World EY 2015 Global Information Security Survey.
Protect your Digital Enterprise
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Cybersecurity as a Business Differentiator
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Your Partner for Superior Cybersecurity
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
A Virtual Tour of SophosLabs Building next-generation protection
The Economics of Cyber Security
Cyber Security Zafar Sadik
Improving the effectiveness of cyber security – controlling people, process and technology 10 April 2014.
Juniper Software-Defined Secure Network
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
Cybercrime: Mitigation Challenges
Cyber Security: State of the Nation
Introduction to a Security Intelligence Maturity Model
Trends in Ransomware Distribution
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
بهترین راهکار را انتخاب کنید...
CYBER CRIME Matthew Purchase.
Threat Landscape for Data Security
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Strong Security for Your Weak Link:
Threat landscape financial sector
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Securing the Threats of Tomorrow, Today.
Brandon Traffanstedt Systems Engineer - Southeast
CRITICAL INFRASTRUCTURE CYBERSECURITY
Cyber Security Culture
Strategic threat assessment
Information Protection
DATA BREACHES 6 4 , 9 3 There were…
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Figuring out CyberSecurity Return On Investment
About Us Scanster is one of the leading IT security software company. Our Software's are well integrated system that simplify computer security management.
Leading financial services provider
Information Protection
Cybersecurity Simplified: Phishing
Presentation transcript:

Gelişmiş Tehdit Korumasının İnkar Edilemez 4 Gerçeği Engin Özbay IBM Security Ülke Lideri, Türkiye enginoz@tr.ibm.com

More companies are revealing massive breaches Security has never been more critical, with increasing numbers of companies revealing massive breaches of their computer systems. How serious is the problem? The annual global cost of cybercrime is estimated to be more than USD400 billion—equaling the gross national income of many countries.1   The soaring number of breaches has created a new security reality, with more risk and greater damage inflicted. To measure the damage, Ponemon Institute has been doing benchmark research for years on the cost of a data breach, the most common type of incident. In the 2015 report, the global average for the total cost of a data breach was found to be USD3.79 million, a 23 percent increase since 2013.2 Estimated annual global cost of cybercrime: over USD400 billion1 Global average cost of a data breach: USD3.79 million—a 23 percent increase since 20132

Is your security team prepared? Broad Attacks Targeted Attacks Indiscriminate malware, spam and DoS activity Advanced, persistent, organized, politically or financially motivated Tactical Approach Compliance-driven, reactionary Strategic Approach Intelligence-driven, continuous Build multiple perimeters Protect all systems Use signature-based methods Periodically scan for known threats Read the latest news Shut down systems Assume constant compromise Prioritize high-risk assets Use behavioral-based methods Continuously monitor activity Consume real-time threat feeds Gather, preserve, retrace evidence New threats require a new approach to security, but most are defending against yesterday’s attacks, using siloed, discrete defenses

The Dyre Wolf campaign is run by a ring of unusually well-funded, experienced and intelligent people Source: IBM MSS, “Inside the Dyre Wolf malware campaign“

Four truths about advanced threat protection Despite increasing challenges, organizations can protect themselves by adopting the right strategy Four truths about advanced threat protection 1 Prevention is mandatory Traditional methods of prevention have often failed, leaving many to believe detection is the only way forward. This is a dangerous proposition. 2 Security Intelligence is the underpinning Specialized knowledge in one domain is not enough. It takes enterprise-wide visibility and maximum use of data to stop today’s threats. 3 Integration enables protection The best defense is relentless improvement. Technologies must seamlessly integrate with processes and people across the entire lifecycle of attacks. 4 Openness must be embraced Security teams need the ability to share context and invoke actions between communities of interest and numerous new and existing security investments.

A dynamic, integrated system to help stop advanced threats The IBM Threat Protection System Break-in 1 Latch-on 2 Expand 3 Gather 4 Exfiltrate 5 Attack Chain

Renaissance Istanbul Polat Bosphorus Hotel Barbaros IBM X-Force Security Roadshow, Istanbul - 2 December 2015 Renaissance Istanbul Polat Bosphorus Hotel Barbaros A Walk On The Wild Side: Real stories from real security incidents, security testing, and things that go bump in the net. Dark Web, Dark Net: How Much Do We Know? When sacked employees hit back. TOR - but there's not just TOR! Ransomware, holding 500,000 key business files to ransom. Pay up or? How we phished a bank account containing in excess of 10M USD. You are invited !!!