Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.

Slides:



Advertisements
Similar presentations
Stonesoft Roadmap WHAT FEATURES WILL COME IN
Advertisements

Slide title :40-47pt Slide subtitle :26-30pt Color::white Corporate Font : FrutigerNext LT Medium Font to be used by customers and partners : Arial Copyright©2011.
Security for Today’s Threat Landscape Kat Pelak 1.
Managed Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Barracuda Web Application Firewall
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Know the Client Own the Problem Share the Solution The 2005 Case for Information Technology Security October 14, 2004.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Network Intrusion Detection Systems Slides by: MM Clements A Adekunle The University of Greenwich.
SIM334. Internet Comprehensive Protection Multi-Engine Antivirus and Multi layered continuously evolving Anti-spam In the Leader’s quadrant in the.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Norman SecureSurf Protect your users when surfing the Internet.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
[Name / Title] [Date] Effective Threat Protection Strategies.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
Marketing of Information Security Products. The business case for Information Security Management.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
PCI: As complicated as it sounds? Gerry Lawrence CTO
© 2006 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Cisco ASA 5500 Series Content Security Edition License Renewal Program.
Fortinet An Introduction
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
1 مديريت فناوري اطلاعات و ارتباطات نشست تخصصي كاربرد ارتباطات ماهواره اي در مديريت بحران و راهكارهاي نوين محافظت اطلاعات سازمان ها 27 مهرماه 1390 مديريت.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
10/14/2015 Introducing Worry-Free SecureSite. Copyright Trend Micro Inc. Agenda Problem –SQL injection –XSS Solution Market opportunity Target.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Basic Security Networking for Home and Small Businesses – Chapter 8.
Customers Security in Context Microsoft & Office 365 / Azure Cloud Security Engagement Framework & References Real World application Frameworks.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Premises Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet regulatory compliance?
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
1 #UPAugusta Today’s Topics What are Deadly IT Sins? Know them. Fear them. Fix them. #UPAugusta201 6.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
BYOD: An IT Security Perspective. What is BYOD? Bring your own device - refers to the policy of permitting employees to bring personally owned mobile.
Managing End Point Security Starts at the Perimeter DIR ISF April 14&15, 2016 Randy Guin, CISSP, CGEIT.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
Cosc 5/4765 NAC Network Access Control. What is NAC? The core concept: –Who you are should govern what you’re allowed to do on the network. Authentication.
OIT Security Operations
Cloud Firewall.
HP ProCurve Alliance + Dr Carl Windsor CISSP Major Account Manager
Data Center Firewall.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Firewall as a Service Market to grow at 25% CAGR from 2017 to 2024: Global.
Beyond Today’s Perimeter Defense: Radware Attack Mitigation System (AMS) Benjamin Radtke Senior SE Radware North/East Germany September 2011.
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Secure once, run anywhere Simplify your security with Sophos
Security week 1 Introductions Class website Syllabus review
In the attack index…what number is your Company?
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack

Early days, isolated networks Only concerned with internal & physical security. IT Security

Connecting to the Internet was awesome but fraught with risks that were not well understood – viruses: easy to distribute malicious code globally – Brute force attacks on vulnerable targets: Why patching is critical – DOS/DDOS: modernized snowball fights – Bots/Malware: the mode of choice for digital warfare IT Security

Attacks are now about money (Cybercrime) Current State of IT Security

CryptoLocker ($30M-$40M estimated lost in ransoms) Copycat programs on the rise (over half of incidents in last 6 mo are ransomware) Current State of IT Security

Zeus/Zbot (old but widely used to steal information on local machine or install additional malware) Current State of IT Security

High profile mass Identity thefts (Target, TJ Max, Home Depot, various Universities, etc) 2014: ITRC reports 546 breaches effecting ~19M records – Identity Theft Resource Center Current State of IT Security

SPAM is a fact of life but generally under control AntiVirus/Malware risk is rampant especially with BYOD trends Patching is still a huge issue in the SMB space Typical business doesn’t separate Users from Servers let alone servers from each other. Most businesses have at least a Stateful firewall, UTM is financially in reach now and 60% of Enterprises have deployed Critical Websites deploy Firewall, UTM, and WAF Most businesses still have no dedicated security staff Forbes Magazine states corporate network security is an over $60 billion industry. Current State of Internet Security

And it is getting worse…

200 Security Engineers ~250,000 AV Signatures per week 100 new IPS Signatures per week 1 Million URLs rated per week 60 Million SPAM Signatures per week Application signatures developed and growing Industry Info: FortiGuard Labs

So how do we protect ourselves?

Packet Filters: 1988 Host-based AntiVirus: ~1987 Stateful Software Firewalls: Checkpoint firewalls: Stateful Firewalls with ASICs: Netscreen 1997 IDS: NetRanger 1995 SPAM Filtering Application Layer Gateways (Basic, RFC Compliance, parameter policies) Inline AntiVirus IPS Application Layer Firewalls (Modern deep inspection, WAF) DLP Tools SIEM: Event Correlation like Cisco MARS, Solutionary ActiveGuard, etc. Brief Evolution of IT Security Tools

It is: No one solution solves the issue. ISO and provide great roadmap for security planning. Engage a reputable partner. Determine what risks your organization is exposed to. Identify the costs associated with those risks Balance your mitigation strategy against the identified risks Implement an ongoing security program to assess and modify your mitigation strategy. Sound Complicated?

ISO Certification (IT Service Delivery process and controls) SSAE-16 SOC 1 Type II Completed (Annually since 2008) Managed Security (Managed Firewall and UTM appliances from Fortinet and Cisco) since 2000 Managed SIEM Services Security Assessment and Professional Services customized to your needs. LightEdge Can Help

Nate Olson-Daniel Principal Engineer & Director of Strategic Development LightEdge Solutions, Inc Thank you!