Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Advertisements

1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Malware\Host Analysis for Level 1 Analysts “Decrease exposure time from detection to eradication” Garrett Schubert – EMC Corporation Critical Incident.
Classification The Threat Environment Joyce Corell, NCSC Assistant Director for Supply Chain National Defense Industrial Association Global Supply Chain.
Security for Today’s Threat Landscape Kat Pelak 1.
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
1© Copyright 2011 EMC Corporation. All rights reserved. Crash Course: how to be become a successful Cyber Criminal Uri Rivner | Head of New Technologies.
By Ashlee Parton, Kimmy McCoy, & Labdhi Shah
Welcome to New Hire Orientation Information Security
Cyber-Warfare: The Future is Now!
Security Awareness Challenges of Security No single simple solution to protecting computers and securing information Different types of attacks Difficulties.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
1 Title ECI: Anatomy of a Cyber Investigation Who Are the Actors.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Cyber Security Nevada Businesses Overview June, 2014.
What does secure mean? You have been assigned a task of finding a cloud provider who can provide a secure environment for the launch of a new web application.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The Changing World of Endpoint Protection
Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.
An Introduction to Cyber Dr Mark Hawksworth Technology Practice Group Leader.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
DRAFT 1 Belfast th World Cyber Security Technology Research Summit Suren Gupta Allstate Corporation Executive Vice President Allstate Technology.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
© IDT911, LLC. All Rights Reserved — Confidential 0 Cyber and Privacy Breach Coverages.
Cybersecurity Risk, Remediation, Response Nathan Gibson, CCE, CEH.
Computer Security By Duncan Hall.
MIS323 – Business Telecommunications Chapter 10 Security.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Cyber Attack – Not a case of if, but when! Housing Technology 2016 Kevin Doran – Chief Technology Officer Tim Cowland – Principal Consultant.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
FROM SECURITY DATA TO SECURITY INTELLIGENCE ZULFIKAR RAMZAN, CTO, RSA.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
Defining your requirements for a successful security (and compliance
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Karsten Chearis Sales Engineer.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Burke.
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Public Facilities and Cyber Security
Journey to Microsoft Secure Cloud
Cyber Security: State of the Nation
A Project on CYBER SECURITY
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
F5 PRO ASSETS We’ve created these Pro Assets to help you communicate to your team the importance of app security and performance. Feel free to remove.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them David Hood Director of Technology Marketing.
Making a Holiday Special For All The Right Reasons
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Bird Team Lead, Account Executive.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Michael Vanderhoff.
Forensics Week 11.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Cybersecurity Awareness
Agenda Consumer ID theft issues Data breach trends Laws and regulations Assessing and mitigating your risk.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Andrew Cotton.
Cybersecurity Hygiene
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
CRITICAL INFRASTRUCTURE CYBERSECURITY
ე ვ ი ო Ш Е Т И О А С Д Ф К Ж З В Н М W Y U I O S D Z X C V B N M
Data Loss Prevention in Office 365
Chapter 1: The Need for Cybersecurity
Keeping your data, money & reputation safe
Protecting Your Company’s Most Valuable Asset
Anatomy of a Large Scale Attack
Strategic threat assessment
National Information Assurance (NIA) Policy
Texas Assisted Living Association 2019 Conference
Presentation transcript:

Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

2 © Copyright 2015 EMC Corporation. All rights reserved. The State of the Problem EMC CONFIDENTIAL – FOR INTERNAL USE ONLY

3 © Copyright 2015 EMC Corporation. All rights reserved. Agenda

4 © Copyright 2015 EMC Corporation. All rights reserved.

5 Why is everyone picking on me?

6 © Copyright 2015 EMC Corporation. All rights reserved. What would anyone want from me?

7 © Copyright 2015 EMC Corporation. All rights reserved. Do you know how much it can cost? 2,644 Breaches * 267 Million Records * $5.5M cost per Breach * $194 cost per Record * 99% records lost due to external hacking * 97% of data breach incidents were avoidable * Target cost $162 million – AFTER INSURANCE –* numbers from the Online Trust Alliance Guide to Data Protection and Breach Readiness (2013)

8 © Copyright 2015 EMC Corporation. All rights reserved. The Adversary – who is after you CRIMINALS Unsophisticated, but noisy Organized, sophisticated supply chains (PII, PCI, financial services, retail) Organized crimePetty criminals NON-STATE ACTORS Various reasons, including collaboration with the enemy Political targets of opportunity, mass disruption, mercenary Cyber-terrorists / Hacktivists Insiders NATION STATE ACTORS Government, defense contractors, IP rich organizations, waterholes Nation states

9 © Copyright 2015 EMC Corporation. All rights reserved. Type of Attack Classification – Proxy Interception – SQL Attack Tools – Web Scanner/Services Attack Tools – Username Harvesting Tools are cheap – – Spear Phishing toolkits $2 - $10 – Malware Kits – Carbanak over $1 b – Skimming Devices – RAM Scraping on PoS terminals – Hackers for Hire websites The Adversary – Tools they use

10 © Copyright 2015 EMC Corporation. All rights reserved. “ Everyone has a plan until you get punched in the face. ” A wise man once said:

11 © Copyright 2015 EMC Corporation. All rights reserved. What is your plan?

12 © Copyright 2015 EMC Corporation. All rights reserved. Can you Execute? People, Process and Technology

EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.