© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.

Slides:



Advertisements
Similar presentations
Your Data Any Place, Any Time Manageability. SQL Server 2008 Manageability Challenges Challenges face database administrators today : Managing complex.
Advertisements

Tag line, tag line Protection Manager 4.0 Customer Strategic Presentation March 2010.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Secure Desktop Name Title Microsoft Corporation. Agenda.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
XProtect® Expert 2013 Product presentation
MOTOROLA and the Stylized M Logo are registered in the US Patent and Trademark Office. All other product or service names are the property of their respective.
1www.skyboxsecurity.com Skybox Cyber Security Best Practices Three steps to reduce the risk of Advanced Persistent Threats With continuing news coverage.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
The Way to Protect The Smartest Way to Protect Websites and Web Apps from Attacks.
The State of Security Management By Jim Reavis January 2003.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Unified Logs and Reporting for Hybrid Centralized Management
Web Server Hardware and Software
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Smart Grid Cyber Security Framework
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Microsoft Dynamics NAVIns for Microsoft Dynamics NAV Product Presentation Event 4 th April 2012.
All content in this presentation is protected – © 2008 American Power Conversion Corporation Rael Haiboullin System Engineer Capacity Manager.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. AT&T: Cyber Security Barriers.
IT:Network:Microsoft Applications
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
BMC Software confidential. BMC Performance Manager Will Brown.
1 IS 8950 Managing Network Infrastructure and Operations.
Lessons Learned in Smart Grid Cyber Security
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
© 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© British Telecommunications plc BT Managed Services Innovate
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
1 GE Fanuc ©2008 GE Fanuc Intelligent Platforms All Rights Reserved Proficy* DataMart v1.0 Barry Lynch Product Manager GE Fanuc Software Puts the “E” in.
One Marketplace Access Exchange.
Before: Servers Behind Firewalls Today: Servers Migrate Out Business drivers: E-Business Supply chain management CRM.
Network security Product Group 2 McAfee Network Security Platform.
Randy Beavers CS 585 – Computer Security February 19, 2009.
© 2009 AT&T Intellectual Property. All rights reserved. AT&T, AT&T logo and all other marks contained herein are trademarks of AT&T Intellectual Property.
Microsoft Management Seminar Series SMS 2003 Change Management.
ORCALE CORPORATION:-Company profile Oracle Corporation was founded in the year 1977 and is the world’s largest s/w company and the leading supplier for.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Emerging and Evolving Cyber Threats Require Sophisticated Response and Protection Capabilities  Advanced Algorithms  Cyber Attack Detection and Machine.
Assure Analytics data analytics and visualisation Robert Ghanea-Hercock, Alex Healing, Ben Azvine, Karl Smith.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
How to Make Cyber Threat Intelligence Actionable
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Surveillance and Security Systems Cyber Security Integration.
Hybrid Management and Security
CIM Modeling for E&U - (Short Version)
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Real-time protection for web sites and web apps against ATTACKS
Microsoft Azure: The only consistent Hybrid Cloud
CCNET Managed Services
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Transforming IT Management
I have many checklists: how do I get started with cyber security?
Cyber Security and the National Broadband Strategy
Ed oms team OMS: Log Analytics Ed oms team.
The University of Adelaide, School of Computer Science
XtremeData on the Microsoft Azure Cloud Platform:
GRC - A Strategic Approach
IT Management Services Infrastructure Services
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National Broadband Strategy John C. Nagengast

Page 2 What is Cyber Security? For AT&T, cyber security is the collective set of capabilities, procedures, and practices that protect our customers and the services we provide them from the full spectrum of cyber threats. Cyber Security assures the information, applications, and services our customers want are secure, accurate, reliable, and available wherever and whenever they are desired.

Page 3 What we see every day! COTS Software with Bugs and Vulnerabilities Insecure “out-of-the-box” configurations Increasing speed of Zero-day Attacks Relentless stream of patches from Vendors Complexity, Complexity, Complexity Increasingly difficult for systems administrators and users to manage complex security solutions against ever more sophisticated attacks

Page 4 Real-Time Alerts & Alarms with Severity & Likely Source Profiling Engine “What You Expect as Normal” AT&T Security Professionals Normalized Database of Alerts Correlation Engine Monitoring Engine “What you Actually See” Security Analysis (Profile/Anomaly Based) How AT&T Identifies Cyber Threats Correlation Across Network, Servers & Applications

Page 5 Security Event & Threat Analysis Portal

Page 6 Our Cyber Security Tool Set – BotNet Tracking Conficker Worm April 01, ,136 visible members, 8 control servers, tracked since 7/2006 Page 6

Page 7 Some Basic Principles – Broadband Strategy & Cyber Security Expand Security Education and Awareness Fulfill Market Needs & Demand for Cyber Security Spur Innovation and Investment Leverage Core Network Intelligence to Optimize Broadband’s Security, Reliability and Efficiency Make Managed Security an integral part of Broadband Services Simplify User Experience and Increase Security