introducing
DESCRIPTION
Introducing. C yber A ttack R emediation & M itigation. Your Cyber Defences will be Breached! It’s Inevitable! WHAT WILL YOU DO?. Unique Integrated S olution P latform Demonstrable TODAY @ Exclusive Networks Combing Best of Breed ‘Ingredients’ - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/1.jpg)
![Page 2: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/2.jpg)
CyberAttackRemediation &Mitigation
Introducing
![Page 3: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/3.jpg)
Your Cyber Defences will be Breached!It’s Inevitable!
WHAT WILL YOU DO?
![Page 4: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/4.jpg)
![Page 5: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/5.jpg)
• Unique Integrated Solution Platform
• Demonstrable TODAY @ Exclusive Networks
• Combing Best of Breed ‘Ingredients’
• One – Post Breach Integrated Solution
- Identification- Containment- Rapid Response & Remediation- Full Forensics
• Focused – Post Breach
![Page 6: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/6.jpg)
Benefits:• Faster Notification • Earlier Remediation – Find2Fix • Improved Visibility & Intelligence• Vastly Enhanced ‘Post Breach’
Response• Minimising Damage
- Cost/Reputation• Efficient Use of Limited Resource
![Page 7: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/7.jpg)
Why Do We Need CARM?• USA
>47,000 known IT security incidents in 2012 (Ref Verizon 2013)
• UK IT Security Incidents in 2012 >54 per large organisation pa (Ref PWC 2013)
• Average Cost of a Data Leak – Large Co.$3.5M per organisation (Ref Ponemon Rpt)
• Belgium – 334 ‘Serious’ Incidents per Month • (ref CERT)
![Page 8: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/8.jpg)
The Problem is Growing !• Number of Devices (Endpoints) per User
– PCs, Tablets, Smartphone• BYOD
– Consumerisation and choice increases IT workload
• Mobility– Android based threats to hit 1M in 2013– 30% increase in Mobile Malware in last 6mnths
(Fortinet)
• Cloud– Attractive point of entry for a cyber attack
• Applications– App Stores outside of IT control
Source:Execs Guide to 2012 Data Breaches - OSF
![Page 9: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/9.jpg)
....and Threats are Getting More Challenging!• Advanced Persistent Threats (APTs)
– Often organisationally driven• Zero Day Exploits
– Defending against the unknown• Polymorphic Threats
– Ever changing
It’s inevitable that some of these threats will become successful ATTACKS!
![Page 10: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/10.jpg)
Evidence . . Fighter Jets• 2009
– China is 16 years behind the US
• BY 2020 – > 1000 US fighters 5th Generation
• F35’s and F22’s! • By 2025
– The GAP widens
• US saw this as a big threat to national security - Why?
![Page 11: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/11.jpg)
2012: Spot the Difference
Lockheed USAF F22
Chengdu J-20
![Page 12: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/12.jpg)
Threats are Commoditising . . . .
• Nation v Nation – Cyber Warfare • National Government – Espionage • Central Governments - Hacktervism• Large, Global Brands - IP/Robbery • Mid to Large sized Organisations - Robbery?• You . . . . Burglary
![Page 13: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/13.jpg)
Post Breach Boom!
![Page 14: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/14.jpg)
Acceleration of Intellectual Property Loss: Significant Breaches of 2012
Jan Feb Mar Apr May Jun July Aug Sept OctJan Feb Mar Apr May Jun July Aug Sept Oct Nov
![Page 15: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/15.jpg)
What’s The Real Cost?
Total cost is > double real cost . . .
![Page 16: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/16.jpg)
Direct v Indirect
Ref: Ponemon 2013
![Page 17: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/17.jpg)
The True Cost of Breach• Loss of revenue
– From outage, no trading
• Damage to reputation– Negative Customer reaction
• Loss of data– Cost of replacement, repair and compliance
• Interruption to business– Diverting resources will delay core activity
• Damage to customer confidence– Loyalty & ongoing business delayed or
lost
• Damage to investor confidence– Valuation can affect credit limits &
increase costs
• Loss of Intellectual property– Leadership position lost & margin
impact
• Legal costs– See all the above!!!
![Page 18: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/18.jpg)
Customer Pain Points• Lack of Visibility
– Anomalies, behaviours, performance degradation– Indicators of change
• Sheer Volume of Incidents– Lateral spread
• Incident Response Processes– Speed of response
• Time to Remediate– Manpower, skills
• Why Did it Happen?– Forensics
• Costs . . . A New Approach is Needed!
![Page 19: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/19.jpg)
So What is Needed?
• A Cyber Attack ‘Early Warning System’
• Rapid Defence Re-configuration• Centralised ‘Command and Control’• Better Visibility • Actionable Intelligence• Learn from our Lessons
![Page 20: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/20.jpg)
...introducing
CyberAttackRemediation &Mitigation and respond
![Page 21: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/21.jpg)
Downgrades Attacks into known Threats!
![Page 22: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/22.jpg)
• Signature-less Defence• High Accuracy Threat Detection• Shared Threat Intelligence• ‘Inside Out’ as well as ‘Outside
In’ Protection• Virtual Execution• Response Automation
Qualities
![Page 23: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/23.jpg)
CARM delivers:
• Real-time Monitoring• BIG DATA Analysis for Abnormality Detection• Low-latency Incident Evaluation & Qualification• Low-latency Incident Response Determination• APIs• Control• Reconfigurable Defences
![Page 24: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/24.jpg)
1 Platform…Multiple Ingredients
![Page 25: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/25.jpg)
![Page 26: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/26.jpg)
![Page 27: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/27.jpg)
...introducing CARMCyberAttackRemediation &Mitigation
Breach is Inevitable
Just like a 3 putt . . . .
And just like a 3 putt . . . It’ll surely happen again
![Page 28: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/28.jpg)
Why Exclusive Networks?• Integrates Platform for the First Time • Drove Development Work with API's • First World Wide ‘Integrated/Interworking’ Solution Platform• First Demo System Available at HQ & London • Use Exclusive Networks to Engineer Demo's and POC's • Promo Pack & Collaterals for Customisation
– eDM/ eShot – Telemarketing Script – White Paper – Presentation – Brochure
![Page 29: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/29.jpg)
VAR Benefits • Post Breach – Big Issue• Addresses a Real Need – NOW • Good Reason for a Conversation with Customers• Demo Facility can be Booked • Demonstrate Value to Customers • Incremental Revenue Opportunities • Could be Annuity Based if Sold as a Service• Speak to your Account Manager for Further
Information
![Page 30: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/30.jpg)
Summary • Post Breach ERA is on US• Not IF but WHEN • Organisations Need to Address it
– Seen as costly – Too complex – More work in overloaded department
• CARM Simplifies & Automates This • Rapid Outcomes at Reasonable Cost • Real-life Working Platform NOW for Demos• It Works!!!
![Page 31: Introducing](https://reader033.vdocument.in/reader033/viewer/2022051421/56816193550346895dd134db/html5/thumbnails/31.jpg)