secure data gi - delivering contextual intelligence

21
A NEW APPROACH TO COMBATING CYBER CRIME 25/11/14 1 Delivering Contextual Intelligence 25/11/14 A NEW APPROACH TO COMBATING CYBER CRIME 1

Upload: skybox-security

Post on 06-Aug-2015

66 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

1

Delivering Contextual Intelligence

25/11/14A NEW APPROACH TO COMBATING CYBER CRIME 1

Page 2: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

2

FIREWALLSENDPOINTSECURITY

THE CURRENT SECURITY LANDSCAPE

GATEWAYSECURITY

IPS/IDSSERVERSECURITY

Page 3: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

3A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

3

THE SECURITY CONUNDRUM

SECURITY SPEND CONTINUES

TO RISE

$$30.1 BILLION SPEND BY 2017

UP FROM $9.6 BILLION IN 2006

Page 4: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

4A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

4

THE SECURITY CONUNDRUM

SECURITY SPEND CONTINUES

TO RISE

BUT SO DOES THE NUMBER OF BREACHES

621 REPORTED IN THE LAST 12 MONTHS

UP 23% OVER THREE YEARS

$$30.1 BILLION SPEND BY 2017

UP FROM $9.6 BILLION IN 2006

Page 5: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

5A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

5

THE SECURITY CONUNDRUM

ORGANISATIONS ON THE FRONT LINE NEED A NEW APPROACH…

WE ARE NOT GOING TO WIN THE BATTLE

$

Page 6: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

6

ASSESS DETECT PROTECT RESPOND

REAL-TIME RISK ASSESSMENT

CONTEXTUAL RISK PROFILE

CORRELATED THREAT & SECURITY INTELLIGENCE

EARLY THREAT DETECTION

AUTOMATED NETWORK PROTECTION

THREAT PREVENTION

EXPERTISE & PROCESS

RAPID & EXPERIENCED RESPONSE

REMEDIATION

A COMPLETE SECURITY PROCESS

Page 7: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

7

CLOUD SERVICES CHANGES THE GAME…

Page 8: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

8

CLOUD SERVICES CHANGES THE GAME…

ENDPOINT SECURITY

• MALWARE INFECTIONS

• NETWORK ATTACK BLOCKED

• VULNERABLE SOFTWARE

• SUSPICIOUS BEHAVIOUR

• PROCESS INJECTION BLOCKED

Page 9: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

9

• INBOUND CONNECTION FAILED

• OUTBOUND CONNECTION FAILED

• OUTBOUND UDP BLOCKED

• TUNNEL TRAFFIC DETECTED

• INBOUND PING BLOCKED

CLOUD SERVICES CHANGES THE GAME…

FIREWALL SECURITY

Page 10: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

10

CLOUD SERVICES CHANGES THE GAME…

SERVER SECURITY

• LOGIN FAILURES

• PASSWORD FAILURE

• VULNERABILITY ON SOFTWARE

• LPAL VIOLATION

• MALWARE

Page 11: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

11

CLOUD SERVICES CHANGES THE GAME…

GATEWAY SECURITY

• SUSPICIOUS EMAILS

• UNSAFE ATTACHMENTS

• MALICIOUS JAVASCRIPT

• SUSPICIOUS URL

• C&C CONNECTION

Page 12: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

12

CLOUD SERVICES CHANGES THE GAME…

IPS/IDS

• IDENTIFY MALICIOUS ACTIVITY

• VULNERABILITY DETECTION

Page 13: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

13

CLOUD SERVICES CHANGES THE GAME…

IPS/IDS

• IDENTIFY MALICIOUS ACTIVITY

• VULNERABILITY DETECTION

TECHNOLOGY PROCESS PEOPLE+ +

Page 14: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

14

CLOUD SERVICES CHANGES THE GAME…

IPS/IDS

• IDENTIFY MALICIOUS ACTIVITY

• VULNERABILITY DETECTION

TECHNOLOGY PROCESS PEOPLE+ +

LEVERAGED PEOPLE

CORRELATED AND CONTEXTUALISED

APPLIED INTELLIGENCE

LEVERAGED HARDWARE+ +

Page 15: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

15

APPLIED INTELLIGENCE

TECHNOLOGY PROCESS PEOPLE+ +

Page 16: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

16A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

16

INSIDE THE SECUREDATA GI CLOUD

CUSTOMER INFORMATION

Page 17: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

17A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

17

INSIDE THE SECUREDATA GI CLOUD

MILLIONSOF SECURITY LOGS AND DATA ANALYSED

VULNERABILITY SCANNING

CUSTOMER INFORMATION

SOFTWARE ALGORITHM

HARDWARE TECHNOLOGYSKYBOX RISK MANAGEMENT TOOL

SIEM PLATFORM CLASS LEADING

DATA PLANE

Page 18: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

18A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

18

INSIDE THE SECUREDATA GI CLOUD

ANALYTICS

MILLIONSOF SECURITY LOGS AND DATA ANALYSED

HUNDREDSOF SECURITY EVENTS IDENTIFIED

VULNERABILITY SCANNING

THREAT FEEDS

CUSTOMER INFORMATION

SOFTWARE ALGORITHM

HARDWARE TECHNOLOGY

MALTEGO BIG DATA ANALYTICS

SKYBOX RISK MANAGEMENT TOOL

SIEM PLATFORM CLASS LEADING

DATA PLANE

INTELLIGENCE STORE

Page 19: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

19A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

19

INSIDE THE SECUREDATA GI CLOUD

ANALYTICS

EXPERTPEOPLE

MILLIONSOF SECURITY LOGS AND DATA ANALYSED

HUNDREDSOF SECURITY EVENTS IDENTIFIED

TENSOF ALERTS INVESTIGATED

VULNERABILITY SCANNING

THREAT FEEDS

24 X 7 X 365 SOC

SENSEPOST SECURITYCONSULTANCY

CUSTOMER INFORMATION

SOFTWARE ALGORITHM

HARDWARE TECHNOLOGY

CYBER ANALSYST TEAM

MALTEGO BIG DATA ANALYTICS

SKYBOX RISK MANAGEMENT TOOL

SIEM PLATFORM CLASS LEADING

DATA PLANE

INTELLIGENCE STORE

Page 20: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

20A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

20

INSIDE THE SECUREDATA GI CLOUD

ANALYTICS

EXPERTPEOPLE

MILLIONSOF SECURITY LOGS AND DATA ANALYSED

HUNDREDSOF SECURITY EVENTS IDENTIFIED

TENSOF ALERTS INVESTIGATED

INDIVIDUALTHREATS WITH ACTIONABLE INTELLIGENCE

VULNERABILITY SCANNING

THREAT FEEDS

24 X 7 X 365 SOC

SENSEPOST SECURITYCONSULTANCY

CUSTOMER INFORMATION

SOFTWARE ALGORITHM

HARDWARE TECHNOLOGY

CYBER ANALSYST TEAM

MALTEGO BIG DATA ANALYTICS

SKYBOX RISK MANAGEMENT TOOL

SIEM PLATFORM CLASS LEADING

DATA PLANE

INTELLIGENCE STORE

Page 21: Secure Data GI - Delivering Contextual Intelligence

A NEW APPROACH TO COMBATING CYBER CRIME25/11/14

21A NEW APPROACH TO COMBATING CYBER CRIMEPRIVATE & CONFIDENTIAL25/11/1421

THANKYOU