the evolving threat landscape - rochester security summit · the evolving threat landscape it data...

30
The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer - NY, NJ, CT

Upload: others

Post on 04-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

The Evolving Threat Landscape

IT Data and Security Analytics

October 2014 Mike Larmie, MCITP

Security Sales Engineer - NY, NJ, CT

Page 2: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

2

The Inflection Point

Page 3: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

The Inflection Point

3

60% of organizations were affected

by successful attacks in 2013 – 2014 CyberDefense Report, by CyberEdge Group

Page 4: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

We’re Not Always Covering the Basics…

4

77% of breaches are a result of

unsophisticated tactics for initial

compromise- 2013 Data Breach Report, Verizon

Page 5: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

…Not Meeting the Compliance Requirements…

“Requirement 11 was the least

complied with requirement in our

study. Just 23.8% of companies

met all the controls between 2011

and 2013”

Verizon 2014 PCI Compliance Report

Source: Verizon 2014 PCI Compliance Report

Page 6: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

6

Expanding Attack Surface

Page 7: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Bring Your Own IT

7

Corporate

IT

User-Added

Devices

User-Added

Services

Page 8: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

8

Corporate

IT

User-Added

Devices

User-Added

Services

Bring Your Own IT

Page 9: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

9

The Living Threat

Page 10: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Today’s Security Technology Misses a Key Attack Vector

10IDS/IPSFirewall SIEM

Physical Network

Mobile

Devices

Page 11: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

76% of network intrusions exploited weak or stolen credentials

69% of breaches discovered by an external party

66% of breaches are undetected for months

- 2013 Data Breach Report, Verizon

Deception-Based Attacks Are Hard to Detect

11

Page 12: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Deliver the data, analysis, & insight to

Fight the Living Threat

Our Mission

12

Page 13: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Rapid7’s Unique Data & Analytics Solution

13

Simplified

Compliance

Threat & Risk

Management

User-Based

Incident Detection

Business

Context

Attacker

Methods

Users

Behaviors

Assets

Controls

Collect Contextualize Analyze

Services

and Support

Page 14: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,
Page 15: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Nexpose

Complete Penetration Testing

Automated Vulnerability

Validation

Efficient Phishing Simulations

Page 16: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Metasploit Pro

“Using hours efficiently is critical, and Metasploit Pro

is a huge help on this. Time savings are the

biggest reason for us to use

Metasploit Pro.”

—Jim O’Gorman, President

Offensive Security

Page 17: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,
Page 18: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Nexpose

Complete Asset Discovery

Contextual Exposure

Analysis

Simplified Compliance & Reporting

Prioritized Action Plans

Page 19: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Nexpose

“We reduced risk by more than

98%. That’s particularly impressive when you

consider that we brought on five new hospitals in

that timeframe.”

—Scott Erven, Manager, Information Security

Essentia Health

Page 20: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,
Page 21: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Nexpose

Comprehensive Measurement of Critical Security Controls

Results-Oriented Trending

Page 22: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

ControlsInsight

“Not knowing the state of our endpoints is a risk that

our organization cannot afford to take. Rapid7

ControlsInsight has provided our

organization with visibility that we

cannot get anywhere else.”

—Chad Currier, IT Infrastructure Director

Cardinal Innovations Healthcare Solutions

Page 23: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,
Page 24: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Nexpose

Smart Detection of Attacks

Fast Incident Investigation

Simplified Discovery

of User Behavior

Page 25: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

ControlsInsight

“Rapid7 UserInsight allows us to look at what users are

doing, enabling us be hyper-vigilant

when it comes to things like

detecting compromised credentialsor knowing if a user logs in from two different locations

within a suspiciously brief period.”

—Manager, Risk and Compliance

Large Outsourced Sales and Marketing Agency

Page 26: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Professional Services

26

Strategic Services• On-Premise Managed Services• Risk Rater Professional • Off-Premise Managed Services

Deployment Services• 3.5-day Rapid Deployment

• Custom Deployment

• Integration to 3rd-party apps

• Custom Reporting & Scripting

Training Services• Webinars

• Virtual Training

• On-site Training

• NX Administrator Certification

Assessment Services• Internal or External Network

• Web or Mobile Application

• Wireless

• Social Engineering

Page 27: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

More Than Just Innovative Technology

27

Customer Focus

200+Customers

in Rapid7

Voice

96%Issue

resolution

on 1st call

~3,000Customers

in 78

countries

41

NPS

28%of Fortune

1000

15k+Community

Members

Silver

Stevie’s

Award for

customer

service

Customers Partners

Page 28: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Success Is Not A Continuum—Nick Saban, Alabama Head Coach

Page 29: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Questions?

29

Page 30: The Evolving Threat Landscape - Rochester Security Summit · The Evolving Threat Landscape IT Data and Security Analytics October 2014 Mike Larmie, MCITP Security Sales Engineer -NY,

Thank You