15
14 March 2018 -

Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

14 March 2018

����������-���

Page 2: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

We Live In A World Where Current Tools Force Security Teams To Play By Old Rules

Device Centric | Not Integrated | Not Automated | Force Lots Of Manual Effort | Unable To Adapt

Page 3: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

3 2016 Verizon Data Breach Report: http://www.verizonenterprise.com/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdf

THE DATA DEMONSTRATE THE CHALLENGE

92% of Compromises happen within Minutes

93% of Compromises take Days, Weeks or Monthsto Discover.

Page 4: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

DETECT & RESPOND IS NOT KEEPING PACE WITH THE ACCELERATION & SOPHISTICATION OF ATTACK

SECURITY OPERATIONS’ ABILITY TO

Page 5: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

THIS IS NOT THE PROBLEM

5

Ransomware surge source: https://www.icsalabs.com/todays-hottest-threatsVerizon Data Breech Report: http://www.verizonenterprise.com/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdfSymantec Internet Security Threat Report: https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdfCyber security Statistics and Facts: http://expandedramblings.com/index.php/cybersecurity-statistics/4 cybersecurity stats that will blow you away: http://www.fool.com/investing/2016/11/13/4-cybersecurity-stats-that-will-blow-you-away.aspxOctober 2016 Cyber Attack Statistics: http://www.hackmageddon.com/2016/11/16/october-2016-cyber-attacks-statistics/

16% Of all cyber incidents

last year according

to Verizon

12,000% Increase in ransomware attempts measured by ICSA Labs Q4 2015 – Q3 2016

95% Of all Web Application Attacks

Are Financially Motivated

according to Verizon

$6.5 millionAverage cost of a data breach

$154 Estimated average cost per

stolen record in a data

breach

1.3 millionAverage number of identities

exposed per breach

according to symantec

36%Annual Increase in malware variants

$2.1 trillionExpected cost of handling cyberattacks globally by 2019 according to Lloyd’s & Juniper Research

43%Data breaches caused

internally according to Intel

52%Percent of companies

expecting a successful

cyberattack in the next year

according to CyberEdge Group 55%Of Attacks Are Made Up Of Malware, Account Hijacking

& Targeted Attacks according to hackmageddon.com

WannaCry

Petya

GoldenEye

Spectre DoublePulsar

FalsePositivesFalseNegatives

Too Many

Alerts

EternalBlue

Meltdown

Page 6: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

IT IS THE NOISE THAT HIDES THE PROBLEM

IT IS DETECTION WITHOUT

UNDERSTANDING

Page 7: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

IT IS INSIGHT WITHOUT

ACTION

Page 8: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

IT IS TIME FOR SECURITY OPERATIONS TO TRANSFORM

Page 9: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

WHAT IF SECURITY OPERATIONS’

EFFECTIVENESS & EFFICIENCY

COULD INCREASE

BY 10 TO 20 TIMES?

20X BIGGER!

Page 10: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

The Fidelis ADR Platform

Agents

HIGHLIGHTS

• Complete Visibility Broad & Deep Across Network & Endpoints

• Automated Detection Across A Universe Of Detectors, Intelligence & Analytics

• Automated Response From Investigation Through Validation, Correlation, Expulsion & Custom Workflows

• Deception to lure attackers into Decoy, deceive, analyze and protect.

Operational ThreatIntelligence

COLLECTOR

HISTORICAL ANALYTICS & HUNTING METABASE

FIDELISNETWORK™

RESPONSE AUTOMATION & ANALYTICS

ENGINE

FIDELISENDPOINT™

Sensors

FIDELISDECEPTION™

Page 11: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

Data TheftProtection

Advanced Malware

Protection

Network Security Analytics

network endpoint

CCTV

CCTV

1

2

3

45

Page 12: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

deception

Intelligent Deception

Security Visibility

Assets and Network decoys, lures, sophisticated data-traps

Asset profiling, Anomaly detection, Forensics, Threat

analysis. Learning TTPs andKill-Chain analysis

Traffic Analysis

C2 channels , Shadow IT, Data exfiltration, Internet Comm.

Page 13: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

13

WE PREVENTATTACKERS

FROMACHIEVING

THEIRMISSION …by creating a world where attackers

have no place left to hide.

Reduce time to Detection and Response…

Page 14: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

Questions?

Page 15: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs

Thank You!

Terence HeahRegional Sale Manager | APACM: (65) 8299 2029E: [email protected]