14
1 SECURITY THE LOGICAL EVOLUTION OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK

THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

1

SECURITY THE LOGICAL EVOLUTION

OF CYBER SECURITY B A S E D O N T H E A N ATO M Y

O F A C Y B E R - AT TA C K

Page 2: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

2

REACTIVE

de fense

Cyber attacks in the

20th century:

• Viruses

• Trojans

• Worms

• KeyLoggers

• Remote/Local

Exploitations

• Spam campaigns

• MITM

The

response was:

• AV Software

• Stateless Firewalls

• Code Signing

• Manual Debugging

• Manual Log

Correlation

Page 3: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

3

REACTIVE

de fense

Page 4: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

4

PROACTIVE

de fense

Cyber attacks in the

21st century:

(same as 20th) +

• Web App Attacks

• Spear Phishing

• Large DDoS Attacks

• Mass Bot Exploitations

The

response was:

• Patch Management

• Vulnerability

Scanners

• Next Gen Firewalls

• Advanced Spam

Filters

• Heuristic Analysis

• GPOs

Page 5: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

5

REACTIVE

de fense

PROACTIVE

de fense

Page 6: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

6

R E A C T I V E P R O A C T I V E

A CYBER ATTACK TODAY

• Cross Platform Exploits

• Advanced Web Based

Threats

• Social engineering

• Ransomware

• Automated Exploitation

Toolkits

• Malware Code Obfuscation

• Social Media Scams

• Targeted Attacks

• Government Sponsored Attacks

• Cryptominers

• UEFI Based Malware

and more…

Page 7: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

7

R E A C T I V E P R O A C T I V E

DEFENSE EVOLUTION

• SIEM

• Log Management

• Threat Intelligence

• Virtual/Micro Patching

• File Reputation

• Network Based

Behaviour Analysis

• Cloud Powered Sandboxing

• Next Gen AV Software

• Machine Learning

• AI Automated Decisions

• EDR

…and more

Page 8: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

8

REACTIVE

de fense

PROACTIVE

de fense

SECURITY 2 .0

(SOC)

DEFENSE EVOLUTION

Page 9: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

9

Page 10: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

10

THE ELEPHANT IN THE ROOM

• Not Enough Staff

• Insufficient Skills

• Expensive Certification

• Funding Complex Defense

• Extremely Complicated Infrastructure

• BYOD (personal devices)

…and more

Page 11: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

11

WE ARE SURE

YOU WANT

PROBLEMS SOLVED!

Page 12: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

12

IMPROVE YOUR SECURITY POSTURE WITH:

• Security Hardening Knowledge

• Real-Time Security Monitoring

• Risk Indicators and Reporting

• Malware Analysis

• Incident Response Team

• Policies and Procedures

• Regular Vulnerability Assessment

• On-demand Penetration Tests

Page 13: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

13

YOU NEED

SECURITY PARTNER.

CHOOSE US

Page 14: THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY THE LOGICAL EVOLUTION SECURITY OF CYBER SECURITY BASED ON THE ANATOMY OF A CYBER-ATTACK . 2 REACTIVE defense Cyber attacks in the 20th

14

[email protected]

Thank you.