Transcript
Page 1: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

Terminate Hacking Operations February 2014

Page 2: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

Founded by veteran cyber security experts

!   Members of Elite Military Cybersecurity Unit

!   Hacking Operations & Forensics

!   Reverse engineering & Malware analysis

!   Cryptography & Evasion

!   Proven track record at Security and SaaS companies – Veracode, DataPower (IBM)

!   Productizing and Go-to-market expertise

!   Successful deployments at large enterprises

Joined by experienced executives

!   Medal of Honor from Israeli head of intelligence corps

!   Excellence in research and academic achievements

Prestigious awards & recognition

CTO CEO Yonatan Striem-Amit Lior Div

CVO Yossi Naar

VP Products Ashish Larivee

VP Sales & Marketing Mark Taber

The team

VP R&D Yonatan Perry

Page 3: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

   

The attack phases

Critical resource

Penetration

Hacking operation

Critical resource

C&C

Recon

Spread

Damage

Breach

Page 4: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

Hacking operation & Malops ™

Sec. Min. Hrs. Days Weeks Months

Damage

Time

Antivirus Firewall Sandbox IDS ...

Incident Response

Penetration Hacking operation

Breach Detected

ê

Malop™

Page 5: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

July 10, 2012

Almost every Fortune 500

company has been hacked and

likely won’t even know it until

6 months after the breach.

Cyber attacks - Everyone's problem

$66M In damage

Aurora

360,000 Credit Cards

Nuclear & Military

Data Taken

$6.7M In damage

$172M In damage

$30M In damage

$225M In damage

$2.6M In damage

70,000 Sites hacked

2.7M Confidential

E-mails

Page 6: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

Continuous Malop™ Detection

Monitoring

Enhancement

Big data analytics

Evidence

Suspicions

Malop™

  Cross  Customer  Cloud  Intelligence

External    Intelligence    Sources

Element  Profiles

Cybereason  LABS

Page 7: Cybereason: Terminate Hacking Operations

© 2014 Cybereason Inc. All rights reserved.

you. Thank www.cybereason.com  www.facebook.com/Cybereason  www.linkedin.com/company/cybereason  www.twiHer.com/cybereason        


Recommended