Beyond Cyber Securit ity Dangerous Toys USB Device Impersonators - - PowerPoint PPT Presentation

beyond
SMART_READER_LITE
LIVE PREVIEW

Beyond Cyber Securit ity Dangerous Toys USB Device Impersonators - - PowerPoint PPT Presentation

Beyond Cyber Securit ity Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates


slide-1
SLIDE 1

Beyond Cyber Securit ity

slide-2
SLIDE 2

Dangerous Toys

USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

slide-3
SLIDE 3

Dangerous Toys

USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

slide-4
SLIDE 4

Dangerous Toys

USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

slide-5
SLIDE 5

Dangerous Toys

USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

slide-6
SLIDE 6

Dangerous Toys

USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

slide-7
SLIDE 7
slide-8
SLIDE 8

https:/ ://censys.io

slide-9
SLIDE 9

https:/ ://shodan.io

slide-10
SLIDE 10

https:/ ://shodan.io In Internet of f Medical Thin ings

slide-11
SLIDE 11

https:/ ://shodan.io In Internet of f Medical Thin ings

slide-12
SLIDE 12

https:/ ://shodan.io In Internet of f Medical Thin ings

slide-13
SLIDE 13

https://haveibeenpwned.c .com

slide-14
SLIDE 14

http://informationisbeautifu ful.net

slide-15
SLIDE 15

http://informationisbeautifu ful.net

slide-16
SLIDE 16

The Song Remains The Same

  • Defense in depth failures
  • Average separate security solutions
  • Time to discover Breaches
  • Time to respond to Incidents
  • Cost of a breach

200 Days 56 Days $3.9 Million Since 1984 and still not effective 40+ (30% feel right number)

slide-17
SLIDE 17

Organized Threat Actors

Crowd-sourced information sharing

State Sponsored Actors Sophisticated Talent Anonymous Digital Currencies Highly Funded R&D Collaborative Development Circumventive Tooling

slide-18
SLIDE 18

Threats Du Jour

slide-19
SLIDE 19

Train ining Exercises

slide-20
SLIDE 20

Represent 26% of the 3655 in the study Highest level of cyber resilience More prepared to respond Less impacted by cyber threats. Report less attacks, better containment and recovery

Ponemon Institute Presentation Private and Confidential

Confidence Dedication Communication Skills Industry Awareness Streamlined SOC

21

Who are High Performers?

slide-21
SLIDE 21

Workflow

Advanced Analytics Cognitive Threat Hunting

DETECT ENRICH

INVESTIGATE ORCHESTRATE

Incident Response

slide-22
SLIDE 22

User Behavior

slide-23
SLIDE 23

IBM CONFIDENTIAL until January 2017

Investigations

Local Analysis

slide-24
SLIDE 24

IBM CONFIDENTIAL until January 2017

Investigations

AI Enriched Analysis

slide-25
SLIDE 25

IBM CONFIDENTIAL until January 2017

Investigations

AI Deep Insight

slide-26
SLIDE 26

What is an Unknown Unknown Search

Offense

2

Offense Property

b

Offense Property

a

Offense Property

f

Offense

1

Offense Property

i

Offense Property

c

Offense Property

d

Offense Property

e

Offense Property

h

Offense Property

g

Ask the question: “show me which

  • ffenses share the same property”

– you don’t know the subset of offenses, not the subset of properties to search

slide-27
SLIDE 27

IBM CONFIDENTIAL until January 2017

Investigations

Investigative Correlations

slide-28
SLIDE 28

Threat Hunting

slide-29
SLIDE 29

Manual In Incident Response Plans

Incident Response Platforms

slide-30
SLIDE 30

In Integrated and In Intelligent Controls

slide-31
SLIDE 31

Beyond Cyber Security