beyond
play

Beyond Cyber Securit ity Dangerous Toys USB Device Impersonators - PowerPoint PPT Presentation

Beyond Cyber Securit ity Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates


  1. Beyond Cyber Securit ity

  2. Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

  3. Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

  4. Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

  5. Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

  6. Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

  7. https:/ ://censys.io

  8. https:/ ://shodan.io

  9. https:/ ://shodan.io In Internet of f Medical Thin ings

  10. https:/ ://shodan.io In Internet of f Medical Thin ings

  11. https:/ ://shodan.io In Internet of f Medical Thin ings

  12. https://haveibeenpwned.c .com

  13. http://informationisbeautifu ful.net

  14. http://informationisbeautifu ful.net

  15. The Song Remains The Same • Defense in depth failures Since 1984 and still not effective • Average separate security solutions 40+ (30% feel right number) • Time to discover Breaches 200 Days • Time to respond to Incidents 56 Days • Cost of a breach $3.9 Million

  16. Organized Threat Actors State Sponsored Actors Sophisticated Talent Anonymous Digital Currencies Highly Funded R&D Collaborative Development Circumventive Tooling Crowd-sourced information sharing

  17. Threats Du Jour

  18. Train ining Exercises

  19. Who are High Performers? Confidence Represent 26% of the 3655 in the study Dedication Highest level of cyber resilience Communication Skills More prepared to respond Industry Less impacted by cyber threats. Awareness Report less attacks, better containment and recovery Streamlined SOC Ponemon Institute Presentation Private and Confidential 21

  20. Threat Hunting Workflow Cognitive Advanced Analytics INVESTIGATE DETECT ENRICH ORCHESTRATE Incident Response

  21. User Behavior

  22. Local Analysis Investigations IBM CONFIDENTIAL until January 2017

  23. AI Enriched Analysis Investigations IBM CONFIDENTIAL until January 2017

  24. AI Deep Insight Investigations IBM CONFIDENTIAL until January 2017

  25. What is an Unknown Unknown Search Offense Offense Property Property b i Offense Offense Offense Property Property Property a h c Offense Offense Offense Property 1 2 d Offense Property f Offense Offense Property Property Ask the question: “show me which g e offenses share the same property” – you don’t know the subset of offenses, not the subset of properties to search

  26. Investigative Correlations Investigations IBM CONFIDENTIAL until January 2017

  27. Threat Hunting

  28. I ncident Manual In Incident R esponse Response Plans P latforms

  29. In Integrated and In Intelligent Controls

  30. Beyond Cyber Security

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend