Bridging Security In Intelligence: Hacking, g, Threat Hunting, g, - - PowerPoint PPT Presentation

bridging security in intelligence
SMART_READER_LITE
LIVE PREVIEW

Bridging Security In Intelligence: Hacking, g, Threat Hunting, g, - - PowerPoint PPT Presentation

Bridging Security In Intelligence: Hacking, g, Threat Hunting, g, AI, I, Behavioral Anomalies, and In Incident Response Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone


slide-1
SLIDE 1

Bridging Security In Intelligence:

Hacking, g, Threat Hunting, g, AI, I, Behavioral Anomalies, and In Incident Response

slide-2
SLIDE 2

Dangerous Toys

USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

slide-3
SLIDE 3

Dangerous Toys

USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

slide-4
SLIDE 4

Dangerous Toys

USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

slide-5
SLIDE 5

Dangerous Toys

USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

slide-6
SLIDE 6

Dangerous Toys

USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

slide-7
SLIDE 7
slide-8
SLIDE 8

https:/ ://censys.io

slide-9
SLIDE 9

https:/ ://shodan.io

slide-10
SLIDE 10

https://haveibeenpwned.c .com

slide-11
SLIDE 11

http://informationisbeautiful.net

slide-12
SLIDE 12

http://informationisbeautiful.net

slide-13
SLIDE 13

The Song Remains The Same

  • Defense in depth failures
  • Average separate security solutions
  • Time to discover Breaches
  • Time to respond to Incidents
  • Cost of a breach

200 Days 56 Days $3.9 Million Since 1984 and still not effective 40+ (30% feel right number)

slide-14
SLIDE 14

Organized Threat Actors

Crowd-sourced information sharing

State Sponsored Actors Sophisticated Talent Anonymous Digital Currencies Highly Funded R&D Collaborative Development Circumventive Tooling

slide-15
SLIDE 15

Threats Du Jour

slide-16
SLIDE 16

Training Exercises

slide-17
SLIDE 17

Protect your information, contain the risk

Gain control

  • Govern all users and

their privileges

  • Protect data usage

across enterprise and cloud

  • Improve DevOps

security

  • Secure mobile devices

and apps

Identify risks

  • Discover, classify business

critical data and apps

  • Expose over privileges with

identity analytics

  • Analyze cloud app usage

and activity

  • Detect web fraud with real

time alerts

Safeguard interactions

  • Deploy adaptive access and web app

protection

  • Federate to and from the cloud
  • Maintain data compliance and stop attacks
  • Secure mobile collaboration
slide-18
SLIDE 18

Represent 26% of the 3655 in the study Highest level of cyber resilience More prepared to respond Less impacted by cyber threats. Report less attacks, better containment and recovery

Ponemon Institute Presentation Private and Confidential

Confidence Dedication Communication Skills Industry Awareness Streamlined SOC

19

Who are High Performers?

slide-19
SLIDE 19

70%

produce either a formal or ‘ad hoc’ report on the

  • rganizations Cyber

Resilience to their executive level and Board

20

51% 19% 30% 40% 21% 39% 0% 10% 20% 30% 40% 50% 60% Yes, formal report Yes, informal or “ad hoc” report No High performer Overall

High Performers Talk to the Board & C Suite Regularly

slide-20
SLIDE 20

Workflow

Advanced Analytics Cognitive Threat Hunting

DETECT ENRICH

INVESTIGATE ORCHESTRATE

Incident Response

slide-21
SLIDE 21

User Behavior

slide-22
SLIDE 22

IBM CONFIDENTIAL until January 2017

Investigations

Local Analysis

slide-23
SLIDE 23

IBM CONFIDENTIAL until January 2017

Investigations

AI Enriched Analysis

slide-24
SLIDE 24

IBM CONFIDENTIAL until January 2017

Investigations

AI Deep Insight

slide-25
SLIDE 25

What is an Unknown Unknown Search

Offense

2

Offense Property

b

Offense Property

a

Offense Property

f

Offense

1

Offense Property

i

Offense Property

c

Offense Property

d

Offense Property

e

Offense Property

h

Offense Property

g

Ask the question: “show me which

  • ffenses share the same property”

– you don’t know the subset of offenses, not the subset of properties to search

slide-26
SLIDE 26

IBM CONFIDENTIAL until January 2017

Investigations

Investigative Correlations

slide-27
SLIDE 27

Threat Hunting

slide-28
SLIDE 28

Incident Response Pla

latform

slide-29
SLIDE 29

In Integrated and In Intelligent Controls

slide-30
SLIDE 30

Bridging Security In Intelligence:

Hacking, g, Threat Hunting, g, AI, I, Behavioral Anomalies, , and In Incident Response