bridging security in intelligence
play

Bridging Security In Intelligence: Hacking, g, Threat Hunting, g, - PowerPoint PPT Presentation

Bridging Security In Intelligence: Hacking, g, Threat Hunting, g, AI, I, Behavioral Anomalies, and In Incident Response Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone


  1. Bridging Security In Intelligence: Hacking, g, Threat Hunting, g, AI, I, Behavioral Anomalies, and In Incident Response

  2. Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

  3. Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

  4. Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

  5. Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

  6. Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers

  7. https:/ ://censys.io

  8. https:/ ://shodan.io

  9. https://haveibeenpwned.c .com

  10. http://informationisbeautiful.net

  11. http://informationisbeautiful.net

  12. The Song Remains The Same • Defense in depth failures Since 1984 and still not effective • Average separate security solutions 40+ (30% feel right number) • Time to discover Breaches 200 Days • Time to respond to Incidents 56 Days • Cost of a breach $3.9 Million

  13. Organized Threat Actors State Sponsored Actors Sophisticated Talent Anonymous Digital Currencies Highly Funded R&D Collaborative Development Circumventive Tooling Crowd-sourced information sharing

  14. Threats Du Jour

  15. Training Exercises

  16. Protect your information, contain the risk Identify risks Gain control • Discover, classify business • Govern all users and critical data and apps their privileges • Expose over privileges with • Protect data usage identity analytics across enterprise and • Analyze cloud app usage cloud and activity • Improve DevOps • Detect web fraud with real security time alerts • Secure mobile devices and apps Safeguard interactions • Deploy adaptive access and web app protection • Federate to and from the cloud • Maintain data compliance and stop attacks • Secure mobile collaboration

  17. Who are High Performers? Confidence Represent 26% of the 3655 in the study Dedication Highest level of cyber resilience Communication More prepared to respond Skills Less impacted by cyber threats. Industry Awareness Report less attacks, better containment and Streamlined SOC recovery Ponemon Institute Presentation Private and Confidential 19

  18. High Performers Talk to the Board & C Suite Regularly 60% 70% 51% 50% 40% 39% 40% produce either a formal or 30% 30% ‘ad hoc’ report on the 21% 19% 20% organizations Cyber Resilience to their executive 10% level and Board 0% Yes, informal or “ad hoc” Yes, formal report No report High performer Overall 20

  19. Threat Hunting Workflow Cognitive Advanced Analytics INVESTIGATE DETECT ENRICH ORCHESTRATE Incident Response

  20. User Behavior

  21. Local Analysis Investigations IBM CONFIDENTIAL until January 2017

  22. AI Enriched Analysis Investigations IBM CONFIDENTIAL until January 2017

  23. AI Deep Insight Investigations IBM CONFIDENTIAL until January 2017

  24. What is an Unknown Unknown Search Offense Offense Property Property b i Offense Offense Offense Property Property Property a h c Offense Offense Offense Property 1 2 d Offense Property f Offense Offense Property Property Ask the question: “show me which g e offenses share the same property” – you don’t know the subset of offenses, not the subset of properties to search

  25. Investigative Correlations Investigations IBM CONFIDENTIAL until January 2017

  26. Threat Hunting

  27. I ncident R esponse P la latform

  28. In Integrated and In Intelligent Controls

  29. Bridging Security In Intelligence: Hacking, g, Threat Hunting, g, AI, I, Behavioral Anomalies, , and In Incident Response

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend