April 19, 2019
CI Security
Mike Hamilton Founder and CISO
Our stuff keeps your stuff from becoming their stuff
CI Security Mike Hamilton Founder and CISO April 19, 2019 2 - - PowerPoint PPT Presentation
April 19, 2019 Our stuff keeps your stuff from becoming their stuff CI Security Mike Hamilton Founder and CISO April 19, 2019 2 Surviving 2019 and Beyond SCITDA September 24, 2019 April 19, 2019 Your Presenter Founder, CI Security
April 19, 2019
Mike Hamilton Founder and CISO
Our stuff keeps your stuff from becoming their stuff
April 19, 2019
SCITDA September 24, 2019
April 19, 2019
Guardent
April 19, 2019
You will recognize
And in some cases
Management
April 19, 2019
April 19, 2019
April 19, 2019
April 19, 2019
April 19, 2019
https://ci.security/ 9
April 19, 2019
April 19, 2019
April 19, 2019
April 19, 2019
April 19, 2019
April 19, 2019
NOTE that the problem waxes and wanes due to the value of the cryptocurrency and power costs
April 19, 2019
April 19, 2019
April 19, 2019
Arbor believes that we’ve entered a new era in which Tb/s DDoS attacks will be common, whether it’s through memcached server vulnerabilities or through other vulnerabilities attackers may be able to find later.
April 19, 2019
April 19, 2019
April 19, 2019
April 19, 2019
April 19, 2019
source: https://motherboard.vice.com/en_us/article/59weqb/a-spyware-company-audaciously-offers-cyber-nukes
April 19, 2019
April 19, 2019
April 19, 2019
April 19, 2019
27
We now recognize we cannot eliminate the likelihood of security events
April 19, 2019
The impact (usually financial) of that realized threat
28
April 19, 2019
https://ci.security/ 29
April 19, 2019
Most organizations suffer deal with the fallout
average days until compromised asset detected
third party such as the FBI
with regulatory requirements
https://ci.security/ 30
April 19, 2019
https://www.armor.com/blog/dwell-time-cyber-security-metric/
April 19, 2019
April 19, 2019
April 19, 2019
https://www.legalcheek.com/2019/03/40-of-ai-start-ups-dont-use-ai/ https://www.csoonline.com/article/3378201/11-questions-to-ask-before-buying-ai-enabled-security-software.html
April 19, 2019
Threat Intelligence Firms Look to AI, but Still Require Humans Machine learning and artificial intelligence are helping threat-intelligence firms cover a greater area
are racing to expand their machine-learning capabilities to capture more of the un-indexed parts of the internet, but somewhat ironically, human analysts and experts remain critical to the effort.
https://www.darkreading.com/risk/threat-intelligence-firms-look-to-ai-but-still-require-humans/d/d-id/1334570
https://www.ttnews.com/articles/ai-will-boost-productivity-needs-human-guidance https://www.extremetech.com/extreme/291952-google-duplex-still-needs-a-lot-of-help-from-humans
April 19, 2019
36 Confidential Information
April 19, 2019
https://ci.security/ 37
Data Sharing Agreements Real-Time Network Security Data City and County Governments CI Security Provides the Monitoring Stack, Collectors, and Maintenance 5-year contract for technology and maintenance services Data Access for Cyber Analyst Curriculum Curriculum Agreements Technology Hosting Agreement Incident Reporting and Response The PISCES Nonprofit
April 19, 2019
You still don't have to run faster than the bear, but you might be collateral damage
emerging threat – monitor, including your control systems (water/waste/traffic/etc.)
April 19, 2019
April 19, 2019
April 19, 2019
Our stuff keeps your stuff from becoming their stuff