Emerging Threat Example: Power Station Subcontractor Energy firm - - PowerPoint PPT Presentation

emerging threat example power station subcontractor
SMART_READER_LITE
LIVE PREVIEW

Emerging Threat Example: Power Station Subcontractor Energy firm - - PowerPoint PPT Presentation

ICA Emerging Threat Example: Power Station Subcontractor Energy firm with confidential information Subcontractor transferred information to a home router Information related to cabling and backups at one of the companys power


slide-1
SLIDE 1

Emerging Threat Example: Power Station Subcontractor

  • Energy firm with confidential

information

  • Subcontractor transferred

information to a home router

  • Information related to cabling

and backups at one of the company’s power stations, and projects for tender

  • Detected as anomalous –

abnormal data transfers

ICA

slide-2
SLIDE 2

Emerging Threat Example: Insider @ Italian Bank

  • Large-scale exfiltration of

sensitive data from an Italian bank

  • Legitimate user credentials

used to send confidential files via Facebook

  • Anomalous behavior detected

within three minutes

ICA

slide-3
SLIDE 3

Cyber Intelligence – The Immune Technology Model

Set Expectations 100% visibility, not 100% security. Innoculate against internal threats while they germinate –before they spread Embrace Technology & Automation People will never be fast enough, every time. Intelligent automation of detection and response will be critical in new era of fast-moving threats Enable People Use machine learning to enhance the value of your greatest assets – your people

ICA

slide-4
SLIDE 4

New Era of Cyber Threat: Machine-on-Machine Attacks

  • Attacks where algorithms are fighting
  • ther algorithms
  • The battle to protect the border is over
  • The real struggle has now moved

inside our corporate networks

  • No security team – however large or

skilled – can keep up with the speed

  • f today’s threats

ICA

slide-5
SLIDE 5

Key Conclusions

  • Machine learning at the heart of new

defense

  • The battlefield is now inside corporate

networks

  • Rules and signatures are not enough
  • No security team, no matter how large, is

fast enough to keep up with the new era of machine threats!

  • Immune system technology is able to adapt

at the same speed as threats, and the same speed as your organization

  • Immune System Technology constitutes a

fundamental new approach

ICA

slide-6
SLIDE 6

Thank You! Japan@Darktrace.com