1
Protecting your Assets
Presented by: Chris Nyhuis – Vigilant LLC.
9/16/14
¡ ¡ PSI ¡Tech ¡Expo ¡ ¡ Sept ¡4th, ¡2014 ¡
Protecting your Assets Sept 4th, 2014 Presented by: Chris - - PowerPoint PPT Presentation
PSI Tech Expo Protecting your Assets Sept 4th, 2014 Presented by: Chris Nyhuis Vigilant LLC. 9/16/14 1 Chris Nyhuis cnyhuis@vigilantnow.com http://www.vigilantnow.com Owner of Vigilant
1
Presented by: Chris Nyhuis – Vigilant LLC.
9/16/14
¡ ¡ PSI ¡Tech ¡Expo ¡ ¡ Sept ¡4th, ¡2014 ¡
2
Chris Nyhuis
cnyhuis@vigilantnow.com http://www.vigilantnow.com
Solutions an IT Cyber Security Personal Training Firm.
Years
Advanced Technical Intelligence Center (Dayton)
3
Security industry hasn’t
costs
4
Compliance
Security
attacks
required
5
Compliance
Security
attacks
required
6
What do these companies have in common?
Neiman Marcus
7
What do these companies have in common? They were all compliant…
HealthNet
145,000,000 70,000,000 94,000,000 Not Known Yet 130,000,000 1,500,000 92,000,000 3,900,000 24,000,000
8
Ponemon’s Cost of Data Breach Study: Global Study, sponsored by IBM. Studied 314 companies spanning 10 countries..
increased by 15%
9
Security is not the same as Compliance – Security is a balance of Control and Visibility
10
Before
randomly skilled
targets were the focus
Today
APT
through supply chain
11
SMB is the new gateway – Protect your reputation you may be the path
12
Before
Herd Mentality Protection
Today
targeted
13
14
detection
first 24 hours, less than 46% in the first 30 days
hours
breach investigations, as well as thousands of penetration tests and scans. It found that the average time between an initial breach and detection was 210 days. In 2011 it was 90 Days.
third party or customer
15
And if you are the only
never know
16
Symantec's senior vice president Brian Dye declared last quarter to the Wall Street Journal that antivirus "is dead."
The security industry doesn’t like that.
17
AV is dead, it does not make you safe it is only a layer of protection and not a good one but still useful
18
Before
Mentality Protection
Secure
Today
targeted
Automation and People
They are in, find them quick
19
Understanding the Problem: Why UTM Firewalls can’t be your only defense – Signature and Position
20
based detection.
Protecting yourself and lowering your costs:
21
Advanced Network Security Monitoring
22
23
Act like they are already in – Anomaly and Passive detection is imperative
24
25
CyberDNA
26
CyberDNA
Docs
27
CyberDNA
Downloaded files.
28
CyberDNA
network traffic
29
CyberDNA
2014
30
CyberDNA
31
Action on Objective is most expensive
attack
32
Take Away #5 Use Layered Protection
team on secure use of internet.
Anomaly Based detection
Managed Services
33
and Security
Security industry hasn’t
34
reputation you may be the path
and Passive detection is imperative
Protection and find them fast.
35
Chris Nyhuis cnyhuis@vigilantnow.com http://www.vigilantnow.com