dell presentation template standard 4:3 layout · and even they are converging into one category:...
TRANSCRIPT
![Page 1: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/1.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Dell SecureWorks
Counter Threat Unit Research Team
– Elite cyber intelligence talent focuses on threat actors, tradecraft and countermeasures
Counter Threat Platform
– Next generation technology applies intelligence to protect thousands of customers worldwide
Global Security Operations Centers
– 7 resilient, high- security facilities provide vendor-neutral, in- region service delivery 24x7x365
Certified Security and Compliance Experts
– 1,000+ security and compliance professionals deliver award- winning services and customer satisfaction
We help thousands of organizations protect against cyber threats, simplify regulatory compliance and embrace innovat ion securely.
1 C onfidential
![Page 2: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/2.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Percentage of U.S. adults who named online banking as their preferred banking method in 2011
GLBA FFIEC NCUA
PCI HIPAA
NERC CIP FISMA
700+ Federal and state security- related
laws
50 U.S. states with
varying data breach laws
76% IT staffs report being
buried in basic daily act ivit ies with lit t le t ime to focus on security & other projects
8,000 Security- related
software vulnerabilit ies
publicly disclosed
![Page 3: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/3.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
DSW
RXPr
ice
Ow
ner C
ost
Asse
t
Crim
inal
Cos
t C
rimin
al G
ain
Role of a managed security service provider
Increase risk Reduce reward Increase effort
3 Confidential
![Page 4: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/4.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
An integrated approach to security
4
Core Assets
Services
Business Value
Incident Response & Digital Forensics
Security & Risk Consulting Managed Security
Flexible Approach
Vertical Expertise
Purpose-built Technology
Scalable Security
Operations CTU
Intelligence
Threat Intelligence
Cost Control Compliance Flexibility Threat
Mitigation Visibility Rapid Response
Certified Security Experts
Dell SecureWorks delivers a comprehensive suite of information security services powered by our proprietary technology, global threat visibility and deep security expertise
C onfidential 6/11/20 13
![Page 5: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/5.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Information Security Leader
![Page 6: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/6.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
6
Dell SecureWorks positioned as a Leader in the Magic Quadrant for MSSPs, North America
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Dell. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
Source: Gartner “Magic Quadrant for MSSPs, North America” by Kelly M. Kavanagh, 15 November 2012.
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from Dell SecureWorks
“G artner sees continued expectations to reduce operational costs and capital expenditures, and avoid staffing increases, while maintaining a suffic ient security posture and meeting compliance
mandates.”
![Page 7: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/7.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Confidential 7 6/11/2013
Industry stats Doubling each year
New pieces of malicious code found daily
2011: 150,000 daily 2010: 75,000 daily 2009: 37,500 daily
1 of 6 SMBs has experienced an IT security breach (1 million+ U.S. companies)
71% Mobile devices in SMB environment found to have high severity operat ing system and applicat ion vulnerabilit ies
$11.3 million Est imated sales/ revenue opportunit ies lost by U.S. SMBs as a result of IT security breaches in the past year
$5.6 million Est imated spend by U.S. SMBs to replace damaged hardware as a result of IT security breaches in the past year
22 million Est imated staff-hours that U.S. SMBs have lost handling security breaches in the past year
40% Of all targeted attacks during past two years directed at companies with fewer than 500 employees
96% Of breached companies subject to PCI DSS had not achieved compliance status
92% Of breach incidents were discovered by a third party
![Page 8: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/8.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Current Threat Landscape
8 Confidential
![Page 9: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/9.jpg)
Global Marketing
Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
G lobal New Hire O rientation G lobal New Hire O rientation
Cyber Threat Macro Trends
Confidential 9 12/3/2012
Notoriety Basic Intrusion
& Viruses Fame
Viruses & Malware
Financial Theft & Damage
National Interests G overnment
Data/Networks Defense Industrial
Base
Thre
at S
ever
ity
1990 1995 2000 2005 2007 2010
![Page 10: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/10.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
The threat landscape
Malware Malicious software that disrupts computer operation, gather sensitive information, or gain unauthorized access to computers Computer viruses, worms, trojan horses, spyware, adware
A sophisticated and organized cyber attack to access and steal information from compromised computers
Advanced Threats
Denial- of-Service Distributed Denial-of-Service An attempt to make a computer or network resource unavailable to its intended users
DoS & DDoS
Cyber Warfare
Politically motivated hacking to conduct sabotage and espionage
C onfidential 6/11/20 13 10
![Page 11: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/11.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
11
Cyber attacks edging out terrorism as No. 1 threat to U.S.
“I am convinced there are only two types of companies: those that have been hacked and those that will be. And even they are converging into one category: companies that have been hacked and will be hacked again.”
“No company is immune, from the Fortune 500 corporat ion to the neighborhood ‘mom and pop’ business.”
“In the not too distant future, we ant icipate that the cyberthreat will pose the No. 1 threat to our country.”
Source: FBI Director Robert Mueller Speaking at 20 12 RSA C onference
![Page 12: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/12.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
“In many cases, the skills of the adversaries are so substant ial that they just leap right over the fence and you don’t even hear an alarm go off.”
Companies, from major mult inat ionals to small start-ups, fail to recognize the financial and legal risks they are taking – or the costs they may have already suffered.
He doesn’t believe there is a single secure, unclassified computer network in the U.S.
FBI agents are increasingly coming across data stolen from companies whose execut ives had no idea their systems had been accessed.
In cases handled by one computer security firm where intrusions were traced back to China, 94% of the targeted companies didn’t realize they had been breached unt il someone else told them.
Companies need to do more than just react to intrusions
Confidential 12
According to top cyber security experts
Source: “U.S. Outgunned in Hacker War” The Wall Street Journal, March 28, 2012
![Page 13: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/13.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Motivations Behind Cyber Crime
13
• Gain financial advantage
• Intelligence gathering
• Gain competitive advantage
• Damage organizations’ brand, reputation and systems
• Obtain indirect access to a targeted business partner Project “Scareware”.
Defrauded consumers of $100 million dollars
Co-conspirators are wanted by FBI
and Interpol
![Page 14: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/14.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Confidential 14
Criminal to Criminal
Fourth generat ion
Increase in criminal- to- criminal activity
– Exploit auction houses (WabiSabiLabi)
– Forums and IRC (# Vxers, cybermafia.cc)
– Distribution service (IFRAMES.BIZ)
– Botnet rental (5Socks.net)
– Licensing model (storm worm)
– Identity auctions (76service)
– Social networks (ranking and escrow)
![Page 15: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/15.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
What If Hackers Inc. Were a Company?
# 1
74x >
![Page 16: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/16.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Losses due to “traditional" crimes
Confidential 16
$10
$20
$30
$40
$50
$60
$70
$80
2003 2004 2005 2006 2007 2008 2009 2010 2011
RecoveredNet Loss
Source: FBI Bank C rime Statistics (BC S) Federally Insured Financial Institutions J anuary 1, 20 0 3- December 31, 20 11
Mill
ions
![Page 17: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/17.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
17 Confidential
Cybercrime vs. traditional crime
$0
$10
$20
$30
$40
$50
$60
$70
$80
$90
$100
Bank Robbery, etc. ZeuS Group A
Mill
ions
Recovered
Net Loss
![Page 18: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/18.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Confidential 18
Incident Source Trend March 2013
Source: OSF DataLossDB
49% of security incidents originate
outside of your four walls
![Page 19: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/19.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Confidential 19
Breach Trend March 2013
Source: OSF DataLossDB
29% of breaches are hacker activity
![Page 20: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/20.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Attacks per month, per customer (Q1/2012)
Source: Dell SescureWorks Counter Threat Unit Intelligence
20
![Page 21: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/21.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Hacker Activity is Global
Confidential 21 6/11/2013
1. China 2. India 3. Vietnam 4. Russia 5. US 6. Ireland 7. Poland 8. Belarus 9. Mexico 10. Ukraine
Source:Team C ymru
![Page 22: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/22.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Data Breaches are costly
Texas Comptroller $210
Health Net IBM
$114 Nemours Childrens
Health System $96
TRICARE - SAIC $307
Betfair $189
Jacobi Medical Center $102
Sony Corporat ion (Playstat ion Network)
$4,620
RSA $66
Stratfor
$52
Global Payments $90 Medicaid
$47
NY State Electric & Gas $108
CA Dept of Child Services
$48
Zappos $1,440
Shanghai Roadway D&B Market ing Services
$9,000 Tianya $2,400
7k7k $1,200
Care2 $1,074
Steam $2,100
Nexon Korea Corp $792
SK Communicat ions $2,100
London Health Programmes $518
SEGA $77
Sony Pictures $60
Sony Online Entertainment
$1,476
Power Market ing Limited $129
0.4
0.8
1.6
3.2
6.4
12.8
25.6
51.2
102.4
204.8
Jan-11 Feb-11 Apr-11 May-11 Jul-11 Sep-11 Oct-11 Dec-11 Feb-12 Mar-12
# o
f Rec
ords
Com
prom
ised
(in
mill
ions
)
2011-2012 Data Breaches (in millions of dollars)
Breaches and estimated costs retrieved from datalossdb.org, and idtheftcenter.org Sony’s records and costs reduced to fit on the map. Records exceeded 77m, and est. cost exceeds $4bln RSA records reduced to fit on the map. Actual records compromised was approx. 40m.
Dell Confidential 22
![Page 23: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/23.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
High profile compromises, Q4 2012
October November December 2012 2
Florida College (300,000 PII. Identity theft)
11
30
24
South Carolina Dept. of Revenue (3.6M tax records)
Barnes & Noble (PoS PII)
Russian Government (Team GhostShell, 2.5M accounts)
Greece (9M citizen records, suspect arrested)
3
Nationwide (1M PII)
Experian (17,000 credit reports)
29
14
NASA (Employee PII)
26
Coca-Cola (Chinese APT, cyberespionage)
5
China/QQ Messenger (1 Billion PII, suspect arrested)
26
28
Council on Foreign Relations
(APT, IE 0-day)
Verizon (300K PII, third party
leak by TibitXimer)
![Page 24: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/24.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Threat Intelligence
24 Confidential
![Page 25: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/25.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
25 Confidential
The Counter Threat Unit
Top security talent in the industry
– Former C ERT, Army G lobal NO SC , USC YBERC O M, DoD, Natl. Labs, C ISO s and SANS instructors
1,000+ security and compliance experts
– C ISSP – INFO SEC – C ISA – G IAC G C IA – G IAC G SEC – G IAC G C FW – G IAC G C IH – G IAC G C FA
– G IAC G C WN – G IAC G PEN – C C DP – C C NA – C C SE – C SPFA – C SVPN – C SIDS
– C C SP – C C IE – C C SA – C C DA – C C NP – INFO SEC – MC SA – MC SE
– MC P+I – MC SE+I – PMP – NC SA – C FE – C C SI – C EH – NO P
Highly regarded in the security community
– Black Hat, DEFC O N, ShmooC on, ToorC on, DeepSec, U.S. DoD C yber C rime C onference, C ERT- EE, AusC ERT, Hacker Halted, REC O N, APWG
![Page 26: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/26.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
26 Confidential
CTU’s strategic focus
Focused on “who” and “how”
– Threat actors and their missions – Tradecraft used in attacks – “Kill chain” – how to disrupt attack process
Elite cyber- intelligence experts
– Current and historical rich attack data – World- class intelligence platform and tools – Industry and law enforcement relationships
Targeted
Broad
Advanced Commodity
Script Kiddies
Hactivists APT
CTU
AV Vendors
IPS Vendors
Organized Cybercrime
![Page 27: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/27.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
• SOC and Data Center • SOC • Additional Delivery Staff
Noida, India Providence, RI
Myrtle Beach, SC Plano, TX
Edinburgh, Scotland
Atlanta, GA
Chicago, IL
Bangalore, India
Bucharest, Romania
Guadalajara, Mexico
70+ Countries
3K+ Customers
1K+ Security Pros
24x7 x365
~38B Daily Events
2K+ Daily Escalat ions
Global threat visibility
27 Confidential
![Page 28: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/28.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Real Life Examples
• Flame Malware
• Gameover Zeus Trojan Horse
• Searchhereonline downloader
• Blackhole Exploit Kit
• Targeted Exploit - CVE-2012-4681
Exist ing countermeasures already in place to detect and block Pony downloader act ivity.
Exist ing countermeasures already in place to detect act ivity associated with this downloader t rojan.
Dell SecureWorks CTU deploys 161 countermeasures to protect customers.
CTU already has countermeasures in place to detect and block Blackhole Exploit Kit
CTU developed iSensor countermeasures to detect and block t raffic associated with this exploit
![Page 29: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/29.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Risk-based approach
Confidential 29 6/11/2013
Direct loss risk Risk to reputat ion
Liability risk Compliance risk
Lost revenue, data
Lit igat ion, civil damages
Lose market share
Fines, penalt ies
![Page 30: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/30.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Real- time monitoring and analysis
Remaining Events of Interest
510,618,423 events
Event Consolidation
3,805,226
207,499
Peop
le &
Pro
cess
Anomaly Filter
Positive Filter
3,803,598 1,628
Negative Filter
506,813,197
Logic/Correlation Engines 5,633
Tech
nolo
gy
Counter Threat Appliance and CTP Agent
Sec urity Event Worm - C lient Not Vulnerable
1 Incident (21 Events)
Security Event
Suspic ious Activity
3 Incidents (32 Events)
Security Event Benign
5,532 Events
Security Event System /
Applicat ion 1 Incident 48 Events
Information from
Intelligence, Scanning, Trending &
Auditing
Incident Handling Process: Aggregate, Correlate, Categorize, Assess Threat, and Respond
Low Threat Incident is logged for future correlat ion and report ing, but no further act ion required.
Medium Threat Incident requires near term intervention by Dell SecureWorks and/or the customer to prevent availability or security issue.
High Threat Incident requires immediate intervent ion by Dell SecureWorks and the customer to prevent and/or remediate availability or security issue in progress.
3 Firewalls 3 IDS / IPS 50 Servers / Other
C onfidential 30
![Page 31: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/31.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
31 Confidential
• Invest in prevention
• Educate your employees
• Protect IT assets
• Reduce security costs
• Enable compliance
• Around- the- clock protection
• Layered security – (50/30/20 Rule)
Be proact ive
![Page 32: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/32.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Dell SecureWorks
Counter Threat Unit Research Team
– Elite cyber intelligence talent focuses on threat actors, tradecraft and countermeasures
Counter Threat Platform
– Next generation technology applies intelligence to protect thousands of customers worldwide
Global Security Operations Centers
– 7 resilient, high- security facilities provide vendor-neutral, in- region service delivery 24x7x365
Certified Security and Compliance Experts
– 1,000+ security and compliance professionals deliver award- winning services and customer satisfaction
We help thousands of organizations protect against cyber threats, simplify regulatory compliance and embrace innovat ion securely.
32 C onfidential
![Page 33: Dell Presentation Template Standard 4:3 Layout · And even they are converging into one category: companies that have been hacked and will be hacked again.” “No company is immune,](https://reader033.vdocuments.mx/reader033/viewer/2022042416/5f30f71d9adfbd2a1f56dd95/html5/thumbnails/33.jpg)
• Classification: //Dell SecureWorks/Confidential - Limited External Distribution:
Questions?
Jeff Multz, Dell SecureWorks Director, North America Medium Business Sales