introducing

31

Upload: peyton

Post on 22-Feb-2016

20 views

Category:

Documents


0 download

DESCRIPTION

Introducing. C yber A ttack R emediation & M itigation. Your Cyber Defences will be Breached! It’s Inevitable! WHAT WILL YOU DO?. Unique Integrated S olution P latform Demonstrable TODAY @ Exclusive Networks Combing Best of Breed ‘Ingredients’ - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Introducing
Page 2: Introducing

CyberAttackRemediation &Mitigation

Introducing

Page 3: Introducing

Your Cyber Defences will be Breached!It’s Inevitable!

WHAT WILL YOU DO?

Page 4: Introducing
Page 5: Introducing

• Unique Integrated Solution Platform

• Demonstrable TODAY @ Exclusive Networks

• Combing Best of Breed ‘Ingredients’

• One – Post Breach Integrated Solution

- Identification- Containment- Rapid Response & Remediation- Full Forensics

• Focused – Post Breach

Page 6: Introducing

Benefits:• Faster Notification • Earlier Remediation – Find2Fix • Improved Visibility & Intelligence• Vastly Enhanced ‘Post Breach’

Response• Minimising Damage

- Cost/Reputation• Efficient Use of Limited Resource

Page 7: Introducing

Why Do We Need CARM?• USA

>47,000 known IT security incidents in 2012 (Ref Verizon 2013)

• UK IT Security Incidents in 2012 >54 per large organisation pa (Ref PWC 2013)

• Average Cost of a Data Leak – Large Co.$3.5M per organisation (Ref Ponemon Rpt)

• Belgium – 334 ‘Serious’ Incidents per Month • (ref CERT)

Page 8: Introducing

The Problem is Growing !• Number of Devices (Endpoints) per User

– PCs, Tablets, Smartphone• BYOD

– Consumerisation and choice increases IT workload

• Mobility– Android based threats to hit 1M in 2013– 30% increase in Mobile Malware in last 6mnths

(Fortinet)

• Cloud– Attractive point of entry for a cyber attack

• Applications– App Stores outside of IT control

Source:Execs Guide to 2012 Data Breaches - OSF

Page 9: Introducing

....and Threats are Getting More Challenging!• Advanced Persistent Threats (APTs)

– Often organisationally driven• Zero Day Exploits

– Defending against the unknown• Polymorphic Threats

– Ever changing

It’s inevitable that some of these threats will become successful ATTACKS!

Page 10: Introducing

Evidence . . Fighter Jets• 2009

– China is 16 years behind the US

• BY 2020 – > 1000 US fighters 5th Generation

• F35’s and F22’s! • By 2025

– The GAP widens

• US saw this as a big threat to national security - Why?

Page 11: Introducing

2012: Spot the Difference

Lockheed USAF F22

Chengdu J-20

Page 12: Introducing

Threats are Commoditising . . . .

• Nation v Nation – Cyber Warfare • National Government – Espionage • Central Governments - Hacktervism• Large, Global Brands - IP/Robbery • Mid to Large sized Organisations - Robbery?• You . . . . Burglary

Page 13: Introducing

Post Breach Boom!

Page 14: Introducing

Acceleration of Intellectual Property Loss: Significant Breaches of 2012

Jan Feb Mar Apr May Jun July Aug Sept OctJan Feb Mar Apr May Jun July Aug Sept Oct Nov

Page 15: Introducing

What’s The Real Cost?

Total cost is > double real cost . . .

Page 16: Introducing

Direct v Indirect

Ref: Ponemon 2013

Page 17: Introducing

The True Cost of Breach• Loss of revenue

– From outage, no trading

• Damage to reputation– Negative Customer reaction

• Loss of data– Cost of replacement, repair and compliance

• Interruption to business– Diverting resources will delay core activity

• Damage to customer confidence– Loyalty & ongoing business delayed or

lost

• Damage to investor confidence– Valuation can affect credit limits &

increase costs

• Loss of Intellectual property– Leadership position lost & margin

impact

• Legal costs– See all the above!!!

Page 18: Introducing

Customer Pain Points• Lack of Visibility

– Anomalies, behaviours, performance degradation– Indicators of change

• Sheer Volume of Incidents– Lateral spread

• Incident Response Processes– Speed of response

• Time to Remediate– Manpower, skills

• Why Did it Happen?– Forensics

• Costs . . . A New Approach is Needed!

Page 19: Introducing

So What is Needed?

• A Cyber Attack ‘Early Warning System’

• Rapid Defence Re-configuration• Centralised ‘Command and Control’• Better Visibility • Actionable Intelligence• Learn from our Lessons

Page 20: Introducing

...introducing

CyberAttackRemediation &Mitigation and respond

Page 21: Introducing

Downgrades Attacks into known Threats!

Page 22: Introducing

• Signature-less Defence• High Accuracy Threat Detection• Shared Threat Intelligence• ‘Inside Out’ as well as ‘Outside

In’ Protection• Virtual Execution• Response Automation

Qualities

Page 23: Introducing

CARM delivers:

• Real-time Monitoring• BIG DATA Analysis for Abnormality Detection• Low-latency Incident Evaluation & Qualification• Low-latency Incident Response Determination• APIs• Control• Reconfigurable Defences

Page 24: Introducing

1 Platform…Multiple Ingredients

Page 25: Introducing
Page 26: Introducing
Page 27: Introducing

...introducing CARMCyberAttackRemediation &Mitigation

Breach is Inevitable

Just like a 3 putt . . . .

And just like a 3 putt . . . It’ll surely happen again

Page 28: Introducing

Why Exclusive Networks?• Integrates Platform for the First Time • Drove Development Work with API's • First World Wide ‘Integrated/Interworking’ Solution Platform• First Demo System Available at HQ & London • Use Exclusive Networks to Engineer Demo's and POC's • Promo Pack & Collaterals for Customisation

– eDM/ eShot – Telemarketing Script – White Paper – Presentation – Brochure

Page 29: Introducing

VAR Benefits • Post Breach – Big Issue• Addresses a Real Need – NOW • Good Reason for a Conversation with Customers• Demo Facility can be Booked • Demonstrate Value to Customers • Incremental Revenue Opportunities • Could be Annuity Based if Sold as a Service• Speak to your Account Manager for Further

Information

Page 30: Introducing

Summary • Post Breach ERA is on US• Not IF but WHEN • Organisations Need to Address it

– Seen as costly – Too complex – More work in overloaded department

• CARM Simplifies & Automates This • Rapid Outcomes at Reasonable Cost • Real-life Working Platform NOW for Demos• It Works!!!

Page 31: Introducing