security event presentation 3.4.2016-final

26

Upload: cal-net-technology-group

Post on 18-Feb-2017

130 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Security event presentation 3.4.2016-final
Page 2: Security event presentation 3.4.2016-final

Gavin ZimmerVice President of Sales

Cal Net Technology GroupSouthern California’s Premier IT Service Provider

Page 3: Security event presentation 3.4.2016-final

Cal Net Technology Group (CNTG)

03

WE START WITH OUR MISSION

AND PURPOSE…

Page 4: Security event presentation 3.4.2016-final

MISSIONCal Net Technology Group (CNTG)

03

Our Mission is to Enable IT Solutions in our

clients’ organizations to allow them to focus their business on what they do, and do what they

do more effectively.

Page 5: Security event presentation 3.4.2016-final

PURPOSECal Net Technology Group (CNTG)

03

to be AN Extension of your IT Department

Page 6: Security event presentation 3.4.2016-final

Managed Services

Remote & Onsite

BPO

NOC

Security

Pro Services

Subject Matter Expertise

Virtual CIO & CISO

Advanced Technology Integration

Physical, Virtual &Cloud

Plan

Design

Acquire

Deploy

ORGANIZATIONCal Net Technology Group (CNTG)

Shared Services

Shared Resources

Integrated Processes

Separate P&L

Integrated Into Specialist Sales Motion

Three Autonomous Business Units

03

Page 7: Security event presentation 3.4.2016-final

FLEXIBLE PATHSCNTG’s Differentiated GTM Model

Direct VerticalsBusiness Alignment

Partner Based (Joint)

Infrastructure/ISV

SubcontractingManaged & Pro

Services

Private LabelManaged/Pro Services/BPM

Public Sector to Commercial (Vertical)

Horizontal (Emerging Growth to Reserved Accounts)

Plan, Build & Run Operating Model

Joint Managed and Professional Services Engineers Coordinated

Standardization where possible

Lead Generation could be combined with Sub & Private Label

Transactional to management of outcomes

Leverage 75+ W2 Certified Professional Services Resources

Non-circumvent and non-compete covenants

Custom NOC & SOC Operations Tailored to Protecting Brand

Include Managed Service Offerings, Security Offerings and Professional Services

Non circumvent and non-compete covenants

Certified and Capable: Industry Specific Accreditations

02

MAJOR VENDORS SPECIFIC SOLUTION VENDORS

Page 8: Security event presentation 3.4.2016-final

OFFERINGSCNTG’s Diversified Offerings

03

Page 9: Security event presentation 3.4.2016-final

ACCOMPLISHMENTSCNTG’s Success Stories

04

Industry Awards Manufacturing Finance & Legal

Education& Non Profit Retail Entertainment

Microsoft Partnerof the Year2013-2015

MarvinEngineering

Fishman,Diamond & Block

GoodwillCoffee Bean& Tea Leaf

Director’s Guildof America

LA Business Journal CIO’s IT Service Partner

of the Year

KaiserAluminum

Hotchkis & Wiley LACMA Fox Rental CarWriter’s Guild

of America

MSP Mentor Top 150 Worldwide

Meggitt ACLUSkirball Cultural

CenterTrue Religion

Bunim-Murray Productions

Best Placesto Work

GlenairDignified

Home LoansHarvard-Westlake

Wolfgang Puck Worldwide

NBC Universal

Inc. 5000 Fastest Growing

Companies in North America

KyoceraBerkshire Hathaway

ModernHealth Care

JetEdgeScreen Actors

Guild

Page 10: Security event presentation 3.4.2016-final

Matt LindleyDirector of Security Services

Cal Net Technology GroupSouthern California’s Premier IT Service Provider

Page 11: Security event presentation 3.4.2016-final

CYBERCRIME TRENDS & TARGETS

IT Security Budget & Level of Protection

Val

ue

of

Exp

loit

able

Ass

ets

Enterprise

Small Business

Cybercriminal Sweet SpotMid-size Business

Page 12: Security event presentation 3.4.2016-final

205 days is the average amount of time organizations

had been compromised before they knew it– FireEye/Mandiant - 2015

Page 13: Security event presentation 3.4.2016-final

You are just finding out today that your network was compromised on August 12th 2015

Page 14: Security event presentation 3.4.2016-final

“There are only two types of companies: those that have been hacked and those that will be.”

- 2012 Robert Mueller, Former FBI Director

Page 15: Security event presentation 3.4.2016-final

VICTIM,VULNERABLE OR VAGUE

Don’t Know They’ve Already

Been Hacked

Will Be Hacked

Have Been Hacked

More than 80 percent of U.S. companies have been successfully hacked, according to a Duke University/CFO Magazine Global Business Outlook Survey.

Page 16: Security event presentation 3.4.2016-final

The average cost for detection and escalation only subsequent to a security breach is approximately $417,700*

- Ponemon Institute & IBM 2015 – Cost of Data Breach Report * Cost does not include: Average Total Cost of Data Breach $3.8 Million

Loss of business (Brand)

Remediation and

mitigation costs

Notification

Identity Protection

Page 17: Security event presentation 3.4.2016-final

THE EVOLUTION OF THREATS

“Never before in the history of human kind have people across

the world been subjected to extortion on a massive scale as they are

today”.

-Symantec : The evolution of Ransomware 2015

20051989 2008 2011 2013 2014 2015

Page 18: Security event presentation 3.4.2016-final

RANSOMWARE TODAY

Cisco’s analysis of malware

validated as “known bad”

found that the majority of

that malware—91.3

percent—use the Domain

Name Service in one of

these three ways:

- To gain command and

control

- To exfiltrate data

- To redirect traffic

Page 19: Security event presentation 3.4.2016-final
Page 20: Security event presentation 3.4.2016-final

“99.9%OF THE EXPLOITED

VULNERABILITIES

WERE COMPROMISED

MORE THAN A YEAR

AFTER THE CVE

WAS PUBLISHED.”

“About half of the CVEs

exploited in 2014 went

from publish to pwn in

less than a month.”

VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT

Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE Identifiers) for publicly known cybersecurity vulnerabilities.

Page 21: Security event presentation 3.4.2016-final
Page 22: Security event presentation 3.4.2016-final

DEFENSE IN DEPTH

Page 23: Security event presentation 3.4.2016-final

10110010010010101001001110100110100

10110010010010101001001110100110100

10110010010010101001001110100110100

10110010010010101001001110100110100

10110010010010101001001110100110100

10110010010010101001001110100110100

10110010010010101001001110100110100

10110010010010101001001110100110100

Perimeter

Network

DEFENSE IN DEPTH

Application

Data

Host

SIEM In Depth

Page 24: Security event presentation 3.4.2016-final

VIIPR

THREAT

RESPONSE

FRAMEWORK

V

I

I

P

R

Page 25: Security event presentation 3.4.2016-final

SECUREMANAGE ENTERPRISE

Security Solutions View Identify Investigate Prioritize Remediate

Managed SIEM Included

Performance, Availability and Change Monitoring Included

Threat Intelligence Center / Threat Feeds Included

Asset Management (CMDB) Included

Single Pane of Glass Portal with Unlimited Users* Included

Customized Dashboards for Security, Performance and Compliance Included

24x7 Event Alerting (Email, Pager/SMS, Dashboard) Included

Internal and External Vulnerability Scanning Included

Vulnerability Remediation Prioritization Included

System Hardening Checks Included

Compliance Alerting, Dashboards and Reporting for PCI, GLBA, FFIEC Included

Threat Monitoring, Analysis and Escalation Included

Expert SOC Analyst Remediation Recommendation Escalation Included

Security Event Remediation (Remote Only) Included

SECUREManage for Enterprise - Compliance

Page 26: Security event presentation 3.4.2016-final

THANKYOU!

CAL NET TECHNOLOGY GROUP