apistek · 2018-03-21 · security visibility assets and network decoys, lures, sophisticated...
TRANSCRIPT
![Page 1: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/1.jpg)
14 March 2018
����������-���
![Page 2: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/2.jpg)
We Live In A World Where Current Tools Force Security Teams To Play By Old Rules
Device Centric | Not Integrated | Not Automated | Force Lots Of Manual Effort | Unable To Adapt
![Page 3: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/3.jpg)
3 2016 Verizon Data Breach Report: http://www.verizonenterprise.com/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdf
THE DATA DEMONSTRATE THE CHALLENGE
92% of Compromises happen within Minutes
93% of Compromises take Days, Weeks or Monthsto Discover.
![Page 4: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/4.jpg)
DETECT & RESPOND IS NOT KEEPING PACE WITH THE ACCELERATION & SOPHISTICATION OF ATTACK
SECURITY OPERATIONS’ ABILITY TO
![Page 5: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/5.jpg)
THIS IS NOT THE PROBLEM
5
Ransomware surge source: https://www.icsalabs.com/todays-hottest-threatsVerizon Data Breech Report: http://www.verizonenterprise.com/resources/reports/rp_dbir-2016-executive-summary_xg_en.pdfSymantec Internet Security Threat Report: https://www.symantec.com/content/dam/symantec/docs/reports/istr-21-2016-en.pdfCyber security Statistics and Facts: http://expandedramblings.com/index.php/cybersecurity-statistics/4 cybersecurity stats that will blow you away: http://www.fool.com/investing/2016/11/13/4-cybersecurity-stats-that-will-blow-you-away.aspxOctober 2016 Cyber Attack Statistics: http://www.hackmageddon.com/2016/11/16/october-2016-cyber-attacks-statistics/
16% Of all cyber incidents
last year according
to Verizon
12,000% Increase in ransomware attempts measured by ICSA Labs Q4 2015 – Q3 2016
95% Of all Web Application Attacks
Are Financially Motivated
according to Verizon
$6.5 millionAverage cost of a data breach
$154 Estimated average cost per
stolen record in a data
breach
1.3 millionAverage number of identities
exposed per breach
according to symantec
36%Annual Increase in malware variants
$2.1 trillionExpected cost of handling cyberattacks globally by 2019 according to Lloyd’s & Juniper Research
43%Data breaches caused
internally according to Intel
52%Percent of companies
expecting a successful
cyberattack in the next year
according to CyberEdge Group 55%Of Attacks Are Made Up Of Malware, Account Hijacking
& Targeted Attacks according to hackmageddon.com
WannaCry
Petya
GoldenEye
Spectre DoublePulsar
FalsePositivesFalseNegatives
Too Many
Alerts
EternalBlue
Meltdown
![Page 6: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/6.jpg)
IT IS THE NOISE THAT HIDES THE PROBLEM
IT IS DETECTION WITHOUT
UNDERSTANDING
![Page 7: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/7.jpg)
IT IS INSIGHT WITHOUT
ACTION
![Page 8: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/8.jpg)
IT IS TIME FOR SECURITY OPERATIONS TO TRANSFORM
![Page 9: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/9.jpg)
WHAT IF SECURITY OPERATIONS’
EFFECTIVENESS & EFFICIENCY
COULD INCREASE
BY 10 TO 20 TIMES?
20X BIGGER!
![Page 10: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/10.jpg)
The Fidelis ADR Platform
Agents
HIGHLIGHTS
• Complete Visibility Broad & Deep Across Network & Endpoints
• Automated Detection Across A Universe Of Detectors, Intelligence & Analytics
• Automated Response From Investigation Through Validation, Correlation, Expulsion & Custom Workflows
• Deception to lure attackers into Decoy, deceive, analyze and protect.
Operational ThreatIntelligence
COLLECTOR
HISTORICAL ANALYTICS & HUNTING METABASE
FIDELISNETWORK™
RESPONSE AUTOMATION & ANALYTICS
ENGINE
FIDELISENDPOINT™
Sensors
FIDELISDECEPTION™
![Page 11: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/11.jpg)
Data TheftProtection
Advanced Malware
Protection
Network Security Analytics
network endpoint
CCTV
CCTV
1
2
3
45
![Page 12: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/12.jpg)
deception
Intelligent Deception
Security Visibility
Assets and Network decoys, lures, sophisticated data-traps
Asset profiling, Anomaly detection, Forensics, Threat
analysis. Learning TTPs andKill-Chain analysis
Traffic Analysis
C2 channels , Shadow IT, Data exfiltration, Internet Comm.
![Page 13: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/13.jpg)
13
WE PREVENTATTACKERS
FROMACHIEVING
THEIRMISSION …by creating a world where attackers
have no place left to hide.
Reduce time to Detection and Response…
![Page 14: Apistek · 2018-03-21 · Security Visibility Assets and Network decoys, lures, sophisticated data-traps Asset profiling, Anomaly detection, Forensics, Threat analysis. Learning TTPs](https://reader033.vdocuments.net/reader033/viewer/2022042606/5f9719e419231d577259e364/html5/thumbnails/14.jpg)
Questions?