Download - Security event presentation 3.4.2016-final
![Page 1: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/1.jpg)
![Page 2: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/2.jpg)
Gavin ZimmerVice President of Sales
Cal Net Technology GroupSouthern California’s Premier IT Service Provider
![Page 3: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/3.jpg)
Cal Net Technology Group (CNTG)
03
WE START WITH OUR MISSION
AND PURPOSE…
![Page 4: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/4.jpg)
MISSIONCal Net Technology Group (CNTG)
03
Our Mission is to Enable IT Solutions in our
clients’ organizations to allow them to focus their business on what they do, and do what they
do more effectively.
![Page 5: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/5.jpg)
PURPOSECal Net Technology Group (CNTG)
03
to be AN Extension of your IT Department
![Page 6: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/6.jpg)
Managed Services
Remote & Onsite
BPO
NOC
Security
Pro Services
Subject Matter Expertise
Virtual CIO & CISO
Advanced Technology Integration
Physical, Virtual &Cloud
Plan
Design
Acquire
Deploy
ORGANIZATIONCal Net Technology Group (CNTG)
Shared Services
Shared Resources
Integrated Processes
Separate P&L
Integrated Into Specialist Sales Motion
Three Autonomous Business Units
03
![Page 7: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/7.jpg)
FLEXIBLE PATHSCNTG’s Differentiated GTM Model
Direct VerticalsBusiness Alignment
Partner Based (Joint)
Infrastructure/ISV
SubcontractingManaged & Pro
Services
Private LabelManaged/Pro Services/BPM
Public Sector to Commercial (Vertical)
Horizontal (Emerging Growth to Reserved Accounts)
Plan, Build & Run Operating Model
Joint Managed and Professional Services Engineers Coordinated
Standardization where possible
Lead Generation could be combined with Sub & Private Label
Transactional to management of outcomes
Leverage 75+ W2 Certified Professional Services Resources
Non-circumvent and non-compete covenants
Custom NOC & SOC Operations Tailored to Protecting Brand
Include Managed Service Offerings, Security Offerings and Professional Services
Non circumvent and non-compete covenants
Certified and Capable: Industry Specific Accreditations
02
MAJOR VENDORS SPECIFIC SOLUTION VENDORS
![Page 8: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/8.jpg)
OFFERINGSCNTG’s Diversified Offerings
03
![Page 9: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/9.jpg)
ACCOMPLISHMENTSCNTG’s Success Stories
04
Industry Awards Manufacturing Finance & Legal
Education& Non Profit Retail Entertainment
Microsoft Partnerof the Year2013-2015
MarvinEngineering
Fishman,Diamond & Block
GoodwillCoffee Bean& Tea Leaf
Director’s Guildof America
LA Business Journal CIO’s IT Service Partner
of the Year
KaiserAluminum
Hotchkis & Wiley LACMA Fox Rental CarWriter’s Guild
of America
MSP Mentor Top 150 Worldwide
Meggitt ACLUSkirball Cultural
CenterTrue Religion
Bunim-Murray Productions
Best Placesto Work
GlenairDignified
Home LoansHarvard-Westlake
Wolfgang Puck Worldwide
NBC Universal
Inc. 5000 Fastest Growing
Companies in North America
KyoceraBerkshire Hathaway
ModernHealth Care
JetEdgeScreen Actors
Guild
![Page 10: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/10.jpg)
Matt LindleyDirector of Security Services
Cal Net Technology GroupSouthern California’s Premier IT Service Provider
![Page 11: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/11.jpg)
CYBERCRIME TRENDS & TARGETS
IT Security Budget & Level of Protection
Val
ue
of
Exp
loit
able
Ass
ets
Enterprise
Small Business
Cybercriminal Sweet SpotMid-size Business
![Page 12: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/12.jpg)
205 days is the average amount of time organizations
had been compromised before they knew it– FireEye/Mandiant - 2015
![Page 13: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/13.jpg)
You are just finding out today that your network was compromised on August 12th 2015
![Page 14: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/14.jpg)
“There are only two types of companies: those that have been hacked and those that will be.”
- 2012 Robert Mueller, Former FBI Director
![Page 15: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/15.jpg)
VICTIM,VULNERABLE OR VAGUE
Don’t Know They’ve Already
Been Hacked
Will Be Hacked
Have Been Hacked
More than 80 percent of U.S. companies have been successfully hacked, according to a Duke University/CFO Magazine Global Business Outlook Survey.
![Page 16: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/16.jpg)
The average cost for detection and escalation only subsequent to a security breach is approximately $417,700*
- Ponemon Institute & IBM 2015 – Cost of Data Breach Report * Cost does not include: Average Total Cost of Data Breach $3.8 Million
Loss of business (Brand)
Remediation and
mitigation costs
Notification
Identity Protection
![Page 17: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/17.jpg)
THE EVOLUTION OF THREATS
“Never before in the history of human kind have people across
the world been subjected to extortion on a massive scale as they are
today”.
-Symantec : The evolution of Ransomware 2015
20051989 2008 2011 2013 2014 2015
![Page 18: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/18.jpg)
RANSOMWARE TODAY
Cisco’s analysis of malware
validated as “known bad”
found that the majority of
that malware—91.3
percent—use the Domain
Name Service in one of
these three ways:
- To gain command and
control
- To exfiltrate data
- To redirect traffic
![Page 19: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/19.jpg)
![Page 20: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/20.jpg)
“99.9%OF THE EXPLOITED
VULNERABILITIES
WERE COMPROMISED
MORE THAN A YEAR
AFTER THE CVE
WAS PUBLISHED.”
“About half of the CVEs
exploited in 2014 went
from publish to pwn in
less than a month.”
VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT
Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE Identifiers) for publicly known cybersecurity vulnerabilities.
![Page 21: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/21.jpg)
![Page 22: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/22.jpg)
DEFENSE IN DEPTH
![Page 23: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/23.jpg)
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
Perimeter
Network
DEFENSE IN DEPTH
Application
Data
Host
SIEM In Depth
![Page 24: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/24.jpg)
VIIPR
THREAT
RESPONSE
FRAMEWORK
V
I
I
P
R
![Page 25: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/25.jpg)
SECUREMANAGE ENTERPRISE
Security Solutions View Identify Investigate Prioritize Remediate
Managed SIEM Included
Performance, Availability and Change Monitoring Included
Threat Intelligence Center / Threat Feeds Included
Asset Management (CMDB) Included
Single Pane of Glass Portal with Unlimited Users* Included
Customized Dashboards for Security, Performance and Compliance Included
24x7 Event Alerting (Email, Pager/SMS, Dashboard) Included
Internal and External Vulnerability Scanning Included
Vulnerability Remediation Prioritization Included
System Hardening Checks Included
Compliance Alerting, Dashboards and Reporting for PCI, GLBA, FFIEC Included
Threat Monitoring, Analysis and Escalation Included
Expert SOC Analyst Remediation Recommendation Escalation Included
Security Event Remediation (Remote Only) Included
SECUREManage for Enterprise - Compliance
![Page 26: Security event presentation 3.4.2016-final](https://reader033.vdocuments.net/reader033/viewer/2022042906/58a869da1a28ab90568b4581/html5/thumbnails/26.jpg)
THANKYOU!
CAL NET TECHNOLOGY GROUP