Caspida Cyber Security Presentation at RSA 2014

3,172
-1

Published on

Cyber security presentation by Caspida at the RSA 2014 conference.

Presented by Karthik Kannan, Founder & CMO, and Christos Tryfonas, Founder & CTO.

"Do you really know who is on your network?"

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,172
On Slideshare
0
From Embeds
0
Number of Embeds
6
Actions
Shares
0
Downloads
56
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • So, how do you deliver user-centric security analytics?
  • Caspida Cyber Security Presentation at RSA 2014

    1. 1. Do you really know who is on your network?!? Karthik Kannan Founder, CMO Christos Tryfonas Founder, CTO Caspida Inc.
    2. 2. Tectonic Shifts in Security Industry The Mobile Cloud Era Vanishing boundaries “Security Intel” sharing Caspida Inc.
    3. 3. Data Security is at its Worst Caspida Inc.
    4. 4. Your Corporate Jewels are at Stake Confidential corporate data Revenue, financial loss Private customer data Reputation Caspida Inc.
    5. 5. Attack Vectors are Spreading Caspida Inc.
    6. 6. Threat Evolution Threat type • • • • APTs Malicious users DIY SIEM Firewalls Malware detection Scale & depth Targeted attacks Phishing, malware Virus, spyware Complexity Signature Object analysis Machine-learning, behavior models and anomaly detection Caspida Inc.
    7. 7. Current Tools: Disservice to you Signatures Rules Malware No dynamic, user-centric approach Caspida Inc.
    8. 8. Security Professional’s Nightmares Significant Attack Variability and Sophistication Thousands of Alerts w/ false Positives (APT, Polymorphic and Low-Grade Attacks) Outdated Toolsets (Firewalls, IDSs, AV, Anti-Malware) Caspida Inc.
    9. 9. Caspida Inc.
    10. 10. Architectural Shifts in Security … Mobile Application Explosion Internet Smart Adversaries (Governments, Groups etc.) Significant Attack Variability and Sophistication (APT, Polymorphic and Low-Grade Attacks) New Infiltration Methods Impossible to use any signature or rules-based system Enterprises With Cloud and BYOD/Mobile Access Caspida Inc.
    11. 11. Security Paradigms need a Jolt  Data Science applied to security  Virtual firewalls across mobile & cloud  Location & role-aware security analytics End to end security intelligence – No more point products Caspida Inc.
    12. 12. Next Steps  Engage NOW for free security threat intelligence  Learn more: − www.caspida.com  Contact: − Karthik Kannan (karthik@caspida.com) Caspida Inc.
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×