SlideShare a Scribd company logo
1 of 12
Do you really know who is
on your network?!?
Karthik Kannan
Founder, CMO

Christos Tryfonas
Founder, CTO

Caspida Inc.
Tectonic Shifts in Security Industry
The Mobile Cloud Era
Vanishing boundaries
“Security Intel” sharing

Caspida Inc.
Data Security is at its Worst

Caspida Inc.
Your Corporate Jewels are at Stake
Confidential corporate data

Revenue, financial loss

Private customer data

Reputation

Caspida Inc.
Attack Vectors are Spreading

Caspida Inc.
Threat Evolution
Threat type

•
•
•
•

APTs
Malicious
users

DIY
SIEM
Firewalls
Malware detection

Scale & depth

Targeted
attacks
Phishing,
malware
Virus,
spyware

Complexity
Signature

Object
analysis

Machine-learning, behavior
models and anomaly detection
Caspida Inc.
Current Tools: Disservice to you
Signatures

Rules

Malware

No dynamic, user-centric approach
Caspida Inc.
Security Professional’s Nightmares

Significant Attack
Variability and
Sophistication

Thousands of
Alerts w/ false
Positives

(APT, Polymorphic and
Low-Grade Attacks)

Outdated Toolsets
(Firewalls, IDSs, AV,
Anti-Malware)
Caspida Inc.
Caspida Inc.
Architectural Shifts in Security
…

Mobile
Application
Explosion

Internet

Smart Adversaries
(Governments,
Groups etc.)

Significant Attack
Variability and
Sophistication
(APT, Polymorphic and
Low-Grade Attacks)

New Infiltration
Methods
Impossible to use any
signature or
rules-based system

Enterprises
With Cloud and
BYOD/Mobile Access

Caspida Inc.
Security Paradigms need a Jolt
 Data Science applied to security
 Virtual firewalls across mobile & cloud
 Location & role-aware security analytics

End to end security intelligence – No more point products
Caspida Inc.
Next Steps
 Engage NOW for free security threat

intelligence
 Learn more:
−

www.caspida.com

 Contact:
−

Karthik Kannan (karthik@caspida.com)
Caspida Inc.

More Related Content

Viewers also liked

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
Symantec
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
Shruti Singh
 

Viewers also liked (17)

Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Cyber security
Cyber securityCyber security
Cyber security
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Poster presentation by Arsalan Muhammad Siddiqui
Poster presentation by Arsalan Muhammad Siddiqui Poster presentation by Arsalan Muhammad Siddiqui
Poster presentation by Arsalan Muhammad Siddiqui
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 

Recently uploaded

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 

Caspida Cyber Security Presentation at RSA 2014

  • 1. Do you really know who is on your network?!? Karthik Kannan Founder, CMO Christos Tryfonas Founder, CTO Caspida Inc.
  • 2. Tectonic Shifts in Security Industry The Mobile Cloud Era Vanishing boundaries “Security Intel” sharing Caspida Inc.
  • 3. Data Security is at its Worst Caspida Inc.
  • 4. Your Corporate Jewels are at Stake Confidential corporate data Revenue, financial loss Private customer data Reputation Caspida Inc.
  • 5. Attack Vectors are Spreading Caspida Inc.
  • 6. Threat Evolution Threat type • • • • APTs Malicious users DIY SIEM Firewalls Malware detection Scale & depth Targeted attacks Phishing, malware Virus, spyware Complexity Signature Object analysis Machine-learning, behavior models and anomaly detection Caspida Inc.
  • 7. Current Tools: Disservice to you Signatures Rules Malware No dynamic, user-centric approach Caspida Inc.
  • 8. Security Professional’s Nightmares Significant Attack Variability and Sophistication Thousands of Alerts w/ false Positives (APT, Polymorphic and Low-Grade Attacks) Outdated Toolsets (Firewalls, IDSs, AV, Anti-Malware) Caspida Inc.
  • 10. Architectural Shifts in Security … Mobile Application Explosion Internet Smart Adversaries (Governments, Groups etc.) Significant Attack Variability and Sophistication (APT, Polymorphic and Low-Grade Attacks) New Infiltration Methods Impossible to use any signature or rules-based system Enterprises With Cloud and BYOD/Mobile Access Caspida Inc.
  • 11. Security Paradigms need a Jolt  Data Science applied to security  Virtual firewalls across mobile & cloud  Location & role-aware security analytics End to end security intelligence – No more point products Caspida Inc.
  • 12. Next Steps  Engage NOW for free security threat intelligence  Learn more: − www.caspida.com  Contact: − Karthik Kannan (karthik@caspida.com) Caspida Inc.

Editor's Notes

  1. So, how do you deliver user-centric security analytics?