How to Find Security Breaches Before They Sink You
 

How to Find Security Breaches Before They Sink You

on

  • 3,248 views

 

Statistics

Views

Total Views
3,248
Views on SlideShare
2,250
Embed Views
998

Actions

Likes
2
Downloads
27
Comments
0

8 Embeds 998

http://www.surgeyourprofits.com 503
http://blog.skyhighnetworks.com 407
https://twitter.com 81
https://www.rebelmouse.com 3
http://webcache.googleusercontent.com 1
http://feedly.com 1
http://blog.skyhighnetworks.gravitatedevelopment.com 1
https://www.linkedin.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

How to Find Security Breaches Before They Sink You How to Find Security Breaches Before They Sink You Presentation Transcript

  • Brought to you by ! How to Find Security Breaches Before they Sink Your Business
  • Security breaches can put your company on the front page
  • That’s why you need to find them early To stop the breach and minimize exposure But how do you tell if it’s normal behavior or something to be worried about?
  • Breaches create outliers. In mathematical terms, they are several standard deviations outside of normal activity
  • You can think of them as being at the very edge of the bell curve Anomaly
  • Let’s take a look at some examples
  • 104,338 tweets in 1 day from 1 IP address Bot exfiltrating data from bank… 140 characters at a time
  • An employee uploads Employee leaving organization 4.5 GB of files to Kanbox Risky Service : No compliance certifications Terms & Conditions: Collects and shares data with third parties Location: Hosted in China
  • Single authenticated user at retail company tries to connect to GoToMyPC… 11,101,872 times in a week. User device infected with malware !
  • Single IP address at energy company attempts to connect to Facebook, which was blocked... 3.8 million times. Malware attempting to connect to its command and control site
  • Manufacturing employee has 188 uploads totaling 48.7 GBs in 1 day to Ryu Share Data sent to a Drop Zone outside of company’s jurisdictional location.
  • Except as otherwise expressly permitted by these Terms, any Code submitted to SourceForge.net must be licensed to Slashdot Media and other licensees under a license that is: compliant with the Open Source Initiative (“OSI”)’s Open Source Definition (http://www.opensource.org/ docs/osd) or certified as an “OSI-Approved L i c e n s e ” ( h t t p : / / o p e n s o u r c e . o r g / licenses).” 65 KB upload to open source code repository Loss of Proprietary IP
  • The definitive guide to the top cloud services and usage trends Brought to you by ! DOWNLOAD NOW Cloud Adoption & Risk Report