2. Every day attackers are using zero $
tools written in 2006 to circumvent
million $ ”solutions” built in 2017…via
exploits in 2010 code that we knew how
to fix way back in 2001.
CLEARLY THERE’S A GAP SOMEWHERE
3.
4. CONSIDER MALWARE IN 2016…
NEW PIECES OF MALWARE WRITTEN AND USED
1 1 every second
that’s
3 5 7 0 0 0 0 0 0,,
Symantec Internet Security Threat Report 2017
6. Phishing remains the #1 threat vector…
because it just works!
It is the #1 delivery method for ransomware
85% of organizations have suffered a phishing
compromise
1 in 3 companies have been victims of a CEO
fraud email
Email filtering will never be 100% effective
End user training is important, but users will still
fall for well crafted emails
Email is the delivery agent of choice.
7.
8. In January, Mount Pleasant, Texas-based Titus Regional Medical Center
was hit with a ransomware attack that prevented the hospital's access to
computer files
In February, hackers shut down the IT systems of
Hollywood (Calif.) Presbyterian Medical Center and
demanded a ransom. Initial reports claimed the hackers
demanded the hospital pay 9,000 in bitcoin, equivalent
to $3.6 million.
Two hospitals in Germany were victims of ransomware
campaigns in February. Neuss-based Lukas Hospital did not
have email access and was conducting business using pencils,
paper and fax machines. North Rhine-Westphalia-based
Klinikum Arnsberg hospital was also affected by a
ransomware attack
The University of Calgary paid a demanded
$20,000 after a ransomware cyberattack on its
computer systems.
Auburn, Ind.-based DeKalb Health suffered a
ransomware attack that temporarily disrupted the
health system's administrative computer system
and forced it to divert patients to other hospitals.
9. A new strain of self-replicating ransomware affected
computers all over the world
It is known by various
names: Wanna, WannaCry
or Wcr.
This malware is disrupting
companies and services
for businesses,
governments and
consumers.
16. Forrester: Zero
Trust Architecture
“Current Trust Models and Approaches
Are Broken”
Common Perspective: “We want our
network to be like an M&M, with a hard
crunchy outside and a soft chewy
center.”
“In today's new threat landscape, this
M&M and ‘trust but verify’ model of
information security is no longer an
effective way of enforcing security.”
“…insiders were more likely than
external attackers to be cause of
breach…”
17. IS IT OBVIOUS THAT THEY
ALL NEEDED A NETWORK?
WE HAVE TO BE DEFENDING AS
– OR WE WILL NEVER GET AHEAD!
FAST AS THEY ARE ATTACKING
19. CASE STUDY: MALWARE DETECTION AT SCALE
Sky ATP deployed in TAP mode on SRX5600 by ISP in North America – primarily serving
educational institutions
Ingress and egress traffic inspected
Results obtained covers a 7-day period in March 2017
535,302Total Files Processed
55,629Unique Files
69%Discovered Malware was
Previously Known
31%Discovered Malware
was previously unseen
Outbound high risk
CC connections:
843,346 (1 day)
20. BREAK OUT OF THE SILO
Integrate behaviour intelligence from across the
business and the globe
Embed security into the fabric of your business
Leverage the technologies you have in place
Protect the virtual and physical networks together
21. WHY JUNIPER SOFTWARE-DEFINED SECURE NETWORKS?
Accurate Threat Detection
Global Policy Management
Granular Enforcement
Automated Threat Remediation
22. AN INTELLIGENT, AUTOMATED,
SECURE NETWORK PLATFORM
SOFTWARE-DEFINED SECURE NETWORKS
Single detection and enforcement domain
Integrate intelligence from across the business
Secure the data, the brand, the business, the customers
23. IT’S TIME TO MAKE USE OF THE ENTIRE
NETWORK TO SECURE THE ENTERPRISE
AUTOMATE THE EVERYDAY,
SECURE THE FUTURE