SlideShare a Scribd company logo
1 of 19
Download to read offline
创新与安全技术趋势 
Innova1on 
& 
Security 
Technology 
Trends 
-­‐ 
Silicon 
Valley 
Perspec1ve 
Dr. 
Fengmin 
Gong 
Co-­‐Founder 
& 
Chief 
Architect 
Target 
tthhee 
tthhrreeaattss 
tthhaatt 
ttaarrggeett 
yyoouu..
Topics 
Of 
Conversa1on 
o Sustained 
Compe11veness 
Requires 
Sustained 
Innova1on 
o Building 
Best 
Tools 
Require 
Understanding 
Of 
<problem, 
users, 
environments> 
o Security 
Threat 
& 
Technology 
Trends 
o Security 
Technology 
Innova1on 
Framework 
o Cyphort 
Product 
Example 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
硅谷之成功人人皆知 Silicon 
Valley 
Successes 
• Total 
of 
18 
investment 
regions 
in 
US 
tracked 
by 
MoneyTree 
Report 
• Silicon 
Valley 
accounts 
more 
than 
54% 
of 
the 
total: 
$7.09b/$12.96b 
(Q2-­‐2014) 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
创业竞争激烈 Survive 
The 
Ficest 
• 先烈榜样不胜枚举 -­‐ 
for 
every 
success 
there 
are 
at 
least 
9 
died 
of 
quiet 
death 
• CB 
Insights, 
updated 
June 
3, 
2014, 
“76 
Startup 
Failure 
Post 
Mortems”, 
www.cbinsights.com/blog/startup-­‐failure-­‐post-­‐mortem/ 
• CB 
Insights, 
June 
14, 
“76 
of 
the 
Biggest, 
Costliest 
Startup 
Failures 
of 
All 
Time”, 
www.cbinsights.com/blog/biggest-­‐startup-­‐failures/ 
保持饥饿,不断创新 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
大不尽是优势 
Big 
Is 
No 
Guarantee 
• 昔日英雄现熊像 
-­‐ 
Yesterday’s 
bulls 
are 
becoming 
struggling 
bears 
• Declining 
tradi1onal 
switch/router 
product 
sales 
• Lacking 
compe11ve 
security 
products 
for 
emerging 
environments 
长江后浪推前浪,前浪自大难逃亡 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
创新制胜 Power 
Of 
Innova1on 
• Bay 
Area 
Council 
Economic 
Ins1tute 
& 
Booz 
Allen 
Joint 
Report 
2012 
• Three 
Innova1on 
Strategies 
1. Need 
seekers: 
understanding 
problems 
& 
an1cipa1ng 
needs 
2. Market 
readers: 
seeing 
demand 
trends 
& 
catching 
the 
wave 
3. Technology 
drivers: 
building 
best 
tech 
& 
looking 
for 
market 
Innova'on 
Strategy 
Business 
& 
Innova'on 
Alignment 
Culture 
for 
Innova'on 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al 
Be 
A 
Need 
Seeker 
Tech 
Leader 
Report 
To 
CEO 
Con'nuous 
Talent 
Refresh 
Silicon 
Valley 
Co 
89.3% 
53.6% 
46.4% 
46.4% 
75% 
46% 
Overall 
Survey 
80.3% 
14.3% 
19.2% 
27.7% 
62.9% 
26%
创新需有用 Key 
Innova1on 
Drivers 
Innovative & 
Useful Tools 
Business Evolution 
• Global 
• Mobile 
• Consumerization 
• Big Data 
• SaaS Cloud 
IT Evolution 
• Blurred Intra-Extra-Internet 
• Unified with ICS- IoT & IoE 
(Fractured Clouds) 
• SDx: Software-defined X 
Threats Evolution 
• Advanced TTP 
• Industrialized cyber crime 
• State actors 
• Increased financial 
incentives 
User 
Awareness 
& 
Percep1on 
• Problems 
on 
the 
ground 
• Urgency 
for 
tools 
• Expecta1on 
for 
“fit” 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
深远影响 Impact 
Of 
Security 
Breaches 
Information and IP loss 
Brand and reputation loss 
Financial and business impact Threat resolution costs
用户视角IT 
Perspec1ve 
Changes 
Transformed 
IT 
Landscape 
IT 
consumeriza1on 
& 
perimeter-­‐less, 
zero-­‐ 
trust 
enterprise 
renders 
current 
solu1ons 
useless 
Impact 
of 
Breaches 
Crown 
jewels 
– 
intellectual 
property, 
customer 
& 
business 
data, 
reputa1on, 
business 
con1nuity 
New 
Stakeholder 
Dynamics 
CEO 
& 
Board 
with 
elevated 
awareness 
of 
business 
risk, 
from 
compliance-­‐driven 
to 
risk-­‐driven 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
大趋势解读 Big 
Trends 
o Top 
8 
Security 
Buzzwords 
1. Big 
Data 
2. Machine 
Learning 
3. Behavior 
Detona1on 
4. Ac1onable 
Intelligence 
5. Con1nuous 
Monitoring 
6. Intelligence 
Sharing 
7. Soqware 
Defined 
X 
8. Security 
Ecosystem 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
Big 
Data 
& 
Machine 
Learning 
o Big 
Data 
大数据 
o It 
is 
not 
about 
o 哪级干部每周几次公款消费方可支持我不转做大数据? 
o How 
many 
TB 
of 
data, 
or 
structured/non-­‐structured 
o It 
is 
about 
o How 
long 
into 
the 
past 
(时间) 
o How 
many 
sites 
or 
how 
many 
companies 
(空间) 
o How 
deep 
into 
the 
business 
transac1ons 
(深度) 
o Machine 
Learning 
机器学习 
o It 
is 
not 
about 
new 
SVM 
or 
Decision 
Tree 
algorithms 
o It 
is 
about 
insights 
on 
o Mapping 
your 
problems 
to 
suitable 
algorithms 
o Choosing 
right 
features 
for 
learning 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
Con1nuous 
Monitoring 
& 
Mi1ga1on 
o Con1nuous 
Monitoring 
无间断监控 
o Why 
-­‐ 
watching 
intrusions 
is 
neither 
necessary 
nor 
sufficient 
for 
controlling 
the 
damage 
from 
intrusions 
o It 
is 
not 
about 
o Monitoring 
just 
the 
front 
doors 
o Using 
your 
AV/IDS/IPS/UTM 
etc. 
o It 
is 
about 
o Monitoring 
all 
points 
of 
traversal, 
all 
the 
1me 
o Using 
all 
methods 
available 
o Mi1ga1on 
With 
Ac1onable 
Intelligence 
有效动作 
o Full 
context:what 
happened 
whom 
how, 
how 
bad? 
o Ready-­‐to-­‐take 
ac1ons 
for 
acack 
containment, 
damage 
control, 
future 
hardening 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
Behavior 
Detona1on 
& 
Intelligence 
Sharing 
o Behavior 
Detona1on 
行为施放 
o It 
is 
not 
about 
o Generic 
sandboxing, 
or 
o Emula1on 
of 
a 
few 
OS 
configura1ons 
o It 
is 
about 
o Elici1ng 
soqware 
behavior 
to 
the 
extent 
necessary 
for 
detec1on 
o Matching 
detona1on 
environments 
to 
protected 
targets 
o Intelligence 
Sharing 
情报共享 
o It 
is 
not 
about 
o Botnet 
CnC 
servers 
or 
SPAM 
domains 
o It 
is 
about 
o Acack 
campaign: 
malware, 
TTP, 
targets, 
actors, 
objec1ves 
o Propaga1on 
trends 
and 
proac1ve 
counter 
measures 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
SDX 
& 
Security 
Ecosystem 
o Soqware-­‐Defined 
X 
o It 
is 
not 
about 
o Soqware 
defined 
networks 
(SDN), 
soqware 
defined 
storage 
(SDS) 
o Or, 
network 
func1on 
virtualiza1on 
(NFV) 
o It 
is 
about 
长远目光 
o Valuing 
flexibility 
and 
scalability 
over 
efficiency 
o Security 
Ecosystem 
o It 
is 
not 
about 
worrying 
vendor’s 
compe11on 
anymore 
o It 
is 
about 
o Elimina1ng 
the 
weakest 
security 
link 
敌人是狡猾的 
o Learning 
from 
enemy, 
unite 
all 
the 
defenders 
团结联防 
希拉里.克林顿说过,需要全村的人参与才可以养育好一个孩 
子。我说,需要全部的安全生态系统配合才能有效地抵御现代 
安全威胁。 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
Cyphort 
Architecture 
Collector: 
Headquarters 
Web Traffic 
Collector: 
Branch Office 
Web Traffic 
Collector: 
Data Center 
Collector: 
Email 
Collect 
Correla1on 
Analy1cs 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al 
Cyphort Global 
Security Services 
Cyphort Core 
Multi-method Inspection 
Machine Learning Analytics 
Correlation 
User & 
Asset Data 
Inspec1on 
Inspect 
Mi1ga1on 
& 
Enforcement 
Publish 
Blocking 
Data 
To 
Exis1ng: 
FW, 
IPS 
and 
SWG 
API 
based 
or 
manual 
Infec1on 
Verifica1on 
Pack 
{ 
Verify 
infec1on 
on 
suspect 
endpoints 
before 
cleaning 
} 
Act 
API 
API
Click to Reduce 
eYdoit uMra 
Rstiesrk ti,t 
lPe rsitoylrei 1ze 
Your 
Response 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al 
Scale 
with flexible 
deployment 
Detection 
of advanced threats 
that matter 
Visibility 
across 
entire attack surface 
Containment 
with speed and 
automation
Technology Finance Media & Entertainment 
Utilities 
Retail 
And More… 
Awards & 
Winning! 
Recognition 
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
© 
Copyright 
2014 
Cyphort, 
Inc. 
All 
rights 
reserved. 
Proprietary 
& 
Confiden1al
Target 
the 
threats 
that 
target 
you. 
Thank You! 
fgong@cyphort.com 
CYPHORT Confidential

More Related Content

What's hot

Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWSylvain Martinez
 
InDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation FinalInDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation FinalRob Marano
 
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack FrameworkDragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack FrameworkDragos, Inc.
 
Streamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxStreamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxtmbainjr131
 
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...Black Duck by Synopsys
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoPrime Infoserv
 
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Dragos, Inc.
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]Stanton Viaduc
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsZivaro Inc
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesLancope, Inc.
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey OWASP-Qatar Chapter
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementAleksey Lukatskiy
 
Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Filip Maertens
 
Scot Secure 2016
Scot Secure 2016Scot Secure 2016
Scot Secure 2016Ray Bugg
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Rafal Los
 
Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos, Inc.
 

What's hot (20)

INFINITY Presentation
INFINITY PresentationINFINITY Presentation
INFINITY Presentation
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
DATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEWDATA LOSS PREVENTION OVERVIEW
DATA LOSS PREVENTION OVERVIEW
 
InDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation FinalInDorse Tech Red Herring 100 Presentation Final
InDorse Tech Red Herring 100 Presentation Final
 
OFFENSIVE IDS
OFFENSIVE IDSOFFENSIVE IDS
OFFENSIVE IDS
 
Importance & Value of Cyber TSCM To Corporations
Importance & Value of Cyber TSCM To CorporationsImportance & Value of Cyber TSCM To Corporations
Importance & Value of Cyber TSCM To Corporations
 
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack FrameworkDragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
Dragos S4X20: Mapping ICS Incidents to the MITRE Attack Framework
 
Streamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptxStreamlining AppSec Policy Definition.pptx
Streamlining AppSec Policy Definition.pptx
 
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
Defense Federal Acquisition Regulation Supplement; Open Source Software Publi...
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction Neighborhood Keeper - Introduction
Neighborhood Keeper - Introduction
 
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
HOW TO PREPARE FOR AND RESPOND TO A RANDSOMWARE ATTACK [Webinar]
 
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced ThreatsGood Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
Good Guys vs Bad Guys: Using Big Data to Counteract Advanced Threats
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
 
Sql injection to enterprise Owned - K.K. Mookhey
Sql injection to enterprise Owned  - K.K. Mookhey Sql injection to enterprise Owned  - K.K. Mookhey
Sql injection to enterprise Owned - K.K. Mookhey
 
ICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness MeasurementICS Cyber Security Effectiveness Measurement
ICS Cyber Security Effectiveness Measurement
 
Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7Cyber Security Lecture at Rah Rah 7
Cyber Security Lecture at Rah Rah 7
 
Scot Secure 2016
Scot Secure 2016Scot Secure 2016
Scot Secure 2016
 
Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."Security BSides Atlanta - "The Business Doesn't Care..."
Security BSides Atlanta - "The Business Doesn't Care..."
 
Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos year in review (yir) 2018
Dragos year in review (yir) 2018
 

Similar to ISC2014 Beijing Keynote

Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018 Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018 Codemotion
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseCyren, Inc
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlCipherCloud
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutLancope, Inc.
 
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkConfirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkMichael Davis
 
软实力与创新竞争力
软实力与创新竞争力软实力与创新竞争力
软实力与创新竞争力Lin Haiqiu
 
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Felipe Lamus
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...NRBsanv
 
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster Godlan, Inc
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Rhys A. Mossom
 
Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554TISA
 
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...poore120
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxtmbainjr131
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyStephanie McVitty
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan Holdings, Inc.
 

Similar to ISC2014 Beijing Keynote (20)

Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018 Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
Dave Lewis | Zero Trust & The Flaming Sword of Justice | Codemotion Madrid 2018
 
Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
Webinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of DefenseWebinar: Cloud-Based Web Security as First/Last Line of Defense
Webinar: Cloud-Based Web Security as First/Last Line of Defense
 
Shadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining ControlShadow IT: The CISO Perspective on Regaining Control
Shadow IT: The CISO Perspective on Regaining Control
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't WorkConfirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
Confirmation Bias - How To Stop Doing The Things In IT Security That Don't Work
 
软实力与创新竞争力
软实力与创新竞争力软实力与创新竞争力
软实力与创新竞争力
 
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014Fast IT Mariano O'Kon, Cisco Live Cancun 2014
Fast IT Mariano O'Kon, Cisco Live Cancun 2014
 
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
Cyber innovation without a new product to buy-Michael Boeckx - cybersec europ...
 
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
Infor 10x Advantage On Air Summit Presentation - Make Better Decisions Faster
 
Resilience in the Cyber Era
Resilience in the Cyber EraResilience in the Cyber Era
Resilience in the Cyber Era
 
Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)Mobile Security BROCHURE (1)
Mobile Security BROCHURE (1)
 
Infosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.pptInfosec russia cnemeth_v1.2.ppt
Infosec russia cnemeth_v1.2.ppt
 
Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554Apt sharing tisa protalk 2-2554
Apt sharing tisa protalk 2-2554
 
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...SecureTech 2014:  Risk, Business Continuity and Cybersecurity - A Resiliency ...
SecureTech 2014: Risk, Business Continuity and Cybersecurity - A Resiliency ...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Re-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptxRe-Thinking BYOD Policy.pptx
Re-Thinking BYOD Policy.pptx
 
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copyBest_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
Best_of_Breed_3-24-2015_How_to_Achieve_ABAC_Today copy
 
Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014Finjan_Investor_Presentation_May2014
Finjan_Investor_Presentation_May2014
 

More from Cyphort

MMW June 2016: The Rise and Fall of Angler
MMW June 2016: The Rise and Fall of Angler MMW June 2016: The Rise and Fall of Angler
MMW June 2016: The Rise and Fall of Angler Cyphort
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityCyphort
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence Cyphort
 
Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksCyphort
 
Most notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsMost notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsCyphort
 
Malware self protection-matrix
Malware self protection-matrixMalware self protection-matrix
Malware self protection-matrixCyphort
 
Machine learning cyphort_malware_most_wanted
Machine learning cyphort_malware_most_wantedMachine learning cyphort_malware_most_wanted
Machine learning cyphort_malware_most_wantedCyphort
 
Dissecting Cryptowall
Dissecting CryptowallDissecting Cryptowall
Dissecting CryptowallCyphort
 
Cyber espionage nation state-apt_attacks_on_the_rise
Cyber espionage nation state-apt_attacks_on_the_riseCyber espionage nation state-apt_attacks_on_the_rise
Cyber espionage nation state-apt_attacks_on_the_riseCyphort
 
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCyphort
 
Mmw anti sandbox_techniques
Mmw anti sandbox_techniquesMmw anti sandbox_techniques
Mmw anti sandbox_techniquesCyphort
 
Mmw anti sandboxtricks
Mmw anti sandboxtricksMmw anti sandboxtricks
Mmw anti sandboxtricksCyphort
 
MMW Anti-Sandbox Techniques
MMW Anti-Sandbox TechniquesMMW Anti-Sandbox Techniques
MMW Anti-Sandbox TechniquesCyphort
 
Mmw mac malware-mac
Mmw mac malware-macMmw mac malware-mac
Mmw mac malware-macCyphort
 
Malware's Most Wanted: The Many Faces of Malware
Malware's Most Wanted: The Many Faces of MalwareMalware's Most Wanted: The Many Faces of Malware
Malware's Most Wanted: The Many Faces of MalwareCyphort
 
Malware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareMalware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareCyphort
 
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial TrojansMalware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial TrojansCyphort
 
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOLMalware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOLCyphort
 
Malware Most Wanted: Evil Bunny
Malware Most Wanted: Evil BunnyMalware Most Wanted: Evil Bunny
Malware Most Wanted: Evil BunnyCyphort
 
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Cyphort
 

More from Cyphort (20)

MMW June 2016: The Rise and Fall of Angler
MMW June 2016: The Rise and Fall of Angler MMW June 2016: The Rise and Fall of Angler
MMW June 2016: The Rise and Fall of Angler
 
EverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in CybersecurityEverSec + Cyphort: Big Trends in Cybersecurity
EverSec + Cyphort: Big Trends in Cybersecurity
 
MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence MMW April 2016 Ransomware Resurgence
MMW April 2016 Ransomware Resurgence
 
Understanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value AttacksUnderstanding Malware Lateral Spread Used in High Value Attacks
Understanding Malware Lateral Spread Used in High Value Attacks
 
Most notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictionsMost notable apt_ attacks_of_2015_and_2016 predictions
Most notable apt_ attacks_of_2015_and_2016 predictions
 
Malware self protection-matrix
Malware self protection-matrixMalware self protection-matrix
Malware self protection-matrix
 
Machine learning cyphort_malware_most_wanted
Machine learning cyphort_malware_most_wantedMachine learning cyphort_malware_most_wanted
Machine learning cyphort_malware_most_wanted
 
Dissecting Cryptowall
Dissecting CryptowallDissecting Cryptowall
Dissecting Cryptowall
 
Cyber espionage nation state-apt_attacks_on_the_rise
Cyber espionage nation state-apt_attacks_on_the_riseCyber espionage nation state-apt_attacks_on_the_rise
Cyber espionage nation state-apt_attacks_on_the_rise
 
Cybersecurity 5 road_blocks
Cybersecurity 5 road_blocksCybersecurity 5 road_blocks
Cybersecurity 5 road_blocks
 
Mmw anti sandbox_techniques
Mmw anti sandbox_techniquesMmw anti sandbox_techniques
Mmw anti sandbox_techniques
 
Mmw anti sandboxtricks
Mmw anti sandboxtricksMmw anti sandboxtricks
Mmw anti sandboxtricks
 
MMW Anti-Sandbox Techniques
MMW Anti-Sandbox TechniquesMMW Anti-Sandbox Techniques
MMW Anti-Sandbox Techniques
 
Mmw mac malware-mac
Mmw mac malware-macMmw mac malware-mac
Mmw mac malware-mac
 
Malware's Most Wanted: The Many Faces of Malware
Malware's Most Wanted: The Many Faces of MalwareMalware's Most Wanted: The Many Faces of Malware
Malware's Most Wanted: The Many Faces of Malware
 
Malware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareMalware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things Malware
 
Malware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial TrojansMalware's Most Wanted: Financial Trojans
Malware's Most Wanted: Financial Trojans
 
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOLMalware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
Malware's Most Wanted: Malvertising Attacks on Huffingtonpost, Yahoo, AOL
 
Malware Most Wanted: Evil Bunny
Malware Most Wanted: Evil BunnyMalware Most Wanted: Evil Bunny
Malware Most Wanted: Evil Bunny
 
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
Sony Attack by Destover Malware. Part of Cyphort Malware Most Wanted Series.
 

Recently uploaded

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdfankushspencer015
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Dr.Costas Sachpazis
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxpurnimasatapathy1234
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 

Recently uploaded (20)

AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Microscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptxMicroscopic Analysis of Ceramic Materials.pptx
Microscopic Analysis of Ceramic Materials.pptx
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 

ISC2014 Beijing Keynote

  • 1. 创新与安全技术趋势 Innova1on & Security Technology Trends -­‐ Silicon Valley Perspec1ve Dr. Fengmin Gong Co-­‐Founder & Chief Architect Target tthhee tthhrreeaattss tthhaatt ttaarrggeett yyoouu..
  • 2. Topics Of Conversa1on o Sustained Compe11veness Requires Sustained Innova1on o Building Best Tools Require Understanding Of <problem, users, environments> o Security Threat & Technology Trends o Security Technology Innova1on Framework o Cyphort Product Example © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 3. 硅谷之成功人人皆知 Silicon Valley Successes • Total of 18 investment regions in US tracked by MoneyTree Report • Silicon Valley accounts more than 54% of the total: $7.09b/$12.96b (Q2-­‐2014) © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 4. 创业竞争激烈 Survive The Ficest • 先烈榜样不胜枚举 -­‐ for every success there are at least 9 died of quiet death • CB Insights, updated June 3, 2014, “76 Startup Failure Post Mortems”, www.cbinsights.com/blog/startup-­‐failure-­‐post-­‐mortem/ • CB Insights, June 14, “76 of the Biggest, Costliest Startup Failures of All Time”, www.cbinsights.com/blog/biggest-­‐startup-­‐failures/ 保持饥饿,不断创新 © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 5. 大不尽是优势 Big Is No Guarantee • 昔日英雄现熊像 -­‐ Yesterday’s bulls are becoming struggling bears • Declining tradi1onal switch/router product sales • Lacking compe11ve security products for emerging environments 长江后浪推前浪,前浪自大难逃亡 © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 6. 创新制胜 Power Of Innova1on • Bay Area Council Economic Ins1tute & Booz Allen Joint Report 2012 • Three Innova1on Strategies 1. Need seekers: understanding problems & an1cipa1ng needs 2. Market readers: seeing demand trends & catching the wave 3. Technology drivers: building best tech & looking for market Innova'on Strategy Business & Innova'on Alignment Culture for Innova'on © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al Be A Need Seeker Tech Leader Report To CEO Con'nuous Talent Refresh Silicon Valley Co 89.3% 53.6% 46.4% 46.4% 75% 46% Overall Survey 80.3% 14.3% 19.2% 27.7% 62.9% 26%
  • 7. 创新需有用 Key Innova1on Drivers Innovative & Useful Tools Business Evolution • Global • Mobile • Consumerization • Big Data • SaaS Cloud IT Evolution • Blurred Intra-Extra-Internet • Unified with ICS- IoT & IoE (Fractured Clouds) • SDx: Software-defined X Threats Evolution • Advanced TTP • Industrialized cyber crime • State actors • Increased financial incentives User Awareness & Percep1on • Problems on the ground • Urgency for tools • Expecta1on for “fit” © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 8. 深远影响 Impact Of Security Breaches Information and IP loss Brand and reputation loss Financial and business impact Threat resolution costs
  • 9. 用户视角IT Perspec1ve Changes Transformed IT Landscape IT consumeriza1on & perimeter-­‐less, zero-­‐ trust enterprise renders current solu1ons useless Impact of Breaches Crown jewels – intellectual property, customer & business data, reputa1on, business con1nuity New Stakeholder Dynamics CEO & Board with elevated awareness of business risk, from compliance-­‐driven to risk-­‐driven © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 10. 大趋势解读 Big Trends o Top 8 Security Buzzwords 1. Big Data 2. Machine Learning 3. Behavior Detona1on 4. Ac1onable Intelligence 5. Con1nuous Monitoring 6. Intelligence Sharing 7. Soqware Defined X 8. Security Ecosystem © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 11. Big Data & Machine Learning o Big Data 大数据 o It is not about o 哪级干部每周几次公款消费方可支持我不转做大数据? o How many TB of data, or structured/non-­‐structured o It is about o How long into the past (时间) o How many sites or how many companies (空间) o How deep into the business transac1ons (深度) o Machine Learning 机器学习 o It is not about new SVM or Decision Tree algorithms o It is about insights on o Mapping your problems to suitable algorithms o Choosing right features for learning © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 12. Con1nuous Monitoring & Mi1ga1on o Con1nuous Monitoring 无间断监控 o Why -­‐ watching intrusions is neither necessary nor sufficient for controlling the damage from intrusions o It is not about o Monitoring just the front doors o Using your AV/IDS/IPS/UTM etc. o It is about o Monitoring all points of traversal, all the 1me o Using all methods available o Mi1ga1on With Ac1onable Intelligence 有效动作 o Full context:what happened whom how, how bad? o Ready-­‐to-­‐take ac1ons for acack containment, damage control, future hardening © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 13. Behavior Detona1on & Intelligence Sharing o Behavior Detona1on 行为施放 o It is not about o Generic sandboxing, or o Emula1on of a few OS configura1ons o It is about o Elici1ng soqware behavior to the extent necessary for detec1on o Matching detona1on environments to protected targets o Intelligence Sharing 情报共享 o It is not about o Botnet CnC servers or SPAM domains o It is about o Acack campaign: malware, TTP, targets, actors, objec1ves o Propaga1on trends and proac1ve counter measures © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 14. SDX & Security Ecosystem o Soqware-­‐Defined X o It is not about o Soqware defined networks (SDN), soqware defined storage (SDS) o Or, network func1on virtualiza1on (NFV) o It is about 长远目光 o Valuing flexibility and scalability over efficiency o Security Ecosystem o It is not about worrying vendor’s compe11on anymore o It is about o Elimina1ng the weakest security link 敌人是狡猾的 o Learning from enemy, unite all the defenders 团结联防 希拉里.克林顿说过,需要全村的人参与才可以养育好一个孩 子。我说,需要全部的安全生态系统配合才能有效地抵御现代 安全威胁。 © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 15. Cyphort Architecture Collector: Headquarters Web Traffic Collector: Branch Office Web Traffic Collector: Data Center Collector: Email Collect Correla1on Analy1cs © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al Cyphort Global Security Services Cyphort Core Multi-method Inspection Machine Learning Analytics Correlation User & Asset Data Inspec1on Inspect Mi1ga1on & Enforcement Publish Blocking Data To Exis1ng: FW, IPS and SWG API based or manual Infec1on Verifica1on Pack { Verify infec1on on suspect endpoints before cleaning } Act API API
  • 16. Click to Reduce eYdoit uMra Rstiesrk ti,t lPe rsitoylrei 1ze Your Response © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al Scale with flexible deployment Detection of advanced threats that matter Visibility across entire attack surface Containment with speed and automation
  • 17. Technology Finance Media & Entertainment Utilities Retail And More… Awards & Winning! Recognition © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 18. © Copyright 2014 Cyphort, Inc. All rights reserved. Proprietary & Confiden1al
  • 19. Target the threats that target you. Thank You! fgong@cyphort.com CYPHORT Confidential