Cerdant is celebrating its 15th year providing the best security possible to all our customers. Our system enhancements and increased IDS capabilities will shorten the time interval on “discovery and containment” to reduce or eliminate “exfiltration”. Mike also reviewed the top information security stories of 2016 and revealed the top tools for combatting cybercriminals.
2. Cerdant Business
Overview
• Celebrated our 15th year in business in January 2017
• In the past 3 years, we doubled our revenues and
employees
• We moved into new facilities in 2016
• In 2012, we had approximately 200 customers. Today
we have 700.
4. Cerdant IDS Capabilities
• There are 4 key metrics of a security incident:
Compromise, exfiltration, discovery, containment High
Availability Device Monitoring
• We can’t stop item 1 (Compromise) Our goal is to
shorten the time interval on “discovery and
containment” to reduce or eliminate “exfiltration”.
5. Recent Enhancements
to IDS
• Detection of remote access activity (RDP/VNC)
• Reputation based detection
• Botnet analysis from SonicWALL events
• Analysis from matches to reputation database
6. Security-
Top Stories of 2016
• Yahoo breach
• Release of DNC (Podesta emails) by WikiLeaks
• DDoS attack of Dyn by Mirai Botnet
• The rise of ransomware
• WikiLeaks release of NSA toolkit
7. Top Tools for Combatting
Security Threats:
• Firewall
• Anti-virus
• Email Security
• Backup
8. The #1 Threat to your Network
Security?
• Newton’s first law of motion
• INERTIA!
• Why is change difficult?
• There are more light switches
9. “I’ve been using (Sophos, McAfee,
Symantec, etc.) for years and nothing
bad has happened.”
• The number of ransomware attacks will surpass botnet
infections in 2017
• Ransomware revenues will exceed $1 billion
• 20 customers (that we know of) were hit by ransomware in
the past year
10. Antivirus is Dead!
• Brian Dye- Symantec senior vice president for information
security
• May 2014
11. Why is Antivirus Dead?
• Easily downloadable ransomware
• Easy to use packers
• A site to test your work is against all the popular AV solutions
• Every threat is zero-day
12. Why won’t my Firewall Stop
Malware?
• 60% of Web traffic is now encrypted
• Advertising at reputable sites contains malware or redirects
to malware
13.
14. “Over the next year we’ll evolve from using HTTP to using
Secure HTTP (HTTPS) while browsing and viewing content on our
service. This helps protect member privacy, particularly when
the network is insecure, such as public Wi-Fi, and it helps
protect members from eavesdropping by their ISP or employer,
who may want to record our members’ viewing for other
reasons.”
-letter to Netflix shareholders, April 15th, 2015