SlideShare a Scribd company logo
1 of 22
Virtual Security Officer
Prevention, detection and response:
A virtual security officer, a solution for the future?
Problem with traditional approach
to IT security
SECURITY IN LAYERS
01
Firewall
Network segmentation,
access control and
IDS/IPS
02 Web & email control 03
Server & endpoint protection
(anti-virus, anti-crypto)
04
Identity and Access
management (IAM)
05
Encryption, risk
assessment, data
masking, penetration
testing, 2FA
06
Vulnerability assessment
and Log management +
SIEM
• COMPLEX
• NEED OF EXPERTISE
• AUDITS
• NO GLOBAL VISIBILITY
• HIGH COSTS
• STATIC
RESULT OF +20 YEARS LAYERED TOOLS
HACKING
WEAKNESS
RISK
Hacking has become more sophisticated and happen more
often, everybody knows it can happen at
anytime/anywhere/anyhow.
There are still permanently unidentified
weaknesses/excessive expositions, lack of tools,
experts and poor reactivity.
Business risk is changing continuously,
remains undefined and unmeasurable.
Human security officer versus virtual
The chief information security officer (CISO) is the head of IT security, driving the IT
security strategy and implementation forward whilst protecting the business from
security threats and cyber-hacking. ...
Source- SC Magazine UK
SECURITY OFFICER JOB QALIFICATIONS (Human)
Master’s degree in computer science with +10 years similar job experience
Knowledge of GLBA, PCI, HIPAA, GDPR, NIST, ISO 27001, major security vendors
At least one of the following industry certifications: CISSP, CISM, CRISC, CCISO,…
Excellent writing skills with the capability to create well-formatted reports
GOOD LUCK IN FINDING A SUITABLE CANDIDATE FOR EVERY COMPANY
HUMAN (CISO) BASED SOC WORKFLOW
Security incident handling by CISO + TOOLS
Various detected
events need to be
analyzed. SIEM + TOOLS
PROTECTION:
• Response late after incident
• Incident not detected by
tool/rule/setup/human errors
• Protection ?
CLEAN
Allow
SUSPICIOUS
Temporary allow
ANALYSIS (LATE)
RESPONSE
MALICIOUS
Block
CISO
Other events remain
undetected
WHAT KIND OF SECURITY AND RISK MANAGEMENT
Make the competition irrelevant
SOC(security operation center) vSOC(virtual security)
›24/7 humans
›High Costs
›n x Virtual Security Officers
›Robotized workflow
›Instant technology updates
›Cost effective
›Large Enterprise only ›Designed for all business
sizes
›Volume of data
›Data analysis after Incident
THE FUTURE TODAY: PROACTIVE SECURITY
NEED FOR DETECTION AND FAST RESPONSE ( at a low cost)
PROACTIVE
SCALABILITY
CENTRALIZED VISIBILITY
COSTS UNDER CONTROL
The only IT security incident management service designed for all business sizes
• Developed by Ozoos SPRL
• HQ in Waterloo - Belgium
• VEEZO is a Virtual Security Officer
service
• Works in total independence vs.
humans and preventive security
tools
Hello!
We are VEEZO
An autonomous virtual security officer who can
work 365/24/7.
I am becoming smarter every day, because I use
a collaborative engine with the latest threat
intelligence and can automate processes.
Development
Milestones:
From automated processing to
predictive security (under R&D)
2018: Version Advanced
Detection and mitigation mode: this
require a VEEZO appliance on site, no
configuration nor management
requirement, plug & play and true bridge
to any existing network segments
2017 Version Standard
Detection mode: immediate activation of the VEEZO
service on existing “syslog” capable UTM solution.
2016: Start
Started from scratch with an idea.
Server
Protected zone
**** &é!’èç(éç§
**** é@çè§àé
**** Fà%@»àè(
Steve ID : 355472
John ID : 785875
Steve ID : 234536
WHERE TO PLUG & PLAY?
Internet
COMMUNICATION
ANALYSIS FLOW
LEGITIMATE
01
SUSPICIOUS
02
MALICIOUS
03
PROCESSED
04
The cloud based collaborative threat detection engine
is autolearning and analyses any events searching for
malicious activities.
ALERTRESPONSE
BLOCK
REPORT
FROM RAW DATA
TO ACTIONABLE INTELLIGENCE
• VEEZO a Virtual Security Officer service
• Security incidents identification,
collection, analysis and
classification.
• Offers real-time visibility and
automated remediation plans.
• Auto-learning
SOC WORKFLOW WITH VEEZO
Security incident handling by Virtual Security Officer
CLEAN
Allowed
SUSPICIOUS
Analysed in
realtime
RESPONSE
ACTION
REPORT
MALICIOUS
Blocked
AUTO
LEARNING
ADVANTAGES VEEZO SERVICE
collaborative cloud-based
engine with intelligence and
automated processes.
add or remove VEEZO’s
according to the needs.
increase your efficiency
enormously so that
people can best utilize
their skills.
we simply do what the
human operator does, but
we work cheaper, faster,
error-free, extremely
scalable, and are never
sick or on strike.
01
02
03
04
VEEZO
IDENTIFY
ANALYZE
ALERT
PROTECT
REPORT
IDENTIFY ACCURATELY SUSPICIOUS AND MALICIOUS ACTIVITIES IN REAL-TIME, 24/7
UNDERSTAND ANY NETWORK COMMUNICATION
EVALUATE THE RELATIVE RISK BASED ON BEHAVIOR
PROTECT AND RESPOND INSTANTLY AGAINST ANY KNOWN AND NEW THREATS
ALERTS IN REALTIME WITH ANALYSIS RESULTS AND REMEDIATION PLANS
SHARE THE SECURITY RELATED INFORMATION WITH A DYNAMIC DASHBOARD
ALL-IN-ONE SERVICE
SCREENSHOTS DASHBOARD - REPORT
20
SUMMARY
 SERVICE 24X7
 INBOUND AND OUTBOUND
COMMUNICATION ANALYSIS
 IT SECURITY INCIDENTS
MANAGEMENT
 PERIMETER MONITORING
AND PROTECTION
 ALERT AND REPORT
IN REALTIME
 PLUG & PLAY & PROTECT
THANK YOU
DREVE RICHELLE 161 H – Bte 15, B-1410 WATERLOO – BELGIUM
+32 2 880 79 47 | sales@veezo.org | veezo.org

More Related Content

What's hot

Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
Exploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of CybercrimeExploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of CybercrimeCylance
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Enterprise Management Associates
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security LandscapeArrow ECS UK
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on VehiclesPriyanka Aash
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDragos, Inc.
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationSymantec
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...AlienVault
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienVault
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Brad Deflin
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeSounil Yu
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
Solving the cybersecurity capacity problem
Solving the cybersecurity capacity problemSolving the cybersecurity capacity problem
Solving the cybersecurity capacity problemNathan Burke
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceEnergySec
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?manoharparakh
 

What's hot (18)

Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Exploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of CybercrimeExploring the Capabilities and Economics of Cybercrime
Exploring the Capabilities and Economics of Cybercrime
 
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)Identifying Effective Endpoint Detection and Response Platforms (EDRP)
Identifying Effective Endpoint Detection and Response Platforms (EDRP)
 
Information Security Seminar
Information Security SeminarInformation Security Seminar
Information Security Seminar
 
The Changing Security Landscape
The Changing Security LandscapeThe Changing Security Landscape
The Changing Security Landscape
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
Solving the cybersecurity capacity problem
Solving the cybersecurity capacity problemSolving the cybersecurity capacity problem
Solving the cybersecurity capacity problem
 
Cybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond ComplianceCybersecurity for Energy: Moving Beyond Compliance
Cybersecurity for Energy: Moving Beyond Compliance
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 

Similar to Veezo - Virtual Security Officer

Cs credit card processor
Cs  credit card processorCs  credit card processor
Cs credit card processorLiora R. Herman
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsAdrian Sanabria
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultAlienVault
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementBeyondTrust
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldnetwealthInvest
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sectorCore Security
 
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando M. Imperiale
 
IBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESIBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESFernando M. Imperiale
 
CCI2018 - La "moderna" Sicurezza informatica & Microsoft
CCI2018 - La "moderna" Sicurezza informatica & MicrosoftCCI2018 - La "moderna" Sicurezza informatica & Microsoft
CCI2018 - La "moderna" Sicurezza informatica & Microsoftwalk2talk srl
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation♟Sergej Epp
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)Vijilan IT Security solutions
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Outpost24 webinar: Security Analytics: what's in a risk score
Outpost24 webinar: Security Analytics: what's in a risk scoreOutpost24 webinar: Security Analytics: what's in a risk score
Outpost24 webinar: Security Analytics: what's in a risk scoreOutpost24
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYSecureData Europe
 
What your scanner isn't telling you
What your scanner isn't telling youWhat your scanner isn't telling you
What your scanner isn't telling youCore Security
 

Similar to Veezo - Virtual Security Officer (20)

Reveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet ENReveelium Smart Predictive Analytics - Datasheet EN
Reveelium Smart Predictive Analytics - Datasheet EN
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Cs credit card processor
Cs  credit card processorCs  credit card processor
Cs credit card processor
 
Securing Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These YearsSecuring Systems - Still Crazy After All These Years
Securing Systems - Still Crazy After All These Years
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 
Fernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMESFernando Imperiale - Security Intelligence para PYMES
Fernando Imperiale - Security Intelligence para PYMES
 
IBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMESIBM - Security Intelligence para PYMES
IBM - Security Intelligence para PYMES
 
CCI2018 - La "moderna" Sicurezza informatica & Microsoft
CCI2018 - La "moderna" Sicurezza informatica & MicrosoftCCI2018 - La "moderna" Sicurezza informatica & Microsoft
CCI2018 - La "moderna" Sicurezza informatica & Microsoft
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
ASPEN Brochure
ASPEN BrochureASPEN Brochure
ASPEN Brochure
 
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
5 BEST PRACTICES FOR A SECURITY OPERATION CENTER (SOC)
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Outpost24 webinar: Security Analytics: what's in a risk score
Outpost24 webinar: Security Analytics: what's in a risk scoreOutpost24 webinar: Security Analytics: what's in a risk score
Outpost24 webinar: Security Analytics: what's in a risk score
 
FINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITYFINE-TUNE IPS TO DIAL UP SECURITY
FINE-TUNE IPS TO DIAL UP SECURITY
 
What your scanner isn't telling you
What your scanner isn't telling youWhat your scanner isn't telling you
What your scanner isn't telling you
 

Recently uploaded

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Veezo - Virtual Security Officer

  • 1. Virtual Security Officer Prevention, detection and response: A virtual security officer, a solution for the future?
  • 2. Problem with traditional approach to IT security
  • 3. SECURITY IN LAYERS 01 Firewall Network segmentation, access control and IDS/IPS 02 Web & email control 03 Server & endpoint protection (anti-virus, anti-crypto) 04 Identity and Access management (IAM) 05 Encryption, risk assessment, data masking, penetration testing, 2FA 06 Vulnerability assessment and Log management + SIEM • COMPLEX • NEED OF EXPERTISE • AUDITS • NO GLOBAL VISIBILITY • HIGH COSTS • STATIC
  • 4. RESULT OF +20 YEARS LAYERED TOOLS HACKING WEAKNESS RISK Hacking has become more sophisticated and happen more often, everybody knows it can happen at anytime/anywhere/anyhow. There are still permanently unidentified weaknesses/excessive expositions, lack of tools, experts and poor reactivity. Business risk is changing continuously, remains undefined and unmeasurable.
  • 5. Human security officer versus virtual The chief information security officer (CISO) is the head of IT security, driving the IT security strategy and implementation forward whilst protecting the business from security threats and cyber-hacking. ... Source- SC Magazine UK
  • 6. SECURITY OFFICER JOB QALIFICATIONS (Human) Master’s degree in computer science with +10 years similar job experience Knowledge of GLBA, PCI, HIPAA, GDPR, NIST, ISO 27001, major security vendors At least one of the following industry certifications: CISSP, CISM, CRISC, CCISO,… Excellent writing skills with the capability to create well-formatted reports GOOD LUCK IN FINDING A SUITABLE CANDIDATE FOR EVERY COMPANY
  • 7. HUMAN (CISO) BASED SOC WORKFLOW Security incident handling by CISO + TOOLS Various detected events need to be analyzed. SIEM + TOOLS PROTECTION: • Response late after incident • Incident not detected by tool/rule/setup/human errors • Protection ? CLEAN Allow SUSPICIOUS Temporary allow ANALYSIS (LATE) RESPONSE MALICIOUS Block CISO Other events remain undetected
  • 8. WHAT KIND OF SECURITY AND RISK MANAGEMENT Make the competition irrelevant SOC(security operation center) vSOC(virtual security) ›24/7 humans ›High Costs ›n x Virtual Security Officers ›Robotized workflow ›Instant technology updates ›Cost effective ›Large Enterprise only ›Designed for all business sizes ›Volume of data ›Data analysis after Incident
  • 9. THE FUTURE TODAY: PROACTIVE SECURITY NEED FOR DETECTION AND FAST RESPONSE ( at a low cost) PROACTIVE SCALABILITY CENTRALIZED VISIBILITY COSTS UNDER CONTROL
  • 10. The only IT security incident management service designed for all business sizes
  • 11. • Developed by Ozoos SPRL • HQ in Waterloo - Belgium • VEEZO is a Virtual Security Officer service • Works in total independence vs. humans and preventive security tools
  • 12. Hello! We are VEEZO An autonomous virtual security officer who can work 365/24/7. I am becoming smarter every day, because I use a collaborative engine with the latest threat intelligence and can automate processes.
  • 13. Development Milestones: From automated processing to predictive security (under R&D) 2018: Version Advanced Detection and mitigation mode: this require a VEEZO appliance on site, no configuration nor management requirement, plug & play and true bridge to any existing network segments 2017 Version Standard Detection mode: immediate activation of the VEEZO service on existing “syslog” capable UTM solution. 2016: Start Started from scratch with an idea.
  • 14. Server Protected zone **** &é!’èç(éç§ **** é@çè§àé **** Fà%@»àè( Steve ID : 355472 John ID : 785875 Steve ID : 234536 WHERE TO PLUG & PLAY? Internet
  • 15. COMMUNICATION ANALYSIS FLOW LEGITIMATE 01 SUSPICIOUS 02 MALICIOUS 03 PROCESSED 04 The cloud based collaborative threat detection engine is autolearning and analyses any events searching for malicious activities. ALERTRESPONSE BLOCK REPORT
  • 16. FROM RAW DATA TO ACTIONABLE INTELLIGENCE • VEEZO a Virtual Security Officer service • Security incidents identification, collection, analysis and classification. • Offers real-time visibility and automated remediation plans. • Auto-learning
  • 17. SOC WORKFLOW WITH VEEZO Security incident handling by Virtual Security Officer CLEAN Allowed SUSPICIOUS Analysed in realtime RESPONSE ACTION REPORT MALICIOUS Blocked AUTO LEARNING
  • 18. ADVANTAGES VEEZO SERVICE collaborative cloud-based engine with intelligence and automated processes. add or remove VEEZO’s according to the needs. increase your efficiency enormously so that people can best utilize their skills. we simply do what the human operator does, but we work cheaper, faster, error-free, extremely scalable, and are never sick or on strike. 01 02 03 04 VEEZO
  • 19. IDENTIFY ANALYZE ALERT PROTECT REPORT IDENTIFY ACCURATELY SUSPICIOUS AND MALICIOUS ACTIVITIES IN REAL-TIME, 24/7 UNDERSTAND ANY NETWORK COMMUNICATION EVALUATE THE RELATIVE RISK BASED ON BEHAVIOR PROTECT AND RESPOND INSTANTLY AGAINST ANY KNOWN AND NEW THREATS ALERTS IN REALTIME WITH ANALYSIS RESULTS AND REMEDIATION PLANS SHARE THE SECURITY RELATED INFORMATION WITH A DYNAMIC DASHBOARD ALL-IN-ONE SERVICE
  • 21. SUMMARY  SERVICE 24X7  INBOUND AND OUTBOUND COMMUNICATION ANALYSIS  IT SECURITY INCIDENTS MANAGEMENT  PERIMETER MONITORING AND PROTECTION  ALERT AND REPORT IN REALTIME  PLUG & PLAY & PROTECT
  • 22. THANK YOU DREVE RICHELLE 161 H – Bte 15, B-1410 WATERLOO – BELGIUM +32 2 880 79 47 | sales@veezo.org | veezo.org

Editor's Notes

  1. “I believe that the more you know about the past, the better you are prepared for the future.” quote ~ Theodore Roosevelt
  2. The CISO main job is protecting
  3. The VOLUME of CISO needed is enormous
  4. What happens with undetected
  5. Ozoos is privately owned and headquartered in Waterloo, Belgium. VEEZO is a BELGIUM BASED Virtual Security Officer (vSO) solution, developed by Ozoos. Service is designed for the SMB needs where IT manager count on outside security experts for the security incidents collection, analysis and classification.  
  6. Just one example where VEEZO can fit in the network => NETWORK BEHAVIOUR ANALYSIS
  7. Communication analysis in real-time by sending events logs – not the traffic. Which take up a small % of bandwith.