SlideShare a Scribd company logo
1 of 23
© 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Mohamed Abdelhakim
Cell: 480-869-7888 l Email Mohamed.a@att.com
Security without theSeams
© 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
AT&T Cybersecurity
2 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
“U.S. CEOs Are More
Worried About
Cybersecurity Than a
Possible Recession”
2
January 17, 2019
© 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and
service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the
property of their respective owners.
http://fortune.com/2019/01/17/cybersecurity-recession/
3 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Why? Cybersecurityisabusinessproblemthat
mustbe addressedatscale
88%
of survey respondents
reported experiencing at
least one type of security
incident or breach in the
past year.
43% $6Trillion
of attacks target small
business
estimated annual cost of
cybersecurity breaches by
2021
— “Charting a New Course,” AT&T
Cybersecurity Insights, vol 8, September
2018
— SCORE
October 18, 2018
https://www.prnewswire.com/news-releases/43-of-
cyberattacks-target-small-businesses-300729384.html
— 2019 Official Annual Cybercrime Report, Cybersecurity
Ventures, Dec 2018
https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-
2021/
4 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Stepsshouldbetakeneverydaytoaddress
problems atscale
Fear, uncertainty, and doubt
dominate for large, singular events
However, taking steps everyday can
have a much larger impact at scale
15,000
lives are saved by seatbelts
each year in the US
(source: NHTSA)
Cybersecurity must now be addressed at scale
Organized Crime:
Technology Complexity
The rise of digitalization:
MORE ATTACKS
MORE SEAMS
HIGHER SEVERITY
5 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
CybersecurityProgramsToday
$100M+
Annual security spend
100’s 70+
Of security employees and
they are hard to find!
Security solutions
Snapshot of Industry Leaders
”In 2016, JPMorgan upped its
cybersecurity budget from $500M in
2015 to $600M. “
— CB Insights, Jan 2018
"The average enterprise uses 75 security
products to secure their network. "
— CSO, March 2016
“2018-2019: 53% of organizations
report a problematic shortage of
cybersecurity skills.”
— ESG, Jan 2019
6 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Businesses do not get
hacked because they
lack a firewall, anti-
virus, or any other
technology...
Almost all modern cybersecurity
breaches have happened in the
“seams” between people, process,
and technology
7 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Cybersecurity has Evolved
Point Solutions
Stitching together
a ‘patch work quilt’
with many seams!
• Firewalls
• Proxies & Gateways
• Endpoint security
Aggregation
Band-aid for seams,
requiring effort to
integrate. Lacking gap
analysis and process
enforcement
• Log management
• SIEM
• Analytics
Service Providers
Delivers the people without
control of orchestration
technology roadmap
• Consulting
• Managed Security
Service Providers
Integrates the “full stack” of
people, process, and technology
• Cybersecurity Consulting
• Managed Security Services
• Threat Detection & Response
• Integration, orchestration, and
automation
The “Standard Approach”
to Defense
Today
UnifiedSecurity
Management
8 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
AT&TCybersecurity
Unified Security Management
Cybersecurity
Consulting
Software-Defined
Platform
Managed
Security Services
AT&T
Alien Labs
Phenomenal
Threat Intelligence
Security
Without the Seams
Collaborative
Defense
9 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
9 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Threat Intelligence
AT&T Alien Labs provides
the tactical threat
intelligence that integrates
directly with our software-
defined platform for
automated security
engineering, threat
detection, and response.
HighVolume
Data Feeds
AI & Machine
Learning
Human
Expertise
Continuous
Updates
10 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
10 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. *as of Jan. 2019
370KUnique malware samples
analyzed per day
199Countries and
territories with highly
secure connections
225+Petabytes of traffic
per day*
19MDaily threat
indicators to OTX140Countries from which
OTX threat indicators
are submitted
100K
Participants contributing to
Alien LabsOTX (OpenThreat
Exchange), the world’s largest
open threat intelligence
community
100BPotential probes for
vulnerabilities across our
global IP network every
day.
Threat Intelligence At a Glance
11 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
PhenomenalThreatIntelligence
Cybersecurity Consulting Services
Managed Security Services
Software-defined Platform forThreat Detection and Response
Threat Intelligence
Human
Expertise
Continuous
Updates
AI & Machine
Learning
High-Volume
Data Feeds
12 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
CollaborativeDefense
Fightingonlinecrimeisateamsport
No enterprise or vendor should be
fighting alone against modern
cybercriminals.
Collaborative defense utilizes advanced
software-defined platforms to integrate
and orchestrate:
• Threat data across sources
• Security technologies from a number of leading
vendors across threat vectors
13 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Integrating people, process, and technology to help protect your business
SecurityWithouttheSeams
People
Process
Technology
Cybersecurity Expertise
8 Global Security Operations Centers
500+ SOC Analysts Orchestrating ecosystem of
security offerings
14 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
14 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Cybersecurity Consulting
AT&T Cybersecurity
Consulting services help
meet the challenges of an
ever-changing threat
landscape, providing the
insight and tools needed to
establish and maintain
sound cybersecurity
practices.
Cyber Risk
Management
Security
Response
Security
Operations
15 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Cyber Risk Management Security ResponseSecurity Operations
Managed Security Services
Security
Strategy
Compliance &
Regulatory
Training and
Awareness
Architecture, Design &
Transformation
Cyber SOC
Services
Cloud Security
Solutions
Threat Management
Services
Breach
Investigations
Incident Response
Retainer Services
Incident Response
Program
Development
Cybersecurity Consulting Services
Software-defined Platform forThreat Detection and Response
CybersecurityConsultingServices
Threat Intelligence
16 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
WhyAT&TCybersecurityConsulting?
Consulting organization
with 25 year history
One of original PCI
Qualified Security Assessor
firms
HITRUST certified assessor Consultants average 12
years of experience in
Cybersecurity
Board seated members
in CSA, ISA, and HIMMS
Direct
representation
in NCSL
Deep security expertise for solutions that fit — across industries, for
businesses of all sizes
17 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
17 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Managed Security Services
AT&T Managed Security
Services orchestrate best-
of-breed solutions from
across the security
technology landscape. Our
security operations centers
define and implement
processes utilizing industry-
standard best practices. Endpoint Connectivity Data &
Applications
Threat
Management
18 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
ManagedSecurityServicesPortfolio
Endpoints Threat Management
Cybersecurity Consulting Services
Connectivity Applications & Data
Endpoint
Management
IoT
Security
Firewall
Services
Global Security
Gateway
CloudWeb
Security
Threat Manager
Endpoint
Security
Mobile
Threat Defense
CDN
Security
Proxy
Services
DDoS
Defense
Intrusion
Prevention
Encryption
Services
Secure
Email Gateway
Software-defined Platform forThreat Detection and Response
Managed Security Services
Threat Intelligence
19 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
19 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Technology
Behind the orchestration is a
powerful software-defined
platform designed to analyze
security data from across
your environment to
automate threat detection,
and orchestrate with security
technologies to respond and
remediate.
Automation &
Response
Data
Analysis
Threat Detection
20 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Software-DefinedPlatform
Cybersecurity Consulting Services
Managed Security Services
Automation & Response
Software-defined Platform forThreat Detection and Response
Data Analysis Threat Detection
Threat Intelligence
21 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
FullStackSecurity
Cybersecurity Consulting Services
Managed Security Services
Security
Strategy
Compliance &
Regulatory
Architecture,
Design
& Transformation
Cyber SOC
Services
Breach
Investigations
Incident Response
Program Development
Training and
Awareness
Cloud Security
Solutions
Threat Management
Services
Incident Response
Retainer Services
Endpoint
Management IoT Security Cloud Web Security
Threat Manager
Endpoint
Security
Mobile
Threat Defense
CDN
Security
Proxy
Services
DDoS
Defense
Intrusion
Prevention
Encryption
Services
Secure
Email Gateway
Data Analysis Automation & ResponseThreat Detection
Software-defined Platform forThreat Detection and Response
Firewall
Services
Global Security
Gateway
Threat Intelligence
22 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
OfferingsAcrosstheSecurityLifecycle
Protect & Prevent
Detect & RespondAssess & Plan
Cybersecurity Consulting
• Cyber-risk posture assessment (remote)
• Enterprise risk assessments
• VulnerabilityAssessments and Management
• PenetrationTesting
• Cyber risk assessment (in-person for mid-
market)
• Compliance Reviews and Attestations (Level
1/Level 2 and all service providers for PCI,
HIPAA/NIST, ISO, NIST)
• SecurityTransformation Services
• SecurityTechnology Strategy and Roadmap
• SecurityArchitecture and Design
• Security Policy Design and Implementation
• Cloud SecurityArchitecture and Monitoring
Strategy
Managed Network Security
• Premises based Firewall
• Network based Firewall
• Global SecurityGateway
Managed Web Security
• CloudWeb Security Service
(CWSS)
Managed Email Security
• Secure Email Gateway
Managed Mobile Security
• EMM/UEM
• MobileThreat Defense
(MTD)
Managed Endpoint Security
• Endpoint Security Service
Managed Application Security
• Reactive DDoS
• DDoS Defense
• DDoS Defense public sector
Cybersecurity Consulting
• ActiveThreat Hunting
• FirewallAnalysis and
Migration
• SecurityAwareness and
Training Program
• Identity andAccess
Management
• Cyber SoC design and
implementation
Threat Detection & Response
• USMA
• AT&TThreat Manager
Cybersecurity Consulting
• Incident Response Services
• Post Breach Services
• Cyber SoC optimization
Cyber Insurance Referral Program
At&t cybersecurity introduction with alien vault

More Related Content

What's hot

Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsIain Dickson
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security RoadmapElliott Franklin
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk M sharifi
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsEnterprise Management Associates
 
Splunk HTTP Event Collector
Splunk HTTP Event CollectorSplunk HTTP Event Collector
Splunk HTTP Event CollectorSplunk
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left SecurityBATbern
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Siem ppt
Siem pptSiem ppt
Siem pptkmehul
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeCrowdStrike
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to TenableBharat Jindal
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical SystemsBob Marcus
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations♟Sergej Epp
 
Make Your SOC Work Smarter, Not Harder
Make Your SOC Work Smarter, Not HarderMake Your SOC Work Smarter, Not Harder
Make Your SOC Work Smarter, Not HarderSplunk
 
Cloud architecture with the ArchiMate Language
Cloud architecture with the ArchiMate LanguageCloud architecture with the ArchiMate Language
Cloud architecture with the ArchiMate LanguageIver Band
 
Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On) Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On) Splunk
 
Elastic Observability keynote
Elastic Observability keynoteElastic Observability keynote
Elastic Observability keynoteElasticsearch
 

What's hot (20)

Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
Building an effective Information Security Roadmap
Building an effective Information Security RoadmapBuilding an effective Information Security Roadmap
Building an effective Information Security Roadmap
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk QRadar, ArcSight and Splunk
QRadar, ArcSight and Splunk
 
How to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-ToolsHow to Reduce the Attack Surface Created by Your Cyber-Tools
How to Reduce the Attack Surface Created by Your Cyber-Tools
 
Splunk HTTP Event Collector
Splunk HTTP Event CollectorSplunk HTTP Event Collector
Splunk HTTP Event Collector
 
Shift Left Security
Shift Left SecurityShift Left Security
Shift Left Security
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Siem ppt
Siem pptSiem ppt
Siem ppt
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 
Introduction to Tenable
Introduction to TenableIntroduction to Tenable
Introduction to Tenable
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Security in Cyber-Physical Systems
Security in Cyber-Physical SystemsSecurity in Cyber-Physical Systems
Security in Cyber-Physical Systems
 
Journey to the Center of Security Operations
Journey to the Center of Security OperationsJourney to the Center of Security Operations
Journey to the Center of Security Operations
 
Make Your SOC Work Smarter, Not Harder
Make Your SOC Work Smarter, Not HarderMake Your SOC Work Smarter, Not Harder
Make Your SOC Work Smarter, Not Harder
 
Cloud architecture with the ArchiMate Language
Cloud architecture with the ArchiMate LanguageCloud architecture with the ArchiMate Language
Cloud architecture with the ArchiMate Language
 
Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On) Getting Started with Splunk (Hands-On)
Getting Started with Splunk (Hands-On)
 
Elastic Observability keynote
Elastic Observability keynoteElastic Observability keynote
Elastic Observability keynote
 

Similar to At&t cybersecurity introduction with alien vault

Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall WebinarAT&T
 
Securing the Internet of Things: What the CEO Needs to Know
Securing the Internet of Things: What the CEO Needs to KnowSecuring the Internet of Things: What the CEO Needs to Know
Securing the Internet of Things: What the CEO Needs to KnowAT&T
 
Managing the Cyberthreat Landscape
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat LandscapeAT&T
 
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...DataWorks Summit/Hadoop Summit
 
Blackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat IntelligenceBlackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat IntelligenceChristopher Doman
 
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020Bernard Marr
 
2015 Cloud Predictions
2015 Cloud Predictions2015 Cloud Predictions
2015 Cloud PredictionsAT&T
 
Final hh - 18.10.4 - erie 5 g evo release
Final   hh - 18.10.4 - erie 5 g evo releaseFinal   hh - 18.10.4 - erie 5 g evo release
Final hh - 18.10.4 - erie 5 g evo releaseHollyHworth
 
ATT: The Power of the Platform
ATT: The Power of the PlatformATT: The Power of the Platform
ATT: The Power of the PlatformCharles Beck
 
Enigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivEnigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivNOAH Advisors
 
Final hh - 18.10.4 - dayton hamilton springfield 5 g evo release
Final   hh - 18.10.4 - dayton hamilton springfield 5 g evo releaseFinal   hh - 18.10.4 - dayton hamilton springfield 5 g evo release
Final hh - 18.10.4 - dayton hamilton springfield 5 g evo releaseHollyHworth
 
Not If, But When: A CEO's Guide to Cyberbreach Response
Not If, But When: A CEO's Guide to Cyberbreach ResponseNot If, But When: A CEO's Guide to Cyberbreach Response
Not If, But When: A CEO's Guide to Cyberbreach ResponseAT&T
 
Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Matteo Fabiano
 
Final hh - 18.10.4 - johnstown 5 g evo release
Final   hh - 18.10.4 - johnstown 5 g evo releaseFinal   hh - 18.10.4 - johnstown 5 g evo release
Final hh - 18.10.4 - johnstown 5 g evo releaseHollyHworth
 
NetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptxNetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptxMansurAli32
 

Similar to At&t cybersecurity introduction with alien vault (20)

Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
Securing the Internet of Things: What the CEO Needs to Know
Securing the Internet of Things: What the CEO Needs to KnowSecuring the Internet of Things: What the CEO Needs to Know
Securing the Internet of Things: What the CEO Needs to Know
 
Managing the Cyberthreat Landscape
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat Landscape
 
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
 
Near Real-Time Outlier Detection and Interpretation
Near Real-Time Outlier Detection and InterpretationNear Real-Time Outlier Detection and Interpretation
Near Real-Time Outlier Detection and Interpretation
 
Blackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat IntelligenceBlackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat Intelligence
 
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
 
2015 Cloud Predictions
2015 Cloud Predictions2015 Cloud Predictions
2015 Cloud Predictions
 
Springfield evo
Springfield evoSpringfield evo
Springfield evo
 
Pittsfield evo
Pittsfield evoPittsfield evo
Pittsfield evo
 
Final hh - 18.10.4 - erie 5 g evo release
Final   hh - 18.10.4 - erie 5 g evo releaseFinal   hh - 18.10.4 - erie 5 g evo release
Final hh - 18.10.4 - erie 5 g evo release
 
ATT: The Power of the Platform
ATT: The Power of the PlatformATT: The Power of the Platform
ATT: The Power of the Platform
 
Enigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivEnigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel Aviv
 
Final hh - 18.10.4 - dayton hamilton springfield 5 g evo release
Final   hh - 18.10.4 - dayton hamilton springfield 5 g evo releaseFinal   hh - 18.10.4 - dayton hamilton springfield 5 g evo release
Final hh - 18.10.4 - dayton hamilton springfield 5 g evo release
 
Cape cod evo
Cape cod evoCape cod evo
Cape cod evo
 
Worcester evo
Worcester evoWorcester evo
Worcester evo
 
Not If, But When: A CEO's Guide to Cyberbreach Response
Not If, But When: A CEO's Guide to Cyberbreach ResponseNot If, But When: A CEO's Guide to Cyberbreach Response
Not If, But When: A CEO's Guide to Cyberbreach Response
 
Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020
 
Final hh - 18.10.4 - johnstown 5 g evo release
Final   hh - 18.10.4 - johnstown 5 g evo releaseFinal   hh - 18.10.4 - johnstown 5 g evo release
Final hh - 18.10.4 - johnstown 5 g evo release
 
NetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptxNetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptx
 

Recently uploaded

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 

Recently uploaded (20)

The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 

At&t cybersecurity introduction with alien vault

  • 1. © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Mohamed Abdelhakim Cell: 480-869-7888 l Email Mohamed.a@att.com Security without theSeams © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Cybersecurity
  • 2. 2 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. “U.S. CEOs Are More Worried About Cybersecurity Than a Possible Recession” 2 January 17, 2019 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. http://fortune.com/2019/01/17/cybersecurity-recession/
  • 3. 3 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Why? Cybersecurityisabusinessproblemthat mustbe addressedatscale 88% of survey respondents reported experiencing at least one type of security incident or breach in the past year. 43% $6Trillion of attacks target small business estimated annual cost of cybersecurity breaches by 2021 — “Charting a New Course,” AT&T Cybersecurity Insights, vol 8, September 2018 — SCORE October 18, 2018 https://www.prnewswire.com/news-releases/43-of- cyberattacks-target-small-businesses-300729384.html — 2019 Official Annual Cybercrime Report, Cybersecurity Ventures, Dec 2018 https://cybersecurityventures.com/cybercrime-damages-6-trillion-by- 2021/
  • 4. 4 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Stepsshouldbetakeneverydaytoaddress problems atscale Fear, uncertainty, and doubt dominate for large, singular events However, taking steps everyday can have a much larger impact at scale 15,000 lives are saved by seatbelts each year in the US (source: NHTSA) Cybersecurity must now be addressed at scale Organized Crime: Technology Complexity The rise of digitalization: MORE ATTACKS MORE SEAMS HIGHER SEVERITY
  • 5. 5 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. CybersecurityProgramsToday $100M+ Annual security spend 100’s 70+ Of security employees and they are hard to find! Security solutions Snapshot of Industry Leaders ”In 2016, JPMorgan upped its cybersecurity budget from $500M in 2015 to $600M. “ — CB Insights, Jan 2018 "The average enterprise uses 75 security products to secure their network. " — CSO, March 2016 “2018-2019: 53% of organizations report a problematic shortage of cybersecurity skills.” — ESG, Jan 2019
  • 6. 6 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Businesses do not get hacked because they lack a firewall, anti- virus, or any other technology... Almost all modern cybersecurity breaches have happened in the “seams” between people, process, and technology
  • 7. 7 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Cybersecurity has Evolved Point Solutions Stitching together a ‘patch work quilt’ with many seams! • Firewalls • Proxies & Gateways • Endpoint security Aggregation Band-aid for seams, requiring effort to integrate. Lacking gap analysis and process enforcement • Log management • SIEM • Analytics Service Providers Delivers the people without control of orchestration technology roadmap • Consulting • Managed Security Service Providers Integrates the “full stack” of people, process, and technology • Cybersecurity Consulting • Managed Security Services • Threat Detection & Response • Integration, orchestration, and automation The “Standard Approach” to Defense Today UnifiedSecurity Management
  • 8. 8 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&TCybersecurity Unified Security Management Cybersecurity Consulting Software-Defined Platform Managed Security Services AT&T Alien Labs Phenomenal Threat Intelligence Security Without the Seams Collaborative Defense
  • 9. 9 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. 9 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Threat Intelligence AT&T Alien Labs provides the tactical threat intelligence that integrates directly with our software- defined platform for automated security engineering, threat detection, and response. HighVolume Data Feeds AI & Machine Learning Human Expertise Continuous Updates
  • 10. 10 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. 10 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. *as of Jan. 2019 370KUnique malware samples analyzed per day 199Countries and territories with highly secure connections 225+Petabytes of traffic per day* 19MDaily threat indicators to OTX140Countries from which OTX threat indicators are submitted 100K Participants contributing to Alien LabsOTX (OpenThreat Exchange), the world’s largest open threat intelligence community 100BPotential probes for vulnerabilities across our global IP network every day. Threat Intelligence At a Glance
  • 11. 11 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. PhenomenalThreatIntelligence Cybersecurity Consulting Services Managed Security Services Software-defined Platform forThreat Detection and Response Threat Intelligence Human Expertise Continuous Updates AI & Machine Learning High-Volume Data Feeds
  • 12. 12 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. CollaborativeDefense Fightingonlinecrimeisateamsport No enterprise or vendor should be fighting alone against modern cybercriminals. Collaborative defense utilizes advanced software-defined platforms to integrate and orchestrate: • Threat data across sources • Security technologies from a number of leading vendors across threat vectors
  • 13. 13 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Integrating people, process, and technology to help protect your business SecurityWithouttheSeams People Process Technology Cybersecurity Expertise 8 Global Security Operations Centers 500+ SOC Analysts Orchestrating ecosystem of security offerings
  • 14. 14 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. 14 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Cybersecurity Consulting AT&T Cybersecurity Consulting services help meet the challenges of an ever-changing threat landscape, providing the insight and tools needed to establish and maintain sound cybersecurity practices. Cyber Risk Management Security Response Security Operations
  • 15. 15 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Cyber Risk Management Security ResponseSecurity Operations Managed Security Services Security Strategy Compliance & Regulatory Training and Awareness Architecture, Design & Transformation Cyber SOC Services Cloud Security Solutions Threat Management Services Breach Investigations Incident Response Retainer Services Incident Response Program Development Cybersecurity Consulting Services Software-defined Platform forThreat Detection and Response CybersecurityConsultingServices Threat Intelligence
  • 16. 16 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. WhyAT&TCybersecurityConsulting? Consulting organization with 25 year history One of original PCI Qualified Security Assessor firms HITRUST certified assessor Consultants average 12 years of experience in Cybersecurity Board seated members in CSA, ISA, and HIMMS Direct representation in NCSL Deep security expertise for solutions that fit — across industries, for businesses of all sizes
  • 17. 17 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. 17 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Managed Security Services AT&T Managed Security Services orchestrate best- of-breed solutions from across the security technology landscape. Our security operations centers define and implement processes utilizing industry- standard best practices. Endpoint Connectivity Data & Applications Threat Management
  • 18. 18 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. ManagedSecurityServicesPortfolio Endpoints Threat Management Cybersecurity Consulting Services Connectivity Applications & Data Endpoint Management IoT Security Firewall Services Global Security Gateway CloudWeb Security Threat Manager Endpoint Security Mobile Threat Defense CDN Security Proxy Services DDoS Defense Intrusion Prevention Encryption Services Secure Email Gateway Software-defined Platform forThreat Detection and Response Managed Security Services Threat Intelligence
  • 19. 19 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. 19 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Technology Behind the orchestration is a powerful software-defined platform designed to analyze security data from across your environment to automate threat detection, and orchestrate with security technologies to respond and remediate. Automation & Response Data Analysis Threat Detection
  • 20. 20 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Software-DefinedPlatform Cybersecurity Consulting Services Managed Security Services Automation & Response Software-defined Platform forThreat Detection and Response Data Analysis Threat Detection Threat Intelligence
  • 21. 21 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. FullStackSecurity Cybersecurity Consulting Services Managed Security Services Security Strategy Compliance & Regulatory Architecture, Design & Transformation Cyber SOC Services Breach Investigations Incident Response Program Development Training and Awareness Cloud Security Solutions Threat Management Services Incident Response Retainer Services Endpoint Management IoT Security Cloud Web Security Threat Manager Endpoint Security Mobile Threat Defense CDN Security Proxy Services DDoS Defense Intrusion Prevention Encryption Services Secure Email Gateway Data Analysis Automation & ResponseThreat Detection Software-defined Platform forThreat Detection and Response Firewall Services Global Security Gateway Threat Intelligence
  • 22. 22 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. OfferingsAcrosstheSecurityLifecycle Protect & Prevent Detect & RespondAssess & Plan Cybersecurity Consulting • Cyber-risk posture assessment (remote) • Enterprise risk assessments • VulnerabilityAssessments and Management • PenetrationTesting • Cyber risk assessment (in-person for mid- market) • Compliance Reviews and Attestations (Level 1/Level 2 and all service providers for PCI, HIPAA/NIST, ISO, NIST) • SecurityTransformation Services • SecurityTechnology Strategy and Roadmap • SecurityArchitecture and Design • Security Policy Design and Implementation • Cloud SecurityArchitecture and Monitoring Strategy Managed Network Security • Premises based Firewall • Network based Firewall • Global SecurityGateway Managed Web Security • CloudWeb Security Service (CWSS) Managed Email Security • Secure Email Gateway Managed Mobile Security • EMM/UEM • MobileThreat Defense (MTD) Managed Endpoint Security • Endpoint Security Service Managed Application Security • Reactive DDoS • DDoS Defense • DDoS Defense public sector Cybersecurity Consulting • ActiveThreat Hunting • FirewallAnalysis and Migration • SecurityAwareness and Training Program • Identity andAccess Management • Cyber SoC design and implementation Threat Detection & Response • USMA • AT&TThreat Manager Cybersecurity Consulting • Incident Response Services • Post Breach Services • Cyber SoC optimization Cyber Insurance Referral Program

Editor's Notes

  1. 160429att_1012_ret_V2.jpg
  2. Organized crime: http://www.verizonenterprise.com/industry/public_sector/docs/2018_dbir_public_sector.pdf Almost three-quarters (73%) of cyberattacks were perpetrated by outsiders. Members of organized criminal groups were behind half of all breaches, with nation-state or state-affiliated actors involved in 12%.