Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Stopping The Next Cyberattack

358 views

Published on

The dramatic scope of the recent string of high profile breaches in 2014 and 2015 proves that organizations of any size and type can be targeted by cyber criminals. This white paper shares 5 steps to developing stronger security to help break the patterns that leave businesses vulnerable and open to attack.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Stopping The Next Cyberattack

  1. 1. ©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd. 5 Steps to Stronger Security STOPPING THE NEXT MASSIVE CYBERATTACK
  2. 2. ©2015 Check Point Software Technologies Ltd. 2 Era of the Breach 1 IT Security Risks Survey 2014, Kapersky Lab report, 2014 2 PWC Global State of Information Security Survey 2015, PWC, October 2014 3 “2014 Cost of Cyber Crime Study: United States,” Ponemon Institute, October 2014 of large companies say targeted attacks are a major threat1 39% 117,339 global attacks per day2 Average annualized cybercrime cost by organization3 12.7 million
  3. 3. ©2015 Check Point Software Technologies Ltd. 3 What Can Breaches Teach Us? Security vulnerabilities Operational weaknesses Common attack patterns Preventive steps
  4. 4. ©2015 Check Point Software Technologies Ltd. 4 Best-in-class security products are not enough on their own Only a security-driven network architecture and security infrastructure partnered with experienced staff can prevent future attacks
  5. 5. ©2015 Check Point Software Technologies Ltd. 5 STEPS TO STRONGER SECURITY
  6. 6. ©2015 Check Point Software Technologies Ltd. 6 Assess environment vulnerabilities and weaknesses STEP 1
  7. 7. ©2015 Check Point Software Technologies Ltd. 7 Evaluating Security • Ingress/Egress • Critical Services • Critical Data • Segmentation • Security controls • Password policy controls • Advanced threat prevention
  8. 8. ©2015 Check Point Software Technologies Ltd. 8 Segment the network to prevent and contain infections STEP 2
  9. 9. ©2015 Check Point Software Technologies Ltd. 9 FLAT NETWORK SEGMENTED NETWORK
  10. 10. ©2015 Check Point Software Technologies Ltd. 10 Implement security controls to protect against APTs STEP 3
  11. 11. ©2015 Check Point Software Technologies Ltd. 11 Stopping Attacks At Every Stage
  12. 12. ©2015 Check Point Software Technologies Ltd. 12 The criminal identifies a vulnerability to exploit Security solution: The criminal writes code to exploit that vulnerability and download malware Security solution: Malware connects with its Command & Control center Security solution: Malware spreads through the network to look for critical data Security solution: Malware finds the data & begins exfiltration Security solution: IPS AV Sandboxing Segmentation IPS AV Anti-bot tools Anti-bot tools Data leakage and loss prevention tools
  13. 13. ©2015 Check Point Software Technologies Ltd. 13 Monitor 24/7 for continuous security STEP 4
  14. 14. ©2015 Check Point Software Technologies Ltd. 14 Keys to Effective Monitoring Monitor logs daily Correlate logs from different technologies Tune detection and analysis rules based on logs Identify potential incidents with anomaly detection tools Stay familiar with network assets Use visualization to assist expert analysis Maintain logs for 90 days or more Retroactively review logs based on new data
  15. 15. ©2015 Check Point Software Technologies Ltd. 15 Create and test Incident Response plan STEP 5
  16. 16. ©2015 Check Point Software Technologies Ltd. 16 Closing The Door To Attacks Are you prepared to… Contain attacks? Minimize losses? Keep the business running?
  17. 17. ©2015 Check Point Software Technologies Ltd. 17 Take the first step, schedule your FREE Security Checkup Stop Tomorrow’s Attacks, Today

×