Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Carm presentation new logo may 14

Cyber attacks effects and CARM proposition overview. The presentation includes the relevant information about nowadays target cyber attacks, how they occur and what the post breach remediation platform offered by Exclusive Networks is.

  • Login to see the comments

  • Be the first to like this

Carm presentation new logo may 14

  1. 1. Cyber Attack Remediation & Mitigation
  2. 2. YOUR CYBER DEFENCES WILL BE BREACHED ITS INEVITABLE! WHAT WILL YOU DO?
  3. 3. Decrease the Find 2 Fix …..
  4. 4. May Jun July Aug Sept OctJan Feb Mar Apr MayJun July Aug Sept Oct Nov Dec Central Bank of Russia Acceleration of Intellectual Property Loss: Significant Breaches of the Last 12 Months
  5. 5. • Unique Integrated Solution with Post Breach capabilities – Defend – Identify – Containment – Rapid Response – Full Forensics • Combining Best of Breed ‘vendor’ - technologies • Demonstrable TODAY @ Exclusive Networks What is
  6. 6. Benefits • Improved Visibility & Intelligence • Minimising Organisation Damage – Loss of Intellectual Property – Brand – Reputation – Loss of revenue • Optimizing IT Resource • Reduce IT Costs • Faster Find-to-Fix and Reduced Time to Remediation
  7. 7. Why do we need • USA – >47,000 known IT security incidents in 2013 (Ref Verizon 2013) – Average cost of a data leak • $5.5M per organisation (Ref Ponemon Rpt) • UK IT security incidents – >54 per large organisation pa (Ref PWC 2013) – Average cost of a data leak • $3.5M (Approx. £2.2M) per large organisation • 65k€ - 110k€ - Small to medium size orgnaisations (Ref Ponemon Rpt) • Belgium – 334 ‘serious’ incidents/Month • (ref SERT)
  8. 8. • Number of devices (endpoints) per user – PCs, Tablets, Smartphone • BYOD – Consumerisation and choice increases IT workload • Mobility – Android based threats to hit 1M in 2013 – 30% increase in Mobile Malware in last 6mnths (Fortinet) • Cloud – Attractive point of entry for a cyber attack • Applications – App Stores outside of IT control Source: Execs Guide to 2012 Data Breaches - OSF The problem is growing !
  9. 9. • Advanced Persistent Threats (APTs) – Often organisationally driven • Zero Day exploits – Defending against the unknown • Polymorphic threats – Ever changing Its inevitable that some of these Threats will become successful ATTACKS! ....and Threats are getting more challenging
  10. 10. “Consider that by 2020, the United States is projected to have nearly 2,500 manned combat aircraft of all kinds. Of those, nearly 1,100 will be the most advanced fifth generation F-35s and F-22s. China, by contrast, is projected to have no fifth generation aircraft by 2020. And by 2025, the gap only widens. The U.S. will have approximately 1,700 of the most advanced fifth generation fighters versus a handful of comparable aircraft for the Chinese. Nonetheless, some portray this scenario as a dire threat to America's national security.” 2009: China Needs Over 16 Years to Catch Up
  11. 11. Lockheed USAF F22 Chengdu J-20 2009: China Needs Over 16 Years to Catch Up
  12. 12. Threats are Commoditising . . . . • Nation v Nation – Cyber Warfare • National Govt – Espionage • Central Govts - Hacktivism • Large, Global Brands . .IP/Robbery • Mid to Large sized Organisations.. Robbery? • You . . . . Burglary
  13. 13. • Of victims had up-to-date AV 100% • Of breaches were reported by third parties 67% • Of breaches involved compromised credentials 100% • The median number of days an attacker was on the network 229 Source: Mandiant M-Trends 2014 report Post Breach Facts
  14. 14. The true cost of breach • Loss of revenue – From outage, no trading • Damage to reputation – Negative customer reaction • Loss of data – Cost of replacement, repair and compliance • Interruption to business – Diverting resources will delay core activity • Damage to customer confidence – Loyalty & ongoing business delayed or lost • Damage to investor confidence – Valuation can affect credit limits & increase costs • Loss of intellectual property – Leadership position lost & margin impact • Legal costs – See all the above!!!
  15. 15. Customer Pain Points • Lack of visibility – Anomalies, behaviours, performance degradation – Indicators of change • Sheer volume of Incidents – Lateral spread • Incident response processes – Speed of response • Time to remediate – Manpower, skills • Why did it happen? – Forensics • Costs • . . . A New Approach is Needed !
  16. 16. So what is needed? • A cyber attack ‘early warning system’ • Single Pane of Glass • Rapid defence re-configuration • Better visibility • Actionable intelligence • Learn from our lessons
  17. 17. Cyber Attack Remediation & Mitigation
  18. 18. meets the NEED • CARM delivers – Real-time monitoring – BIG DATA analysis for abnormality detection – Fast incident evaluation & qualification – Fast incident response determination – Control – Reconfigurable defences
  19. 19. `
  20. 20. Demonstrable Platforms
  21. 21. C.A.R.M What people are saying about
  22. 22. 1 Reseller says… • ‘We talk to our customers about IT security but its always been a bit of challenge to help them select the right combination of products – CARM provides us with a comprehensive framework to help the customer make the right choices’ • Benefits: – CARM increases our credibility – Stalled conversations can be re-opened – Upsell opportunities in existing accounts – Greater account penetration
  23. 23. Another says… • ‘The CARM solution enables us to engage with a much broader audience in the customer’ • Benefits: – Greater account penetration – Upsell opportunities in existing accounts – Open new doors
  24. 24. 1 Vendor said… • ‘CARM is great – it positions our product and makes it more compelling & relevant’ • Benefits: – The Exclusive Networks (EN) channel is more attractive than other routes – EN Partners gain accelerated sales engagement with vendors
  25. 25. Another Vendor told us… • ‘We pitched CARM instead of just our product and created an earlier opportunity!’ • Benefits: – Cross product lead generation – Shorter sales cycle – Broader customer engagement
  26. 26. VAR Benefits • Post Breach – big Issue • Addresses a real need – NOW • Good reason for a conversation with customers • Demo facility can be booked • Demonstrate your value to customers – “We understand your business issues” – ”How/Where does it (product) fit into your network” • Incremental revenue opportunities • Could be annuity based if sold as a service
  27. 27. Live Demo & Workshop
  28. 28. Next Steps • Talk to your customers about CARM • Qualify and arrange a demonstration • Explore their reaction • Evaluate the service and product potential • Create those opportunities with your account manager
  29. 29. Next Steps - Materials http://www.carmsecurity.com • These PowerPoint slides – make merry • CARM white paper • CARM Info-graphic • CARM videos and canned demonstrations • More to come…
  30. 30. Summary • Post breach era is here • Not IF but WHEN • Organisations need to address it – Seen as costly – Too complex – More work in overloaded dept. • CARM simplifies & automates this – Accelerates – FIND 2 FIX …… 229 days …EBay 90 days + • Rapid outcomes at reasonable cost • Real-life working platform NOW for demos • It works!!! . . . . .
  31. 31. So ........

×