SlideShare a Scribd company logo
1 of 28
Confidential
Dr. Christine Izuakor
Pete Nourse
Extending Cybersecurity Beyond The Office
Perimeter
Confidential
Your speakers
Dr. Christine Izuakor
Dr. Izuakor is the Founder and CEO of Cyber Pop-up. She has 10 years of
Fortune 100 enterprise technology and leadership experience, including
building numerous security functions from the ground up at United
Airlines. She earned a PhD in Security Engineering, is a cyber security
professor, writes and speaks on a wide range of cyber security issues
globally, and helps corporations solve a broad range of strategic
cybersecurity challenges.
Pete Nourse
Pete is the CMO of Veriato. He is a seasoned technology marketing
executive with over 20 years of experience leading marketing for
multiple, multinational corporations. He has been focused in the
cybersecurity field since 2001. Prior to joining Veriato, he worked for
companies including Bitdefender, nCipher, Avid Technologies, and EDS.
Confidential
25% employees admit sharing
passwords with family & friends.
SailPoint Remote Work Report
Confidential
28% of employees don't lock
their phones. -
Pew Research
Confidential
72% of security professionals are
concerned that remote employees break
security policies and expose systems to
risk.
Black Hat
Confidential
Today’s agenda
• The evolution of the office perimeter
• Latest threats to organizations in and out of the office
• Keeping your data and systems safe while they sit in
your employees' house
• A user-centric approach to extending security beyond
the traditional office perimeter
Confidential
The “new office perimeter”
• Companies struggle to balance the shrinking office footprint vs. explosive
growth in the mobile footprint
Confidential
Extended risk footprint raises security
concerns
• Insider threats
• Data loss
• Compliance challenges
Confidential
Keys to extending security beyond
the office
• Basic security hygiene
• Insider threat detection
• Zero trust strategies
• Ransomware protection
• Productivity monitoring
Confidential
User-centric security a key
strategy in the extended office
• Keep users at the core your
remote security strategy
• Draw key insights from data
through user behavior analytics
Confidential
Keep security up,
as office walls
come down.
Confidential
CONFIDENTIAL
Confidential
CONFIDENTIAL
Single Integrated Platform
USER & ENTITY BEHAVIOR ANALYTICS (UEBA)
+
USER ACTIVITY MONITORING (UAM)
+
PREDICTIVE RISK SCORING
Ai POWERED THREAT HUNTING
Confidential
CONFIDENTIAL
Macs
PCs
Androids
Cerebral Management Console
SQL Server
Cerebral Works in Physical & Virtualized Environment
Windows
Servers
(including
terminal
servers)
Confidential
Productivity &
Engagement
Confidential
CONFIDENTIAL
Cerebral lets you
• Track, Analyze & Record all user activity (at home or in
office)
• Provides daily productivity reports (Excel or Netflix?)
• Fine Grain control over who and what is monitored
(privacy)
• Psycholinguistic sentiment analysis (disengagement
indicator)
Confidential
CONFIDENTIAL
Active Vs. Idle Time Summary
Confidential
Compliance
Confidential
CONFIDENTIAL
Work from Home
Compliance Nightmare
VPN Violation
Confidential
Insider Threat
Security
Confidential
• 84% believe remote work is here to stay
• 18% say cybersecurity is not a priority at home
• 23% experienced increased incidents during
pandemic
Massively Expanded
Risk Footprint
Confidential
CONFIDENTIAL
T I M E
R
I
S
K
Managing Corporate Risk Timeline
P R E - B R E A C H P O S T - B R E A C H
M O M E N T o f
B R E A C H
E m p l o y e e s
C o n t r a c t o r s
E x - e m p l o y e e s
I m p o s t e r s
V a l u a b l e
D a t a
Real
Time
Alerting
Predictive
Threat Hunting
Intelligent
Incident
Response
Watching
Analyzing
Recording
24/7/365
File
Transfers
Document
Tracking
Network
Usage
Applications Used
User Status
Geofencing
Email content
Chats & IMs
Websites visited &
Online Searches
Keystrokes
Android
Phone Use
Compromised
Credentials
Psycholinguistics
Printer & USB
Ai
Confidential
CONFIDENTIAL
Predictive Analytics
Best in Class Technology
• Utilizes advanced machine learning techniques
o Based on the Palo Alto Research Center PARC
o Tested against the CERT Insider Threat Center dataset that
comprise computer employee activities within a large business or
government organization over a 500-day period
• Cerebral ML adds to the best (sophisticated DARPA-supported ML)
• Veriato proprietary innovations :
1. Adds consideration activity with psychological factors
2. Passes over “dirty data” and adjusts noise due to changing
domains clusters
• In CERT benchmark testing resulted in fewer false
alarms
• < 3% FA than similar algorithms
Veriato’s ML results currently
unbeaten, including beating
Microsoft’s ML algorithm in head
to head testing
Alerting
Enterprise Wide Risk Scoring
• Calculates continuous user risk scores for all employees
• Ranks risky users in a watchlist
• Predicts and prevents by observing trends in user risk score time series
Maximized Efficiency
The Complete Insider Threat Intelligence Platform
Integrated & Intelligent
Eyes On Glass Technology
Exactly What Happened (UAM)
• Time-Capsule DVR screenshot review
• See all onscreen actions
• Play it back like your DVR
• Export as BMP, JPG or AVI
Video Playback
Confidential
Empowering Cybersecurity
Beyond the Office Perimeter
Contact Us For a Cerebral Demo
Sales@Veriato.com
1-888-598-2788

More Related Content

What's hot

What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and DocumentsNuance Communications
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesBijay Senihang
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Knowledge Group
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Netpluz Asia Pte Ltd
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - FlierSunit Belapure
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityIllumeo
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber SecurityNikunj Thakkar
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Amrit Chhetri
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected WorldRussell_Kennedy
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture NotesFellowBuddy.com
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy finalIndian Air Force
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public SectorScott Geye
 

What's hot (20)

What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents16 Things You Should be Doing to Secure Print and Documents
16 Things You Should be Doing to Secure Print and Documents
 
Cyber Security Threats and Data Breaches
Cyber Security Threats and Data BreachesCyber Security Threats and Data Breaches
Cyber Security Threats and Data Breaches
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
Cyber Security Landscape and Systems Resiliency – Challenges & Priorities - T...
 
Cyber security & Data Protection
Cyber security & Data ProtectionCyber security & Data Protection
Cyber security & Data Protection
 
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
Are you Cyber ready? Introducing Netpluz managed cyber security - cyber intel...
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
Cyber Security - Flier
Cyber Security - FlierCyber Security - Flier
Cyber Security - Flier
 
2019 Cybersecurity Predictions
2019 Cybersecurity Predictions2019 Cybersecurity Predictions
2019 Cybersecurity Predictions
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Basics of Cyber Security
Basics of Cyber SecurityBasics of Cyber Security
Basics of Cyber Security
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021Role of Forensic Triage In Cyber Security Trends 2021
Role of Forensic Triage In Cyber Security Trends 2021
 
Cyber Security in the Interconnected World
Cyber Security in the Interconnected WorldCyber Security in the Interconnected World
Cyber Security in the Interconnected World
 
Information Security Lecture Notes
Information Security Lecture NotesInformation Security Lecture Notes
Information Security Lecture Notes
 
Introduction to the concept of it security
Introduction to the concept of it securityIntroduction to the concept of it security
Introduction to the concept of it security
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
National cyber security policy final
National cyber security policy finalNational cyber security policy final
National cyber security policy final
 
2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector2016 - Cyber Security for the Public Sector
2016 - Cyber Security for the Public Sector
 

Similar to Extending CyberSecurity Beyond The Office Perimeter

Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacksAppSense
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!Dell EMC World
 
Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Steve Lamb
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Aggregage
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionInfo-Tech Research Group
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data Naveed Ahmed
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber SecurityMisha Hanin
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareCloudera, Inc.
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planetVincent Kwon
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareRES
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionTop 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionEnterprise Management Associates
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldNetskope
 

Similar to Extending CyberSecurity Beyond The Office Perimeter (20)

Protecting endpoints from targeted attacks
Protecting endpoints from targeted attacksProtecting endpoints from targeted attacks
Protecting endpoints from targeted attacks
 
MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!MT50 Data is the new currency: Protect it!
MT50 Data is the new currency: Protect it!
 
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SCCyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
Cyber Security for Non-Technical Executives (SC GMIS) Columbia, SC
 
Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10Core.co.enterprise.deck.06.16.10
Core.co.enterprise.deck.06.16.10
 
Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...Security and Policing event presentation by Steve lamb from hewlett packard e...
Security and Policing event presentation by Steve lamb from hewlett packard e...
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
Harness Your Code, Unleash Your Creativity: Your Team's Pragmatic Guide to Se...
 
Select and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection SolutionSelect and Implement a Next Generation Endpoint Protection Solution
Select and Implement a Next Generation Endpoint Protection Solution
 
Secure Your High Risk Data
 Secure Your High Risk Data  Secure Your High Risk Data
Secure Your High Risk Data
 
Splunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior AnalyticsSplunk for Enterprise Security featuring User Behavior Analytics
Splunk for Enterprise Security featuring User Behavior Analytics
 
The 5 ws of Cyber Security
The 5 ws of Cyber SecurityThe 5 ws of Cyber Security
The 5 ws of Cyber Security
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
MID_SIEM_Boubker_EN
MID_SIEM_Boubker_ENMID_SIEM_Boubker_EN
MID_SIEM_Boubker_EN
 
Risks vs real life
Risks vs real lifeRisks vs real life
Risks vs real life
 
Protecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomwareProtecting health and life science organizations from breaches and ransomware
Protecting health and life science organizations from breaches and ransomware
 
Security solutions for a smarter planet
Security solutions for a smarter planetSecurity solutions for a smarter planet
Security solutions for a smarter planet
 
It's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES SoftwareIt's Behind You! Managing Insider Threats to Digital Security with RES Software
It's Behind You! Managing Insider Threats to Digital Security with RES Software
 
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management SolutionTop 10 Tips for Selecting a Threat and Vulnerability Management Solution
Top 10 Tips for Selecting a Threat and Vulnerability Management Solution
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Data Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy WorldData Privacy, Security, and Sovereignty in a Cloudy World
Data Privacy, Security, and Sovereignty in a Cloudy World
 

More from Veriato

Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyVeriato
 
What do your employees do all day? - Veriato + Digital Boardwalk
What do your employees do all day? - Veriato + Digital BoardwalkWhat do your employees do all day? - Veriato + Digital Boardwalk
What do your employees do all day? - Veriato + Digital BoardwalkVeriato
 
Monitoring a hybrid workforce - veriato and prianto
Monitoring a hybrid workforce - veriato and priantoMonitoring a hybrid workforce - veriato and prianto
Monitoring a hybrid workforce - veriato and priantoVeriato
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsVeriato
 
The Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceThe Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceVeriato
 
Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Rev...
Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Rev...Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Rev...
Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Rev...Veriato
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark webVeriato
 
Monitoring employees in a remote workplace
Monitoring employees in a remote workplaceMonitoring employees in a remote workplace
Monitoring employees in a remote workplaceVeriato
 
Building an insider threat program
Building an insider threat programBuilding an insider threat program
Building an insider threat programVeriato
 
Implementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramImplementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramVeriato
 

More from Veriato (10)

Ransomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your CompanyRansomware Has Evolved And So Should Your Company
Ransomware Has Evolved And So Should Your Company
 
What do your employees do all day? - Veriato + Digital Boardwalk
What do your employees do all day? - Veriato + Digital BoardwalkWhat do your employees do all day? - Veriato + Digital Boardwalk
What do your employees do all day? - Veriato + Digital Boardwalk
 
Monitoring a hybrid workforce - veriato and prianto
Monitoring a hybrid workforce - veriato and priantoMonitoring a hybrid workforce - veriato and prianto
Monitoring a hybrid workforce - veriato and prianto
 
Fraud Detection With User Behavior Analytics
Fraud Detection With User Behavior AnalyticsFraud Detection With User Behavior Analytics
Fraud Detection With User Behavior Analytics
 
The Rise of Ransomware As a Service
The Rise of Ransomware As a ServiceThe Rise of Ransomware As a Service
The Rise of Ransomware As a Service
 
Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Rev...
Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Rev...Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Rev...
Veriato Counterforensics Webinar: How Insiders Evade Forensics and How to Rev...
 
Revealing the dark web
Revealing the dark webRevealing the dark web
Revealing the dark web
 
Monitoring employees in a remote workplace
Monitoring employees in a remote workplaceMonitoring employees in a remote workplace
Monitoring employees in a remote workplace
 
Building an insider threat program
Building an insider threat programBuilding an insider threat program
Building an insider threat program
 
Implementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring ProgramImplementing A User Activity & Behavior Monitoring Program
Implementing A User Activity & Behavior Monitoring Program
 

Recently uploaded

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmSujith Sukumaran
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based projectAnoyGreter
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 

Recently uploaded (20)

chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
Intelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalmIntelligent Home Wi-Fi Solutions | ThinkPalm
Intelligent Home Wi-Fi Solutions | ThinkPalm
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
MYjobs Presentation Django-based project
MYjobs Presentation Django-based projectMYjobs Presentation Django-based project
MYjobs Presentation Django-based project
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 

Extending CyberSecurity Beyond The Office Perimeter

Editor's Notes

  1. Christine: *kick off session*
  2. Christine: *introduce speakers*
  3. Christine: set context Also, 50% of employees share a company issued device with friends and family.
  4. Christine: set context
  5. Christine: set context
  6. Christine: *walkthrough agenda and what attendees will walk away with*
  7. Christine: ”Explain what is meant by the "new office perimeter". How has this concept evolved over time?” Pete: Discuss the shrinking office footprint, and growing mobile footprint. (Data in the kitchen, data on the beach, data in unknown places.) Visibility and monitoring technology
  8. Christine: ”What new threats are you all seeing arise given this continual shift?” Pete: Discuss insider threats, data loss, compliance issues, anything else you want to add Christine: Add a bit on ransomware and backup challenges.
  9. Christine: ”What are some key recommendations to keeping data and systems secure beyond the traditional office perimeter?” Pete: Discuss remote employee monitoring and insider threat detection, concept of zero trust, ransomsafe, added value of productivity monitoring, etc. Christine: Add a bit on training and awareness; also don't neglect what you left on prem.
  10. Christine: ”As perimeters get blurred, we're all learning that while perimeters are still important we have to focus more on the nodes within - aka users. Tell us more about user-centric approaches to extending security beyond the traditional office perimeter.” Pete: Plug Veriato products and lead into a demo or product slides?
  11. Add any demo slides Pete
  12. Today we’re going to show you Cerebral. Cerebral is an Ai power insider threat platform that integrates User Behavior Analytics and User Activity Monitoring to provide a powerful Next Gen solution. Cerebral’s predictive analytics allow a security team to proactively hunt threats. I’d like to give you an overview of Cerebral’s components and how it works as well as a some common use cases from some of our customers. Does that sound OK? Before we dive in could you take a couple of minutes and tell me what you’re using now for insider threat security and what objective you have? Thanks for sharing that, it will help tailor our conversation.
  13. Cerebral is an insider threat intelligence platform that integrates User & entity behavior analytics, daily risk scoring and user activity monitoring which includes video screenshot playback. The power comes from the integration which allows you to identify and close investigation dramatically faster that with legacy or network analysis tools. Cerebral is software based but it does require a SQL DB to store the data. From your management console you can remotely push the Cerebral agent out to the endpoint machines (PCs, Macs, and Androids). The agent deploys and runs in stealth mode unless you choose to make it visible to the end user. The devices can be anywhere in the world as long as they have an internet or network connection to communicate back to the server. As soon as the agents are deployed they start watching all user activity on the endpoint 24/7. A dynamic behavioral profile is created for every user over a 20-30 day period. This dynamic digital fingerprint sets a behavioral baseline for both the person and the group the person’s associated with
  14. Lets take a look at Productivity and engagement
  15. Cerebral will; Track all activity at home or in the office Provide productivity reporting which I’ll show you in a minute Give you fine grain control over who and what is monitored – Privacy is always a concern – we can talk more about this later if it’s a concern for your team And we can tell you when people are starting to mentally disengage from the company Employee engagement leads to 59% lower employee turnover, so it has a huge bottom-line impact Cerebral’s AI utilizes psycholinguistics to identify signs of disengagement – a top concern of every HR exec. Analyzes languageused by an employee in an email and picks up subtle clues that a person is disengaging – for example someone stops saying “we” and instead says “they” Key Point – Lay out exact capabilities regarding productivity & engagement
  16. Let’s take a look at how simple it is to review productivity. Here’s the active VS. idle time indicator – the light blue shows when people are active. So it looks like most people got going between 8:30 and 9:00. But then you notice that this guy down here who I’m guessing had a 9:00 tee time because he checked in at 8:00 for 10 minutes and then was idle for the rest of the day Key Point – Easy to view and spot probs
  17. After the initial wave of pandemic panic, with getting people set up remotely laptops and VPN connections etc. we started receiving calls to help with a new problem – compliance. Key Point – A new problem has arisen Concept - Others are concerned, you should be too
  18. Let’s look at a scenario; A hospital has sent all there billing and insurance reps. to work from home Each morning John sits in his kitchen, clicks onto the VPN and download the patient records so he can start working (click) If during the day, he clicks the VPN disconnect button on their screen, the Hospital has lost all visibility (click) – they don’t know what he’s doing with the patient data They are out of compliance Cerebral eliminates this problem because it’s not VPN reliant (click) Communication can be set up through a private URL so anytime the person is online data will flow back to the console (Click) Additionally – even if John shuts down there wifi and goes offline completely, Cerebral is still monitoring and recording all activity so a definitive record and auditable trail is maintained and stored locally. The next time John goes online, all the data will upload to the server. Because data is stored in a SQL database, reports can be queried to meet any compliance reporting requirement. Key Point – an end to end story to illustrate overcoming the compliance nightmare remote workers cause is easily resolved with Veriato
  19. Finally let’s look at Insider Threat Security As employees left their office environment and began working in spare bedrooms and at kitchen tables, with critical data, the risk footprint for organizations suddenly grew exponentially. Valuable IP, customer, patient and financial data is now outside the firewalls spread across the city region or country with no visibility into what employees are doing all day. With 60% of breaches coming from employees/contractors/partners… pre-covid - Insider threat security is more important than ever. Key Point – The risk footprint expanded so you need to pay closer attention
  20. Christine: Compliance is a start, but compliant doesn’t mean secure. We have bigger issues. Most companies are accepting that this could be permanent – in fact, a report from Pulse Secure found that 84% of US organizations expect a broader and more persistent remote work adoption after the coronavirus pandemic passes. However, adopting remote-first work policies comes with security challenges for tech leaders. Some studies have shown that remote employees are less likely to follow security best practices — for example, a report by Malwarebytes showcasing security in today's work from home environment found 18% of respondents said cybersecurity was not a priority. And in a report commissioned by (ISC)², nearly one fourth (23%) of infosec professionals said that cybersecurity incidents experienced by their organization have increased since transitioning to remote work.
  21. When looking at the Risk Timeline there are 2 components – the valuable data and the people affiliated with the organization We look at the risk timeline in 3 phases Pre-Breach Moment of breach Post Breach As time moves forward without resolution the risk grows Ideally we’d love to stop every threat at Pre-Breach phase, but unfortunately that’s not a reality so we want to minimize corporate risk at each phase Use predictive analytics to proactively hunt threats - to ID employees that are exhibiting signs of risk - to head off as many breaches as possible If a breach occurs – need to be alerted right away – the industry average of 206 days to discover a breach is completely unacceptable Incident response; Understand context right away so that appropriate action can be taken within minutes (not hours, not days) Understand how the breach occurred Understand if accomplices inside or outside of the organizations Create an evidence trail to allow prosecution
  22. Veriato is watching all human activity on the network. As soon as the agent is deployed on the endpoint, Veriato AI utilizes machine learning to create baselines on all employees. These digital fingerprint are used to look for behavioral anomalies. Cerebral continually analyzes and records all user activity on the endpoint 24/7 including, emails, chats, web usage, files movement, network usage, geofencing, psycholinguistics and more Alert Events -When conditions set in an Alerting Policy are met, an "Alert Event" is recorded Call Events - Phone numbers of incoming and outgoing calls and duration of call mobile devices only Chat/IM Events - Content from and information about a chat room session or Instant Message session Document Events - Printing, moving, renaming, copying of a file and all relevant information Email Events - All email sent/received and email file attachments File Transfer Events - All Peer-to-Peer, FTP, and HTTP file transactions Keystroke Events - All typed keystrokes and characters, visible or not Keyword Alert Events - Any event that triggered an alert, based on detection of a keyword at the client Network Events - All communication with other computers on the network intranet or internet Online Search Events - Searches entered and hits received from search engines Application Events -Every program opened and the activity within it Screen Snapshots - A picture every 30 seconds or specified time of the user's screen, as the user sees it User Status Events - Log on and log off times; periods of activity and inactivity Website Events - All domains and URLs visited
  23. Cerebral’s Predictive analytics are best in class and even build off of the DODs DARPA ML
  24. Cerebral’s AI is constantly analyzing all data gathered and creates a dynamic risk score for all employees. A security analyst can simply check the risk score dashboard each morning to proactively identify people that deserve a closer look. Here we see 6 people flagged red as high risk. You click on any person (click) and get the details about the activities that moved them into the red. Key Point –A key part of threat hunting and a huge efficiency maximizer (minimize the risk by proactively looking at possible needles in the haystack)
  25. The power of cerebral comes from its artificial intelligence and integrated functionality. It watches everyone 24/7 It analyzes all behavior It alerts you when there’s a sign of threat It lets see video of exactly what’s happening Letting you react in minutes instead of days weeks or months
  26. Cerebral’s eyes on glass technology gives you immediate visibility, so you know exactly what’s going on. If the alert comes in at 9:35 am, security can immediately use our Time-Capsule DVR to go back in time and cue up video of Joe’s screen from 30 minutes before the alert and watch everything he does. Is he just working on a big report or is he encrypting the data and hiding it in a PowerPoint presentation and using obfuscation tools to cover his tracks? Do you give him a raise for working hard… or call HR and the police? Now you know exactly what to do within minutes! Key Point –See the context immediately – react in minutes – minimize the Risk by stopping the bleeding fast
  27. Christine: Transition to Q&A and then close out session