Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

How to Find Security Breaches Before They Sink Your Business


Published on

Security breach that impacted millions of customers can take weeks to uncover if you don't know the signs. Learn how to uncover breaches by identifying anomalous activity.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

How to Find Security Breaches Before They Sink Your Business

  1. 1. How to Find Security Breaches Before they Sink Your Business Brought to you by !
  2. 2. Security breaches can put your company on the front page
  3. 3. That’s why you need to find them early To stop the breach and minimize exposure But how do you tell if it’s normal behavior or something to be worried about?
  4. 4. Breaches create outliers. In mathematical terms, they are several standard deviations outside of normal activity
  5. 5. You can think of them as being at the very edge of the bell curve Anomaly
  6. 6. Let’s take a look at some examples
  7. 7. 104,338 tweets in 1 day from 1 IP address Bot exfiltrating data from bank… 140 characters at a time
  8. 8. A retail employee uploads Employee leaving organization 4.5 GB of files to Kanbox Risky Service : No compliance certifications Terms & Conditions: Collects and shares data with third parties Location: Hosted in China
  9. 9. Single authenticated user at energy company tries to connect to GoToMyPC… 11,101,872 times in a week. User device infected with malware !
  10. 10. Single IP address at healthcare company attempts to connect to Facebook, which was blocked... 3.8 million times. Malware attempting to connect to its command and control site
  11. 11. Manufacturing employee has 188 uploads totaling 48.7 GBs in 1 day to Ryu Share Data sent to a Drop Zone outside of company’s jurisdictional location.
  12. 12. Except as otherwise expressly permitted by these Terms, any Code submitted to must be licensed to Slashdot Media and other licensees under a license that is: compliant with the Open Source Initiative (“OSI”)’s Open Source Definition ( docs/osd) or certified as an “OSI-Approved L i c e n s e ” ( h t t p : / / o p e n s o u r c e . o r g / licenses).” 65 KB upload to open source code repository Loss of Proprietary IP
  13. 13. Beyond the hype, get the facts from 5.9M+ users Brought to you by ! DOWNLOAD NOW 2014 Cloud Adoption & Risk Report