Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

How to Win the War Against Hackers

128 views

Published on

At Black Hat, ServiceNow shows how threat intelligence sharing, automation, and orchestration wins the war against hackers. Learn more!

Published in: Technology
  • Be the first to comment

  • Be the first to like this

How to Win the War Against Hackers

  1. 1. 1 © 2017 ServiceNow All Rights Reserved© 2017 ServiceNow All Rights Reserved B L A C K H A T 2 0 1 7 How Threat Intelligence Sharing, Automation & Orchestration Wins the War Against Attackers Rich Reybok Senior Director, Engineering Security Business Unit ServiceNow
  2. 2. 2 © 2017 ServiceNow All Rights Reserved Security Response Today Is Slow Source: Ponemon Institute 2017 On average, it took respondents 191 days to spot a breach caused by a malicious attacker, and 66 days to contain it.
  3. 3. 3 © 2017 ServiceNow All Rights Reserved But Why Does it Take so Long? Incomplete Information Manual Remediation Repeat Infections
  4. 4. 4 © 2017 ServiceNow All Rights Reserved Orchestration Is Hot…but it Must Be Accurate You need to: Get it right the 1st time Orchestrate the right process Or else risk: Blocking the wrong things & people Losing business
  5. 5. 5 © 2017 ServiceNow All Rights Reserved Make People More Effective Shared intelligence fills in the skill gaps
  6. 6. 6 © 2017 ServiceNow All Rights Reserved Do better than Improve Accuracy Through Threat Intelligence Sharing Current Complete Relevant Accurate 267251230219188167146125Fewer days to find & contain
  7. 7. 7 © 2017 ServiceNow All Rights Reserved Share Intelligence with ServiceNow Trusted Security Circles • Anonymous sharing • Automatic sightings searches • Circles based on commonality • Sharing stays with your company • Supports industry standards – STIX, TAXII • Early warning of potential attacks
  8. 8. 8 © 2017 ServiceNow All Rights Reserved More Than Just Sharing ENTERPRISE SECURITY RESPONSE Security Incident Response Workflow Automation & Orchestration Deep IT Integration Vulnerability Response Threat Intelligence
  9. 9. 9 © 2017 ServiceNow All Rights Reserved Over 10 years of orchestration experience Proven platform with 3,600+ customers Secure & Compliant ScalableMulti-Instance Intelligent Automation Engine WorkflowService Catalog Knowledge Base Developer Tools Contextual Collaboration Single Database Service Portal Subscription & Notification Performance Forecasting Predictive Modeling OrchestrationReports & Dashboards Anomaly Detection Nonstop Cloud Now Platform™ Peer Benchmarking
  10. 10. 10 © 2017 ServiceNow All Rights Reserved 10© 2017 ServiceNow All Rights Reserved Confidential DEMO
  11. 11. 11 © 2017 ServiceNow All Rights Reserved Today’s Averages (A Quick Reminder) Source: Ponemon Institute 2017 190.7 days 4,577 to Identify a Breach HOURS to Contain a Breach HOURS 66.2 days 1,589
  12. 12. 12 © 2017 ServiceNow All Rights Reserved Results ServiceNow Customers Have Realized to Identify a Breach HOURS to Contain a Breach HOURS
  13. 13. 13 © 2017 ServiceNow All Rights Reserved 160x to Identify a Breach Improvement to Contain a Breach 50x Improvement Results ServiceNow Customers Have Realized
  14. 14. 14 © 2017 ServiceNow All Rights Reserved 14© 2017 ServiceNow All Rights Reserved Confidential Visit ServiceNow for More Information or www.servicenow.com/sec-ops
  15. 15. 15 © 2017 ServiceNow All Rights Reserved 15© 2017 ServiceNow All Rights Reserved Confidential Questions?
  16. 16. 16 © 2017 ServiceNow All Rights Reserved 16© 2017 ServiceNow All Rights Reserved Confidential Rich Reybok Senior Director, Engineering Security Business Unit ServiceNow Thank You

×