Artificial Intelligence.
Real Threat Prevention.
Art Hathaway
Regional Sales Director, Ohio Valley
Steve Richards
Sales Engineer, Ohio Valley
3 | © 2015 Cylance, Inc.
The Future of Security
Past
Pre-Execution
Humans Needed
Present Future
AV SANDBOXING ISOLATION EDR
Post-Execution
z
Pre-Execution
No Humans
AI
HIPS / ANTI-EXPLOITATION
4 | © 2015 Cylance, Inc.
Required Solution
Reduce risk by preventing
malware before it executes.
Cylance prevents malware by
using Artificial Intelligence to
unlock the DNA of advanced
threats.
5 | © 2015 Cylance, Inc.
Algorithmic Science
• Machine Learning
• Cluster & Classify
• Pandora ML
Confidence Scoring
Threat Indicators
• Anomalies
• Collection
• Data Loss
• Deception
• Destruction
Collect / Classify / Context
6 | © 2015 Cylance, Inc.
How It Works
EXTRACT
COLLECT
CLASSIFY
& CLUSTER
TRANSFORM,
VECTORIZE
& TRAIN
BAD
GOOD
7 | © 2015 Cylance, Inc.
What is a Feature / Attribute
8 | © 2015 Cylance, Inc.
Extract ~15,000,000 features
RosAsm Base3.exe PE File Structure
DosMZ Header
DOS Stub
PE File Header
PE Signature
Image_Optional_Header
Section Table
Array of Image_Section Headers
Sections
.idata
.rsrc
.data
.text
.src
Directories
lea rcx,[rdi+20h]
mov qword ptr [rdi+8],r13
mov qword ptr [rdi+10h],r13
mov qword ptr [rdi+18h],r13
mov qword ptr [rcx+20h],r12
mov qword ptr [rcx+18h],r13
lea rdx,[rsp+258h]
or r9,0FFFFFFFFFFFFFFFFh
xor r8d,r8d
mov word ptr [rcx+8],r13w
mov ebx,r14d
DOS Header
NT Header
File Header
Section Headers
Export Directory
Import Directory
Resource Directory
Relocation Directory
Debug Directory
Packer Used
Compiler Type
Compiler Language
File size
PE size
Image section headers
Image imports
Functions called
Kernel hooks
Image Paths
Image Resource Directory
Bitmaps
Icons
Strings
RCData
Icon Groups
Version Info
9 | © 2015 Cylance, Inc.
x=[1007013456]
Transformation
Normalization and Vectorization
Meta-data that creates new features
x=[1602111430]
x=[2819209111]
x=[3220101036]
x=[9910192839]
x=[2201920391]
x=[8819102999]
x=[5778492200]
x=[0001928311]
x=[7564778203]
x=[9928183918]
x=[9929192839]
X
Matrix
x=[0019376471]
x=[0093810292]
x=[0019102922]
x=[6657749100]
Unsafe
Safe
10 | © 2015 Cylance, Inc.
Deep Discussion
• First Order Feature – information you can extract directly from
the binary or it’s structure
• Second Order Feature – Ex. Entropy Value of a binary or
section of binary.
• Third Order Feature
11 | © 2015 Cylance, Inc.
The world is growing more
VOLATILE AMBIGUOUS COMPLEX
And it is all speeding up …
© 2015 Cylance, Inc. 14
The Escalating Battle for Control in Cyberspace
Increase in sophistication and number of cyber attacks
Government concerns are driving new regulation
Increasing tensions between privacy and security
Growing debate about the Roles of Government and Industry in Privacy and Security
Threats & Impacts – A Simple Summary
IP Loss
(technology
leadership)
Shut Down Your Business
(materiality impact)
Compromise you to
Compromise others
(trust, brand, reputation)
Product Vulnerability
(trust, brand and
reputation)
An Adversary
The idea is to assess soil and landscape types, weather and pest
issues to boost crop yields and profits.
All the farmer needs is a smartphone, a GPS enabled
tractor connected to cloud, with the data & analytics
All a government needs is access to the data
The idea is to facilitate a precision bombing.
The idea is to cure blindness.
Doctors on June 19th 2015 insert a retinal implant into a
patients eye that is connected to high tech glasses with a
camera and a video processing unit
The idea is to extort money.
All a bad person needs is poorly developed or managed
technology and the ability to execute malicious code
The idea is to improve road maintenance and safety
All a municipality needs is sensors in the cement,
sensors in cars, sensors with people, connected to the
cloud, with data and analytics
The idea is to profit from or to harm others
All a bad person needs is poorly developed or managed
technology and the ability to execute malicious code
The idea is to improve food safety and reduce cost
All a food and beverage organization needs is real time
information flow from the slaughter house to the point of sale
The idea is to save cows
All a bad person needs is poorly developed or managed
technology and the ability to execute malicious code
Adoption of
smart grid
devices
water/power
Tech inside
more than
phones, tablets,
laptops
IP enabled
home
appliances
Centralized
home
information
flow (bundled
services via
internet)
Proliferation of
devices & app
markets
“Virtual assets”
- content with
emotional
attachment in
digital world
Pervasive
wearables
updating social
computing
Open source
Intelligence
refining targets
Expanding attack surface - greater technology integration with society well being
Cyber has been IS characterized as the 5th domain of warfare
Digital Evolution
In the next few years the attack landscape will dramatically change:
$2M in funding for the attack came from cyber crime
In November 2008,10 Pakistani members of an Islamic militant organization, carried out a series of 12 coordinated shooting and
bombing attacks lasting four days across Mumbia. The attacks, began on Wednesday, 26 November and lasted until Saturday, 29
November 2008, killing 164 people and wounding at least 308.
The idea is to terrorize
All a bad person needs is poorly developed or managed
technology and the ability to execute malicious code
A growing digital economy relies on Trust
“We saw air let out of the balloon, an
evaporation of trust”
“the reputation of the Tech industry went
backwards”
“By a margin of 2 to 1 people don’t believe
that governments or businesses are
thinking enough about the broad negative
societal impacts that technology can have”
Richard Edleman – Feb 2015
Breaking someone’s trust is like crumpling up a perfect
piece of paper
Breaking someone’s trust is like crumpling up a perfect
piece of paper
You can work to smooth it over, but
it’s never going to be the same again
RESPOND
DETECT
PREVENT
Automated Manual
Control Approaches
ControlTypes
Semi-Automated
9 – Box of Controls
Risk
Cost
RESPOND
DETECT
PREVENT
Automated Manual
Control Approaches
ControlTypes
Focus is on
Minimizing
damage – only
variables are time
to detect and time
to contain
Focus is on
Minimizing
vulnerability and
potential for
harm
Semi-Automated
Risk
Cost
RESPOND
DETECT
PREVENT
Automated Manual
Control Approaches
ControlTypes
Semi-Automated
Where most of the industry is focused
Risk
Cost
RESPOND
DETECT
PREVENT
Automated Manual
Highest Risk
Highest Cost
Most Liability
Lowest Risk
Lowest Cost
Limited Liability
Control Approaches
ControlTypes
Semi-Automated
Where most of the industry is focused
Risk
Cost
RESPOND
DETECT
PREVENT
Automated Manual
Control Approaches
ControlTypes
Semi-Automated
MOTION
Risk
Cost
RESPOND
DETECT
PREVENT
Automated Manual
Control Approaches
ControlTypes
Semi-Automated
MOTION
Risk
Cost
RESPOND
DETECT
PREVENT
Automated Manual
Control Approaches
ControlTypes
Semi-Automated
MOTION
HIGH CONTROL
FRICTION
Risk
Cost
RESPOND
DETECT
PREVENT
Automated Manual
Control Approaches
ControlTypes
Semi-Automated
LOW CONTROL
FRICTION
WE NEED SOLUTIONS THAT …
To Enhance Trust in Technology
LOWER RISK LOWER COST LOWER FRICTION
so we can make sure
tomorrow is better than
today
Total Cost of Controls
Obvious Direct Cash Buckets
• AV replacement
• Security Operations
• Hunting team
• Investigations
• Legal
• Help Desk Calls
• Performance complaints
• Infection related issues
• IT operations costs
• IT emergency response
• Infrastructure costs
• Rebuild/re-image costs
Less Obvious Direct Cash Buckets
• De-cluter other controls
• Other end point products (cyberark, client proxy,
DLP, ect)
• Other control products
• Extending PC lifecycle
• Headroom back due to performance
• Other IT operations costs
• EOL’d systems – delayed upgrades
• Change patching windows
• Servers can be protected – normally cannot
complete disk scan with AV
• Reduce infrastructure costs due to less
“chattiness” with cloud
Total Cost of Controls
Hero
• Value of IP
• Maintain market leadership
• Cost of a privacy breach
• Litigation
• FTC, class actions, ect
• ediscovery
• PR & Comms
• Credit monitoring
• Mgmt Distraction
Zero
• Spent on the “insurance” and no proof
that you “saved the world”
All about probability of bad things occurring and a wide range of outcomes/impacts financially
Control Friction
• Controls are a “drag coefficient” on business velocity
• Slow the user
• Slow a business process
• Too Much control Friction
• Business and users go around security and IT
• Add’s cost – IT isn’t managing IT anymore
• Data and business silo’s are created
• Loss of purchasing power
• Add’s risk
• Risk and Security team becomes blind – cant prevent, hard to detect, and everything ends up
being an after the fact response
• Business adheres to the controls – generates systemic Business Risk
• Loose time to market
• Loose ability to innovate
• Loose long term market leadership

Art Hathaway - Artificial Intelligence - Real Threat Prevention

  • 1.
    Artificial Intelligence. Real ThreatPrevention. Art Hathaway Regional Sales Director, Ohio Valley Steve Richards Sales Engineer, Ohio Valley
  • 3.
    3 | ©2015 Cylance, Inc. The Future of Security Past Pre-Execution Humans Needed Present Future AV SANDBOXING ISOLATION EDR Post-Execution z Pre-Execution No Humans AI HIPS / ANTI-EXPLOITATION
  • 4.
    4 | ©2015 Cylance, Inc. Required Solution Reduce risk by preventing malware before it executes. Cylance prevents malware by using Artificial Intelligence to unlock the DNA of advanced threats.
  • 5.
    5 | ©2015 Cylance, Inc. Algorithmic Science • Machine Learning • Cluster & Classify • Pandora ML Confidence Scoring Threat Indicators • Anomalies • Collection • Data Loss • Deception • Destruction Collect / Classify / Context
  • 6.
    6 | ©2015 Cylance, Inc. How It Works EXTRACT COLLECT CLASSIFY & CLUSTER TRANSFORM, VECTORIZE & TRAIN BAD GOOD
  • 7.
    7 | ©2015 Cylance, Inc. What is a Feature / Attribute
  • 8.
    8 | ©2015 Cylance, Inc. Extract ~15,000,000 features RosAsm Base3.exe PE File Structure DosMZ Header DOS Stub PE File Header PE Signature Image_Optional_Header Section Table Array of Image_Section Headers Sections .idata .rsrc .data .text .src Directories lea rcx,[rdi+20h] mov qword ptr [rdi+8],r13 mov qword ptr [rdi+10h],r13 mov qword ptr [rdi+18h],r13 mov qword ptr [rcx+20h],r12 mov qword ptr [rcx+18h],r13 lea rdx,[rsp+258h] or r9,0FFFFFFFFFFFFFFFFh xor r8d,r8d mov word ptr [rcx+8],r13w mov ebx,r14d DOS Header NT Header File Header Section Headers Export Directory Import Directory Resource Directory Relocation Directory Debug Directory Packer Used Compiler Type Compiler Language File size PE size Image section headers Image imports Functions called Kernel hooks Image Paths Image Resource Directory Bitmaps Icons Strings RCData Icon Groups Version Info
  • 9.
    9 | ©2015 Cylance, Inc. x=[1007013456] Transformation Normalization and Vectorization Meta-data that creates new features x=[1602111430] x=[2819209111] x=[3220101036] x=[9910192839] x=[2201920391] x=[8819102999] x=[5778492200] x=[0001928311] x=[7564778203] x=[9928183918] x=[9929192839] X Matrix x=[0019376471] x=[0093810292] x=[0019102922] x=[6657749100] Unsafe Safe
  • 10.
    10 | ©2015 Cylance, Inc. Deep Discussion • First Order Feature – information you can extract directly from the binary or it’s structure • Second Order Feature – Ex. Entropy Value of a binary or section of binary. • Third Order Feature
  • 11.
    11 | ©2015 Cylance, Inc.
  • 13.
    The world isgrowing more VOLATILE AMBIGUOUS COMPLEX And it is all speeding up …
  • 14.
    © 2015 Cylance,Inc. 14 The Escalating Battle for Control in Cyberspace Increase in sophistication and number of cyber attacks Government concerns are driving new regulation Increasing tensions between privacy and security Growing debate about the Roles of Government and Industry in Privacy and Security
  • 15.
    Threats & Impacts– A Simple Summary IP Loss (technology leadership) Shut Down Your Business (materiality impact) Compromise you to Compromise others (trust, brand, reputation) Product Vulnerability (trust, brand and reputation) An Adversary
  • 16.
    The idea isto assess soil and landscape types, weather and pest issues to boost crop yields and profits. All the farmer needs is a smartphone, a GPS enabled tractor connected to cloud, with the data & analytics
  • 17.
    All a governmentneeds is access to the data The idea is to facilitate a precision bombing.
  • 18.
    The idea isto cure blindness. Doctors on June 19th 2015 insert a retinal implant into a patients eye that is connected to high tech glasses with a camera and a video processing unit
  • 19.
    The idea isto extort money. All a bad person needs is poorly developed or managed technology and the ability to execute malicious code
  • 20.
    The idea isto improve road maintenance and safety All a municipality needs is sensors in the cement, sensors in cars, sensors with people, connected to the cloud, with data and analytics
  • 21.
    The idea isto profit from or to harm others All a bad person needs is poorly developed or managed technology and the ability to execute malicious code
  • 22.
    The idea isto improve food safety and reduce cost All a food and beverage organization needs is real time information flow from the slaughter house to the point of sale
  • 23.
    The idea isto save cows All a bad person needs is poorly developed or managed technology and the ability to execute malicious code
  • 24.
    Adoption of smart grid devices water/power Techinside more than phones, tablets, laptops IP enabled home appliances Centralized home information flow (bundled services via internet) Proliferation of devices & app markets “Virtual assets” - content with emotional attachment in digital world Pervasive wearables updating social computing Open source Intelligence refining targets Expanding attack surface - greater technology integration with society well being Cyber has been IS characterized as the 5th domain of warfare Digital Evolution In the next few years the attack landscape will dramatically change:
  • 25.
    $2M in fundingfor the attack came from cyber crime In November 2008,10 Pakistani members of an Islamic militant organization, carried out a series of 12 coordinated shooting and bombing attacks lasting four days across Mumbia. The attacks, began on Wednesday, 26 November and lasted until Saturday, 29 November 2008, killing 164 people and wounding at least 308.
  • 26.
    The idea isto terrorize All a bad person needs is poorly developed or managed technology and the ability to execute malicious code
  • 27.
    A growing digitaleconomy relies on Trust “We saw air let out of the balloon, an evaporation of trust” “the reputation of the Tech industry went backwards” “By a margin of 2 to 1 people don’t believe that governments or businesses are thinking enough about the broad negative societal impacts that technology can have” Richard Edleman – Feb 2015
  • 28.
    Breaking someone’s trustis like crumpling up a perfect piece of paper
  • 29.
    Breaking someone’s trustis like crumpling up a perfect piece of paper You can work to smooth it over, but it’s never going to be the same again
  • 30.
  • 31.
    Risk Cost RESPOND DETECT PREVENT Automated Manual Control Approaches ControlTypes Focusis on Minimizing damage – only variables are time to detect and time to contain Focus is on Minimizing vulnerability and potential for harm Semi-Automated
  • 32.
  • 33.
    Risk Cost RESPOND DETECT PREVENT Automated Manual Highest Risk HighestCost Most Liability Lowest Risk Lowest Cost Limited Liability Control Approaches ControlTypes Semi-Automated Where most of the industry is focused
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
    WE NEED SOLUTIONSTHAT … To Enhance Trust in Technology LOWER RISK LOWER COST LOWER FRICTION
  • 39.
    so we canmake sure tomorrow is better than today
  • 40.
    Total Cost ofControls Obvious Direct Cash Buckets • AV replacement • Security Operations • Hunting team • Investigations • Legal • Help Desk Calls • Performance complaints • Infection related issues • IT operations costs • IT emergency response • Infrastructure costs • Rebuild/re-image costs Less Obvious Direct Cash Buckets • De-cluter other controls • Other end point products (cyberark, client proxy, DLP, ect) • Other control products • Extending PC lifecycle • Headroom back due to performance • Other IT operations costs • EOL’d systems – delayed upgrades • Change patching windows • Servers can be protected – normally cannot complete disk scan with AV • Reduce infrastructure costs due to less “chattiness” with cloud
  • 41.
    Total Cost ofControls Hero • Value of IP • Maintain market leadership • Cost of a privacy breach • Litigation • FTC, class actions, ect • ediscovery • PR & Comms • Credit monitoring • Mgmt Distraction Zero • Spent on the “insurance” and no proof that you “saved the world” All about probability of bad things occurring and a wide range of outcomes/impacts financially
  • 42.
    Control Friction • Controlsare a “drag coefficient” on business velocity • Slow the user • Slow a business process • Too Much control Friction • Business and users go around security and IT • Add’s cost – IT isn’t managing IT anymore • Data and business silo’s are created • Loss of purchasing power • Add’s risk • Risk and Security team becomes blind – cant prevent, hard to detect, and everything ends up being an after the fact response • Business adheres to the controls – generates systemic Business Risk • Loose time to market • Loose ability to innovate • Loose long term market leadership

Editor's Notes

  • #13 Key Points: Perfect Storm - Complexity of the system prevents a simple solution Consider threats beyond viruses Legal and regulatory risks must be mitigated Everyone has data worth stealing We’ll begin by taking a walk thru a risk management cycle. (numbers indicate clicks for transition of the slide animation, suggested dialogue accompanies the clicks) “What are Threats?” We start with looking at the threats in our environment. Threats originate with people. They can be internal or external, and they can be intentional or unintentional. 2. “Threats exploit our vulnerabilities.” These vulnerabilities are increasing every day and add to our business risk. The only way to eliminate vulnerabilities is to take the tools away. Both threats and vulnerabilities are increasing. 3. “Threats and vulnerabilities increase our Business Risk.” 4. “Vulnerabilities expose our assets to business risk. What are some assets that we don’t want exposed?” 5. “Exposure of our assets leads to loss of Confidentiality, Integrity, Availability of our data.” Confidentiality – Intellectual Property (IP) , trade secrets, data and information Integrity – data, financial reports, reputation, image Availability – Denial of service may cause our assets to be unavailable The asset base is also changing… changing with form factors, connectivity, integration. Today these assets are PCs and servers, tomorrow they are PDA, phones, tablets. 6. “Loss of CIA causes business impact.” 7. “We manage and mitigate business impacts with well placed controls.” such as Antivirus programs Intrusion detection Policies and awareness Disaster Recovery Encryption 8. “Control reduce or mitigate Business Risks…” 9. “and protect us against threats.” We have a well-defined risk management cycle here but wait there’s more… 10. “Meanwhile additional legislation is passed,” 11. “which increases our business risk” 12. “and forces us to look at the business impacts as well as reassess our controls.” Legislation such as Sarbanes Oxley, European Privacy Controls, California Privacy Control (Database-breach disclosure law…know as SB 1386). All which increases our liability Sarbanes Oxley doesn’t care about confidentiality, is only concerned with integrity and availability of financial data. All of this, forces our limited budget away from areas that we want to protect, but may not feel legally compelled to protect. We are now (Sarbanes Oxley) compelled to share any material weaknesses with shareholders. In spite of the fact that we know others with malicious intent will also be listening. California database breach disclosure – SB 1386, forces an organization of any database breach. You now must release who’s privacy information has been damaged, when this happened, how they we damaged and how it happened. This is a field day for class-action lawyers. We now must now directly provide them all the information necessary to bring and win a class-action lawsuit. This is like fishing in the hatchery. 13. “All of this results in needing additional assurances that you are who you say you are” 14. “which results in additional need for identity management, which results in companies needing to keep additional personal information,” 15. “which results in more legislation and additional business risk.” 16. “Each of the items are independent, yet interdependent…and all operating in confluence with each other….all creating the PERFECT STORM!” Use this slide when your management wants to know why you need additional funding and resources to increase security and risk compliance. BTW, pressure to encrypt your data will be one of the biggest security challenges over the next three years….you will need the horsepower to process. Key Points: Perfect Storm - Complexity of the system prevents a simple solution Consider threats beyond viruses Legal and regulatory risks must be mitigated Everyone has data worth stealing Two key places for audience participation: first box, ‘Threats’; third box, ‘Assets’ sixth box, ‘Controls’ (if they are really biting today)
  • #17 You plant tomatoes on day X and irrigate them on day Y and apply fertilizers on day Z. Much of this information isn’t really suitable because in real life things are a lot more dynamic than that,” Khalil says. “You cannot model a crop on a static calendar efficiently. Variables in the soil and its ability to hold moisture is another variable, as is temperature, humidity and trans-evaporation.” Even irrigation differs based on the variety, he adds. The service relies on precision agriculture, an idea that uses information technology to help improve the quality of crops, while reducing the environmental impact. Precision farming relies on soil sampling, technologies like GPS, and other information management tools to improve agriculture production.