2017 Security
Conference
Cerdant Business
Overview
• Celebrated our 15th year in business in January 2017
• In the past 3 years, we doubled our revenues and
employees
• We moved into new facilities in 2016
• In 2012, we had approximately 200 customers. Today
we have 700.
System Enhancements
• Completion of billing system
• High Availability Device Monitoring
• Subscription Licensing Audits
Cerdant IDS Capabilities
• There are 4 key metrics of a security incident:
Compromise, exfiltration, discovery, containment High
Availability Device Monitoring
• We can’t stop item 1 (Compromise) Our goal is to
shorten the time interval on “discovery and
containment” to reduce or eliminate “exfiltration”.
Recent Enhancements
to IDS
• Detection of remote access activity (RDP/VNC)
• Reputation based detection
• Botnet analysis from SonicWALL events
• Analysis from matches to reputation database
Security-
Top Stories of 2016
• Yahoo breach
• Release of DNC (Podesta emails) by WikiLeaks
• DDoS attack of Dyn by Mirai Botnet
• The rise of ransomware
• WikiLeaks release of NSA toolkit
Top Tools for Combatting
Security Threats:
• Firewall
• Anti-virus
• Email Security
• Backup
The #1 Threat to your Network
Security?
• Newton’s first law of motion
• INERTIA!
• Why is change difficult?
• There are more light switches
“I’ve been using (Sophos, McAfee,
Symantec, etc.) for years and nothing
bad has happened.”
• The number of ransomware attacks will surpass botnet
infections in 2017
• Ransomware revenues will exceed $1 billion
• 20 customers (that we know of) were hit by ransomware in
the past year
Antivirus is Dead!
• Brian Dye- Symantec senior vice president for information
security
• May 2014
Why is Antivirus Dead?
• Easily downloadable ransomware
• Easy to use packers
• A site to test your work is against all the popular AV solutions
• Every threat is zero-day
Why won’t my Firewall Stop
Malware?
• 60% of Web traffic is now encrypted
• Advertising at reputable sites contains malware or redirects
to malware
“Over the next year we’ll evolve from using HTTP to using
Secure HTTP (HTTPS) while browsing and viewing content on our
service. This helps protect member privacy, particularly when
the network is insecure, such as public Wi-Fi, and it helps
protect members from eavesdropping by their ISP or employer,
who may want to record our members’ viewing for other
reasons.”
-letter to Netflix shareholders, April 15th, 2015
The Road Ahead-
More of the Same

Cerdant Security State of the Union

  • 1.
  • 2.
    Cerdant Business Overview • Celebratedour 15th year in business in January 2017 • In the past 3 years, we doubled our revenues and employees • We moved into new facilities in 2016 • In 2012, we had approximately 200 customers. Today we have 700.
  • 3.
    System Enhancements • Completionof billing system • High Availability Device Monitoring • Subscription Licensing Audits
  • 4.
    Cerdant IDS Capabilities •There are 4 key metrics of a security incident: Compromise, exfiltration, discovery, containment High Availability Device Monitoring • We can’t stop item 1 (Compromise) Our goal is to shorten the time interval on “discovery and containment” to reduce or eliminate “exfiltration”.
  • 5.
    Recent Enhancements to IDS •Detection of remote access activity (RDP/VNC) • Reputation based detection • Botnet analysis from SonicWALL events • Analysis from matches to reputation database
  • 6.
    Security- Top Stories of2016 • Yahoo breach • Release of DNC (Podesta emails) by WikiLeaks • DDoS attack of Dyn by Mirai Botnet • The rise of ransomware • WikiLeaks release of NSA toolkit
  • 7.
    Top Tools forCombatting Security Threats: • Firewall • Anti-virus • Email Security • Backup
  • 8.
    The #1 Threatto your Network Security? • Newton’s first law of motion • INERTIA! • Why is change difficult? • There are more light switches
  • 9.
    “I’ve been using(Sophos, McAfee, Symantec, etc.) for years and nothing bad has happened.” • The number of ransomware attacks will surpass botnet infections in 2017 • Ransomware revenues will exceed $1 billion • 20 customers (that we know of) were hit by ransomware in the past year
  • 10.
    Antivirus is Dead! •Brian Dye- Symantec senior vice president for information security • May 2014
  • 11.
    Why is AntivirusDead? • Easily downloadable ransomware • Easy to use packers • A site to test your work is against all the popular AV solutions • Every threat is zero-day
  • 12.
    Why won’t myFirewall Stop Malware? • 60% of Web traffic is now encrypted • Advertising at reputable sites contains malware or redirects to malware
  • 14.
    “Over the nextyear we’ll evolve from using HTTP to using Secure HTTP (HTTPS) while browsing and viewing content on our service. This helps protect member privacy, particularly when the network is insecure, such as public Wi-Fi, and it helps protect members from eavesdropping by their ISP or employer, who may want to record our members’ viewing for other reasons.” -letter to Netflix shareholders, April 15th, 2015
  • 15.