SlideShare a Scribd company logo
1 of 46
Cyber Security
A Common Problem
Intercity Technology & Check Point Software Technologies
Cyber Security:
A Common Problem
Can you afford to be scared to do something
when it comes to cybersecurity?
In a world where our personal data is a currency of trust, the risk of not putting your investment in your
customers’ private information can cost you your hard-earned reputation. New technologies present great
opportunities for businesses to evolve. Opportunists with an appetite for cyber chaos are primed to take
advantage of the weaknesses in your cybersecurity strategy.
Agenda
− 13:20 Welcome & Introduction
− 13:30 Che Smith
− 14:15 Refreshment Break
− 14:30 Tom Kendrick
− 15:15 Q&A
− 15:30 Networking Drinks
Che Smith
Technology Associate, Intercity Technology
“The Road to Security Hell”
intercity.technology
An Epic Fail Story
The ironic adventure
of the veiled
lodger
Final
Reflections
Checkpoint
the role of AI
in Cyber
Security
What would
Trump do?
Introducing
Intercity
The Nine
Circles of
Security Hell
Today’s Agenda
A Cyber Security Epic Fail
The ironic adventure of the veiled lodger
Employs
1.9 million
Employs
1.7 million
2015 figures
“Ransomware is
unique among
cybercrime because in
order for the attack to
be successful, it
requires the victim to
become a willing
accomplice after the
fact”
James Scott, Sr. Fellow, Institute for
Critical Infrastructure Technology
Wide Area
Networking and
foundation voice
environments
IaaS Hosting and Data Centre services that
includes Storage, Hybrid Cloud and
Dedicated Bare Metal services,
All services come
with the M4
Service wrap;
• Maintained
• Monitored
• Management
• Managed
Service Desk
Local Area Networking -
Designing, Installing, Testing and
Refreshing.
A managed, cloud-based, next-generation
firewall service. Dedicated instances and
shared environments available.
Technology reviews, strategic support,
network audits, network readiness
assessments, vulnerability scanning,
Penetration testing & Managed Service Desks
The Intercity Story
Exploit and Explore
A Managed service
provider putting
people first
intercity.technology
If Trump was running
your security he would
do it “bigly”
Bigly Covfefe
Bad
Hombre
Extreme
Vetting
Taking the
shackles
off
I’m gonna’
build a wall
Fake News
Don’t be a
snowflake
Alternative
Facts
Small
Hands
What would Trump say?
Cybersecurity Ventures predicts that a
business will fall victim to a ransomware
attack every 14 seconds by 2019
The average amount demanded after a
ransomware attack is $1,077
Cyber Security: A
common problem
I’m gonna’
build a wall
intercity.technology
Fake News
One of the main cyber-risks is
to think they don’t exist.
intercity.technology
Only 38 percent of global organizations
claim they are prepared to handle a
sophisticated cyber attack.
Don’t be a
snowflake
Global Cybersecurity Status Report” | ISACA International
Cyber Security: A
common problem
intercity.technology
80% of senior decision makers
say security is hindering innovation
Alternative facts
Security VS Innovation – DisruptionHub 2018
Cyber Security: A
common problem
intercity.technology
The percentage of Security people
in comparison to IT people is not
growing as fast as it should be.
Small hands
Forbes
Cyber Security: A
common problem
intercity.technology
“Cyber crime is the greatest threat to
every company in the world.”
Ginni Rometty
Bigly
IBM
Cyber Security: A
common problem
intercity.technology
$75.2 billion: Amount that
organizations worldwide will spend
on infrastructure protection and
security services in 2018
Covfefe
Gartner December 7, 2017
Cyber Security: A
common problem
intercity.technology
There are about 20 Billion Threat
Blocks a day
Bad Hombre
IBM
Cyber Security: A
common problem
intercity.technology
71% of staff are using apps not
approved by IT.
Extreme vetting
Forbes
Cyber Security: A
common problem
intercity.technology
Employee training may prove to
be the best ROI on cybersecurity
investments for organizations
globally over the next 5 years
Taking the
shackles off
CCS Insight
Cyber Security: A
common problem
The journey to “security hell”
is paved with good intentions
1. Limbo
Do nothing except bury your head in the sand
and I am sure everything will be OK.
2. Lust
Continually lusting after other organisations’
security solutions.
3. Gluttony
Gorging on freebie security solutions
whilst disregarding real protection.
4. Greed
Taking in as many solutions as you possibly can
and creating management chaos.
5. Anger
Getting angry with the perpetrators and taking
your eye off the prize.
6. Heresy
Not believing the advice from
the experts.
7. Violence
Continuously breaking up what you
have built and starting again.
8. Fraud
Pretending you know what you
are doing.
9. Treachery
Sometimes the greatest threat
comes from within.
2) Surround yourself with experts that can create layers of next
generation defenses around your critical infrastructure.
1) Is it time to move your Security to the Cloud?
5) Come and talk to Intercity Technology
3) Don’t Stand Still
4) Don’t Forget the Basics
Final Reflections
©2018 Check Point Software Technologies Ltd.
Tom Kendrick | European Customer Success Manager
tkendrick@checkpoint.com
A View into AI in Cyber Security
Intercity Event - 2018
AI, INTELLIGENTLY
“The development of
full
artificial intelligence
could spell the end
of the human race.”Stephen
Hawking
“Computers are
going to take over
from humans, no
question.”
Steve
Wozniak
“AI will be the
most likely cause
of WW3”Elon
Musk
“Country that leads in
AI development will be
the ruler of the world”
Vladimir
Putin
EVERYBODY
IS TALKING
ABOUT AI
BILLIONS
OF $$
INVESTED
IN AI TECH
AI: THE NEXT
INDUSTRIAL
REVOLUTION
The AI Revolution:
BRAINS  MACHINES
The Industrial Revolution:
MUSCLES 
MACHINES
SHOPPING
PREDICTIONS
IMAGE
SEARCH
Speech
Recognition
WHY NOW?
Storage Compute Mathematics
People & Skills
IS AI
MAGIC?
WHO’S
YOUR
TEACHER? Tay Bot
LOST IN
TRANSLATIO
N
BUT IT IS
USEFUL!
NO,
AI IS
NOT
MAGI
C
EXPERTISEDATA
Lots of Data
Rich Data
AI Expertise
Domain Expertise
A GOOD AI SOLUTION REQUIRES:
AI IN
CYBER
SECURITY
IS AI
CYBER
SECURITY
MAGIC?
KEY PROBLEMS WITH CYBER SECURITY AI
Not Enough Not EnoughDATA EXPERTISE
Access to cyber security training data is
limited
Verdict logic is obscure
High false detection rate
BUT IT IS
USEFUL!
NO, AI
IS NOT
CYBER
SECURITY
MAGIC
AI IS
REVOLUTIONIZING
CYBER SECURITY
AI
TECHNOLOGIES
@ CHECK POINT
PREDICTIVE
THREAT
INTELLIGENCE
Expose unknown CnC and
malicious domains
Attribute attacks to campaigns
Enrich threat intelligence for
predictive campaign prevention
Campaign
Hunting
Introduce
d
+10
%
CAMPAIGN
HUNTING
UNCOVER
MALICIOUS
EXECUTABLES
Dynamically analyze executables is
a Sandbox to collect system APIs
Apply Machine Learning to reach
malicious verdict
Feedback loop for continued
learning
“BUFFY”/”HUNTRESS
”
Huntress
Unique
Detections
+13
%
CONTEXT
AWARE
DETECTION
“CADET”
Look at the full context of the
inspected element
Extract parameters from the
environment
THOUSAND
S
of discrete
Indicators
 ONE
Accurate
Verdict
Missed Detection False Positive
Old CADET
2-fold
10-fold
So what have we learned?
• There are new techniques and attacks developing
• Basic protections cover the simple attacks very well!
• Most IT Professionals are not skilled enough in advanced
analysis
• Security solutions, assisted by Automation and AI let us
have that expert analyst anywhere our data may be
• AI is not perfect, but it helps!
SUMMARY
©2018 Check Point Software Technologies Ltd.
THANK YOU
Q&A Time
Che Smith & Tom Kendrick
Any Questions?

More Related Content

What's hot

Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecuritysommerville-videos
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04Kyle Lai
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityAvantika University
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security AwarenessRamiro Cid
 
Cybersecurity technology adoption survey
Cybersecurity technology adoption surveyCybersecurity technology adoption survey
Cybersecurity technology adoption surveyPaperjam_redaction
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Kinetic Potential
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security9784
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesWAJAHAT IQBAL
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber securitySAHANAHK
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityPriyanshu Ratnakar
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security toolsVicky Fernandes
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017R-Style Lab
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber securitymahendra_chauhan
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Cyber Security Infotech
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityRamiro Cid
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber securityyatendrakumar47
 

What's hot (20)

Cybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurityCybersecurity 1. intro to cybersecurity
Cybersecurity 1. intro to cybersecurity
 
CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04CyberSecurity - UH IEEE Presentation 2015-04
CyberSecurity - UH IEEE Presentation 2015-04
 
What is Cyber Security - Avantika University
What is Cyber Security - Avantika UniversityWhat is Cyber Security - Avantika University
What is Cyber Security - Avantika University
 
Cyber Security Awareness
Cyber Security AwarenessCyber Security Awareness
Cyber Security Awareness
 
Cybersecurity technology adoption survey
Cybersecurity technology adoption surveyCybersecurity technology adoption survey
Cybersecurity technology adoption survey
 
Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813Intro to cybersecurity concepts 20210813
Intro to cybersecurity concepts 20210813
 
Presentation on cyber security
Presentation on cyber securityPresentation on cyber security
Presentation on cyber security
 
Cybersecurity - Overview
Cybersecurity  - OverviewCybersecurity  - Overview
Cybersecurity - Overview
 
Cybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practisesCybersecurity concepts & Defense best practises
Cybersecurity concepts & Defense best practises
 
What is cyber security
What is cyber securityWhat is cyber security
What is cyber security
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber security and demonstration of security tools
Cyber security and demonstration of security toolsCyber security and demonstration of security tools
Cyber security and demonstration of security tools
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017The Importance of Cybersecurity in 2017
The Importance of Cybersecurity in 2017
 
Basic knowledge of cyber security
Basic knowledge of cyber securityBasic knowledge of cyber security
Basic knowledge of cyber security
 
Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)Introduction to cyber security by cyber security infotech (csi)
Introduction to cyber security by cyber security infotech (csi)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Ppt growing need of cyber security
Ppt  growing need of cyber securityPpt  growing need of cyber security
Ppt growing need of cyber security
 

Similar to Cyber Security: A Common Problem 2018

CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziNCCOMMS
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2Adela Cocic
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about securityAlison Gianotto
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdfRakeshPatel583282
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictionscentralohioissa
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourselfjkl0202
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfpreetichaubey4
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SMCarlos Valderrama
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationPECB
 
Machine learning and artificial intelligence as powerful cybersecurity tools
Machine learning and artificial intelligence as powerful cybersecurity toolsMachine learning and artificial intelligence as powerful cybersecurity tools
Machine learning and artificial intelligence as powerful cybersecurity toolsTech Mobius
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfInfosec Train
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC PerspectivePositive Hack Days
 

Similar to Cyber Security: A Common Problem 2018 (20)

CSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael NarezziCSF18 - Guarding Against the Unknown - Rafael Narezzi
CSF18 - Guarding Against the Unknown - Rafael Narezzi
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party  Cyb...
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
 
AI in Hacking
AI in HackingAI in Hacking
AI in Hacking
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
1. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol21. security 20 20 - ebook-vol2
1. security 20 20 - ebook-vol2
 
Getting users to care about security
Getting users to care about securityGetting users to care about security
Getting users to care about security
 
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
02_Security_Audit_-_Common_Cyber_Attacks_9.pdf
 
Jason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 PredictionsJason Samide - State of Security & 2016 Predictions
Jason Samide - State of Security & 2016 Predictions
 
Digital Age-Preparing Yourself
Digital Age-Preparing YourselfDigital Age-Preparing Yourself
Digital Age-Preparing Yourself
 
Volume2 chapter1 security
Volume2 chapter1 securityVolume2 chapter1 security
Volume2 chapter1 security
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
Magazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdfMagazine Febuary-2023-Preview.pdf
Magazine Febuary-2023-Preview.pdf
 
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
Machine learning and artificial intelligence as powerful cybersecurity tools
Machine learning and artificial intelligence as powerful cybersecurity toolsMachine learning and artificial intelligence as powerful cybersecurity tools
Machine learning and artificial intelligence as powerful cybersecurity tools
 
Cybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdfCybersecurity Interview Questions Part -2.pdf
Cybersecurity Interview Questions Part -2.pdf
 
Security Opportunities A Silicon Valley VC Perspective
Security Opportunities  A Silicon Valley VC PerspectiveSecurity Opportunities  A Silicon Valley VC Perspective
Security Opportunities A Silicon Valley VC Perspective
 
Cyber security
Cyber securityCyber security
Cyber security
 

Recently uploaded

Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Cyber Security: A Common Problem 2018

  • 1. Cyber Security A Common Problem Intercity Technology & Check Point Software Technologies
  • 2. Cyber Security: A Common Problem Can you afford to be scared to do something when it comes to cybersecurity? In a world where our personal data is a currency of trust, the risk of not putting your investment in your customers’ private information can cost you your hard-earned reputation. New technologies present great opportunities for businesses to evolve. Opportunists with an appetite for cyber chaos are primed to take advantage of the weaknesses in your cybersecurity strategy.
  • 3. Agenda − 13:20 Welcome & Introduction − 13:30 Che Smith − 14:15 Refreshment Break − 14:30 Tom Kendrick − 15:15 Q&A − 15:30 Networking Drinks
  • 4. Che Smith Technology Associate, Intercity Technology “The Road to Security Hell”
  • 5. intercity.technology An Epic Fail Story The ironic adventure of the veiled lodger Final Reflections Checkpoint the role of AI in Cyber Security What would Trump do? Introducing Intercity The Nine Circles of Security Hell Today’s Agenda
  • 6. A Cyber Security Epic Fail The ironic adventure of the veiled lodger Employs 1.9 million Employs 1.7 million 2015 figures “Ransomware is unique among cybercrime because in order for the attack to be successful, it requires the victim to become a willing accomplice after the fact” James Scott, Sr. Fellow, Institute for Critical Infrastructure Technology
  • 7. Wide Area Networking and foundation voice environments IaaS Hosting and Data Centre services that includes Storage, Hybrid Cloud and Dedicated Bare Metal services, All services come with the M4 Service wrap; • Maintained • Monitored • Management • Managed Service Desk Local Area Networking - Designing, Installing, Testing and Refreshing. A managed, cloud-based, next-generation firewall service. Dedicated instances and shared environments available. Technology reviews, strategic support, network audits, network readiness assessments, vulnerability scanning, Penetration testing & Managed Service Desks The Intercity Story Exploit and Explore A Managed service provider putting people first
  • 8. intercity.technology If Trump was running your security he would do it “bigly” Bigly Covfefe Bad Hombre Extreme Vetting Taking the shackles off I’m gonna’ build a wall Fake News Don’t be a snowflake Alternative Facts Small Hands What would Trump say?
  • 9. Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 14 seconds by 2019 The average amount demanded after a ransomware attack is $1,077 Cyber Security: A common problem I’m gonna’ build a wall
  • 10. intercity.technology Fake News One of the main cyber-risks is to think they don’t exist.
  • 11. intercity.technology Only 38 percent of global organizations claim they are prepared to handle a sophisticated cyber attack. Don’t be a snowflake Global Cybersecurity Status Report” | ISACA International Cyber Security: A common problem
  • 12. intercity.technology 80% of senior decision makers say security is hindering innovation Alternative facts Security VS Innovation – DisruptionHub 2018 Cyber Security: A common problem
  • 13. intercity.technology The percentage of Security people in comparison to IT people is not growing as fast as it should be. Small hands Forbes Cyber Security: A common problem
  • 14. intercity.technology “Cyber crime is the greatest threat to every company in the world.” Ginni Rometty Bigly IBM Cyber Security: A common problem
  • 15. intercity.technology $75.2 billion: Amount that organizations worldwide will spend on infrastructure protection and security services in 2018 Covfefe Gartner December 7, 2017 Cyber Security: A common problem
  • 16. intercity.technology There are about 20 Billion Threat Blocks a day Bad Hombre IBM Cyber Security: A common problem
  • 17. intercity.technology 71% of staff are using apps not approved by IT. Extreme vetting Forbes Cyber Security: A common problem
  • 18. intercity.technology Employee training may prove to be the best ROI on cybersecurity investments for organizations globally over the next 5 years Taking the shackles off CCS Insight Cyber Security: A common problem
  • 19. The journey to “security hell” is paved with good intentions 1. Limbo Do nothing except bury your head in the sand and I am sure everything will be OK. 2. Lust Continually lusting after other organisations’ security solutions. 3. Gluttony Gorging on freebie security solutions whilst disregarding real protection. 4. Greed Taking in as many solutions as you possibly can and creating management chaos. 5. Anger Getting angry with the perpetrators and taking your eye off the prize. 6. Heresy Not believing the advice from the experts. 7. Violence Continuously breaking up what you have built and starting again. 8. Fraud Pretending you know what you are doing. 9. Treachery Sometimes the greatest threat comes from within.
  • 20. 2) Surround yourself with experts that can create layers of next generation defenses around your critical infrastructure. 1) Is it time to move your Security to the Cloud? 5) Come and talk to Intercity Technology 3) Don’t Stand Still 4) Don’t Forget the Basics Final Reflections
  • 21. ©2018 Check Point Software Technologies Ltd. Tom Kendrick | European Customer Success Manager tkendrick@checkpoint.com A View into AI in Cyber Security Intercity Event - 2018 AI, INTELLIGENTLY
  • 22. “The development of full artificial intelligence could spell the end of the human race.”Stephen Hawking “Computers are going to take over from humans, no question.” Steve Wozniak “AI will be the most likely cause of WW3”Elon Musk “Country that leads in AI development will be the ruler of the world” Vladimir Putin EVERYBODY IS TALKING ABOUT AI
  • 25. The AI Revolution: BRAINS  MACHINES The Industrial Revolution: MUSCLES  MACHINES
  • 29. WHY NOW? Storage Compute Mathematics People & Skills
  • 33. BUT IT IS USEFUL! NO, AI IS NOT MAGI C
  • 34. EXPERTISEDATA Lots of Data Rich Data AI Expertise Domain Expertise A GOOD AI SOLUTION REQUIRES:
  • 37. KEY PROBLEMS WITH CYBER SECURITY AI Not Enough Not EnoughDATA EXPERTISE Access to cyber security training data is limited Verdict logic is obscure High false detection rate
  • 38. BUT IT IS USEFUL! NO, AI IS NOT CYBER SECURITY MAGIC
  • 41. PREDICTIVE THREAT INTELLIGENCE Expose unknown CnC and malicious domains Attribute attacks to campaigns Enrich threat intelligence for predictive campaign prevention Campaign Hunting Introduce d +10 % CAMPAIGN HUNTING
  • 42. UNCOVER MALICIOUS EXECUTABLES Dynamically analyze executables is a Sandbox to collect system APIs Apply Machine Learning to reach malicious verdict Feedback loop for continued learning “BUFFY”/”HUNTRESS ” Huntress Unique Detections +13 %
  • 43. CONTEXT AWARE DETECTION “CADET” Look at the full context of the inspected element Extract parameters from the environment THOUSAND S of discrete Indicators  ONE Accurate Verdict Missed Detection False Positive Old CADET 2-fold 10-fold
  • 44. So what have we learned? • There are new techniques and attacks developing • Basic protections cover the simple attacks very well! • Most IT Professionals are not skilled enough in advanced analysis • Security solutions, assisted by Automation and AI let us have that expert analyst anywhere our data may be • AI is not perfect, but it helps! SUMMARY
  • 45. ©2018 Check Point Software Technologies Ltd. THANK YOU
  • 46. Q&A Time Che Smith & Tom Kendrick Any Questions?