SlideShare a Scribd company logo
1
Cyber Security for Digital-Era
AI, Machine Learning, Dynamic Threat Models for Proactive
Threat Detection and Elimination
Erich Berger
Executive, Secure Design
Kevin Stillman
CISO, State University of NY
Lalit Shinde
EVP Security, Seceon
Outline of the Presentation
2
Why should CxOs pay particular attention to Cyber Security
Seceon’s Approach, Key Features/Technologies and Complete Solution
Real world Examples, Benefits, Value Proposition to Enterprises
Challenges faced by Cyber Security Experts, Tools and Solutions
Why should CxO’s pay attention to Cyber Security?
 Cost of Data Breach is not just lost Data, but the impact on Reputation,
Brand and Business Revenue
 Cyber attack puts not just you, but your customers, partners and
employees at risk
 Breaches have hefty cost associated with them – it’s a financial burden
 Your Cyber hygiene affects everyone that you connect with
 Legal aspects of Cyber Regulations – Compliance is one of the most
important aspect in several regulated industries
3Source: Ponemon 2016 Cost of Data Breach Study Report
Cost of Data Breach at a glance – 2016
 $4 million is the average total cost of data breach
 29% increase in total cost of data breach since 2013
 $158 is the average cost per lost or stolen record – For Healthcare industry,
it’s $355, most among all, for Education it’s $246 and for Banking it’s $221
per stolen record
 Regulated industries, such as healthcare and financial services, have the
most costly data breaches because of fines and the higher than average
rate of lost business and customers.
 15% increase in per capita cost since 2013
4Source: Ponemon 2016 Cost of Data Breach Study Report
5
Biggest Security Threats to Organizations
Source: UBM Ponemon HPE 2016 Cyber Security Trends Report
Challenges: Cost of MTTI and MTTC
6
MTTI – Mean Time To Identify
MTTC – Mean Time To Contain
US $M
US $M
Source: Ponemon 2016 Cost of Data Breach Study Report
Challenges: Most Security Products Fall Short
7Source: Verizon 2016 Data Breach Investigation Report
Stealing Credentials happens
in minutes
95% Data Extraction happens
within 24 hours
Data Breaches – Why Automated Real-Time solution is a must?
 Today’s approaches are reactive than proactive
 Despite the investment and focus over past 3 years organizations are losing ground
 The attacks are smarter and faster
 The smart people based centric approach is too slow, too complicated and too expensive
 A new fully automated comprehensive threat detect and response system is required
 One that Detects threats in Minutes, Fully deploys & protects in a few hours and does not need rule or signature updates
Challenges: Operational Cost of Investigations
8
Flows/Logs Troubleshooting
Activity
Type
Flow/Log
Instances
Comments
NG FW generates events/logs around
an instance of an infected device
attempting to connect to a bad web site.
North-South
Activity
444
NG FW is resetting connections from
the device over time and is not
correlating these "non critical flagged"
instances
Device is also performing IP Sweeps
East- West
Activity
135
Few separate instances across the
internal network
Device is also performing IP Port scans
East- West
Activity
92
Few separate instances across the
internal network
Device needs to be identified Internal Activity 1
What device is it? who or what group it
belongs to?
Total Activity 672 Total instances to investigate
Consider an example where a device is infected with a Malware
9
Seceon’s Approach to Cyber Security
Traditional Security Approach Seceon OTM Security Approach
 Reactive Approach
 Tools are highly specialized, but work in
Silos with no comprehensive visibility
 High CapEx with 20+ Security Tools
 High OpEx with 1M+ events/logs per day –
almost 80% require follow up
 Investigation and Incident Response
 90% take an hour or longer to identify
 90% take a day or longer (many times
months) to respond
 Challenges
 Lack of Integration among Tools
 Knowledge/Skill of investigation and
Response is costly
 Proactive Approach
 Moving from Point Tools to Complete
Predictive Analysis Solution
 Comprehensive Visibility across all Asset
Groups – Devices, Applications, Network,
Employees, Customers etc.
 Automated Detection and Remediation
 Predictive Threat Detection using AI, ML
and Behavioral Threat Models
 Automated Remediation within near Real
Time
 Automated Correlation
 Contextual based Single Line Alerts
 Rapid Deployment with Automated DevOps
model and Open API
Seceon OTM Platform Overview
10
Adaptive Visualization
• Comprehensive view of all assets and threats
• Fully automated solution that is easiest to deploy
• Allows drill down of threats with all details
Detect Threats that Matter
• Detects known as well as unknown threats
• Provides comprehensive information of the threats
• Indicates all compromised assets and potential targets
Contain Threats in Real Time
• Immediate corrective action in real time
• Automatic notification through email/text if required
• Provides actionable analytics
Built-in Security
Threat Modeling
Parse
Dynamic
Reduction
Behavior Analysis
Threat Correlation
Threat Intelligence
UniversalCollectionBus
Unstructured
Data
Unstructured
Data
Store
Storage Engine
Search
Rapid Search
Agent
Analytics
Analytics Engine
Big Data Store &
Search
Real-time Threat
Detection
Real-time
Analytics
Predictive
Modeling
Outputs
Built-in Advanced
Correlation
Built-in ML
Engine
Built-in Data
Model Engine
Platform Security Engine
Structured
Data
Parse
Dynamic
Reduction
Parse
Dynamic
Reduction
Seceon’s Scalable – Fast Analytics Processing
Platform
Distributed Data Ingest (CCE) Fast Parallel Processing Architecture (APE)
Closed Loop Threat Containment
Threat
Containment
Use Case – Compromised Credentials
12
• Compromised Credentials Account for 75% of data theft
• Most traditional security solutions are blind to almost all forms of compromised credentials
• Seceon detects all forms of compromised credential use in real-time for external or insider source
verify
User “A”
Credentials
Directory
User: “A”
“Credentials – User A”
Host Name: “Bob’s PC”
 No threat
 No threat  Threat Indicator
 No threat
User: “A”
“Credentials – User A”
Host Name: “Joe’s PC”
DB
High Value
Assets
SIEM
Learn User behavior based on geolocation, computer
Used, time of logins, assets accessed, etc.. etc.
Use Case – Ransomware
13
• Criminal Malware like Ransomware made it to top cyber security concern in 2016
• Ransomware had millions of different strains and families affecting large enterprises, as well as SMBs
• Seceon detects all forms of Ransomware using layered approach of predictive analytics in real-time
User “A” receives Email and cl
icks on a innocuous link
 Threat Indicator 1
 No threat
Bad Reputation URL
Malware Downloaded
Command and Control
Network Scan for other v
ulnerable hosts
 Threat Indicator 2
High Value
Assets
Infection Propagation
 Threat Indicator 3
 Stops threats – automatically
 Disable compromised credentials
 Set filters on firewalls and switches
 Block, rate limit or redirect traffic
 Detects a full range of threats
 Compromised Credentials
 Insider threats
 Brute force attacks
 DDoS attack (all forms)
 Malware, BOTs, APTs Ransomware…
14
Seceon OTM Key Features
 Policy monitoring and enforcement
 Protect critical resources
 Restricting access to only select groups
 Alert and stop upon attempt
 Visualizes impact of attacks
 On applications, users
 On the network
 Provides traffic trend monitoring
Thank you
For further info about Seceon please write to : meghna.jaiswal@jktech.com

More Related Content

What's hot

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
Krutarth Vasavada
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
Murray Security Services
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Matthew Rosenquist
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
Shah Sheikh
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
IBM Security
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Michael Noel
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
Vertex Holdings
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
IBM Security
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructureIntel IT Center
 
Cyber security
Cyber securityCyber security
Cyber security
Eduonix
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
IBM Security
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
Nandita Nityanandam
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Sirius
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
IBM Security
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
PECB
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
Pedro Espinosa
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec
 

What's hot (20)

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructure
 
Cyber security
Cyber securityCyber security
Cyber security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 

Viewers also liked

To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
Nishant Mehta
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityIAEME Publication
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
Machine Learning on Big Data
Machine Learning on Big DataMachine Learning on Big Data
Machine Learning on Big Data
Max Lin
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningLior Rokach
 
10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems
Xavier Amatriain
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
Natasha Murashev
 

Viewers also liked (7)

To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Machine Learning on Big Data
Machine Learning on Big DataMachine Learning on Big Data
Machine Learning on Big Data
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to Cyber Security for Digital-Era

Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
JK Tech
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Qualys
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
BeyondTrust
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
Splunk
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
Adeo Security
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
CSNP
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
Aaron White
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
JoAnna Cheshire
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
NetworkCollaborators
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
Ricardo Resnik
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Leslie McFarlin
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
Quick Heal Technologies Ltd.
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
IBM Security
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseLumension
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
Minh Le
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
Ivanti
 
AMP_Security_ Malware Protection Presentatiion
AMP_Security_ Malware Protection PresentatiionAMP_Security_ Malware Protection Presentatiion
AMP_Security_ Malware Protection Presentatiion
SohanGole1
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
TechBiz Forense Digital
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
Bob Maley
 

Similar to Cyber Security for Digital-Era (20)

Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
AMP_Security_ Malware Protection Presentatiion
AMP_Security_ Malware Protection PresentatiionAMP_Security_ Malware Protection Presentatiion
AMP_Security_ Malware Protection Presentatiion
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 

More from JK Tech

Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
JK Tech
 
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
JK Tech
 
Bulletproof Your QAD ERP to Cloud | JK Tech Webinar
Bulletproof Your QAD ERP to Cloud | JK Tech WebinarBulletproof Your QAD ERP to Cloud | JK Tech Webinar
Bulletproof Your QAD ERP to Cloud | JK Tech Webinar
JK Tech
 
Application Modernization to Accelerate Business Growth | JK Tech Webinar
Application Modernization to Accelerate Business Growth | JK Tech WebinarApplication Modernization to Accelerate Business Growth | JK Tech Webinar
Application Modernization to Accelerate Business Growth | JK Tech Webinar
JK Tech
 
Modernise Your Applications to Accelerate Digital Transformation | Webinar
Modernise Your Applications to Accelerate Digital Transformation | WebinarModernise Your Applications to Accelerate Digital Transformation | Webinar
Modernise Your Applications to Accelerate Digital Transformation | Webinar
JK Tech
 
[Webinar] - Digital Transformation Journey in Dairy Industry
[Webinar] - Digital Transformation Journey in Dairy Industry[Webinar] - Digital Transformation Journey in Dairy Industry
[Webinar] - Digital Transformation Journey in Dairy Industry
JK Tech
 
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
JK Tech
 
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
JK Tech
 
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
JK Tech
 
[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain
JK Tech
 
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
JK Tech
 
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
JK Tech
 
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
JK Tech
 
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
JK Tech
 
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
JK Tech
 
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test AutomationWebinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
JK Tech
 
Webinar (UK/Europe) - Demystifying SAP S/4HANA
Webinar (UK/Europe) - Demystifying SAP S/4HANAWebinar (UK/Europe) - Demystifying SAP S/4HANA
Webinar (UK/Europe) - Demystifying SAP S/4HANA
JK Tech
 
Demystifying SAP S/4HANA
Demystifying SAP S/4HANADemystifying SAP S/4HANA
Demystifying SAP S/4HANA
JK Tech
 
Webinar - Loyalty Reward Points Using Blockchain
Webinar - Loyalty Reward Points Using BlockchainWebinar - Loyalty Reward Points Using Blockchain
Webinar - Loyalty Reward Points Using Blockchain
JK Tech
 
Driving Process Improvement Through Automation | Webinar
Driving Process Improvement Through Automation | WebinarDriving Process Improvement Through Automation | Webinar
Driving Process Improvement Through Automation | Webinar
JK Tech
 

More from JK Tech (20)

Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
 
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
 
Bulletproof Your QAD ERP to Cloud | JK Tech Webinar
Bulletproof Your QAD ERP to Cloud | JK Tech WebinarBulletproof Your QAD ERP to Cloud | JK Tech Webinar
Bulletproof Your QAD ERP to Cloud | JK Tech Webinar
 
Application Modernization to Accelerate Business Growth | JK Tech Webinar
Application Modernization to Accelerate Business Growth | JK Tech WebinarApplication Modernization to Accelerate Business Growth | JK Tech Webinar
Application Modernization to Accelerate Business Growth | JK Tech Webinar
 
Modernise Your Applications to Accelerate Digital Transformation | Webinar
Modernise Your Applications to Accelerate Digital Transformation | WebinarModernise Your Applications to Accelerate Digital Transformation | Webinar
Modernise Your Applications to Accelerate Digital Transformation | Webinar
 
[Webinar] - Digital Transformation Journey in Dairy Industry
[Webinar] - Digital Transformation Journey in Dairy Industry[Webinar] - Digital Transformation Journey in Dairy Industry
[Webinar] - Digital Transformation Journey in Dairy Industry
 
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
 
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
 
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
 
[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain
 
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
 
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
 
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
 
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
 
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
 
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test AutomationWebinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
 
Webinar (UK/Europe) - Demystifying SAP S/4HANA
Webinar (UK/Europe) - Demystifying SAP S/4HANAWebinar (UK/Europe) - Demystifying SAP S/4HANA
Webinar (UK/Europe) - Demystifying SAP S/4HANA
 
Demystifying SAP S/4HANA
Demystifying SAP S/4HANADemystifying SAP S/4HANA
Demystifying SAP S/4HANA
 
Webinar - Loyalty Reward Points Using Blockchain
Webinar - Loyalty Reward Points Using BlockchainWebinar - Loyalty Reward Points Using Blockchain
Webinar - Loyalty Reward Points Using Blockchain
 
Driving Process Improvement Through Automation | Webinar
Driving Process Improvement Through Automation | WebinarDriving Process Improvement Through Automation | Webinar
Driving Process Improvement Through Automation | Webinar
 

Recently uploaded

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
CatarinaPereira64715
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
Abida Shariff
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
ODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User GroupODC, Data Fabric and Architecture User Group
ODC, Data Fabric and Architecture User Group
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 

Cyber Security for Digital-Era

  • 1. 1 Cyber Security for Digital-Era AI, Machine Learning, Dynamic Threat Models for Proactive Threat Detection and Elimination Erich Berger Executive, Secure Design Kevin Stillman CISO, State University of NY Lalit Shinde EVP Security, Seceon
  • 2. Outline of the Presentation 2 Why should CxOs pay particular attention to Cyber Security Seceon’s Approach, Key Features/Technologies and Complete Solution Real world Examples, Benefits, Value Proposition to Enterprises Challenges faced by Cyber Security Experts, Tools and Solutions
  • 3. Why should CxO’s pay attention to Cyber Security?  Cost of Data Breach is not just lost Data, but the impact on Reputation, Brand and Business Revenue  Cyber attack puts not just you, but your customers, partners and employees at risk  Breaches have hefty cost associated with them – it’s a financial burden  Your Cyber hygiene affects everyone that you connect with  Legal aspects of Cyber Regulations – Compliance is one of the most important aspect in several regulated industries 3Source: Ponemon 2016 Cost of Data Breach Study Report
  • 4. Cost of Data Breach at a glance – 2016  $4 million is the average total cost of data breach  29% increase in total cost of data breach since 2013  $158 is the average cost per lost or stolen record – For Healthcare industry, it’s $355, most among all, for Education it’s $246 and for Banking it’s $221 per stolen record  Regulated industries, such as healthcare and financial services, have the most costly data breaches because of fines and the higher than average rate of lost business and customers.  15% increase in per capita cost since 2013 4Source: Ponemon 2016 Cost of Data Breach Study Report
  • 5. 5 Biggest Security Threats to Organizations Source: UBM Ponemon HPE 2016 Cyber Security Trends Report
  • 6. Challenges: Cost of MTTI and MTTC 6 MTTI – Mean Time To Identify MTTC – Mean Time To Contain US $M US $M Source: Ponemon 2016 Cost of Data Breach Study Report
  • 7. Challenges: Most Security Products Fall Short 7Source: Verizon 2016 Data Breach Investigation Report Stealing Credentials happens in minutes 95% Data Extraction happens within 24 hours Data Breaches – Why Automated Real-Time solution is a must?  Today’s approaches are reactive than proactive  Despite the investment and focus over past 3 years organizations are losing ground  The attacks are smarter and faster  The smart people based centric approach is too slow, too complicated and too expensive  A new fully automated comprehensive threat detect and response system is required  One that Detects threats in Minutes, Fully deploys & protects in a few hours and does not need rule or signature updates
  • 8. Challenges: Operational Cost of Investigations 8 Flows/Logs Troubleshooting Activity Type Flow/Log Instances Comments NG FW generates events/logs around an instance of an infected device attempting to connect to a bad web site. North-South Activity 444 NG FW is resetting connections from the device over time and is not correlating these "non critical flagged" instances Device is also performing IP Sweeps East- West Activity 135 Few separate instances across the internal network Device is also performing IP Port scans East- West Activity 92 Few separate instances across the internal network Device needs to be identified Internal Activity 1 What device is it? who or what group it belongs to? Total Activity 672 Total instances to investigate Consider an example where a device is infected with a Malware
  • 9. 9 Seceon’s Approach to Cyber Security Traditional Security Approach Seceon OTM Security Approach  Reactive Approach  Tools are highly specialized, but work in Silos with no comprehensive visibility  High CapEx with 20+ Security Tools  High OpEx with 1M+ events/logs per day – almost 80% require follow up  Investigation and Incident Response  90% take an hour or longer to identify  90% take a day or longer (many times months) to respond  Challenges  Lack of Integration among Tools  Knowledge/Skill of investigation and Response is costly  Proactive Approach  Moving from Point Tools to Complete Predictive Analysis Solution  Comprehensive Visibility across all Asset Groups – Devices, Applications, Network, Employees, Customers etc.  Automated Detection and Remediation  Predictive Threat Detection using AI, ML and Behavioral Threat Models  Automated Remediation within near Real Time  Automated Correlation  Contextual based Single Line Alerts  Rapid Deployment with Automated DevOps model and Open API
  • 10. Seceon OTM Platform Overview 10 Adaptive Visualization • Comprehensive view of all assets and threats • Fully automated solution that is easiest to deploy • Allows drill down of threats with all details Detect Threats that Matter • Detects known as well as unknown threats • Provides comprehensive information of the threats • Indicates all compromised assets and potential targets Contain Threats in Real Time • Immediate corrective action in real time • Automatic notification through email/text if required • Provides actionable analytics
  • 11. Built-in Security Threat Modeling Parse Dynamic Reduction Behavior Analysis Threat Correlation Threat Intelligence UniversalCollectionBus Unstructured Data Unstructured Data Store Storage Engine Search Rapid Search Agent Analytics Analytics Engine Big Data Store & Search Real-time Threat Detection Real-time Analytics Predictive Modeling Outputs Built-in Advanced Correlation Built-in ML Engine Built-in Data Model Engine Platform Security Engine Structured Data Parse Dynamic Reduction Parse Dynamic Reduction Seceon’s Scalable – Fast Analytics Processing Platform Distributed Data Ingest (CCE) Fast Parallel Processing Architecture (APE) Closed Loop Threat Containment Threat Containment
  • 12. Use Case – Compromised Credentials 12 • Compromised Credentials Account for 75% of data theft • Most traditional security solutions are blind to almost all forms of compromised credentials • Seceon detects all forms of compromised credential use in real-time for external or insider source verify User “A” Credentials Directory User: “A” “Credentials – User A” Host Name: “Bob’s PC”  No threat  No threat  Threat Indicator  No threat User: “A” “Credentials – User A” Host Name: “Joe’s PC” DB High Value Assets SIEM Learn User behavior based on geolocation, computer Used, time of logins, assets accessed, etc.. etc.
  • 13. Use Case – Ransomware 13 • Criminal Malware like Ransomware made it to top cyber security concern in 2016 • Ransomware had millions of different strains and families affecting large enterprises, as well as SMBs • Seceon detects all forms of Ransomware using layered approach of predictive analytics in real-time User “A” receives Email and cl icks on a innocuous link  Threat Indicator 1  No threat Bad Reputation URL Malware Downloaded Command and Control Network Scan for other v ulnerable hosts  Threat Indicator 2 High Value Assets Infection Propagation  Threat Indicator 3
  • 14.  Stops threats – automatically  Disable compromised credentials  Set filters on firewalls and switches  Block, rate limit or redirect traffic  Detects a full range of threats  Compromised Credentials  Insider threats  Brute force attacks  DDoS attack (all forms)  Malware, BOTs, APTs Ransomware… 14 Seceon OTM Key Features  Policy monitoring and enforcement  Protect critical resources  Restricting access to only select groups  Alert and stop upon attempt  Visualizes impact of attacks  On applications, users  On the network  Provides traffic trend monitoring
  • 15. Thank you For further info about Seceon please write to : meghna.jaiswal@jktech.com