SlideShare a Scribd company logo
Network
Situational
Awareness
© 2015 Lumeta Corporation
In Cybersecurity, The
Network Doesn’t Lie
Networks are increasingly dynamic
and changing causing a 20% gap in
network situational awareness
• Constant upgrades, moves and changes
• Spin-offs, mergers and acquisitions
• Call back to TOR exit nodes
• Invisible assets turned into malware
infrastructure
• Unmanaged & Unsecured Devices
• Digital economy causing infrastructure
transitions to:
• Mobile from fixed
• Virtual from physical
• DevOps in the cloud
• Software defined networks &
datacenter
IP Addresses
Awareness
100%
1,000K100K10K
Lumeta
Network Situational
Awareness
Cybersecurity
Analytics
Operationalizing
Threat Intelligence
Validate No Access to
Known Malware C2
Servers
• Determine whether or not
active security controls
prevent call back to known
botnet/command and
control networks and
servers
Validate No Access to
Known TOR Exit
Nodes
• Determine whether or not
active security controls
prevent call back to TOR exit
nodes
(TOR – The Onion Router/Dark Web Infrastructure)
Zombie Hunting
• Determine whether or not
any trusted/enterprise
assets are malware
infrastructure or part of
blacklists/dropnets/
Shadowserver/attacker lists
Internal TOR
Relays/Bridges
• Determine whether or not
any trusted/enterprise
assets are/ were acting as
TOR relays/ bridges
Use/Accessibility of
Trojan/Malware
Ports
• Determine whether or not
any trusted/enterprise
assets are utilizing ports
associated with Trojans,
Malware, and attack
lateralization
Network Attack
Emulation Solution
• Intelligence-led test environment
mimics the actions of cyber
attackers with full traceability
and reporting
• Use of Lumeta innocuous
malware protects the end user
during testing
• We are partnering with
European PENTEST partners -
Please contact us for more
information

More Related Content

What's hot

Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
AlgoSec
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
GENIANS, INC.
 
Ntcip Device Tester
Ntcip Device TesterNtcip Device Tester
Ntcip Device Tester
Peter Ashley
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
GENIANS, INC.
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
Tanveer Malik
 
EclipseCon NA 2016: The Things Network
EclipseCon NA 2016: The Things NetworkEclipseCon NA 2016: The Things Network
EclipseCon NA 2016: The Things Network
Johan Stokking
 
How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...
Askozia
 
UniQ-ID Identity and Access Management
UniQ-ID Identity and Access ManagementUniQ-ID Identity and Access Management
UniQ-ID Identity and Access Management
Frans Bolk
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
GENIANS, INC.
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
Nanna Wang
 
The Things Network Technical Update 4: February 2016
The Things Network Technical Update 4: February 2016The Things Network Technical Update 4: February 2016
The Things Network Technical Update 4: February 2016
Johan Stokking
 
GAO Asset Tracking System: know where your assets are at all times!
GAO Asset Tracking System: know where your assets are at all times!GAO Asset Tracking System: know where your assets are at all times!
GAO Asset Tracking System: know where your assets are at all times!
GAO RFID Inc.
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
Tempered
 
Security standard
Security standardSecurity standard
Security standard
lyndyv
 
FreeSBC - Getting Started
FreeSBC - Getting StartedFreeSBC - Getting Started
FreeSBC - Getting Started
Alan Percy
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
GENIANS, INC.
 
IOT and Mulesoft
IOT and MulesoftIOT and Mulesoft
IOT and Mulesoft
Ravi Prakash Singh
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
MultiTech IT
 
How to secure a safe teleworking environment
How to secure a safe teleworking environment How to secure a safe teleworking environment
How to secure a safe teleworking environment
LCpublicrelations
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
Jim Gilsinn
 

What's hot (20)

Segmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the UglySegmenting your Network for Security - The Good, the Bad and the Ugly
Segmenting your Network for Security - The Good, the Bad and the Ugly
 
Genian NAC Overview
Genian NAC Overview Genian NAC Overview
Genian NAC Overview
 
Ntcip Device Tester
Ntcip Device TesterNtcip Device Tester
Ntcip Device Tester
 
What we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 InfosecWhat we learned from MISA Ontario 2020 Infosec
What we learned from MISA Ontario 2020 Infosec
 
Lecture 5 software to control network
Lecture 5 software to control networkLecture 5 software to control network
Lecture 5 software to control network
 
EclipseCon NA 2016: The Things Network
EclipseCon NA 2016: The Things NetworkEclipseCon NA 2016: The Things Network
EclipseCon NA 2016: The Things Network
 
How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...How to protect your business telephony from cyber attacks - webinar 2017, Eng...
How to protect your business telephony from cyber attacks - webinar 2017, Eng...
 
UniQ-ID Identity and Access Management
UniQ-ID Identity and Access ManagementUniQ-ID Identity and Access Management
UniQ-ID Identity and Access Management
 
Genian NAC Datasheet
Genian NAC Datasheet Genian NAC Datasheet
Genian NAC Datasheet
 
Netop remote control 12.5 Brochure
Netop remote control 12.5 BrochureNetop remote control 12.5 Brochure
Netop remote control 12.5 Brochure
 
The Things Network Technical Update 4: February 2016
The Things Network Technical Update 4: February 2016The Things Network Technical Update 4: February 2016
The Things Network Technical Update 4: February 2016
 
GAO Asset Tracking System: know where your assets are at all times!
GAO Asset Tracking System: know where your assets are at all times!GAO Asset Tracking System: know where your assets are at all times!
GAO Asset Tracking System: know where your assets are at all times!
 
Cloaking is the new perimeter
Cloaking is the new perimeterCloaking is the new perimeter
Cloaking is the new perimeter
 
Security standard
Security standardSecurity standard
Security standard
 
FreeSBC - Getting Started
FreeSBC - Getting StartedFreeSBC - Getting Started
FreeSBC - Getting Started
 
Identify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilitiesIdentify and mitigate high risk port vulnerabilities
Identify and mitigate high risk port vulnerabilities
 
IOT and Mulesoft
IOT and MulesoftIOT and Mulesoft
IOT and Mulesoft
 
Benefits of IT Outsourcing
Benefits of IT OutsourcingBenefits of IT Outsourcing
Benefits of IT Outsourcing
 
How to secure a safe teleworking environment
How to secure a safe teleworking environment How to secure a safe teleworking environment
How to secure a safe teleworking environment
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 

Viewers also liked

Friend
FriendFriend
Friend
guestde0fbb
 
Middle East Internet Poster
Middle East Internet PosterMiddle East Internet Poster
Middle East Internet Poster
Abbas Badran
 
New media
New mediaNew media
New media
Abbas Badran
 
Friend
FriendFriend
Friend
guestde0fbb
 
Mobile devices are changing the behavior patterns of people.
Mobile devices are changing the behavior patterns of people.Mobile devices are changing the behavior patterns of people.
Mobile devices are changing the behavior patterns of people.
Etsuji Kameyama
 
Use of Augmented Reality in shopping-mall (商店・商店街における拡張現実の活用)
Use of Augmented Reality in shopping-mall (商店・商店街における拡張現実の活用)Use of Augmented Reality in shopping-mall (商店・商店街における拡張現実の活用)
Use of Augmented Reality in shopping-mall (商店・商店街における拡張現実の活用)
Etsuji Kameyama
 
Current State and case introduction of AR - ARの現状と最新事例 (summer of 2012)
Current State and case introduction of AR - ARの現状と最新事例 (summer of 2012)Current State and case introduction of AR - ARの現状と最新事例 (summer of 2012)
Current State and case introduction of AR - ARの現状と最新事例 (summer of 2012)
Etsuji Kameyama
 
The 1st Augmented reality (AR) summit in Japan - View in current state and th...
The 1st Augmented reality (AR) summit in Japan - View in current state and th...The 1st Augmented reality (AR) summit in Japan - View in current state and th...
The 1st Augmented reality (AR) summit in Japan - View in current state and th...
Etsuji Kameyama
 
cyberwar strategy
cyberwar strategycyberwar strategy
cyberwar strategy
Abbas Badran
 
教育分野で利用するAR(拡張現実)とVR(仮想現実)の技術
教育分野で利用するAR(拡張現実)とVR(仮想現実)の技術教育分野で利用するAR(拡張現実)とVR(仮想現実)の技術
教育分野で利用するAR(拡張現実)とVR(仮想現実)の技術
Etsuji Kameyama
 
PTC Vuforia を使用したAR(拡張現実) と MR(複合現実)
PTC Vuforia を使用したAR(拡張現実) と MR(複合現実)PTC Vuforia を使用したAR(拡張現実) と MR(複合現実)
PTC Vuforia を使用したAR(拡張現実) と MR(複合現実)
Etsuji Kameyama
 
AR, VR, MR の現状と最新事例 2015 Winter
AR, VR, MR の現状と最新事例 2015 WinterAR, VR, MR の現状と最新事例 2015 Winter
AR, VR, MR の現状と最新事例 2015 Winter
Etsuji Kameyama
 
واقع الحكومة الالكترونية العربية
واقع الحكومة الالكترونية العربيةواقع الحكومة الالكترونية العربية
واقع الحكومة الالكترونية العربية
Abbas Badran
 
AR(拡張現実)アプリ+位置情報の事例紹介と導入ポイント
AR(拡張現実)アプリ+位置情報の事例紹介と導入ポイントAR(拡張現実)アプリ+位置情報の事例紹介と導入ポイント
AR(拡張現実)アプリ+位置情報の事例紹介と導入ポイント
Etsuji Kameyama
 
音のある風景 - 機能としてのサイン音
音のある風景 - 機能としてのサイン音音のある風景 - 機能としてのサイン音
音のある風景 - 機能としてのサイン音
Etsuji Kameyama
 

Viewers also liked (16)

Friend
FriendFriend
Friend
 
Middle East Internet Poster
Middle East Internet PosterMiddle East Internet Poster
Middle East Internet Poster
 
New media
New mediaNew media
New media
 
Friend
FriendFriend
Friend
 
Mobile devices are changing the behavior patterns of people.
Mobile devices are changing the behavior patterns of people.Mobile devices are changing the behavior patterns of people.
Mobile devices are changing the behavior patterns of people.
 
Use of Augmented Reality in shopping-mall (商店・商店街における拡張現実の活用)
Use of Augmented Reality in shopping-mall (商店・商店街における拡張現実の活用)Use of Augmented Reality in shopping-mall (商店・商店街における拡張現実の活用)
Use of Augmented Reality in shopping-mall (商店・商店街における拡張現実の活用)
 
Current State and case introduction of AR - ARの現状と最新事例 (summer of 2012)
Current State and case introduction of AR - ARの現状と最新事例 (summer of 2012)Current State and case introduction of AR - ARの現状と最新事例 (summer of 2012)
Current State and case introduction of AR - ARの現状と最新事例 (summer of 2012)
 
Bracciali1
Bracciali1Bracciali1
Bracciali1
 
The 1st Augmented reality (AR) summit in Japan - View in current state and th...
The 1st Augmented reality (AR) summit in Japan - View in current state and th...The 1st Augmented reality (AR) summit in Japan - View in current state and th...
The 1st Augmented reality (AR) summit in Japan - View in current state and th...
 
cyberwar strategy
cyberwar strategycyberwar strategy
cyberwar strategy
 
教育分野で利用するAR(拡張現実)とVR(仮想現実)の技術
教育分野で利用するAR(拡張現実)とVR(仮想現実)の技術教育分野で利用するAR(拡張現実)とVR(仮想現実)の技術
教育分野で利用するAR(拡張現実)とVR(仮想現実)の技術
 
PTC Vuforia を使用したAR(拡張現実) と MR(複合現実)
PTC Vuforia を使用したAR(拡張現実) と MR(複合現実)PTC Vuforia を使用したAR(拡張現実) と MR(複合現実)
PTC Vuforia を使用したAR(拡張現実) と MR(複合現実)
 
AR, VR, MR の現状と最新事例 2015 Winter
AR, VR, MR の現状と最新事例 2015 WinterAR, VR, MR の現状と最新事例 2015 Winter
AR, VR, MR の現状と最新事例 2015 Winter
 
واقع الحكومة الالكترونية العربية
واقع الحكومة الالكترونية العربيةواقع الحكومة الالكترونية العربية
واقع الحكومة الالكترونية العربية
 
AR(拡張現実)アプリ+位置情報の事例紹介と導入ポイント
AR(拡張現実)アプリ+位置情報の事例紹介と導入ポイントAR(拡張現実)アプリ+位置情報の事例紹介と導入ポイント
AR(拡張現実)アプリ+位置情報の事例紹介と導入ポイント
 
音のある風景 - 機能としてのサイン音
音のある風景 - 機能としてのサイン音音のある風景 - 機能としてのサイン音
音のある風景 - 機能としてのサイン音
 

Similar to Ia15 network situation awareness Lumeta Europe

Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Amazon Web Services
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
Christopher Frenz
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
AlgoSec
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
Satya P. Joshi
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Decisions
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
Brian Pichman
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
xband
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
Cisco do Brasil
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
Scalar Decisions
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Cyren, Inc
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
EBERTE
 
Understanding Security Features of Tally on Cloud
Understanding Security Features of Tally on CloudUnderstanding Security Features of Tally on Cloud
Understanding Security Features of Tally on Cloud
Antraweb Technologies
 
Zero Trust Best Practices for Kubernetes
Zero Trust Best Practices for KubernetesZero Trust Best Practices for Kubernetes
Zero Trust Best Practices for Kubernetes
NGINX, Inc.
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
ST_World
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
Ben Rothke
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
Khoa Nguyen Hong Nguyen
 
Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud Attacks
Imperva
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
Great Bay Software
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
Muhib Ahmad Sherwani
 

Similar to Ia15 network situation awareness Lumeta Europe (20)

Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with TelosNext-Generation Cybersecurity for the Globally Connected Enterprise with Telos
Next-Generation Cybersecurity for the Globally Connected Enterprise with Telos
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.Compliance made easy. Pass your audits stress-free.
Compliance made easy. Pass your audits stress-free.
 
Security and control in Management Information System
Security and control in Management Information SystemSecurity and control in Management Information System
Security and control in Management Information System
 
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
 
Implementing security for your library | PLAN Tech Day Conference
Implementing security for  your library | PLAN Tech Day ConferenceImplementing security for  your library | PLAN Tech Day Conference
Implementing security for your library | PLAN Tech Day Conference
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
A rede como um sensor de segurança
A rede como um sensor de segurança A rede como um sensor de segurança
A rede como um sensor de segurança
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
Webinar: Can a Light Bulb Really Pose a Security Threat? A Practical Look at ...
 
CCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptxCCSA Treinamento_CheckPoint.pptx
CCSA Treinamento_CheckPoint.pptx
 
Understanding Security Features of Tally on Cloud
Understanding Security Features of Tally on CloudUnderstanding Security Features of Tally on Cloud
Understanding Security Features of Tally on Cloud
 
Zero Trust Best Practices for Kubernetes
Zero Trust Best Practices for KubernetesZero Trust Best Practices for Kubernetes
Zero Trust Best Practices for Kubernetes
 
Track 5 session 1 - st dev con 2016 - need for security for iot
Track 5   session 1 - st dev con 2016 - need for security for iotTrack 5   session 1 - st dev con 2016 - need for security for iot
Track 5 session 1 - st dev con 2016 - need for security for iot
 
Securing your presence at the perimeter
Securing your presence at the perimeterSecuring your presence at the perimeter
Securing your presence at the perimeter
 
Fore scout nac-datasheet
Fore scout nac-datasheetFore scout nac-datasheet
Fore scout nac-datasheet
 
Man in the Cloud Attacks
Man in the Cloud AttacksMan in the Cloud Attacks
Man in the Cloud Attacks
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Software Security and IDS.pptx
Software Security and IDS.pptxSoftware Security and IDS.pptx
Software Security and IDS.pptx
 

Recently uploaded

[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
Vietnam Cotton & Spinning Association
 
Ahmedabad Call Girls 7339748667 With Free Home Delivery At Your Door
Ahmedabad Call Girls 7339748667 With Free Home Delivery At Your DoorAhmedabad Call Girls 7339748667 With Free Home Delivery At Your Door
Ahmedabad Call Girls 7339748667 With Free Home Delivery At Your Door
Russian Escorts in Delhi 9711199171 with low rate Book online
 
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
Timothy Spann
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
Rebecca Bilbro
 
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
nitachopra
 
Do People Really Know Their Fertility Intentions? Correspondence between Sel...
Do People Really Know Their Fertility Intentions?  Correspondence between Sel...Do People Really Know Their Fertility Intentions?  Correspondence between Sel...
Do People Really Know Their Fertility Intentions? Correspondence between Sel...
Xiao Xu
 
Interview Methods - Marital and Family Therapy and Counselling - Psychology S...
Interview Methods - Marital and Family Therapy and Counselling - Psychology S...Interview Methods - Marital and Family Therapy and Counselling - Psychology S...
Interview Methods - Marital and Family Therapy and Counselling - Psychology S...
PsychoTech Services
 
Drownings spike from May to August in children
Drownings spike from May to August in childrenDrownings spike from May to August in children
Drownings spike from May to August in children
Bisnar Chase Personal Injury Attorneys
 
Health care analysis using sentimental analysis
Health care analysis using sentimental analysisHealth care analysis using sentimental analysis
Health care analysis using sentimental analysis
krishnasrigannavarap
 
Bangalore ℂall Girl 000000 Bangalore Escorts Service
Bangalore ℂall Girl 000000 Bangalore Escorts ServiceBangalore ℂall Girl 000000 Bangalore Escorts Service
Bangalore ℂall Girl 000000 Bangalore Escorts Service
nhero3888
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
keesa2
 
Senior Software Profiles Backend Sample - Sheet1.pdf
Senior Software Profiles  Backend Sample - Sheet1.pdfSenior Software Profiles  Backend Sample - Sheet1.pdf
Senior Software Profiles Backend Sample - Sheet1.pdf
Vineet
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
Vineet
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
eoxhsaa
 
Digital Marketing Performance Marketing Sample .pdf
Digital Marketing Performance Marketing  Sample .pdfDigital Marketing Performance Marketing  Sample .pdf
Digital Marketing Performance Marketing Sample .pdf
Vineet
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
Alireza Kamrani
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
9gr6pty
 
一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理
ugydym
 
Salesforce AI + Data Community Tour Slides - Canarias
Salesforce AI + Data Community Tour Slides - CanariasSalesforce AI + Data Community Tour Slides - Canarias
Salesforce AI + Data Community Tour Slides - Canarias
davidpietrzykowski1
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
uevausa
 

Recently uploaded (20)

[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
[VCOSA] Monthly Report - Cotton & Yarn Statistics March 2024
 
Ahmedabad Call Girls 7339748667 With Free Home Delivery At Your Door
Ahmedabad Call Girls 7339748667 With Free Home Delivery At Your DoorAhmedabad Call Girls 7339748667 With Free Home Delivery At Your Door
Ahmedabad Call Girls 7339748667 With Free Home Delivery At Your Door
 
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
06-20-2024-AI Camp Meetup-Unstructured Data and Vector Databases
 
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
PyData London 2024: Mistakes were made (Dr. Rebecca Bilbro)
 
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
Call Girls Goa👉9024918724👉Low Rate Escorts in Goa 💃 Available 24/7
 
Do People Really Know Their Fertility Intentions? Correspondence between Sel...
Do People Really Know Their Fertility Intentions?  Correspondence between Sel...Do People Really Know Their Fertility Intentions?  Correspondence between Sel...
Do People Really Know Their Fertility Intentions? Correspondence between Sel...
 
Interview Methods - Marital and Family Therapy and Counselling - Psychology S...
Interview Methods - Marital and Family Therapy and Counselling - Psychology S...Interview Methods - Marital and Family Therapy and Counselling - Psychology S...
Interview Methods - Marital and Family Therapy and Counselling - Psychology S...
 
Drownings spike from May to August in children
Drownings spike from May to August in childrenDrownings spike from May to August in children
Drownings spike from May to August in children
 
Health care analysis using sentimental analysis
Health care analysis using sentimental analysisHealth care analysis using sentimental analysis
Health care analysis using sentimental analysis
 
Bangalore ℂall Girl 000000 Bangalore Escorts Service
Bangalore ℂall Girl 000000 Bangalore Escorts ServiceBangalore ℂall Girl 000000 Bangalore Escorts Service
Bangalore ℂall Girl 000000 Bangalore Escorts Service
 
一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理一比一原版悉尼大学毕业证如何办理
一比一原版悉尼大学毕业证如何办理
 
Senior Software Profiles Backend Sample - Sheet1.pdf
Senior Software Profiles  Backend Sample - Sheet1.pdfSenior Software Profiles  Backend Sample - Sheet1.pdf
Senior Software Profiles Backend Sample - Sheet1.pdf
 
Sample Devops SRE Product Companies .pdf
Sample Devops SRE  Product Companies .pdfSample Devops SRE  Product Companies .pdf
Sample Devops SRE Product Companies .pdf
 
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
一比一原版多伦多大学毕业证(UofT毕业证书)学历如何办理
 
Digital Marketing Performance Marketing Sample .pdf
Digital Marketing Performance Marketing  Sample .pdfDigital Marketing Performance Marketing  Sample .pdf
Digital Marketing Performance Marketing Sample .pdf
 
How To Control IO Usage using Resource Manager
How To Control IO Usage using Resource ManagerHow To Control IO Usage using Resource Manager
How To Control IO Usage using Resource Manager
 
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
一比一原版(uob毕业证书)伯明翰大学毕业证如何办理
 
一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理一比一原版南昆士兰大学毕业证如何办理
一比一原版南昆士兰大学毕业证如何办理
 
Salesforce AI + Data Community Tour Slides - Canarias
Salesforce AI + Data Community Tour Slides - CanariasSalesforce AI + Data Community Tour Slides - Canarias
Salesforce AI + Data Community Tour Slides - Canarias
 
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
一比一原版加拿大渥太华大学毕业证(uottawa毕业证书)如何办理
 

Ia15 network situation awareness Lumeta Europe

  • 2. In Cybersecurity, The Network Doesn’t Lie Networks are increasingly dynamic and changing causing a 20% gap in network situational awareness • Constant upgrades, moves and changes • Spin-offs, mergers and acquisitions • Call back to TOR exit nodes • Invisible assets turned into malware infrastructure • Unmanaged & Unsecured Devices • Digital economy causing infrastructure transitions to: • Mobile from fixed • Virtual from physical • DevOps in the cloud • Software defined networks & datacenter IP Addresses Awareness 100% 1,000K100K10K
  • 5. Validate No Access to Known Malware C2 Servers • Determine whether or not active security controls prevent call back to known botnet/command and control networks and servers
  • 6. Validate No Access to Known TOR Exit Nodes • Determine whether or not active security controls prevent call back to TOR exit nodes (TOR – The Onion Router/Dark Web Infrastructure)
  • 7. Zombie Hunting • Determine whether or not any trusted/enterprise assets are malware infrastructure or part of blacklists/dropnets/ Shadowserver/attacker lists
  • 8. Internal TOR Relays/Bridges • Determine whether or not any trusted/enterprise assets are/ were acting as TOR relays/ bridges
  • 9. Use/Accessibility of Trojan/Malware Ports • Determine whether or not any trusted/enterprise assets are utilizing ports associated with Trojans, Malware, and attack lateralization
  • 10. Network Attack Emulation Solution • Intelligence-led test environment mimics the actions of cyber attackers with full traceability and reporting • Use of Lumeta innocuous malware protects the end user during testing • We are partnering with European PENTEST partners - Please contact us for more information