This 20 minute talk was delivered by Forcepoint Principal Security Analyst Carl Leonard at Infosecurity Europe 2018. Delivered to the Strategy track this talk provides a review of the macro trends affecting businesses today, reviews root cause of standout data breaches, highlights the security risk presented by employees, and offers guidance on how to protect your business from specific root causes.
Every single security company is talking about how they are using machine learning—as a security company you have to claim artificial intelligence to be even part of the conversation. However, this approach can be dangerous when we blindly rely on algorithms to do the right thing. Rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and, in turn, discovering wrong insights.
In this session, we will discuss:
• Limitations of machine learning and issues of explainability
• Where deep learning should never be applied
• Examples of how the blind application of algorithms can lead to wrong results
In this presentation Raffael Marty, VP of Research of Intelligence, Forcepoint X-Labs, explores the topic of Artificial Intelligence (AI) in cyber security. What is AI and how do we get to real intelligence in a cyber context? Raffael outlines some of the dangers of the way we are using algorithms (AI, Machine Learning) today and what that leads to. We then explore how we can add real intelligence through export knowledge to the problem of finding attackers and anomalies in our applications and networks.
Presented at AI 4 Cybersecurity in NYC on April 30, 2019
How is ai important to the future of cyber security Robert Smith
Today’s era is driven by technology in every aspect of our lives, so much that we’ve now increased our dependence on technology on a daily basis. With an increase in the dependency, we’re now very vulnerable and exposed to the intermittent threat posed as cyber-attacks. Cyber-attack threats have plagued businesses, corporates, governments, and institutions.
How Machine Learning & AI Will Improve Cyber SecurityDevOps.com
Machine Learning (ML) and Artificial Intelligence (AI) have been proclaimed as perhaps the next great leap in human quality of life, as well as a potential reason for our extinction. Somewhere in between lies how ML & AI can potentially improve our Cyber Security efforts. But are ML & AI a true panacea or merely the next shiny trinket for the cyber industry to fixate on? In this webinar we will explore:
How ML & AI are currently being utilized in cyber security efforts.
What is working and what has not worked
What is on the both the short term and near-term horizon for ML &AI
Practical steps you can take now to begin leveraging these technologies to tangibly improve your cyber security posture
Join our panel of industry experts as we explore this brave new frontier in cyber security with a candid look cutting through the hype.
With the increasingly connected world revolving around the revolution of internet and new technologies like mobiles, smartphones, and tablets, and with the wide usage of wireless technologies, the information security risks have increased. Both individuals and organizations are under regular attacks for commercial or non-commercial gains. The objectives of such attacks may be to take revenge, malign the reputation of a competitor organization, understand the strategies and sensitive information about the competitor, simply have fun of exploiting the vulnerabilities. Hence, the need to protect information assets and ensure information security receives adequate attention.
In this session, I will discuss how AI and Machine Learning can be applied in detecting, predicting and preventing cyber security/information security vulnerabilities and what are the benefits of using Machine Learning and AI. We also touch upon some of the tools available to perform the same.
Every single security company is talking about how they are using machine learning—as a security company you have to claim artificial intelligence to be even part of the conversation. However, this approach can be dangerous when we blindly rely on algorithms to do the right thing. Rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and, in turn, discovering wrong insights.
In this session, we will discuss:
• Limitations of machine learning and issues of explainability
• Where deep learning should never be applied
• Examples of how the blind application of algorithms can lead to wrong results
In this presentation Raffael Marty, VP of Research of Intelligence, Forcepoint X-Labs, explores the topic of Artificial Intelligence (AI) in cyber security. What is AI and how do we get to real intelligence in a cyber context? Raffael outlines some of the dangers of the way we are using algorithms (AI, Machine Learning) today and what that leads to. We then explore how we can add real intelligence through export knowledge to the problem of finding attackers and anomalies in our applications and networks.
Presented at AI 4 Cybersecurity in NYC on April 30, 2019
How is ai important to the future of cyber security Robert Smith
Today’s era is driven by technology in every aspect of our lives, so much that we’ve now increased our dependence on technology on a daily basis. With an increase in the dependency, we’re now very vulnerable and exposed to the intermittent threat posed as cyber-attacks. Cyber-attack threats have plagued businesses, corporates, governments, and institutions.
How Machine Learning & AI Will Improve Cyber SecurityDevOps.com
Machine Learning (ML) and Artificial Intelligence (AI) have been proclaimed as perhaps the next great leap in human quality of life, as well as a potential reason for our extinction. Somewhere in between lies how ML & AI can potentially improve our Cyber Security efforts. But are ML & AI a true panacea or merely the next shiny trinket for the cyber industry to fixate on? In this webinar we will explore:
How ML & AI are currently being utilized in cyber security efforts.
What is working and what has not worked
What is on the both the short term and near-term horizon for ML &AI
Practical steps you can take now to begin leveraging these technologies to tangibly improve your cyber security posture
Join our panel of industry experts as we explore this brave new frontier in cyber security with a candid look cutting through the hype.
With the increasingly connected world revolving around the revolution of internet and new technologies like mobiles, smartphones, and tablets, and with the wide usage of wireless technologies, the information security risks have increased. Both individuals and organizations are under regular attacks for commercial or non-commercial gains. The objectives of such attacks may be to take revenge, malign the reputation of a competitor organization, understand the strategies and sensitive information about the competitor, simply have fun of exploiting the vulnerabilities. Hence, the need to protect information assets and ensure information security receives adequate attention.
In this session, I will discuss how AI and Machine Learning can be applied in detecting, predicting and preventing cyber security/information security vulnerabilities and what are the benefits of using Machine Learning and AI. We also touch upon some of the tools available to perform the same.
Challenges in Applying AI to Enterprise CybersecurityTahseen Shabab
Applying AI/ML in live Cybersecurity environments can be challenging. We share some of our learnings and identify common pitfalls.
Bibu Labs is a leading Cybersecurity company leveraging AI to solve complex problems faced by Enterprise clients.
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
Let's take a look at implementations of AI or machine learning in the cybersecurity world. To know more: https://www.softwarefirms.co/blog/ai-and-machine-learning-in-cybersecurity-a-saviour-or-enemy?utm_source=Social+media&utm_medium=Traffic&utm_campaign=SR
In this presentation I explore the topic of artificial intelligence in cyber security. What is AI and how do we get to real intelligence in a cyber context. I outline some of the dangers of the way we are using algorithms (AI, ML) today and what that leads to. We then explore how we can add real intelligence through export knowledge to the problem of finding attackers and anomalies in our applications and networks.
Presented at AI 4 Cyber in NYC on April 30, 2019
From machine learning to deepfakes - how AI is revolutionizing cybersecurityInfosec
Artificial intelligence (AI) and machine learning are changing how cybercriminals carry out cyberattacks — and how cybersecurity professionals defend against them.
Join Infosec Skills author Emmanuel Tsukerman to get an inside look at these new technologies, their impact on cybersecurity and what it means for your career, including:
-Different attack methods that leverage machine learning
-Current and future uses of machine learning and AI within cybersecurity
-New skills and roles for cybersecurity professionals
-A live deepfake demonstration
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
Companies have AI projects. Security products use AI to keep attackers out and insiders at bay. But what is this "AI" that everyone talks about? In this talk we will explore what artificial intelligence in cyber security is, where the limitations and dangers are, and in what areas we should invest more in AI. We will talk about some of the recent failures of AI in security and invite a conversation about how we verify artificially intelligent systems to understand how much trust we can place in them.
Alongside the AI conversation, we will discover that we need to make a shift in our traditional approach to cyber security. We need to augment our reactive approaches of studying adversary behaviors to understanding behaviors of users and machines to inform a risk-driven approach to security that prevents even zero day attacks.
“AI is the new electricity” proclaims Andrew Ng, co-founder of Google Brain. Just as we need to know how to safely harness electricity, we also need to know how to securely employ AI to power our businesses. In some scenarios, the security of AI systems can impact human safety. On the flip side, AI can also be misused by cyber-adversaries and so we need to understand how to counter them.
This talk will provide food for thought in 3 areas:
Security of AI systems
Use of AI in cybersecurity
Malicious use of AI
This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness
The good, the bad, and the ugly on integration ai with cybersecurityMohammad Khreesha
AI is the simulation of human intelligence processes by machines, especially computer systems. These processes include learning, reasoning, and self-correction. Integrating it with Cybersecurity is beneficial because it improves how security experts analyze, study, and understand cyber-crime.
In this talk, we will discuss & explain AI and how to integrate it with Cybersecurity to detect many types of attacks. The talk will cover many applications in Cybersecurity in which we can apply AI to improve those applications. Finally, I will present a demo on how to build your development environment with some scripting examples.
Ashrith talks about whether it's time for the cyber security industry to start using AI to solve their challenges
- Powered by the open source machine learning software H2O.ai. Contributors welcome at: https://github.com/h2oai
- To view videos on H2O open source machine learning software, go to: https://www.youtube.com/user/0xdata
A technical seminar delivered on Machine learning in cybersecurity. Machine learning is trending and desired subject this presentation demonstrates how machine learning can be used to protect IT infrastructure
AI & ML in Cyber Security - Why Algorithms Are DangerousRaffael Marty
Every single security company is talking in some way or another about how they are applying machine learning. Companies go out of their way to make sure they mention machine learning and not statistics when they explain how they work. Recently, that's not enough anymore either. As a security company you have to claim artificial intelligence to be even part of the conversation.
Guess what. It's all baloney. We have entered a state in cyber security that is, in fact, dangerous. We are blindly relying on algorithms to do the right thing. We are letting deep learning algorithms detect anomalies in our data without having a clue what that algorithm just did. In academia, they call this the lack of explainability and verifiability. But rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and in turn discover wrong insights.
In this talk I will show the limitations of machine learning, outline the issues of explainability, and show where deep learning should never be applied. I will show examples of how the blind application of algorithms (including deep learning) actually leads to wrong results. Algorithms are dangerous. We need to revert back to experts and invest in systems that learn from, and absorb the knowledge, of experts.
The Future of Security: How Artificial Intelligence Will Impact UsPECB
For decades, the security profession has relied on the best technology we had at the time to deflect the onslaught of what we faced daily in the way of virus and malware attacks. Now, as predicted by Thomas Kuhn in his book “The Structure of Scientific Revolutions, we’re seeing the dawn of a new day where AI’s machine learning and advanced mathematical algorithms now offer validated deflection rates, pre-execution, in the realm of 99%. This session will explore this new paradigm and how it will impact our future.
Main points covered:
• How did our profession change in the world of reactive detection?
• How to escape the inertia that held us, prisoners?
• What is the power of AI and machine learning?
• What are the risks of this new technology?
Presenter:
Our presenter for this webinar, John McClurg serves as Vice President and Ambassador-At-Large of Cylance, where he is responsible for building Security and Trust programs & operational excellence efforts. Prior to Cylance, he served as the CSO of Dell, Honeywell, and Lucent and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation (FBI). He also served as a Deputy Branch Chief of CIA where he helped to establish the new Counterespionage Group and was responsible for the management of complex counterespionage investigations. McClurg was voted one of America’s 25 most influential security professionals.
Organizer: Ardian Berisha
Date: October 25th, 2018
Recorded webinar link:
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Interset
At the 2018 CRIAQ RDV Forum, Interset Director of Field Operations Jay Lillie presented on Interset's mission to apply principled math and data science to cybersecurity in order to detect insider threats.
Security Analytics and Big Data: What You Need to KnowMapR Technologies
The number of attacks on organization's' IT infrastructure are continuously increasing. It is becoming more and more difficult to identify unknown threats, in particular. This problem requires the ability to store more data and better tools to analyze the data.
Learn in this webinar why big data is enabling new security analytics solutions and why the MapR Quick Start Solution for Security Analytics offers an easy starting point for faster and deeper security analytics.
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteInterset
Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture.
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Cybereason
Security analytics, what is real and examined the promise, the hype and the real state of artificial intelligence, machine learning and data science in solving fundamental security problems.
In depth presentation covers market trends and risks related to network security & big data analytics. The presentation was given by Matan Trogan at Cybertech Singapore.
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
Presentation at Pulse 2014 as part of the session, "Enhance Your Identity and Access Management Solution with Integrations from Key IBM Technology Partners"
Speaker:
Russell Tait, Prolifics
Join a panel of IBM technology partners to learn about new and exciting Identity and Access Management (IAM) integrations that have been validated through the Ready for IBM Security Intelligence program. In this slide deck, IBM technology partner, Prolifics, discusses how their integrations with key areas of the IBM Security portfolio increase solution value for customers. The panel discussion will cover strong authentication, mobile, cloud, and security intelligence use cases.
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
cybersecurity - You Are Being Targeted
Business executive with high-level management and hands-on analytical skill sets and over 27 years of professional experience in technical solutions and service offering development and implementation, organizational strategies for efficiency, cost controls, and bottom-line profitability, multi-million dollar enterprise-wide client engagements, compliance with schedule, budget, and quality requirements, hiring and leadership of high-performance IT employees.
Keyven Lewis, CMIT SOLUTIONS- Cybersecurity - You Are Being Targeted.
An overview to help SMB owners understand the dynamics (exp. the who, the why, and the how) of cybersecurity as it relates to their business.
Challenges in Applying AI to Enterprise CybersecurityTahseen Shabab
Applying AI/ML in live Cybersecurity environments can be challenging. We share some of our learnings and identify common pitfalls.
Bibu Labs is a leading Cybersecurity company leveraging AI to solve complex problems faced by Enterprise clients.
AI and Machine Learning In Cybersecurity | A Saviour or Enemy?SahilRao25
Let's take a look at implementations of AI or machine learning in the cybersecurity world. To know more: https://www.softwarefirms.co/blog/ai-and-machine-learning-in-cybersecurity-a-saviour-or-enemy?utm_source=Social+media&utm_medium=Traffic&utm_campaign=SR
In this presentation I explore the topic of artificial intelligence in cyber security. What is AI and how do we get to real intelligence in a cyber context. I outline some of the dangers of the way we are using algorithms (AI, ML) today and what that leads to. We then explore how we can add real intelligence through export knowledge to the problem of finding attackers and anomalies in our applications and networks.
Presented at AI 4 Cyber in NYC on April 30, 2019
From machine learning to deepfakes - how AI is revolutionizing cybersecurityInfosec
Artificial intelligence (AI) and machine learning are changing how cybercriminals carry out cyberattacks — and how cybersecurity professionals defend against them.
Join Infosec Skills author Emmanuel Tsukerman to get an inside look at these new technologies, their impact on cybersecurity and what it means for your career, including:
-Different attack methods that leverage machine learning
-Current and future uses of machine learning and AI within cybersecurity
-New skills and roles for cybersecurity professionals
-A live deepfake demonstration
Artificial Intelligence – Time Bomb or The Promised Land?Raffael Marty
Companies have AI projects. Security products use AI to keep attackers out and insiders at bay. But what is this "AI" that everyone talks about? In this talk we will explore what artificial intelligence in cyber security is, where the limitations and dangers are, and in what areas we should invest more in AI. We will talk about some of the recent failures of AI in security and invite a conversation about how we verify artificially intelligent systems to understand how much trust we can place in them.
Alongside the AI conversation, we will discover that we need to make a shift in our traditional approach to cyber security. We need to augment our reactive approaches of studying adversary behaviors to understanding behaviors of users and machines to inform a risk-driven approach to security that prevents even zero day attacks.
“AI is the new electricity” proclaims Andrew Ng, co-founder of Google Brain. Just as we need to know how to safely harness electricity, we also need to know how to securely employ AI to power our businesses. In some scenarios, the security of AI systems can impact human safety. On the flip side, AI can also be misused by cyber-adversaries and so we need to understand how to counter them.
This talk will provide food for thought in 3 areas:
Security of AI systems
Use of AI in cybersecurity
Malicious use of AI
This deck is from Interpol Conference 2017, these slides shows the holistic view of machine learning in cyber security for better organization readiness
The good, the bad, and the ugly on integration ai with cybersecurityMohammad Khreesha
AI is the simulation of human intelligence processes by machines, especially computer systems. These processes include learning, reasoning, and self-correction. Integrating it with Cybersecurity is beneficial because it improves how security experts analyze, study, and understand cyber-crime.
In this talk, we will discuss & explain AI and how to integrate it with Cybersecurity to detect many types of attacks. The talk will cover many applications in Cybersecurity in which we can apply AI to improve those applications. Finally, I will present a demo on how to build your development environment with some scripting examples.
Ashrith talks about whether it's time for the cyber security industry to start using AI to solve their challenges
- Powered by the open source machine learning software H2O.ai. Contributors welcome at: https://github.com/h2oai
- To view videos on H2O open source machine learning software, go to: https://www.youtube.com/user/0xdata
A technical seminar delivered on Machine learning in cybersecurity. Machine learning is trending and desired subject this presentation demonstrates how machine learning can be used to protect IT infrastructure
AI & ML in Cyber Security - Why Algorithms Are DangerousRaffael Marty
Every single security company is talking in some way or another about how they are applying machine learning. Companies go out of their way to make sure they mention machine learning and not statistics when they explain how they work. Recently, that's not enough anymore either. As a security company you have to claim artificial intelligence to be even part of the conversation.
Guess what. It's all baloney. We have entered a state in cyber security that is, in fact, dangerous. We are blindly relying on algorithms to do the right thing. We are letting deep learning algorithms detect anomalies in our data without having a clue what that algorithm just did. In academia, they call this the lack of explainability and verifiability. But rather than building systems with actual security knowledge, companies are using algorithms that nobody understands and in turn discover wrong insights.
In this talk I will show the limitations of machine learning, outline the issues of explainability, and show where deep learning should never be applied. I will show examples of how the blind application of algorithms (including deep learning) actually leads to wrong results. Algorithms are dangerous. We need to revert back to experts and invest in systems that learn from, and absorb the knowledge, of experts.
The Future of Security: How Artificial Intelligence Will Impact UsPECB
For decades, the security profession has relied on the best technology we had at the time to deflect the onslaught of what we faced daily in the way of virus and malware attacks. Now, as predicted by Thomas Kuhn in his book “The Structure of Scientific Revolutions, we’re seeing the dawn of a new day where AI’s machine learning and advanced mathematical algorithms now offer validated deflection rates, pre-execution, in the realm of 99%. This session will explore this new paradigm and how it will impact our future.
Main points covered:
• How did our profession change in the world of reactive detection?
• How to escape the inertia that held us, prisoners?
• What is the power of AI and machine learning?
• What are the risks of this new technology?
Presenter:
Our presenter for this webinar, John McClurg serves as Vice President and Ambassador-At-Large of Cylance, where he is responsible for building Security and Trust programs & operational excellence efforts. Prior to Cylance, he served as the CSO of Dell, Honeywell, and Lucent and in the U.S. Intelligence Community, as a twice-decorated member of the Federal Bureau of Investigation (FBI). He also served as a Deputy Branch Chief of CIA where he helped to establish the new Counterespionage Group and was responsible for the management of complex counterespionage investigations. McClurg was voted one of America’s 25 most influential security professionals.
Organizer: Ardian Berisha
Date: October 25th, 2018
Recorded webinar link:
Innovation in Cybersecurity [Montreal 2018 CRIAQ RDV Forum]Interset
At the 2018 CRIAQ RDV Forum, Interset Director of Field Operations Jay Lillie presented on Interset's mission to apply principled math and data science to cybersecurity in order to detect insider threats.
Security Analytics and Big Data: What You Need to KnowMapR Technologies
The number of attacks on organization's' IT infrastructure are continuously increasing. It is becoming more and more difficult to identify unknown threats, in particular. This problem requires the ability to store more data and better tools to analyze the data.
Learn in this webinar why big data is enabling new security analytics solutions and why the MapR Quick Start Solution for Security Analytics offers an easy starting point for faster and deeper security analytics.
Operationalizing Big Data Security Analytics - IANS Forum Toronto KeynoteInterset
Presented by Stephan Jou, Interset CTO, at IANS Forum Toronto 2018, this presentation explores how companies can operationalize security analytics with Interset's threat detection platform, which distills billions of events into a handful of prioritized threat leads through unsupervised machine learning and an open source, big data architecture.
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Cybereason
Security analytics, what is real and examined the promise, the hype and the real state of artificial intelligence, machine learning and data science in solving fundamental security problems.
In depth presentation covers market trends and risks related to network security & big data analytics. The presentation was given by Matan Trogan at Cybertech Singapore.
Identity intelligence: Threat-aware Identity and Access ManagementProlifics
Presentation at Pulse 2014 as part of the session, "Enhance Your Identity and Access Management Solution with Integrations from Key IBM Technology Partners"
Speaker:
Russell Tait, Prolifics
Join a panel of IBM technology partners to learn about new and exciting Identity and Access Management (IAM) integrations that have been validated through the Ready for IBM Security Intelligence program. In this slide deck, IBM technology partner, Prolifics, discusses how their integrations with key areas of the IBM Security portfolio increase solution value for customers. The panel discussion will cover strong authentication, mobile, cloud, and security intelligence use cases.
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONSRandall Chase
cybersecurity - You Are Being Targeted
Business executive with high-level management and hands-on analytical skill sets and over 27 years of professional experience in technical solutions and service offering development and implementation, organizational strategies for efficiency, cost controls, and bottom-line profitability, multi-million dollar enterprise-wide client engagements, compliance with schedule, budget, and quality requirements, hiring and leadership of high-performance IT employees.
Keyven Lewis, CMIT SOLUTIONS- Cybersecurity - You Are Being Targeted.
An overview to help SMB owners understand the dynamics (exp. the who, the why, and the how) of cybersecurity as it relates to their business.
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...Rishi Singh
Presentation on the 2015-2016 State of Cybersecurity and Third Party Vendor Risk Management, presented by Matt Pascussi and Rishi Singh.
This presentation was sponsored by TekSystems.
Topics covered during the briefing include:
Key Privacy, Cybersecurity, IT Audit, and Compliance Challenges for Healthcare
Updates on New Privacy and Compliance Laws and What They Change/Impact
Trending Cybersecurity Threats in the Healthcare Industry Trending Best Practices
Real-World Examples of Recent Incidents and Key Takeaways from Each
Outlook to the Top Issues for 2022
Data loss is considered by security experts to be one of the most serious threats that businesses currently face.
Maintaining the confidentiality of personal information and data is an essential factor in operating a successful business. People must be able to trust that their service provider takes the appropriate measures to implement security controls that will ultimately protect their privacy.
However, some of the largest and most reputable organizations have fallen victim to data loss security breaches resulting in significant legal, financial, and reputation loss, including [1]:
The Bank of America: Losing the personal employee information of over one million employees
The United States Government: Losing data related to the military
Heartland Payment Systems: Transferring credit card information and other personal records of over 130 million customers
In 2013, it was estimated that data breaches had resulted in the exploitation of over 800 million personal records [2]. This number is also expected to rise over the next several years given the advanced tools that cybercriminals use to steal information and data.
Interestingly, it is not just cybercriminals who represent a threat as:
64% of data loss is caused by well-meaning insiders.
50% of employees leave with data.
$3.5 million average cost of a security breach.
Considering these extensive data breaches, it is practical for organizations to understand where their critical data is located and understanding current security controls that can stop data loss.
Data Loss Prevention (DLP) solutions locate critical and personal data for organizations and help prevent data loss. By having a deeper understanding of efficient DLP security controls, you will help protect the reputation of your organization.
For more information contact: rkopaee@riskview.ca
https://www.threatview.ca
http://www.riskview.ca
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
The landscape of threats to sensitive data is changing. New technologies bring with them new vulnerabilities, and organizations like Target are failing to adapt to the shifts around them.
What’s needed is an approach equal to the persistent, advanced attacks companies face every day. The sooner we start adopting the same proactive thinking hackers are using to get at our data, the better we will be able to protect it.
In this webinar, Protegrity CTO and data security thought leader Ulf Mattsson integrates new information from the Verizon 2014 Data Breach Investigation Report (DBIR) into his analysis on what is driving data breaches today, and how we can prevent them in the future.
KEY TOPICS INCLUDE:
• The changing threat landscape
• The effects of new technologies on breaches
• Analysis of recent breaches, including Target
• Compliance vs. security
• The importance of shifting from reactive to proactive thinking
• Preparing for future attacks with new technology & techniques
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
Most cybersecurity professionals know the CIS Top Five Critical Security Controls. Yet, the evidence that they are effective is slim. Using data on cyber-incidents, researchers looked at the attack paths used by adversaries and determined what controls could have disrupted these attack paths. The result is a new set of critical controls that organizations should implement on a priority basis.
Learning Objectives:
1: Understand evidence-based approach to selecting controls.
2: Understand why the “new top five” controls were selected.
3: Chart a pathway to implementing the new top five controls.
(Source: RSA Conference USA 2018)
One afternoon. Nine pitches. Who will get your 'investment'?
Enter the CyberDen and take your place in the dragon's seat. We're sending in eight leading cyber security vendors who will pitch their solutions to try and pique your interest.
We've rounded up some of the biggest names in the industry and exciting new players to provide you with an informative and relaxed afternoon. The RSA Vaults act as the perfect setting to make you feel like you're stepping in the den. You can then vote to 'invest' in the pitches that impress you or excite your interest.
INFOGRAPHIC: IS YOUR PATIENT DATA PROTECTED?Diaspark
According to OCR, there were 253 breaches affecting 500 individuals or more w/ a combined loss of over 112M records. Healthcare Failing to secure their data
48% encountered a data breach or failed a compliance audit in the last 12 months
26% are protecting data because of a past data breach
138% jump in number of breached healthcare records since 2012
The estimated cost for HIPAA breaches since 2009 has reached over 31 billion dollars.
Healthcare IT Challenges
42% of 2014 data breaches were in healthcare
90% of healthcare organizations have had at least 1 data breach in past 2 years
40% report that they have had more than 5 incidents of the entire U.S population was impacted by cybercrime in 9 months
Healthcare Cost of Breach
29% Reputation and brand damage
21% lost productivity
19% Lost Revenue
12% Forensics
10% Technical Support
8% Compliance Regulatory
With Data breaches expected to reach $2.1 trillion globally by 2019, which is four times the expected cost for cybercrime in 2015, It's apparent that a new approach to data security is needed if organizations are to stay ahead of the attackers and more effectively protect their intellectual property, data, customer information, employees, and their bottom lines against data breaches in the future
Contact us to learn how to safeguard against such breaches and implement it security strategy.
Corporate Treasurers Focus on Cyber SecurityJoan Weber
Treasury departments at large U.S. companies rank IT security as their top priority for 2015 - ahead of such critical issues as cost management and regulatory/compliance challenges.
These finding come from the results Greenwich Associates 2014 U.S. Large Corporate Finance Study, for which the firm interviewed CFOs or treasury department representatives at more than 500 large U.S. companies.
The study results suggest that U.S. companies are taking action to address security concerns and other IT issues with 63% of the participants saying their treasury departments will increase technology spending in the year ahead.
Gene Scriven, Chief Information Security Officer at Sabre Corporation, discussed the biggest threats to today’s enterprises during his presentation at the 2015 Chief Information Officer Leadership Forum in Dallas on March 11. In his presentation, “Top 12 Threats to Enterprise – aka ‘Gene’s Dirty Dozen,’” Scriven pointed out that information security is a major problem for many organizations, but there are several ways that organizations can protect themselves against myriad cyber threats.
IT security threats for next year will be introducing new players while bringing back some old ones (with a few new twists). The 2015 threat landscape — It's complicated.
The top 5 IT security threats for 2015 include more insider breaches, more crime as a service, and more reputation sabotage.
Presentacion realizada en Argentina y Paraguay Durante Marzo 2014.
En Argentina por Faustino Sanchez. En Paraguay por Santiago Cavanna.
Trata sobre el problema de la presencia de vulnerabilidades en aplicaciones, el impacto que tiene en las organizaciones y la forma que se encuentra disponible para descubrirlas en forma temprana y facilitar su remediacion
Links disponibles en
http://www.santiagocavanna.com/segurinfo-2014-el-costo-oculto-de-las-aplicaciones-vulnerables/
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing the Impact of a Breach
Encryption has been viewed as the ultimate way to protect sensitive data for compliance. But it has also been considered very complex to implement. Today, encryption is essential to meet compliance objectives, and has become much simpler to implement. The challenge is knowing when and where to use encryption, how it can simplify compliance, what controls need to be in place, and the options for good encryption key management. This session will cover the options for encryption and key management, what each provides, and their requirements. Encryption and key management topics include application-level encryption for data in use, network encryption of data in motion, and storage encryption for data at rest.
Similar to One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data Breaches (20)
Rethinking the concept of trust (DoDIIS 2019 presentation)Forcepoint LLC
Eric Trexler, Vice President of Global Governments & Critical Infrastructure at Forcepoint spoke at DoDIIS 2019. He described how trust is changing, and offered advice for agencies to considering how to balance trust and security.
Sparking Curiosity to Change Security BehaviorsForcepoint LLC
In this presentation Dr. Margaret Cunningham, Principal Research Scientist, Forcepoint X-Labs, explores the topic of curiosity in cybersecurity.
Curiosity is a powerful catalyst for behavioral changes, but for the most part, curiosity has been used to exploit users rather than to motivate positive security behaviors. This session explores the science of curiosity, provides examples of how curiosity increases security risks, and discusses strategies for using curiosity to increase engagement and positive security behaviors. Through this session attendees can apply strategies learned for motivating positive security behaviors as a means to mitigate risk and decrease alert fatigue within an organization.
Presented at Black Hat USA 2019 on Wednesday August 7, 2019.
Related blog: https://www.forcepoint.com/blog/x-labs/sparking-curiosity-change-security-behaviors-bhusa-2019-slides-and-summary
Weary Warriors: Reducing the Impact of Wishful Thinking & Fatigue on Informat...Forcepoint LLC
Wishful thinking won’t protect your data and systems. Without understanding two key psychological constructs, motivated reasoning and decision fatigue, people will continue to put their trust in software alone to keep their systems safe – and then shift responsibility for adverse events onto end users. For example, those impacted by motivated reasoning will reuse passwords without believing it might actually have an impact. People who experience decision fatigue avoid decisions or choose the least effortful action. However, there are steps organisations and individuals can take to recognise and cope with these parts of human nature – are you prepared?
Using Language Modeling to Verify User IdentitiesForcepoint LLC
How can we verify identity using unstructured data from a user device? While biometrics like fingerprinting and facial recognition are often used for authentication, research around natural language processing has found people's use of language as uniquely identifying.
In this session, we will discuss multiple facets of language modeling:
• Efficacy on different kinds of unstructured text within a corporate network
• As a technique to detect anomalous user activity, compromised accounts, and stolen credentials
• As an integral part of a cybersecurity program in addition to UEBA and risk-adaptive protection
Driving the successful adoption of Microsoft Office 365Forcepoint LLC
For enterprise and mid-sized companies who have deployed Office 365 but have not realized the full value of their investment, Forcepoint removes the barriers to full adoption by enhancing security and compliance, taking back unsanctioned IT, and implementing the right architecture.
Is your security solution having trouble keeping up? Explore what a modern security solution looks like—built to tackle the evolving threat landscape while adapting to today’s global, mobile workforce.
Addressing Future Risks and Legal Challenges of Insider ThreatsForcepoint LLC
Get an in-depth analysis of the framework of insider threats, its legal considerations and global privacy implications, and best practices to build an effective insider threat program.
A Predictive “Precrime” Approach Requires a Human FocusForcepoint LLC
In Philip K. Dick’s 1956 “The Minority Report,” murder ceased to occur due to the work of the “Precrime Division,” that anticipated and prevented killings before they happened. Today, we are only beginning to see the impact of predictive analytics upon cybersecurity – especially for insider threat detection and prevention. Based on user interaction with data, CISOs and their teams emerge as the IT equivalent of a Precrime Division, empowered to intervene before a violation is ever committed. Discover the technologies which make predictive analytics valuable, along with ethically minded guidance to strike the balance between vigilance and privacy.
A pirate used to have to show up on your shores, now they can stay on the other side of the world and still be a pirate. They are the mercenaries of the modern day – hackers who carry out crippling cyberattacks for personal gain, for political motivations, or perhaps on behalf of foreign governments, wittingly or unwittingly. The complexity of the problem also means there’s no simple answer for the global community. Mr. Daly looked at how we arrived at this convergence of actors and discussed efforts to get countries cooperating more effectively to prevent international cybercrime and bound cyber warfare.
Securing the Global Mission: Enabling Effective Information Sharing (DoD MPE-IS)Forcepoint LLC
The DoD Mission Partner Environment (MPE) enables Command and Control (C2) for operational support planning and execution – residing on a shared network infrastructure at a single security level with a common language. Rory Kinney, OSD DoD CIO, shared his perspectives on how an MPE capability allows Mission Partners (MPs) to share information with all participants within a specific partnership or coalition and the role MPE-IS plays in securing the global mission.
Security Insights for Mission-Critical NetworksForcepoint LLC
Networks are at the heart of the most critical missions. In environments where network availability and increased comprehensive security seem to be at odds, what are the options? Learn why traditional firewall solutions have been replaced with next gen technologies that mitigate the management burden while offering even more robust security and protection.
Maintaining Visibility and Control as Workers and Apps ScatterForcepoint LLC
Balancing productivity and security has been an age old challenge for IT. Nowadays, tight budgets and a shortage of skilled security personnel are further complicating the security equation at a time when mobile workers and cloud applications require effective defenses beyond traditional perimeters. Fortunately, there are new perspectives and best practices to help Government IT security leaders secure systems and users everywhere, with the same level of mission-critical protection that Federal networks require.
By 2025, millennials are projected to make up 75% of the total workforce. Organizations have been adapting their processes, policies and environments to match the millennial culture, but are they truly prepared to handle millennial technology practices? Michael Crouse – Forcepoint VP, Insider Threat explains.
Many organizations are struggling to combat advanced threats, focusing on what they should be doing to prevent these threats vs. creating a strategy to shift the burden. Josh Douglas, Chief Strategy Officer at Raytheon Foreground Security, talked about why shifting the burden matters in order to reduce dwell time and how you can make that happen by investing in user awareness training, assessments, incident response and threat hunting.
Guy Filippelli, CEO of RedOwl, shared observations and principles honed from experiences leading software teams in Afghanistan and Baghdad, and how such insights ought to be applied to increasingly complex data challenges in security analytics, with a particular focus on insider risk. Guy shared his views on topics such as the importance of vision, the criticality of diverse data, the empowerment of the analyst, and the role of analytics.
Theresa Payton discusses how security is fundamentally broken, because we're not focused on the human point. As employees, people want to have mobile experiences the same way they do as consumers. Workforces need the right tools to do their job, but ensure they're protected from the threats that come from mobile technology. It's time we embrace these technologies and empower our teams to make good choices as they interact with data.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
JMeter webinar - integration with InfluxDB and GrafanaRTTS
Watch this recorded webinar about real-time monitoring of application performance. See how to integrate Apache JMeter, the open-source leader in performance testing, with InfluxDB, the open-source time-series database, and Grafana, the open-source analytics and visualization application.
In this webinar, we will review the benefits of leveraging InfluxDB and Grafana when executing load tests and demonstrate how these tools are used to visualize performance metrics.
Length: 30 minutes
Session Overview
-------------------------------------------
During this webinar, we will cover the following topics while demonstrating the integrations of JMeter, InfluxDB and Grafana:
- What out-of-the-box solutions are available for real-time monitoring JMeter tests?
- What are the benefits of integrating InfluxDB and Grafana into the load testing stack?
- Which features are provided by Grafana?
- Demonstration of InfluxDB and Grafana using a practice web application
To view the webinar recording, go to:
https://www.rttsweb.com/jmeter-integration-webinar
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
One Year After WannaCry - Has Anything Changed? A Root Cause Analysis of Data Breaches
1. Carl Leonard, Principal Security Analyst
Forcepoint
One Year After
WannaCry - Has
Anything Changed?
A Root Cause
Analysis of Data
Breaches
2. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
We have to ask why…
• Are attackers improving?
• Are businesses getting worse (at
protecting data)?
It seems the likelihood of a breach is
increasing….
HaveIBeenPwned.com now holds >5bn
accounts.
Review your spend to minimise risk.
Cyber Security Is Failing
3. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
Define: breach
4. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
• A breach begins as an incident
• Not all incidents become breaches
GDPR:
…‘personal data breach’ means a breach of security leading to the
accidental or unlawful destruction, loss, alteration, unauthorised
disclosure of, or access to, personal data transmitted, stored or
otherwise processed;…
Breach vs Incident
5. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
Cast your mind back 2500 years to the
battle between the “300 Spartans” and
the Persian Empire.
An insider leaked details of an
alternative route around the mountain
pass, used by the 300, which
ultimately led to their downfall.
We need a way to adapt to risk as and
when that risk increases – from
whatever source.
History Repeats Itself
6. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
Are We Focusing On The Wrong Priorities?
Do we have our blinkers on when it
comes to the threat posed by stolen
credentials and malicious insiders?
If we are aware do we lack the
visibility and control that we must
have?
Forcepoint survey 2017 “What CISOs
Need To Know”:
• 11% of respondents admitted to
sending data to a third-party.
• 27% did not consider the security of
cloud apps before uploading data.
7. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
Macro Trends
Move to Cloud
Poor Heath of
Security Programs
Remote
Workers
8. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
Threat Landscape
Mandatory
Breach
Notification
Cloud
Applications
Cryptocurrency
Miners Seeking
CPU Power
Accidental,
Compromised &
Malicious Employees
9. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
Data Breach RCA
Industry Date Records Affected Information Lost Root Cause
Credit Reference
Agency
2017 147 million plus
records.
Email address, login credentials
(username, password, secret questions),
driving license number, phone number.
Patching Failure.
Mobile Telecoms
Provider
2015 3 million customers,
1000 employees.
Names, addresses, phone numbers,
dates of birth, marital status, historical
payment data.
Multiple inc.
Compromised
Credentials.
Startup 2017 Unknown. Intellectual Property. Malicious Insider
Social Media 2018 Unknown. Plain text passwords. Process Error.
Accounting 2017 Unknown. Data contained within emails. Lack of 2FA.
Healthcare
Insurance
2017 108,000 records. Names, DoB, contact info. Malicious Insider.
10. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
Data Breach RCA
Industry Date Records Affected Information Lost Root Cause Protection
Credit Reference
Agency
2017 147 million plus
records.
Email address, login credentials
(username, password, secret questions),
driving license number, phone number.
Patching Failure. Patch Management.
Mobile Telecoms
Provider
2015 3 million customers,
1000 employees.
Names, addresses, phone numbers,
dates of birth, marital status, historical
payment data.
Multiple inc.
Compromised
Credentials.
NGFW, DLP, UEBA, Risk-
Adaptive.
Startup 2017 Unknown. Intellectual Property. Malicious Insider DLP, UEBA, Risk-Adaptive.
Social Media 2018 Unknown. Plain text passwords. Process Error. Third-party tool.
Accounting 2017 Unknown. Data contained within emails. Lack of 2FA. UEBA, 2FA.
Healthcare
Insurance
2017 108,000 records. Names, DoB, contact info. Malicious Insider. DLP, UEBA, Risk-Adaptive.
11. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
Cyber Continuum Of Intent
Inadvertent
Behaviors
Poorly communicated
policies and user
awareness
Broken Business
Process
Data where it shouldn’t
be, not where it should
be
Rogue
Employee
Leaving the
company, poor
performance
review
Criminal Actor
Employees
Corporate espionage,
national espionage,
organized crime
Malware
Infections
Phishing targets,
breaches, BYOD
contamination
Stolen
Credentials
Credential exfiltration,
social engineering,
device control hygiene
MALICIOUS INSIDER COMPROMISED INSIDERACCIDENTAL INSIDER
12. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
5 KEY TAKE AWAYS
13. ONE YEAR AFTER WANNACRY – HAS ANYTHING CHANGED?
A ROOT CAUSE ANALYSIS OF DATA BREACHES
• 2018 is the “Year of Privacy Protection”
• You must test your GDPR-readiness. Conduct a table-top War
Game.
• Do you have an insider threat blindspot?
• Evaluate strengths at Identify-Protect-Detect-Respond-Recover.
• Consider a free “Cloud Threat Assessment”, see
https://forcepoint.com/cloud-threat-assessment
5 KEY TAKE AWAYS