SlideShare a Scribd company logo
SIGS _ Dec 2014 
Security Interest Group Switzerland
Risk Analytics – One Intelligent View 
Thomas Wendrich, Director CEUR, Skybox Security 
Simon Roe, EMEA Channel Presales Director 
November 2014 
www.skyboxsecurity.com 
thomas.wendrich@skyboxsecurity.com 
+49 40 31979956
Agenda 
 Cyber Risk - The Management Challenge 
– Facts and Figures 
 Live Demo 
 Summary 
© 2014 Skybox Security Inc. 3
Lloyds Risk Index 2013 
“The World Catches Up With Cyber Risk” 
“It appears that businesses across the world have 
encountered a partial reality check about the 
degree of cyber risk. 
Their sense of preparedness to deal with the level 
of risk, however, still appears remarkably 
complacent.” 
© 2014 Skybox Security Inc. 4
Verizon Data Breach Investigations Reports 
 Incidents tripled over last 
year’s already much 
increased number 
 97% of breaches were 
avoidable through simple or 
intermediate controls (2012) 
© 2014 Skybox Security Inc. 5
Security Management is Challenging Today 
Problems our customers face 
 Too much output from security tools 
 Lack of visibility across silos 
 Maintaining continuous compliance 
 Making agile and secure changes 
 Understanding risk implications 
 Evolving threat landscape 
© 2014 Skybox Security Inc. 6
Seeing the Battlefield 
“The battlefield is a scene of constant chaos. The winner will be the one who 
controls that chaos , both his own and the enemies” NAPOLEON BONAPARTE 
© 2014 Skybox Security Inc. 7
Risk Analytics For Cyber Security? 
© 2014 Skybox Security Inc. 8
Attackers Understand Your Attack Surface 
…You Don’t 
Expansion Drivers 
Vulnerabilities 
Endpoints 
Exploits 
Network access 
© 2014 Skybox Security Inc. 9 
Contraction Drivers 
Network segmentation 
Fixing vulnerabilities 
Technical controls 
Hours to attack, months to defend
Recent Snowden Leak Backs This Up 
KEY 
OBJECTIVE! 
Source – TED Talk October 2013 – Mikko Hyponnen, Chief Risk Officer F-Secure 
© 2014 Skybox Security Inc. 10
Is there a solution? 
© 2014 Skybox Security Inc. 11
Use Risk Analytics to Understand Your 
Attack Surface—Continuously 
Network Visibility: 
Topology 
Routing 
Policies 
Firewalls 
© 2014 Skybox Security Inc. 12 
Endpoints Visibility: 
Software 
Patches 
Vulnerabilities 
Classification 
Attack Vectors 
Risk Metrics 
Remediation Plans 
Network Visualization 
Contextual Analysis
Agenda 
 Live Demo – Simon Roe 
– Overview 
© 2014 Skybox Security Inc. 13
Agenda 
 Summary 
– Thomas Wendrich 
© 2014 Skybox Security Inc. 14
What Do You See?
Combine Data & Give It Battlefield Context 
√ 80+ Vendors integrated with Skybox 
© 2014 Skybox Security Inc. 16
Skybox – A Critical Component of Next 
Generation Cyber SOC Design 
Cyber Security Analysts 
IT-GRC - Integrated Security Dashboard & Reporting 
Risk Analytics 
Security intelligence to 
minimize risk exposure 
© 2014 Skybox Security Inc. 17 
Security Information & 
Event Management 
Event monitoring to detect 
& respond to incidents
Skybox Company Snapshot 
Leading provider of risk analytics solutions for security management & cyber defense 
© 2014 Skybox Security Inc. 18 
Founded 2002 
Revenue Growth 50%+ 
Customers 400+ 
Countries 40 
Headquarters San Jose 
R&D Center Israel 
Identify security gaps in minutes, not weeks
400+ Enterprise Customers in 40+ Countries 
Financial 
Services 
© 2014 Skybox Security Inc. 19 
Technology Healthcare 
Government 
& Defense 
Consumer 
Service 
Providers 
Energy & 
Utilities
Network Security Management with Skybox 
© 2014 Skybox Security Inc. 20 
Monitor 
Compliance 
Model Network 
Understand network 
context 
Analyze 
Firewalls 
Manage 
Changes 
 Rule and 
configuration 
checks 
 Access path 
analysis 
 Rule optimization 
 Change tracking 
 Automated audits 
 PCI DSS 
 FISMA 
 NERC 
 NIST 
 Custom Policies 
Automate security 
assessments 
Verify controls 
continuously 
Change 
Request 
Tech 
Details 
Assess 
Risks 
Make 
Change 
Reconcile 
Verify 
Optimize change 
process 
 Network 
topology view 
 Normalize data 
from 70+ systems 
 Access simulation
© 2014 Skybox Security Inc. 21
SIGS _ Dec 2014 
Security Interest Group Switzerland 
Thomas Wendrich, Director CEUR, Skybox Security 
Simon Roe, EMEA Channel Presales Director 
November 2014 
www.skyboxsecurity.com 
thomas.wendrich@skyboxsecurity.com 
+49 40 31979956

More Related Content

What's hot

Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Skybox Security
 
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...Skybox Security
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the CloudAlert Logic
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management Skybox Security
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Alert Logic
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Skycure
 
Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyQualys
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Qualys
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
Shared Security Responsibility in the AWS Public Cloud
Shared Security Responsibility in the AWS Public CloudShared Security Responsibility in the AWS Public Cloud
Shared Security Responsibility in the AWS Public CloudAlert Logic
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesSkycure
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate BrochureQualys
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Alert Logic
 

What's hot (20)

Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
 
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Check Point and Accenture Webinar
Check Point and Accenture Webinar Check Point and Accenture Webinar
Check Point and Accenture Webinar
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
 
2015 Security Report
2015 Security Report 2015 Security Report
2015 Security Report
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Shared Security Responsibility in the AWS Public Cloud
Shared Security Responsibility in the AWS Public CloudShared Security Responsibility in the AWS Public Cloud
Shared Security Responsibility in the AWS Public Cloud
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 

Viewers also liked

A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...
A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...
A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...Xiaoling (Sean) Yu Ph.D.
 
Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013Brian Crotty
 
Stress Testing
Stress TestingStress Testing
Stress Testingnikatmalik
 
HCL Technologies parsentation
HCL Technologies parsentationHCL Technologies parsentation
HCL Technologies parsentationCBSMS
 
Stress Testing the Loan Portfolio
Stress Testing the Loan PortfolioStress Testing the Loan Portfolio
Stress Testing the Loan PortfolioLibby Bierman
 
Big Data Analytics: Ashwin Malshe Talk
Big Data Analytics: Ashwin Malshe TalkBig Data Analytics: Ashwin Malshe Talk
Big Data Analytics: Ashwin Malshe TalkAshwin Malshe
 
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...accenture
 
CCAR & DFAST: How to incorporate stress testing into banking operations + str...
CCAR & DFAST: How to incorporate stress testing into banking operations + str...CCAR & DFAST: How to incorporate stress testing into banking operations + str...
CCAR & DFAST: How to incorporate stress testing into banking operations + str...Grant Thornton LLP
 
Customer Portfolio Segmentation for Finance
Customer Portfolio Segmentation for FinanceCustomer Portfolio Segmentation for Finance
Customer Portfolio Segmentation for FinanceDun & Bradstreet
 
Organizational Design - HCL Technologies
Organizational Design - HCL TechnologiesOrganizational Design - HCL Technologies
Organizational Design - HCL TechnologiesGautam Mahesh
 
Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...
Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...
Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...NAFCU Services Corporation
 
HR / Talent Analytics
HR / Talent AnalyticsHR / Talent Analytics
HR / Talent AnalyticsAkshay Raje
 

Viewers also liked (17)

A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...
A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...
A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...
 
FENG CCAR DFAST BASELIII_real(2)
FENG CCAR DFAST BASELIII_real(2)FENG CCAR DFAST BASELIII_real(2)
FENG CCAR DFAST BASELIII_real(2)
 
Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013
 
SOX 2016 - PART I - COSO 2013
SOX 2016 - PART I - COSO 2013SOX 2016 - PART I - COSO 2013
SOX 2016 - PART I - COSO 2013
 
Stress Testing
Stress TestingStress Testing
Stress Testing
 
HCL Technologies parsentation
HCL Technologies parsentationHCL Technologies parsentation
HCL Technologies parsentation
 
Stress Testing the Loan Portfolio
Stress Testing the Loan PortfolioStress Testing the Loan Portfolio
Stress Testing the Loan Portfolio
 
Big Data Analytics: Ashwin Malshe Talk
Big Data Analytics: Ashwin Malshe TalkBig Data Analytics: Ashwin Malshe Talk
Big Data Analytics: Ashwin Malshe Talk
 
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
 
CCAR & DFAST: How to incorporate stress testing into banking operations + str...
CCAR & DFAST: How to incorporate stress testing into banking operations + str...CCAR & DFAST: How to incorporate stress testing into banking operations + str...
CCAR & DFAST: How to incorporate stress testing into banking operations + str...
 
Risk Analysis for Dummies
Risk Analysis for DummiesRisk Analysis for Dummies
Risk Analysis for Dummies
 
Customer Portfolio Segmentation for Finance
Customer Portfolio Segmentation for FinanceCustomer Portfolio Segmentation for Finance
Customer Portfolio Segmentation for Finance
 
Hcl company ppt.
Hcl  company ppt.Hcl  company ppt.
Hcl company ppt.
 
Market Risk
Market RiskMarket Risk
Market Risk
 
Organizational Design - HCL Technologies
Organizational Design - HCL TechnologiesOrganizational Design - HCL Technologies
Organizational Design - HCL Technologies
 
Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...
Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...
Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...
 
HR / Talent Analytics
HR / Talent AnalyticsHR / Talent Analytics
HR / Talent Analytics
 

Similar to Risk Analytics: One Intelligent View

Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyMarketingArrowECS_CZ
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud SecuritySusanne Tedrick
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of thingsChristian Milde
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroSkycure
 
F secure presentation
F secure presentationF secure presentation
F secure presentationkwader Saudi
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San JoseMoshe Ferber
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudAlert Logic
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsSkycure
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudAlert Logic
 

Similar to Risk Analytics: One Intelligent View (20)

Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
Acronis for SAP
Acronis for SAPAcronis for SAP
Acronis for SAP
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 

More from Skybox Security

Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Skybox Security
 
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce RiskCAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce RiskSkybox Security
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSkybox Security
 
Infosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Firewall Change ManagementInfosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Firewall Change ManagementSkybox Security
 
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability DiscoveryInfosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability DiscoverySkybox Security
 
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Finding and Understanding the Risk Impact of Firewall ChangesInfosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Finding and Understanding the Risk Impact of Firewall ChangesSkybox Security
 
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Skybox Security
 
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecurityInfosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecuritySkybox Security
 
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkRSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkSkybox Security
 
RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply Skybox Security
 
Infographic: Are You Keeping Pace with Security Risks?
Infographic: Are You Keeping Pace with Security Risks?Infographic: Are You Keeping Pace with Security Risks?
Infographic: Are You Keeping Pace with Security Risks?Skybox Security
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Skybox Security
 
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 Best Practice Next-Generation Vulnerability Management to Identify Threats, ... Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...Skybox Security
 
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...Skybox Security
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013 Skybox Security
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Skybox Security
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Skybox Security
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurSkybox Security
 

More from Skybox Security (18)

Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce RiskCAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
 
Infosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Firewall Change ManagementInfosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Firewall Change Management
 
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability DiscoveryInfosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
 
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Finding and Understanding the Risk Impact of Firewall ChangesInfosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
 
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
 
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecurityInfosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
 
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkRSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
 
RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply
 
Infographic: Are You Keeping Pace with Security Risks?
Infographic: Are You Keeping Pace with Security Risks?Infographic: Are You Keeping Pace with Security Risks?
Infographic: Are You Keeping Pace with Security Risks?
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 Best Practice Next-Generation Vulnerability Management to Identify Threats, ... Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
 

Recently uploaded

一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单vcaxypu
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesStarCompliance.io
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...elinavihriala
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sMAQIB18
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundOppotus
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBAlireza Kamrani
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单ewymefz
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationBoston Institute of Analytics
 
How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?DOT TECH
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJames Polillo
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxbenishzehra469
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单nscud
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatheahmadsaood
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单ewymefz
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单ewymefz
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单ewymefz
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单enxupq
 

Recently uploaded (20)

一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
一比一原版(ArtEZ毕业证)ArtEZ艺术学院毕业证成绩单
 
Investigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_CrimesInvestigate & Recover / StarCompliance.io / Crypto_Crimes
Investigate & Recover / StarCompliance.io / Crypto_Crimes
 
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
2024-05-14 - Tableau User Group - TC24 Hot Topics - Tableau Pulse and Einstei...
 
Computer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage sComputer Presentation.pptx ecommerce advantage s
Computer Presentation.pptx ecommerce advantage s
 
Q1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year ReboundQ1’2024 Update: MYCI’s Leap Year Rebound
Q1’2024 Update: MYCI’s Leap Year Rebound
 
Using PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDBUsing PDB Relocation to Move a Single PDB to Another Existing CDB
Using PDB Relocation to Move a Single PDB to Another Existing CDB
 
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
一比一原版(UofM毕业证)明尼苏达大学毕业证成绩单
 
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project PresentationPredicting Product Ad Campaign Performance: A Data Analysis Project Presentation
Predicting Product Ad Campaign Performance: A Data Analysis Project Presentation
 
How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?How can I successfully sell my pi coins in Philippines?
How can I successfully sell my pi coins in Philippines?
 
Jpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization SampleJpolillo Amazon PPC - Bid Optimization Sample
Jpolillo Amazon PPC - Bid Optimization Sample
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
Empowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptxEmpowering Data Analytics Ecosystem.pptx
Empowering Data Analytics Ecosystem.pptx
 
Criminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdfCriminal IP - Threat Hunting Webinar.pdf
Criminal IP - Threat Hunting Webinar.pdf
 
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
一比一原版(CBU毕业证)不列颠海角大学毕业证成绩单
 
tapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive datatapal brand analysis PPT slide for comptetive data
tapal brand analysis PPT slide for comptetive data
 
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
一比一原版(UPenn毕业证)宾夕法尼亚大学毕业证成绩单
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单
 
Opendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptxOpendatabay - Open Data Marketplace.pptx
Opendatabay - Open Data Marketplace.pptx
 
一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单一比一原版(NYU毕业证)纽约大学毕业证成绩单
一比一原版(NYU毕业证)纽约大学毕业证成绩单
 
一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单一比一原版(QU毕业证)皇后大学毕业证成绩单
一比一原版(QU毕业证)皇后大学毕业证成绩单
 

Risk Analytics: One Intelligent View

  • 1. SIGS _ Dec 2014 Security Interest Group Switzerland
  • 2. Risk Analytics – One Intelligent View Thomas Wendrich, Director CEUR, Skybox Security Simon Roe, EMEA Channel Presales Director November 2014 www.skyboxsecurity.com thomas.wendrich@skyboxsecurity.com +49 40 31979956
  • 3. Agenda  Cyber Risk - The Management Challenge – Facts and Figures  Live Demo  Summary © 2014 Skybox Security Inc. 3
  • 4. Lloyds Risk Index 2013 “The World Catches Up With Cyber Risk” “It appears that businesses across the world have encountered a partial reality check about the degree of cyber risk. Their sense of preparedness to deal with the level of risk, however, still appears remarkably complacent.” © 2014 Skybox Security Inc. 4
  • 5. Verizon Data Breach Investigations Reports  Incidents tripled over last year’s already much increased number  97% of breaches were avoidable through simple or intermediate controls (2012) © 2014 Skybox Security Inc. 5
  • 6. Security Management is Challenging Today Problems our customers face  Too much output from security tools  Lack of visibility across silos  Maintaining continuous compliance  Making agile and secure changes  Understanding risk implications  Evolving threat landscape © 2014 Skybox Security Inc. 6
  • 7. Seeing the Battlefield “The battlefield is a scene of constant chaos. The winner will be the one who controls that chaos , both his own and the enemies” NAPOLEON BONAPARTE © 2014 Skybox Security Inc. 7
  • 8. Risk Analytics For Cyber Security? © 2014 Skybox Security Inc. 8
  • 9. Attackers Understand Your Attack Surface …You Don’t Expansion Drivers Vulnerabilities Endpoints Exploits Network access © 2014 Skybox Security Inc. 9 Contraction Drivers Network segmentation Fixing vulnerabilities Technical controls Hours to attack, months to defend
  • 10. Recent Snowden Leak Backs This Up KEY OBJECTIVE! Source – TED Talk October 2013 – Mikko Hyponnen, Chief Risk Officer F-Secure © 2014 Skybox Security Inc. 10
  • 11. Is there a solution? © 2014 Skybox Security Inc. 11
  • 12. Use Risk Analytics to Understand Your Attack Surface—Continuously Network Visibility: Topology Routing Policies Firewalls © 2014 Skybox Security Inc. 12 Endpoints Visibility: Software Patches Vulnerabilities Classification Attack Vectors Risk Metrics Remediation Plans Network Visualization Contextual Analysis
  • 13. Agenda  Live Demo – Simon Roe – Overview © 2014 Skybox Security Inc. 13
  • 14. Agenda  Summary – Thomas Wendrich © 2014 Skybox Security Inc. 14
  • 15. What Do You See?
  • 16. Combine Data & Give It Battlefield Context √ 80+ Vendors integrated with Skybox © 2014 Skybox Security Inc. 16
  • 17. Skybox – A Critical Component of Next Generation Cyber SOC Design Cyber Security Analysts IT-GRC - Integrated Security Dashboard & Reporting Risk Analytics Security intelligence to minimize risk exposure © 2014 Skybox Security Inc. 17 Security Information & Event Management Event monitoring to detect & respond to incidents
  • 18. Skybox Company Snapshot Leading provider of risk analytics solutions for security management & cyber defense © 2014 Skybox Security Inc. 18 Founded 2002 Revenue Growth 50%+ Customers 400+ Countries 40 Headquarters San Jose R&D Center Israel Identify security gaps in minutes, not weeks
  • 19. 400+ Enterprise Customers in 40+ Countries Financial Services © 2014 Skybox Security Inc. 19 Technology Healthcare Government & Defense Consumer Service Providers Energy & Utilities
  • 20. Network Security Management with Skybox © 2014 Skybox Security Inc. 20 Monitor Compliance Model Network Understand network context Analyze Firewalls Manage Changes  Rule and configuration checks  Access path analysis  Rule optimization  Change tracking  Automated audits  PCI DSS  FISMA  NERC  NIST  Custom Policies Automate security assessments Verify controls continuously Change Request Tech Details Assess Risks Make Change Reconcile Verify Optimize change process  Network topology view  Normalize data from 70+ systems  Access simulation
  • 21. © 2014 Skybox Security Inc. 21
  • 22. SIGS _ Dec 2014 Security Interest Group Switzerland Thomas Wendrich, Director CEUR, Skybox Security Simon Roe, EMEA Channel Presales Director November 2014 www.skyboxsecurity.com thomas.wendrich@skyboxsecurity.com +49 40 31979956

Editor's Notes

  1. Der Lloyds Risk Index Report von 2013. Wo steht ‘Cyber Risk’
  2. Remember from 2012 report – 97% of breaches were avoidable through simple or intermediate controls
  3. Alternative to slide #2 Key Points: Bring in some of the issues that you see with existing customers or specific industry challenges Today’s networks are more complex than ever, and that complexity impacts how you address vulnerability and threat management, network security management
  4. Battle of Austerlitz ... drawing which shows Napoleon directing the battle from Zuran Hill The view of the battlefield from the Zuran Hill, which was Napoleon's command post during the early stages of the battle, are to Austerlitz what the Lion Mound is to Waterloo. An excellent viewing platform. Despite the far from perfect weather the whole of the left and centre of the battlefield was laid out before us. From the Santon on our left, to the Post House directly in front and the Pratzen Heights on our right. True the area around Telnitz on the far right were out of sight, and true also that in the early stages of the battle this was a critical area. But the main French attack would be launched on the Pratzen Heights and this was an ideal observation platform for the coming attack.
  5. Battle of Austerlitz ... drawing which shows Napoleon directing the battle from Zuran Hill The view of the battlefield from the Zuran Hill, which was Napoleon's command post during the early stages of the battle, are to Austerlitz what the Lion Mound is to Waterloo. An excellent viewing platform. Despite the far from perfect weather the whole of the left and centre of the battlefield was laid out before us. From the Santon on our left, to the Post House directly in front and the Pratzen Heights on our right. True the area around Telnitz on the far right were out of sight, and true also that in the early stages of the battle this was a critical area. But the main French attack would be launched on the Pratzen Heights and this was an ideal observation platform for the coming attack.
  6. TED Talk October 2013 – Mikko Hyponnen
  7. Modelling, as so many industries have embraced
  8. Interviewer: I understand that the merger of [Company A] and [Company B] was a massive undertaking. What was the situation in 2009? Mr. Finan: Global financial situation in 2009, led to forced merger of [Company A] and [Company B], short time-frame, government oversight. Interviewer: What was the role of your IT team in all of this? Mr. Finan: Merge the two networks, both environments of 100,000 IP nodes each. Risk committee looking for a solution to merge the two networks and reduce risk.
  9. Skybox is able to integrate and work with data from nearly 80 different devices and systems, giving you the widest view of your Network and potential risks. When you’re a skybox customer, one of the perks is that you’ll have the most accurate view of your network, enabling you to respond correctly when faced with some difficult security questions.
  10. Effectively, the Risk Analytics component is what Gartner called out (Advanced Analytics) as the next opportunity for MSSPs *Monitoring of network intrusions in the context of customer vulnerabilities, computing the attack surfaces and understanding what needs to be done to PREVENT attacks *Targeted Attacks & APTs – same issue; like vulnerability assessment, malware detection
  11. Access simulation Automated firewall analytics Comprehensive network model: view the network topology and see the impact of security controls Access analysis: identify access paths to critical assets Compliance monitoring: show compliance against PCI, NIST and other requirements Firewall change management Products used in this solution: Firewall Assurance, Network Assurance, Change Manager Skybox provides a “next-generation” solution for Network Security Management that solves some of the main headaches in managing firewalls and other network devices. Skybox helps achieve and demonstrate compliance – as needed, to maintain continuous compliance with compliance regulations and organizational policies. Change Manager: Skybox provides a complete secure change workflow from an initial change request to planning and executing network changes, and making sure that changes are completed as requested. Skybox is based on technology that allows security teams to see the network topology, making it easier to see and understand the interaction of network devices, security controls, information assets, and policies