SlideShare a Scribd company logo
1 of 53
Download to read offline
Scalar Security Roadshow
April 15, 2015
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 1
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 2
Vancouver Calgary
Toronto
Ottawa
London
Montreal
100%
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 3
We studied the Canadian market
Believe they are winning the
CyberSecurity war
Suffered a breach leading to loss or
disclosure of sensitive data
Average annual number of attacks
Average cost to address a security
breach
41%
46%
34
$200,000
•  Security is more complicated than ever;
hackers are funded and motivated
•  Many organizations struggle to understand
and effectively control security risk
•  Traditional security approaches have not
been effective
•  Companies who invest in security are still
suffering catastrophic breaches
Traditional Approaches Have Failed
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
“Good Enough” always fails
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
•  Are more aware of the threat landscape
•  Have a higher percentage of their IT
budget dedicated to security
•  Invest in cutting edge technologies
•  Measure the ROI of those technologies
•  And have a security strategy that is
aligned with their business objectives
and mission
High-performers – 25% less breaches
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
Be more aware of threats and align your security
strategy with business objectives. Build effective
security programs to protect critical assets.
Design and build robust security solutions using
leading technologies that provide visibility
understanding and control.
Develop or acquire expertise to monitor and respond
to security events. Continuously validate the
effectiveness of security controls.
What do Top Performers do?
Prepare
Respond
Defend
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 8
Winning The War
•  Addressing business risk
•  Effective reduction of attack surface
•  Understandable and actionable security
intelligence
•  Rapid incident containment and response
•  Continuous validation and meaningful reporting
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 9
Today’s Agenda
Isolated. Protected.
Bromium.
Security Architecture 1.0…
Traditional Security Technologies
ANY CO. PLC
usDon’t stop next generation threats
Endpoint: The Path of Least Resistance
THREAT TARGETS
DESKTOPS
USERS
WINDOWS 7
WINDOWS 8.1
LAPTOPS
INTERNET EXPLORER
The key security threat channels are Web
and Email. The key threat vectors are
web-links and downloaded files.
Your security posture is significantly
improved by negating the key security
issues of users clicking malicious web-
links and opening infected attachments
Prioritize
Focus
THREAT VECTORS
VIDEOS
PICTURES
DOCUMENTS
WEBLINKS
MAIL
WEB
THREAT CHANNELS
The Business Problem: The Bromium Cure
SECURE
WEB BROWSING
SECURE
EMAIL
SECURITY
PATCHING
Endpoint Isolation Technology
How It Works – Bromium
ISOLATED. PROTECTED.DISRUPTIVE DAMAGING
HARDWARE
OS KERNEL
Untrusted user tasks and any malware
are isolated in a super-efficient micro-VM.
All micro-VMs destroyed, eliminating all
traces of malware with them.
Hardware-isolated
micro-VMs
Why Bromium?
Open Anything,
From Anyone,
Anywhere…
Isolated. Protected.
WhiteHat Security
Application Testing
Rob Stonehouse, CISSP
Chief Security Architect
© 2014 Scalar Decisions Inc. Not for distribution outside of intended audience. 17
About WhiteHat Security
•  Application security testing leader in Gartner Magic Quadrant
•  HQ in Santa Clara, California
•  Employees: 300
•  Customers: 650+
•  Sites under management: 30,000+
18
SAST - “Sentinel Source” Static Testing
•  Integrates into your
development process
•  Directly connects to source
code repository
•  Designed for Agile
•  Your code stays onsite
•  Verified vulnerabilities avoid
false positives
•  Assesses partial code, as
often as needed
19
Sentinel Mobile - Secure Mobile Devices
§  Assesses both iOS and Android
applications
§  Tests native mobile code and server-side
APIs
§  Identifies critical vulnerabilities including
OWASP Mobile Top 10
§  Verified findings:
Zero false positives reduce overhead for
developers
Results prioritized by risk
§  Covers traffic analysis between client and
server-side
DAST – Dynamic Application Testing
•  Non-intrusive, non-disruptive, 24x7
coverage
•  Meets and exceeds PCI 6.5/6.6
requirements
•  Full service and support included in
all offerings
•  Unlimited retests, integration
support, and remediation guidance
at no additional charge
•  Persistent, consistent testing and
results
Cross-site scripting
Credential/Session
Prediction
Weak Password
Recovery Validation
Information Leakage
Brute Force
SQL Injection
Insufficient
Authentication
Application Security Lifecycle
Integrated Application
Security Lifecycle
Software
Development 
Lifecycle
SAST
22
How to Remediate Vulnerabilities?
Continuous Testing
•  Full SDLC coverage: training, development, QA, and
production
•  Stop using Tiger teams!
Expert hands-on guidance from the Threat Research Center
•  100% verified vulnerabilities, 0 false positives
•  150+ security engineers available by phone/email/WebEx
Retest, Retest, Retest
•  Trending of vulnerabilities across time and continuous
assessment of deployment
How Deep to Test?
§  Sentinel PE (Fully Targeted / High Risk)
•  Ideal for high impact sites with sensitive
user and financial information
•  Technical and business logic
vulnerabilities, complete WASC v2
§  Baseline Edition (Static Webpages)
•  Unauthenticated, Verified Results
§  Standard Edition (Directed/Opportunistic)
•  Custom configured logins and multi-step
sequences
•  Comprehensive coverage for technical
vulnerabilities
Scan Scheduling
27
© WhiteHat Security 2013 28
© WhiteHat Security 2013 29
Flexible Reporting
§  Web & PDF Based
§  Bi-Directional XML API
§  Integration with popular technologies like
Jira, Archer, F5 & Imperva
Command Execution
§  Buffer Overflow
§  Format String Attack
§  LDAP Injection
§  OS Commanding
§  SQL Injection
§  SSI Injection
§  XPath Injection
Information Disclosure
§  Directory Indexing
§  Information Leakage
§  Path Traversal
§  Predictable Resource Location
Business Logic: Hands-on Inspection
Authentication
§  Brute Force
§  Insufficient Authentication
§  Weak Password Recovery Validation
Authorization
§  Credential/Session Prediction
§  Insufficient Authorization
§  Insufficient Session Expiration
§  Session Fixation
Logical Attacks
§  Abuse of Functionality
§  Insufficient Anti-automation
§  Insufficient Process Validation
Premium Edition Baseline Edition Standard Edition
WhiteHat Sentinel Vulnerability Coverage
Client-Side
§  Content Spoofing
§  Cross-site Scripting
§  HTTP Response Splitting
§  Insecure Content
Protecting the Network with
LogRhythm
Nyron Samaroo, Security Architect
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 32
Introduction
Questions:
•  What is SIEM?
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 33
Answers:
•  Security Information and Event Management (SIEM) is a
tool used to gather and report on security information.
•  Who is LogRhythm?
•  LogRhythm is a global leader in security intelligence and
analytics empowering organizations to rapidly detect,
respond and neutralize cyber threats. Their Security
Intelligence platform unifies next-gen SIEM, log
management, network and endpoint forensics, and
advanced security analytics.
•  How will LogRhythm
defend my network?
•  Through the process of Intelligent and Behavioral
Analytics LogRhythm is capable of detecting and
protecting in near real-time security events not just on
the network but on critical assets residing on the
network.
LogRhythm in Motion
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 34
LogRhythm Agents
Workstations and Servers
Archiving
AI Engine
Log Manager
LogRhythm Personal
Dashboard / Web UI
Event Manager
Network Devices
Identification
Classification
Normalization
Prioritization
Aggregation
Events
Console
Reporting
Alarming
Configuration
Behavior Analytics /
Advanced Correlation
The Platform for Security Intelligence
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 35
Input Analytics Output
LogRhythm System Monitor
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 36
Host Activity Monitoring
•  Independently collects forensic detail
•  Ideal for hosts with sensitive data or critical applications
•  Support for Microsoft, Linux, and Unix platforms
File Integrity and
Windows Registry
Monitoring
•  Meet Compliance Requirements
•  Recognize “who” performed unauthorized
file changes or moves
•  Build whitelists for recognizing malware
or blacklists of undesired applications
•  Identify new, non-whitelisted network
services
•  Detect anomalous network activity
indicating data exfiltration or botnet C&C
•  Monitor unauthorized data movement to
prevent data theft
Process Monitoring
Network
Connection
Monitoring
Data Loss Defender
LogRhythm Network Monitor
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 37
1.  True Application Identification for over 2800
applications
2.  SmartFlow™: Search and analyze packet data from
each network session up to Layer7
3.  SmartCapture™: Full or selective packet capture
for deeper forensic analysis
Google Docs
PostGres
SMTP
Facebook Apps
TorSkype DropBox
XBoxLive
AWS
BitTorrent
GoToDevice
Gmail
Source IP: 192.168.12.59
Destination IP: 192.168.2.84
Command: smb2 change
Filename: SethMy Documents
todayspreso.ppt
Path: serverfileUsers
ApplicationPath: /tcp/netbios/smb
Login: seth.goldhammer
Bytes: 4.52 Mb
Time Start: 2013/10/10 19:30:38
Time Updated: 2013/10/10
………………
Samba
Source IP: 192.168.12.59
Destination IP: 192.168.18.2
Sender: seth@logrhythm.com
Receiver: kbroughton@recruiter.com
Attachment File Name: SethMy Docs
employeedata.txt
Mime Type: http/text
Bytes: 4.52 Mb
Time Start: 2013/10/10 19:30:38
Time Updated: 2013/10/10
………………
Real-time Forensic Monitoring
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 38
System Monitoring
•  Capture host activities not
represented by log data
•  Gain deep visibility on valuable
hosts, sensitive data
Network Monitoring
•  Capture network activities not
captured by standard flow data
•  Recognize applications and perform
Deep Packet Inspection (DPI) on all
network traffic
Independent collection of forensic detail is
CRITICAL for recognizing high risk activities
The Platform for Security Intelligence
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 39
Input Analytics Output
Data Classification
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 40
• LogRhythm not only structures incoming
data but adds contextual information
such as:
• Classification
• Common Event
• Risk Score
• Reduces time required for analysis and
ensures query results are complete
• Provides deep intelligence on more than
600 different systems, devices, apps,
databases, etc.
• 20-30 added each quarter
Confidential Information
0
100
200
300
400
500
600
700
Total
Customer Relations Management
Data Loss Prevention
File Integrity Monitor
Network Controllers
Unified Threat Managers
UPS
Anti-Spam
Physical Security
Encryption
Wireless Access Management
Vulnerability Assessment
Directory Services
Point-Of-Sale
VOIP
Storage
Virtualization
Wireless Access Point
Remote Access
VPN
E-Mail Security
Load Balancers
Content Inspection/Filters
Routers
Anti-Virus
Email Servers
Switch
Access Control
Other
Databases
Web Servers
Network Management
IDS/IPS
Firewalls
Applications
Operating Systems
Scenario Building Blocks
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 41
Log	
  Observed	
  
Log	
  Not	
  Observed	
  
Log	
  Not	
  Observed	
  
Scheduled	
  
Threshold	
  Observed	
  
Threshold	
  Not	
  Observed	
  
Threshold	
  Not	
  Observed	
  
Scheduled	
  
Unique	
  Value	
  Observed	
  
Unique	
  Value	
  	
  
Not	
  Observed	
  
Unique	
  Value	
  Not	
  
Observed	
  Scheduled	
  
Whitelist	
  
Trend	
  
Sta;s;cal	
  
Scenario Examples
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 42
Log	
  Observed	
  
Log	
  Observed	
  
Account	
  Created	
  
Account	
  Deleted	
  
Account=Account	
  
Short	
  ;me	
  period	
  
Log	
  Observed	
  
Log	
  Not	
  Observed	
  
Secure	
  Panel	
  Accessed	
  
No	
  Badge	
  Swipe	
  
Short	
  ;me	
  period	
  before	
  
Detec%ng	
  Temporary	
  Accounts	
   Detec%ng	
  Forced	
  Physical	
  Access	
  
Complex Scenario
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 43
Trend	
  
Abnormal	
  Access	
  and	
  Authen%ca%on	
  Failures	
  	
  
Log	
  count	
  
comparison	
  of	
  
auth	
  and	
  access	
  
failures	
  per	
  user	
  
Trend	
  
Abnormal	
  Authen%ca%on	
  Behavior	
  
Histogram	
  of	
  auth	
  
success	
  and	
  
failures	
  per	
  user	
  
Trend	
  
Abnormal	
  Authen%ca%on	
  Loca%ons	
  
Histogram	
  of	
  auth	
  
success	
  loca;ons	
  
per	
  user	
  
Unique	
  Value	
  Observed	
  
Same	
  user	
  
with	
  mul;ple	
  
anomalies	
  
Event	
  Loop	
  Back	
  
The Platform for Security Intelligence
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 44
Input Analytics Output
Smart Response (closing the loop)
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 45
SmartResponse™ delivers immediate
action on real-world issues, such as when
suspicious behavior patterns are detected,
specific internal or compliance-driven
policies are violated, or critical
performance thresholds are crossed.
•  Pull Attacking IP from Alarm and add to firewall
ACL. Terminating dangerous access to network
•  Suspend or remove newly added or recently
modified privileged user account until activity is
verified as legitimate
•  Remove suspicious users from network during
investigative period
•  Restart operational processes from alarms
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 46
Analytics Driven Defense Modules
Privileged User Monitoring
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 47
Use Case: Detect a rogue
administrator account
Details: Identify when a privileged
user is abusing authority, indicating
either insider threat activity or
compromised credentials
AIE Rules look for:
•  New Admin Activity
•  Mass Object Deletion
•  Users added to privileged group
•  Recently disabled privileged account activity
Retail Cyber Crime Module
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 48
Use Case: Detect Compromised Back
Office Systems
Details: Identify suspicious changes on
back office systems and the network
activity they generate.
AIE Rules look for:
•  New processes
•  New authentications
•  New FIM access events
•  Any FIM modification event
•  Any DLD Activity
•  New Common Event
•  New Network Activity
Analytics Modules
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 49
Rapid-Time
to-Value
Knowledge
•  Industry	
  experts	
  
•  Machine	
  Data	
  
Intelligence	
  
•  Security	
  
•  Compliance	
  	
  
•  Advanced	
  Threat	
  Research	
  
•  Embedded	
  Exper;se	
  
•  Ready-­‐to-­‐use	
  content	
  
•  Frequent,	
  automa;c	
  
updates	
  
•  Knowledge	
  aligned	
  to	
  
organiza;onal	
  goals	
  
•  Quick	
  benefit	
  
recogni;on	
  
•  Ongoing	
  addi;onal	
  value	
  
We deliver IT.
50© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. April 18, 2015
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 51
Thank you
Download our 2015 Security Study: The Cyber
Security Readiness of Canadian Organizations
Download Here: http://blog.scalar.ca/security-
study-2015
What’s Next?
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
Connect with us!
© 2014 Scalar Decisions Inc. 53
facebook.com/scalardecisions
@scalardecisions linkedin.com/company/scalar-decisions
slideshare.net/scalardecisions

More Related Content

What's hot

Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......centralohioissa
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJSherry Jones
 
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniOWASP Delhi
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2jeffirby
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessCloudPassage
 
GSS IT Infrastructure Transformation Services
GSS IT Infrastructure Transformation ServicesGSS IT Infrastructure Transformation Services
GSS IT Infrastructure Transformation ServicesMartin Gold
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Vladimir Jirasek
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudCloudHesive
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Dell World
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCCloudflare
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?QOS Networks
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud worldZscaler
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCaroline Hsieh
 

What's hot (19)

Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
 
Cloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav ChablaniCloud Security 101 by Madhav Chablani
Cloud Security 101 by Madhav Chablani
 
Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2Accelerated Saa S Exec Briefing V2
Accelerated Saa S Exec Briefing V2
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
 
GSS IT Infrastructure Transformation Services
GSS IT Infrastructure Transformation ServicesGSS IT Infrastructure Transformation Services
GSS IT Infrastructure Transformation Services
 
Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...Secure your cloud applications by building solid foundations with enterprise ...
Secure your cloud applications by building solid foundations with enterprise ...
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 
Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption Cloud security: Accelerating cloud adoption
Cloud security: Accelerating cloud adoption
 
Biznet Gio Presentation - Database Security
Biznet Gio Presentation - Database SecurityBiznet Gio Presentation - Database Security
Biznet Gio Presentation - Database Security
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDCDefending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
 
CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0CSA Security Guidance Cloud Computing v3.0
CSA Security Guidance Cloud Computing v3.0
 
What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?What is SASE and How Can Partners Talk About it?
What is SASE and How Can Partners Talk About it?
 
The evolution of IT in a cloud world
The evolution of IT in a cloud worldThe evolution of IT in a cloud world
The evolution of IT in a cloud world
 
Cloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service ManagementCloud Adoption - Journey of IT Service Management
Cloud Adoption - Journey of IT Service Management
 

Viewers also liked

Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...patmisasi
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck finalScalar Decisions
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Decisions
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Decisions
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storagepatmisasi
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...centralohioissa
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT InfrastructureScalar Decisions
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsSpredfast
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck finalScalar Decisions
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Decisions
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overviewpatmisasi
 
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...Thomas Wendt
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study RoadshowScalar Decisions
 
4000 sf downtown dt
4000 sf downtown   dt4000 sf downtown   dt
4000 sf downtown dtChris Fyvie
 

Viewers also liked (20)

Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Vancouver security road show master deck final
Vancouver   security road show master deck finalVancouver   security road show master deck final
Vancouver security road show master deck final
 
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging BrocadeScalar Technical session - Network Functions Virtualization leveraging Brocade
Scalar Technical session - Network Functions Virtualization leveraging Brocade
 
Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012Alfa Tech VestAsia 2012
Alfa Tech VestAsia 2012
 
Scalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker EntertainmentScalar customer case study: Rainmaker Entertainment
Scalar customer case study: Rainmaker Entertainment
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto StopScalar Security Roadshow - Toronto Stop
Scalar Security Roadshow - Toronto Stop
 
Scalar Decisions: Emerging Trends and Technologies in Storage
Scalar  Decisions: Emerging Trends and Technologies in StorageScalar  Decisions: Emerging Trends and Technologies in Storage
Scalar Decisions: Emerging Trends and Technologies in Storage
 
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
 
12210943 pss7
12210943 pss712210943 pss7
12210943 pss7
 
Optimize IT Infrastructure
Optimize IT InfrastructureOptimize IT Infrastructure
Optimize IT Infrastructure
 
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business ResultsConnect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
 
Calgary security road show master deck final
Calgary security road show master deck finalCalgary security road show master deck final
Calgary security road show master deck final
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Scalar Decisions 2013 Overview
Scalar Decisions 2013 OverviewScalar Decisions 2013 Overview
Scalar Decisions 2013 Overview
 
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
 
2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow2016 Scalar Security Study Roadshow
2016 Scalar Security Study Roadshow
 
4000 sf downtown dt
4000 sf downtown   dt4000 sf downtown   dt
4000 sf downtown dt
 

Similar to Scalar Security Roadshow: Toronto Presentation - April 15, 2015

DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513Tiffeny Price
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application SecurityJim Kaplan CIA CFE
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceSPAN Infotech (India) Pvt Ltd
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabiltiesSneha .
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 sucesuminas
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats Jim Kaplan CIA CFE
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecLalit Kale
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on itWSO2
 
Subscribed 2015: Architecture, Security, Scalability
Subscribed 2015: Architecture, Security, ScalabilitySubscribed 2015: Architecture, Security, Scalability
Subscribed 2015: Architecture, Security, ScalabilityZuora, Inc.
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 sebaSebastien Deleersnyder
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DaySymantec
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assessBirodh Rijal
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachRahul Neel Mani
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Scott Carlson
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnSamuel Reed
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 

Similar to Scalar Security Roadshow: Toronto Presentation - April 15, 2015 (20)

DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513DS_Sentinel_4pg_031513
DS_Sentinel_4pg_031513
 
Cyber security series Application Security
Cyber security series   Application SecurityCyber security series   Application Security
Cyber security series Application Security
 
Enterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and complianceEnterprise under attack dealing with security threats and compliance
Enterprise under attack dealing with security threats and compliance
 
CyberKnight capabilties
CyberKnight capabiltiesCyberKnight capabilties
CyberKnight capabilties
 
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05 Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
 
Cyber security series advanced persistent threats
Cyber security series   advanced persistent threats Cyber security series   advanced persistent threats
Cyber security series advanced persistent threats
 
For Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSecFor Business's Sake, Let's focus on AppSec
For Business's Sake, Let's focus on AppSec
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 
Cybersecurity update 12
Cybersecurity update 12Cybersecurity update 12
Cybersecurity update 12
 
Subscribed 2015: Architecture, Security, Scalability
Subscribed 2015: Architecture, Security, ScalabilitySubscribed 2015: Architecture, Security, Scalability
Subscribed 2015: Architecture, Security, Scalability
 
Solvay secure application layer v2015 seba
Solvay secure application layer v2015   sebaSolvay secure application layer v2015   seba
Solvay secure application layer v2015 seba
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
BATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdfBATbern48_How Zero Trust can help your organisation keep safe.pdf
BATbern48_How Zero Trust can help your organisation keep safe.pdf
 
Datasheet app vulnerability_assess
Datasheet app vulnerability_assessDatasheet app vulnerability_assess
Datasheet app vulnerability_assess
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Threat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a BreachThreat Exposure Management - Reduce your Risk of a Breach
Threat Exposure Management - Reduce your Risk of a Breach
 
Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?Just Trust Everyone and We Will Be Fine, Right?
Just Trust Everyone and We Will Be Fine, Right?
 
Cloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate OnCloud Security Zen: Principles to Meditate On
Cloud Security Zen: Principles to Meditate On
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 

More from Scalar Decisions

La transformation numérique de Scalar
La transformation numérique de ScalarLa transformation numérique de Scalar
La transformation numérique de ScalarScalar Decisions
 
2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study SummaryScalar Decisions
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar Decisions
 
Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016Scalar Decisions
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyScalar Decisions
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...Scalar Decisions
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Web scale with-nutanix_rev
Web scale with-nutanix_revWeb scale with-nutanix_rev
Web scale with-nutanix_revScalar Decisions
 
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...Scalar Decisions
 
Hyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of VirtualizationHyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of VirtualizationScalar Decisions
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.Scalar Decisions
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsScalar Decisions
 
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data CentreWhere Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data CentreScalar Decisions
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Scalar Decisions
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Decisions
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Decisions
 
Sheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudySheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudyScalar Decisions
 
City of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case StudyCity of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case StudyScalar Decisions
 

More from Scalar Decisions (20)

La transformation numérique de Scalar
La transformation numérique de ScalarLa transformation numérique de Scalar
La transformation numérique de Scalar
 
2017 Scalar Security Study Summary
2017 Scalar Security Study Summary2017 Scalar Security Study Summary
2017 Scalar Security Study Summary
 
Scalar cloud study2016_slideshare
Scalar cloud study2016_slideshareScalar cloud study2016_slideshare
Scalar cloud study2016_slideshare
 
Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016Résumé de l’étude sur la sécurité de Scalar 2016
Résumé de l’étude sur la sécurité de Scalar 2016
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Web scale with-nutanix_rev
Web scale with-nutanix_revWeb scale with-nutanix_rev
Web scale with-nutanix_rev
 
Cloudforms Workshop
Cloudforms WorkshopCloudforms Workshop
Cloudforms Workshop
 
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
 
XtremIO
XtremIOXtremIO
XtremIO
 
Hyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of VirtualizationHyperconverged Infrastructure: The Leading Edge of Virtualization
Hyperconverged Infrastructure: The Leading Edge of Virtualization
 
The road to clustered data ontap.
The road to clustered data ontap.The road to clustered data ontap.
The road to clustered data ontap.
 
The Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian OrganizationsThe Cyber Security Readiness of Canadian Organizations
The Cyber Security Readiness of Canadian Organizations
 
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data CentreWhere Technology Meets Medicine: SickKids High Performance Computing Data Centre
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
 
Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015Cyber Security trends and tactics for 2015
Cyber Security trends and tactics for 2015
 
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am GamesScalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Sheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case StudySheridan College: Scalar Customer Case Study
Sheridan College: Scalar Customer Case Study
 
City of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case StudyCity of Airdrie: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case Study
 

Recently uploaded

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 

Scalar Security Roadshow: Toronto Presentation - April 15, 2015

  • 1. Scalar Security Roadshow April 15, 2015 © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 1
  • 2. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 2 Vancouver Calgary Toronto Ottawa London Montreal 100%
  • 3. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 3 We studied the Canadian market Believe they are winning the CyberSecurity war Suffered a breach leading to loss or disclosure of sensitive data Average annual number of attacks Average cost to address a security breach 41% 46% 34 $200,000
  • 4. •  Security is more complicated than ever; hackers are funded and motivated •  Many organizations struggle to understand and effectively control security risk •  Traditional security approaches have not been effective •  Companies who invest in security are still suffering catastrophic breaches Traditional Approaches Have Failed © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
  • 5. “Good Enough” always fails © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
  • 6. •  Are more aware of the threat landscape •  Have a higher percentage of their IT budget dedicated to security •  Invest in cutting edge technologies •  Measure the ROI of those technologies •  And have a security strategy that is aligned with their business objectives and mission High-performers – 25% less breaches © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
  • 7. Be more aware of threats and align your security strategy with business objectives. Build effective security programs to protect critical assets. Design and build robust security solutions using leading technologies that provide visibility understanding and control. Develop or acquire expertise to monitor and respond to security events. Continuously validate the effectiveness of security controls. What do Top Performers do? Prepare Respond Defend © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
  • 8. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 8 Winning The War •  Addressing business risk •  Effective reduction of attack surface •  Understandable and actionable security intelligence •  Rapid incident containment and response •  Continuous validation and meaningful reporting
  • 9. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 9 Today’s Agenda
  • 11. Security Architecture 1.0… Traditional Security Technologies ANY CO. PLC usDon’t stop next generation threats
  • 12. Endpoint: The Path of Least Resistance THREAT TARGETS DESKTOPS USERS WINDOWS 7 WINDOWS 8.1 LAPTOPS INTERNET EXPLORER The key security threat channels are Web and Email. The key threat vectors are web-links and downloaded files. Your security posture is significantly improved by negating the key security issues of users clicking malicious web- links and opening infected attachments Prioritize Focus THREAT VECTORS VIDEOS PICTURES DOCUMENTS WEBLINKS MAIL WEB THREAT CHANNELS
  • 13. The Business Problem: The Bromium Cure SECURE WEB BROWSING SECURE EMAIL SECURITY PATCHING
  • 14. Endpoint Isolation Technology How It Works – Bromium ISOLATED. PROTECTED.DISRUPTIVE DAMAGING HARDWARE OS KERNEL Untrusted user tasks and any malware are isolated in a super-efficient micro-VM. All micro-VMs destroyed, eliminating all traces of malware with them. Hardware-isolated micro-VMs
  • 15. Why Bromium? Open Anything, From Anyone, Anywhere…
  • 17. WhiteHat Security Application Testing Rob Stonehouse, CISSP Chief Security Architect © 2014 Scalar Decisions Inc. Not for distribution outside of intended audience. 17
  • 18. About WhiteHat Security •  Application security testing leader in Gartner Magic Quadrant •  HQ in Santa Clara, California •  Employees: 300 •  Customers: 650+ •  Sites under management: 30,000+ 18
  • 19. SAST - “Sentinel Source” Static Testing •  Integrates into your development process •  Directly connects to source code repository •  Designed for Agile •  Your code stays onsite •  Verified vulnerabilities avoid false positives •  Assesses partial code, as often as needed 19
  • 20. Sentinel Mobile - Secure Mobile Devices §  Assesses both iOS and Android applications §  Tests native mobile code and server-side APIs §  Identifies critical vulnerabilities including OWASP Mobile Top 10 §  Verified findings: Zero false positives reduce overhead for developers Results prioritized by risk §  Covers traffic analysis between client and server-side
  • 21. DAST – Dynamic Application Testing •  Non-intrusive, non-disruptive, 24x7 coverage •  Meets and exceeds PCI 6.5/6.6 requirements •  Full service and support included in all offerings •  Unlimited retests, integration support, and remediation guidance at no additional charge •  Persistent, consistent testing and results Cross-site scripting Credential/Session Prediction Weak Password Recovery Validation Information Leakage Brute Force SQL Injection Insufficient Authentication
  • 22. Application Security Lifecycle Integrated Application Security Lifecycle Software Development Lifecycle SAST 22
  • 23. How to Remediate Vulnerabilities? Continuous Testing •  Full SDLC coverage: training, development, QA, and production •  Stop using Tiger teams! Expert hands-on guidance from the Threat Research Center •  100% verified vulnerabilities, 0 false positives •  150+ security engineers available by phone/email/WebEx Retest, Retest, Retest •  Trending of vulnerabilities across time and continuous assessment of deployment
  • 24. How Deep to Test? §  Sentinel PE (Fully Targeted / High Risk) •  Ideal for high impact sites with sensitive user and financial information •  Technical and business logic vulnerabilities, complete WASC v2 §  Baseline Edition (Static Webpages) •  Unauthenticated, Verified Results §  Standard Edition (Directed/Opportunistic) •  Custom configured logins and multi-step sequences •  Comprehensive coverage for technical vulnerabilities
  • 25.
  • 27. 27
  • 30. Flexible Reporting §  Web & PDF Based §  Bi-Directional XML API §  Integration with popular technologies like Jira, Archer, F5 & Imperva
  • 31. Command Execution §  Buffer Overflow §  Format String Attack §  LDAP Injection §  OS Commanding §  SQL Injection §  SSI Injection §  XPath Injection Information Disclosure §  Directory Indexing §  Information Leakage §  Path Traversal §  Predictable Resource Location Business Logic: Hands-on Inspection Authentication §  Brute Force §  Insufficient Authentication §  Weak Password Recovery Validation Authorization §  Credential/Session Prediction §  Insufficient Authorization §  Insufficient Session Expiration §  Session Fixation Logical Attacks §  Abuse of Functionality §  Insufficient Anti-automation §  Insufficient Process Validation Premium Edition Baseline Edition Standard Edition WhiteHat Sentinel Vulnerability Coverage Client-Side §  Content Spoofing §  Cross-site Scripting §  HTTP Response Splitting §  Insecure Content
  • 32. Protecting the Network with LogRhythm Nyron Samaroo, Security Architect © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 32
  • 33. Introduction Questions: •  What is SIEM? © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 33 Answers: •  Security Information and Event Management (SIEM) is a tool used to gather and report on security information. •  Who is LogRhythm? •  LogRhythm is a global leader in security intelligence and analytics empowering organizations to rapidly detect, respond and neutralize cyber threats. Their Security Intelligence platform unifies next-gen SIEM, log management, network and endpoint forensics, and advanced security analytics. •  How will LogRhythm defend my network? •  Through the process of Intelligent and Behavioral Analytics LogRhythm is capable of detecting and protecting in near real-time security events not just on the network but on critical assets residing on the network.
  • 34. LogRhythm in Motion © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 34 LogRhythm Agents Workstations and Servers Archiving AI Engine Log Manager LogRhythm Personal Dashboard / Web UI Event Manager Network Devices Identification Classification Normalization Prioritization Aggregation Events Console Reporting Alarming Configuration Behavior Analytics / Advanced Correlation
  • 35. The Platform for Security Intelligence © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 35 Input Analytics Output
  • 36. LogRhythm System Monitor © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 36 Host Activity Monitoring •  Independently collects forensic detail •  Ideal for hosts with sensitive data or critical applications •  Support for Microsoft, Linux, and Unix platforms File Integrity and Windows Registry Monitoring •  Meet Compliance Requirements •  Recognize “who” performed unauthorized file changes or moves •  Build whitelists for recognizing malware or blacklists of undesired applications •  Identify new, non-whitelisted network services •  Detect anomalous network activity indicating data exfiltration or botnet C&C •  Monitor unauthorized data movement to prevent data theft Process Monitoring Network Connection Monitoring Data Loss Defender
  • 37. LogRhythm Network Monitor © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 37 1.  True Application Identification for over 2800 applications 2.  SmartFlow™: Search and analyze packet data from each network session up to Layer7 3.  SmartCapture™: Full or selective packet capture for deeper forensic analysis Google Docs PostGres SMTP Facebook Apps TorSkype DropBox XBoxLive AWS BitTorrent GoToDevice Gmail Source IP: 192.168.12.59 Destination IP: 192.168.2.84 Command: smb2 change Filename: SethMy Documents todayspreso.ppt Path: serverfileUsers ApplicationPath: /tcp/netbios/smb Login: seth.goldhammer Bytes: 4.52 Mb Time Start: 2013/10/10 19:30:38 Time Updated: 2013/10/10 ……………… Samba Source IP: 192.168.12.59 Destination IP: 192.168.18.2 Sender: seth@logrhythm.com Receiver: kbroughton@recruiter.com Attachment File Name: SethMy Docs employeedata.txt Mime Type: http/text Bytes: 4.52 Mb Time Start: 2013/10/10 19:30:38 Time Updated: 2013/10/10 ………………
  • 38. Real-time Forensic Monitoring © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 38 System Monitoring •  Capture host activities not represented by log data •  Gain deep visibility on valuable hosts, sensitive data Network Monitoring •  Capture network activities not captured by standard flow data •  Recognize applications and perform Deep Packet Inspection (DPI) on all network traffic Independent collection of forensic detail is CRITICAL for recognizing high risk activities
  • 39. The Platform for Security Intelligence © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 39 Input Analytics Output
  • 40. Data Classification © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 40 • LogRhythm not only structures incoming data but adds contextual information such as: • Classification • Common Event • Risk Score • Reduces time required for analysis and ensures query results are complete • Provides deep intelligence on more than 600 different systems, devices, apps, databases, etc. • 20-30 added each quarter Confidential Information 0 100 200 300 400 500 600 700 Total Customer Relations Management Data Loss Prevention File Integrity Monitor Network Controllers Unified Threat Managers UPS Anti-Spam Physical Security Encryption Wireless Access Management Vulnerability Assessment Directory Services Point-Of-Sale VOIP Storage Virtualization Wireless Access Point Remote Access VPN E-Mail Security Load Balancers Content Inspection/Filters Routers Anti-Virus Email Servers Switch Access Control Other Databases Web Servers Network Management IDS/IPS Firewalls Applications Operating Systems
  • 41. Scenario Building Blocks © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 41 Log  Observed   Log  Not  Observed   Log  Not  Observed   Scheduled   Threshold  Observed   Threshold  Not  Observed   Threshold  Not  Observed   Scheduled   Unique  Value  Observed   Unique  Value     Not  Observed   Unique  Value  Not   Observed  Scheduled   Whitelist   Trend   Sta;s;cal  
  • 42. Scenario Examples © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 42 Log  Observed   Log  Observed   Account  Created   Account  Deleted   Account=Account   Short  ;me  period   Log  Observed   Log  Not  Observed   Secure  Panel  Accessed   No  Badge  Swipe   Short  ;me  period  before   Detec%ng  Temporary  Accounts   Detec%ng  Forced  Physical  Access  
  • 43. Complex Scenario © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 43 Trend   Abnormal  Access  and  Authen%ca%on  Failures     Log  count   comparison  of   auth  and  access   failures  per  user   Trend   Abnormal  Authen%ca%on  Behavior   Histogram  of  auth   success  and   failures  per  user   Trend   Abnormal  Authen%ca%on  Loca%ons   Histogram  of  auth   success  loca;ons   per  user   Unique  Value  Observed   Same  user   with  mul;ple   anomalies   Event  Loop  Back  
  • 44. The Platform for Security Intelligence © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 44 Input Analytics Output
  • 45. Smart Response (closing the loop) © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 45 SmartResponse™ delivers immediate action on real-world issues, such as when suspicious behavior patterns are detected, specific internal or compliance-driven policies are violated, or critical performance thresholds are crossed. •  Pull Attacking IP from Alarm and add to firewall ACL. Terminating dangerous access to network •  Suspend or remove newly added or recently modified privileged user account until activity is verified as legitimate •  Remove suspicious users from network during investigative period •  Restart operational processes from alarms
  • 46. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 46 Analytics Driven Defense Modules
  • 47. Privileged User Monitoring © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 47 Use Case: Detect a rogue administrator account Details: Identify when a privileged user is abusing authority, indicating either insider threat activity or compromised credentials AIE Rules look for: •  New Admin Activity •  Mass Object Deletion •  Users added to privileged group •  Recently disabled privileged account activity
  • 48. Retail Cyber Crime Module © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 48 Use Case: Detect Compromised Back Office Systems Details: Identify suspicious changes on back office systems and the network activity they generate. AIE Rules look for: •  New processes •  New authentications •  New FIM access events •  Any FIM modification event •  Any DLD Activity •  New Common Event •  New Network Activity
  • 49. Analytics Modules © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 49 Rapid-Time to-Value Knowledge •  Industry  experts   •  Machine  Data   Intelligence   •  Security   •  Compliance     •  Advanced  Threat  Research   •  Embedded  Exper;se   •  Ready-­‐to-­‐use  content   •  Frequent,  automa;c   updates   •  Knowledge  aligned  to   organiza;onal  goals   •  Quick  benefit   recogni;on   •  Ongoing  addi;onal  value  
  • 50. We deliver IT. 50© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. April 18, 2015
  • 51. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 51 Thank you
  • 52. Download our 2015 Security Study: The Cyber Security Readiness of Canadian Organizations Download Here: http://blog.scalar.ca/security- study-2015 What’s Next? © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
  • 53. Connect with us! © 2014 Scalar Decisions Inc. 53 facebook.com/scalardecisions @scalardecisions linkedin.com/company/scalar-decisions slideshare.net/scalardecisions