Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation...
Transcript of Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation...
![Page 1: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/1.jpg)
Disrupting the Revolution of Cyber-Threats with Revolutionary Security
![Page 2: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/2.jpg)
REVOLUTION
TODAY, YOU ARE EXPERIENCING A
OF CYBER-THREATS
![Page 3: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/3.jpg)
Targeting
So
ph
isticatio
n
2003–2004 2005–present 2012–beyond
![Page 4: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/4.jpg)
![Page 5: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/5.jpg)
Addressing the threats requires a new approach:
Security from the inside out – beyond bigger walls
RUIN THE ATTACKERS ECONOMIC MODEL
BREAK THE ATTACK PLAYBOOK
ELIMINATE THE VECTORS OF ATTACK
![Page 6: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/6.jpg)
Device Protection Information Protection Identity Protection
Windows 10 Security Approach
![Page 7: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/7.jpg)
Identity Protection
![Page 8: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/8.jpg)
SHARED SECRETS
shhh!
Easily mishandled or lost
(Hint: The user is the problem)
![Page 9: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/9.jpg)
Internet username and password
User
THE SITES WE USE ARE A WEAK LINK
Bad Guy
1
Social
.com
Bank
.com
Network
.com
LOL
.com
Obscure
.com 1
2
![Page 10: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/10.jpg)
LIMITED USE OF MFA CREATES WEAK LINKS
User
UN/Password
High-value assets
Most network resources
![Page 11: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/11.jpg)
![Page 12: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/12.jpg)
![Page 13: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/13.jpg)
WINDOWS HELLO
Facial
Hello Rick
Fingerprint Iris
![Page 14: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/14.jpg)
FIDO ALLIANCE
Board level members
![Page 15: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/15.jpg)
![Page 16: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/16.jpg)
![Page 17: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/17.jpg)
Information Protection
![Page 18: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/18.jpg)
Protects data when a device is lost or stolen using full disk encryption
Provides single sign on and protection from cold boot attacks
Easy to deploy and manageable at scale
Excellent integration, performance, and reliability
In process for FIPS 140-2 certification
BitLocker data protection
![Page 19: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/19.jpg)
2HIPPA Secure Now, “A look at the cost of healthcare data breaches,” Art Gross, March 30, 2012
Have accidentally sent sensitive information to the wrong person1
58%
…of senior managers admit to regularly uploading work files to a personal email or cloud account1
87%
Average per record cost of a data breach across all industries2
$240 PER
RECORD
1Stroz Friedberg, “On The Pulse: Information Security In American Business,” 2013
![Page 20: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/20.jpg)
DEVICE PROTECTION
DATA SEPARATION
LEAK PROTECTION
SHARING PROTECTION
Containment
BYOD separation
DATA SEPARATION
Prevent unauthorized apps from accessing data
LEAK PROTECTION
![Page 21: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/21.jpg)
HOW OTHERS ARE FILLING THE GAP: PAIN POINTS
![Page 22: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/22.jpg)
![Page 23: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/23.jpg)
Device Protection
![Page 24: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/24.jpg)
MICROSOFT CONFIDENTIAL – Internal Use Only
![Page 25: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/25.jpg)
Device Guard
Hardware Rooted App Control
Windows desktop can be locked down to only run trusted apps, just like many mobile OS’s (e.g.: Windows Phone)
Resistant to tampering by an administrator or malware
Requires devices specially configured by either the OEM or IT
Requires Windows Enterprise edition
Untrusted apps and executables, such as malware, are unable to run
![Page 26: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/26.jpg)
Threat Analysis
![Page 27: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/27.jpg)
$3.5M The average cost of a data breach to a company
200+ The median # of days that attackers reside within a victim’s network before detection
76% of all network intrusions are due to compromised user credentials
$500B The total potential cost of cybercrime to the global economy
![Page 28: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/28.jpg)
Detect threats fast with Behavioral
Analytics
Adapt as fast as your enemies
Focus on what is important fast
using the simple attack timeline
Reduce the fatigue of false positives
No need to create rules or policies,
deploy agents or monitoring a flood of
security reports. The intelligence needed
is ready to analyze and continuously
learning.
ATA continuously learns from the
organizational entity behavior (users,
devices, and resources) and adjusts
itself to reflect the changes in your
rapidly-evolving enterprise.
The attack timeline is a clear, efficient,
and convenient feed that surfaces the
right things on a timeline, giving you
the power of perspective on the
“who-what-when-and how” of your
enterprise. It also provides
recommendations for next steps
Alerts only happen once suspicious
activities are contextually
aggregated, not only comparing the
entity’s behavior to its own behavior,
but also to the profiles of other
entities in its interaction path.
![Page 29: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/29.jpg)
![Page 30: Disrupting the Revolution of Cyber-Threats with ... · OF CYBER-THREATS. Targeting cation 2003–2004 2005–present 2012–beyond . Addressing the threats requires a new approach:](https://reader035.fdocuments.us/reader035/viewer/2022062920/5f02ea037e708231d406a2bb/html5/thumbnails/30.jpg)