CYBER ATTACKS DON T DISCRIMINATE. Michael Purcell, Systems Engineer Manager

Similar documents
Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

Software-Defined Secure Networks in Action

Reducing the Cost of Incident Response

Top 10 most important IT priorities over the next 12 months. (Percent of respondents, N=633, ten responses accepted)

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

85% 89% 10/5/2018. Do You Have A Firewall Around Your Cloud? Conquering The Big Threats & Challenges

Securing Digital Transformation

THE ACCENTURE CYBER DEFENSE SOLUTION

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Best Practices in Securing a Multicloud World

Cylance Axiom Alliances Program

Catch an Active Cyber Attack in minutes

Why Most IoT Projects Fail And how to ensure success with OSIsoft and Cisco Kinetic

Beyond Firewalls: The Future Of Network Security

ForeScout Extended Module for Splunk

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

Software-Defined Secure Networks. Sergei Gotchev April 2016

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Managed Endpoint Defense

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Pedal to the Metal: Mitigating New Threats Faster with Rapid Intel and Automation

How Vectra Cognito enables the implementation of an adaptive security architecture

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

WHITE PAPER. Applying Software-Defined Security to the Branch Office

Build a Software-Defined Network to Defend your Business

ADVANCED THREAT PREVENTION FOR ENDPOINT DEVICES 5 th GENERATION OF CYBER SECURITY

Strategies for a Successful Security and Digital Transformation

MOBILE SECURITY 2017 SPOTLIGHT REPORT. Information Security PRESENTED BY. Group Partner

Technology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 04/12/2017

Mitigating Branch Office Risks with SD-WAN

ISE Cyber Security UCITS Index (HUR)

Building an Effective Threat Intelligence Capability. Haider Pasha, CISSP, C EH Director, Security Strategy Emerging Markets Office of the CTO

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Software Defined Secure Networks

Security Operations in Flux

Technology Roadmap for Managed IT and Security. Michael Kirby II, Scott Yoshimura 05/24/2017

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Building an Integrated Security Platform for the Future

Security in India: Enabling a New Connected Era

Advanced Threat Intelligence to Detect Advanced Malware Jim Deerman

Are we breached? Deloitte's Cyber Threat Hunting

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

May the (IBM) X-Force Be With You

esendpoint Next-gen endpoint threat detection and response

2018 Cyber Security Predictions

GDPR: An Opportunity to Transform Your Security Operations

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

The Need For A New IT Security Architecture: Global Study On The Risk Of Outdated Technologies

Vectra Cognito Automating Security Operations with AI

ForeScout ControlFabric TM Architecture

An Aflac Case Study: Moving a Security Program from Defense to Offense

A Fabric Approach to Network Security

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Automated Threat Management - in Real Time. Vectra Networks

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

A New Security Model for the IoE World. Henry Ong SE Manager - ASEAN Cisco Global Security Sales Organization

6 KEY SECURITY REQUIREMENTS

How your network can take on the cloud and win. Think beyond traditional networking toward a secure digital perimeter

Software-Define Secure Networks The Future of Network Security for Digital Learning

Stay Ahead of Cybercrime:

Securing the SMB Cloud Generation

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

Intelligent and Secure Network

HEALTH CARE AND CYBER SECURITY:

THE CRITICAL COMMUNICATIONS COMPANY CYBER SECURITY AS A SERVICE

Microsoft Finland. Microsoft in Finland is a strong millennial, born ,000+ partners generating 8 $ revenue per each $ by MSFT

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Spotlight Report. Information Security. Presented by. Group Partner

CloudSOC and Security.cloud for Microsoft Office 365

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

SOLUTION BRIEF RSA NETWITNESS PLATFORM ACCELERATED THREAT DETECTION & AUTOMATED RESPONSE FROM THE ENDPOINT TO THE CLOUD

Managed Enterprise Phishing Protection. Comprehensive protection delivered 24/7 by anti-phishing experts

Gladiator Incident Alert

Verizon Software Defined Perimeter (SDP).

ENDPOINT SECURITY AND THE CLOUD: HOW TO APPLY PREDICTIVE ANALYTICS AND BIG DATA

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

Juniper Sky Advanced Threat Prevention

Sophos Central for partners and customers: overview and new features. Jonathan Shaw Senior Product Manager, Sophos Central

BUILDING AND MAINTAINING SOC

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Building a Threat Intelligence Program

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Service Provider View of Cyber Security. July 2017

Retail Security in a World of Digital Touchpoint Complexity

JUNIPER SKY ADVANCED THREAT PREVENTION

Incident Response Agility: Leverage the Past and Present into the Future

Traditional Security Solutions Have Reached Their Limit

MITIGATE CYBER ATTACK RISK

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Orchestrating and Automating Trend Micro TippingPoint and IBM QRadar

Accelerating into the Turn

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

Agile Security Solutions

Transcription:

CYBER ATTACKS DON T DISCRIMINATE Michael Purcell, Systems Engineer Manager

THREAT LANDSCAPE IS HUGE AND ORGANIZED $8 TRILLION Will be cost of fighting cybercrime in 2022 (JuniperResearch) 14.5 BILLION Malware-bearing emails sent in 2017 (AppRiver)

NOT ENOUGH GOOD GUYS 3.5 MIILLION Unfilled security jobs by 2021 (Cybersecurity Ventures)

4 MOST CRITICAL PAIN POINTS OF IT PROFESSIONALS 43% Cyber crime continues to develop faster than security tools 36% IoT growth is increasing the risk of a breach 35% There is a skills shortage within many organizations 34% Organizations lack visibility into threats 69% say that current cybersecurity solutions aren t delivering on their promises. The cyber threat landscape is ever changing, and organizations are performing a juggling act in trying to deal with the wide variety of cybersecurity demands. Source: Vanson Bourne Survey 2017 - Adaptive Cybersecurity A Necessity for Business Continuity

THE POWER OF UNITY SHARED CYBER THREAT INTELLIGENCE, TOGETHER, WE ARE STRONGER.

MOST VALUED SECURITY CAPABILITIES 44% 41% 37% 36% 35% Greater speed of threat detection Automated threat remediation Advanced Threat Protection (ATP) A.I. Machine Learning Advanced Analytics Market Trends 86% Respondents agree that cybersecurity tools with artificial intelligence and machine learning capabilities would be of great benefit to their organization. 35% Over the next three years, cloud and virtualization trends are set to become more of a pain point for organizations Source: Vanson Bourne Survey 2017 - Adaptive Cybersecurity A Necessity for Business Continuity

IF YOUR NOT THINKING ABOUT AUTOMATION, YOU CANT BE SECURE 75% Three quarters of respondents agree that the 24/7 always on nature of cybercrime puts a great strain on their security personnel. Benefits of adopting security tools with Automation 55% Reduction in operating costs 55% Reduction in personnel costs 59% Reduction in false positives Source: Vanson Bourne Survey 2017 - Adaptive Cybersecurity A Necessity for Business Continuity

AUSTRALIAN ORGANIZATIONS UNDER ATTACK Quarterly Statistics Report, Q3 2018 (July 2018 September 2018) Number of breaches reported under the Notifiable Data Breaches Scheme Feb-18* 8 Mar-18 55 Total received for the quarter: 245 Apr-18 May-18 65 87 Total received last quarter: 242 Total received YTD: 550 Jun-18 90 Jul-18 81 Aug-18 88 Sept-18 76 0 20 40 60 80 100 * The NDB Scheme commenced on 22 Feb 2018

AUSTRALIAN ORGANIZATIONS UNDER ATTACK Quarterly Statistics Report, Q3 2018 (July 2018 September 2018) Source of Reported Data Breaches System Fault 6% Human Error 37% Top 5 Industry Sectors that reported breaches (Q3) Top 5 industry sectors NDBs received Health service providers 45 Finance (incl. superannuation) 35 Legal, Accounting & Management services 34 Education 16 Business and Professional Associations 13 Type of personal information breached Kinds of personal information % of data breaches Contact information 85% Malicious Attack 57% Financial details 45% Identity information 35% Health information 22% TFN 22% Other sensitive information 7%

JUNIPER ADVANCED THREAT PREVENTION (JATP) 2 Threat Behavior Analytics Detection On-premise solution that can detect advanced threats across web, email and lateral traffic Machine learning + behavior analysis + threat feeds 1 Advanced Malware Detection Juniper ATP Appliance 3 One-Touch Mitigation Analytics Improve productivity of SOC and IR teams by automating manual activities Timeline view of all security events that have occurred on a host or user Mitigation Leverage existing security infrastructure to mitigate threats Automatically block malicious IPs, URLs and infected hosts

JATP OPEN ECOSYSTEM Endpoint Firewall & SWG SIEM CASB NAC & Identity Others

JATP - PRIMARY THREAT VECTORS Perimeter Malicious Email Internet ANALYTICS ENGINE Malicious Web Collectors continuously ingest web and email traffic to the smart analytics engine including cloud email (O365/Gmail)

JATP OPEN ECOSYSTEM INFECTED HOST AND MALWARE RISK TREND

THREAT OVERVIEW AND LATERAL PROGRESSION

KILL CHAIN EVENT CORRELATION

JATP - KILL CHAIN Exploit Download Install C&C Lateral Activity JATP Chain Heuristics JATP Static, Behavior, Reputation Engines JATP IVP tool JATP Correlation engine JATP Lateral engine Correlated lateral and perimeter traffic with combined web and email visibility

JATP ONE TOUCH MITIGATION JATP CORE Mitigation & Enforcement Publish Blocking Data To Existing: FW, IPS and SWG API based or manual ANALYTICS ENGINE Verification & Containment Verify infection on suspect endpoints before cleaning (Carbon-Black, Tanium, Crowdstrike, Bradford)

CALL TO ACTION Download a 14-Day free trial of JATP. Engage with the Juniper team to find out more about the Juniper Unified Cybersecurity Platform and Secure SD-WAN. Read What is the most sophisticated piece of software/code ever written? John Byrd (Quora) Security should be built-in, not bolted-on. REMEMBER! Reduce your attack surface streamline your policies and get your apps under control. Use automation Machine vs Machine is the ONLY way to win.