Artificial Intelligence Drives the next Generation of Internet Security

Similar documents
EU GENERAL DATA PROTECTION: TIME TO ACT. Laurent Vanderschrick Channel Manager Belgium & Luxembourg Stefaan Van Hoornick Technical Manager BeNeLux

Analytics Driven, Simple, Accurate and Actionable Cyber Security Solution CYBER ANALYTICS

Connect Securely in an Unsecure World. Jon Clay Director: Global Threat

2018 Cyber Security Predictions

Cisco Firepower NGFW. Anticipate, block, and respond to threats

BETTER Mobile Threat Defense (BMTD)

Maximum Security with Minimum Impact : Going Beyond Next Gen

Built without compromise for users who want it all

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Easy Activation Effortless web-based administration that can be activated in as little as one business day - no integration or migration necessary.

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Intro to Niara. no compromise behavioral analytics. Tomas Muliuolis HPE Aruba Baltics Lead

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Novetta Cyber Analytics

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

CONSUMER CYBER SECURITY BUSINESS Kristian Järnefelt, Executive Vice President

Automated Threat Management - in Real Time. Vectra Networks

Joe Stocker, CISSP, MCITP, VTSP Patriot Consulting

Cisco Firepower NGFW. Anticipate, block, and respond to threats

Getting over Ransomware - Plan your Strategy for more Advanced Threats

Integrating Okta and Preempt Detecting and Preventing Threats With Greater Visibility and Proactive Enforcement

Technical Brochure F-SECURE THREAT SHIELD

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

RSA INCIDENT RESPONSE SERVICES

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

Resolving Security s Biggest Productivity Killer

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

FOR FINANCIAL SERVICES ORGANIZATIONS

DEFENCE IN DEPTH HOW ANTIVIRUS, TRADITIONAL FIREWALLS, AND DNS FIREWALLS WORK TOGETHER

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

An Aflac Case Study: Moving a Security Program from Defense to Offense

The Invisible Threat of Modern Malware Lee Gitzes, CISSP Comm Solutions Company

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

A MULTILAYERED SECURITY APPROACH TO KEEPING HEALTHCARE DATA SECURE

8 Must Have. Features for Risk-Based Vulnerability Management and More

Security Information & Event Management (SIEM)

CYBER SOLUTIONS & THREAT INTELLIGENCE

Incident Response Agility: Leverage the Past and Present into the Future

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Transforming Security from Defense in Depth to Comprehensive Security Assurance

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Intelligent and Secure Network

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

MITIGATE CYBER ATTACK RISK

empow s Security Platform The SIEM that Gives SIEM a Good Name

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Machine Learning and Advanced Analytics to Address Today s Security Challenges

IPS with isensor sees, identifies and blocks more malicious traffic than other IPS solutions

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

RSA INCIDENT RESPONSE SERVICES

Securing Digital Transformation

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

HELP ME NETWORK VISIBILITY AND AI; YOU RE OUR ONLY HOPE

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Securing the SMB Cloud Generation

From Managed Security Services to the next evolution of CyberSoc Services

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

How Vectra Cognito enables the implementation of an adaptive security architecture

Cisco Advanced Malware Protection. May 2016

RSA Advanced Security Operations Richard Nichols, Director EMEA. Copyright 2015 EMC Corporation. All rights reserved. 1

Reducing the Cost of Incident Response

Cyber Threat XChange: A New Approach to Managing Security

Strategies for a Successful Security and Digital Transformation

Comodo cwatch Web Security Software Version 1.6

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

DATA SHEET RSA NETWITNESS ENDPOINT DETECT UNKNOWN THREATS. REDUCE DWELL TIME. ACCELERATE RESPONSE.

Cisco Ransomware Defense The Ransomware Threat Is Real

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

Imperva Incapsula Website Security

Outwit Cyber Criminals with Comprehensive Malware and Exploit Protection.

Agile Security Solutions

Speed Up Incident Response with Actionable Forensic Analytics

The best for everyday PC users

AKAMAI CLOUD SECURITY SOLUTIONS

IDENTITY: A KEY ELEMENT OF BUSINESS-DRIVEN SECURITY

CYBER SECURITY EFFECTIVENESS FOR THE RESOURCE-CONSTRAINED ORGANIZATION

Service Provider View of Cyber Security. July 2017

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Discount Kaspersky PURE 3.0 internet download software for windows 8 ]

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Supercharge Your SIEM: How Domain Intelligence Enhances Situational Awareness

Unlocking the Power of the Cloud

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

AT&T Endpoint Security

Protecting the Home Front

SIEM Solutions from McAfee

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

Cyber Defense Operations Center

Review Kaspersky Internet Security - multi-device 2015 online software downloader ]

MEETING ISO STANDARDS

IBM Cloud Internet Services: Optimizing security to protect your web applications

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Evolution Of Cyber Threats & Defense Approaches

Endpoint Protection : Last line of defense?

Gaps in Resources, Risk and Visibility Weaken Cybersecurity Posture

SaaS Flyer for Trend Micro

Transcription:

Artificial Intelligence Drives the next Generation of Internet Security Sam Lee Regional Director sam.lee@cujo.com Copyright 2017 CUJO LLC, All rights reserved.

Artificial Intelligence Leads the Way Copyright 2017 CUJO LLC, All rights reserved.

You Use Services Powered by Big Data and AI Already Personalized experience, premium services, advanced insights

Copyright 2017 CUJO LLC, All rights reserved.

Growing Internet of Things The number of connected devices will exceed 20 billion by 2020 Consumer and SMB IoT is 63% of total

Attack Vectors on IoT Smart Toys, Kettle Zombies, and Privacy Issues https://youtu.be/szcseweg5f8

The Internet Was Not Designed for Safety Rapid growth leads to widespread issues New threats Numerous devices Vulnerable networks 1339 data breaches were registered in the US in 2017 Typical household in the US today has 22 connected devices Average DDoS attack cost businesses $2.5M ITRC, 2017 CUJO AI data, 2018 ZDnet, 2017

Risky Connected Experience Source: HP Fortify 90% of devices collected at least one piece of personal information via the device, the cloud, or its mobile application Global Intelligence 70% of devices used unencrypted network traffic 80% 70% of devices along with their cloud and mobile application components failed to require passwords of a sufficient complexity and length of devices along with their cloud and mobile application enable an attacker to identify valid user accounts through account enumeration

Legacy Technologies Do Not Suffice When It Comes To Protecting Broadband Homes Endpoint security solutions do not address risks associated with consumer IoT devices DPI on firewall at the edge creates privacy concerns and drives up cost of broadband CPE DNS blacklisting quickly becomes ineffective as a control point with trend towards encrypted DNS Threat and reputation lists not enough to prevent zero-day phishing threats, ensure safe browsing and thwart IoT attack vectors

Limitations of Current Technology Consumer IoT space focus Data Collection Threat Detection Identification Methods Key Components Security/Policy Enforcement Current State of the Art Honey Pots Traditional threat intel gathering Forensic investigations DPI on Firewall at edge of network Endpoint solutions on LAN devices Reactive Based on what bad looks like Pattern recognition Smart SecOps team and systems Threat Lists Hashes DNS Endpoint Security Enterprise-grade firewalls What is Required Collect data in millions of homes Accurately identify IoT devices Model normal behaviors No DPI at the edge router Leverage cloud-based AI/ML algorithms Proactive Based on what good looks like Recognize anomalous behavior AI/ML Algorithms Real-time analysis/assessment and categorization Residential Router

Artificial Intelligence, Machine Learning, or Deep Learning What is the difference? Artificial intelligence An umbrella term for all programs that can sense, reason, etc. Intelligence presented by machines. Machine learning A subset of AI. Algorithm that makes better predictions when given more data. Deep learning Deep learning A subset of machine learning that uses data to learn using neural networks

AI-Based Solutions Human analysts cannot comprehend the amount of new data. Algorithms can. Deep learning Analyze data IoT devices and online activities create huge amounts of data Spot the pattern ML algorithms can define the patterns from anonymized data Offer a prediction After comparing known data with the new data, the algorithm can offer precise predictions

Device Identification with AI Precisely detecting all devices Define Device Behavior Fingerprint and find the pattern Offer Personalized Security Each device has its own network behavior pattern, depending on its category and specific features. Without knowing the pattern, it is not possible to properly protect these devices Fingerprinting all devices allows the ML algorithm to create different behavioral patterns for each device within a network Precisely adapt security controls, predict potentially harmful behavior, block threats and get notified

Proactive Network Security with AI Detecting threats without decrypting DNS traffic Learn network behavior Create behavioral profiles Accurately predict threats Learn network and device behavior from big data sets. Identify which patterns are known-good and known-bad After precising which behavior is considered malicious, the ML algorithms can create behavioral profiles for good and bad device or network behavior Known behavioral patterns are then used to block the threats that are showing malicious features

Contextual Alerts using AI Detecting threats without compromising user privacy Learn normal behavior Create content profiles Accurately predict nuance Learn appropriate and inappropriate content from big data sets. Identify which patterns are known-good (neutral, positive) and known-bad (insulting, negative). After precising which content is considered negative, the ML algorithms can create behavioral profiles for good and bad content. Block subtle and nuanced negative content (predatory, racist, bullying). Push a notification to alert the user. User data stays private - the notification is automated.

Adding AI-based IoT Security Services To a network operator s broadband portfolio https://youtu.be/3eycvpeqqde

Example on what AI can do for protecting children

I want My Devices to work for Me

The Ultimate Choice Powered by AI Simple and Intuitive In and Out of Home Protected Children Understand your network and know what devices are on it. Connect seamlessly, keep your family safe and enjoy a personalized experience. Make sure your devices are protected against malware, phishing and other threats in and out of the home. No matter which OS or device you are using. Help your children build a healthy relationship with technology. Schedule, set limits, block content. Protect kids from threats.

Summary Current state of the internet does not fit the needs of the users New devices are constantly added to home networks Cyber threat landscape is growing Legacy security methods are not effective Artificial intelligence provides proactive and private solution Copyright 2017 CUJO LLC, All rights reserved.

The CUJO AI Platform provides network operators a software solution consisting of: AI security Advanced device identification Advanced parental controls Network analytics

Sam Lee Regional Director sam.lee@cujo.com