Combating Cyberattacks Through Network Agility and Automation Sagi Chief Technology Officer

Similar documents
HOW TO HANDLE A RANSOM- DRIVEN DDOS ATTACK

Smart and Secured Infrastructure. Rajesh Kumar Technical Consultant

Cisco Firepower with Radware DDoS Mitigation

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

Cyber Attacks: Evolving Network Architectures to Meet the Challenge

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape

Disaster Recovery Is A Business Strategy

AKAMAI CLOUD SECURITY SOLUTIONS

Introducing MVISION. Cohesive Cloud-based Management of Threat Countermeasures and Devices Leveraging Built-in Device Controls. Jon Parkes.

Elevate the Conversation: Put IT Resilience into Practice for Cloud Service Providers

WEBSCALE CONVERGED APPLICATION DELIVERY PLATFORM

IBM Cloud Internet Services: Optimizing security to protect your web applications

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Securing Digital Transformation

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Neustar Security Solutions Overview

Cybersecurity for Service Providers

Christopher Covert. Principal Product Manager Enterprise Solutions Group. Copyright 2016 Symantec Endpoint Protection Cloud

Cyber Resilience. Think18. Felicity March IBM Corporation

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

Accelerate Your Enterprise Private Cloud Initiative

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Comprehensive datacenter protection

Evolution of Data Center Security Automated Security for Today s Dynamic Data Centers

Corero & GTT DDoS Trends Report Q2 Q3 2017

Disaster Recovery as a Service

Security Vendor Line Card

Mind your Business We manage your IT

to protect the well-being of citizens. Fairfax is also home to some Fortune 500 and large

Think You re Safe from DDoS Attacks? As an AWS customer, you probably need more protection. Discover the vulnerabilities and how Neustar can help.

Countering ransomware with HPE data protection solutions

VMworld disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Cybersecurity Roadmap: Global Healthcare Security Architecture

Prescriptive Security Operations Centers. Leveraging big data capabilities to build next generation SOC

Building Resilience to Denial-of-Service Attacks

Use Cases. E-Commerce. Enterprise

WHITEPAPER HEALTHCARE S KEY TO DEFEATING CYBERATTACKS

Security by Default: Enabling Transformation Through Cyber Resilience

ERT Threat Alert New Risks Revealed by Mirai Botnet November 2, 2016

Best Practices in Securing a Multicloud World

Machine-Based Penetration Testing

Synchronized Security

From Managed Security Services to the next evolution of CyberSoc Services

Insight Guide into Securing your Connectivity

Conquer New Digital Frontiers with leading Public Cloud Platforms.

Simple and secure PCI DSS compliance

Service Provider View of Cyber Security. July 2017

WHITEPAPER ATTIVO NETWORKS DECEPTION TECHNOLOGY FOR MERGERS AND ACQUISITIONS

Citrix SD-WAN for Optimal Office 365 Connectivity and Performance

SOTI SUMMER [state of the internet] / security ATTACK SPOTLIGHT

Designing and Building a Cybersecurity Program

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Cisco SD-WAN. Intent-based networking for the branch and WAN. Carlos Infante PSS EN Spain March 2018

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

Cyber Security Technologies

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Microsoft Security Management

State of the Internet Security Q Mihnea-Costin Grigore Security Technical Project Manager

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Privilege Security & Next-Generation Technology. Morey J. Haber Chief Technology Officer

An Aflac Case Study: Moving a Security Program from Defense to Offense

snoc Snoc DDoS Protection Fast Secure Cost effective Introduction Snoc 3.0 Global Scrubbing Centers Web Application DNS Protection

DDoS Hybrid Defender. SSL Orchestrator. Comprehensive DDoS protection, tightly-integrated on-premises and cloud

Provide Your Customers with a New Compute Experience

PORTFOLIO OVERVIEW. Security. A Comprehensive Set of Security Services for Today s Complex Cyber Security Needs. Portfolio Overview.

and indeed live most of our lives online. Whether we are enterprise users or endpoint consumers, our digital experiences are increasingly delivered

Network Virtualization Business Case

The Virtualisation Security Journey: Beyond Endpoint Security with VMware and Symantec

8 CRITICAL CAPABILITIES FOR DIGITAL WORKSPACE SECURITY

Enterprise Overview. Benefits and features of Cloudflare s Enterprise plan FLARE

Automated, Real-Time Risk Analysis & Remediation

2nd SIG-NOC meeting and DDoS Mitigation Workshop Scrubbing Away DDOS Attacks. 9 th November 2015

Security and networks

Security: Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration

Application Security. Rafal Chrusciel Senior Security Operations Analyst, F5 Networks

Data Protection, Disaster Recovery, and Ransomware Protection with DRaaS

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Beyond Blind Defense: Gaining Insights from Proactive App Sec

F5 Synthesis Information Session. April, 2014

Protecting Your Digital Business: The Case for Next-Generation Intrusion Prevention

DIGITAL TRUST Making digital work by making digital secure

The Time For IT Resilience Is NOW

Imperva Incapsula Product Overview

Capability Analysis of Internet of Things (IoT) Devices in Botnets & Implications for Cyber Security Risk Assessment Processes (Part One)

The Next Generation Security Platform. Domenico Stranieri Pre- Sales Engineer Palo Alto Networks EMEA Italy

3 Ways to Prevent and Protect Your Clients from a Cyber-Attack. George Anderson Product Marketing Director Business October 31 st 2017

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Cloud Security Strategy - Adapt to Changes with Security Automation -

How to master hybrid IT. Get the speed and agility you want, with the visibility and control you need

Stop Ransomware In Its Tracks. Chris Chaves Channel Sales Engineer

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

CISCO NETWORKS BORDERLESS Cisco Systems, Inc. All rights reserved. 1

RiskSense Attack Surface Validation for IoT Systems

A Top US Bank Trusts Neustar SiteProtect for Reliable DDoS Protection Depth

8 Must Have. Features for Risk-Based Vulnerability Management and More

Transcription:

Combating Cyberattacks Through Network Agility and Automation Sagi Brody @webairsagi Chief Technology Officer

Leverage new technologies to: 1) Improve traditional DDoS monitoring & mitigation 2) Enhance disaster & ransomware recovery orchestration 3) Provide end-to-end service assurance for Hybrid IT

DDoS & Cyberattack -2017 FUD 2017 Global Ransomware damage exceeds $5B. Up from $325M in 2015 35% increase in # of attacks per target, Q1 to Q3 2017* 55% increase in attacks >10Gbps* 20+ reflection vectors with 600x1 amplification (CLDAP newest) EternalRed/SambaCry *nix server exploit Repear sleeper BotNet: 9 exploits in D-link, Linksys (Mirai 2.0) DDoS being used as a distraction for Cybersecurity *Corero DDoS Trends Report 2017

Ransom DDoS (RDoS) We are Armada Collective. If you haven heard for us, use Google. Recently, we have launched some of the largest DDoS attacks in history. Check this out, for example: https://twitter.com/optucker/status/665470164411023360 (and it was measured while we were DDoS-ing 3 other sites at the same time) We will start DDoS-ing your network if you don't pay 20 Bitcoins @ 14sJhJTVzQBAhZ4a8o2BCb1LufxoZ7UpAT by Monday Right now we will start small 30 minutes UDP attack on your site's IP: xx.xx.xx.xx. It will not be hard, just to prove that we are for real Armada Collective. Check your logs. If you don't pay by Friday, massive attack will start, price to stop will increase to 40 BTC and will go up 2 BTC for every hourof attack. In addition, we will be contacting affected customers to explain why they are down and recommend them to move to OVH. We willdothe same on social networks Our attacks are extremely powerful - sometimes over 1 Tbps per second. Prevent it all with just 20 BTC @ 14sJhJTVzQBAhZ4a8o2BCb1LufxoZ7UpAT Do not reply, we will not read. Pay and we will know its you. AND YOU WILL NEVER AGAIN HEAR FROM US! AAnd nobody will ever know you cooperated.

I don t need to worry about DDoS attacks.. Internet Exposed Assets: Volumetric Attacks Solution: Mitigation Services via BGP/GRE, DNS, Proxy Application Attacks Solution: Proxy service, Appliance/WAF, FW+Service, App specific Private Assets: Outbound attacks via endpoint malware infection Large amount of response traffic Effects all industries, commonly seen at schools

Traditional DDoS Mitigation Internet connectivity required to communicate with DDoS Partner Announcement based services will not withstand large volumetric attacks automatically Alternatives require physical connectivity in-region

Leveraging Interconnection Fabrics

Fabric empowered Mitigation

Abstracting DDoS Services & Providers

Why Segment DDoS Monitoring? Monitoring vs Mitigation are 2 distinct tasks Integrate once Use multiple mitigation partners

Ransomware: Proactive solutions are not enough Threat monitoring & mitigation Disaster Recovery & IT Resiliency Orchestration Proactive Reactive Full Cyber & Business Continuity Protection

Disaster-Recovery-as-an-entry-point Recovery infrastructure is often ignored until needed DR site security not on-par with production MSSP monitoring at recovery site? Asset, Vulnerability, Penetration testing of DR site? Forcing a DR failover event can expose new attack vectors

Full Security Accountability MSSP full accountability Consistent security & technology Reference Architecture: Replica of production @DR SIEM @DR DRaaS API Free Usage of DR Enhanced Security: Replica for DLP, asset & vulnerability scanning, penetration testing Reduce production vulnerability exposure time Reduce time to remediation

Proper Ransomware Recovery Application specific failover & failback Is it easier than paying off the ransom? DRaaS and RRaaS is not about replicating data, its about the network.

DR Network Automation & Exposure Traditional Methods: MPLS, VPN, cross connects Internal & external route injection (ibgp/ebgp, static ) DNS Double-NAT L2 Stretch.. More dirtiness Security Implications: All security related change control must be matched at DR (ACLs..) DR-Site must be considered standalone branch office DR-Site requires feature parity to support security platforms Solid/Proper Security & DR scenario may require major changes to production (re-ip)

DR Networking & Security: A better way Using Software-Defined Perimeter tools for DRaaS automation i.e: AppGate, ScaleFT Enforces Zero-Trust security models across organization Abstracts security control from network architecture Policy based, global security Provides software-defined controller for automation

DR Networking & Security: A better way SDP for Disaster Recovery Policy based failover & failback between production/dr No traditional network changes required to failover/back Network team not required for proper DR configuration Security guaranteed to be same at DR site Requirement: Organization must utilize the SDP software DRaaS provider/infrastructure must support 1+1 = 3

DR Networking & Security: Fabric Fabric for Disaster Recovery Automated capacity increases to recovery site via API Follows your infrastructure Easy traffic segmentation: Replication traffic Easy traffic segmentation via multiple VXCs Dangerous L2 stretch only enabled at recovery time (l2 overlap) Part of IT Resilience Orchestration

Future Production Environments: Hybrid IT

Hybrid IT: New Disruption Opportunities Non-traditional Prod/DR Production in SaaS Internet connectivity more important Hyperscale on-ramp IoT phone-home to SaaS Hosted Voice & SIP 3rd parties being attacked Cohesive Security Policies

Direct Access Cloud Cloud infrastructure privately connected to customer environments Cloud infrastructure which is local, low-latency, data-sovereign Predictable performance Utilize organization s existing security policies and devices Air-Gapped cloud infrastructure Single point accountability Single network & security integration Workloads s best interest at heart Who will own management, monitoring, securing and scaling of Hybrid IT in the future

THANK YOU Sagi Brody Chief Technology Officer @webairsagi