Threat Landscape vs Threat Management Thomas Ludvik Næss Country Manager
Threat Landscape Past, Present and Future
So it begins in the year of 1802 Joseph Marie Jacquard 3
Very first computer virus 1971 The Creeper system, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies to test John von Neumann's theory. [2] Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message "I'm the creeper, catch me if you can!" was displayed. The Reaper program was later created to delete Creeper. [3] Source: https://en.wikipedia.org/wiki/timeline_of_computer_viruses_and_worms 4
May 1974 World s first Spam sent 5
DAMAGE CAUSED Cybercrime Business Development CRIMEWARE Intellig ent Botnets W eb Threats Targ eted Attacks Mob ile Attacks Destructiv e Attacks/ Ransomware Business Email Compromise W orm Outb reaks Vulnerab ilities Spam Mass Mailers Spyware 2001 2003 2004 2005 2007 2010 2012 2015 2016
brand new malware every second! of these infects only one machine cybercrimers spends more time deleting their trails.
I will never be hacked! YES YOU WILL!!
World Economic Forum - The Global Risks Report 2017 9
RANSOMWARE GROWTH WILL PLATEAU IN 2017, BUT ATTACK METHODS AND TARGETS WILL DIVERSIFY. 10
IOT DEVICES WILL PLAY A BIGGER ROLE IN DDOS ATTACKS; IIOT SYSTEMS IN TARGETED ATTACKS. 11
THE SIMPLICITY OF BUSINESS EMAIL COMPROMISE ATTACKS WILL DRIVE AN INCREASE IN THE VOLUME OF TARGETED SCAMS IN 2017. 12
BUSINESS PROCESS COMPROMISE WILL GAIN TRACTION AMONG CYBERCRIMINALS LOOKING TO TARGET THE FINANCIAL SECTOR. 13
ADOBE AND APPLE WILL OUTPACE MICROSOFT IN TERMS OF PLATFORM VULNERABILITY DISCOVERIES. 14
CYBERPROPAGANDA WILL BECOME A NORM. GENERAL DATA PROTECTION REGULATION IMPLEMENTATION AND COMPLIANCE WILL RAISE ADMINISTRATIVE COSTS ACROSS ORGANIZATIONS. THREAT ACTORS WILL COME UP WITH NEW TARGETED ATTACK TACTICS THAT CIRCUMVENT CURRENT ANTI-EVASION SOLUTIONS. 15
Face Reality With a Hollistic Approach Cloud and Virtualization Complex Networks Consumerization 16
State of the Art Threat Management
Cloud based & Big Data Analytics Driven Threat Intelligence since 2004 Global Threat Intelligence 100 TB analyzed daily 500k new threats daily 800M+ good file whitelist 100s of millions of sensors Threat Researchers 450 researchers Threat lifecycle and distribution research 3k+ external vulnerability & exploit researchers (ZDI) 18
19
SMART Maximizes protection Sandbox Analysis Intrusion Prevention Application Control Machine Learning Integrity Monitoring Behavioral Analysis Anti-Malware & Content Filtering Response & Containment 20
OPTIMIZED Minimizes IT impact Sandbox Analysis Intrusion Prevention Application Control Machine Learning Integrity Monitoring Behavioral Analysis Anti-Malware & Content Filtering Response & Containment 21
CONNECTED Speeds time to protect, detect and respond 22
LEGEND Protect Against Advanced Threats Known Good Known Bad Unknown Anti-Malware & Content Filtering Intrusion Prevention (IPS) & Firewall Integrity Monitoring & Log Inspection Application Control Machine Learning Behavioral Analysis Safe files & actions allowed Custom Sandbox Analysis Malicious files & actions blocked 23
ANALYZER VISIBILITY AND CONTROL INSPECTOR
Layered Defense on WCRY (and all other threats) 25
Market Leadership Position The market leader in server security for the 7th straight year Recommended Breach Detection System for 3 straight years, and Recommended Next-generation IPS Highest and Furthest to the Right in the Leader s Quadrant in the Gartner Magic Quadrant for Endpoint Protection Platforms, Jan 2017 Leader in Gartner Magic Quadrant for Intrusion Detection and Prevention Systems, January 2017 #1 in protection and performance Source: IDC, Securing the Server Compute Evolution: Hybrid Cloud Has Transformed the Datacenter, January 2017 #US41867116 26 NSS Labs Breach Detection Test Results (2014-2016); NSS NGIPS Test Results, 2016 http://www.trendmicro.com/us/business/cyber-security/gartner-idps-report/ https://resources.trendmicro.com/gartner-magic-quadrant- Endpoints.html av-test.org (Jan 2014 to Dec 2016)
Trend Micro 28 years focused on security software Headquartered in Japan, Tokyo Exchange Nikkei Index (4704) Annual sales over $1B US Customers include 45 of top 50 global corporations 5500+ employees in over 50 countries Enterprise Midsize Business 500k commercial customers & 155M endpoints protected Consumers r Small Business 27
thomas@trendmicro.no