1 / 31

Introducing

Introducing. C yber A ttack R emediation & M itigation. Your Cyber Defences will be Breached! It’s Inevitable! WHAT WILL YOU DO?. Unique Integrated S olution P latform Demonstrable TODAY @ Exclusive Networks Combing Best of Breed ‘Ingredients’

peyton
Download Presentation

Introducing

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Introducing Cyber Attack Remediation & Mitigation

  2. Your Cyber Defences will be Breached! It’s Inevitable! WHAT WILL YOU DO?

  3. Unique Integrated Solution Platform • Demonstrable TODAY @ Exclusive Networks • Combing Best of Breed ‘Ingredients’ • One – Post Breach Integrated Solution - Identification - Containment - Rapid Response & Remediation - Full Forensics • Focused – Post Breach

  4. Benefits: • Faster Notification • Earlier Remediation – Find2Fix • Improved Visibility & Intelligence • Vastly Enhanced ‘Post Breach’ Response • Minimising Damage - Cost/Reputation • Efficient Use of Limited Resource

  5. Why Do We Need CARM? • USA >47,000 known IT security incidents in 2012 (Ref Verizon 2013) • UK IT Security Incidents in 2012 >54 per large organisation pa (Ref PWC 2013) • Average Cost of a Data Leak – Large Co. $3.5M per organisation (Ref Ponemon Rpt) • Belgium – 334 ‘Serious’ Incidents per Month • (ref CERT)

  6. The Problem is Growing ! • Number of Devices (Endpoints) per User • PCs, Tablets, Smartphone • BYOD • Consumerisation and choice increases IT workload • Mobility • Android based threats to hit 1M in 2013 • 30% increase in Mobile Malware in last 6mnths (Fortinet) • Cloud • Attractive point of entry for a cyber attack • Applications • App Stores outside of IT control Source: Execs Guide to 2012 Data Breaches - OSF

  7. ....and Threats are Getting More Challenging! • Advanced Persistent Threats (APTs) • Often organisationally driven • Zero Day Exploits • Defending against the unknown • Polymorphic Threats • Ever changing It’s inevitable that some of these threats will become successful ATTACKS!

  8. Evidence . . Fighter Jets • 2009 • China is 16 years behind the US • BY 2020 • > 1000 US fighters 5th Generation • F35’s and F22’s! • By 2025 • The GAP widens • US saw this as a big threat to national security- Why?

  9. 2012: Spot the Difference Lockheed USAF F22 Chengdu J-20

  10. Threats are Commoditising . . . . • Nation v Nation – Cyber Warfare • National Government – Espionage • Central Governments - Hacktervism • Large, Global Brands - IP/Robbery • Mid to Large sized Organisations- Robbery? • You . . . . Burglary

  11. Post Breach Boom!

  12. Acceleration of Intellectual Property Loss: Significant Breaches of 2012 Oct Sept May Aug Mar Feb Apr Oct May Aug Mar July Apr Jan Jun Jun Sept July Jan Nov Feb

  13. What’s The Real Cost? Total cost is > double real cost . . .

  14. Direct v Indirect Ref: Ponemon 2013

  15. The True Cost of Breach • Loss of revenue • From outage, no trading • Damage to reputation • Negative Customer reaction • Loss of data • Cost of replacement, repair and compliance • Interruption to business • Diverting resources will delay core activity • Damage to customer confidence • Loyalty & ongoing business delayed or lost • Damage to investor confidence • Valuation can affect credit limits & increase costs • Loss of Intellectual property • Leadership position lost & margin impact • Legal costs • See all the above!!!

  16. Customer Pain Points • Lack of Visibility • Anomalies, behaviours, performance degradation • Indicators of change • Sheer Volume of Incidents • Lateral spread • Incident Response Processes • Speed of response • Time to Remediate • Manpower, skills • Why Did it Happen? • Forensics • Costs . . . A New Approach is Needed!

  17. So What is Needed? • A Cyber Attack ‘Early Warning System’ • Rapid Defence Re-configuration • Centralised ‘Command and Control’ • Better Visibility • Actionable Intelligence • Learn from our Lessons

  18. ...introducing Cyber Attack Remediation & Mitigation and respond

  19. DowngradesAttacksinto known Threats!

  20. Qualities • Signature-less Defence • High Accuracy Threat Detection • Shared Threat Intelligence • ‘Inside Out’ as well as ‘Outside In’ Protection • Virtual Execution • Response Automation

  21. CARM delivers: • Real-time Monitoring • BIG DATA Analysis for Abnormality Detection • Low-latency Incident Evaluation & Qualification • Low-latency Incident Response Determination • APIs • Control • Reconfigurable Defences

  22. 1 Platform…Multiple Ingredients

  23. ...introducing CARM Cyber Attack Remediation & Mitigation Breach is Inevitable Just like a 3 putt . . . . And just like a 3 putt . . . It’ll surely happen again

  24. Why Exclusive Networks? • Integrates Platform for the First Time • Drove Development Work with API's • First World Wide ‘Integrated/Interworking’ Solution Platform • First Demo System Available at HQ & London • Use Exclusive Networks to Engineer Demo's and POC's • Promo Pack & Collaterals for Customisation • eDM/ eShot • Telemarketing Script • White Paper • Presentation • Brochure

  25. VAR Benefits • Post Breach – Big Issue • Addresses a Real Need – NOW • Good Reason for aConversation with Customers • Demo Facility can be Booked • Demonstrate Value to Customers • Incremental Revenue Opportunities • Could be Annuity Based if Sold as a Service • Speak to your Account Manager for Further Information

  26. Summary • Post Breach ERA is on US • Not IF but WHEN • Organisations Need to Address it • Seen as costly • Too complex • More work in overloaded department • CARM Simplifies & Automates This • Rapid Outcomes at Reasonable Cost • Real-life Working Platform NOW for Demos • It Works!!!

More Related