taking the offensive security leaders v9.1

15
Você está pronto para enfrentar os criminosos cibernéticos? Fernando Romero, CISSP Cybersecurity Specialist LATAM [email protected]

Upload: fernando-romero

Post on 10-Jan-2017

14 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Taking the offensive Security Leaders V9.1

Você está pronto para enfrentar os criminosos cibernéticos?

Fernando Romero, CISSPCybersecurity Specialist [email protected]

Page 2: Taking the offensive Security Leaders V9.1

2

aiming to divert custom.

Hacktivists

seeking to avenge a perceived wrong.

those who use hacking to get their message across.

those aiming to exploit for financial gain.

amateurs vandalising ‘just because’.

Employees Competitors EntrepreneurHackers

Como podemos categorizar os criminosos cibernéticos?

Page 3: Taking the offensive Security Leaders V9.1

3

1. Security challenges.

Digital crime is driven by a criminal dark market – with organised, well resourced and profitable attacks.

Beyond the ‘four walls’, remote working, BYOD and complex supply chains increase vulnerability – leaving security teams struggling to keep up with digital thieves.

The net cast by criminal entrepreneurs is widening. Every second new malware is created and distributed and new phishing campaigns are launched.

Unpatched, legacy IT can be a weak point in digital defences.

Phishing tactics are constantly evolving and new trends emerge towards email ‘CEO fraud’.

Attacks go beyond distributing malware – organised crime groups exploit, blackmail employees and place people onthe inside.

Page 4: Taking the offensive Security Leaders V9.1

44

2. Rethink the digital security threat.

Page 5: Taking the offensive Security Leaders V9.1

55

3. Ruthless and rational entrepreneurs.

Page 6: Taking the offensive Security Leaders V9.1

66

4. Taking the fight to the attacker.

Page 7: Taking the offensive Security Leaders V9.1

77

4. Taking the fight to the attacker.

Keep criminals away from your information. Your first line of defence is to keep criminals

out of your information systems. Criminal

entrepreneurs are after your data, and without access to

this, they can’t make any money.

Make it harder for attackers to exploit your data. Should you suffer a breach, the next step is to make it harder for

criminals to actually use your data. Encryption is a key

element in achieving this — and banks offer a good

example to follow.

Stop criminals spending their ill-gotten gains. To truly cut off criminal entrepreneurs’ ability to capitalise on their crimes, you have to stop them using

their profits. This means being part of a collaborative

worldwide effort to prevent money laundering and access

to black markets. ’.

Page 8: Taking the offensive Security Leaders V9.1

88

5. Um pouco do Portfolio da BT Security.

BT Assure DDoS Mitigation makes sure hackers cannot

prevent customers from reaching your ‘storefront’.

BT Assure Threat Defence guarantees real-

time response to any critical alerts or targeted malware detected within

your network.

BT Assure Threat Monitoring provides a unique security

information and event management (SIEM) service

that collects and analyses security information 24x7 across your organisation.

Page 9: Taking the offensive Security Leaders V9.1

9

The Geo-mapping shows the source and destination of attacks in real time or based on historical data

The search function allows you to quickly find information within messages

Failures

Anomalies

PotentialThreats

Attack

6. Assure analytics - Map View

Page 10: Taking the offensive Security Leaders V9.1

10

7. Assure DDoS Mitigation – The problem

Page 11: Taking the offensive Security Leaders V9.1

11

8. Assure DDoS Mitigation – A global solution

Page 12: Taking the offensive Security Leaders V9.1

BT Assure. Security that matters 12

BT SOC• Monitoring• Query• Analysis• Alerts

Customer portal & Intelligence Feeds

User environment

User Web browsing Email servers

Check Point SandBlast

Internet

9. Assure Threat Defence – Check Point Technology + BT Services

REAL TIME

Page 13: Taking the offensive Security Leaders V9.1

13

10. Why BT.

Page 14: Taking the offensive Security Leaders V9.1

14 BT Security 14

Taking the offensive - Report

http://bit.ly/29eeS6q