taste june 28th of technology - peters & associates · day on new threats and reputations of...

56
June 28th of Taste Technology

Upload: others

Post on 18-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

June 28thof

Taste

Technology

Page 2: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Helping you grow your business with

scalable IT services & solutionsfor today’s challenges & tomorrow’s vision.

© 2018 Peters & Associates, Inc. All rights reserved.

Taste of Technology

June 28, 2018

Bruce Ward, VP of Business StrategyAdam Gassensmith, Manager of Client Engagement

Page 3: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

What to expect…What to expect…

• Give-Aways

• Raffle

• Evaluations

Wrap-up@

Device Bar

Page 4: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Final Wrap-up

Page 5: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsNIST’s CyberSecurity Framework (CSF)

Page 6: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsPeters & Associates Security Wheel

DATAData protected by Controls

Page 7: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Network Perimeter

Office 365

Approved Cloud Services

Unmanaged Devices

Shadow ITThreatsPersistent

Network perimeter works…except for threats such as• Phishing • Credential theft

+ External Data and Devices

= Identity security perimeter▪ Multi-factor Authentication ▪ Conditional Access ▪ Login Risk intelligence

Resources

Identity Perimeter

Page 8: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsOffice 365 Multi-factor Authentication

Page 9: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsMovie #2!

Fraudulent Instruction

Page 10: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsOffice 365 Multi-factor Authentication

Page 11: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsOffice 365 Multi-factor Authentication

Page 12: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

http://www.peters.com/events http://www.peters.com/blog/

Events, Webinars & Blogs

Page 13: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Helping you grow your business with

scalable IT services & solutionsfor today’s challenges & tomorrow’s vision.

© 2018 Peters & Associates, Inc. All rights reserved.

FIRE!

What wildfires taught me about security

June 28, 2018

Adam Gassensmith, Manager of Client Engagement

Page 14: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutions

Page 15: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsFighting Wildfires with NIST

Page 16: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutions

Firefighters

Populated Areas

Critical Infrastructure

Density

Identify

Your Secure Organization

Critical People

Critical Infrastructure

Critical Data

Page 17: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsProtect

Firefighters

Awareness

Fire Lines

Controlled Burns

Maintenance

Your Secure Organization

Awareness

Network Configuration

Access Configuration

Anti-Virus and Anti-SPAM

Routine Patching

Page 18: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsDetect

Firefighters

People

Sensors and Detection Systems

Your Secure Organization

People

Security Monitoring

Page 19: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsRespond

Firefighters

Alert Notifications

Helicopters, Trucks, and People

Water

Fire Retardants

Your Secure Organization

Notification

Incident Remediation

Disaster Recovery Plan

Page 20: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsRecover

Firefighters

Monitor

Rebuild

Fire Lines

Adjust

Your Secure Organization

Monitor

System Restore

Forensics

Adjust

Page 21: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutions

Ignoring any phases leaves you

at risk

There are multiple layers to address in

each phase

New threats emerge as technology advances

Applying these Firefighting Principles

Page 22: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsIncreasing Frequency of BEC Attacks

Hacker gain access to mailbox

Hacker monitors communications

Hacker impersonates hacking victim

Wire fraud victim wires funds

Page 23: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutions

Security Awareness Training

Security Monitoring

Office 365 Security Settings

Frequent Office 365 Audit Log Review

How do you battle BEC?

Page 24: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutions

PULSE Complete

Office 365 Weekly*

Security Audit

How Can Peter & Associates Help?

*Critical login data reviewed daily

Page 25: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Weekly O365 Security Check

Mailbox Auditing Inbox Forwarding Mailbox Retention

Office 365 Domains Office 365 Settings MFA Phone Numbers

Foreign Mailbox Logons Old / Unused Mailboxes Roles assigned

Page 26: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2015 Peters & Associates, Inc. All rights reserved.© 2018 Peters & Associates, Inc. All rights reserved.

Page 27: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

Overall Posture

Page 28: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsNIST’s CyberSecurity Framework (CSF)

Page 29: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction
Page 30: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

Solution Details

Page 31: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

Solution Details

Page 32: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction
Page 33: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsMulti-factor Complexities

Technology User Experience

Conditions Expertise

Our Solution

Results-driven

Page 34: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsPeters & Associates Security Wheel

DATAData = crown jewels

Page 35: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2018 Peters & Associates, Inc. All rights reserved.

IT SecuritySolutionsPeters & Associates Security Wheel

DATAIdentity

Page 36: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

© 2015 Peters & Associates, Inc. All rights reserved.© 2018 Peters & Associates, Inc. All rights reserved.

To ask questions, either:

1) Take phone off mute, ask.

2) Type question in IM Window

Page 37: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

1801 S. Meyers Road, Suite 120Oakbrook Terrace, IL 60181

(630) 832-0075

Thank you!

© 2018 Peters & Associates, Inc. All rights reserved.

Bruce Ward

[email protected]

Page 38: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Helping you grow your business with

scalable IT services & solutionsfor today’s challenges & tomorrow’s vision.

© 2018 Peters & Associates, Inc. All rights reserved.

Smarter by the Numbers

Andrew Bagnato

Page 39: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

The Challenge

The amount of daily ransomware attacks since the beginning of 2016

(Source: CyberSense)

4,000

2016 financial loss from cybercrime in the U.S.

(Source: FBI)

1.3 Billion

(Source: National cyber Security Alliance)

of small companies go out of business within six months of a cyberattack

60%

of hacking-related breaches leveraged either stolen passwords and/or weak or guessable passwords.

(Source: 2017 Verizon DBIR)

80%

Page 40: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

The High Cost of User Error

July 2, 2018 40

90% 55%

of successful data breaches caused by

user error

of SMBs experienced a cyberattack in past year

Page 41: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Ransomware Trends

$5 billion dollarsDamages estimate from WannaCry and Notpetya

200,000 computers

Page 42: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Business Intelligence

© 2018 Peters & Associates, Inc. All rights reserved.

Record-Breaking Infection Count

Cyberwar.liveuamap.com

Page 43: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Trends in Malware by Operating System

Page 44: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Phishing

Page 45: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

High-risk URLs by Country

Page 46: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Attack Life Cycles are Getting Shorter

Page 47: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Top 10 Brands Impersonated in Phishing Attacks

Page 48: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Change in the Leaders of Top Phishing Impersonation Brands

Page 49: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Malicious Mobile Apps

Page 50: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

How do we answer this?

Page 51: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Paranoia!

Page 52: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

User Error is a Big Issue

Necessary: People are the weakest link in the security chain

01

Proven: Educating employees can reduce security risk

02

Best Practice:Security Awareness Training is a best practice or requirement for many industries

03

\\

of all successful cyber attacks is caused by human error

Source: IBM Cyber Security Intelligence Index

95%

Page 53: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Highly Automated, Massive Scale Machine Learning

Hundreds of classification models

hosted in Hadoop to cover different

threat types and content languages

Advanced machine learning and multiple

sources mean URLs, IPs, files and apps are

classified faster and more accuratelyPublishes millions of updates every

day on new threats and reputations of

existing URLs, IPs, apps and files

Low-touch systems requiring

minimal human interaction

Powered by 5th generation machine

learning to analyze and produce rich

sources of contextual Threat

Intelligence and security outcomes

across multiple vectors in milliseconds

July 2, 2018 Confidential 53

Page 54: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Business Intelligence

© 2018 Peters & Associates, Inc. All rights reserved.

Webroot Threat Intelligence Platform

27+ Billion URLs

600+ Million

Domains

4.3+ Billion

IP Addresses

15+ Billion

File Behavior Records

62+ Million

Mobile Apps

52+ Million

Connected Sensors

Page 55: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

The Strategy of Multi-Vector Protection

July 2, 2018 Confidential 55

File Exploit Prevention

Behavior Heuristics

Identity Shield

Malicious PE File Detection

Journaling & Rollback

Malicious URL Blocking

Real-Time Anti-Phishing

Web-Exploit Prevention

Malicious Script Blocking

Malicious PE File Blocking

Pre-Execution

Threat Prevention

Post-Execution

Protection & Remediation

Page 56: Taste June 28th of Technology - Peters & Associates · day on new threats and reputations of existing URLs, IPs, apps and files Low-touch systems requiring minimal human interaction

Business Intelligence

© 2018 Peters & Associates, Inc. All rights reserved.

Thank you!