1 / 8

Cyber Threat Evolution & Global Response Strategies

Explore the evolution of cyber threats from 1998 to present, including ransomware, cloud attacks, and more. Learn key strategies and insights from Venkatesh Subramaniam, Global CISO at Olam International, with over 25 years of experience in cybersecurity. Discover the latest in cyber risk management, threat detection, and response techniques. Stay informed and protected in today's rapidly changing digital landscape.

ivac
Download Presentation

Cyber Threat Evolution & Global Response Strategies

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Cross Generation Detection & Response VenkateshSubramaniamGlobal Chief Information Security Officer Olam International

  2. About the Speaker VENKATESH SUBRAMANIAM Global CISO, Olam International Venkatesh has over twenty-five years of experience in information security & management and has worked in diverse areas of security in critical sectors like finance and telecom, and in Fortune 50 companies globally. At Olam, he is responsible for all aspects of security – Plan, Build & Operate – covering over 70 countries. Prior to this, he was the Global CISO for a US based mortgage servicer responsible for oversight of the security program, and also the global head for business continuity. In a prior stint, he was the CISO for a leading telecom operator, and also headed the Business Continuity & Privacy Offices. Venkatesh is a Gold Medalist in Engineering, has an MBA from a premier business school in India, and also holds a Masters Degree in Computer Science from Boston University

  3. Evolution of Threats 1998 2004 2007 2010 2013 2016 Present File less Malware Ransomware Cloud Attacks Trojan Worms viruses Banking Trojans Ransomware Botnets Botnets DNS Attacks Identity Theft Phishing DOS Attacks DDOS Attack MaliciousEmail Botnets Ransomware Cryptominer Android attacks 3

  4. Global Threat Landscape Wannacry 150 230,000 $4 Countries Computers infected Billion NotPetya An advanced international ransomware could cost1 GDPRviolation fine $193 $10 €20 4% or Billion Billion Million of annual global turnover 1 Cyber Risk Management (CYRM) Project Singapore

  5. Pyramid Of Pain * Tough Challenging Annoying Easy Trivial TTPs Tools Easy for attacker to modify artifacts in the lower tiers in the Pyramid Defenders should focus on the upper tiers in the Pyramid especially the TTPs Network /Host Artifacts Domain Names IP Address Hash values * David Bianco 5

  6. Mitre ATT&CK Framework

  7. ML Based <__> • High Fidelity Alerts Integrating the silos SIEM + SOAR TI ML-Based Behavior Analytics Contextual Threat Hunting High Fidelity Alerts SECURITYDATA LAKE Telemetry Endpoint Network Cloud OT 7

  8. THANK YOU VenkateshSubramaniamGlobal CISO | Olam International

More Related