80 likes | 100 Views
Explore the evolution of cyber threats from 1998 to present, including ransomware, cloud attacks, and more. Learn key strategies and insights from Venkatesh Subramaniam, Global CISO at Olam International, with over 25 years of experience in cybersecurity. Discover the latest in cyber risk management, threat detection, and response techniques. Stay informed and protected in today's rapidly changing digital landscape.
E N D
Cross Generation Detection & Response VenkateshSubramaniamGlobal Chief Information Security Officer Olam International
About the Speaker VENKATESH SUBRAMANIAM Global CISO, Olam International Venkatesh has over twenty-five years of experience in information security & management and has worked in diverse areas of security in critical sectors like finance and telecom, and in Fortune 50 companies globally. At Olam, he is responsible for all aspects of security – Plan, Build & Operate – covering over 70 countries. Prior to this, he was the Global CISO for a US based mortgage servicer responsible for oversight of the security program, and also the global head for business continuity. In a prior stint, he was the CISO for a leading telecom operator, and also headed the Business Continuity & Privacy Offices. Venkatesh is a Gold Medalist in Engineering, has an MBA from a premier business school in India, and also holds a Masters Degree in Computer Science from Boston University
Evolution of Threats 1998 2004 2007 2010 2013 2016 Present File less Malware Ransomware Cloud Attacks Trojan Worms viruses Banking Trojans Ransomware Botnets Botnets DNS Attacks Identity Theft Phishing DOS Attacks DDOS Attack MaliciousEmail Botnets Ransomware Cryptominer Android attacks 3
Global Threat Landscape Wannacry 150 230,000 $4 Countries Computers infected Billion NotPetya An advanced international ransomware could cost1 GDPRviolation fine $193 $10 €20 4% or Billion Billion Million of annual global turnover 1 Cyber Risk Management (CYRM) Project Singapore
Pyramid Of Pain * Tough Challenging Annoying Easy Trivial TTPs Tools Easy for attacker to modify artifacts in the lower tiers in the Pyramid Defenders should focus on the upper tiers in the Pyramid especially the TTPs Network /Host Artifacts Domain Names IP Address Hash values * David Bianco 5
ML Based <__> • High Fidelity Alerts Integrating the silos SIEM + SOAR TI ML-Based Behavior Analytics Contextual Threat Hunting High Fidelity Alerts SECURITYDATA LAKE Telemetry Endpoint Network Cloud OT 7
THANK YOU VenkateshSubramaniamGlobal CISO | Olam International