310 likes | 424 Views
Introducing. C yber A ttack R emediation & M itigation. Your Cyber Defences will be Breached! It’s Inevitable! WHAT WILL YOU DO?. Unique Integrated S olution P latform Demonstrable TODAY @ Exclusive Networks Combing Best of Breed ‘Ingredients’
E N D
Introducing Cyber Attack Remediation & Mitigation
Your Cyber Defences will be Breached! It’s Inevitable! WHAT WILL YOU DO?
Unique Integrated Solution Platform • Demonstrable TODAY @ Exclusive Networks • Combing Best of Breed ‘Ingredients’ • One – Post Breach Integrated Solution - Identification - Containment - Rapid Response & Remediation - Full Forensics • Focused – Post Breach
Benefits: • Faster Notification • Earlier Remediation – Find2Fix • Improved Visibility & Intelligence • Vastly Enhanced ‘Post Breach’ Response • Minimising Damage - Cost/Reputation • Efficient Use of Limited Resource
Why Do We Need CARM? • USA >47,000 known IT security incidents in 2012 (Ref Verizon 2013) • UK IT Security Incidents in 2012 >54 per large organisation pa (Ref PWC 2013) • Average Cost of a Data Leak – Large Co. $3.5M per organisation (Ref Ponemon Rpt) • Belgium – 334 ‘Serious’ Incidents per Month • (ref CERT)
The Problem is Growing ! • Number of Devices (Endpoints) per User • PCs, Tablets, Smartphone • BYOD • Consumerisation and choice increases IT workload • Mobility • Android based threats to hit 1M in 2013 • 30% increase in Mobile Malware in last 6mnths (Fortinet) • Cloud • Attractive point of entry for a cyber attack • Applications • App Stores outside of IT control Source: Execs Guide to 2012 Data Breaches - OSF
....and Threats are Getting More Challenging! • Advanced Persistent Threats (APTs) • Often organisationally driven • Zero Day Exploits • Defending against the unknown • Polymorphic Threats • Ever changing It’s inevitable that some of these threats will become successful ATTACKS!
Evidence . . Fighter Jets • 2009 • China is 16 years behind the US • BY 2020 • > 1000 US fighters 5th Generation • F35’s and F22’s! • By 2025 • The GAP widens • US saw this as a big threat to national security- Why?
2012: Spot the Difference Lockheed USAF F22 Chengdu J-20
Threats are Commoditising . . . . • Nation v Nation – Cyber Warfare • National Government – Espionage • Central Governments - Hacktervism • Large, Global Brands - IP/Robbery • Mid to Large sized Organisations- Robbery? • You . . . . Burglary
Acceleration of Intellectual Property Loss: Significant Breaches of 2012 Oct Sept May Aug Mar Feb Apr Oct May Aug Mar July Apr Jan Jun Jun Sept July Jan Nov Feb
What’s The Real Cost? Total cost is > double real cost . . .
Direct v Indirect Ref: Ponemon 2013
The True Cost of Breach • Loss of revenue • From outage, no trading • Damage to reputation • Negative Customer reaction • Loss of data • Cost of replacement, repair and compliance • Interruption to business • Diverting resources will delay core activity • Damage to customer confidence • Loyalty & ongoing business delayed or lost • Damage to investor confidence • Valuation can affect credit limits & increase costs • Loss of Intellectual property • Leadership position lost & margin impact • Legal costs • See all the above!!!
Customer Pain Points • Lack of Visibility • Anomalies, behaviours, performance degradation • Indicators of change • Sheer Volume of Incidents • Lateral spread • Incident Response Processes • Speed of response • Time to Remediate • Manpower, skills • Why Did it Happen? • Forensics • Costs . . . A New Approach is Needed!
So What is Needed? • A Cyber Attack ‘Early Warning System’ • Rapid Defence Re-configuration • Centralised ‘Command and Control’ • Better Visibility • Actionable Intelligence • Learn from our Lessons
...introducing Cyber Attack Remediation & Mitigation and respond
Qualities • Signature-less Defence • High Accuracy Threat Detection • Shared Threat Intelligence • ‘Inside Out’ as well as ‘Outside In’ Protection • Virtual Execution • Response Automation
CARM delivers: • Real-time Monitoring • BIG DATA Analysis for Abnormality Detection • Low-latency Incident Evaluation & Qualification • Low-latency Incident Response Determination • APIs • Control • Reconfigurable Defences
...introducing CARM Cyber Attack Remediation & Mitigation Breach is Inevitable Just like a 3 putt . . . . And just like a 3 putt . . . It’ll surely happen again
Why Exclusive Networks? • Integrates Platform for the First Time • Drove Development Work with API's • First World Wide ‘Integrated/Interworking’ Solution Platform • First Demo System Available at HQ & London • Use Exclusive Networks to Engineer Demo's and POC's • Promo Pack & Collaterals for Customisation • eDM/ eShot • Telemarketing Script • White Paper • Presentation • Brochure
VAR Benefits • Post Breach – Big Issue • Addresses a Real Need – NOW • Good Reason for aConversation with Customers • Demo Facility can be Booked • Demonstrate Value to Customers • Incremental Revenue Opportunities • Could be Annuity Based if Sold as a Service • Speak to your Account Manager for Further Information
Summary • Post Breach ERA is on US • Not IF but WHEN • Organisations Need to Address it • Seen as costly • Too complex • More work in overloaded department • CARM Simplifies & Automates This • Rapid Outcomes at Reasonable Cost • Real-life Working Platform NOW for Demos • It Works!!!