Today, being connected on-line is a foundational aspect of many businesses. Everything from our computers and cars to phones and refrigerators are connected in the race to digital transformation.
But it comes with a cost. Every device and application in use increases our cyber-attack surface.
These slides--based on the webinar from leading IT research firm Enterprise Management Associates (EMA) and Risk IQ--provide information on:
- How to get an accurate picture of your attack surface
- How threat actors exploit our Internet presence within the context of business and security management tools, issues, and practices
- How you can reduce your risk of an attack
How to Reduce the Attack Surface Created by Your Cyber-Tools
1. IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
David Monahan
Managing Research Director
EMA
How to Reduce the Attack Surface
Created by Your Cyber-Tools
Benjamin Powell
Technical Marketing Manager
RiskIQ
2. IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Watch the On-Demand Webinar
Slide 2
• How to Reduce the Attack Surface Created by Your Cyber-
Tools On-Demand webinar is available here:
http://info.enterprisemanagement.com/how-to-reduce-the-
attack-surface-created-by-your-cyber-tools-webinar-ws
• Check out upcoming webinars from EMA here:
http://www.enterprisemanagement.com/freeResearch
3. IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Today’s Speakers
Benjamin Powell, Technical Marketing Manager, RiskIQ
Benjamin has worked in IT for over 30 years, focused on IT security for the last 14 years.
Prior to RiskIQ he was a founding employee at AccelOps, a SIEM company where he ran
Professional Services and Product Marketing. Benjamin has worked and managed IT and
cyber security teams in numerous industries (state government, international airport, port
district, education, biotech, file encryption software, and financial services).
David Monahan, Managing Research Director, Security and Risk Management, EMA
David is a senior information security executive with several years of experience. He has
organized and managed both physical and information security programs, including security
and network operations (SOCs and NOCs) for organizations ranging from Fortune 100
companies to local government and small public and private companies. He has diverse audit
and compliance and risk and privacy experience such as providing strategic and tactical
leadership to develop, architect, and deploy assurance controls; delivering process and policy
documentation and training; and working on educational and technical solutions.
4. IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
Logistics for Today’s Webinar
An archived version of the event recording will be
available at www.enterprisemanagement.com
• Log questions in the chat panel located on the lower
left-hand corner of your screen
• Questions will be addressed during the Q&A session
of the event
QUESTIONS
EVENT RECORDING
A PDF of the speaker slides will be distributed
to all attendees
PDF SLIDES
Logistics for Today’s Webinar
5. IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
IT & DATA MANAGEMENT RESEARCH,
INDUSTRY ANALYSIS & CONSULTING
David Monahan
Managing Research Director
EMA
How to Reduce the Attack Surface
Created by Your Cyber-Tools
27. Virtual User
Globalized Internet Proxy
Social Media Sites
Digital Advertisements
Mobile App Store Monitoring
DNS Sensors
Port & Service Scanners
IP Scanners
Hunt,
Observe &
Interact
Multiple
Layers
Full Stack Visibility
28. Capture
(Multiple Digital
Channels with
Glocalization
Perspective)
Advanced Internet
Reconnaissance
Open Source
Intelligence
SSL
Certificates
IoT
CookiesJavaScript
Passive
DNS
Phishin
g
Client
Side
DOM
Active
DNS
Malware
Social
Media
Mobile
Apps
WHOIS
Port
Info
Banner
s
Service
s
Comprehensive & Scalable Collections
• 250k New Domain Resolutions/day
• 5.5M New Host Resolutions/day
• 106B+ Total Unique DNS Records
• 2B+ Web Requests/ day
• 300K+ New Port Observations
• 300+ Mobile App Stores – 34M+ apps
31. RiskIQ Internet
Data Warehouse
Structure and
Curate
INTERNET DATA SETS
• Full DOM Capture &
Analysis
• Passive DNS
• Crawl Index
• SSL Certificates
• Web Components
• Trackers
• Historic Data
• Mobile Apps
• WHOIS
• IP Port &
Banner
DERIVED DATA SETS
• IoT
• Zero-day
• Accomplice
• Spam
• Scam
• Cookie
• IP Reputation Data
• Domain Infringement
• Malware
• Blacklist
• Phishing
• Host Pairs
Analyze
Orchestration & Recursion
32. RiskIQ Internet
Data Warehouse
Discovery/
Alert
Structure and
Curate
Infections & IOCs
Fake Mobile Apps
OWASP CVE CVSS
Data Leakage/ Exfiltration
Non Authorized Services
Custom
Compromise & Defacement
Rogue Phishing Sites
Infringing Domains & Hosts
Social Media Impersonations
Compliance
Asset Discovery
INTERNET DATA SETS
• Full DOM Capture &
Analysis
• Passive DNS
• Crawl Index
• SSL Certificates
• Web Components
• Trackers
• Historic Data
• Mobile Apps
• WHOIS
• IP Port &
Banner
DERIVED DATA SETS
• IoT
• Zero-day
• Accomplice
• Spam
• Scam
• Cookie
• IP Reputation Data
• Domain Infringement
• Malware
• Blacklist
• Phishing
• Host Pairs
Analyze
Orchestration & Recursion
33. RiskIQ Internet
Data Warehouse
Discovery/
Alert
Enforce
Structure and
Curate
Infections & IOCs
Fake Mobile Apps
OWASP CVE CVSS
Data Leakage/ Exfiltration
Non Authorized Services
Custom
Compromise & Defacement
Rogue Phishing Sites
Infringing Domains & Hosts
Social Media Impersonations
Compliance
Asset Discovery
INTERNET DATA SETS
• Full DOM Capture &
Analysis
• Passive DNS
• Crawl Index
• SSL Certificates
• Web Components
• Trackers
• Historic Data
• Mobile Apps
• WHOIS
• IP Port &
Banner
DERIVED DATA SETS
• IoT
• Zero-day
• Accomplice
• Spam
• Scam
• Cookie
• IP Reputation Data
• Domain Infringement
• Malware
• Blacklist
• Phishing
• Host Pairs
GSB/MSS Mitigation
Email Alerts
In App Enforcement
Integrations
Restful API
Analyze
Orchestration & Recursion
34. RiskIQ Internet
Data Warehouse
Discovery/
Alert
Enforce Manage
Structure and
Curate
Infections & IOCs
Fake Mobile Apps
OWASP CVE CVSS
Data Leakage/ Exfiltration
Non Authorized Services
Custom
Compromise & Defacement
Rogue Phishing Sites
Infringing Domains & Hosts
Social Media Impersonations
Compliance
Asset Discovery
INTERNET DATA SETS
• Full DOM Capture &
Analysis
• Passive DNS
• Crawl Index
• SSL Certificates
• Web Components
• Trackers
• Historic Data
• Mobile Apps
• WHOIS
• IP Port &
Banner
DERIVED DATA SETS
• IoT
• Zero-day
• Accomplice
• Spam
• Scam
• Cookie
• IP Reputation Data
• Domain Infringement
• Malware
• Blacklist
• Phishing
• Host Pairs
Change Monitoring
Correspondence Tracking
Correlations
Reporting
Trends
GSB/MSS Mitigation
Email Alerts
In App Enforcement
Integrations
Restful API
Analyze
Orchestration & Recursion