SlideShare ist ein Scribd-Unternehmen logo
1 von 45
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
Seguridad en Capas:
Smart & Actionable Data
Daniel Villanueva
Netscout Arbor VP & GM – LATAM
dvillanueva@arbor.net
2©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
THE INTERNET
TRANSFORMS
THE HUMANITY
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 3
IOT Revolution
(Internet Of Things)
27 Billion Connected
Devices in 2017
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 4
Scan / Listen
Service
2
Report:
- Discovered IP
- Successful Credentials
TCP/48101
CnC
TCP/23
Telnet Scan
(TCP/23)
Brute Force
1
Already Compromised?
3
Install Bot Code
4
Loader
Check-In to
Command & Control
5
Bot
(compromised)
New IOT
Device
IOT: Mirai Botnet Propagation
And the beat goes on ...
1’
Telnet Scan
(TCP/23)
Brute Force
Telnet Scan
(TCP/23)
Brute Force
New Bot
(compromised)
~500,000 Infected
Devices
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 5
Bruce Schneier - renowned security technologist
https://www.schneier.com/blog/archives/2017/02/security_and_th.html
“The market can't fix this because neither the buyer nor the seller
cares.
The owners of the webcams and DVRs used in the denial-of-service attacks
don't care. Their devices were cheap to buy, they still work, and they
don't know any of the victims of the attacks.
The sellers of those devices don't care: They're now selling newer and
better models, and the original buyers only cared about price and
features.
There is no market solution, because the insecurity is what economists
call an externality: It's an effect of the purchasing decision that
affects other people. Think of it kind of like invisible pollution.”
How will this get any better ?...
6©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
1.7K
KNOWN DATA BREACHES
7.5M
DDoS ATTACKS
Just last year…
1 Attack
Every 4.2
Seconds
57% of
Enterprises
saw their
Bandwidth
Saturated
due to
DDoS
DDoS is the
Top Threat
for Service
Providers,
and 87% had
Reported
Attacks
44% of
Advanced
Attacks did
not use
Malwares
15%
Increase
vs 2016
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 7
Source: Worldwide Infrastructure Security Report. Arbor Networks, Inc.
In 2016 sizes, frequency and complexity of
attacks have increased dramatically
IoT Botnets becomes a reality
DDoS: Year-over-Year Growth
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
24
Gbps
40
Gbps
49
Gbps
100
Gbps
60
Gbps
62
Gbps
309
Gbps
395
Gbps
490
Gbps
800
Gbps
8©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
2016
600G
500G
400G
300G
200G
100G
DDoS Revolution: IoT Botnet Impact
Inbound DDoS Traffic in a Brazilian ISP
Sept AugOct Nov Feb Mar Apr May June JulyDec
SustainedattackIoTBotnetobserved
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 9
October 2016: Massive Attack to Internet
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 10
DYN down and disrupts the Internet
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 11
Source: Worldwide Infrastructure Security Report. Arbor Networks, Inc.
DDoS: Year-over-Year Growth
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017
24
Gbps
40
Gbps
49
Gbps
100
Gbps
60
Gbps
62
Gbps
309
Gbps
395
Gbps
490
Gbps
800
Gbps
641
Gbps
The attacker economy is cyclical in nature.
In 2017, multiple Mirai clones appears.
New attack tools like “Windows Mirai Trojan”
and “IoT Reaper”
24
Gbps
40
Gbps
49
Gbps
100
Gbps
60
Gbps
62
Gbps
309
Gbps
395
Gbps
490
Gbps
800
Gbps
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 12
DDoS Botnet Monetization Growth
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 13
DDoS Botnet Monetization
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 14
Source: Worldwide Infrastructure Security Report. Arbor Networks, Inc.
DDoS: Year-over-Year Growth
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018
24
Gbps
40
Gbps
49
Gbps
100
Gbps
60
Gbps
62
Gbps
309
Gbps
395
Gbps
490
Gbps
800
Gbps
641
Gbps
24
Gbps
40
Gbps
49
Gbps
100
Gbps 60
Gbps
62
Gbps
309
Gbps
395
Gbps
490
Gbps
800
Gbps
641
Gbps
1.7
Tbps
In 2018 new Reflection/Amplification attacks
techniques abuse Memcached service and
generate 1.7 Tbps of attack traffic
Also new ways to detect, and compromise
IoT devices, even those thought to be secure
behind firewalls.
24
Gbps
40
Gbps
49
Gbps
100
Gbps
60
Gbps
62
Gbps
309
Gbps
395
Gbps
490
Gbps
800
Gbps
641
Gbps
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 15
Memcached DDoS Reflection Attack
Memcached is an in-memory database caching
system to improve the performance of database-
driven of Internet-facing services.
The default implementation has no authentication
Deployed as listening on port UPD/TCP 11211
Combine this with IP spoofing and the results is a
1.3 Tbps DDoS Reflection attack!
Amplification factor
1:500.000
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 16
February 2018 - Memcached DDoS
Extortion note demanded payment of 50 XMR
(Monero cryptocurrency). Approx. U$S 15,000
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 17
March 2018 - Memcached DDoS
Arbor confirmed a 1.7 Tbps attack
targeted at a customer of a U.S. based
Service Provider
It has been recorded by our ATLAS global
traffic system
That Service Provider had capabilities to
defend against an attack of this nature.
No outages were reported
18©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
Y ?????....Como me afecta a MI ?
19
Ataques a Peru (Max) – Ultimo año
20
Ataques a Peru (Max) – Ultimos 3 meses
21©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
22©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
WHO
WE ARE
> 100 Countries
Protecting
World’s Largest
Networks
The Leading
Authority
23©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
History of ARBOR NETWORKS
TIER 1 & 2
SERVICE PROVIDERS
TIER 1, 2 & 3
SERVICE & CLOUD
PROVIDERS
CLOUD PROVIDERS &
ENTERPRISE DDoS
APT
ENTERPRISE
VISIBILITY
TRAFFIC & DDoS
VISIBILITY
DDoS
PROTECTION
Full Layered DDoS
PROTECTION SOLUTION
ADVANCED
THREAT
FOCUS
EXECUTION
PARTNERS
PEOPLE
INTELLIGENCE
2001 2007 2014 2016
24©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
SERVICE
PROVIDERS
80%
of Tier 2
100%
of Tier 1 ENTERPRISES
90% of Main Cloud
& Web Hoster
Providers
9/10 of Top
Online Brands
25©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
HOW
WE
DO IT
We See What
Others Can’t
Service
Excellence
Continuous
Innovation
26©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
NETWORK TRAFFIC
VISIBILITY IS THE
ULTIMATE TRUTH
27©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
Ingest of traffic at +140Tbps
Visibility of
of Internet Traffic
Malware
Samples per Day
30%
200K
28©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
INTELLIGENCE IS
THE FOUNDATION
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 29
ASNs: 44,570
Unique IPv4
Addresses:
2.63B
“Dark” IPv4
Addresses:
1.76M
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
30©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
CONTINUOUS
INNOVATION WITH
LAYERED SOLUTION
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 31
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 32
NETSCOUT Security
Vision
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 33
CyberSec y sus Analogias
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 34
????
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 35
Small Data, Big Problem
BIG DATA
Net
DATA
Sec
DATA
App
DATA
xxx
DATA
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 36
Como se oculta un elefante ?
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 37
In Today’s Enterprise…
…Managing ‘change’ is key to
success
…SaaS, Cloud, Virtualization….
…Regulatory frameworks, customer
expectation, velocity…
THE CONNECTED
WORLD IS BUSINESS
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 38
…. Cyber Risk is Top of Mind
• Many organizations do not maximize their success:
– Lack of control slows down change adoption
– Increasing costs from digital transformation
• Limited actionable threat awareness, impacts risk management
• Increased Threat Surface
• Increased Data Variability
• Increased Number of Tools
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 39
There is NO Peacetime
3.4M records lost YTD (Feb)
in 2018, up 48.8% on 2017
Multi-vector cyber attacks
are much more common
Threats
everywhere
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 40
Advanced Threat: Slices of Threat Visibility
• Different data sources, granularity & detection methodology
• Enterprises need a COMPLETE picture to identify and contain threats quickly
Internet Threats Enterprise Network Threats Private/Public Cloud,Virtualization, etc..
Smart Data Core
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 41
Small Data, Big Problem
BIG DATA
Net
DATA
Sec
DATA
App
DATA
xxx
DATA
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 42
NETSCOUT Smart Data, For Security
SMART
DATA
CORE
Packet telemetry - Anywhere
Consistent visibility – Everywhere
COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 43
A Security Portfolio for the Future
Arbor SP
NETSCOUT
SMART DATA
Arbor Threat Mitigation System
Arbor CLOUD
Internet
Enterprise
Arbor APS
44©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
WE ARE GUARDIANS
OF THE CONNECTED
WORLD
©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
Thank You !

Weitere ähnliche Inhalte

Was ist angesagt?

2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentationixiademandgen
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCristian Garcia G.
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskCristian Garcia G.
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Cristian Garcia G.
 
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeDisección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeCristian Garcia G.
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityCentrify Corporation
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Cristian Garcia G.
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity Zymr Cloud
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cloudflare
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016ColloqueRISQ
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrZYMR, INC.
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.Cristian Garcia G.
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015   saga - cisco cybersecurity rešenja- Viktor VargaIct 2015   saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor VargaDejan Jeremic
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Securescoopnewsgroup
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR SessionFelipe Lamus
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersCisco Security
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyCloudflare
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesCristian Garcia G.
 

Was ist angesagt? (20)

2017 Security Report Presentation
2017 Security Report Presentation2017 Security Report Presentation
2017 Security Report Presentation
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital riskSecurity transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
 
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nubeDisección de amenazas en entornos de nube
Disección de amenazas en entornos de nube
 
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust SecurityDebunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
 
Zymr Cybersecurity
Zymr Cybersecurity Zymr Cybersecurity
Zymr Cybersecurity
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
 
Microsoft john weigelt 2016
Microsoft john weigelt 2016Microsoft john weigelt 2016
Microsoft john weigelt 2016
 
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - ZymrCyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.RETOS ACTUALES  E INNOVACIÓN  SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015   saga - cisco cybersecurity rešenja- Viktor VargaIct 2015   saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
 
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & SecureHow Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service ProvidersInfographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
 
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial ServicesEmpowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
 

Ähnlich wie Seguridad en Capas: Smart & Actionable Data

IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016Qrator Labs
 
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Wallarm
 
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check PointHarry Gunns
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copperscoopnewsgroup
 
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetOutage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetThousandEyes
 
NetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptxNetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptxMansurAli32
 
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...African Cyber Security Summit
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsForgeRock
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTTechnofutur TIC
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPawachMetharattanara
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalA. Phillip Smith
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsZeshan Sattar
 
Ciena - the journey to the adaptive network
Ciena - the journey to the adaptive networkCiena - the journey to the adaptive network
Ciena - the journey to the adaptive networkJisc
 

Ähnlich wie Seguridad en Capas: Smart & Actionable Data (20)

IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
 
Network Security in 2016
Network Security in 2016Network Security in 2016
Network Security in 2016
 
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017
 
Infosecurity - CDMX 2018
Infosecurity - CDMX 2018Infosecurity - CDMX 2018
Infosecurity - CDMX 2018
 
Check Point Infinity
Check Point Infinity Check Point Infinity
Check Point Infinity
 
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018 NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
 
End to End Security - Check Point
End to End Security - Check PointEnd to End Security - Check Point
End to End Security - Check Point
 
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip CopperAnalytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
 
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the InternetOutage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the Internet
 
NetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptxNetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptx
 
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
 
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of ThingsThe Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
 
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINTPIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptxPresales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
 
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - finalNvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
 
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil ThingsProtecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
 
Ciena - the journey to the adaptive network
Ciena - the journey to the adaptive networkCiena - the journey to the adaptive network
Ciena - the journey to the adaptive network
 

Mehr von Cristian Garcia G.

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyCristian Garcia G.
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCristian Garcia G.
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadCristian Garcia G.
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Cristian Garcia G.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACristian Garcia G.
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Cristian Garcia G.
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterCristian Garcia G.
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoCristian Garcia G.
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Cristian Garcia G.
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cristian Garcia G.
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoCristian Garcia G.
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecinaCristian Garcia G.
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoCristian Garcia G.
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Cristian Garcia G.
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCCristian Garcia G.
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteCristian Garcia G.
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Cristian Garcia G.
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Cristian Garcia G.
 

Mehr von Cristian Garcia G. (20)

Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously EasyMaking App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
 
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al NegocioCiberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
 
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridadReducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
 
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio. Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
 
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IACiberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
 
Symantec Enterprise Cloud
Symantec Enterprise CloudSymantec Enterprise Cloud
Symantec Enterprise Cloud
 
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
 
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-DatacenterProtección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
 
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo TecnológicoLa Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
 
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
 
Gestión de la Exposición
Gestión de la ExposiciónGestión de la Exposición
Gestión de la Exposición
 
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
 
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbridoUn enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
 
La crisis de identidad que se avecina
La crisis de identidad que se avecinaLa crisis de identidad que se avecina
La crisis de identidad que se avecina
 
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxitoSimplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
 
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
 
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOCStay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
 
La evolución de IBM Qradar Suite
La evolución de IBM Qradar SuiteLa evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
 
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
 
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
 

Kürzlich hochgeladen

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 

Kürzlich hochgeladen (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 

Seguridad en Capas: Smart & Actionable Data

  • 1. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY Seguridad en Capas: Smart & Actionable Data Daniel Villanueva Netscout Arbor VP & GM – LATAM dvillanueva@arbor.net
  • 2. 2©2016 ARBOR® CONFIDENTIAL & PROPRIETARY THE INTERNET TRANSFORMS THE HUMANITY
  • 3. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 3 IOT Revolution (Internet Of Things) 27 Billion Connected Devices in 2017
  • 4. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 4 Scan / Listen Service 2 Report: - Discovered IP - Successful Credentials TCP/48101 CnC TCP/23 Telnet Scan (TCP/23) Brute Force 1 Already Compromised? 3 Install Bot Code 4 Loader Check-In to Command & Control 5 Bot (compromised) New IOT Device IOT: Mirai Botnet Propagation And the beat goes on ... 1’ Telnet Scan (TCP/23) Brute Force Telnet Scan (TCP/23) Brute Force New Bot (compromised) ~500,000 Infected Devices
  • 5. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 5 Bruce Schneier - renowned security technologist https://www.schneier.com/blog/archives/2017/02/security_and_th.html “The market can't fix this because neither the buyer nor the seller cares. The owners of the webcams and DVRs used in the denial-of-service attacks don't care. Their devices were cheap to buy, they still work, and they don't know any of the victims of the attacks. The sellers of those devices don't care: They're now selling newer and better models, and the original buyers only cared about price and features. There is no market solution, because the insecurity is what economists call an externality: It's an effect of the purchasing decision that affects other people. Think of it kind of like invisible pollution.” How will this get any better ?...
  • 6. 6©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 1.7K KNOWN DATA BREACHES 7.5M DDoS ATTACKS Just last year… 1 Attack Every 4.2 Seconds 57% of Enterprises saw their Bandwidth Saturated due to DDoS DDoS is the Top Threat for Service Providers, and 87% had Reported Attacks 44% of Advanced Attacks did not use Malwares 15% Increase vs 2016
  • 7. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 7 Source: Worldwide Infrastructure Security Report. Arbor Networks, Inc. In 2016 sizes, frequency and complexity of attacks have increased dramatically IoT Botnets becomes a reality DDoS: Year-over-Year Growth 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps
  • 8. 8©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 2016 600G 500G 400G 300G 200G 100G DDoS Revolution: IoT Botnet Impact Inbound DDoS Traffic in a Brazilian ISP Sept AugOct Nov Feb Mar Apr May June JulyDec SustainedattackIoTBotnetobserved
  • 9. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 9 October 2016: Massive Attack to Internet
  • 10. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 10 DYN down and disrupts the Internet
  • 11. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 11 Source: Worldwide Infrastructure Security Report. Arbor Networks, Inc. DDoS: Year-over-Year Growth 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps 641 Gbps The attacker economy is cyclical in nature. In 2017, multiple Mirai clones appears. New attack tools like “Windows Mirai Trojan” and “IoT Reaper” 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps
  • 12. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 12 DDoS Botnet Monetization Growth
  • 13. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 13 DDoS Botnet Monetization
  • 14. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 14 Source: Worldwide Infrastructure Security Report. Arbor Networks, Inc. DDoS: Year-over-Year Growth 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps 641 Gbps 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps 641 Gbps 1.7 Tbps In 2018 new Reflection/Amplification attacks techniques abuse Memcached service and generate 1.7 Tbps of attack traffic Also new ways to detect, and compromise IoT devices, even those thought to be secure behind firewalls. 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps 641 Gbps
  • 15. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 15 Memcached DDoS Reflection Attack Memcached is an in-memory database caching system to improve the performance of database- driven of Internet-facing services. The default implementation has no authentication Deployed as listening on port UPD/TCP 11211 Combine this with IP spoofing and the results is a 1.3 Tbps DDoS Reflection attack! Amplification factor 1:500.000
  • 16. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 16 February 2018 - Memcached DDoS Extortion note demanded payment of 50 XMR (Monero cryptocurrency). Approx. U$S 15,000
  • 17. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 17 March 2018 - Memcached DDoS Arbor confirmed a 1.7 Tbps attack targeted at a customer of a U.S. based Service Provider It has been recorded by our ATLAS global traffic system That Service Provider had capabilities to defend against an attack of this nature. No outages were reported
  • 18. 18©2016 ARBOR® CONFIDENTIAL & PROPRIETARY Y ?????....Como me afecta a MI ?
  • 19. 19 Ataques a Peru (Max) – Ultimo año
  • 20. 20 Ataques a Peru (Max) – Ultimos 3 meses
  • 22. 22©2016 ARBOR® CONFIDENTIAL & PROPRIETARY WHO WE ARE > 100 Countries Protecting World’s Largest Networks The Leading Authority
  • 23. 23©2016 ARBOR® CONFIDENTIAL & PROPRIETARY History of ARBOR NETWORKS TIER 1 & 2 SERVICE PROVIDERS TIER 1, 2 & 3 SERVICE & CLOUD PROVIDERS CLOUD PROVIDERS & ENTERPRISE DDoS APT ENTERPRISE VISIBILITY TRAFFIC & DDoS VISIBILITY DDoS PROTECTION Full Layered DDoS PROTECTION SOLUTION ADVANCED THREAT FOCUS EXECUTION PARTNERS PEOPLE INTELLIGENCE 2001 2007 2014 2016
  • 24. 24©2016 ARBOR® CONFIDENTIAL & PROPRIETARY SERVICE PROVIDERS 80% of Tier 2 100% of Tier 1 ENTERPRISES 90% of Main Cloud & Web Hoster Providers 9/10 of Top Online Brands
  • 25. 25©2016 ARBOR® CONFIDENTIAL & PROPRIETARY HOW WE DO IT We See What Others Can’t Service Excellence Continuous Innovation
  • 26. 26©2016 ARBOR® CONFIDENTIAL & PROPRIETARY NETWORK TRAFFIC VISIBILITY IS THE ULTIMATE TRUTH
  • 27. 27©2016 ARBOR® CONFIDENTIAL & PROPRIETARY Ingest of traffic at +140Tbps Visibility of of Internet Traffic Malware Samples per Day 30% 200K
  • 28. 28©2016 ARBOR® CONFIDENTIAL & PROPRIETARY INTELLIGENCE IS THE FOUNDATION
  • 29. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY 29 ASNs: 44,570 Unique IPv4 Addresses: 2.63B “Dark” IPv4 Addresses: 1.76M ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
  • 30. 30©2016 ARBOR® CONFIDENTIAL & PROPRIETARY CONTINUOUS INNOVATION WITH LAYERED SOLUTION
  • 31. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 31
  • 32. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 32 NETSCOUT Security Vision
  • 33. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 33 CyberSec y sus Analogias
  • 34. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 34 ????
  • 35. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 35 Small Data, Big Problem BIG DATA Net DATA Sec DATA App DATA xxx DATA
  • 36. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 36 Como se oculta un elefante ?
  • 37. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 37 In Today’s Enterprise… …Managing ‘change’ is key to success …SaaS, Cloud, Virtualization…. …Regulatory frameworks, customer expectation, velocity… THE CONNECTED WORLD IS BUSINESS
  • 38. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 38 …. Cyber Risk is Top of Mind • Many organizations do not maximize their success: – Lack of control slows down change adoption – Increasing costs from digital transformation • Limited actionable threat awareness, impacts risk management • Increased Threat Surface • Increased Data Variability • Increased Number of Tools
  • 39. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 39 There is NO Peacetime 3.4M records lost YTD (Feb) in 2018, up 48.8% on 2017 Multi-vector cyber attacks are much more common Threats everywhere
  • 40. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 40 Advanced Threat: Slices of Threat Visibility • Different data sources, granularity & detection methodology • Enterprises need a COMPLETE picture to identify and contain threats quickly Internet Threats Enterprise Network Threats Private/Public Cloud,Virtualization, etc.. Smart Data Core
  • 41. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 41 Small Data, Big Problem BIG DATA Net DATA Sec DATA App DATA xxx DATA
  • 42. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 42 NETSCOUT Smart Data, For Security SMART DATA CORE Packet telemetry - Anywhere Consistent visibility – Everywhere
  • 43. COPYRIGHT © 2018 NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 43 A Security Portfolio for the Future Arbor SP NETSCOUT SMART DATA Arbor Threat Mitigation System Arbor CLOUD Internet Enterprise Arbor APS
  • 44. 44©2016 ARBOR® CONFIDENTIAL & PROPRIETARY WE ARE GUARDIANS OF THE CONNECTED WORLD
  • 45. ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY Thank You !