Suche senden
Hochladen
Seguridad en Capas: Smart & Actionable Data
•
Als PPTX, PDF herunterladen
•
1 gefällt mir
•
163 views
Cristian Garcia G.
Folgen
Daniel Villanueva - Vice President Sales - LATAM
Weniger lesen
Mehr lesen
Technologie
Diashow-Anzeige
Melden
Teilen
Diashow-Anzeige
Melden
Teilen
1 von 45
Jetzt herunterladen
Empfohlen
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
Business Continuity and app Security
Business Continuity and app Security
Cristian Garcia G.
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Cristian Garcia G.
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber Security
Cristian Garcia G.
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
El Futuro de la Cibersegu
El Futuro de la Cibersegu
Cristian Garcia G.
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
INFINITY Presentation
INFINITY Presentation
Cristian Garcia G.
Empfohlen
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
Business Continuity and app Security
Business Continuity and app Security
Cristian Garcia G.
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Proteja sus datos en cualquier servicio Cloud y Web de forma unificada
Cristian Garcia G.
Ascendiendo a la GEN V de Cyber Security
Ascendiendo a la GEN V de Cyber Security
Cristian Garcia G.
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Cristian Garcia G.
El Futuro de la Cibersegu
El Futuro de la Cibersegu
Cristian Garcia G.
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
INFINITY Presentation
INFINITY Presentation
Cristian Garcia G.
2017 Security Report Presentation
2017 Security Report Presentation
ixiademandgen
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
Cristian Garcia G.
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
Cristian Garcia G.
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nube
Cristian Garcia G.
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Cristian Garcia G.
Zymr Cybersecurity
Zymr Cybersecurity
Zymr Cloud
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
Cloudflare
Microsoft john weigelt 2016
Microsoft john weigelt 2016
ColloqueRISQ
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
Cristian Garcia G.
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Dejan Jeremic
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
Cisco Live Cancun PR Session
Cisco Live Cancun PR Session
Felipe Lamus
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
Cloudflare
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
Cristian Garcia G.
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
APNIC
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
African Cyber Security Summit
Weitere ähnliche Inhalte
Was ist angesagt?
2017 Security Report Presentation
2017 Security Report Presentation
ixiademandgen
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
Cristian Garcia G.
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
Cristian Garcia G.
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nube
Cristian Garcia G.
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Centrify Corporation
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Cristian Garcia G.
Zymr Cybersecurity
Zymr Cybersecurity
Zymr Cloud
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
Cloudflare
Microsoft john weigelt 2016
Microsoft john weigelt 2016
ColloqueRISQ
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
ZYMR, INC.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
Cristian Garcia G.
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Dejan Jeremic
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
scoopnewsgroup
Cisco Live Cancun PR Session
Cisco Live Cancun PR Session
Felipe Lamus
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
Cisco Security
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
Cloudflare
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
Cristian Garcia G.
Was ist angesagt?
(20)
2017 Security Report Presentation
2017 Security Report Presentation
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
Security transformation: Helping you manage digital risk
Security transformation: Helping you manage digital risk
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Disección de amenazas en entornos de nube
Disección de amenazas en entornos de nube
Debunked: 5 Myths About Zero Trust Security
Debunked: 5 Myths About Zero Trust Security
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Zymr Cybersecurity
Zymr Cybersecurity
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
Microsoft john weigelt 2016
Microsoft john weigelt 2016
Cyber Security Services & Solutions - Zymr
Cyber Security Services & Solutions - Zymr
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
How Zero Trust Makes the Mission Simple & Secure
How Zero Trust Makes the Mission Simple & Secure
Cisco Live Cancun PR Session
Cisco Live Cancun PR Session
Infographic: Security for Mobile Service Providers
Infographic: Security for Mobile Service Providers
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
Empowering Digital Transformation in Financial Services
Empowering Digital Transformation in Financial Services
Ähnlich wie Seguridad en Capas: Smart & Actionable Data
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
APNIC
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
African Cyber Security Summit
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
African Cyber Security Summit
Network Security in 2016
Network Security in 2016
Qrator Labs
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017
Wallarm
Infosecurity - CDMX 2018
Infosecurity - CDMX 2018
Miguel Hernández y López
Check Point Infinity
Check Point Infinity
Alexander Kravchenko
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT
End to End Security - Check Point
End to End Security - Check Point
Harry Gunns
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
scoopnewsgroup
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the Internet
ThousandEyes
NetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptx
MansurAli32
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
African Cyber Security Summit
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
ForgeRock
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
Technofutur TIC
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
PawachMetharattanara
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
PawachMetharattanara
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
A. Phillip Smith
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
Zeshan Sattar
Ciena - the journey to the adaptive network
Ciena - the journey to the adaptive network
Jisc
Ähnlich wie Seguridad en Capas: Smart & Actionable Data
(20)
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
Atelier Technique ARBOR NETWORKS ACSS 2018
Network Security in 2016
Network Security in 2016
Network and Application Security 2017. Prediction 2017
Network and Application Security 2017. Prediction 2017
Infosecurity - CDMX 2018
Infosecurity - CDMX 2018
Check Point Infinity
Check Point Infinity
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
NETSCOUT Threat Intelligence Report: Findings Summary 1st half of 2018
End to End Security - Check Point
End to End Security - Check Point
Analytical Driven Security - Chip Copper
Analytical Driven Security - Chip Copper
Outage analysis: BGP Routing Errors Ripple Across the Internet
Outage analysis: BGP Routing Errors Ripple Across the Internet
NetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptx
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
Conférence - Arbor Edge Defense, Première et dernière ligne de défense intell...
The Future of Digital Identity in the Age of the Internet of Things
The Future of Digital Identity in the Age of the Internet of Things
PIONEERING GEN V SECURITY WITH CHECK POINT
PIONEERING GEN V SECURITY WITH CHECK POINT
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
Presales-Present_GravityZone Products_June2023.pptx
Nvis, inc. 03 18-2020 - final
Nvis, inc. 03 18-2020 - final
Protecting your Organisation from the Internet of Evil Things
Protecting your Organisation from the Internet of Evil Things
Ciena - the journey to the adaptive network
Ciena - the journey to the adaptive network
Mehr von Cristian Garcia G.
Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
Cristian Garcia G.
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
Cristian Garcia G.
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
Cristian Garcia G.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Cristian Garcia G.
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
Cristian Garcia G.
Symantec Enterprise Cloud
Symantec Enterprise Cloud
Cristian Garcia G.
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Cristian Garcia G.
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
Cristian Garcia G.
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
Cristian Garcia G.
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Cristian Garcia G.
Gestión de la Exposición
Gestión de la Exposición
Cristian Garcia G.
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cristian Garcia G.
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Cristian Garcia G.
La crisis de identidad que se avecina
La crisis de identidad que se avecina
Cristian Garcia G.
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Cristian Garcia G.
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Cristian Garcia G.
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Cristian Garcia G.
La evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
Cristian Garcia G.
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
Cristian Garcia G.
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Cristian Garcia G.
Mehr von Cristian Garcia G.
(20)
Making App Security and Delivery Ridiculously Easy
Making App Security and Delivery Ridiculously Easy
Ciberseguridad Alineada al Negocio
Ciberseguridad Alineada al Negocio
Reducción efectiva del riesgo de ciberseguridad
Reducción efectiva del riesgo de ciberseguridad
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Operación Segura : SOC y alineación del riesgo con el impacto para el negocio.
Ciberseguridad en el mundo de la IA
Ciberseguridad en el mundo de la IA
Symantec Enterprise Cloud
Symantec Enterprise Cloud
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Optimización en la detección de amenazas utilizando analítica (IA/UEBA)
Protección de los datos en la era Post-Datacenter
Protección de los datos en la era Post-Datacenter
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
La Ciberseguridad como pilar fundamental del Desarrollo Tecnológico
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Simplificando la seguridad en entornos de nube híbridos con el Security Fabri...
Gestión de la Exposición
Gestión de la Exposición
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Cómo la gestión de privilegios puede blindar su negocio contra ransomware y o...
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
Un enfoque práctico para implementar confianza cero en el trabajo híbrido
La crisis de identidad que se avecina
La crisis de identidad que se avecina
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Simplifica y Vencerás : La seguridad debe ser simple para garantizar el éxito
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Porqué enfocarnos en el DEX (Experiencia Digital del Empleado) - Cómo la tecn...
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
Stay ahead of the Threats: Automate and Simplify SecOps to revolutionize the SOC
La evolución de IBM Qradar Suite
La evolución de IBM Qradar Suite
Ciberseguridad en GTD, SecureSoft en GTD
Ciberseguridad en GTD, SecureSoft en GTD
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Time is Money… and More.- Nuestras Capacidades Regionales de Detección y Resp...
Kürzlich hochgeladen
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
UiPathCommunity
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
Alfredo García Lavilla
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
Dubai Multi Commodity Centre
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
LoriGlavin3
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
Commit University
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
MounikaPolabathina
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
Lars Bell
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Databarracks
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
ScyllaDB
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Alan Dix
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Hervé Boutemy
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
LoriGlavin3
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
Kalema Edgar
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
gvaughan
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
BkGupta21
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Fwdays
Kürzlich hochgeladen
(20)
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
How to write a Business Continuity Plan
How to write a Business Continuity Plan
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
Seguridad en Capas: Smart & Actionable Data
1.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY Seguridad en Capas: Smart & Actionable Data Daniel Villanueva Netscout Arbor VP & GM – LATAM dvillanueva@arbor.net
2.
2©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY THE INTERNET TRANSFORMS THE HUMANITY
3.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 3 IOT Revolution (Internet Of Things) 27 Billion Connected Devices in 2017
4.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 4 Scan / Listen Service 2 Report: - Discovered IP - Successful Credentials TCP/48101 CnC TCP/23 Telnet Scan (TCP/23) Brute Force 1 Already Compromised? 3 Install Bot Code 4 Loader Check-In to Command & Control 5 Bot (compromised) New IOT Device IOT: Mirai Botnet Propagation And the beat goes on ... 1’ Telnet Scan (TCP/23) Brute Force Telnet Scan (TCP/23) Brute Force New Bot (compromised) ~500,000 Infected Devices
5.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 5 Bruce Schneier - renowned security technologist https://www.schneier.com/blog/archives/2017/02/security_and_th.html “The market can't fix this because neither the buyer nor the seller cares. The owners of the webcams and DVRs used in the denial-of-service attacks don't care. Their devices were cheap to buy, they still work, and they don't know any of the victims of the attacks. The sellers of those devices don't care: They're now selling newer and better models, and the original buyers only cared about price and features. There is no market solution, because the insecurity is what economists call an externality: It's an effect of the purchasing decision that affects other people. Think of it kind of like invisible pollution.” How will this get any better ?...
6.
6©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 1.7K KNOWN DATA BREACHES 7.5M DDoS ATTACKS Just last year… 1 Attack Every 4.2 Seconds 57% of Enterprises saw their Bandwidth Saturated due to DDoS DDoS is the Top Threat for Service Providers, and 87% had Reported Attacks 44% of Advanced Attacks did not use Malwares 15% Increase vs 2016
7.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 7 Source: Worldwide Infrastructure Security Report. Arbor Networks, Inc. In 2016 sizes, frequency and complexity of attacks have increased dramatically IoT Botnets becomes a reality DDoS: Year-over-Year Growth 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps
8.
8©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 2016 600G 500G 400G 300G 200G 100G DDoS Revolution: IoT Botnet Impact Inbound DDoS Traffic in a Brazilian ISP Sept AugOct Nov Feb Mar Apr May June JulyDec SustainedattackIoTBotnetobserved
9.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 9 October 2016: Massive Attack to Internet
10.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 10 DYN down and disrupts the Internet
11.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 11 Source: Worldwide Infrastructure Security Report. Arbor Networks, Inc. DDoS: Year-over-Year Growth 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps 641 Gbps The attacker economy is cyclical in nature. In 2017, multiple Mirai clones appears. New attack tools like “Windows Mirai Trojan” and “IoT Reaper” 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps
12.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 12 DDoS Botnet Monetization Growth
13.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 13 DDoS Botnet Monetization
14.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 14 Source: Worldwide Infrastructure Security Report. Arbor Networks, Inc. DDoS: Year-over-Year Growth 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps 641 Gbps 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps 641 Gbps 1.7 Tbps In 2018 new Reflection/Amplification attacks techniques abuse Memcached service and generate 1.7 Tbps of attack traffic Also new ways to detect, and compromise IoT devices, even those thought to be secure behind firewalls. 24 Gbps 40 Gbps 49 Gbps 100 Gbps 60 Gbps 62 Gbps 309 Gbps 395 Gbps 490 Gbps 800 Gbps 641 Gbps
15.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 15 Memcached DDoS Reflection Attack Memcached is an in-memory database caching system to improve the performance of database- driven of Internet-facing services. The default implementation has no authentication Deployed as listening on port UPD/TCP 11211 Combine this with IP spoofing and the results is a 1.3 Tbps DDoS Reflection attack! Amplification factor 1:500.000
16.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 16 February 2018 - Memcached DDoS Extortion note demanded payment of 50 XMR (Monero cryptocurrency). Approx. U$S 15,000
17.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 17 March 2018 - Memcached DDoS Arbor confirmed a 1.7 Tbps attack targeted at a customer of a U.S. based Service Provider It has been recorded by our ATLAS global traffic system That Service Provider had capabilities to defend against an attack of this nature. No outages were reported
18.
18©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY Y ?????....Como me afecta a MI ?
19.
19 Ataques a Peru
(Max) – Ultimo año
20.
20 Ataques a Peru
(Max) – Ultimos 3 meses
21.
21©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY
22.
22©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY WHO WE ARE > 100 Countries Protecting World’s Largest Networks The Leading Authority
23.
23©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY History of ARBOR NETWORKS TIER 1 & 2 SERVICE PROVIDERS TIER 1, 2 & 3 SERVICE & CLOUD PROVIDERS CLOUD PROVIDERS & ENTERPRISE DDoS APT ENTERPRISE VISIBILITY TRAFFIC & DDoS VISIBILITY DDoS PROTECTION Full Layered DDoS PROTECTION SOLUTION ADVANCED THREAT FOCUS EXECUTION PARTNERS PEOPLE INTELLIGENCE 2001 2007 2014 2016
24.
24©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY SERVICE PROVIDERS 80% of Tier 2 100% of Tier 1 ENTERPRISES 90% of Main Cloud & Web Hoster Providers 9/10 of Top Online Brands
25.
25©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY HOW WE DO IT We See What Others Can’t Service Excellence Continuous Innovation
26.
26©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY NETWORK TRAFFIC VISIBILITY IS THE ULTIMATE TRUTH
27.
27©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY Ingest of traffic at +140Tbps Visibility of of Internet Traffic Malware Samples per Day 30% 200K
28.
28©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY INTELLIGENCE IS THE FOUNDATION
29.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY 29 ASNs: 44,570 Unique IPv4 Addresses: 2.63B “Dark” IPv4 Addresses: 1.76M ©2016 ARBOR® CONFIDENTIAL & PROPRIETARY
30.
30©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY CONTINUOUS INNOVATION WITH LAYERED SOLUTION
31.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 31
32.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 32 NETSCOUT Security Vision
33.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 33 CyberSec y sus Analogias
34.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 34 ????
35.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 35 Small Data, Big Problem BIG DATA Net DATA Sec DATA App DATA xxx DATA
36.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 36 Como se oculta un elefante ?
37.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 37 In Today’s Enterprise… …Managing ‘change’ is key to success …SaaS, Cloud, Virtualization…. …Regulatory frameworks, customer expectation, velocity… THE CONNECTED WORLD IS BUSINESS
38.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 38 …. Cyber Risk is Top of Mind • Many organizations do not maximize their success: – Lack of control slows down change adoption – Increasing costs from digital transformation • Limited actionable threat awareness, impacts risk management • Increased Threat Surface • Increased Data Variability • Increased Number of Tools
39.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 39 There is NO Peacetime 3.4M records lost YTD (Feb) in 2018, up 48.8% on 2017 Multi-vector cyber attacks are much more common Threats everywhere
40.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 40 Advanced Threat: Slices of Threat Visibility • Different data sources, granularity & detection methodology • Enterprises need a COMPLETE picture to identify and contain threats quickly Internet Threats Enterprise Network Threats Private/Public Cloud,Virtualization, etc.. Smart Data Core
41.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 41 Small Data, Big Problem BIG DATA Net DATA Sec DATA App DATA xxx DATA
42.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 42 NETSCOUT Smart Data, For Security SMART DATA CORE Packet telemetry - Anywhere Consistent visibility – Everywhere
43.
COPYRIGHT © 2018
NETSCOUT SYSTEMS, INC. | CONFIDENTIAL & PROPRIETARY 43 A Security Portfolio for the Future Arbor SP NETSCOUT SMART DATA Arbor Threat Mitigation System Arbor CLOUD Internet Enterprise Arbor APS
44.
44©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY WE ARE GUARDIANS OF THE CONNECTED WORLD
45.
©2016 ARBOR® CONFIDENTIAL
& PROPRIETARY Thank You !
Jetzt herunterladen