SlideShare ist ein Scribd-Unternehmen logo
1 von 28
Downloaden Sie, um offline zu lesen
Start A Mission Join the Swarm
Prescriptive Cyber - Business Resilience
Hyver
May 2017
PASSIVE…http://reut.rs/2psz5m7
Are you brave
enough?…
About our Cyber Activity
AGW Group – Prosecs provides END-TO-END ORGANIZATIONAL VULNERABILITY COVERAGE AND
SECURITY MATURITY
Established 2011
❖ Boutique cyber Red-Team consulting
❖ Supporting >100 companies (23 Fortune 500 )
❖ Retainer contracts
❖ Core -Team: 25 nation-level Elite experts
❖ Active community: 400 White-hat Hackers
5
Hyver
© 2016 Red Team Intelligence
Leading Bank - Case
Study
7
Hyver
© 2016 Red Team Intelligence
SANDBOX
macrosANTI
VIRUS
8
Hyver
© 2016 Red Team Intelligence
40% OPEN THE FILE IN MORE THAN 100
ORGANIZATIONS
100% SUCCESS
Behavior Anomaly Signature
9
Hyver
© 2016 Red Team Intelligence
USER
Misconfiguration of the
system ADMIN
Mimikatz Names and Passwords
P
H
I
S
I
N
G
DOMAIN ADMINISTRATOR
10
Hyver
© 2016 Red Team Intelligence
TAKE OVER- GAME OVER
11
Hyver
© 2016 Red Team Intelligence
Windows 2K
Exploitation
12
Hyver
© 2016 Red Team Intelligence
Sensitive Data on
Shares
13
Hyver
© 2016 Red Team Intelligence
Security Cameras
14
Hyver
© 2016 Red Team Intelligence
Branches Security
Cameras
15
Hyver
© 2016 Red Team Intelligence
Physical access control
system
16
Hyver
© 2016 Red Team Intelligence
Access to VoIP based
telephones
17
Hyver
© 2016 Red Team Intelligence
Full access to video conference
systems
18
Hyver
© 2016 Red Team Intelligence
Access to restricted cameras
19
Hyver
© 2016 Red Team Intelligence
ATMs Full Control
20
Hyver
© 2016 Red Team Intelligence
ATMs Security Cameras
LINE ID eitanlavie
Email eitan@agwcorp.com
Are you still brave
enough?…
22
Hyver
© 2016 Red Team Intelligence
Security Leaders Challenges
Army of Attackers
Vast Methodologies
Advanced Attacks
New Attack Vectors
Lack of HR & Skills
GEO Knowledge
Machine can’t handle logic
Budget , Priority
Poor Actionable Mitigation
Vs
security strategy needs to encompass people,
processes, and technology
23
Hyver
© 2016 Red Team Intelligence
Changing the Paradigm
Predictive Analysis
Assessment
PROACTIVE!
24
Hyver
© 2016 Red Team Intelligence
Hyver – Prescriptive Analysis
Attacks Graph AnalysisVulnerability Map Decision Kill Chain
25
Hyver
© 2016 Red Team Intelligence
Hyver Vetted Community
Sign-In
Only Member recommend
on new member
Registration
Personal Information & Bank
Details (High rank – NDA )
Ranking
Build your rank &trust based
on performance over time
Objections
Community members can
recommend or object
Challenge
Tests in phases evaluating
Quality
Monitoring
Continues monitoring &
recording of all users activities
Each task is assigned to
multiple Testers
Community
26
Hyver
© 2016 Red Team Intelligence
Maximum Coverage at Work
The result: 98% Unparalleled Vulnerability Coverage
Hyver test methodology leverages machine learning
to improve human tasking for security efficiency.
COMPETITION HYVER
VS
27
Hyver
© 2016 Red Team Intelligence
Hyver
Continuous Assessment Experts Community Predictive Analysis
28
Hyver
© 2016 Red Team Intelligence
Thank You
Eitan Lavie – Chairman & CEO
AGW Group
24/7
eitan@agwcorp.com

Weitere ähnliche Inhalte

Was ist angesagt?

How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
CrowdStrike
 
DSP-MSSMDR-DataSheet_Final (1)
DSP-MSSMDR-DataSheet_Final (1)DSP-MSSMDR-DataSheet_Final (1)
DSP-MSSMDR-DataSheet_Final (1)
Spencer Henderson
 
DSP-MSSMDR-DataSheet_Final (1)
DSP-MSSMDR-DataSheet_Final (1)DSP-MSSMDR-DataSheet_Final (1)
DSP-MSSMDR-DataSheet_Final (1)
Jonathan Holman
 
Advanced Threat Hunting - Botconf 2017
Advanced Threat Hunting - Botconf 2017Advanced Threat Hunting - Botconf 2017
Advanced Threat Hunting - Botconf 2017
Kevin Finley
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
Tony Zirnoon, CISSP
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
Adam Barrera
 

Was ist angesagt? (20)

Managing Indicator Deprecation in ThreatConnect
Managing Indicator Deprecation in ThreatConnectManaging Indicator Deprecation in ThreatConnect
Managing Indicator Deprecation in ThreatConnect
 
MP_OneSheet_VulnThreat
MP_OneSheet_VulnThreatMP_OneSheet_VulnThreat
MP_OneSheet_VulnThreat
 
Building a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the CloudBuilding a Threat Hunting Practice in the Cloud
Building a Threat Hunting Practice in the Cloud
 
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
CrowdStrike Webinar: Taking Dwell-Time Out of Incident ResponseCrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
CrowdStrike Webinar: Taking Dwell-Time Out of Incident Response
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
 
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
The Security Industry is Suffering from Fragmentation, What Can Your Organiza...
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
 
DSP-MSSMDR-DataSheet_Final (1)
DSP-MSSMDR-DataSheet_Final (1)DSP-MSSMDR-DataSheet_Final (1)
DSP-MSSMDR-DataSheet_Final (1)
 
DSP-MSSMDR-DataSheet_Final (1)
DSP-MSSMDR-DataSheet_Final (1)DSP-MSSMDR-DataSheet_Final (1)
DSP-MSSMDR-DataSheet_Final (1)
 
Advanced Threat Hunting - Botconf 2017
Advanced Threat Hunting - Botconf 2017Advanced Threat Hunting - Botconf 2017
Advanced Threat Hunting - Botconf 2017
 
Threat Hunting
Threat HuntingThreat Hunting
Threat Hunting
 
Security Awareness: The Best Defence
Security Awareness: The Best DefenceSecurity Awareness: The Best Defence
Security Awareness: The Best Defence
 
Industry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_FinanceIndustry_Brief_TrapX_Banking_Finance
Industry_Brief_TrapX_Banking_Finance
 
Sqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar UsersSqrrl and IBM: Threat Hunting for QRadar Users
Sqrrl and IBM: Threat Hunting for QRadar Users
 
How to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrikeHow to Replace Your Legacy Antivirus Solution with CrowdStrike
How to Replace Your Legacy Antivirus Solution with CrowdStrike
 
Executive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security StudyExecutive Summary of the 2016 Scalar Security Study
Executive Summary of the 2016 Scalar Security Study
 
See Clearly and Respond Quickly from the Network to the Endpoint
See Clearly and Respond Quickly from the Network to the EndpointSee Clearly and Respond Quickly from the Network to the Endpoint
See Clearly and Respond Quickly from the Network to the Endpoint
 
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORMDEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
DEFENDING AGAINST THREATS TARGETING THE MAC PLATFORM
 
Demonstrating Information Security Program Effectiveness
Demonstrating Information Security Program EffectivenessDemonstrating Information Security Program Effectiveness
Demonstrating Information Security Program Effectiveness
 
Intelligence driven defense webinar
Intelligence driven defense webinarIntelligence driven defense webinar
Intelligence driven defense webinar
 

Ähnlich wie Echelon Thailand 2017 – Cybersecurity Resilience by Crowd Wisdom

Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Aujas
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
ChristopherSumner7
 

Ähnlich wie Echelon Thailand 2017 – Cybersecurity Resilience by Crowd Wisdom (20)

Understanding the “Why” in Enterprise Application Security Strategy
Understanding the “Why” in Enterprise Application Security StrategyUnderstanding the “Why” in Enterprise Application Security Strategy
Understanding the “Why” in Enterprise Application Security Strategy
 
Data Science for Cyber Risk
Data Science for Cyber RiskData Science for Cyber Risk
Data Science for Cyber Risk
 
Risk Assessments
Risk AssessmentsRisk Assessments
Risk Assessments
 
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber AttackWebinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
Webinar: Get Ready to Detect, Respond & Recover from a Cyber Attack
 
Data Aggregation, Curation and analytics for security and situational awareness
Data Aggregation, Curation and analytics for security and situational awarenessData Aggregation, Curation and analytics for security and situational awareness
Data Aggregation, Curation and analytics for security and situational awareness
 
Aml 161014061258
Aml 161014061258Aml 161014061258
Aml 161014061258
 
Aml 161014061258
Aml 161014061258Aml 161014061258
Aml 161014061258
 
AML
AMLAML
AML
 
Deliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data SecurityDeliver the ‘Right’ Customer Experience without Compromising Data Security
Deliver the ‘Right’ Customer Experience without Compromising Data Security
 
PAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArkPAMaaS- Powered by CyberArk
PAMaaS- Powered by CyberArk
 
Overview of Haystax Technology
Overview of Haystax TechnologyOverview of Haystax Technology
Overview of Haystax Technology
 
Top 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk programTop 5 secrets to successfully jumpstarting your cyber-risk program
Top 5 secrets to successfully jumpstarting your cyber-risk program
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance2018 State of Cyber Resilience Insurance
2018 State of Cyber Resilience Insurance
 
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device PlatformsHow to Use Open Source Technologies in Safety-critical Medical Device Platforms
How to Use Open Source Technologies in Safety-critical Medical Device Platforms
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
ServiceNow Webinar 12/1: Simplify Security Operations - Detect, Prioritize an...
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 

Mehr von e27

Mehr von e27 (20)

Insights from Localising and Evolving LINE through Partnerships
Insights from Localising and Evolving LINE through PartnershipsInsights from Localising and Evolving LINE through Partnerships
Insights from Localising and Evolving LINE through Partnerships
 
Echelon Thailand 2017 – Fundraising & Term Sheet 101
Echelon Thailand 2017 – Fundraising & Term Sheet 101Echelon Thailand 2017 – Fundraising & Term Sheet 101
Echelon Thailand 2017 – Fundraising & Term Sheet 101
 
Echelon Thailand 2017 – Social Media Intelligence for Start-Ups & SMEs
Echelon Thailand 2017 – Social Media Intelligence for Start-Ups & SMEsEchelon Thailand 2017 – Social Media Intelligence for Start-Ups & SMEs
Echelon Thailand 2017 – Social Media Intelligence for Start-Ups & SMEs
 
Echelon Thailand 2017 – How can Digital Technology Address Social Needs While...
Echelon Thailand 2017 – How can Digital Technology Address Social Needs While...Echelon Thailand 2017 – How can Digital Technology Address Social Needs While...
Echelon Thailand 2017 – How can Digital Technology Address Social Needs While...
 
Echelon Thailand 2017 – Hiring 101
Echelon Thailand 2017 – Hiring 101Echelon Thailand 2017 – Hiring 101
Echelon Thailand 2017 – Hiring 101
 
Echelon Thailand 2017 – Leveraging On Scalable Technology To Expand Regionally
Echelon Thailand 2017 – Leveraging On Scalable Technology To Expand RegionallyEchelon Thailand 2017 – Leveraging On Scalable Technology To Expand Regionally
Echelon Thailand 2017 – Leveraging On Scalable Technology To Expand Regionally
 
Disrupting the Food / Agri Landscape in Southeast Asia With Tech Innovation
Disrupting the Food / Agri Landscape in Southeast Asia With Tech InnovationDisrupting the Food / Agri Landscape in Southeast Asia With Tech Innovation
Disrupting the Food / Agri Landscape in Southeast Asia With Tech Innovation
 
Echelon Asia Summit 2015: Startup Metrics for Mobile Pirates
Echelon Asia Summit 2015: Startup Metrics for Mobile PiratesEchelon Asia Summit 2015: Startup Metrics for Mobile Pirates
Echelon Asia Summit 2015: Startup Metrics for Mobile Pirates
 
Echelon Asia Summit 2015: Path of a NEXT GEN [ASEAN] Start-UP
Echelon Asia Summit 2015: Path of a NEXT GEN [ASEAN] Start-UPEchelon Asia Summit 2015: Path of a NEXT GEN [ASEAN] Start-UP
Echelon Asia Summit 2015: Path of a NEXT GEN [ASEAN] Start-UP
 
Echelon Asia Summit 2015: State of App Nation: Asia Edition
Echelon Asia Summit 2015: State of App Nation: Asia EditionEchelon Asia Summit 2015: State of App Nation: Asia Edition
Echelon Asia Summit 2015: State of App Nation: Asia Edition
 
Echelon Asia Summit 2015: The Old Guy Speech (The End of the Mobile App Cycle...
Echelon Asia Summit 2015: The Old Guy Speech (The End of the Mobile App Cycle...Echelon Asia Summit 2015: The Old Guy Speech (The End of the Mobile App Cycle...
Echelon Asia Summit 2015: The Old Guy Speech (The End of the Mobile App Cycle...
 
Echelon Asia Summit 2015: The Future of Payments
Echelon Asia Summit 2015: The Future of PaymentsEchelon Asia Summit 2015: The Future of Payments
Echelon Asia Summit 2015: The Future of Payments
 
Echelon Asia Summit 2015: Build Your Multi-$B Category Outside of The Valley
Echelon Asia Summit 2015: Build Your Multi-$B Category Outside of The ValleyEchelon Asia Summit 2015: Build Your Multi-$B Category Outside of The Valley
Echelon Asia Summit 2015: Build Your Multi-$B Category Outside of The Valley
 
Why online advertising is not a dirty word - Echelon 2014
Why online advertising is not a dirty word - Echelon 2014Why online advertising is not a dirty word - Echelon 2014
Why online advertising is not a dirty word - Echelon 2014
 
How do Technology Companies And Venture Capital Firms Around The World Maximi...
How do Technology Companies And Venture Capital Firms Around The World Maximi...How do Technology Companies And Venture Capital Firms Around The World Maximi...
How do Technology Companies And Venture Capital Firms Around The World Maximi...
 
Building a Marketplace Business
Building a Marketplace BusinessBuilding a Marketplace Business
Building a Marketplace Business
 
The E-commerce Revolution: How the Industry is Evolving and What the Future H...
The E-commerce Revolution: How the Industry is Evolving and What the Future H...The E-commerce Revolution: How the Industry is Evolving and What the Future H...
The E-commerce Revolution: How the Industry is Evolving and What the Future H...
 
The Key Ingredient to Building a World Class Startup: Startup DNA, And How to...
The Key Ingredient to Building a World Class Startup: Startup DNA, And How to...The Key Ingredient to Building a World Class Startup: Startup DNA, And How to...
The Key Ingredient to Building a World Class Startup: Startup DNA, And How to...
 
What is Wrong With Angel Investors And Accelerators
What is Wrong With Angel Investors And AcceleratorsWhat is Wrong With Angel Investors And Accelerators
What is Wrong With Angel Investors And Accelerators
 
9GAG’s Secret Sauce To Millions Visitors And Billions Pageviews - Echelon 2014
9GAG’s Secret Sauce To Millions Visitors And Billions Pageviews - Echelon 20149GAG’s Secret Sauce To Millions Visitors And Billions Pageviews - Echelon 2014
9GAG’s Secret Sauce To Millions Visitors And Billions Pageviews - Echelon 2014
 

Kürzlich hochgeladen

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 

Echelon Thailand 2017 – Cybersecurity Resilience by Crowd Wisdom

  • 1. Start A Mission Join the Swarm Prescriptive Cyber - Business Resilience Hyver May 2017
  • 4. About our Cyber Activity AGW Group – Prosecs provides END-TO-END ORGANIZATIONAL VULNERABILITY COVERAGE AND SECURITY MATURITY Established 2011 ❖ Boutique cyber Red-Team consulting ❖ Supporting >100 companies (23 Fortune 500 ) ❖ Retainer contracts ❖ Core -Team: 25 nation-level Elite experts ❖ Active community: 400 White-hat Hackers
  • 5. 5 Hyver © 2016 Red Team Intelligence Leading Bank - Case Study
  • 6.
  • 7. 7 Hyver © 2016 Red Team Intelligence SANDBOX macrosANTI VIRUS
  • 8. 8 Hyver © 2016 Red Team Intelligence 40% OPEN THE FILE IN MORE THAN 100 ORGANIZATIONS 100% SUCCESS Behavior Anomaly Signature
  • 9. 9 Hyver © 2016 Red Team Intelligence USER Misconfiguration of the system ADMIN Mimikatz Names and Passwords P H I S I N G DOMAIN ADMINISTRATOR
  • 10. 10 Hyver © 2016 Red Team Intelligence TAKE OVER- GAME OVER
  • 11. 11 Hyver © 2016 Red Team Intelligence Windows 2K Exploitation
  • 12. 12 Hyver © 2016 Red Team Intelligence Sensitive Data on Shares
  • 13. 13 Hyver © 2016 Red Team Intelligence Security Cameras
  • 14. 14 Hyver © 2016 Red Team Intelligence Branches Security Cameras
  • 15. 15 Hyver © 2016 Red Team Intelligence Physical access control system
  • 16. 16 Hyver © 2016 Red Team Intelligence Access to VoIP based telephones
  • 17. 17 Hyver © 2016 Red Team Intelligence Full access to video conference systems
  • 18. 18 Hyver © 2016 Red Team Intelligence Access to restricted cameras
  • 19. 19 Hyver © 2016 Red Team Intelligence ATMs Full Control
  • 20. 20 Hyver © 2016 Red Team Intelligence ATMs Security Cameras
  • 21. LINE ID eitanlavie Email eitan@agwcorp.com Are you still brave enough?…
  • 22. 22 Hyver © 2016 Red Team Intelligence Security Leaders Challenges Army of Attackers Vast Methodologies Advanced Attacks New Attack Vectors Lack of HR & Skills GEO Knowledge Machine can’t handle logic Budget , Priority Poor Actionable Mitigation Vs security strategy needs to encompass people, processes, and technology
  • 23. 23 Hyver © 2016 Red Team Intelligence Changing the Paradigm Predictive Analysis Assessment PROACTIVE!
  • 24. 24 Hyver © 2016 Red Team Intelligence Hyver – Prescriptive Analysis Attacks Graph AnalysisVulnerability Map Decision Kill Chain
  • 25. 25 Hyver © 2016 Red Team Intelligence Hyver Vetted Community Sign-In Only Member recommend on new member Registration Personal Information & Bank Details (High rank – NDA ) Ranking Build your rank &trust based on performance over time Objections Community members can recommend or object Challenge Tests in phases evaluating Quality Monitoring Continues monitoring & recording of all users activities Each task is assigned to multiple Testers Community
  • 26. 26 Hyver © 2016 Red Team Intelligence Maximum Coverage at Work The result: 98% Unparalleled Vulnerability Coverage Hyver test methodology leverages machine learning to improve human tasking for security efficiency. COMPETITION HYVER VS
  • 27. 27 Hyver © 2016 Red Team Intelligence Hyver Continuous Assessment Experts Community Predictive Analysis
  • 28. 28 Hyver © 2016 Red Team Intelligence Thank You Eitan Lavie – Chairman & CEO AGW Group 24/7 eitan@agwcorp.com