SlideShare ist ein Scribd-Unternehmen logo
1 von 24
Nightingale Floors: Mitigating Cyber Attacks in 2015
Tom Kellermann, CISM
Chief Cybersecurity Officer, Trend Micro Inc.
History Repeats Itself
Copyright 2015 Trend Micro Inc.
Advanced Malware Targeted Attacks
Advanced
Malware
Targeted
Attacks
Employee
Data Leaks
Traditional
Malware
Vulnerability
Exploits
300K new malware programs daily!
Arms Bazaar of Attack Code
Thriving Market
Malware offered for $249 with a service level agreement (SLA)
and replacement warranty if the creation is detected by any
antivirus within 9 months
Copyright 2014 Trend Micro Inc.
Malware checking
Botnet Framework
Bulletproof hosting
Exploit Kit
DDOS Attack for 24 hours
Dropper file and crypt
Modules
$30
$125
monthly onetime
$50
$40
$0$52
$38 $120
$0 $20
$205$70
$80$8
Total: $238 $600
Menu for Full Service Hacking
Stratagems of Elite Hackers
Stages-of-Attack.pptx
Destroy the Forensics
Copyright 2015 Trend Micro Inc.
Noteworthy Attack Vectors
Watering Hole Attacks: 28% in the USA
Source: Trend Micro Q3’14 Treat Roundup Report
Island Hopping and Secondary Infections
The Evolution of Mobile Attacks
Proximity Attacks Realized
Geopolitics as Harbingers for Attack
Operation Pawn Storm
Copyright 2015 Trend Micro Inc.
What are the Impacts of Targeted Attacks?
Strategic Costs CareerRisks
Offense Must Inform Defense: Spin the Chess Board
Trends of Attack 2015
• IOS will become the bull's-eye
of malware.
• Zero Day’s for Web applications
explode.
• Cloud App Attacks.
• Secondary infections are
leveraged to facilitate long-term
campaigns against the fortune
100.
• Ransomware
• The use of destructive
payloads as part of counter
incident response.
3/19/2015
Advanced Persistent Response
Advanced
Malware
Detection
Attacker Activity
Detection
Threat Impact
Assessment
Contextual
Threat Analysis
Detect malware, C&C, and
attacker activity invisible to
standard defenses
Analyze the risk, context,
timeline and full extent of
the attack
Respond with automatic
security updates & the
insight to shut down the
attack
Custom Defense is the Foundation
Custom Defense
Advanced Malware
Detection
Contextual
Threat Analysis
Automated
Security Updates
Command & Control
Detection
Attacker
Activity Detection
Threat Impact
Assessment
Risk Management
1. Conduct Pen test of all third parties.
2. Use Two-factor authentication.
3. Utilize a host based intrusion prevention system.
4. Deploy file integrity monitoring.
5. Implement virtual shielding for zero day exploits.
6. Deploy both an MDM and Mobile Application Reputation software.
7. Sandbox your cloud apps.
8. Implement whitelisting.
9. Manage the crypto keys for your cloud data.
10. Web Application Security (OWASP).
11. Deploy context aware Threat Intelligence.
12. Utilize a Breach Detection System.
Securing your journey
to the cloud

Weitere ähnliche Inhalte

Was ist angesagt?

Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of InactivityCisco Security
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicBlue Coat
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Jacob Tranter
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 ReportFortis
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous MalwareHTS Hosting
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityLai Yoong Seng
 
Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryBright Technology
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA InfographicBlue Coat
 
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 Best Practice Next-Generation Vulnerability Management to Identify Threats, ... Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...Skybox Security
 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro videoChad Loeven
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension Inc.
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation SummitOPSWAT
 
What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemClickSSL
 
Vulnerability Prioritization and Prediction
Vulnerability Prioritization and PredictionVulnerability Prioritization and Prediction
Vulnerability Prioritization and PredictionJonathan Cran
 
Cloud Crime Ops
Cloud Crime OpsCloud Crime Ops
Cloud Crime OpsGreg Foss
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 
Dragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack groupDragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack groupSymantec Security Response
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationMaaz Ahmed Shaikh
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníMarketingArrowECS_CZ
 

Was ist angesagt? (20)

Malware and the Cost of Inactivity
Malware and the Cost of InactivityMalware and the Cost of Inactivity
Malware and the Cost of Inactivity
 
Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
Resolution - Security - Cisco Advanced Malware Protection for Endpoints - Fea...
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Ransomware 2020 Report
Ransomware 2020 ReportRansomware 2020 Report
Ransomware 2020 Report
 
Ransomware: A Perilous Malware
Ransomware: A Perilous MalwareRansomware: A Perilous Malware
Ransomware: A Perilous Malware
 
Ransomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and AvailabilityRansomware Resiliency, Recoverability and Availability
Ransomware Resiliency, Recoverability and Availability
 
Ransomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive SummaryRansomware - Information And Protection Guide - Executive Summary
Ransomware - Information And Protection Guide - Executive Summary
 
CAS MAA Infographic
CAS MAA InfographicCAS MAA Infographic
CAS MAA Infographic
 
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 Best Practice Next-Generation Vulnerability Management to Identify Threats, ... Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 
VMRay intro video
VMRay intro videoVMRay intro video
VMRay intro video
 
Next Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA ComplianceNext Dimension and Cisco | Solutions for PIPEDA Compliance
Next Dimension and Cisco | Solutions for PIPEDA Compliance
 
Defense Innovation Summit
Defense Innovation SummitDefense Innovation Summit
Defense Innovation Summit
 
What is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your SystemWhat is Ransomware? How You Can Protect Your System
What is Ransomware? How You Can Protect Your System
 
Vulnerability Prioritization and Prediction
Vulnerability Prioritization and PredictionVulnerability Prioritization and Prediction
Vulnerability Prioritization and Prediction
 
Cloud Crime Ops
Cloud Crime OpsCloud Crime Ops
Cloud Crime Ops
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Dragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack groupDragonfly: Western energy sector targeted by sophisticated attack group
Dragonfly: Western energy sector targeted by sophisticated attack group
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 

Andere mochten auch

IDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must ConfrontIDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must ConfrontIngram Micro Cloud
 
Why Your Cloud Needs a Sysadmin
Why Your Cloud Needs a SysadminWhy Your Cloud Needs a Sysadmin
Why Your Cloud Needs a Sysadmincloudcampghent
 
Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Australia
 
아크로니스 전제품 제안서 폼
아크로니스 전제품 제안서 폼아크로니스 전제품 제안서 폼
아크로니스 전제품 제안서 폼kyoseok99
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityIngram Micro Cloud
 
Roundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP ConversionRoundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP ConversionIngram Micro Cloud
 
SoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersSoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersIngram Micro Cloud
 
CSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationCSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationIngram Micro Cloud
 
Cloud university intel security
Cloud university intel securityCloud university intel security
Cloud university intel securityIngram Micro Cloud
 
Century link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalCentury link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalIngram Micro Cloud
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes MainstreamIngram Micro Cloud
 
DropBox: The Dropbox Users Love, with the Control that IT Needs
DropBox: The Dropbox Users Love, with the Control that IT NeedsDropBox: The Dropbox Users Love, with the Control that IT Needs
DropBox: The Dropbox Users Love, with the Control that IT NeedsMAXfocus
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Ingram Micro Cloud
 
How To Maximize Dropbox For Your Business
How To Maximize Dropbox For Your BusinessHow To Maximize Dropbox For Your Business
How To Maximize Dropbox For Your BusinessJorina Banes
 
Buying Into The Cloud
Buying Into The CloudBuying Into The Cloud
Buying Into The Cloudmyhosting
 

Andere mochten auch (19)

TrendMicro
TrendMicroTrendMicro
TrendMicro
 
IDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must ConfrontIDC Keynote: The Seven Transformations IT Solution Providers Must Confront
IDC Keynote: The Seven Transformations IT Solution Providers Must Confront
 
Why Your Cloud Needs a Sysadmin
Why Your Cloud Needs a SysadminWhy Your Cloud Needs a Sysadmin
Why Your Cloud Needs a Sysadmin
 
Logicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data ProtectionLogicalis Backup as a Service: Re-defining Data Protection
Logicalis Backup as a Service: Re-defining Data Protection
 
아크로니스 전제품 제안서 폼
아크로니스 전제품 제안서 폼아크로니스 전제품 제안서 폼
아크로니스 전제품 제안서 폼
 
Clouds Over Holland
Clouds Over HollandClouds Over Holland
Clouds Over Holland
 
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and OpportunityMicrosoft Cloud Update: New Programs, Platforms, and Opportunity
Microsoft Cloud Update: New Programs, Platforms, and Opportunity
 
Roundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP ConversionRoundtable: Office 365 Advisor to CSP Conversion
Roundtable: Office 365 Advisor to CSP Conversion
 
SoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for PartnersSoftLayer & Ingram Micro: A Winning Combination for Partners
SoftLayer & Ingram Micro: A Winning Combination for Partners
 
Imc master
Imc masterImc master
Imc master
 
Ibm
IbmIbm
Ibm
 
CSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial TransformationCSEU - Leverage the Power of Cloud for Financial Transformation
CSEU - Leverage the Power of Cloud for Financial Transformation
 
Cloud university intel security
Cloud university intel securityCloud university intel security
Cloud university intel security
 
Century link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation finalCentury link ingram micro cloud workshop presentation final
Century link ingram micro cloud workshop presentation final
 
2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream2015: The Year Hybrid Cloud Goes Mainstream
2015: The Year Hybrid Cloud Goes Mainstream
 
DropBox: The Dropbox Users Love, with the Control that IT Needs
DropBox: The Dropbox Users Love, with the Control that IT NeedsDropBox: The Dropbox Users Love, with the Control that IT Needs
DropBox: The Dropbox Users Love, with the Control that IT Needs
 
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
 
How To Maximize Dropbox For Your Business
How To Maximize Dropbox For Your BusinessHow To Maximize Dropbox For Your Business
How To Maximize Dropbox For Your Business
 
Buying Into The Cloud
Buying Into The CloudBuying Into The Cloud
Buying Into The Cloud
 

Ähnlich wie Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Scalar Decisions
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseLumension
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake finalMinh Le
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityLumension
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...Lumension
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Blue Coat
 
Building an Android Scale Incident Response Process
Building an Android Scale Incident Response ProcessBuilding an Android Scale Incident Response Process
Building an Android Scale Incident Response ProcessPriyanka Aash
 
Trend Micro Antivirus.pdf
Trend Micro Antivirus.pdfTrend Micro Antivirus.pdf
Trend Micro Antivirus.pdfCloudtechtiq
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Conkarenahmanny4c
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxcroysierkathey
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepIvanti
 
FireEye Report.ppt
FireEye Report.pptFireEye Report.ppt
FireEye Report.pptDubemJavapi
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfANUSREEASHOK5
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Cyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesCyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesDam Frank
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to CyberthreatsIBM Security
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 
Crack the Code
Crack the CodeCrack the Code
Crack the CodeInnoTech
 

Ähnlich wie Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015 (20)

Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
The Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day RealityThe Role of Application Control in a Zero-Day Reality
The Role of Application Control in a Zero-Day Reality
 
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
 
Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101Advanced Threat Protection - Sandboxing 101
Advanced Threat Protection - Sandboxing 101
 
Building an Android Scale Incident Response Process
Building an Android Scale Incident Response ProcessBuilding an Android Scale Incident Response Process
Building an Android Scale Incident Response Process
 
Trend Micro Antivirus.pdf
Trend Micro Antivirus.pdfTrend Micro Antivirus.pdf
Trend Micro Antivirus.pdf
 
Journal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993ConJournal of Computer and System Sciences 80 (2014) 973–993Con
Journal of Computer and System Sciences 80 (2014) 973–993Con
 
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docxJournal of Computer and System Sciences 80 (2014) 973–993Con.docx
Journal of Computer and System Sciences 80 (2014) 973–993Con.docx
 
Everything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeepEverything You Need to Know About BlueKeep
Everything You Need to Know About BlueKeep
 
FireEye Report.ppt
FireEye Report.pptFireEye Report.ppt
FireEye Report.ppt
 
Types-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdfTypes-of-Cyber-Attacks-E-book.pdf
Types-of-Cyber-Attacks-E-book.pdf
 
TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Cyber Incident Response Proposed Strategies
Cyber Incident Response Proposed StrategiesCyber Incident Response Proposed Strategies
Cyber Incident Response Proposed Strategies
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats4 Ways to Build your Immunity to Cyberthreats
4 Ways to Build your Immunity to Cyberthreats
 
DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Crack the Code
Crack the CodeCrack the Code
Crack the Code
 

Mehr von Ingram Micro Cloud

Comp tia cloud foundations managing your customer's clouds
Comp tia cloud foundations   managing your customer's cloudsComp tia cloud foundations   managing your customer's clouds
Comp tia cloud foundations managing your customer's cloudsIngram Micro Cloud
 
Marketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales TomorrowMarketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales TomorrowIngram Micro Cloud
 
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud ServicesSales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud ServicesIngram Micro Cloud
 
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data CentersCSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data CentersIngram Micro Cloud
 
CSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with SocialCSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with SocialIngram Micro Cloud
 
CSEU - Building Your Cloud Business
CSEU - Building Your Cloud BusinessCSEU - Building Your Cloud Business
CSEU - Building Your Cloud BusinessIngram Micro Cloud
 
Cloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityCloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityIngram Micro Cloud
 
Cloud University: Ingram Micro
Cloud University: Ingram MicroCloud University: Ingram Micro
Cloud University: Ingram MicroIngram Micro Cloud
 
Windows Server 2003 End-of-Service: A Comprehensive, Market-Shifting Opportunity
Windows Server 2003 End-of-Service: A Comprehensive, Market-Shifting OpportunityWindows Server 2003 End-of-Service: A Comprehensive, Market-Shifting Opportunity
Windows Server 2003 End-of-Service: A Comprehensive, Market-Shifting OpportunityIngram Micro Cloud
 
Where Rainmaker's Thrive - Ingram Micro Cloud
Where Rainmaker's Thrive - Ingram Micro CloudWhere Rainmaker's Thrive - Ingram Micro Cloud
Where Rainmaker's Thrive - Ingram Micro CloudIngram Micro Cloud
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIngram Micro Cloud
 
Axcient: Don't Get Caught With Your Saas Down
Axcient: Don't Get Caught With Your Saas DownAxcient: Don't Get Caught With Your Saas Down
Axcient: Don't Get Caught With Your Saas DownIngram Micro Cloud
 
Sales Development: Advanced Selling for the Cloud
Sales Development: Advanced Selling for the CloudSales Development: Advanced Selling for the Cloud
Sales Development: Advanced Selling for the CloudIngram Micro Cloud
 
Sales Development: Necessities of Selling in the Cloud
Sales Development: Necessities of Selling in the CloudSales Development: Necessities of Selling in the Cloud
Sales Development: Necessities of Selling in the CloudIngram Micro Cloud
 
Building a Successful Cloud and Mobility Practice
Building a Successful Cloud and Mobility PracticeBuilding a Successful Cloud and Mobility Practice
Building a Successful Cloud and Mobility PracticeIngram Micro Cloud
 
New Millennium Sales Leadership
New Millennium Sales LeadershipNew Millennium Sales Leadership
New Millennium Sales LeadershipIngram Micro Cloud
 

Mehr von Ingram Micro Cloud (19)

Microsoft
MicrosoftMicrosoft
Microsoft
 
Comp tia cloud foundations managing your customer's clouds
Comp tia cloud foundations   managing your customer's cloudsComp tia cloud foundations   managing your customer's clouds
Comp tia cloud foundations managing your customer's clouds
 
Marketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales TomorrowMarketing Transformation: Marketing Today Becomes Sales Tomorrow
Marketing Transformation: Marketing Today Becomes Sales Tomorrow
 
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud ServicesSales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
Sales Transformation: 5 Steps to Accelerating Growth of Your Cloud Services
 
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data CentersCSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
CSEU - Smarter Storage Solutions for the Cloud and Enterprise Data Centers
 
CSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with SocialCSEU - Enabling Your Channel Business with Social
CSEU - Enabling Your Channel Business with Social
 
CSEU - Building Your Cloud Business
CSEU - Building Your Cloud BusinessCSEU - Building Your Cloud Business
CSEU - Building Your Cloud Business
 
Cloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape OpportunityCloud University: 2015 - A Year of Grape Opportunity
Cloud University: 2015 - A Year of Grape Opportunity
 
Cloud University: Ingram Micro
Cloud University: Ingram MicroCloud University: Ingram Micro
Cloud University: Ingram Micro
 
Cloud University: IDC
Cloud University: IDCCloud University: IDC
Cloud University: IDC
 
Windows Server 2003 End-of-Service: A Comprehensive, Market-Shifting Opportunity
Windows Server 2003 End-of-Service: A Comprehensive, Market-Shifting OpportunityWindows Server 2003 End-of-Service: A Comprehensive, Market-Shifting Opportunity
Windows Server 2003 End-of-Service: A Comprehensive, Market-Shifting Opportunity
 
Where Rainmaker's Thrive - Ingram Micro Cloud
Where Rainmaker's Thrive - Ingram Micro CloudWhere Rainmaker's Thrive - Ingram Micro Cloud
Where Rainmaker's Thrive - Ingram Micro Cloud
 
Introducing Acronis Backup as a Service
Introducing Acronis Backup as a ServiceIntroducing Acronis Backup as a Service
Introducing Acronis Backup as a Service
 
Axcient: Don't Get Caught With Your Saas Down
Axcient: Don't Get Caught With Your Saas DownAxcient: Don't Get Caught With Your Saas Down
Axcient: Don't Get Caught With Your Saas Down
 
Axcient: SaaS Economics 101
Axcient: SaaS Economics 101Axcient: SaaS Economics 101
Axcient: SaaS Economics 101
 
Sales Development: Advanced Selling for the Cloud
Sales Development: Advanced Selling for the CloudSales Development: Advanced Selling for the Cloud
Sales Development: Advanced Selling for the Cloud
 
Sales Development: Necessities of Selling in the Cloud
Sales Development: Necessities of Selling in the CloudSales Development: Necessities of Selling in the Cloud
Sales Development: Necessities of Selling in the Cloud
 
Building a Successful Cloud and Mobility Practice
Building a Successful Cloud and Mobility PracticeBuilding a Successful Cloud and Mobility Practice
Building a Successful Cloud and Mobility Practice
 
New Millennium Sales Leadership
New Millennium Sales LeadershipNew Millennium Sales Leadership
New Millennium Sales Leadership
 

Kürzlich hochgeladen

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbuapidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 

Kürzlich hochgeladen (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Hinweis der Redaktion

  1. The intent of this slide is to provide the customer with an initial glide path to understand the reasons why targeted attacked can out maneuver their existing defenses. Here are the key points to make: Attacks have evolved in complexity from being opportunistic to targeted. Malware is being designed and customized to serve a definitive purpose of breaching a specific organization. As such, security defenses which were designed with detecting and stopping ‘mass attacks’ are no longer capable of identifying unknown attacks or evolving attack methods. As such… although they remain of value and a vital part of a layered defense… they need to be enhanced. Employee Data Leaks ?? Traditional Malware – typically widely distributed and used on for opportunistic attacks. These are a form of ‘virus” with generic functions such as stealing passwords or data. These types of threats are typically dealt with using signatures for purposes of detection and blocking in technologies such as firewalls, intrusion prevention and intrusion detection systems Vulnerability Exploits – attackers take advantage of buffer overflows, memory dumps and other ‘software and/or security bugs” to encroach on and extract data from a desktop, server or other device. These types of threats are typically address by vulnerability patching, IPS and IDS products. Advanced Malware – attackers establish a foothold on a trusted device and use it as a launching pad to access other areas of your network and exflitrate information. In addition, this form of malware tends to contain subroutines and processes to create the perception of legitimate access and purpose. The malware can automate the selection of IP addresses, communication protocols and other techniques. Detecting this form of malware requires analysis of network traffic, heuristics, algorithms and malware analysis capabilities. Targeted Attacks - Similar to a bank heist, attackers research their target and identify the security, processes, and location of what they want to steal. After completing advance reconnaissance they devise a detailed plan of attack, custom design and build their attack code, test their plan of attack and then execute. The key design criteria is to evade detection, enable freedom of movement within your network and access to the assets they wish to target. In so doing attackers will take whatever means are at their disposal. If it is clear that you have a hardened means to monitor web traffic , they will use another protocol. They will determine how your firewall is configured and what ports might yield safe passage. They will attempt to erase their footprints and ensure they can move within your network and improve their intelligence on your environment through every stage of the attack. By the time you are aware they have what they want, have likely already turned it into cash and are either long gone, or have come back for more.
  2. Island Hopping and Secondary Infections:  The targeted attacks against the “virtual supply chain” of financial insitutions abound. In addition to this new dynamic of counterparty risk, there is widespread utilization of previously installed backdoors within trusted systems to leverage a secondary infection.  Backdoors—applications that open computers to remote access—play a crucial role in targeted attacks. Often initially used in the second (point of entry) or third (command-and-control [C&C]) stage of the targeted attack process, backdoors enable threat actors to gain command and control of their target network. 
  3. Unexpected Impacts Unexpected Strategic Impacts Loss of brand equity & revenue (The Interview) Loss of intellectual property Deterioration / loss of intangible assets: technology, market, customer, operational practices etc Erosion of market value (ex: Target) Unexpected Costs: internal investigation & post attack clean up regulatory filings and external investigation. EMC/RSA breach being estimated at $66 million. Target is claiming over $1 billion Unexpected Risks: Litigation by shareholders, customers, employees, or suppliers Your network being used as a beachhead to launch attacks Third party access and island hoping Unexpected Career Impacts: Scapegoat effect Resignation of Target CEO and CIO despite being “PCI compliant” Board of Director’s and Executives face risk to their reputation and personal market value …. they need advise and direction
  4. "control-unit" prisons, or units within prisons, which represent the most secure levels of custody in the prison systems of certain countries. The objective is to provide long term, segregated housing for inmates classified as the highest security risks in the prison system—the "worst of the worst" criminals, and those who pose a threat to national and international security. Although APTs are extremely difficult to detect, the following is a list of common telltale signs that your organization may have been compromised by an APT.             ;  Finding system exploit code embedded in email attachments or delivered via Web pages.             ;  Increase in elevated logons late at night.             ;  Outbound connections to known CnC servers.             ;  Finding widespread backdoor Trojans on endpoints and/or network file shares.             ;  Large, unexpected flows of data from within the net- work — from server to server, server to client, client to server, or network to network.             ;  Discovering large (I’m talking gigabytes, not mega- bytes) chunks of data appearing in places where that data should not exist. Be especially wary if you find compressed data in formats not normally used by your organization. ; ; A major reason why organizations fail to identify APT attacks is because their security devices are only (or mainly) config- ured to examine inbound traffic at the perimeter. Acquiring and/or configuring security solutions to inspect outbound traffic significantly improve your chances of detecting APTs and other cyber attacks.
  5. APTrap is an environment in which analysts can study APT actors’ tools, tactics, and procedures (TTPs). The basic idea behind APTrap is to create a realistic yet isolated environment that APT actors are allowed to breach, move , exploit, and exfiltrate data while all of their actions are captured in non-obvious ways. Analysts can then do a detailed analysis on the data captured to (1) understand the mindset of the attackers, (2) gain insight into what tools they use and how they use them, and (3) learn more about the goals behind the actual intrusion by examining what data they may be searching for and how they exfiltrate it.