SlideShare ist ein Scribd-Unternehmen logo
1 von 15
1
Cyber Security for Digital-Era
AI, Machine Learning, Dynamic Threat Models for Proactive
Threat Detection and Elimination
Erich Berger
Executive, Secure Design
Kevin Stillman
CISO, State University of NY
Lalit Shinde
EVP Security, Seceon
Outline of the Presentation
2
Why should CxOs pay particular attention to Cyber Security
Seceon’s Approach, Key Features/Technologies and Complete Solution
Real world Examples, Benefits, Value Proposition to Enterprises
Challenges faced by Cyber Security Experts, Tools and Solutions
Why should CxO’s pay attention to Cyber Security?
 Cost of Data Breach is not just lost Data, but the impact on Reputation,
Brand and Business Revenue
 Cyber attack puts not just you, but your customers, partners and
employees at risk
 Breaches have hefty cost associated with them – it’s a financial burden
 Your Cyber hygiene affects everyone that you connect with
 Legal aspects of Cyber Regulations – Compliance is one of the most
important aspect in several regulated industries
3Source: Ponemon 2016 Cost of Data Breach Study Report
Cost of Data Breach at a glance – 2016
 $4 million is the average total cost of data breach
 29% increase in total cost of data breach since 2013
 $158 is the average cost per lost or stolen record – For Healthcare industry,
it’s $355, most among all, for Education it’s $246 and for Banking it’s $221
per stolen record
 Regulated industries, such as healthcare and financial services, have the
most costly data breaches because of fines and the higher than average
rate of lost business and customers.
 15% increase in per capita cost since 2013
4Source: Ponemon 2016 Cost of Data Breach Study Report
5
Biggest Security Threats to Organizations
Source: UBM Ponemon HPE 2016 Cyber Security Trends Report
Challenges: Cost of MTTI and MTTC
6
MTTI – Mean Time To Identify
MTTC – Mean Time To Contain
US $M
US $M
Source: Ponemon 2016 Cost of Data Breach Study Report
Challenges: Most Security Products Fall Short
7Source: Verizon 2016 Data Breach Investigation Report
Stealing Credentials happens
in minutes
95% Data Extraction happens
within 24 hours
Data Breaches – Why Automated Real-Time solution is a must?
 Today’s approaches are reactive than proactive
 Despite the investment and focus over past 3 years organizations are losing ground
 The attacks are smarter and faster
 The smart people based centric approach is too slow, too complicated and too expensive
 A new fully automated comprehensive threat detect and response system is required
 One that Detects threats in Minutes, Fully deploys & protects in a few hours and does not need rule or signature updates
Challenges: Operational Cost of Investigations
8
Flows/Logs Troubleshooting
Activity
Type
Flow/Log
Instances
Comments
NG FW generates events/logs around
an instance of an infected device
attempting to connect to a bad web site.
North-South
Activity
444
NG FW is resetting connections from
the device over time and is not
correlating these "non critical flagged"
instances
Device is also performing IP Sweeps
East- West
Activity
135
Few separate instances across the
internal network
Device is also performing IP Port scans
East- West
Activity
92
Few separate instances across the
internal network
Device needs to be identified Internal Activity 1
What device is it? who or what group it
belongs to?
Total Activity 672 Total instances to investigate
Consider an example where a device is infected with a Malware
9
Seceon’s Approach to Cyber Security
Traditional Security Approach Seceon OTM Security Approach
 Reactive Approach
 Tools are highly specialized, but work in
Silos with no comprehensive visibility
 High CapEx with 20+ Security Tools
 High OpEx with 1M+ events/logs per day –
almost 80% require follow up
 Investigation and Incident Response
 90% take an hour or longer to identify
 90% take a day or longer (many times
months) to respond
 Challenges
 Lack of Integration among Tools
 Knowledge/Skill of investigation and
Response is costly
 Proactive Approach
 Moving from Point Tools to Complete
Predictive Analysis Solution
 Comprehensive Visibility across all Asset
Groups – Devices, Applications, Network,
Employees, Customers etc.
 Automated Detection and Remediation
 Predictive Threat Detection using AI, ML
and Behavioral Threat Models
 Automated Remediation within near Real
Time
 Automated Correlation
 Contextual based Single Line Alerts
 Rapid Deployment with Automated DevOps
model and Open API
Seceon OTM Platform Overview
10
Adaptive Visualization
• Comprehensive view of all assets and threats
• Fully automated solution that is easiest to deploy
• Allows drill down of threats with all details
Detect Threats that Matter
• Detects known as well as unknown threats
• Provides comprehensive information of the threats
• Indicates all compromised assets and potential targets
Contain Threats in Real Time
• Immediate corrective action in real time
• Automatic notification through email/text if required
• Provides actionable analytics
Built-in Security
Threat Modeling
Parse
Dynamic
Reduction
Behavior Analysis
Threat Correlation
Threat Intelligence
UniversalCollectionBus
Unstructured
Data
Unstructured
Data
Store
Storage Engine
Search
Rapid Search
Agent
Analytics
Analytics Engine
Big Data Store &
Search
Real-time Threat
Detection
Real-time
Analytics
Predictive
Modeling
Outputs
Built-in Advanced
Correlation
Built-in ML
Engine
Built-in Data
Model Engine
Platform Security Engine
Structured
Data
Parse
Dynamic
Reduction
Parse
Dynamic
Reduction
Seceon’s Scalable – Fast Analytics Processing
Platform
Distributed Data Ingest (CCE) Fast Parallel Processing Architecture (APE)
Closed Loop Threat Containment
Threat
Containment
Use Case – Compromised Credentials
12
• Compromised Credentials Account for 75% of data theft
• Most traditional security solutions are blind to almost all forms of compromised credentials
• Seceon detects all forms of compromised credential use in real-time for external or insider source
verify
User “A”
Credentials
Directory
User: “A”
“Credentials – User A”
Host Name: “Bob’s PC”
 No threat
 No threat  Threat Indicator
 No threat
User: “A”
“Credentials – User A”
Host Name: “Joe’s PC”
DB
High Value
Assets
SIEM
Learn User behavior based on geolocation, computer
Used, time of logins, assets accessed, etc.. etc.
Use Case – Ransomware
13
• Criminal Malware like Ransomware made it to top cyber security concern in 2016
• Ransomware had millions of different strains and families affecting large enterprises, as well as SMBs
• Seceon detects all forms of Ransomware using layered approach of predictive analytics in real-time
User “A” receives Email and cl
icks on a innocuous link
 Threat Indicator 1
 No threat
Bad Reputation URL
Malware Downloaded
Command and Control
Network Scan for other v
ulnerable hosts
 Threat Indicator 2
High Value
Assets
Infection Propagation
 Threat Indicator 3
 Stops threats – automatically
 Disable compromised credentials
 Set filters on firewalls and switches
 Block, rate limit or redirect traffic
 Detects a full range of threats
 Compromised Credentials
 Insider threats
 Brute force attacks
 DDoS attack (all forms)
 Malware, BOTs, APTs Ransomware…
14
Seceon OTM Key Features
 Policy monitoring and enforcement
 Protect critical resources
 Restricting access to only select groups
 Alert and stop upon attempt
 Visualizes impact of attacks
 On applications, users
 On the network
 Provides traffic trend monitoring
Thank you
For further info about Seceon please write to : meghna.jaiswal@jktech.com

Weitere ähnliche Inhalte

Was ist angesagt?

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to CybersecurityKrutarth Vasavada
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistMatthew Rosenquist
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Michael Noel
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Vertex Holdings
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...IBM Security
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructureIntel IT Center
 
Cyber security
Cyber securityCyber security
Cyber securityEduonix
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondNandita Nityanandam
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?PECB
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - GuidelinesPedro Espinosa
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 

Was ist angesagt? (20)

Introduction to Cybersecurity
Introduction to CybersecurityIntroduction to Cybersecurity
Introduction to Cybersecurity
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
Securing IT Against Modern Threats with Microsoft Cloud Security Tools - M365...
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.Cybersecurity | Risk. Impact. Innovations.
Cybersecurity | Risk. Impact. Innovations.
 
Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...Avoiding data breach using security intelligence and big data to stay out of ...
Avoiding data breach using security intelligence and big data to stay out of ...
 
Cloud computing security infrastructure
Cloud computing security   infrastructureCloud computing security   infrastructure
Cloud computing security infrastructure
 
Cyber security
Cyber securityCyber security
Cyber security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Top 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and BeyondTop 5 Cybersecurity Trends in 2021 and Beyond
Top 5 Cybersecurity Trends in 2021 and Beyond
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
Ethical Hacking vs Penetration Testing vs Cybersecurity: Know the Difference?
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 

Andere mochten auch

To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...Nishant Mehta
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityIAEME Publication
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningLior Rokach
 
Machine Learning on Big Data
Machine Learning on Big DataMachine Learning on Big Data
Machine Learning on Big DataMax Lin
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine LearningLior Rokach
 
10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systemsXavier Amatriain
 

Andere mochten auch (7)

To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...To use the concept of Data Mining and machine learning concept for Cyber secu...
To use the concept of Data Mining and machine learning concept for Cyber secu...
 
Machine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber securityMachine learning approach to anomaly detection in cyber security
Machine learning approach to anomaly detection in cyber security
 
When Cyber Security Meets Machine Learning
When Cyber Security Meets Machine LearningWhen Cyber Security Meets Machine Learning
When Cyber Security Meets Machine Learning
 
Machine Learning on Big Data
Machine Learning on Big DataMachine Learning on Big Data
Machine Learning on Big Data
 
Introduction to Machine Learning
Introduction to Machine LearningIntroduction to Machine Learning
Introduction to Machine Learning
 
10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems10 more lessons learned from building Machine Learning systems
10 more lessons learned from building Machine Learning systems
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Ähnlich wie Cyber Security for Digital-Era

Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionJK Tech
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveyQualys
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsAdeo Security
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesCSNP
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeAaron White
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI JoAnna Cheshire
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityNetworkCollaborators
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Leslie McFarlin
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowIBM Security
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseLumension
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake finalMinh Le
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
AMP_Security_ Malware Protection Presentatiion
AMP_Security_ Malware Protection PresentatiionAMP_Security_ Malware Protection Presentatiion
AMP_Security_ Malware Protection PresentatiionSohanGole1
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress NycBob Maley
 

Ähnlich wie Cyber Security for Digital-Era (20)

Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Microsoft Avanced Threat Analytics
Microsoft Avanced Threat AnalyticsMicrosoft Avanced Threat Analytics
Microsoft Avanced Threat Analytics
 
Aon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation StrategiesAon Ransomware Response and Mitigation Strategies
Aon Ransomware Response and Mitigation Strategies
 
Cyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat LandscapeCyber-Espionage: Understanding the Advanced Threat Landscape
Cyber-Espionage: Understanding the Advanced Threat Landscape
 
Cognitive Computing in Security with AI
Cognitive Computing in Security with AI Cognitive Computing in Security with AI
Cognitive Computing in Security with AI
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018Exploration Draft Document- CEM Machine Learning & AI Project 2018
Exploration Draft Document- CEM Machine Learning & AI Project 2018
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to KnowDefining Security Intelligence for the Enterprise - What CISOs Need to Know
Defining Security Intelligence for the Enterprise - What CISOs Need to Know
 
Key Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your EnterpriseKey Strategies to Address Rising Application Risk in Your Enterprise
Key Strategies to Address Rising Application Risk in Your Enterprise
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
AMP_Security_ Malware Protection Presentatiion
AMP_Security_ Malware Protection PresentatiionAMP_Security_ Malware Protection Presentatiion
AMP_Security_ Malware Protection Presentatiion
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
2010 Sc World Congress Nyc
2010 Sc World Congress Nyc2010 Sc World Congress Nyc
2010 Sc World Congress Nyc
 

Mehr von JK Tech

Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...JK Tech
 
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?JK Tech
 
Bulletproof Your QAD ERP to Cloud | JK Tech Webinar
Bulletproof Your QAD ERP to Cloud | JK Tech WebinarBulletproof Your QAD ERP to Cloud | JK Tech Webinar
Bulletproof Your QAD ERP to Cloud | JK Tech WebinarJK Tech
 
Application Modernization to Accelerate Business Growth | JK Tech Webinar
Application Modernization to Accelerate Business Growth | JK Tech WebinarApplication Modernization to Accelerate Business Growth | JK Tech Webinar
Application Modernization to Accelerate Business Growth | JK Tech WebinarJK Tech
 
Modernise Your Applications to Accelerate Digital Transformation | Webinar
Modernise Your Applications to Accelerate Digital Transformation | WebinarModernise Your Applications to Accelerate Digital Transformation | Webinar
Modernise Your Applications to Accelerate Digital Transformation | WebinarJK Tech
 
[Webinar] - Digital Transformation Journey in Dairy Industry
[Webinar] - Digital Transformation Journey in Dairy Industry[Webinar] - Digital Transformation Journey in Dairy Industry
[Webinar] - Digital Transformation Journey in Dairy IndustryJK Tech
 
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...JK Tech
 
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...JK Tech
 
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your BusinessJK Tech
 
[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with BrainJK Tech
 
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...JK Tech
 
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...JK Tech
 
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
[Webinar] - Using RPA to Accelerate the Benefits from Shared ServicesJK Tech
 
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
[Webinar] - Digital Transformation Through Salesforce | JK TehnosoftJK Tech
 
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support FunctionJK Tech
 
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test AutomationWebinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test AutomationJK Tech
 
Webinar (UK/Europe) - Demystifying SAP S/4HANA
Webinar (UK/Europe) - Demystifying SAP S/4HANAWebinar (UK/Europe) - Demystifying SAP S/4HANA
Webinar (UK/Europe) - Demystifying SAP S/4HANAJK Tech
 
Demystifying SAP S/4HANA
Demystifying SAP S/4HANADemystifying SAP S/4HANA
Demystifying SAP S/4HANAJK Tech
 
Webinar - Loyalty Reward Points Using Blockchain
Webinar - Loyalty Reward Points Using BlockchainWebinar - Loyalty Reward Points Using Blockchain
Webinar - Loyalty Reward Points Using BlockchainJK Tech
 
Driving Process Improvement Through Automation | Webinar
Driving Process Improvement Through Automation | WebinarDriving Process Improvement Through Automation | Webinar
Driving Process Improvement Through Automation | WebinarJK Tech
 

Mehr von JK Tech (20)

Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
Competitor & Pricing Intelligence Can Increase Your Retail GMV by 6% | JK Tec...
 
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
Retail Webinar - How to Stay 10 Steps Ahead of Retail Competitors?
 
Bulletproof Your QAD ERP to Cloud | JK Tech Webinar
Bulletproof Your QAD ERP to Cloud | JK Tech WebinarBulletproof Your QAD ERP to Cloud | JK Tech Webinar
Bulletproof Your QAD ERP to Cloud | JK Tech Webinar
 
Application Modernization to Accelerate Business Growth | JK Tech Webinar
Application Modernization to Accelerate Business Growth | JK Tech WebinarApplication Modernization to Accelerate Business Growth | JK Tech Webinar
Application Modernization to Accelerate Business Growth | JK Tech Webinar
 
Modernise Your Applications to Accelerate Digital Transformation | Webinar
Modernise Your Applications to Accelerate Digital Transformation | WebinarModernise Your Applications to Accelerate Digital Transformation | Webinar
Modernise Your Applications to Accelerate Digital Transformation | Webinar
 
[Webinar] - Digital Transformation Journey in Dairy Industry
[Webinar] - Digital Transformation Journey in Dairy Industry[Webinar] - Digital Transformation Journey in Dairy Industry
[Webinar] - Digital Transformation Journey in Dairy Industry
 
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
[Webinar] - Enabling the Digital Dairy Supply Chain: Traceability of Milk Com...
 
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
[Webinar] - How to Future-proof Your ERP Applications with Intelligent Automa...
 
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
[Webinar] – Social Distancing Radar: Smart AI Solution to Restart Your Business
 
[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain[Webinar] - Intelligent Automation: Enabling Bots with Brain
[Webinar] - Intelligent Automation: Enabling Bots with Brain
 
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
[AI Webinar Series P1] - How Advanced Text Analytics Can Increase the Operati...
 
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
[Webinar] - Adopt QAD & Progress DBA Global Shared Services to Deliver Cost O...
 
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
[Webinar] - Using RPA to Accelerate the Benefits from Shared Services
 
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
[Webinar] - Digital Transformation Through Salesforce | JK Tehnosoft
 
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
[Webinar] - Chatbot at Work in Just 5-days: Optimize Customer Support Function
 
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test AutomationWebinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
Webinar (UK/Europe) - Demystifying SAP S/4HANA & Test Automation
 
Webinar (UK/Europe) - Demystifying SAP S/4HANA
Webinar (UK/Europe) - Demystifying SAP S/4HANAWebinar (UK/Europe) - Demystifying SAP S/4HANA
Webinar (UK/Europe) - Demystifying SAP S/4HANA
 
Demystifying SAP S/4HANA
Demystifying SAP S/4HANADemystifying SAP S/4HANA
Demystifying SAP S/4HANA
 
Webinar - Loyalty Reward Points Using Blockchain
Webinar - Loyalty Reward Points Using BlockchainWebinar - Loyalty Reward Points Using Blockchain
Webinar - Loyalty Reward Points Using Blockchain
 
Driving Process Improvement Through Automation | Webinar
Driving Process Improvement Through Automation | WebinarDriving Process Improvement Through Automation | Webinar
Driving Process Improvement Through Automation | Webinar
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 

Kürzlich hochgeladen (20)

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Cyber Security for Digital-Era

  • 1. 1 Cyber Security for Digital-Era AI, Machine Learning, Dynamic Threat Models for Proactive Threat Detection and Elimination Erich Berger Executive, Secure Design Kevin Stillman CISO, State University of NY Lalit Shinde EVP Security, Seceon
  • 2. Outline of the Presentation 2 Why should CxOs pay particular attention to Cyber Security Seceon’s Approach, Key Features/Technologies and Complete Solution Real world Examples, Benefits, Value Proposition to Enterprises Challenges faced by Cyber Security Experts, Tools and Solutions
  • 3. Why should CxO’s pay attention to Cyber Security?  Cost of Data Breach is not just lost Data, but the impact on Reputation, Brand and Business Revenue  Cyber attack puts not just you, but your customers, partners and employees at risk  Breaches have hefty cost associated with them – it’s a financial burden  Your Cyber hygiene affects everyone that you connect with  Legal aspects of Cyber Regulations – Compliance is one of the most important aspect in several regulated industries 3Source: Ponemon 2016 Cost of Data Breach Study Report
  • 4. Cost of Data Breach at a glance – 2016  $4 million is the average total cost of data breach  29% increase in total cost of data breach since 2013  $158 is the average cost per lost or stolen record – For Healthcare industry, it’s $355, most among all, for Education it’s $246 and for Banking it’s $221 per stolen record  Regulated industries, such as healthcare and financial services, have the most costly data breaches because of fines and the higher than average rate of lost business and customers.  15% increase in per capita cost since 2013 4Source: Ponemon 2016 Cost of Data Breach Study Report
  • 5. 5 Biggest Security Threats to Organizations Source: UBM Ponemon HPE 2016 Cyber Security Trends Report
  • 6. Challenges: Cost of MTTI and MTTC 6 MTTI – Mean Time To Identify MTTC – Mean Time To Contain US $M US $M Source: Ponemon 2016 Cost of Data Breach Study Report
  • 7. Challenges: Most Security Products Fall Short 7Source: Verizon 2016 Data Breach Investigation Report Stealing Credentials happens in minutes 95% Data Extraction happens within 24 hours Data Breaches – Why Automated Real-Time solution is a must?  Today’s approaches are reactive than proactive  Despite the investment and focus over past 3 years organizations are losing ground  The attacks are smarter and faster  The smart people based centric approach is too slow, too complicated and too expensive  A new fully automated comprehensive threat detect and response system is required  One that Detects threats in Minutes, Fully deploys & protects in a few hours and does not need rule or signature updates
  • 8. Challenges: Operational Cost of Investigations 8 Flows/Logs Troubleshooting Activity Type Flow/Log Instances Comments NG FW generates events/logs around an instance of an infected device attempting to connect to a bad web site. North-South Activity 444 NG FW is resetting connections from the device over time and is not correlating these "non critical flagged" instances Device is also performing IP Sweeps East- West Activity 135 Few separate instances across the internal network Device is also performing IP Port scans East- West Activity 92 Few separate instances across the internal network Device needs to be identified Internal Activity 1 What device is it? who or what group it belongs to? Total Activity 672 Total instances to investigate Consider an example where a device is infected with a Malware
  • 9. 9 Seceon’s Approach to Cyber Security Traditional Security Approach Seceon OTM Security Approach  Reactive Approach  Tools are highly specialized, but work in Silos with no comprehensive visibility  High CapEx with 20+ Security Tools  High OpEx with 1M+ events/logs per day – almost 80% require follow up  Investigation and Incident Response  90% take an hour or longer to identify  90% take a day or longer (many times months) to respond  Challenges  Lack of Integration among Tools  Knowledge/Skill of investigation and Response is costly  Proactive Approach  Moving from Point Tools to Complete Predictive Analysis Solution  Comprehensive Visibility across all Asset Groups – Devices, Applications, Network, Employees, Customers etc.  Automated Detection and Remediation  Predictive Threat Detection using AI, ML and Behavioral Threat Models  Automated Remediation within near Real Time  Automated Correlation  Contextual based Single Line Alerts  Rapid Deployment with Automated DevOps model and Open API
  • 10. Seceon OTM Platform Overview 10 Adaptive Visualization • Comprehensive view of all assets and threats • Fully automated solution that is easiest to deploy • Allows drill down of threats with all details Detect Threats that Matter • Detects known as well as unknown threats • Provides comprehensive information of the threats • Indicates all compromised assets and potential targets Contain Threats in Real Time • Immediate corrective action in real time • Automatic notification through email/text if required • Provides actionable analytics
  • 11. Built-in Security Threat Modeling Parse Dynamic Reduction Behavior Analysis Threat Correlation Threat Intelligence UniversalCollectionBus Unstructured Data Unstructured Data Store Storage Engine Search Rapid Search Agent Analytics Analytics Engine Big Data Store & Search Real-time Threat Detection Real-time Analytics Predictive Modeling Outputs Built-in Advanced Correlation Built-in ML Engine Built-in Data Model Engine Platform Security Engine Structured Data Parse Dynamic Reduction Parse Dynamic Reduction Seceon’s Scalable – Fast Analytics Processing Platform Distributed Data Ingest (CCE) Fast Parallel Processing Architecture (APE) Closed Loop Threat Containment Threat Containment
  • 12. Use Case – Compromised Credentials 12 • Compromised Credentials Account for 75% of data theft • Most traditional security solutions are blind to almost all forms of compromised credentials • Seceon detects all forms of compromised credential use in real-time for external or insider source verify User “A” Credentials Directory User: “A” “Credentials – User A” Host Name: “Bob’s PC”  No threat  No threat  Threat Indicator  No threat User: “A” “Credentials – User A” Host Name: “Joe’s PC” DB High Value Assets SIEM Learn User behavior based on geolocation, computer Used, time of logins, assets accessed, etc.. etc.
  • 13. Use Case – Ransomware 13 • Criminal Malware like Ransomware made it to top cyber security concern in 2016 • Ransomware had millions of different strains and families affecting large enterprises, as well as SMBs • Seceon detects all forms of Ransomware using layered approach of predictive analytics in real-time User “A” receives Email and cl icks on a innocuous link  Threat Indicator 1  No threat Bad Reputation URL Malware Downloaded Command and Control Network Scan for other v ulnerable hosts  Threat Indicator 2 High Value Assets Infection Propagation  Threat Indicator 3
  • 14.  Stops threats – automatically  Disable compromised credentials  Set filters on firewalls and switches  Block, rate limit or redirect traffic  Detects a full range of threats  Compromised Credentials  Insider threats  Brute force attacks  DDoS attack (all forms)  Malware, BOTs, APTs Ransomware… 14 Seceon OTM Key Features  Policy monitoring and enforcement  Protect critical resources  Restricting access to only select groups  Alert and stop upon attempt  Visualizes impact of attacks  On applications, users  On the network  Provides traffic trend monitoring
  • 15. Thank you For further info about Seceon please write to : meghna.jaiswal@jktech.com