SlideShare ist ein Scribd-Unternehmen logo
1 von 22
SIGS _ Dec 2014 
Security Interest Group Switzerland
Risk Analytics – One Intelligent View 
Thomas Wendrich, Director CEUR, Skybox Security 
Simon Roe, EMEA Channel Presales Director 
November 2014 
www.skyboxsecurity.com 
thomas.wendrich@skyboxsecurity.com 
+49 40 31979956
Agenda 
 Cyber Risk - The Management Challenge 
– Facts and Figures 
 Live Demo 
 Summary 
© 2014 Skybox Security Inc. 3
Lloyds Risk Index 2013 
“The World Catches Up With Cyber Risk” 
“It appears that businesses across the world have 
encountered a partial reality check about the 
degree of cyber risk. 
Their sense of preparedness to deal with the level 
of risk, however, still appears remarkably 
complacent.” 
© 2014 Skybox Security Inc. 4
Verizon Data Breach Investigations Reports 
 Incidents tripled over last 
year’s already much 
increased number 
 97% of breaches were 
avoidable through simple or 
intermediate controls (2012) 
© 2014 Skybox Security Inc. 5
Security Management is Challenging Today 
Problems our customers face 
 Too much output from security tools 
 Lack of visibility across silos 
 Maintaining continuous compliance 
 Making agile and secure changes 
 Understanding risk implications 
 Evolving threat landscape 
© 2014 Skybox Security Inc. 6
Seeing the Battlefield 
“The battlefield is a scene of constant chaos. The winner will be the one who 
controls that chaos , both his own and the enemies” NAPOLEON BONAPARTE 
© 2014 Skybox Security Inc. 7
Risk Analytics For Cyber Security? 
© 2014 Skybox Security Inc. 8
Attackers Understand Your Attack Surface 
…You Don’t 
Expansion Drivers 
Vulnerabilities 
Endpoints 
Exploits 
Network access 
© 2014 Skybox Security Inc. 9 
Contraction Drivers 
Network segmentation 
Fixing vulnerabilities 
Technical controls 
Hours to attack, months to defend
Recent Snowden Leak Backs This Up 
KEY 
OBJECTIVE! 
Source – TED Talk October 2013 – Mikko Hyponnen, Chief Risk Officer F-Secure 
© 2014 Skybox Security Inc. 10
Is there a solution? 
© 2014 Skybox Security Inc. 11
Use Risk Analytics to Understand Your 
Attack Surface—Continuously 
Network Visibility: 
Topology 
Routing 
Policies 
Firewalls 
© 2014 Skybox Security Inc. 12 
Endpoints Visibility: 
Software 
Patches 
Vulnerabilities 
Classification 
Attack Vectors 
Risk Metrics 
Remediation Plans 
Network Visualization 
Contextual Analysis
Agenda 
 Live Demo – Simon Roe 
– Overview 
© 2014 Skybox Security Inc. 13
Agenda 
 Summary 
– Thomas Wendrich 
© 2014 Skybox Security Inc. 14
What Do You See?
Combine Data & Give It Battlefield Context 
√ 80+ Vendors integrated with Skybox 
© 2014 Skybox Security Inc. 16
Skybox – A Critical Component of Next 
Generation Cyber SOC Design 
Cyber Security Analysts 
IT-GRC - Integrated Security Dashboard & Reporting 
Risk Analytics 
Security intelligence to 
minimize risk exposure 
© 2014 Skybox Security Inc. 17 
Security Information & 
Event Management 
Event monitoring to detect 
& respond to incidents
Skybox Company Snapshot 
Leading provider of risk analytics solutions for security management & cyber defense 
© 2014 Skybox Security Inc. 18 
Founded 2002 
Revenue Growth 50%+ 
Customers 400+ 
Countries 40 
Headquarters San Jose 
R&D Center Israel 
Identify security gaps in minutes, not weeks
400+ Enterprise Customers in 40+ Countries 
Financial 
Services 
© 2014 Skybox Security Inc. 19 
Technology Healthcare 
Government 
& Defense 
Consumer 
Service 
Providers 
Energy & 
Utilities
Network Security Management with Skybox 
© 2014 Skybox Security Inc. 20 
Monitor 
Compliance 
Model Network 
Understand network 
context 
Analyze 
Firewalls 
Manage 
Changes 
 Rule and 
configuration 
checks 
 Access path 
analysis 
 Rule optimization 
 Change tracking 
 Automated audits 
 PCI DSS 
 FISMA 
 NERC 
 NIST 
 Custom Policies 
Automate security 
assessments 
Verify controls 
continuously 
Change 
Request 
Tech 
Details 
Assess 
Risks 
Make 
Change 
Reconcile 
Verify 
Optimize change 
process 
 Network 
topology view 
 Normalize data 
from 70+ systems 
 Access simulation
© 2014 Skybox Security Inc. 21
SIGS _ Dec 2014 
Security Interest Group Switzerland 
Thomas Wendrich, Director CEUR, Skybox Security 
Simon Roe, EMEA Channel Presales Director 
November 2014 
www.skyboxsecurity.com 
thomas.wendrich@skyboxsecurity.com 
+49 40 31979956

Weitere ähnliche Inhalte

Was ist angesagt?

Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Skybox Security
 

Was ist angesagt? (20)

Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
 
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
A Call to Arms: Using a Working Model of the Attack Surface to Improve Incide...
 
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud#ALSummit: Accenture -  Making the Move: Enabling Security in the Cloud
#ALSummit: Accenture - Making the Move: Enabling Security in the Cloud
 
Best Practices for Network Security Management
Best Practices for Network Security Management Best Practices for Network Security Management
Best Practices for Network Security Management
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016 Top 5 Cloud Security Predictions for 2016
Top 5 Cloud Security Predictions for 2016
 
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security Outpost24 webinar - Busting the myths of cloud security
Outpost24 webinar - Busting the myths of cloud security
 
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape SurveySecurity Whack-a-Mole: SANS 2017 Threat Landscape Survey
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Check Point and Accenture Webinar
Check Point and Accenture Webinar Check Point and Accenture Webinar
Check Point and Accenture Webinar
 
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
 
2015 Security Report
2015 Security Report 2015 Security Report
2015 Security Report
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
Shared Security Responsibility in the AWS Public Cloud
Shared Security Responsibility in the AWS Public CloudShared Security Responsibility in the AWS Public Cloud
Shared Security Responsibility in the AWS Public Cloud
 
How Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile DevicesHow Aetna Mitigated 701 Malware Infections on Mobile Devices
How Aetna Mitigated 701 Malware Infections on Mobile Devices
 
Qualys Corporate Brochure
Qualys Corporate BrochureQualys Corporate Brochure
Qualys Corporate Brochure
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 

Andere mochten auch

Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013
Brian Crotty
 
Stress Testing the Loan Portfolio
Stress Testing the Loan PortfolioStress Testing the Loan Portfolio
Stress Testing the Loan Portfolio
Libby Bierman
 

Andere mochten auch (17)

A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...
A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...
A Tale of Two Risk Measures: Economic Capital vs. Stress Testing and a Call f...
 
FENG CCAR DFAST BASELIII_real(2)
FENG CCAR DFAST BASELIII_real(2)FENG CCAR DFAST BASELIII_real(2)
FENG CCAR DFAST BASELIII_real(2)
 
Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013Accenture: Analytics journey to roi Feb 2013
Accenture: Analytics journey to roi Feb 2013
 
SOX 2016 - PART I - COSO 2013
SOX 2016 - PART I - COSO 2013SOX 2016 - PART I - COSO 2013
SOX 2016 - PART I - COSO 2013
 
Stress Testing
Stress TestingStress Testing
Stress Testing
 
HCL Technologies parsentation
HCL Technologies parsentationHCL Technologies parsentation
HCL Technologies parsentation
 
Stress Testing the Loan Portfolio
Stress Testing the Loan PortfolioStress Testing the Loan Portfolio
Stress Testing the Loan Portfolio
 
Big Data Analytics: Ashwin Malshe Talk
Big Data Analytics: Ashwin Malshe TalkBig Data Analytics: Ashwin Malshe Talk
Big Data Analytics: Ashwin Malshe Talk
 
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
Accenture 2015 Global Risk Management Study: Banking Report Key Findings and ...
 
CCAR & DFAST: How to incorporate stress testing into banking operations + str...
CCAR & DFAST: How to incorporate stress testing into banking operations + str...CCAR & DFAST: How to incorporate stress testing into banking operations + str...
CCAR & DFAST: How to incorporate stress testing into banking operations + str...
 
Risk Analysis for Dummies
Risk Analysis for DummiesRisk Analysis for Dummies
Risk Analysis for Dummies
 
Customer Portfolio Segmentation for Finance
Customer Portfolio Segmentation for FinanceCustomer Portfolio Segmentation for Finance
Customer Portfolio Segmentation for Finance
 
Hcl company ppt.
Hcl  company ppt.Hcl  company ppt.
Hcl company ppt.
 
Market Risk
Market RiskMarket Risk
Market Risk
 
Organizational Design - HCL Technologies
Organizational Design - HCL TechnologiesOrganizational Design - HCL Technologies
Organizational Design - HCL Technologies
 
Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...
Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...
Carpe Diem: Living in a Post-Durbin World (Credit Union Conference Session Pr...
 
HR / Talent Analytics
HR / Talent AnalyticsHR / Talent Analytics
HR / Talent Analytics
 

Ähnlich wie Risk Analytics: One Intelligent View

The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
Amazon Web Services
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
CSA Argentina
 

Ähnlich wie Risk Analytics: One Intelligent View (20)

Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024Softwide Security Company Introduction 2024
Softwide Security Company Introduction 2024
 
Scalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto PresentationScalar Security Roadshow - Toronto Presentation
Scalar Security Roadshow - Toronto Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové službyvSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
vSEC: bezpečnostní platforma pro privátní a veřejné cloudové služby
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Introduction to Cloud Security
Introduction to Cloud SecurityIntroduction to Cloud Security
Introduction to Cloud Security
 
Scalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa PresentationScalar Security Roadshow - Ottawa Presentation
Scalar Security Roadshow - Ottawa Presentation
 
Cyren cybersecurity of things
Cyren cybersecurity of thingsCyren cybersecurity of things
Cyren cybersecurity of things
 
Three Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security SuperheroThree Secrets to Becoming a Mobile Security Superhero
Three Secrets to Becoming a Mobile Security Superhero
 
F secure presentation
F secure presentationF secure presentation
F secure presentation
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 
Check Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - DetailedCheck Point Corporate Overview 2020 - Detailed
Check Point Corporate Overview 2020 - Detailed
 
Cisco Live Cancun PR Session
Cisco Live Cancun PR SessionCisco Live Cancun PR Session
Cisco Live Cancun PR Session
 
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats -  CSA Congress, San JoseThe Notorious 9 Cloud Computing Threats -  CSA Congress, San Jose
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
 
Acronis for SAP
Acronis for SAPAcronis for SAP
Acronis for SAP
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Mobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 PredictionsMobile Security: 2016 Wrap-Up and 2017 Predictions
Mobile Security: 2016 Wrap-Up and 2017 Predictions
 
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the CloudCSS17: Atlanta - Realities of Security in the Cloud
CSS17: Atlanta - Realities of Security in the Cloud
 

Mehr von Skybox Security

Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
Skybox Security
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Skybox Security
 

Mehr von Skybox Security (18)

Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11Using a Network Model to Address SANS Critical Controls 10 and 11
Using a Network Model to Address SANS Critical Controls 10 and 11
 
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce RiskCAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
CAPITA - Network Visibility to Manage Firewall Changes & Reduce Risk
 
Secure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual IntelligenceSecure Data GI - Delivering Contextual Intelligence
Secure Data GI - Delivering Contextual Intelligence
 
Infosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Firewall Change ManagementInfosec 2014: Tech Talk - Firewall Change Management
Infosec 2014: Tech Talk - Firewall Change Management
 
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability DiscoveryInfosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
Infosec 2014: Tech Talk - Non-Disruptive Vulnerability Discovery
 
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Finding and Understanding the Risk Impact of Firewall ChangesInfosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
Infosec 2014: Finding and Understanding the Risk Impact of Firewall Changes
 
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
Infosec 2014: Capita Customer Management: Network Visibility to Manage Firewa...
 
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline SecurityInfosec 2014: Intelligence as a Service: The Future of Frontline Security
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
 
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your NetworkRSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
RSA 2014: Non-Disruptive Vulnerability Discovery, Without Scanning Your Network
 
RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply RSA 2014: Firewall Change Management: Automate, Secure & Comply
RSA 2014: Firewall Change Management: Automate, Secure & Comply
 
Infographic: Are You Keeping Pace with Security Risks?
Infographic: Are You Keeping Pace with Security Risks?Infographic: Are You Keeping Pace with Security Risks?
Infographic: Are You Keeping Pace with Security Risks?
 
Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?Is Your Vulnerability Management Program Keeping Pace With Risks?
Is Your Vulnerability Management Program Keeping Pace With Risks?
 
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 Best Practice Next-Generation Vulnerability Management to Identify Threats, ... Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
Best Practice Next-Generation Vulnerability Management to Identify Threats, ...
 
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
Out With the Old, In With the New – Reinvent and Justify Your 2013 Security S...
 
Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013Security at the Breaking Point: Rethink Security in 2013
Security at the Breaking Point: Rethink Security in 2013
 
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
Transitioning to Next-Generation Firewall Management - 3 Ways to Accelerate t...
 
Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?Is Your Vulnerability Management Program Irrelevant?
Is Your Vulnerability Management Program Irrelevant?
 
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They OccurAnticipate and Prevent Cyber Attack Scenarios, Before They Occur
Anticipate and Prevent Cyber Attack Scenarios, Before They Occur
 

Kürzlich hochgeladen

Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdf
SayantanBiswas37
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
HyderabadDolls
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
ahmedjiabur940
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
Health
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
nirzagarg
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
gajnagarg
 

Kürzlich hochgeladen (20)

Computer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdfComputer science Sql cheat sheet.pdf.pdf
Computer science Sql cheat sheet.pdf.pdf
 
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
5CL-ADBA,5cladba, Chinese supplier, safety is guaranteed
 
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
Sonagachi * best call girls in Kolkata | ₹,9500 Pay Cash 8005736733 Free Home...
 
Digital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham WareDigital Transformation Playbook by Graham Ware
Digital Transformation Playbook by Graham Ware
 
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
High Profile Call Girls Service in Jalore { 9332606886 } VVIP NISHA Call Girl...
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
Ranking and Scoring Exercises for Research
Ranking and Scoring Exercises for ResearchRanking and Scoring Exercises for Research
Ranking and Scoring Exercises for Research
 
Kings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about themKings of Saudi Arabia, information about them
Kings of Saudi Arabia, information about them
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
TrafficWave Generator Will Instantly drive targeted and engaging traffic back...
 
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
+97470301568>>weed for sale in qatar ,weed for sale in dubai,weed for sale in...
 
Statistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbersStatistics notes ,it includes mean to index numbers
Statistics notes ,it includes mean to index numbers
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
 
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
Nirala Nagar / Cheap Call Girls In Lucknow Phone No 9548273370 Elite Escort S...
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptxRESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
RESEARCH-FINAL-DEFENSE-PPT-TEMPLATE.pptx
 
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 

Risk Analytics: One Intelligent View

  • 1. SIGS _ Dec 2014 Security Interest Group Switzerland
  • 2. Risk Analytics – One Intelligent View Thomas Wendrich, Director CEUR, Skybox Security Simon Roe, EMEA Channel Presales Director November 2014 www.skyboxsecurity.com thomas.wendrich@skyboxsecurity.com +49 40 31979956
  • 3. Agenda  Cyber Risk - The Management Challenge – Facts and Figures  Live Demo  Summary © 2014 Skybox Security Inc. 3
  • 4. Lloyds Risk Index 2013 “The World Catches Up With Cyber Risk” “It appears that businesses across the world have encountered a partial reality check about the degree of cyber risk. Their sense of preparedness to deal with the level of risk, however, still appears remarkably complacent.” © 2014 Skybox Security Inc. 4
  • 5. Verizon Data Breach Investigations Reports  Incidents tripled over last year’s already much increased number  97% of breaches were avoidable through simple or intermediate controls (2012) © 2014 Skybox Security Inc. 5
  • 6. Security Management is Challenging Today Problems our customers face  Too much output from security tools  Lack of visibility across silos  Maintaining continuous compliance  Making agile and secure changes  Understanding risk implications  Evolving threat landscape © 2014 Skybox Security Inc. 6
  • 7. Seeing the Battlefield “The battlefield is a scene of constant chaos. The winner will be the one who controls that chaos , both his own and the enemies” NAPOLEON BONAPARTE © 2014 Skybox Security Inc. 7
  • 8. Risk Analytics For Cyber Security? © 2014 Skybox Security Inc. 8
  • 9. Attackers Understand Your Attack Surface …You Don’t Expansion Drivers Vulnerabilities Endpoints Exploits Network access © 2014 Skybox Security Inc. 9 Contraction Drivers Network segmentation Fixing vulnerabilities Technical controls Hours to attack, months to defend
  • 10. Recent Snowden Leak Backs This Up KEY OBJECTIVE! Source – TED Talk October 2013 – Mikko Hyponnen, Chief Risk Officer F-Secure © 2014 Skybox Security Inc. 10
  • 11. Is there a solution? © 2014 Skybox Security Inc. 11
  • 12. Use Risk Analytics to Understand Your Attack Surface—Continuously Network Visibility: Topology Routing Policies Firewalls © 2014 Skybox Security Inc. 12 Endpoints Visibility: Software Patches Vulnerabilities Classification Attack Vectors Risk Metrics Remediation Plans Network Visualization Contextual Analysis
  • 13. Agenda  Live Demo – Simon Roe – Overview © 2014 Skybox Security Inc. 13
  • 14. Agenda  Summary – Thomas Wendrich © 2014 Skybox Security Inc. 14
  • 15. What Do You See?
  • 16. Combine Data & Give It Battlefield Context √ 80+ Vendors integrated with Skybox © 2014 Skybox Security Inc. 16
  • 17. Skybox – A Critical Component of Next Generation Cyber SOC Design Cyber Security Analysts IT-GRC - Integrated Security Dashboard & Reporting Risk Analytics Security intelligence to minimize risk exposure © 2014 Skybox Security Inc. 17 Security Information & Event Management Event monitoring to detect & respond to incidents
  • 18. Skybox Company Snapshot Leading provider of risk analytics solutions for security management & cyber defense © 2014 Skybox Security Inc. 18 Founded 2002 Revenue Growth 50%+ Customers 400+ Countries 40 Headquarters San Jose R&D Center Israel Identify security gaps in minutes, not weeks
  • 19. 400+ Enterprise Customers in 40+ Countries Financial Services © 2014 Skybox Security Inc. 19 Technology Healthcare Government & Defense Consumer Service Providers Energy & Utilities
  • 20. Network Security Management with Skybox © 2014 Skybox Security Inc. 20 Monitor Compliance Model Network Understand network context Analyze Firewalls Manage Changes  Rule and configuration checks  Access path analysis  Rule optimization  Change tracking  Automated audits  PCI DSS  FISMA  NERC  NIST  Custom Policies Automate security assessments Verify controls continuously Change Request Tech Details Assess Risks Make Change Reconcile Verify Optimize change process  Network topology view  Normalize data from 70+ systems  Access simulation
  • 21. © 2014 Skybox Security Inc. 21
  • 22. SIGS _ Dec 2014 Security Interest Group Switzerland Thomas Wendrich, Director CEUR, Skybox Security Simon Roe, EMEA Channel Presales Director November 2014 www.skyboxsecurity.com thomas.wendrich@skyboxsecurity.com +49 40 31979956

Hinweis der Redaktion

  1. Der Lloyds Risk Index Report von 2013. Wo steht ‘Cyber Risk’
  2. Remember from 2012 report – 97% of breaches were avoidable through simple or intermediate controls
  3. Alternative to slide #2 Key Points: Bring in some of the issues that you see with existing customers or specific industry challenges Today’s networks are more complex than ever, and that complexity impacts how you address vulnerability and threat management, network security management
  4. Battle of Austerlitz ... drawing which shows Napoleon directing the battle from Zuran Hill The view of the battlefield from the Zuran Hill, which was Napoleon's command post during the early stages of the battle, are to Austerlitz what the Lion Mound is to Waterloo. An excellent viewing platform. Despite the far from perfect weather the whole of the left and centre of the battlefield was laid out before us. From the Santon on our left, to the Post House directly in front and the Pratzen Heights on our right. True the area around Telnitz on the far right were out of sight, and true also that in the early stages of the battle this was a critical area. But the main French attack would be launched on the Pratzen Heights and this was an ideal observation platform for the coming attack.
  5. Battle of Austerlitz ... drawing which shows Napoleon directing the battle from Zuran Hill The view of the battlefield from the Zuran Hill, which was Napoleon's command post during the early stages of the battle, are to Austerlitz what the Lion Mound is to Waterloo. An excellent viewing platform. Despite the far from perfect weather the whole of the left and centre of the battlefield was laid out before us. From the Santon on our left, to the Post House directly in front and the Pratzen Heights on our right. True the area around Telnitz on the far right were out of sight, and true also that in the early stages of the battle this was a critical area. But the main French attack would be launched on the Pratzen Heights and this was an ideal observation platform for the coming attack.
  6. TED Talk October 2013 – Mikko Hyponnen
  7. Modelling, as so many industries have embraced
  8. Interviewer: I understand that the merger of [Company A] and [Company B] was a massive undertaking. What was the situation in 2009? Mr. Finan: Global financial situation in 2009, led to forced merger of [Company A] and [Company B], short time-frame, government oversight. Interviewer: What was the role of your IT team in all of this? Mr. Finan: Merge the two networks, both environments of 100,000 IP nodes each. Risk committee looking for a solution to merge the two networks and reduce risk.
  9. Skybox is able to integrate and work with data from nearly 80 different devices and systems, giving you the widest view of your Network and potential risks. When you’re a skybox customer, one of the perks is that you’ll have the most accurate view of your network, enabling you to respond correctly when faced with some difficult security questions.
  10. Effectively, the Risk Analytics component is what Gartner called out (Advanced Analytics) as the next opportunity for MSSPs *Monitoring of network intrusions in the context of customer vulnerabilities, computing the attack surfaces and understanding what needs to be done to PREVENT attacks *Targeted Attacks & APTs – same issue; like vulnerability assessment, malware detection
  11. Access simulation Automated firewall analytics Comprehensive network model: view the network topology and see the impact of security controls Access analysis: identify access paths to critical assets Compliance monitoring: show compliance against PCI, NIST and other requirements Firewall change management Products used in this solution: Firewall Assurance, Network Assurance, Change Manager Skybox provides a “next-generation” solution for Network Security Management that solves some of the main headaches in managing firewalls and other network devices. Skybox helps achieve and demonstrate compliance – as needed, to maintain continuous compliance with compliance regulations and organizational policies. Change Manager: Skybox provides a complete secure change workflow from an initial change request to planning and executing network changes, and making sure that changes are completed as requested. Skybox is based on technology that allows security teams to see the network topology, making it easier to see and understand the interaction of network devices, security controls, information assets, and policies