SlideShare uma empresa Scribd logo
1 de 14
JISC Conference
Technical decision support for
PREVENT
November 2019
What’s this session about?
What is OSINT?
How can technology like this be
leveraged to provide early
indication of safeguarding issues
A few simple steps to become
more effective and efficient
I’m just (X), how can NCSC help
me?
!
OSINT = Open Source Intelligence = our “Digital
Exhaust”
We all leave it behind us
everywhere we go
Cookies
Social Media
WhatsApp Groups
‘Free’ WiFi
‘Loyalty’/Cashback Schemes
‘Free’ ANYTHING
Digital Economy now extant,
that horse has bolted
Security vs Privacy? Data is the
new currency
“Online Life” & “Real Life” are
merging, as are the norms
expected in both
A new form of Social Contract
is emerging
The Need: Automated Real-Time Anomaly Detection &
Prevention
Ransomware
Fileless Malware
Cyber-Bullying
X-ism
Organised Crime
Phishing
Any Vehicle
Email, Browser, Apps, Files
Any Traffic
Encrypted, Unencrypted
Any Network
Wired, Wireless, Mobile, Cloud
Any Device
PC, Tablet, Phone, IoT
Inspect all SSL/encrypted traffic
Machine learning
Multi-engine, CPU-tracking cloud sandbox
Block files until a verdict is rendered
Integrated security platform (firewall,
endpoint, wireless, email, CASB, Wi-Fi)
Security center (SOC)
1.0M+
Sensors
50+
Industry
research
organizations
in which
intelligence is
shared
24x7x365
Monitoring
<4 Hr.
Response to
never-before-seen
vulnerabilities
140K+
Malware
samples
collected
daily
28M+
Malware
attacks
blocked
daily
SonicWall Capture Labs
Analyzed
7.2 billion
malware attacks
January to September
2019
Identified
113K+ never-before-seen
threats in 2019
Credited
Discovery of
hundreds of unique
variants every day
Established
in Mid-’90s
Dedicated
World-class threat and
machine learning
engineering team
Extensive
Malware Library
Thousands of terabytes of
data/artifacts
My problem isn’t with malware it’s with
behaviour
Large and diverse young population
No control over devices
Security vs Privacy is in a different realm:
oOften need to secure one from another
oSafeguarding is not the same as Cyber
oPastoral care & Intervention often more
important than “policing”
o Early detection of issues thus becomes the desired
outcome of technology introduction
OSINT Analytics
Automated Internet-Mediated Research Module
OSINT Analytics combines a dedicated search engine, context-
adjusted normalized social media analytics, and AI-powered
sentiment analysis into a powerful package.
OSINT Analytics provides snapshot insights of social media
ecosystems – revealing popular posts, opinion leaders, and topic
initiators with text and visualization.
CONNECTING
THE DOTS
INTO THE DEEP
WEB
SHORTER TIME
TO
INTELLIGENCE
INFLUENCER
IDENTIFICATION
P.O.I.
Automated Trend Forecasting
P.O.I. generates a dynamic
activity view built around
keyword searches and topic
selection to reveal inflection
points and conversation drivers.
P.O.I. uses Machine Learning
algorithms to aid in pattern
identification and false profile
detection.
INFLUENCER IDENTIFICATION
Since social networks are not just text and keywords, OSINT Analytics contextually
analyzes organic connections and content – more accurately identifying, flagging, and
ranking inflection points..
EARLY WARNING
Activity timelines and other graphical data displays within P.O.I. allow you to stay ahead
of changes in trends within any domain. Know when things are heating up, before they
boil over.
SUGGEST AND IDENTIFY
View activity patterns and post history – identify fake profiles and botnets at a glance.
Then, pass the information on to other operators, using integrated in-system notification
AUTOMATED AND DYNAMIC TOPCIS OF INTEREST
Create cross-platform social media monitors on any topic in seconds, and let P.O.I.
continuously float inflection points to your attention, based on preset queries of
popularity, sentiment, platform, activity, influence etc. or custom queries in real time.
What can I do in the meantime?
Talk to us: Bill Orme/David Peace:
borme@sonicwall.com
dpeace@sonicwall.com
Use the NCSC’s Protective DNS
https://www.ncsc.gov.uk/information/pdns
Talk to people like the Cyber Foundry in Manchester
https://gmcyberfoundry.ac.uk/
Tell your student populations up front about what is OK/!OK on your
networks (short policies in big letters)
Product Architecture
CAPTURE Security Center (Management, Analytics, Threat Visibility)
CAPTURE Advanced Threat Protection
Cloud App Security
Email Security
NSv and WAF
CAPTURE Client
Network Security Platforms Cloud & SaaS IoTEmailMobile & EndpointsWi-Fi
AutomatedReal-TimeBreachDetectionand PreventionTechnology
DEEP LEARNING
ALGORITHM
Machine Learning
Artifact 1
Artifact 2
Artifact 3
Artifact 4
Data File
MS Office
PDF
Streaming Data
Classified Malware
RANSOMWARE
Locky
RANSOMWARE
WannaCry
TROJAN
Spartan
UNKNOWN
CLOUD CAPTURE SANDBOX
Hypervisor
GoodBad BLOCK
until
VERDICT
SENT
Emulation
Virtualization
BLOCK
Analyzed
7.2 billion malware attack attempts
from Jan. 19 to Sept. 19
Memory/RTDMI
Protecting PDFs, MS Office and
Chip-based Processor / Memory
Network
Security
Appliances
Wi-Fi
Cloud
& SaaS
Email
IoT
Endpoints
Thank You | SonicWall.com

Mais conteúdo relacionado

Mais procurados

Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityPriyanshu Ratnakar
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Shawn Nutley
 
How AI Can Improve Your Security System?
How AI Can Improve Your Security System?How AI Can Improve Your Security System?
How AI Can Improve Your Security System?venkatvajradhar1
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYvenkatvajradhar1
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Cristian Garcia G.
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYPriyanshu Ratnakar
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation♟Sergej Epp
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on CybersecurityGraham Mann
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoTJinia Bhowmik
 
How AI Can Improve Your Security System?
How AI Can Improve Your Security System?How AI Can Improve Your Security System?
How AI Can Improve Your Security System?venkatvajradhar1
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityAvantika University
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareSecureAuth
 
Smartly Secure, Securely Smart _ Enterprise IT News
Smartly Secure, Securely Smart _ Enterprise IT NewsSmartly Secure, Securely Smart _ Enterprise IT News
Smartly Secure, Securely Smart _ Enterprise IT NewsKrishna Arani
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityMohammad Khreesha
 

Mais procurados (20)

Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020Top 8 Cybersecurity Trends 2020
Top 8 Cybersecurity Trends 2020
 
How AI Can Improve Your Security System?
How AI Can Improve Your Security System?How AI Can Improve Your Security System?
How AI Can Improve Your Security System?
 
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITYARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
ARTIFICIAL INTELLIGENCE IN CYBER-SECURITY
 
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
Ciberseguridad: Enemigos o defraudadores (MAGISTRAL)
 
HOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITYHOW AI CAN HELP IN CYBERSECURITY
HOW AI CAN HELP IN CYBERSECURITY
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
AI and the Impact on Cybersecurity
AI and the Impact on CybersecurityAI and the Impact on Cybersecurity
AI and the Impact on Cybersecurity
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Mobile security article
Mobile security articleMobile security article
Mobile security article
 
Security issues and solutions : IoT
Security issues and solutions : IoTSecurity issues and solutions : IoT
Security issues and solutions : IoT
 
How AI Can Improve Your Security System?
How AI Can Improve Your Security System?How AI Can Improve Your Security System?
How AI Can Improve Your Security System?
 
Use of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika UniversityUse of Artificial Intelligence in Cyber Security - Avantika University
Use of Artificial Intelligence in Cyber Security - Avantika University
 
Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Balancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in HealthcareBalancing User Experience with Secure Access Control in Healthcare
Balancing User Experience with Secure Access Control in Healthcare
 
Smartphone Security Article
Smartphone Security ArticleSmartphone Security Article
Smartphone Security Article
 
Smartly Secure, Securely Smart _ Enterprise IT News
Smartly Secure, Securely Smart _ Enterprise IT NewsSmartly Secure, Securely Smart _ Enterprise IT News
Smartly Secure, Securely Smart _ Enterprise IT News
 
IT Security
IT SecurityIT Security
IT Security
 
The good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurityThe good, the bad, and the ugly on integration ai with cybersecurity
The good, the bad, and the ugly on integration ai with cybersecurity
 

Semelhante a Providing real time decision support to Prevent coordinators

Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security TechnologiesRuchikaSachdeva4
 
AI for improved surveillance & cybersecurity
AI for improved surveillance & cybersecurityAI for improved surveillance & cybersecurity
AI for improved surveillance & cybersecurityRepustate
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys? SITA
 
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdfseotechinator
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurityArjitDas2
 
What if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTWhat if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTMuralidhar Somisetty
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Michele Chubirka
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?John Newton
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleGregory Hanis
 
3i mind-open mind-web
3i mind-open mind-web3i mind-open mind-web
3i mind-open mind-webPublicLeaker
 
3i mind-open mind-web
3i mind-open mind-web3i mind-open mind-web
3i mind-open mind-webDeepDude
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfBecky Burwell
 
Presentasi cca it now and tomorow
Presentasi cca it now and tomorowPresentasi cca it now and tomorow
Presentasi cca it now and tomorowHendri Karisma
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligenceabhisheksinghcs
 

Semelhante a Providing real time decision support to Prevent coordinators (20)

Hot Cyber Security Technologies
Hot Cyber Security TechnologiesHot Cyber Security Technologies
Hot Cyber Security Technologies
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
AI for improved surveillance & cybersecurity
AI for improved surveillance & cybersecurityAI for improved surveillance & cybersecurity
AI for improved surveillance & cybersecurity
 
Threat intelligence minority report
Threat intelligence minority reportThreat intelligence minority report
Threat intelligence minority report
 
OpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptxOpenSourceIntelligence-OSINT.pptx
OpenSourceIntelligence-OSINT.pptx
 
Why do women love chasing down bad guys?
Why do women love chasing down bad guys? Why do women love chasing down bad guys?
Why do women love chasing down bad guys?
 
Hope x talk
Hope x talkHope x talk
Hope x talk
 
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdftechinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
techinator-net-how-ai-use-in-cybersecurity-future-of-hacking-.pdf
 
How AI used in cybersecurity
How AI used in cybersecurityHow AI used in cybersecurity
How AI used in cybersecurity
 
Pentest trends 2017
Pentest trends 2017Pentest trends 2017
Pentest trends 2017
 
What if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoTWhat if Things Start to Think - Artificial Intelligence in IoT
What if Things Start to Think - Artificial Intelligence in IoT
 
Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)Digital Defense for Activists (and the rest of us)
Digital Defense for Activists (and the rest of us)
 
Chicago20110608e 110609115733 Phpapp01
Chicago20110608e 110609115733 Phpapp01Chicago20110608e 110609115733 Phpapp01
Chicago20110608e 110609115733 Phpapp01
 
CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?CSI Content: Who Killed ECM?
CSI Content: Who Killed ECM?
 
IDS+Honeypots Making Security Simple
IDS+Honeypots Making Security SimpleIDS+Honeypots Making Security Simple
IDS+Honeypots Making Security Simple
 
3i mind-open mind-web
3i mind-open mind-web3i mind-open mind-web
3i mind-open mind-web
 
3i mind-open mind-web
3i mind-open mind-web3i mind-open mind-web
3i mind-open mind-web
 
SFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdfSFBA_SUG_2023-08-02.pdf
SFBA_SUG_2023-08-02.pdf
 
Presentasi cca it now and tomorow
Presentasi cca it now and tomorowPresentasi cca it now and tomorow
Presentasi cca it now and tomorow
 
Road map for actionable threat intelligence
Road map for actionable threat intelligenceRoad map for actionable threat intelligence
Road map for actionable threat intelligence
 

Mais de Jisc

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...Jisc
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxJisc
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxJisc
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Jisc
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...Jisc
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptxJisc
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxJisc
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxJisc
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxJisc
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJisc
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxJisc
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptxJisc
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptxJisc
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxJisc
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptxJisc
 

Mais de Jisc (20)

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...International students’ digital experience: understanding and mitigating the ...
International students’ digital experience: understanding and mitigating the ...
 
Digital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptxDigital Storytelling Community Launch!.pptx
Digital Storytelling Community Launch!.pptx
 
Open Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptxOpen Access book publishing understanding your options (1).pptx
Open Access book publishing understanding your options (1).pptx
 
Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...Scottish Universities Press supporting authors with requirements for open acc...
Scottish Universities Press supporting authors with requirements for open acc...
 
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...How Bloomsbury is supporting authors with UKRI long-form open access requirem...
How Bloomsbury is supporting authors with UKRI long-form open access requirem...
 
Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023Jisc Northern Ireland Strategy Forum 2023
Jisc Northern Ireland Strategy Forum 2023
 
Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023Jisc Scotland Strategy Forum 2023
Jisc Scotland Strategy Forum 2023
 
Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023Jisc stakeholder strategic update 2023
Jisc stakeholder strategic update 2023
 
JISC Presentation.pptx
JISC Presentation.pptxJISC Presentation.pptx
JISC Presentation.pptx
 
Community-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptxCommunity-led Open Access Publishing webinar.pptx
Community-led Open Access Publishing webinar.pptx
 
The Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptxThe Open Access Community Framework (OACF) 2023 (1).pptx
The Open Access Community Framework (OACF) 2023 (1).pptx
 
Are we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptxAre we onboard yet University of Sussex.pptx
Are we onboard yet University of Sussex.pptx
 
JiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptxJiscOAWeek_LAIR_slides_October2023.pptx
JiscOAWeek_LAIR_slides_October2023.pptx
 
UWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptxUWP OA Week Presentation (1).pptx
UWP OA Week Presentation (1).pptx
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
MarkChilds.pptx
MarkChilds.pptxMarkChilds.pptx
MarkChilds.pptx
 
RStrachanOct23.pptx
RStrachanOct23.pptxRStrachanOct23.pptx
RStrachanOct23.pptx
 
ISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptxISDX2 Oct 2023 .pptx
ISDX2 Oct 2023 .pptx
 
FerrellWalker.pptx
FerrellWalker.pptxFerrellWalker.pptx
FerrellWalker.pptx
 

Último

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 

Último (20)

Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 

Providing real time decision support to Prevent coordinators

  • 1. JISC Conference Technical decision support for PREVENT November 2019
  • 2.
  • 3. What’s this session about? What is OSINT? How can technology like this be leveraged to provide early indication of safeguarding issues A few simple steps to become more effective and efficient I’m just (X), how can NCSC help me? !
  • 4. OSINT = Open Source Intelligence = our “Digital Exhaust” We all leave it behind us everywhere we go Cookies Social Media WhatsApp Groups ‘Free’ WiFi ‘Loyalty’/Cashback Schemes ‘Free’ ANYTHING Digital Economy now extant, that horse has bolted Security vs Privacy? Data is the new currency “Online Life” & “Real Life” are merging, as are the norms expected in both A new form of Social Contract is emerging
  • 5. The Need: Automated Real-Time Anomaly Detection & Prevention Ransomware Fileless Malware Cyber-Bullying X-ism Organised Crime Phishing Any Vehicle Email, Browser, Apps, Files Any Traffic Encrypted, Unencrypted Any Network Wired, Wireless, Mobile, Cloud Any Device PC, Tablet, Phone, IoT Inspect all SSL/encrypted traffic Machine learning Multi-engine, CPU-tracking cloud sandbox Block files until a verdict is rendered Integrated security platform (firewall, endpoint, wireless, email, CASB, Wi-Fi) Security center (SOC)
  • 6. 1.0M+ Sensors 50+ Industry research organizations in which intelligence is shared 24x7x365 Monitoring <4 Hr. Response to never-before-seen vulnerabilities 140K+ Malware samples collected daily 28M+ Malware attacks blocked daily
  • 7. SonicWall Capture Labs Analyzed 7.2 billion malware attacks January to September 2019 Identified 113K+ never-before-seen threats in 2019 Credited Discovery of hundreds of unique variants every day Established in Mid-’90s Dedicated World-class threat and machine learning engineering team Extensive Malware Library Thousands of terabytes of data/artifacts
  • 8. My problem isn’t with malware it’s with behaviour Large and diverse young population No control over devices Security vs Privacy is in a different realm: oOften need to secure one from another oSafeguarding is not the same as Cyber oPastoral care & Intervention often more important than “policing” o Early detection of issues thus becomes the desired outcome of technology introduction
  • 9. OSINT Analytics Automated Internet-Mediated Research Module OSINT Analytics combines a dedicated search engine, context- adjusted normalized social media analytics, and AI-powered sentiment analysis into a powerful package. OSINT Analytics provides snapshot insights of social media ecosystems – revealing popular posts, opinion leaders, and topic initiators with text and visualization. CONNECTING THE DOTS INTO THE DEEP WEB SHORTER TIME TO INTELLIGENCE INFLUENCER IDENTIFICATION
  • 10. P.O.I. Automated Trend Forecasting P.O.I. generates a dynamic activity view built around keyword searches and topic selection to reveal inflection points and conversation drivers. P.O.I. uses Machine Learning algorithms to aid in pattern identification and false profile detection. INFLUENCER IDENTIFICATION Since social networks are not just text and keywords, OSINT Analytics contextually analyzes organic connections and content – more accurately identifying, flagging, and ranking inflection points.. EARLY WARNING Activity timelines and other graphical data displays within P.O.I. allow you to stay ahead of changes in trends within any domain. Know when things are heating up, before they boil over. SUGGEST AND IDENTIFY View activity patterns and post history – identify fake profiles and botnets at a glance. Then, pass the information on to other operators, using integrated in-system notification AUTOMATED AND DYNAMIC TOPCIS OF INTEREST Create cross-platform social media monitors on any topic in seconds, and let P.O.I. continuously float inflection points to your attention, based on preset queries of popularity, sentiment, platform, activity, influence etc. or custom queries in real time.
  • 11. What can I do in the meantime? Talk to us: Bill Orme/David Peace: borme@sonicwall.com dpeace@sonicwall.com Use the NCSC’s Protective DNS https://www.ncsc.gov.uk/information/pdns Talk to people like the Cyber Foundry in Manchester https://gmcyberfoundry.ac.uk/ Tell your student populations up front about what is OK/!OK on your networks (short policies in big letters)
  • 12. Product Architecture CAPTURE Security Center (Management, Analytics, Threat Visibility) CAPTURE Advanced Threat Protection Cloud App Security Email Security NSv and WAF CAPTURE Client Network Security Platforms Cloud & SaaS IoTEmailMobile & EndpointsWi-Fi
  • 13. AutomatedReal-TimeBreachDetectionand PreventionTechnology DEEP LEARNING ALGORITHM Machine Learning Artifact 1 Artifact 2 Artifact 3 Artifact 4 Data File MS Office PDF Streaming Data Classified Malware RANSOMWARE Locky RANSOMWARE WannaCry TROJAN Spartan UNKNOWN CLOUD CAPTURE SANDBOX Hypervisor GoodBad BLOCK until VERDICT SENT Emulation Virtualization BLOCK Analyzed 7.2 billion malware attack attempts from Jan. 19 to Sept. 19 Memory/RTDMI Protecting PDFs, MS Office and Chip-based Processor / Memory Network Security Appliances Wi-Fi Cloud & SaaS Email IoT Endpoints
  • 14. Thank You | SonicWall.com

Notas do Editor

  1. The Capture Labs team pulls from the Capture Threat Network – which includes data from the following sources: Intelligence sharing consortiums of threat researchers, 1 million sensors located across the globe. Continuous real-time monitoring. We collect 100K malware samples per day and analyze 100k events per day.
  2. We have a team of over 50 engineers Dedicated to identifying the latest threats Over our 28 years – have amassed hundreds of terabytes of data / artifacts.
  3. All of our cloud capabilities integrated into our cloud platform. [ADVANCE]
  4. This is technology that is central to SonicWall’s offering, makes us unique in the market, and a key component to our Capture Cloud Platform. We scan incoming traffic – PDFs, office docs, etc. and look at artifacts in those files that represent malicious activity. We utilize Machine Learning (all the data we’ve gathered over 27 years) with deep learning algorithms and block files until a verdict is rendered. If we suspect something, we send it to the Capture Cloud. First, we check it against the hundreds of terabytes of hashed artifacts that we’ve collected. If it isn’t found, we run through our multi-engine sandbox (analogy of a hurt arm). It has to pass all four engines with a green check. If it’s bad we hash the artifact, and it’s shared globally amongst the SonicWall products – FW, endpoint, email, client. Note that Capture renders a verdict for ~80% of all files in less than 2 seconds. Note the unique capability around RTDMI (can detect Meltdown, Spectre, Foreshadow); executes the malware in memory; less than 100 nanoseconds; patented. RTDMI is extremely effective and detects ~98% of what the other engines find. Important to note that we have the IP around RTDMI. We have a solution that can help. Our vision, straight up, is that we will provide automated breach detection and prevention in real-time. Run through the advanced threats, the challenges, and then the critical components needed to protect against this. Aligns directly with the cyber arms race and the cyber skills gap.