SlideShare uma empresa Scribd logo
1 de 17
©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd.
5 Steps to Stronger Security
STOPPING THE NEXT
MASSIVE CYBERATTACK
©2015 Check Point Software Technologies Ltd. 2
Era of the Breach
1 IT Security Risks Survey 2014, Kapersky Lab report, 2014
2 PWC Global State of Information Security Survey 2015, PWC, October 2014
3 “2014 Cost of Cyber Crime Study: United States,” Ponemon Institute, October 2014
of large companies say
targeted attacks are
a major threat1
39% 117,339
global attacks
per day2
Average annualized
cybercrime cost by
organization3
12.7
million
©2015 Check Point Software Technologies Ltd. 3
What Can Breaches Teach Us?
Security vulnerabilities
Operational weaknesses
Common attack patterns
Preventive steps
©2015 Check Point Software Technologies Ltd. 4
Best-in-class security
products are not enough
on their own
Only a security-driven network architecture and
security infrastructure partnered with
experienced staff can prevent future attacks
©2015 Check Point Software Technologies Ltd.
5 STEPS TO
STRONGER
SECURITY
©2015 Check Point Software Technologies Ltd. 6
Assess environment
vulnerabilities and weaknesses
STEP 1
©2015 Check Point Software Technologies Ltd. 7
Evaluating Security
• Ingress/Egress
• Critical Services
• Critical Data
• Segmentation
• Security controls
• Password policy controls
• Advanced threat prevention
©2015 Check Point Software Technologies Ltd. 8
Segment the network to
prevent and contain infections
STEP 2
©2015 Check Point Software Technologies Ltd. 9
FLAT NETWORK
SEGMENTED NETWORK
©2015 Check Point Software Technologies Ltd. 10
Implement security controls
to protect against APTs
STEP 3
©2015 Check Point Software Technologies Ltd. 11
Stopping Attacks At
Every Stage
©2015 Check Point Software Technologies Ltd. 12
The criminal identifies
a vulnerability to
exploit
Security solution:
The criminal writes code to
exploit that vulnerability and
download malware
Security solution:
Malware connects
with its Command
& Control center
Security solution:
Malware spreads
through the network to
look for critical data
Security solution:
Malware finds the data
& begins exfiltration
Security solution:
IPS AV
Sandboxing
Segmentation
IPS
AV
Anti-bot tools
Anti-bot
tools
Data
leakage
and loss
prevention
tools
©2015 Check Point Software Technologies Ltd. 13
Monitor 24/7
for continuous security
STEP 4
©2015 Check Point Software Technologies Ltd. 14
Keys to Effective Monitoring
Monitor logs daily
Correlate logs from different technologies
Tune detection and analysis rules based on logs
Identify potential incidents with anomaly detection tools
Stay familiar with network assets
Use visualization to assist expert analysis
Maintain logs for 90 days or more
Retroactively review logs based on new data
©2015 Check Point Software Technologies Ltd. 15
Create and test
Incident Response plan
STEP 5
©2015 Check Point Software Technologies Ltd. 16
Closing The Door To Attacks
Are you prepared to…
Contain attacks?
Minimize losses?
Keep the business running?
©2015 Check Point Software Technologies Ltd. 17
Take the first step,
schedule your FREE
Security Checkup
Stop Tomorrow’s
Attacks, Today

Mais conteúdo relacionado

Mais de Check Point Software Technologies

Mais de Check Point Software Technologies (8)

Check Point and Accenture Webinar
Check Point and Accenture Webinar Check Point and Accenture Webinar
Check Point and Accenture Webinar
 
Securing Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSECSecuring Your Cloud With Check Point's vSEC
Securing Your Cloud With Check Point's vSEC
 
WannaCry: How to Protect Yourself
WannaCry: How to Protect YourselfWannaCry: How to Protect Yourself
WannaCry: How to Protect Yourself
 
Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?Are You Prepared for the Next Mobile Attack?
Are You Prepared for the Next Mobile Attack?
 
Check Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private CloudCheck Point and Cisco: Securing the Private Cloud
Check Point and Cisco: Securing the Private Cloud
 
Check Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure WebinarCheck Point vSEC for Microsoft Azure Webinar
Check Point vSEC for Microsoft Azure Webinar
 
Protecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero ToleranceProtecting Critical Infastrucutre: Zero Tolerance
Protecting Critical Infastrucutre: Zero Tolerance
 
2015 Security Report
2015 Security Report 2015 Security Report
2015 Security Report
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Stopping The Next Cyberattack

  • 1. ©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd. 5 Steps to Stronger Security STOPPING THE NEXT MASSIVE CYBERATTACK
  • 2. ©2015 Check Point Software Technologies Ltd. 2 Era of the Breach 1 IT Security Risks Survey 2014, Kapersky Lab report, 2014 2 PWC Global State of Information Security Survey 2015, PWC, October 2014 3 “2014 Cost of Cyber Crime Study: United States,” Ponemon Institute, October 2014 of large companies say targeted attacks are a major threat1 39% 117,339 global attacks per day2 Average annualized cybercrime cost by organization3 12.7 million
  • 3. ©2015 Check Point Software Technologies Ltd. 3 What Can Breaches Teach Us? Security vulnerabilities Operational weaknesses Common attack patterns Preventive steps
  • 4. ©2015 Check Point Software Technologies Ltd. 4 Best-in-class security products are not enough on their own Only a security-driven network architecture and security infrastructure partnered with experienced staff can prevent future attacks
  • 5. ©2015 Check Point Software Technologies Ltd. 5 STEPS TO STRONGER SECURITY
  • 6. ©2015 Check Point Software Technologies Ltd. 6 Assess environment vulnerabilities and weaknesses STEP 1
  • 7. ©2015 Check Point Software Technologies Ltd. 7 Evaluating Security • Ingress/Egress • Critical Services • Critical Data • Segmentation • Security controls • Password policy controls • Advanced threat prevention
  • 8. ©2015 Check Point Software Technologies Ltd. 8 Segment the network to prevent and contain infections STEP 2
  • 9. ©2015 Check Point Software Technologies Ltd. 9 FLAT NETWORK SEGMENTED NETWORK
  • 10. ©2015 Check Point Software Technologies Ltd. 10 Implement security controls to protect against APTs STEP 3
  • 11. ©2015 Check Point Software Technologies Ltd. 11 Stopping Attacks At Every Stage
  • 12. ©2015 Check Point Software Technologies Ltd. 12 The criminal identifies a vulnerability to exploit Security solution: The criminal writes code to exploit that vulnerability and download malware Security solution: Malware connects with its Command & Control center Security solution: Malware spreads through the network to look for critical data Security solution: Malware finds the data & begins exfiltration Security solution: IPS AV Sandboxing Segmentation IPS AV Anti-bot tools Anti-bot tools Data leakage and loss prevention tools
  • 13. ©2015 Check Point Software Technologies Ltd. 13 Monitor 24/7 for continuous security STEP 4
  • 14. ©2015 Check Point Software Technologies Ltd. 14 Keys to Effective Monitoring Monitor logs daily Correlate logs from different technologies Tune detection and analysis rules based on logs Identify potential incidents with anomaly detection tools Stay familiar with network assets Use visualization to assist expert analysis Maintain logs for 90 days or more Retroactively review logs based on new data
  • 15. ©2015 Check Point Software Technologies Ltd. 15 Create and test Incident Response plan STEP 5
  • 16. ©2015 Check Point Software Technologies Ltd. 16 Closing The Door To Attacks Are you prepared to… Contain attacks? Minimize losses? Keep the business running?
  • 17. ©2015 Check Point Software Technologies Ltd. 17 Take the first step, schedule your FREE Security Checkup Stop Tomorrow’s Attacks, Today