The world has changed. Nearly everything is online and connected. Risks arise and recent attacks are major by volume, variety, frequency or reach. How to prepare to respond to an attack? Don’t wait – Take action now with Orange
More about Orange Business Services:
Official website: http://www.orange-business.com/en
Facebook: https://www.facebook.com/orangebusiness/
Twitter: https://twitter.com/orangebusiness
Linkedin: https://www.linkedin.com/company/orange-business-services/
Slideshare: http://www.slideshare.net/orangebusiness
Pinterest: https://fr.pinterest.com/orangebusiness
2. %
in connected things 2015 to 2025
– IHS Markit
400 increase
Nearly everything is
online and connected
Connectivity + IoT =
everything in the cloud
Over 2 trillion Google
searches per year
By 2025 we will output 62Gb
of data per person per day, vs
500Mb in 2012
The world has changed
Age of Cyber Dependency
2
3. About 15 million customer
information was stolen from
T-Mobile, after Experian, the
credit-checking company,
was breached
Mirai DDoS attacks rendered
sites like Netflix, Twitter and
Reddit inaccessible, and is
still a threat with source code
circulating hacker forums
WannaCry global attacks
hit the UK’s NHS hardest,
compromising 70,000 devices
like computers, MRI scanners
and blood storage refrigerators
IT Compliance Blog listed
7,073,069 data breaches
and cyber attacks in Jan
2018, the highest number
of any month in any year
2015
WannaCry
Dubbed the biggest malware
attack in history, WannaCry
infected 230,000 computers
across 150 countries when it
was unleashed in May 2017
29 Sep, 2017 www.itpro.co.uk 24 Oct, 2017 www.symantec.com
Petya
Petya has been in existence since 2016 and
is primarily impacting organizations in
Europe. It differs from typical ransomware as
it doesn’t just encrypt files, it also overwrites
and encrypts the master boot record (MBR).
NotPetya
Many of the computers infected by NotPetya
were running older versions of Windows.
NotPetya virus superficially resembles Petya
in several ways, except that it spreads on its
own and encrypts everything.
Cyber Threat (2015 - 2018)
Recent attacks are major
by volume, variety, frequency or reach
3
2016 2017 2018
17 Oct, 2017 www.csoonline
4. Equifax
Poorly managed digital risk
can cause real harm
300m costs from NotPetya attack Details of national servicemen
and personnel leaked
23 lawsuits with 2.4m affected
in new attack
No one is
immune
Accountability push from regulators,
government and ratings agencies
Targets are not solely chosen
based on return on effort
4
Singapore Ministry of
Defense Cyber BreachMaersk
5. Digital security high
on CIO agenda
Source: The 2017 CIO Agenda: Seize the Digital Ecosystem Opportunity
Gartner survey
“The risks of not
investing in digital
security are high.
– Gartner Special Report:
Cybersecurity at the Speed of Digital Business
5
Major organizations globally see digital security as
a priority activity and will action on short term
trails and long-term investments.
It was found that digital security is a priority activity for major
organizations, both for short term pilots and trails, as well as for
deeper investments and deployments.
6. Source: Ransomware Protection: Five Best Practices, July 2017
5 best practices for enterprises to harden their defense against the growing threat of ransomware.
5 actions to manage digital risk
Protect against known ransomware vulnerability
Correlate exploits to vulnerabilities, and prioritize patching.
Work with a third-party vulnerability management vendor to scan and patch.
Assign patch priority based on prioritized patching process (P3) scores.
6
Protect against phishing and watering hole attacks
Protect against malvertisements and downloaders with proper endpoint protection
Ensure that the right network-level protections are in place
Bulletproof your backup and recovery practices05
04
03
02
01
Use antispam, phishing, and web control tools, consider browser isolation.
Encourage the human firewall.
Don’t blame the victims; give them the right tools.
Go beyond traditional blacklist-based endpoint security for maximum protection.
Focus on attack surface reduction.
Detect and block malicious behavior.
Beef up your network security controls to allow only known good traffic.
Deploy next-generation firewalls.
Deploy a solution for automated malware analysis.
Focus on frequent backups that are free of ransomware.
Back up and test often.
Watch backups for malware.
8. Orange has market-leading
capabilities in cyber security
OPEX and CAPEX-based services
Flexible business models to suit your requirements
Eco-system of partners
Protect against known ransomware vulnerability
Protect against phishing and watering hole attacks
Protect against malvertisements and downloaders with proper endpoint protection
Ensure that the right network-level protections are in place
Bulletproof your backup and recovery practices
Did
you
We can support your management of digital risks
8
know
01
02
03
04
05
Orange
addresses all
5 practices.
9. Uniquely positioned to
support you
By leveraging on operator DNA
First to know
First hand visibility
of attack signals
from our Internet
backbone.
Security span
B2B customer data
has the same security
services that protect
B2C customers
from massive and
continuous attacks.
9
10. Perimeter and
end-user security
An end-to-end service provider
Hunt and investigate emerging
threats, fraud and data leaks
Qualify, contain and remediate
attacks
Analyze security events
and detect breaches
Defend and monitor your
critical assets and data
against cyber threats
Prepare your security strategy
and ensure it is working
Crisis management
and remediation
Advanced threat
detection
Audit and consultingThreat intelligence
10
Managed by
experts
11. Organizational,
technical &
compliance
audit
Penetration
testing Consulting
DDoS
protection
Security Incident
Event Mgmt &
CyberSOC
USB
decontamination
24/7
CyberSOC
Vulnerability
scan
Mobile
Security
Network
and web
security
Data and
application
security
Identity and
Access
Management
Email
protection
24/7SOC
Vulnerability
intelligence
feeds
Cyber
criminality
prevention
CERT tools
CERT
Incident
response
Digital
Forensics
24/7C-SIRT
Crisis
management
Our Solutions
11
Managed by
experts
12. 11:00
Orange incident
response teams
engaged by customers
14:30
Real-time intelligence
feeds confirm global
ransomware
15:30
Orange Epidemiology Lab
communicates Indicators
of Compromise (IoC)
16:00
Remediation
actions shared with
security agencies
14:50
Orange CERT
identifies similarities
with Petya
15:50
Orange CyberSOC injects
IoCs and personalized use
case for each customer
17:00
Orange operational teams
ready to apply emergency
procedures and patches
Thank you for your support during the NotPetya ransomware (crisis).
Especially for your proactivity, timely communications and swift actions
– IT Director, Cosmetics Multinational
“
”
managed by
Orange
cyberdefense
experts
Detect
Real life example
Managing the NotPetya crisis
12
14. Leading private
CERT
Incident response
Digital forensics
Cyberdefense
Academy
4 CyberSOC that bring together the best expertise in threat analysis 24/7/365
9 SOC around the world monitoring security infra-structure 24/7/365
4 CERT around the world monitoring and responding to events 24/7/365
3 scrubbing centers to mitigate DDoS attacks
Belgium
France
India
Egypt
Mauritius
United States
Canada
Singapore
Malaysia
Poland
14
A global presence of industry-leading capabilities
15. Our proprietary capabilities
correlated
events/day25bn
1500qualified security
incidents managed/month
500m+malwares
in our database
Patented big data collection and
event correlation engine
Own threat intelligence
database and real-time feeds
Qualification and investigation by multi-
skilled experts based around the globe
15
16. A business unit
dedicated to security
Orange Cyberdefense
“Orange customers give
above-average marks
for vendor and service
capability satisfaction
– Gartner : Magic Quadrant
for Managed Security Services, Worldwide, 2018
ISO 27001 and NATO certified
60,000+
security assets
managed worldwide
30 years
of experience in securing
critical infrastructures
720
multinational customers
1200+
Cyberdefense experts
16
19. How to prepare to respond to
an attack?
How ready are you to prevent a
potential crisis?
How would your organization,
customers and suppliers cope if
network and systems weredown?
Business, disrupted.
19
20. Don’t wait – Take action now
Improve your cyber
resilience across the digital
risk lifecycle
Secure data throughout its
journey
Embrace Next-Gen
security
Adopt a proactive
mindset
Form the right
alliances
20
Prepare your organization
for an attack
Ensure continuous
improvement of your
security
Access expertise and
collective threat
intelligence
Effectively orchestrate
technology vendors