SlideShare uma empresa Scribd logo
1 de 17
Baixar para ler offline
Cyber	
  Security	
  Simula/on	
  
Michael	
  Garvin	
  
Senior	
  Manager,	
  Product	
  Management	
  
Security	
  Organiza/ons	
  are	
  Figh/ng	
  an	
  Asymmetric	
  Ba=le	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
2	
  
Cybersecurity	
  top	
  IT	
  
skills	
  shortage	
  for	
  4th	
  
year	
  in	
  a	
  row*	
  
Staff	
  unproven—lack	
  
of	
  hands-­‐on	
  
experience	
  with	
  a	
  
breach	
  	
  
Organiza;ons	
  are	
  
never	
  certain	
  of	
  	
  
cyber-­‐readiness	
  
	
  
Seemingly	
  limitless	
  
resources	
  
Sophis;cated,	
  mul;-­‐
stage	
  aMacks	
  
AMacker	
  tac;cs	
  
constantly	
  morphing	
  
•  *	
  ESG’s	
  annual	
  global	
  IT	
  Spending	
  Inten6ons	
  survey	
  has	
  shown	
  a	
  ’problema6c	
  shortage’	
  of	
  cybersecurity	
  experts	
  as	
  the	
  top	
  IT	
  skills	
  shortage	
  for	
  four	
  years	
  in	
  a	
  row.	
  	
  	
  
•  hBp://www.esg-­‐global.com/research-­‐reports/2015-­‐it-­‐spending-­‐inten6ons-­‐survey/	
  
Security	
  Simula/on	
  Strengthens	
  Cyber	
  Readiness	
  
•  Cloud-­‐based,	
  virtual	
  training	
  experience	
  
•  Live-­‐fire	
  simula;on	
  of	
  mul;-­‐staged,	
  
advanced	
  targeted	
  aMack	
  scenarios	
  
•  Players	
  assume	
  the	
  iden;ty	
  of	
  their	
  
adversaries	
  to	
  learn	
  mo;ves,	
  tac;cs	
  and	
  
tools	
  
Engaging,	
  immersive	
  security	
  training	
  through	
  gamifica/on	
  	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
3	
  
Simula/on	
  Concept	
  Tested	
  and	
  Proven	
  Worldwide	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
4	
  
Annual	
  company-­‐wide	
  
war	
  games	
  
A	
  culture	
  of	
  	
  Educa/on,	
  
Innova/on	
  and	
  Passion	
  
Currently	
  ac/ve	
  in	
  30+	
  
countries	
  
Now	
  in	
  4th	
  Year	
  of	
  Ac/ve	
  
Deployment	
  
80+	
  Cyber	
  Readiness	
  events	
  worldwide	
  
Focused	
  on	
  Security	
  Awareness	
  	
  
and	
  thought	
  leadership	
  
Global	
  customer	
  &	
  partner	
  events	
  
Largest	
  event	
  -­‐	
  1500	
  registrants	
   Largest	
  compe//on	
  -­‐	
  400	
  teams	
  
Innova/on	
  Model	
  for	
  Achieving	
  Cyber	
  Readiness	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
5	
  
•  Cloud-­‐based,	
  virtual	
  training	
  experience	
  simulates	
  mul;-­‐staged	
  
aMack	
  scenarios	
  allowing	
  	
  players	
  to	
  take	
  on	
  the	
  iden;fy	
  of	
  their	
  
adversaries	
  	
  
•  Gamifica;on	
  provides	
  a	
  more	
  engaging,	
  immersive	
  educa;onal	
  
experience	
  	
  
•  Frequent	
  content	
  updates	
  ensure	
  team	
  stays	
  current	
  on	
  latest	
  
adversaries,	
  mo;ves	
  and	
  techniques	
  
•  Scenarios	
  impart	
  knowledge	
  gleaned	
  from	
  Symantec	
  security	
  
experts,	
  threat	
  analysis	
  and	
  current	
  threat	
  landscape	
  
THINK	
  LIKE	
  AN	
  ATTACKER	
  
•  Leaders	
  and	
  par;cipants	
  receive	
  in-­‐depth	
  security	
  skill	
  
assessments	
  
•  Provides	
  structured	
  recommenda;ons	
  for	
  cybersecurity	
  skill	
  
development	
  
•  Iden;fy	
  gaps	
  in	
  team	
  coverage	
  and	
  assess	
  skills	
  of	
  new-­‐hire	
  
candidates	
  
ASSESS	
  AND	
  ADVANCE	
  	
  
YOUR	
  TEAM	
  
Security	
  Simula;on	
  strengthens	
  cyber-­‐readiness	
  through	
  live-­‐fire	
  simula;on	
  of	
  today’s	
  most	
  
sophis;cated	
  advanced	
  targeted	
  aMacks	
  
Think	
  Like	
  Your	
  A=acker	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
6	
  
Hack/vist	
  
wants	
  notoriety,	
  a=en/on	
  
Cyber	
  Criminal	
  
mo/vated	
  by	
  money	
  
Cyber	
  Espionage	
  
seeking	
  Intellectual	
  
Property	
  for	
  profit	
  
	
  
Cyber	
  War	
  Crimes	
  
poli/cally	
  mo/vated,	
  	
  
na/on	
  states,	
  	
  
looking	
  to	
  gain	
  advantage	
  
	
  
What	
  
They’re	
  
Trying	
  to	
  
Steal	
  
How	
  They	
  	
  
Stole	
  It	
  
The	
  
A=acker	
  
Reconnaissance	
  
Incursion	
  
Discovery	
  
Capture	
  
Exfiltra/on	
  
Real-­‐world	
  A=ack	
  Scenarios	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
7	
  
Scenario	
  1:	
  
The	
  EDC	
  and	
  RKI	
  
	
  
Scenario	
  2:	
  
The	
  Coffee	
  Shop	
  Hack	
  
	
  
Scenario	
  3:	
  
EDC	
  and	
  the	
  Lost	
  Laptop	
  
	
  
Scenario	
  4:	
  
Forensics	
  Examiner	
  	
  
Mishandles	
  Evidence	
  
	
  
	
  
Skills:	
  
•  Ethical	
  hacking	
  
•  Penetra;on	
  Tes;ng	
  
•  Forensics	
  	
  
•  Data	
  exfiltra;on	
  
Methods:	
  
•  Iden;fy	
  targets	
  	
  
•  Compromise	
  network	
  and	
  
systems	
  
•  Blend	
  aMacks	
  	
  
•  Exfiltrate	
  data	
  	
  
Mission:	
  Breach	
  &	
  Steal	
  Informa/on	
  
Scenario	
  
Storyboard	
  
Scenario	
  
Map	
  
Target	
  &	
  
Content	
  Crea/on	
  
QA	
  
Tes/ng	
  
Scenarios	
  and	
  Content	
  Updated	
  as	
  New	
  A=ackers	
  and	
  Techniques	
  Emerge	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
8	
  
Symantec	
  Security	
  Experience	
   Global	
  Threat	
  Intelligence	
   Real	
  World	
  A=acks	
  
Refine	
  Content	
  Customer	
  Feedback	
  Deploy	
  Scenario	
  
Implement	
  Skill	
  Assessment	
  
and	
  Development	
  Programs	
  
Iden/fy	
  Organiza/onal	
  Gaps	
  
Assess	
  and	
  Advance	
  Your	
  Team	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
9	
  
•  Iden;fy	
  skills	
  requirements	
  for	
  
individuals	
  and	
  organiza;ons	
  
•  Iden;fy	
  gaps	
  in	
  team	
  coverage	
  
•  Assess	
  skills	
  of	
  poten;al	
  job	
  
candidates,	
  new	
  hires	
  and	
  exis;ng	
  
employees	
  
•  Focus	
  on	
  security	
  strategy	
  and	
  
tac;cs,	
  techniques	
  	
  
and	
  procedures	
  (TTP)	
  
•  Manual	
  and	
  automated	
  skills	
  
assessment	
  and	
  performance	
  
analysis	
  
•  Prescrip;ve	
  guidance	
  for	
  skill	
  set	
  
development	
  	
  
•  Conduct	
  itera;ve	
  skill	
  
development	
  programs	
  for	
  
con;nuous	
  learning	
  
Par/cipate	
  
Assess	
  skills	
  
Create	
  
development	
  
plan	
  
Par/cipate	
  /	
  
Learn	
  
Assess	
  
Progress	
  
Two	
  Delivery	
  Op/ons	
  	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
10	
  
Security	
  Simula/on	
  
Yearly	
  Subscrip/on	
  
Security	
  Simula/on	
  Exercise	
  
One-­‐/me	
  Workshop	
  
Personalize	
  to	
  organiza;onal	
  objec;ves	
  
Delivery	
  Op;ons:	
  	
  
•  Delivered	
  either	
  Onsite	
  or	
  Online	
  
•  Facilitated	
  or	
  Self-­‐directed	
  
•  One	
  or	
  Mul;-­‐day	
  
•  Contact	
  your	
  account	
  representa;ve	
  to	
  determine	
  schedule	
  
availability	
  
•  Fully	
  managed,	
  cloud-­‐based	
  service	
  
•  Prac;ce	
  your	
  skills	
  24x7	
  –	
  just	
  like	
  the	
  aMackers	
  
•  Includes	
  all	
  four	
  scenarios	
  as	
  on-­‐demand	
  self-­‐paced	
  training	
  
•  Frequent	
  content	
  updates	
  
•  New	
  scenarios	
  added	
  to	
  address	
  evolving	
  threats	
  	
  
Thank	
  you!	
  
SYMANTEC	
  PROPRIETARY/CONFIDENTIAL	
  –	
  INTERNAL	
  USE	
  ONLY	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on.	
  All	
  rights	
  reserved.	
  
Michael	
  Garvin	
  
michael_garvin@symantec.com	
  
(919)	
  454-­‐9128	
  
Mul/-­‐Staged	
  A=ack	
  Campaigns	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
12	
  
1.	
  Reconnaissance	
  
A=acker	
  leverages	
  informa/on	
  from	
  a	
  variety	
  
of	
  factors	
  to	
  understand	
  their	
  target.	
  
	
  
2.	
  Incursion	
  
A=ackers	
  break	
  into	
  network	
  by	
  using	
  social	
  
engineering	
  to	
  deliver	
  targeted	
  malware	
  to	
  
vulnerable	
  systems	
  and	
  people.	
  
	
  
3.	
  Discovery	
  
Once	
  in,	
  the	
  a=ackers	
  stay	
  “low	
  and	
  slow”	
  to	
  avoid	
  
detec/on.	
  They	
  then	
  map	
  the	
  organiza/ons	
  
defenses	
  from	
  the	
  inside	
  and	
  create	
  a	
  ba=le	
  plan	
  
and	
  deploy	
  mul/ple	
  parallel	
  kill	
  chains	
  to	
  ensure	
  
success.	
  
	
  
Mul/-­‐Staged	
  A=ack	
  Campaigns	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
13	
  
4.	
  Capture	
  
A=ackers	
  access	
  unprotected	
  systems	
  and	
  
capture	
  informa/on	
  over	
  an	
  extended	
  period.	
  
They	
  may	
  also	
  install	
  malware	
  to	
  secretly	
  
acquire	
  data	
  or	
  disrupt	
  opera/ons	
  
	
  
5.	
  Exfiltra/on	
  
Captured	
  informa/on	
  is	
  sent	
  back	
  to	
  a=ack	
  
team’s	
  home	
  base	
  for	
  analysis	
  and	
  further	
  
exploita/on	
  fraud	
  –	
  or	
  worse.	
  
	
  
Your	
  Success	
  Can	
  Be	
  Measured.	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
14	
  
-­‐2	
  
3	
  
8	
  
13	
  
18	
  
23	
  
28	
  
33	
  
38	
  
43	
  
Total	
  Flag	
  Captures	
  per	
  Event	
  and	
  #	
  of	
  Hints	
  used	
  
Total	
  Cap	
  
Hints	
  Used	
  
Security	
  Simula/on:	
  Soiware	
  as	
  a	
  Service	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
15	
  
•  On	
  demand,	
  managed	
  SaaS	
  offering	
  
•  Hands-­‐on,	
  completely	
  browser-­‐based	
  
•  Role-­‐based	
  views	
  /	
  scenarios	
  
•  Scoring	
  and	
  repor;ng	
  
•  Launching	
  1H	
  CY15	
  
Security	
  Simula/on	
  Exercise	
  
What	
  do	
  they	
  want,	
  and	
  how	
  will	
  they	
  try	
  to	
  get	
  it?	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
16	
  
•  On	
  demand,	
  managed	
  
SaaS	
  offering	
  
•  Hands-­‐on,	
  completely	
  
browser-­‐based	
  
•  Role-­‐based	
  views	
  /	
  
scenarios	
  
•  Scoring	
  and	
  repor/ng	
  
•  Launching	
  1H	
  CY15	
  
Guided	
  Simula/on	
  
Assess	
  and	
  Advance	
  Your	
  Team	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora;on	
  
17	
  
Assessment	
  
•  Iden/fy	
  Skills	
  Requirements	
  for	
  Individuals	
  and	
  Organiza/ons	
  
•  Structure	
  Appropriate	
  Cyclical	
  Programs	
  for	
  Ongoing	
  Learning	
  
Training	
  
•  Classroom	
  and	
  Online	
  Training	
  Op/ons	
  
•  Integra/on	
  into	
  SSP	
  for	
  Objec/ve	
  based	
  Skills	
  Development	
  	
  
in	
  an	
  Exercise	
  
•  Focused	
  on	
  security	
  strategy	
  and	
  tac/cs,	
  techniques,	
  	
  
and	
  procedures	
  (TTP)	
  
Evalua/on/Performance	
  
•  Manual	
  and	
  Automated	
  Skills	
  Assessment	
  /	
  
Performance	
  Analysis	
  
•  Prescrip/ve	
  guidance	
  for	
  exper/se	
  and	
  skill	
  set	
  
development	
  	
  

Mais conteúdo relacionado

Mais procurados

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAJorge Sebastiao
 
Building an application security program
Building an application security programBuilding an application security program
Building an application security programOutpost24
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...Shah Sheikh
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mrISSA LA
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber EssentialsJisc
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceIBM Security
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on VehiclesPriyanka Aash
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDonald Tabone
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...North Texas Chapter of the ISSA
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsIBM Security
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Sirius
 

Mais procurados (20)

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
IDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSAIDC Cloud Security and Managed Services Conference Riyadh KSA
IDC Cloud Security and Managed Services Conference Riyadh KSA
 
Building an application security program
Building an application security programBuilding an application security program
Building an application security program
 
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
National Oil Company Conference 2014 - Evolving Cyber Security - A Wake Up Ca...
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive Defense
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
 
An introduction to Cyber Essentials
An introduction to Cyber EssentialsAn introduction to Cyber Essentials
An introduction to Cyber Essentials
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Dealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber ResilienceDealing with Information Security, Risk Management & Cyber Resilience
Dealing with Information Security, Risk Management & Cyber Resilience
 
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
Luncheon 2015-06-18 Security Industry 2.0: Survival in the Boardroom by David...
 
Extend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPsExtend Your Market Reach with IBM Security QRadar for MSPs
Extend Your Market Reach with IBM Security QRadar for MSPs
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 

Destaque

Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security pptLipsita Behera
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentationBijay Bhandari
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.pptAeman Khan
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTHAwais Shibli
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansMaurice Dawson
 
Cyber security
Cyber securityCyber security
Cyber securitySiblu28
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime pptMOE515253
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refinedWan Solo
 
Cyber security cgi moving forward
Cyber security cgi  moving forwardCyber security cgi  moving forward
Cyber security cgi moving forwardNils Thulin
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyFiroze Hussain
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Simon Salter
 
Digital strategy - security
Digital strategy - securityDigital strategy - security
Digital strategy - securityNansje
 
Funny miss la sen hand sketching
Funny miss la sen hand sketchingFunny miss la sen hand sketching
Funny miss la sen hand sketchingMiss La Sen house
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC Advisory Group
 
Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?honeywellgf
 

Destaque (20)

Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Cyber crime and security ppt
Cyber crime and security pptCyber crime and security ppt
Cyber crime and security ppt
 
Cyber security presentation
Cyber security presentationCyber security presentation
Cyber security presentation
 
Cybercrime.ppt
Cybercrime.pptCybercrime.ppt
Cybercrime.ppt
 
Cyber Security_Presentation_KTH
Cyber Security_Presentation_KTHCyber Security_Presentation_KTH
Cyber Security_Presentation_KTH
 
NACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New OrleansNACCTFO Cyber Security Presentation 2014 New Orleans
NACCTFO Cyber Security Presentation 2014 New Orleans
 
IBM Security Portfolio - 2015
IBM Security Portfolio - 2015IBM Security Portfolio - 2015
IBM Security Portfolio - 2015
 
Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security and emails presentation refined
Cyber security and emails presentation refinedCyber security and emails presentation refined
Cyber security and emails presentation refined
 
Cyber security cgi moving forward
Cyber security cgi  moving forwardCyber security cgi  moving forward
Cyber security cgi moving forward
 
How to beat ransomware
How to beat ransomwareHow to beat ransomware
How to beat ransomware
 
NESA on Steroids
NESA on SteroidsNESA on Steroids
NESA on Steroids
 
Cyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th JulyCyber Security Isaca Bglr Presentation 24th July
Cyber Security Isaca Bglr Presentation 24th July
 
Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me" Cyber Security Presentation "It Will Never Happen To Me"
Cyber Security Presentation "It Will Never Happen To Me"
 
Digital strategy - security
Digital strategy - securityDigital strategy - security
Digital strategy - security
 
Funny miss la sen hand sketching
Funny miss la sen hand sketchingFunny miss la sen hand sketching
Funny miss la sen hand sketching
 
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
ARC's Bob Mick Cyber Security Presentation @ ARC Industry Forum 2010
 
Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?Industrial Cyber Security: What is Application Whitelisting?
Industrial Cyber Security: What is Application Whitelisting?
 

Semelhante a PRESENTATION▶ Cyber Security Services (CSS): Security Simulation

For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfJustinBrown267905
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales PlayIftikhar Ali Iqbal
 
Selling Infosec to the CSuite
Selling Infosec to the CSuiteSelling Infosec to the CSuite
Selling Infosec to the CSuiteDave R. Taylor
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Businessaccenture
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteSurfWatch Labs
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Net at Work
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight BackMTG IT Professionals
 
SplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis PerkinsSplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis PerkinsSplunk
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Splunk
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project 99X Technology
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'aFahmi Albaheth
 
Beating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWSBeating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWSAmazon Web Services
 
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...Splunk
 

Semelhante a PRESENTATION▶ Cyber Security Services (CSS): Security Simulation (20)

For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdfFor Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
 
Symantec Portfolio - Sales Play
Symantec Portfolio - Sales PlaySymantec Portfolio - Sales Play
Symantec Portfolio - Sales Play
 
Selling Infosec to the CSuite
Selling Infosec to the CSuiteSelling Infosec to the CSuite
Selling Infosec to the CSuite
 
Intelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital BusinessIntelligent Security: Defending the Digital Business
Intelligent Security: Defending the Digital Business
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
How to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-SuiteHow to Raise Cyber Risk Awareness and Management to the C-Suite
How to Raise Cyber Risk Awareness and Management to the C-Suite
 
Resume - Varsharani
Resume - VarsharaniResume - Varsharani
Resume - Varsharani
 
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
Information Security Risks - What You Can Do To Help Your Clients Avoid Costl...
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
SplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis PerkinsSplunkLive! London 2017 - Travis Perkins
SplunkLive! London 2017 - Travis Perkins
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
 
How to develop an AppSec culture in your project
How to develop an AppSec culture in your project How to develop an AppSec culture in your project
How to develop an AppSec culture in your project
 
Building an AppSec Culture
Building an AppSec Culture Building an AppSec Culture
Building an AppSec Culture
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
New technologies - Amer Haza'a
New technologies - Amer Haza'aNew technologies - Amer Haza'a
New technologies - Amer Haza'a
 
Beating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWSBeating Sophisticated Attackers at Their Game Using AWS
Beating Sophisticated Attackers at Their Game Using AWS
 
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
SplunkLive! Paris 2018: Use Splunk for Incident Response, Orchestration and A...
 

Mais de Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mais de Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Último

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Último (20)

Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

PRESENTATION▶ Cyber Security Services (CSS): Security Simulation

  • 1. Cyber  Security  Simula/on   Michael  Garvin   Senior  Manager,  Product  Management  
  • 2. Security  Organiza/ons  are  Figh/ng  an  Asymmetric  Ba=le   Copyright  ©  2015  Symantec  Corpora;on   2   Cybersecurity  top  IT   skills  shortage  for  4th   year  in  a  row*   Staff  unproven—lack   of  hands-­‐on   experience  with  a   breach     Organiza;ons  are   never  certain  of     cyber-­‐readiness     Seemingly  limitless   resources   Sophis;cated,  mul;-­‐ stage  aMacks   AMacker  tac;cs   constantly  morphing   •  *  ESG’s  annual  global  IT  Spending  Inten6ons  survey  has  shown  a  ’problema6c  shortage’  of  cybersecurity  experts  as  the  top  IT  skills  shortage  for  four  years  in  a  row.       •  hBp://www.esg-­‐global.com/research-­‐reports/2015-­‐it-­‐spending-­‐inten6ons-­‐survey/  
  • 3. Security  Simula/on  Strengthens  Cyber  Readiness   •  Cloud-­‐based,  virtual  training  experience   •  Live-­‐fire  simula;on  of  mul;-­‐staged,   advanced  targeted  aMack  scenarios   •  Players  assume  the  iden;ty  of  their   adversaries  to  learn  mo;ves,  tac;cs  and   tools   Engaging,  immersive  security  training  through  gamifica/on     Copyright  ©  2015  Symantec  Corpora;on   3  
  • 4. Simula/on  Concept  Tested  and  Proven  Worldwide   Copyright  ©  2015  Symantec  Corpora;on   4   Annual  company-­‐wide   war  games   A  culture  of    Educa/on,   Innova/on  and  Passion   Currently  ac/ve  in  30+   countries   Now  in  4th  Year  of  Ac/ve   Deployment   80+  Cyber  Readiness  events  worldwide   Focused  on  Security  Awareness     and  thought  leadership   Global  customer  &  partner  events   Largest  event  -­‐  1500  registrants   Largest  compe//on  -­‐  400  teams  
  • 5. Innova/on  Model  for  Achieving  Cyber  Readiness   Copyright  ©  2015  Symantec  Corpora;on   5   •  Cloud-­‐based,  virtual  training  experience  simulates  mul;-­‐staged   aMack  scenarios  allowing    players  to  take  on  the  iden;fy  of  their   adversaries     •  Gamifica;on  provides  a  more  engaging,  immersive  educa;onal   experience     •  Frequent  content  updates  ensure  team  stays  current  on  latest   adversaries,  mo;ves  and  techniques   •  Scenarios  impart  knowledge  gleaned  from  Symantec  security   experts,  threat  analysis  and  current  threat  landscape   THINK  LIKE  AN  ATTACKER   •  Leaders  and  par;cipants  receive  in-­‐depth  security  skill   assessments   •  Provides  structured  recommenda;ons  for  cybersecurity  skill   development   •  Iden;fy  gaps  in  team  coverage  and  assess  skills  of  new-­‐hire   candidates   ASSESS  AND  ADVANCE     YOUR  TEAM   Security  Simula;on  strengthens  cyber-­‐readiness  through  live-­‐fire  simula;on  of  today’s  most   sophis;cated  advanced  targeted  aMacks  
  • 6. Think  Like  Your  A=acker   Copyright  ©  2015  Symantec  Corpora;on   6   Hack/vist   wants  notoriety,  a=en/on   Cyber  Criminal   mo/vated  by  money   Cyber  Espionage   seeking  Intellectual   Property  for  profit     Cyber  War  Crimes   poli/cally  mo/vated,     na/on  states,     looking  to  gain  advantage     What   They’re   Trying  to   Steal   How  They     Stole  It   The   A=acker   Reconnaissance   Incursion   Discovery   Capture   Exfiltra/on  
  • 7. Real-­‐world  A=ack  Scenarios   Copyright  ©  2015  Symantec  Corpora;on   7   Scenario  1:   The  EDC  and  RKI     Scenario  2:   The  Coffee  Shop  Hack     Scenario  3:   EDC  and  the  Lost  Laptop     Scenario  4:   Forensics  Examiner     Mishandles  Evidence       Skills:   •  Ethical  hacking   •  Penetra;on  Tes;ng   •  Forensics     •  Data  exfiltra;on   Methods:   •  Iden;fy  targets     •  Compromise  network  and   systems   •  Blend  aMacks     •  Exfiltrate  data     Mission:  Breach  &  Steal  Informa/on  
  • 8. Scenario   Storyboard   Scenario   Map   Target  &   Content  Crea/on   QA   Tes/ng   Scenarios  and  Content  Updated  as  New  A=ackers  and  Techniques  Emerge   Copyright  ©  2015  Symantec  Corpora;on   8   Symantec  Security  Experience   Global  Threat  Intelligence   Real  World  A=acks   Refine  Content  Customer  Feedback  Deploy  Scenario  
  • 9. Implement  Skill  Assessment   and  Development  Programs   Iden/fy  Organiza/onal  Gaps   Assess  and  Advance  Your  Team   Copyright  ©  2015  Symantec  Corpora;on   9   •  Iden;fy  skills  requirements  for   individuals  and  organiza;ons   •  Iden;fy  gaps  in  team  coverage   •  Assess  skills  of  poten;al  job   candidates,  new  hires  and  exis;ng   employees   •  Focus  on  security  strategy  and   tac;cs,  techniques     and  procedures  (TTP)   •  Manual  and  automated  skills   assessment  and  performance   analysis   •  Prescrip;ve  guidance  for  skill  set   development     •  Conduct  itera;ve  skill   development  programs  for   con;nuous  learning   Par/cipate   Assess  skills   Create   development   plan   Par/cipate  /   Learn   Assess   Progress  
  • 10. Two  Delivery  Op/ons     Copyright  ©  2015  Symantec  Corpora;on   10   Security  Simula/on   Yearly  Subscrip/on   Security  Simula/on  Exercise   One-­‐/me  Workshop   Personalize  to  organiza;onal  objec;ves   Delivery  Op;ons:     •  Delivered  either  Onsite  or  Online   •  Facilitated  or  Self-­‐directed   •  One  or  Mul;-­‐day   •  Contact  your  account  representa;ve  to  determine  schedule   availability   •  Fully  managed,  cloud-­‐based  service   •  Prac;ce  your  skills  24x7  –  just  like  the  aMackers   •  Includes  all  four  scenarios  as  on-­‐demand  self-­‐paced  training   •  Frequent  content  updates   •  New  scenarios  added  to  address  evolving  threats    
  • 11. Thank  you!   SYMANTEC  PROPRIETARY/CONFIDENTIAL  –  INTERNAL  USE  ONLY   Copyright  ©  2015  Symantec  Corpora;on.  All  rights  reserved.   Michael  Garvin   michael_garvin@symantec.com   (919)  454-­‐9128  
  • 12. Mul/-­‐Staged  A=ack  Campaigns   Copyright  ©  2015  Symantec  Corpora;on   12   1.  Reconnaissance   A=acker  leverages  informa/on  from  a  variety   of  factors  to  understand  their  target.     2.  Incursion   A=ackers  break  into  network  by  using  social   engineering  to  deliver  targeted  malware  to   vulnerable  systems  and  people.     3.  Discovery   Once  in,  the  a=ackers  stay  “low  and  slow”  to  avoid   detec/on.  They  then  map  the  organiza/ons   defenses  from  the  inside  and  create  a  ba=le  plan   and  deploy  mul/ple  parallel  kill  chains  to  ensure   success.    
  • 13. Mul/-­‐Staged  A=ack  Campaigns   Copyright  ©  2015  Symantec  Corpora;on   13   4.  Capture   A=ackers  access  unprotected  systems  and   capture  informa/on  over  an  extended  period.   They  may  also  install  malware  to  secretly   acquire  data  or  disrupt  opera/ons     5.  Exfiltra/on   Captured  informa/on  is  sent  back  to  a=ack   team’s  home  base  for  analysis  and  further   exploita/on  fraud  –  or  worse.    
  • 14. Your  Success  Can  Be  Measured.   Copyright  ©  2015  Symantec  Corpora;on   14   -­‐2   3   8   13   18   23   28   33   38   43   Total  Flag  Captures  per  Event  and  #  of  Hints  used   Total  Cap   Hints  Used  
  • 15. Security  Simula/on:  Soiware  as  a  Service   Copyright  ©  2015  Symantec  Corpora;on   15   •  On  demand,  managed  SaaS  offering   •  Hands-­‐on,  completely  browser-­‐based   •  Role-­‐based  views  /  scenarios   •  Scoring  and  repor;ng   •  Launching  1H  CY15  
  • 16. Security  Simula/on  Exercise   What  do  they  want,  and  how  will  they  try  to  get  it?   Copyright  ©  2015  Symantec  Corpora;on   16   •  On  demand,  managed   SaaS  offering   •  Hands-­‐on,  completely   browser-­‐based   •  Role-­‐based  views  /   scenarios   •  Scoring  and  repor/ng   •  Launching  1H  CY15   Guided  Simula/on  
  • 17. Assess  and  Advance  Your  Team   Copyright  ©  2015  Symantec  Corpora;on   17   Assessment   •  Iden/fy  Skills  Requirements  for  Individuals  and  Organiza/ons   •  Structure  Appropriate  Cyclical  Programs  for  Ongoing  Learning   Training   •  Classroom  and  Online  Training  Op/ons   •  Integra/on  into  SSP  for  Objec/ve  based  Skills  Development     in  an  Exercise   •  Focused  on  security  strategy  and  tac/cs,  techniques,     and  procedures  (TTP)   Evalua/on/Performance   •  Manual  and  Automated  Skills  Assessment  /   Performance  Analysis   •  Prescrip/ve  guidance  for  exper/se  and  skill  set   development