Beyond Cyber Securit ity
Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers
Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers
Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers
Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers
Dangerous Toys USB Device Impersonators USB Killers Man in the Middle Faceplates Wireless Pineapples Payload Phone Chargers
https:/ ://censys.io
https:/ ://shodan.io
https:/ ://shodan.io In Internet of f Medical Thin ings
https:/ ://shodan.io In Internet of f Medical Thin ings
https:/ ://shodan.io In Internet of f Medical Thin ings
https://haveibeenpwned.c .com
http://informationisbeautifu ful.net
http://informationisbeautifu ful.net
The Song Remains The Same • Defense in depth failures Since 1984 and still not effective • Average separate security solutions 40+ (30% feel right number) • Time to discover Breaches 200 Days • Time to respond to Incidents 56 Days • Cost of a breach $3.9 Million
Organized Threat Actors State Sponsored Actors Sophisticated Talent Anonymous Digital Currencies Highly Funded R&D Collaborative Development Circumventive Tooling Crowd-sourced information sharing
Threats Du Jour
Train ining Exercises
Who are High Performers? Confidence Represent 26% of the 3655 in the study Dedication Highest level of cyber resilience Communication Skills More prepared to respond Industry Less impacted by cyber threats. Awareness Report less attacks, better containment and recovery Streamlined SOC Ponemon Institute Presentation Private and Confidential 21
Threat Hunting Workflow Cognitive Advanced Analytics INVESTIGATE DETECT ENRICH ORCHESTRATE Incident Response
User Behavior
Local Analysis Investigations IBM CONFIDENTIAL until January 2017
AI Enriched Analysis Investigations IBM CONFIDENTIAL until January 2017
AI Deep Insight Investigations IBM CONFIDENTIAL until January 2017
What is an Unknown Unknown Search Offense Offense Property Property b i Offense Offense Offense Property Property Property a h c Offense Offense Offense Property 1 2 d Offense Property f Offense Offense Property Property Ask the question: “show me which g e offenses share the same property” – you don’t know the subset of offenses, not the subset of properties to search
Investigative Correlations Investigations IBM CONFIDENTIAL until January 2017
Threat Hunting
I ncident Manual In Incident R esponse Response Plans P latforms
In Integrated and In Intelligent Controls
Beyond Cyber Security
Recommend
More recommend