ICA Emerging Threat Example: Power Station Subcontractor • Energy firm with confidential information • Subcontractor transferred information to a home router • Information related to cabling and backups at one of the company’s power stations, and projects for tender • Detected as anomalous – abnormal data transfers
ICA Emerging Threat Example: Insider @ Italian Bank • Large-scale exfiltration of sensitive data from an Italian bank • Legitimate user credentials used to send confidential files via Facebook • Anomalous behavior detected within three minutes
ICA Cyber Intelligence – The Immune Technology Model Set Expectations 100% visibility, not 100% security. Innoculate against internal threats while they germinate –before they spread Embrace Technology & Automation People will never be fast enough, every time. Intelligent automation of detection and response will be critical in new era of fast-moving threats Enable People Use machine learning to enhance the value of your greatest assets – your people
ICA New Era of Cyber Threat: Machine-on-Machine Attacks • Attacks where algorithms are fighting other algorithms • The battle to protect the border is over • The real struggle has now moved inside our corporate networks • No security team – however large or skilled – can keep up with the speed of today’s threats
ICA Key Conclusions • Machine learning at the heart of new defense • The battlefield is now inside corporate networks • Rules and signatures are not enough • No security team, no matter how large, is fast enough to keep up with the new era of machine threats! • Immune system technology is able to adapt at the same speed as threats, and the same speed as your organization • Immune System Technology constitutes a fundamental new approach
Thank You! Japan@Darktrace.com
Recommend
More recommend