Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Agenda.
1. Cyber Fraud 2. Advanced Persistent Threats (APTs) 3. APT Mitigation Strategy
Cybercrime Industry
Malware designed to infiltrate a network, identify vulnerabilities, and obtain sensitive information Data continues to be the #1 target
Response to the threat landscape evolved as Americans began to understand their risk
FBI
NSA
CIA
OR
ARE YOU PREPARED FOR THE NEW BREED OF ATTACKS KNOWN AS APTS?
83%
65%
of organizations dont believe they have sufficient resources to prevent Advanced Threats
Source: Ponemon Institute Survey titled The Growing Risk of Advanced Threats
99%
of breaches led to data compromise within days or less
85%
of breaches took weeks or more to discover
Source: Verizon 2012 Data Breach Investigations Report
Characteristics
of an APT
Group of People Intent and Capability Persistent and Adaptive (cover their tracks) Targeted and not Accidental
Drive-by download
John clicks on the link and gets infected by Trojan from drive-by download.
Johns machine
3
RDP
PASSWORD
Johns machine
Critical Server
Build Trust in Your Defense by Investing in Protection that Aligns with Your Vulnerability
Monitoring 33%
Be Prepared.
Test your defenses because you will be tested Breach Readiness Assessments People, Process and Technology Run breach drills similar to fire drills Goal of drills should be to improve detection time Technology solutions leveraging big data analytics work well
Key Takeaways
Understand your organizations value and your role in its protection APTs are real and the latest elements of cyber fraud Invest in your reputation and brand Be Prepared breach readiness
QUESTIONS?
THANK YOU