SlideShare a Scribd company logo
1 of 33
HOW TO ENJOY EXPERT 24/7 THIRD PARTY
MONITORING FOR LESS THAN $300 PER MONTH
Scott B. Suhy, CEO
Scott.Suhy@netwatcher.com
®
Agenda
Copyright © 2017 NetWatcher All Rights Reserved.
• Trends your Financial Institution needs to understand
• A new trend “Managed Detection & Response”
• NetWatcher’s Managed Detection & Response service
3/30/2017
Copyright © 2017 NetWatcher All Rights Reserved.
The Gramm–Leach–Bliley Act – (for details 6801–6809) requires financial
institutions to explain their information-sharing practices to their customers
and to safeguard sensitive data. The Act contains three elements (Privacy
Rule, Safeguards Rule and Pretexting Protection) regarding the privacy of
information, of which businesses, primarily "financial institutions," need to
be aware – (More from the FTC on complying with the Safeguards Rule).
The Safeguards Rule requires an institution to develop, implement, and
maintain a comprehensive information security program that is written,
contains administrative, technical and physical safeguards, is “appropriate” to
the institution’s size and complexity, as well as the nature and scope of its
activities, and is appropriate to the sensitivity of the customer information at
issue.
Managed Security Providers
Security is the #1 Growth area for Managed Services Providers (MSPs)—CompTIA
5kopportunities
HP
IBM
FireEye
Palo Alto
Etc…
Security
Sophistication
Small Medium Large
Size of Business
Threat Intelligence
SIEM
End Point Technology
Intrusion Detection
Intrusion Protection
…big gap…
Firewall
Anti-virus
Customer demands
and compliance mandates
15kopportunities
MSSPs
Copyright © 2017 NetWatcher All Rights Reserved.
Trend #1 – SME’s Pressured to Have More Protection
Managed Security Providers
Security is the #1 Growth area for Managed Services Providers (MSPs)—CompTIA
5kopportunities
HP
IBM
FireEye
Palo Alto
Etc…
Security
Sophistication
Small Medium Large
Size of Business
Threat Intelligence
SIEM
End Point Technology
Intrusion Detection
Intrusion Protection
…big gap…
Firewall
Anti-virus
Solutions expensive
difficult to use
security analysts don’t exist
15kopportunities
MSSPs
Copyright © 2017 NetWatcher All Rights Reserved.
Trend #1 – SME’s Pressured to Have More Protection
Managed Security Providers
Security is the #1 Growth area for Managed Services Providers (MSPs)—CompTIA
5kOrganizations
HP
IBM
FireEye
Palo Alto
Etc…
Security
Sophistication
Small Medium Large
Size of Business
Threat Intelligence
SIEM
End Point Technology
Intrusion Detection
Intrusion Protection
…big gap…
Firewall
Anti-virus
Solutions expensive
difficult to use
security analysts don’t exist
Customer demands
and compliance mandates 15kOrganizations
MSSPs
5M+Organizations
Copyright © 2017 NetWatcher All Rights Reserved.
Trend #1 – SME’s Pressured to Have More Protection
Trend #2 – Giant Skills Gap in Cyber Security
Copyright © 2017 NetWatcher All Rights Reserved.
shortfall of
1.5 million
security
professionals
by 2020 –
Frost &
Sullivan
Trend #3 - Known Vulnerabilities
Copyright © 2017 NetWatcher All Rights Reserved.
44% of breaches came from vulnerabilities that are two to
four years old… -- HP’s Cyber Risk Report
http://www.cvedetails.com/vulnerability-list
Think about it… Organized crime and foreign government employees are….
Trend #4 – Ransomware – as - service
.
Copyright © 2017 NetWatcher All Rights Reserved.
TrueCrypter (late April)
CryptXXX (mid April)
7ev3n-HONE$T (mid April)
AutoLocky (mid April)
Jigsaw (early April)
CryptoHost (early April)
Rokku (late March)
KimcilWare (late March)
Coverton (late March)
Petya (late March)
Maktub Locker (mid March)
Nemucod .CRYPTED (mid March)
Samas/Kazi (mid March)
The Surprise (mid March)
Pompous (early March)
KeRanger (early March)
Cerber (early March)
CTB-Locker for web sites (mid February)
Padcrypt (mid February)
Locky (mid February)
Umbrecrypt (early February)
DMA Locker (early February)
NanoLocker (late January)
7ev3n (late January)
LeChiffre (mid January)
Magic (mid January)
CryptoJoker (early January)
Ransom32 (early January)
Trend #4 – Ransomware – as - service
.
Copyright © 2017 NetWatcher All Rights Reserved.
TrueCrypter (late April)
CryptXXX (mid April)
7ev3n-HONE$T (mid April)
AutoLocky (mid April)
Jigsaw (early April)
CryptoHost (early April)
Rokku (late March)
KimcilWare (late March)
Coverton (late March)
Petya (late March)
Maktub Locker (mid March)
Nemucod .CRYPTED (mid March)
Samas/Kazi (mid March)
The Surprise (mid March)
Pompous (early March)
KeRanger (early March)
Cerber (early March)
CTB-Locker for web sites (mid February)
Padcrypt (mid February)
Locky (mid February)
Umbrecrypt (early February)
DMA Locker (early February)
NanoLocker (late January)
7ev3n (late January)
LeChiffre (mid January)
Magic (mid January)
CryptoJoker (early January)
Ransom32 (early January)
Trend #5 - Unintentional Insider Threat
Copyright © 2017 NetWatcher All Rights Reserved.
Clicking on a Phishing
Message
Browsing Explicit Web Sites
Downloading Risky
Software (TOR, Hola,
BitTorrent etc..)
Using Vulnerable Software
(outdated Java and Flash)
Sending Personally
Identifiable Information in
Clear Text
Trend #5 - Unintentional Insider Threat
Copyright © 2017 NetWatcher All Rights Reserved.
Clicking on a Phishing
Message
Browsing Explicit Web Sites
Downloading Risky
Software (TOR, Hola,
BitTorrent etc..)
Using Vulnerable Software
(outdated Java and Flash)
Sending Personally
Identifiable Information in
Clear Text
Trend #6 - Supply Chain Risk
Copyright © 2017 NetWatcher All Rights Reserved.
Do you have customer data?
Do you provide your customers data to third party vendors?
Do you provide your data to third party vendors?
“It is abundantly clear that, in many respects,” Mr. Lawsky (New York State’s top financial
regulator) said in the letter, “a firm’s level of cybersecurity is only as good as the security of its
vendors.” -- NYTimes.com: After JPMorgan Cyberattack, a Push to Fortify Wall Street Banks
Think “Business Associate Agreement/HIPAA” – Your customers are going to be expecting you to
have great Cyber Security Controls. You should expect the same of your suppliers…
Trend #7 - Open Source
Copyright © 2017 NetWatcher All Rights Reserved.
• Doh! Shellshock…
Heartbleed… POODLE…
• Duh! They have the
source code…
• What is managing the
BOM in the solutions
built on Open Source?
Trend #7 - Open Source
Copyright © 2017 NetWatcher All Rights Reserved.
• Doh! Shellshock…
Heartbleed… POODLE…
• Duh! They have the
source code…
• What is managing the
BOM in the solutions
built on Open Source?
FACT – Your Customer’s are Weak on Cyber Security
Copyright © 2017 NetWatcher All Rights Reserved.
 Generally no security controls (users
have admin access to machines, weak
employee policy documents, no cyber
training, no cyber liability insurance,
sr. execs not schooled on the risks
etc…)
 Most are not aware that they have
already been compromised!
 Don’t keep firmware up to date on
WIFI, Routers, Switches, Firewalls
 Many do not change Default
Passwords on equipment (see
Shodan.io)
 Most don’t know who their employees
are talking to and what bad actor
scans are making it through the
firewall
FACT – Your Customer’s are Weak on Cyber Security
Copyright © 2017 NetWatcher All Rights Reserved.
 Generally no security controls (users
have admin access to machines, weak
employee policy documents, no cyber
training, no cyber liability insurance,
sr. execs not schooled on the risks
etc…)
 Most are not aware that they have
already been compromised!
 Don’t keep firmware up to date on
WIFI, Routers, Switches, Firewalls
 Many do not change Default
Passwords on equipment (see
Shodan.io)
 Most don’t know who their employees
are talking to and what bad actor
scans are making it through the
firewall
Copyright © 2017 NetWatcher All Rights Reserved.
Example… Your 12 year old can do this…
Copyright © 2017 NetWatcher All Rights Reserved.
Example… Your 12 year old can do this…
Copyright © 2017 NetWatcher All Rights Reserved.
Example… Your 12 year old can do this…
Click Here…
Copyright © 2017 NetWatcher All Rights Reserved.
Example… Your 12 year old can do this…
Copyright © 2017 NetWatcher All Rights Reserved.
Example… Your 12 year old can do this…
Will it Get Worse? Or Better?
Copyright © 2017 NetWatcher All Rights Reserved.
2005 2015 2020
CyberAttackSurface
InvolvementofOrganizedCrime&NationStates
More
Protection
More
Innovation
Desire for
Privacy
More
Surface to
Attack
More
Organized
Crime
Convenience
What is Managed Detection & Response (MDR)
www.netwatcher.com
• Automated “Detection” to find issues 24x7 (Alarms) in concert with Threat
Hunting across broad customer base
• Cloud based correlation of events over different silo’s of information
over time
• Alerting, MSP integration, Analyst availability, “Response” Automation
• Focused inside Perimeter versus Edge
• Focused on what makes it through the traditional line of defense versus
replacing traditional line of defense
Where NetWatcher’s MDR Service Fits
24x7 Continuous Monitoring for Exploits & Vulnerabilities
www.netwatcher.com
End Point Protection IPS/UTM/Firewall
Keeps bad guy from
Coming through the
Front door…
NetWatcher
Continuous Monitoring
Keeps employees from
Letting bad guy through the
Front door…
NetWatcher Service Delivery.
www.netwatcher.com
Sensor(s) (hardware or VM) that sits on the inside of
customers network and listens for anomalies…
(IDS, Netflow, SIEM, Scanner)
Endpoint software (HIDS, Logs, Sensor-in-Cloud VPN/IDS)
“Cloud based” Service that sends you necessary alerts
when a serious security issue is discovered. (Advanced
correlation)
Security Analysts in Secure Operations Center (SOC)
Why NetWatcher?.
www.netwatcher.com
What is your
Cyber Promiscuity Score™?
Automation Hunting for exploits & malware hidden in infected
computers, phones or tablets etc...
Cyber Promiscuity issues (sometimes referred to as
unintentional insider threats) that can lead to
security problems such as your employees visiting
compromised websites, out of date software or
Personally Identifiable Information (PII) being sent
over the internet in clear text.

 Change the users behavior!
SMB Requirements
www.netwatcher.com
Accuracy
 Multi-tenant cloud
Ease of installation
 Plug it in and it works
Easy to Use
 CPortal design, easy to understand alarms, CHS/CPS scores
 Alarms sent via Text & eMail
 Sensor in the Cloud endpoint module
MSP Friendly
 Single Pane of Glass MSP Portal
 ConnectWise integration
Affordable
 Easy to understand pricing
DEMO
www.netwatcher.com
Don’t
Become
One of
These…
www.netwatcher.com
http://privacyrights.org/data-breach
www.netwatcher.com
NetWatcher is committed to Financ
www.netwatcher.com
NetWatcher is committed to Financ
• NCUA Cyber Resources site (found here)
• FFIEC Cyber Assessment Tool (found here)
• Conference of State Bank Supervisors Executive Leadership of Cybersecurity Resource Guide
(found here)
• The FDIC Community Bank Cyber Exercise (found here) – Created to encourage community financial
institutions to discuss operational risk issues and the potential impact of information technology
disruptions on common banking functions.
• FFIEC Handbook’s Section on Information Security (found here)
• FDIC Framework for Cybersecurity (found here) - The article addresses some common cyber-attack
strategies, the critical components of information security programs (corporate governance, threat
intelligence, security awareness training, and patch-management programs), and actions taken by
federal bank regulators to respond to cybersecurity threats. The article stresses that everyone within a
financial institution, from entry-level staff to the board of directors, is responsible for prioritizing
cybersecurity. The article includes information about several resources available to help educate and
inform employees and directors on cybersecurity.
• NIST Cyber Security Framework (found here)
Thank You!
To Contact Us:
lauren.sexton@netwatcher.com
571.308.3661
www.netwatcher.com
Scott B. Suhy, CEO
Scott.Suhy@netwatcher.com

More Related Content

What's hot

Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesAlex Rudie
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsUlf Mattsson
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?PECB
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber AttackShawn Tuma
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Software
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and riskEY
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsNowSecure
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - CybersecurityAbhilashYadav14
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Dr. Ahmed Al Zaidy
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsUlf Mattsson
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better CybersecurityShawn Tuma
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...NowSecure
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Knowjxyz
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...PECB
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty VisualizationDoug Cogswell
 

What's hot (20)

Cybersecurity Risks for Businesses
Cybersecurity Risks for BusinessesCybersecurity Risks for Businesses
Cybersecurity Risks for Businesses
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Recovering from a Cyber Attack
Recovering from a Cyber AttackRecovering from a Cyber Attack
Recovering from a Cyber Attack
 
Laser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, EntredaLaser App Conference 2017 - Sid Yenamandra, Entreda
Laser App Conference 2017 - Sid Yenamandra, Entreda
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Cybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar AssociationsCybersecurity Fundamentals for Bar Associations
Cybersecurity Fundamentals for Bar Associations
 
Cyber security
Cyber securityCyber security
Cyber security
 
Summer internship - Cybersecurity
Summer internship - CybersecuritySummer internship - Cybersecurity
Summer internship - Cybersecurity
 
Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9Fundamentals of Information Systems Security Chapter 9
Fundamentals of Information Systems Security Chapter 9
 
Cyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & RecommendationsCyber Risk Management in 2017 - Challenges & Recommendations
Cyber Risk Management in 2017 - Challenges & Recommendations
 
Contracting for Better Cybersecurity
Contracting for Better CybersecurityContracting for Better Cybersecurity
Contracting for Better Cybersecurity
 
Cyber Security for Financial Institutions
Cyber Security for Financial InstitutionsCyber Security for Financial Institutions
Cyber Security for Financial Institutions
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
 
Cybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already KnowCybersecurity: How to Use What We Already Know
Cybersecurity: How to Use What We Already Know
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
The State of Ransomware 2020
The State of Ransomware 2020The State of Ransomware 2020
The State of Ransomware 2020
 
Cyber Secuirty Visualization
Cyber Secuirty VisualizationCyber Secuirty Visualization
Cyber Secuirty Visualization
 

Viewers also liked

Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end usersNetWatcher
 
Soaring through the Clouds –Live Demo of Setting a World Record in Integratin...
Soaring through the Clouds –Live Demo of Setting a World Record in Integratin...Soaring through the Clouds –Live Demo of Setting a World Record in Integratin...
Soaring through the Clouds –Live Demo of Setting a World Record in Integratin...Lucas Jellema
 
Dontdrinkanddriventsipic
DontdrinkanddriventsipicDontdrinkanddriventsipic
Dontdrinkanddriventsipicntsicorp
 
After tests marzo 2017: Pruebas de Integración Automatizadas con Docker
After tests marzo 2017: Pruebas de Integración Automatizadas con DockerAfter tests marzo 2017: Pruebas de Integración Automatizadas con Docker
After tests marzo 2017: Pruebas de Integración Automatizadas con DockerFernando Llaca Romero
 
Caps & robbers louis sihler
Caps & robbers louis sihler Caps & robbers louis sihler
Caps & robbers louis sihler Louis Sihler
 
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...Pablo Carrillo
 
Message to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MITMessage to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MITDavid Sweigert
 
Informe del perfil profesional rima 2016
Informe del perfil profesional rima 2016Informe del perfil profesional rima 2016
Informe del perfil profesional rima 2016Sergio Hinchado Leal
 
Campamento de Verano 2017 Los Alcázares
Campamento de Verano 2017  Los AlcázaresCampamento de Verano 2017  Los Alcázares
Campamento de Verano 2017 Los AlcázaresVeleta3000
 
Campamentos de Verano San Martín de Valdeiglesias 2017
Campamentos de Verano San Martín de Valdeiglesias 2017Campamentos de Verano San Martín de Valdeiglesias 2017
Campamentos de Verano San Martín de Valdeiglesias 2017Veleta3000
 
Closed on sundays louis sihler
Closed on sundays louis sihler Closed on sundays louis sihler
Closed on sundays louis sihler Louis Sihler
 
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料20170329 D3 DBAが夜間メンテをしなくなった日 発表資料
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料dcubeio
 
Lista de exercícios Expressões Numéricas com Números Naturais
Lista de exercícios   Expressões Numéricas com Números NaturaisLista de exercícios   Expressões Numéricas com Números Naturais
Lista de exercícios Expressões Numéricas com Números NaturaisMario Andre Nunes Rodrigues
 
Participatory Design: Discovering Unmet Needs & New Solutions
Participatory Design: Discovering Unmet Needs & New SolutionsParticipatory Design: Discovering Unmet Needs & New Solutions
Participatory Design: Discovering Unmet Needs & New SolutionsJennifer Briselli
 
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...confluent
 
Deep dive into PostgreSQL statistics.
Deep dive into PostgreSQL statistics.Deep dive into PostgreSQL statistics.
Deep dive into PostgreSQL statistics.Alexey Lesovsky
 
How to become a data scientist in 6 months
How to become a data scientist in 6 monthsHow to become a data scientist in 6 months
How to become a data scientist in 6 monthsTetiana Ivanova
 
Primer on using Snapchat at #AACR17 and other scientific meetings
Primer on using Snapchat at #AACR17 and other scientific meetingsPrimer on using Snapchat at #AACR17 and other scientific meetings
Primer on using Snapchat at #AACR17 and other scientific meetingsEmil Lou, M.D., Ph.D, FACP
 

Viewers also liked (20)

Cyber security awareness for end users
Cyber security awareness for end usersCyber security awareness for end users
Cyber security awareness for end users
 
Soaring through the Clouds –Live Demo of Setting a World Record in Integratin...
Soaring through the Clouds –Live Demo of Setting a World Record in Integratin...Soaring through the Clouds –Live Demo of Setting a World Record in Integratin...
Soaring through the Clouds –Live Demo of Setting a World Record in Integratin...
 
Dontdrinkanddriventsipic
DontdrinkanddriventsipicDontdrinkanddriventsipic
Dontdrinkanddriventsipic
 
After tests marzo 2017: Pruebas de Integración Automatizadas con Docker
After tests marzo 2017: Pruebas de Integración Automatizadas con DockerAfter tests marzo 2017: Pruebas de Integración Automatizadas con Docker
After tests marzo 2017: Pruebas de Integración Automatizadas con Docker
 
Caps & robbers louis sihler
Caps & robbers louis sihler Caps & robbers louis sihler
Caps & robbers louis sihler
 
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...
Las Vegas es llamada “La Capital Mundial del Entretenimiento” por una buena r...
 
Ecossistema de Uso dos dados abertos
Ecossistema de Uso dos dados abertosEcossistema de Uso dos dados abertos
Ecossistema de Uso dos dados abertos
 
Message to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MITMessage to White House to take Cyber Security seriously - from MIT
Message to White House to take Cyber Security seriously - from MIT
 
Informe del perfil profesional rima 2016
Informe del perfil profesional rima 2016Informe del perfil profesional rima 2016
Informe del perfil profesional rima 2016
 
Campamento de Verano 2017 Los Alcázares
Campamento de Verano 2017  Los AlcázaresCampamento de Verano 2017  Los Alcázares
Campamento de Verano 2017 Los Alcázares
 
Campamentos de Verano San Martín de Valdeiglesias 2017
Campamentos de Verano San Martín de Valdeiglesias 2017Campamentos de Verano San Martín de Valdeiglesias 2017
Campamentos de Verano San Martín de Valdeiglesias 2017
 
Archivematica and the digital archival chain of custody
Archivematica and the digital archival chain of custodyArchivematica and the digital archival chain of custody
Archivematica and the digital archival chain of custody
 
Closed on sundays louis sihler
Closed on sundays louis sihler Closed on sundays louis sihler
Closed on sundays louis sihler
 
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料20170329 D3 DBAが夜間メンテをしなくなった日 発表資料
20170329 D3 DBAが夜間メンテをしなくなった日 発表資料
 
Lista de exercícios Expressões Numéricas com Números Naturais
Lista de exercícios   Expressões Numéricas com Números NaturaisLista de exercícios   Expressões Numéricas com Números Naturais
Lista de exercícios Expressões Numéricas com Números Naturais
 
Participatory Design: Discovering Unmet Needs & New Solutions
Participatory Design: Discovering Unmet Needs & New SolutionsParticipatory Design: Discovering Unmet Needs & New Solutions
Participatory Design: Discovering Unmet Needs & New Solutions
 
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...
The Enterprise Service Bus is Dead! Long live the Enterprise Service Bus, Rim...
 
Deep dive into PostgreSQL statistics.
Deep dive into PostgreSQL statistics.Deep dive into PostgreSQL statistics.
Deep dive into PostgreSQL statistics.
 
How to become a data scientist in 6 months
How to become a data scientist in 6 monthsHow to become a data scientist in 6 months
How to become a data scientist in 6 months
 
Primer on using Snapchat at #AACR17 and other scientific meetings
Primer on using Snapchat at #AACR17 and other scientific meetingsPrimer on using Snapchat at #AACR17 and other scientific meetings
Primer on using Snapchat at #AACR17 and other scientific meetings
 

Similar to Netwatcher Credit Union Tech Talk

Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsOurCrowd
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfJazmine Brown
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionIvanti
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of securityMatthew Pascucci
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019Ulf Mattsson
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldSafeNet
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfYounesChafi1
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guidelarry1401
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxmccormicknadine86
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxsleeperharwell
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010joevest
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultSOCVault
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Entersoft Security
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)Shawn Tuma
 

Similar to Netwatcher Credit Union Tech Talk (20)

Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Main Menu
Main MenuMain Menu
Main Menu
 
Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
The Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for InvestorsThe Cyber Security Landscape: An OurCrowd Briefing for Investors
The Cyber Security Landscape: An OurCrowd Briefing for Investors
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
OSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the UnionOSB50: Operational Security: State of the Union
OSB50: Operational Security: State of the Union
 
11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security11 19-2015 - iasaca membership conference - the state of security
11 19-2015 - iasaca membership conference - the state of security
 
What i learned at issa international summit 2019
What i learned at issa international summit 2019What i learned at issa international summit 2019
What i learned at issa international summit 2019
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdfsecureit-cloudsecurity-151130141528-lva1-app6892.pdf
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
 
Cybersecurity a short business guide
Cybersecurity   a short business guideCybersecurity   a short business guide
Cybersecurity a short business guide
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docxCISSPCertified Information SystemsSecurity ProfessionalCop.docx
CISSPCertified Information SystemsSecurity ProfessionalCop.docx
 
Information security management v2010
Information security management v2010Information security management v2010
Information security management v2010
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
What Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVaultWhat Is Cyber Threat Intelligence | How It Work? | SOCVault
What Is Cyber Threat Intelligence | How It Work? | SOCVault
 
Cloud & Sécurité
Cloud & SécuritéCloud & Sécurité
Cloud & Sécurité
 
Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018Fintech Cyber Security Survey Hong Knog 2018
Fintech Cyber Security Survey Hong Knog 2018
 
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
The Legal Case for Cybersecurity - SecureWorld Denver 2017 (Lunch Keynote)
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 

Recently uploaded

Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒anilsa9823
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...lizamodels9
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Neil Kimberley
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 

Recently uploaded (20)

Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒VIP Call Girls In Saharaganj ( Lucknow  ) 🔝 8923113531 🔝  Cash Payment (COD) 👒
VIP Call Girls In Saharaganj ( Lucknow ) 🔝 8923113531 🔝 Cash Payment (COD) 👒
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 

Netwatcher Credit Union Tech Talk

  • 1. HOW TO ENJOY EXPERT 24/7 THIRD PARTY MONITORING FOR LESS THAN $300 PER MONTH Scott B. Suhy, CEO Scott.Suhy@netwatcher.com ®
  • 2. Agenda Copyright © 2017 NetWatcher All Rights Reserved. • Trends your Financial Institution needs to understand • A new trend “Managed Detection & Response” • NetWatcher’s Managed Detection & Response service 3/30/2017
  • 3. Copyright © 2017 NetWatcher All Rights Reserved. The Gramm–Leach–Bliley Act – (for details 6801–6809) requires financial institutions to explain their information-sharing practices to their customers and to safeguard sensitive data. The Act contains three elements (Privacy Rule, Safeguards Rule and Pretexting Protection) regarding the privacy of information, of which businesses, primarily "financial institutions," need to be aware – (More from the FTC on complying with the Safeguards Rule). The Safeguards Rule requires an institution to develop, implement, and maintain a comprehensive information security program that is written, contains administrative, technical and physical safeguards, is “appropriate” to the institution’s size and complexity, as well as the nature and scope of its activities, and is appropriate to the sensitivity of the customer information at issue.
  • 4. Managed Security Providers Security is the #1 Growth area for Managed Services Providers (MSPs)—CompTIA 5kopportunities HP IBM FireEye Palo Alto Etc… Security Sophistication Small Medium Large Size of Business Threat Intelligence SIEM End Point Technology Intrusion Detection Intrusion Protection …big gap… Firewall Anti-virus Customer demands and compliance mandates 15kopportunities MSSPs Copyright © 2017 NetWatcher All Rights Reserved. Trend #1 – SME’s Pressured to Have More Protection
  • 5. Managed Security Providers Security is the #1 Growth area for Managed Services Providers (MSPs)—CompTIA 5kopportunities HP IBM FireEye Palo Alto Etc… Security Sophistication Small Medium Large Size of Business Threat Intelligence SIEM End Point Technology Intrusion Detection Intrusion Protection …big gap… Firewall Anti-virus Solutions expensive difficult to use security analysts don’t exist 15kopportunities MSSPs Copyright © 2017 NetWatcher All Rights Reserved. Trend #1 – SME’s Pressured to Have More Protection
  • 6. Managed Security Providers Security is the #1 Growth area for Managed Services Providers (MSPs)—CompTIA 5kOrganizations HP IBM FireEye Palo Alto Etc… Security Sophistication Small Medium Large Size of Business Threat Intelligence SIEM End Point Technology Intrusion Detection Intrusion Protection …big gap… Firewall Anti-virus Solutions expensive difficult to use security analysts don’t exist Customer demands and compliance mandates 15kOrganizations MSSPs 5M+Organizations Copyright © 2017 NetWatcher All Rights Reserved. Trend #1 – SME’s Pressured to Have More Protection
  • 7. Trend #2 – Giant Skills Gap in Cyber Security Copyright © 2017 NetWatcher All Rights Reserved. shortfall of 1.5 million security professionals by 2020 – Frost & Sullivan
  • 8. Trend #3 - Known Vulnerabilities Copyright © 2017 NetWatcher All Rights Reserved. 44% of breaches came from vulnerabilities that are two to four years old… -- HP’s Cyber Risk Report http://www.cvedetails.com/vulnerability-list Think about it… Organized crime and foreign government employees are….
  • 9. Trend #4 – Ransomware – as - service . Copyright © 2017 NetWatcher All Rights Reserved. TrueCrypter (late April) CryptXXX (mid April) 7ev3n-HONE$T (mid April) AutoLocky (mid April) Jigsaw (early April) CryptoHost (early April) Rokku (late March) KimcilWare (late March) Coverton (late March) Petya (late March) Maktub Locker (mid March) Nemucod .CRYPTED (mid March) Samas/Kazi (mid March) The Surprise (mid March) Pompous (early March) KeRanger (early March) Cerber (early March) CTB-Locker for web sites (mid February) Padcrypt (mid February) Locky (mid February) Umbrecrypt (early February) DMA Locker (early February) NanoLocker (late January) 7ev3n (late January) LeChiffre (mid January) Magic (mid January) CryptoJoker (early January) Ransom32 (early January)
  • 10. Trend #4 – Ransomware – as - service . Copyright © 2017 NetWatcher All Rights Reserved. TrueCrypter (late April) CryptXXX (mid April) 7ev3n-HONE$T (mid April) AutoLocky (mid April) Jigsaw (early April) CryptoHost (early April) Rokku (late March) KimcilWare (late March) Coverton (late March) Petya (late March) Maktub Locker (mid March) Nemucod .CRYPTED (mid March) Samas/Kazi (mid March) The Surprise (mid March) Pompous (early March) KeRanger (early March) Cerber (early March) CTB-Locker for web sites (mid February) Padcrypt (mid February) Locky (mid February) Umbrecrypt (early February) DMA Locker (early February) NanoLocker (late January) 7ev3n (late January) LeChiffre (mid January) Magic (mid January) CryptoJoker (early January) Ransom32 (early January)
  • 11. Trend #5 - Unintentional Insider Threat Copyright © 2017 NetWatcher All Rights Reserved. Clicking on a Phishing Message Browsing Explicit Web Sites Downloading Risky Software (TOR, Hola, BitTorrent etc..) Using Vulnerable Software (outdated Java and Flash) Sending Personally Identifiable Information in Clear Text
  • 12. Trend #5 - Unintentional Insider Threat Copyright © 2017 NetWatcher All Rights Reserved. Clicking on a Phishing Message Browsing Explicit Web Sites Downloading Risky Software (TOR, Hola, BitTorrent etc..) Using Vulnerable Software (outdated Java and Flash) Sending Personally Identifiable Information in Clear Text
  • 13. Trend #6 - Supply Chain Risk Copyright © 2017 NetWatcher All Rights Reserved. Do you have customer data? Do you provide your customers data to third party vendors? Do you provide your data to third party vendors? “It is abundantly clear that, in many respects,” Mr. Lawsky (New York State’s top financial regulator) said in the letter, “a firm’s level of cybersecurity is only as good as the security of its vendors.” -- NYTimes.com: After JPMorgan Cyberattack, a Push to Fortify Wall Street Banks Think “Business Associate Agreement/HIPAA” – Your customers are going to be expecting you to have great Cyber Security Controls. You should expect the same of your suppliers…
  • 14. Trend #7 - Open Source Copyright © 2017 NetWatcher All Rights Reserved. • Doh! Shellshock… Heartbleed… POODLE… • Duh! They have the source code… • What is managing the BOM in the solutions built on Open Source?
  • 15. Trend #7 - Open Source Copyright © 2017 NetWatcher All Rights Reserved. • Doh! Shellshock… Heartbleed… POODLE… • Duh! They have the source code… • What is managing the BOM in the solutions built on Open Source?
  • 16. FACT – Your Customer’s are Weak on Cyber Security Copyright © 2017 NetWatcher All Rights Reserved.  Generally no security controls (users have admin access to machines, weak employee policy documents, no cyber training, no cyber liability insurance, sr. execs not schooled on the risks etc…)  Most are not aware that they have already been compromised!  Don’t keep firmware up to date on WIFI, Routers, Switches, Firewalls  Many do not change Default Passwords on equipment (see Shodan.io)  Most don’t know who their employees are talking to and what bad actor scans are making it through the firewall
  • 17. FACT – Your Customer’s are Weak on Cyber Security Copyright © 2017 NetWatcher All Rights Reserved.  Generally no security controls (users have admin access to machines, weak employee policy documents, no cyber training, no cyber liability insurance, sr. execs not schooled on the risks etc…)  Most are not aware that they have already been compromised!  Don’t keep firmware up to date on WIFI, Routers, Switches, Firewalls  Many do not change Default Passwords on equipment (see Shodan.io)  Most don’t know who their employees are talking to and what bad actor scans are making it through the firewall
  • 18. Copyright © 2017 NetWatcher All Rights Reserved. Example… Your 12 year old can do this…
  • 19. Copyright © 2017 NetWatcher All Rights Reserved. Example… Your 12 year old can do this…
  • 20. Copyright © 2017 NetWatcher All Rights Reserved. Example… Your 12 year old can do this… Click Here…
  • 21. Copyright © 2017 NetWatcher All Rights Reserved. Example… Your 12 year old can do this…
  • 22. Copyright © 2017 NetWatcher All Rights Reserved. Example… Your 12 year old can do this…
  • 23. Will it Get Worse? Or Better? Copyright © 2017 NetWatcher All Rights Reserved. 2005 2015 2020 CyberAttackSurface InvolvementofOrganizedCrime&NationStates More Protection More Innovation Desire for Privacy More Surface to Attack More Organized Crime Convenience
  • 24. What is Managed Detection & Response (MDR) www.netwatcher.com • Automated “Detection” to find issues 24x7 (Alarms) in concert with Threat Hunting across broad customer base • Cloud based correlation of events over different silo’s of information over time • Alerting, MSP integration, Analyst availability, “Response” Automation • Focused inside Perimeter versus Edge • Focused on what makes it through the traditional line of defense versus replacing traditional line of defense
  • 25. Where NetWatcher’s MDR Service Fits 24x7 Continuous Monitoring for Exploits & Vulnerabilities www.netwatcher.com End Point Protection IPS/UTM/Firewall Keeps bad guy from Coming through the Front door… NetWatcher Continuous Monitoring Keeps employees from Letting bad guy through the Front door…
  • 26. NetWatcher Service Delivery. www.netwatcher.com Sensor(s) (hardware or VM) that sits on the inside of customers network and listens for anomalies… (IDS, Netflow, SIEM, Scanner) Endpoint software (HIDS, Logs, Sensor-in-Cloud VPN/IDS) “Cloud based” Service that sends you necessary alerts when a serious security issue is discovered. (Advanced correlation) Security Analysts in Secure Operations Center (SOC)
  • 27. Why NetWatcher?. www.netwatcher.com What is your Cyber Promiscuity Score™? Automation Hunting for exploits & malware hidden in infected computers, phones or tablets etc... Cyber Promiscuity issues (sometimes referred to as unintentional insider threats) that can lead to security problems such as your employees visiting compromised websites, out of date software or Personally Identifiable Information (PII) being sent over the internet in clear text.   Change the users behavior!
  • 28. SMB Requirements www.netwatcher.com Accuracy  Multi-tenant cloud Ease of installation  Plug it in and it works Easy to Use  CPortal design, easy to understand alarms, CHS/CPS scores  Alarms sent via Text & eMail  Sensor in the Cloud endpoint module MSP Friendly  Single Pane of Glass MSP Portal  ConnectWise integration Affordable  Easy to understand pricing
  • 32. www.netwatcher.com NetWatcher is committed to Financ • NCUA Cyber Resources site (found here) • FFIEC Cyber Assessment Tool (found here) • Conference of State Bank Supervisors Executive Leadership of Cybersecurity Resource Guide (found here) • The FDIC Community Bank Cyber Exercise (found here) – Created to encourage community financial institutions to discuss operational risk issues and the potential impact of information technology disruptions on common banking functions. • FFIEC Handbook’s Section on Information Security (found here) • FDIC Framework for Cybersecurity (found here) - The article addresses some common cyber-attack strategies, the critical components of information security programs (corporate governance, threat intelligence, security awareness training, and patch-management programs), and actions taken by federal bank regulators to respond to cybersecurity threats. The article stresses that everyone within a financial institution, from entry-level staff to the board of directors, is responsible for prioritizing cybersecurity. The article includes information about several resources available to help educate and inform employees and directors on cybersecurity. • NIST Cyber Security Framework (found here)
  • 33. Thank You! To Contact Us: lauren.sexton@netwatcher.com 571.308.3661 www.netwatcher.com Scott B. Suhy, CEO Scott.Suhy@netwatcher.com