SlideShare a Scribd company logo
1 of 35
Download to read offline
Detect and Remediate Advanced
Targeted Attacks
Raphael Reich - Senior Director, Product Marketing, Imperva
Ruby Sharma - Manager, WW Strategic Alliances, FireEye

1

© 2013 Imperva, Inc. All rights reserved.

Confidential
Agenda
§  The threat landscape
§  Traditional defenses fall short
§  Securing high-value applications and data assets
§  FireEye and Imperva: focused defense for targeted
attacks

2

© 2013 Imperva, Inc. All rights reserved.

Confidential
Raphael Reich
Senior Director, Product Marketing , Imperva
§  Expertise
•  20+ years in product marketing,
product management, and software
engineering

§  Professional Experience
•  Cisco, Check Point, Network General

§  Academics
•  Bachelor’s degree in Computer
Science from UC Santa Cruz
•  MBA from UCLA

3

© 2013 Imperva, Inc. All rights reserved.

Confidential
Ruby Sharma
Manager, WW Strategic Alliances, FireEye
§  Expertise
•  10+ years in strategic alliances,
product management, and software
engineering

§  Professional Experience
•  FireEye, Microsoft

§  Academics
•  Masters in Computer Science from
Illinois Institute of Technology

4

© 2013 Imperva, Inc. All rights reserved.

Confidential
Threat Landscape

5

© 2013 Imperva, Inc. All rights reserved.

Confidential
Attackers Turn Your Data Into Their Money

6

© 2013 Imperva, Inc. All rights reserved.

Confidential
Target Your Users and Your Data Center

Source: Verizon Data Breach Report, 2013
7

© 2013 Imperva, Inc. All rights reserved.

Confidential
Who’s Doing It and Why
Governments
Stealing Intellectual Property (IP) and raw data, and spying
§  Motivated by: Policy, politics, and nationalism
§  Preferred Methods: Targeted attacks

Organized Crime
Stealing IP and data
§  Motivated by: Profit
§  Preferred Methods: Targeted attacks, fraud

Hacktivists
Exposing IP and data, and compromising the infrastructure
§  Motivated by: Political causes, ideology, personal agendas
§  Preferred Methods: Targeted attacks, Denial of Service attacks
8

© 2013 Imperva, Inc. All rights reserved.

Confidential
Some Examples
Hackers stole sensitive data related to a planned
$2.4B acquisition of China Huiyuan Juice Group
Hackers raided troves of sensitive data from the
$21B company, but it was never made public

Hackers gained access to privileged user accounts
regarding electric vehicle drive train technology

Hackers had full system access with the ability to
modify, copy and delete sensitive data

9

© 2013 Imperva, Inc. All rights reserved.

Confidential
Anatomy of a Targeted Attack
Records lost: 4M
Population: 5M

= 80%

Attack Timeline: Targeted, Efficient, and Undetected

Attacker steals
login credentials
via phishing
email & malware

Attacker logs in
remotely and
accesses the
database

Aug 13, 2012

Aug 27, 2012

10

© 2013 Imperva, Inc. All rights reserved.

Confidential

Additional
reconnaissance, more
credentials stolen

Aug 29 – Sept 12, 2012

Attacker steals
the entire
database

Sept 12 - 14, 2012
Current Controls
Won’t the NGFW/IPS/AV Stop It?

11

© 2013 Imperva, Inc. All rights reserved.

Confidential
Protect and Monitor Your Assets
Applications and data are the main focus
of modern cyber attacks. However, existing
identity, endpoint, and network security
solutions are insufficient for their
protection.
Application Security Roadmap Beyond 2012:
Breaking Silos, Increasing Intelligence, Enabling Mass Adoption
Joseph Feiman and Neil MacDonald; June 22, 2012

Gartner, Inc.

12

© 2013 Imperva, Inc. All rights reserved.

Confidential
Typical Defenses Ineffective Against Modern
Malware

“Organizations face an evolving threat scenario that they are ill-prepared to deal with….advanced
threats that have bypassed their traditional security protection techniques and reside undetected
on their systems.”
Gartner, 2012

13

© 2013 Imperva, Inc. All rights reserved.

Confidential
Traditional Defenses Don’t Work
The new breed of attacks evade signature-based defenses
Anti-Spam
Gateways

IPS
"

Firewalls/
NGFW

14

© 2013 Imperva, Inc. All rights reserved.

Secure Web
Gateways

Confidential

Desktop AV
The Spending Disconnect
The Threats Have Changed

Security Spending Hasn’t

2012

2001

Cyber Espionage
Organized Criminals
Industrialized Hackers
Anti-virus

Anti-virus

Backdoors

Firewall / VPN

Firewall / VPN

“Digital Graffiti”

Content Filtering

Secure Email/Web

Script Kiddies

IDS / IPS

IPS

Threats

Security Spend

Threats

Security Spend
Sources: Gartner, Imperva analysis

15

© 2013 Imperva, Inc. All rights reserved.

Confidential
Rebalance Your Security Portfolio

16

© 2013 Imperva, Inc. All rights reserved.

Confidential
Security Redefined
Forward Thinking

17

© 2013 Imperva, Inc. All rights reserved.

Confidential
New Threat Landscape

Coordinated Persistent Threat Actors

Dynamic,
Polymorphic Malware

Advanced attacks go undetected!

Multi-Vector Attacks

18

© 2013 Imperva, Inc. All rights reserved.

Confidential

Multi-Stage Attacks
Targeting an Organization’s Valuable Assets

Spear Phishing

CFO

Financial Information

Web-Based Attack

Director of Engineering

Intellectual Property

File-Based Attack

Government Employee

National Security
Information

19

© 2013 Imperva, Inc. All rights reserved.

Confidential
A New Approach Required
Legacy Security Devices
Pattern-Matching
Detection Model

•  Signature-based
•  Reactive
•  Only known threats
•  False positives
20

© 2013 Imperva, Inc. All rights reserved.

Confidential

New Virtual MachineBased Detection Model

• 
• 
• 
• 

Signature-less
Dynamic, real time
Known/unknown threats
Minimal false positives
FireEye’s Multi-Flow, Stateful Attack Analysis
Infection Server

Callback Server

•  FireEye uses multi-flow analysis
to understand the full context of
today’s cyber attacks
Exploit

Callbacks

Malware
Executable

Data
Exfiltration

•  Stateful attack analysis shows
the entire attack life cycle
•  Enables FireEye to disrupt each
stage and neutralize attack
•  Point products focus only on
objects (e.g., executable, files)
and can be easily bypassed

Downloads

21

© 2013 Imperva, Inc. All rights reserved.

Confidential
FireEye Multi Vector Protection Platform
Network based based
appliances see wide range
of network traffic

Web

Email

File

Malwar
e

Multi-Vector Virtual Execution™
Central Management System

Dynamic Threat Intelligence™

22

© 2013 Imperva, Inc. All rights reserved.

Confidential

Installs within an hour on
most networks with no
need for rules and policies
Integrates with common
network architectures
Additional specialized
malware analyst tools
Leverage of detection
experience across entire
customer base
Attacks Discovered and Stopped by FireEye

FireEye claims protection against
Internet Explorer zero-day attack,
Operation Aurora

Attackers Target Internet
Explorer Zero-Day Flaw
December 28, 2012
Researcher – Darien Kindlund

January 18, 2010

Java Zero-Day Attack Could
Hit Enterprises Hard
August 28, 2012
Researcher – Atif Mushdaq

South Korea network attack
'a computer virus'
March 20, 2013
Researcher – Vinay Pidathala

Operation Beebus Attacks
Discovered by FireEye
February 4, 2013
Researchers – Vinay Pidathala,
Darien Kindlund

2010

Command and Control Used in
Sanny APT Attacks Shut Down
March 22, 2013
Researchers – Ali Islam,
Alex Lanstein

2013
2012

Researchers Say They Took Down
World’s Third-Largest Botnet
July 18, 2012
Researcher – Atif Mushdaq

APT Attacks FireEye
is Designed to Combat

23

Russian space research org
targeted by mystery malware attack
December 12, 2012
Researchers – Ali Islam, Alex Lanstein

Stuxnet

© 2013 Imperva, Inc. All rights reserved.

Adobe reviews report of another
security bug in its software
February 13, 2013
Researcher – Zheng Bu

Duqu
South Korea

Confidential

Researchers: Zero-day PDF exploit
affects Adobe Reader 11, earlier
versions
February 13, 2013
Researcher – Yichong Lin
Protecting the Data Center From
Advanced Targeted Attacks

24

© 2013 Imperva, Inc. All rights reserved.

Confidential
What is Needed
Advanced Detection: identify zero-day attacks
Immediate Mitigation: block/report compromise insiders attempt to…
•  Access business critical applications
•  Access sensitive data – databases, intellectual property, deal
data, etc.
•  Conduct administrative actions or privileged operations

Non-disruptive: mitigation enables business to continue
Full Forensics: logs all activity originating from infected hosts
25

© 2013 Imperva, Inc. All rights reserved.

Confidential
Reduce Risk
§  Identify sensitive data

§  Build policies to protect that data

§  Review and rationalize access rights

§  Audit, analyze and alert on access activity

26

© 2013 Imperva, Inc. All rights reserved.

Confidential
Detect Advanced Attacks
§  Detect advanced malware on network
•  Detect in-bound malware exploits and out-bound data exfiltration to
C&C sites

§  Identify compromised endpoints/users
•  Prevent them from accessing business critical data

27

© 2013 Imperva, Inc. All rights reserved.

Confidential
Insulate Critical Applications and Data
§  Stop compromised users and devices from accessing
sensitive applications and data

28

© 2013 Imperva, Inc. All rights reserved.

Confidential
Post-incident Analysis
§  Leverage audit trail and forensics to improve the incident
response process
•  Identify trends and patterns that indicate security risk

29

© 2013 Imperva, Inc. All rights reserved.

Confidential
Protect Data From Advanced Targeted Attacks

+
	
  
1.  Identify insiders/endpoint compromised by malware
2.  Prevent compromised hosts from accessing critical
business data
3.  Provide business continuity without business risk

30

© 2013 Imperva, Inc. All rights reserved.

Confidential
Case Study: PSCU - Financial Services

BLOCK

Protecting regulated data in databases with Imperva and FireEye

PCI

Imperva Database Firewall
31

© 2013 Imperva, Inc. All rights reserved.

Confidential
Integration and Data Flow
Data set

SecureSphere MX

Data	
  

Descrip,on	
  

IP	
  

Compromised	
  device	
  IP	
  address	
  

Hostname	
  

Compromised	
  device	
  hostname	
  	
  

FireEye	
  ID	
  

Unique	
  FireEye	
  ID	
  for	
  mapping	
  

Source	
  

FireEye	
  MPS	
  source	
  device	
  

Etc.	
  

Etc.	
  

32

© 2013 Imperva, Inc. All rights reserved.

SecureSphere Gateways

Confidential
Additional Resources – White Paper

Download Now

33

© 2013 Imperva, Inc. All rights reserved.

Confidential
Additional Resources – eBook

Download Now

34

© 2013 Imperva, Inc. All rights reserved.

Confidential
www.imperva.com

35

© 2013 Imperva, Inc. All rights reserved.

Confidential

More Related Content

What's hot

[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...FireEye, Inc.
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsFireEye, Inc.
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníMarketingArrowECS_CZ
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyePrime Infoserv
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of CompromiseFireEye, Inc.
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF-Secure Corporation
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...Luigi Delgrosso
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSForgeRock
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceTom K
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowSkycure
 
Persistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent ThreatsPersistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent ThreatsSameer Thadani
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing Priyanka Aash
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallAlienVault
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsDavid Sweigert
 

What's hot (20)

[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
[Industry Intelligence Brief] Cyber Threats to the Legal and Professional Ser...
 
Proatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security TeamsProatively Engaged: Questions Executives Should Ask Their Security Teams
Proatively Engaged: Questions Executives Should Ask Their Security Teams
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Endpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEyeEndpoint Detection & Response - FireEye
Endpoint Detection & Response - FireEye
 
Bezpečnost není jen antivirus
Bezpečnost není jen antivirusBezpečnost není jen antivirus
Bezpečnost není jen antivirus
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
F secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and managementF secure Radar vulnerability scanning and management
F secure Radar vulnerability scanning and management
 
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
IBM ridefinisce la strategia e l'approccio verso gli Avanced Persistent Threa...
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPSREAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
REAL-TIME THREAT INTELLIGENCE FOR TRUSTED RELATIONSHIPS
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
 
Pegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to KnowPegasus Spyware - What You Need to Know
Pegasus Spyware - What You Need to Know
 
Persistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent ThreatsPersistence is Key: Advanced Persistent Threats
Persistence is Key: Advanced Persistent Threats
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal BallPlanning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Cyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber CriminalsCyber Kill Chain vs. Cyber Criminals
Cyber Kill Chain vs. Cyber Criminals
 

Viewers also liked

FireEye Systems Engineer
FireEye Systems EngineerFireEye Systems Engineer
FireEye Systems EngineerDediHusniHasyim
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Edge Pereira
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by AttackersFireEye, Inc.
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughImperva
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......centralohioissa
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best PracticesKnowBe4
 
A review of network concepts base on CISCO by Ali Shahbazi
A review of network concepts base on CISCO by Ali ShahbaziA review of network concepts base on CISCO by Ali Shahbazi
A review of network concepts base on CISCO by Ali ShahbaziAli Shahbazi Khojasteh
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudImperva
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.Imperva
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageImperva
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)Digital Bond
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarImperva
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation FoundationImperva
 

Viewers also liked (16)

Fire Eye Appliance Quick Start
Fire Eye Appliance Quick StartFire Eye Appliance Quick Start
Fire Eye Appliance Quick Start
 
xstream_network
xstream_networkxstream_network
xstream_network
 
Ali shahbazi khojasteh dot1X
Ali shahbazi khojasteh dot1XAli shahbazi khojasteh dot1X
Ali shahbazi khojasteh dot1X
 
FireEye Systems Engineer
FireEye Systems EngineerFireEye Systems Engineer
FireEye Systems Engineer
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers[Infographic] Email: The First Security Gap Targeted by Attackers
[Infographic] Email: The First Security Gap Targeted by Attackers
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
 
Email Security Best Practices
Email Security Best PracticesEmail Security Best Practices
Email Security Best Practices
 
A review of network concepts base on CISCO by Ali Shahbazi
A review of network concepts base on CISCO by Ali ShahbaziA review of network concepts base on CISCO by Ali Shahbazi
A review of network concepts base on CISCO by Ali Shahbazi
 
Protect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public CloudProtect Your Data and Apps in the Public Cloud
Protect Your Data and Apps in the Public Cloud
 
More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.More Databases. More Hackers. More Audits.
More Databases. More Hackers. More Audits.
 
Hackers, Cyber Crime and Espionage
Hackers, Cyber Crime and EspionageHackers, Cyber Crime and Espionage
Hackers, Cyber Crime and Espionage
 
ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)ICS Network Security Monitoring (NSM)
ICS Network Security Monitoring (NSM)
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 

Similar to Detect & Remediate Malware & Advanced Targeted Attacks

A Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalA Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalImperva
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint GovernanceImperva
 
Protecting Against Vulnerabilities in SharePoint Add-ons
Protecting Against Vulnerabilities in SharePoint Add-onsProtecting Against Vulnerabilities in SharePoint Add-ons
Protecting Against Vulnerabilities in SharePoint Add-onsImperva
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceImperva
 
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesImperva
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014Imperva
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentationJoseph Schorr
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataIBM Security
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajanShwetank Jayaswal
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud IBM Security
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsDenim Group
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing ProfessionalsTechWell
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsEmulex Corporation
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)Norm Barber
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardEMC
 

Similar to Detect & Remediate Malware & Advanced Targeted Attacks (20)

A Blueprint for Web Attack Survival
A Blueprint for Web Attack SurvivalA Blueprint for Web Attack Survival
A Blueprint for Web Attack Survival
 
4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance4 Security Guidelines for SharePoint Governance
4 Security Guidelines for SharePoint Governance
 
Protecting Against Vulnerabilities in SharePoint Add-ons
Protecting Against Vulnerabilities in SharePoint Add-onsProtecting Against Vulnerabilities in SharePoint Add-ons
Protecting Against Vulnerabilities in SharePoint Add-ons
 
The Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat IntelligenceThe Value of Crowd-Sourced Threat Intelligence
The Value of Crowd-Sourced Threat Intelligence
 
Challenges2013
Challenges2013Challenges2013
Challenges2013
 
Hiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known VulnerabilitiesHiding in Plain Sight: The Danger of Known Vulnerabilities
Hiding in Plain Sight: The Danger of Known Vulnerabilities
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?Application Hackers Have A Handbook. Why Shouldn't You?
Application Hackers Have A Handbook. Why Shouldn't You?
 
Retail security-services--client-presentation
Retail security-services--client-presentationRetail security-services--client-presentation
Retail security-services--client-presentation
 
Bridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical DataBridging the Gap Between Your Security Defenses and Critical Data
Bridging the Gap Between Your Security Defenses and Critical Data
 
IBM security systems overview v1.0 - rohit nagarajan
IBM security systems overview v1.0 -  rohit nagarajanIBM security systems overview v1.0 -  rohit nagarajan
IBM security systems overview v1.0 - rohit nagarajan
 
Data security in the cloud
Data security in the cloud Data security in the cloud
Data security in the cloud
 
Top Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for ApplicationsTop Strategies to Capture Security Intelligence for Applications
Top Strategies to Capture Security Intelligence for Applications
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
From SIEM to SA: The Path Forward
From SIEM to SA: The Path ForwardFrom SIEM to SA: The Path Forward
From SIEM to SA: The Path Forward
 

More from Imperva

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyImperva
 
API Security Survey
API Security SurveyAPI Security Survey
API Security SurveyImperva
 
Imperva ppt
Imperva pptImperva ppt
Imperva pptImperva
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountImperva
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Imperva
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesImperva
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchImperva
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecurityImperva
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRImperva
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware Imperva
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged VendorsImperva
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet SophisticationImperva
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made EasyImperva
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceImperva
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyImperva
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR PlanImperva
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataImperva
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityImperva
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Imperva
 

More from Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Detect & Remediate Malware & Advanced Targeted Attacks

  • 1. Detect and Remediate Advanced Targeted Attacks Raphael Reich - Senior Director, Product Marketing, Imperva Ruby Sharma - Manager, WW Strategic Alliances, FireEye 1 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 2. Agenda §  The threat landscape §  Traditional defenses fall short §  Securing high-value applications and data assets §  FireEye and Imperva: focused defense for targeted attacks 2 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 3. Raphael Reich Senior Director, Product Marketing , Imperva §  Expertise •  20+ years in product marketing, product management, and software engineering §  Professional Experience •  Cisco, Check Point, Network General §  Academics •  Bachelor’s degree in Computer Science from UC Santa Cruz •  MBA from UCLA 3 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 4. Ruby Sharma Manager, WW Strategic Alliances, FireEye §  Expertise •  10+ years in strategic alliances, product management, and software engineering §  Professional Experience •  FireEye, Microsoft §  Academics •  Masters in Computer Science from Illinois Institute of Technology 4 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 5. Threat Landscape 5 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 6. Attackers Turn Your Data Into Their Money 6 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 7. Target Your Users and Your Data Center Source: Verizon Data Breach Report, 2013 7 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 8. Who’s Doing It and Why Governments Stealing Intellectual Property (IP) and raw data, and spying §  Motivated by: Policy, politics, and nationalism §  Preferred Methods: Targeted attacks Organized Crime Stealing IP and data §  Motivated by: Profit §  Preferred Methods: Targeted attacks, fraud Hacktivists Exposing IP and data, and compromising the infrastructure §  Motivated by: Political causes, ideology, personal agendas §  Preferred Methods: Targeted attacks, Denial of Service attacks 8 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 9. Some Examples Hackers stole sensitive data related to a planned $2.4B acquisition of China Huiyuan Juice Group Hackers raided troves of sensitive data from the $21B company, but it was never made public Hackers gained access to privileged user accounts regarding electric vehicle drive train technology Hackers had full system access with the ability to modify, copy and delete sensitive data 9 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 10. Anatomy of a Targeted Attack Records lost: 4M Population: 5M = 80% Attack Timeline: Targeted, Efficient, and Undetected Attacker steals login credentials via phishing email & malware Attacker logs in remotely and accesses the database Aug 13, 2012 Aug 27, 2012 10 © 2013 Imperva, Inc. All rights reserved. Confidential Additional reconnaissance, more credentials stolen Aug 29 – Sept 12, 2012 Attacker steals the entire database Sept 12 - 14, 2012
  • 11. Current Controls Won’t the NGFW/IPS/AV Stop It? 11 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 12. Protect and Monitor Your Assets Applications and data are the main focus of modern cyber attacks. However, existing identity, endpoint, and network security solutions are insufficient for their protection. Application Security Roadmap Beyond 2012: Breaking Silos, Increasing Intelligence, Enabling Mass Adoption Joseph Feiman and Neil MacDonald; June 22, 2012 Gartner, Inc. 12 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 13. Typical Defenses Ineffective Against Modern Malware “Organizations face an evolving threat scenario that they are ill-prepared to deal with….advanced threats that have bypassed their traditional security protection techniques and reside undetected on their systems.” Gartner, 2012 13 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 14. Traditional Defenses Don’t Work The new breed of attacks evade signature-based defenses Anti-Spam Gateways IPS " Firewalls/ NGFW 14 © 2013 Imperva, Inc. All rights reserved. Secure Web Gateways Confidential Desktop AV
  • 15. The Spending Disconnect The Threats Have Changed Security Spending Hasn’t 2012 2001 Cyber Espionage Organized Criminals Industrialized Hackers Anti-virus Anti-virus Backdoors Firewall / VPN Firewall / VPN “Digital Graffiti” Content Filtering Secure Email/Web Script Kiddies IDS / IPS IPS Threats Security Spend Threats Security Spend Sources: Gartner, Imperva analysis 15 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 16. Rebalance Your Security Portfolio 16 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 17. Security Redefined Forward Thinking 17 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 18. New Threat Landscape Coordinated Persistent Threat Actors Dynamic, Polymorphic Malware Advanced attacks go undetected! Multi-Vector Attacks 18 © 2013 Imperva, Inc. All rights reserved. Confidential Multi-Stage Attacks
  • 19. Targeting an Organization’s Valuable Assets Spear Phishing CFO Financial Information Web-Based Attack Director of Engineering Intellectual Property File-Based Attack Government Employee National Security Information 19 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 20. A New Approach Required Legacy Security Devices Pattern-Matching Detection Model •  Signature-based •  Reactive •  Only known threats •  False positives 20 © 2013 Imperva, Inc. All rights reserved. Confidential New Virtual MachineBased Detection Model •  •  •  •  Signature-less Dynamic, real time Known/unknown threats Minimal false positives
  • 21. FireEye’s Multi-Flow, Stateful Attack Analysis Infection Server Callback Server •  FireEye uses multi-flow analysis to understand the full context of today’s cyber attacks Exploit Callbacks Malware Executable Data Exfiltration •  Stateful attack analysis shows the entire attack life cycle •  Enables FireEye to disrupt each stage and neutralize attack •  Point products focus only on objects (e.g., executable, files) and can be easily bypassed Downloads 21 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 22. FireEye Multi Vector Protection Platform Network based based appliances see wide range of network traffic Web Email File Malwar e Multi-Vector Virtual Execution™ Central Management System Dynamic Threat Intelligence™ 22 © 2013 Imperva, Inc. All rights reserved. Confidential Installs within an hour on most networks with no need for rules and policies Integrates with common network architectures Additional specialized malware analyst tools Leverage of detection experience across entire customer base
  • 23. Attacks Discovered and Stopped by FireEye FireEye claims protection against Internet Explorer zero-day attack, Operation Aurora Attackers Target Internet Explorer Zero-Day Flaw December 28, 2012 Researcher – Darien Kindlund January 18, 2010 Java Zero-Day Attack Could Hit Enterprises Hard August 28, 2012 Researcher – Atif Mushdaq South Korea network attack 'a computer virus' March 20, 2013 Researcher – Vinay Pidathala Operation Beebus Attacks Discovered by FireEye February 4, 2013 Researchers – Vinay Pidathala, Darien Kindlund 2010 Command and Control Used in Sanny APT Attacks Shut Down March 22, 2013 Researchers – Ali Islam, Alex Lanstein 2013 2012 Researchers Say They Took Down World’s Third-Largest Botnet July 18, 2012 Researcher – Atif Mushdaq APT Attacks FireEye is Designed to Combat 23 Russian space research org targeted by mystery malware attack December 12, 2012 Researchers – Ali Islam, Alex Lanstein Stuxnet © 2013 Imperva, Inc. All rights reserved. Adobe reviews report of another security bug in its software February 13, 2013 Researcher – Zheng Bu Duqu South Korea Confidential Researchers: Zero-day PDF exploit affects Adobe Reader 11, earlier versions February 13, 2013 Researcher – Yichong Lin
  • 24. Protecting the Data Center From Advanced Targeted Attacks 24 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 25. What is Needed Advanced Detection: identify zero-day attacks Immediate Mitigation: block/report compromise insiders attempt to… •  Access business critical applications •  Access sensitive data – databases, intellectual property, deal data, etc. •  Conduct administrative actions or privileged operations Non-disruptive: mitigation enables business to continue Full Forensics: logs all activity originating from infected hosts 25 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 26. Reduce Risk §  Identify sensitive data §  Build policies to protect that data §  Review and rationalize access rights §  Audit, analyze and alert on access activity 26 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 27. Detect Advanced Attacks §  Detect advanced malware on network •  Detect in-bound malware exploits and out-bound data exfiltration to C&C sites §  Identify compromised endpoints/users •  Prevent them from accessing business critical data 27 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 28. Insulate Critical Applications and Data §  Stop compromised users and devices from accessing sensitive applications and data 28 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 29. Post-incident Analysis §  Leverage audit trail and forensics to improve the incident response process •  Identify trends and patterns that indicate security risk 29 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 30. Protect Data From Advanced Targeted Attacks +   1.  Identify insiders/endpoint compromised by malware 2.  Prevent compromised hosts from accessing critical business data 3.  Provide business continuity without business risk 30 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 31. Case Study: PSCU - Financial Services BLOCK Protecting regulated data in databases with Imperva and FireEye PCI Imperva Database Firewall 31 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 32. Integration and Data Flow Data set SecureSphere MX Data   Descrip,on   IP   Compromised  device  IP  address   Hostname   Compromised  device  hostname     FireEye  ID   Unique  FireEye  ID  for  mapping   Source   FireEye  MPS  source  device   Etc.   Etc.   32 © 2013 Imperva, Inc. All rights reserved. SecureSphere Gateways Confidential
  • 33. Additional Resources – White Paper Download Now 33 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 34. Additional Resources – eBook Download Now 34 © 2013 Imperva, Inc. All rights reserved. Confidential
  • 35. www.imperva.com 35 © 2013 Imperva, Inc. All rights reserved. Confidential