In this presentation, Gajraj Singh, VP of Product Marketing, defines “cyberwar,” explains the implications of breaches on an organization, and shows how Tripwire addresses cybersecurity challenges.
2. cyberwar (noun)
Pronunciation: (/ˈsībərˌwôr/)
After land, sea, air and space,
warfare has entered the fifth domain: cyberspace.
The use of computer technology to disrupt the activities of a state or organization, especially
the deliberate attacking of information systems for strategic or military purposes
But there are few, if any, rules in this domain!
In fact, Cyberwar is NOT a defined term
of art in law or legal convention.
3. NATO Tries to Define Cyberwar
2014 summit declaration states, a certain threshold must be met to consider
invoking Article 5, the collective defense clause.
But how do we define “thresholds” in cyberspace?
1. Confidentiality – breaches have been treated as crimes
2. Availability – e.g. DDoS campaign against Estonia.
Espionage, sabotage, and crime but not an act of war
3. Integrity – e.g. Infecting industrial control systems.
Could be catastrophic
A small number of cyber attacks involve data manipulation, and even fewer
pose militaristic threats.
12. Reduce attack surface
Detect advanced threats
Business agility
Optimize resources
Reduce business risk
INTEGRATION
AUTOMATION
CONTEXT
13.
14. Real-time change detection
and audit tracking helps
maintain continuous
compliance
700+ policy and platform
support
Auto discovery and
inventory of all assets,
hardware and software
in scope.
Rapid discovery of gaps.
Audit and ensure patch
process through
integrated configuration,
vulnerability and log
management
Update with built-in
remediation guidance
Policy and compliance
content updates,
vulnerabilities and
security frameworks.
15. Evaluate ‘drift’ from
baseline – who, what,
when, why
Assist security and
compliance with
evidence & workflows
Automate IT and
security workflows and
processes
Quickly adapt & update
based on risk &
business priorities
16. Trusted: By over half of Fortune 500 and over 9,500+ customers worldwide
Advanced: Integrity monitoring, configuration and risk assessment portfolio
Open: Built for integration and automation across the security and IT ecosystem
Resilient: Proven, reliable platform for security, compliance and IT operations