© 2017Cybereason Inc. All rights reserved.
Avoiding	a	Sophisticated,	Targeted	Breach	
Critical	Guidance	for	Healthcare	Organizations
© 2017 Cybereason Inc. All rights reserved.
Attackers	Are	Becoming	More	and	More	Successful,	
Little	Security	Disruption
The	paradigm	graph
Time
Success	Rate
Attackers
Defenders
© 2017 Cybereason Inc. All rights reserved.
Attacker-Defender	paradigm	in	question
100%	success
• Advanced	adversaries	succeed	almost	100%	of	the	time
• BUT,	attackers	have	some	inherent	vulnerabilities	too	- an	
attack	is	composed	of	dozens	or	even	hundreds	of	steps
• With	the	right	procedures	and	toolset	in	place,	a	defender	can	
turn	any	(very	likely)	mistake	made	by	an	attacker	into	a	
complete	exposure	of	the	malicious	operation
© 2017 Cybereason Inc. All rights reserved.
Black market trafficking
of	compromised	enterprise	
computing	resources
© 2017 Cybereason Inc. All rights reserved.
A	new	incident	is	detected
• Is	it	Targeted	or	Untargeted?	
• Is	it	relevant?
• A	completely	untargeted	threat	can	turn	into	a	targeted	
operation	within	hours
© 2017 Cybereason Inc. All rights reserved.
Business	Rationale
Machine	LifetimeValue
Monetization Method
Adware	/	Click-fraud
Bulk	Sale
Unit	Sale
$18 – $36
$10 – $20
$10 - $1000
© 2017 Cybereason Inc. All rights reserved.
Black	market	machine	trading	– Machine	Valuation
Basic	– Approx.	+50%	on	“commodity	price”	(~$5-$10)
• Admin	privs
• Public	IP
• Network	bandwidth
Nice	– Between	+50%-1,000%
• Installed	software	/	Accessed	websites
Jackpot	– Between	+1,000%	- 10,000%
• Enterprise	affiliation
© 2017 Cybereason Inc. All rights reserved.
Black	market	machine	trading
© 2017 Cybereason Inc. All rights reserved.
Black	market	machine	trading
© 2017 Cybereason Inc. All rights reserved.
Black	market	Code	of	Conduct
© 2017 Cybereason Inc. All rights reserved.
Black	market	machine	trading	– US-based	machines
© 2017 Cybereason Inc. All rights reserved.
Black	market	machine	trading	– Some	statistics
Percentage	of	compromised	machines	for	sale	per	state	– Top	5:
• 1st	prize	goes	to:	California,	21%
• 2nd	prize	goes	to:	New	Jersey,	11%
• 3rd	prize	goes	to:	New	York,	6%
• 4th	prize	goes	to:	Texas,	6%
• 5th	prize	goes	to:	Iowa,	6%	(what?!...)
© 2017 Cybereason Inc. All rights reserved.
Examining a Threat
Escalation Incident
Case	Study
© 2017 Cybereason Inc. All rights reserved.
Black	market	machine	trading	– Case	study
Incident	details,	as	seen	in	several	enterprises:
• Starts	with	untargeted,	known	file-less	
click-fraud	tool,	effecting	several	
machines	in	the	enterprise	network
• Detection	was	based	on	malicious	use	of
PowerShell	and	malware	
communication	with	known	malicious	
C2	domains	/	IPs
• De-prioritized	by	SOC	based	on	low	
damage	potential
© 2017 Cybereason Inc. All rights reserved.
Black	market	machine	trading	– Case	study
Incident	details,	as	seen	in	several	enterprises:
• SOC	continues	to	monitor	the	compromised	
endpoints	(automated),	and	blocks	access	to	
the	known	C2
• 5	days	later,	1	machine	stops	attempting	to	
communicate	with	known	C2	and	is	detected	
performing	DGA	and	connecting	to	a	
previously	unknown	C2
• C2	communications	now	occurs	only	when	
“outside”	the	corporate	network	(no	C2	
when	local	IP	is	in	the	enterprise	subnet,	
only	when	on	192.168.*	or	10.0.*)
© 2017 Cybereason Inc. All rights reserved.
Black	market	machine	trading	– Case	study
Incident	details,	as	seen	in	several	enterprises:
• Over	the	next	24	hours	C2	communication	profile	changes	to	include	
downloading	and	uploading	significantly	more	data,	and	click-fraud	tool	
escalated	privileges	to	Local	System
• Before	(typical	click-fraud):
© 2017 Cybereason Inc. All rights reserved.
Black	market	machine	trading	– Case	study
Incident	details,	as	seen	in	several	enterprises:
• Over	the	next	24	hours	C2	communication	profile	changes	to	include	downloading	
and	uploading	significantly	more	data
• After	(could	indicate	a	heavier	protocol	transmitted	over	port	8080	/	download	of	
additional	modules	/	exfiltration	of	broader	system	information):
© 2017 Cybereason Inc. All rights reserved.
Black	market	machine	trading	– Case	study
Incident	details,	as	seen	in	several	enterprises:
• Attack	tool	injects	code	and	migrates	into	msdtc.exe process
• Below,	msdtc.exe establishing	C2	connection	with	previously	DGA-established	C2:
© 2017 Cybereason Inc. All rights reserved.
Behavioral Indicators
of	a	transaction
© 2017 Cybereason Inc. All rights reserved.
TTPs	of	Seller-Marketplace-Buyer	Relationship
C2
• Continuous	/	reliable	/	auto	verifiable	command	and	control	channel	– RDP,	SSH
• Required	to	enable	the	transaction
• Can	use	non-standard	ports,	reverse	connections,	encapsulation	in	other
protocols	(e.g.	HTTP)
• Exact	configuration	&	persistence	method	depend	on	the	seller
• Tasking-based	C2	is	very	rare	in	marketplaces	since	it	doesn’t	naturally	fit	
the	above	3	criteria
• Once	the	buyer	goes	in,	a	different	mechanism	may	be	put	in	place
© 2017 Cybereason Inc. All rights reserved.
TTPs	of	Seller-Marketplace-Buyer	Relationship
Priv.Esc.
• Priv.Esc.	– Admin	access	is	worth	more	than	unprivileged	user	access.
• Process	/	installed	software	enumeration	and	browser	history	enumeration.
Relevant	software	and	browsing	history	can	up	the	price	of	a	compromised	
machine	by	100x
© 2017 Cybereason Inc. All rights reserved.
TTPs	Detection	– How	to	break	the	system?
Change	in	C2
• From	known	malicious	IP	/	domain	to	unknown	IP	/	domain
• From	straight	IP	/	domain	to	DGA
• Question	connections	to	RDP	service	– especially	on	already	compromised	
machines
• Long	lasting	connections
• Change	in	RDP	configuration
• Question	unfamiliar	modules	loaded	as	part	of	the	remote	assistance	service
© 2017 Cybereason Inc. All rights reserved.
TTPs	Detection	– How	to	break	the	system?
Change	in	privileges
• Monitor	for	processes	performing	priv.esc.	– especially	on	already	compromised	
machines
• Process	/	Installed	software	enumeration	and	browser	history	enumeration
• Stop	of	previous	attack?	In	most	cases	– Not	a	good	indicator…	(No	code	of	
conduct	for	this	on	most	marketplaces)
© 2017 Cybereason Inc. All rights reserved.
House	of	Cards
Successful	defense	doesn’t	mean	
stopping	every	stage	of	the	attack…
…find	one	component	of	the	hack	and,	over	
time,	the	entire	operation	can	collapse.
© 2017 Cybereason Inc. All rights reserved.
Returning	Power	to	the	Defenders
Be	Proactive!	Establish	visibility!	Hunt	for	cyber	kill	chain	behaviors!
Time
Success	Rate
Attackers
Defenders
© 2017 Cybereason Inc. All rights reserved.
you.
Thank
www.cybereason.com

More Related Content

PPTX
Cybereason - behind the HackingTeam infection server
PDF
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
PDF
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
PDF
Activated Charcoal - Making Sense of Endpoint Data
PDF
Webinar: Stopping evasive malware - how a cloud sandbox array works
PDF
SecureSet WarGames - Logging and Packet Capture Training
PDF
Deception Driven Defense - Infragard 2016
PDF
Webinar: Insights from Cyren's 2016 cyberthreat report
Cybereason - behind the HackingTeam infection server
Networking 2016-05-24 - Topic 1- Cybereason Lab Analysis by Brad Green
Networking 2016-05-24 - Topic 2 - The "Hack Back" - How Hacking Team Became t...
Activated Charcoal - Making Sense of Endpoint Data
Webinar: Stopping evasive malware - how a cloud sandbox array works
SecureSet WarGames - Logging and Packet Capture Training
Deception Driven Defense - Infragard 2016
Webinar: Insights from Cyren's 2016 cyberthreat report

What's hot (20)

PDF
Webinar: Why evasive zero day attacks are killing traditional sandboxing
PDF
Webinar: IT security at SMBs: 2016 benchmarking survey
PDF
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
PPTX
Advanced Threat Hunting - Botconf 2017
PDF
Threat Landscape Lessons from IoTs and Honeynets
PDF
Webinar: Dispelling the Myths about Cloud Security
PDF
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
PDF
Webinar: A deep dive on ransomware
PDF
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
PDF
Webinar: Is your web security broken? - 10 things you need to know
PDF
Intelligence driven defense webinar
PDF
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
PDF
Managing Indicator Deprecation in ThreatConnect
PDF
DerbyCon 5 - Tactical Diversion-Driven Defense
PDF
Phishing Intelligence Engine - BlueHat v17
PDF
What Happens Before the Kill Chain
PDF
PIE - BSides Vancouver 2018
PPTX
Corporate Espionage without the Hassle of Committing Felonies
PPTX
Combating Insider Threats – Protecting Your Agency from the Inside Out
PDF
Threat Intelligence Field of Dreams
Webinar: Why evasive zero day attacks are killing traditional sandboxing
Webinar: IT security at SMBs: 2016 benchmarking survey
Webinar: Insights from CYREN's 2015-Q3 Cyber Threat Report
Advanced Threat Hunting - Botconf 2017
Threat Landscape Lessons from IoTs and Honeynets
Webinar: Dispelling the Myths about Cloud Security
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
Webinar: A deep dive on ransomware
Webinar: Insights from CYREN's 2015 Q2 Cyber Threats Report
Webinar: Is your web security broken? - 10 things you need to know
Intelligence driven defense webinar
Webinar: Insights from CYREN's Q1 2015 Cyber Threats Trend Report
Managing Indicator Deprecation in ThreatConnect
DerbyCon 5 - Tactical Diversion-Driven Defense
Phishing Intelligence Engine - BlueHat v17
What Happens Before the Kill Chain
PIE - BSides Vancouver 2018
Corporate Espionage without the Hassle of Committing Felonies
Combating Insider Threats – Protecting Your Agency from the Inside Out
Threat Intelligence Field of Dreams
Ad

Viewers also liked (11)

PDF
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
PDF
Some PowerShell Goodies
PDF
Ransomware is Coming to a Desktop Near You
PDF
Threat Hunting 102: Beyond the Basics
PDF
Deploying a data centric approach to enterprise agility
PPTX
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
PDF
Cybersecurity and Internet Governance
PDF
Profiling an enigma: The mystery of North Korea’s cyber threat landscape
PDF
Gray Hat PowerShell - ShowMeCon 2015
PPTX
How to do everything with PowerShell
PPTX
Slideshare ppt
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Some PowerShell Goodies
Ransomware is Coming to a Desktop Near You
Threat Hunting 102: Beyond the Basics
Deploying a data centric approach to enterprise agility
bsides NOVA 2017 So You Want to Be a Cyber Threat Analyst eh?
Cybersecurity and Internet Governance
Profiling an enigma: The mystery of North Korea’s cyber threat landscape
Gray Hat PowerShell - ShowMeCon 2015
How to do everything with PowerShell
Slideshare ppt
Ad

Similar to Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare (20)

PPTX
CTEK Cyber Briefing - April 2022.pptx
PPTX
CynergisTek Cyber Briefing April 2022
PDF
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
PDF
BIZGrowth Strategies — Cybersecurity Special Edition 2023
PDF
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
PDF
Cybersecurity: A Manufacturers Guide by Clearnetwork
PPTX
Cyber Sec Update Secure World Seattle Nov 13, 2014
PDF
Protecting Your Business From Cybercrime
DOC
Data breach represents potential existential risk to any organization
DOC
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
PDF
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
PPTX
How secure are you?
PPTX
Ways To Protect Your Company From Cybercrime
PDF
How Vulnerable Is Your Industry to Cyber Crime?
PPTX
Cyber Security and Healthcare
PDF
Webinar: Cybersecurity and the New Age of Hackers
PPTX
Cybersecurity Presentation 6-11-15
PDF
Protecting Your Business from Cybercrime - Cybersecurity 101
PDF
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
PDF
Data Breach Review - Takeaways for the Business Infographic
CTEK Cyber Briefing - April 2022.pptx
CynergisTek Cyber Briefing April 2022
Establishing_strategic_level_anaysis_Brown_-_CTI_and_IR_Conference_London_2016
BIZGrowth Strategies — Cybersecurity Special Edition 2023
5 Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk
Cybersecurity: A Manufacturers Guide by Clearnetwork
Cyber Sec Update Secure World Seattle Nov 13, 2014
Protecting Your Business From Cybercrime
Data breach represents potential existential risk to any organization
DATA BREACH REPRESENTS POTENTIAL EXISTENTIAL RISK
Unveiling the Latest Threat Intelligence Practical Strategies for Strengtheni...
How secure are you?
Ways To Protect Your Company From Cybercrime
How Vulnerable Is Your Industry to Cyber Crime?
Cyber Security and Healthcare
Webinar: Cybersecurity and the New Age of Hackers
Cybersecurity Presentation 6-11-15
Protecting Your Business from Cybercrime - Cybersecurity 101
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Data Breach Review - Takeaways for the Business Infographic

More from Cybereason (9)

PDF
Antifragile Cyber Defense
PDF
An Introduction to the Agile SoC
PDF
Protecting the financial services industry
PDF
Protecting the healthcare industry
PDF
Protecting the manufacturing industry
PDF
The attack lifecycle. Cybereason can help you answer: Are you under attack?
PDF
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
PDF
The Cyber Attack Lifecycle
PDF
Maturing your threat hunting program
Antifragile Cyber Defense
An Introduction to the Agile SoC
Protecting the financial services industry
Protecting the healthcare industry
Protecting the manufacturing industry
The attack lifecycle. Cybereason can help you answer: Are you under attack?
The Incident Response Checklist - 9 Steps Your Current Plan Lacks
The Cyber Attack Lifecycle
Maturing your threat hunting program

Recently uploaded (20)

PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PPTX
Internet of Everything -Basic concepts details
PDF
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PDF
EIS-Webinar-Regulated-Industries-2025-08.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PPTX
Microsoft User Copilot Training Slide Deck
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Internet of Everything -Basic concepts details
Transform-Your-Factory-with-AI-Driven-Quality-Engineering.pdf
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
EIS-Webinar-Regulated-Industries-2025-08.pdf
Basics of Cloud Computing - Cloud Ecosystem
MuleSoft-Compete-Deck for midddleware integrations
Enhancing plagiarism detection using data pre-processing and machine learning...
giants, standing on the shoulders of - by Daniel Stenberg
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Module 1 Introduction to Web Programming .pptx
LMS bot: enhanced learning management systems for improved student learning e...
“The Future of Visual AI: Efficient Multimodal Intelligence,” a Keynote Prese...
Lung cancer patients survival prediction using outlier detection and optimize...
Microsoft User Copilot Training Slide Deck
future_of_ai_comprehensive_20250822032121.pptx
Advancing precision in air quality forecasting through machine learning integ...
Convolutional neural network based encoder-decoder for efficient real-time ob...
Connector Corner: Transform Unstructured Documents with Agentic Automation

Avoiding Sophisticated Targeted Breach Critical Guidance Healthcare

  • 1. © 2017Cybereason Inc. All rights reserved. Avoiding a Sophisticated, Targeted Breach Critical Guidance for Healthcare Organizations
  • 2. © 2017 Cybereason Inc. All rights reserved. Attackers Are Becoming More and More Successful, Little Security Disruption The paradigm graph Time Success Rate Attackers Defenders
  • 3. © 2017 Cybereason Inc. All rights reserved. Attacker-Defender paradigm in question 100% success • Advanced adversaries succeed almost 100% of the time • BUT, attackers have some inherent vulnerabilities too - an attack is composed of dozens or even hundreds of steps • With the right procedures and toolset in place, a defender can turn any (very likely) mistake made by an attacker into a complete exposure of the malicious operation
  • 4. © 2017 Cybereason Inc. All rights reserved. Black market trafficking of compromised enterprise computing resources
  • 5. © 2017 Cybereason Inc. All rights reserved. A new incident is detected • Is it Targeted or Untargeted? • Is it relevant? • A completely untargeted threat can turn into a targeted operation within hours
  • 6. © 2017 Cybereason Inc. All rights reserved. Business Rationale Machine LifetimeValue Monetization Method Adware / Click-fraud Bulk Sale Unit Sale $18 – $36 $10 – $20 $10 - $1000
  • 7. © 2017 Cybereason Inc. All rights reserved. Black market machine trading – Machine Valuation Basic – Approx. +50% on “commodity price” (~$5-$10) • Admin privs • Public IP • Network bandwidth Nice – Between +50%-1,000% • Installed software / Accessed websites Jackpot – Between +1,000% - 10,000% • Enterprise affiliation
  • 8. © 2017 Cybereason Inc. All rights reserved. Black market machine trading
  • 9. © 2017 Cybereason Inc. All rights reserved. Black market machine trading
  • 10. © 2017 Cybereason Inc. All rights reserved. Black market Code of Conduct
  • 11. © 2017 Cybereason Inc. All rights reserved. Black market machine trading – US-based machines
  • 12. © 2017 Cybereason Inc. All rights reserved. Black market machine trading – Some statistics Percentage of compromised machines for sale per state – Top 5: • 1st prize goes to: California, 21% • 2nd prize goes to: New Jersey, 11% • 3rd prize goes to: New York, 6% • 4th prize goes to: Texas, 6% • 5th prize goes to: Iowa, 6% (what?!...)
  • 13. © 2017 Cybereason Inc. All rights reserved. Examining a Threat Escalation Incident Case Study
  • 14. © 2017 Cybereason Inc. All rights reserved. Black market machine trading – Case study Incident details, as seen in several enterprises: • Starts with untargeted, known file-less click-fraud tool, effecting several machines in the enterprise network • Detection was based on malicious use of PowerShell and malware communication with known malicious C2 domains / IPs • De-prioritized by SOC based on low damage potential
  • 15. © 2017 Cybereason Inc. All rights reserved. Black market machine trading – Case study Incident details, as seen in several enterprises: • SOC continues to monitor the compromised endpoints (automated), and blocks access to the known C2 • 5 days later, 1 machine stops attempting to communicate with known C2 and is detected performing DGA and connecting to a previously unknown C2 • C2 communications now occurs only when “outside” the corporate network (no C2 when local IP is in the enterprise subnet, only when on 192.168.* or 10.0.*)
  • 16. © 2017 Cybereason Inc. All rights reserved. Black market machine trading – Case study Incident details, as seen in several enterprises: • Over the next 24 hours C2 communication profile changes to include downloading and uploading significantly more data, and click-fraud tool escalated privileges to Local System • Before (typical click-fraud):
  • 17. © 2017 Cybereason Inc. All rights reserved. Black market machine trading – Case study Incident details, as seen in several enterprises: • Over the next 24 hours C2 communication profile changes to include downloading and uploading significantly more data • After (could indicate a heavier protocol transmitted over port 8080 / download of additional modules / exfiltration of broader system information):
  • 18. © 2017 Cybereason Inc. All rights reserved. Black market machine trading – Case study Incident details, as seen in several enterprises: • Attack tool injects code and migrates into msdtc.exe process • Below, msdtc.exe establishing C2 connection with previously DGA-established C2:
  • 19. © 2017 Cybereason Inc. All rights reserved. Behavioral Indicators of a transaction
  • 20. © 2017 Cybereason Inc. All rights reserved. TTPs of Seller-Marketplace-Buyer Relationship C2 • Continuous / reliable / auto verifiable command and control channel – RDP, SSH • Required to enable the transaction • Can use non-standard ports, reverse connections, encapsulation in other protocols (e.g. HTTP) • Exact configuration & persistence method depend on the seller • Tasking-based C2 is very rare in marketplaces since it doesn’t naturally fit the above 3 criteria • Once the buyer goes in, a different mechanism may be put in place
  • 21. © 2017 Cybereason Inc. All rights reserved. TTPs of Seller-Marketplace-Buyer Relationship Priv.Esc. • Priv.Esc. – Admin access is worth more than unprivileged user access. • Process / installed software enumeration and browser history enumeration. Relevant software and browsing history can up the price of a compromised machine by 100x
  • 22. © 2017 Cybereason Inc. All rights reserved. TTPs Detection – How to break the system? Change in C2 • From known malicious IP / domain to unknown IP / domain • From straight IP / domain to DGA • Question connections to RDP service – especially on already compromised machines • Long lasting connections • Change in RDP configuration • Question unfamiliar modules loaded as part of the remote assistance service
  • 23. © 2017 Cybereason Inc. All rights reserved. TTPs Detection – How to break the system? Change in privileges • Monitor for processes performing priv.esc. – especially on already compromised machines • Process / Installed software enumeration and browser history enumeration • Stop of previous attack? In most cases – Not a good indicator… (No code of conduct for this on most marketplaces)
  • 24. © 2017 Cybereason Inc. All rights reserved. House of Cards Successful defense doesn’t mean stopping every stage of the attack… …find one component of the hack and, over time, the entire operation can collapse.
  • 25. © 2017 Cybereason Inc. All rights reserved. Returning Power to the Defenders Be Proactive! Establish visibility! Hunt for cyber kill chain behaviors! Time Success Rate Attackers Defenders
  • 26. © 2017 Cybereason Inc. All rights reserved. you. Thank www.cybereason.com