SlideShare a Scribd company logo
1
YO SIGO TRABAJANDO
EN CASA
Christian.Ramos@rsa.com
Senior System Engineer Bolivia,
Ecuador & Perú
3
 Internal Use -
Confidential
MANAGING DIGITAL RISK
AMID DISRUPTION
Accelerate threat detection and response from the endpoint to the cloud
For Security Digital Transformation
Sonia.Cordova@rsa.com Gabriela.Valdivia@rsa.com
Territory Manager NOLA Sr SecurID Account Manager
MaryPaz.Castillo@rsa.com Christian.Ramos@rsa.com
Channels Mexico, CA, Caribe & NOLA Senior System Engineer Bolivia, Ecuador & Perú
4
DIGITAL
TRANSFORMATION
5
MODERNIZATION
Digital
Business
IoT
Social
Media
Cloud
Robotics
6
MODERNIZATION
Digital
Business
IoT
Social
Media
Cloud
Robotics
Hackers &
Malware
Vulnerabilities
Phishing
MALICE
7
MALICEMODERNIZATION
MANDATES
Digital
Business
IoT
Social
Media
Cloud
Robotics
Hackers &
Malware
Vulnerabilities
Phishing
Regulatory
Change
Corporate
Governance
GDPR
Privacy
8
TRANSFORMACIÓN DIGITAL
S O S T E N I B I L I D A D. C R E C I M I E N TO. E F I C I E N C I A .
8
Objetivo: Agrega valor en
cada componente del
proceso de negocio, de
manera coherente a la
estrategia general.
Tranformación Digital
Las cuatro tendencias:
 “Los móviles no son una plataforma más, sino la
primera”
 La Nube. “Vamos a ser capaces de definir todas
nuestras infraestructuras por software”
 Lo Social. “El negocio quiere integrarse en la vida
del usuario y nos afecta”
 Big data. “En la parte de IAM no sabemos qué
hacer, porque definir los controles de acceso va a
ser complicado. De ahí que deba haber algún tipo
de gestión diferente”.
9
 Internal Use -
Confidential
9
S U P P LY C H A I N S E C U R I T Y
O P E R AT I O N S W O R K F O R C E
DISRUPTIONDISRUPTIONIoT
Robotics
Vulnerabilities
Phishing
Privacy
GDPR
Cloud
10
 Internal Use -
Confidential
10
S E C U R I T Y
O P E R AT I O N S W O R K F O R C E
DISRUPTIONDISRUPTION CONTAIN ADAPTASSESSSUSTAIN
Address
compliance changes
Manage risk
assessments
Address
heightened threats
Address cloud
threats
Manage vendor
ecosystem
(who, what, where, why)
Manage
continuity efforts
Manage vendor
disruption
(supply chain continuity)
Manage
identity threats
Expand remote
workforce securely
Ensure proper
data access
MANAGE
PROCESS
AUTOMATION
RISK
MANAGE
PROCESS
AUTOMATION
RISK
MITIGATE CYBER
ATTACK RISK
MITIGATE CYBER
ATTACK RISK
BUILD BUSINESS
RESILIENCY
BUILD BUSINESS
RESILIENCY
SECURE YOUR
CLOUD
TRANSFORMATION
SECURE YOUR
CLOUD
TRANSFORMATION
EVOLVE DATA
GOVERNANCE &
PRIVACY
EVOLVE DATA
GOVERNANCE &
PRIVACY
MANAGE
THIRD
PARTY RISK
MANAGE
THIRD
PARTY RISK
MANAGE DYNAMIC
WORKFORCE RISK
MANAGE DYNAMIC
WORKFORCE RISK
MODERNIZE YOUR
COMPLIANCE
PROGRAM
MODERNIZE YOUR
COMPLIANCE
PROGRAM
S U P P LY C H A I N
12
 Internal Use -
Confidential
12
DIGITAL
TRANSFORMATION
VISIBILITY
ACTION
INSIGHT
D I G I TA L
R IS K MA N A G EME NT
RISK
MANAGEMENT
IT SECURITY
13
 Internal Use -
Confidential
13
Understand & Respond
to Cyber-Threats
Evolve
Security & Risk
Manage Complex
Regulatory Landscape
MANAGE DYNAMIC
WORKFORCE RISK
MANAGE PROCESS
AUTOMATION RISK
SECURE YOUR CLOUD
TRANSFORMATION
MODERNIZE YOUR
COMPLIANCE PROGRAM
BUILD BUSINESS
RESILIENCY
MANAGE THIRD
PARTY RISK
EVOLVE DATA
GOVERNANCE & PRIVACY
MITIGATE CYBER
ATTACK RISK
DIGITAL
RISK MANAGEMENT
14
 Internal Use -
Confidential
RSA PORTAFOLIO
Single, Unified Solution To
Detect And Respond To Evolving Threats
 Netwitness Logs
 Netwitness Network
 Netwitness Endpoint
 Netwitness Cyber Incident and Breach Response
 Netwitness User and Entity Behavior Analytics
 Netwitness Orchestrator
Accelerate Business While You
Mitigate Identity Risk
 SecurID – Authentication Manager
 SecurID Access – MFA
 Identity Governance & Lifecycle
Centralized Cross Channel Fraud For
Unified Detection And Mitigation
 Fraud Action
 Adaptive Authentication
 Adaptive Authentication for Ecommerce
Proven Business Risk Management
Suite To Confidently
 IT Security & Risk
 Enterprise & Operational Risk
 3rd Party Governance
 Business Resiliency
 Public Sector
 Audit Management
 Regulatory & Corporate Compliance
15
 Internal Use -
Confidential
Fraud Prevention
& Mitigation
Identity
Management
Risk
Management
Identify, Monitor,
Detection, Prevention,
Respond, Restore?
IT SECURITY JOURNEY
16
 Internal Use -
Confidential
WHAT IS YOUR MANTRA IN IT SECURITY?
17
ATTACKERS TAKE ADVANTAGE OF CHALLENGES
TO TURN COMPROMISES INTO BREACHES
Minutes Hours Days Weeks Months
Breach
Detected
Breach
Detected
3rd Party
Detection
compromised in
MINUTES82% of exfiltration
occurred in DAYS99% discovered in
MONTHS64%
Spear Phishing
Attack
Malware
Installed
Initial Compromise
Communicate to
External Server
(C2)
Breach
Lateral
Movement
Discover
Critical Assets
Data
Exfiltration
18
TRADITIONAL METHODS WON’T PROTECT YOU
“Traditional defense-in-depth components are still necessary, but are no longer sufficient
in protecting against advanced targeted attacks and advanced malware” – Gartner
Source: Gartner’s “Five Styles of Advanced Threat Defense”
Network Traffic Analysis
Style 1
Payload Analysis
Style 3
Endpoint Behavior Analysis
Style 4
Network Forensics
Style 2
Endpoint Forensics
Style 5
Where
to Look
Network
Payload
Endpoint
Time
SIEM
NBA – NTA - NFA
EDR
19
VPN
20
EVOLUTION OF THREAT ACTORS & DETECTION
IMPLICATIONS
Firewall
IDS/IPS
Antivirus
Antimalware
Correlacionador
SIEM
CAPA DE
SEGURIDAD TRADICIONAL
Visibilidad
delaRED
Visibilidad
delTERMINAL
Tecnologías
Operacionales
Tecnologías
de información
INFORMACION
OBJETIVO
INFRAESTRUCTURA
CAPA DE
SEGURIDAD AVANZADA
ESPACIOBLANCO
NOVIGILADO
ATACANTES
21
Detect Respond
Network
RSA NetWitness
Endpoint
Logs
Orchestration
Endpoint
Logs
Network
RSA Advanced
Cyber Defense
RSA Incident
Response
RSA Professional
Services
Threat Intelligence (Live)
RSA ADVANCED SOC SOLUTIONS
22
METADATA
It’s the story behind the data
x.x.x.x 10.0.0.1 TCP/80
10.0.0.1 y.y.y.y UDP/53
China
Web
Server
Tor
Node
HTTP Post
no Get
Base64
Encoded
Payload
Encrypted
Zip File
Apache
runs
PowerShell
Command
line with Zip
Password
Payload is
FTP
Logs
Threat Intel
Network
Endpoint
In a single interface, at capture time
23
RSA NETWITNESS UEBA
BEHAVIOURAL
ANALYTICS
SMART Alerts around specific
use cases- e.g. Data exfiltration
Context around detected risks-
which user, what time / activity?
Investigation of each detected
alert anomaly
RSA NETWITNESS
LOGS
BEHAVIORAL
ANALYTICS
UNIQUE UNSUPERVISED
3 STAGE MACHINE LEARNING
OUTCOME
24
ANALYZING LOGON ACTIVITY - EXAMPLE
3,009
Indicators
56 Alerts
37
High Risk
Users
1.6B~Logon Events
7
Indicators
Abnormal Logon Time
Abnormal Source Computer
Abnormal Destination Computer
Multiple Successful Authentication
Multiple Failed Authentications
Multiple Source Computers
Multiple Destination Computers
Windows
Logons
(4624)
2 Months
5,000 AD users
1
Input
Source
Interactive Logons
4
Alerts
Brute Force
Authentication
Non-Standard
Hours
User Login to
Abnormal Computer
User Logins to
Multiple Hosts
25
CONNECTING THE DOTS. LITERALLY.
EFFECTIVE ANOMALY DETECTION IN ACTION
User: Randall S. Anderson
Raw events
Threat Indicators
Correlated alert with scoring
26
CONNECTING THE DOTS. LITERALLY.
EFFECTIVE ANOMALY DETECTION IN ACTION
User: Randall S. Anderson
Raw events
Threat Indicators
Correlated alert with scoring
27
CONNECTING THE DOTS. LITERALLY.
EFFECTIVE ANOMALY DETECTION IN ACTION
User: Randall S. Anderson
Raw events
Threat Indicators
Correlated alerts with scoring
 Alert Score = 15
28CONFIDENTIAL
VISUALIZING HOW UEBA WORKS
WITH EXISTING RSA NETWITNESS LOGS
Data from Existing RSA
NetWitness Deployment
Creates baseline of normal
behavior
UEBA
Monitors Indicators /
Continues to Collect Data
Indicator 1 Indicator 2
Indicator 3 Indicator 4
Anomalies DetectedAnomalies Grouped Together
Uniqueness: High
Severity: High
29CONFIDENTIAL
SUPERVISED VS. UNSUPERVISED MACHINE
LEARNING
Supervised Machine
Learning
Item Attribute 1 Attribute 2
Large Red
Medium Red
Small Red
Large Green
Medium Green
Small Green
Large Blue
Medium Blue
Small Blue
Large Yellow
Medium Yellow
Small Yellow
?  Administrator has to
label data types
 The system tries to
decide what to do
based on learned labels
when data comes in
30
ORCHESTRATION & AUTOMATION
Gartner defines security orchestration, automation and response, or SOAR, as
technologies that enable organizations
• ORCHESTATION [to collect security threats data and alerts from different sources, where
incident analysis and triage can be performed leveraging a combination of human and
machine power]
• AUTOMATION [to help define, prioritize and drive standardized incident response activities
according to a standard workflow.]
SOAR tools allow an organization to define incident analysis and response procedures (aka
plays in a security operations playbook) in a digital workflow format, such that a range of
machine-driven activities can be automated.
31
RSA NETWITNESS ORCHESTATOR
AUTHENTICATION
DATA ENRICHMENT
VULNERABILITY
SIEM
THREAT
INTEL
NETWORK
FORENSICS
ANALYTICS
BYOI
CASE MANAGEMENT
ALERTS
/INCIDENTS
COLLABORATIONUSER/ENTITY
RESPONSE
ACTION
MACHINE
LEARNING
CASE
MANAGEMENT
AUTOMATED
PLAYBOOKS
32
EMPOWER ANALYSTS WITH RISK &
AUTOMATIONRSA NetWitness v11 Respond enables Essential
Incident Management actions for a SOC
RSA NetWitness Orchestrator enables
Advanced Incident Orchestration &
Automation Needs
RSA Archer Cyber Incident &
Breach Response enables a Business
response to declared Security Incidents
45
 Internal Use -
Confidential
45
INNOVATION TRUST LEADERSHIP ECOSYSTEM
IoT
Robotics
Vulnerabilities
Corporate
Governance
Privacy
GDPR
Cloud
Digital BusinessRegulatory
Change
Hackers
& Malware
 Encryption
 Authentication
 Fraud Risk Engine
 SIEM/SOAR
 Integrated Risk
Management
 35+ years
 12,500+ customers
 50M+ identities
 2B consumers
 94% of the
Fortune 500
 Recognized
leadership by
analyst firms
 Industry leading
events and
thought leadership
 Expertise, guided by
proven frameworks
 700+ practitioners
 400+ global
partners
 1100+ product
integrations
 Robust customer
community
WHY RSA
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS

More Related Content

PDF
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Cristian Garcia G.
 
PDF
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
Cristian Garcia G.
 
PPTX
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
PPTX
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
Cristian Garcia G.
 
PPTX
INFINITY Presentation
Cristian Garcia G.
 
PDF
DTS Solution - Cyber Security Services Portfolio
Shah Sheikh
 
PPTX
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Cristian Garcia G.
 
PPTX
Cloud Security Strategy by McAfee
Cristian Garcia G.
 
TENDENCIAS DE SEGURIDAD PARA AMBIENTES EN LA NUBE
Cristian Garcia G.
 
DETENIENDO LOS ATAQUES DDOS CON NSFOCUS
Cristian Garcia G.
 
Nube, Cumplimiento y Amenazas avanzadas: Consideraciones de Seguridad para la...
Cristian Garcia G.
 
RETOS ACTUALES E INNOVACIÓN SOBRE EL CONTROL DE ACCESOS PRIVILEGIADOS.
Cristian Garcia G.
 
INFINITY Presentation
Cristian Garcia G.
 
DTS Solution - Cyber Security Services Portfolio
Shah Sheikh
 
Porque las Amenazas avanzadas requieren de una Seguridad para Aplicaciones av...
Cristian Garcia G.
 
Cloud Security Strategy by McAfee
Cristian Garcia G.
 

What's hot (20)

PPTX
Empowering Digital Transformation in Financial Services
Cristian Garcia G.
 
PDF
Cyber Security Governance
Priyanka Aash
 
PDF
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Cristian Garcia G.
 
PPTX
El Futuro de la Cibersegu
Cristian Garcia G.
 
PPTX
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Dejan Jeremic
 
PPTX
kill-chain-presentation-v3
Shawn Croswell
 
PDF
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
Shah Sheikh
 
PDF
DTS Solution - Company Presentation
Shah Sheikh
 
PDF
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
infoLock Technologies
 
PDF
DTS Solution - Red Team - Penetration Testing
Shah Sheikh
 
PPTX
Ascendiendo a la GEN V de Cyber Security
Cristian Garcia G.
 
PDF
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Shah Sheikh
 
PPTX
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
PPTX
Seguridad en Capas: Smart & Actionable Data
Cristian Garcia G.
 
PDF
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
Cristian Garcia G.
 
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
PPTX
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
 
PDF
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 
PPTX
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Cristian Garcia G.
 
PDF
DTS Solution - Company Presentation
Shah Sheikh
 
Empowering Digital Transformation in Financial Services
Cristian Garcia G.
 
Cyber Security Governance
Priyanka Aash
 
Seguridad: Realidad o Ficción: Control y Seguridad en sus Aplicaciones F5
Cristian Garcia G.
 
El Futuro de la Cibersegu
Cristian Garcia G.
 
Ict 2015 saga - cisco cybersecurity rešenja- Viktor Varga
Dejan Jeremic
 
kill-chain-presentation-v3
Shawn Croswell
 
ISACA 2019 Amman Chapter - Shah Sheikh - Cyber Resilience
Shah Sheikh
 
DTS Solution - Company Presentation
Shah Sheikh
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
infoLock Technologies
 
DTS Solution - Red Team - Penetration Testing
Shah Sheikh
 
Ascendiendo a la GEN V de Cyber Security
Cristian Garcia G.
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Shah Sheikh
 
Desafíos de la Ciberseguridad en un ecosistema digitalmente transformado
Cristian Garcia G.
 
Seguridad en Capas: Smart & Actionable Data
Cristian Garcia G.
 
BUSCAS UNA SEGURIDAD INTEGRADA Y DINÁMICA? ; INTELIGENCIA Y COLABORACIÓN LA ...
Cristian Garcia G.
 
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Scalar Decisions
 
Reduciendo su riesgo cibernético midiendo su Cyber Exposure
Cristian Garcia G.
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
EnterpriseGRC Solutions, Inc.
 
Últimos retos en el ámbito de la Ciberseguridad: Análisis de amenazas Ciberné...
Cristian Garcia G.
 
DTS Solution - Company Presentation
Shah Sheikh
 
Ad

Similar to DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS (20)

PPTX
Be the Hunter
Rahul Neel Mani
 
PDF
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
PDF
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
Skybox Security
 
PDF
Kaspersky Lab new Enterprise Portfolio
Kaspersky
 
PDF
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
NetworkCollaborators
 
PPTX
Best Practices for Scoping Infections and Disrupting Breaches
Splunk
 
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
PDF
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
PPT
Cognitive security
Iqra khalil
 
PDF
Whitepaper IBM Qradar Security Intelligence
Camilo Fandiño Gómez
 
PPTX
Haystax: Actionable Intelligence Platform
Haystax Technology
 
PDF
Tenable Solutions for Enterprise Cloud Security
MarketingArrowECS_CZ
 
PPTX
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP
 
PDF
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
James Perry, Jr.
 
PPTX
2016 - Cyber Security for the Public Sector
Scott Geye
 
PDF
CCA study group
IIBA UK Chapter
 
PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson
 
PPTX
Haystax Technology - About Us
Haystax Technology
 
PDF
Anatomy of a cyber attack
Mark Silver
 
Be the Hunter
Rahul Neel Mani
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
itnewsafrica
 
Infosec 2014: Intelligence as a Service: The Future of Frontline Security
Skybox Security
 
Kaspersky Lab new Enterprise Portfolio
Kaspersky
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
NetworkCollaborators
 
Best Practices for Scoping Infections and Disrupting Breaches
Splunk
 
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
Cognitive security
Iqra khalil
 
Whitepaper IBM Qradar Security Intelligence
Camilo Fandiño Gómez
 
Haystax: Actionable Intelligence Platform
Haystax Technology
 
Tenable Solutions for Enterprise Cloud Security
MarketingArrowECS_CZ
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
James Perry, Jr.
 
2016 - Cyber Security for the Public Sector
Scott Geye
 
CCA study group
IIBA UK Chapter
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Angeloluca Barba
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
James Anderson
 
Haystax Technology - About Us
Haystax Technology
 
Anatomy of a cyber attack
Mark Silver
 
Ad

More from Cristian Garcia G. (20)

PDF
Ciberamenazas en el Horizonte: Estrategias de Defensa para la Industria
Cristian Garcia G.
 
PPTX
El imperativo de la seguridad de la identidad
Cristian Garcia G.
 
PPTX
Como una solución de NSPM puede ayudarle a mejorar su postura de seguridad, r...
Cristian Garcia G.
 
PPTX
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
PPTX
TENDENCIAS EN EL MERCADO DE LA CIBERSEGURIDAD
Cristian Garcia G.
 
PPTX
Seguridad de Datos Unificada NETSKOPE Daniel Santoyo
Cristian Garcia G.
 
PPTX
Del SIEM Tradicional al SOC del Futuro: La Evolución Inteligente con Stellar ...
Cristian Garcia G.
 
PPTX
La Brecha Silenciosa: ¿Estás Realmente Protegido?
Cristian Garcia G.
 
PPTX
Madurando sus caminos para acceder a privilegios: Por qué debe madurar su enf...
Cristian Garcia G.
 
PPTX
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
Cristian Garcia G.
 
PPTX
Gestión Integral del Riesgo: La Revolución del ROC en la Ciberseguridad Empre...
Cristian Garcia G.
 
PPTX
Gestionando amenazas y no incidentes de ciberseguridad…el camino de Tenable.
Cristian Garcia G.
 
PPTX
Protegiendo Identidades y Transacciones Críticas en el Mundo Digital.
Cristian Garcia G.
 
PPTX
Ciberseguridad en la Era de la IA: Estrategias y Habilitadores para los CISOs...
Cristian Garcia G.
 
PDF
Estrategia de prevencion contra fraude electronico y financiero
Cristian Garcia G.
 
PDF
BEYONDTRUST - Protegiendo Rutas al Privilegio
Cristian Garcia G.
 
PDF
Unifica la seguridad de tus operaciones con la plataforma de Cortex XDR
Cristian Garcia G.
 
PDF
FIREMON - Postura de Perimetro y Cumplimiento
Cristian Garcia G.
 
PDF
Implementando Zero Standing Privilege: Acelere sus iniciativas estratégicas
Cristian Garcia G.
 
PDF
NETSKOPE Proteger y acelerar todo a todas partes
Cristian Garcia G.
 
Ciberamenazas en el Horizonte: Estrategias de Defensa para la Industria
Cristian Garcia G.
 
El imperativo de la seguridad de la identidad
Cristian Garcia G.
 
Como una solución de NSPM puede ayudarle a mejorar su postura de seguridad, r...
Cristian Garcia G.
 
Reimaginando la Ciberdefensa: De Copilots a Redes de Agentes
Cristian Garcia G.
 
TENDENCIAS EN EL MERCADO DE LA CIBERSEGURIDAD
Cristian Garcia G.
 
Seguridad de Datos Unificada NETSKOPE Daniel Santoyo
Cristian Garcia G.
 
Del SIEM Tradicional al SOC del Futuro: La Evolución Inteligente con Stellar ...
Cristian Garcia G.
 
La Brecha Silenciosa: ¿Estás Realmente Protegido?
Cristian Garcia G.
 
Madurando sus caminos para acceder a privilegios: Por qué debe madurar su enf...
Cristian Garcia G.
 
Simplifica la seguridad en la nube y la detección de amenazas con FortiCNAPP
Cristian Garcia G.
 
Gestión Integral del Riesgo: La Revolución del ROC en la Ciberseguridad Empre...
Cristian Garcia G.
 
Gestionando amenazas y no incidentes de ciberseguridad…el camino de Tenable.
Cristian Garcia G.
 
Protegiendo Identidades y Transacciones Críticas en el Mundo Digital.
Cristian Garcia G.
 
Ciberseguridad en la Era de la IA: Estrategias y Habilitadores para los CISOs...
Cristian Garcia G.
 
Estrategia de prevencion contra fraude electronico y financiero
Cristian Garcia G.
 
BEYONDTRUST - Protegiendo Rutas al Privilegio
Cristian Garcia G.
 
Unifica la seguridad de tus operaciones con la plataforma de Cortex XDR
Cristian Garcia G.
 
FIREMON - Postura de Perimetro y Cumplimiento
Cristian Garcia G.
 
Implementando Zero Standing Privilege: Acelere sus iniciativas estratégicas
Cristian Garcia G.
 
NETSKOPE Proteger y acelerar todo a todas partes
Cristian Garcia G.
 

Recently uploaded (20)

PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
PDF
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
PPTX
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PPTX
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
NewMind AI Weekly Chronicles - July'25 - Week IV
NewMind AI
 
Accelerating Oracle Database 23ai Troubleshooting with Oracle AHF Fleet Insig...
Sandesh Rao
 
New ThousandEyes Product Innovations: Cisco Live June 2025
ThousandEyes
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
cloud computing vai.pptx for the project
vaibhavdobariyal79
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 

DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS

  • 1. 1 YO SIGO TRABAJANDO EN CASA [email protected] Senior System Engineer Bolivia, Ecuador & Perú
  • 2. 3  Internal Use - Confidential MANAGING DIGITAL RISK AMID DISRUPTION Accelerate threat detection and response from the endpoint to the cloud For Security Digital Transformation [email protected] [email protected] Territory Manager NOLA Sr SecurID Account Manager [email protected] [email protected] Channels Mexico, CA, Caribe & NOLA Senior System Engineer Bolivia, Ecuador & Perú
  • 7. 8 TRANSFORMACIÓN DIGITAL S O S T E N I B I L I D A D. C R E C I M I E N TO. E F I C I E N C I A . 8 Objetivo: Agrega valor en cada componente del proceso de negocio, de manera coherente a la estrategia general. Tranformación Digital Las cuatro tendencias:  “Los móviles no son una plataforma más, sino la primera”  La Nube. “Vamos a ser capaces de definir todas nuestras infraestructuras por software”  Lo Social. “El negocio quiere integrarse en la vida del usuario y nos afecta”  Big data. “En la parte de IAM no sabemos qué hacer, porque definir los controles de acceso va a ser complicado. De ahí que deba haber algún tipo de gestión diferente”.
  • 8. 9  Internal Use - Confidential 9 S U P P LY C H A I N S E C U R I T Y O P E R AT I O N S W O R K F O R C E DISRUPTIONDISRUPTIONIoT Robotics Vulnerabilities Phishing Privacy GDPR Cloud
  • 9. 10  Internal Use - Confidential 10 S E C U R I T Y O P E R AT I O N S W O R K F O R C E DISRUPTIONDISRUPTION CONTAIN ADAPTASSESSSUSTAIN Address compliance changes Manage risk assessments Address heightened threats Address cloud threats Manage vendor ecosystem (who, what, where, why) Manage continuity efforts Manage vendor disruption (supply chain continuity) Manage identity threats Expand remote workforce securely Ensure proper data access MANAGE PROCESS AUTOMATION RISK MANAGE PROCESS AUTOMATION RISK MITIGATE CYBER ATTACK RISK MITIGATE CYBER ATTACK RISK BUILD BUSINESS RESILIENCY BUILD BUSINESS RESILIENCY SECURE YOUR CLOUD TRANSFORMATION SECURE YOUR CLOUD TRANSFORMATION EVOLVE DATA GOVERNANCE & PRIVACY EVOLVE DATA GOVERNANCE & PRIVACY MANAGE THIRD PARTY RISK MANAGE THIRD PARTY RISK MANAGE DYNAMIC WORKFORCE RISK MANAGE DYNAMIC WORKFORCE RISK MODERNIZE YOUR COMPLIANCE PROGRAM MODERNIZE YOUR COMPLIANCE PROGRAM S U P P LY C H A I N
  • 10. 12  Internal Use - Confidential 12 DIGITAL TRANSFORMATION VISIBILITY ACTION INSIGHT D I G I TA L R IS K MA N A G EME NT RISK MANAGEMENT IT SECURITY
  • 11. 13  Internal Use - Confidential 13 Understand & Respond to Cyber-Threats Evolve Security & Risk Manage Complex Regulatory Landscape MANAGE DYNAMIC WORKFORCE RISK MANAGE PROCESS AUTOMATION RISK SECURE YOUR CLOUD TRANSFORMATION MODERNIZE YOUR COMPLIANCE PROGRAM BUILD BUSINESS RESILIENCY MANAGE THIRD PARTY RISK EVOLVE DATA GOVERNANCE & PRIVACY MITIGATE CYBER ATTACK RISK DIGITAL RISK MANAGEMENT
  • 12. 14  Internal Use - Confidential RSA PORTAFOLIO Single, Unified Solution To Detect And Respond To Evolving Threats  Netwitness Logs  Netwitness Network  Netwitness Endpoint  Netwitness Cyber Incident and Breach Response  Netwitness User and Entity Behavior Analytics  Netwitness Orchestrator Accelerate Business While You Mitigate Identity Risk  SecurID – Authentication Manager  SecurID Access – MFA  Identity Governance & Lifecycle Centralized Cross Channel Fraud For Unified Detection And Mitigation  Fraud Action  Adaptive Authentication  Adaptive Authentication for Ecommerce Proven Business Risk Management Suite To Confidently  IT Security & Risk  Enterprise & Operational Risk  3rd Party Governance  Business Resiliency  Public Sector  Audit Management  Regulatory & Corporate Compliance
  • 13. 15  Internal Use - Confidential Fraud Prevention & Mitigation Identity Management Risk Management Identify, Monitor, Detection, Prevention, Respond, Restore? IT SECURITY JOURNEY
  • 14. 16  Internal Use - Confidential WHAT IS YOUR MANTRA IN IT SECURITY?
  • 15. 17 ATTACKERS TAKE ADVANTAGE OF CHALLENGES TO TURN COMPROMISES INTO BREACHES Minutes Hours Days Weeks Months Breach Detected Breach Detected 3rd Party Detection compromised in MINUTES82% of exfiltration occurred in DAYS99% discovered in MONTHS64% Spear Phishing Attack Malware Installed Initial Compromise Communicate to External Server (C2) Breach Lateral Movement Discover Critical Assets Data Exfiltration
  • 16. 18 TRADITIONAL METHODS WON’T PROTECT YOU “Traditional defense-in-depth components are still necessary, but are no longer sufficient in protecting against advanced targeted attacks and advanced malware” – Gartner Source: Gartner’s “Five Styles of Advanced Threat Defense” Network Traffic Analysis Style 1 Payload Analysis Style 3 Endpoint Behavior Analysis Style 4 Network Forensics Style 2 Endpoint Forensics Style 5 Where to Look Network Payload Endpoint Time SIEM NBA – NTA - NFA EDR
  • 18. 20 EVOLUTION OF THREAT ACTORS & DETECTION IMPLICATIONS Firewall IDS/IPS Antivirus Antimalware Correlacionador SIEM CAPA DE SEGURIDAD TRADICIONAL Visibilidad delaRED Visibilidad delTERMINAL Tecnologías Operacionales Tecnologías de información INFORMACION OBJETIVO INFRAESTRUCTURA CAPA DE SEGURIDAD AVANZADA ESPACIOBLANCO NOVIGILADO ATACANTES
  • 19. 21 Detect Respond Network RSA NetWitness Endpoint Logs Orchestration Endpoint Logs Network RSA Advanced Cyber Defense RSA Incident Response RSA Professional Services Threat Intelligence (Live) RSA ADVANCED SOC SOLUTIONS
  • 20. 22 METADATA It’s the story behind the data x.x.x.x 10.0.0.1 TCP/80 10.0.0.1 y.y.y.y UDP/53 China Web Server Tor Node HTTP Post no Get Base64 Encoded Payload Encrypted Zip File Apache runs PowerShell Command line with Zip Password Payload is FTP Logs Threat Intel Network Endpoint In a single interface, at capture time
  • 21. 23 RSA NETWITNESS UEBA BEHAVIOURAL ANALYTICS SMART Alerts around specific use cases- e.g. Data exfiltration Context around detected risks- which user, what time / activity? Investigation of each detected alert anomaly RSA NETWITNESS LOGS BEHAVIORAL ANALYTICS UNIQUE UNSUPERVISED 3 STAGE MACHINE LEARNING OUTCOME
  • 22. 24 ANALYZING LOGON ACTIVITY - EXAMPLE 3,009 Indicators 56 Alerts 37 High Risk Users 1.6B~Logon Events 7 Indicators Abnormal Logon Time Abnormal Source Computer Abnormal Destination Computer Multiple Successful Authentication Multiple Failed Authentications Multiple Source Computers Multiple Destination Computers Windows Logons (4624) 2 Months 5,000 AD users 1 Input Source Interactive Logons 4 Alerts Brute Force Authentication Non-Standard Hours User Login to Abnormal Computer User Logins to Multiple Hosts
  • 23. 25 CONNECTING THE DOTS. LITERALLY. EFFECTIVE ANOMALY DETECTION IN ACTION User: Randall S. Anderson Raw events Threat Indicators Correlated alert with scoring
  • 24. 26 CONNECTING THE DOTS. LITERALLY. EFFECTIVE ANOMALY DETECTION IN ACTION User: Randall S. Anderson Raw events Threat Indicators Correlated alert with scoring
  • 25. 27 CONNECTING THE DOTS. LITERALLY. EFFECTIVE ANOMALY DETECTION IN ACTION User: Randall S. Anderson Raw events Threat Indicators Correlated alerts with scoring  Alert Score = 15
  • 26. 28CONFIDENTIAL VISUALIZING HOW UEBA WORKS WITH EXISTING RSA NETWITNESS LOGS Data from Existing RSA NetWitness Deployment Creates baseline of normal behavior UEBA Monitors Indicators / Continues to Collect Data Indicator 1 Indicator 2 Indicator 3 Indicator 4 Anomalies DetectedAnomalies Grouped Together Uniqueness: High Severity: High
  • 27. 29CONFIDENTIAL SUPERVISED VS. UNSUPERVISED MACHINE LEARNING Supervised Machine Learning Item Attribute 1 Attribute 2 Large Red Medium Red Small Red Large Green Medium Green Small Green Large Blue Medium Blue Small Blue Large Yellow Medium Yellow Small Yellow ?  Administrator has to label data types  The system tries to decide what to do based on learned labels when data comes in
  • 28. 30 ORCHESTRATION & AUTOMATION Gartner defines security orchestration, automation and response, or SOAR, as technologies that enable organizations • ORCHESTATION [to collect security threats data and alerts from different sources, where incident analysis and triage can be performed leveraging a combination of human and machine power] • AUTOMATION [to help define, prioritize and drive standardized incident response activities according to a standard workflow.] SOAR tools allow an organization to define incident analysis and response procedures (aka plays in a security operations playbook) in a digital workflow format, such that a range of machine-driven activities can be automated.
  • 29. 31 RSA NETWITNESS ORCHESTATOR AUTHENTICATION DATA ENRICHMENT VULNERABILITY SIEM THREAT INTEL NETWORK FORENSICS ANALYTICS BYOI CASE MANAGEMENT ALERTS /INCIDENTS COLLABORATIONUSER/ENTITY RESPONSE ACTION MACHINE LEARNING CASE MANAGEMENT AUTOMATED PLAYBOOKS
  • 30. 32 EMPOWER ANALYSTS WITH RISK & AUTOMATIONRSA NetWitness v11 Respond enables Essential Incident Management actions for a SOC RSA NetWitness Orchestrator enables Advanced Incident Orchestration & Automation Needs RSA Archer Cyber Incident & Breach Response enables a Business response to declared Security Incidents
  • 31. 45  Internal Use - Confidential 45 INNOVATION TRUST LEADERSHIP ECOSYSTEM IoT Robotics Vulnerabilities Corporate Governance Privacy GDPR Cloud Digital BusinessRegulatory Change Hackers & Malware  Encryption  Authentication  Fraud Risk Engine  SIEM/SOAR  Integrated Risk Management  35+ years  12,500+ customers  50M+ identities  2B consumers  94% of the Fortune 500  Recognized leadership by analyst firms  Industry leading events and thought leadership  Expertise, guided by proven frameworks  700+ practitioners  400+ global partners  1100+ product integrations  Robust customer community WHY RSA