SlideShare a Scribd company logo
Security event presentation 3.4.2016-final
Gavin Zimmer
VicePresident of Sales
Cal NetTechnology Group
Southern California’s Premier IT Service Provider
Cal Net Technology Group (CNTG)
03
WE START WITH OUR MISSION
AND PURPOSE…
MISSION
Cal Net Technology Group (CNTG)
03
Our Mission is to Enable IT Solutions in our
clients’ organizations to allow them to focus their
business on what they do, and do what they
do more effectively.
PURPOSE
Cal Net Technology Group (CNTG)
03
to be AN Extension of your IT Department
Managed
Services
Remote & Onsite
BPO
NOC
Security
Pro
Services
Subject Matter
Expertise
Virtual CIO & CISO
AdvancedTechnology
Integration
Physical,
Virtual &
Cloud
Plan
Design
Acquire
Deploy
ORGANIZATION
Cal Net Technology Group (CNTG)
 Shared Services
 Shared Resources
 Integrated Processes
 Separate P&L
 Integrated Into Specialist Sales
Motion
Three Autonomous Business Units
03
FLEXIBLE PATHS
CNTG’s Differentiated GTM Model
Direct Verticals
Business Alignment
Partner Based
(Joint)
Infrastructure/ISV
Subcontracting
Managed & Pro
Services
Private Label
Managed/Pro Services/BPM
 Public Sector to
Commercial (Vertical)
 Horizontal (Emerging
Growth to Reserved
Accounts)
 Plan, Build & Run
Operating Model
 Joint Managed and
Professional Services
Engineers Coordinated
 Standardization where
possible
 Lead Generation could be
combined with Sub &
Private Label
 Transactional to
management of
outcomes
 Leverage 75+ W2
Certified Professional
Services Resources
 Non-circumvent and
non-compete
covenants
 Custom NOC & SOC
Operations Tailored to
Protecting Brand
 Include Managed Service
Offerings, Security Offerings
and Professional Services
 Non circumvent and non-
compete covenants
Certified and Capable: Industry Specific Accreditations
02
MAJOR VENDORS SPECIFIC SOLUTION VENDORS
OFFERINGS
CNTG’s Diversified Offerings
03
ACCOMPLISHMENTS
CNTG’s Success Stories
04
Industry
Awards Manufacturing Finance & Legal
Education
& Non Profit Retail Entertainment
Microsoft Partner
of the Year
2013-2015
Marvin
Engineering
Fishman,
Diamond & Block
Goodwill
Coffee Bean
& Tea Leaf
Director’s Guild
of America
LA Business
Journal CIO’s IT
Service Partner
of the Year
Kaiser
Aluminum
Hotchkis & Wiley LACMA Fox Rental Car
Writer’s Guild
of America
MSP Mentor Top
150 Worldwide
Meggitt ACLU
Skirball Cultural
Center
True Religion
Bunim-Murray
Productions
Best Places
to Work
Glenair
Dignified
Home Loans
Harvard-Westlake
Wolfgang Puck
Worldwide
NBC Universal
Inc. 5000 Fastest
Growing
Companies in
North America
Kyocera
Berkshire
Hathaway
Modern
Health Care
JetEdge
Screen Actors
Guild
Matt Lindley
Director of Security Services
Cal NetTechnology Group
Southern California’s Premier IT Service Provider
CYBERCRIME TRENDS & TARGETS
IT Security Budget & Level of Protection
ValueofExploitableAssets Enterprise
Small Business
Cybercriminal Sweet SpotMid-size Business
205 days is the average amount of time organizations
had been compromised before they knew it
– FireEye/Mandiant - 2015
You are just finding out today that your
network was compromised on
August 12th 2015
“There are only two types of companies: those that have
been hacked and those that will be.”
- 2012 Robert Mueller, Former FBI Director
VICTIM,VULNERABLE OR VAGUE
Don’t Know
They’ve
Already
Been Hacked
Will Be Hacked
Have Been
Hacked
More than 80 percent of
U.S. companies have been
successfully hacked,
according to a Duke
University/CFO Magazine
Global Business Outlook
Survey.
The average cost for detection and escalation only subsequent
to a security breach is approximately $417,700*
- Ponemon Institute & IBM 2015 – Cost of Data Breach Report * Cost does not include:
Average Total Cost of Data Breach $3.8 Million
Loss of business (Brand)
Remediation and
mitigation costs
Notification
Identity Protection
THE EVOLUTION OF THREATS
“Never before in the history of human kind have people across
the world been subjected to extortion on a massive scale as they are
today”.
-Symantec : The evolution of Ransomware 2015
20051989 2008 2011 2013 2014 2015
RANSOMWARE TODAY
Cisco’s analysis of malware
validated as “known bad”
found that the majority of
that malware—91.3
percent—use the Domain
Name Service in one of
these three ways:
- To gain command and
control
- To exfiltrate data
- To redirect traffic
Security event presentation 3.4.2016-final
“99.9%
OF THE EXPLOITED
VULNERABILITIES
WERE COMPROMISED
MORE THAN A YEAR
AFTER THE CVE
WAS PUBLISHED.”
“About half of the CVEs
exploited in 2014 went
from publish to pwn in
less than a month.”
VERIZON 2015 DATA BREACH
INVESTIGATIONS REPORT
Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE
Identifiers) for publicly known cybersecurity vulnerabilities.
Security event presentation 3.4.2016-final
DEFENSE IN DEPTH
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
Perimeter
Network
DEFENSE IN DEPTH
Application
Data
Host
SIEM In Depth
VIIPR
THREAT
RESPONSE
FRAMEWORK
V
I
I
P
R
SECUREMANAGE ENTERPRISE
Security Solutions View Identify Investigate Prioritize Remediate
Managed SIEM Included
Performance, Availability and Change Monitoring Included
Threat Intelligence Center / Threat Feeds Included
Asset Management (CMDB) Included
Single Pane of Glass Portal with Unlimited Users* Included
Customized Dashboards for Security, Performance and Compliance Included
24x7 Event Alerting (Email, Pager/SMS, Dashboard) Included
Internal and External Vulnerability Scanning Included
Vulnerability Remediation Prioritization Included
System Hardening Checks Included
Compliance Alerting, Dashboards and Reporting for PCI, GLBA, FFIEC Included
Threat Monitoring, Analysis and Escalation Included
Expert SOC Analyst Remediation Recommendation Escalation Included
Security Event Remediation (Remote Only) Included
SECUREManage for Enterprise - Compliance
THANKYOU!
CAL NET
TECHNOLOGY GROUP

More Related Content

PDF
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
Monica Verma
 
PDF
Cloudflare Partner Program 2020
Dan Hollinger
 
PDF
Top 12 Cybersecurity Predictions for 2017
IBM Security
 
PDF
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
Scalar Decisions
 
PDF
Scalar security study2017_slideshare_rev[1]
Tracey Ong
 
PDF
Big or Small, it can happen to your business!
Wavecrest Computing
 
PDF
Digital Transformation and Security for the Modern Business Part 1 – Finance
Xenith Document Systems Ltd
 
DOCX
DBryant-Cybersecurity Challenge
msdee3362
 
2019 08-27 sikkerhetsfestivalen-cloud_security_infinitystones_present_en
Monica Verma
 
Cloudflare Partner Program 2020
Dan Hollinger
 
Top 12 Cybersecurity Predictions for 2017
IBM Security
 
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
Scalar Decisions
 
Scalar security study2017_slideshare_rev[1]
Tracey Ong
 
Big or Small, it can happen to your business!
Wavecrest Computing
 
Digital Transformation and Security for the Modern Business Part 1 – Finance
Xenith Document Systems Ltd
 
DBryant-Cybersecurity Challenge
msdee3362
 

What's hot (14)

PPTX
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cloudflare
 
PPTX
Data security 2016 trends and questions
Bill McCabe
 
PPTX
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Kevin Duffey
 
PDF
Security - A Digital Transformation Enabler
Alexander Akinjayeju. MSc, CISM, Prince2
 
PDF
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Statewide Insurance Brokers
 
PPTX
Cybersecurity 2020 threat landscape and its implications (AMER)
Cloudflare
 
PPTX
CS3: Cybersecurity Extortion & Fraud
Paige Rasid
 
PPTX
What is cloud computing
Hardik Kakadiya
 
PDF
Stopping DDoS Attacks in North America
Cloudflare
 
PPTX
Cyber Security 101
Cloudflare
 
PDF
Security for Smartgrid
Gruene-it.org
 
PPTX
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
Rea
 
PPTX
Cyber Resilience: managing 3rd Party Risks in Financial Services
Kevin Duffey
 
PDF
How to Build a Practical and Cost-Effective Security Strategy
Cloudflare
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cloudflare
 
Data security 2016 trends and questions
Bill McCabe
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Kevin Duffey
 
Security - A Digital Transformation Enabler
Alexander Akinjayeju. MSc, CISM, Prince2
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Statewide Insurance Brokers
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cloudflare
 
CS3: Cybersecurity Extortion & Fraud
Paige Rasid
 
What is cloud computing
Hardik Kakadiya
 
Stopping DDoS Attacks in North America
Cloudflare
 
Cyber Security 101
Cloudflare
 
Security for Smartgrid
Gruene-it.org
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
Rea
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Kevin Duffey
 
How to Build a Practical and Cost-Effective Security Strategy
Cloudflare
 
Ad

Viewers also liked (18)

PDF
Embracing Mobile First
CoreMedia
 
PDF
Msp deck v1.0
AccelOps
 
PPTX
KPN Getronics Portfolio informatie
KPN Getronics
 
PDF
OpenStack 101 Presentation
EVault
 
PDF
2014 Ecommerce Holiday Prep
Tenzing Managed IT Services
 
PPT
Zaptech Solutions - Software Development Company
Zaptech Solutions
 
PPT
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Easynet Connect
 
PDF
Grace Under Pressure
Vanguard
 
PPTX
Microsoft Office for the iPhone and iPad
Palmetto Technology Group
 
PDF
Optimizing the Monetization of a Connected Universe
Comverse, Inc.
 
PPTX
Agile - Scrum
Samir Chitkara
 
PPT
Arise EMEA - My Story Video Contest
Arise International
 
PPT
ECC Cloud and Security
Erlach Computer Consulting
 
PPTX
Call Management Services Should be Part of Every Business Telephone System
Mahindra Comviva
 
PPTX
Mhta.private.cloud.final.16.9
Virteva Inc.
 
PPS
KServe Retail Outlet
Kallos Solutions Pvt Ltd
 
PDF
High Performance Medical Reconstruction Using Stream Programming Paradigms
QuEST Global (erstwhile NeST Software)
 
PPTX
Get Your Head in the Cloud
Claris Networks
 
Embracing Mobile First
CoreMedia
 
Msp deck v1.0
AccelOps
 
KPN Getronics Portfolio informatie
KPN Getronics
 
OpenStack 101 Presentation
EVault
 
2014 Ecommerce Holiday Prep
Tenzing Managed IT Services
 
Zaptech Solutions - Software Development Company
Zaptech Solutions
 
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Easynet Connect
 
Grace Under Pressure
Vanguard
 
Microsoft Office for the iPhone and iPad
Palmetto Technology Group
 
Optimizing the Monetization of a Connected Universe
Comverse, Inc.
 
Agile - Scrum
Samir Chitkara
 
Arise EMEA - My Story Video Contest
Arise International
 
ECC Cloud and Security
Erlach Computer Consulting
 
Call Management Services Should be Part of Every Business Telephone System
Mahindra Comviva
 
Mhta.private.cloud.final.16.9
Virteva Inc.
 
KServe Retail Outlet
Kallos Solutions Pvt Ltd
 
High Performance Medical Reconstruction Using Stream Programming Paradigms
QuEST Global (erstwhile NeST Software)
 
Get Your Head in the Cloud
Claris Networks
 
Ad

Similar to Security event presentation 3.4.2016-final (20)

PDF
Insights success the 10 best performing cyber security solution providers 4th...
Insights success media and technology pvt ltd
 
PDF
Cal Net Tech Talk Webinar Vulnerability Management 101-10 Essential Rules to ...
Laryssa Mereszczak
 
PDF
Cal Net TechTalk Webinar - Vulnerability Management 101-10 Essential Rules to...
Cal Net Technology Group
 
PDF
Cyber Security
NC Military Business Center
 
PPTX
Standardizing and Strengthening Security to Lower Costs
OpenDNS
 
PDF
Cyber Security in a Fully Mobile World
University of Hertfordshire
 
PPTX
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
eGov Magazine
 
PDF
Addressing the cyber kill chain
Symantec Brasil
 
PDF
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
 
PDF
Journey to the Center of Security Operations
♟Sergej Epp
 
PPTX
CyberDen 2020
Fahad Al-Hasan
 
PDF
CIO Digest_July 2013 Issue
Patrick Spencer
 
PDF
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Withum
 
PPTX
Cybersecurity Presentation 6-11-15
Turner and Associates, Inc.
 
PPTX
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus
 
PDF
Detecting Stopping Advanced Attacks
Envision Technology Advisors
 
PPTX
Information Security and Data Breach Trends 2014-2015
Brian Levine
 
PPTX
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
PPTX
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Randall Chase
 
PDF
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
IBM India Smarter Computing
 
Insights success the 10 best performing cyber security solution providers 4th...
Insights success media and technology pvt ltd
 
Cal Net Tech Talk Webinar Vulnerability Management 101-10 Essential Rules to ...
Laryssa Mereszczak
 
Cal Net TechTalk Webinar - Vulnerability Management 101-10 Essential Rules to...
Cal Net Technology Group
 
Standardizing and Strengthening Security to Lower Costs
OpenDNS
 
Cyber Security in a Fully Mobile World
University of Hertfordshire
 
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
eGov Magazine
 
Addressing the cyber kill chain
Symantec Brasil
 
The 10 Fastest Growing Cyber Security Companies of 2017
Insights success media and technology pvt ltd
 
Journey to the Center of Security Operations
♟Sergej Epp
 
CyberDen 2020
Fahad Al-Hasan
 
CIO Digest_July 2013 Issue
Patrick Spencer
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Withum
 
Cybersecurity Presentation 6-11-15
Turner and Associates, Inc.
 
ConnXus myCBC Webinar Series: Cybersecurity Risks to Your Business
ConnXus
 
Detecting Stopping Advanced Attacks
Envision Technology Advisors
 
Information Security and Data Breach Trends 2014-2015
Brian Levine
 
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
Cybersecurity - you are being targeted -Keyven Lewis, CMIT SOLUTIONS
Randall Chase
 
Steve Mills Senior Vice President and Group Executive IBM Software and Systems
IBM India Smarter Computing
 

Recently uploaded (20)

PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
Software Development Methodologies in 2025
KodekX
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
PDF
REPORT: Heating appliances market in Poland 2024
SPIUG
 
PDF
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
PDF
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
PDF
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PPTX
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
PDF
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
PDF
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
Software Development Methodologies in 2025
KodekX
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
A Strategic Analysis of the MVNO Wave in Emerging Markets.pdf
IPLOOK Networks
 
REPORT: Heating appliances market in Poland 2024
SPIUG
 
How-Cloud-Computing-Impacts-Businesses-in-2025-and-Beyond.pdf
Artjoker Software Development Company
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Orbitly Pitch Deck|A Mission-Driven Platform for Side Project Collaboration (...
zz41354899
 
Using Anchore and DefectDojo to Stand Up Your DevSecOps Function
Anchore
 
The Evolution of KM Roles (Presented at Knowledge Summit Dublin 2025)
Enterprise Knowledge
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
BLW VOCATIONAL TRAINING SUMMER INTERNSHIP REPORT
codernjn73
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
The Future of Artificial Intelligence (AI)
Mukul
 
Dev Dives: Automate, test, and deploy in one place—with Unified Developer Exp...
AndreeaTom
 
Cloud-Migration-Best-Practices-A-Practical-Guide-to-AWS-Azure-and-Google-Clou...
Artjoker Software Development Company
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Get More from Fiori Automation - What’s New, What Works, and What’s Next.pdf
Precisely
 
Unlocking the Future- AI Agents Meet Oracle Database 23ai - AIOUG Yatra 2025.pdf
Sandesh Rao
 

Security event presentation 3.4.2016-final

  • 2. Gavin Zimmer VicePresident of Sales Cal NetTechnology Group Southern California’s Premier IT Service Provider
  • 3. Cal Net Technology Group (CNTG) 03 WE START WITH OUR MISSION AND PURPOSE…
  • 4. MISSION Cal Net Technology Group (CNTG) 03 Our Mission is to Enable IT Solutions in our clients’ organizations to allow them to focus their business on what they do, and do what they do more effectively.
  • 5. PURPOSE Cal Net Technology Group (CNTG) 03 to be AN Extension of your IT Department
  • 6. Managed Services Remote & Onsite BPO NOC Security Pro Services Subject Matter Expertise Virtual CIO & CISO AdvancedTechnology Integration Physical, Virtual & Cloud Plan Design Acquire Deploy ORGANIZATION Cal Net Technology Group (CNTG)  Shared Services  Shared Resources  Integrated Processes  Separate P&L  Integrated Into Specialist Sales Motion Three Autonomous Business Units 03
  • 7. FLEXIBLE PATHS CNTG’s Differentiated GTM Model Direct Verticals Business Alignment Partner Based (Joint) Infrastructure/ISV Subcontracting Managed & Pro Services Private Label Managed/Pro Services/BPM  Public Sector to Commercial (Vertical)  Horizontal (Emerging Growth to Reserved Accounts)  Plan, Build & Run Operating Model  Joint Managed and Professional Services Engineers Coordinated  Standardization where possible  Lead Generation could be combined with Sub & Private Label  Transactional to management of outcomes  Leverage 75+ W2 Certified Professional Services Resources  Non-circumvent and non-compete covenants  Custom NOC & SOC Operations Tailored to Protecting Brand  Include Managed Service Offerings, Security Offerings and Professional Services  Non circumvent and non- compete covenants Certified and Capable: Industry Specific Accreditations 02 MAJOR VENDORS SPECIFIC SOLUTION VENDORS
  • 9. ACCOMPLISHMENTS CNTG’s Success Stories 04 Industry Awards Manufacturing Finance & Legal Education & Non Profit Retail Entertainment Microsoft Partner of the Year 2013-2015 Marvin Engineering Fishman, Diamond & Block Goodwill Coffee Bean & Tea Leaf Director’s Guild of America LA Business Journal CIO’s IT Service Partner of the Year Kaiser Aluminum Hotchkis & Wiley LACMA Fox Rental Car Writer’s Guild of America MSP Mentor Top 150 Worldwide Meggitt ACLU Skirball Cultural Center True Religion Bunim-Murray Productions Best Places to Work Glenair Dignified Home Loans Harvard-Westlake Wolfgang Puck Worldwide NBC Universal Inc. 5000 Fastest Growing Companies in North America Kyocera Berkshire Hathaway Modern Health Care JetEdge Screen Actors Guild
  • 10. Matt Lindley Director of Security Services Cal NetTechnology Group Southern California’s Premier IT Service Provider
  • 11. CYBERCRIME TRENDS & TARGETS IT Security Budget & Level of Protection ValueofExploitableAssets Enterprise Small Business Cybercriminal Sweet SpotMid-size Business
  • 12. 205 days is the average amount of time organizations had been compromised before they knew it – FireEye/Mandiant - 2015
  • 13. You are just finding out today that your network was compromised on August 12th 2015
  • 14. “There are only two types of companies: those that have been hacked and those that will be.” - 2012 Robert Mueller, Former FBI Director
  • 15. VICTIM,VULNERABLE OR VAGUE Don’t Know They’ve Already Been Hacked Will Be Hacked Have Been Hacked More than 80 percent of U.S. companies have been successfully hacked, according to a Duke University/CFO Magazine Global Business Outlook Survey.
  • 16. The average cost for detection and escalation only subsequent to a security breach is approximately $417,700* - Ponemon Institute & IBM 2015 – Cost of Data Breach Report * Cost does not include: Average Total Cost of Data Breach $3.8 Million Loss of business (Brand) Remediation and mitigation costs Notification Identity Protection
  • 17. THE EVOLUTION OF THREATS “Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today”. -Symantec : The evolution of Ransomware 2015 20051989 2008 2011 2013 2014 2015
  • 18. RANSOMWARE TODAY Cisco’s analysis of malware validated as “known bad” found that the majority of that malware—91.3 percent—use the Domain Name Service in one of these three ways: - To gain command and control - To exfiltrate data - To redirect traffic
  • 20. “99.9% OF THE EXPLOITED VULNERABILITIES WERE COMPROMISED MORE THAN A YEAR AFTER THE CVE WAS PUBLISHED.” “About half of the CVEs exploited in 2014 went from publish to pwn in less than a month.” VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE Identifiers) for publicly known cybersecurity vulnerabilities.
  • 25. SECUREMANAGE ENTERPRISE Security Solutions View Identify Investigate Prioritize Remediate Managed SIEM Included Performance, Availability and Change Monitoring Included Threat Intelligence Center / Threat Feeds Included Asset Management (CMDB) Included Single Pane of Glass Portal with Unlimited Users* Included Customized Dashboards for Security, Performance and Compliance Included 24x7 Event Alerting (Email, Pager/SMS, Dashboard) Included Internal and External Vulnerability Scanning Included Vulnerability Remediation Prioritization Included System Hardening Checks Included Compliance Alerting, Dashboards and Reporting for PCI, GLBA, FFIEC Included Threat Monitoring, Analysis and Escalation Included Expert SOC Analyst Remediation Recommendation Escalation Included Security Event Remediation (Remote Only) Included SECUREManage for Enterprise - Compliance