SlideShare una empresa de Scribd logo
1 de 12
Do you really know who is
on your network?!?
Karthik Kannan
Founder, CMO

Christos Tryfonas
Founder, CTO

Caspida Inc.
Tectonic Shifts in Security Industry
The Mobile Cloud Era
Vanishing boundaries
“Security Intel” sharing

Caspida Inc.
Data Security is at its Worst

Caspida Inc.
Your Corporate Jewels are at Stake
Confidential corporate data

Revenue, financial loss

Private customer data

Reputation

Caspida Inc.
Attack Vectors are Spreading

Caspida Inc.
Threat Evolution
Threat type

•
•
•
•

APTs
Malicious
users

DIY
SIEM
Firewalls
Malware detection

Scale & depth

Targeted
attacks
Phishing,
malware
Virus,
spyware

Complexity
Signature

Object
analysis

Machine-learning, behavior
models and anomaly detection
Caspida Inc.
Current Tools: Disservice to you
Signatures

Rules

Malware

No dynamic, user-centric approach
Caspida Inc.
Security Professional’s Nightmares

Significant Attack
Variability and
Sophistication

Thousands of
Alerts w/ false
Positives

(APT, Polymorphic and
Low-Grade Attacks)

Outdated Toolsets
(Firewalls, IDSs, AV,
Anti-Malware)
Caspida Inc.
Caspida Inc.
Architectural Shifts in Security
…

Mobile
Application
Explosion

Internet

Smart Adversaries
(Governments,
Groups etc.)

Significant Attack
Variability and
Sophistication
(APT, Polymorphic and
Low-Grade Attacks)

New Infiltration
Methods
Impossible to use any
signature or
rules-based system

Enterprises
With Cloud and
BYOD/Mobile Access

Caspida Inc.
Security Paradigms need a Jolt
 Data Science applied to security
 Virtual firewalls across mobile & cloud
 Location & role-aware security analytics

End to end security intelligence – No more point products
Caspida Inc.
Next Steps
 Engage NOW for free security threat

intelligence
 Learn more:
−

www.caspida.com

 Contact:
−

Karthik Kannan (karthik@caspida.com)
Caspida Inc.

Más contenido relacionado

Destacado

Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
MOE515253
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
Symantec
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
Shruti Singh
 

Destacado (17)

Cyber-crime PPT
Cyber-crime PPTCyber-crime PPT
Cyber-crime PPT
 
Cyber crime ppt
Cyber crime pptCyber crime ppt
Cyber crime ppt
 
Cyber security
Cyber securityCyber security
Cyber security
 
Cyber Security and the Impact on your Business
Cyber Security and the Impact on your BusinessCyber Security and the Impact on your Business
Cyber Security and the Impact on your Business
 
Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...Critical Infrastructure Protection against targeted attacks on cyber-physical...
Critical Infrastructure Protection against targeted attacks on cyber-physical...
 
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...Global Cyber Security trend & impact of Internet on the society of Bangladesh...
Global Cyber Security trend & impact of Internet on the society of Bangladesh...
 
Cyber Security Terms
Cyber Security TermsCyber Security Terms
Cyber Security Terms
 
Splunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout SessionSplunk for Enterprise Security featuring UBA Breakout Session
Splunk for Enterprise Security featuring UBA Breakout Session
 
Cyber security
Cyber securityCyber security
Cyber security
 
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security SimulationPRESENTATION▶ Cyber Security Services (CSS): Security Simulation
PRESENTATION▶ Cyber Security Services (CSS): Security Simulation
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
Security, Privacy Data Protection and Perspectives to Counter Cybercrime 0409...
 
Poster presentation by Arsalan Muhammad Siddiqui
Poster presentation by Arsalan Muhammad Siddiqui Poster presentation by Arsalan Muhammad Siddiqui
Poster presentation by Arsalan Muhammad Siddiqui
 
Virtual reality
Virtual realityVirtual reality
Virtual reality
 
Potential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical InfrastructurePotential Impact of Cyber Attacks on Critical Infrastructure
Potential Impact of Cyber Attacks on Critical Infrastructure
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Cyber Security and Healthcare
Cyber Security and HealthcareCyber Security and Healthcare
Cyber Security and Healthcare
 

Último

Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Último (20)

Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
Human Expert Website Manual WCAG 2.0 2.1 2.2 Audit - Digital Accessibility Au...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Design Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptxDesign Guidelines for Passkeys 2024.pptx
Design Guidelines for Passkeys 2024.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 

Caspida Cyber Security Presentation at RSA 2014

  • 1. Do you really know who is on your network?!? Karthik Kannan Founder, CMO Christos Tryfonas Founder, CTO Caspida Inc.
  • 2. Tectonic Shifts in Security Industry The Mobile Cloud Era Vanishing boundaries “Security Intel” sharing Caspida Inc.
  • 3. Data Security is at its Worst Caspida Inc.
  • 4. Your Corporate Jewels are at Stake Confidential corporate data Revenue, financial loss Private customer data Reputation Caspida Inc.
  • 5. Attack Vectors are Spreading Caspida Inc.
  • 6. Threat Evolution Threat type • • • • APTs Malicious users DIY SIEM Firewalls Malware detection Scale & depth Targeted attacks Phishing, malware Virus, spyware Complexity Signature Object analysis Machine-learning, behavior models and anomaly detection Caspida Inc.
  • 7. Current Tools: Disservice to you Signatures Rules Malware No dynamic, user-centric approach Caspida Inc.
  • 8. Security Professional’s Nightmares Significant Attack Variability and Sophistication Thousands of Alerts w/ false Positives (APT, Polymorphic and Low-Grade Attacks) Outdated Toolsets (Firewalls, IDSs, AV, Anti-Malware) Caspida Inc.
  • 10. Architectural Shifts in Security … Mobile Application Explosion Internet Smart Adversaries (Governments, Groups etc.) Significant Attack Variability and Sophistication (APT, Polymorphic and Low-Grade Attacks) New Infiltration Methods Impossible to use any signature or rules-based system Enterprises With Cloud and BYOD/Mobile Access Caspida Inc.
  • 11. Security Paradigms need a Jolt  Data Science applied to security  Virtual firewalls across mobile & cloud  Location & role-aware security analytics End to end security intelligence – No more point products Caspida Inc.
  • 12. Next Steps  Engage NOW for free security threat intelligence  Learn more: − www.caspida.com  Contact: − Karthik Kannan (karthik@caspida.com) Caspida Inc.

Notas del editor

  1. So, how do you deliver user-centric security analytics?