SlideShare una empresa de Scribd logo
1 de 18
Thinking Differently About
SECURITY PROTECTION & PREVENTION
Peter Starceski | Sr. Principal Systems Engineer, CISSP
Agenda
• Introductions – Myself / Bio and Audience
• Review Current Security Risks and Threats
• Discuss Security Threat Vectors
• Definition of Machine Learning (ML)
• Some Current Practical ML Use Cases
• How Does Data Science / ML Work
• Future of Security
• Q&A
Introductions – Myself
Introductions – Audience
• Your Name, Company and Role
• Years of Experience in Information Technology?
• Years of Experience in Information Security
Source:https://www.av-test.org/en/statistics/malware/
CURRENT THREATS AND MALWARE
 Malware is used in 90% of
cyber incidents
 Hackers are modifying their
code to avoid detection - 99%
of malware hashes are seen
for 58 seconds or less
 New or changed hashes render
traditional AV totally useless
2016 VERIZON DBIR
Source: http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
© 2016 Cylance, Inc. |
7
SCENARIO: SPEAR PHISHING ATTACK
Alice, the CEO of Big Ideas Inc., receives an email
from a social media connection, Carol.
Unbeknownst to her, an attacker used publicly
available intelligence to craft a spear phishing email
pretending to be Carol.
Attached to the email is a Word document that
contains a malicious vbscript.
Alice opens the Word document and becomes
infected with ransomware.
© 2016 Cylance, Inc. |
8
ATTACK ANATOMY: SPEAR PHISHING
Powershell
Script
Spearphishing
Email
content.doc Bilaga.vbs
Ransomware encrypted
laptop
Ransomware: Angler Exploit
Execution
(99%)
Identity
(~50%)
Resource
Starvation
- DDOS
(<5%)
T H E T H R E AT L A N D S C A P E
There are three core methods that allow
attackers to get into systems:
Phish
USBMalware
Exploits
0-day
APTs
Adware
Spyware
Ransomware
DOC/XLS
Scripts
Web
Waterholing
SQL
Authentication
CASB
Surveillance
MITM
Encryption
DLP
VPN
Firewall
Authentication
DNS
TCP
UDP ARP
Unicast
Web (80/443)
BroadcastMulticast
IP
Some Common Threat Vectors Used By Malware
• Network Edge
• Web
• Email
• Portable Devices and Drives
• Endpoints / Users
RUNNING PROCESSES
FILE SYSTEM
PROGRAM EXECUTION
MEMORY EXPLOITS MALICIOUS SCRIPTS MALICIOUS MACROS
WATCH FOR
NEW FILES
BACKGROUND
THREAT DETECTION
MONITOR PROCESS
EXECUTION
MONITOR
LIBRARY LOADS
BLOCK MALWARE
PRE-EXECUTION
APPLICATION
CONTROL
ENDPOINT KILL CHAIN
 ARE HUMANS EQUIPPED TO DEAL WITH MACHINE LEARNING?
DATA SCIENCE & MACHINE LEARNING
 MACHINES ARE MORE EQUIPPED TO DEAL WITH MACHINE
LEARNING …
 Machine learning is the subfield of computer science that
gives computers the ability to learn without being explicitly
programmed.
 Machine learning is closely related to (and often overlaps
with) computational statistics, which also focuses in
prediction-making through the use of computers.
 Within the field of data analytics, machine learning is a
method used to devise complex models and algorithms that
lend themselves to prediction; in commercial use, this is
known as predictive analytics.
 Machine learning focuses on prediction based on the
properties learned from a earlier data.
DEFINITION: MACHINE LEARNING
 Amazon, Uber, Facebook, Pandora, etc.
 SPAM filtering
 Optical Character Recognition (OCR)
 Speech Recognition (e.g. Apple Siri)
 Internet Search Engines: Google, Bing and Yahoo!
Search
 Computer Vision
 Space, Astronomy and Robotics
SOME PRACTICAL EXAMPLES:
MACHINE LEARNING
COLLECT
HOW DOES IT WORK?
DATA SCIENCE AND MACHINE LEARNING
TRANSFORM,
VECTORIZE AND TRAIN
X = [63796c616e6365]
X = [70726576656e74]
X = [70726f74656374]
EXTRACT CLASSIFY
AND CLUSTER
Past Present Future
AV Hips /
Anti-Exploitation
Sandboxing Isolation EDR AI
Specialized Humans Needed
Post-Execution
No Humans
Pre-Execution
Humans Needed
THE FUTURE OF SECURITY
THANK YOU
Peter Starceski
pstarceski@cylance.com
586.530.0618

Más contenido relacionado

La actualidad más candente

Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicBlue Coat
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionBlue Coat
 
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionBlue Coat
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XSophos Benelux
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT securitySophos Benelux
 
How Malware Works
How Malware WorksHow Malware Works
How Malware WorksAlienVault
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionGiovanni Giovannelli
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XSophos Benelux
 
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureSecurity Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureAlert Logic
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníMarketingArrowECS_CZ
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Cisco Security
 
#ALSummit: Live Cyber Hack Demonstration
#ALSummit: Live Cyber Hack Demonstration#ALSummit: Live Cyber Hack Demonstration
#ALSummit: Live Cyber Hack DemonstrationAlert Logic
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewSymantec
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Securityxband
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 

La actualidad más candente (20)

Advanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle InfographicAdvanced Threat Protection Lifecycle Infographic
Advanced Threat Protection Lifecycle Infographic
 
Content Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat ProtectionContent Analysis System and Advanced Threat Protection
Content Analysis System and Advanced Threat Protection
 
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL EncryptionInfographic: Stop Attacks Hiding Under the Cover of SSL Encryption
Infographic: Stop Attacks Hiding Under the Cover of SSL Encryption
 
Taking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept XTaking the battle to Ransomware with Sophos Intercept X
Taking the battle to Ransomware with Sophos Intercept X
 
The next generation of IT security
The next generation of IT securityThe next generation of IT security
The next generation of IT security
 
How Malware Works
How Malware WorksHow Malware Works
How Malware Works
 
Sophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser ProtectionSophos Next-Generation Enduser Protection
Sophos Next-Generation Enduser Protection
 
This is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept XThis is Next-Gen IT Security - Introducing Intercept X
This is Next-Gen IT Security - Introducing Intercept X
 
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas AzureSecurity Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud - CSS Dallas Azure
 
Advanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešeníAdvanced Threat Protection – ultimátní bezpečnostní řešení
Advanced Threat Protection – ultimátní bezpečnostní řešení
 
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
Identify Zero-Day Breaches with Cognitive Threat Analytics on Cisco Web Secur...
 
Intercept X - Sophos Endpoint
Intercept X - Sophos EndpointIntercept X - Sophos Endpoint
Intercept X - Sophos Endpoint
 
#ALSummit: Live Cyber Hack Demonstration
#ALSummit: Live Cyber Hack Demonstration#ALSummit: Live Cyber Hack Demonstration
#ALSummit: Live Cyber Hack Demonstration
 
ATP
ATPATP
ATP
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical OverviewCyber Tech Israel 2016: Advanced Threat Protection Technical Overview
Cyber Tech Israel 2016: Advanced Threat Protection Technical Overview
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Think Like a Hacker
Think Like a HackerThink Like a Hacker
Think Like a Hacker
 
Network Security Tools
Network Security ToolsNetwork Security Tools
Network Security Tools
 

Similar a Thinking Differently About Security Protection and Prevention

Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security IntelligenceSplunk
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Sourcehack33
 
CSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri DiogenesCSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri DiogenesNCCOMMS
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security PresentationSimplex
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityCihan Özhan
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissanceCloudera, Inc.
 
Cyber security for system design
Cyber security for system designCyber security for system design
Cyber security for system designTom Kaczmarek
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProjectKaley Hair
 
Port of seattle security presentation david morris
Port of seattle security presentation   david morrisPort of seattle security presentation   david morris
Port of seattle security presentation david morrisEmily2014
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesSplunk
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceQualys
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0James Perry, Jr.
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest ResumeDhishant Abrol
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Cisco do Brasil
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetuppbink
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseCisco Canada
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9Amanda Case
 

Similar a Thinking Differently About Security Protection and Prevention (20)

NetWitness
NetWitnessNetWitness
NetWitness
 
Operational Security Intelligence
Operational Security IntelligenceOperational Security Intelligence
Operational Security Intelligence
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
Invited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open SourceInvited Talk - Cyber Security and Open Source
Invited Talk - Cyber Security and Open Source
 
CSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri DiogenesCSF18 - Incident Response in the Cloud - Yuri Diogenes
CSF18 - Incident Response in the Cloud - Yuri Diogenes
 
Cisco Security Presentation
Cisco Security PresentationCisco Security Presentation
Cisco Security Presentation
 
AI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision SecurityAI Security : Machine Learning, Deep Learning and Computer Vision Security
AI Security : Machine Learning, Deep Learning and Computer Vision Security
 
Preparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity RenaissancePreparing for the Cybersecurity Renaissance
Preparing for the Cybersecurity Renaissance
 
Cyber security for system design
Cyber security for system designCyber security for system design
Cyber security for system design
 
2014CyberSecurityProject
2014CyberSecurityProject2014CyberSecurityProject
2014CyberSecurityProject
 
Port of seattle security presentation david morris
Port of seattle security presentation   david morrisPort of seattle security presentation   david morris
Port of seattle security presentation david morris
 
Best Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting BreachesBest Practices for Scoping Infections and Disrupting Breaches
Best Practices for Scoping Infections and Disrupting Breaches
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
NetSecurity_ThreatResponder(r)_Capability_Brief_021116_Rev0
 
Dhishant -Latest Resume
Dhishant -Latest ResumeDhishant -Latest Resume
Dhishant -Latest Resume
 
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)Estratégia de segurança da Cisco (um diferencial para seus negócios)
Estratégia de segurança da Cisco (um diferencial para seus negócios)
 
Solnet dev secops meetup
Solnet dev secops meetupSolnet dev secops meetup
Solnet dev secops meetup
 
Talos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the NoiseTalos Insight: Threat Innovation Emerging from the Noise
Talos Insight: Threat Innovation Emerging from the Noise
 
LIS3353 SP12 Week 9
LIS3353 SP12 Week 9LIS3353 SP12 Week 9
LIS3353 SP12 Week 9
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 

Último

Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...lizamodels9
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...amitlee9823
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...Any kyc Account
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxpriyanshujha201
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataExhibitors Data
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876dlhescort
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdftbatkhuu1
 

Último (20)

Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
Call Girls In Holiday Inn Express Gurugram➥99902@11544 ( Best price)100% Genu...
 
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
Call Girls Jp Nagar Just Call 👗 7737669865 👗 Top Class Call Girl Service Bang...
 
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
KYC-Verified Accounts: Helping Companies Handle Challenging Regulatory Enviro...
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
RSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors DataRSA Conference Exhibitor List 2024 - Exhibitors Data
RSA Conference Exhibitor List 2024 - Exhibitors Data
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
Call Girls in Delhi, Escort Service Available 24x7 in Delhi 959961-/-3876
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Event mailer assignment progress report .pdf
Event mailer assignment progress report .pdfEvent mailer assignment progress report .pdf
Event mailer assignment progress report .pdf
 

Thinking Differently About Security Protection and Prevention

  • 1. Thinking Differently About SECURITY PROTECTION & PREVENTION Peter Starceski | Sr. Principal Systems Engineer, CISSP
  • 2. Agenda • Introductions – Myself / Bio and Audience • Review Current Security Risks and Threats • Discuss Security Threat Vectors • Definition of Machine Learning (ML) • Some Current Practical ML Use Cases • How Does Data Science / ML Work • Future of Security • Q&A
  • 4. Introductions – Audience • Your Name, Company and Role • Years of Experience in Information Technology? • Years of Experience in Information Security
  • 6.  Malware is used in 90% of cyber incidents  Hackers are modifying their code to avoid detection - 99% of malware hashes are seen for 58 seconds or less  New or changed hashes render traditional AV totally useless 2016 VERIZON DBIR Source: http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/
  • 7. © 2016 Cylance, Inc. | 7 SCENARIO: SPEAR PHISHING ATTACK Alice, the CEO of Big Ideas Inc., receives an email from a social media connection, Carol. Unbeknownst to her, an attacker used publicly available intelligence to craft a spear phishing email pretending to be Carol. Attached to the email is a Word document that contains a malicious vbscript. Alice opens the Word document and becomes infected with ransomware.
  • 8. © 2016 Cylance, Inc. | 8 ATTACK ANATOMY: SPEAR PHISHING Powershell Script Spearphishing Email content.doc Bilaga.vbs Ransomware encrypted laptop
  • 10. Execution (99%) Identity (~50%) Resource Starvation - DDOS (<5%) T H E T H R E AT L A N D S C A P E There are three core methods that allow attackers to get into systems: Phish USBMalware Exploits 0-day APTs Adware Spyware Ransomware DOC/XLS Scripts Web Waterholing SQL Authentication CASB Surveillance MITM Encryption DLP VPN Firewall Authentication DNS TCP UDP ARP Unicast Web (80/443) BroadcastMulticast IP
  • 11. Some Common Threat Vectors Used By Malware • Network Edge • Web • Email • Portable Devices and Drives • Endpoints / Users
  • 12. RUNNING PROCESSES FILE SYSTEM PROGRAM EXECUTION MEMORY EXPLOITS MALICIOUS SCRIPTS MALICIOUS MACROS WATCH FOR NEW FILES BACKGROUND THREAT DETECTION MONITOR PROCESS EXECUTION MONITOR LIBRARY LOADS BLOCK MALWARE PRE-EXECUTION APPLICATION CONTROL ENDPOINT KILL CHAIN
  • 13.  ARE HUMANS EQUIPPED TO DEAL WITH MACHINE LEARNING? DATA SCIENCE & MACHINE LEARNING  MACHINES ARE MORE EQUIPPED TO DEAL WITH MACHINE LEARNING …
  • 14.  Machine learning is the subfield of computer science that gives computers the ability to learn without being explicitly programmed.  Machine learning is closely related to (and often overlaps with) computational statistics, which also focuses in prediction-making through the use of computers.  Within the field of data analytics, machine learning is a method used to devise complex models and algorithms that lend themselves to prediction; in commercial use, this is known as predictive analytics.  Machine learning focuses on prediction based on the properties learned from a earlier data. DEFINITION: MACHINE LEARNING
  • 15.  Amazon, Uber, Facebook, Pandora, etc.  SPAM filtering  Optical Character Recognition (OCR)  Speech Recognition (e.g. Apple Siri)  Internet Search Engines: Google, Bing and Yahoo! Search  Computer Vision  Space, Astronomy and Robotics SOME PRACTICAL EXAMPLES: MACHINE LEARNING
  • 16. COLLECT HOW DOES IT WORK? DATA SCIENCE AND MACHINE LEARNING TRANSFORM, VECTORIZE AND TRAIN X = [63796c616e6365] X = [70726576656e74] X = [70726f74656374] EXTRACT CLASSIFY AND CLUSTER
  • 17. Past Present Future AV Hips / Anti-Exploitation Sandboxing Isolation EDR AI Specialized Humans Needed Post-Execution No Humans Pre-Execution Humans Needed THE FUTURE OF SECURITY

Notas del editor

  1. New malware programs continue to increase exponentially – this stat comes from AV-TEST.org and mentions their daily registration for new malware programs … numbers for new malware are even larger than this actually.
  2. Src: http://www.verizonenterprise.com/verizon-insights-lab/dbir/2016/ This 2016 Verizon Data Breach Report, mentions 1,500 known ‘malware-related’ breaches The report further reveals … “Analysis of one of our larger datasets showed that 99% of malware hashes are seen for only 58 seconds or less. In fact, most malware was seen only once. This reflects how quickly hackers are modifying their code to avoid detection.” Many of these are PoS breaches many are ransomware Lifespan data supports the one-time-use of malware data. That is, many targeted threat-related malware artifacts will never been seen in-the-wild, and will not be intercepted by the traditional AV companies for analysis. When malware is involved in an attack, the attackers are able to act swiftly and dynamically to ensure persistence, evasion, and long-term success. Adversaries modify code to avoid detection by signatures Of 3.8M samples, 20K existed in more than one organization
  3. Lets review an example of such an attack that uses Spear Phishing on said company, Big Ideas … CEO is being spear phished with public intel from someone pretending to be Carol ... CEO receives an email with a MS Word Doc from this threat actor and opens it ... As it turns out the CEO is infected with Ransomware ... Let look at this process a bit more closely
  4. Reviewing the process we can see that the MS Word doc actually also contained a VBS file that launched a powershell script to begin the ransomware infection/encryption process … Is everyone aware of the big issue of ransomware? It is a big business for those that operate in the underground .. Lets look at some more data ...
  5. The revenue from the Angler exploit alone is approximately $300/ransom or roughly $34M/year. That’s from just one type of Ransomware … what about the others? And the underground continues to operate Ransomware as a Service (RaaS) for all threat actor orgs to use ... Represents almost a $1B / year industry.
  6. There are three core problems that allow attackers to get into systems: Execution – 99% of attacks use this method Identity – 50% of attacks use this method Distributed Denial of Service (DDOS) – Only less than 5% of attacks use this
  7. Let’s review some common threat vectors used by malware … list them ... Audience poll: what types on Endpoint Security or AV solutions are you familiar with … list them on whiteboard/easel. All of these solutions are challenged to protect and prevent these sorts of threats ... How can we break this process and deal with this?
  8. For these threat vectors along this attack chain, security solutions that are part of the kill chain must address / deal with these sorts of threats through protecting running processes, file system and program execution.
  9. Now to the meat of my discussion … there is a lot of buzz around machine learning these days especially with online retail, cloud and security. Let clarify some of this … but first lets review a definition of machine learning ...
  10. Evolved from the study of pattern recognition and computational learning theory in artificial intelligence,[2] machine learning explores the study and construction of algorithms that can learn from and make predictions on data[3] – such algorithms overcome following strictly static program instructions by making data driven predictions or decisions,[4]:2 through building a model from sample inputs. Machine learning is employed in a range of computing tasks where designing and programming explicit algorithms is infeasible; example applications include spam filtering, detection of network intruders or malicious insiders working towards a data breach,[5] optical character recognition (OCR),[6] search engines and computer vision. These analytical models allow researchers, data scientists, engineers, and analysts to "produce reliable, repeatable decisions and results" and uncover "hidden insights" through learning from historical relationships and trends in the data.[11]
  11. Much like a DNA analysis or an actuarial review, file analysis starts with the collection of a massive amount of data— in this case files of specific types (executables, PDFs, Microsoft Word® documents, Java, Flash, etc.). We collect hundreds of millions of files (even billions) from industry ‘feeds,’ proprietary organizational repositories and live inputs from active computers with Cylance agents on them Once these files are collected, they’re normalized, reviewed and placed into three buckets; known and verified valid, known and verified malicious and unknown. Then they’re converted to numerical values that can be used in statistical models. It’s here where vectorization and machine learning are applied to eliminate the human impurities and speed analytical processing. Leveraging the millions of attributes of files identified in extraction, Cylance mathematicians then develop statistical models that accurately predict whether a file is valid or malicious.
  12. So to summarize, in the past AV might have been enough to deal with a limited landscape of threats and human intervention was required. Presently today layers of security protection within a threat vector area are still being challenged to keep pace with security threats, post-execution. The future of security protection and prevention must begin to include ML and AI technology to increase your ability to protect and prevent security threats pre-execution within your environments. When you are going through the layers of protection as part of your security program, remember that machine learning and AI already have many practical uses within our daily lives – think differently about including use of this innovative technology in your security protection and prevention solution strategy. It will reduce your needs and requirements for incident and breach response activities. TY