SlideShare una empresa de Scribd logo
1 de 10
Effective Strategies for Managing
Cyber Security Risks
06/17/15 1
NTE Business Services LLC
Owner
Independent Agent for IT
585-314-1824
My Digital Link LLC
Reseller CTO
Next Generation IT Specialty
585-314-1824
With credits to:
1- paloalto NETWORKS
2- Aruba Networks
3- DataGravity
2 - Nutanix
1980s
Cloud Generation
Client-Server Generation
Virtualization Generation
The Evolution to Generation CLOUD
Public Cloud
x86
2000s 2010>
x86 x86x86 x86 x86
x86 x86x86
Intelligent
Software
06/17/15 2
1990s
Cloud Generation
Client-Server Generation
Virtualization Generation
INTRUSION 1.0 - Circa 1970 - 2000
Public Cloud
x86
2000s 2010>
x86 x86x86 x86 x86
x86 x86x86
Intelligent
Software
PORTS
PROTOCOLS
IP ADDRESSES
06/17/15 3
The Cyber-Kids of Yesterday
06/17/15 4
• Simplistic
• Competing for Street Cred
• Honing Skills
• Having Fun
• Signature Based Attacks
1990s
Intrusion 2.0
2000s 2010>
x86
PP
• Hop from Port to Port
• Traffic Encryption
• Exploiting Open Ports
• Tunneling through
approved applications
State of the Art
(and Acceptable)
CLOUD
06/17/15 5
Modern Day Cyber Threat
Actors
06/17/15 6
• Nation States
• Organized Crime
• Well Financed
• Global Actors
• Cyber Warfare
• Internal & Experts
• Zero Day Malware
• Polymorphic
Protocols
• Embedded Malware
• Command & Control
Protocols
Sophisticated Weapons
AttacksAttacks
Mobility Factor
Virtualization Generation
x86 x86x86
PP
PUBLIC CLOUDPrivate Cloud
Payroll
HR Benefits
Traditional DATA CENTER
BYOD
Visitors
??
MS Exchange
Collab Site
??
??
06/17/15 7
Cyber Security 2.0
06/17/15
8
PORTS
PROTOCOLS
IP ADDRESSES
PRIVATE – PUBLIC – CLOUD
WORK – MOBILITY - PERSONAL
Preparing for Cloud Security
06/17/15 9
• Engage External Providers
o Due Diligence / Cloud Provider
o Deep Analytics Services Provider
• Establish Detection / Response Team
• Create / Elevate CISO Function
• Include Mobility
• Engage / Select Vendor-Partners
o Strategic Relationship
o Roadmaps Reviews
• Time is of the essence
Call to Action
Effective Strategies for Managing
Cyber Security Risks
A Cloud Services Perspective
06/17/15 10
NTE Business Services LLC
Owner
Independent Agent for IT
My Digital Link LLC
Reseller CTO
Next Generation IT Specialty

Más contenido relacionado

La actualidad más candente

Delivering the IoT ecosystem
Delivering the IoT ecosystemDelivering the IoT ecosystem
Delivering the IoT ecosystemTelefónica IoT
 
Володимир Шиманський “Роль спільноти і OpenSource в IoT бізнесі” {R0boCamp}
Володимир Шиманський “Роль спільноти і OpenSource в IoT бізнесі” {R0boCamp} Володимир Шиманський “Роль спільноти і OpenSource в IoT бізнесі” {R0boCamp}
Володимир Шиманський “Роль спільноти і OpenSource в IoT бізнесі” {R0boCamp} Lviv Startup Club
 
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...Nabil Bouzerna
 
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...Open Mobile Alliance
 
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationPeter Waher
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityThibault Cantegrel
 
Successful practical applications of IoT / M2M, Mark White, Locatrix
Successful practical applications of IoT / M2M, Mark White, LocatrixSuccessful practical applications of IoT / M2M, Mark White, Locatrix
Successful practical applications of IoT / M2M, Mark White, LocatrixAlan Quayle
 
3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT SolutionsIan Skerrett
 

La actualidad más candente (11)

Delivering the IoT ecosystem
Delivering the IoT ecosystemDelivering the IoT ecosystem
Delivering the IoT ecosystem
 
Володимир Шиманський “Роль спільноти і OpenSource в IoT бізнесі” {R0boCamp}
Володимир Шиманський “Роль спільноти і OpenSource в IoT бізнесі” {R0boCamp} Володимир Шиманський “Роль спільноти і OpenSource в IoT бізнесі” {R0boCamp}
Володимир Шиманський “Роль спільноти і OpenSource в IoT бізнесі” {R0boCamp}
 
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
SODA-IIoT4ConnectedCars: Spread updates between cars with limited Internet ac...
 
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
IoT Seminar (Jan. 2016) - (3) benjamin cabé - building an open internet of th...
 
IPv6 and the Internet of Things
IPv6 and the Internet of ThingsIPv6 and the Internet of Things
IPv6 and the Internet of Things
 
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal TrendsITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
ITCamp 2019 - Cristiana Fernbach - Blockchain Legal Trends
 
Cross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperationCross domain autonomous cooperation cross-domain autonomous cooperation
Cross domain autonomous cooperation cross-domain autonomous cooperation
 
InnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivityInnovationSummit2015 - iot connectivity
InnovationSummit2015 - iot connectivity
 
Successful practical applications of IoT / M2M, Mark White, Locatrix
Successful practical applications of IoT / M2M, Mark White, LocatrixSuccessful practical applications of IoT / M2M, Mark White, Locatrix
Successful practical applications of IoT / M2M, Mark White, Locatrix
 
Cloud Computing Talk for PRIA Winter Symposium 2012 by Corey Leong
Cloud Computing Talk for PRIA Winter Symposium 2012 by Corey LeongCloud Computing Talk for PRIA Winter Symposium 2012 by Corey Leong
Cloud Computing Talk for PRIA Winter Symposium 2012 by Corey Leong
 
3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions3 Software Stacks for IoT Solutions
3 Software Stacks for IoT Solutions
 

Destacado

baiseur démonte bien profond la minouche rasée d'une pompeuse de baguettes ch...
baiseur démonte bien profond la minouche rasée d'une pompeuse de baguettes ch...baiseur démonte bien profond la minouche rasée d'une pompeuse de baguettes ch...
baiseur démonte bien profond la minouche rasée d'une pompeuse de baguettes ch...joyousrascal3205
 
Las redes sociales en ámbito educativo
Las redes sociales en ámbito educativoLas redes sociales en ámbito educativo
Las redes sociales en ámbito educativodariveri
 
Despertando a tu riqueza, Cardedeu (Barcelona) 2013
Despertando a tu riqueza, Cardedeu (Barcelona) 2013Despertando a tu riqueza, Cardedeu (Barcelona) 2013
Despertando a tu riqueza, Cardedeu (Barcelona) 2013mlbecerra
 
MECATRONICA )PORTUGUES(
MECATRONICA )PORTUGUES(MECATRONICA )PORTUGUES(
MECATRONICA )PORTUGUES(Arpus Supra
 
Capabilities Sheet
Capabilities SheetCapabilities Sheet
Capabilities SheetNick Kovacic
 
Romanticismo y Realismo
Romanticismo y Realismo Romanticismo y Realismo
Romanticismo y Realismo Mariarapor
 
A l a s k a l i v e s t o c k s e r i e s
A l a s k a l i v e s t o c k s e r i e sA l a s k a l i v e s t o c k s e r i e s
A l a s k a l i v e s t o c k s e r i e sDr.Muhammad Awais
 
Leeresume2014
Leeresume2014Leeresume2014
Leeresume2014Lee Sims
 
Finalonlinemarketing omkar
Finalonlinemarketing omkarFinalonlinemarketing omkar
Finalonlinemarketing omkaromkar paney
 
Presentacion sobre la historia sobre los mundiales
Presentacion sobre la historia sobre los mundialesPresentacion sobre la historia sobre los mundiales
Presentacion sobre la historia sobre los mundialesfacundov
 
Actividades en dresden
Actividades en dresdenActividades en dresden
Actividades en dresdenmaje5918
 
Тези учнів-членів Гадяцького районного наукового товариства учнів - 2013
Тези учнів-членів Гадяцького районного наукового товариства учнів - 2013Тези учнів-членів Гадяцького районного наукового товариства учнів - 2013
Тези учнів-членів Гадяцького районного наукового товариства учнів - 2013nadiamyrosh
 

Destacado (16)

baiseur démonte bien profond la minouche rasée d'une pompeuse de baguettes ch...
baiseur démonte bien profond la minouche rasée d'une pompeuse de baguettes ch...baiseur démonte bien profond la minouche rasée d'une pompeuse de baguettes ch...
baiseur démonte bien profond la minouche rasée d'une pompeuse de baguettes ch...
 
Las redes sociales en ámbito educativo
Las redes sociales en ámbito educativoLas redes sociales en ámbito educativo
Las redes sociales en ámbito educativo
 
Despertando a tu riqueza, Cardedeu (Barcelona) 2013
Despertando a tu riqueza, Cardedeu (Barcelona) 2013Despertando a tu riqueza, Cardedeu (Barcelona) 2013
Despertando a tu riqueza, Cardedeu (Barcelona) 2013
 
MECATRONICA )PORTUGUES(
MECATRONICA )PORTUGUES(MECATRONICA )PORTUGUES(
MECATRONICA )PORTUGUES(
 
Imt b comm revision
Imt b comm revisionImt b comm revision
Imt b comm revision
 
Capabilities Sheet
Capabilities SheetCapabilities Sheet
Capabilities Sheet
 
Romanticismo y Realismo
Romanticismo y Realismo Romanticismo y Realismo
Romanticismo y Realismo
 
A l a s k a l i v e s t o c k s e r i e s
A l a s k a l i v e s t o c k s e r i e sA l a s k a l i v e s t o c k s e r i e s
A l a s k a l i v e s t o c k s e r i e s
 
Leeresume2014
Leeresume2014Leeresume2014
Leeresume2014
 
Finalonlinemarketing omkar
Finalonlinemarketing omkarFinalonlinemarketing omkar
Finalonlinemarketing omkar
 
Presentacion sobre la historia sobre los mundiales
Presentacion sobre la historia sobre los mundialesPresentacion sobre la historia sobre los mundiales
Presentacion sobre la historia sobre los mundiales
 
IMT Business Communication_Case study
IMT Business Communication_Case studyIMT Business Communication_Case study
IMT Business Communication_Case study
 
Actividades en dresden
Actividades en dresdenActividades en dresden
Actividades en dresden
 
Тези учнів-членів Гадяцького районного наукового товариства учнів - 2013
Тези учнів-членів Гадяцького районного наукового товариства учнів - 2013Тези учнів-членів Гадяцького районного наукового товариства учнів - 2013
Тези учнів-членів Гадяцького районного наукового товариства учнів - 2013
 
0111
01110111
0111
 
Presentación1
Presentación1Presentación1
Presentación1
 

Similar a Cyber Event Prepers

Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Canada
 
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamuraIndonesia Network Operators Group
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX WebinarKatie Hyman
 
Welcome Address at the Cloud Event jointly organised by SCS,SAL,ACCA and SMF
Welcome Address at the Cloud Event jointly organised by SCS,SAL,ACCA and SMFWelcome Address at the Cloud Event jointly organised by SCS,SAL,ACCA and SMF
Welcome Address at the Cloud Event jointly organised by SCS,SAL,ACCA and SMFITEC
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinDigicomp Academy AG
 
Smart Cities are the Internet of Things
Smart Cities are the Internet of ThingsSmart Cities are the Internet of Things
Smart Cities are the Internet of Thingszdshelby
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityAPNIC
 
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...Kai Wähner
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Brian Proctor - GICSP, CISSP, CRISC
 
StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware Lancope, Inc.
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceMichelle Holley
 
Cisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - IntroCisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - IntroBeMyApp
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeAPNIC
 
FIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE OverviewFIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE OverviewFIWARE
 
Ovh analytics data compute with apache spark as a service meetup ovh bordeaux
Ovh analytics data compute with apache spark as a service   meetup ovh bordeauxOvh analytics data compute with apache spark as a service   meetup ovh bordeaux
Ovh analytics data compute with apache spark as a service meetup ovh bordeauxMojtaba Imani
 
OVH Analytics Data Compute - Apache Spark Cluster as a Service
OVH Analytics Data Compute - Apache Spark Cluster as a ServiceOVH Analytics Data Compute - Apache Spark Cluster as a Service
OVH Analytics Data Compute - Apache Spark Cluster as a ServiceOVHcloud
 

Similar a Cyber Event Prepers (20)

Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
Cisco Connect Vancouver 2017 - Cisco's Digital Network Architecture - deeper ...
 
Mellanox's Technological Advantage
Mellanox's Technological AdvantageMellanox's Technological Advantage
Mellanox's Technological Advantage
 
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
04 (IDNOG01) Handling massive numbers subscribers and attacks by Takeki kumamura
 
ONF & iSDX Webinar
ONF & iSDX WebinarONF & iSDX Webinar
ONF & iSDX Webinar
 
Ibm iot overview
Ibm   iot overviewIbm   iot overview
Ibm iot overview
 
Welcome Address at the Cloud Event jointly organised by SCS,SAL,ACCA and SMF
Welcome Address at the Cloud Event jointly organised by SCS,SAL,ACCA and SMFWelcome Address at the Cloud Event jointly organised by SCS,SAL,ACCA and SMF
Welcome Address at the Cloud Event jointly organised by SCS,SAL,ACCA and SMF
 
IPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe KleinIPv6 Security Talk mit Joe Klein
IPv6 Security Talk mit Joe Klein
 
Smart Cities are the Internet of Things
Smart Cities are the Internet of ThingsSmart Cities are the Internet of Things
Smart Cities are the Internet of Things
 
The evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivityThe evolving threat in the face of increased connectivity
The evolving threat in the face of increased connectivity
 
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
IoT Open Source Integration Comparison (Kura, Node-RED, Flogo, Apache Nifi, S...
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?
 
StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware StealthWatch & Point-of-Sale (POS) Malware
StealthWatch & Point-of-Sale (POS) Malware
 
Industrial IoT and OT/IT Convergence
Industrial IoT and OT/IT ConvergenceIndustrial IoT and OT/IT Convergence
Industrial IoT and OT/IT Convergence
 
Cisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - IntroCisco Paris DevNet Hackathon slideshow - Intro
Cisco Paris DevNet Hackathon slideshow - Intro
 
Fiware overview3
Fiware overview3Fiware overview3
Fiware overview3
 
IoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat LandscapeIoT - the Next Wave of DDoS Threat Landscape
IoT - the Next Wave of DDoS Threat Landscape
 
FIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE OverviewFIWARE Global Summit - FIWARE Overview
FIWARE Global Summit - FIWARE Overview
 
Ovh analytics data compute with apache spark as a service meetup ovh bordeaux
Ovh analytics data compute with apache spark as a service   meetup ovh bordeauxOvh analytics data compute with apache spark as a service   meetup ovh bordeaux
Ovh analytics data compute with apache spark as a service meetup ovh bordeaux
 
OVH Analytics Data Compute - Apache Spark Cluster as a Service
OVH Analytics Data Compute - Apache Spark Cluster as a ServiceOVH Analytics Data Compute - Apache Spark Cluster as a Service
OVH Analytics Data Compute - Apache Spark Cluster as a Service
 
Telefonica i pv6_smartcity
Telefonica i pv6_smartcityTelefonica i pv6_smartcity
Telefonica i pv6_smartcity
 

Último

Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...HyderabadDolls
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...kumargunjan9515
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangeThinkInnovation
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxchadhar227
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowgargpaaro
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...nirzagarg
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdfkhraisr
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabiaahmedjiabur940
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样wsppdmt
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...nirzagarg
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...nirzagarg
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Klinik kandungan
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...nirzagarg
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.pptibrahimabdi22
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...HyderabadDolls
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...gajnagarg
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...HyderabadDolls
 

Último (20)

Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
Charbagh + Female Escorts Service in Lucknow | Starting ₹,5K To @25k with A/C...
 
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...Top Call Girls in Balaghat  9332606886Call Girls Advance Cash On Delivery Ser...
Top Call Girls in Balaghat 9332606886Call Girls Advance Cash On Delivery Ser...
 
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With OrangePredicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
Predicting HDB Resale Prices - Conducting Linear Regression Analysis With Orange
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Purnia [ 7014168258 ] Call Me For Genuine Models We...
 
20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf20240412-SmartCityIndex-2024-Full-Report.pdf
20240412-SmartCityIndex-2024-Full-Report.pdf
 
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi ArabiaIn Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
In Riyadh ((+919101817206)) Cytotec kit @ Abortion Pills Saudi Arabia
 
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
如何办理英国诺森比亚大学毕业证(NU毕业证书)成绩单原件一模一样
 
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In Begusarai [ 7014168258 ] Call Me For Genuine Models...
 
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Hapur [ 7014168258 ] Call Me For Genuine Models We ...
 
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Indore [ 7014168258 ] Call Me For Genuine Models We...
 
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
Jual obat aborsi Bandung ( 085657271886 ) Cytote pil telat bulan penggugur ka...
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
Gomti Nagar & best call girls in Lucknow | 9548273370 Independent Escorts & D...
 
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
Top profile Call Girls In Chandrapur [ 7014168258 ] Call Me For Genuine Model...
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
 

Cyber Event Prepers

  • 1. Effective Strategies for Managing Cyber Security Risks 06/17/15 1 NTE Business Services LLC Owner Independent Agent for IT 585-314-1824 My Digital Link LLC Reseller CTO Next Generation IT Specialty 585-314-1824 With credits to: 1- paloalto NETWORKS 2- Aruba Networks 3- DataGravity 2 - Nutanix
  • 2. 1980s Cloud Generation Client-Server Generation Virtualization Generation The Evolution to Generation CLOUD Public Cloud x86 2000s 2010> x86 x86x86 x86 x86 x86 x86x86 Intelligent Software 06/17/15 2
  • 3. 1990s Cloud Generation Client-Server Generation Virtualization Generation INTRUSION 1.0 - Circa 1970 - 2000 Public Cloud x86 2000s 2010> x86 x86x86 x86 x86 x86 x86x86 Intelligent Software PORTS PROTOCOLS IP ADDRESSES 06/17/15 3
  • 4. The Cyber-Kids of Yesterday 06/17/15 4 • Simplistic • Competing for Street Cred • Honing Skills • Having Fun • Signature Based Attacks
  • 5. 1990s Intrusion 2.0 2000s 2010> x86 PP • Hop from Port to Port • Traffic Encryption • Exploiting Open Ports • Tunneling through approved applications State of the Art (and Acceptable) CLOUD 06/17/15 5
  • 6. Modern Day Cyber Threat Actors 06/17/15 6 • Nation States • Organized Crime • Well Financed • Global Actors • Cyber Warfare • Internal & Experts • Zero Day Malware • Polymorphic Protocols • Embedded Malware • Command & Control Protocols Sophisticated Weapons AttacksAttacks
  • 7. Mobility Factor Virtualization Generation x86 x86x86 PP PUBLIC CLOUDPrivate Cloud Payroll HR Benefits Traditional DATA CENTER BYOD Visitors ?? MS Exchange Collab Site ?? ?? 06/17/15 7
  • 8. Cyber Security 2.0 06/17/15 8 PORTS PROTOCOLS IP ADDRESSES PRIVATE – PUBLIC – CLOUD WORK – MOBILITY - PERSONAL
  • 9. Preparing for Cloud Security 06/17/15 9 • Engage External Providers o Due Diligence / Cloud Provider o Deep Analytics Services Provider • Establish Detection / Response Team • Create / Elevate CISO Function • Include Mobility • Engage / Select Vendor-Partners o Strategic Relationship o Roadmaps Reviews • Time is of the essence Call to Action
  • 10. Effective Strategies for Managing Cyber Security Risks A Cloud Services Perspective 06/17/15 10 NTE Business Services LLC Owner Independent Agent for IT My Digital Link LLC Reseller CTO Next Generation IT Specialty

Notas del editor

  1. A 30,000 foot view……… To help you with a Call to Action For Executive Sponsors Interested in protecting the identity and assets of the company where you work. Start with History
  2. ignore history - doomed to repeat - So here’s the history Individual department level computers - underutilized – wasteful and expensive Evolution led to Server Sprawl Server Sprawl gave rise to virtualization – Less Expensive and complex (jury out)? Virtualization = Applications in bubbles floating about the IT infrastructure. 1999 Salesforce.com, CRM Software as a Service, Browser based app – first SaaS. Amazon Web Services Elastic Computing On Demand Google Compute Engine, Rackspace and many others. Now everywhere for B2B, B2C. Social Media and e-Commerce- SaaS, IaaS, PaaS. The point APPLICATIONS Left home (the company desktop / the home PC) With Limited Protection
  3. Limited protection meaning rudimentary by today’s standards. THEN…. Scanning files from floppy disk Virus scans on HDD On-line purchase and downloads – infancy Free-ware was the dominant host for transmission of viruses deployed by hackers Home firewall nearly non-existent Network infrastructure un-sophisticated Enterprise firewalls limited to Monitoring PORTS, PROTOCOLS and IP ADDRESSES There was No peeking in on applications Monitoring of data objects or unstructured data did not exist Nothing was “APPLICATION AWARE” IP tunneling for VPNs was new and not addressed by firewalls of the day Many remain in service today Insufficient for a MOBILE community and CLOUD.
  4. Firewalls may have been rudimentary but so were the threats Out for a little fun Show off - peers Honing skills in competition Early forms of Viruses, Worms and Trojan Horses Exploiting firewall vulnerabilities and holes software code Examples Miami 16yr old – hacked NASA servers winning 6 mos. in jail MafiaBoy, 14yrs old - DoS Attacks on Yahoo, CNN, eBay & Amazon Downingtown PA 15yr old - 41,000 SSNs from residents Consequences were serious but Smaller scale / less frequent then No target rich Mobile User community to exploit State of the art - Symantec, Norton and McAfee Focused on Threat Prevention and Protection
  5. Cloud upped the ante - Enabled Intrusion 2.0 Un-intended consequences Enhanced Cloud Applications Accessibility and Mobility Accepted State of the ART for Internet Based Applications Hop from Port to Port Encryption their Traffic Exploiting Open Ports and Tunneling through approved applications Analogy Cloud - information highway with on ramps and off ramps. Vehicles = APPLICATIONS Drivers both licensed or un-licensed Visiting Grandmas Transporting Contraband. Mix of Applications per vehicle What is on your device – Audience’s Mobile Apps Pintrest, Amazon, Salesforce, Company Apps, etc.
  6. Well financed and they have grown up to be experts Enormous $$$ Gain to be had Remember Target or Sony? Defense Dept. (and others) Cyber Warfare initiatives Machiavelli - “The best defense is a good offense” Nation States and Organized crime dwarf the efforts of individual hackers Great career for Grown up experts Tools of the trade… Zero Day Malware – unknown vulnerabilities – days to years to Detect Polymorphic Protocols – ScambleSuit – defeat Deep Packet Inspection (DPI) originally to override Nation/State Censorship Embedded Malware within Virtual Machines Sophisticated Command and Control protocols embedded in Peer-to-peer, social and Cloud networks Cyber Criminals leverage Google AppEngine - multi-server command and control centers
  7. add the Mobility Factor Workplace BYOD – Multiple Devices – Double Agents – Personal & Business Tablet PC Smart Phone iWatch Fit Bit. Point out all of the pathways Electronic Drafting Right on your heels through security and on the Corporate database and Intellectual Property archives
  8. Good News – Cyber Security is Good Business Upstarts and Established are innovating backed by smart money. Downside examples, 2014 Target breach - about $110 million 2007 TJX Companies - about $250 million 2011 Sony Playstation hack - about $170 million For existing traditional IT Ports – Protocols & IP Address based will remain PREVENT & PROTECT MBOs will remain BUT CLOUDS MEAN - YOU DON’T OWN IT ALL Control is delegated in Cyber-Space Cyber Security Investments = on DETECTION and RESPONSE to attacks …. within Applications and Virtualized Environments within the User’s (often personal) Devices and Inside unstructured data or CONTENT in the form of video files, audio files and pdf documents
  9. Call to Action. Shift % traditional prevent and protect MBOs to Detect and Respond Zero sum $$$ Hire a CISO - adjunct to CFO and CIO. Due diligence - Cloud Provider Security Policies and Plans Engage security solutions vendor/partner Don’t forget Mobility. Roadmap reviews with all of them Know where they are going and provide input. The ability to prowl around applications, VMs and unstructured data Require resources capable of deploying deep analytics. Find a capable services provider in that area (F100). Start - Time is of the essence. Remember Sony at $170M – AT&T at $2M – Fidelity Investments at $1M and Target at $141M – not to mention your Customers Data which is – Priceless!
  10. The big take away is……. Cyber Attacker will eventually hit the mark The State of the Art for Security in the Cloud is now…… Don’t wait for more How soon can you detect an attack? How fast and how will you respond? Thank you for listening