SlideShare una empresa de Scribd logo
1 de 46
VeriSign ®  iDefense ®  Security Intelligence Services Overview  ,[object Object],[object Object]
Security Incidents Dominate Headlines Oracle to fix 73 security bugs next week   Computerworld, April 2011 WikiLeaks Releases Guantánamo Bay Prisoner Reports   Wired , April 2011 Royal Navy hacker claims to have broken into space agency site  The Register , April 2011 Malware Aimed at Iran Hit Five Sites, Report Says New York Tim , February 2011 Sony PlayStation suffers massive data breach  Reuters , April 2011
Increased Sophistication of Attacks / Attackers More than  286 million  new malware variants detected in 2010  1 93%   increase in malware attacks in 2011  1   56%   of malicious code infections were Trojans in 2010  1 Reported online crime losses totaled  $559.7M  USD   in 2009 – a total of 336,655 complaints, a  111%  and  22.3%  increase from 2008, respectively.  2   Cyber criminals are targeting Web 2.0 and cloud technologies Ecommerce fraud in 2010 estimated to  $2.7   billion  3 More than  115,000   reported phishing attacks in 2010  4
New and Emerging Attack Vectors—Real & Present ,[object Object],[object Object],[object Object],Source: Lattuf2:  http://tinyurl.com/djyqk4 Source: Waldec :  CarnalOwnage, 01/09 ,[object Object],[object Object],[object Object],Underground  Evolution Malicious Infrastructure Technology  Disruptors Waldec Trojan: 2500 Unique IPS
The Challenge of Keeping Up Which  patches  are critical? Which aren’t? Is this a  real threat ? Are there threats I don’t know about? How do I get the most out of our security infrastructure  investments ? How can I stay ahead of the  threat  curve? How do I maximize our  incident response  efforts? How can I make sense of  global thr eat implications? How do I best inform executive management of the most relevant  risk factors ?
The Solution Proactively Protect Respond In Real-time Understand Global Implications   Remediate Online Fraud Prioritized Vulnerability and Patch Management Enable Risk Management
What Can VeriSign iDefense Do for You? ,[object Object],[object Object],[object Object],[object Object],[object Object],™
VeriSign iDefense Security Intelligence Services The Leading Security Intelligence Research Shop VeriSign iDefense delivers deep analysis and actionable intelligence related to vulnerabilities, malicious code and geopolitical threats to enable protection against critical infrastructure attacks Industry-Leading Services Offerings ,[object Object],[object Object],Actively Gathering Global Intelligence Since 1998 ,[object Object],[object Object],Recognized by  Frost & Sullivan The Leading Provider of Exclusive Vulnerabilities (2009)
VeriSign iDefense Security Intelligence Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs Delivering Security Operational Support
The VeriSign iDefense Intelligence Process  VeriSign iDefense executes a disciplined process to get intelligence data to users Discovery Analysis Publication Delivery XML Appliance Portal Email Original Vulnerabilities Geopolitical Threats Malicious Code Intelligence Report Archive Archive Intelligence Reports Publish Intelligence Reports Create Intelligence Reports Analyst Desktop Original Vulnerabilities &  VeriSign iDefense Labs The World Public Sources Centralized Data Collection Public Vulnerabilities Desktop Tools & Freeware VeriSign  Intelligence Network RSS Feed Int’l Cyber Intelligence
The VeriSign iDefense Original Vulnerability Process  Each Vendor Works with VeriSign on Public Disclosure Schedule Discovery Notification Responsible Disclosure Public Disclosure By Vendor The World VeriSign iDefense Vulnerability Advanced Research Labs Verification Original Vulnerabilities VeriSign iDefense process for notifying customers and vendors of vulnerabilities VCP Network VeriSign iDefense Customers Vendor
Get the Best Security Intelligence with iDefense Quick Stats ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Key Attributes  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
iDefense Portal
Intelligence that Warns when a Threat Is Real ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Midnight Microsoft Announces Out of Band Patch; Exploit Code in the Wild 2 AM First Leader Team Discussion 5 AM Decision to go to War Room 10 AM First Meeting; Situational Awareness 3 PM Last Meeting; Situational Awareness 5:30 PM Customer Call 1 PM MS releases OOB Patch VAT issued an alert Exploit Code Found PCAPS Developed;  Sigs Developed Customer Information Coming In Exploit Code Built VeriSign iDefense Threat Report Updated 7X
Ways to Consume VeriSign iDefense Intelligence Frequency of Research Delivery  Daily ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Weekly / Bi-Weekly ,[object Object],[object Object],[object Object],[object Object],Monthly ,[object Object],[object Object],By Request ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],8 Reports / Year ,[object Object],Automated ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VeriSign iDefense Integrated Intelligence ,[object Object],[object Object],[object Object],Vulnerability Management SIEM Platform IT GRC
iDefense Service Bundles:  Support Security Ops *VeriSign iDefense offers several integration scenarios with leading security management platforms and tools.  Please consult your Account Executive to review a full list of available integrations and discuss the value of integrated analytical intelligence into your enterprise environment. Global Threat Intelligence Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Vulnerability Intelligence Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Incident Response Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fraud Mitigation Services ,[object Object],[object Object],[object Object],[object Object],[object Object],Add-On Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
iDefense Threat Protection-Level Service Bundles Core Service Standard Service ,[object Object],[object Object],[object Object],[object Object],Tactical Research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Tactical Research Comprehensive Service Tactical Research iDefense ®  Intelligence Feed FLASH Reports Strategic Research iDefense ®  Analyst Service  iDefense ®  Threat Briefings iDefense ®  Designated Analyst Service Malcode Rapid Report Service IP Reputation Service Analyst Team Weekly Threat Report Vulnerability Summary Reports Malicious Code Summary Reports Patch Tuesday Reports Topical Research Reports Global Threat Research Reports ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],iDefense ®  Analyst Service  iDefense ®  Threat Briefings Malcode Rapid Report Service Enhanced Service Strategic Research Tactical Research Weekly Threat Report Vulnerability Summary Reports Malicious Code Summary Reports Microsoft Patch Tuesday Reports Topical Research Reports Analyst Team
Intelligence In Action—A Case Study A top 10 enterprise services firm saved about  $5M  by using VeriSign iDefense analysis to decide—correctly—not to install three  out-of-cycle patches … even though other security organizations were recommending them Vulnerability Management Assistance Save time  and money
Intelligence In Action—A Case Study On Feb 26, 2009, a mass mailer virus was identified internally within a top global enterprise services firm attempting to spread to all addresses within an address book.  Within 3 hours  of submission to VeriSign iDefense Rapid Response Team, analysis and  remediation strategies  were delivered that enabled institution of immediate and accurate file restrictions and updated AV signatures to thwart the threat of the Waledec Mass Email Worm. Incident Response Faster and smarter remediation
Intelligence In Action—A Case Study A top 10 US bank leveraged VeriSign iDefense world-class  malcode  analysis services that lead to the  identification  and cancelation of a  fraudulent online bank transaction  in the amount of $82K. Fraud Mitigation Gain visibility and confidence
Intelligence In Action—A Case Study Recently, a VeriSign iDefense client was considering expansion into Russia and need to understand how this might impact their risk level.  By leveraging iDefense Global Threat Intelligence Services, the organization increased awareness of prominent  insider threats in the region .  As a result, intelligence delivered in the  context  of the client’s  geographical needs  was used in making better decisions around review of local security practices, hiring of local personnel and background checks.  Global Threat Intelligence Drives Threat Awareness
The Bottom Line ,[object Object],[object Object],[object Object],[object Object],[object Object]
Q & A
 
APPENDIX
iDefense Service Bundles:  Support Security Ops *VeriSign iDefense offers several integration scenarios with leading security management platforms and tools.  Please consult your Account Executive to review a full list of available integrations and discuss the value of integrated analytical intelligence into your enterprise environment. Global Threat Intelligence Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Vulnerability Intelligence Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Incident Response Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Fraud Mitigation Services ,[object Object],[object Object],[object Object],[object Object],[object Object],Add-On Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
iDefense Threat Protection-Level Service Bundles Core Service Standard Service ,[object Object],[object Object],[object Object],[object Object],Tactical Research ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Tactical Research Comprehensive Service Tactical Research iDefense ®  Intelligence Feed FLASH Reports Strategic Research iDefense ®  Analyst Service  iDefense ®  Threat Briefings iDefense ®  Designated Analyst Service Malcode Rapid Report Service IP Reputation Service Analyst Team Weekly Threat Report Vulnerability Summary Reports Malicious Code Summary Reports Patch Tuesday Reports Topical Research Reports Global Threat Research Reports ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],iDefense ®  Analyst Service  iDefense ®  Threat Briefings Malcode Rapid Report Service Enhanced Service Strategic Research Tactical Research Weekly Threat Report Vulnerability Summary Reports Malicious Code Summary Reports Microsoft Patch Tuesday Reports Topical Research Reports Analyst Team
VeriSign iDefense Security Intelligence Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs VeriSign iDefense Intelligence Organization Editorial
VeriSign iDefense Intelligence Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs Provides vulnerability mitigation intelligence by conducting leading-edge reverse-engineering research and analysis of submitted and internally uncovered computer vulnerabilities, exploits, and attacks
VeriSign iDefense Intelligence Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Provides in-depth research and analysis on public vulnerabilities and exploits to ensure customers receive actionable vulnerability notification and mitigation options Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs
VeriSign iDefense Intelligence Organization ,[object Object],[object Object],[object Object],[object Object],[object Object],The mission of the FS-ISAC is to enhance the ability of the financial services sector, and its critical infrastructure, to prepare and respond to cyber and physical threats, vulnerabilities and incidents Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs
VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Provides a 24/7/365 incident response service in the form of an executive briefing to  occur within three (3) hours of a customer submission and discussion of incident
VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Provides notification of malicious code threats to IT security breaches to augment  customers’ risk management process
VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Provides research on the dynamics of the world’s cyber security environments and its  interconnections through combined analytical methods—From the behavioral and information  sciences to the development of research programs and networks of relationships
VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs Editorial ,[object Object],[object Object],[object Object],[object Object]
VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ways to Consume VeriSign iDefense Intelligence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Depth and Frequency of VeriSign iDefense Intelligence
Security Incidents Dominate Headlines Monster.com Hit With Possible Monster-Sized Data Breach   InformationWeek , January 2009  Cyber Attacks Jam Government and Commercial Web Sites in U.S. and South Korea  New York Times , July 2009 Updated MyDoom Responsible for DDoS Attacks computerworld.com, July 2009  Electricity Grid in U.S. Penetrated By Spies Wall Street Journal, April 2009 Obama's Copter Plans Turn Up On The Web New York Post , March 2009 Vast Spy System Loots Computers in 103 Countries   New York Times , March 2009 Former employee accused of stealing secrets from Goldman Sachs Group Chicago Tribune , July 2009 DOD seeks defense against denial-of-service attacks  fcw.com, July 2009 Data breaches cost $6.6 million on average, survey finds CNET , February 2009
Growth of Threats and Exposure / Risk Your Business Network
Intelligence that Warns when a Threat Is Not ,[object Object],[object Object],[object Object],[object Object],[object Object],60 Minutes Reports 1  Apr Internet Meltdown 29 Mar 23 Oct Microsoft Announces Out of Band Patch;  MS 08-067 24 Nov First Conficker  in the Wild 01 Jan 10 Dec First in-depth Analysis on Conficker  in MSR 2nd Conficker  in the Wild 28 Jan Publishes Domain Generation Algorithm 29 Jan Publishes Downatool 09 Mar 3rd Conficker  in the Wild 16 Mar 4th Conficker  in the Wild Media Reports 1  Apr Internet Meltdown 23 Mar Nothing Happens 1 Apr Accurate Prediction Detection Tool VeriSign iDefense   Threat Report: Explaining Why The Internet Would Not Melt Accurate Intelligence Allows You to Focus  on What Matters Most
What Customers Tell Us ,[object Object],[object Object],[object Object],[object Object],[object Object],“ With VeriSign iDefense, they have the world’s most experienced multinational network of security experts  acting as an extension of their teams, with exclusive access to the most in-depth cyber threat intelligence available.”
VeriSign iDefense Research Methodology ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs VeriSign iDefense Intelligence Organization Editorial
Ways to Consume VeriSign iDefense Intelligence ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VeriSign iDefense Security Operational Support ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
VeriSign iDefense in Summary ,[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterVMUG IT
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesSkybox Security
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Kyle Lai
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Securityxband
 
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Enterprise Management Associates
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligencexband
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server securityxband
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareTzar Umang
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Ioannis Aligizakis, M.Sc.
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromPROIDEA
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chainSymantec Brasil
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2016
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye, Inc.
 
Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos, Inc.
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityDragos, Inc.
 
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks  Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks Dragos, Inc.
 
Tools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense SolutionsTools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense SolutionsSkycure
 

La actualidad más candente (20)

TrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data CenterTrendMicro - Security Designed for the Software-Defined Data Center
TrendMicro - Security Designed for the Software-Defined Data Center
 
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security ChallengesInfosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
Infosec 2014: Risk Analytics: Using Your Data to Solve Security Challenges
 
Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016Pactera - Cloud, Application, Cyber Security Trend 2016
Pactera - Cloud, Application, Cyber Security Trend 2016
 
Advanced Threat Defense Intel Security
Advanced Threat Defense  Intel SecurityAdvanced Threat Defense  Intel Security
Advanced Threat Defense Intel Security
 
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
Solving the Asset Management Challenge for Cybersecurity (It’s About Time)
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Talos threat-intelligence
Talos threat-intelligenceTalos threat-intelligence
Talos threat-intelligence
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
Data Center Server security
Data Center Server securityData Center Server security
Data Center Server security
 
Cloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-wareCloud security From Infrastructure to People-ware
Cloud security From Infrastructure to People-ware
 
Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy Microsoft Cyber Defense Operation Center Strategy
Microsoft Cyber Defense Operation Center Strategy
 
CONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin NystromCONFidence2015: Real World Threat Hunting - Martin Nystrom
CONFidence2015: Real World Threat Hunting - Martin Nystrom
 
Addressing the cyber kill chain
Addressing the cyber kill chainAddressing the cyber kill chain
Addressing the cyber kill chain
 
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Microfestival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
festival ICT 2013: Gli attacchi mirati e la Difesa Personalizzata Trend Micro
 
FireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to KnowFireEye Advanced Threat Protection - What You Need to Know
FireEye Advanced Threat Protection - What You Need to Know
 
Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos year in review (yir) 2018
Dragos year in review (yir) 2018
 
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker MaturityHow Long to Boom: Understanding and Measuring ICS Hacker Maturity
How Long to Boom: Understanding and Measuring ICS Hacker Maturity
 
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks  Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
Intelligence-Driven Industrial Security with Case Studies in ICS Attacks
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Tools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense SolutionsTools for Evaluating Mobile Threat Defense Solutions
Tools for Evaluating Mobile Threat Defense Solutions
 

Similar a Verisign iDefense Security Intelligence Services

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckArrow ECS UK
 
The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseChristiaan Beek
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityNetworkCollaborators
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscapeyohansurya2
 
Securing Your Business #2 - Role Of The Vendor
Securing Your Business #2 - Role Of The VendorSecuring Your Business #2 - Role Of The Vendor
Securing Your Business #2 - Role Of The VendorDatapipe
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceValery Yelanin
 
FireEye Report.ppt
FireEye Report.pptFireEye Report.ppt
FireEye Report.pptDubemJavapi
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to InfrastructureJorge Orchilles
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexIBM Security
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...patmisasi
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...James Anderson
 
Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown AlienVault
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Dell World
 
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondLessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondAPNIC
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Alan Kan
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overviewCisco Canada
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake finalMinh Le
 

Similar a Verisign iDefense Security Intelligence Services (20)

Ibm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deckIbm security overview 2012 jan-18 sellers deck
Ibm security overview 2012 jan-18 sellers deck
 
The 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypseThe 4horsemen of ics secapocalypse
The 4horsemen of ics secapocalypse
 
NetWitness
NetWitnessNetWitness
NetWitness
 
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive securityCisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
Cisco Connect 2018 Malaysia - Risk less, achieve more with proactive security
 
Corporate threat vector and landscape
Corporate threat vector and landscapeCorporate threat vector and landscape
Corporate threat vector and landscape
 
Securing Your Business #2 - Role Of The Vendor
Securing Your Business #2 - Role Of The VendorSecuring Your Business #2 - Role Of The Vendor
Securing Your Business #2 - Role Of The Vendor
 
FireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment ExperienceFireEye Use Cases — FireEye Solution Deployment Experience
FireEye Use Cases — FireEye Solution Deployment Experience
 
FireEye Report.ppt
FireEye Report.pptFireEye Report.ppt
FireEye Report.ppt
 
Discover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & ManagementDiscover an IT Infrastructure Services & Management
Discover an IT Infrastructure Services & Management
 
Emerging Threats to Infrastructure
Emerging Threats to InfrastructureEmerging Threats to Infrastructure
Emerging Threats to Infrastructure
 
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence IndexKey Findings from the 2015 IBM Cyber Security Intelligence Index
Key Findings from the 2015 IBM Cyber Security Intelligence Index
 
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...Task   Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
 
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
 
Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown Spice world 2014 hacker smackdown
Spice world 2014 hacker smackdown
 
Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats Key Security Insights: Examining 2014 to predict emerging threats
Key Security Insights: Examining 2014 to predict emerging threats
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyondLessons learned from 2017 cybersecurity incidents, 2018 and beyond
Lessons learned from 2017 cybersecurity incidents, 2018 and beyond
 
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...Discovering the Value of Verifying Web Application Security Using IBM Rationa...
Discovering the Value of Verifying Web Application Security Using IBM Rationa...
 
Cisco umbrella overview
Cisco umbrella overviewCisco umbrella overview
Cisco umbrella overview
 
Custom defense - Blake final
Custom defense  - Blake finalCustom defense  - Blake final
Custom defense - Blake final
 

Más de TechBiz Forense Digital

10 atributos que o seu firewall precisa ter
10 atributos que o seu firewall precisa ter10 atributos que o seu firewall precisa ter
10 atributos que o seu firewall precisa terTechBiz Forense Digital
 
En case cybersecurity automating incident response-bhagtani-5-22-2012 [compat...
En case cybersecurity automating incident response-bhagtani-5-22-2012 [compat...En case cybersecurity automating incident response-bhagtani-5-22-2012 [compat...
En case cybersecurity automating incident response-bhagtani-5-22-2012 [compat...TechBiz Forense Digital
 
Ata srp 015 2010 v1 - marinha - netwitness
Ata srp 015 2010 v1 - marinha - netwitnessAta srp 015 2010 v1 - marinha - netwitness
Ata srp 015 2010 v1 - marinha - netwitnessTechBiz Forense Digital
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesTechBiz Forense Digital
 
Artigo velasquez (combate a crimes digitais)
Artigo velasquez (combate a crimes digitais)Artigo velasquez (combate a crimes digitais)
Artigo velasquez (combate a crimes digitais)TechBiz Forense Digital
 
C:\Fakepath-6 09 10 Financial Fraud Webinar
C:\Fakepath-6 09 10 Financial Fraud WebinarC:\Fakepath-6 09 10 Financial Fraud Webinar
C:\Fakepath-6 09 10 Financial Fraud WebinarTechBiz Forense Digital
 
Avanços tecnológicos em perícia computacional e resposta a incidentes
Avanços tecnológicos em perícia computacional e resposta a incidentesAvanços tecnológicos em perícia computacional e resposta a incidentes
Avanços tecnológicos em perícia computacional e resposta a incidentesTechBiz Forense Digital
 

Más de TechBiz Forense Digital (20)

Casos de sucesso
Casos de sucessoCasos de sucesso
Casos de sucesso
 
Cases forense[2]
Cases forense[2]Cases forense[2]
Cases forense[2]
 
Cnasi sp apresentação marcelo souza
Cnasi sp   apresentação marcelo souzaCnasi sp   apresentação marcelo souza
Cnasi sp apresentação marcelo souza
 
10 atributos que o seu firewall precisa ter
10 atributos que o seu firewall precisa ter10 atributos que o seu firewall precisa ter
10 atributos que o seu firewall precisa ter
 
En case cybersecurity automating incident response-bhagtani-5-22-2012 [compat...
En case cybersecurity automating incident response-bhagtani-5-22-2012 [compat...En case cybersecurity automating incident response-bhagtani-5-22-2012 [compat...
En case cybersecurity automating incident response-bhagtani-5-22-2012 [compat...
 
Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1Insa cyber intelligence_2011-1
Insa cyber intelligence_2011-1
 
Apresentação SegInfo
Apresentação SegInfoApresentação SegInfo
Apresentação SegInfo
 
Palantir
PalantirPalantir
Palantir
 
Online fraud report_0611[1]
Online fraud report_0611[1]Online fraud report_0611[1]
Online fraud report_0611[1]
 
Ata srp 015 2010 v1 - marinha - netwitness
Ata srp 015 2010 v1 - marinha - netwitnessAta srp 015 2010 v1 - marinha - netwitness
Ata srp 015 2010 v1 - marinha - netwitness
 
Road Show - Arcsight ETRM
Road Show - Arcsight ETRMRoad Show - Arcsight ETRM
Road Show - Arcsight ETRM
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
CyberSecurity
CyberSecurityCyberSecurity
CyberSecurity
 
VeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence ServicesVeriSign iDefense Security Intelligence Services
VeriSign iDefense Security Intelligence Services
 
Access data
Access dataAccess data
Access data
 
01 11- alexandre atheniense
01 11- alexandre atheniense01 11- alexandre atheniense
01 11- alexandre atheniense
 
16 03 - institucional
16 03 - institucional16 03 - institucional
16 03 - institucional
 
Artigo velasquez (combate a crimes digitais)
Artigo velasquez (combate a crimes digitais)Artigo velasquez (combate a crimes digitais)
Artigo velasquez (combate a crimes digitais)
 
C:\Fakepath-6 09 10 Financial Fraud Webinar
C:\Fakepath-6 09 10 Financial Fraud WebinarC:\Fakepath-6 09 10 Financial Fraud Webinar
C:\Fakepath-6 09 10 Financial Fraud Webinar
 
Avanços tecnológicos em perícia computacional e resposta a incidentes
Avanços tecnológicos em perícia computacional e resposta a incidentesAvanços tecnológicos em perícia computacional e resposta a incidentes
Avanços tecnológicos em perícia computacional e resposta a incidentes
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

Verisign iDefense Security Intelligence Services

  • 1.
  • 2. Security Incidents Dominate Headlines Oracle to fix 73 security bugs next week Computerworld, April 2011 WikiLeaks Releases Guantánamo Bay Prisoner Reports Wired , April 2011 Royal Navy hacker claims to have broken into space agency site The Register , April 2011 Malware Aimed at Iran Hit Five Sites, Report Says New York Tim , February 2011 Sony PlayStation suffers massive data breach Reuters , April 2011
  • 3. Increased Sophistication of Attacks / Attackers More than 286 million new malware variants detected in 2010 1 93% increase in malware attacks in 2011 1 56% of malicious code infections were Trojans in 2010 1 Reported online crime losses totaled $559.7M USD in 2009 – a total of 336,655 complaints, a 111% and 22.3% increase from 2008, respectively. 2 Cyber criminals are targeting Web 2.0 and cloud technologies Ecommerce fraud in 2010 estimated to $2.7 billion 3 More than 115,000 reported phishing attacks in 2010 4
  • 4.
  • 5. The Challenge of Keeping Up Which patches are critical? Which aren’t? Is this a real threat ? Are there threats I don’t know about? How do I get the most out of our security infrastructure investments ? How can I stay ahead of the threat curve? How do I maximize our incident response efforts? How can I make sense of global thr eat implications? How do I best inform executive management of the most relevant risk factors ?
  • 6. The Solution Proactively Protect Respond In Real-time Understand Global Implications Remediate Online Fraud Prioritized Vulnerability and Patch Management Enable Risk Management
  • 7.
  • 8.
  • 9.
  • 10. The VeriSign iDefense Intelligence Process VeriSign iDefense executes a disciplined process to get intelligence data to users Discovery Analysis Publication Delivery XML Appliance Portal Email Original Vulnerabilities Geopolitical Threats Malicious Code Intelligence Report Archive Archive Intelligence Reports Publish Intelligence Reports Create Intelligence Reports Analyst Desktop Original Vulnerabilities & VeriSign iDefense Labs The World Public Sources Centralized Data Collection Public Vulnerabilities Desktop Tools & Freeware VeriSign Intelligence Network RSS Feed Int’l Cyber Intelligence
  • 11. The VeriSign iDefense Original Vulnerability Process Each Vendor Works with VeriSign on Public Disclosure Schedule Discovery Notification Responsible Disclosure Public Disclosure By Vendor The World VeriSign iDefense Vulnerability Advanced Research Labs Verification Original Vulnerabilities VeriSign iDefense process for notifying customers and vendors of vulnerabilities VCP Network VeriSign iDefense Customers Vendor
  • 12.
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Intelligence In Action—A Case Study A top 10 enterprise services firm saved about $5M by using VeriSign iDefense analysis to decide—correctly—not to install three out-of-cycle patches … even though other security organizations were recommending them Vulnerability Management Assistance Save time and money
  • 20. Intelligence In Action—A Case Study On Feb 26, 2009, a mass mailer virus was identified internally within a top global enterprise services firm attempting to spread to all addresses within an address book. Within 3 hours of submission to VeriSign iDefense Rapid Response Team, analysis and remediation strategies were delivered that enabled institution of immediate and accurate file restrictions and updated AV signatures to thwart the threat of the Waledec Mass Email Worm. Incident Response Faster and smarter remediation
  • 21. Intelligence In Action—A Case Study A top 10 US bank leveraged VeriSign iDefense world-class malcode analysis services that lead to the identification and cancelation of a fraudulent online bank transaction in the amount of $82K. Fraud Mitigation Gain visibility and confidence
  • 22. Intelligence In Action—A Case Study Recently, a VeriSign iDefense client was considering expansion into Russia and need to understand how this might impact their risk level. By leveraging iDefense Global Threat Intelligence Services, the organization increased awareness of prominent insider threats in the region . As a result, intelligence delivered in the context of the client’s geographical needs was used in making better decisions around review of local security practices, hiring of local personnel and background checks. Global Threat Intelligence Drives Threat Awareness
  • 23.
  • 24. Q & A
  • 25.  
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39. Security Incidents Dominate Headlines Monster.com Hit With Possible Monster-Sized Data Breach InformationWeek , January 2009 Cyber Attacks Jam Government and Commercial Web Sites in U.S. and South Korea New York Times , July 2009 Updated MyDoom Responsible for DDoS Attacks computerworld.com, July 2009 Electricity Grid in U.S. Penetrated By Spies Wall Street Journal, April 2009 Obama's Copter Plans Turn Up On The Web New York Post , March 2009 Vast Spy System Loots Computers in 103 Countries New York Times , March 2009 Former employee accused of stealing secrets from Goldman Sachs Group Chicago Tribune , July 2009 DOD seeks defense against denial-of-service attacks fcw.com, July 2009 Data breaches cost $6.6 million on average, survey finds CNET , February 2009
  • 40. Growth of Threats and Exposure / Risk Your Business Network
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.

Notas del editor

  1. PlayStation Network Hack Leaves Credit Card Info at Risk Wired, April 2011 http://www.wired.com/gamelife/2011/04/playstation-network-hacked/ 'Anonymous' attacks Visa.com, Mastercard.com in support of WikiLeaks The Washington Post, Dec. 2010 http://voices.washingtonpost.com/blog-post/2010/12/mastercardcom_hacked_by_wikile.html Malware Aimed at Iran Hit Five Sites, Report Says New York Times, February 2011 http://www.nytimes.com/2011/02/13/science/13stuxnet.html?ref=stuxnet Sony PlayStation suffers massive data breach http://www.reuters.com/article/2011/04/26/us-sony-stoldendata-idUSTRE73P6WB20110426 reuters.com - 04/27/2011 WikiLeaks Releases Guantánamo Bay Prisoner Reports http://www.wired.com/threatlevel/2011/04/wikileaks-gitmo  Wired, April 2011 Royal Navy hacker claims to have broken into space agency site The Register, April 2011 http://www.theregister.co.uk/2011/04/18/esa_website_hack Oracle to fix 73 security bugs next week Computerworld, April 2011 http://www.computerworld.com/s/article/9215838/Oracle_to_fix_73_security_bugs_next_week
  2. Overall, spam made up 74.68 percent of all messages in March 2011 State of Spam & Phishing Report, Symantec, April 2011 http://www.symantec.com/business/theme.jsp?themeid=state_of_spam [1] Symantec Internet Security Threat Report - trends for 2010 Volume 16, April 2011 http://www.symantec.com/business/threatreport/index.jsp http://news.techworld.com/security/3272431/malware-attacks-increased-by-93-in-2010-symantec-says/ - more than 286 million new malware variants Symantec detected in 2010 93% increase in the volume of Web-based attacks in 2010 over the volume observed in 2009. Trojans made up the highest percentage of the top 50 potential malicious code infections for 2010. In 2010, the percentage of potential infections by Trojans was 56 percent. [2] IC3 2009 Annual Report on Internet Crime http://www.ic3.gov/media/2010/100312.aspx - The Internet Crime Complaint Center (IC3) received a total of 336,655 complaints, a 22.3 percent increase from 2008. The total loss linked to online fraud was $559.7 million; this is up from $265 million in 2008. [3] http://www.internetretailer.com/2011/01/18/fraud-losses-fall [4] APWG Global Phishing Survey: Domain Name Use and Trends in 2H2010 The bad guys are getting more sophisticated and targeted in their motives: DDoS attacks Malware increasing to include data stealing trojans Phishing schemes becoming more and more prominent Taking advantage of economic downturn is working in the favor of attackers … Traditional network security is not enough 1 Kaspersky Labs 2 McAfee 2009 threat predictions report 3 Symantec, Internet Security Report XIV, April 09 4 Trend Micro, Focus Report: Data Stealing Malware . July 7, 2009 SC Magazine 5 APACS, UK Payments Association, October 2008 6 McAfee 7 SC magazine, Dan Raywood, May 22, 2009
  3. Underground Evolution – critical mass has been reached The cyber security landscape has fundamentally changed and professionalized cyber criminals have emerged Muslim extremists use cyber fraud as a way to fund their agendas Amateur hacker groups practice cyber espionage in the open in China and elsewhere Cyber war has become a legitimate tool to accomplish political goals, as in Estonia and Georgia. Malicious Infrastructures are present Malicious hackers seem to be applying increased scrutiny to their victims’ critical infrastructure All the while building their own infrastructure to increase efficiency and survivability Bullet Proof Hosting Fastflux iFrames Security Disruptors Security disruptors, which result from new technologies or developments in the culture that will fundamentally change how the business enterprise secures its environments. Mobile Device & Application = Mobile Threat IPv6 Virtualization
  4. Conflict Internal security teams can’t keep up with the soaring volume of sophisticated threats. Late detection, poor clarity around which threats are most severe, and the difficulty of reprioritizing resources for remediation puts your entire business on the line. Security breaches can and do destroy businesses – costing millions in lost revenue, shareholder value and customer trust. Market share loss swiftly follows. The volume of threats is massive, and accelerating: new vulnerabilities, new attacks, and new players. Each threat is constantly evolving. Internal security teams can’t keep up. It’s almost impossible for over-tapped internal teams to confidently prioritize which threats present the greatest risk. Companies inevitably over-spend on false ‘emergencies.’
  5. The solution to keeping up directly addresses many of the biggest challenges that prospects face, especially today. Any security partnership or intelligence organization must deliver Accurate, actionable and detailed threat intelligence to equip an organization’s security team with the following capabilities: Proactively protect your business from the threats that matter most. Actively respond in real-time to malicious threats with deep analysis of what the threat is, where it is coming from and how to mitigate it. Understand the global implications of any emerging or existing threat, as it evolves. Remediate online fraud with rapid credential recovery and constant monitoring of malicious IPs. Prioritize your threat and vulnerability management strategy – and maximize internal resources. Move from ‘security management’ to ‘risk management’ – and take the lead in communicating this strategy to the executive team.
  6. We are the leading security intelligence research shop. No one else approaches security the way we do. 24 hours a day, every day, we provide vendor neutral security intelligence as our core competency If you look at our marquee customer base you can see that our services are taken seriously as again we are integrated into many of the 3 letter government organizations as a trusted intelligence source, largest financial services companies like Goldman Sachs, insurance, healthcare, retailers like Wal-Mart, and large software companies like Microsoft use our services every day. All of our intelligence is created by six highly specialized teams that work in a matrixes function to discover and analyze emerging threats. Additionally, we have been gathering intelligence since 98 and are our primary team is located in the greater Washington DC area (Dulles, VA) with global visibility and presence through VCP and ongoing field operations. Examples of 24 x 7 – Team worked non-stop between Christmas and New Years 2006, 2007 and 2008
  7. This slide shows the process we go through to deliver intelligence. I show this slide because some of what I’ve spoken about so far is kind of “cloak and dagger”. We have a discovery phase where information is collected in all sorts of ways, which is then.. Fed to our analysts at various locations in the world at different times who then. Turn that information into intelligence reports of various types such as original vulnerabilities, threats, malicious code, etc. The information is then delivered to our customers in one of four primary means. XML webservice or appliance. We have a XML webservice where report data can be sent to you via a XML webservice or also through an appliance that you can keep onsite where you can utilize the data how ever you want. We also have a secure portal that you can log into to perform research into past threats or read up on recent reports. Also in the portal you can customize your profiles for delivery. Delivery profiles which help customze your e-mail delivery can allow you to make sure your only getting the reports you want from the hundreds created every day. You can get the Oracle reports directly to your oracle guy, or the Malicious Code reports to your malicious code guy, or even reports of only a certain severity of a certain product set once a week to a specific person. The options are endless You can also choose to receive alerts as well via RSS.
  8. This slide shows our exclusive vulnerability life cycle from discovery to disclosure. The first section here is when one of our 400 researchers in one of 46 different countires in our VCP network discover a new vulnerability. They send this vulnerability to our VeriSign iDefense labs team who verifies the vulnerability is in fact a vulnerability that would be of importance to the security of the internet and to our customers. We then perform our own research documenting how the vulnerability and its associated exploit code works and then work with the Vendor of the vulnerable product to ensure patch development begins. We share this information with the Vendors to better assist them in creating the patch and then share the information with our customers usually the same day. This allows our customers to understand that they may have a device or application in their environment that is vulnerable and they can use our mitigation and work arounds if available to proactively protect themselves. Now the next portion is important, the Disclosure phase. The actual disclosure time from when we notify our customers and vendor to when the vendor makes the actual public disclosure is measured in months… not days… Right now for the last couple years of VeriSign iDefense exclusive vulnerabilities the average time it takes vendors to make a public disclosure of a vulnerability we discover is 121 days on average over the last two years.
  9. The following VeriSign iDefense capabilities help organizations develop a complete threat picture: A private, worldwide network of independent security researchers who provide exclusive advance notification of unpublished vulnerabilities and exploit code Identification and technical verification of original vulnerabilities Aggregation of raw data originating from more than 1,550 sources, including mailing lists, Web sites, and proprietary resources Around-the-clock monitoring and reporting on threats posed by viruses, worms, Trojan horses, spyware, and adware Analysis of the motivation behind cyber attacks and hacker groups to determine whether such groups will actually exploit a vulnerability Risk research and reporting as it pertains to global threats and emerging technologies and trends
  10. http://www.microsoft.com/technet/security/Bulletin/MS08-dec.mspx This slide represents what VeriSign iDefense can do for its customers when a real threat emerges. This particular threat came from the Microsoft announced Out of Band Patch in December 2008. Microsoft announced that they would release an out of band patch later on that same day (Dec 9 2008). Our Vulnerability team issued an alert to our customers about the upcoming event and alerted our team about the same. One of our Chinese analysts immediately found the exploit code referenced in the Microsoft Bulletin on a Chinese speaking forum and grabbed it for analysis. At 2 AM, the Vulnerability Team Leader and the Advanced Research Labs leader began discussing the seriousness of the issue and what VeriSign iDefense should do about it. At 5 AM, the team leads woke up the intelligence director to recommend going into War Room Mode. War Room mode is when VeriSign iDefense changes its operational tempo from every 24 hours to 3 hours; in other words, instead of meeting once a day to discuss intelligence matters, the team meets every three hours until an issue is resolved. In the mean time, the VeriSign iDefense Advanced Research Lab (ARL) collected its first set of PCAP files and created its first set of SNORT IDS signatures based on the Chinese sample collected earlier. The Vuln Aggregation Team (VAT) pushed those signatures to all customers. At 10 AM, VeriSign iDefense held its first War Room Meeting. We assigned research tasks. We gathered all customer questions that had begun to come in because of the MS announcement. By 1 PM, the ARL had developed their own Exploit Code that leveraged the Vulnerability description from MS. Now we had two distinct sets of exploit code for the same vulnerability. We knew this was dangerous. We recommended to customers to patch this vulnerability immediately, out of cycle if they could,. But definitely ahead of schedule. MS released the patch at 1 PM We closed the War Room down at 3 PM and hosted a customer call at 5:30 to discuss all that we learned. In 17 hours, we updated the alert for this one vulnerability 7 times with new information about how the vulnerability works, what the potential impact may be and how to mitigate it both with the patch and other work-arounds.
  11. Patch Management Assistance: Save time and money A top 10 enterprise services firm saved about $5M by using VeriSign iDefense Vulnerability Aggregation Team analysis to decide - correctly - not to install three out-of-cycle patches… even though other security organizations were recommending them Fraud Response: Gain visibility and confidence A top 10 US bank credential recovery, supported by VeriSign iDefense with additional malcode analysis, lead to the identification and cancelation of a fraudulent online bank transaction in the amount of $82K. Global Threat Awareness: Protect even against unknown threats On April 22nd, Finjan discovered a botnet with 1.9M users that had been in use since February and was hosted in the Ukraine and allowing malware to bypassed 90% of common anti-virus software. Nothing about this botnet stood out before the event since it appeared to be a completely average bot. However, the unnamed botnet was previously seen by VeriSign iDefense allowing all VeriSign iDefense customers to be protected against the threat months earlier. Incident Response: Extend your team for faster remediation On Feb 26 2009, a mass mailer virus was identified internally within a top global enterprise services firm attempting to spread to all addresses within an address book. A code sample was obtained and submitted to VeriSign iDefense Rapid Response team and within several minutes, receipt of the submission was confirmed by phone. Within 3 hours of submission, an VeriSign iDefense Rapid Report was delivered with analysis and remediation strategies that enabled institution of immediate and accurate file restrictions and updated AV signatures to thwart the threat of the Waledec Mass Email Worm. #4b Incident Response 2 of 2: Extend your team for faster remediation In November 2008, an VeriSign iDefense retail client was confronted with a critical attack whereby a user reported that they were having problems on one of the company websites—home page of a sub-site had been corrupted. A pop-up would appear that requests the user to purchase a fake antivirus product that once installed, the victim is asked to purchase the full version for $50 and redirection takes over the entire browser resulting in a useless fake page. The client quickly reached out to the VeriSign iDefense Rapid Response team as they were having some problems reproducing the error. VeriSign iDefense immediately identified and narrowed down the problem to a malicious advertisement fed into the website through advertising partners, not through a direct attack. The client was notified that all that was required was the removal of the advertisement to mitigate the attack. From the time the incident was reported to VeriSign iDefense to takedown of the ad was less than two hours. The biggest value to client was that with such a quick turnaround, not a single bit of negative press was released about the attack, which could have been detrimental during the holiday season.
  12. Patch Management Assistance: Save time and money A top 10 enterprise services firm saved about $5M by using VeriSign iDefense Vulnerability Aggregation Team analysis to decide - correctly - not to install three out-of-cycle patches… even though other security organizations were recommending them Fraud Response: Gain visibility and confidence A top 10 US bank credential recovery, supported by VeriSign iDefense with additional malcode analysis, lead to the identification and cancelation of a fraudulent online bank transaction in the amount of $82K. Global Threat Awareness: Protect even against unknown threats On April 22nd, Finjan discovered a botnet with 1.9M users that had been in use since February and was hosted in the Ukraine and allowing malware to bypassed 90% of common anti-virus software. Nothing about this botnet stood out before the event since it appeared to be a completely average bot. However, the unnamed botnet was previously seen by VeriSign iDefense allowing all VeriSign iDefense customers to be protected against the threat months earlier. Incident Response: Extend your team for faster remediation On Feb 26 2009, a mass mailer virus was identified internally within a top global enterprise services firm attempting to spread to all addresses within an address book. A code sample was obtained and submitted to VeriSign iDefense Rapid Response team and within several minutes, receipt of the submission was confirmed by phone. Within 3 hours of submission, an VeriSign iDefense Rapid Report was delivered with analysis and remediation strategies that enabled institution of immediate and accurate file restrictions and updated AV signatures to thwart the threat of the Waledec Mass Email Worm. #4b Incident Response 2 of 2: Extend your team for faster remediation In November 2008, an VeriSign iDefense retail client was confronted with a critical attack whereby a user reported that they were having problems on one of the company websites—home page of a sub-site had been corrupted. A pop-up would appear that requests the user to purchase a fake antivirus product that once installed, the victim is asked to purchase the full version for $50 and redirection takes over the entire browser resulting in a useless fake page. The client quickly reached out to the VeriSign iDefense Rapid Response team as they were having some problems reproducing the error. VeriSign iDefense immediately identified and narrowed down the problem to a malicious advertisement fed into the website through advertising partners, not through a direct attack. The client was notified that all that was required was the removal of the advertisement to mitigate the attack. From the time the incident was reported to VeriSign iDefense to takedown of the ad was less than two hours. The biggest value to client was that with such a quick turnaround, not a single bit of negative press was released about the attack, which could have been detrimental during the holiday season.
  13. Patch Management Assistance: Save time and money A top 10 enterprise services firm saved about $5M by using VeriSign iDefense Vulnerability Aggregation Team analysis to decide - correctly - not to install three out-of-cycle patches… even though other security organizations were recommending them Fraud Response: Gain visibility and confidence A top 10 US bank credential recovery, supported by VeriSign iDefense with additional malcode analysis, lead to the identification and cancelation of a fraudulent online bank transaction in the amount of $82K. Global Threat Awareness: Protect even against unknown threats On April 22nd, Finjan discovered a botnet with 1.9M users that had been in use since February and was hosted in the Ukraine and allowing malware to bypassed 90% of common anti-virus software. Nothing about this botnet stood out before the event since it appeared to be a completely average bot. However, the unnamed botnet was previously seen by VeriSign iDefense allowing all VeriSign iDefense customers to be protected against the threat months earlier. Incident Response: Extend your team for faster remediation On Feb 26 2009, a mass mailer virus was identified internally within a top global enterprise services firm attempting to spread to all addresses within an address book. A code sample was obtained and submitted to VeriSign iDefense Rapid Response team and within several minutes, receipt of the submission was confirmed by phone. Within 3 hours of submission, an VeriSign iDefense Rapid Report was delivered with analysis and remediation strategies that enabled institution of immediate and accurate file restrictions and updated AV signatures to thwart the threat of the Waledec Mass Email Worm. #4b Incident Response 2 of 2: Extend your team for faster remediation In November 2008, an VeriSign iDefense retail client was confronted with a critical attack whereby a user reported that they were having problems on one of the company websites—home page of a sub-site had been corrupted. A pop-up would appear that requests the user to purchase a fake antivirus product that once installed, the victim is asked to purchase the full version for $50 and redirection takes over the entire browser resulting in a useless fake page. The client quickly reached out to the VeriSign iDefense Rapid Response team as they were having some problems reproducing the error. VeriSign iDefense immediately identified and narrowed down the problem to a malicious advertisement fed into the website through advertising partners, not through a direct attack. The client was notified that all that was required was the removal of the advertisement to mitigate the attack. From the time the incident was reported to VeriSign iDefense to takedown of the ad was less than two hours. The biggest value to client was that with such a quick turnaround, not a single bit of negative press was released about the attack, which could have been detrimental during the holiday season.
  14. Patch Management Assistance: Save time and money A top 10 enterprise services firm saved about $5M by using VeriSign iDefense Vulnerability Aggregation Team analysis to decide - correctly - not to install three out-of-cycle patches… even though other security organizations were recommending them Fraud Response: Gain visibility and confidence A top 10 US bank credential recovery, supported by VeriSign iDefense with additional malcode analysis, lead to the identification and cancelation of a fraudulent online bank transaction in the amount of $82K. Global Threat Awareness: Protect even against unknown threats On April 22nd, Finjan discovered a botnet with 1.9M users that had been in use since February and was hosted in the Ukraine and allowing malware to bypassed 90% of common anti-virus software. Nothing about this botnet stood out before the event since it appeared to be a completely average bot. However, the unnamed botnet was previously seen by VeriSign iDefense allowing all VeriSign iDefense customers to be protected against the threat months earlier. Incident Response: Extend your team for faster remediation On Feb 26 2009, a mass mailer virus was identified internally within a top global enterprise services firm attempting to spread to all addresses within an address book. A code sample was obtained and submitted to VeriSign iDefense Rapid Response team and within several minutes, receipt of the submission was confirmed by phone. Within 3 hours of submission, an VeriSign iDefense Rapid Report was delivered with analysis and remediation strategies that enabled institution of immediate and accurate file restrictions and updated AV signatures to thwart the threat of the Waledec Mass Email Worm. #4b Incident Response 2 of 2: Extend your team for faster remediation In November 2008, an VeriSign iDefense retail client was confronted with a critical attack whereby a user reported that they were having problems on one of the company websites—home page of a sub-site had been corrupted. A pop-up would appear that requests the user to purchase a fake antivirus product that once installed, the victim is asked to purchase the full version for $50 and redirection takes over the entire browser resulting in a useless fake page. The client quickly reached out to the VeriSign iDefense Rapid Response team as they were having some problems reproducing the error. VeriSign iDefense immediately identified and narrowed down the problem to a malicious advertisement fed into the website through advertising partners, not through a direct attack. The client was notified that all that was required was the removal of the advertisement to mitigate the attack. From the time the incident was reported to VeriSign iDefense to takedown of the ad was less than two hours. The biggest value to client was that with such a quick turnaround, not a single bit of negative press was released about the attack, which could have been detrimental during the holiday season.
  15. Wrap up With VeriSign iDefense, companies have the world’s most experienced multinational network of security experts acting as an extension of their teams and exclusive access to the most in-depth cyber threat intelligence available. This translates into a security strategy that consistently delivers significant return-on-investment through cost savings – with proactive insights on true threats, and the intelligence to avoid false alarms – revenue and reputation protection through improved system and application availability -- through fraud mitigation and response support, etc. –Also emphasized making our customer exec look good, avoid attacks and support customer security teams in working faster, smarter through integration of intelligence, and analyst access… and share knowledge with security teams that results in evolution of security program maturity. What Next Steps do we want? Manage security risk. Not just threats. Cyber attacks can, and do, destroy companies, and the volume and severity of threats is explosive. Companies can’t keep up. VeriSign iDefense’s global cyber-intelligence team puts you in control, with proactive, accurate intelligence – and informed recommendations for threat mitigation. Basic ‘threat feeds’ don’t come close. Know which threats matter most. (And which ones don’t). Accuracy, detail and context are what make intelligence valuable. VeriSign iDefense delivers the most in-depth analysis of the complete threat landscape, so your team can focus on real threats, avoiding daily ‘emergencies’ and costly fire-drills. Stay 100+ days ahead of threats. The only way to protect your network is to spot threats early – and know which ones pose real risk. VeriSign iDefense is consistently 100 days ahead of everyone else, with deep analysis, accurate and actionable insight, and customized threat intelligence. This time advantage means you’re secure, when others are spending millions to fix damage that could have been prevented. Strengthen your security team VeriSign iDefense puts 60 of the world’s top security experts on your team, delivering exclusive research that goes far beyond publicly known vulnerabilities. While you watch your perimeter, we watch the world – bringing you actionable threat intelligence to keep your company safe. Trust the industry’s only truly vendor-independent provider of global cyber threat intelligence Hundreds of companies rely on VeriSign iDefense as their No. 1 trusted security partner, including 20 of the top 30 banks . As part of this select group, you gain access to the world’s best strategies for risk management and cyber intelligence.
  16. Growth of threats and exposure/risk has exponentially increase as organizations move beyond the enterprise to be competitive making information, data, application available to customers, partners and mobile workforce. Threats are growing in number as more critical data is being pushed beyond the enterprise and through online. With the addition of new attack vectors that are on not just seen on the horizon, they are real and closer… This has created-- The Perfect Storm Attacks are threatening your company’s defenses every hour, putting you at increased risk Risk in terms of multi-million-dollar costs: Loss of revenue And the devastating loss of reputation, Customer trust Market share
  17. http://www.microsoft.com/technet/security/Bulletin/MS08-067.mspx This slide represents what VeriSign iDefense can do for its customers when a perceived threat is not real. This particular threat came from the media scare about what the Conficker Worm might do on 1 April, April Fool’s Day, of this year. VeriSign iDefense began tracking the worm when MS annouced the OOB patch back in October 2008 and reverse engineered all of the variants for the next few months. We knew exactly what this worm was doing and when it would do it. By january, we even published a prediction algorithm that accurately predicted what domains Conficker would occupy as it spread. And, we published a detection tool to our customers so that they could see if they were infected. In late Mar, the media began reporting that the Internet would melt down because Conficker was going to do something drastic on 1 Apr. We knew by reverse engineering the code that what OCnficker was going to do on 1 Apr was massively update itself with new functionality but that nobody on the internet would be affected. The work could still be used for nefarious purposes, but the 1 Apr update was just an upgrade to the software. All of the VeriSign iDefense customers new this situation well before the media began to hype it and could talk their leadership down form the ledge because of the NPR story they heard that morning.
  18. Here are the tangible benefits (business, bandwidth, financial value, knowledge sharing/improved security program management) Should this be where we put the key stats mentioned above? With VeriSign iDefense, companies have the world’s most experienced multinational network of security experts acting as an extension of their teams and exclusive access to the most in-depth cyber threat intelligence available. This translates into a security strategy that consistently delivers substantial cost savings – with proactive insights on true threats, the intelligence to avoid false alarms and revenue protection through improved system and application availability . reputation protection through fraud mitigation and response support,
  19. Slides that walk through teams and focus Add visibility of VRSN Global Infrastructure
  20. Not sure if this is where we should place this page… Research/Report Packages—more info to follow Business Application (PM, IR, Fraud Response, Global Threat Awareness) Integrated Intelligence: Integrating deep and analytical research from VeriSign iDefense brings value to the landscape of security management tools and platforms
  21. Get crucial new insights within days – finding unexpected threats and shoring up looming vulnerabilities Know about upcoming attacks that matter to you -- and have an action plan in place – for zero exposure Gain new control over real threats, empty scares and scarce budget – with targeted knowledge that filters out the needles from the haystacks Custom recommendations for action – and the confidence that each is 100% vendor-neutral Extend your team with the resources of the world’s savviest security users – and more than 60 dedicated specialists watching your network Get the peace of mind that comes from being proactive – finally. And transform how your C-team thinks about security