+ All Categories
Home > Documents > Jason Miller | CEOmmeanet.org/wp-content/uploads/BitLyft-Presi-09.08.18.pdf · 2018. 11. 3. ·...

Jason Miller | CEOmmeanet.org/wp-content/uploads/BitLyft-Presi-09.08.18.pdf · 2018. 11. 3. ·...

Date post: 29-Jan-2021
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
21
Jason Miller | CEO [email protected] LinkedIn: /jasonmillerbitlyft www.bitlyft.com
Transcript
  • Jason Miller | [email protected]

    LinkedIn: /jasonmillerbitlyft

    www.bitlyft.com

  • www.bitlyft.com

  • Think cyberattacks are not an issue?

    www.bitlyft.com

  • www.bitlyft.com

  • www.bitlyft.com

  • Visible and InvisibleAttack Vectors

    www.bitlyft.com

  • Common visible vectors for an attacker

    • Humans!• We make mistakes

    • Hardware devices.• Endpoints• Servers• Firewalls• Switches• Smart Devices (IoT)

    • Exploited configurations• Insecure software

    • Malicious software• Causes confusion• Looks exactly like what

    your used to seeing

    www.bitlyft.com

  • Email | Web BrowserDNS | Fileless Malware

    Insider Threat

    www.bitlyft.com

    PresenterPresentation NotesSecurity Skills Assessment Appropriate Training

  • Invisible Threats• Compromised accounts go un-noticed

    • Office 365 accounts being used, un-noticed to system administrators.

    • VOIP Phone systems• SIP calls to foreign countries

    • Your company’s logo on a vendor website or other marketing collateral.

    www.bitlyft.com

    PresenterPresentation NotesMFA – helps with being able to monitor cloud accounts we have no control over.

  • www.bitlyft.com

  • www.bitlyft.com

  • www.bitlyft.com

    PresenterPresentation NotesSteve Irwin

  • www.bitlyft.com

    Dropbox

  • www.bitlyft.com

    Network traffic from machine going out to China and Russia.

  • Mature SIEM is well integrated across the entire IT landscape

    www.bitlyft.com

  • Machine Data Intelligence Fabric

    LogRhythm Network MonitorLogRhythm System Monitor

    Data Collection

    Data Generation

    Machine Data Intelligence (MDI) Fabric• Uniform Data Classification• Uniform Data Structure• Time Normalization• Risk Score

    • User Persona• Host Persona• Geolocation• Flow Direction• …more

    Search Analytics Machine Analytics

    Benefits Serves as IT environment abstraction layerEnables generic scenario representationAllows for high-efficacy packaged analytics modules

    www.bitlyft.com

    PresenterPresentation NotesTalking PointsMDI: Unrivaled in terms of precision and capabilities

  • BitLyft (Platform)

    RELAY SOAR

    Clients

    1

    FW

    SW

    Servers

    Endpoints

    Applications

    Databases

    2 3

    FW

    SW

    Servers

    Endpoints

    Applications

    Databases

    4 5

    FW

    SW

    Servers

    Endpoints

    Applications

    Databases

    ….

    www.bitlyft.com

  • • Security Orchestration Automated Response

    • Within minutes neutralize threats

    • Reports the threat to “Relay”

    • Identifies similar clients• Uses SOAR to take

    preventive action on those similar clients

    • Security Analysts• Augmenting existing IT Team• On-going Communication

    between BitLyft Security Analysts and Client

    • Developers building automation

    • Foundational• Monitoring• Detection• Alarms• Log Collection• Compliance Reporting• SIEM notifies SOAR 1st

    SIEM2ndSOC

    3rdSOAR

    4thRELAY

    www.bitlyft.com

    Bitlyft’s Unified Approach

  • www.bitlyft.com

    Needs

    You have to be proactive, have some type of UEBA that looks at user behavior and how they are interacting with your network, as well as a centralized location for log data so that you have real visibility into

    your network.

    Without visibility you have no real way of knowing whether you are under attack until it is too late.

  • Takeaways…

    In 2017 - One in 131 emails sent were malicious.

    Build advanced malware defenses into and across your entire network and endpoints.

    You’re responsible for your Cloud… AWS, Azure and Google are not responsible for your data.

    Indicators-Warnings of Attack: What activities, events, conditions, or behaviors could serve as indicators that an attack is imminent, in progress, or has occurred?

    Obfuscation: What techniques are typically used to disguise the fact that an attack is imminent, in progress, or has occurred?

    You can’t change, what you aren’t measuring!

    www.bitlyft.com

  • Jason Miller | [email protected]

    LinkedIn: /jasonmillerbitlyft

    www.bitlyft.com

    Slide Number 1Slide Number 2Slide Number 3Slide Number 4Slide Number 5Visible and Invisible Attack VectorsSlide Number 7Slide Number 8Slide Number 9Slide Number 10Slide Number 11Slide Number 12Slide Number 13Slide Number 14Slide Number 15Machine Data Intelligence FabricSlide Number 17Slide Number 18Slide Number 19Slide Number 20Slide Number 21


Recommended