1
SECURITY THE LOGICAL EVOLUTION
OF CYBER SECURITY B A S E D O N T H E A N ATO M Y
O F A C Y B E R - AT TA C K
2
REACTIVE
de fense
Cyber attacks in the
20th century:
• Viruses
• Trojans
• Worms
• KeyLoggers
• Remote/Local
Exploitations
• Spam campaigns
• MITM
The
response was:
• AV Software
• Stateless Firewalls
• Code Signing
• Manual Debugging
• Manual Log
Correlation
3
REACTIVE
de fense
4
PROACTIVE
de fense
Cyber attacks in the
21st century:
(same as 20th) +
• Web App Attacks
• Spear Phishing
• Large DDoS Attacks
• Mass Bot Exploitations
The
response was:
• Patch Management
• Vulnerability
Scanners
• Next Gen Firewalls
• Advanced Spam
Filters
• Heuristic Analysis
• GPOs
5
REACTIVE
de fense
PROACTIVE
de fense
6
R E A C T I V E P R O A C T I V E
A CYBER ATTACK TODAY
• Cross Platform Exploits
• Advanced Web Based
Threats
• Social engineering
• Ransomware
• Automated Exploitation
Toolkits
• Malware Code Obfuscation
• Social Media Scams
• Targeted Attacks
• Government Sponsored Attacks
• Cryptominers
• UEFI Based Malware
and more…
7
R E A C T I V E P R O A C T I V E
DEFENSE EVOLUTION
• SIEM
• Log Management
• Threat Intelligence
• Virtual/Micro Patching
• File Reputation
• Network Based
Behaviour Analysis
• Cloud Powered Sandboxing
• Next Gen AV Software
• Machine Learning
• AI Automated Decisions
• EDR
…and more
8
REACTIVE
de fense
PROACTIVE
de fense
SECURITY 2 .0
(SOC)
DEFENSE EVOLUTION
9
10
THE ELEPHANT IN THE ROOM
• Not Enough Staff
• Insufficient Skills
• Expensive Certification
• Funding Complex Defense
• Extremely Complicated Infrastructure
• BYOD (personal devices)
…and more
11
WE ARE SURE
YOU WANT
PROBLEMS SOLVED!
12
IMPROVE YOUR SECURITY POSTURE WITH:
• Security Hardening Knowledge
• Real-Time Security Monitoring
• Risk Indicators and Reporting
• Malware Analysis
• Incident Response Team
• Policies and Procedures
• Regular Vulnerability Assessment
• On-demand Penetration Tests
13
YOU NEED
SECURITY PARTNER.
CHOOSE US
Top Related