Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing (#ddti)
|
|
- Lucas Fletcher
- 8 years ago
- Views:
Transcription
1 Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing (#ddti) Alex Pinto Chief Data Scientist MLSec Project / Niddel
2 Agenda What is TI good for? Combine and TIQ-test Measuring Indicators Threat Intelligence Sharing Future research direction (i.e. will work for data) HT
3 What is TI good for (1) Attribution
4 What is TI good for anyway? TY for his work on
5 What is TI good for (2) Cyber Maps!! TY for his work on
6 What is TI good for anyway? (3) How about actual defense? Strategic vs. tactical vs. operational: planning Technical indicators: DFIR and monitoring
7 Affirming the Consequent Fallacy 1. If A, then B. 2. B. 3. Therefore, A. 1. Evil malware talks to I see traffic to ZOMG, APT!!!
8 This is a data-driven talk! Please check your anecdotes at the door
9 Combine and TIQ-Test Combine ( Gathers TI data (ip/host) from Internet and local files Normalizes the data and enriches it (AS / Geo / pdns) Can export to CSV, tiq-test format and @c0wl TIQ-Test ( Runs statistical summaries and tests on TI feeds Generates charts based on the tests and summaries Written in R (because you should learn a stat language)
10 Suddenly Data
11
12 Using TIQ-TEST Feeds Selected Dataset was separated into inbound and outbound TY and John Bambenek for access to their feeds
13 Data Format for TIQ-TEST
14 Tons of Threat-y Tests Putting this threat data to work NOVELTY How often do the feeds update themselves? AGING How long does an indicator sit on a feed? POPULATION How does this population distribution compare to my data? OVERLAP How do the indicators compare to the ones you got? UNIQUENESS How many indicators are found only on one feed?
15 Tons of Threat-y Tests Putting this threat data to work NOVELTY How often do the feeds update themselves? AGING How long does an indicator sit on a feed? POPULATION How does this population distribution compare to my data? OVERLAP How do the indicators compare to the ones you got? UNIQUENESS How many indicators are found only on one feed?
16 Overlap Test More data is fine, but make sure it is different
17 Overlap Test - Inbound
18 Overlap Test - Outbound
19 Uniqueness Test How many fish REALLY are there at the sea?
20
21
22 I hate quoting myself, but
23 Key Takeaway #1 MORE!= BETTER Threat Intelligence Indicator Feeds Threat Intelligence Program
24
25 TI Sharing is TOTALLY going to solve this Right, people? Right?
26 Herd Immunity, is it? Source:
27
28
29 Threat Intelligence Sharing We would like to thank the kind contribution of data from the fine folks at Facebook Threat Exchange and Threat Connect and also the sharing communities that chose to remain anonymous. You know who you are, and we you too.
30 Threat Intelligence Sharing Data From a period of to : - Number of Indicators Shared Per day Per member Not sharing this data privacy concerns for the members and communities
31 OVERLAP SLIDE
32 OVERLAP SLIDE
33 UNIQUENESS SLIDE
34 The Cognitive Dissonances of TI Sharing Everybody should share! The CIRCLE OF TRUST
35 The Two Sides of Trust What do you share? What do you consume?
36 Activity Test Is there any actual sharing going on?
37 Large s members Small High 10s members Update frequency chart High 10s average Low 100s average
38 Diversity Test Check your sharing privilege
39
40
41 Recall Test But is the data any good?
42
43 What does good curation looks like?
44 Karma and Anonymity
45
46 Key Takeaway #1 'How can sharing make me better understand what are attacks that are targeted and what are commodity?'
47 Telemetry > Analysis Not everyone should need to know how to hunt to make a meaningful contribution
48 More Takeaways Analyze your data. Extract more value from it! If you ABSOLUTELY HAVE TO buy Threat Intelligence or data, evaluate it first. Try the sample data, replicate the experiments: Share data with us. I ll make sure it gets proper exercise!
49
50 Thanks! Q&A? Feedback! The measure of intelligence is the ability to change." - Albert Einstein
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing (#ddti)
Data-Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing (#ddti) Alex Pinto Chief Data Scientist MLSec Project @alexcpsec @MLSecProject Alexandre Sieira CTO Niddel @AlexandreSieira
More informationData- Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing (#ddti)
Data- Driven Threat Intelligence: Metrics on Indicator Dissemination and Sharing (#ddti) Alex Pinto Chief Data Scientist Niddel / MLSec Project @alexcpsec @MLSecProject Alexandre Sieira CTO Niddel @AlexandreSieira
More informationFrom Threat Intelligence to Defense Cleverness: A Data Science Approach (#tidatasci)
From Threat Intelligence to Defense Cleverness: A Data Science Approach (#tidatasci) Alex Pinto Chief Data Scientist Niddel / MLSec Project @alexcpsec @MLSecProject () { :; }; whoami Alex Pinto That guy
More informationSecure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)
Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath) Alex Pinto Chief Data Scientist Niddel / MLSec Project @alexcpsec @MLSecProject @NiddelCorp MLSec Project / Niddel MLSec
More informationMeasuring*the*IQ*of*your*Threat* Intelligence*Feeds*(#TIQtest)*
Measuring*the*IQ*of*your*Threat* Intelligence*Feeds*(#TIQtest)* Alex%Pinto% MLSec%Project% @alexcpsec% @MLSecProject! Kyle%Maxwell% Researcher% @kylemaxwell! whoami(s)* Alex%Pinto% Science%guy%at%MLSec%Project%
More informationThreat Intelligence Buyer s Guide
Threat Intelligence Buyer s Guide SANS CTI Summit, 10 February 2014 Rick Holland @rickhholland Principal Analyst Last year 2014 Forrester Research, Inc. Reproduction Prohibited 2 This year, Arnold s back!!
More informationRethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
More informationTy Miller. Director, Threat Intelligence Pty Ltd
Ty Miller Director, Threat Intelligence Pty Ltd Security Specialist Creator of Threat Analytics CREST Tech Lead, Assessor, Board of Directors Trained likes of FBI, US DoD, US Mil, International Govt agencies,
More informationDefining, building, and making use cases work
Defining, building, and making use cases work Paul Brettle Presales Manager, Americas Pacific Region What is a use case? Compliance FISMA, PCI, SOX, etc Network security firewalls, IDS, routers & switches
More informationSecure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)
Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath) Alex Pinto Chief Data Scien2st Niddel / MLSec Project @alexcpsec @MLSecProject @NiddelCorp Agenda Security Singularity
More informationDefending Networks with Incomplete Information: A Machine Learning Approach. Alexandre Pinto alexcp@mlsecproject.org @alexcpsec @MLSecProject
Defending Networks with Incomplete Information: A Machine Learning Approach Alexandre Pinto alexcp@mlsecproject.org @alexcpsec @MLSecProject Agenda Security Monitoring: We are doing it wrong Machine Learning
More informationIs security awareness a waste of time?
Is security awareness a waste of time? New York State Cyber Security Conference June 5, 2013 Scott Gréaux Vice President Product Management and Services, PhishMe, Inc. They are exploiting human vulnerabilities
More informationApplying Machine Learning to Network Security Monitoring. Alex Pinto Chief Data Scien2st MLSec Project @alexcpsec @MLSecProject!
Applying Machine Learning to Network Security Monitoring Alex Pinto Chief Data Scien2st MLSec Project @alexcpsec @MLSecProject! whoami Almost 15 years in Informa2on Security, done a licle bit of everything.
More informationCyber Attacks and Liabilities Why do so many Organizations keep Getting Hacked, Sued and Fined?
Cyber Attacks and Liabilities Why do so many Organizations keep Getting Hacked, Sued and Fined? PRESENTED BY RICK SHAW, AWAREITY Webinar Objectives Employees (and third parties) are the weakest links Learn
More informationA Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
More informationThe New ROI: Results Oriented Intel. David Amsler, Founder
The New ROI: Results Oriented Intel David Amsler, Founder Foreground Security Dedicated Security services firm Founded in 2000 with offices in Florida, Virginia, and Maryland Federal and commercial clients
More informationCYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
More informationSecurity Analytics for Smart Grid
Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC robert.griffin@rsa.com blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard
More informationSection 1: Introduction to the Employee Satisfaction Roll Out Process 3
TABLE OF CONTENTS: Section 1: Introduction to the Employee Satisfaction Roll Out Process 3 Section 2: The Survey Roll Out Process Defined... 4-15 1: Survey Completed And Data Collected. 4 2: Leaders Trained
More informationDETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.
DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK. A Brief History of IT Security Once upon a time, IT security was simple. Viruses were written to attack any system they came in contact with. As a result,
More informationThreat Intelligence Platforms: The New Essential Enterprise Software
Gitomer-1 Threat Intelligence Platforms: The New Essential Enterprise Software Due to the ever-increasing volume of cyber attacks and regulatory pressures, there is a need for a new type of enterprise
More informationAll about Threat Central
All about Threat Central Ted Ross & Nadav Cohen #HPProtect Forward-looking statements This is a rolling (up to three year) Roadmap and is subject to change without notice. This document contains forward
More informationObtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
More informationOne View Of Customer Data & Marketing Data
One View Of Customer Data & Marketing Data Ian Kenealy, Head of Customer Data & Analytics, RSA spoke to the CX Network and shared his thoughts on all things customer, data and analytics! Can you briefly
More informationCloud Computing and Big Data What s the Big Deal
Cloud Computing and Big Data What s the Big Deal Arlene Minkiewicz, Chief Scientist PRICE Systems, LLC arlene.minkiewicz@pricesystems.com Optimize tomorrow today. 1 Agenda Introduction Cloud Computing
More informationCyber Security Related Excerpts from the Global Risk Forum Berlin September 25-26, 2013 Draft 10/24/13
Cyber Security Related Excerpts from the Global Risk Forum Berlin September 25-26, 2013 Draft 10/24/13 Forwarding an International Public-Private Framework for Cyber Security & Resilience: With Increasing
More informationEvolution Of Cyber Threats & Defense Approaches
Evolution Of Cyber Threats & Defense Approaches Antony Abraham IT Architect, Information Security, State Farm Kevin McIntyre Tech Lead, Information Security, State Farm Agenda About State Farm Evolution
More informationData Driven Assessment of Cyber Risk:
Data Driven Assessment of Cyber Risk: Challenges in Assessing and Mitigating Cyber Risk Mustaque Ahamad, Saby Mitra and Paul Royal Georgia Tech InformationSecurity Center Georgia Tech Research Institute
More informationSplunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
More informationDefending against Cyber Attacks
2015 AMC Privacy & Security Conference Defending against Cyber Attacks MICHAEL DOCKERY CHRIS BEAL PAUL HOWELL Security & Privacy Track June 24, 2015 In the News 2015 MCNC General Use v1.0 Healthcare Data
More informationMcAfee Phishing Quiz. Partner Enablement Guide
McAfee Phishing Quiz Partner Enablement Guide Use the Phishing Quiz to educate your own organization, prospects, and existing customers about phishing and how McAfee security solutions can help. This guide
More informationFireEye Advanced Threat Report 1H 2012
FireEye Advanced Threat Report 1H 2012 FireEye, Inc. FireEye Advanced Threat Report 1H 2012 1 Advanced Threat Report Contents Inside This Report 2 Executive Summary 2 Finding 1 3 Explosion in Advanced
More informationUnified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
More informationActionable information for security incident response
Actionable information for security incident response Cosmin Ciobanu 2015 European Union Agency for Network and Information Security www.enisa.europa.eu European Union Agency for Network and Information
More informationThree powerful analytics use cases for Customer Link. How linked data powers smarter analytics and better predictive models
Three powerful analytics use cases for Customer Link 1 How linked data powers smarter analytics and better predictive models 0123 4567 8901 2345 The power of linked data When it comes to adopting new tech
More informationLEAD GENERATION. www.iconicdigitalagency.com success@iconicdigitalagency.com 317.813.9996
1 LEAD GENERATION www.iconicdigitalagency.com success@iconicdigitalagency.com 317.813.9996 LEAD GENERATION 1 2 WHY YOU NEED TO FOCUS ON LEAD GENERATION There is no such thing as too many sales leads. Sales
More informationThreat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity
Threat Intelligence for Dummies Karen Scarfone Scarfone Cybersecurity 1 Source Material Threat Intelligence for Dummies ebook Co-authored with Steve Piper of CyberEdge Group Published by Wiley Sponsored
More informationAgenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
More informationEU CIP Project DENSEK. Joining forces against cyber threats on European level
EU CIP Project DENSEK Joining forces against cyber threats on European level DENSEK EU CIP Objectives Improving the resilience of the energy infrastructure i.e. improving the security of the Smart Energy
More informationInbound Marketing Overview. January 26, 2015 BEC 382
Inbound Marketing Overview January 26, 2015 BEC 382 Past Week Presented Marketing Plan to Nonprofit Interviews for Fund Raising Campaign Pitched Robotics Firm Met with University admissions Met with two
More informationDEMYSTIFYING BIG DATA. What it is, what it isn t, and what it can do for you.
DEMYSTIFYING BIG DATA What it is, what it isn t, and what it can do for you. JAMES LUCK BIO James Luck is a Data Scientist with AT&T Consulting. He has 25+ years of experience in data analytics, in addition
More information2010 Data Breach Investigations Report
2010 Data Breach Investigations Report Matthijs van de Wel Managing Principal Forensics EMEA 2010 Verizon. All Rights Reserved. PTE14626 07/10 PROPRIETARY STATEMENT This document and any attached materials
More informationThe Five Most Common Cyber-Attack Myths Debunked
cybereason The Five Most Common Cyber-Attack Myths Debunked 2016 Cybereason. All rights reserved. 1 Cyber attacks show no sign of decreasing any time soon. If anything, hackers have expanded the type of
More informationCritical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC chris.beal@mcnc.org @mcncsecurity on Twitter The Critical Security Controls The Critical Security
More informationThreat Intelligence is Dead. Long Live Threat Intelligence!
SESSION ID: STR-R02 Threat Intelligence is Dead. Long Live Threat Intelligence! Mark Orlando Director of Cyber Operations Foreground Security Background Threat Intelligence is Dead. Long Live Threat Intelligence!
More informationOperational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel @Ben_Smith Ben Smith, CISSP Field CTO (US East), Security Portfolio A Security Maturity Path CONTROLS COMPLIANCE IT RISK BUSINESS
More informationNext Generation Security Strategies. Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com
Next Generation Security Strategies Marc Sarrias Regional Sales Manager msarrias@paloaltonetworks.com IT Ever-Evolving Challenges & Constraints Support IT Initiatives Minimize Business Risks from Cybersecurity
More informationCALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
More informationPalo Alto Networks. October 6
Palo Alto Networks October 6 Agenda Malware Trends by the numbers Protect Locally Share Globally Delivery methods 21.5% ~14% OF MALWARE HAS BEEN DELIVERED OVER APPS OTHER THAN WEB AND EMAIL IN 2015 8.2%
More informationCognitive and Organizational Challenges of Big Data in Cyber Defense
Cognitive and Organizational Challenges of Big Data in Cyber Defense Nathan Bos & John Gersh Johns Hopkins University Applied Laboratory nathan.bos@jhuapl.edu, john.gersh@jhuapl.edu The cognitive and organizational
More informationCybersecurity: An Innovative Approach to Advanced Persistent Threats
Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used
More informationData Managers Interest Group. Research. April 17, 2012
Data Managers Interest Group Institute of Clinical and Translational Research April 17, 2012 Privacy & Security Contacts hipaa@jhmi.edu network.security@jhmi.edu IT Help Desk 410.735.4357 3 Or you can
More informationSalony Creations. Namita Ramani Founder & CEO Lead Generation Expert Certified Google Trainer
Salony Creations Full service Digital Marketing agency Namita Ramani Founder & CEO Lead Generation Expert Certified Google Trainer Over the past nine years, Salony Creations has helped over 300 companies
More informationHow to Cheat and Make Better Decisions with Predictive Analytics. Track 1 Session 3
How to Cheat and Make Better Decisions with Predictive Analytics Track 1 Session 3 Robert Heaney - Title: Lead Analyst, Supply Chain Management - Company: Aberdeen Group - Email : Bob.Heaney@Aberdeen.com
More informationAdobe Connect. Virtual Conferences. Foreword. Tactics, Techniques, and Procedures. By:
Adobe Connect s Foreword This whitepaper is based on services EnvolveMEDIA performed with Adobe Connect for the Naval & Environmental Training Safety Center in March of 2013. In a matter of weeks, the
More informationSecurity Intelligence and Analytics in Industrial Systems
Users Group Europe, Middle East and Africa Security Intelligence and Analytics in Industrial Systems Eric D Knapp, About the Presenter Eric D. Knapp Global Director of Cyber Security Solutions and Technology
More informationIntelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
More informationDirect Response Marketing on the Facebook Platform. Customer Experience Delivery
Direct Response Marketing on the Facebook Platform Customer Experience Delivery Welcome Megan Pagliuca Vice President & General Manager of Digital Media Merkle Bryan Schroeder Product Marketing Director,
More information1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS
1 2013 Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS $32.8B 100,000 Cyber Criminals State-Sponsored Spies Hactivists We live in a POST-PREVENTION Amount enterprises are
More information5 Reasons Why Your Security Education Program isn t Working (and how to fix it)
5 Reasons Why Your Security Education Program isn t Working (and how to fix it) February 2015 Presentation Agenda 5 Reasons Your Program isn t Working 10 Learning Science Principles Continuous Training
More informationThinking Cloud Services Look Before You Leap
Thinking Cloud Services Look Before You Leap Brian V. Cummings brian.cummings@tcs.com Tata Consultancy Services Friday, March 16, 2012 Session 10358 Preamble Cloud security literature consistently boils
More informationBREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to
More informationRashmi Knowles Chief Security Architect EMEA
Rashmi Knowles Chief Security Architect EMEA AGENDA Transformation of IT New cyber-security challenges Intelligence Driven Security Security Analytics Q&A 2 ENTERPRISE DATA CENTER ADVANCED SECURITY A UNIQUE
More informationRoundpeg 2014 All Rights Reserved. Page 1
Page 1 Page 2 CONTENTS SMALL BUSINESS FOCUS... 2 INTRODUCTION... 3 IT IS ALL ABOUT TIME... 4 TIME SPENT DECLINING... 4 B2B VS B2C... 4 EMPLOYEES IN LARGER COMPANIES SPEND MORE TIME... 4 FEELS LIKE MORE
More informationMitigating Web Threats with Comprehensive, Cloud-Delivered Web Security
White Paper Mitigating Web Threats with Comprehensive, Cloud-Delivered Web Security Overview For collaboration, communication, and data access, the web has become a mission-critical business tool. But
More informationLead Generation Lessons From 4,000 Businesses. A study based on real data from 4,000 businesses
Lead Generation Lessons From 4,000 Businesses A study based on real data from 4,000 businesses Table of Contents Introduction: Real Data from 4,000 Businesses... 3 Factor 1: Blogging... 4 Factor 2: Web
More informationHow Users Find Apps A study on how users found the last app they downloaded
How Users Find Apps A study on how users found the last app they downloaded 53% of Android users and 47% of ios users found the last app they downloaded though app store search. Introduction Knowing what
More informationSECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.
SECURITY MEETS BIG DATA Achieve Effectiveness And Efficiency 1 IN 2010 THE DIGITAL UNIVERSE WAS 1.2 ZETTABYTES 1,000,000,000,000,000,000,000 Zetta Exa Peta Tera Giga Mega Kilo Byte Source: 2010 IDC Digital
More informationA conversation with Scott Chappell, CMO, Sessions Online Schools of Art and Design
A conversation with Scott Chappell, CMO, Sessions Online Schools of Interviewed by: Steven Groves, StevenGroves.com Guy R. Powell, DemandROMI Can you talk to us a little bit about Sessions and what Sessions
More informationSpyware. Michael Glenn Technology Management Michael.Glenn@Qwest.com. 2004 Qwest Communications International Inc.
Spyware Michael Glenn Technology Management Michael.Glenn@Qwest.com Agenda Security Fundamentals Current Issues Spyware Definitions Overlaps of Threats Best Practices What Service Providers are Doing References
More informationHow To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
More informationPALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
More informationRequest for Quotation For the Supply, Installation and Configuration of Security Analytics
Request for Quotation For the Supply, Installation and Configuration of Security Analytics PASEGURUHAN NG MGA NAGLILINGKOD SA PAMAHALAAN (GOVERNMENT SERVICE INSURANCE SYSTEM) Financial Center, Pasay City
More informationThreat Information Sharing; Perspectives, Strategies, and Scenarios
Threat Information Sharing; Perspectives, Strategies, and Scenarios 15 June 2015 Tim Grance,, Sarah Brown, Fox-IT, Luc Dandurand, ITU Thomas Millar, US CERT, Pawel Pawlinski, CERT.PL 1 Information Sharing
More informationThe Importance of Cyber Threat Intelligence to a Strong Security Posture
The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report
More informationAdvanced Threats in Retail Companies: A Study of North America & EMEA
Advanced Threats in Companies: A Study of North America & EMEA Sponsored by Arbor Networks Independently conducted by Ponemon Institute LLC Publication Date: May 2015 Ponemon Institute Research Report
More informationCyber Security Threats
Cyber Security Threats What keeps us up at night? Doug Jacobson Information Assurance Center www.iac.iastate.edu Information Assurance Center Iowa State University 1 Outline Who are the players The good,
More informationIs it secret? Is it safe? - mining the global Internet for early warning.
SESSION ID: SPO2-F04 Is it secret? Is it safe? - mining the global Internet for early warning. Michael Baker (Arbor Networks) Me Michael Baker, Arbor Networks. Incapable of doing Vendor talks ;) Co-Founder
More informationBUILDING A HOLISTIC MARKETING STRATEGY
Introduction To Integrated Marketing: BUILDING A HOLISTIC MARKETING STRATEGY Email Social Media Online Events Blogs Web S ite Intelligence Landing Pages Integrated Analytics Many B2B marketers invest fortunes
More informationCloud Computing and Big Data. What s the Big Deal?
Cloud Computing and Big Data. What s the Big Deal? Arlene Minkiewicz, Chief Scientist PRICE Systems, LLC arlene.minkiewicz@pricesystems.com 2013 PRICE Systems, LLC All Rights Reserved Decades of Cost Management
More informationCyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
More informationLifecycle Marketing Why traditional marketing is broken and how lifecycle marketing can fix it.
Lifecycle Marketing Why traditional marketing is broken and how lifecycle marketing can fix it. TURNING VISITORS INTO CUSTOMERS AND MARKETERS INTO HEROS Contents Executive Summary: Professional marketers
More informationAn Overview of the Swiss Pension System
An Overview of the Swiss Pension System Role of Investment Consultants in Switzerland Presentation to the EPFIF, September 9, 2011 Dr. Stephan Skaanes, CFA, Partner PPCmetrics AG Financial Consulting,
More informationModern Approach to Incident Response: Automated Response Architecture
SESSION ID: ANF-T10 Modern Approach to Incident Response: Automated Response Architecture James Carder Director, Security Informatics Mayo Clinic @carderjames Jessica Hebenstreit Senior Manager, Security
More informationCONTENT MARKETING IN THE UK 2016 BENCHMARKS, BUDGETS, AND TRENDS SPONSORED BY
CONTENT MARKETING IN THE UK 2016 BENCHMARKS, BUDGETS, AND TRENDS TABLE OF CONTENTS Welcome...3 Key Takeaways...4 Section 1: Usage & Effectiveness...6 Section 2: Strategy & Organization... 10 Section 3:
More information1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders.
Threat Protection Tools and Best Practices Objectives 1. Threat Types Express familiarity with different threat types such as Virus, Malware, Trojan, Spyware, and Downloaders. 2. Threat Vectors Be familiar
More information3 KEYS TO TRANSFORMING SALES & MARKETING WITH INBOUND MARKETING
3 KEYS TO TRANSFORMING SALES & MARKETING WITH INBOUND MARKETING 2 2011 by Mark Mathson This work is licensed under the Creative Commons Attribution 3.0 United States License. Please feel welcome to share
More informationPORTCULLIS. 2nd Annual Financial Services Cyber Security Summit. CBEST Workshop
PORTCULLIS 2nd Annual Financial Services Cyber Security Summit CBEST Workshop CBEST portcullis David Byrne CBEST Service Owner Introduction Portcullis has been established for over 23 years as an independent
More informationREPORT FIREEYE ADVANCED THREAT REPORT 1H 2012 SECURITY REIMAGINED
REPORT FIREEYE ADVANCED THREAT REPORT 1H 2012 SECURITY REIMAGINED CONTENTS Inside This Report...3 Executive Summary...3 Finding 1 Explosion in Advanced Malware Bypassing Traditional Signature-Based Defenses...4
More informationADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS
ADVANCED PERSISTENT THREATS & ZERO DAY ATTACKS AN INFORMATION SECURITY BATTLEFIELD From Static to Dynamic Defense Cyber Security Strategies, LLC 1 2008-2010 Is The Cyber Tipping Point ESTONIA GEORGIA CABLE
More informationClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014
1 ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 About the Presenters Ms. Irene Selia, Product Manager, ClearSkies SecaaS SIEM Contact: iselia@odysseyconsultants.com,
More informationSEMINARS & WORKSHOPS 2015
SEMINARS & WORKSHOPS 2015 SEMINARS 3 HOURS Social Media Level 1 Must Haves, Should Haves & Wants Social Media Level 2 Bump It Up! Strategies for Success Cost Effective Marketing 82 No or Low Cost Ways
More informationInbound Vs Outbound Marketing
Cold Calling is Dead Introductory Calls Are Alive! 17 Year Newspaper Advertising Executive with Knight Ridder, McClatchy, Gannett 2X INMA Award 1 st place winner for Best Advertiser Results Springfield
More informationKey Performance Indicator 26 Success Secrets. Copyright by Benjamin Hodges
Key Performance Indicator 26 Success Secrets Copyright by Benjamin Hodges Notice of rights All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic,
More informationSecurity Awareness Training Solutions
DATA SHEET Security Awareness Training Solutions A guide to available Dell SecureWorks services At Dell SecureWorks, we strive to be a trusted security advisor to our clients. Part of building this trust
More informationWhy are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA
Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA 2 Agenda What is the cloud business value? What about the SecaaS? Why companies
More informationAnalytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
18th Annual Space & Missile Defense Symposium IAMD Evolution and Integration/Key Topic: Predictive Cyber Threat Analysis Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.
More informationSocial Media Measurement and Analysis: When Friends Aren t Enough 4/30/2012
1 Social Media Measurement and Analysis: When Friends Aren t Enough 4/30/2012 2 Agenda strategy The 10 questions you must ask before starting a social media campaign Typical Campaign Goals Footprint Engagement
More informationWho s your Big Data? Big Data Metrics, what it is, how it works and who benefits.
Accessorial Charge Accessorial Summary by Month (Top 5) $5,000 $0 Other LAYOVER FEE Month-Year DRIVER ASSIST UNLOADING Information to better Understand your Business: Who s your Big Data? Big Data Metrics,
More information