DETECT. LEARN. ADAPT. DEFEND. WIN EVERY ATTACK.
A Brief History of IT Security Once upon a time, IT security was simple. Viruses were written to attack any system they came in contact with. As a result, organizations all pretty much faced the same threats. To counter this, security packages adopted a model where they would allow one customer to detect the threat and then quickly inoculate the rest of their install base. With a large install base, as long as your software was up-to-date and complied with regulatory requirements, you and your data were more or less secure. It was classic man vs. machine, and man usually won. Of course, all good things must come to an end. This behavior led to sameness within the industry. Vendors treated businesses and organizations as if they all faced the same threats and developed a one-size-fits-all mentality, leaving IT managers and business owners vulnerable to sophisticated, targeted cyber attacks. Cybercrime in the U.S. costs approximately $300 billion and 1.2 million jobs per year. An average company has 3 5% of its PCs compromised by targeted attackers. Today, malware is developed, implemented and customized for its targets. An average company has 3 5% of its PCs compromised by targeted attackers and the annual cost of cybercrime in the U.S. is approximately $300 billion and 1.2 million jobs. Long story short, simply updating to the latest version of your security software is not even close to cutting it. In fact, the attackers often test their tools against standard security packages to make sure they are not detected. Trust us, it wouldn t be difficult. So what do you do in a world where not all viruses are created equal? We re glad you asked. It s a strategy by CBTS Advanced Cyber Security called Intelligent Analysis and Adaptive Defense, and it s going to change the way you think about cyber security because you won t have to ever think about cyber security.
CBTS Advanced Cyber Security Strategy The best part about Intelligent Analysis and Adaptive Defense? It uses the hacker s code, tools and tactics against them. You see, every cyber attacker must take a particular series of steps to be successful. CBTS Advanced Cyber Security detects attacker tools at every step of the attack process, extracts all of the information about the hacker s tools and feeds it into the detection process, making it so the hacker can never reuse any part of their original toolset. And since attackers tend to reuse code, CBTS Advanced Cyber Security allows your business to catch and track the evolution of the attacker s toolset. By staying one step ahead of the threat, you ll increase the attacker s costs and drastically reduce their chances of success. Our Threat Intelligence Center is staffed with experts experienced in military, financial, manufacturing and defense industries and is dedicated to monitoring and protecting your data 24/7. INCIDENT RESPONSE AND ASSESSMENTS In our experience, businesses are often under attack and don t know it. CBTS Advanced Cyber Security can respond to an incident or perform a compromise assessment to remove existing threats or determine if you have a previously undetected compromise. We also perform penetration tests, environment or application assessments, and security strategy consulting to ensure you re effectively balancing IT security and efficient business practices.
One Size Fits You. INTELLIGENT ANALYSIS AND ADAPTIVE DEFENSE Cyber attacks are inevitable. Worrying about them doesn t have to be. Intelligent Analysis and Adaptive Defense is how CBTS protects its customers. Instead of delivering one threat detection mechanism that attempts to meet most customer needs, CBTS Advanced Cyber Security delivers four detection mechanisms designed to address the specific threats a business or organization is facing. Moreover, CBTS Advanced Cyber Security is the only system that offers layered signature, reputational, mathematical and behavioral detection all at once. In other words, we develop a cyber security strategy customized for your specific needs that responds and adjusts to human cyber attackers.
Meet the team. Join the CBTS Advanced Cyber Security Group on LinkedIn. Brian Minick Vice President, CBTS Advanced Cyber Security Brian.Minick@cbts.net Before joining CBTS Brian was the Chief Information Security Officer for GE Aviation and Energy. Brian has also consulted with the White House and State Department on cyber policy, collaborated with the CIO of the Pentagon and NSA on cyber detection technology, and is a Six Sigma Quality Leader. Adam Hoffman CBTS Advanced Cyber Security Products Adam.Hoffman@cbts.net Adam brought 14 years of product development experience to CBTS Advanced Cyber Security. He previously worked for CA Technologies, where he managed an international team and oversaw a $2.5 million budget while he managed projects that utilized VMware, vcloud, and followed the Agile/Scrum methodology. Brian Klenke Incident Response Brian.Klenke@cbts.net Brian has been protecting companies for the past 15 years. He began as the Information Security Manager at Fifth Third Bancorp, then as a Cyber Intelligence Lead Analyst at General Electric, and eventually became the Senior Cyber Intelligence Analyst for Lockheed Martin before joining CBTS Advanced Cyber Security. Michael Schuetter CBTS Advanced Cyber Security Michael.Schuetter@cbts.net Michael joined CBTS Advanced Cyber Security in 2005 as the Senior Manager of Information Technology, where he covered everything from staffing and training to functionality and managing incident response. Prior to CBTS, Michael worked as a Network Security Consultant for SARCOM, an IT solutions provider. Call The Cyber Security Experts today. Our team is always ready. 866.587.CBTS (2287) I cbts.net/security