how to find security breaches before they sink you
DESCRIPTION
TRANSCRIPT
Brought to you by !
How to Find Security Breaches Before they Sink Your Business
Security breaches can put your company on the front page
That’s why you need to find them early
To stop the breach and minimize exposure
But how do you tell if it’s normal behavior or something to be worried about?
Breaches create outliers. In mathematical terms, they are several standard deviations outside of normal activity
You can think of them as being at the very edge of the bell curve
Anomaly
Let’s take a look at some
examples
104,338 tweets in 1 day from 1 IP address
Bot exfiltrating data from bank…
140 characters at a time
An employee uploads
Employee leaving
organization
4.5 GB of files to Kanbox
Risky Service : No compliance certifications
Terms & Conditions: Collects and shares data with third parties
Location: Hosted in China
Single authenticated user at retail company tries to connect to GoToMyPC…
11,101,872 times in a week.
User device infected with malware !
Single IP address at energy company attempts to connect to Facebook, which was blocked...
3.8 million times. Malware attempting to connect to its command and control site
Manufacturing employee has 188 uploads totaling 48.7 GBs in 1 day to Ryu Share
Data sent to a Drop Zone outside of company’s jurisdictional location.
Except as otherwise expressly permitted by these Terms, any Code submitted to SourceForge.net must be licensed to Slashdot Media and other licensees under a license that is: compliant with the Open Source Initiative (“OSI”)’s Open Source Definition (http://www.opensource.org/docs/osd) or certified as an “OSI-Approved L i c e n s e ” ( h t t p : / / o p e n s o u r c e . o r g /licenses).”
65 KB upload to open source code repository
Loss of
Proprietary IP
The definitive guide to the top cloud services and usage trends
Brought to you by !
DOWNLOAD NOW
Cloud Adoption & Risk Report