how to find security breaches before they sink you

13
Brought to you by How to Find Security Breaches Before they Sink Your Business

Upload: skyhigh-networks-cloud-security-software

Post on 30-Nov-2014

3.561 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: How to Find Security Breaches Before They Sink You

Brought to you by !

How to Find Security Breaches Before they Sink Your Business

Page 2: How to Find Security Breaches Before They Sink You

Security breaches can put your company on the front page

Page 3: How to Find Security Breaches Before They Sink You

That’s why you need to find them early

To stop the breach and minimize exposure

But how do you tell if it’s normal behavior or something to be worried about?

Page 4: How to Find Security Breaches Before They Sink You

Breaches create outliers. In mathematical terms, they are several standard deviations outside of normal activity

Page 5: How to Find Security Breaches Before They Sink You

You can think of them as being at the very edge of the bell curve

Anomaly

Page 6: How to Find Security Breaches Before They Sink You

Let’s take a look at some

examples

Page 7: How to Find Security Breaches Before They Sink You

104,338 tweets in 1 day from 1 IP address

Bot exfiltrating data from bank…

140 characters at a time

Page 8: How to Find Security Breaches Before They Sink You

An employee uploads

Employee leaving

organization

4.5 GB of files to Kanbox

Risky Service : No compliance certifications

Terms & Conditions: Collects and shares data with third parties

Location: Hosted in China

Page 9: How to Find Security Breaches Before They Sink You

Single authenticated user at retail company tries to connect to GoToMyPC…

11,101,872 times in a week.

User device infected with malware !

Page 10: How to Find Security Breaches Before They Sink You

Single IP address at energy company attempts to connect to Facebook, which was blocked...

3.8 million times. Malware attempting to connect to its command and control site

Page 11: How to Find Security Breaches Before They Sink You

Manufacturing employee has 188 uploads totaling 48.7 GBs in 1 day to Ryu Share

Data sent to a Drop Zone outside of company’s jurisdictional location.

Page 12: How to Find Security Breaches Before They Sink You

Except as otherwise expressly permitted by these Terms, any Code submitted to SourceForge.net must be licensed to Slashdot Media and other licensees under a license that is: compliant with the Open Source Initiative (“OSI”)’s Open Source Definition (http://www.opensource.org/docs/osd) or certified as an “OSI-Approved L i c e n s e ” ( h t t p : / / o p e n s o u r c e . o r g /licenses).”

65 KB upload to open source code repository

Loss of

Proprietary IP

Page 13: How to Find Security Breaches Before They Sink You

The definitive guide to the top cloud services and usage trends

Brought to you by !

DOWNLOAD NOW

Cloud Adoption & Risk Report