improving cyber defensive postures | breaches are certain ...breaking the attack chain profiling...
TRANSCRIPT
![Page 1: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/1.jpg)
Improving Cyber Defensive Postures | Breaches are Certain, Impact is NotApril 20, 2017
Ken Liao, Vice President of Product Marketing
![Page 2: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/2.jpg)
Who Am I?
Ken Liao, Vice President Product Marketing
Over 10 years of InfoSec industry experience
Helping businesses, schools, and government agencies protect their endpoints
![Page 3: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/3.jpg)
Why Malwarebytes?
Trusted by
MILLIONS
De facto STANDARD for remediation—you may be using Malwarebytes today!
![Page 4: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/4.jpg)
Why Malwarebytes?
De facto STANDARD for remediation—you may be using Malwarebytes today!
Machine Approach
Human Approach
Trusted by
MILLIONS
![Page 5: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/5.jpg)
Responding to Breaches
DETECTION CONFIRMATION INVESTIGATION RESPONSE
ASSISTING ATTACKER IN MAPPING THE ENTERPRISE LANDSCAPE
EXPOSING INTERNAL & EXTERNAL CREDENTIALS
DEGRADING ENDPOINT PERFORMANCE
SHARING ATTACK VERTICES WITH OTHER ENDPOINTS
End of Attacker Window
Successful Breach
Incident Alert
![Page 6: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/6.jpg)
Responding to Breaches
DETECTION CONFIRMATION INVESTIGATION RESPONSE
ASSISTING ATTACKER IN MAPPING THE ENTERPRISE LANDSCAPE
EXPOSING INTERNAL & EXTERNAL CREDENTIALS
DEGRADING ENDPOINT PERFORMANCE
SHARING ATTACK VERTICES WITH OTHER ENDPOINTS
End of Attacker Window
Successful Breach
Incident Alert
![Page 7: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/7.jpg)
Breaking the Attack Chain
Pre-execution Post-execution
Malicious BehaviorProfiling Payload ExecutionExploitationDelivery
![Page 8: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/8.jpg)
Pre-execution Post-execution
Malicious BehaviorProfiling Payload ExecutionExploitationDelivery
Breaking the Attack Chain
• Application hardening reduces vulnerability surface and proactively detects fingerprinting attempts used by advanced attacks. (Signature-less)
![Page 9: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/9.jpg)
Breaking the Attack Chain
• Web protection prevents access to malicious websites, ad networks, scammer networks, and bad neighborhoods
Pre-execution Post-execution
Malicious BehaviorProfiling Payload ExecutionExploitationDelivery
![Page 10: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/10.jpg)
Breaking the Attack Chain
• Exploit mitigations proactively detect and block attempts to abuse vulnerabilities and remotely execute code on machine. (Signature-less)
• Application behavior protection, prevents apps from infecting the machine. (Signature-less)
Pre-execution Post-execution
Malicious BehaviorProfiling Payload ExecutionExploitationDelivery
![Page 11: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/11.jpg)
Breaking the Attack Chain
• Payload analysis with heuristic and behavioral rules, identifies entire families of known and relevant malware.
• Machine learning (in beta) proactively identifies viruses and malware. (Signature-less)
Pre-execution Post-execution
Malicious BehaviorProfiling Payload ExecutionExploitationDelivery
![Page 12: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/12.jpg)
Breaking the Attack Chain
Malicious BehaviorProfiling Payload ExecutionExploitationDelivery
• Ransomware mitigation detects and blocks ransomware via behavior monitoring technology. (Signature-less)
• Callback protection prevents access to C&C servers and other malicious websites.
• Incident response engine quickly and thoroughly removes infection and all artifacts. (Signature-based & signature-less)
Pre-execution Post-execution
![Page 13: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/13.jpg)
Breaking the Attack Chain
Malicious BehaviorProfilin
gPayload ExecutionExploitationDelivery
Pre-execution Post-execution
![Page 14: Improving Cyber Defensive Postures | Breaches are Certain ...Breaking the Attack Chain Profiling Delivery Exploitation Payload Execution Malicious Behavior •Ransomware mitigation](https://reader033.vdocuments.us/reader033/viewer/2022060903/609f525243f2c064b642cde8/html5/thumbnails/14.jpg)
Thank you
Learn More: malwarebytes.com
Latest News: blog.malwarebytes.com
Request a Trial: malwarebytes.com/business/licensing
Follow Us: