Battling Savvy Cyber Thieves - SCMagazine

50 %
50 %
Information about Battling Savvy Cyber Thieves - SCMagazine

Published on March 12, 2014

Author: alienvault



The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data have enlisted surreptitious ways to achieve their ends. From targeting specific employees with convincing phishing emails that encourage them to download malware-riddled attachments to taking advantage of vulnerable web apps, these miscreants find myriad ways to gain entry to networks so that they can siphon off sensitive data – most often unnoticed for days, weeks or even months. Implementing a combination of just the right policies and plans, along with the most effective technologies to support them, is paramount. In this 20/20, we talk to a leading industry expert to learn how cyber crooks are making off with critical data and what methods and types of technologies you should consider to stop them in their tracks.

Battling Savvy Cyber Thieves Speaker: Roger Thornton, CTO, AlienVault

Prevention has proven to be elusive 2013 “Cost of Cybercrime Study”, Ponemon Institute A detailed study of 56 “Large US firms” Results: 102 successful intrusions between them Every Week!

“There are two types of companies that use computers. Victims of crime that know they are victims of crime and victims of crime that don’t have a clue yet.” James Routh, 2007 CISO Depository Trust Clearing Corporation

“How would you change your strategy if you knew for certain that you were going to be compromised?” Martin Roesch, 2013 Founder & CTO Sourcefire, Author SNORT

So many security technologies to choose from Given the 10 most recommended technologies and the pricing range, an organization could expect to spend anywhere from $225,000 to $1.46m in its first year, including technology and staff. Source: The Real Cost of Security, 451 Research, April 2013 Factor into this:  Initial Licensing Costs  Implementation / Optimization Costs  Ongoing Management Costs  Renewal Costs  Integration of all the security technologies  Training of personnel/incoming personnel

Questions for SIEM Vendors HINT: PRINT THIS OUT FOR THE NEXT TIME THEY CALL YOU…. 1. How long from installation to security insight? 2. integration work measured in years, months or hours? 3. Do you simply integrate data from security tools (SIEM), or embed tools and orchestrate into effective incident response workflows (USM)? e.g. asset inventories, IDS, vulnerability scans, netflows, etc. 4. What is the real TCO - licensing, consulting, implementation and maintenance/tuning fees? 5. A list of alarms or step-by-step instructions on how to confirm, respond and mitigate threats? 6. Is there a community for threat sharing? If so, how large, broad and open?

Add a comment

Related presentations

Presentación que realice en el Evento Nacional de Gobierno Abierto, realizado los ...

In this presentation we will describe our experience developing with a highly dyna...

Presentation to the LITA Forum 7th November 2014 Albuquerque, NM

Un recorrido por los cambios que nos generará el wearabletech en el futuro

Um paralelo entre as novidades & mercado em Wearable Computing e Tecnologias Assis...

Microsoft finally joins the smartwatch and fitness tracker game by introducing the...

Related pages

Battling savvy cyber thieves - SC Magazine

The methods cyber attackers use to infiltrate networks are endless. There is no doubt that the more sophisticated bad guys looking to steal specific data ...
Read more

44 Thieves - Documents

Another criticism of 44 Thieves Study as that it concluded that affectionless psychopathy was ... Battling Savvy Cyber Thieves - SCMagazine AD&D ...
Read more

Decoding Ransomware- Part 1 - SC Magazine

Decoding Ransomware- Part 1; Dr. Peter Stephenson. ... Increasing use of encryption technology causes more cyber-attacks; ... Tweets by @SCMagazine.
Read more

BotNets- Cyber Torrirism Battling the threats of internet ...

BotNets- Cyber Torrirism Battling the threats of internet. Assoc. Prof. Dr. Sureswaran Ramadass National Advanced IPv6 Center - Director. Why Talk ...
Read more

Threat Geek: cyber threat security

Threat Geek is the independent blog ... but exactly who are they battling? Hacktivists? Organized cyber ... we have seen thieves target databases and point ...
Read more

Crime in Cyberspace: Offenders and the Role of Organized ...

... Crime in Cyberspace: Offenders and the Role of ... Anonymous has a long history of battling online ... Read more

Techrights | Free Software Sentry – watching and reporting ...

... by finding itself battling design patent holders ... of computer-savvy giants such as ... States’ very own cyber thieves ...
Read more

Identity Theft News, Security Breach News | Rob Douglas ...

... we finally know how: According to investigators, the thieves simply spoofed emails to ... Report on Cardiac Device Cyber ...
Read more

auDA Domain Name News

auDA Domain Name News ... How Savvy DDoS Attackers Are Using Our Defenses Against Us,” a research ... A series of cyber regulations officially ...
Read more