250 likes | 401 Views
Getting Beyond Standalone Antivirus to Advanced Threat Protection. Eric Schwake. Sr. Product Marketing Manager @lombar77. Targeted Attack Trends. 1. Organizations Struggling to Keep Up. 2. A Methodology for Better Protection. 3. How Symantec Can Help. 4. Q & A. 5. Targeted Attacks.
E N D
Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing Manager@lombar77
Targeted Attack Trends 1 Organizations Struggling to Keep Up 2 A Methodology for Better Protection 3 How Symantec Can Help 4 Q & A 5
Targeted Attacks Defined Broad term used to characterize threats targeted to a specific entity or set of entities Often crafted and executed to purposely be covert and evasive, especially to traditional security controls End goal is most commonly to capture and extract high value information, to damage brand, or to disrupt critical systems
How Targeted Attacks Happen Watering Hole Attack Spear Phishing Infect a website and lie in wait for them Send an email to a person of interest
Targeted Attack Trends 2011 2012 2013 Top 10 Industries Targetedin Spear-Phishing Attacks, 2013 2013 Spear Phishing Attacks by Size of Targeted Organization, 2011 - 2013 Source: Symantec Source: Symantec 779 122 100% 16% 78 Public Administration (Gov.) Email per Campaign 111 29 39% 15 Services – Professional 2,501+Employees 50% 50% 2012 408 14 +91% 61 Services – Non-Traditional Recipient/Campaign 23 13 Manufacturing 13 Finance, Insurance & Real Estate 1,501 to 2,500 165 Campaigns 6 1,001 to 1,500 Transportation, Gas, Communications, Electric 61% 501 to 1,000 5 50% 50% Wholesale 251 to 500 2 Retail 30% 31% 1 Increase in targeted attack campaigns 18% Duration of Campaign Mining 1 to 250 3 days 8.3 days 4 days 1 0 Construction 2011 2012 2013
Reliance on Silver Bullet Technologies • A single point product won’t identify all threats • Most frequent Silver Bullet monitoring technologies: • IDP / IPS • Anomaly detection (on the rise) • Individual technologies lack a comprehensive vantage point to detect today’s threats. 32% Average % of incidents detected by IDP / IPS technologies
Incomplete Enterprise Coverage • Companies fail to effectively assess (and update) the scope of their Enterprise • Enterprise technology trends further challenge scope • Mobile • Cloud • BYOD
Underestimate SIEM Complexity • Companies frequently underestimate effort and cost to implement • Technical architecture frequently under scoped • Time to implement can take year+ • Struggle to sustain capability • Turnover of “the SIEM expert” • Focus / Expertise Required 72% 35% Collect 1TB of security data or more on a monthly basis Too many false positive responses
Lack of Sufficient Staff / ExpertiseIncreasing Sophistication ≠ More Resources 83% of enterprise organizations say it’s extremely difficult or somewhat difficult to recruit/hire security professionals “We’re at 100% employment in IT security” – Chief Security Officer Health Care Organization
Can’t Keep up with Evolving Threats • Detection program must be evolve as threats evolves • Analyst training / awareness • SIEM tuning • Detection methods • Response tactics • Varied tactics to keep up with threats: • Open source • Working groups (ISACs) • Commercial 35% 28% Do not use external threat intelligence for security analytics Sophisticated security events have become too hard to detect for us
The Attack Waterfall Readiness Protection Detection Response 100+ Security Ops staff 350,000Security Events The ‘Maybe’s 256 Billion Attacks 3,000Incidents
100+ Security Staff 256B attacks 350K events 3000 incidents
Identify or Readiness Asset Management Policy Threat Intelligence Practice
100+ Security Staff 256B attacks 350K events 3000 incidents
Proactive Protection Technologies More than AV Test URLs in Email All Control Points
100+ Security Staff 256B attacks 350K events 3000 incidents
Detect Identify Anomalies Monitor & Test Everything Correlate Control Points
100+ Security Staff 256B attacks 350K events 3000 incidents
Respond Automate Correlation Incident Response
Symantec Advanced Threat Protection Readiness Protection Detection Response 100+ Security Ops staff 350,000Security Events The ‘Maybe’s 256 Billion Attacks 3,000Incidents Managed Adversary Service Insight, SONAR, Thread injection protection Advanced Threat Protection Solution MSS-ATP Synapse Secure App Service Disarm, Link following, Skeptic Incident Response Service Cynic Security Simulation Synapse
Eric Schwake Eric_schwake@symantec.com +1 541 520 6015 @lombar77