SlideShare a Scribd company logo
Security event presentation 3.4.2016-final
Gavin Zimmer
VicePresident of Sales
Cal NetTechnology Group
Southern California’s Premier IT Service Provider
Cal Net Technology Group (CNTG)
03
WE START WITH OUR MISSION
AND PURPOSE…
MISSION
Cal Net Technology Group (CNTG)
03
Our Mission is to Enable IT Solutions in our
clients’ organizations to allow them to focus their
business on what they do, and do what they
do more effectively.
PURPOSE
Cal Net Technology Group (CNTG)
03
to be AN Extension of your IT Department
Managed
Services
Remote & Onsite
BPO
NOC
Security
Pro
Services
Subject Matter
Expertise
Virtual CIO & CISO
AdvancedTechnology
Integration
Physical,
Virtual &
Cloud
Plan
Design
Acquire
Deploy
ORGANIZATION
Cal Net Technology Group (CNTG)
 Shared Services
 Shared Resources
 Integrated Processes
 Separate P&L
 Integrated Into Specialist Sales
Motion
Three Autonomous Business Units
03
FLEXIBLE PATHS
CNTG’s Differentiated GTM Model
Direct Verticals
Business Alignment
Partner Based
(Joint)
Infrastructure/ISV
Subcontracting
Managed & Pro
Services
Private Label
Managed/Pro Services/BPM
 Public Sector to
Commercial (Vertical)
 Horizontal (Emerging
Growth to Reserved
Accounts)
 Plan, Build & Run
Operating Model
 Joint Managed and
Professional Services
Engineers Coordinated
 Standardization where
possible
 Lead Generation could be
combined with Sub &
Private Label
 Transactional to
management of
outcomes
 Leverage 75+ W2
Certified Professional
Services Resources
 Non-circumvent and
non-compete
covenants
 Custom NOC & SOC
Operations Tailored to
Protecting Brand
 Include Managed Service
Offerings, Security Offerings
and Professional Services
 Non circumvent and non-
compete covenants
Certified and Capable: Industry Specific Accreditations
02
MAJOR VENDORS SPECIFIC SOLUTION VENDORS
OFFERINGS
CNTG’s Diversified Offerings
03
ACCOMPLISHMENTS
CNTG’s Success Stories
04
Industry
Awards Manufacturing Finance & Legal
Education
& Non Profit Retail Entertainment
Microsoft Partner
of the Year
2013-2015
Marvin
Engineering
Fishman,
Diamond & Block
Goodwill
Coffee Bean
& Tea Leaf
Director’s Guild
of America
LA Business
Journal CIO’s IT
Service Partner
of the Year
Kaiser
Aluminum
Hotchkis & Wiley LACMA Fox Rental Car
Writer’s Guild
of America
MSP Mentor Top
150 Worldwide
Meggitt ACLU
Skirball Cultural
Center
True Religion
Bunim-Murray
Productions
Best Places
to Work
Glenair
Dignified
Home Loans
Harvard-Westlake
Wolfgang Puck
Worldwide
NBC Universal
Inc. 5000 Fastest
Growing
Companies in
North America
Kyocera
Berkshire
Hathaway
Modern
Health Care
JetEdge
Screen Actors
Guild
Matt Lindley
Director of Security Services
Cal NetTechnology Group
Southern California’s Premier IT Service Provider
CYBERCRIME TRENDS & TARGETS
IT Security Budget & Level of Protection
ValueofExploitableAssets Enterprise
Small Business
Cybercriminal Sweet SpotMid-size Business
205 days is the average amount of time organizations
had been compromised before they knew it
– FireEye/Mandiant - 2015
You are just finding out today that your
network was compromised on
August 12th 2015
“There are only two types of companies: those that have
been hacked and those that will be.”
- 2012 Robert Mueller, Former FBI Director
VICTIM,VULNERABLE OR VAGUE
Don’t Know
They’ve
Already
Been Hacked
Will Be Hacked
Have Been
Hacked
More than 80 percent of
U.S. companies have been
successfully hacked,
according to a Duke
University/CFO Magazine
Global Business Outlook
Survey.
The average cost for detection and escalation only subsequent
to a security breach is approximately $417,700*
- Ponemon Institute & IBM 2015 – Cost of Data Breach Report * Cost does not include:
Average Total Cost of Data Breach $3.8 Million
Loss of business (Brand)
Remediation and
mitigation costs
Notification
Identity Protection
THE EVOLUTION OF THREATS
“Never before in the history of human kind have people across
the world been subjected to extortion on a massive scale as they are
today”.
-Symantec : The evolution of Ransomware 2015
20051989 2008 2011 2013 2014 2015
RANSOMWARE TODAY
Cisco’s analysis of malware
validated as “known bad”
found that the majority of
that malware—91.3
percent—use the Domain
Name Service in one of
these three ways:
- To gain command and
control
- To exfiltrate data
- To redirect traffic
Security event presentation 3.4.2016-final
“99.9%
OF THE EXPLOITED
VULNERABILITIES
WERE COMPROMISED
MORE THAN A YEAR
AFTER THE CVE
WAS PUBLISHED.”
“About half of the CVEs
exploited in 2014 went
from publish to pwn in
less than a month.”
VERIZON 2015 DATA BREACH
INVESTIGATIONS REPORT
Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE
Identifiers) for publicly known cybersecurity vulnerabilities.
Security event presentation 3.4.2016-final
DEFENSE IN DEPTH
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
10110010010010101001001110100110100
Perimeter
Network
DEFENSE IN DEPTH
Application
Data
Host
SIEM In Depth
VIIPR
THREAT
RESPONSE
FRAMEWORK
V
I
I
P
R
SECUREMANAGE ENTERPRISE
Security Solutions View Identify Investigate Prioritize Remediate
Managed SIEM Included
Performance, Availability and Change Monitoring Included
Threat Intelligence Center / Threat Feeds Included
Asset Management (CMDB) Included
Single Pane of Glass Portal with Unlimited Users* Included
Customized Dashboards for Security, Performance and Compliance Included
24x7 Event Alerting (Email, Pager/SMS, Dashboard) Included
Internal and External Vulnerability Scanning Included
Vulnerability Remediation Prioritization Included
System Hardening Checks Included
Compliance Alerting, Dashboards and Reporting for PCI, GLBA, FFIEC Included
Threat Monitoring, Analysis and Escalation Included
Expert SOC Analyst Remediation Recommendation Escalation Included
Security Event Remediation (Remote Only) Included
SECUREManage for Enterprise - Compliance
THANKYOU!
CAL NET
TECHNOLOGY GROUP
Ad

More Related Content

What's hot (14)

LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cloudflare
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
Bill McCabe
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Kevin Duffey
 
Security - A Digital Transformation Enabler
Security - A Digital Transformation EnablerSecurity - A Digital Transformation Enabler
Security - A Digital Transformation Enabler
Alexander Akinjayeju. MSc, CISM, Prince2
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Statewide Insurance Brokers
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
Cloudflare
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid
 
What is cloud computing
What is cloud computingWhat is cloud computing
What is cloud computing
Hardik Kakadiya
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
Cloudflare
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
Cloudflare
 
Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for Smartgrid
Gruene-it.org
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
Rea
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
Kevin Duffey
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
Cloudflare
 
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
LendingTree and Cloudflare: Ensuring zero trade-off between security and cust...
Cloudflare
 
Data security 2016 trends and questions
Data security 2016 trends and questionsData security 2016 trends and questions
Data security 2016 trends and questions
Bill McCabe
 
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Cyber Risk Measurement: what 25 CISOs & CROs plan for 2020
Kevin Duffey
 
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide InsuranceCyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Cyber Insurance, A Novel of 2017, Q1. By Statewide Insurance
Statewide Insurance Brokers
 
Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)Cybersecurity 2020 threat landscape and its implications (AMER)
Cybersecurity 2020 threat landscape and its implications (AMER)
Cloudflare
 
CS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & FraudCS3: Cybersecurity Extortion & Fraud
CS3: Cybersecurity Extortion & Fraud
Paige Rasid
 
Stopping DDoS Attacks in North America
Stopping DDoS Attacks in North AmericaStopping DDoS Attacks in North America
Stopping DDoS Attacks in North America
Cloudflare
 
Cyber Security 101
Cyber Security 101Cyber Security 101
Cyber Security 101
Cloudflare
 
Security for Smartgrid
Security for SmartgridSecurity for Smartgrid
Security for Smartgrid
Gruene-it.org
 
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
[ON-DEMAND WEBINAR] Managed Service Providers vs Managed Security Service Pro...
Rea
 
Cyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial ServicesCyber Resilience: managing 3rd Party Risks in Financial Services
Cyber Resilience: managing 3rd Party Risks in Financial Services
Kevin Duffey
 
How to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security StrategyHow to Build a Practical and Cost-Effective Security Strategy
How to Build a Practical and Cost-Effective Security Strategy
Cloudflare
 

Viewers also liked (18)

Embracing Mobile First
Embracing Mobile FirstEmbracing Mobile First
Embracing Mobile First
CoreMedia
 
Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0
AccelOps
 
KPN Getronics Portfolio informatie
KPN Getronics Portfolio informatieKPN Getronics Portfolio informatie
KPN Getronics Portfolio informatie
KPN Getronics
 
OpenStack 101 Presentation
OpenStack 101 PresentationOpenStack 101 Presentation
OpenStack 101 Presentation
EVault
 
2014 Ecommerce Holiday Prep
2014 Ecommerce Holiday Prep2014 Ecommerce Holiday Prep
2014 Ecommerce Holiday Prep
Tenzing Managed IT Services
 
Zaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions - Software Development Company
Zaptech Solutions - Software Development Company
Zaptech Solutions
 
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEsCloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Easynet Connect
 
Grace Under Pressure
Grace Under PressureGrace Under Pressure
Grace Under Pressure
Vanguard
 
Microsoft Office for the iPhone and iPad
Microsoft Office for the iPhone and iPadMicrosoft Office for the iPhone and iPad
Microsoft Office for the iPhone and iPad
Palmetto Technology Group
 
Optimizing the Monetization of a Connected Universe
Optimizing the Monetization of a Connected UniverseOptimizing the Monetization of a Connected Universe
Optimizing the Monetization of a Connected Universe
Comverse, Inc.
 
Agile - Scrum
Agile - ScrumAgile - Scrum
Agile - Scrum
Samir Chitkara
 
Arise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise EMEA - My Story Video Contest
Arise EMEA - My Story Video Contest
Arise International
 
ECC Cloud and Security
ECC Cloud and SecurityECC Cloud and Security
ECC Cloud and Security
Erlach Computer Consulting
 
Call Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemCall Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone System
Mahindra Comviva
 
Mhta.private.cloud.final.16.9
Mhta.private.cloud.final.16.9Mhta.private.cloud.final.16.9
Mhta.private.cloud.final.16.9
Virteva Inc.
 
KServe Retail Outlet
KServe Retail OutletKServe Retail Outlet
KServe Retail Outlet
Kallos Solutions Pvt Ltd
 
High Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsHigh Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming Paradigms
QuEST Global (erstwhile NeST Software)
 
Get Your Head in the Cloud
Get Your Head in the CloudGet Your Head in the Cloud
Get Your Head in the Cloud
Claris Networks
 
Embracing Mobile First
Embracing Mobile FirstEmbracing Mobile First
Embracing Mobile First
CoreMedia
 
Msp deck v1.0
Msp deck v1.0Msp deck v1.0
Msp deck v1.0
AccelOps
 
KPN Getronics Portfolio informatie
KPN Getronics Portfolio informatieKPN Getronics Portfolio informatie
KPN Getronics Portfolio informatie
KPN Getronics
 
OpenStack 101 Presentation
OpenStack 101 PresentationOpenStack 101 Presentation
OpenStack 101 Presentation
EVault
 
Zaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions - Software Development Company
Zaptech Solutions - Software Development Company
Zaptech Solutions
 
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEsCloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Cloud Expo May 09 Richard Britton, Cloud Computing for SMEs
Easynet Connect
 
Grace Under Pressure
Grace Under PressureGrace Under Pressure
Grace Under Pressure
Vanguard
 
Optimizing the Monetization of a Connected Universe
Optimizing the Monetization of a Connected UniverseOptimizing the Monetization of a Connected Universe
Optimizing the Monetization of a Connected Universe
Comverse, Inc.
 
Arise EMEA - My Story Video Contest
Arise EMEA - My Story Video ContestArise EMEA - My Story Video Contest
Arise EMEA - My Story Video Contest
Arise International
 
Call Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemCall Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone System
Mahindra Comviva
 
Mhta.private.cloud.final.16.9
Mhta.private.cloud.final.16.9Mhta.private.cloud.final.16.9
Mhta.private.cloud.final.16.9
Virteva Inc.
 
High Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming ParadigmsHigh Performance Medical Reconstruction Using Stream Programming Paradigms
High Performance Medical Reconstruction Using Stream Programming Paradigms
QuEST Global (erstwhile NeST Software)
 
Get Your Head in the Cloud
Get Your Head in the CloudGet Your Head in the Cloud
Get Your Head in the Cloud
Claris Networks
 
Ad

Similar to Security event presentation 3.4.2016-final (20)

Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
MITRE - ATT&CKcon
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
CA Technologies
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
Microsoft UK
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
CA Technologies
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
STASH | Datacentric Security
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
North Texas Chapter of the ISSA
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
refaeli
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Hao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Inside Analysis
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Mahbubul Alam
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
CA Technologies
 
The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018The 10 best performing cloud solution providers 2018
The 10 best performing cloud solution providers 2018
Insights success media and technology pvt ltd
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Steven Schwartz
 
Cloud Computing and the Culture of Innovation
Cloud Computing and the Culture of Innovation Cloud Computing and the Culture of Innovation
Cloud Computing and the Culture of Innovation
Joseph Holbrook, Chief Learning Officer (CLO)
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
ChristiAKannapel
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
DLT Solutions
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
Steven Aiello
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Fall2015SecurityShow
Fall2015SecurityShowFall2015SecurityShow
Fall2015SecurityShow
Adam Heller
 
MITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - NovemberMITRE ATT&CKcon Power Hour - November
MITRE ATT&CKcon Power Hour - November
MITRE - ATT&CKcon
 
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
Tech Talk: Isn’t One Authentication Mechanism z Systems Enough?
CA Technologies
 
Cyber Security Demistyified
Cyber Security DemistyifiedCyber Security Demistyified
Cyber Security Demistyified
Microsoft UK
 
Complicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analyticsComplicate, detect, respond: stopping cyber attacks with identity analytics
Complicate, detect, respond: stopping cyber attacks with identity analytics
CA Technologies
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
North Texas Chapter of the ISSA
 
Cloud Computing Security Needs & Problems Alon Refaeli
Cloud Computing Security Needs & Problems   Alon RefaeliCloud Computing Security Needs & Problems   Alon Refaeli
Cloud Computing Security Needs & Problems Alon Refaeli
refaeli
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Hao Tran
 
Rethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile WorldRethinking Data Availability and Governance in a Mobile World
Rethinking Data Availability and Governance in a Mobile World
Inside Analysis
 
Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)Too Small to Get Hacked? Think Again (Webinar)
Too Small to Get Hacked? Think Again (Webinar)
OnRamp
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Mahbubul Alam
 
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
Security Opening Keynote Address: Security Drives DIGITAL TRANSFORMATION in...
CA Technologies
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Steven Schwartz
 
BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"BIS "Is Your Company at Risk for a Security Breach?"
BIS "Is Your Company at Risk for a Security Breach?"
ChristiAKannapel
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
DLT Solutions
 
4 Cyber Security KPIs
4 Cyber Security KPIs4 Cyber Security KPIs
4 Cyber Security KPIs
Steven Aiello
 
Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016Top Cyber Security Trends for 2016
Top Cyber Security Trends for 2016
Imperva
 
Ad

Recently uploaded (20)

How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 
How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?How Can I use the AI Hype in my Business Context?
How Can I use the AI Hype in my Business Context?
Daniel Lehner
 
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-UmgebungenHCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
HCL Nomad Web – Best Practices und Verwaltung von Multiuser-Umgebungen
panagenda
 
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdfComplete Guide to Advanced Logistics Management Software in Riyadh.pdf
Complete Guide to Advanced Logistics Management Software in Riyadh.pdf
Software Company
 
Cyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of securityCyber Awareness overview for 2025 month of security
Cyber Awareness overview for 2025 month of security
riccardosl1
 
HCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser EnvironmentsHCL Nomad Web – Best Practices and Managing Multiuser Environments
HCL Nomad Web – Best Practices and Managing Multiuser Environments
panagenda
 
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded DevelopersLinux Support for SMARC: How Toradex Empowers Embedded Developers
Linux Support for SMARC: How Toradex Empowers Embedded Developers
Toradex
 
Mobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi ArabiaMobile App Development Company in Saudi Arabia
Mobile App Development Company in Saudi Arabia
Steve Jonas
 
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
#StandardsGoals for 2025: Standards & certification roundup - Tech Forum 2025
BookNet Canada
 
Build Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For DevsBuild Your Own Copilot & Agents For Devs
Build Your Own Copilot & Agents For Devs
Brian McKeiver
 
AI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global TrendsAI and Data Privacy in 2025: Global Trends
AI and Data Privacy in 2025: Global Trends
InData Labs
 
Semantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AISemantic Cultivators : The Critical Future Role to Enable AI
Semantic Cultivators : The Critical Future Role to Enable AI
artmondano
 
2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx2025-05-Q4-2024-Investor-Presentation.pptx
2025-05-Q4-2024-Investor-Presentation.pptx
Samuele Fogagnolo
 
Procurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptxProcurement Insights Cost To Value Guide.pptx
Procurement Insights Cost To Value Guide.pptx
Jon Hansen
 
Generative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in BusinessGenerative Artificial Intelligence (GenAI) in Business
Generative Artificial Intelligence (GenAI) in Business
Dr. Tathagat Varma
 
Drupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy ConsumptionDrupalcamp Finland – Measuring Front-end Energy Consumption
Drupalcamp Finland – Measuring Front-end Energy Consumption
Exove
 
Technology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data AnalyticsTechnology Trends in 2025: AI and Big Data Analytics
Technology Trends in 2025: AI and Big Data Analytics
InData Labs
 
Rusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond SparkRusty Waters: Elevating Lakehouses Beyond Spark
Rusty Waters: Elevating Lakehouses Beyond Spark
carlyakerly1
 
Quantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur MorganQuantum Computing Quick Research Guide by Arthur Morgan
Quantum Computing Quick Research Guide by Arthur Morgan
Arthur Morgan
 
tecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdftecnologias de las primeras civilizaciones.pdf
tecnologias de las primeras civilizaciones.pdf
fjgm517
 
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes Partner Innovation Updates for May 2025
ThousandEyes
 

Security event presentation 3.4.2016-final

  • 2. Gavin Zimmer VicePresident of Sales Cal NetTechnology Group Southern California’s Premier IT Service Provider
  • 3. Cal Net Technology Group (CNTG) 03 WE START WITH OUR MISSION AND PURPOSE…
  • 4. MISSION Cal Net Technology Group (CNTG) 03 Our Mission is to Enable IT Solutions in our clients’ organizations to allow them to focus their business on what they do, and do what they do more effectively.
  • 5. PURPOSE Cal Net Technology Group (CNTG) 03 to be AN Extension of your IT Department
  • 6. Managed Services Remote & Onsite BPO NOC Security Pro Services Subject Matter Expertise Virtual CIO & CISO AdvancedTechnology Integration Physical, Virtual & Cloud Plan Design Acquire Deploy ORGANIZATION Cal Net Technology Group (CNTG)  Shared Services  Shared Resources  Integrated Processes  Separate P&L  Integrated Into Specialist Sales Motion Three Autonomous Business Units 03
  • 7. FLEXIBLE PATHS CNTG’s Differentiated GTM Model Direct Verticals Business Alignment Partner Based (Joint) Infrastructure/ISV Subcontracting Managed & Pro Services Private Label Managed/Pro Services/BPM  Public Sector to Commercial (Vertical)  Horizontal (Emerging Growth to Reserved Accounts)  Plan, Build & Run Operating Model  Joint Managed and Professional Services Engineers Coordinated  Standardization where possible  Lead Generation could be combined with Sub & Private Label  Transactional to management of outcomes  Leverage 75+ W2 Certified Professional Services Resources  Non-circumvent and non-compete covenants  Custom NOC & SOC Operations Tailored to Protecting Brand  Include Managed Service Offerings, Security Offerings and Professional Services  Non circumvent and non- compete covenants Certified and Capable: Industry Specific Accreditations 02 MAJOR VENDORS SPECIFIC SOLUTION VENDORS
  • 9. ACCOMPLISHMENTS CNTG’s Success Stories 04 Industry Awards Manufacturing Finance & Legal Education & Non Profit Retail Entertainment Microsoft Partner of the Year 2013-2015 Marvin Engineering Fishman, Diamond & Block Goodwill Coffee Bean & Tea Leaf Director’s Guild of America LA Business Journal CIO’s IT Service Partner of the Year Kaiser Aluminum Hotchkis & Wiley LACMA Fox Rental Car Writer’s Guild of America MSP Mentor Top 150 Worldwide Meggitt ACLU Skirball Cultural Center True Religion Bunim-Murray Productions Best Places to Work Glenair Dignified Home Loans Harvard-Westlake Wolfgang Puck Worldwide NBC Universal Inc. 5000 Fastest Growing Companies in North America Kyocera Berkshire Hathaway Modern Health Care JetEdge Screen Actors Guild
  • 10. Matt Lindley Director of Security Services Cal NetTechnology Group Southern California’s Premier IT Service Provider
  • 11. CYBERCRIME TRENDS & TARGETS IT Security Budget & Level of Protection ValueofExploitableAssets Enterprise Small Business Cybercriminal Sweet SpotMid-size Business
  • 12. 205 days is the average amount of time organizations had been compromised before they knew it – FireEye/Mandiant - 2015
  • 13. You are just finding out today that your network was compromised on August 12th 2015
  • 14. “There are only two types of companies: those that have been hacked and those that will be.” - 2012 Robert Mueller, Former FBI Director
  • 15. VICTIM,VULNERABLE OR VAGUE Don’t Know They’ve Already Been Hacked Will Be Hacked Have Been Hacked More than 80 percent of U.S. companies have been successfully hacked, according to a Duke University/CFO Magazine Global Business Outlook Survey.
  • 16. The average cost for detection and escalation only subsequent to a security breach is approximately $417,700* - Ponemon Institute & IBM 2015 – Cost of Data Breach Report * Cost does not include: Average Total Cost of Data Breach $3.8 Million Loss of business (Brand) Remediation and mitigation costs Notification Identity Protection
  • 17. THE EVOLUTION OF THREATS “Never before in the history of human kind have people across the world been subjected to extortion on a massive scale as they are today”. -Symantec : The evolution of Ransomware 2015 20051989 2008 2011 2013 2014 2015
  • 18. RANSOMWARE TODAY Cisco’s analysis of malware validated as “known bad” found that the majority of that malware—91.3 percent—use the Domain Name Service in one of these three ways: - To gain command and control - To exfiltrate data - To redirect traffic
  • 20. “99.9% OF THE EXPLOITED VULNERABILITIES WERE COMPROMISED MORE THAN A YEAR AFTER THE CVE WAS PUBLISHED.” “About half of the CVEs exploited in 2014 went from publish to pwn in less than a month.” VERIZON 2015 DATA BREACH INVESTIGATIONS REPORT Common Vulnerabilities and Exposures (CVE®) is a dictionary of common names (i.e., CVE Identifiers) for publicly known cybersecurity vulnerabilities.
  • 25. SECUREMANAGE ENTERPRISE Security Solutions View Identify Investigate Prioritize Remediate Managed SIEM Included Performance, Availability and Change Monitoring Included Threat Intelligence Center / Threat Feeds Included Asset Management (CMDB) Included Single Pane of Glass Portal with Unlimited Users* Included Customized Dashboards for Security, Performance and Compliance Included 24x7 Event Alerting (Email, Pager/SMS, Dashboard) Included Internal and External Vulnerability Scanning Included Vulnerability Remediation Prioritization Included System Hardening Checks Included Compliance Alerting, Dashboards and Reporting for PCI, GLBA, FFIEC Included Threat Monitoring, Analysis and Escalation Included Expert SOC Analyst Remediation Recommendation Escalation Included Security Event Remediation (Remote Only) Included SECUREManage for Enterprise - Compliance