1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
Drive, Chip and ‘Down the
Line’ with Cyber Security:
6.21.18
2©2018 Check Point Software Technologies Ltd.
Greg Wartes – GA Account Manager – Check Point Software
Technologies
• Husband | Father of 3
• Microsoft Certified Professional
• Aspiring Writer
• Former Golf Professional
• Texas Longhorn Fanatical Fan
Magazine
WHITE PAPERS
CASE STUDIES
Published In:
gwartes@checkpoint.com
3©2018 Check Point Software Technologies Ltd.
Definitions Matter:
4©2018 Check Point Software Technologies Ltd.
Definitions Matter:
Someone Else’s
environment/hardware
5©2018 Check Point Software Technologies Ltd.
6©2018 Check Point Software Technologies Ltd.
Did You Know?
1. In 2016 over 50% of SMB’s were breached
2. 60% of SMB’s fold within 6 mos. of a Cyber Attack.
3. Does anyone here know a business that has been attacked?
(not in the headlines)
4. There are over 1,000 threat vectors available as entry points:
1. Web – fake sites, etc.
2. Session hijacking (remote/support sessions)
3. Wireless – multiple platforms
4. Email – links, attachments, etc.
5. Mobility – cellular, tablets, laptops
6. Social – multiple platforms, etc.
7. Social Engineering
8. Malware
9. USB
10. Human Element – stolen identity
7©2018 Check Point Software Technologies Ltd.
Definitions Matter:
8©2018 Check Point Software Technologies Ltd.
Definitions Matter:
9©2018 Check Point Software Technologies Ltd.
“Best” of Breed Approach…..
10©2018 Check Point Software Technologies Ltd.
11©2018 Check Point Software Technologies Ltd.
12©2018 Check Point Software Technologies Ltd.
13©2018 Check Point Software Technologies Ltd.
RENTAL CAR – YOUR CLOUD:
14©2018 Check Point Software Technologies Ltd.
What’s in Your “CAR?” YOUR
15©2018 Check Point Software Technologies Ltd.
What are you doing to protect your “CAR?”
16©2018 Check Point Software Technologies Ltd.
The Game Has Changed!
Law No. 1: If There Is A Vulnerability, It Will Be Exploited
Law No. 2: Everything Is Vulnerable In Some Way
Law No. 3: Humans Trust Even When They Shouldn't
Law No. 4: W/ Innovation Comes Opportunity For Exploitation
Law No. 5: When In Doubt, See Law No. 1
: The Five Laws Of Cybersecurity
17©2018 Check Point Software Technologies Ltd.
OUR CLOUD ENVIRONMENT
Internet
18©2018 Check Point Software Technologies Ltd.
WITHIN THE FIRST 15 MINUTES
Houston we have a problem . . .
19©2018 Check Point Software Technologies Ltd.
AFTER 7 DAYS . . .
Oh won’t you please be my neighbor . . .
~4 million attacks recorded!
20©2018 Check Point Software Technologies Ltd.
“In The Room”
21©2018 Check Point Software Technologies Ltd.
22©2018 Check Point Software Technologies Ltd.
23©2018 Check Point Software Technologies Ltd.
Look at YOUR Organization/Data/ Differently:
24©2018 Check Point Software Technologies Ltd.
What are you doing to protect your “CAR?”
25©2018 Check Point Software Technologies Ltd.
YOU Still have responsibility
26©2018 Check Point Software Technologies Ltd.
Protect YOUR CLOUD – YOUR DATA
27©2018 Check Point Software Technologies Ltd.
28©2018 Check Point Software Technologies Ltd.
Time
29©2018 Check Point Software Technologies Ltd.
You Need a Small Army of Security Technologies
Machine
Learning
CPU-Level
Sandboxing
30©2018 Check Point Software Technologies Ltd. 30©2018 Check Point Software Technologies Ltd.
THIS WORKS !
YOU CAN MAKE IT POSSIBLE
[Internal Use] for Check Point employees​
Machine
Learning
CPU-Level
Sandboxing
Threat
Extraction
Virtual
Firewall
Endpoint
Detection
& Response
Human
Behavioral
Analytics
Data
Encryption
Data Leak
Prevention
Anti-Bot Flash
Detonation
URL
Filtering
Firewall
ICS/ SCADA
Protection
Machine
Learning
Proxy
Network
Encryption
Anti-
Ransomware
Zero
Phishing
Mobile Threat
Prevention
CPU-Level
Sandboxing
HTTPS
Inspection
Intrusion
Prevention
Anti-Virus DDOS
Hypervisor
Level Security
Application
Control
THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
31©2018 Check Point Software Technologies Ltd. 31©2018 Check Point Software Technologies Ltd.
WHAT INGREDIENTS DO WE NEED ?
32©2018 Check Point Software Technologies Ltd. 32©2018 Check Point Software Technologies Ltd.
MAKING GEN V POSSIBLE
SS7 ATTACK
PREVENTION
LARGE SCALE
MANAGEMENT
MOBILE MAN
IN THE
MIDDLE
ATTACK
MEMORY
ANALYSIS
PUBLIC-CLOUD
AUTOPROVISION
THREAT
EXTRACTION
NETWORK
ENCRYPTION
REST APIs ORCHESTRATION
CPU LEVEL
SANDBOX
ADAPTIVE
CLOUD
SECURITY
CLOUD
SECURITY
AUTO-SCALE
33©2018 Check Point Software Technologies Ltd.
Thank you.
34©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd.
Don’t be caught unprepared.
Uncover potential risks on your enterprise network.

More Related Content

PPTX
Ga society of cpa's 2018 coastal chapter
PPTX
Kba talk track 2018
PDF
GDPR and Remote Access Security: What You Need To Know
PDF
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
PPTX
Target data breach presentation
PDF
Protecting Sensitive and Critical Financial Data with Privileged Access
PDF
Opening Keynote (Identity Live Berlin 2018)
PDF
The 7 Steps to a Successful Cyberattack: How to Defend Against Them
Ga society of cpa's 2018 coastal chapter
Kba talk track 2018
GDPR and Remote Access Security: What You Need To Know
The Four Pitfalls of Privilege: Defend Critical Accounts & Systems Against Cy...
Target data breach presentation
Protecting Sensitive and Critical Financial Data with Privileged Access
Opening Keynote (Identity Live Berlin 2018)
The 7 Steps to a Successful Cyberattack: How to Defend Against Them

What's hot (20)

PDF
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
PDF
Shift from GDPR readiness to sustained compliance to improve your business an...
PDF
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
PDF
Detecting Wire Fraud in Real-Time
PDF
Preventing P2P Fraud with Aite Group
PPTX
Data breach presentation
PDF
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
PDF
Server-Side Second Factors: Approaches to Measuring User Authenticity
PPTX
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
PPTX
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
PDF
Putting the PRE into ATTACK
PDF
Target Breach Analysis
PDF
Applying Innovative Tools for GDPR Success
PPTX
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
PDF
Emerging Trends in Application Security
PDF
The Case for a Turnkey Approach to Fraud Operations
PDF
Identity Live Sydney: Intelligent Authentication
PDF
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
PPTX
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
PDF
Same day ach bec fraud detection prevention webinar 3 1-18
2018 Black Hat Hacker Survey Report: What Hackers Really Think About Your Cyb...
Shift from GDPR readiness to sustained compliance to improve your business an...
Cybersecurity Compliance can Make or Break Your Business - DigiCert - Symantec
Detecting Wire Fraud in Real-Time
Preventing P2P Fraud with Aite Group
Data breach presentation
Data Science vs. the Bad Guys: Defending LinkedIn from Fraud and Abuse
Server-Side Second Factors: Approaches to Measuring User Authenticity
Open Source Insight: GitHub Finds 4M Flaws, IAST Magic Quadrant, 2018 Open So...
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Putting the PRE into ATTACK
Target Breach Analysis
Applying Innovative Tools for GDPR Success
Open Source Insight: AppSec for DevOps, Open Source vs Proprietary, Malicious...
Emerging Trends in Application Security
The Case for a Turnkey Approach to Fraud Operations
Identity Live Sydney: Intelligent Authentication
The Value of User and Data Centricity Beyond IoT Devices: Stein Myrseth and G...
Global CCISO Forum 2018 | Ondrej Krehel | The Era of Cyber Extortion and Rans...
Same day ach bec fraud detection prevention webinar 3 1-18
Ad

Similar to Pgatss slide deck june 7, 2018 (20)

PPTX
Augusta gen v presentation adapture v2
PPTX
Ascendiendo a la GEN V de Cyber Security
PPTX
INFORMATION SECURITY PPT.pptx ON CYBER SECURITY
PPTX
Cybersecurity…real world solutions
PDF
PIONEERING GEN V SECURITY WITH CHECK POINT
PDF
Ciberseguridad en el mundo de la IA
PPTX
Tsc2021 cyber-issues
PPTX
Cybersecurity Basics of awareness presentation .pptx
PDF
Introduction to Cybersecurity
PPTX
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
PDF
Presentation 10 (1).pdf
PPTX
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
PPTX
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
PPTX
Cybersecurity Training For Sales People.pptx
PDF
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
PPT
December ISSA Meeting Executive Security Presentation
PPTX
Cyber Security: Threats and Needed Actions
PPTX
Cyber Security: A Common Problem 2018
PPTX
Cyber Security for SCADA and Networks - Sean McMillan
PPTX
Cybersecurity - Keeping Your Business Protected
Augusta gen v presentation adapture v2
Ascendiendo a la GEN V de Cyber Security
INFORMATION SECURITY PPT.pptx ON CYBER SECURITY
Cybersecurity…real world solutions
PIONEERING GEN V SECURITY WITH CHECK POINT
Ciberseguridad en el mundo de la IA
Tsc2021 cyber-issues
Cybersecurity Basics of awareness presentation .pptx
Introduction to Cybersecurity
Advanced Threat protection – Digital Era - Ajit Pillai, Director Sales – Indi...
Presentation 10 (1).pdf
Add-Structure-and-Credibility-to-Your-Security-Portfolio-with-CIS-Controls-v8...
Global Megatrends in Cybersecurity – A Survey of 1,000 CxOs
Cybersecurity Training For Sales People.pptx
The Legal Case for Cybersecurity - SecureWorld Dallas 2017 (Lunch Keynote)
December ISSA Meeting Executive Security Presentation
Cyber Security: Threats and Needed Actions
Cyber Security: A Common Problem 2018
Cyber Security for SCADA and Networks - Sean McMillan
Cybersecurity - Keeping Your Business Protected
Ad

More from Greg Wartes, MCP (6)

PPTX
Security Minded - Ransomware Awareness
PPTX
Removing Reactive Behavior Inside Your Organization
PPTX
Outcome Based Selling July 15th 2014 CPA event
PPTX
Comptia slides managed print vegas
PPTX
June 18th, 2013 gwinnete chapter of cpa's
PDF
Office 365 mid_market_sales_pitch_deck (3)
Security Minded - Ransomware Awareness
Removing Reactive Behavior Inside Your Organization
Outcome Based Selling July 15th 2014 CPA event
Comptia slides managed print vegas
June 18th, 2013 gwinnete chapter of cpa's
Office 365 mid_market_sales_pitch_deck (3)

Recently uploaded (20)

PDF
Five Habits of High-Impact Board Members
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PPTX
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
PPTX
Modernising the Digital Integration Hub
PDF
UiPath Agentic Automation session 1: RPA to Agents
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PPT
What is a Computer? Input Devices /output devices
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPT
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPT
Geologic Time for studying geology for geologist
PDF
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
STKI Israel Market Study 2025 version august
Five Habits of High-Impact Board Members
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
GROUP4NURSINGINFORMATICSREPORT-2 PRESENTATION
Modernising the Digital Integration Hub
UiPath Agentic Automation session 1: RPA to Agents
Basics of Cloud Computing - Cloud Ecosystem
Enhancing plagiarism detection using data pre-processing and machine learning...
Improvisation in detection of pomegranate leaf disease using transfer learni...
What is a Computer? Input Devices /output devices
sustainability-14-14877-v2.pddhzftheheeeee
Galois Field Theory of Risk: A Perspective, Protocol, and Mathematical Backgr...
Module 1.ppt Iot fundamentals and Architecture
NewMind AI Weekly Chronicles – August ’25 Week III
Geologic Time for studying geology for geologist
Produktkatalog für HOBO Datenlogger, Wetterstationen, Sensoren, Software und ...
Flame analysis and combustion estimation using large language and vision assi...
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
STKI Israel Market Study 2025 version august

Pgatss slide deck june 7, 2018

  • 1. 1©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Drive, Chip and ‘Down the Line’ with Cyber Security: 6.21.18
  • 2. 2©2018 Check Point Software Technologies Ltd. Greg Wartes – GA Account Manager – Check Point Software Technologies • Husband | Father of 3 • Microsoft Certified Professional • Aspiring Writer • Former Golf Professional • Texas Longhorn Fanatical Fan Magazine WHITE PAPERS CASE STUDIES Published In: [email protected]
  • 3. 3©2018 Check Point Software Technologies Ltd. Definitions Matter:
  • 4. 4©2018 Check Point Software Technologies Ltd. Definitions Matter: Someone Else’s environment/hardware
  • 5. 5©2018 Check Point Software Technologies Ltd.
  • 6. 6©2018 Check Point Software Technologies Ltd. Did You Know? 1. In 2016 over 50% of SMB’s were breached 2. 60% of SMB’s fold within 6 mos. of a Cyber Attack. 3. Does anyone here know a business that has been attacked? (not in the headlines) 4. There are over 1,000 threat vectors available as entry points: 1. Web – fake sites, etc. 2. Session hijacking (remote/support sessions) 3. Wireless – multiple platforms 4. Email – links, attachments, etc. 5. Mobility – cellular, tablets, laptops 6. Social – multiple platforms, etc. 7. Social Engineering 8. Malware 9. USB 10. Human Element – stolen identity
  • 7. 7©2018 Check Point Software Technologies Ltd. Definitions Matter:
  • 8. 8©2018 Check Point Software Technologies Ltd. Definitions Matter:
  • 9. 9©2018 Check Point Software Technologies Ltd. “Best” of Breed Approach…..
  • 10. 10©2018 Check Point Software Technologies Ltd.
  • 11. 11©2018 Check Point Software Technologies Ltd.
  • 12. 12©2018 Check Point Software Technologies Ltd.
  • 13. 13©2018 Check Point Software Technologies Ltd. RENTAL CAR – YOUR CLOUD:
  • 14. 14©2018 Check Point Software Technologies Ltd. What’s in Your “CAR?” YOUR
  • 15. 15©2018 Check Point Software Technologies Ltd. What are you doing to protect your “CAR?”
  • 16. 16©2018 Check Point Software Technologies Ltd. The Game Has Changed! Law No. 1: If There Is A Vulnerability, It Will Be Exploited Law No. 2: Everything Is Vulnerable In Some Way Law No. 3: Humans Trust Even When They Shouldn't Law No. 4: W/ Innovation Comes Opportunity For Exploitation Law No. 5: When In Doubt, See Law No. 1 : The Five Laws Of Cybersecurity
  • 17. 17©2018 Check Point Software Technologies Ltd. OUR CLOUD ENVIRONMENT Internet
  • 18. 18©2018 Check Point Software Technologies Ltd. WITHIN THE FIRST 15 MINUTES Houston we have a problem . . .
  • 19. 19©2018 Check Point Software Technologies Ltd. AFTER 7 DAYS . . . Oh won’t you please be my neighbor . . . ~4 million attacks recorded!
  • 20. 20©2018 Check Point Software Technologies Ltd. “In The Room”
  • 21. 21©2018 Check Point Software Technologies Ltd.
  • 22. 22©2018 Check Point Software Technologies Ltd.
  • 23. 23©2018 Check Point Software Technologies Ltd. Look at YOUR Organization/Data/ Differently:
  • 24. 24©2018 Check Point Software Technologies Ltd. What are you doing to protect your “CAR?”
  • 25. 25©2018 Check Point Software Technologies Ltd. YOU Still have responsibility
  • 26. 26©2018 Check Point Software Technologies Ltd. Protect YOUR CLOUD – YOUR DATA
  • 27. 27©2018 Check Point Software Technologies Ltd.
  • 28. 28©2018 Check Point Software Technologies Ltd. Time
  • 29. 29©2018 Check Point Software Technologies Ltd. You Need a Small Army of Security Technologies Machine Learning CPU-Level Sandboxing
  • 30. 30©2018 Check Point Software Technologies Ltd. 30©2018 Check Point Software Technologies Ltd. THIS WORKS ! YOU CAN MAKE IT POSSIBLE [Internal Use] for Check Point employees​ Machine Learning CPU-Level Sandboxing Threat Extraction Virtual Firewall Endpoint Detection & Response Human Behavioral Analytics Data Encryption Data Leak Prevention Anti-Bot Flash Detonation URL Filtering Firewall ICS/ SCADA Protection Machine Learning Proxy Network Encryption Anti- Ransomware Zero Phishing Mobile Threat Prevention CPU-Level Sandboxing HTTPS Inspection Intrusion Prevention Anti-Virus DDOS Hypervisor Level Security Application Control THE CYBER SECURITY ARCHITECTURE OF THE FUTURE
  • 31. 31©2018 Check Point Software Technologies Ltd. 31©2018 Check Point Software Technologies Ltd. WHAT INGREDIENTS DO WE NEED ?
  • 32. 32©2018 Check Point Software Technologies Ltd. 32©2018 Check Point Software Technologies Ltd. MAKING GEN V POSSIBLE SS7 ATTACK PREVENTION LARGE SCALE MANAGEMENT MOBILE MAN IN THE MIDDLE ATTACK MEMORY ANALYSIS PUBLIC-CLOUD AUTOPROVISION THREAT EXTRACTION NETWORK ENCRYPTION REST APIs ORCHESTRATION CPU LEVEL SANDBOX ADAPTIVE CLOUD SECURITY CLOUD SECURITY AUTO-SCALE
  • 33. 33©2018 Check Point Software Technologies Ltd. Thank you.
  • 34. 34©2018 Check Point Software Technologies Ltd.©2018 Check Point Software Technologies Ltd. Don’t be caught unprepared. Uncover potential risks on your enterprise network.

Editor's Notes

  • #4: Anyone know who this is? Seth Godin – Creator of Google Marketing, Author of NYT Best Sellers, Bizzillionare – in many of his books – he talks about the importance of definitions in business/business meetings – getting everyone on the same page…..I have adopted that methodology and would like to start there – what is the cloud?
  • #5: We can all agree that there are a wide variety of types of cloud computing: private, public, hybrid, community, etc…But are they all secure/safe by default? Does the provider hold responsibility for keeping your data safe? What makes me laugh is when people complain about the cloud when they are utililsing a FREE service…..E-Mail is the biggest one….
  • #6: The cloud has become part of our every day lives – there really isn’t a way of getting around it. You can no longer buy a CD for software, it’s delivered to you via the cloud. The 800lb. Gorrila/the mother ship/Microsoft now has included ways to save your work to the cloud as a default location. You can utilize google photos to save space on your i-phone…..for free!
  • #7: Let’s address the elephant in the room….Atlanta
  • #8: We can all agree that there are a wide variety of types of cloud computing: private, public, hybrid, community, etc…But are they all secure/safe by default? Does the provider hold responsibility for keeping your data safe? What makes me laugh is when people complain about the cloud when they are utililsing a FREE service…..E-Mail is the biggest one….
  • #9: We can all agree that there are a wide variety of types of cloud computing: private, public, hybrid, community, etc…But are they all secure/safe by default? Does the provider hold responsibility for keeping your data safe? What makes me laugh is when people complain about the cloud when they are utililsing a FREE service…..E-Mail is the biggest one….
  • #11: If you are not looking at your data differently – criminals are, and they will find the exploits/weak-spots…it’s only a matter of time.
  • #12: The game of I.T. Security has changed…..it’s no longer block and tackle.
  • #14: Who here has rented a car recently? What is the 1st thing you do…..after signing paperwork? You walk around the car with the rep, check for dents/dings, check gas level, make sure is has 4 tires, etc. They don’t check the engine with you, they don’t check the electronics, the power windows, etc. They give you a car that drives……that’s it, and you’re off.
  • #15: What do you travel with? What do you put in your car? Would you leave this in a “bad” part of town with the windows down and the doors unlocked? So why are you leaving your cloud in the bad part of town with doors unlocked and windows down?
  • #16: What are you able to put around your car? Lock the doors? Hire someone (MSP – Staff) to watch it? Put a fence around it (Technology?) Spot lights to ensure you can see it at all times (technology?)
  • #18: So, we built a cloud environment from a popular cloud service provider (CSP), deployed a server instance in our new cloud environment, and using all the native tools that were available through the CSP, connected our new “cloud service” to the Internet. In addition, for added assurance, we also deployed a Honeypot in front of our new cloud service just on the off-chance something were to slip past the native controls . . . we connected our service through our Honeypot and sat back and watched what happened . . . And almost immediately we found some “interesting” results . . .
  • #19: 149 attacks identified by our HoneyPot Ninety two (92) ssh/telnet attacks One (1) scripting attack Seven (7) attacks targeting TCP/UDP ports Forty nine (49) network based According to Distil Networks: “Bad bots made up 20% of all web traffic and are everywhere, at all times—they don’t take breaks and they don’t sleep. Even though bad bots are on all sites, larger sites were hit the hardest in 2016. Bad bots accounted for 21.83% of large website web traffic, which saw an increase of 36.43% since 2015.” Also, “Data centers were the weapon of choice for bad bots with 60.1% coming from the cloud. Amazon AWS was the top originating ISP for the third year in a row with 16.37% of all bad bot traffic—four times more than the next ISP (OVH SAS).” The challenge – these bot armies are programmed to After 7 days: 3.97 Million ssh/telnet based attempts + malware uploaded to the cloud 826 attack attemps detected by Dionaea 9 attack attempts detected by the elastic pot search engine 98 attempts detected by the web application honeypot glastopf and almost 4900 attacks detected by Honeytrap It‘s clear we have a problem – native controls aren‘t enough . . . How do cloud providers deal with this?
  • #20: It is worth noting that these figures do not contain any clean traffic. Since there are no real services behind our honeypot, everything we saw and captured were attempts to compromise our environment. In total, we witnessed:   3.97 Million ssh/telnet based attempts + malware uploaded to the cloud 826 attack attemps detected by Dionaea 9 attack attempts detected by the elastic pot search engine 98 attempts detected by the web application honeypot glastopf and almost 4900 attacks detected by Honeytrap   Our test simulated a typical cloud environment, thus this is what customers are likely to see in a similar span of time – especially if they just utilize the native ACL filters available through their cloud provider. We can clearly see that cloud assets are vulnerable to the same types of attacks targeting our premises-based networks, but the key difference is that on-prem we deploy advanced security protections to safeguard our assets; we need to start doing the same thing in the cloud.
  • #21: Let’s address the elephant in the room….Atlanta
  • #22: Let’s start with the elephant in the room – the city of ATL was recently hacked – Ransomware. Orbits was also hacked with almost a million customer records leaked. This sort of stuff happens every day – it’s just the ones that carry a large recognizable logo that make the headlines – this happens even more often in the Mid-sized market place, but they don’t report it because they aren’t household names.
  • #23: Let’s start with the elephant in the room – the city of ATL was recently hacked – Ransomware. Orbits was also hacked with almost a million customer records leaked. This sort of stuff happens every day – it’s just the ones that carry a large recognizable logo that make the headlines – this happens even more often in the Mid-sized market place, but they don’t report it because they aren’t household names.
  • #24: It’s time to look at your organization differently – someone else already is!
  • #25: What are you able to put around your car? Lock the doors? Hire someone (MSP – Staff) to watch it? Put a fence around it (Technology?) Spot lights to ensure you can see it at all times (technology?)
  • #26: You have the responsibility to protect that car/cloud – it’s in good share when it was given to you – but the provider’s responsibility do in fact end there – they’ve give you the keys, now you have to manage it, protect it, ensure it stays safe…..So how do you do that?
  • #27: This is the extra security and responsibility that falls on you. Now I know what you are thinking….that is a lot of technology packed into one offering; and you are right. The next question is more than likely – how much time will it take to not only deploy, but to manage…..? Well, let’s stick with the brick and mortar/layers and icing mind set….
  • #28: Anyone know who this is? Buddy Valastro or The “Cake Boss.” He uses tools in his trade to speed up his production – here he is using a an icing bag to assist in icing a cake. If you’ve seen his show before, he can do this EXTREMELY fast.