THE SITUATION IN VIETNAM...THE SITUATION IN VIETNAM Subject: THE SITUATION IN VIETNAM Keywords ...
Ia15 network situation awareness Lumeta Europe
-
Upload
bryan-munro-smith -
Category
Data & Analytics
-
view
92 -
download
1
Transcript of Ia15 network situation awareness Lumeta Europe
![Page 1: Ia15 network situation awareness Lumeta Europe](https://reader031.fdocuments.net/reader031/viewer/2022030309/58f27a5c1a28abff5d8b45a9/html5/thumbnails/1.jpg)
Network
Situational
Awareness
© 2015 Lumeta Corporation
![Page 2: Ia15 network situation awareness Lumeta Europe](https://reader031.fdocuments.net/reader031/viewer/2022030309/58f27a5c1a28abff5d8b45a9/html5/thumbnails/2.jpg)
In Cybersecurity, The Network Doesn’t Lie
Networks are increasingly dynamic
and changing causing a 20% gap in
network situational awareness
• Constant upgrades, moves and changes
• Spin-offs, mergers and acquisitions
• Call back to TOR exit nodes
• Invisible assets turned into malware
infrastructure
• Unmanaged & Unsecured Devices
• Digital economy causing infrastructure
transitions to:
• Mobile from fixed
• Virtual from physical
• DevOps in the cloud
• Software defined networks &
datacenter
IP Addresses
Aw
aren
ess
100%
1,000K 100K 10K
![Page 3: Ia15 network situation awareness Lumeta Europe](https://reader031.fdocuments.net/reader031/viewer/2022030309/58f27a5c1a28abff5d8b45a9/html5/thumbnails/3.jpg)
Lumeta Network Situational
Awareness
![Page 4: Ia15 network situation awareness Lumeta Europe](https://reader031.fdocuments.net/reader031/viewer/2022030309/58f27a5c1a28abff5d8b45a9/html5/thumbnails/4.jpg)
Cybersecurity Analytics
Operationalizing Threat Intelligence
![Page 5: Ia15 network situation awareness Lumeta Europe](https://reader031.fdocuments.net/reader031/viewer/2022030309/58f27a5c1a28abff5d8b45a9/html5/thumbnails/5.jpg)
Validate No Access to Known Malware C2
Servers • Determine whether or not
active security controls prevent call back to known botnet/command and control networks and servers
![Page 6: Ia15 network situation awareness Lumeta Europe](https://reader031.fdocuments.net/reader031/viewer/2022030309/58f27a5c1a28abff5d8b45a9/html5/thumbnails/6.jpg)
Validate No Access to Known TOR Exit
Nodes • Determine whether or not
active security controls prevent call back to TOR exit nodes (TOR – The Onion Router/Dark Web Infrastructure)
![Page 7: Ia15 network situation awareness Lumeta Europe](https://reader031.fdocuments.net/reader031/viewer/2022030309/58f27a5c1a28abff5d8b45a9/html5/thumbnails/7.jpg)
Zombie Hunting
• Determine whether or not any trusted/enterprise assets are malware infrastructure or part of blacklists/dropnets/ Shadowserver/attacker lists
![Page 8: Ia15 network situation awareness Lumeta Europe](https://reader031.fdocuments.net/reader031/viewer/2022030309/58f27a5c1a28abff5d8b45a9/html5/thumbnails/8.jpg)
Internal TOR Relays/Bridges
• Determine whether or not any trusted/enterprise assets are/ were acting as TOR relays/ bridges
![Page 9: Ia15 network situation awareness Lumeta Europe](https://reader031.fdocuments.net/reader031/viewer/2022030309/58f27a5c1a28abff5d8b45a9/html5/thumbnails/9.jpg)
Use/Accessibility of Trojan/Malware
Ports • Determine whether or not
any trusted/enterprise assets are utilizing ports associated with Trojans, Malware, and attack lateralization
![Page 10: Ia15 network situation awareness Lumeta Europe](https://reader031.fdocuments.net/reader031/viewer/2022030309/58f27a5c1a28abff5d8b45a9/html5/thumbnails/10.jpg)
Network Attack Emulation Solution
• Intelligence-led test environment mimics the actions of cyber attackers with full traceability and reporting
• Use of Lumeta innocuous malware protects the end user during testing
• We are partnering with European PENTEST partners - Please contact us for more information