Stopping The Next Cyberattack

17
©2015 Check Point Software Technologies Ltd. 1 ©2015 Check Point Software Technologies Ltd. 5 Steps to Stronger Security STOPPING THE NEXT MASSIVE CYBERATTACK

Transcript of Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd.

5 Steps to Stronger Security

STOPPING THE NEXT MASSIVE CYBERATTACK

©2015 Check Point Software Technologies Ltd. 2

Era of the Breach

1 IT Security Risks Survey 2014, Kapersky Lab report, 20142 PWC Global State of Information Security Survey 2015, PWC, October 20143 “2014 Cost of Cyber Crime Study: United States,” Ponemon Institute, October 2014

of large companies saytargeted attacks area major threat1

39% 117,339global attacks per day2

Average annualized cybercrime cost by organization3

12.7million

©2015 Check Point Software Technologies Ltd. 3

What Can Breaches Teach Us?

Security vulnerabilities

Operational weaknesses

Common attack patterns

Preventive steps

©2015 Check Point Software Technologies Ltd. 4

Best-in-class securityproducts are not enoughon their own  Only a security-driven network architecture and security infrastructure partnered with experienced staff can prevent future attacks

©2015 Check Point Software Technologies Ltd.

5 STEPS TO STRONGER SECURITY

©2015 Check Point Software Technologies Ltd. 6

Assess environment vulnerabilities and weaknesses

 

STEP 1

©2015 Check Point Software Technologies Ltd. 7

Evaluating Security• Ingress/Egress • Critical Services • Critical Data • Segmentation • Security controls • Password policy controls• Advanced threat prevention

©2015 Check Point Software Technologies Ltd. 8

Segment the network toprevent and contain infections

 

STEP 2

©2015 Check Point Software Technologies Ltd. 9

FLAT NETWORK

SEGMENTED NETWORK

©2015 Check Point Software Technologies Ltd. 10

Implement security controlsto protect against APTs

STEP 3

©2015 Check Point Software Technologies Ltd. 11

Stopping Attacks At Every Stage

©2015 Check Point Software Technologies Ltd. 12

The criminal identifies a vulnerability to exploitSecurity solution:

The criminal writes code to exploit that vulnerability and download malwareSecurity solution:

Malware connectswith its Command& Control centerSecurity solution:

Malware spreads through the network to look for critical dataSecurity solution:

Malware finds the data & begins exfiltrationSecurity solution:

IPS AVSandboxing

SegmentationIPSAV

Anti-bot tools

Anti-bottools

Data leakage and loss

prevention tools

©2015 Check Point Software Technologies Ltd. 13

Monitor 24/7for continuous security

STEP 4

©2015 Check Point Software Technologies Ltd. 14

Keys to Effective Monitoring

Monitor logs daily

Correlate logs from different technologies

Tune detection and analysis rules based on logs

Identify potential incidents with anomaly detection tools

Stay familiar with network assets

Use visualization to assist expert analysis

Maintain logs for 90 days or more

Retroactively review logs based on new data

©2015 Check Point Software Technologies Ltd. 15

Create and testIncident Response plan

STEP 5

©2015 Check Point Software Technologies Ltd. 16

Closing The Door To Attacks

Are you prepared to…

Contain attacks?

Minimize losses?

Keep the business running?

©2015 Check Point Software Technologies Ltd. 17

Take the first step, schedule your FREE Security Checkup

Stop Tomorrow’s Attacks, Today