Tripwire University: Cyberwar Boot Camp – Introduction and Overview
-
Upload
tripwire -
Category
Technology
-
view
335 -
download
2
Transcript of Tripwire University: Cyberwar Boot Camp – Introduction and Overview
![Page 1: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/1.jpg)
Overview
Gajraj SinghVice President Product MarketingTripwire
![Page 2: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/2.jpg)
cyberwar (noun)Pronunciation: (/ˈsībərˌwôr/)
After land, sea, air and space, warfare has entered the fifth domain: cyberspace.
The use of computer technology to disrupt the activities of a state or organization, especially the deliberate attacking of information systems for strategic or military purposes
But there are few, if any, rules in this domain!
In fact, Cyberwar is NOT a defined term of art in law or legal convention.
![Page 3: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/3.jpg)
NATO Tries to Define Cyberwar
2014 summit declaration states, a certain threshold must be met to consider invoking Article 5, the collective defense clause.
But how do we define “thresholds” in cyberspace?
1. Confidentiality – breaches have been treated as crimes
2. Availability – e.g. DDoS campaign against Estonia. Espionage, sabotage, and crime but not an act of war
3. Integrity – e.g. Infecting industrial control systems. Could be catastrophic
A small number of cyber attacks involve data manipulation, and even fewer pose militaristic threats.
![Page 4: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/4.jpg)
Five Pillars: Pentagon, United States military strategy for cyberwarfare
• Recognizing cyberspace as the next domain of warfare
• The need for active defenses
• Protection of critical infrastructure
• Enhancing collective defense
• The need to marshal our technological prowess
![Page 5: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/5.jpg)
![Page 6: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/6.jpg)
9
GROWTH
COMPETITIVENESS
OPS EFFICIENCY
CUSTOMER EXPERIENCE
VISIBILITY
ADAPTIVENESS
RESPONSIVENESS
CONTROL
DIGITAL BUSINESS ENABLE AND PROTECT
BUSINESS AGILITY
CYBER RESILIENCE
![Page 7: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/7.jpg)
10
450M
Over 390K malicious programs discovered
every day
78%
% of Boards concerned withcyber security
<50%
believe teams have abilityto detect & respond to complex incidents
SOURCE: Joint study from ISACA and RSA
SOURCE: Joint study from ISACA and RSA
SOURCE: AV-Test.org
$445B Estimated Financial Loss Per YearSOURCE: Strategic and Int’l Studies
![Page 8: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/8.jpg)
11
DEFEND AND PROTECT EVERY ENDPOINT
![Page 9: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/9.jpg)
SOURCE: Gartner
THE “CIAS” MODEL OF CYBERSECURITYFrom information security to cybersecurity—the qualitiesof security evolve
Digital and physical blur… but not the need for safety
Confidentiality
Safety
Availability Integrity
Safety
Digital
Physical
![Page 10: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/10.jpg)
Reducing Risk Exposure
Detect & Respond to Threats
Drive Operational Efficiency
Inte
grat
ion
& A
utom
atio
n
HOW IS TRIPWIREADDRESSING
CYBERSECURITYCHALLENGES?
![Page 11: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/11.jpg)
Tripwire delivers advanced security, compliance and IT operations solutions
9,500+Customers in96 Countries
$$$Profitable
475+Employees
$167MFY2015
Revenue
![Page 12: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/12.jpg)
Proactive Threat DefenseReduce attack surface
Detect advanced threats
Business agility
Optimize resources
Reduce business risk
Continuous Compliance
Responsive IT Operations
INTEGRATION
AUTOMATION
Tripwire: Security, Compliance and IT Operations
![Page 13: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/13.jpg)
Integrated risk assessment, endpoint monitoring and threat detection
Detect, confirm, prioritize and contain with best-in-class endpoint intelligence
Harden endpoints, reduce attack surface and integrate to prevent attacks and contain losses
Investigate, analyze and respond with intelligence, automation and integration
Predictive analysis by baselining, assess vulnerabilities, configuration changes and threat intelligence
Tripwire: Proactive Threat Defense
![Page 14: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/14.jpg)
Real-time change detection and audit tracking helps maintain continuous compliance
700+ policy and platform support
Auto discovery and inventory of all assets, hardware and software in scope.
Rapid discovery of gaps.
Audit and ensure patch process through integrated configuration, vulnerability and log management
Update with built-in remediation guidance
Policy and compliance content updates, vulnerabilities and security frameworks.
Industry leading compliance and policy platformTripwire: Continuous Compliance
![Page 15: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/15.jpg)
Real-time system and file integrity monitoringUninterrupted change visibility for actionable intelligenceReports, dashboards and alerts
Discover and baseline IT infrastructureHave full inventory of ITManage Shadow ITDetect ‘at-risk’ assets and changes
Evaluate ‘drift’ from baseline – who, what, when, whyAssist security and compliance with evidence & workflows
Automate IT and security workflows and processesQuickly adapt & update based on risk & business priorities
Business Agility through integration and automation of IT workflowsTripwire: Responsive IT Operations
![Page 16: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/16.jpg)
Tripwire – Trusted and recognized industry leaderHalf of Fortune 500 and over 9,000 customers worldwide
Trusted: By over half of Fortune 500 and over 9,500+ customers worldwide
Advanced: Integrity monitoring, configuration and risk assessment portfolio
Open: Built for integration and automation across the security and IT ecosystem
Resilient: Proven, reliable platform for security, compliance and IT operations
![Page 17: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/17.jpg)
cyberwarOverview
enemy Economy of Bad
battlefieldShifting Landscape
yourselfConfidence
battleTips & Resources
![Page 18: Tripwire University: Cyberwar Boot Camp – Introduction and Overview](https://reader036.fdocuments.net/reader036/viewer/2022070522/58ee93f71a28ab29428b458b/html5/thumbnails/18.jpg)
tripwire.com | @TripwireInc
Download from www.tripwire.com
1 2 3