Top Banner
Bruce Chai Check Point 06 th March 2018 Ambarrukmo, Yogyakarta
42

Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

May 31, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

Bruce ChaiCheck Point 06th March 2018 Ambarrukmo, Yogyakarta

Presenter
Presentation Notes
Intro. Company, self and point of preso.
Page 2: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

May 12th2017

Page 3: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

ZEROINFECTIONS

Presenter
Presentation Notes
How do we continue to protect against such attacks. Already at the start of 2018 we are seeing Meltdown and Spectre.
Page 4: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

ENABLE GROWTH,ADVANCE THE IT

MAINTAINSECURITY

Presenter
Presentation Notes
Promote IT infrastructure to promote the growth of the company while maintaining IT Security
Page 5: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

ENABLE GROWTH,ADVANCE THE IT

TOOLS

INFRASTRUCTURE

CLOUD

Presenter
Presentation Notes
Between implementing the most advance CRM system The most advance collaboration tools And public cloud infrastructure
Page 6: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

1990 2000 2010 2015 2017 2020

Virus

Gen I

Networks

Gen II

Applications

Gen III

Payload

Gen IVMega

Gen V

MAINTAINSECURITY

Evolving threats

Presenter
Presentation Notes
And between the facts that threat techniques are advancing rapidly. And new malicious tools are outpacing our security level.
Page 7: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

7©2018 Check Point Software Technologies Ltd.

1%SUPERHERO

99%ROUTINE

Presenter
Presentation Notes
5 insights from our CIO. Not all about Wannacry. CIOs are not superheros all the time. Only 1% of incidents 99% mundane task like Patching systems Addressing endless vulnerabilities reports. Segmenting networks Dealing with daily incidence
Page 8: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

8©2018 Check Point Software Technologies Ltd.

Common culprits

35% 23% 23%Browsers Office Android

Presenter
Presentation Notes
Basic tools which we use everyday that have become the platform for ongoing attacks. We need to prevent these from entering your perimeter as well as your endpoints
Page 9: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

9©2018 Check Point Software Technologies Ltd.

It’s beyond the HQ

Presenter
Presentation Notes
90+ sales offices 4 Research center 3 private cloud co-lo 4500+ employees working from laptop and mobile accessing corporate data
Page 10: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

10©2018 Check Point Software Technologies Ltd.

MOBILE50%

will sacrifice security over

usability(BT survey)

Presenter
Presentation Notes
Mobile. Can’t be ignored any longer. We talk about malicious apps but we’re not doing anything about it. 1-2% are secured again mobile threats according to a survey done by checkpoint. MDM and EMM is not for security. Its to help push policy.
Page 11: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

11©2018 Check Point Software Technologies Ltd.

Humans…

Misjudgment behind 70% of breaches

Presenter
Presentation Notes
70% of security incidence are cause by human error.
Page 12: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

MAINTAINSECURITY

ENABLE GROWTHADVANCE THE IT

Technology

Presenter
Presentation Notes
How to address this constant dilemma, How do we beat the odds. It start with choosing the right technology
Page 13: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

MAINTAINSECURITY

ENABLE GROWTHADVANCE THE IT

PolicyTechnology

Presenter
Presentation Notes
Support by the right policies.
Page 14: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

MAINTAINSECURITY

ENABLE GROWTHADVANCE THE IT

PeoplePolicyTechnology

Presenter
Presentation Notes
Cannot forget the human factor
Page 15: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

PEOPLEPOLICYTECHNOLOGY

Presenter
Presentation Notes
Start with people.
Page 16: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

People WILL make mistakes

Onboarding

Follow on training

They tend to forget

Empower-ment

Safetynet

“Are you sure?”

Presenter
Presentation Notes
Train them once they come on board, but they have so much to take in that and they will forget. You’ll be lucky if they remember 10% of what they were taught. They won’t remember the security training Must reinforce with remedial training and test. But because we’re human we will forget. What we do is to empower our users and build safety net.
Page 17: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

17©2018 Check Point Software Technologies Ltd.

Send?

Justify

Discard

EMPOWERMENT

Presenter
Presentation Notes
Explain the risk of sharing corporate information with someone outside the company. The action gives feedback explaining the risk. With the power to make a decision on sending or discarding the email
Page 18: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

18©2018 Check Point Software Technologies Ltd.

SAFETYNET

Page 19: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

19©2018 Check Point Software Technologies Ltd.

Zero PhishingSAFETYNET

Page 20: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

PEOPLEPOLICYTECHNOLOGY

Presenter
Presentation Notes
Policies are the Glue between the people and the technologies. Policies need to be dynamic to fit the needs of the people.
Page 21: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

TECHNOLOGY PEOPLEPOLICY

THE GLUE BETWEEN PEOPLE AND TECHNOLOGY

Presenter
Presentation Notes
When checkpoint first came up with Threat extraction we implement it and it took us 24 to notice that the legal dept need the original.
Page 22: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

22©2018 Check Point Software Technologies Ltd.

THREATEXTRACTION

Exploitable contentExtraction

Document Reconstruction

THREATEMULATION

ADAPTIVE POLICY

ORIGINALDOCUMENT

Presenter
Presentation Notes
Threat Extraction This proactively sanitizes documents, converting them to a safe format such as a word doc to a PDF. This prevents 0 day malwares from coming in. However shortly after implementing such a solution, we found that legal required the original to work. Threat Extraction now works hand in hand with our Threat Emulation solutions, which makes up our Sandblast 0 day threat prevention offering. Instead of just extracting a document file to a safe format, the solution simultaneously sends the file for emulation. The result, legal gets a safe copy which is sanitize of just about any possible threats, which still having access to the original once its done with emulation.
Page 23: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

PEOPLEPOLICYTECHNOLOGY

Page 24: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue
Page 25: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

25©2018 Check Point Software Technologies Ltd.

Choosing the right technology

Page 26: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

26©2018 Check Point Software Technologies Ltd.

looking backlooking forward

Fixing:Prevention:

PREVENTION

Page 27: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

27©2018 Check Point Software Technologies Ltd.

CONSISTENCY

Presenter
Presentation Notes
Consistent across organization. Consistent across my offices. Consistent across my devices, regardless of mobile, network, PC, servers and the cloud.
Page 28: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

28©2018 Check Point Software Technologies Ltd.

CONSOLIDATION

Presenter
Presentation Notes
No luxury of enough resources to manage it all. Can only work if we use limited number of solutions set. And only if the solution can be manage by a small number of consoles.
Page 29: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

29©2018 Check Point Software Technologies Ltd.

EXAMPLES

Page 30: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

30©2018 Check Point Software Technologies Ltd.

WannaCry – PREVENTION FIRST

Anti-Ransomware

Anti-Bot

Threat Emulation

Threat Extraction

Zero Phishing

Anti-Virus

IPS

Page 31: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

MOBILE – CANNOT IGNORE THEM ANY LONGER

Page 32: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

32©2018 Check Point Software Technologies Ltd.

100+High-risk incidentsin December 2017

Presenter
Presentation Notes
One was an employee trying to sync mobile device to laptop. Downloaded sync manage which was a keylogger. Lucky he was block.
Page 33: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

33©2018 Check Point Software Technologies Ltd.

Capsule Workspace

Presenter
Presentation Notes
BYOD challenges. We use Capsule workspace to contain the connection between the device and the corporate resource.
Page 34: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

34©2018 Check Point Software Technologies Ltd.

SandBlast Mobile

Presenter
Presentation Notes
Some don’t want to implement sandblast mobile on the device.
Page 35: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

35©2018 Check Point Software Technologies Ltd.

Better together

SandBlast & Capsule

Presenter
Presentation Notes
So we implement the need of SBM to use capsule workspace. Benefit is if a threat is detected in SBM, we can block the use of the workspace.
Page 36: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

CAN THE TECHNOLOGY BE TRUSTED?

Page 37: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

PROVEN 3rd PARTY TRACK RECORD OF SECURITY EXCELLENCESource: http://tiny.cc/nss_stats NSS Labs Network Security tests (FW/NGFW/IPS/NGIPS/DCIPS/BDS) * PAN NGFW solution have not been recommended since 2013

Neutral Caution Recommended

Page 38: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

2017 NSS Breach Prevention Systems Test

Page 39: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

39©2018 Check Point Software Technologies Ltd.

PEOPLEPOLICYTECHNOLOGY

Page 40: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

T H A N K Y O UPlease contact me directly with any questions or comments

[email protected]+65 9001 6841

Page 41: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

May 2018 ,Three Days SOC AND SIEM CLASS

• Three Days from 2rd 3rd and 4th of May 2018

• Chief Trainer : Kirby Chong• Suitable for : itsec teams, audit and

compliance, IT heads whom wannaunderstand SOCs etc

• Contact : ping [email protected] or to 0818102085

Page 42: Bruce Chai - Weebly · Bruce Chai Check Point 06th March 2018 Ambarrukmo, Yogyakarta. Intro. Company, self and point of preso. May 12th. 2017. ZERO INFECTIONS . How do we continue

Kirby Chong, ICION advisory trainer