Top Banner
©2015 Check Point Software Technologies Ltd. 1 ©2015 Check Point Software Technologies Ltd. 5 Steps to Stronger Security STOPPING THE NEXT MASSIVE CYBERATTACK
17
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 1©2015 Check Point Software Technologies Ltd.

5 Steps to Stronger Security

STOPPING THE NEXT MASSIVE CYBERATTACK

Page 2: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 2

Era of the Breach

1 IT Security Risks Survey 2014, Kapersky Lab report, 20142 PWC Global State of Information Security Survey 2015, PWC, October 20143 “2014 Cost of Cyber Crime Study: United States,” Ponemon Institute, October 2014

of large companies saytargeted attacks area major threat1

39% 117,339global attacks per day2

Average annualized cybercrime cost by organization3

12.7million

Page 3: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 3

What Can Breaches Teach Us?

Security vulnerabilities

Operational weaknesses

Common attack patterns

Preventive steps

Page 4: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 4

Best-in-class securityproducts are not enoughon their own  Only a security-driven network architecture and security infrastructure partnered with experienced staff can prevent future attacks

Page 5: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd.

5 STEPS TO STRONGER SECURITY

Page 6: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 6

Assess environment vulnerabilities and weaknesses

 

STEP 1

Page 7: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 7

Evaluating Security• Ingress/Egress • Critical Services • Critical Data • Segmentation • Security controls • Password policy controls• Advanced threat prevention

Page 8: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 8

Segment the network toprevent and contain infections

 

STEP 2

Page 9: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 9

FLAT NETWORK

SEGMENTED NETWORK

Page 10: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 10

Implement security controlsto protect against APTs

STEP 3

Page 11: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 11

Stopping Attacks At Every Stage

Page 12: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 12

The criminal identifies a vulnerability to exploitSecurity solution:

The criminal writes code to exploit that vulnerability and download malwareSecurity solution:

Malware connectswith its Command& Control centerSecurity solution:

Malware spreads through the network to look for critical dataSecurity solution:

Malware finds the data & begins exfiltrationSecurity solution:

IPS AVSandboxing

SegmentationIPSAV

Anti-bot tools

Anti-bottools

Data leakage and loss

prevention tools

Page 13: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 13

Monitor 24/7for continuous security

STEP 4

Page 14: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 14

Keys to Effective Monitoring

Monitor logs daily

Correlate logs from different technologies

Tune detection and analysis rules based on logs

Identify potential incidents with anomaly detection tools

Stay familiar with network assets

Use visualization to assist expert analysis

Maintain logs for 90 days or more

Retroactively review logs based on new data

Page 15: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 15

Create and testIncident Response plan

STEP 5

Page 16: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 16

Closing The Door To Attacks

Are you prepared to…

Contain attacks?

Minimize losses?

Keep the business running?

Page 17: Stopping The Next Cyberattack

©2015 Check Point Software Technologies Ltd. 17

Take the first step, schedule your FREE Security Checkup

Stop Tomorrow’s Attacks, Today