SlideShare a Scribd company logo
Threat Detection Redefined
Steve Bassi
CEO
Ben Schmidt
CSO
Paul
Makowski
CTO
Nick Davis
COO
Background
➔ Built high-end R&D consultancy with projects for:
DARPA, DHS, Fortune 200…
➔ Threat-hunted nation states in world’s largest
enterprises, frustrated by difficulty of tool
deployment and reuse
➔ Co-founded & built PolySwarm to 25 employees to
rethink threat detection
1.5 million security
expert shortage
projected by 2019
26-47% of threats go
undetected by the
average antivirus
32% increase in new
malware vs prior
year
Malware Growth Low AV Effectiveness Talent Shortage
Silver Bullet-Proof Problem
GData Security Blog RAP Proactive Symantec
Inadequate Model
Single-Vendor, Centralized Protection Model
1. Overlapping coverage = wasted effort
1. Solutions not cross-compatible
1. Hard to combine specialized offerings
1. Lack of market transparency
coverage overlap not compatible
AV 2AV 1
traditional threat landscape
blind
spot
AV 1
Competitive Threat Detection
Combine Global Experts Into A Single Access Point
The Product
Decentralized Threat Detection Marketplace
User submits artifact Multiple Experts’ software
1. Analyzes artifact
2. Predicts artifact malintent
3. Stakes prediction with money
4. Collects spoils for job well done
Rinse and repeat, per-
artifact, millions of
times per day
Consumer Benefits
Improvements to Threat Detection Paradigm
PolySwarm threat landscape
Expert A AV Company B
1. Competitive response = higher signal Speculators
need not apply
1. Broader coverage via pressure to specialize,
commoditization of widely known threats
1. Reputational transparency drives industry forward
2. Privacy & anonymity
Generate passive income
A true meritocracy with lower barriers to entry
Access to a vast stream of malware samples and analytics
Access to a large market
Supplier Benefits
A Fair Playfield To Monetize Specialized Expertise
“PolySwarm's prediction market is one of the most
novel ideas seen on threat intelligence space”
“PolySwarm provides a better detection rate for
consumers and immediate feedback to anti-malware
services to improve their products.”
“We look forward to expanding our coverage with
PolySwarm’s and consuming the marketplace’s threat
intelligence feeds”
“The ability to generate passive income is what
drew us to PolySwarm’s marketplace.”
Why PolySwarm
“PolySwarm offers a major R&D advantage as we get the
opportunity to continuously test and develop our
system in a real-world environment”
“ PolySwarm’s decentralized platform provides a
new way to protect the internet”
Competitive Threat Detection
Prediction Market Applied
Bounties
Offers
BOUNTY
➔ Have: money, streams of suspect
artifacts (files, URLs, traffic)
➔ Want: accurate, timely protection
for their users and IP
➔ Why PolySwarm?
higher utilization of subscription
dollar, broader right-fit coverage
Enterprises
Bounties
Offers
BOUNTY
GROUND TRUTH
➔ Have: expertise in identifying
badness in files, urls, and network
traffic (artifacts), up to date intel
on their slice of the malware landscape
➔ Want: compensation for providing intel
➔ Why PolySwarm?
broad customer access point that rewards
codified threat detection
Experts
BOUNTY
GROUND TRUTH
➔ Have: enterprise customers,
accuracy data for PolySwarm
security experts
➔ Want: compensation for turnkey
Enterprise solutions
➔ Why PolySwarm?
current expertise, enabling better
response to customer threats
MSSPs Bounties
Offers
Bounty Example
Today’s Edge
Suppliers antivirus companies antivirus companies & diverse security experts
Coverage must deliver overlapping core coverage incentivizes specialization
Economic
Incentives
None rewards & penalties based on accuracy
Barrier to
Entry
engine with broad coverage,
established customer base
no restrictions; anyone with codified threat
detection software can participate
Privacy customers can see everything from anyone anonymous participation + private communities
Tomorrow’s Vision
Competition <> Edge, Better User Protection
Tool Integration
Mail servers for blocking dangerous attachments
SaaS services that handle potentially dangerous uploads
Appliances and endpoint agents that protect users directly
Bring Competitive Threat Detection To Allow/Block Enforcers
Democratized Data Asset
Leverage malware data and modeling to target/price
cyber risk insurance
Broad training for competing ML micro-engines
Real ROI data for security dollars spent
Distributed Detection, Single Point Of Aggregation
Expert Care and Feeding
Expert reputation and dimensional performance stored in a
immutable ledger
Encourage specialization by highlighting unmet artifact
demand (e.g. Android APKs)
Distribute micro-engines directly to the enterprise edge
Community Growth And Expert Promotion Holds Key To Matchmaking
More consumers
attract more
suppliers
More suppliers
attract more
consumers
Stimulate
Network Effects
Growth Plan
1. Integration into existing:
a. Incident response (IR) tools
b. Security Appliances
c. Anti-virus regimes
1. Engine and Channel Partnerships
1. Financial grants to individual security experts
1. ‘Matchmaking’ approach for Supply<>Demand
Suppliers of threat detection
1.5 million security
expert shortage
projected by 2019
26-47% of threats go
undetected by the
average antivirus
32% increase in new
malware vs prior
year
Malware Growth Low AV Effectiveness Talent Shortage
Problem<>Solution
GData Security Blog RAP Proactive Symantec
PolySwarm connects high-value
talent to high-value companies
1.5 million security
expert shortage
projected by 2019
26-47% of threats go
undetected by the
average antivirus
32% increase in new
malware vs prior
year
Malware Growth Low AV Effectiveness Talent Shortage
GData Security Blog RAP Proactive Symantec
In PolySwarm, vendors specialize, together
providing comprehensive coverage
PolySwarm connects high-value
talent to high-value companies
Problem<>Solution
1.5 million security
expert shortage
projected by 2019
26-47% of threats go
undetected by the
average antivirus
32% increase in new
malware vs prior
year
Malware Growth Low AV Effectiveness Talent Shortage
GData Security Blog RAP Proactive Symantec
In PolySwarm, vendors specialize, together
providing comprehensive coverage
PolySwarm connects high-value
talent to high-value companies
PolySwarm continuously
evolves as experts adapt
to new threats
Problem<>Solution
“VirusTotal on steroids”
polyswarm.io

More Related Content

PDF
POV - Enterprise Security Canvas
PDF
5 Key Findings on Advanced Threats
PDF
Cisco Addresses the Full Attack Continuum
PPTX
What is cyber resilience?
PDF
CIO Review 2016-AUG SentinelOne
PPTX
Cyber Security protection by MultiPoint Ltd.
PDF
NCC Group Pro-active Breach Discovery: Network Threat Assessment
PDF
Cisco 2016 Annual Security Report
POV - Enterprise Security Canvas
5 Key Findings on Advanced Threats
Cisco Addresses the Full Attack Continuum
What is cyber resilience?
CIO Review 2016-AUG SentinelOne
Cyber Security protection by MultiPoint Ltd.
NCC Group Pro-active Breach Discovery: Network Threat Assessment
Cisco 2016 Annual Security Report

What's hot (18)

PDF
Cisco Annual Security Report
PPTX
Cyber Resilience
PPTX
Countering Cyber Threats
PDF
Introduction to Cyber Resilience
PPTX
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
PDF
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
PPTX
Modern Security Risk
PDF
SentinelOne Buyers Guide
PDF
NCC Group C Suite Cyber Security Advisory Services
PPTX
Managing Enterprise Risk: Why U No Haz Metrics?
PDF
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
PDF
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
PDF
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
PPT
VeriSign iDefense Security Intelligence Services
PDF
edgescan vulnerability stats report (2018)
PDF
Cyber-Risk-Management-Assessment (1)
PDF
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
PDF
Ctia course outline
Cisco Annual Security Report
Cyber Resilience
Countering Cyber Threats
Introduction to Cyber Resilience
Boardroom to War Room: Practical Application of the NIST Cybersecurity Frame...
Using Hackers’ Own Methods and Tools to Defeat Persistent Adversaries
Modern Security Risk
SentinelOne Buyers Guide
NCC Group C Suite Cyber Security Advisory Services
Managing Enterprise Risk: Why U No Haz Metrics?
Defending Against Advanced Threats-Addressing the Cyber Kill Chain_FINAL
ThreatAlytics Compliance Monitoring CADSI 23 Nov_rev3
SFScon21 - Christian Notdurfter - Data Protection by Design and by Default fo...
VeriSign iDefense Security Intelligence Services
edgescan vulnerability stats report (2018)
Cyber-Risk-Management-Assessment (1)
Security Metrics Rehab: Breaking Free from Top ‘X’ Lists, Cultivating Organic...
Ctia course outline
Ad

Similar to Introduction to PolySwarm (20)

PPTX
CTO-Cybersecurity Forum-Angela McKay
PPTX
Cisco 2015 Midyear Security Report Slide Deck
PDF
Marlabs cyber threat management
PDF
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PDF
RevBits_ Redefining Cybersecurity and Developing Trustworthy Solutions in a T...
PDF
Bitdefender - Solution Paper - Active Threat Control
PDF
A New Era of Cybersecurity
PDF
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
PPTX
Select and Implement a Next Generation Endpoint Protection Solution
PPTX
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
PPT
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
PDF
Monitoring threats for pci compliance
PDF
Monitoring threats for pci compliance
PPTX
OWASP Barcelona 2025 Threat Model Library
DOCX
Research Paper
PDF
WithSecure Deepguard WhitePaper
PDF
2016 Trends in Security
PDF
En msft-scrty-cntnt-e book-cybersecurity
CTO-Cybersecurity Forum-Angela McKay
Cisco 2015 Midyear Security Report Slide Deck
Marlabs cyber threat management
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
Cyber Risk Management in 2017: Challenges & Recommendations
RevBits_ Redefining Cybersecurity and Developing Trustworthy Solutions in a T...
Bitdefender - Solution Paper - Active Threat Control
A New Era of Cybersecurity
For Public_ Cybersecurity_ Frameworks, Fundamentals, and Foundations 2023.pdf
Select and Implement a Next Generation Endpoint Protection Solution
Mobile Threat Protection: A Holistic Approach to Securing Mobile Data and Dev...
The True Cost of Anti-Virus: How to Ensure More Effective and Efficient Endp...
Monitoring threats for pci compliance
Monitoring threats for pci compliance
OWASP Barcelona 2025 Threat Model Library
Research Paper
WithSecure Deepguard WhitePaper
2016 Trends in Security
En msft-scrty-cntnt-e book-cybersecurity
Ad

Recently uploaded (20)

PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Getting started with AI Agents and Multi-Agent Systems
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
A novel scalable deep ensemble learning framework for big data classification...
DOCX
search engine optimization ppt fir known well about this
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
CloudStack 4.21: First Look Webinar slides
PDF
August Patch Tuesday
PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
Unlock new opportunities with location data.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPT
Module 1.ppt Iot fundamentals and Architecture
PPTX
The various Industrial Revolutions .pptx
Taming the Chaos: How to Turn Unstructured Data into Decisions
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Assigned Numbers - 2025 - Bluetooth® Document
Getting started with AI Agents and Multi-Agent Systems
Zenith AI: Advanced Artificial Intelligence
Final SEM Unit 1 for mit wpu at pune .pptx
NewMind AI Weekly Chronicles – August ’25 Week III
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
A comparative study of natural language inference in Swahili using monolingua...
Group 1 Presentation -Planning and Decision Making .pptx
A novel scalable deep ensemble learning framework for big data classification...
search engine optimization ppt fir known well about this
Developing a website for English-speaking practice to English as a foreign la...
CloudStack 4.21: First Look Webinar slides
August Patch Tuesday
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
Unlock new opportunities with location data.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
Module 1.ppt Iot fundamentals and Architecture
The various Industrial Revolutions .pptx

Introduction to PolySwarm

  • 2. Steve Bassi CEO Ben Schmidt CSO Paul Makowski CTO Nick Davis COO Background ➔ Built high-end R&D consultancy with projects for: DARPA, DHS, Fortune 200… ➔ Threat-hunted nation states in world’s largest enterprises, frustrated by difficulty of tool deployment and reuse ➔ Co-founded & built PolySwarm to 25 employees to rethink threat detection
  • 3. 1.5 million security expert shortage projected by 2019 26-47% of threats go undetected by the average antivirus 32% increase in new malware vs prior year Malware Growth Low AV Effectiveness Talent Shortage Silver Bullet-Proof Problem GData Security Blog RAP Proactive Symantec
  • 4. Inadequate Model Single-Vendor, Centralized Protection Model 1. Overlapping coverage = wasted effort 1. Solutions not cross-compatible 1. Hard to combine specialized offerings 1. Lack of market transparency coverage overlap not compatible AV 2AV 1 traditional threat landscape blind spot AV 1
  • 5. Competitive Threat Detection Combine Global Experts Into A Single Access Point
  • 6. The Product Decentralized Threat Detection Marketplace User submits artifact Multiple Experts’ software 1. Analyzes artifact 2. Predicts artifact malintent 3. Stakes prediction with money 4. Collects spoils for job well done Rinse and repeat, per- artifact, millions of times per day
  • 7. Consumer Benefits Improvements to Threat Detection Paradigm PolySwarm threat landscape Expert A AV Company B 1. Competitive response = higher signal Speculators need not apply 1. Broader coverage via pressure to specialize, commoditization of widely known threats 1. Reputational transparency drives industry forward 2. Privacy & anonymity
  • 8. Generate passive income A true meritocracy with lower barriers to entry Access to a vast stream of malware samples and analytics Access to a large market Supplier Benefits A Fair Playfield To Monetize Specialized Expertise
  • 9. “PolySwarm's prediction market is one of the most novel ideas seen on threat intelligence space” “PolySwarm provides a better detection rate for consumers and immediate feedback to anti-malware services to improve their products.” “We look forward to expanding our coverage with PolySwarm’s and consuming the marketplace’s threat intelligence feeds” “The ability to generate passive income is what drew us to PolySwarm’s marketplace.” Why PolySwarm “PolySwarm offers a major R&D advantage as we get the opportunity to continuously test and develop our system in a real-world environment” “ PolySwarm’s decentralized platform provides a new way to protect the internet”
  • 11. Bounties Offers BOUNTY ➔ Have: money, streams of suspect artifacts (files, URLs, traffic) ➔ Want: accurate, timely protection for their users and IP ➔ Why PolySwarm? higher utilization of subscription dollar, broader right-fit coverage Enterprises
  • 12. Bounties Offers BOUNTY GROUND TRUTH ➔ Have: expertise in identifying badness in files, urls, and network traffic (artifacts), up to date intel on their slice of the malware landscape ➔ Want: compensation for providing intel ➔ Why PolySwarm? broad customer access point that rewards codified threat detection Experts
  • 13. BOUNTY GROUND TRUTH ➔ Have: enterprise customers, accuracy data for PolySwarm security experts ➔ Want: compensation for turnkey Enterprise solutions ➔ Why PolySwarm? current expertise, enabling better response to customer threats MSSPs Bounties Offers
  • 15. Today’s Edge Suppliers antivirus companies antivirus companies & diverse security experts Coverage must deliver overlapping core coverage incentivizes specialization Economic Incentives None rewards & penalties based on accuracy Barrier to Entry engine with broad coverage, established customer base no restrictions; anyone with codified threat detection software can participate Privacy customers can see everything from anyone anonymous participation + private communities
  • 16. Tomorrow’s Vision Competition <> Edge, Better User Protection
  • 17. Tool Integration Mail servers for blocking dangerous attachments SaaS services that handle potentially dangerous uploads Appliances and endpoint agents that protect users directly Bring Competitive Threat Detection To Allow/Block Enforcers
  • 18. Democratized Data Asset Leverage malware data and modeling to target/price cyber risk insurance Broad training for competing ML micro-engines Real ROI data for security dollars spent Distributed Detection, Single Point Of Aggregation
  • 19. Expert Care and Feeding Expert reputation and dimensional performance stored in a immutable ledger Encourage specialization by highlighting unmet artifact demand (e.g. Android APKs) Distribute micro-engines directly to the enterprise edge Community Growth And Expert Promotion Holds Key To Matchmaking
  • 20. More consumers attract more suppliers More suppliers attract more consumers Stimulate Network Effects Growth Plan 1. Integration into existing: a. Incident response (IR) tools b. Security Appliances c. Anti-virus regimes 1. Engine and Channel Partnerships 1. Financial grants to individual security experts 1. ‘Matchmaking’ approach for Supply<>Demand
  • 21. Suppliers of threat detection
  • 22. 1.5 million security expert shortage projected by 2019 26-47% of threats go undetected by the average antivirus 32% increase in new malware vs prior year Malware Growth Low AV Effectiveness Talent Shortage Problem<>Solution GData Security Blog RAP Proactive Symantec PolySwarm connects high-value talent to high-value companies
  • 23. 1.5 million security expert shortage projected by 2019 26-47% of threats go undetected by the average antivirus 32% increase in new malware vs prior year Malware Growth Low AV Effectiveness Talent Shortage GData Security Blog RAP Proactive Symantec In PolySwarm, vendors specialize, together providing comprehensive coverage PolySwarm connects high-value talent to high-value companies Problem<>Solution
  • 24. 1.5 million security expert shortage projected by 2019 26-47% of threats go undetected by the average antivirus 32% increase in new malware vs prior year Malware Growth Low AV Effectiveness Talent Shortage GData Security Blog RAP Proactive Symantec In PolySwarm, vendors specialize, together providing comprehensive coverage PolySwarm connects high-value talent to high-value companies PolySwarm continuously evolves as experts adapt to new threats Problem<>Solution

Editor's Notes

  • #4: And we think you see the consequences of this frustration everywhere Lots of innovative tools out there but both the amount of malware and the damage done by it keep growing Also, the cyber insurance market keeps growing which means our tech industry efforts aren’t effective as we’d like re shortage, that 1.5M figure is 320k in the US alone according to NSA, 1M in US by 2020
  • #5: And we think the way we buy cyber security tools and expect them to protect us is actually to blame Once a year symantec, kaspersky, mcafee all go into a room and pitch their products Those products all cover the threat bell curve in different ways, some focus on the tails, others on the middle This means some coverage overlaps, some doesn’t, and there is no way to combine all those vendors into one protective umbrella and just pay for what you use
  • #6: So we were already frustrated that we couldn’t get our special snowflake tools into wide distribution in our enterprise threat hunting days. And we felt like we (TODO) paul brainstorm: global experts, single access point global expertise, one access point simple, scalable access to global expertise global expertise at scale global expertise, one interface
  • #7: So we built this playing field for threat detection competition. And at a very high level it works like this. Now you’re probably wondering about D, how do we divide the spoils for a job well done well that is where we leverage something called a prediction market <tell them about prediction market>. paul notes: “at line speed” “at machine speed” micro-transactions
  • #11: TODO: describe
  • #12: TODO: faster through these
  • #16: Where we are today is approaching virus total in feature parity. We act as that single access point for predicting malintent in artifacts and really change the game on the data behind that prediction. So today we pretty much operate in cloud AV mode.
  • #17: TODO: describe
  • #27: demo script: go to polyswarm.network upload a benign file search that benign file by hash log in upload EICAR view microengines page curl against consumer (api key in env var) run a microengine, point at polyswarmd?