SlideShare a Scribd company logo
4 Pillars of Architecture
Three Pillars of Security Architecture
• Protection
• Detection
• Response
• Prediction
Detection and Prevention
Cloud Access Security Brokers
Challenges with SaaS/Cloud
• Sanctioned IT:
– Lack of user behavior visibility or audit trail,
– Ability to encrypt/secure
– Ability to directly prevent threats
• Shadow IT:
– No visibility
– No control
CASB
• Cloud Access Security Brokers (CASBs) are
security enforcement points between
consumers and service providers that apply
security controls to access cloud services
– Data Security/Encryption
– Visibility
– Threat Protection
– Compliance
Image Source: Cloud Access Security Broker (CASB): A pattern for secure access to cloud services EDUARDO B. FERNANDEZ et al
CASB
• Ciphercloud
• Skyhigh
• Palerra
• Bitglass
• Adallom
Application Control
• Bit9
• Avecto
• Viewfinity
RASP and IAST
RASP and IAST
• IAST
– Combine SAST and DAST
• RASP
– Self Defending Applications
– Vendors
• Arxan
• Prevoty
• Waratek
Specialized Security Analytics
Beyond SIEM
• SIEM failed to deliver as per expectation
• Domain specific Analytics
– User Behavior Analytics
– Network Behavior Analytics
– Network Sandboxing
– RASP
– CASB
Attack Deception
Turning the table
• New type of technologies which deceives the
attacker
– Isolate attacker
– Deceive and Observe
• Vendors
– Illusive
– Topspin
– TrapX
Security Awareness Doesn’t Deliver
Beyond a Point. Invest in Habits.
Insider Threats
Response
Micro Segmentation and End Point
Isolation
You will get hacked…but that’s ok
• Isolate Browser and Applications
• Trusted Container in un-trusted system
• Un-trusted Container in trusted system
• Microsegmentation Vendors
• Illumio
• Cloudpassage
• Vidder
• Catbird
• Certes
• Endpoint Isolation
– Bromium
– Invincea
– Avecto
– Armor5
– Menlo Security
– Spikes security
EDR – Endpoint Detection and
Response
EDR
• Cybereason
• Triumphant
• Countertack
• Mandiant
Incident Response Platforms
• CSG
• DFLabs
• Resilient
• Hexadite
Prediction
Threat Intelligence
Threat Intelligence
Intel 101
• Data vs Intelligence
– Context, Intent, Capability
• Tactical vs Strategic
– How and what?
– Who and why?
• Atomic vs Composite
– IP, packet string, hash
– Combine multiple things
• TTP- Tactics, Techniques and Procedures
Taxonomy for Threat Intelligence
Threat
intelligence
Threat
Intelligence
Platform
Threat
Intelligence
Enrichment
Threat
Intelligence
Integration
Open Source
Intel Human Intel
Technical
Intel
Adversary
Intel
Vulnerability
Intel
Strategic
Intel
Vendor Landscape
• Total Vendors studied: 23
• Prominent Vendors
– Open Source Intel: Recorded Future, Digital Shadows, Cyveillance
– Human Intel: Booz Allen Hamilton, CrowdStrike, iSIGHT Partners,
Verisign iDefence, Cyveillance
– Technical Intel: Norse Corporation , Anubis Networks, Emerging
Threats
– Adversary Intel: Booz Allen Hamilton, CrowdStrike, iSIGHT Partners,
Verisign iDefence, Symantec Deepsight
– Vulnerability Intel: iSIGHT Partners, Verisign iDefence
– Strategic Intel: , Surfwatch labs, Cytegic
Tying Things Together
Threat
Vector
Protective
Controls
Detective
Controls
Responsive
Controls
Predictive
Controls
Thank You

More Related Content

PDF
From Business Architecture to Security Architecture
PPTX
Application Security Architecture and Threat Modelling
PDF
Cybersecurity roadmap : Global healthcare security architecture
PPTX
Critical Capabilities for MDR Services - What to Know Before You Buy
PPTX
Overview of Google’s BeyondCorp Approach to Security
PPTX
CyberSecurity Portfolio Management
PDF
Practical Enterprise Security Architecture
PDF
Game Changing Cyber Defensive Strategies for 2019
From Business Architecture to Security Architecture
Application Security Architecture and Threat Modelling
Cybersecurity roadmap : Global healthcare security architecture
Critical Capabilities for MDR Services - What to Know Before You Buy
Overview of Google’s BeyondCorp Approach to Security
CyberSecurity Portfolio Management
Practical Enterprise Security Architecture
Game Changing Cyber Defensive Strategies for 2019

What's hot (20)

PDF
Why Zero Trust Yields Maximum Security
PPTX
5 things i wish i knew about sast (DSO-LG July 2021)
PDF
The State of Threat Detection 2019
PDF
Hardware Security on Vehicles
PDF
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
PDF
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
DOCX
What is zero trust model of information security?
PDF
Extending Your Network Cloud Security to AWS
PPTX
Zero Trust Framework for Network Security​
PPTX
Optimizing Security Operations: 5 Keys to Success
PDF
Vulnerability management - beyond scanning
DOCX
What operational technology cyber security is?
PPTX
Effective Security Operation Center - present by Reza Adineh
PDF
Arbel Zinger | Microsoft Advanced Threat Analytics
PDF
Chapter 15 incident handling
PPTX
Zero trust deck 2020
PDF
Micro segmentation and zero trust for security and compliance - Guardicore an...
PDF
Zero Trust Model Presentation
PDF
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
PDF
IDC Security 2014, Endpoint Security in Depth
Why Zero Trust Yields Maximum Security
5 things i wish i knew about sast (DSO-LG July 2021)
The State of Threat Detection 2019
Hardware Security on Vehicles
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
What is zero trust model of information security?
Extending Your Network Cloud Security to AWS
Zero Trust Framework for Network Security​
Optimizing Security Operations: 5 Keys to Success
Vulnerability management - beyond scanning
What operational technology cyber security is?
Effective Security Operation Center - present by Reza Adineh
Arbel Zinger | Microsoft Advanced Threat Analytics
Chapter 15 incident handling
Zero trust deck 2020
Micro segmentation and zero trust for security and compliance - Guardicore an...
Zero Trust Model Presentation
When to Implement a Vulnerability Assessment or Pen Test | IT Security & Risk...
IDC Security 2014, Endpoint Security in Depth
Ad

Viewers also liked (20)

PDF
Application Threat Modeling
PDF
SACON Orientation
PPTX
NIST Critical Security Framework (CSF)
PDF
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
PDF
Workshop on Endpoint Memory Forensics
PPTX
SOC Architecture Workshop - Part 1
PDF
SOC Architecture - Building the NextGen SOC
PPTX
Enterprise Security Architecture
PDF
Security Maturity Models.
PDF
Risk Analysis using open FAIR and Adoption of right Security Controls
PDF
Enterprise Security Architecture
PDF
Network Forensics and Practical Packet Analysis
PPTX
Practical Applications of Block Chain Technologies
PPTX
2015 Microsoft Vulnerabilities Report
PDF
Hickman threat modeling
PDF
Robert Hurlbut - Threat Modeling for Secure Software Design
PDF
Overcoming Cyber Attacks
PDF
Secure Password Storage & Management
PDF
Threat Modeling for Web Applications (and other duties as assigned)
PDF
BadUSB — On accessories that turn evil by Karsten Nohl
Application Threat Modeling
SACON Orientation
NIST Critical Security Framework (CSF)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Workshop on Endpoint Memory Forensics
SOC Architecture Workshop - Part 1
SOC Architecture - Building the NextGen SOC
Enterprise Security Architecture
Security Maturity Models.
Risk Analysis using open FAIR and Adoption of right Security Controls
Enterprise Security Architecture
Network Forensics and Practical Packet Analysis
Practical Applications of Block Chain Technologies
2015 Microsoft Vulnerabilities Report
Hickman threat modeling
Robert Hurlbut - Threat Modeling for Secure Software Design
Overcoming Cyber Attacks
Secure Password Storage & Management
Threat Modeling for Web Applications (and other duties as assigned)
BadUSB — On accessories that turn evil by Karsten Nohl
Ad

Similar to ATP Technology Pillars (20)

PPT
cloud-complete.ppt
PPT
Cloud complete
PPT
cloud-complete.ppt
PPT
cloud-complete.ppt
PPT
cloud-complete.ppt
PPT
cloud-complete power point presentation for digital signature
PPT
Cloud complete
PPTX
SECURITY AND PRIVACY SECURITY AND PRIVACY SECURITY AND PRIVACY SECURITY AND P...
PDF
110307 cloud security requirements gourley
PPT
cloud-complete.ppt
PPT
Tutorial-security-privacy-cloud-computing
PDF
Workshop: Threat Intelligence - Part 1
PPT
12-cloud-security.ppt
PDF
Offensive cyber security engineer
PDF
Offensive cyber security engineer pragram course agenda
PDF
Offensive cyber security engineer updated
PDF
AWS Cloud Security
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
PPTX
security and compliance in the cloud
PPT
4831586.ppt
cloud-complete.ppt
Cloud complete
cloud-complete.ppt
cloud-complete.ppt
cloud-complete.ppt
cloud-complete power point presentation for digital signature
Cloud complete
SECURITY AND PRIVACY SECURITY AND PRIVACY SECURITY AND PRIVACY SECURITY AND P...
110307 cloud security requirements gourley
cloud-complete.ppt
Tutorial-security-privacy-cloud-computing
Workshop: Threat Intelligence - Part 1
12-cloud-security.ppt
Offensive cyber security engineer
Offensive cyber security engineer pragram course agenda
Offensive cyber security engineer updated
AWS Cloud Security
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
security and compliance in the cloud
4831586.ppt

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
cuic standard and advanced reporting.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
KodekX | Application Modernization Development
PDF
Modernizing your data center with Dell and AMD
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Understanding_Digital_Forensics_Presentation.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Mobile App Security Testing_ A Comprehensive Guide.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
Building Integrated photovoltaic BIPV_UPV.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
NewMind AI Monthly Chronicles - July 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Unlocking AI with Model Context Protocol (MCP)
cuic standard and advanced reporting.pdf
MYSQL Presentation for SQL database connectivity
KodekX | Application Modernization Development
Modernizing your data center with Dell and AMD
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication

ATP Technology Pillars