SlideShare a Scribd company logo
Be#er	
  Security	
  Through	
  Big	
  Data	
  Analy5cs	
  
Jeff	
  Scheel,	
  SVP,	
  Corporate	
  Development,	
  Alliances	
  &	
  Strategy	
  -­‐	
  Symantec	
  
Myrna	
  Soto,	
  SVP	
  &	
  CISO,	
  Consumer	
  Energy	
  –	
  Comcast	
  	
  
Amit	
  Jasuja,	
  SVP,	
  Product	
  Development	
  -­‐	
  Symantec	
  
	
  
Enterprise	
  Threat	
  Landscape	
  	
  
2	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora6on	
  
A#ackers	
  Moving	
  Faster	
  	
  
Digital	
  extor5on	
  	
  
on	
  the	
  rise	
  
Malware	
  gets	
  
smarter	
  
Zero-­‐Day	
  Threats	
   Many	
  Sectors	
  Under	
  A#ack	
  
5	
  of	
  6	
  large	
  
companies	
  
a9acked	
  
317M	
  new	
  
malware	
  
created	
  
1M	
  new	
  
threats	
  
daily	
  
60%	
  of	
  
a9acks	
  
targeted	
  SMEs	
  
113%	
  
increase	
  in	
  
ransomware	
  
45X	
  more	
  
devices	
  
held	
  
hostage	
  	
  
28%	
  of	
  malware	
  
was	
  Virtual	
  
Machine	
  Aware	
  
24	
  	
  
all-­‐6me	
  
high	
  
Top	
  5	
  
unpatched	
  
for	
  295	
  days	
  
24	
  	
  
Healthcare	
  	
  
+	
  37%	
  	
  
Retail	
  
+11%	
  	
  
Educa6on	
  
+10%	
  
Government	
  
+8%	
  
Financial	
  
+6%	
  
Source:	
  Symantec	
  Internet	
  Security	
  Threat	
  Report	
  2015	
  
Key	
  Trends	
  Reshaping	
  the	
  Enterprise	
  Security	
  Market	
  
RESURGENCE	
  OF	
  ENDPOINT	
   Rapid	
  shi`	
  to	
  mobile	
  and	
  IoT	
  
DISAPPEARING	
  PERIMETER	
   Decreasingly	
  relevant	
  with	
  “fuzzy”	
  perimeter	
  
RAPID	
  CLOUD	
  ADOPTION	
   Enterprise	
  data	
  and	
  applica5ons	
  moving	
  to	
  cloud	
  
SERVICES	
   Security	
  as	
  a	
  Service;	
  box	
  fa5gue	
  
CYBERSECURITY	
   Governments	
  and	
  regulators	
  playing	
  ever	
  larger	
  role	
  
Copyright	
  ©	
  2015	
  Symantec	
  Corpora6on	
  
3	
  
Security	
  Analy5cs	
  Market|	
  Focus	
  Shi`ing	
  from	
  SIEMs	
  to	
  Analy5cs	
  Plahorms	
  
4	
  
A#acks	
  are	
  
More	
  
Sophis5cated	
  
Breaches	
  and	
  a9acks	
  (external	
  or	
  
insider)	
  are	
  ever	
  more	
  sophis6cated,	
  
polymorphic,	
  and	
  go	
  undetected	
  for	
  
extremely	
  long	
  periods	
  of	
  6me	
  
Tradi5onal	
  
Methods	
  Do	
  
Not	
  Scale	
  
Tradi6onal	
  rules,	
  signatures,	
  
preven6on,	
  access	
  management,	
  
and	
  even	
  more	
  recent	
  sandboxing	
  
approaches	
  are	
  not	
  sufficient	
  
Analyst	
  
Fa5gue	
  is	
  
Rampant	
  
Analysts	
  are	
  suffering	
  from	
  too	
  many	
  
alerts	
  and	
  false	
  posi6ves,	
  and	
  
companies	
  are	
  unable	
  to	
  scale	
  the	
  
skills	
  and	
  personnel	
  needed	
  
Rise	
  of	
  
Security	
  
Analy5cs	
  
Increasingly	
  organiza6ons	
  are	
  
seeking	
  big	
  data,	
  analy6cs,	
  and	
  
machine	
  learning	
  to	
  address	
  
the	
  scale,	
  a9ack	
  sophis6ca6on,	
  
and	
  skill	
  set	
  shortage	
  
C L O U D 	
  
5	
  
What	
  if	
  …	
  
Apply	
  	
  
Context	
  
Correlate	
  	
  
&	
  Priori6ze	
  
•  We	
  could	
  collect	
  info	
  from	
  	
  
every	
  endpoint,	
  network	
  	
  
device,	
  and	
  server	
  
•  We	
  could	
  watch	
  this	
  data	
  	
  looking	
  for	
  
pa9erns	
  and	
  anomalies	
  
•  We	
  could	
  apply	
  knowledge	
  and	
  learning	
  
from	
  across	
  global	
  repositories	
  of	
  
telemetry	
  and	
  intelligence	
  in	
  real-­‐6me	
  
Indicators	
  	
  
of	
  
Breach	
  
Knowledge	
  	
  
about	
  URLs,	
  	
  
file	
  hashes	
  
A9ack	
  	
  
pa9erns	
  &	
  
actors	
  
Correla6on	
  
across	
  	
  
ecosystems	
  
B U S I N E S S 	
  
D E V I C E S 	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora6on	
  
6	
  
Symantec	
  Speaking	
  Sessions	
  	
  
	
  
•  Vendor	
  User	
  Roundtable	
  
•  Title:	
  How	
  Be#er	
  Analy5cs	
  will	
  make	
  you	
  a	
  Security	
  Rock	
  Star	
  
•  Date	
  &	
  Time:	
  Tuesday,	
  June	
  9th	
  -­‐	
  	
  4:15	
  pm	
  –	
  5:00	
  pm	
  in	
  Chesapeake	
  D	
  
•  Show	
  Floor	
  Theater	
  Session	
  
•  Title:	
  Embrace	
  Cloud	
  Security	
  –	
  Protect	
  the	
  Data,	
  Kill	
  the	
  Password	
  
•  Date	
  &	
  Time:	
  Wednesday,	
  June	
  10th	
  -­‐	
  12:45	
  pm	
  -­‐	
  1:10	
  pm	
  in	
  Theater	
  C,	
  Prince	
  George's	
  Hall	
  C	
  
•  CISO	
  Boardroom	
  Sessions	
  
•  Title:	
  The	
  Future	
  State	
  of	
  Adversary	
  Defense	
  and	
  Incident	
  Response	
  
•  Date	
  &	
  Time:	
  Monday,	
  June	
  8th:	
  4:45	
  pm	
  –	
  5:15	
  pm	
  &	
  Wednesday,	
  June	
  10th	
  –	
  9:15	
  am	
  –	
  9:45am	
  in	
  Chesapeake	
  4	
  &	
  5	
  
•  Title:	
  Securing	
  Informa5on	
  Any5me	
  and	
  Everywhere	
  
•  Date	
  &	
  Time:	
  Tuesday,	
  June	
  9th:	
  9:15	
  am	
  –	
  9:45	
  am	
  &	
  Tuesday,	
  June	
  9th	
  –	
  4:15	
  pm	
  –	
  4:45pm	
  in	
  Chesapeake	
  8	
  &	
  9	
  
7	
  
Thank	
  you!	
  
Copyright	
  ©	
  2014	
  Symantec	
  Corpora5on.	
  All	
  rights	
  reserved.	
  Symantec	
  and	
  the	
  Symantec	
  Logo	
  are	
  trademarks	
  or	
  registered	
  trademarks	
  of	
  Symantec	
  Corpora6on	
  or	
  its	
  affiliates	
  in	
  the	
  U.S.	
  and	
  other	
  countries.	
  	
  Other	
  names	
  may	
  be	
  
trademarks	
  of	
  their	
  respec6ve	
  owners.	
  
This	
  document	
  is	
  provided	
  for	
  informa6onal	
  purposes	
  only	
  and	
  is	
  not	
  intended	
  as	
  adver6sing.	
  	
  All	
  warran6es	
  rela6ng	
  to	
  the	
  informa6on	
  in	
  this	
  document,	
  either	
  express	
  or	
  implied,	
  are	
  disclaimed	
  to	
  the	
  maximum	
  extent	
  allowed	
  by	
  law.	
  	
  
The	
  informa6on	
  in	
  this	
  document	
  is	
  subject	
  to	
  change	
  without	
  no6ce.	
  
Symantec	
  Booth	
  #317	
  –	
  Expo	
  Hall	
  

More Related Content

PDF
Norton Mobile Apps Survey Report
PDF
Adjusting Your Security Controls: It’s the New Normal
PDF
INFOGRAPHIC: The Evolution of Data Privacy
PDF
Symantec Intelligence Report: May 2015
PDF
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
PDF
MEF Global Consumer Trust Report
POTX
Federal Information Security - Rob Potter
PPTX
Aligning Today's IT with the Future of Government - Peter Pin
Norton Mobile Apps Survey Report
Adjusting Your Security Controls: It’s the New Normal
INFOGRAPHIC: The Evolution of Data Privacy
Symantec Intelligence Report: May 2015
The Internet Is a Dog-Eat-Dog World, and Your App Is Clad in Milk-Bone Underwear
MEF Global Consumer Trust Report
Federal Information Security - Rob Potter
Aligning Today's IT with the Future of Government - Peter Pin

What's hot (18)

PDF
11 Reasons Why Your Company Could Be In Danger
PPTX
2014 q2q3umeng insight_report_en
PDF
TeleSign Consumer Account Security Report 2015 FINAL
PDF
Security Practices: The Generational Gap | Infographic
PPT
Sameer Mitter |The impact of automation on the workforce
PDF
State of Web Application Security by Ponemon Institute
PDF
Web Application Security Statistics Report 2016
PDF
Digital Generation: Security Infographic
PDF
Unisys Security Insights Infographic: Global
PDF
Not logging on, but living on
PDF
Symantec Intelligence Report
PPTX
Getting users to trust your Mobile Apps and Mobile Web sites
PDF
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
PDF
Verizon DBIR 2021
PDF
CAPP Conference Survey
PDF
Three main pain points from today’s smartphones
PDF
Security Risks of Uneducated Employees
PDF
SVB Cybersecurity Impact on Innovation Report - Overview
11 Reasons Why Your Company Could Be In Danger
2014 q2q3umeng insight_report_en
TeleSign Consumer Account Security Report 2015 FINAL
Security Practices: The Generational Gap | Infographic
Sameer Mitter |The impact of automation on the workforce
State of Web Application Security by Ponemon Institute
Web Application Security Statistics Report 2016
Digital Generation: Security Infographic
Unisys Security Insights Infographic: Global
Not logging on, but living on
Symantec Intelligence Report
Getting users to trust your Mobile Apps and Mobile Web sites
“The Impact of Mobile Devices on Information Security: A Survey of IT and Sec...
Verizon DBIR 2021
CAPP Conference Survey
Three main pain points from today’s smartphones
Security Risks of Uneducated Employees
SVB Cybersecurity Impact on Innovation Report - Overview
Ad

Similar to Better Security Through Big Data Analytics (20)

PPTX
Symantec Portfolio - Sales Play
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PPTX
Symantec investor presentation february 2016 final
PDF
Symantec investor presentation august 2016
PPTX
Cyber Risk Management in 2017 - Challenges & Recommendations
PPTX
Splunk for Security Breakout Session
PDF
Addressing the cyber kill chain
PPT
Symantec_2-4-5 nov 2010
PPTX
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
PPTX
Operationalizing Security Intelligence
PPTX
SplunkLive! - Splunk for Security
PPTX
Symantec investor presentation march 2016
PPTX
Symantec investor presentation march 2016
PDF
CHIME Lead Forum - Seattle 2015
PPTX
11 19-2015 - iasaca membership conference - the state of security
PPTX
Cyber Security in the market place: HP CTO Day
PDF
Atelier Technique SYMANTEC ACSS 2018
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PDF
CIO Digest_July 2013 Issue
PPTX
Top 12 Threats to Enterprise
Symantec Portfolio - Sales Play
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
Symantec investor presentation february 2016 final
Symantec investor presentation august 2016
Cyber Risk Management in 2017 - Challenges & Recommendations
Splunk for Security Breakout Session
Addressing the cyber kill chain
Symantec_2-4-5 nov 2010
Joint Presentation on The State of Cybersecurity ('15-'16) & Third Party Cyb...
Operationalizing Security Intelligence
SplunkLive! - Splunk for Security
Symantec investor presentation march 2016
Symantec investor presentation march 2016
CHIME Lead Forum - Seattle 2015
11 19-2015 - iasaca membership conference - the state of security
Cyber Security in the market place: HP CTO Day
Atelier Technique SYMANTEC ACSS 2018
Cyber Risk Management in 2017: Challenges & Recommendations
CIO Digest_July 2013 Issue
Top 12 Threats to Enterprise
Ad

More from Symantec (20)

PDF
Symantec Enterprise Security Products are now part of Broadcom
PDF
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
PDF
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
PDF
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
PDF
Symantec Webinar | National Cyber Security Awareness Month - Own IT
PDF
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
PDF
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
PDF
Symantec Mobile Security Webinar
PDF
Symantec Webinar Cloud Security Threat Report
PDF
Symantec Cloud Security Threat Report
PDF
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
PDF
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
PDF
Symantec Webinar | Tips for Successful CASB Projects
PDF
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
PDF
Symantec Webinar: GDPR 1 Year On
PDF
Symantec ISTR 24 Webcast 2019
PDF
Symantec Best Practices for Cloud Security: Insights from the Front Lines
PDF
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
PDF
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
PDF
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Enterprise Security Products are now part of Broadcom
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Mobile Security Webinar
Symantec Webinar Cloud Security Threat Report
Symantec Cloud Security Threat Report
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: GDPR 1 Year On
Symantec ISTR 24 Webcast 2019
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Big Data Technologies - Introduction.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Electronic commerce courselecture one. Pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Approach and Philosophy of On baking technology
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
KodekX | Application Modernization Development
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Cloud computing and distributed systems.
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Big Data Technologies - Introduction.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Electronic commerce courselecture one. Pdf
Encapsulation_ Review paper, used for researhc scholars
Approach and Philosophy of On baking technology
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
KodekX | Application Modernization Development
Advanced methodologies resolving dimensionality complications for autism neur...
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
MYSQL Presentation for SQL database connectivity
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Cloud computing and distributed systems.
Building Integrated photovoltaic BIPV_UPV.pdf

Better Security Through Big Data Analytics

  • 1. Be#er  Security  Through  Big  Data  Analy5cs   Jeff  Scheel,  SVP,  Corporate  Development,  Alliances  &  Strategy  -­‐  Symantec   Myrna  Soto,  SVP  &  CISO,  Consumer  Energy  –  Comcast     Amit  Jasuja,  SVP,  Product  Development  -­‐  Symantec    
  • 2. Enterprise  Threat  Landscape     2   Copyright  ©  2015  Symantec  Corpora6on   A#ackers  Moving  Faster     Digital  extor5on     on  the  rise   Malware  gets   smarter   Zero-­‐Day  Threats   Many  Sectors  Under  A#ack   5  of  6  large   companies   a9acked   317M  new   malware   created   1M  new   threats   daily   60%  of   a9acks   targeted  SMEs   113%   increase  in   ransomware   45X  more   devices   held   hostage     28%  of  malware   was  Virtual   Machine  Aware   24     all-­‐6me   high   Top  5   unpatched   for  295  days   24     Healthcare     +  37%     Retail   +11%     Educa6on   +10%   Government   +8%   Financial   +6%   Source:  Symantec  Internet  Security  Threat  Report  2015  
  • 3. Key  Trends  Reshaping  the  Enterprise  Security  Market   RESURGENCE  OF  ENDPOINT   Rapid  shi`  to  mobile  and  IoT   DISAPPEARING  PERIMETER   Decreasingly  relevant  with  “fuzzy”  perimeter   RAPID  CLOUD  ADOPTION   Enterprise  data  and  applica5ons  moving  to  cloud   SERVICES   Security  as  a  Service;  box  fa5gue   CYBERSECURITY   Governments  and  regulators  playing  ever  larger  role   Copyright  ©  2015  Symantec  Corpora6on   3  
  • 4. Security  Analy5cs  Market|  Focus  Shi`ing  from  SIEMs  to  Analy5cs  Plahorms   4   A#acks  are   More   Sophis5cated   Breaches  and  a9acks  (external  or   insider)  are  ever  more  sophis6cated,   polymorphic,  and  go  undetected  for   extremely  long  periods  of  6me   Tradi5onal   Methods  Do   Not  Scale   Tradi6onal  rules,  signatures,   preven6on,  access  management,   and  even  more  recent  sandboxing   approaches  are  not  sufficient   Analyst   Fa5gue  is   Rampant   Analysts  are  suffering  from  too  many   alerts  and  false  posi6ves,  and   companies  are  unable  to  scale  the   skills  and  personnel  needed   Rise  of   Security   Analy5cs   Increasingly  organiza6ons  are   seeking  big  data,  analy6cs,  and   machine  learning  to  address   the  scale,  a9ack  sophis6ca6on,   and  skill  set  shortage  
  • 5. C L O U D   5   What  if  …   Apply     Context   Correlate     &  Priori6ze   •  We  could  collect  info  from     every  endpoint,  network     device,  and  server   •  We  could  watch  this  data    looking  for   pa9erns  and  anomalies   •  We  could  apply  knowledge  and  learning   from  across  global  repositories  of   telemetry  and  intelligence  in  real-­‐6me   Indicators     of   Breach   Knowledge     about  URLs,     file  hashes   A9ack     pa9erns  &   actors   Correla6on   across     ecosystems   B U S I N E S S   D E V I C E S  
  • 6. Copyright  ©  2014  Symantec  Corpora6on   6  
  • 7. Symantec  Speaking  Sessions       •  Vendor  User  Roundtable   •  Title:  How  Be#er  Analy5cs  will  make  you  a  Security  Rock  Star   •  Date  &  Time:  Tuesday,  June  9th  -­‐    4:15  pm  –  5:00  pm  in  Chesapeake  D   •  Show  Floor  Theater  Session   •  Title:  Embrace  Cloud  Security  –  Protect  the  Data,  Kill  the  Password   •  Date  &  Time:  Wednesday,  June  10th  -­‐  12:45  pm  -­‐  1:10  pm  in  Theater  C,  Prince  George's  Hall  C   •  CISO  Boardroom  Sessions   •  Title:  The  Future  State  of  Adversary  Defense  and  Incident  Response   •  Date  &  Time:  Monday,  June  8th:  4:45  pm  –  5:15  pm  &  Wednesday,  June  10th  –  9:15  am  –  9:45am  in  Chesapeake  4  &  5   •  Title:  Securing  Informa5on  Any5me  and  Everywhere   •  Date  &  Time:  Tuesday,  June  9th:  9:15  am  –  9:45  am  &  Tuesday,  June  9th  –  4:15  pm  –  4:45pm  in  Chesapeake  8  &  9   7  
  • 8. Thank  you!   Copyright  ©  2014  Symantec  Corpora5on.  All  rights  reserved.  Symantec  and  the  Symantec  Logo  are  trademarks  or  registered  trademarks  of  Symantec  Corpora6on  or  its  affiliates  in  the  U.S.  and  other  countries.    Other  names  may  be   trademarks  of  their  respec6ve  owners.   This  document  is  provided  for  informa6onal  purposes  only  and  is  not  intended  as  adver6sing.    All  warran6es  rela6ng  to  the  informa6on  in  this  document,  either  express  or  implied,  are  disclaimed  to  the  maximum  extent  allowed  by  law.     The  informa6on  in  this  document  is  subject  to  change  without  no6ce.   Symantec  Booth  #317  –  Expo  Hall