SlideShare a Scribd company logo
TK Keanini, Principal Engineer & Product Line CTO for Security Analytics
Security Business Unit, Advanced Threat Group – Cisco Systems
SxSW 2017 – W20 Group
Battle stories from the Earth’s network
Not so quiet on the Internet
Front
TK: The past 52 years in a nutshell
Hello My Name is TK Keanini
Keanini (Pronounced Kay-Ah-Nee-Nee)
250+
Full Time Threat
Intel Researchers
MILLIONS
Of Telemetry
Agents
4
Global Data
Centers
1100+
Threat Traps
100+
Threat Intelligence
Partners
THREAT INTEL
1.5 MILLION
Daily Malware
Samples
600 BILLION
Daily Email
Messages
16 BILLION
Daily Web
Requests
Honeypots
Open Source
Communities
Vulnerability
Discovery (Internal)
Product
Telemetry
Internet-Wide
Scanning
20 BILLION
Threats Blocked
INTEL SHARING
TALOS INTEL BREAKDOWN
Customer Data
Sharing
Programs
Provider
Coordination
Program
Open
Source
Intel
Sharing
3rd Party Programs
(MAPP)
Industry
Sharing
Partnerships
(ISACs)
500+
Participants
You and your business sit
supply-side to the cybercrime
market
Cybercrime is [unfortunately] profitable
Breaches Markets
Dark Market
Consumers
From a one
man operation
to a complex
supply chain
Spammers
Infrastructure
Malware
Exploit Kits
Ransomware
Crypto
Currency
Botnets
Tk Keanini, Cisco Systems: Not So Quiet on the Internet Front
Tk Keanini, Cisco Systems: Not So Quiet on the Internet Front
How can you
make it more
expensive for
cyber
criminals to
operate?
Password Strategy
Pick something that you will use
When offered, use two factor authentication
https://twofactorauth.org/
Easy backup solutions
If it is not easy to use, you are not going to be effective
The yearly subscriptions to these
online services are less than a
single ransomware payment!!!
Visibility Tools
Question 01: How much visibility do you have on your digital business?
Question 02: Assume someone in your company has had their account
compromised, how would you know?
Question 03: When a breach happens, what data will function as your
digital business ‘general ledger’?
• tkeanini1@cisco.com
• Follow me on Twitter @tkeanini
• Personal Blog: tkonsecurity.com
• LinkedIn: www.linkedin.com/in/tkkeaninipub/
Contact Info
THANK
YOU
Tk Keanini, Cisco Systems: Not So Quiet on the Internet Front

More Related Content

PDF
Trend Micro 10 Minute Overview
PDF
Four Network Security Challenges for the Cloud Generation
PDF
Trend Micro Solutions Overview
PDF
The Riskiest Industries in the Cloud
PDF
Cyber Security and Cloud Security
PPTX
Software Security For DevOps And Continuous Deployment In The Cloud
PPTX
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
PDF
The 1% Who Can Take Down your Organization
Trend Micro 10 Minute Overview
Four Network Security Challenges for the Cloud Generation
Trend Micro Solutions Overview
The Riskiest Industries in the Cloud
Cyber Security and Cloud Security
Software Security For DevOps And Continuous Deployment In The Cloud
Open Source Insight: Top Picks for Black Hat, GDPR & Open Source Webinar, ...
The 1% Who Can Take Down your Organization

What's hot (19)

PDF
How Datacenter Threats are Evolving Infographic
PDF
McAfee's Commitment to Innovation - Chris Young
PPTX
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
PDF
Palo Alto Networks 2016 Cybersecurity Predictions
PDF
The Enemy Within IoT - A Mirai DDoS Timeline
PPTX
Open Source Software Security
PDF
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
DOCX
Cyber security research proposal
PPTX
The Mian cyber attack Groups in China (Chinese episonage)
PDF
Сергей Лёвкин «Технологии Microsoft для актуальных трендов»
PDF
The application security controller
PDF
Bridgera enterprise IoT Software Solutions
PPTX
The Future of Cybersecurity and You
PPTX
Cybersecurity threats you should know about in 2018
PPTX
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
PDF
June 2016 Worldwide Netskope Cloud Report
PPTX
Cloud Networking Services
PDF
Analytics Cybersecurity Predictions 2016
How Datacenter Threats are Evolving Infographic
McAfee's Commitment to Innovation - Chris Young
Open Source Insight: NotPetya Strikes, Patching Is Vital for Risk Management
Palo Alto Networks 2016 Cybersecurity Predictions
The Enemy Within IoT - A Mirai DDoS Timeline
Open Source Software Security
Cyberterrorism: The Security of Critical Infrastructure and Public Places in ...
Cyber security research proposal
The Mian cyber attack Groups in China (Chinese episonage)
Сергей Лёвкин «Технологии Microsoft для актуальных трендов»
The application security controller
Bridgera enterprise IoT Software Solutions
The Future of Cybersecurity and You
Cybersecurity threats you should know about in 2018
Open Source Insight: Heartbleed Results in £100,000 fine, WannaCry Hits Japan...
June 2016 Worldwide Netskope Cloud Report
Cloud Networking Services
Analytics Cybersecurity Predictions 2016
Ad

Viewers also liked (15)

PPTX
Bryan Kramer, Pure Matter: Breaking Through the Human Firewall
PPTX
Bob Pearson, W2O Group: Moneyball Part II
PPTX
Brian Solis, Altimeter Group: The Experience When Business Meets Design
PPTX
Robert Hastings, Bell Helicopter: Lead Like a Warrior
PPTX
Rohit Bhargava, Influential Marketing Group: How To (Actually) Predict the Fu...
PPTX
Francesca DeMartino, Medtronic: Adding Patient Value Through Partnerships
PPTX
Jim Larrison, Dynamic Signal: Building Trust with Authentic Workplace Communi...
PPTX
Mary Ellen Dugan, WP Engine: Elevating Diversity Through Marketing
PPTX
Jeremiah Owyang, Crowd Companies: The Corporate Innovation Imperative
PPTX
Ellen Jackowski, HP Sustainability: Innovation in the Harshest Conditions in ...
PPTX
Innovations in Healthcare - US Chamber of Commerce
PPTX
Dr. Asif Qasim (MedShr): The Future of Medicine: How Physicians Choose to Learn
PPTX
Stephen Roop, Freight Shuttle International: Autonomous Freight: Bringing the...
PPTX
Michael Plante, Inside Sales: The AI Revolution
PDF
Common Sense for the C-Suite: Relevance is the New Reputation
Bryan Kramer, Pure Matter: Breaking Through the Human Firewall
Bob Pearson, W2O Group: Moneyball Part II
Brian Solis, Altimeter Group: The Experience When Business Meets Design
Robert Hastings, Bell Helicopter: Lead Like a Warrior
Rohit Bhargava, Influential Marketing Group: How To (Actually) Predict the Fu...
Francesca DeMartino, Medtronic: Adding Patient Value Through Partnerships
Jim Larrison, Dynamic Signal: Building Trust with Authentic Workplace Communi...
Mary Ellen Dugan, WP Engine: Elevating Diversity Through Marketing
Jeremiah Owyang, Crowd Companies: The Corporate Innovation Imperative
Ellen Jackowski, HP Sustainability: Innovation in the Harshest Conditions in ...
Innovations in Healthcare - US Chamber of Commerce
Dr. Asif Qasim (MedShr): The Future of Medicine: How Physicians Choose to Learn
Stephen Roop, Freight Shuttle International: Autonomous Freight: Bringing the...
Michael Plante, Inside Sales: The AI Revolution
Common Sense for the C-Suite: Relevance is the New Reputation
Ad

Similar to Tk Keanini, Cisco Systems: Not So Quiet on the Internet Front (20)

PPTX
Retail Excellence Ireland - Cyber Threats 2015 Overview
PPTX
Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology ba...
PDF
BSI Mikrotik Security Presentation PdfCo
PPTX
CRI Retail Cyber Threats
PPTX
Implementing security for your library | PLAN Tech Day Conference
PPTX
Lenovo Presentation for Sys Logic Lunch and Learn
PDF
India's Leading Cyber Security Company2022.pdf
PPTX
It security the condensed version
PDF
Cyber Resilience
PDF
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
PPTX
Cyber security
PPTX
Cyber Threat Overview for Euro IT counsel
PPTX
CRI "Lessons From The Front Lines" March 26th Dublin
PDF
MikroTik Security
PPTX
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
PDF
Cyber security as a strategic imperative web
PPTX
Cyber Security
PDF
Refugees on Rails Berlin - #2 Tech Talk on Security
PPTX
Data security brian honan
PPTX
Internet Security is an Oxymoron
Retail Excellence Ireland - Cyber Threats 2015 Overview
Tim Holman, Director, 2-Sec - Cyber security, putting liberated technology ba...
BSI Mikrotik Security Presentation PdfCo
CRI Retail Cyber Threats
Implementing security for your library | PLAN Tech Day Conference
Lenovo Presentation for Sys Logic Lunch and Learn
India's Leading Cyber Security Company2022.pdf
It security the condensed version
Cyber Resilience
nullcon 2011 - Cyber crime 101: Cost of cyber crime, trends and analysis
Cyber security
Cyber Threat Overview for Euro IT counsel
CRI "Lessons From The Front Lines" March 26th Dublin
MikroTik Security
Smart Defense: Strategic Approach to fight contemporary Security, Privacy & A...
Cyber security as a strategic imperative web
Cyber Security
Refugees on Rails Berlin - #2 Tech Talk on Security
Data security brian honan
Internet Security is an Oxymoron

More from W2O Group (16)

PPTX
The 7 Characteristics of Highly Effective Entrepreneurial Employees
PPTX
Understanding Physician/ Patient Conversations Online
PPTX
Innovations in Healthcare - US Chamber of Commerce
PPTX
W2O Group GeekATea: Storytizing and Audience Architecture
PPTX
Social Desirability Effects in Market Research Effectiveness
PDF
Online Conversations: From Understanding to Action and Success
PPTX
Network scoring for 2015 healthcare conferences
PDF
Common Sense for the C-Suite
PPTX
Digital Media Trends: Audience Architecture
PPTX
Twitter Removes 140-Character Limit for Direct Messages
PDF
Using Facebook 'Live' to Activate Influencers
PPTX
How to Chose the Right Social Media Partners
PDF
The evolution of online cancer conversations
PDF
The 2015 MDigitalLIfe Social Oncology Project Report
PDF
W2O HIMSS 2015 Social Conversation Report
PDF
A look at SxSW Health 2015 through the eyes of the online health ecosystem
The 7 Characteristics of Highly Effective Entrepreneurial Employees
Understanding Physician/ Patient Conversations Online
Innovations in Healthcare - US Chamber of Commerce
W2O Group GeekATea: Storytizing and Audience Architecture
Social Desirability Effects in Market Research Effectiveness
Online Conversations: From Understanding to Action and Success
Network scoring for 2015 healthcare conferences
Common Sense for the C-Suite
Digital Media Trends: Audience Architecture
Twitter Removes 140-Character Limit for Direct Messages
Using Facebook 'Live' to Activate Influencers
How to Chose the Right Social Media Partners
The evolution of online cancer conversations
The 2015 MDigitalLIfe Social Oncology Project Report
W2O HIMSS 2015 Social Conversation Report
A look at SxSW Health 2015 through the eyes of the online health ecosystem

Recently uploaded (20)

PDF
MARG’s Door & Window Hardware Catalogue | Trending Branding Digital Solutions
PDF
Fly Emirates SEO case study by Rakesh pathak.pdf
PDF
AFCAT Syllabus 2026 Guide by Best Defence Academy in Lucknow.pdf
PDF
Unit 1 -2 THE 4 As of RURAL MARKETING MIX.pdf
PDF
Prove and Prioritize Profitability in Every Marketing Campaign - Zach Sherrod...
DOCX
marketing plan starville............docx
DOCX
Parkville marketing plan .......MR.docx
PDF
AI & Automation: The Future of Marketing or the End of Creativity - Matthew W...
PPTX
Best Digital marketing service provider in Chandigarh.pptx
PDF
Modernizing IT for the age of AI - Jason Aloia, Freshworks
PDF
Proven AI Visibility: From SEO Strategy To GEO Tactics
PDF
UNIT 1 -4 Profile of Rural Consumers (1).pdf
PDF
EVOLUTION OF RURAL MARKETING IN INDIAN CIVILIZATION
PPTX
Final Project parkville.............pptx
DOCX
AL-ahly Sabbour un official strategic plan.docx
PDF
Mastering Content Strategy in 2025 ss.pdf
PDF
Building a strong social media presence.
PDF
Ramjilal Ramsaroop || Trending Branding
PDF
Coleção Nature .
PPTX
Kimberly Crossland Storytelling Marketing Class 5stars.pptx
MARG’s Door & Window Hardware Catalogue | Trending Branding Digital Solutions
Fly Emirates SEO case study by Rakesh pathak.pdf
AFCAT Syllabus 2026 Guide by Best Defence Academy in Lucknow.pdf
Unit 1 -2 THE 4 As of RURAL MARKETING MIX.pdf
Prove and Prioritize Profitability in Every Marketing Campaign - Zach Sherrod...
marketing plan starville............docx
Parkville marketing plan .......MR.docx
AI & Automation: The Future of Marketing or the End of Creativity - Matthew W...
Best Digital marketing service provider in Chandigarh.pptx
Modernizing IT for the age of AI - Jason Aloia, Freshworks
Proven AI Visibility: From SEO Strategy To GEO Tactics
UNIT 1 -4 Profile of Rural Consumers (1).pdf
EVOLUTION OF RURAL MARKETING IN INDIAN CIVILIZATION
Final Project parkville.............pptx
AL-ahly Sabbour un official strategic plan.docx
Mastering Content Strategy in 2025 ss.pdf
Building a strong social media presence.
Ramjilal Ramsaroop || Trending Branding
Coleção Nature .
Kimberly Crossland Storytelling Marketing Class 5stars.pptx

Tk Keanini, Cisco Systems: Not So Quiet on the Internet Front

  • 1. TK Keanini, Principal Engineer & Product Line CTO for Security Analytics Security Business Unit, Advanced Threat Group – Cisco Systems SxSW 2017 – W20 Group Battle stories from the Earth’s network Not so quiet on the Internet Front
  • 2. TK: The past 52 years in a nutshell Hello My Name is TK Keanini Keanini (Pronounced Kay-Ah-Nee-Nee)
  • 3. 250+ Full Time Threat Intel Researchers MILLIONS Of Telemetry Agents 4 Global Data Centers 1100+ Threat Traps 100+ Threat Intelligence Partners THREAT INTEL 1.5 MILLION Daily Malware Samples 600 BILLION Daily Email Messages 16 BILLION Daily Web Requests Honeypots Open Source Communities Vulnerability Discovery (Internal) Product Telemetry Internet-Wide Scanning 20 BILLION Threats Blocked INTEL SHARING TALOS INTEL BREAKDOWN Customer Data Sharing Programs Provider Coordination Program Open Source Intel Sharing 3rd Party Programs (MAPP) Industry Sharing Partnerships (ISACs) 500+ Participants
  • 4. You and your business sit supply-side to the cybercrime market Cybercrime is [unfortunately] profitable Breaches Markets Dark Market Consumers
  • 5. From a one man operation to a complex supply chain Spammers Infrastructure Malware Exploit Kits Ransomware Crypto Currency Botnets
  • 8. How can you make it more expensive for cyber criminals to operate?
  • 9. Password Strategy Pick something that you will use When offered, use two factor authentication https://twofactorauth.org/
  • 10. Easy backup solutions If it is not easy to use, you are not going to be effective The yearly subscriptions to these online services are less than a single ransomware payment!!!
  • 11. Visibility Tools Question 01: How much visibility do you have on your digital business? Question 02: Assume someone in your company has had their account compromised, how would you know? Question 03: When a breach happens, what data will function as your digital business ‘general ledger’?
  • 12. • tkeanini1@cisco.com • Follow me on Twitter @tkeanini • Personal Blog: tkonsecurity.com • LinkedIn: www.linkedin.com/in/tkkeaninipub/ Contact Info THANK YOU

Editor's Notes

  • #3: Keanini (Pronouned Kay-Ah-Nee-Nee) Musician Video Game Development (Broderbund) Cisco Morgan Stanley nCircle
  • #4: 2.5 m blocks a sec if you count email
  • #7: Able to Quantify Money Being made First reliable Estimate Actor responsible for ~50% Angler Activity Requests from 90K IP’s in Single Day Estimated $30 Million Annually Calculation Details 9000 Users Served Exploits 40% Compromised (3600) 62% of Payloads are Ransomware Average Ransom = $300 Percentage Users Paying = 2.9% Data for Entire Month Monthly Revenue ~$3.4 Million USD
  • #8: Able to Quantify Money Being made First reliable Estimate Actor responsible for ~50% Angler Activity Requests from 90K IP’s in Single Day Estimated $30 Million Annually Calculation Details 9000 Users Served Exploits 40% Compromised (3600) 62% of Payloads are Ransomware Average Ransom = $300 Percentage Users Paying = 2.9% Data for Entire Month Monthly Revenue ~$3.4 Million USD