SlideShare a Scribd company logo
1 of 40
TIG Enabled Infocyte HUNT™
The Proactive Security Platform
Defense alone doesn’t win games.
• Security industry focused on prevention and real-time detect
• Customer environments built with ever increasing complexity
and layers of defenses
• Threat landscape is progressing rapidly with more resources
than ever
• Even with great defense, best result is tie. Common result is
other team scores and you lose.
• Don’t settle for a tie and don’t wait to lose
Proactive Security is the Answer
• Proactive security identify and resolve threats and vulnerabilities
before they impact your environment
• Optimize security intelligence and cut across the silos (network,
endpoint, identity, cloud, application…)
• Leverage existing tools and augment with no disruption
• Automate complex security tasks
– Experienced security staff can scale; less experienced staff can
provide higher value with our integrations
– Backstop your team with detection & response experts
• Ensure compliance and mitigate risks on an ongoing basis
Proactive Security Advisories
•Source: IDC IR Marketscape, Gartner MDR Market Guide, NIST Adisory
Gartner:
IDC:
NIST:
“IT security and risk management leaders .. should use MDR services to
expand their investments beyond preventative security technologies to
address their detection, response and 24/7 monitoring gaps”
"Enterprises should make proactive incident readiness, response, and
resiliency a priority”
"Customers should conduct periodic risk assessments of systems and
applications determine threats and vulnerabilities ensuring monitoring
and response capabilities are in place”
What Infocyte does
Infocyte HUNT fills the gap between prevention and incident response
improving your Security Operations
• Independent: Infocyte HUNT gathers forensic data from hosts and
enriches it to deliver evidence vs alerts
• Efficient: The process is automated, agentless, cloud-based and simple
• Effective: Provide security insights that are easily consumed and
actionable
Infocyte HUNT proactively assesses your security state & posture, closing
gaps in your defense while driving compliance
Q2 Real World Network Findings
What We Inspected
● 582K Systems
● 100s of Customers
● 1000s of Network Segments
● 50% IR & 50% Proactive
● 12.4 M Artifacts
● 45K fileless code injects
● 339K User Accounts
● 161K Applications
System Findings Summary
● 5% advanced or multi-stage attack
● 22% encountered some element of
Ransomware in their lifetime with 43
days avg dwell time
● 72% have unwanted or Riskware
(800+ day average Dwell Time)
Threat Findings Summary
● 1% undetectable but suspicious and
found by analysts
● 4.6% Unknown to community / Intel,
but found by Infocyte Incyte ML
platform
● 32% Known bad but still able to
persist (Ryuk, Emotet, Fuery,
MereTam, Sality….)
● 63% Riskware including (risky admin
tools, Adware, Keyloggers)
Source: Infocyte Q2 Threat Report
Infocyte Spans the Lifecycle
Exploitation Installation Command & Control Lateral Movement Exfiltration Persist
Attack Post Compromise Response
Attack In Progress Attacker Dwell Time Recovery
NETWORK
BREACHED
INCIDENT
DISCOVERED
Reconnaissance
(actors living within the network)(actors identify
path in)
Mean Time to Detect
197 days
Mean Time to Respond
69 days
Hardening
Mean Time to Compromise
Minutes
Pre - Attack
Mean Time to Patch
12 weeks
(actors exploit
gaps)
Source: VDBR and Ponemon
Infocyte HUNT™
SaaS Threat Detection & Incident Response Platform Overview
Complete API – Clean & Efficient UI
Command
Premium Hunt & IR Support
IncyteTM Threat Intel
and Synapse ML
Agentless Agent-based
✓ Command Services leverage experts to alert you on top risks
or threats and recommends response actions
✓ Respond Faster - Automate forensics, timelining, and artifact
analysis to validate & scope incidents then take action.
✓ Identify Issues that matter - AI analytic and Threat Intel
provide context on threats and vulnerabilities
✓ Independent Inspection – forensic-based inspection, triage
and assessment across all your assets
✓ Easy deployment from the cloud via API, controller, or light
agent
Confidential
KPI DashboardActionable Insights
Exposures: Identity
& Vulnerability Activity Trace™
Agents
Infocyte Cloud
Architecture
HUNT™
Console
customer1.Infocyte.com
Controller Endpoints
/ Servers
Endpoints
/ Servers
Agentless
Security Operations
Center (SOC)
Adv. Hunt & IR
Augmentation
for “Command”- level
subscribers and partners
INCYTE
Threat Intel & Analytics
API
MSSP / SOC
AWS / Azure / GCP
Cloud Plugins
API & UI
Infocyte HUNT Agents can be installed on
unmanaged endpoints -- on-prem, in the
cloud, or at a coffee shop.
Cloud Plugins enable agentless
workload visibility and
interaction via IaaS API
Infocyte HUNT Controller discovers
endpoints and initiates scans
(deployed inside the firewall / network)
serverless* ∙ container* ∙ virtual machines ∙ datacenter ∙ headquarters ∙ retail/POS ∙ branch office ∙ mobile workforce (laptops)
Cloud Hybrid
Infocyte HUNT enables Managed Detection and Response (MDR) services across the entire ecosystem
Physical Workstations MobileVirtualized
Time to Detect +
Time to Respond
= Dwell Time
• Cost - $58k per day
• Average - 191 days globally (131 in US) in 2018
How are your Security Operations Performing?
• Infocyte accurately measures and helps reduce these metrics
• Measure performance and improvement of security operations
• Convey business impact – value of security operations
– KPI improvements = Downtime avoided and response costs reduced
– Businesses have up to 97% reduction in breach costs if contained within 1 day
Key KPIs
Outcomes with Infocyte
1. Become more proactive with discovering assets,
vulnerabilities and characterizing threats and risks
in your environment with proper context
3. Achieve compliance with unprecedented visibility
and reporting into network and application assets,
network hygiene, and auditing the effectiveness of
security controls.
2. Respond faster with automated incident response
triage, scoping, and patient-zero identification
Reports
Infocyte as a Platform
- Long Term Vision for Infocyte is as a comprehensive platform for
identifying, assessing and responding to risks and threats across your
organization
- Independent Risk and Threat Discovery → Reducing Risk and MTTD
- Application and OS Vulnerabilities (more focused than VA vendors)
- Broader Environmental Vulnerabilities (identity entitlements, etc.)
- Incident Response → Integrated into workflows to reduce MTTR
- Constantly Expanding Coverage: Cloud workloads, identity, OSX...
In Closing
• Shift your mindset and posture to Proactive Security
– play offense, don’t wait to lose
– Extend your existing security investments
– add forensic data to enable better incident response
– Enable your resources to be more efficient and effective
• Infocyte is the Easy Button
– Affordable: starts at $2/node / month
– Easy: fully managed, no business disruption
– Fast: evaluate in your environment, get results in hours
Leveraging as a Pre-Sales tool for Check Point
(Especially Sandblast Agent)
www.infocyte.com
The Leader in Proactive Security
www.infocyte.com
How is it deployed?
• New cloud instance is created in console
• Controller (agentless) or agents deployed in environment
– and are discovered and enabled in console
• Service group and query are configured in console
– Service account is defined and configured
– Environment is enumerated
• Scan is initiated and forensic data is analyzed by Incyte
• Enriched forensic data is presented in console or report
Time start to finish for 100 hosts = <120 min
Detection: Response begins when you detect malicious or suspicious activity via real-time
monitoring, proactive hunting, external reports, etc.
1. Triage Determine scope of breach, gather
information for quick decision making
Infocyte automates full forensic
triage
2. Containment Initial response actions to mitigate active
threat
Automates ticketing workflows &
recommendations
3. Investigation Analyze evidence and determine root
cause
Activity Trace and automated
timelines makes this easy
4. Certification Verify control and clean state of network Infocyte enables and automates
this step.
5. Learning Implement new controls based on
lessons learned
Accurate RCA leads to better
decisions
Incident Response Steps
Infocyte Security Integrations Ecosystem
SYSLOG Alerting
Common Event Format (CEF)
SIEM Orchestration Intel
Infocyte Case Study
HUNT Command: Case Study
• Government network with
sensitive data (including PII & Court
Records).
• Customer started with core
protection tools but little hunting
or IR expertise
• First 3 months identified, resolved
and addressed root cause of over
80 threats or risky applications
• Organization now demonstrates
higher IR readiness and network
hygiene with significantly lower
mean time to respond
Month 1
Month 2
Month 3
Month 4
Command Sample Monthly Summary
RECOVE
R
Recovery Planning
and Improvements
(RC.RP +IM)
RESPON
D
Analysis including
Root Cause
(RS.AN)
Mitigation, Contained
and Validated
(assist)
(RS.MI)
DETECT
Host Anomalies and
Events
(DE.RA)
Continuous
Monitoring of Hosts
(DE.CM)
Detection Processes
in Place
(DE.DP)
PROTECTIDENTIFY
Asset Discovery
(ID.AM)
Asset Vulnerabilities
Discovered
(ID.RA)
Infocyte 8 Core NIST Capabilities
HUNT Command: Infocyte 8 Critical Controls for Risk
Management and IR Readiness
NIST Category Critical Control My Score (0-5)
Identify Do I know all of my networked assets and where they are?
Identify What applications are installed in my network? Which are
vulnerable?
Detect Are protection and detection platforms deployed and
working properly?
Detect Do I have visibility on attacks that get through my security
controls?
Detect Can I characterize these risks when found?
Respond Am I able to reach ALL endpoints in the event of an
incident?
Respond How quickly can I triage, complete RCA and scope an
attack to contain and remediate?
Recover Once fixed, can I validate the network is clean and no
other backdoors remain?
Use Cases:
Threat Detection
Managed Detection
• Proactively discover threats in your
network
– Forensically validate your security controls
have not been bypassed
Targeted Hunting (Analytics + Infocyte)
• Compliment security data (e.g. EDR, IDS,
Firewall) analytics
• Use Infocyte to investigate and confirm
leads by inspecting suspicious systems
• An automated solution to forensically triage
alerts from your SIEM, network or endpoint
security solutions
– Collects & analyzes targeted forensic triage data.
– Reduces the time and resources needed to
manually comb through volumes of false and
low priority data.
– Allows your security team to focus on
remediating real threats.
Incident Response (Forensic Triage)
When combined with the visibility and
orchestration provided by ForeScout
CounterACT,
Infocyte HUNT equips enterprises with
the ability to forensically evaluate the
state of an endpoint and create a
network compliance policy that ensures
that no compromised system enters the
network.
HOW IT WORKS
• CounterACT discovers and classifies an
endpoint as soon as it enters the network.
• If the endpoint has not been recently
inspected, CounterACT will initiate a hunt
with Infocyte.
• Endpoints that are found to be
compromised are out of compliance.
• Non-compliant endpoints can be
quarantined from the network or subject to
any other CounterACT enforcement action.
Network Access Control
Endpoints
3. Infocyte
verifies endpoint
state
1
2
3
4
2. ForeScout
Requests
Hunt
4. Infocyte
returns findings
to ForeScout
5
CounterACT™
HUNT™
Use Cases:
Partners (MSSPs & Service Providers)
Compromise Assessments
A proactive hunt across systems to detect threats that may
have evaded existing security controls
“Is this network clean or compromised?
• Effective at detecting presence of malware, remote access tools,
and other indications of unauthorized access
• Fast – Started in minutes, assess thousands of hosts an hour
• Affordable – A typical organization should be able to conduct it
proactively and regularly (i.e. quarterly/annually)
• Independent – The assessment does not rely on existing
detection solutions already in the environment
Infocyte is the only product optimized for compromise assessments and
trusted by teams like PwC, Specter Ops, Check Point, and many others.
APPLICATIONS
• Periodic Threat Hunting
• Incident Response
• Mergers & Acquisitions
• Third Party & Vendor Risk Management
• Security Program Validation / Audit
• Collects and analyzes initial forensic triage
data to determine scope of incident and
collect samples.
– Collects & analyzes targeted forensic triage data.
– Instantly recover in-memory inject samples
(unmapped from memory) for offline analysis
– Most flexible endpoint access options:
• Agentless (scan hosts within network from single entry
point)
– Server-side or Client-side Encryption of network credentials
• Agent (interact directly with host)
• Offline Scan (manual offline survey and upload results) Endpoints
Agentless: Target Network
Workstation or Server
becomes pivot system to scan
other systems within firewall
HUNT™
Agent: End-customer
installs agent to give direct
access to a hosts
Incident Response
cust2.infocyte.com cust3.infocyte.com
Service Delivery Models
MSSP1.Infocyte.com
- 100% Managed Customers
- Single Instance | Multiple Customers
- Customers should not access UI
cust1.infocyte.com
Customer 7
Customer 1
Customer 5 Customer 6
Customer 4Customer 3
Customer 2
cust5.infocyte.com
Customer 9
cust4.infocyte.com
Customer 8
Managed Co-Managed Private
MSSP or Partner manages a set of customers
in a single HUNT instance.
SOC / MSSP
- Co-Managed Instances
- Both end customer and SOC can
access individual customer
instance UI
- Individual private Instances
- GDPR & highly regulated
environments
Technical Appendix
Current State of Security
- Environmental Vulnerabilities continue to increase
- Increases in cloud and mobility have eroded the perimeter and increased the
attack surface
- Threat Landscape continues to get more sophisticated and have greater resources
- They will encrypt, destroy or exfiltrate your sensitive data
- 64% of businesses experienced major security incident last year
- Cyber attack ‘dwell time’ is 191 days in 2018
- Cost of breach is $400 to $700/endpoint or $3.5M
No Protection is 100%: Breaches happen.
- Proactive Security recognized as largest drivers to reduce breach exposure and
cost
Sources: Gartner, NIST, CVE Database, Ponemon 2018 state of endpoint security, Dark Reading, Infocyte Analysis
Cloud Security – What is collected?
• Endpoint forensic triage data is collected from
each host which includes:
– Process, executable, scripts, apps, and connection
metadata (hashes, IPs, digital signatures, etc.)
– Associated User Account metadata
– The results of volatile memory analysis -- small
segments of executable memory identified as
malicious
• Except in rare circumstances, executable-marked memory
regions do not contain PII or other sensitive data. Data-
marked regions of memory are excluded from collection.
• All raw data collected is available to users
through the interface and API integrations. Users
retain control over reducing the scope of
collected data in the interface as well.
Cloud Security – How is it protected?
Each instance of Infocyte HUNT has its’ own unique database that stores
customer-specific data. All access is constrained to those who have been
given explicit access to that instance.
Infocyte HUNT Command-level subscribers grant an analysis-level access to
the Infocyte SOC. All other customers have administrative access through an
Infocyte account which is used for maintenance, support, and password
resets.
Security Features:
• All infrastructure on Infocyte’s AWS Virtual Private Cloud (VPC) within US or
UK datacenters
• All employees and contractors with access to infrastructure are rigorously
vetted and utilize principles of least privilege
• Data Encrypted in transit (SSL) and at rest
• Regular Penetration Tests to identify and patch vulnerabilities
• Multi-Factor User Authentication (Coming Dec 2019)
• Audit (Activity) Logs monitored 24/7
Authentication
Infocyte HUNT authentication is
protected with the strongest industry-
accepted encryption and authentication
standards. Going above industry-
standard, we do not use cookies to
store session tokens in browsers.
Credential Manager
For Agentless collection, service
accounts and SSH keys may be utilized.
These credentials are encrypted and
stored within Infocyte’s credential
manager.
Options exist for both server-side keys
(provided by Infocyte) and client-side
keys (generated stored on-prem)
ROI of Proactive Detection and Response
Security Mindset:
• Reactive: Wait for Alert 🡪 Investigate
• Proactive: Find issues 🡪 Detect and
Resolve
Reports
TIG / Infocyte: Proactive Cybersecurity for State and Local Government

More Related Content

What's hot

Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseInfocyte
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmAlienVault
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementMayur Nanotkar
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the CloudNetStandard
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapEric Johansen, CISSP
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTLee Wei Yeong
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud projectPetteri Heino
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...RootedCON
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides finalAlienVault
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienVault
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemLancope, Inc.
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentMarcelo Silva
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)mmubashirkhan
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMAlienVault
 
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionIndustrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionDragos, Inc.
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM AlienVault
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM SuccessAlienVault
 

What's hot (20)

Threat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident ResponseThreat Hunting 101: Intro to Threat Detection and Incident Response
Threat Hunting 101: Intro to Threat Detection and Incident Response
 
Improve threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usmImprove threat detection with hids and alien vault usm
Improve threat detection with hids and alien vault usm
 
Advanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security ManagementAdvanced Persistent Threats (APTs) - Information Security Management
Advanced Persistent Threats (APTs) - Information Security Management
 
20 Security Controls for the Cloud
20 Security Controls for the Cloud20 Security Controls for the Cloud
20 Security Controls for the Cloud
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
RSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APTRSA: Security Analytics Architecture for APT
RSA: Security Analytics Architecture for APT
 
Cheatsheet for your cloud project
Cheatsheet for your cloud projectCheatsheet for your cloud project
Cheatsheet for your cloud project
 
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
 
Incident response live demo slides final
Incident response live demo slides finalIncident response live demo slides final
Incident response live demo slides final
 
Alienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworksAlienvault threat alerts in spiceworks
Alienvault threat alerts in spiceworks
 
The Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch SystemThe Critical Security Controls and the StealthWatch System
The Critical Security Controls and the StealthWatch System
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
Info Security - Vulnerability Assessment
Info Security - Vulnerability AssessmentInfo Security - Vulnerability Assessment
Info Security - Vulnerability Assessment
 
Advanced persistent threat (apt)
Advanced persistent threat (apt)Advanced persistent threat (apt)
Advanced persistent threat (apt)
 
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USMInsider Threats: How to Spot Trouble Quickly with AlienVault USM
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
 
Industrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology SelectionIndustrial Control Systems Cybersecurity Technology Selection
Industrial Control Systems Cybersecurity Technology Selection
 
How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM How to Detect SQL Injections & XSS Attacks with AlienVault USM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
 
Six Steps to SIEM Success
Six Steps to SIEM SuccessSix Steps to SIEM Success
Six Steps to SIEM Success
 

Similar to TIG / Infocyte: Proactive Cybersecurity for State and Local Government

Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Ricardo Resnik
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMAlienVault
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultAlienVault
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...DFLABS SRL
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofRUDDER
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare ☁
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersIBM Security
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakMarc St-Pierre
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseEMC
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygieneThiagu Haldurai
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceChristopher Gerritz
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environmentsamiable_indian
 
NTXISSACSC3 - Relevant Impact - Building a Successful Threat Management Progr...
NTXISSACSC3 - Relevant Impact - Building a Successful Threat Management Progr...NTXISSACSC3 - Relevant Impact - Building a Successful Threat Management Progr...
NTXISSACSC3 - Relevant Impact - Building a Successful Threat Management Progr...North Texas Chapter of the ISSA
 

Similar to TIG / Infocyte: Proactive Cybersecurity for State and Local Government (20)

Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.Cyber Security protection by MultiPoint Ltd.
Cyber Security protection by MultiPoint Ltd.
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
Cyber Crime Conference 2017 - DFLabs Supervised Active Intelligence - Andrea ...
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proofServers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
Manoj Purandare - Application Security - Secure Code Assessment Program - Pre...
 
Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360Panda Security - Adaptive Defense 360
Panda Security - Adaptive Defense 360
 
Detect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange PartnersDetect and Respond to Threats Better with IBM Security App Exchange Partners
Detect and Respond to Threats Better with IBM Security App Exchange Partners
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
Intelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and ResponseIntelligence Driven Threat Detection and Response
Intelligence Driven Threat Detection and Response
 
The uncool-security-hygiene
The uncool-security-hygieneThe uncool-security-hygiene
The uncool-security-hygiene
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Security Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA EnvironmentsSecurity Considerations in Process Control and SCADA Environments
Security Considerations in Process Control and SCADA Environments
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 
NTXISSACSC3 - Relevant Impact - Building a Successful Threat Management Progr...
NTXISSACSC3 - Relevant Impact - Building a Successful Threat Management Progr...NTXISSACSC3 - Relevant Impact - Building a Successful Threat Management Progr...
NTXISSACSC3 - Relevant Impact - Building a Successful Threat Management Progr...
 

Recently uploaded

PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)ahcitycouncil
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28JSchaus & Associates
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Dipal Arora
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...ranjana rawat
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxSwastiRanjanNayak
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...tanu pandey
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29JSchaus & Associates
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...CedZabala
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...nservice241
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...ranjana rawat
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxPeter Miles
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos WebinarLinda Reinstein
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 

Recently uploaded (20)

Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCeCall Girls In  Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
Call Girls In Rohini ꧁❤ 🔝 9953056974🔝❤꧂ Escort ServiCe
 
PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)PPT Item # 4 - 231 Encino Ave (Significance Only)
PPT Item # 4 - 231 Encino Ave (Significance Only)
 
2024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 282024: The FAR, Federal Acquisition Regulations - Part 28
2024: The FAR, Federal Acquisition Regulations - Part 28
 
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
Just Call Vip call girls Wardha Escorts ☎️8617370543 Starting From 5K to 25K ...
 
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
(SUHANI) Call Girls Pimple Saudagar ( 7001035870 ) HI-Fi Pune Escorts Service
 
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
(ANIKA) Call Girls Wadki ( 7001035870 ) HI-Fi Pune Escorts Service
 
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
Delhi Russian Call Girls In Connaught Place ➡️9999965857 India's Finest Model...
 
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
The Most Attractive Pune Call Girls Handewadi Road 8250192130 Will You Miss T...
 
Postal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptxPostal Ballots-For home voting step by step process 2024.pptx
Postal Ballots-For home voting step by step process 2024.pptx
 
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Junnar ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Junnar ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
(DIVYA) Call Girls Wakad ( 7001035870 ) HI-Fi Pune Escorts Service
 
2024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 292024: The FAR, Federal Acquisition Regulations - Part 29
2024: The FAR, Federal Acquisition Regulations - Part 29
 
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
Artificial Intelligence in Philippine Local Governance: Challenges and Opport...
 
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Nanded City Call Me 7737669865 Budget Friendly No Advance Booking
 
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 37 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...The Economic and Organised Crime Office (EOCO) has been advised by the Office...
The Economic and Organised Crime Office (EOCO) has been advised by the Office...
 
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
↑VVIP celebrity ( Pune ) Serampore Call Girls 8250192130 unlimited shot and a...
 
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxxIncident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
Incident Command System xxxxxxxxxxxxxxxxxxxxxxxxx
 
2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar2024 Zoom Reinstein Legacy Asbestos Webinar
2024 Zoom Reinstein Legacy Asbestos Webinar
 
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
(SHINA) Call Girls Khed ( 7001035870 ) HI-Fi Pune Escorts Service
 

TIG / Infocyte: Proactive Cybersecurity for State and Local Government

  • 1. TIG Enabled Infocyte HUNT™ The Proactive Security Platform
  • 2. Defense alone doesn’t win games. • Security industry focused on prevention and real-time detect • Customer environments built with ever increasing complexity and layers of defenses • Threat landscape is progressing rapidly with more resources than ever • Even with great defense, best result is tie. Common result is other team scores and you lose. • Don’t settle for a tie and don’t wait to lose
  • 3. Proactive Security is the Answer • Proactive security identify and resolve threats and vulnerabilities before they impact your environment • Optimize security intelligence and cut across the silos (network, endpoint, identity, cloud, application…) • Leverage existing tools and augment with no disruption • Automate complex security tasks – Experienced security staff can scale; less experienced staff can provide higher value with our integrations – Backstop your team with detection & response experts • Ensure compliance and mitigate risks on an ongoing basis
  • 4. Proactive Security Advisories •Source: IDC IR Marketscape, Gartner MDR Market Guide, NIST Adisory Gartner: IDC: NIST: “IT security and risk management leaders .. should use MDR services to expand their investments beyond preventative security technologies to address their detection, response and 24/7 monitoring gaps” "Enterprises should make proactive incident readiness, response, and resiliency a priority” "Customers should conduct periodic risk assessments of systems and applications determine threats and vulnerabilities ensuring monitoring and response capabilities are in place”
  • 5. What Infocyte does Infocyte HUNT fills the gap between prevention and incident response improving your Security Operations • Independent: Infocyte HUNT gathers forensic data from hosts and enriches it to deliver evidence vs alerts • Efficient: The process is automated, agentless, cloud-based and simple • Effective: Provide security insights that are easily consumed and actionable Infocyte HUNT proactively assesses your security state & posture, closing gaps in your defense while driving compliance
  • 6. Q2 Real World Network Findings What We Inspected ● 582K Systems ● 100s of Customers ● 1000s of Network Segments ● 50% IR & 50% Proactive ● 12.4 M Artifacts ● 45K fileless code injects ● 339K User Accounts ● 161K Applications System Findings Summary ● 5% advanced or multi-stage attack ● 22% encountered some element of Ransomware in their lifetime with 43 days avg dwell time ● 72% have unwanted or Riskware (800+ day average Dwell Time) Threat Findings Summary ● 1% undetectable but suspicious and found by analysts ● 4.6% Unknown to community / Intel, but found by Infocyte Incyte ML platform ● 32% Known bad but still able to persist (Ryuk, Emotet, Fuery, MereTam, Sality….) ● 63% Riskware including (risky admin tools, Adware, Keyloggers) Source: Infocyte Q2 Threat Report
  • 7. Infocyte Spans the Lifecycle Exploitation Installation Command & Control Lateral Movement Exfiltration Persist Attack Post Compromise Response Attack In Progress Attacker Dwell Time Recovery NETWORK BREACHED INCIDENT DISCOVERED Reconnaissance (actors living within the network)(actors identify path in) Mean Time to Detect 197 days Mean Time to Respond 69 days Hardening Mean Time to Compromise Minutes Pre - Attack Mean Time to Patch 12 weeks (actors exploit gaps) Source: VDBR and Ponemon
  • 8. Infocyte HUNT™ SaaS Threat Detection & Incident Response Platform Overview Complete API – Clean & Efficient UI Command Premium Hunt & IR Support IncyteTM Threat Intel and Synapse ML Agentless Agent-based ✓ Command Services leverage experts to alert you on top risks or threats and recommends response actions ✓ Respond Faster - Automate forensics, timelining, and artifact analysis to validate & scope incidents then take action. ✓ Identify Issues that matter - AI analytic and Threat Intel provide context on threats and vulnerabilities ✓ Independent Inspection – forensic-based inspection, triage and assessment across all your assets ✓ Easy deployment from the cloud via API, controller, or light agent Confidential KPI DashboardActionable Insights Exposures: Identity & Vulnerability Activity Trace™
  • 9. Agents Infocyte Cloud Architecture HUNT™ Console customer1.Infocyte.com Controller Endpoints / Servers Endpoints / Servers Agentless Security Operations Center (SOC) Adv. Hunt & IR Augmentation for “Command”- level subscribers and partners INCYTE Threat Intel & Analytics API MSSP / SOC AWS / Azure / GCP Cloud Plugins API & UI Infocyte HUNT Agents can be installed on unmanaged endpoints -- on-prem, in the cloud, or at a coffee shop. Cloud Plugins enable agentless workload visibility and interaction via IaaS API Infocyte HUNT Controller discovers endpoints and initiates scans (deployed inside the firewall / network) serverless* ∙ container* ∙ virtual machines ∙ datacenter ∙ headquarters ∙ retail/POS ∙ branch office ∙ mobile workforce (laptops) Cloud Hybrid Infocyte HUNT enables Managed Detection and Response (MDR) services across the entire ecosystem Physical Workstations MobileVirtualized
  • 10. Time to Detect + Time to Respond = Dwell Time • Cost - $58k per day • Average - 191 days globally (131 in US) in 2018 How are your Security Operations Performing? • Infocyte accurately measures and helps reduce these metrics • Measure performance and improvement of security operations • Convey business impact – value of security operations – KPI improvements = Downtime avoided and response costs reduced – Businesses have up to 97% reduction in breach costs if contained within 1 day Key KPIs
  • 11. Outcomes with Infocyte 1. Become more proactive with discovering assets, vulnerabilities and characterizing threats and risks in your environment with proper context 3. Achieve compliance with unprecedented visibility and reporting into network and application assets, network hygiene, and auditing the effectiveness of security controls. 2. Respond faster with automated incident response triage, scoping, and patient-zero identification
  • 13.
  • 14. Infocyte as a Platform - Long Term Vision for Infocyte is as a comprehensive platform for identifying, assessing and responding to risks and threats across your organization - Independent Risk and Threat Discovery → Reducing Risk and MTTD - Application and OS Vulnerabilities (more focused than VA vendors) - Broader Environmental Vulnerabilities (identity entitlements, etc.) - Incident Response → Integrated into workflows to reduce MTTR - Constantly Expanding Coverage: Cloud workloads, identity, OSX...
  • 15. In Closing • Shift your mindset and posture to Proactive Security – play offense, don’t wait to lose – Extend your existing security investments – add forensic data to enable better incident response – Enable your resources to be more efficient and effective • Infocyte is the Easy Button – Affordable: starts at $2/node / month – Easy: fully managed, no business disruption – Fast: evaluate in your environment, get results in hours
  • 16. Leveraging as a Pre-Sales tool for Check Point (Especially Sandblast Agent) www.infocyte.com
  • 17. The Leader in Proactive Security www.infocyte.com
  • 18. How is it deployed? • New cloud instance is created in console • Controller (agentless) or agents deployed in environment – and are discovered and enabled in console • Service group and query are configured in console – Service account is defined and configured – Environment is enumerated • Scan is initiated and forensic data is analyzed by Incyte • Enriched forensic data is presented in console or report Time start to finish for 100 hosts = <120 min
  • 19. Detection: Response begins when you detect malicious or suspicious activity via real-time monitoring, proactive hunting, external reports, etc. 1. Triage Determine scope of breach, gather information for quick decision making Infocyte automates full forensic triage 2. Containment Initial response actions to mitigate active threat Automates ticketing workflows & recommendations 3. Investigation Analyze evidence and determine root cause Activity Trace and automated timelines makes this easy 4. Certification Verify control and clean state of network Infocyte enables and automates this step. 5. Learning Implement new controls based on lessons learned Accurate RCA leads to better decisions Incident Response Steps
  • 20. Infocyte Security Integrations Ecosystem SYSLOG Alerting Common Event Format (CEF) SIEM Orchestration Intel
  • 22. HUNT Command: Case Study • Government network with sensitive data (including PII & Court Records). • Customer started with core protection tools but little hunting or IR expertise • First 3 months identified, resolved and addressed root cause of over 80 threats or risky applications • Organization now demonstrates higher IR readiness and network hygiene with significantly lower mean time to respond Month 1 Month 2 Month 3 Month 4
  • 24. RECOVE R Recovery Planning and Improvements (RC.RP +IM) RESPON D Analysis including Root Cause (RS.AN) Mitigation, Contained and Validated (assist) (RS.MI) DETECT Host Anomalies and Events (DE.RA) Continuous Monitoring of Hosts (DE.CM) Detection Processes in Place (DE.DP) PROTECTIDENTIFY Asset Discovery (ID.AM) Asset Vulnerabilities Discovered (ID.RA) Infocyte 8 Core NIST Capabilities
  • 25. HUNT Command: Infocyte 8 Critical Controls for Risk Management and IR Readiness NIST Category Critical Control My Score (0-5) Identify Do I know all of my networked assets and where they are? Identify What applications are installed in my network? Which are vulnerable? Detect Are protection and detection platforms deployed and working properly? Detect Do I have visibility on attacks that get through my security controls? Detect Can I characterize these risks when found? Respond Am I able to reach ALL endpoints in the event of an incident? Respond How quickly can I triage, complete RCA and scope an attack to contain and remediate? Recover Once fixed, can I validate the network is clean and no other backdoors remain?
  • 27. Threat Detection Managed Detection • Proactively discover threats in your network – Forensically validate your security controls have not been bypassed Targeted Hunting (Analytics + Infocyte) • Compliment security data (e.g. EDR, IDS, Firewall) analytics • Use Infocyte to investigate and confirm leads by inspecting suspicious systems
  • 28. • An automated solution to forensically triage alerts from your SIEM, network or endpoint security solutions – Collects & analyzes targeted forensic triage data. – Reduces the time and resources needed to manually comb through volumes of false and low priority data. – Allows your security team to focus on remediating real threats. Incident Response (Forensic Triage)
  • 29. When combined with the visibility and orchestration provided by ForeScout CounterACT, Infocyte HUNT equips enterprises with the ability to forensically evaluate the state of an endpoint and create a network compliance policy that ensures that no compromised system enters the network. HOW IT WORKS • CounterACT discovers and classifies an endpoint as soon as it enters the network. • If the endpoint has not been recently inspected, CounterACT will initiate a hunt with Infocyte. • Endpoints that are found to be compromised are out of compliance. • Non-compliant endpoints can be quarantined from the network or subject to any other CounterACT enforcement action. Network Access Control Endpoints 3. Infocyte verifies endpoint state 1 2 3 4 2. ForeScout Requests Hunt 4. Infocyte returns findings to ForeScout 5 CounterACT™ HUNT™
  • 30. Use Cases: Partners (MSSPs & Service Providers)
  • 31. Compromise Assessments A proactive hunt across systems to detect threats that may have evaded existing security controls “Is this network clean or compromised? • Effective at detecting presence of malware, remote access tools, and other indications of unauthorized access • Fast – Started in minutes, assess thousands of hosts an hour • Affordable – A typical organization should be able to conduct it proactively and regularly (i.e. quarterly/annually) • Independent – The assessment does not rely on existing detection solutions already in the environment Infocyte is the only product optimized for compromise assessments and trusted by teams like PwC, Specter Ops, Check Point, and many others. APPLICATIONS • Periodic Threat Hunting • Incident Response • Mergers & Acquisitions • Third Party & Vendor Risk Management • Security Program Validation / Audit
  • 32. • Collects and analyzes initial forensic triage data to determine scope of incident and collect samples. – Collects & analyzes targeted forensic triage data. – Instantly recover in-memory inject samples (unmapped from memory) for offline analysis – Most flexible endpoint access options: • Agentless (scan hosts within network from single entry point) – Server-side or Client-side Encryption of network credentials • Agent (interact directly with host) • Offline Scan (manual offline survey and upload results) Endpoints Agentless: Target Network Workstation or Server becomes pivot system to scan other systems within firewall HUNT™ Agent: End-customer installs agent to give direct access to a hosts Incident Response
  • 33. cust2.infocyte.com cust3.infocyte.com Service Delivery Models MSSP1.Infocyte.com - 100% Managed Customers - Single Instance | Multiple Customers - Customers should not access UI cust1.infocyte.com Customer 7 Customer 1 Customer 5 Customer 6 Customer 4Customer 3 Customer 2 cust5.infocyte.com Customer 9 cust4.infocyte.com Customer 8 Managed Co-Managed Private MSSP or Partner manages a set of customers in a single HUNT instance. SOC / MSSP - Co-Managed Instances - Both end customer and SOC can access individual customer instance UI - Individual private Instances - GDPR & highly regulated environments
  • 35. Current State of Security - Environmental Vulnerabilities continue to increase - Increases in cloud and mobility have eroded the perimeter and increased the attack surface - Threat Landscape continues to get more sophisticated and have greater resources - They will encrypt, destroy or exfiltrate your sensitive data - 64% of businesses experienced major security incident last year - Cyber attack ‘dwell time’ is 191 days in 2018 - Cost of breach is $400 to $700/endpoint or $3.5M No Protection is 100%: Breaches happen. - Proactive Security recognized as largest drivers to reduce breach exposure and cost Sources: Gartner, NIST, CVE Database, Ponemon 2018 state of endpoint security, Dark Reading, Infocyte Analysis
  • 36. Cloud Security – What is collected? • Endpoint forensic triage data is collected from each host which includes: – Process, executable, scripts, apps, and connection metadata (hashes, IPs, digital signatures, etc.) – Associated User Account metadata – The results of volatile memory analysis -- small segments of executable memory identified as malicious • Except in rare circumstances, executable-marked memory regions do not contain PII or other sensitive data. Data- marked regions of memory are excluded from collection. • All raw data collected is available to users through the interface and API integrations. Users retain control over reducing the scope of collected data in the interface as well.
  • 37. Cloud Security – How is it protected? Each instance of Infocyte HUNT has its’ own unique database that stores customer-specific data. All access is constrained to those who have been given explicit access to that instance. Infocyte HUNT Command-level subscribers grant an analysis-level access to the Infocyte SOC. All other customers have administrative access through an Infocyte account which is used for maintenance, support, and password resets. Security Features: • All infrastructure on Infocyte’s AWS Virtual Private Cloud (VPC) within US or UK datacenters • All employees and contractors with access to infrastructure are rigorously vetted and utilize principles of least privilege • Data Encrypted in transit (SSL) and at rest • Regular Penetration Tests to identify and patch vulnerabilities • Multi-Factor User Authentication (Coming Dec 2019) • Audit (Activity) Logs monitored 24/7 Authentication Infocyte HUNT authentication is protected with the strongest industry- accepted encryption and authentication standards. Going above industry- standard, we do not use cookies to store session tokens in browsers. Credential Manager For Agentless collection, service accounts and SSH keys may be utilized. These credentials are encrypted and stored within Infocyte’s credential manager. Options exist for both server-side keys (provided by Infocyte) and client-side keys (generated stored on-prem)
  • 38. ROI of Proactive Detection and Response Security Mindset: • Reactive: Wait for Alert 🡪 Investigate • Proactive: Find issues 🡪 Detect and Resolve