Sophos- Todays Threat Landscape

Today’s Threat Landscape
Ryan Archer - Sales Engineer
1
~8 new Internet users
every second
2
30,000 new infected
websites every day
>80% small businesses
3
Where are these
infections coming from?
4
5
Pavel Vrublevsky
6
Affiliate marketing, Russian style
7
How do we get infected?
>10 billion ad impressions infected with
malware last year
8
Please install my malware kit
9
10
Opportunistic threats
Digital smash and grab
11
Why?
Image: krebsonsecurity.com
12
Because…
Image: krebsonsecurity.com
13
Drive-by downloads
14
Do you patch?
15
Old or new it must be patched
CVE-2014-4822
CVE-2014-3201
CVE-2014-6492
CVE-2014-0322
CVE-2014-0500
CVE-2014-0319
CVE-2014-8068
CVE-2012-0158
16
17
Phishing
45 % of the time it works every time
18
Search Engine Optimization
19
Phishing – Enumeration made easy
20
Phishing – your site or mine?
21
Phishing – Campaigning
22
How about a quick example?
23
Ransomware
24
Ransomware
25
Cryptolocker
26
Cryptolocker file list
27
Advanced Threats
28
Another Popular Term(APT)?
• Specific individuals
• Specific well-defined goals
• Nation-state sponsored
• Espionage
• Watering hole
• Dragnet by vertical
29
Research
30
Exploit
31
Gain persistence
32
Explore
33
Act on objective
34
Clean up
35
In the news
36
What it means for businesses
37
Increasing attacks, increasing sophistication
Attack surface
exponentially larger
Threats more
sophisticated
Laptops/Desktops
Phones/Tablets
Virtual servers/desktops
Attacks are more
coordinated than defenses
38
Today’s security approach is falling behind
INCOMPLETE
Always one more thing
to deploy and manage
COMPLICATED
Too hard to configure,
too much to monitor
INEFFECTIVE
Not keeping up with
advanced threats
39
What we believe
Security must be comprehensive
The capabilities required to fully satisfy customer needs
Security can be made simple
Platform, deployment, licensing, user experience
Security is more effective as a system
New possibilities through technology cooperation
40
Project Galileo
Technology
integration that
enables complete,
simple-to-manage
security that works
effectively as a
system.
Next-Gen
Network Security
Next-Gen
Server
Protection
Next-Gen
Enduser
Protection
Sophos Confidential
41
Next-Gen Enduser
Protection
42
The Endpoint Has Changed
Corporate Perimeter
Corporate Perimeter
VPN
Cloud
Services
43
Endpoint Security Needs to Change
Data
Prevent Malware
“Prevention is ideal, but
detection is a must.”
Prevent Malware
Detect Compromises
Remediate Threats
Encrypt Data
44
Summary – Security Made Simple
Reputation Data
• Active Protection
AT HOME AND ON THE MOVE
SophosLabs
Correlated intelligence • Content Classification
REMOTE OFFICE
Secure VPN RED
Endpoint Security
SafeGuard Encryption
Mobile Control
Secure Wi-Fi
Endpoint Security
SafeGuard Encryption
Mobile Control
Secure VPN
Client
HEADQUARTERS
SOPHOS CLOUD
Network Storage Antivirus
Server Security
Administration
Web Application Firewall
Mobile Control
Secure Wi-Fi
Endpoint Security
SafeGuard Encryption
Secure Web
Gateway
UTM
NextGen Firewall
Secure Web Gateway
Secure Email Gateway
Web Application Firewall
Secure Email
Gateway
Guest Wi-Fi
45
And one more…
Because we LOVE users….
46
© Sophos Ltd. All rights reserved.
47