T.E.N. Knowledge Base

ISE® West 2018

Respond Analyst: Business Case  > Download Whitepaper
The exponential growth in security-relevant data coupled with the ongoing challenge of finding training and retaining skilled security analysts to monitor and respond to that data creates a critical and vexing problem for security organizations.

Respond Analyst: Technology White Paper  > Download Whitepaper
Respond Analyst is the first software expert system to automate the monitoring and analysis tasks performed by front-line security analysts. Respond Analyst emulates the judgment and reasoning of experienced security professionals with speed, scale and consistency unmatched by today’s manual processes. Leveraging the latest advancements in artificial intelligence, machine learning and modern stream-based architectures, and leveraging Respond Software’s unique Probabilistic Graphical Optimization (PGOTM) technology, Respond Analyst acts autonomously – without a heavy system management burden, security engineering oversight, or long learning cycles.



Attivo Networks - ThreatDefend  > Download Whitepaper
We had intended to include Attivo Networks’ ThreatDefendTM Detection and Response Platform in our deception networks group but after looking pretty closely at it we decided that it is quite a bit more than a deception grid. It is true, of course, that this system includes BOTsink, a deception tool that is both effective and well-known. But BOT- sink is just part of the story. This is a full-fea- tured incident response system.



AUTOMATE & ACCELERATE YOUR SECURITY OPERATIONS: 5 Must-Haves to Rev Up Threat Detection & Response  > Download Whitepaper
Modern cyber-attacks are processes, not single events. They span all phases of the attack lifecycle — from initial exploit, reconnaissance, command and control communication, and staging, to theft or destruction of valuable data. This process can take hours, days, weeks, or even months and the longer threats lurk in your network, the more expensive they become to resolve.



Security Built to Work Outside the Perimeter  > Download Whitepaper
People are the Perimeter: We all know that the days of working within four office walls are long-gone, in fact 43% of Americans work remotely at least some of the time. Your team works from their desks, but also from home, from the airport, from the coffee shop around the corner—the list goes on. Your employees are using modern cloud applications that allow them to work from anywhere, but is your security solution keeping up with this new perimeter? Keep your company out of the headlines and your end users happy and productive.



What is Microsoft Azure and Why Use It?  > Download Whitepaper
Today plenty of businesses still have real concerns about migrating applications to the cloud. Fears about network security, availability, and potential downtime swirl through the heads of chief decision makers, sometimes paralyzing organizations into standing pat on existing tech— even though it’s aging by the minute.

Enter Microsoft Azure, the industry leader’s solution for going to a partially or totally cloud-based architecture. Below is a detailed look at what Azure is, the power of partnering with Microsoft for a cloud or hybrid cloud solution, and the best way to get full and actionable visibility into your aggregated logs and infrastructure metrics so your organization can react quickly to opportunities.



Backus_jon

Jon Backus
Product Manager
Aetna
Biography

The AEIRS Analytics Program  > Download Presentation
The team at Aetna is using leading-edge technology that uses machine learning to provide early detection of anomalies in user behavior. The Aetna Entitlements, Identity, & Risk System (AEIRS), is a User and Entitlement Behavior Analytics (UEBA) program that evaluates millions of event records looking for anomalous or unusual behavior and alerts when detected. The analytics engine, AEIRS, determines and tracks normalized behavior for every Aetna user and then uses it to look for abnormal breaks from pattern, as well as rules-based criteria through behavior models. It also calculates a risk score for each individual user that has access to an Aetna system. The risk scores will change based on anomalous or unusual behavior detected by a model. Join our discussions as we learn how AEIRS’ models and risk scores have been used to influence response and automated control changes.


Singer_Steven

Steven Singer
Director of Information Security
LegalZoom
Biography

Sponsored by:

Rebalancing the SOC  > Summary
Central to safeguarding against cyber threats is a corporation's SOC. Security operations require constant innovation to keep up with the businesses they protect and to mitigate potential damage from the threats against them, especially because skilled SOC analysts are so hard to find and retain. The exponential growth in security-relevant data coupled with the ongoing challenge of finding training and retaining skilled security analysts to monitor and respond to that data creates a critical and vexing problem for security organizations. However, by marrying the benefits of skilled analysts with automation, orchestration and AI, your organization can create a much more hospitable, efficient, and effective SOC. With revolutionary technologies advancing security operations, like AI-based expert systems, an autonomous analyst is no longer a concept, but a reality.


Kornberg_Avram

Avram Kornberg
Security and Technology Executive & Founder
Stratecution Consulting, LLC.
Biography

Sponsored by:

Security That Works Outside the Perimeter  > Summary
The days of working within four office walls are long-gone. In fact, 43% of Americans work remotely at least some of the time. Your team works from their desks, but also from home, from the airport, from the coffee shop around the corner—the list goes on. Your employees are using modern cloud applications that allow them to work from anywhere, but is your security solution keeping up with this new perimeter? It’s important to balance security and end user flexibility to meet compliance requirements for your organization. Furthermore, end users aren’t just your employees any more. Customers, partners, and suppliers are all demanding access on-the-go and on multiple devices. Join our conversation as we discuss the challenges of securing your organization in a perimeterless world and how we can create a seamless end user experience and secure data all while meeting enterprise compliance requirements.


John Abel

John Abel
Senior Director of Security
Credit Karma

The Increasing Impact of Insider Threats  > Summary
Insider threats continue to be one of the top cyber security threats and have proven that they are a force to be reckoned with. According to a 2017 Insider Threat Report, 53% of companies estimate remediation costs of $100,000 and more, with 12% estimating a cost of more than $1 million. The same report suggests that 74% of companies feel that they are vulnerable to insider threats, with 7% reporting extreme vulnerability. Every company will face an insider-related breach sooner or later regardless of whether it will be caused by a malicious action or an honest mistake. As costs related to insider threats continue to grow, what can Information Security Executives and their security teams do to combat this all too familiar foe?


Selim Aissi
Chief Security Officer
Ellie Mae
ISE® West Executive Award Finalist 2015
ISE® North America Executive Award Finalist 2015 - Commercial Category

Biography

Gone Phishing: Securing the Enterprise from Social Engineering Attacks  > Summary
Social media, a digital medium that is rooted in sharing personal and professional data, continues to be a favorite target for cyber-criminals because it offers a virtual treasure trove of readily accessible information. The very nature of how information is shared via social media goes against many longstanding core information security principals. Businesses of all shapes and sizes can be targets of social media engineering and phishing attacks. While phishing itself is an incredibly well-known attack technique, it still continues to be a major security issues for many organizations. Symantec’s 2017 Internet Security Threat Report found that Business Email Compromise (BEC) scams, relying on spear-phishing emails, targeted over 400 businesses every day, draining $3 billion over the last three years. While it’s critical for security teams to keep up to date on current social engineering and phishing attacks, what else needs to be done to ensure the enterprise at large is aware of the dangers and pitfalls of these kinds of attacks?