Fabricating An Environment For Cyber Riskimages.nam.org/EMAIL/Department/MBS/LeadingEdge/... ·...

1
eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyberattacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), staffed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.eSentire.com and follow @eSentire. IT’S ONLY A MATTER OF TIME TO FIND A BLIND SPOT THE GREATER YOUR EXPOSURE, THE GREATER THE PROBABILITY BECOMES REALITY² TRADITIONAL SECURITY APPROACHES PROVE FUTILE, WHILE MEAN TIME TO IDENTIFY AND CONTAIN A THREAT EXTENDS TO DANGEROUS LEVELS CONFIDENCE IN CAPABILITIES TO QUICKLY DETECT AND CONTAIN AN ATTACK DECREASE WHILE CONSEQUENCES INCREASE MODERNIZE YOUR CYBERSECURITY TO MEET THE DEMANDS OF TODAY’S THREAT LANDSCAPE of attackers can achieve in under 10 hours of attackers can achieve in under 10 hours 71 67 Manufacturing: Probability of a breach Fabricating An Environment For Cyber Risk ADVERSARIES EXECUTE ATTACKS AGAINST MANUFACTURERS FASTER THAN EVER USING TOOLS AND TECHNIQUES DESIGNED TO BYPASS YOUR CYBERSECURITY MEASURES1 of attackers can achieve in under 10 hours 78 Malware Phishing Exploit Cumulative Modernized business demands modernized security. eSentire Managed Detection and Response ¹2018 Nuix Black Report ²Using data from more than 2,000 deployed eSentire sites, depicts risk rates for organizations that do not have a threat monitoring service in place. Statistical projections are based on the ongoing and cumulative chance attack categories would have been picked up by an eSentire Security Operations Center, which watches for things bypassing traditional security measures in unmonitored environments. ³⁴⁵⁶ 2018 Cyber Risk in Advanced Manufacturing Report ⁷⁸ Ponemon: 2018 Cost of a Data Breach Study ⁷⁸Ponemon: 3rd Annual Study on the Cyber Resilient Organization ⁹¹⁰¹¹https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security/ SEE EVERTHING MISS NOTHING ACT BEFORE IMPACT HARDEN AGAINST FUTURE ATTACKS 24x7x365 monitoring with full spectrum visibility across on- premises, cloud and hybrid IT environments. Human threat hunting with machine learning-assisted detection uncovers known and never- before-seen attacks. Embedded incident response accelerates precision and speed, facilitating rapid tactical threat containment. Root cause investigation and remediation guidance defines corrective actions to harden security postures against evolving threats. 30 27 48 39 Locations Malware Phishing Exploit Cumulative TAKE ACTION Per Location: Cumulative Probability of a Security Incident Involving a Bypass of a Manufacturer's Security Controls Over a 12-month period² 49 % of attackers spend over 20 hours a week researching and bypassing security systems Breach the Perimeter Identify Critical Data Exfiltrate Data CONFIDENCE: Nearly 50 % lack confidence they are protected⁷ CONSEQUENCES: Increased downtime due to affected ICS 91 % of material stolen is related to proprietary information 8 3.1 % abnormal client churn 9 48 % experienced losses of $500k or more per incident 10 168 DAYS mean time to identify a data breach⁷ 63 DAYS mean time to contain a data breach⁸ eSentire Managed Detection and Response (MDR) 1 3 6 9 20% 40% 60% 80% 100% 48% report lack of funding as top barrier regarding cyber risk³ 50% perform ICS vulnerability testing less than once a month⁴ 31% have not conducted an ICS assessment⁵ 39% experienced a breach in the last 12 months⁶

Transcript of Fabricating An Environment For Cyber Riskimages.nam.org/EMAIL/Department/MBS/LeadingEdge/... ·...

Page 1: Fabricating An Environment For Cyber Riskimages.nam.org/EMAIL/Department/MBS/LeadingEdge/... · containment. Root cause investigation and remediation guidance defines corrective

eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyberattacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), sta�ed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.eSentire.com and follow @eSentire.

IT’S ONLY A MATTER OF TIME TO FIND A BLIND SPOT

THE GREATER YOUR EXPOSURE, THE GREATER THE PROBABILITY BECOMES REALITY²

TRADITIONAL SECURITY APPROACHES PROVE FUTILE, WHILE MEAN TIME TO IDENTIFY AND CONTAIN A THREAT EXTENDS TO DANGEROUS LEVELS

CONFIDENCE IN CAPABILITIES TO QUICKLY DETECT AND CONTAIN AN ATTACK DECREASE WHILE CONSEQUENCES INCREASE

MODERNIZE YOUR CYBERSECURITYTO MEET THE DEMANDS OF TODAY’S THREAT LANDSCAPE

of attackers can achieve in under 10 hours

of attackers can achieve in under 10 hours71 67

Manufacturing: Probability of a breach Fabricating An Environment For Cyber Risk

ADVERSARIES EXECUTE ATTACKS AGAINST MANUFACTURERS FASTER THAN EVER USING TOOLS AND TECHNIQUES DESIGNED TO BYPASS YOUR CYBERSECURITY MEASURES1

of attackers can achieve in under 10 hours78

Malware Phishing Exploit Cumulative

Modernized business demands modernized secur i ty .

eSentire Managed Detection and Response

¹2018 Nuix Black Report²Using data from more than 2,000 deployed eSentire sites, depicts risk rates for organizations that do not have a threat monitoring service in place. Statistical projections are based on the ongoing and cumulative chance attack categories would have been picked up by an eSentire Security Operations Center, which watches for things bypassing traditional security measures in unmonitored environments.

³⁴⁵⁶ 2018 Cyber Risk in Advanced Manufacturing Report⁷⁸ Ponemon: 2018 Cost of a Data Breach Study

⁷⁸Ponemon: 3rd Annual Study on the Cyber Resilient Organization⁹¹⁰¹¹https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security/

SEE EVERTHING MISS NOTHING

ACT BEFORE IMPACT HARDEN AGAINSTFUTURE ATTACKS

24x7x365 monitoring with full spectrum visibility across on-premises, cloud and hybrid IT environments.

Human threat hunting with machine learning-assisted detection uncovers known and never-before-seen attacks.

Embedded incident response accelerates precision and speed, facilitating rapid tactical threat containment.

Root cause investigation and remediation guidance defines corrective actions to harden security postures against evolving threats.

30274839

Locations

Malware

Phishing

Exploit

Cumulative

TAKE ACTION

Per Location: Cumulative Probability of a Security Incident Involving aBypass of a Manufacturer's Security Controls Over a 12-month period²

49% of attackers spend over 20 hours a week researching and bypassing security systems

Breach the Perimeter Identify Critical Data Exfiltrate Data

CONFIDENCE:

• Nearly 50% lack confidence theyare protected⁷

CONSEQUENCES:

• Increased downtime due to a�ected ICS

• 91% of material stolen is related toproprietary information 8

• 3.1% abnormal client churn9

• 48% experienced losses of $500kor more per incident10

168DAYS

mean time to identify a data breach⁷

63DAYS

mean time to contain a data breach⁸

eSentire Managed Detectionand Response (MDR)

1 3 6 920%

40%

60%

80%

100%

• 48% report lack of funding astop barrier regarding cyber risk³

• 50% perform ICS vulnerability testing less than once a month⁴

• 31% have not conducted an ICS assessment⁵

• 39% experienced a breach in the last 12 months⁶