WEB OFFICE OF THE CSO

Similar documents
TRITON AP-WEB TRITON AP-WEB - no more, no less.

SWISS EPHEMERIS for the year 1626 heliocentric JANUARY 1626 GC 00:00 UT Day Sid.t Terra B C D E F G O I J N T d41'08 10d36 23j36 25g46 27b

{ } 09:00~11:00 15:00~17:

NSTISSC: National Security Telecommunications and Information System Security Committee 2. NSTISSI: National Security Telecommunications and In

C ONTENTS 目 录 热 点 舆 情 消 息 海 外 来 风 56 Win10 周 年 更 新 再 出 BUG: 竟 没 有 关 机 按 钮 57 谷 歌 为 MacOS 开 发 的 恶 意 软 件 嗅 探 器 即 将 完 成 58 数 据 安 全 公 司 Imperva 财 报 不 佳? 被

計 畫 案, 本 系 預 計 三 場 校 外 參 訪 活 動, 簡 述 如 下 : 參 訪 日 期 :3 月 28 日 ( 三 ), 參 訪 地 點 : 暨 南 大 學 集 集 小 鎮 參 訪 日 期 :4 月 27 日 ( 五 ), 參 訪 地 點 : 大 里 國 際 兒 童 英 語 村 國 立

< FBDC5BFEBC6F2B0A15FC3D6C1BEBAB8B0EDBCAD5FC3E2B0A3BFEB2E706466>

<4D F736F F D20312D3120B9ABBFAAD7AAC8C3CBB5C3F7CAE9A3A8C9EAB1A8B8E5A3A92E646F63>

I

科 研 信 息 化 技 术 与 应 用,2015, 6 (1) of identity and the framework of identity management, this paper analyses the development trend of Identity Management

Microsoft PowerPoint ARIS_Platform_en.ppt

微軟認證專家.PDF

untitled

10 IBM Louis V. Gerstner, Jr. 15 Moore's Law EPC PC 2-2

应 用 为 先, 统 筹 规 划 摘 要 : 总 体 上 看, 我 国 的 云 计 算 还 没 有 进 入 良 性 发 展 的 轨 道 目 前 的 形 势 是 政 府 比 企 业 积 极, 企 业 比 用 户 积 极, 大 企 业 比 中 小 企 业 积 极, 建 设 数 据 中 心 比 推 广 应

GDP % % GDP % % GDP 56% 68% Executive Office of the President Economic Report of the Pr

2

Paul Einzig ( )

Microsoft Word - Datastream5.1_使用說明201110

空 天 力 量 杂 志 的 问 题 思 索 的 一 个 结 果, 就 是 借 鉴 前 两 次 抵 消 战 略 的 经 验 和 教 训, 创 造 性 延 续 马 歇 尔 的 运 用 技 术 优 势 克 服 对 手 数 量 优 势 的 竞 争 战 略 思 维, 开 创 新 思 路 新 武 器 新 军 事

AhnLab安全月刊

iCal — Month — 1/1/12 to 12/31/12

Microsoft Word - China FDI (中国对外直接投资)_V4.docx

<4D F736F F F696E74202D20A8E2A9A4AA41B0C8B77EB654A9F6B67DA9F1ABE1A141BB4FC657AAF7BFC4AAF7BFC4AA41B0C8B77EA4A7B0D3BEF7BB50AC44BED420A6BFACB C >


目 录 简 介.3 ` 体 系 结 构...4 数 据 层...5 数 据 连 接 器...6 Tableau Server 组 件...7 网 关 / 负 载 平 衡 器...8 客 户 端 :Web 浏 览 器 和 移 动 应 用 程 序...8 客 户 端 :Tableau Desktop..

Microsoft Word 記錄附件

簡報題目


Microsoft Word - 971管理學院工作報告2

2Office 365 Microsoft Office 365 Microsoft Office Microsoft Office Microsoft Office 365 Office (Office Web Apps) Office WindowsMAC OS Office 365 Offic

目 录 执 行 摘 要. 3 是 时 候 主 动 出 击 了. 3 漏 洞 评 估. 3 应 用 程 序 修 补. 3 白 名 单 和 应 用 程 序 控 制. 4 LANDESK 方 法. 4 朝 着 更 高 安 全 成 熟 度 坚 持 迈 进. 5 参 考 资 料. 5 在 现 行 法 律 允

2016 勒索軟體白皮書

基于泛在网的智能交通应用系统总体框架

次世代のITインフラ“Compute”を先取り!HPが統合型アプライアンス「HP ConvergedSystem」を推進する理由

Forrester Wave Chris Sherman Christopher McClean Salvatore Schiano Peggy Dostie Forrester Bromium Carbon Black Crow

Total Internet Connectivity in a Single Chip

PowerPoint 簡報

一 南 安 普 顿 大 学 介 绍 南 安 普 顿 大 学 介 绍 南 安 普 顿 大 学 的 前 身 是 哈 特 利 学 院,1862 年 由 当 时 的 首 相 帕 密 尔 敦 揭 牌 成 立 1952 年 获 得 皇 家 特 许 升 格 为 大 学, 成 为 英 国 15 所 科 研 重 点


國家圖書館典藏電子全文

软件概述

Microsoft PowerPoint - ACA 專案簡報玄奘大學 ppt

STOCK #90810

第壹拾篇

財團法人張思恒文教基金會

系 統 識 別 號 : 公 務 出 國 報 告 提 要 頁 數 :12 報 告 名 稱 : 參 加 亞 洲 警 察 學 會 2014 年 年 會 主 辦 機 關 : 中 央 警 察 大 學 聯 絡 人 / 電 話 : 陳 春 成 / 出 國 人 員 : 章 光 明 中 央 警

穨HR入口網站的建置策略-以N公司為例

104 學 年 度 第 2 學 期 第 1 次 院 務 會 議 紀 錄 開 會 時 間 :105 年 5 月 11 日 ( 三 ) 中 午 12 時 至 下 午 1 時 30 分 開 會 地 點 : 社 管 大 樓 5 樓 533 會 議 室 主 持 人 : 王 院 長 精 文 紀

业 务 与 运 营 社 交 网 络 行 为 将 对 网 络 流 量 造 成 较 大 影 响 3) 即 时 通 信 类 业 务 包 括 微 信 QQ 等, 该 类 业 务 属 于 典 型 的 小 数 据 包 业 务, 有 可 能 带 来 较 大 的 信 令 开 呼 叫 建 立 的 时 延 销 即 时

Microsoft Word - SPEC

中文最终版30.indd

Blank 2015 Monthly Calendar

P X-M PowerChute Business Edition v8.0 Basic 85

Microsoft Word - Lv Kaiyan, Edmund HoiNgan Loi.doc

博物館科技應用前瞻分析--從Horizon Report談起

<4D F736F F D20BCC6A6ECB5D8BB79A4E5B2A3B77EB1C0B0CAB5A6B2A4B3F8A E646F63>

~ ~


GDP = + + SNA

Microsoft PowerPoint Zhang Guohua.ppt [Compatibility Mode]

112 Journal of Management & Operations September 2011, Number5/6, pp The county and city government actively engage in holding festival activ


14-1-人文封面

Acronis True Image 2015

「本港青少年網上行為」調查

<4D F736F F F696E74202D20B8EAB054AFC0BE69B2C43035B3A1A4C0A147B8EAB76ABC67A7402E707074>

http / / www. un. org /zh /peacekeeping /resources /statistics /factsheet. shtml 09

РИАНовости 2

2002

計畫編號:DOH94-DC-2027

Microsoft PowerPoint - Performance Analysis of Video Streaming over LTE using.pptx

Transcription:

2016 年 全球 威脅報告無懼前行 製作呈獻 FORCEPOINT Security Labs

......... 06... WEB... 02 06 10 20... 22 OFFICE OF THE CSO... 25... 29 2016 02

Microsoft Office Forcepoint Security Labs (SI) Office of the CSO (OoCSO)

Forcepoint 2016 Forcepoint Security Labs 1. Forcepoint 5 30% 1 40% 2 2. JAKU Forcepoint (TTP) SI JAKU Locky 3. WEB Web 92% URL 44.7% 20 2016 04

4. (CIO) (CISO) 80% IT 3 5. FORCEPOINT OFFICE OF THE CSO 2015 Forcepoint Office of the CSO (M&A) OoCSO Forcepoint M&A Websense Raytheon Cyber Products (RCP) Stonesoft (NGFW) FORCEPOINT Forcepoint 2016 1 14 Raytheon Company Vista Equity Partners Forcepoint Websense Raytheon Cyber Products Stonesoft Forcepoint Raytheon Raytheon Forcepoint

Forrester 2015 50% 4 ff ff ff ff USB Idaho National Laboratory USB 20% 5 2016 06

1 Raytheon 10 Forcepoint Ponemon Institute 6 2016 3 7 BYOD 2015 15% 8... 9 (PII) 10

Ponemon 11 40% (DLP) IT RFID IP IT ff ff ff ff ff GARTNER 2018 (UBA) 12 25% 2016 08

1 Forrester 13 12 39% 26% 56% 18% Forcepoint (M&A) Forcepoint SureView 30 USB Web Forcepoint SureView 1. FORCEPOINT 2. 3. 4.

IT 14 Forcepoint (TTP) SI SI TTP JAKU 2016 10

2 JAKU JAKU TTP JAKU Forcepoint Security Labs Security Labs Forcepoint 2015 10 JAKU TTP Forcepoint Richard Ford JAKU JAKU 93 348

JAKU 6 BITTORRENT 2016 12

2 19k JAKU 134

JAKU JAKU (IOC) 2016 5 4 Security Labs Forcepoint Kaspersky Dark Hotel (NCA) CERT-UK Europol Interpol FORCEPOINT 1. 15 2. Torrent 3. DEEPRED RAYTHEON FORCEPOINT DEEPRED 2016 8 DEF CON 2 2016 14

2 LOCKY Forcepoint Security Labs 16 SI FORCEPOINT LOCKY Forcepoint Locky Microsoft Office Forcepoint Security Labs Locky 128 AES SQL Locky Security Labs Locky Forcepoint Security Labs Locky (DGA) 17

DGA 14 Forcepoint 30 18 Forcepoint 23 19 20 3 2 5 21 CTB-Locker (C&C Server) Forcepoint 22 23 24 2016 GLOBAL THREAT REPORT 2016 16

2 2016 GLOBAL THREAT REPORT CTB-Locker AES-256 (Teslacrypt) RSA-2048 CryptoLocker CryptoWall FORCEPOINT 1. 2. 3. 4.

(NGFW) NGFW NGFW FORCEPOINT SECURITY LABS 4 5 6 7 Forcepoint Security Labs TOR ff IP IP (IP) RFC 791 25 IP IP 2016 18

2 ff TCP (TCP) RFC 793 26 TCP TCP ff TCP URG RFC 793 TCP (URG) 2016 1. 2. 3. (C&C) 4. 5. FORCEPOINT 1. 2.

WEB % Web 2015 Office Forcepoint Security Labs 2014 250% Dridex 27 28 Web Web 2015 Identity Theft Resource Center 2015 29 2015 f f 91.7% f f 2.34% f f 44.7% Web f f 68.4% 2014 88.5% Forcepoint Microsoft Office 2015 30 2014 2015 Forcepoint 2014 44.7% 2011 74.0% 2012 76.4% 2013 84.0% 2014 88.5% 2015 68.4% 2016 20

3 WEB 1. ZIP 2. SDOS/WINDOWS 3. 4. MICROSOFT WORD 97 5. MHT 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 1. * 3. 5. 7. 2. 4. 6. 8. * 8 FORCEPOINT 1. Web 2. Web 3.

Harvard Business Review Analytic Services 31 85% IT 60% 32 Ponemon 33 2016 22

4 IT f f 8% IT ff 71% IT * * 2015 1

80% IT IT IT 16% 34 IT 34% 35 IT IDG Enterprise 36 CIO 2016 IT CSA STAR Certification 37 FORCEPOINT 1. (DLP) (NGFW) IT 2. IT IT 3. IT Raytheon 38 2016 24

5 OoCSO THE OFFICE OF THE (S&P) 500 84% (IP) 39 IP

FORCEPOINT 2016 1 14 Websense Raytheon Cyber Products Stonesoft NGFW Forcepoint Websense RCP Stonesoft -DAVE BARTON FORCEPOINT CISO 2016 26

5 OoCSO RCP Websense IP Forcepoint Raytheon (M&A) Raytheon Development and Evaluation (CODE) Center Cyber Operations CODE Center Raytheon

IT Forcepoint Websense RCP Stonesoft IT Forcepoint.com M&A 2016 28

Forcepoint 2016 IT 360 Forcepoint Security Labs Office of the CSO

1. Ponemon Institute LLC. 2015 Cost of Cyber Crime Study: Global. October 2015. https://ssl.www8.hp.com/ww/en/secure/pdf/4aa5-5207enw.pdf 2. Ponemon Institute LLC. Privileged User Abuse & The Insider Threat. May 2014. http://www.raytheoncyber.com/rtnwcm/groups/cyber/documents/content/rtn_257010.pdf 3. Anderson, Ed; Nag, Sid, and Gartner, Inc. Forecast Overview: Public Cloud Services, Worldwide, 2016 Update. February 17, 2016. https://www. gartner.com/doc/3214717?ref=sitesearch&sthkw=security%20concerns%20cloud%20adoption&fnl=search&srcid=1-3478922254 4. Shey, Heidi. Understand The State Of Data Security And Privacy: 2015 To 2016. Forrester Research, Inc., 8 Jan. 2016. https://www.forrester.com/ report/understand+the+state+of+data+security+and+privacy+2015+to+2016/-/e-res117447 5. Mearian, Lucas. Government Tests Show Security s People Problem. Computerworld. July 6, 2011. http://www.computerworld.com/article/2510014/security0/government-tests-show-security-s-people-problem.html 6. Ponemon Institute LLC. Ponemon Study: The Unintentional Insider Risk in United States and German Organizations. July 30, 2015. http://www. raytheoncyber.com/spotlight/ponemon/index.html 7. Bank Director. Bank Director s 2016 Risk Practices Survey. March 21, 2016. http://www.bankdirector.com/download_file/view_inline/4996 8. Identity Theft Resource Center. 2015 Data Breaches ITRC Surveys & Studies ID Theft Blog. January 25, 2016. http://www.idtheftcenter.org/ ITRC-Surveys-Studies/2015databreaches.html 9. Forrester Research, Inc. Global Business Technographics Security Survey, 2015. July 2015. https://www.forrester.com/global Business Technographics Security Survey 2015/-/E-sus2957 10. Forrester Research, Inc. Global Business Technographics Devices And Security Workforce Survey, 2015. August 2015. https://www.forrester. com/global+business+technographics+devices+and+security+workforce+survey+2015/-/e-sus2971 11. Ponemon Institute LLC. Privileged User Abuse & The Insider Threat. May 2014. http://www.raytheoncyber.com/rtnwcm/groups/cyber/documents/content/rtn_257010.pdf 12. Litan, Avivah, and Gartner, Inc. Best Practices and Success Stories for User Behavior Analytics. March 4, 2015. https://www.gartner.com/ doc/2998124/best-practices-success-stories-user 13. Forrester Research, Inc. Global Business Technographics Security Survey, 2015. July 2015. https://www.forrester.com/global Business Technographics Security Survey 2015/-/E-sus2957 14. Forcepoint LLC. Cyber Dwell Time and Lateral Movement THE NEW CYBERSECURITY BLUEPRINT. https://www.forcepoint.com/resources/whitepapers/cyber-dwell-time-and-lateral-movement 15. Forcepoint LLC. Cyber Dwell Time and Lateral Movement THE NEW CYBERSECURITY BLUEPRINT. https://www.forcepoint.com/resources/whitepapers/cyber-dwell-time-and-lateral-movement 16. Vanian, Jonathan. Hollywood Hospital Pays Off Hackers To Restore Computer System. February 18, 2016. http://fortune.com/2016/02/18/hollywood-hospital-hackers-computer-system/ 17. Forcepoint Security Labs and Forcepoint LLC. Locky Ransomware - Encrypts Documents, Databases, Code, BitCoin Wallets and More... February 19, 2016. https://blogs.forcepoint.com/security-labs/locky-ransomware-encrypts-documents-databases-code-bitcoin-wallets-and-more 18. Forcepoint Security Labs and Forcepoint LLC. Locky s New DGA - Seeding the New Domains [RUSSIA UPDATE: 26/FEB/16]. February 25, 2016. https://blogs.forcepoint.com/security-labs/lockys-new-dga-seeding-new-domains 19. @Forcepointsec Twitter handle. March 22, 2016. Tweet, https://twitter.com/forcepointsec/status/712316915687948289 20. Winton, Richard. Hollywood Hospital Pays $17,000 in Bitcoin to Hackers; FBI Investigating. Los Angeles Times. February 18, 2016. http://www. latimes.com/business/technology/la-me-ln-hollywood-hospital-bitcoin-20160217-story.html 2016 30

21. Vijayan, Jai. With $325 Million In Extorted Payments CryptoWall 3 Highlights Ransomware Threat. Dark Reading. October 29, 2015. http:// www.darkreading.com/endpoint/with-$325-million-in-extorted-payments-cryptowall-3-highlights-ransomware-threat/d/d-id/1322899 22. Forcepoint LLC (formerly Websense). The Seven Stages of Advanced Threats. https://www.websense.com/assets/pdf/understanding-the-cyber-attack-infographic.pdf 23. Forcepoint Security Labs and Forcepoint LLC. TorrentLocker is Back and Targets Sweden & Italy. March 15, 2016. https://blogs.forcepoint. com/security-labs/torrentlocker-back-and-targets-sweden-italy 24. Forcepoint Security Labs and Forcepoint LLC. Locky s New DGA - Seeding the New Domains [RUSSIA UPDATE: 26/FEB/16]. February 25, 2016. https://blogs.forcepoint.com/security-labs/lockys-new-dga-seeding-new-domains 25. Information Sciences Institute; University of Southern California. DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION. INTERNET PROTOCOL, September 1981. https://tools.ietf.org/html/rfc791 26. Information Sciences Institute; University of Southern California. DARPA INTERNET PROGRAM PROTOCOL SPECIFICATION. TRANSMIS- SION CONTROL PROTOCOL, September 1981. https://tools.ietf.org/html/rfc793 27. Forcepoint Security Labs and Forcepoint LLC. Dridex Down Under. November 5, 2015. https://blogs.forcepoint.com/security-labs/dridex-down-under 28. Forcepoint Security Labs and Forcepoint LLC. Accounts Payable in the Czech Republic Targeted by Dridex. August 4, 2015. https://blogs. forcepoint.com/security-labs/accounts-payable-czech-republic-targeted-dridex 29. Identity Theft Resource Center. 2015 Data Breaches ITRC Surveys & Studies ID Theft Blog. January 25, 2016. http://www.idtheftcenter. org/itrc-surveys-studies/2015databreaches.html 30. Forcepoint LLC. Websense 2015 Threat Report. April 8, 2015. https://www.websense.com/content/websense-2015-threat-report.aspx 31. Harvard Business Review. How the Cloud Looks from the Top: Achieving Competitive Advantage In the Age of Cloud Computing. 2011. https://hbr.org/resources/pdfs/tools/16700_hbr_microsoft%20report_long_webview.pdf 32. Anderson, Ed; Nag, Sid, and Gartner, Inc. Forecast Overview: Public Cloud Services, Worldwide, 2016 Update. February 17, 2016. https:// www.gartner.com/doc/3214717?ref=sitesearch&sthkw=security%20concerns%20cloud%20adoption&fnl=search&srcid=1-3478922254 33. Ponemon Institute LLC. The Challenges of Cloud Information Governance: A Global Data Security Study. October 2014. http://www2.gemalto.com/cloud-security-research/safenet-cloud-governance.pdf 34. VansonBourne. Shadow IT ITDMs Data Summary. p. 34. July 11, 2014. http://www.vansonbourne.com/files/1914/1225/3447/vb-shadow_ IT-ITDMs-Data-Summary.pdf 35. VansonBourne. Shadow IT BDM Data Summary. p. 24. July 22, 2014. http://www.vansonbourne.com/files/7614/1225/3401/vb-shadow_ IT-BDM-Data-Summary.pdf 36. IDG Enterprise. 2015 IDG enterprise cloud computing survey. November 17, 2015. http://www.idgenterprise.com/resource/research/2015-cloud-computing-study/ 37. CAS Cloud Security Alliance. https://cloudsecurityalliance.org/star/certification/ 38. Raytheon Company, Securing Our Future: Closing the Cyber Talent Gap. October 19, 2015. http://raytheon.mediaroom.com/2015-10-26-many-more-men-than-women-are-drawn-to-cybersecurity-careers-and-the-gap-is-widening-dramatically-new-survey-says 39. Ocean Tomo LLC. Intangible Asset Market Value Study. March 4, 2015. http://www.oceantomo.com/2015/03/04/2015-intangible-asset-market-value-study/

2016 FORCEPOINT Forcepoint Forcepoint THREATSEEKER INTELLIGENCE CLOUD 全球 威脅 Threatseeker Intelligence Cloud Forcepoint 155 Threatseeker Forcepoint Threatseeker Forcepoint Forcepoint, LLC SureView ThreatSeeker TRITON Forcepoint, LLC Raytheon Raytheon Company