- There is no security silver bullet
- Review of the complete attack timeline of Cobalt Strike
- Layered defenses need to work together
The theme at the Gartner Security Summit this year highlights IT security as everyone’s business in the digital age. I appreciate this as a theme because there is no silver bullet when it comes to cybersecurity. If any vendor makes this statement, they have either not been in cyber for very long or are lying to you. The ever-increasing industry shortage of cybersecurity professionals does not make it any easier either.
This begs the question; how do you protect your organization against the ever-changing threat landscape? Cyber resilience takes planning and implementation of multiple security layers, each with very critical jobs to improve organizational security strategy while ensuring business agility.
When implementing layered security, it’s not good enough to deploy point solutions that don’t work together. Or you will end up with your Security Operations Center (SOC) inundated with security incidents that require investigation from multiple products for potentially the same threat. All without context. Worse, the volume of incidents cannot be processed. Roughly 30 percent of alerts are not investigated due to lack of time. How much of a risk does this pose to your organization?
Except for WannaCry, GandCrab, GoldenEye/NotPetya, GandCrab, Ryuk, SamSam, to name a few, most adversaries want to remain as stealthy as possible. But there are some commonalities in the way organizations get breached. Every successful, and unsuccessful, attack steps can be mapped to the kill chain. The kill chain is not a new concept. But it is a very effective tool to use when evaluating how well your security posture stacks up to attacker TTPs (tactics, techniques, and procedures).
At Gartner this year, Bitdefender will be delivering a session that showcases the complete attack timeline of Cobalt Strike, used primarily for penetration testing, that the notorious criminal group Carbanak used to infiltrate financial institutions. We will use the kill chain to highlight what technologies can be employed to detect and remediate targeted attacks as quickly as possible.
Why is the important and why should you attend?
The Carbanak group have successfully stolen over $1.2 billion from organizations in over 40 countries. Despite their leader’s arrest last year, the cybercriminal group continues to remain active to this day. This case study review is the result of detailed analysis performed by the Bitdefender forensics teams on one of their latest attacks, and exclusively provides an intimate view of how the attack occurred step by step. During the session, we will also present how combining advanced hardening, endpoint detection and response (EDR), and network analytics in an end-to-end breach security platform can stop such attacks, and dramatically improve the overall security posture of an organization.
With the average cost of a cyberattack now exceeding $1 million, Security should be everyone business.
Don’t miss this exciting session and register now for ‘Bitdefender: Carbanak + Cobalt Strike: Anatomy of An APT & Beating It with EDR & Network Analytics’ on Monday, June 17th at 11:30 AM. Be sure to stop by our booth #129 to see a demo.