SlideShare a Scribd company logo
1 of 23
© 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Mohamed Abdelhakim
Cell: 480-869-7888 l Email Mohamed.a@att.com
Security without theSeams
© 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
AT&T Cybersecurity
2 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
“U.S. CEOs Are More
Worried About
Cybersecurity Than a
Possible Recession”
2
January 17, 2019
© 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and
service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the
property of their respective owners.
http://fortune.com/2019/01/17/cybersecurity-recession/
3 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Why? Cybersecurityisabusinessproblemthat
mustbe addressedatscale
88%
of survey respondents
reported experiencing at
least one type of security
incident or breach in the
past year.
43% $6Trillion
of attacks target small
business
estimated annual cost of
cybersecurity breaches by
2021
— “Charting a New Course,” AT&T
Cybersecurity Insights, vol 8, September
2018
— SCORE
October 18, 2018
https://www.prnewswire.com/news-releases/43-of-
cyberattacks-target-small-businesses-300729384.html
— 2019 Official Annual Cybercrime Report, Cybersecurity
Ventures, Dec 2018
https://cybersecurityventures.com/cybercrime-damages-6-trillion-by-
2021/
4 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Stepsshouldbetakeneverydaytoaddress
problems atscale
Fear, uncertainty, and doubt
dominate for large, singular events
However, taking steps everyday can
have a much larger impact at scale
15,000
lives are saved by seatbelts
each year in the US
(source: NHTSA)
Cybersecurity must now be addressed at scale
Organized Crime:
Technology Complexity
The rise of digitalization:
MORE ATTACKS
MORE SEAMS
HIGHER SEVERITY
5 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
CybersecurityProgramsToday
$100M+
Annual security spend
100’s 70+
Of security employees and
they are hard to find!
Security solutions
Snapshot of Industry Leaders
”In 2016, JPMorgan upped its
cybersecurity budget from $500M in
2015 to $600M. “
— CB Insights, Jan 2018
"The average enterprise uses 75 security
products to secure their network. "
— CSO, March 2016
“2018-2019: 53% of organizations
report a problematic shortage of
cybersecurity skills.”
— ESG, Jan 2019
6 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Businesses do not get
hacked because they
lack a firewall, anti-
virus, or any other
technology...
Almost all modern cybersecurity
breaches have happened in the
“seams” between people, process,
and technology
7 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Cybersecurity has Evolved
Point Solutions
Stitching together
a ‘patch work quilt’
with many seams!
• Firewalls
• Proxies & Gateways
• Endpoint security
Aggregation
Band-aid for seams,
requiring effort to
integrate. Lacking gap
analysis and process
enforcement
• Log management
• SIEM
• Analytics
Service Providers
Delivers the people without
control of orchestration
technology roadmap
• Consulting
• Managed Security
Service Providers
Integrates the “full stack” of
people, process, and technology
• Cybersecurity Consulting
• Managed Security Services
• Threat Detection & Response
• Integration, orchestration, and
automation
The “Standard Approach”
to Defense
Today
UnifiedSecurity
Management
8 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
AT&TCybersecurity
Unified Security Management
Cybersecurity
Consulting
Software-Defined
Platform
Managed
Security Services
AT&T
Alien Labs
Phenomenal
Threat Intelligence
Security
Without the Seams
Collaborative
Defense
9 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
9 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Threat Intelligence
AT&T Alien Labs provides
the tactical threat
intelligence that integrates
directly with our software-
defined platform for
automated security
engineering, threat
detection, and response.
HighVolume
Data Feeds
AI & Machine
Learning
Human
Expertise
Continuous
Updates
10 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
10 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. *as of Jan. 2019
370KUnique malware samples
analyzed per day
199Countries and
territories with highly
secure connections
225+Petabytes of traffic
per day*
19MDaily threat
indicators to OTX140Countries from which
OTX threat indicators
are submitted
100K
Participants contributing to
Alien LabsOTX (OpenThreat
Exchange), the world’s largest
open threat intelligence
community
100BPotential probes for
vulnerabilities across our
global IP network every
day.
Threat Intelligence At a Glance
11 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
PhenomenalThreatIntelligence
Cybersecurity Consulting Services
Managed Security Services
Software-defined Platform forThreat Detection and Response
Threat Intelligence
Human
Expertise
Continuous
Updates
AI & Machine
Learning
High-Volume
Data Feeds
12 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
CollaborativeDefense
Fightingonlinecrimeisateamsport
No enterprise or vendor should be
fighting alone against modern
cybercriminals.
Collaborative defense utilizes advanced
software-defined platforms to integrate
and orchestrate:
• Threat data across sources
• Security technologies from a number of leading
vendors across threat vectors
13 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Integrating people, process, and technology to help protect your business
SecurityWithouttheSeams
People
Process
Technology
Cybersecurity Expertise
8 Global Security Operations Centers
500+ SOC Analysts Orchestrating ecosystem of
security offerings
14 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
14 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Cybersecurity Consulting
AT&T Cybersecurity
Consulting services help
meet the challenges of an
ever-changing threat
landscape, providing the
insight and tools needed to
establish and maintain
sound cybersecurity
practices.
Cyber Risk
Management
Security
Response
Security
Operations
15 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Cyber Risk Management Security ResponseSecurity Operations
Managed Security Services
Security
Strategy
Compliance &
Regulatory
Training and
Awareness
Architecture, Design &
Transformation
Cyber SOC
Services
Cloud Security
Solutions
Threat Management
Services
Breach
Investigations
Incident Response
Retainer Services
Incident Response
Program
Development
Cybersecurity Consulting Services
Software-defined Platform forThreat Detection and Response
CybersecurityConsultingServices
Threat Intelligence
16 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
WhyAT&TCybersecurityConsulting?
Consulting organization
with 25 year history
One of original PCI
Qualified Security Assessor
firms
HITRUST certified assessor Consultants average 12
years of experience in
Cybersecurity
Board seated members
in CSA, ISA, and HIMMS
Direct
representation
in NCSL
Deep security expertise for solutions that fit — across industries, for
businesses of all sizes
17 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
17 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Managed Security Services
AT&T Managed Security
Services orchestrate best-
of-breed solutions from
across the security
technology landscape. Our
security operations centers
define and implement
processes utilizing industry-
standard best practices. Endpoint Connectivity Data &
Applications
Threat
Management
18 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
ManagedSecurityServicesPortfolio
Endpoints Threat Management
Cybersecurity Consulting Services
Connectivity Applications & Data
Endpoint
Management
IoT
Security
Firewall
Services
Global Security
Gateway
CloudWeb
Security
Threat Manager
Endpoint
Security
Mobile
Threat Defense
CDN
Security
Proxy
Services
DDoS
Defense
Intrusion
Prevention
Encryption
Services
Secure
Email Gateway
Software-defined Platform forThreat Detection and Response
Managed Security Services
Threat Intelligence
19 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
19 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Technology
Behind the orchestration is a
powerful software-defined
platform designed to analyze
security data from across
your environment to
automate threat detection,
and orchestrate with security
technologies to respond and
remediate.
Automation &
Response
Data
Analysis
Threat Detection
20 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
Software-DefinedPlatform
Cybersecurity Consulting Services
Managed Security Services
Automation & Response
Software-defined Platform forThreat Detection and Response
Data Analysis Threat Detection
Threat Intelligence
21 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
FullStackSecurity
Cybersecurity Consulting Services
Managed Security Services
Security
Strategy
Compliance &
Regulatory
Architecture,
Design
& Transformation
Cyber SOC
Services
Breach
Investigations
Incident Response
Program Development
Training and
Awareness
Cloud Security
Solutions
Threat Management
Services
Incident Response
Retainer Services
Endpoint
Management IoT Security Cloud Web Security
Threat Manager
Endpoint
Security
Mobile
Threat Defense
CDN
Security
Proxy
Services
DDoS
Defense
Intrusion
Prevention
Encryption
Services
Secure
Email Gateway
Data Analysis Automation & ResponseThreat Detection
Software-defined Platform forThreat Detection and Response
Firewall
Services
Global Security
Gateway
Threat Intelligence
22 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of
AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners.
OfferingsAcrosstheSecurityLifecycle
Protect & Prevent
Detect & RespondAssess & Plan
Cybersecurity Consulting
• Cyber-risk posture assessment (remote)
• Enterprise risk assessments
• VulnerabilityAssessments and Management
• PenetrationTesting
• Cyber risk assessment (in-person for mid-
market)
• Compliance Reviews and Attestations (Level
1/Level 2 and all service providers for PCI,
HIPAA/NIST, ISO, NIST)
• SecurityTransformation Services
• SecurityTechnology Strategy and Roadmap
• SecurityArchitecture and Design
• Security Policy Design and Implementation
• Cloud SecurityArchitecture and Monitoring
Strategy
Managed Network Security
• Premises based Firewall
• Network based Firewall
• Global SecurityGateway
Managed Web Security
• CloudWeb Security Service
(CWSS)
Managed Email Security
• Secure Email Gateway
Managed Mobile Security
• EMM/UEM
• MobileThreat Defense
(MTD)
Managed Endpoint Security
• Endpoint Security Service
Managed Application Security
• Reactive DDoS
• DDoS Defense
• DDoS Defense public sector
Cybersecurity Consulting
• ActiveThreat Hunting
• FirewallAnalysis and
Migration
• SecurityAwareness and
Training Program
• Identity andAccess
Management
• Cyber SoC design and
implementation
Threat Detection & Response
• USMA
• AT&TThreat Manager
Cybersecurity Consulting
• Incident Response Services
• Post Breach Services
• Cyber SoC optimization
Cyber Insurance Referral Program
At&t cybersecurity introduction with alien vault

More Related Content

What's hot

Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionMarketingArrowECS_CZ
 
Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results Amazon Web Services
 
Planning A Cloud Implementation
Planning A Cloud ImplementationPlanning A Cloud Implementation
Planning A Cloud ImplementationRex Wang
 
Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialAlibaba Cloud
 
Cloud Adoption in the Enterprise
Cloud Adoption in the EnterpriseCloud Adoption in the Enterprise
Cloud Adoption in the EnterpriseAmazon Web Services
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesThousandEyes
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCAST
 
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud Steps
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud StepsAccelerate Cloud Migration to AWS Cloud with Cognizant Cloud Steps
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud StepsAmazon Web Services
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationAlaina Carter
 
Cloud Migration Checklist | Microsoft Azure Migration
Cloud Migration Checklist | Microsoft Azure MigrationCloud Migration Checklist | Microsoft Azure Migration
Cloud Migration Checklist | Microsoft Azure MigrationIntellika
 
The Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical TrialsThe Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical TrialsVeeva Systems
 
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...Simplilearn
 
Cloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudCloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudSafe Software
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewDavid J Rosenthal
 
Post transaction cloud value creation
Post transaction cloud value creation Post transaction cloud value creation
Post transaction cloud value creation Tom Laszewski
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingJim Geovedi
 

What's hot (20)

Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
Cloud Adoption Framework Define Your Cloud Strategy and Accelerate Results
 
Planning A Cloud Implementation
Planning A Cloud ImplementationPlanning A Cloud Implementation
Planning A Cloud Implementation
 
Why a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is EssentialWhy a Multi-cloud Strategy is Essential
Why a Multi-cloud Strategy is Essential
 
Cloud Adoption in the Enterprise
Cloud Adoption in the EnterpriseCloud Adoption in the Enterprise
Cloud Adoption in the Enterprise
 
Realize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyesRealize True Business Value With ThousandEyes
Realize True Business Value With ThousandEyes
 
Multi cloud networking
Multi cloud networkingMulti cloud networking
Multi cloud networking
 
Cloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case StudyCloud Migration: Cloud Readiness Assessment Case Study
Cloud Migration: Cloud Readiness Assessment Case Study
 
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud Steps
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud StepsAccelerate Cloud Migration to AWS Cloud with Cognizant Cloud Steps
Accelerate Cloud Migration to AWS Cloud with Cognizant Cloud Steps
 
A Practical Guide to Cloud Migration
A Practical Guide to Cloud MigrationA Practical Guide to Cloud Migration
A Practical Guide to Cloud Migration
 
Cloud Migration Checklist | Microsoft Azure Migration
Cloud Migration Checklist | Microsoft Azure MigrationCloud Migration Checklist | Microsoft Azure Migration
Cloud Migration Checklist | Microsoft Azure Migration
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
The Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical TrialsThe Industry’s Move Toward Digitally Connected Clinical Trials
The Industry’s Move Toward Digitally Connected Clinical Trials
 
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
What Is Cloud Computing? | Cloud Computing For Beginners | Cloud Computing Tr...
 
Building Your Cloud Strategy
Building Your Cloud StrategyBuilding Your Cloud Strategy
Building Your Cloud Strategy
 
AWS 101
AWS 101AWS 101
AWS 101
 
Cloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the CloudCloud Migration: Moving Data and Infrastructure to the Cloud
Cloud Migration: Moving Data and Infrastructure to the Cloud
 
Microsoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 OverviewMicrosoft 365 eEnterprise E5 Overview
Microsoft 365 eEnterprise E5 Overview
 
Post transaction cloud value creation
Post transaction cloud value creation Post transaction cloud value creation
Post transaction cloud value creation
 
Cloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud ComputingCloud Security - Security Aspects of Cloud Computing
Cloud Security - Security Aspects of Cloud Computing
 

Similar to At&t cybersecurity introduction with alien vault

Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall WebinarAT&T
 
Securing the Internet of Things: What the CEO Needs to Know
Securing the Internet of Things: What the CEO Needs to KnowSecuring the Internet of Things: What the CEO Needs to Know
Securing the Internet of Things: What the CEO Needs to KnowAT&T
 
Managing the Cyberthreat Landscape
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat LandscapeAT&T
 
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...DataWorks Summit/Hadoop Summit
 
Blackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat IntelligenceBlackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat IntelligenceChristopher Doman
 
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020Bernard Marr
 
2015 Cloud Predictions
2015 Cloud Predictions2015 Cloud Predictions
2015 Cloud PredictionsAT&T
 
Final hh - 18.10.4 - erie 5 g evo release
Final   hh - 18.10.4 - erie 5 g evo releaseFinal   hh - 18.10.4 - erie 5 g evo release
Final hh - 18.10.4 - erie 5 g evo releaseHollyHworth
 
ATT: The Power of the Platform
ATT: The Power of the PlatformATT: The Power of the Platform
ATT: The Power of the PlatformCharles Beck
 
Enigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivEnigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivNOAH Advisors
 
Final hh - 18.10.4 - dayton hamilton springfield 5 g evo release
Final   hh - 18.10.4 - dayton hamilton springfield 5 g evo releaseFinal   hh - 18.10.4 - dayton hamilton springfield 5 g evo release
Final hh - 18.10.4 - dayton hamilton springfield 5 g evo releaseHollyHworth
 
Not If, But When: A CEO's Guide to Cyberbreach Response
Not If, But When: A CEO's Guide to Cyberbreach ResponseNot If, But When: A CEO's Guide to Cyberbreach Response
Not If, But When: A CEO's Guide to Cyberbreach ResponseAT&T
 
Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Matteo Fabiano
 
Final hh - 18.10.4 - johnstown 5 g evo release
Final   hh - 18.10.4 - johnstown 5 g evo releaseFinal   hh - 18.10.4 - johnstown 5 g evo release
Final hh - 18.10.4 - johnstown 5 g evo releaseHollyHworth
 
NetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptxNetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptxMansurAli32
 

Similar to At&t cybersecurity introduction with alien vault (20)

Firewall Webinar
Firewall WebinarFirewall Webinar
Firewall Webinar
 
Securing the Internet of Things: What the CEO Needs to Know
Securing the Internet of Things: What the CEO Needs to KnowSecuring the Internet of Things: What the CEO Needs to Know
Securing the Internet of Things: What the CEO Needs to Know
 
Managing the Cyberthreat Landscape
Managing the Cyberthreat LandscapeManaging the Cyberthreat Landscape
Managing the Cyberthreat Landscape
 
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
Near Real-time Outlier Detection and Interpretation - Part 1 by Robert Thorma...
 
Near Real-Time Outlier Detection and Interpretation
Near Real-Time Outlier Detection and InterpretationNear Real-Time Outlier Detection and Interpretation
Near Real-Time Outlier Detection and Interpretation
 
Blackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat IntelligenceBlackhat - Do you trust your Threat Intelligence
Blackhat - Do you trust your Threat Intelligence
 
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
The 7 Biggest Technology Trends That Will Transform Telecoms In 2020
 
2015 Cloud Predictions
2015 Cloud Predictions2015 Cloud Predictions
2015 Cloud Predictions
 
Springfield evo
Springfield evoSpringfield evo
Springfield evo
 
Pittsfield evo
Pittsfield evoPittsfield evo
Pittsfield evo
 
Final hh - 18.10.4 - erie 5 g evo release
Final   hh - 18.10.4 - erie 5 g evo releaseFinal   hh - 18.10.4 - erie 5 g evo release
Final hh - 18.10.4 - erie 5 g evo release
 
ATT: The Power of the Platform
ATT: The Power of the PlatformATT: The Power of the Platform
ATT: The Power of the Platform
 
Enigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel AvivEnigmatos - NOAH19 Tel Aviv
Enigmatos - NOAH19 Tel Aviv
 
Final hh - 18.10.4 - dayton hamilton springfield 5 g evo release
Final   hh - 18.10.4 - dayton hamilton springfield 5 g evo releaseFinal   hh - 18.10.4 - dayton hamilton springfield 5 g evo release
Final hh - 18.10.4 - dayton hamilton springfield 5 g evo release
 
Cape cod evo
Cape cod evoCape cod evo
Cape cod evo
 
Worcester evo
Worcester evoWorcester evo
Worcester evo
 
Not If, But When: A CEO's Guide to Cyberbreach Response
Not If, But When: A CEO's Guide to Cyberbreach ResponseNot If, But When: A CEO's Guide to Cyberbreach Response
Not If, But When: A CEO's Guide to Cyberbreach Response
 
Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020Coming to Tech's Mecca 2020
Coming to Tech's Mecca 2020
 
Final hh - 18.10.4 - johnstown 5 g evo release
Final   hh - 18.10.4 - johnstown 5 g evo releaseFinal   hh - 18.10.4 - johnstown 5 g evo release
Final hh - 18.10.4 - johnstown 5 g evo release
 
NetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptxNetNordic_DDoS-War-Room_25-april-2019.pptx
NetNordic_DDoS-War-Room_25-april-2019.pptx
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsAndrey Dotsenko
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 

At&t cybersecurity introduction with alien vault

  • 1. © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Mohamed Abdelhakim Cell: 480-869-7888 l Email Mohamed.a@att.com Security without theSeams © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&T Cybersecurity
  • 2. 2 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. “U.S. CEOs Are More Worried About Cybersecurity Than a Possible Recession” 2 January 17, 2019 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. http://fortune.com/2019/01/17/cybersecurity-recession/
  • 3. 3 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Why? Cybersecurityisabusinessproblemthat mustbe addressedatscale 88% of survey respondents reported experiencing at least one type of security incident or breach in the past year. 43% $6Trillion of attacks target small business estimated annual cost of cybersecurity breaches by 2021 — “Charting a New Course,” AT&T Cybersecurity Insights, vol 8, September 2018 — SCORE October 18, 2018 https://www.prnewswire.com/news-releases/43-of- cyberattacks-target-small-businesses-300729384.html — 2019 Official Annual Cybercrime Report, Cybersecurity Ventures, Dec 2018 https://cybersecurityventures.com/cybercrime-damages-6-trillion-by- 2021/
  • 4. 4 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Stepsshouldbetakeneverydaytoaddress problems atscale Fear, uncertainty, and doubt dominate for large, singular events However, taking steps everyday can have a much larger impact at scale 15,000 lives are saved by seatbelts each year in the US (source: NHTSA) Cybersecurity must now be addressed at scale Organized Crime: Technology Complexity The rise of digitalization: MORE ATTACKS MORE SEAMS HIGHER SEVERITY
  • 5. 5 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. CybersecurityProgramsToday $100M+ Annual security spend 100’s 70+ Of security employees and they are hard to find! Security solutions Snapshot of Industry Leaders ”In 2016, JPMorgan upped its cybersecurity budget from $500M in 2015 to $600M. “ — CB Insights, Jan 2018 "The average enterprise uses 75 security products to secure their network. " — CSO, March 2016 “2018-2019: 53% of organizations report a problematic shortage of cybersecurity skills.” — ESG, Jan 2019
  • 6. 6 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Businesses do not get hacked because they lack a firewall, anti- virus, or any other technology... Almost all modern cybersecurity breaches have happened in the “seams” between people, process, and technology
  • 7. 7 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Cybersecurity has Evolved Point Solutions Stitching together a ‘patch work quilt’ with many seams! • Firewalls • Proxies & Gateways • Endpoint security Aggregation Band-aid for seams, requiring effort to integrate. Lacking gap analysis and process enforcement • Log management • SIEM • Analytics Service Providers Delivers the people without control of orchestration technology roadmap • Consulting • Managed Security Service Providers Integrates the “full stack” of people, process, and technology • Cybersecurity Consulting • Managed Security Services • Threat Detection & Response • Integration, orchestration, and automation The “Standard Approach” to Defense Today UnifiedSecurity Management
  • 8. 8 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. AT&TCybersecurity Unified Security Management Cybersecurity Consulting Software-Defined Platform Managed Security Services AT&T Alien Labs Phenomenal Threat Intelligence Security Without the Seams Collaborative Defense
  • 9. 9 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. 9 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Threat Intelligence AT&T Alien Labs provides the tactical threat intelligence that integrates directly with our software- defined platform for automated security engineering, threat detection, and response. HighVolume Data Feeds AI & Machine Learning Human Expertise Continuous Updates
  • 10. 10 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. 10 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. *as of Jan. 2019 370KUnique malware samples analyzed per day 199Countries and territories with highly secure connections 225+Petabytes of traffic per day* 19MDaily threat indicators to OTX140Countries from which OTX threat indicators are submitted 100K Participants contributing to Alien LabsOTX (OpenThreat Exchange), the world’s largest open threat intelligence community 100BPotential probes for vulnerabilities across our global IP network every day. Threat Intelligence At a Glance
  • 11. 11 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. PhenomenalThreatIntelligence Cybersecurity Consulting Services Managed Security Services Software-defined Platform forThreat Detection and Response Threat Intelligence Human Expertise Continuous Updates AI & Machine Learning High-Volume Data Feeds
  • 12. 12 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. CollaborativeDefense Fightingonlinecrimeisateamsport No enterprise or vendor should be fighting alone against modern cybercriminals. Collaborative defense utilizes advanced software-defined platforms to integrate and orchestrate: • Threat data across sources • Security technologies from a number of leading vendors across threat vectors
  • 13. 13 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Integrating people, process, and technology to help protect your business SecurityWithouttheSeams People Process Technology Cybersecurity Expertise 8 Global Security Operations Centers 500+ SOC Analysts Orchestrating ecosystem of security offerings
  • 14. 14 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. 14 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Cybersecurity Consulting AT&T Cybersecurity Consulting services help meet the challenges of an ever-changing threat landscape, providing the insight and tools needed to establish and maintain sound cybersecurity practices. Cyber Risk Management Security Response Security Operations
  • 15. 15 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Cyber Risk Management Security ResponseSecurity Operations Managed Security Services Security Strategy Compliance & Regulatory Training and Awareness Architecture, Design & Transformation Cyber SOC Services Cloud Security Solutions Threat Management Services Breach Investigations Incident Response Retainer Services Incident Response Program Development Cybersecurity Consulting Services Software-defined Platform forThreat Detection and Response CybersecurityConsultingServices Threat Intelligence
  • 16. 16 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. WhyAT&TCybersecurityConsulting? Consulting organization with 25 year history One of original PCI Qualified Security Assessor firms HITRUST certified assessor Consultants average 12 years of experience in Cybersecurity Board seated members in CSA, ISA, and HIMMS Direct representation in NCSL Deep security expertise for solutions that fit — across industries, for businesses of all sizes
  • 17. 17 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. 17 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Managed Security Services AT&T Managed Security Services orchestrate best- of-breed solutions from across the security technology landscape. Our security operations centers define and implement processes utilizing industry- standard best practices. Endpoint Connectivity Data & Applications Threat Management
  • 18. 18 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. ManagedSecurityServicesPortfolio Endpoints Threat Management Cybersecurity Consulting Services Connectivity Applications & Data Endpoint Management IoT Security Firewall Services Global Security Gateway CloudWeb Security Threat Manager Endpoint Security Mobile Threat Defense CDN Security Proxy Services DDoS Defense Intrusion Prevention Encryption Services Secure Email Gateway Software-defined Platform forThreat Detection and Response Managed Security Services Threat Intelligence
  • 19. 19 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. 19 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Technology Behind the orchestration is a powerful software-defined platform designed to analyze security data from across your environment to automate threat detection, and orchestrate with security technologies to respond and remediate. Automation & Response Data Analysis Threat Detection
  • 20. 20 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. Software-DefinedPlatform Cybersecurity Consulting Services Managed Security Services Automation & Response Software-defined Platform forThreat Detection and Response Data Analysis Threat Detection Threat Intelligence
  • 21. 21 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. FullStackSecurity Cybersecurity Consulting Services Managed Security Services Security Strategy Compliance & Regulatory Architecture, Design & Transformation Cyber SOC Services Breach Investigations Incident Response Program Development Training and Awareness Cloud Security Solutions Threat Management Services Incident Response Retainer Services Endpoint Management IoT Security Cloud Web Security Threat Manager Endpoint Security Mobile Threat Defense CDN Security Proxy Services DDoS Defense Intrusion Prevention Encryption Services Secure Email Gateway Data Analysis Automation & ResponseThreat Detection Software-defined Platform forThreat Detection and Response Firewall Services Global Security Gateway Threat Intelligence
  • 22. 22 © 2019 AT&T Intellectual Property. AT&T, Globe logo, and DIRECTV are registered trademarks and service marks of AT&T Intellectual Property and/or AT&T affiliated companies. All other marks are the property of their respective owners. OfferingsAcrosstheSecurityLifecycle Protect & Prevent Detect & RespondAssess & Plan Cybersecurity Consulting • Cyber-risk posture assessment (remote) • Enterprise risk assessments • VulnerabilityAssessments and Management • PenetrationTesting • Cyber risk assessment (in-person for mid- market) • Compliance Reviews and Attestations (Level 1/Level 2 and all service providers for PCI, HIPAA/NIST, ISO, NIST) • SecurityTransformation Services • SecurityTechnology Strategy and Roadmap • SecurityArchitecture and Design • Security Policy Design and Implementation • Cloud SecurityArchitecture and Monitoring Strategy Managed Network Security • Premises based Firewall • Network based Firewall • Global SecurityGateway Managed Web Security • CloudWeb Security Service (CWSS) Managed Email Security • Secure Email Gateway Managed Mobile Security • EMM/UEM • MobileThreat Defense (MTD) Managed Endpoint Security • Endpoint Security Service Managed Application Security • Reactive DDoS • DDoS Defense • DDoS Defense public sector Cybersecurity Consulting • ActiveThreat Hunting • FirewallAnalysis and Migration • SecurityAwareness and Training Program • Identity andAccess Management • Cyber SoC design and implementation Threat Detection & Response • USMA • AT&TThreat Manager Cybersecurity Consulting • Incident Response Services • Post Breach Services • Cyber SoC optimization Cyber Insurance Referral Program

Editor's Notes

  1. 160429att_1012_ret_V2.jpg
  2. Organized crime: http://www.verizonenterprise.com/industry/public_sector/docs/2018_dbir_public_sector.pdf Almost three-quarters (73%) of cyberattacks were perpetrated by outsiders. Members of organized criminal groups were behind half of all breaches, with nation-state or state-affiliated actors involved in 12%.