fabricating an environment for cyber riskimages.nam.org/email/department/mbs/leadingedge/... ·...
TRANSCRIPT
eSentire is the largest pure-play Managed Detection and Response (MDR) service provider, keeping organizations safe from constantly evolving cyberattacks that technology alone cannot prevent. Its 24x7 Security Operations Center (SOC), sta�ed by elite security analysts, hunts, investigates, and responds in real-time to known and unknown threats before they become business-disrupting events. Protecting more than $6 trillion in corporate assets, eSentire absorbs the complexity of cybersecurity, delivering enterprise-grade protection and the ability to comply with growing regulatory requirements. For more information, visit www.eSentire.com and follow @eSentire.
IT’S ONLY A MATTER OF TIME TO FIND A BLIND SPOT
THE GREATER YOUR EXPOSURE, THE GREATER THE PROBABILITY BECOMES REALITY²
TRADITIONAL SECURITY APPROACHES PROVE FUTILE, WHILE MEAN TIME TO IDENTIFY AND CONTAIN A THREAT EXTENDS TO DANGEROUS LEVELS
CONFIDENCE IN CAPABILITIES TO QUICKLY DETECT AND CONTAIN AN ATTACK DECREASE WHILE CONSEQUENCES INCREASE
MODERNIZE YOUR CYBERSECURITYTO MEET THE DEMANDS OF TODAY’S THREAT LANDSCAPE
of attackers can achieve in under 10 hours
of attackers can achieve in under 10 hours71 67
Manufacturing: Probability of a breach Fabricating An Environment For Cyber Risk
ADVERSARIES EXECUTE ATTACKS AGAINST MANUFACTURERS FASTER THAN EVER USING TOOLS AND TECHNIQUES DESIGNED TO BYPASS YOUR CYBERSECURITY MEASURES1
of attackers can achieve in under 10 hours78
Malware Phishing Exploit Cumulative
Modernized business demands modernized secur i ty .
eSentire Managed Detection and Response
¹2018 Nuix Black Report²Using data from more than 2,000 deployed eSentire sites, depicts risk rates for organizations that do not have a threat monitoring service in place. Statistical projections are based on the ongoing and cumulative chance attack categories would have been picked up by an eSentire Security Operations Center, which watches for things bypassing traditional security measures in unmonitored environments.
³⁴⁵⁶ 2018 Cyber Risk in Advanced Manufacturing Report⁷⁸ Ponemon: 2018 Cost of a Data Breach Study
⁷⁸Ponemon: 3rd Annual Study on the Cyber Resilient Organization⁹¹⁰¹¹https://www.americanbar.org/groups/law_practice/publications/techreport/2017/security/
SEE EVERTHING MISS NOTHING
ACT BEFORE IMPACT HARDEN AGAINSTFUTURE ATTACKS
24x7x365 monitoring with full spectrum visibility across on-premises, cloud and hybrid IT environments.
Human threat hunting with machine learning-assisted detection uncovers known and never-before-seen attacks.
Embedded incident response accelerates precision and speed, facilitating rapid tactical threat containment.
Root cause investigation and remediation guidance defines corrective actions to harden security postures against evolving threats.
30274839
Locations
Malware
Phishing
Exploit
Cumulative
TAKE ACTION
Per Location: Cumulative Probability of a Security Incident Involving aBypass of a Manufacturer's Security Controls Over a 12-month period²
49% of attackers spend over 20 hours a week researching and bypassing security systems
Breach the Perimeter Identify Critical Data Exfiltrate Data
CONFIDENCE:
• Nearly 50% lack confidence theyare protected⁷
CONSEQUENCES:
• Increased downtime due to a�ected ICS
• 91% of material stolen is related toproprietary information 8
• 3.1% abnormal client churn9
• 48% experienced losses of $500kor more per incident10
168DAYS
mean time to identify a data breach⁷
63DAYS
mean time to contain a data breach⁸
eSentire Managed Detectionand Response (MDR)
1 3 6 920%
40%
60%
80%
100%
• 48% report lack of funding astop barrier regarding cyber risk³
• 50% perform ICS vulnerability testing less than once a month⁴
• 31% have not conducted an ICS assessment⁵
• 39% experienced a breach in the last 12 months⁶