Threat Landscape vs Threat Management Thomas Ludvik Næss Country Manager Threat Landscape Past, Present and Future So it begins… in the year of 1802

Joseph Marie Jacquard

3 Copyright 2017 Trend Micro Inc. Very first … 1971

•The Creeper system, an experimental self-replicating program, is written by Bob Thomas at BBN Technologies to test John von Neumann's theory.[2] Creeper infected DEC PDP-10 computers running the TENEX operating system. Creeper gained access via the ARPANET and copied itself to the remote system where the message "I'm the creeper, catch me if you can!" was displayed. The program was later created to delete Creeper.[3]

Source: https://en.wikipedia.org/wiki/Timeline_of_computer_viruses_and_worms

4 Copyright 2017 Trend Micro Inc. May 1974 – World´s first “Spam” sent…

5 Copyright 2017 Trend Micro Inc. Cybercrime Business Development

Business CRIMEWARE Email Destructive Compromise Attacks/ Mobile Ransomware Attacks Targeted Attacks W eb DAMAGE CAUSED DAMAGE Intelligent Threats Botnets

Spyware Spam Mass W orm Mailers Outbreaks Vulnerabilities

2001 2003 2004 2005 2007 2010 2012 2015 2016 brand new malware of these infects only one every second! machine…

…cybercrimers spends more time deleting their trails. I will never be YES YOU hacked! WILL!! World Economic Forum - The Global Risks Report 2017

9 Copyright 2017 Trend Micro Inc. RANSOMWARE GROWTH WILL PLATEAU IN 2017, BUT ATTACK METHODS AND TARGETS WILL DIVERSIFY.

10 Copyright 2017 Trend Micro Inc. IOT DEVICES WILL PLAY A BIGGER ROLE IN DDOS ATTACKS; IIOT SYSTEMS IN TARGETED ATTACKS.

11 Copyright 2017 Trend Micro Inc. THE SIMPLICITY OF BUSINESS EMAIL COMPROMISE ATTACKS WILL DRIVE AN INCREASE IN THE VOLUME OF TARGETED SCAMS IN 2017.

12 Copyright 2017 Trend Micro Inc. BUSINESS PROCESS COMPROMISE WILL GAIN TRACTION AMONG CYBERCRIMINALS LOOKING TO TARGET THE FINANCIAL SECTOR.

13 Copyright 2017 Trend Micro Inc. ADOBE AND APPLE WILL OUTPACE MICROSOFT IN TERMS OF PLATFORM VULNERABILITY DISCOVERIES.

14 Copyright 2017 Trend Micro Inc. CYBERPROPAGANDA WILL BECOME A NORM.

GENERAL DATA PROTECTION REGULATION IMPLEMENTATION AND COMPLIANCE WILL RAISE ADMINISTRATIVE COSTS ACROSS ORGANIZATIONS.

THREAT ACTORS WILL COME UP WITH NEW TARGETED ATTACK TACTICS THAT CIRCUMVENT CURRENT ANTI-EVASION SOLUTIONS.

15 Copyright 2017 Trend Micro Inc. Face Reality With a Hollistic Approach

Cloud and Complex Consumerization Virtualization Networks

16 Copyright 2017 Trend Micro Inc. State of the Art Threat Management Cloud based & Big Data Analytics Driven Threat Intelligence since 2004

Global Threat Intelligence Threat Researchers

• 100 TB analyzed daily • 450 researchers • 500k new threats daily • Threat lifecycle and • 800M+ good file whitelist distribution research • 100s of millions of sensors • 3k+ external vulnerability & exploit researchers (ZDI)

18 Copyright 2017 Trend Micro Inc. 19 Copyright 2017 Trend Micro Inc. SMART Maximizes protection

Intrusion Prevention Sandbox Application Analysis Control

Machine Integrity Learning Monitoring

Behavioral Response & Analysis Containment Anti-Malware & Content Filtering

20 Copyright 2017 Trend Micro Inc. OPTIMIZED Minimizes IT impact

Intrusion Prevention Sandbox Application Analysis Control

Machine Integrity Learning Monitoring

Behavioral Response & Analysis Containment Anti-Malware & Content Filtering

21 Copyright 2017 Trend Micro Inc. CONNECTED Speeds time to protect, detect and respond

22 Copyright 2017 Trend Micro Inc. Protect Against Advanced Threats Known Known Unknown LEGEND Good Bad

Anti-Malware & Content Filtering Intrusion Prevention (IPS) & Firewall Integrity Monitoring & Log Inspection Application Control

Machine Learning

Behavioral Analysis

Safe files & Malicious files & actions allowed Custom Sandbox Analysis actions blocked

23 Copyright 2017 Trend Micro Inc. ANALYZER INSPECTOR VISIBILITY AND CONTROL Layered Defense on WCRY (and all other threats)

25 Copyright 2017 Trend Micro Inc. Market Leadership Position

The market leader Recommended Breach Detection System Highest and Furthest to the Right in in server security for 3 straight years, and the Leader’s Quadrant in the Gartner for the 7th straight year Recommended Next-generation IPS Magic Quadrant for Endpoint Protection Platforms, Jan 2017

Leader in Gartner Magic Quadrant for Intrusion Detection and Prevention #1 in protection and performance Systems, January 2017

• Source: IDC, Securing the Server Compute Evolution: Hybrid Cloud Has • NSS Labs Breach Detection Test Results (2014-2016); Transformed the Datacenter, January 2017 #US41867116 NSS NGIPS Test Results, 2016 • https://resources.trendmicro.com/Gartner-Magic-Quadrant- 26 Copyright 2017 Trend Micro Inc. Endpoints.html • http://www.trendmicro.com/us/business/cyber-security/gartner-idps-report/ • av-test.org (Jan 2014 to Dec 2016) Trend Micro

. 28 years focused on security software Enterprise . Headquartered in Japan, Tokyo Exchange Nikkei Index (4704) . Annual sales over $1B US . Customers include 45 of top 50 global corporations

. 5500+ employees in over 50 countries Midsize Business

500k commercial customers & Small 155M endpoints protected Business ConsumersConsume r

27 Copyright 2017 Trend Micro Inc. [email protected]