Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
FICO® Cybersecurity Solution Finding Emerging Cyber Threats in Real Time You are the frontline of defense Your business partners are counting on you to ensure information security and network integrity and deliver on several security imperatives. Among them: anticipating and resolving business risks, securing intellectual property, safeguarding the flow of digital information and protecting your company’s reputation. Is your team ready to fight the most sophisticated and complex cyber threats? © 2015 Fair Isaac Corporation. All rights reserved. 2 Finding Emerging Cyber Threats in Real Time You are under attack as you read this Yet many attacks will stay under the radar of most businesses for weeks or even months. By the time most new cyber threats are discovered, they have already damaged your network, your business and, potentially, your customers. Cyber criminals are more aggressive and inflicting more damage The gap between cyber attacks and discovery is growing faster. A recent report* found that nearly 100% of cyber attacks now 100% inflict damage within days – some within just hours. That represents time frame is holding constant at less than 25%, so the gap between compromise and discovery is actually getting wider. The right cybersecurity solution should close that gap and keep it closed. * Source: Verizon 2015 Data Breach Investigations Report % WHERE DAYS OR LESS a 20% increase from 2004. Yet discovery of breaches within the same 75% 50% 67% 55% 55% 61% 67% 62% 67% 89% 62% 77% 45% 25% Attackers’ time to compromise Companies’ time to discovery 2004 2006 2008 2010 2012 2014 © 2015 Fair Isaac Corporation. All rights reserved. 3 Finding Emerging Cyber Threats in Real Time A lot is on the line when it comes to cybersecurity A retailer’s market cap plummeted nearly US$5 billion after a cybersecurity breach. Can your business afford that? The hard truth is that the damage from a cybersecurity breach extends far beyond the initial hit to your stock price. Breaches impose significant financial and reputational costs in the short-term, and over a longer horizon. Long term Midterm Short term Expensive system upgrades Costs of investigation and litigation, lost customers and sales Increasing supplier and vendor skepticism Reduced employee productivity, morale and retention Erosion of brand equity “Defensive” advertising and PR campaigns © 2015 Fair Isaac Corporation. All rights reserved. 4 Finding Emerging Cyber Threats in Real Time Transform cybersecurity now – or risk everything To detect unknown threat patterns and emerging risks, your cybersecurity system must evolve. Today, an effective cybersecurity solution incorporates: Real-time analysis to recognize cyber crime while it is happening – not months after the fact Scoring and prioritizing functions, so that your resources can be deployed against the worst attacks An analytic infrastructure that constantly learns then adjusts automatically to identify and counter new attack vectors © 2015 Fair Isaac Corporation. All rights reserved. 5 Finding Emerging Cyber Threats in Real Time Apply analytics to cybersecurity Data scientists at FICO use unique algorithms to identify breaches and data loss, in real time. Drawing on decades of experience in fraud detection, security and compliance, FICO created the FICO® Cybersecurity Solution. It allows teams to identify threats and fight cyber crime with: • Real-time, predictive, streaming analytics • Machine-learned, multilayered self-calibration • Threat scoring and threat review workflows for prioritizing responses • A proven, effective consortium model © 2015 Fair Isaac Corporation. All rights reserved. 6 Finding Emerging Cyber Threats in Real Time The FICO® Cybersecurity Solution 0 1 1 1 1 0 SELF-CALIBRATING MODELS 0 0 1 1 0 1 1 0 TRANSACTION PROFILES 0 1 1 0 010 10 0 1 FICO ® CYBERSECURITY SOLUTION ALERT MANAGEMENT INTERFACE DECISION ENGINE security strategy 0 1 1 1 1 R CONSORTIUM CYBE INVESTIGATIVE CAS ES 1 1 ASON CODE S + RE S ORE SC CYBER CONSORTIU M 0 0 1 SELF-LEARNING ANALYTICS 1 0 fills a critical gap in your FICO’s proprietary, rigorous testing in financial services firms informed its uniquely robust cybersecurity solution. Differentiating dimensions of the FICO Cybersecurity Solution include: • Transaction profiling • Self-calibrating outlier analytics • Global profiles S RT SCO E AL RES + REASON CODES + • Consortium analytics © 2015 Fair Isaac Corporation. All rights reserved. 7 Finding Emerging Cyber Threats in Real Time Self-calibrating outlier analytics detect emerging threats in real time Streaming analytics distinguish malicious anomalies Detection capabilities that adapt on the fly Actionable scoring and threat review • Current industry solutions use • Automated, self-calibrating FICO’s threat scoring and threat historical signature models that, models generate a dynamic review workflows help accelerate by definition, are out of date. perspective on network activity. your response. Updates to • FICO’s self-calibrating outlier • Another benefit: Self-calibrating analytics identify emerging threat vectors, in real time. models do not require constant revision as policies or rules change. archetypes, belief propagation and clique analysis combine to help you categorize, prioritize and address the gravest threats quickly. © 2015 Fair Isaac Corporation. All rights reserved. 8 Finding Emerging Cyber Threats in Real Time Multiple layers of self-calibration enhance security • Each hidden node is a separate self-calibrating model • Factor analysis is used to minimize correlation of features in nodes • Output weighting of hidden nodes can be tuned to improve performance or study effectiveness Self-Calibration In the FICO® Cybersecurity Solution Input node Hidden node Output node DNS Requestor IP Flow Resolved IP Case review Requestor IP + Web Log Domain Name DHCP Domain Name Other Weights tuning Multilayer self‑calibrating score Review threshold © 2015 Fair Isaac Corporation. All rights reserved. 9 Finding Emerging Cyber Threats in Real Time FICO’s cyber consortium deepens your cyber insight Unlike other solutions, the FICO® Cybersecurity Solution seamlessly combines threat information from other organizations. Sharing and synthesizing information about rare pattern exemplars, new threat archetypes and global network topologies closes critical gaps in each consortium member’s knowledge. First deployed successfully to protect payments organizations, the FICO consortium approach strengthens companies’ cybersecurity defenses continually. © 2015 Fair Isaac Corporation. All rights reserved. 10 Finding Emerging Cyber Threats in Real Time We are in this fight together Your business partners, suppliers and customers trust you to keep them secure. The FICO® Cybersecurity Solution uses innovative, predictive analytics to help you detect new threats and remove them before they can do damage. The FICO Cybersecurity Solution fills a critical security gap. It safeguards and protects your precious business assets: your reputation, intellectual property, and sensitive customer and financial information. We help you stay secure, today and tomorrow. Learn more Download:View: Hot Topics in Cybersecurity Q&A FOR MORE INFORMATION www.fico.com www.fico.com/en/blogs NORTH AMERICA +1 888 342 6336 [email protected] Cybersecurity video LATIN AMERICA & CARIBBEAN +55 11 5189 8267 [email protected] EUROPE, MIDDLE EAST & AFRICA +44 (0) 207 940 8718 [email protected] FICO is a trademark or registered trademark of Fair Isaac Corporation in the United States and in other countries. Other product and company names herein may be trademarks of their respective owners. © 2015 Fair Isaac Corporation. All rights reserved. 4118BK_EN 06/15 PDF ASIA PACIFIC +65 6422 7700 [email protected]