Hiding in Plain Sight: The Relationship Between Cyber Attacks and Applications. presented at AusCERT 2014

by Matt Keil,

Summary : With recent high profile security incidents as a backdrop, this session will discuss how today’s cyber threats hide in plain sight amidst your network traffic, making them nearly impossible to defend against. These cyber threats use applications as their infiltration vector, exhibit application-like evasion tactics and they leverage commonly used network applications for exfiltration. Based on data collected from more than 1,300 networks across Australia, New Zealand and Asia Pacific, Palo Alto Networks will analyze the intertwined relationship between cyber attacks and applications.
Topics covered in this session will include:
• Which applications are the most highly targeted.
• Where is the most likely hiding place for command and control traffic.
• How many applications can hop ports or use SSL to evade traditional security measures.
Palo Alto Networks is leading a new era in cybersecurity by protecting thousands of enterprise, government, and service provider networks from cyber threats. Our deep expertise, commitment to innovation and game-changing security platform has made us one of the fastest growing security companies in the market. But more important it’s made us a strategic partner to over 16,000 companies who rely on Palo Alto Networks to protect their most critical assets. Our security platform natively inspects all traffic, inclusive of applications, threats and content, then ties that traffic to the user, regardless of location or device type. With our platform, organizations can safely enable the use of all applications, maintain complete visibility and control, confidently pursue new technology initiatives like cloud and mobility, and protect the organization from cyber attacks — known and unknown