Image Title

Search Results for EFCC:

Derek Manky, Fortinet | CUBEconversation


 

(upbeat music) >> Welcome to a CUBEConversation. I'm Peter Burris with Wikibon SiliconAngle. I am having a great conversation today with Derek Manky, who's a global securities strategist at Fortinet. >> Yes sir. >> Lots to talk about, Derek. I don't want to be too topical here, but still, why don't you tell us exactly what a global security strategist does. >> Yeah. So, obviously I've got a global region. We're looking at the past, the present, and the future. When I say that, we're looking at past events, learning from security, we're looking at present events, reacting to them, trying to beat the bad guys to the punch, doing advanced research on darknet, but also looking at statistical trends and modeling, a lot like a weather forecast. So, we're doing modeling as to where threats in the future, based on our expertise, knowledge and, obviously, a global telemetry base of data. Billions and billions of data points we look at. >> Everybody knows that this is enormous, that security in the past informed the current, and we are all worried about the future, but let's talk about where we are right now. >> Derek: Sure, sure, yeah. >> What is the state of things in global cybersecurity? >> It's flashing red, unfortunately, we're in this state. And what I mean by this is, CSOs and the likes always have to look at flashing red on their dashboards. They're a lot like car alarms and we get so many events that are happening day in and day out and we need to start looking at them and prioritizing: How do we respond to these events? What's the severity level of these? What are these events? And the context around that and why it matters. We look at a lot of events that are happening today, obviously we get into the IoT world, that's here, mobile threats are here. We've gone from, just from one year ago, we had about 2% of the global tax that we see were mobile, that number is reaching close to 10% now, so mobile threat activity is accounting for nearly 10% of all global activity that we're seeing. IoT is the next rising star that we're seeing in that as well. That's really the state that we're seeing. >> So, there's no really new normal in global cybersecurity, it's constantly changing, so give us an assessment and some insights into how the threat target is changing. What is the surface area and the surface attack area that we're worried about as we go forward? >> Sure. Up and to the right. What I mean by that is when I say that, we're seeing, obviously, volume increasing, and we're seeing the level of sophistication increasing in the threats as well. A lot more automated clever techniques are being put into threats. The attack surface is shifting into the IoT world, as I mentioned. Some of the top attacks we're seeing are CCTV cameras, which by the way, are not closed-circuit anymore, IP security cameras, we're looking at DVRs, consumer-grade routers, printers, all of these different devices now that are not just, obviously Windows-based as well. Because of that, the amount of volume of threats is increasing that attack surface, there's much more interconnectivity into these devices, which is a very large issue. We're dealing with a zero-patch environment now, as well. The reality is there's just not enough patches readily available for these devices too. And again, that comes back to the security strategy piece, we have to strategize. >> We're used to thinking about PCs being attacked, or servers being attacked, what happens if your router gets hacked in this way? Give us a little insight into how that propagates into a problem. >> Yeah, so worm-like activity, we look at a lot of, what I'm calling, shadow nets. These are IoT botnets. What I mean by that is you get a piece of code like Mirai, Hajime, there's also other flavors of this that we're seeing out there that basically look to propagate like a worm, spread from router to router, or different device to different device, plant malicious code. And then, once they have that, obviously, the device is compromised and it can be used for anything. It can be used for altering DNS traffic, hijacking credentials, it can be used to launch a DDos attack, like we saw with Mirai last year, as well. It's also being used now for more sophisticated attacks, so we look at like the Hajime botnet. Unlike Mirai, which I would consider more of a non-intelligent botnet, it's just using brute force techniques, Hajime is using automated techniques to download new password lists and try different attacks using updated and dynamic intelligence as being built into this automated code now as well. >> That sounds like it's an enormous amount of fun (laughs). We're talking mainly about devices at this point in time, but when we think about digital business, Wikibon likes to say that digital business is different from business in how a digital business uses data. And the idea that data is increasingly becoming an asset and is a differentiator for your business, especially in how you do things from engagement standpoint. How is the idea of data as an asset and the need for these new threats, this new landscape, going to come together over the course of the next few years? >> Yeah, absolutely. That's a really good point, what you bring up. Data is highly sought after by these threats. The initial stage of attack is building infrastructure and that's been done. We talk about these IoT botnets as gaining a foothold into networks where data is either stored or in transit, especially on mobile. And when we look at how data is stored or in transit, often enough it's stored for too long, it's too persistent, it's not stored properly, it's not hashed or salted and these sorts of techniques, and it's often, it may be going to the wrong places, or giving permission to the wrong users. These threats now that have a foothold onto these devices, can easily scrape and use data, send to their command and control operators, botnet operators, and then that data, as you are very well aware, can be used multiple times. We're seeing this data used, obviously, sold through crime services, sold on data dumps, on darknet. It's being used for things like identity theft, money mules, and laundering. We worked on a case last year with the EFCC in Nigeria, and INTERPOL, that's the expert working panel I'm on, we took down a $60 million crime ring. The heart of that crime ring was money laundering and that all revolves around identity theft, as well, which is all data. >> Right. So, let's build on this a little bit because one of the things I think people frequently get wrong is they don't understand data as an asset and that a crucial feature of it is it can be copied, and can be applied in two places at once. Now, that has a lot of business implication, but let's talk about the security implication. If somebody steals my money, I immediately know that my money is gone. If somebody steals my data, I may not know that my data is gone because it can be copied, and it can be reapplied and reused and I may never know it. Now, we're looking at a recent breach here at a big supplier's credit services, 165 million accounts being hacked. That might have only taken five minutes to download the data associated with those 165 million accounts, but that was probably a persistent, a few months, or maybe years getting to that point. What does a business have to do differently, from a security standpoint, to actually be able to capture those smaller events that may not have immediate proximate damage, but lead to a big hack like this? >> Yeah, absolutely, that's a really good point. Obviously, the threat landscape is extremely volatile. There's a lot of different characteristics or features you have to look for in these attacks. You're completely right, most of these attacks we see can play resident for months on networks. In fact, they want to lay as silent and as stealthy as possible. As I said, it's much more tricky today because threats are becoming more sophisticated to try to obfuscate into data flows and to try to remain silent on networks. What can be done, from an organization standpoint, is absolutely turning it around, looking at detection first. Threat intelligence, applying threat intelligence to detection. You need advanced threat intelligence to be able to find advanced threats. We're talking about solutions like SIEM, and so forth. Once you can see that threat activity on the network, that's key. Obviously, launching into incident response, how we deal with this, shut down that threat to mitigate the window because, otherwise, if you have a wide open window, obviously, more data is going to be leaked, the more data is leaked, the more damage and collateral damage is going to be done. >> And that's, still we're talking about consumers, which are problematic. But, when we start talking about critical infrastructure, we're talking about the social fabric itself. >> Yes. >> What new visibility, because Fortinet and auto research are on this, what visibility does Fortinet have into what's going on with some of the new critical infrastructure security--? >> Yeah, so looking at our threat landscape report, unfortunately, this is the normal still. I wouldn't say it's the new normal, in this case, because we're seeing 90% of organizations that are still facing attacks on application vulnerabilities that are three years or older. When we look critical infrastructure, it is over nine times, if we look at all industries, and just compare critical infrastructure to that baseline, so we're nine times higher with the tax on these application vulnerabilities. And so, the problem, unfortunately, with critical infrastructure, we're still seeing a lot of attacks on these IoT devices that are connected, the CCTV cameras, other things like that, that can be used as launchpads because they're not traditionally inspected by security. They're in a tough position with critical infrastructure, also healthcare, and ICU, critical care networks, because they're resistant to patch sometimes because if the patch is done, it could break. They have critical services and processes behind there that it could break it, but at the same time, what we're experiencing is that they're under rapid fire and if they don't patch, it's going to be much more damage done because we're seeing tremendous volume on the tax to those vulnerable applications lying on the networks. >> We now have a situation where we're trying to secure our critical infrastructure, which affects everybody, individuals have to be more cognizant of the role that a breach in their home network or their IoT devices can play. Increasingly, we're thinking about: How do we start putting together the idea of brand trust and security? Talk a little bit about how security is going to enter into the lexicon of brand, brand preference, and starting with what brands are going to have to do to transmit their commitment to security. >> Yeah, so again, we're talking about digital assets, when it comes to that. I think when it comes to brand integrity, if we flashback 10 years, I think, people had a false sense of security. They wouldn't really think twice about where their data is going, how that data is stored, and so forth. But, now that we're seeing consumers having a direct impact, when there are these massive data breaches, I think consumers are finally starting to become much more security conscious. That mentality, switching from that false sense of security, is really going to start having them have that cyber hygiene and have that daily thought process of where's my data going and they should have this. Where is my data going? Who is storing that? What are their security practices? Being able to readily access that sort of information on security posture. I think it's going to be critical moving forward-- >> So, what is it? Because this is very complex stuff, there are a limited number of people in the world who understand this really deeply. You're one of them, obviously. What does a consumer, then, have to know about security to be able to make that type of assessment? Because that's going to lead to some new conventions that we can start to promulgate and diffuse for how to get smarter about things. Is there like one or two things that someone has to be really aware of right now, questions that they can ask to get to that point where you're saying that they could be, therefore, smarter about how to evaluate different brands? >> I think they really have to, just at a basic level, treat their identity, treat their information, like the keys to their car, or their keys to their house, and their family's. It has to be personal, and so they have to be able to understand that they have a part to play, but they also have to understand that if I walk into a house and I leave the keys on the table somewhere and walk out, that somebody else can still easily access that. As opposed to me putting the keys to my car in a locker when I'm somewhere else. That is what they have to understand is that their assets, where they store those assets, and how they transmit those assets, is ultimately going to come back and impact them. >> If Wikibon says that digital business is about a business using data differently, in a matter of respects about what we're talking about, is digital life is a recognition, an acknowledgement, that data is playing a different role in your life and being really, really clear about that as an asset in the way that you conduct yourself. >> Yeah. And I think moving forward, that's just going to become even more critical. As I said, we're going to have more and more, as I said, with the world of IoT coming now, there's going to be more and more impact on daily life, there are more transit points for those data to go to. >> But the reality is, even though you're right, people don't, we might have been saying, "What about digital security?" a number of years ago because it wasn't on the forefront of everybody's minds. There are things that people can do to be smarter about this, treat your digital identity as an asset and be careful about it, but the reality is, most of us aren't really going to be smart enough to really make good decisions in this regard, we're going to rely on automation. Also, as you said earlier, we know that the bad guys are doing more with automation. Even if automation is not the complete goal, how are we going to fight more automation, on the bad guys' side, as we try to have more people involved in these good digital security practices? >> Yeah, there's a couple of approaches to that. First of all, number one, there is a severe, this is not a surprise or news, but there's a severe shortage in cybersecurity professionals out there. As you said, not a lot of people understand this stuff deeply, especially when we get down to the consumer level. How can we arm them to defend against all of this automation that the black hats are doing? We need to fight automation with automation. We need defensive measures, we need scalable security solutions, interconnected security solutions, security solutions that integrate threat intelligence, as well, to be able to identify the different stages of these threats. And the key here is quickly reacting to that because these threats are moving so quickly from the black hats' side, automated defense layers need to be able to identify those aspects of the threats and then make decisions, this is the key part, make a decision. This is what I call actionable intelligence. A security solution that can make a decision on its own, it's what I refer to as an expert system, is what's required to be able to block those, so that the people who don't know anything about these threats and worse, respond to them too slowly, don't have to do those measures. This is the idea of having an integrated intelligent security fabric. >> And where are we going to get that? >> Our approach is the security fabric. This is the Fortinet security fabric where we can take integrated intelligence, scale it up and make automated decisions that humans, we don't have to get rid of the humans, but we can repurpose the humans for that nature. >> Derek, once again, great insight. I think we'll call it a wrap there. Once again, this has been a CUBEConversation. I'm Peter Burris, Wikibon, and Derek Manky, who's the global securities strategist at Fortinet. Derek you and I have had, a couple of times, have talked, and every time it's been really insightful. The work you guys do is absolutely essential in today's world, so thank you very much for doing that. >> Yeah, it's a pleasure, anytime. >> Until we have another opportunity to speak again, track CUBEConversations, let's get the signal out of the noise. (upbeat music)

Published Date : Sep 10 2017

SUMMARY :

Welcome to a CUBEConversation. Lots to talk about, Derek. Billions and billions of data points we look at. that security in the past informed the current, that number is reaching close to 10% now, What is the surface area and the surface attack area And again, that comes back to the security strategy piece, what happens if your router gets hacked in this way? that basically look to propagate like a worm, and the need for these new threats, and it's often, it may be going to the wrong places, to actually be able to capture those smaller events the more damage and collateral damage is going to be done. And that's, still we're talking about consumers, and just compare critical infrastructure to that baseline, individuals have to be more cognizant of the role I think it's going to be critical moving forward-- questions that they can ask to get to that point and so they have to be able to understand and being really, really clear about that as an asset there's going to be more and more impact on daily life, Even if automation is not the complete goal, And the key here is quickly reacting to that that humans, we don't have to get rid of the humans, I'm Peter Burris, Wikibon, and Derek Manky, let's get the signal out of the noise.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Derek MankyPERSON

0.99+

Peter BurrisPERSON

0.99+

DerekPERSON

0.99+

five minutesQUANTITY

0.99+

EFCCORGANIZATION

0.99+

oneQUANTITY

0.99+

90%QUANTITY

0.99+

NigeriaLOCATION

0.99+

$60 millionQUANTITY

0.99+

FortinetORGANIZATION

0.99+

last yearDATE

0.99+

two placesQUANTITY

0.99+

165 million accountsQUANTITY

0.99+

INTERPOLORGANIZATION

0.99+

nine timesQUANTITY

0.99+

three yearsQUANTITY

0.99+

billionsQUANTITY

0.99+

over nine timesQUANTITY

0.99+

twiceQUANTITY

0.99+

one year agoDATE

0.98+

HajimeORGANIZATION

0.98+

Wikibon SiliconAngleORGANIZATION

0.98+

todayDATE

0.98+

WikibonORGANIZATION

0.97+

BillionsQUANTITY

0.97+

10 yearsQUANTITY

0.97+

nearly 10%QUANTITY

0.96+

about 2%QUANTITY

0.96+

FirstQUANTITY

0.96+

WindowsTITLE

0.96+

two thingsQUANTITY

0.91+

WikibonPERSON

0.89+

MiraiTITLE

0.88+

firstQUANTITY

0.86+

of years agoDATE

0.75+

10%QUANTITY

0.75+

next few yearsDATE

0.73+

MiraiORGANIZATION

0.66+

dataQUANTITY

0.65+

themQUANTITY

0.6+

zeroQUANTITY

0.57+

CUBEConversationsTITLE

0.44+

Derek Manky, Fortinet | Fortinet Accelerate 2017


 

>> Narrator: Live from Las Vegas, Nevada, it's the Cube, covering accelerate 2017, brought to you by Fortinet. Now here are your hosts, Lisa Martin and Peter Burris. >> Hi, welcome back to the cube, we are live in Las Vegas at Fortinet Accelerate 2017. I'm you host , Lisa Martin, joined by my cohost, Peter Burris, and we're really excited about or next guest. We are talking next with Derek Manky. Derek, you are-- first of all, welcome to the cube. >> Thank you very much, I'm excited to be here. >> You have a really important role in Fortinet, you are the Global Security Strategist. >> Correct, yes. >> You have a... Established yourself as a thought leader with over 15 year of cyber security expertise, and your goal is to make a positive impact towards the global war on cyber-crime, that's a big goal. >> That's a very, very big goal, but it's a big hairy goal, but it's... Critically important, I believe, I firmly believe this over my whole career, and I'm starting to see some good traction with the efforts that we're doing too. >> And it's becoming more, and more, critical every day as breaches, and hacks, are a daily occurrence, you're also the leader of FortiGuard Labs, you've got a team of over 200, tell our viewers that can't be here today, what is FortiGuard Labs, what are you doing to leverage threat intelligence to help Fortinet's customers. >> Sure, so we're trying to manage complexity, cause that's always the enemy of security, and we're trying to make it simple across the board, so we're managing security for all of our customers, 300 000 customers plus. That's a big deal, so we had to invest a lot into that in terms of how we can do that to make it simple to the end users. So what FortiGuard Labs is, is it's services we deliver to the end user, protection services across the spectrum, our whole product portfolio. So we have world-class expertise as a security vendor, 200 plus people on the team, experts in each domain. We have researchers, and experts, looking at things like industrial attacks, mobile problems, malicious websites, ripping apart, what we call reverse engineering, malware samples to find out digital fingerprints of who's creating these attacks, so we can work also in partnerships with that too. At the end of the day, we have the humans working on that, but we've also invested a ton into artificial intelligence, and machine learning, we have to comb through over 50 billion attacks in a day, and so the machines are also helping us to create a lot of this automated protection, that's all driven by our patents, by our world-class development teams, that gets down to the end user, so that they don't have to invest as much into their own security operations centers, cause that's a big OpEx, expansions to the expenditure, so we're helping to alleviate that issue, especially with this, as everybody knows, today, the big gap in cyber security, professionals, so that helps to alleviate that issue too. >> You said 50 billion attacks a day. >> That's correct sir, yes. Potential attacks. >> Oh, potential attacks. Clearly that means that increasing percentages of the total body of attacks are no longer coming from humans, they're coming from other things, >> Derek: Absolutely. >> And how's that playing out? >> It's a fascinating landscape right now. With every legitimate model, there's an illegitimate model to follow, especially with cyber crime, and what we see in the digital underground, dark web, all these sorts of things, you rewind back to the 90s, your opportunistic hacker was just trying to plot, plot, plot, a message bar on a Windows 95, or Windows 98 system at the time. Nowadays, of course, the attack surface has grown tremendously. You look back to DARPA, back in 1989, it had 60 000 system connected on the Internet, now we have IPv6, 20 plus billions connected devices, everything is a target now, especially with the Internet of Things. Smart televisions-- >> Peter: And a potential threat. >> Exactly, and a weapon. >> Exactly, and so to capitalize on that, what we're seeing now is cyber criminals developing automated systems of their own, to infect these systems, to report back to them, so they're doing a lot of that heavy work, to the heavy lifting, using their own machines to infect, and their own algorithms to infect these systems, and then from there, it'll escalate back up to them to further capitalize, and leverage those attacks. On any given minute, we're seeing between 500 000 to 700 000 hacking attempts across, and this is our own infrastructure, so we're leading in terms of firewalls in units shipped so we're able to get a good grasp on intelligence out there, what's happening, and in any given minute, well over 500 000 hacking attempts on systems worldwide. >> So every hour, 30 million. >> Derek: Yeah that's some quick math. >> Yeah, I'm amazing at multiplication. I almost got it wrong though, I have to say. 30 million hacks an hour. >> Yeah, and so our job is to identify that, we don't want to block things we shouldn't be, so there has to be a very big emphasis on quality of intelligence as well, we've done a lot with our machines to validate attacks, to be able to protect against those attacks, and not, especially when it comes to these attacks like intrusion prevention, that attack surface now, we got to be able to not just look at attacks on PCs now, so that's why that number keeps ticking up. >> Lisa: Right, proliferation of mobile, IoT. >> Derek: It's directly related, absolutely. >> So, this is clearly something that eyeballs are not going to solve. >> Not alone, so I'm very, very big advocate saying that we cannot win this war alone, just relying even on the brightest minds on the world, but we can also not just rely a hundred percent on machines to control, it's just like autonomous vehicles. You look at Tesla, and these other vehicles, and Google, what they're doing, it's a trust exercise again, you can never pass a hundred percent control to that automation. Rather you can get up to that 99 percent tile with automation, but you still need those bright minds looking at it. So to answer your questions, eyeballs alone, no, but the approach we've taken is to scale up, distribute, and use machines to identify it, to try to find that needle in a haystack, and then, escalate that to our bright minds, when we need to take a look at the big attacks that matter, and solve some more of the complex issues. >> Speaking of bright minds, you and your team, recently published an incredible blog on 2017 predictions. Wow, that's on the Fortinet blog? >> Derek: Yeah, that's correct >> We can find that? Really incredibly thorough, eye-opening, and there were six predictions, take us through maybe the top three. We talked about the proliferation of devices, the attack surface getting larger, more and more things becoming potential threats, what are the top three, maybe biggest threats that you were seeing, and is there any industry, in particular, that pops up as one of the prime targets? >> Absolutely. I'll get into some buckets on this, I think first, and foremost, what is primary now in what we're seeing is, what we're calling, autonomous malware, so this is the notion of, basically what we're just talking about to your question on what's driving this data, what's driving all these attack points. First of all, the Internet's been seeded with, what I call, ticking time bombs right now, we have 20 plus, whatever the number's going to be, all of these billions of devices that are connected, that are inherently, in my professional opinion, insecure. A lot of these devices are not following proper security development life cycles. >> Lisa: Is there accountability to begin with? >> No, not at this point. >> Right. >> Right. And that's something that DHS, and NIST, just released some guidelines on, at the end of last year, and I think we're going to see a lot of activity on accountability for that, but that has to be taken care of. Unfortunately right now, it's been seeded, this attack surfaces there, so we already have all these open avenues of attack, and that's why I call it a ticking time bomb, because it's been seeded, and now these are ripe for attack, and we're seeing attackers capitalize on this, so what we're seeing is the first indications of autonomous malware, malware that is capable of mapping out these vulnerable points. The machine's doing this, and the machine's attacking the other machines, so it's not just the eyeballs then, and the cyber criminals doing this. We saw last year, unprecedented DDoS attacks, this is directly related to Mirai BotNet. We had gone from a 600 gig to terabit plus DDoS attacks, that was unheard of before. They are leveraging all of these different IoT devices as a horsepower to attack these systems in a massive distributed denial-of-service attack. The interesting part about Mirai is that it's also using open-source intelligence as well, so this is something that humans, like a black hat attacker, would typically have to do, they would have to get reports back from one of their systems, and say, "okay, now I've found all these vulnerable systems, I'm going to attack all these systems.", but they're the glue, so they're now removing themselves as the glue, and making this completely automated, where a BotNet like Mirai is able to use Shodan, as an example, it's an open-source database, and say, "here are a whole bunch of vulnerable systems, I'm going to go attack it, and so that's to my point of view, that's the first indication of the smart-malware, because malware has always been guided by humans. But now, I think, we're starting to see a lot of, more of that intelligent attack, the offense, the intelligent offense being baked in to these pieces of malware. So I think it's going to open this whole new breed of attacks and malware, and obviously, we're in a whole new arms race when it comes to that. How can we get ahead of the bad guys, and so this is obviously what Fortinet instituting on the autonomous defense, our Security Fabric, and Fabric-ready approach, that's all about, beating them to the punch on that, having our machines, the defensive machines talk to each other, combine world-class intelligence like FortiGuard so that it can defend against those attacks, it's a though task, but I really firmly believe that this year is a year that we have the advantage, we can have the advantage as white hats to get one leg up on the black hat attackers. As I said, for 15 years at FortiGuard Labs, we have invested a ton into our AI machine, learning intelligence, so we're experts on the automation, I don't believe the black hat attackers are experts on automation. So I think for that reason, we have a really good opportunity this year, because you always hear about the black hats, another data breach, and all these things happening, they're always had the advantage, and I think, we can really turn the tables this year. >> You have some great experience working, not just in the private sector, but in the public sector as well, you've done work with NATO, with Interpol, with SERT, what is your perspective on public sector, and private sector, working together, is that essential to win this war on cyber crime? >> Absolutely, we need everybody at the table, we cannot win it, as one single vendor alone, a good example of that is, we're starting to do across the board, this is something, I firmly believe in, it's really near and dear to my heart, I've worked on it for the course of, well over six years now, and we have a lot of the existing partnerships, across organizations, so other security vendors, and experts, Cyber Threat Alliance is an excellent example, we're a founding member of that, and these are competitors, but security vendors getting together to level the playing field on intelligence, we can still really remain competitive on the solutions, and how we implement that intelligence, but at least-- it's like a Venn diagram, you look at that attack surface out there, you want to try to share all that information, so that you can deliver that to security controls, and protect against it. So, the Cyber Threat Alliance is a good example, but that's private sector. If you look at National Computer Emergency Response, law enforcement, we have made great inroads into that working with the likes of Computer Emergency Response, to give them intel. If we find bad stuff happening somewhere, we're not law enforcement, we can't go take the server down, and disrupt campaign, we can't arrest, or prosecute people, but they can, but they don't have all that expertise, and intelligence that we do, all the data points, so this is, you're starting to see a lot of this string up, and we're doing a lot of leadership in this area, and I think, it's absolutely essential. President Obama last year mentioned it, the Cyber Threat Alliance, and the public-private sector, needing to work together in one of his speeches at Stanford, and I believe it's the only way we can win this. You have to go up to the head of the snake too, if we just are always on the defense, and we're always just trying to disrupt cyber criminals, it's a slap on the wrist for them, they're going to go set up shop somewhere else. We need to be able to actually go and prosecute these guys, and we had a really good case last year, we took down, working with Interpol, and the EFCC, a 62 million dollar crime ring in the US. They went, and prosecuted the kingpin of this operation, out of Nigeria. It's an unprecedented random example, but we need to do more of that, but it's a good example of a healthy working public-private sector relationship >> What an incredible experience that you have, what you have achieved with FortiGuard Labs, what excites you most, going forward, we're just at the beginning of 2017, with what's been announced here, the partnerships that you guys have formed, what excites you most about this year, and maybe... Some of the key steps you want to take against cyber crime as Fortinet. >> Sure, so I think we want to, so Cyber Threat Alliance is a very big machine, there's a lot of exciting things happening, so that's going to be a really good initiative, that's going to carry forward momentum this year. What excites me most? Well, it's not always a good thing I guess, but if you look at all the bad news that's out there, like I said, I think it's just going to be, there's so much fuel, that's being thrown on the fire when it comes to attacks right now. Like I said, these time bombs that have been planted out there. We're going to see the year of IoT attacks for sure, a new version of Marai has already come out, they're starting to sell this, commercialize this, and it's even more advanced in terms of intelligence than the previous one, so that sort of stuff. It depends on your definition of the word, excites, of course, but these are the things that we have opportunity, and again I think going back to my first point, the white hats having, for the first time in my point of view, a leg up on the black hats, that opportunity, that really excites me. When we look at what's happening, moving forward in 2017, healthcare, I think, is going to be a very big thing in terms of attack targets, so we're going to be focused on that, in terms of attacks on, not just healthcare records, which are more valuable than financial records as an example, but medical devices, again the IoT play in healthcare, that's a big deal, we're starting to already see attacks on that. Smart cities as well, you look forward to the next three years, building management systems, a lot of people talk about SCADA industrial control, this is definitely a big attack target to a certain... Attack surface, obviously, power plants, electrical grids, but building management systems, and these automated systems that are being put in, even smart vehicles, and smart homes is another big target that's unfolding over the next year. >> Hard to air gap a home, and certainly not a city. >> Absolutely, yeah, and again it goes back to the point that a lot of these devices being installed in those homes are inherently, insecure. So that's a big focus for us, and that's a big thing FortiGuard is doing, is looking at what those attacks are, so we can defend against that at the network layer, that we can work with all of our business partners that are here at Accelerate this year, to deliver those solutions, and protect against it. >> Wow, it sounds like, and I think Peter would agree, your passion for what you do is very evident, as those bad actors are out there, and as the technologies on the baton are getting more advanced, and intelligent, as you say, it's great to hear what you, and your team are doing to help defend against that on the enterprise side, and one day on the consumer side as well. So Derek Manky, Global Security Strategist for Fortinet, thank you so much cube and sharing your expertise with us. >> It's my pleasure, any time, thank you very much. >> Well, on behalf of my cohost, Peter Burris, I'm Lisa Martin, you've been watching the Cube, and stick around, we'll be right back. (electronic music)

Published Date : Jan 11 2017

SUMMARY :

brought to you by Fortinet. Peter Burris, and we're really excited I'm excited to be here. you are the Global Security Strategist. and your goal is to make a positive impact and I'm starting to see some good traction threat intelligence to so that they don't have to invest as much That's correct sir, yes. of the total body of Nowadays, of course, the attack surface Exactly, and so to capitalize on that, though, I have to say. so there has to be a very proliferation of mobile, IoT. Derek: It's directly are not going to solve. and solve some more of the complex issues. Wow, that's on the Fortinet blog? as one of the prime targets? the number's going to be, but that has to be taken care of. and I believe it's the Some of the key steps happening, so that's going to Hard to air gap a home, that at the network layer, and as the technologies on the baton time, thank you very much. and stick around, we'll be right back.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Peter BurrisPERSON

0.99+

DerekPERSON

0.99+

Lisa MartinPERSON

0.99+

EFCCORGANIZATION

0.99+

NISTORGANIZATION

0.99+

LisaPERSON

0.99+

Derek MankyPERSON

0.99+

2017DATE

0.99+

NATOORGANIZATION

0.99+

FortinetORGANIZATION

0.99+

InterpolORGANIZATION

0.99+

1989DATE

0.99+

DHSORGANIZATION

0.99+

FortiGuard LabsORGANIZATION

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

USLOCATION

0.99+

TeslaORGANIZATION

0.99+

NigeriaLOCATION

0.99+

15 yearsQUANTITY

0.99+

Las VegasLOCATION

0.99+

30 millionQUANTITY

0.99+

600 gigQUANTITY

0.99+

200 plus peopleQUANTITY

0.99+

last yearDATE

0.99+

six predictionsQUANTITY

0.99+

PeterPERSON

0.99+

Windows 95TITLE

0.99+

Windows 98TITLE

0.99+

PresidentPERSON

0.99+

99 percentQUANTITY

0.99+

first pointQUANTITY

0.99+

SERTORGANIZATION

0.99+

Cyber Threat AllianceORGANIZATION

0.99+

20 plusQUANTITY

0.99+

AccelerateORGANIZATION

0.99+

62 million dollarQUANTITY

0.99+

first timeQUANTITY

0.99+

firstQUANTITY

0.99+

700 000QUANTITY

0.99+

each domainQUANTITY

0.98+

this yearDATE

0.98+

over 15 yearQUANTITY

0.98+

oneQUANTITY

0.98+

billionsQUANTITY

0.98+

FirstQUANTITY

0.98+

next yearDATE

0.98+

over 200QUANTITY

0.98+

90sDATE

0.98+

Las Vegas, NevadaLOCATION

0.98+

300 000 customersQUANTITY

0.97+

FortiGuardORGANIZATION

0.97+

over 50 billion attacksQUANTITY

0.97+

hundred percentQUANTITY

0.97+

top threeQUANTITY

0.97+

SCADAORGANIZATION

0.97+

over six yearsQUANTITY

0.97+

BotNetORGANIZATION

0.96+

500 000QUANTITY

0.96+

30 million hacksQUANTITY

0.95+

50 billion attacks a dayQUANTITY

0.95+

first indicationsQUANTITY

0.94+

60 000 systemQUANTITY

0.93+