SlideShare a Scribd company logo
The NoN
Evolution of
Security
Matt Suiche
@msuiche / m@comae.io
Founder, ComaeTechnologies
About us
 UAE-based Cyber Security start-up
 Building the most comprehensive and powerful memory forensics
platform of the industry.
 Services / Advising
 Founded by Matt Suiche
 Co-Founder & Chief Scientist of CloudVolumes (VMware AppVolumes)
 Microsoft MVP Enterprise Security since 2009
 BlackHat Review Board Member
 Shakacon Program Committee
More and more companies
Source: Crunchbase
More and more fund raisers
Source: Crunchbase
More and more money
Source: Crunchbase
2010-2016
Source: Crunchbase
Top acquirers
Source: Crunchbase
Top startups
Source: Crunchbase
Critical ExploitableVulnerabilities
Vulnerability trends Up and Down
Increased investment cost per exploit
5 Critical Attributes
1. Identify
2. Protect
3. Detect
4. Respond
5. Recover
5 Critical Attributes
1. Identify
2. Protect
3. Detect
4. Respond
5. Recover
Top current trends
 Endpoint Protection Platform (EPP)
 Endpoint Detection and Response (EDR)
 Next-Generation AntiVirus
 EPP and EDR will most likely consolidate in the future.
Top #10 BlackHat USA 2016 talks
 The Linux Kernel Hidden insideWindows 10 by Alex Ionescu
 Measuring Adversary Costs to Exploit Commercial Software:The Government- Bootstrapped Non-ProfitC.I.T.L. by Mudge +
Sarah Zatko
 Breaking Kernel Address Space Layout Randomization (KASLR) with IntelTSX byYeongjinJang + Sangho Lee +Taesoo Kim
 Keystone Engine: Next Generation Assembler Framework by Nguyen Anh Quynh
 Advanced CAN InjectionTechniques forVehicle Networks by Charlie Miller + Chris Valasek
 Demystifying the Secure Enclave Processor byTarjei Mandt + Mathew Solnik + David Wang
 Analysis of the Attack Surface ofWindows 10Virtualization-Based Security by Rafal Wojtczuk
 Windows 10 Mitigation Improvements by Matt Miller + David Weston
 DPTrace: Dual PurposeTrace for Exploitability Analysis of Program Crashes by Rodrigo Branco + Rohit Mothe
 Pay No Attention toThat Hacker Behind the Curtain: A Look Inside the Black Hat Network by NeilWyler + Bart Stump
References
 https://medium.com/@msuiche/infosec-why-be-a-criminal-when-you-can-be-rich-
cde579a35a99#.qaewr4eir
 https://medium.com/@msuiche/infosec-top-acquirers-and-top-start-ups-
cabc0ea7f74a#.p2a7cn8fc
 https://medium.com/@msuiche/infosec-top-acquirers-and-top-start-ups-
cabc0ea7f74a#.p2a7cn8fc
 https://medium.com/@msuiche/infosec-ipos-vs-acquisitions-ff40f45e7cfd#.aq8dawjei
 https://www.blackhat.com/us-16/schedule.html
 http://blogs.gartner.com/anton-chuvakin/2015/12/03/where-does-edr-end-and-ng-av-begin/
Contact
m@comae.io (@msuiche) or support@comae.io
More information on www.comae.io (@comaeio)

More Related Content

Keynote Session : The Non - Evolution of Security