Incident Response. Six Best Practices for Managing Cyber Breaches.
|
|
|
- Reynold Newton
- 10 years ago
- Views:
Transcription
1 Incident Response Six Best Practices for Managing Cyber Breaches
2 What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices for Collecting Volatile Data Page 2
3 Data is the Lifeblood of Your Company Business Intelligence Company Data Page 3
4 Data is the Lifeblood of Your Company Business Intelligence Company Data Epicenter of Risk Page 4
5 Cyber Security Trends Ninety percent of businesses were hit by a cyber security breach in Breaches cost $500,000 or more, for up to 41 percent of the businesses reporting a breach. And the top two endpoints under attack are laptops and mobile devices. 52 percent of respondents say that 10 percent or less of their IT budget is allocated to security 40 percent of respondents didn t know the source of the attacks 52 percent said insider abuse led to security breaches at their companies and 48 percent cited malicious software downloads Source - survey of surveyed 583 IT and security professionals: Page 5
6 Firewalls rated most effective at 86% DLP near the bottom, rated 38% effective Multiple technologies must be layered for effective security. *Source: 2010 Cybersecurity Watch Survey Page 6
7 Large Data Breaches Heartland Payment Systems 130 million records hacked January 2009 Target Corporation 70 to 110 million records hacked November 2013 TJX Companies, Inc. 94 million records hacked January 2007 Sony Corporation 77 million records hacked April 2011 National Archives 76 million records improper disposal, October 2009 Epsilon 60 million records hacked March 2011 LivingSocial, Inc. 50 million records hacked April 2013 RockYou, Inc. 32 million records hacked December 2009 Zappos.com 24 million records January 2012 Page 7
8 Your Challenges are Many Perimeter defense is never enough With new technologies, come new exploits Threats can also be internal and/or inadvertent A determined hacker will find a way (high end) Hacking has become productized (low end) Attacks will continue 24/7/365 Page 8
9 Your Challenges are Many Continued Anonymity will challenge attribution Malware will be custom designed for specific targets You live in a zero-day environment if you don t know about it, it is zero day to you Polymorphic/metamorphic code is prevalent and evades signature-based detection Defenders have to be right 100% of the time Page 9
10 You ve been compromised now what? Your network security has been breached now what do you do? Your data is leaving Is the threat internal or external? Inadvertent or malicious? Was there malware involved? Where was it? Where is it now? What does it look like? Find it, where it went, what it morphed to, and remediate it. Page 10
11 IR Techniques and Considerations The traditional method of collecting digital evidence and subsequently examining that evidence has been to shutdown the system, either gracefully or by pulling the plug, and then image all the media contained within the system for later static analysis. With the advancement of malware today and memory-only resident malicious code that never touches the hard disk, it is extremely important to try to capture the contents of memory for inclusion in your overall analysis methods. Page 11
12 Advanced Persistent Threat A major problem is the advanced clandestine compromise of a network by sophisticated attackers, known as an APT or Advanced Persistent Threat a buzzword that is still a real threat. [APT is used throughout the industry with differing meanings. It is really a specific targeted attack with an intended outcome.] An APT is intrusion into a network using multiple, sophisticated recon methods that is very hard to eradicate due to the use of stealthy techniques. An APT often has five phases: 1. Reconnaissance 2. Attack 3. Compromise 4. Install backdoor 5. Persistent exploitation Page 12
13 Typical Incident Response Timeline Time to detection could be weeks or months Typical manual incident response time is several days In contrast, network-enabled incident response can be real or near time, and automated with integration into a Security Information and Event Management (SIEM) application. Page 13
14 Incident Response: Six Best Practices for Managing Cyber Breaches Page 14
15 Best Practice #1: Prepare Training Incident response process planning Tools and trends Security awareness Tools Layered security Manual vs. network-enabled response Process Understand sensitive data location and use Keep systems patched and up-to-date Ongoing vulnerability testing Implement full incident response process Test the process with regular fire drills The Veterans Administration unplugged employees and contractors who do not complete CS training. Source: Page 15
16 Best Practice #2: Identify and Expose The art of SIEM is to at best identify exactly the critical situations which need to be handled. Not more, not less. Martin Kuppinger, Founder and Principal Analyst, KuppingerCole The problem is, no organization can do that perfectly no SIEM is ever tuned to such a fine degree of precision so that only the critical situations which need to be handled are immediately presented to the incident response team. Use network-enabled cyber forensics tools to quickly reveal suspect or mutating software on any system in your network through SIEM integration Cross-platform Speed is essential to find and collect actionable volatile data Source: Page 16
17 Best Practice #3: Triage Understand the extent of the compromise or capabilities of the malware Zero in on the biggest threats first Determine if personal identifying information and/or intellectual property was compromised Page 17
18 Best Practice #4: Contain Remotely collect malware and relevant data with network-enabled forensic tools Collect and preserve volatile data as evidence (more in a bit) Capturing the crucial malware and artifacts to determine remediation steps It is polymorphic or metamorphic? Page 18
19 Best Practice #5: Recover & Audit Remediate systems by deleting all malicious or unauthorized code Both on the identified systems and then proactive remediation network wide Conduct a sensitive data audit of the affected systems Personal identifying information Intellectual property Classified materials etc. Page 19
20 Best Practice #6: Report & Lesson Learned Consult relevant data breach notification regulations Breach notification plan for internal stakeholders (Legal, IT, PR, Executive team etc.) Reporting no matter how smart you are, if no one can understand your report, they won t understand the value you are contributing Lessons Learned What did we intend to do? What went right? What went wrong? What can we do better? Adapt, document and implement Page 20
21 In Depth: Best Practices for Collecting Volatile Data Page 21
22 Why volatile data? What is volatile data? Why is it so important to the incident response process? How would an examiner use this data? How does you relate volatile data to static data in order to assess threats and risks? Page 22
23 Volatile Data Defined Volatile data exists in the main memory (RAM) of a server or workstation; if power is lost or a system fault occurs, the data will be lost. Volatile data includes: Currently logged on user TCP and UDP port information In contrast static (or nonvolatile) data is information stored on hard drives, USB devices, CDs, etc., and is typically not lost when a power loss or system fault occurs. Open files Running processes and applications Encrypted volumes and RAM drives System resource utilization. In general, volatile data stored in RAM is used by the system for administration and processing purposes. Page 23
24 Heisenberg Principle and Incident Response Because you will be collecting volatile data on a live system, things will constantly be changing as information is being gathered and copied. One of the principles of quantum physics is the Heisenberg Uncertainty Principle named after Werner Heisenberg. Heisenberg formulated the principle associated with measuring the location of an atomic particle or the motion of that same atomic particle in space, but not being able to do both because the action of one procedure alters the outcome of the second. This is due to the fact that in order to measure it, you have to stop its motion. The same principle applies in incident response today; you cannot collect volatile data without inadvertently introducing additional data during the collection process. You also can t stop the computer or freeze its activity while you copy the exact state everything is in. Therefore the order in which you collect the volatile data is important. Data that is considered more volatile than others should be collected first. Order of volatility Memory contents (RAM) Network information Running process information Disk contents (static data) Page 24
25 Collecting Volatile Data Collecting volatile data is similar to photographing and documenting a crime scene. Keeping with the analogy, the ability to get an accurate picture of the volatile data from a running machine is referred to as a snapshot. Snapshots gather volatile data and provide information on what was occurring on a system at a given point in time. A volatile data snapshot can then be analyzed in an attempt to discover the source and extent of an intrusion or compromise as well as provide leads for additional investigation. Page 25
26 What volatile data can reveal Volatile data may reveal invaluable information both during and after an incident has occurred. Analysis of volatile data captures can answer questions such as: Are any ports open that should not be? Are unfamiliar services or machines accessing the system? Are unknown applications or processes executing? Such information helps you determine what was happening on the system at the point in time the snapshot was taken, and if an attack was actively occurring. Page 26
27 Correlation with Static Data The correlation of volatile data and static data is essential, but not exhaustive to the incident response and examination process. Volatile data can help you determine if suspicious activities or applications are active on a system and help guide you in the search for backdoors or malicious code. Additionally it may help you determine who and what is accessing the system and its resources whether internal or externally. One of the most important aspects of volatile data capture is that it provides you with the ability to quickly ascertain if unauthorized ports, processes, or applications are active. This information is critical when deciding whether to continue system operation or take the system offline. This is a crucial component of incident response triage; the ability to rapidly determine to what extent if any a system has been compromised. Page 27
28 Volatile Data Components Process memory dumps Dumps of memory areas used to run specific processes (identified via process ID number or PID). Open ports Open ports are the active endpoints to a logical TCP or UDP connection on a system at a particular point in time. Active sockets/current connections As open ports indicate active endpoints, active connections are established sockets or vectors of communication between two endpoints (application to application, or host to host). *NOTE: It is important to obtain information about the actual programs that have opened ports or are responsible for active sockets. Page 28
29 Volatile Data Components Active processes Active processes are the executables that are running on a computer at a particular point in time, including hidden processes Active services Active services are those programs that are being run (and sometimes autostarted) as a service on the system (e.g., DHCP Client). Open files Open files are the files that are in use on a computer at a particular point in time. Currently logged on users A record of those users currently logged on or interacting with the system. Page 29
30 Volatile Data Components Scheduled jobs Scheduled jobs are tasks that have been entered into the Task Scheduler for completion/execution. Cached NetBIOS name table This table maps the NetBIOS names of recently connected hosts to their IP addresses. Internal routing tables These tables show the current routing information the system uses to route outgoing data. Encrypted volumes or RAM drives These are volumes that appear as normal storage volumes to the user, but will be closed or locked if viewed offline. Page 30
31 Requirements of Volatile Data Acquisition While capturing volatile data from systems is a critical component of the incident management and response process, there are several considerations for which an investigator must plan. Among other requirements NIST urges that the collection of volatile data be: Performed with minimal invasiveness (NIST guidelines) Performed as early in the process as possible Preserved for further or future analysis Performed using a repeatable process to prevent inconsistencies Page 31
32 Key Takeaways Page 32
33 Key Takeaways Your network security will be breached...it is a reality of the world in which we operate and do business How quickly you identify the breach; stop the exfiltration of personal data, intellectual property or classified material; and remediate the threat makes all of the difference in risk, cost and exposure There are six essential phases to an incident response that you need to know, and prepare for, to successfully manage a cyber breach Preserve volatile data as quickly as possible, using best practices Page 33
34 Questions? Page 34
35 Thanks! Richard Thompson Page 35
Incident Response. Six Best Practices for Managing Cyber Breaches. Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software
Incident Response Six Best Practices for Managing Cyber Breaches Nick Pollard, Senior Director Professional Services EMEA / APAC, Guidance Software www.encase.com 2014 Guidance Software Inc., All Rights
Things To Do After You ve Been Hacked
Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
ADVANCED THREATS IN THE ENTERPRISE. Finding an Evil in the Haystack with RSA ECAT. White Paper
ADVANCED THREATS IN THE ENTERPRISE Finding an Evil in the Haystack with RSA ECAT White Paper With thousands of workstations and servers under management, most enterprises have no way to effectively make
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
The Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Incident Response. Proactive Incident Management. Sean Curran Director
Incident Response Proactive Incident Management Sean Curran Director Agenda Incident Response Overview 3 Drivers for Incident Response 5 Incident Response Approach 11 Proactive Incident Response 17 2 2013
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
EnCase Analytics Product Overview
GUIDANCE SOFTWARE EnCase Analytics EnCase Analytics Product Overview Security Intelligence through Endpoint Analytics GUIDANCE SOFTWARE EnCase Analytics EnCase Analytics Key Benefits Find unknown and undiscovered
EnCase Cybersecurity. Network-enabled Incident Response and Endpoint Data Control through Cyberforensics. GUIDANCE SOFTWARE EnCase Cybersecurity
GUIDANCE SOFTWARE EnCase Cybersecurity EnCase Cybersecurity Network-enabled Incident Response and Endpoint Data Control through Cyberforensics Supplied and supported in the UK and Ireland by Phoenix Datacom
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
Agenda. 3 2012, Palo Alto Networks. Confidential and Proprietary.
Agenda Evolution of the cyber threat How the cyber threat develops Why traditional systems are failing Need move to application controls Need for automation 3 2012, Palo Alto Networks. Confidential and
Using LYNXeon with NetFlow to Complete Your Cyber Security Picture
Using LYNXeon with NetFlow to Complete Your Cyber Security Picture 21CT.COM Combine NetFlow traffic with other data sources and see more of your network, over a longer period of time. Introduction Many
Protecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
The Next Generation Security Operations Center
The Next Generation Security Operations Center Vassil Barsakov Regional Manager, CEE & CIS RSA, the Security Division of EMC 1 Threats are Evolving Rapidly Criminals Petty criminals Unsophisticated Organized
Endpoint Threat Detection without the Pain
WHITEPAPER Endpoint Threat Detection without the Pain Contents Motivated Adversaries, Too Many Alerts, Not Enough Actionable Information: Incident Response is Getting Harder... 1 A New Solution, with a
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM
The Benefits of Integrating File Integrity Monitoring with SIEM Security Information and Event Management (SIEM) is designed to provide continuous IT monitoring, actionable intelligence, incident response,
How To Handle A Threat From A Corporate Computer System
Politics of Security Webcast Summary Cyber Threat News and APT Defenses Introduction Stories about cyber espionage and Advanced Persistent Threats (APTs) are part of the mainstream news cycle. Concerns
Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION
Making the difference between read to output, and read to copy GOING BEYOND BASIC FILE AUDITING FOR DATA PROTECTION MOST OF THE IMPORTANT DATA LOSS VECTORS DEPEND ON COPYING files in order to compromise
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
How To Test For Security On A Network Without Being Hacked
A Simple Guide to Successful Penetration Testing Table of Contents Penetration Testing, Simplified. Scanning is Not Testing. Test Well. Test Often. Pen Test to Avoid a Mess. Six-phase Methodology. A Few
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Security strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
Guidance Software Whitepaper. Best Practices for Integration and Automation of Incident Response using EnCase Cybersecurity
Guidance Software Whitepaper Best Practices for Integration and Automation of Incident Response using EnCase Cybersecurity 60% [of organizations] plan to automate incident remediation within 24 months
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
AB 1149 Compliance: Data Security Best Practices
AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California
UNCLASSIFIED. http://www.govcertuk.gov.uk. General Enquiries. Incidents [email protected] Incidents [email protected].
Version 1.2 19-June-2013 GUIDELINES Incident Response Guidelines Executive Summary Government Departments have a responsibility to report computer incidents under the terms laid out in the SPF, issued
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense
A Trend Micro Whitepaper I February 2016 Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense How Trend Micro Deep Security Can Help: A Mapping to the SANS Top 20 Critical
What Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 [email protected] Presented by: Rob D. Moseley, Jr. 2 West
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited
Practice Good Enterprise Security Management Presented by Laurence CHAN, MTR Corporation Limited About Me Manager Information Security o o o o Policy formulation and governance Incident response Incident
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC
Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to
Uncover security risks on your enterprise network
Uncover security risks on your enterprise network Sign up for Check Point s on-site Security Checkup. About this presentation: The key message of this presentation is that organizations should sign up
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it
Complete and high performance protection where you need it Overview delivers high-performance protection against physical and virtual server downtime with policy based prevention, using multiple protection
A New Perspective on Protecting Critical Networks from Attack:
Whitepaper A New Perspective on Protecting Critical Networks from Attack: Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network 2014: A Year of Mega Breaches A Ponemon Study published
Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats
Solution Overview Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats What You Will Learn The network security threat landscape is ever-evolving. But always
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Evolution Of Cyber Threats & Defense Approaches
Evolution Of Cyber Threats & Defense Approaches Antony Abraham IT Architect, Information Security, State Farm Kevin McIntyre Tech Lead, Information Security, State Farm Agenda About State Farm Evolution
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide. EnCase Cybersecurity. Complement Guide
GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide EnCase Cybersecurity Complement Guide GUIDANCE SOFTWARE EnCase Cybersecurity Complement Guide To truly secure an enterprise, a comprehensive approach
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
