Automation in the Incident Response Process: Creating an Effective Long-Term Plan
|
|
|
- Ferdinand Welch
- 10 years ago
- Views:
Transcription
1 A SANS Whitepaper Written by Alissa Torres February 2015 Sponsored by Bit9 + Carbon Black 2015 SANS Institute
2 Introduction If 2014 was the year of the mega breach, with corporate giants falling prey to hackers and suffering significant data breaches, 2015 may very well be known as the year of proactive vigilance. None of our networks is immune to a motivated attacker. As Joseph Demarest, assistant director of the cyberdivision of the Federal Bureau of Investigation, told members of Congress at the end of December 2014, [T]he malware that was used would have gotten past 90 percent of the Net defenses that are out there today in private industry. 1 1 FBI official calls Sony attackers organized, persistent, 1
3 Present Weaknesses in the Incident Response Process Security professionals have grown to accept certain irrefutable truths: The adversary is already in the network. Detection is theoretically possible with the right technology, process and expertise. Security teams are limited by organizational constraints (budget, trained personnel and effective technology) and how much risk avoidance the company is willing to pay for. With the right resources in place, security professionals can detect attacks more accurately and efficiently, mitigating damage and data loss. And today s chief information security officers (CISOs) are under tremendous pressure to craft a proactive strategy for defense and detection. At the same time, security pros are dealing with limited budgets, staff and other resources. Mixed into this challenging environment are increasingly tough data breach and compliance regulations that require enterprises to protect proprietary data and customer personally identifiable information to avoid legal fines. Creating and implementing effective measures to prevent a data breach in 2015 are in the forefront of security team agendas in organizations of all sizes. According to the Ponemon Institute 2014: A Year of Mega Breaches survey results, 55 percent of respondents reported that their organization created an incident response (IR) capability as a result of the recent large-scale data breaches covered in the media
4 What Is the Role of Automation and Why? Six Steps of Incident Response 1. Preparation 2. Detection 3. Containment 4. Eradication 5. Remediation 6. Follow-up Few breach victims can wait days, much less weeks, for service providers to arrive on site when an attacker is actively stealing sensitive data. Working from an IR plan allows for structure and organization when the unexpected occurs. Because the circumstances of critical events vary widely, a team with the proper process and procedure in place will move smoothly through the six steps of the IR process. These steps include preparation, detection, containment, eradication, remediation and follow-up. Even as security challenges have multiplied, many organizations current IR plans rely on both the availability and affordability of third-party IR and breach mitigation support, either employed via retainer or service contract. These third-party companies specialize in detailed scoping of an intrusion as well as mitigation, enabling other organizations to call upon them as needed instead of establishing their own full-time IR staff. But with the recent spike in demand for IR services, the outsourced model has fallen under intense scrutiny. And exponentially increasing demand for premier level service prioritization from these service providers means that meeting any acceptable boots on the ground SLA timeframe is becoming increasingly more difficult. Few breach victims can wait days, much less weeks, for service providers to arrive on site when an attacker is actively stealing sensitive data. As a consequence, CISOs in many organizations are realizing faster response times and financial advantages of moving these capabilities in-house. By taking ownership of the IR process and customizing the response process to the specific needs and infrastructure of their organization, an internal IR team will grow increasingly more proficient at handling its own critical incidents. Typical efficiency gains of automating and owning IR include deeper knowledge of the implemented technology, faster false-positive reductions, shorter duration of detection to containment time and, subsequently, less significant data loss when a breach occurs. According to the 2014 SANS Incident Response survey, 59 percent of respondents reported their employers have a dedicated internal team focused on IR, reporting and remediation, and 61 percent of respondents employers have identified surge IR support team members from internal staff. 3 These statistics (see Figure 1) support the recent trend of establishing in-house IR capabilities
5 What Is the Role of Automation and Why? (CONTINUED) What resources does your orginization utilize in responding to incidents? Select the best answer. Surge team drawn from our internal staff Dedicated internal team focused on IR, reporting and remediation Third-party IR services we call as needed Third-party IT management provider Other Figure 1. Figure Dedicated 1. Dedicated Versus Versus Third-Party Third-Party IR IR Capability (Source: SANS 2014 IR Survey) There is no shortage of obstacles for those teams developing an internal IR capability. Time from initial infection to detection is thought to be the most critical matter and greatest failing of today s IR teams. 4 The 2014 Verizon Data Breach Investigations Report shows that the majority of attacks require less than a week to break into a network, yet only approximately 25 percent of the breach detection occurs in the same span of time. 5 To target this Achilles heel of the six-step IR process, security information and event management (SIEM) and endpoint security and intrusion detection technologies were reported as the top security investments companies are making, according to the 2014 Ponemon Institute survey. 6 Fifty percent of survey respondents reported that their organization s top security investment was in SIEM, with endpoint security a close second, named by 48 percent of respondents. 4 Lessons From 2014 Mega Breaches: It s Time To Shift To A Post-Breach Mindset,
6 Targeted Areas for Improvements Through Automation Acknowledging the substantial investment involved with weighing, selecting and implementing an endpoint and network monitoring system, it is essential that organizations consider their present and future security needs. These tools enable the security team to aggregate critical endpoint system information and log to a SIEM technology. With access to a continuous system-state data feed, the security team can configure a SIEM to identify a pattern or sequence of activities (such as serial attempts seen associated with a domain user attempting to connect to a system across the network via share). Enterprises that want to increase their internal automated IR capabilities face several potential challenges, including a lack of time, skills and roadmap. Those organizations creating a proactively vigilant environment from nothing also face several potential obstacles, including whether to add testing and installation of endpoint protection software. In addition, enterprises going in-house will need to evaluate whether workstations, servers and mobile devices should be within the scope of system monitoring and what data they should aggregate from each of these types. Often the absence of skilled personnel experienced with the chosen technology makes customizing a tool for a unique environment a time-consuming and frustrating trial-and-error effort. A View into the State of Current IR Processes Automation provides deeper insight into endpoint and network traffic and facilitates detection of execution of malicious software or anomalous activity. In addition to improving detection, efficiency gains provided by automation can improve response time significantly, allowing for swift triage and containment. Fast response affects the impact of incident after detection, mitigating the organization s data loss and/or destruction. Consider the inefficiencies of the following scenario, representative of the state of current IR processes in many organizations: A Tier 2 IR analyst spots anomalous entries on a few workstations while performing targeted data aggregation and stacking analysis. In studying the least frequently occurring AppCompatCache registry entries from a sample set of hundreds of systems, three systems show an scvhost.exe having executed from a peculiar C:\Users\Public\Biforder directory. Based on the time and date stamps embedded in these registry values, the analyst isolates the initial time of execution as being approximately two months ago. How does this analyst proceed with triage and investigation of these potentially suspicious findings? 5
7 Targeted Areas for Improvements Through Automation (CONTINUED) When encountering possible signs of malicious code execution on a system, one must consider the various possible stages of attack at which incident responders may discover an intrusion. In the best-case scenario, the malicious scvhost binary attempted to execute on these systems and failed to download, in which case few additional artifacts would exist both on these systems and in capture network traffic. But consider a successful exploitation and stage 2 malware delivery completed on all three systems. After two months on the network, a sophisticated adversary would have gained intelligence survey of the internal network and notable directory structures as well as had the opportunity to harvest local system, application and domain credentials. How will the analyst determine at what stage in the attacker kill chain he has encountered the adversary? 7 Naturally, the responder s investigative methodology would lead him to interrogate each system of interest to gather more information on the suspicious binaries. Unfortunately, in most organizations, this analysis would be limited to the current state of the system with no historical understanding of system volume, Windows registry or native Windows artifacts. After all, a security team cannot be precognitive about what will be pertinent to the investigation before the breach occurs. The team could not possibly predict which artifacts on which specific system would hold the key to unraveling the initial vector of infection. The examiner s view of the current contents of the file system, based on the sophistication of his attacker, may or may not include the C:\Users\Public\Biforder directory at this point. What about volume shadow copies (VSS)? They may have a past snapshot of the directory of interest, yet a roll of the dice occurs for such a possibility because the timeframe of VSS creation is every seven days. The current system s prefetch directory, local event logs, $USNJournal, $LogFile and Windows Search Index may shed some light on the existence and timeline of these binaries as well, but have an element of brittleness based on the rate of churn on the systems. Incident responders encounter this all-too-common scenario every day. Even those who don t just react to alerts but proactively hunt for behavioral indicators of adversary behavior find it difficult if not impossible to reconstruct the sequence of events that led to infection. And without access to relevant archived system or network data, the most skilled examiners can be left without insight into how the system volume, Windows registry, and native logs and artifacts looked last week, or last month, or at any other period
8 Targeted Areas for Improvements Through Automation (CONTINUED) As this example illustrates, the level of expertise required to manually acquire the target dataset from the potentially compromised systems requires considerable training and experience. Many organizations just growing their response capability are not able to employ such an expert, because such expertise is unavailable, too expensive or otherwise not feasible. Given this reality, a case can be made for automated data management technology, which can standardize data collection in a triage situation so nothing is missed. Because one of the biggest challenges for incident responders is just getting the data, automated continuous monitoring of endpoints and network traffic provides such data. Therefore, analysis can begin immediately to help move the IR investigation forward. 7
9 Automating and Improving the IR Process: A Three-Step Plan Developing a more automated, and therefore more effective, IR approach can be broken into three specific strategies: Continuous data collection Aggregate and apply threat intelligence Streamlining live response capabilities Figure 2 illustrates these strategies. Streamlining live response capabilities Aggregate and apply threat intelligence Continuous data collection Figure 2. The Three Steps to an Automated IR Plan Continuous Data Collection According to the SANS 2014 Log Management survey, 97 percent of respondents collect logs, yet only 42 percent send logs to an SIEM system. 8 In implementing automated continuous data collection strategies, a security team gains deeper insight into historical system state, event logs and network traffic. How does automated continuous data collection compare to the standard data collection performed when an incident is detected? In traditional IR, evidence gathering takes place after a potential incident, leaving the investigator with blind spots regarding how the system was compromised and what the attacker did prior to detection. In contrast, continuous proactive data collection ensures that evidence of execution, file access, lateral movement, network connections and logons are collected continuously. This data is archived for future use in incidents that have not yet occurred or been identified a form of IR precognition
10 Automating and Improving the IR Process: A Three-Step Plan (CONTINUED) In the preceding example, with ongoing enterprise endpoint monitoring in place, the examiner could have rolled right into response, having overcome the greatest hurdle to the investigative process just getting the data. The skilled examiner has the data immediately within arms reach instead of having to extract evidence manually. This approach saves significant time. By collecting the right data, signs of an attacker s lateral movement under the guise of legitimate credentials may be identified. Prioritizing ongoing data collection offers some additional benefits. For example, largescale enterprise data aggregation tools provide the capability to baseline user behavior. By creating patterns of life for legitimate users on the network, deviations from a user s typical activity would be flagged as anomalous behavior. The examiner can then create automated alerts for events such as unusually timed logons, network resource accesses and VPN activity, allowing visibility into possible activity of the attackers already inside the network. In addition, by collecting the right data, signs of an attacker s lateral movement under the guise of legitimate credentials may be identified a technique commonly employed by attackers to move among remote systems. Relying on logon audit failures or manual log review would make this type of identification nearly impossible. It is important to note here that SIEMs are only as intelligent as the data they are fed, pointing to the expertise involved in selecting what data to aggregate in the first place. Yet if configured correctly, the automated collection can allow security teams to know what normal system and user behavior looks like and therefore recognize anomalous activity when it occurs. 9
11 Automating and Improving the IR Process: A Three-Step Plan (CONTINUED) With automated data aggregation, Aggregate and Apply Threat Intelligence With continuous data monitoring in place, enterprises now can move to step two of our three-step plan. By centralizing continuous endpoint and network data collection, powerful correlations can be drawn with regards to threat activity, attack and reconnaissance techniques and threat actors. Threat intelligence is a capability that in the past has often been associated with more mature security teams and is underutilized in most organizations today. As seen in the SANS Incident Response survey conducted in June 2014, only 31 percent of organizations polled perform adversary/attacker attribution based on the data they collect during the IR process (see Figure 3). 9 Does your organization perform adversary/attacker attribution based on the data/signatures collected during the incident response process? threat intelligence and attribution becomes easier from an institutional perspective. Yes No Unknown Figure 3. Respondents Who Perform Adversary/Attacker Attribution with IR Data (Source: SANS 2014 IR Survey) How can an organization incorporate threat intelligence capability into their IR process? With automated data aggregation, threat intelligence and attribution becomes easier from an institutional perspective, using data from past incidents to identify current attacks, as well as through partnerships developed with endpoint/network security vendors. Threat intelligence feeds can be obtained from SIEM vendors, community feeds and commercial threat intelligence providers and aggregators capable of packaging feeds in SIEM-ready preformatted rules. Through automation, the barrier to making use of past incident data from the organization and others in the community is lowered, allowing for greater proactive detection and response
12 Automating and Improving the IR Process: A Three-Step Plan (CONTINUED) Streamline Live Response Capability Lack of historical data was not the only difficulty that the examiner in our example ran into during his investigation, because the life of an incident responder is littered with obstacles. From the start, he struggled to rapidly perform system triage due to his organization s inefficient response technology, giving the attacker more dwell time uncontained on his network. Streamlining of the IR process and reduction of inefficiencies such as the one described is another critical element of an effective automated plan. In our example of an attack, gaining access to the three geographically disparate systems of interest required laborious configuration changes because the environment lacked a remote enterprise triage tool. This problem is an easy fix because many of today s remote endpoint analysis tools offer automated triage capabilities. In connecting to the remote system via a software agent, these tools enable an examiner to perform triage swiftly upon request or to set triage to trigger automatically in reaction to an alert. Remote system interrogation provides a solution for getting the data to the examiner for faster triage of potentially compromised systems. However, not all organizations take advantage of these tools at this time. A notable percentage of companies are paying for automated endpoint detection and mitigation technology and not making effective use of their investment due to lack of time, trained staff or incompatible network architecture. Much of the new spending, however, may be on process improvements and staffing to get the most value out of existing security technologies already in place, according to the 2014 Ponemon Institute survey. 10 Most computer incident response team (CIRT) members agree that every day on the job brings different and widely varying challenges. Devising a standard operating procedure when each incident could require uniquely specific actions is exceedingly difficult. For example, the measures taken to contain the effects of equipment theft compared to those put in place to combat a distributed denial of service (DDoS) against a web server can hardly be described in one standing document, let alone expected to be handled comprehensively by the same skillset of professionals. The need for automation and efficiency of process and procedure exists no matter what type of incident an organization encounters. 10 Data Breaches Drive Investments In Security Response, Data Protection, 11
13 Summary As many organizations seek to increase their response capabilities, future implementations of streamlining evidence collection from the endpoints and crafting intelligently baselined event threshold alerts will become more imperative due to budget, time and manpower constraints. A forward leaning focus on automated security implementations that incorporates endpoint data/log collection, network device log aggregation and packet capture will offer an organization the capability to expand to its future demands of an ever-changing, increasingly sophisticated threatscape. 12
14 About the Author Alissa Torres is a certified SANS instructor, specializing in advanced computer forensics and incident response (IR). Her industry experience includes serving in the trenches as part of the Mandiant Computer Incident Response Team (MCIRT) as an incident handler and working on an internal security team as a digital forensic investigator. She has extensive experience in information security, spanning government, academic and corporate environments, and holds a bachelor s degree from University of Virginia and a master s from University of Maryland in information technology. Alissa has taught as an instructor at the Defense Cyber Investigations Training Academy (DCITA), delivering IR and network basics to security professionals entering the forensics community. She has presented at various industry conferences and numerous B-Sides events. In addition to being a GIAC Certified Forensic Analyst (GCFA), she holds the GCFE, GPEN, CISSP, EnCE, CFCE, MCT and CTT+. Sponsor SANS would like to thank this paper s sponsor: 13
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Managing the Unpredictable Human Element of Cybersecurity
CONTINUOUS MONITORING Managing the Unpredictable Human Element of Cybersecurity A WHITE PAPER PRESENTED BY: May 2014 PREPARED BY MARKET CONNECTIONS, INC. 14555 AVION PARKWAY, SUITE 125 CHANTILLY, VA 20151
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
Whitepaper. Advanced Threat Hunting with Carbon Black
Advanced Threat Hunting with Carbon Black TABLE OF CONTENTS Overview Threat Hunting Defined Existing Challenges and Solutions Prioritize Endpoint Data Collection Over Detection Leverage Comprehensive Threat
SIEM is only as good as the data it consumes
SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning
Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
eguide: Designing a Continuous Response Architecture Disrupting the Threat: Identify, Respond, Contain & Recover in Seconds
Disrupting the Threat: Identify, Respond, Contain & Recover in Seconds Table of Contents Overview 3 The Problem 3 Defining the Threat 3 The Network is Not the Target 4 Incident Response is Ad Hoc 5 Incident
SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security
SIEM Optimization 101 ReliaQuest E-Book Fully Integrated and Optimized IT Security Introduction SIEM solutions are effective security measures that mitigate security breaches and increase the awareness
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
Modern Approach to Incident Response: Automated Response Architecture
SESSION ID: ANF-T10 Modern Approach to Incident Response: Automated Response Architecture James Carder Director, Security Informatics Mayo Clinic @carderjames Jessica Hebenstreit Senior Manager, Security
Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined
Niara Security Intelligence Threat Discovery and Incident Investigation Reimagined Niara enables Compromised user discovery Malicious insider discovery Threat hunting Incident investigation Overview In
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge
Targeted Intrusion Remediation: Lessons From The Front Lines Jim Aldridge All information is derived from MANDIANT observations in non-classified environments. Information has beensanitized where necessary
Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow
Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned
Cisco Cyber Threat Defense - Visibility and Network Prevention
White Paper Advanced Threat Detection: Gain Network Visibility and Stop Malware What You Will Learn The Cisco Cyber Threat Defense (CTD) solution brings visibility to all the points of your extended network,
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM
The Benefits of Integrating File Integrity Monitoring with SIEM Security Information and Event Management (SIEM) is designed to provide continuous IT monitoring, actionable intelligence, incident response,
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst
ESG Lab Review RSA Enterprise Compromise Assessment Tool (ECAT) Date: January 2014 Authors: Jon Oltsik, Senior Principal Analyst and Tony Palmer, Senior Lab Analyst Abstract: This ESG Lab review documents
THE EVOLUTION OF SIEM
THE EVOLUTION OF SIEM WHY IT IS CRITICAL TO MOVE BEYOND LOGS Despite increasing investments in security, breaches are still occurring at an alarming rate. 43% Traditional SIEMs have not evolved to meet
Software that provides secure access to technology, everywhere.
Software that provides secure access to technology, everywhere. Joseph Patrick Schorr @JoeSchorr October, 2015 2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Agenda What are we dealing with? How
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
DYNAMIC DNS: DATA EXFILTRATION
DYNAMIC DNS: DATA EXFILTRATION RSA Visibility Reconnaissance Weaponization Delivery Exploitation Installation C2 Action WHAT IS DATA EXFILTRATION? One of the most common goals of malicious actors is to
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel @Ben_Smith Ben Smith, CISSP Field CTO (US East), Security Portfolio A Security Maturity Path CONTROLS COMPLIANCE IT RISK BUSINESS
www.contextis.com Effective Log Management
www.contextis.com About About Information Security has a client base including some of the world s most high profile blue chip companies and government organisations. Our strong track record is based above
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Preempting
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY?
WHAT ARE THE BENEFITS OF OUTSOURCING NETWORK SECURITY? Contents Introduction.... 3 What Types of Network Security Services are Available?... 4 Penetration Testing and Vulnerability Assessment... 4 Cyber
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Win the race against time to stay ahead of cybercriminals
IBM Software Win the race against time to stay ahead of cybercriminals Get to the root cause of attacks fast with IBM Security QRadar Incident Forensics Highlights Help reduce the time required to determine
Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA
Advanced SOC Design Next Generation Security Operations Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA 1 ! Why/How security investments need to shift! Key functions of a Security Operations
Security Analytics for Smart Grid
Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC [email protected] blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Endpoint Threat Detection without the Pain
WHITEPAPER Endpoint Threat Detection without the Pain Contents Motivated Adversaries, Too Many Alerts, Not Enough Actionable Information: Incident Response is Getting Harder... 1 A New Solution, with a
Advanced Analytics For Real-Time Incident Response A REVIEW OF THREE KNOWN CASES AND THE IMPACT OF INVESTIGATIVE ANALYTICS
Advanced Analytics For Real-Time Incident Response A REVIEW OF THREE KNOWN CASES AND THE IMPACT OF INVESTIGATIVE ANALYTICS Introduction Every year, cyber criminals become stronger and more sophisticated
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Persistence Mechanisms as Indicators of Compromise
Persistence Persistence Mechanisms as Indicators of Compromise An automated technology for identifying cyber attacks designed to survive indefinitely the reboot process on PCs White Paper Date: October
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Breach Found. Did It Hurt?
ANALYST BRIEF Breach Found. Did It Hurt? INCIDENT RESPONSE PART 2: A PROCESS FOR ASSESSING LOSS Authors Christopher Morales, Jason Pappalexis Overview Malware infections impact every organization. Many
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
A New Perspective on Protecting Critical Networks from Attack:
Whitepaper A New Perspective on Protecting Critical Networks from Attack: Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network 2014: A Year of Mega Breaches A Ponemon Study published
Intelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
Hunting for Indicators of Compromise
Hunting for Indicators of Compromise Lucas Zaichkowsky Mandiant Session ID: END-R31 Session Classification: Intermediate Agenda Threat brief Defensive strategy overview Hunting for Indicators of Compromise
Using Network Forensics to Visualize Advanced Persistent Threats
Using Network Forensics to Visualize Advanced Persistent Threats Dale Long, Sr. Technology Consultant, RSA Security 1 The Problem 2 Traditional Security Is Not Working 99% of breaches led to compromise
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
Securing Remote Vendor Access with Privileged Account Security
Securing Remote Vendor Access with Privileged Account Security Table of Contents Introduction to privileged remote third-party access 3 Do you know who your remote vendors are? 3 The risk: unmanaged credentials
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics
CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics TRADITIONAL SIEMS ARE SHOWING THEIR AGE Security Information and Event Management (SIEM) tools have been a
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
AMPLIFYING SECURITY INTELLIGENCE
AMPLIFYING SECURITY INTELLIGENCE WITH BIG DATA AND ADVANCED ANALYTICS Chris Meenan Senior Product Manager, Security Intelligence 1 IBM Security Systems Welcome to a Not So Friendly Cyber World Biggest
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats
Stop the Maelstrom: Using Endpoint Sensor Data in a SIEM to Isolate Threats Jody C. Patilla The Johns Hopkins University Session ID: TECH-107 Session Classification: Intermediate Objectives Get more out
Security strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
EnCase Analytics Product Overview
GUIDANCE SOFTWARE EnCase Analytics EnCase Analytics Product Overview Security Intelligence through Endpoint Analytics GUIDANCE SOFTWARE EnCase Analytics EnCase Analytics Key Benefits Find unknown and undiscovered
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.
ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.
MAJOR FINANCIAL SERVICES LEADER Top 5 Global Bank Selects Resolution1 for Cyber Incident Response. Automation and remote endpoint remediation reduce incident response (IR) times from 10 days to 5 hours.
After the Attack: RSA's Security Operations Transformed
After the Attack: RSA's Security Operations Transformed Ben Smith, CISSP RSA Field CTO (East), Security Portfolio Senior Member, ISSA Northern Virginia 1 The Environment ~ 2,000 security devices ~55M security
Top 5 reasons incident response is failing. kpmg.com
Top 5 reasons incident response is failing kpmg.com b Top 5 reasons incident response is failing Introduction The Incident Response function within an organization is responsible for assessing the integrity
