SIEM Implementation Approach Discussion. April 2012
|
|
|
- Constance Singleton
- 10 years ago
- Views:
Transcription
1 SIEM Implementation Approach Discussion April 2012
2 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual Level Insourcing versus Outsourcing Vendors Implementation Considerations Copyright 2012 Deloitte Development LLC. All rights reserved. 1
3 What are we trying to solve?
4 Summary Observations from the Security Assessments related to Logging & Monitoring Inconsistent logging of security events (servers, databases, network devices, security devices, etc.) No logging standard Monitoring of logs ranged from non-existent to limited Correlation capability of security events was mostly non-existent (for identifying threats timely) Log retention was not consistent Limited monitoring for sensitive data leakage via network Limited monitoring for change in system configurations (security related) Copyright 2012 Deloitte Development LLC. All rights reserved. 3
5 Problem Statement Institutions may not detect security incidents (e.g., unauthorized access to sensitive repositories, changes in security configurations to critical systems, sensitive data leakage, etc.) on a timely basis (or at all). While this can be applied broadly, the focus of the observations was related to infrastructure (network, operating systems, and databases) perimeter devices, security devices, as well as select internal servers. Copyright 2012 Deloitte Development LLC. All rights reserved. 4
6 Typical Scenario Recovery Manual detection process Acceptable Risk High Risk Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 Day 7 Day 8 Day 9 Day 10 Day 11 Day 12 Day 13 Day 14 Day 15 Day 16 Day 17 Outbreak of critical event Corrective Action Taken Copyright 2012 Deloitte Development LLC. All rights reserved. 5
7 Organizations With SEIM Recovery Automated detection process Acceptable Risk 0.00 High Risk Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 Day 7 Day 8 Day 9 Day 10 Day 11 Day 12 Day 13 Day 14 Day 15 Day 16 Day 17 Outbreak of critical event Corrective Action Taken Copyright 2012 Deloitte Development LLC. All rights reserved. 6
8 Organizations With SEIM and Active Threat Management/Effective Incident Escalation Automated detection and remediation process Acceptable Risk Day 1 Day 2 Day 3 Day 4 Day 5 Day 6 Day 7 Day 8 Day 9 Day 10 Day 11 Day 12 Day 13 Day 14 Day 15 Day 16 Day 17 Outbreak of worm Corrective Action Taken Copyright 2012 Deloitte Development LLC. All rights reserved. 7
9 SEIM Addressing of Organizational Challenges Challenges addressed by LMR Risk Containment Operational Cost Compliance Lack of visibility from external threats (Intrusion Detection) Lack of visibility from internal threats (Extrusion Detection) Limited visibility of misappropriation and mis-use Inability to effectively enforce and monitor security controls High loss of revenue due to virus and worm outbreaks Disabling or limitation of audit controls due to information overload Inability to correlate events from disparate sources High operational cost to monitor security events High exposure window due to the time to react Too much technology making monitoring (operationally) cost prohibitive Inability to effectively demonstrate security compliance Copyright 2012 Deloitte Development LLC. All rights reserved. 8
10 Conceptual Solution
11 Solution Conceptual Level Develop a Logging & Monitoring Strategy Develop logging standard aligned with regulatory and business needs Align / provision logging on devices based on logging standard (careful on DB!) Microsoft werpoint Presentat Perform analysis on requirements, options (in-house versus MSSP, SOC approach), and sustainment considerations for implementing log management and monitoring processes Procure tool (and/or services) and resources for managing and monitoring logs (SIEM, DLP - network, FIM) Design Use Cases for monitoring Implementation strategy (phases, tuning, etc.) Copyright 2012 Deloitte Development LLC. All rights reserved. 10
12 Detective Controls (Sample for illustration purposes) Higher business value Infrastructure Threats Outbreak Threats Mis-use of privilege Insider Threat Data Leakage Advanced Persistent Threats Industry Channel Threats Fraud and Misappropri ation Business Applications Web Application Gateway APT feed CTI feed Cyber-beacon feed DLP Emerging Threats High Business Impact Vulnerability data Identity Management Database/DAM etc. File and Print Authentication Servers (Radius, TACACS+, AD etc.) IDS/IPS/WAF/NAC Content Management (AV, Malware Detection, URL etc.) Network Behavioral Analysis Current Threats Structured Controls FW/VPN OS logs Core Switches Distribution Switches Access Level Switches Infrastructure Threats Good Controls Typically Exist Copyright 2012 Deloitte Development LLC. All rights reserved. 11
13 SEIM as Part of an Organizational Security Architecture (Typical) SAMPLE 12 Copyright 2012 Deloitte Development LLC. All rights reserved. 12
14 Insourcing versus Outsourcing
15 Comparison of an in versus outsourced solution Level 1 and Security Status Monitoring MSSP s can often provide repeatable and highly effective services for level 1 (traditional) security threats. This includes traditional security monitoring of common threats that are faced by other organizations. Level 2 (Advanced Threat) The MSSP is generally dependent on the organization for advanced threat monitoring (e.g., emerging threats that are not defined in the SLA), coordination with internal application owners, case and ticket tracking, etc. Most MSSP operate under a model of monitor, detect, escalate and handoff. MSSP s define a maximum number of complementary use cases that will be integrated into the SOC, per year. Additional use cases may affect the financial impact of operating the SOC over time. Infrastructure Monitoring MSSP s can monitor against organization s defined use cases for Infrastructure Monitoring. However the logic around the dynamic nature of the infrastructure requires specific (client specific) familiarity and assimilation into the fabric of the organization. For example, new initiatives that results in increased firewall activity. A process workflow can be created to notify MSSP s of these activities, but usually there is a threshold of how often these notifications occurs and typically do not include smaller changes. Copyright 2012 Deloitte Development LLC. All rights reserved. 14
16 Comparison of an in versus outsourced solution Perimeter Threat Monitoring MSSP s generally have repeatable and optimized processes around perimeter threat monitoring. Given the fact that MSSP s work with other like organizations, MSSP s can distinguish between a general Internet threat and a more focused organizational specific threat. Internal Threat Monitoring Internal (Insider) Threat Monitoring requires detailed understanding of the Lines of Business, expected behavior and a good appreciation for the organization s specific operational and business model, including the tendency for expected behavior to change over time. Outlier Threat Analysis Similar to Internal Threat Monitoring, Outlier Threat Analysis is the evaluation of threats against an organization s baseline. However the baseline at client may change based on various factors and therefore an internal SOC is better geared to evaluate against outlier and statistical models. Copyright 2012 Deloitte Development LLC. All rights reserved. 15
17 Comparison of an in versus outsourced solution Business and Fraud Monitoring Most MSSP have good capability on traditional security monitoring, but have limited capability against client focused business and fraud monitoring. The reason being that MSSP s are designed and operate on a scalable platform to service a large subset of clients. However Business and Fraud patterns differ from organization by organization. IT Service Management Security Monitoring A key part of security monitoring is reconciling security events against ITIL based services. For example, comparing configuration changes against approved changes (or releases). Most MSSP s support the export of cases (or incidents) into a ticketing system, but usually do not have the ability to receive changes to CI s (Configuration Item s) related to an approved change, especially from the diverse ticketing processes. An insource SOC can build a process to either receive information on approved changes, automate CI s on assets related to a change or be able to interface with the change initiator to validate change approval. Privilege User Monitoring Similar to IT Service Management Monitoring, MSSP s can monitor based on client use cases, but are unable to fully reconcile use of privilege out of role (or duty). An internal SOC can build Identity Provisioning input into the SOC to evaluate security events against role, segregation of duty and other factors. Copyright 2012 Deloitte Development LLC. All rights reserved. 16
18 Comparison of an in versus outsourced solution General Cyber Threat Monitoring MSSP s have threat vectors for general cyber threats, should they have other like monitored organizations. Therefore they theoretically can provide repeatable capability against general cyber threats. Brand Protection and Cyber Beacon Monitoring Most of the threats nowadays originate or can be depicted through an organizations Cyber Beacon. Cyber Beacon is how an Organization is viewed in cyber space, including data points from a Web 2.0 perspective. Most innovative organizations are starting to pre-empt threats by obtaining advanced knowledge from Cyber Threat Intelligence from these sources. This includes how the brand or association with the brand is used and the threats posed by Spammer, Phishers, etc. Unless provided as a supplementary service (not part of the core offering) most MSSP s do not have the ability to perform brand and cyber beacon monitoring. However this can be built within the people, process and technology of an insourced SOC. Non-traditional multi-dimensional threat monitoring As organizations expand the foot print of Security Status monitoring, the organization may consider non-traditional security monitoring. For example Physical Security and the like. Most MSSP s that monitor for logical threats are usually not tooled (people, process and technology) to address these non-traditional devices. Copyright 2012 Deloitte Development LLC. All rights reserved. 17
19 Vendors
20 SIEM and MSSP Vendors Copyright 2012 Deloitte Development LLC. All rights reserved. 19
21 Implementation Considerations
22 Implementation Considerations Decide on Sourcing Strategy (inhouse versus MSSP) Identify what data sources will you need to monitor in order to detect potential security incidents => may lead to identification of additional tools needs (e.g., network DLP, FIM, etc.) SIEM on its own does not provide any value! Regardless of what any of the vendors say, implementing a logging and monitoring solution properly will require take some time Device Inventory is Key Develop specific technical and functional requirements for the solution Develop Architecture and Sizing (EPS rates and Log Capacity) will impact cost Copyright 2012 Deloitte Development LLC. All rights reserved. 21
23 Implementation Considerations (cont.) Logging Standard Developed Device Identification and Integration - Exact devices to be integrated have been identified? (This can be a pain and can impact project schedule if not nailed down early) - Data classification in place? Develop Configuration Guides for Device Integration and consistency Types of devices databases will add complexities; some devices may require custom connector development Change Management Process (can impact device integration) Cyber Threat Intelligence (CTI) Feed consideration May require additional products syslog server Number and Type of Use Cases for SIEM (outside of out-of-box rules) these should be developed in conjunction with the phased strategy Tuning will be key! (Level 1, 2 and 3) Copyright 2012 Deloitte Development LLC. All rights reserved. 22
24 Lesson s Learned Requirements analysis: Define the requirements, control objectives, compliance requirements and problem definition; Determine appropriate control levels: Ensure that the rollout plan is mapped to control objectives; Optimize and prioritize: The key factor of a successful SEIM deployment is the appropriate selection and prioritization of log sources; Threat landscape matrix: Define a threat inventory based on the risk and control requirement profile of the client. This will be used for architecture development; Set expectation: Ensure that management and technical staff understand the key realities of the architecture; Define enterprise infrastructure requirements: This can include data store requirements, retention, network bandwidth requirements etc. It is important to involve key stakeholders; Solution analysis: Review and map compliance/risk requirements against solutions; Customized for unique requirements: SEIM solutions offer base capability however require customization to meet organizational risk and compliance goals; Process development: Define the people and processes required to support the architecture. In Deloitte s experience, SEM/SEIM projects usually fail due to weaknesses in processes, people and vision Copyright 2012 Deloitte Development LLC. All rights reserved. 23
25 Copyright 2012 Deloitte Development LLC. All rights reserved. Questions?
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Information Shield Solution Matrix for CIP Security Standards
Information Shield Solution Matrix for CIP Security Standards The following table illustrates how specific topic categories within ISO 27002 map to the cyber security requirements of the Mandatory Reliability
Intelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Managed Security Service Providers vs. SIEM Product Solutions
White Paper The Business Case for Managed Security Services Managed Security Service Providers vs. SIEM Product Solutions www.solutionary.com (866) 333-2133 The Business Case for Managed Security Services
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions
File Integrity Monitoring Challenges and Solutions Introduction (TOC page) A key component to any information security program is awareness of data breaches, and yet every day, hackers are using malware
IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer
IBM Security QRadar SIEM & Fortinet / FortiAnalyzer Introducing new functionality for IBM QRadar Security Intelligence Platform: integration with Fortinet s firewalls and logs forwarded by FortiAnalyzer.
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
www.obrela.com Corporate Security Intelligence Services
Corporate Security Intelligence Services We Keep Your Business In Business Using security analytics and sophisticated risk management technology we dynamically protect our clients by identifying, analyzing,
Defining, building, and making use cases work
Defining, building, and making use cases work Paul Brettle Presales Manager, Americas Pacific Region What is a use case? Compliance FISMA, PCI, SOX, etc Network security firewalls, IDS, routers & switches
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
High End Information Security Services
High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Service Asset & Configuration Management PinkVERIFY
-11-G-001 General Criteria Does the tool use ITIL 2011 Edition process terms and align to ITIL 2011 Edition workflows and process integrations? -11-G-002 Does the tool have security controls in place to
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Safeguarding the cloud with IBM Dynamic Cloud Security
Safeguarding the cloud with IBM Dynamic Cloud Security Maintain visibility and control with proven security solutions for public, private and hybrid clouds Highlights Extend enterprise-class security from
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific
Thales Service Definition for PSN Secure Email Gateway Service for Cloud Services
Thales Definition for PSN Secure Email Gateway Thales Definition for PSN Secure Email Gateway for Cloud s April 2014 Page 1 of 12 Thales Definition for PSN Secure Email Gateway CONTENT Page No. Introduction...
White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere
Protecting Databases from Unauthorized Activities Using Imperva SecureSphere White Paper As the primary repository for the enterprise s most valuable information, the database is perhaps the most sensitive
How To Secure A Database From A Leaky, Unsecured, And Unpatched Server
InfoSphere Guardium Ingmārs Briedis ([email protected]) IBM SW solutions Agenda Any questions unresolved? The Guardium Architecture Integration with Existing Infrastructure Summary Any questions
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
Spyders Managed Security Services
Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES
LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Information Technology Engineers Examination. Information Technology Service Manager Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Technology Service Manager Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
OCIE CYBERSECURITY INITIATIVE
Topic: Cybersecurity Examinations Key Takeaways: OCIE will be conducting examinations of more than 50 registered brokerdealers and registered investment advisers, focusing on areas related to cybersecurity.
FairWarning Mapping to PCI DSS 3.0, Requirement 10
FairWarning Mapping to PCI DSS 3.0, Requirement 10 Requirement 10: Track and monitor all access to network resources and cardholder data Logging mechanisms and the ability to track user activities are
Feature. Log Management: A Pragmatic Approach to PCI DSS
Feature Prakhar Srivastava is a senior consultant with Infosys Technologies Ltd. and is part of the Infrastructure Transformation Services Group. Srivastava is a solutions-oriented IT professional who
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
PCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
How To Create Situational Awareness
SIEM: The Integralis Difference January, 2013 Avoid the SIEM Pitfalls Get it right the first time Common SIEM challenges Maintaining staffing levels 24/7 Blended skills set, continuous building of rules
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
McAfee Security Information Event Management (SIEM) Administration Course 101
McAfee Security Information Event Management (SIEM) Administration Course 101 Intel Security Education Services Administration Course The McAfee SIEM Administration course from McAfee Education Services
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
Find the needle in the security haystack
Find the needle in the security haystack Gunnar Kristian Kopperud Principal Presales Consultant Security & Endpoint Management Technology Day Oslo 1 Find the needle in the security haystack Manually deep
Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?
Information Security Incident Management Program What is an Incident Management Program? It is a coordinated program of people, processes, tools and technology, which prevents and manages information security
BeyondInsight Version 5.6 New and Updated Features
BeyondInsight Version 5.6 New and Updated Features BeyondInsight 5.6 Expands Risk Visibility Across New Endpoint, Cloud and Firewall Environments; Adds Proactive Threat Alerts The BeyondInsight IT Risk
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises
Appendix Key Areas of Concern i. Inadequate coverage of cybersecurity risk assessment exercises The scope coverage of cybersecurity risk assessment exercises, such as cybersecurity control gap analysis
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
D. Grzetich 6/26/2013. The Problem We Face Today
Ideas on Using Asset Criticality Inference (ACI) Through Gathering and Processing of Asset Contextual Utilizing Analytical Models and Processing Rules D. Grzetich 6/26/2013 The Problem We Face Today Security
RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution
RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution David Mateju RSA Sales Consultant, RSA CSE [email protected] Adding an information-centric view Infrastructure Information
Looking at the SANS 20 Critical Security Controls
Looking at the SANS 20 Critical Security Controls Mapping the SANS 20 to NIST 800-53 to ISO 27002 by Brad C. Johnson The SANS 20 Overview SANS has created the 20 Critical Security Controls as a way of
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015
Internal audit of cybersecurity Presentation to the Atlanta IIA Chapter January 2015 Agenda Executive summary Why is this topic important? Cyber attacks: increasing complexity arket insights: What are
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards
A Websense Research Brief Prevent Loss and Comply with Payment Card Industry Security Standards Prevent Loss and Comply with Payment Card Industry Security Standards Standards for Credit Card Security
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
Der Weg, wie die Verantwortung getragen werden kann!
Managed Security Services Der Weg, wie die Verantwortung getragen werden kann! Christoph Altherr System Engineer Security 2008 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Agenda Enterprise
Information security controls. Briefing for clients on Experian information security controls
Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face
Obtaining Value from Your Database Activity Monitoring (DAM) Solution
Obtaining Value from Your Database Activity Monitoring (DAM) Solution September 23, 2015 Mike Miller Chief Security Officer Integrigy Corporation Stephen Kost Chief Technology Officer Integrigy Corporation
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing
EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty
EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements
White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements The benefits of QRadar for protective monitoring of government systems as required by the UK Government Connect
IT audit updates. Current hot topics and key considerations. IT risk assessment leading practices
IT audit updates Current hot topics and key considerations Contents IT risk assessment leading practices IT risks to consider in your audit plan IT SOX considerations and risks COSO 2013 and IT considerations
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
An Overview of Information Security Frameworks. Presented to TIF September 25, 2013
An Overview of Information Security Frameworks Presented to TIF September 25, 2013 What is a framework? A framework helps define an approach to implementing, maintaining, monitoring, and improving information
SUPPLIER SECURITY STANDARD
SUPPLIER SECURITY STANDARD OWNER: LEVEL 3 COMMUNICATIONS AUTHOR: LEVEL 3 GLOBAL SECURITY AUTHORIZER: DALE DREW, CSO CURRENT RELEASE: 12/09/2014 Purpose: The purpose of this Level 3 Supplier Security Standard
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the specific documents requested,
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
White Paper. Time for Integrated vs. Bolted-on IT Security. Cyphort Platform Architecture: Modular, Open and Flexible
White Paper Time for Integrated vs. Bolted-on IT Security Cyphort Platform Architecture: Modular, Open and Flexible Overview This paper discusses prevalent market approaches to designing and architecting
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
RSA Via Lifecycle and Governance 101. Getting Started with a Solid Foundation
RSA Via Lifecycle and Governance 101 Getting Started with a Solid Foundation Early Identity and Access Management Early IAM was all about Provisioning IT tools to solve an IT productivity problem Meet
Achieving SOX Compliance with Masergy Security Professional Services
Achieving SOX Compliance with Masergy Security Professional Services The Sarbanes-Oxley (SOX) Act, also known as the Public Company Accounting Reform and Investor Protection Act of 2002 (and commonly called
