The Changing Nature of Risk and the Role of Big Data
|
|
|
- Sabrina Taylor
- 10 years ago
- Views:
Transcription
1 The Changing Nature of Risk and the Role of Big Data Jack Danahy Director / North American Security Consulting IBM
2 Incidents Continue to Grow in Spite of Investment 2012 Sampling of Security Incidents by Attack Type, Time and Impact Conjecture of relative breach impact is based on publicly disclosed information regarding leaked records and financial losses Source: IBM X-Force 2012 Mid-year Trend and Risk Report, September 2012
3 Attacks, Sophistication, and Vulnerabilities Increase Source: Targeted-by-the-Hackers.html?ref=technology "This attack was not the work of amateurs, and we do not believe it was an isolated incident. The attackers were extremely sophisticated, and we believe other companies and organizations have also been recently similarly attacked." Source: In 2012, IBM reported over Source: IBM X-Force 2012 Mid-year Trend and Risk Report, September 2012
4 Individual Attacks Span Multiple Vectors People Investments Advisors Employees Privileged Users Suppliers Outsourcers Institutional Clients Investors Data Account Information High Value Portfolios Customer Information In Motion Applications Asset Management Enterprise Applications Investment Trading Mobile Applications Infrastructure Datacenters PCs Laptops Mobile Cloud Non-traditional
5 Creating a Need for a Multi-Pronged Approach Then Now People Administration Insight Data Basiccontrol Laserfocused Applications Bolt-on Built-in Infrastructure Thicker walls Smarter defenses Collect and Analyze Everything
6 Threats and Attackers are More Sophisticated. 1 Break-in Spear phishing and remote exploits to gain access 2 Command & Control (CnC) Latch-on Malware and backdoors installed to establish a foothold 3 Expand Reconnaissance and lateral movement to increase access and maintain a presence 4 Gather Acquisition and aggregation of confidential data 5 Command & Control (CnC) Exfiltrate Data exfiltration to external networks
7 Multiple Threat Vectors Dictate Broad Visibility Misconfigured Firewall Vulnerable Server 0day Exploit Botnet Communication SQL Injection Malicious PDF Spammer Infected Website Phishing Campaign Malicious Insider Brute Force On the Network Across the Enterprise Across the World Application Control Risk Management Threat Advisories Network Anomaly Detection Vulnerability Management IP Reputation Web Application Protection Content and Data Security Intrusion Prevention Network Activity Monitoring SIEM Log Management Malware Information Malicious Websites Vulnerability Database Threat Protection Security Intelligence Threat Intelligence
8 Changing Responsibilities at the C-Level
9 Key CIO Findings Crisis or Compliance Drives Tactical Behaviors Investments typically driven by industry standards and regulation or by specific negative event Value proposition is to address immediate need at minimal cost leading to point solution buying CIOs seek to transform from IT security to information risk management Mobile, social and cloud are driving increased threats, leaks and regulations In addition to more risk, the nature of risk is shifting away from data toward the core business CIOs are looking for more a more holistic, integrated risk management approach CIOs highlight four requirements to executing information risk management Active engagement with business leaders in information security decisions New IT risk role with sufficient knowledge, authority and budget to address issues across the business Integrated vendors with consulting skill and security solutions that address the entire information lifecycle Better ways to measure the value of security / risk management to the organization
10 CIO Consensus : Holistic View Required Organizations need to move away from solely concentrating on compliance, audits, preventing unauthorized access and data exposure, and service interruptions. This new perspective is more about Information Risk Management as opposed to just security and compliance. Traditional Focus Governance and Compliance Emerging Focus Information Risk Management IT Compliance Risk Negative audit findings, penalties, fines Regulatory or statutory shortcomings LOB Operational Risk Disruption of business operations Failure to assure integrity of products or services delivered Information IT Risk Unauthorized exposure of critical information asset Significant service interruptions Brand Risk Loss of brand equity Loss of customer trust Technology IT Risk Failures in access control System or application unauthorized modification Transformation Risk Inability to execute on transformation initiatives Failure to deliver expected business value
11 1. Executive Management Considers Security as IT The business deals with risk when there is a problem/breach or impending regulatory action, otherwise security is largely considered an IT issue. CIOs tell us CIO s need to. If you tried to walk into the board of directors of today and talk about information risk management, he ll tell you to go talk to the IT people. Management does not appreciate the strategic value of good information risk management - all hell breaks loose when something does go wrong, then they forget about it in time. Business and non-it executives are willing to discuss security and technology risk issues, but typically only if he asks them to get involved, they talk about it when I bring it up The organization pays lip service to the idea that security is a business problem, but typically does not put it s money where it s mouth is. The down side is you get small, important chunks of airtime with these business executives. If you re seen as a nerd without a strategic holistic view, they don t want to go anywhere. Engage with business leaders to take a more active role in information security decisions
12 2. The CISO Suffers From Lack of Visibility and Influence IT doesn t always have a strong voice across the organization CIOs tell us CIO s need. CIOs/CTOs feel either a risk management group or executive should report to a business executive or the board so they have sufficient and independent authority and can help promote a more holistic, businessled approach to the organization. It s something I believe in, but we don t have the right people running this area. The Information Risk Officer needs to align to the business to give the position more credibility and authority those aligned to the technology organization don t have as much impact and credibility within the business lines. Don t have the right people leading this area we don t have the right level person, the right skill-level person doing it while he has the authority and the budget (or can take it from other areas), he doesn t feel prepared to assume this role The right people leading a new security role within the organization that is aligned with the business and has sufficient knowledge, authority and budget to address issues across the business
13 3. Point Solutions are Already in Place Existing (and significant) security investments CIOs tell us None of the participants take a fully integrated, holistic approach to security solution purchases reactive, point product buys are more the norm. New / ever changing threats, the desire for best of breed products to address these specific threats, and lack of awareness of integrated, enterprise-wide solutions drive this purchase behavior. The different point solutions that have been implemented throughout the years all the silos of systems that have been in place over the years it is a desired direction to move towards, however, it s going to be a long ways away. Others doubts that one provider can deliver a holistic solution that can cover all segments of security, including mobile devices (with different operating systems), anti-virus, firewalls, proxy servers, etc. CIO s need. Partner with security vendors with consulting skill sets and business relationships as well as security solutions that address the entire information lifecycle. Would make things easier if there were at least a couple vendors in the marketplace who do really good end-toend security, however, not sure who, if anyone, has that capability.
14 4. Hard to Measure the Positive Impact of Security Business leaders are skeptical about ROI since it s not directly tied to revenue growth CIOs tell us CIO s need. Not sure how to quantify it and doesn t try to with management, just tells them it s just what we need to do. It s not ROI because this isn t making you money. It s not going to save money unless there is a problem so you talk about it internally as lowering the probability of exposure. The more sophisticated talk about a certain % decrease in exposure and then apply that decrease to the revenue in play Another CIO would like vendors to approach him with more solutions that demonstrate ROI they need to come to the table with a model on how to prove that there is either a cost neutral or a positive ROI for going down a path. Better ways to measure the value of security and risk management to the organization
15 Integrating the Power of Big Data
16 Increased Threat Sophistication is Compounded by Scale Configuration data from infrastructure Vulnerability and patch information Alerts from security sensors Security logs from servers External threat feeds 250,000 managed firewalls 30,000 network devices 500,000 open port combinations 410,455 Windows client systems 36,109 Windows servers 24,000 *NIX servers 1200 vulnerability assessors System audit trails and logs and social activity Business process data Malware samples and behavior Network flows and anomalies Full packet and DNS captures Size estimates of scale and volume of events and logs TB per month per major security service GB total per minor security service Unscoped TB unstructured social and business data
17 Driving an Evolution of Intelligence for Security Log Management SIEM Security Intelligence with Big Data Collect and analyze security logs Monitor and manage users, services and system configuration changes Incident response Real-time correlation and advanced analytics Anomaly detection Enterprise-wide visibility Structured and unstructured data Predictive and decision modeling Interactive visualization Security insights from enterprise data
18 Business Potential for Big Data Enablement in Security Visibility from traditional security operations and technologies Alerts from security sensors Configuration data from infrastructure System audit trails and logs Vulnerability and patch information Security logs from servers External threat feeds Network flows and anomalies Security operations are reactive vs. proactive Lots of data but limited visibility restricts threat awareness and containment When needed - insufficient cyber security investigative and forensics capabilities Complex ever-changing regulatory environment and social activity Business process data Malware samples and behavior Full packet and DNS captures The new Security program needs to enable system availability and stakeholder confidence
19 Big Data Applies to Prevention and Clean-up What are the external and internal threats? Are we configured to protect against these threats? What is happening right now? What was the impact? Prediction & Prevention Risk Management Vulnerability Management Configuration Monitoring IBM X-Force Threat Intelligence Compliance Management Reporting and Scorecards Reaction & Remediation SIEM Log Management Incident Response Network Anomaly Detection Packet Forensics Database Activity Monitoring Data Loss Prevention
20 Data Scale Data at Rest Harnessing the Variety, Velocity and Volume of Big Data Deep: Historic Insight, Context, Model Building Exa Peta Tera Up to 10,000 times larger HOT Analytics : Realtime behavior analytics Realtime interdiction Just in time investigation and mitigation COLD Analytics : Giga User and system profiling Forensic analysis / clean-up Mega Traditional Data Warehouse and Business Intelligence Cost and resource tracking Kilo Data in Motion Up to 10,000 times faster Fast: Detection, Correlation, Aggregation, Scoring yr mo wk day hr min sec ms μs Decision Frequency
21 Global Threat Operations Center Actual Customer Example Security Analysis Center Key Functions Threat Intelligence Gathering Event and Vulnerability Analysis Impact Analysis Incident Management Investigations Enforcement Optimization Risk Assessments, Briefings, and Advisories Key Functions Security Monitoring Incident Escalation and Response SIEM Intelligence Platform Administration Security Governance Security Operations Center Key Functions Application Management Hunter Team Penetration testing Infrastructure Application Social Phishing Awareness Attack modeling Assessments Ad-hoc projects Configuration Management Policy Management Security Intelligence Platform Key Functions Aggregate security event, log and flow data Correlation, rules and feeds
22 IBM Architecture Example Security Intelligence Platform Big Data Platform QRadar Data collection Event correlation Real-time analytics Offense prioritization Data Ingest Insights InfoSphere BigInsights Hadoop-based data integration Data mining Custom analytics Machine learning Advanced Threat Detection Custom Use Cases Traditional Data Sources Non-traditional
23 Customer example User profiling based on multiple sources Data Sources Real-time Processing Security Operations Internet NetFlow Web and Proxy 6 Big Data Processing 7 Big Data Analytics and Forensics 5 Unstructured Data Hadoop Store Suspicious User(s) 8 Optional Relational Store 9
24 Intelligence Data Flow Public Research Industry Collaboration Threat Actor Analysis IR Analysis ISACS Community Groups Vuln Analysis Private Research SAC/SOC Actionable Intelligence Incident Info GregNet Threat Modeling Threat Analysis Threat Detection Anomaly Detection Vulnerability Research Honeynet Blacklists BlackNet Alerting TBS Direct Communication Hunter Team CIO/CISO Office Intel Gathering Threat Modeling Analysis Exploitation Past Exploitation Analysis Reports
25 CIO and CISO Influencers
26 CIO and CISO are a Strategic Combination In IBM s recent CISO Study, nearly two thirds said senior executives are paying more attention to security issues and expect to have to spend more over the next 2 years. They also rated external threats as a bigger challenge than internal threats, new technology or compliance. Influencers in limiting the impact of security breaches demonstrate commitment to a proven approach: 1) They set priorities by understanding the asset environment 2) They understand what needs to be protected and implement accordingly 3) They understand that they need a plan in place in the event of a breach 4) They understand that enterprise security means more than just technology it involves people and process as well Source: IBM 2012 CISO Assessment y
27 Applying the Lessons of Influencers Prioritize Protect Prepare Promote Determine what s most important to the security of your business and why Identify those areas most vulnerable to attack Identify the specific types of attacks that pose the biggest threat Create a proactive and informed approach to IT security Identify existing vulnerabilities and fix them Mediate against any existing threats Take an informed approach to security intelligence Demonstrate and document the value of your security investments Review to ensure that there are no gaps or unnecessary overlaps Develop a detailed and coordinated response plan Ensure you have access to the resources and tools needed to respond quickly Take a consistent approach to assigning responsibility across the organization Create and support a risk-aware culture throughout your organization Ensure that each employee knows what to do
28 Integration to Improve Consistency and Communications Consolidate and correlate siloed information from hundreds of sources Designed to help detect, notify and respond to threats missed by other security solutions Automate compliance tasks and assess risks Stay ahead of the changing threat landscape Designed to help detect the latest vulnerabilities, exploits and malware Add security intelligence to non-intelligent systems Customize protection capabilities to block specific vulnerabilities using scan results Converge access management with web service gateways Link identity information with database security JK
29 Put the Model Into Action Risk Baseline Knowledge What is the cost of an outage? What are the ingress and egress points? Gather Information Existing Knowledge Impact studies Network diagrams Known bad actors Interpret Results Risk Assessment Impact Vulnerability Threat How can the system be accessed? What malware exists that can exploit my OS and access methods? Routine Collection Baseline Anomalies Firewall Rule Usage Vulnerability Scans Research Penetration tests Forensic analysis Attack modelling Validation Likelihood Costs Risk mitigation & avoidance IPS Signature Firewall rule Architecture Mods Draw Conclusion The Answer Data Information Security Intelligence
30 Questions?
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
AMPLIFYING SECURITY INTELLIGENCE
AMPLIFYING SECURITY INTELLIGENCE WITH BIG DATA AND ADVANCED ANALYTICS Chris Meenan Senior Product Manager, Security Intelligence 1 IBM Security Systems Welcome to a Not So Friendly Cyber World Biggest
Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dagli attacchi
Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dagli attacchi Giovanni Abbadessa, IBM IT Security Architect Umberto Sansovini, IBM Security Consultant Document number Big
Breaking down silos of protection: An integrated approach to managing application security
IBM Software Thought Leadership White Paper October 2013 Breaking down silos of protection: An integrated approach to managing application security Protect your enterprise from the growing volume and velocity
IBM Security X-Force Threat Intelligence
IBM Security X-Force Threat Intelligence Use dynamic IBM X-Force data with IBM Security QRadar to detect the latest Internet threats Highlights Automatically feed IBM X-Force data into IBM QRadar Security
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!
IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager! IBM can provide unmatched global coverage and security awareness! 4,300 Strategic outsourcing security delivery resources 1,200
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
RSA Security Analytics
RSA Security Analytics This is what SIEM was Meant to Be 1 The Original Intent of SIEM Single compliance & security interface Compliance yes, but security? Analyze & prioritize alerts across various sources
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
Security strategies to stay off the Børsen front page
Security strategies to stay off the Børsen front page Steve Durkin, Channel Director for Europe, Q1 Labs, an IBM Company 1 2012 IBM Corporation Given the dynamic nature of the challenge, measuring the
A Love Affair: Cyber Security, Big-data and Risk
A Love Affair: Cyber Security, Big-data and Risk Mark Seward, Senior Director Security and Compliance, Splunk Inc. Professional Techniques - Session 31 Security what s at stake On average, organizations
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Visualize current and potential network traffic patterns
Under the Hood of the IBM Threat Protection System
Under the Hood of the System The Nuts and Bolts of the Dynamic Attack Chain 1 Balazs Csendes IBM Security Intelligence Leader, CEE [email protected] 1 You are an... IT Security Manager at a retailer
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Risk-based solutions for managing application security
IBM Software Thought Leadership White Paper September 2013 Risk-based solutions for managing application security Protect the enterprise from the growing volume and velocity of threats with integrated
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
IBM Security QRadar Risk Manager
IBM Security QRadar Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance Highlights Collect network security device configuration data to
IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: Many enterprise organizations claim that they already
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
QRadar SIEM and Zscaler Nanolog Streaming Service
QRadar SIEM and Zscaler Nanolog Streaming Service February 2014 1 QRadar SIEM: Security Intelligence Platform QRadar SIEM provides full visibility and actionable insight to protect networks and IT assets
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Extending security intelligence with big data solutions
IBM Software Thought Leadership White Paper January 2013 Extending security intelligence with big data solutions Leverage big data technologies to uncover actionable insights into modern, advanced data
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
Effectively Using Security Intelligence to Detect Threats and Exceed Compliance
Effectively Using Security Intelligence to Detect Threats and Exceed Compliance Chris Poulin Security Strategist, IBM Reboot Conference 2012 1 Security Threats Affect the Business Business Brand image
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
IBM & Security Gov. Point Of Views
IBM & Security Gov. Point Of Views Santiago Cavanna [email protected] @scavanna Point of View: Info Security situation How Government can Protect Itself from Cyber Attacks According to a GovLoop survey,
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
Strengthen security with intelligent identity and access management
Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers
Ecom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Using SIEM for Real- Time Threat Detection
Using SIEM for Real- Time Threat Detection Presentation to ISSA Baltimore See and secure what matters Joe Magee CTO and Co-Founder March, 27 2013 About us Vigilant helps clients build and operate dynamic,
The webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Changing the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
2011 Forrester Research, Inc. Reproduction Prohibited
1 2011 Forrester Research, Inc. Reproduction Prohibited Information Security Metrics Present Information that Matters to the Business Ed Ferrara, Principal Research Analyst July 12, 2011 2 2009 2011 Forrester
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Can We Become Resilient to Cyber Attacks?
Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,
The Protection Mission a constant endeavor
a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
Beyond Watson: The Business Implications of Big Data
Beyond Watson: The Business Implications of Big Data Shankar Venkataraman IBM Program Director, STSM, Big Data August 10, 2011 The World is Changing and Becoming More INSTRUMENTED INTERCONNECTED INTELLIGENT
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Cisco SAFE: A Security Reference Architecture
Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Extreme Networks Security Analytics G2 Risk Manager
DATA SHEET Extreme Networks Security Analytics G2 Risk Manager Proactively manage vulnerabilities and network device configuration to reduce risk, improve compliance HIGHLIGHTS Visualize current and potential
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Boosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
Vulnerability management lifecycle: defining vulnerability management
Framework for building a vulnerability management lifecycle program http://searchsecurity.techtarget.com/magazinecontent/framework-for-building-avulnerability-management-lifecycle-program August 2011 By
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
White Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
Threat Intelligence Pty Ltd [email protected] 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Managing security risks and vulnerabilities
IBM Software Thought Leadership White Paper January 2014 Managing security risks and vulnerabilities Protect your critical assets with an integrated, cost-effective approach to vulnerability assessments
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Metrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty
EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING
IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today
Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dai cyber-attacchi
Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dai cyber-attacchi Giovanni Abbadessa, IBM T Security Architect Umberto Sansovini, IBM Security Consultant 1 Please note IBM
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
You ll learn about our roadmap across the Symantec email and gateway security offerings.
#SymVisionEmea In this session you will hear how Symantec continues to focus our comprehensive security expertise, global intelligence and portfolio on giving organizations proactive, targeted attack protection
Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR
Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO
2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA
Emerging Network Security Threats and what they mean for internal auditors December 11, 2013 John Gagne, CISSP, CISA 0 Objectives Emerging Risks Distributed Denial of Service (DDoS) Attacks Social Engineering
