Threat intelligence. A buyer s guide

Size: px
Start display at page:

Download "Threat intelligence. A buyer s guide"

Transcription

1 Threat intelligence A buyer s guide 1

2 Table of Contents Executive summary Introduction The rise of digital business What is cyber threat intelligence? Common types of cyber threat intelligence What is new? CATER Coverage Accuracy Timeliness Ease of integration Relevance Summary Get a proof of concept and tell the world End notes All Rights Reserved

3 Executive summary Over the course of the last several years, cyber attacks have become more and more targeted in nature. Traditional attacks were largely indiscriminate, whereas today s attacks focus on specific individuals or organizations. These targets are often acquired after a great deal of planning and reconnaissance has taken place over days, weeks, months, and even years. The threats posed by these new types of attacks has been compounded by the lower barrier to entry that the global adoption of social media, cloud, and mobile technologies have introduced. Now, more than ever, organizations are seeking to understand which threat actors pose a viable threat to their assets and business operations. In order to gain insight into this uncertain environment, several steps must be undertaken all of which can be influenced by cyber threat intelligence (CTI). The past three years have seen an explosion in new information security firms offering CTI. Many of these firms were traditional security vendors who have established intelligence products alongside their traditional product offerings. As a result, there are many options from which to choose in the market, which often leads to confusion. The question then becomes, which providers should potential buyers turn to in order to gain a better understanding of their threats? This paper provides an overview of the CTI market. It does so by looking at the rise of digital business in today s world and at the impact that threat intelligence has had on the market. Additionally, the paper outlines the fundamental characteristics of a CTI provider: Coverage Accuracy Timeliness Ease of Integration Relevance With our CATER checklist you can better understand these fundamental characteristics and make more informed decisions with respect to which providers are best suited for your organization. 3

4 1. Introduction

5 The rise of digital business We live in a complex world, which has transformed the way we do business and the way we live our day-to-day lives. The interaction of over three billion individuals 1 across multiple platforms has formed a new world: the world of digital business. 2 Social media, mobile computing, and cloud services have increased the ease and speed of communication, whilst simultaneously reducing the cost. As a result of the complexities introduced to our world and due to the advent of digital business, new threats are introduced to our enterprises. In this complex, volatile and uncertain world, we are exposed to a range of people and organizations that present a threat be they agenda driven (hacktivist), organized criminals, or nation states. These are some of the groups that are successfully penetrating our traditional boundary defenses on a daily basis. As a result of the evolution of these threats, enterprises are evolving their defenses to respond to this changing landscape. These enterprises are placing an increasing emphasis on security controls that exist beyond the traditional perimeter. Many are focusing their efforts on building a threat intelligence capability. In doing so these organizations introduce a means to reduce the uncertainty they encounter within the threat landscape while also protecting themselves from data loss and targeted attack. This is easier said than done. The market has been seeking a stable definition of what effective cyber threat intelligence (CTI) means. Specifically, there is a confusion between data, information and intelligence. This will be explored further in the following sections. 5

6 Cyber threat intelligence is characterized by many vendors in the market as a means of analyzing huge volumes of data, in multiple formats, or indeed languages, across public and closed data sources. The objective of this analysis is to provide information in context that can mitigate a harmful event. If this information in context allows an enterprise to take some sort of direct action, it is possible to argue this is intelligence. This is by no means a trivial task. Many organizations simply lack the resources, skills, time and money to establish a meaningful in-house intelligence capability. 3 Consequently, they are turning towards external help to plug this capability gap. As more and more vendors produce and go to market with cyber threat intelligence solutions and services, enterprise organizations are forced to face a confusing picture to attempt to select a good quality of support that presents a long term, value for money approach. As with many areas in security, there is no silver bullet for CTI. As a result a judicious assessment of the market should take place to choose an appropriate CTI solution. We believe that through the use of the CATER model, arriving at a decision regarding CTI solution will be much easier. The remainder of this paper will explore the definition of threat intelligence, the different types of threat intelligence categories present in today s world, and characteristics of a CTI provider. 6

7 What is cyber threat intelligence? Business leaders are becoming increasingly aware of the value of CTI. Cyber threat intelligence enables organizations to make more informed and better decisions about policy-making, defensive controls and resource allocation. However, the increased interest in CTI across industry and the media is creating a significant amount of hype in the market. A major reason for this is that there is no consensual definition for CTI. Without an intelligible and consistent definition, CTI is at risk of fast becoming a buzzword. At a high level, intelligence can be defined as simply information about the enemy. 4 This is a good starting point but, when definitions become more granular, problems with inconsistency and jargon soon arise. The most common of all is the failure to coherently differentiate between data, information, knowledge and intelligence. The difference between these terms is key to understanding the CTI market. Data refers only to observables and facts that becomes information when context is added. This becomes knowledge when meaning is given to the information. Within this context, intelligence is simply relevant and meaningful information. Figure 1. Relationship between data, information, knowledge and intelligence 7

8 There is no single agreed universal definition of cyber threat intelligence. It means a lot of different things to a lot of different people. One useful definition of threat intelligence came from a recent workshop held with a number of CTI vendors, and was included in a paper released by the Bank of England: Information about threats and threat actors that provides relevant and sufficient understanding for mitigating the impact of a [...] harmful event. 5 This definition of cyber threat intelligence is useful in that it is broad enough to be applied to numerous different service offerings, and to help differentiate data feeds from those that have value in the process of defending an organization or pre-empting an attack. However, with this breadth in definition, we also must look at what differentiates various offerings. 8

9 Common types of cyber threat intelligence Figure 2. Cyber threat intelligence market Security monitoring intelligence One of the most important types of threat intelligence is produced from within an organization itself. In many instances this type of intelligence is referred to as security monitoring intelligence due to the fact that it is derived largely from assets (network, gateway, end points, SIEM etc.), which already exist within the organizations enterprise environment. Examples may include information obtained from existing SIEM capabilities, Intrusion Prevention Systems, or internal netflow. Internal DNS can give vital clues about who or what is communicating out of the network. Staff themselves can flag unexpected behaviours to a central reporting point. Convergence of this array of sources provides a cohesive view of the organizations risk posture. 9

10 Sharing communities Sharing communities provide a great deal of value to individuals and organizations tasked with managing threat intelligence activities. These communities take on many forms and are represented in a variety of ways from vetted and private mailing lists, to sponsored threat exchange environments to more structured organizations such as national Computer Emergency Response Teams (CERTS), sector / vertical CERTS, and Information Sharing and Analysis Centers (ISAC)s. Participating in these communities is critical to substantiating an organizations threat intelligence programs. External sources The final type of threat intelligence is external sources, of which there are two types: Machine-oriented cyber threat intelligence Human oriented and analyst driven cyber threat intelligence Machine-oriented cyber threat intelligence This type of CTI focuses on providing organizations with machine derived technical feeds. These are typically very structured, composed of data objects provided at scale and volume. The value of such feeds varies dramatically as does the content delivered via the feeds themselves Often these will be simple updated lists of IP addresses, Domain names, MD5 hashes. More sophisticated versions implement lists of indicators of compromise (IOC). Good feeds can be timely and provide a firm basis for driving the configuration of key detection and protection actions in a network. Sometimes these feeds can lack accuracy or may offer an incomplete view. Human oriented and analyst friven These sources are human oriented and analyst-driven. They are most relevant to organizations that do not have dedicated in-house CTI teams. Such humanoriented sources eliminate more false positives and provide a more customized service focussed on known facts and behaviours about threat groups and actors. Unlike machine-oriented CTI, these improve accuracy at the expense of timeliness and coverage. 10

11 What is new? For decades enterprise organizations have sought out new ways to inform themselves of threats and the risks they are exposed to. Much of these activities have been internally focused. This includes the generation of security intelligence via activities including end point and network analysis, vulnerability analysis, penetration testing, and incident response. Some organizations have started to explore their online exposure through the use of search engine technology, by mining for information (so-called google-hacking ). In this case, what s new about CTI? There is an unprecedented scale and diversity of sources of cyber threat intelligence available to organizations today. Advances in technology such as those provided by Cloud technologies provide inexpensive computing resources that enable threat intelligence providers to collect and produce more intelligence at a lower cost. Other advances such as those related to data science allow for better automation of processes that can infer meaning and improve relevance. Finally, advances in intelligence sharing continue which influence the rise of integrated, automated, and centralized security controls. 11

12 2. CATER

13 Characteristics of an external CTI provider If organizations choose to embrace the advances in CTI and turn to external sources, it is essential that they select the vendor(s) that best address the organization s needs. Large organizations, for example, may have the resources to take on machine-generated feeds whereas some smaller organizations may not. Buyers of CTI are often overwhelmed by providers who either provide data feeds or have simply re-badged existing data feed services as cyber threat intelligence. In such a crowded industry, how can buyers ensure a vendor provides the intelligence an organization craves and not raw data or irrelevant information? In order to pick through the noisy CTI industry, buyers of CTI should use CATER as a guide to assessing vendors across six categories: Coverage: how wide and how varied are the sources? Accuracy: how does the provider ensure my intelligence is free from cognitive biases and false alarms? Timeliness: how quickly will my organization receive an alert following an event and how far back does the context go? Ease of integration: how well does the service integrate my organization s existing services, and how does this ensure that action is taken? Relevance: how tailored is the service to my organization and its supply chain? 13

14 Coverage Coverage is one of the most important characteristics of a threat intelligence provider. A provider that is able to ingest millions rather than thousands of unique domains will, understandably, be expected to generate more results. A provider that covers many sources will reduce the chance of threats going unnoticed. But coverage is about far more than volume: variety is just as important. The provider should have the capabilities to collect and ingest a wide range of source types such as web and Internet services, a mixture of public and private forums and a range of media types such as IRC chats, and video. This variety is necessary in order to develop a better understanding of the threat environment. 6 Neither quantity nor variety are possible without a broad language capability for unstructured information. Cyber threats are a global phenomenon and a provider whose technology and analysts fail to process and analyse threats in languages such as Russian, Portuguese, Arabic and Mandarin Chinese will miss a significant quantity of relevant information. Many providers claim to offer superior coverage but there is no one single provider who can claim to have the best coverage. 7 To get the best coverage it will be necessary to go with many providers who can combine to offer you the widest and most varied offering. 14

15 Accuracy Wide, varied and multilingual coverage is key but it is not enough. Coverage must be balanced against the accuracy of the alerts. There is a deluge of automated data feeds from providers that focus on how a computer system has been compromised and the forensic remnants of the attack. Unfortunately these machine-generated data feeds are often overly technical, fail to give context and may be riddled with false positives. This leaves a burden on the consumer to sift the information for relevant content. Some providers will also reuse existing data feeds that are acquired from other parties. This results in a highly time-consuming, costly and overwhelming process for the organization. For data to become intelligence it must be transformed into information and then effort must be made to strip out the false positives and then to prioritize and contextualize the information. A balance ought to be found between the machine-oriented, high volume CTI and the human-oriented, more curated and tailored CTI. Accuracy is often impeded by cognitive biases and heuristics. Therefore, it is important to ensure that a provider employs a range of techniques to ensure the consistency and accuracy of the information. This should include systems in place to remove conformation bias and mitigate against other cognitive errors where results are curated by an analyst. 8 Good intelligence tradecraft have existed for many years. Some providers take a purely technical view of the gathered intelligence without recognizing the importance of accurate and clear intelligence. 81% *Ponemon Of respondents felt that the high false positive rate was one of the biggest problems of CTI Institute,

16 Timeliness The blend of coverage and accuracy must also be balanced against the timeliness of information. A managed service might succeed in removing false positives but if the alerts are not timely they will become redundant. For example, several providers produce thorough and expertly-written reports which, despite being comprehensive pieces of analytical work, are received too late in the day to be considered actionable. In this hyper-connected world, information spreads quickly. For example, 56% of those asked in a recent survey said that intelligence becomes stale within minutes or seconds. 9 Providers must be able to demonstrate that they understand that dynamic, high volume data sources such as Twitter which are ingested at very high rates, produce intelligence that is relevant the moment it is collected. Buyers should expect a provider to be able to alert the client within at least 30 minutes of an event. It is also useful to understand how far back in time a provider can go. The ability to spot malicious tweets from previous years, for example, can prove invaluable. Just as understanding the historical behaviour of an IP address can provide valuable clues. 84% *Ponemon Of respondents felt the dissemination of intelligence in a timely fashion was one of the biggest problems of CTI Institute,

17 Ease of integration Two to three years ago, threat intelligence providers were pitting their services against one another. In a 2012 blog article Rick Holland of Forrester Research quipped that it was a case of My threat intelligence can beat up your threat intelligence. 10 Now the situation is beginning to change amid a growing realization that no single provider can satisfy all of an organization s needs. No matter how advanced their offering may be, providers must demonstrate that they can integrate with other solutions. The market still has room to mature, however. According to the SANS Institute there is a shortage of standards and interoperability around feeds, context and detection may become more problematic as more organizations add more sources of CTI into their detection and response programs. 11 Similarly, a recent study by the Ponemon Institute reported that 59% of respondents found that the problem with CTI is that it does not integrate with various security technologies. 12 Providers will all have their own particular focus. Some will focus on technical data feeds, some on context and others on detection. As such, it is essential that a provider s solution has an API that can easily integrate with existing solutions and wider sharing communities such as FS ISAC, CISP and utilize standards such as OpenIOC and STIX. 17

18 Relevance The final and perhaps the most important characteristic of a threat intelligence provider is the relevance of its information. The intelligence an organization receives often covers threats to geographies or specific sectors. This is good but it is not enough. The most valuable intelligence is that which is specific to an organization and its assets. This tailored intelligence offering will help organizations understand how they appear or are discussed online. With so many incidents to deal with, organizations are at risk of becoming overwhelmed by alerts. There should therefore be a mechanism in place for prioritizing alerts. 13 These alerts should be graded according to the severity of the threat and the urgency of remedial actions. Through taking this tailored approach, the organization will have the opportunity to give feedback to the intelligence provider and improve the process. Such feedback mechanisms should not be perceived as an optional extra but as a fundamental feature of the service. The provider should be in place to help you understand your threats. Therefore, the service should be fully tailored to your organizational assets and requirements. 18

19 3. Summary

20 Get a proof of concept and tell the world The CTI landscape has been obscured by hype, unrealistic expectations and inconsistency around key definitions. Coverage, accuracy, timeliness, ease of integration and relevance are fundamental characteristics of an external source of CTI. Using our CATER checklist can help you whittle down the market and pick out the signal from the noise. In order to get the best service, it may be necessary to go to more than one provider in order to give you the comprehensive service your organization needs. Furthermore, a successful threat intelligence capability will have a mix of internal, sharing and external sources. Of course, it is only possible to see the true value of a CTI provider when the service begins. If you have any reservations, ask your provider for a proof of concept before signing up for a lengthy contract. You might have to pay for this, but it can be a great way of demonstrating value and making it easier to secure budget. Last but not least, once you re in the favourable position of having a vendor or multiple vendors that caters to your needs, make sure you share your findings. Communicating with your peers is key to cutting through the hype and making the most of cyber threat intelligence. Good luck. 20

21 End notes 1. Internet Live Stats, Internet users in the world, com/internet-users/ (last accessed 26th May 2015) 2. Gartner, Putting Digital Business to Work in 2015, October Ponemon Institute, Intelligence Driven Cyber Defense, February D. MacLachlan, Room 39: A Study in Naval Intelligence, Bank of England, CBEST Threat Intelligence Framework: Qualities of a threat intelligence provider, Bank of England, CBEST Threat Intelligence Framework: Qualities of a threat intelligence provider, Verizon, 2015 Data breach investigations report, 2015, 8. Digital Shadows, The dangers of groupthink, February Ponemon Institute, The Importance of Cyber Threat Intelligence to a Strong Security Posture, March Rick Holland, My threat intelligence can beat up your threat Intelligence, 22 May SANS, Who s Using Cyberthreat Intelligence and How?, February Ponemon Institute, Intelligence Driven Cyber Defense, February Bank of England, CBEST Threat Intelligence Framework: Qualities of a threat intelligence provider,

22 About Digital Shadows Digital Shadows is the only company to provide cyber situational awareness that helps organizations protect against cyber attacks, loss of intellectual property, and loss of brand and reputational integrity. Its flagship solution, Digital Shadows SearchLight, is a scalable and easy-to-use data analysis platform that provides a holistic view of an your digital footprint and the profile of its attackers. It is complemented with security analyst expertise to ensure extensive coverage, tailored intelligence and frictionless deployment. digitalshadows.com London San Francisco Level 39, One Canada Square, London, E14 5AB 535 Mission St, Fl. 14, San Francisco, CA (0) [email protected] +1 (888)

CBEST/STAR Threat Intelligence

CBEST/STAR Threat Intelligence CBEST/STAR Threat Intelligence Systemically-important financial institutions that form part of the UK s Critical National Infrastructure need to remain resilient to cyber attack. To help them achieve this,

More information

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Separating Signal from Noise: Taking Threat Intelligence to the Next Level SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges

More information

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who

More information

The Importance of Cyber Threat Intelligence to a Strong Security Posture

The Importance of Cyber Threat Intelligence to a Strong Security Posture The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015 Ponemon Institute Research Report

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

WHITE PAPER: THREAT INTELLIGENCE RANKING

WHITE PAPER: THREAT INTELLIGENCE RANKING WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes

More information

Threat Intelligence Buyer s Guide

Threat Intelligence Buyer s Guide Threat Intelligence Buyer s Guide SANS CTI Summit, 10 February 2014 Rick Holland @rickhholland Principal Analyst Last year 2014 Forrester Research, Inc. Reproduction Prohibited 2 This year, Arnold s back!!

More information

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Preempting

More information

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily

More information

Cyber Risk Reduction: Why Automated Threat Verification is key

Cyber Risk Reduction: Why Automated Threat Verification is key Cyber Risk Reduction: Why Automated Threat Verification is key Automated threat verification: The new stage between detection and resolution Alarmingly, recent findings indicate that organisations are

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle

More information

The SIEM Evaluator s Guide

The SIEM Evaluator s Guide Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,

More information

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance

More information

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

SOLUTION BRIEF. Next Generation APT Defense for Healthcare SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their

More information

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

GETTING REAL ABOUT SECURITY MANAGEMENT AND BIG DATA GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats

More information

FROM INBOX TO ACTION EMAIL AND THREAT INTELLIGENCE:

FROM INBOX TO ACTION EMAIL AND THREAT INTELLIGENCE: WHITE PAPER EMAIL AND THREAT INTELLIGENCE: FROM INBOX TO ACTION There is danger in your email box. You know it, and so does everyone else. The term phishing is now part of our daily lexicon, and even if

More information

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations September 2015 Copyright 2015 Deloitte Development LLC. All rights reserved. This presentation

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

THE EVOLUTION OF SIEM

THE EVOLUTION OF SIEM THE EVOLUTION OF SIEM WHY IT IS CRITICAL TO MOVE BEYOND LOGS Despite increasing investments in security, breaches are still occurring at an alarming rate. 43% Traditional SIEMs have not evolved to meet

More information

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult

More information

What is Cyber Threat Intelligence and why do I need it?

What is Cyber Threat Intelligence and why do I need it? What is Cyber Threat Intelligence and why do I need it? Global Cyber Threat Intelligence much ado about something The Information Security market is buzzing about cyber threat intelligence. Following all

More information

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average

More information

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved.

ESG Brief. Overview. 2014 by The Enterprise Strategy Group, Inc. All Rights Reserved. ESG Brief Webroot Delivers Enterprise-Class Threat Intelligence to Security Technology Providers and Large Organizations Date: September 2014 Author: Jon Oltsik, Senior Principal Analyst; Kyle Prigmore,

More information

Continuous Network Monitoring

Continuous Network Monitoring Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment

More information

Zak Khan Director, Advanced Cyber Defence

Zak Khan Director, Advanced Cyber Defence Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts

More information

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.

More information

Best Practices for Building a Security Operations Center

Best Practices for Building a Security Operations Center OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

Attack Intelligence: Why It Matters

Attack Intelligence: Why It Matters Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,

More information

A Primer on Cyber Threat Intelligence

A Primer on Cyber Threat Intelligence A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly

More information

How To Create An Insight Analysis For Cyber Security

How To Create An Insight Analysis For Cyber Security IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security

More information

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Eight Essential Elements for Effective Threat Intelligence Management May 2015 INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent

More information

Requirements When Considering a Next- Generation Firewall

Requirements When Considering a Next- Generation Firewall White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration

More information

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value. SYMANTEC MANAGED SECURITY SERVICES Superior information security delivered with exceptional value. A strong security posture starts with a smart business decision. In today s complex enterprise environments,

More information

Concierge SIEM Reporting Overview

Concierge SIEM Reporting Overview Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts

More information

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.

Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches. Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming

More information

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond

More information

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions

More information

Gaining the upper hand in today s cyber security battle

Gaining the upper hand in today s cyber security battle IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper

More information

Cyber Information-Sharing Models: An Overview

Cyber Information-Sharing Models: An Overview PARTNERSHIP Cyber Information-Sharing Models: An Overview October 2012. The MITRE Corporation. All rights reserved. Approved for Public Release. Case Number 11-4486. Distribution Unlimited. Table of Contents

More information

Cybersecurity Awareness for Executives

Cybersecurity Awareness for Executives SESSION ID: SOP-R04 Cybersecurity Awareness for Executives Rob Sloan Head of Cyber Content and Data Dow Jones @_rob_sloan Session Overview Aim: Provide a high level overview of an effective cybersecurity

More information

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence

More information

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle

A Strategic Approach to Web Application Security The importance of a secure software development lifecycle A Strategic Approach to Web Application Security The importance of a secure software development lifecycle Rachna Goel Technical Lead Enterprise Technology Web application security is clearly the new frontier

More information

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were

More information

QRadar SIEM and FireEye MPS Integration

QRadar SIEM and FireEye MPS Integration QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving

More information

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC : INCIDENT RESPONSE THREAT INTELLIGENCE 1 THREAT INTELLIGENCE How it applies to our clients, and discuss some of the key components and benefits of a comprehensive threat intelligence strategy. Threat

More information

A Unified View of Network Monitoring. One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS

A Unified View of Network Monitoring. One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS A Unified View of Network Monitoring One Cohesive Network Monitoring View and How You Can Achieve It with NMSaaS Executive Summary In the past few years, the enterprise computing technology has changed

More information

Cyber intelligence exchange in business environment : a battle for trust and data

Cyber intelligence exchange in business environment : a battle for trust and data Cyber intelligence exchange in business environment : a battle for trust and data Experiences of a cyber threat information exchange research project and the need for public private collaboration Building

More information

Detect, Contain and Control Cyberthreats

Detect, Contain and Control Cyberthreats A SANS Whitepaper Written by Eric Cole, PhD June 2015 Sponsored by Raytheon Websense 2015 SANS Institute Introduction Dwell Time Relates to damage because the longer a system is compromised, the bigger

More information

WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective

WHITE PAPER OCTOBER 2014. Unified Monitoring. A Business Perspective WHITE PAPER OCTOBER 2014 Unified Monitoring A Business Perspective 2 WHITE PAPER: UNIFIED MONITORING ca.com Table of Contents Introduction 3 Section 1: Today s Emerging Computing Environments 4 Section

More information

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations

More information

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,

More information

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning Niara Security Analytics Automatically detect attacks on the inside using machine learning Automatically detect attacks on the inside Supercharge analysts capabilities Enhance existing security investments

More information

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target

More information

REVOLUTIONIZING ADVANCED THREAT PROTECTION

REVOLUTIONIZING ADVANCED THREAT PROTECTION REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my

More information

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations

More information

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015 Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology

More information

Cyber Security Evolved

Cyber Security Evolved Cyber Security Evolved Aware Cyber threats are many, varied and always evolving Being aware is knowing what is going on so you can figure out what to do. The challenge is to know which cyber threats are

More information

Whitepaper. Advanced Threat Hunting with Carbon Black

Whitepaper. Advanced Threat Hunting with Carbon Black Advanced Threat Hunting with Carbon Black TABLE OF CONTENTS Overview Threat Hunting Defined Existing Challenges and Solutions Prioritize Endpoint Data Collection Over Detection Leverage Comprehensive Threat

More information

BIG SHIFT TO CLOUD-BASED SECURITY

BIG SHIFT TO CLOUD-BASED SECURITY GUIDE THE BIG SHIFT TO CLOUD-BASED SECURITY How mid-sized and smaller organizations can manage their IT risks and meet regulatory compliance with minimal staff and budget. CONTINUOUS SECURITY TABLE OF

More information

CyberReady Solutions. Integrated Threat Intelligence and Cyber Operations MONTH DD, YYYY SEPTEMBER 8, 2014

CyberReady Solutions. Integrated Threat Intelligence and Cyber Operations MONTH DD, YYYY SEPTEMBER 8, 2014 CR CyberReady Solutions Actionable Insight for the Digital Enterprise Integrated Threat Intelligence and Cyber Operations MONTH DD, YYYY SEPTEMBER 8, 2014 INTELLIGENCE-DRIVEN OPERATIONS The Game Has Changed

More information

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were

More information

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments CSM-ACE 2014 Cyber Threat Intelligence Driven Environments Presented by James Calder Client Services Manager, Singapore 1 CONTENTS Digital criminality Intelligence-led security Shylock case study Making

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Big Data Integration: A Buyer's Guide

Big Data Integration: A Buyer's Guide SEPTEMBER 2013 Buyer s Guide to Big Data Integration Sponsored by Contents Introduction 1 Challenges of Big Data Integration: New and Old 1 What You Need for Big Data Integration 3 Preferred Technology

More information

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Addressing Big Data Security Challenges: The Right Tools for Smart Protection Addressing Big Data Security Challenges: The Right Tools for Smart Protection Trend Micro, Incorporated A Trend Micro White Paper September 2012 EXECUTIVE SUMMARY Managing big data and navigating today

More information

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity Threat Intelligence for Dummies Karen Scarfone Scarfone Cybersecurity 1 Source Material Threat Intelligence for Dummies ebook Co-authored with Steve Piper of CyberEdge Group Published by Wiley Sponsored

More information

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC WHITE PAPER Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC www.openioc.org OpenIOC 1 Table of Contents Introduction... 3 IOCs & OpenIOC... 4 IOC Functionality... 5

More information

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING

IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY How runtime application security monitoring helps enterprises make smarter decisions on remediation 2 ABSTRACT Enterprises today

More information

FIVE PRACTICAL STEPS

FIVE PRACTICAL STEPS WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND

More information

CyberArk Privileged Threat Analytics. Solution Brief

CyberArk Privileged Threat Analytics. Solution Brief CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect

More information

Open Source Software for Cyber Operations:

Open Source Software for Cyber Operations: W H I T E P A P E R Open Source Software for Cyber Operations: Delivering Network Security, Flexibility and Interoperability Introduction For the last decade, the use of open source software (OSS) in corporate

More information

How To Protect Your Network From Attack From A Network Security Threat

How To Protect Your Network From Attack From A Network Security Threat Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your

More information