Soltra edge open cyber intelligence platform report

Size: px
Start display at page:

Download "Soltra edge open cyber intelligence platform report"

Transcription

1 Soltra edge open cyber intelligence platform report Prepared By: Alan Magar Sphyrna Security 340 Ridgeside Farm Drive Kanata, Ontario K2W 0A1 PWGSC Contract Number: W FE01/001/ST Task 33 CSA: Melanie Bernier, Defence Scientist, Scientific Authority: Melanie Bernier Defence Scientist DRDC CORA Research Centre The scientific or technical validity of this Contract Report is entirely the responsibility of the Contractor and the contents do not necessarily have the approval or endorsement of the Department of National Defence of Canada. Contract Report DRDC-RDDC-2015-C204 March 2015

2 This Contract Report was produced for the Cyber Decision Making and Response project (05ac) under the DRDC Cyber Operations S&T program. Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2015 Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2015

3 Soltra Edge Open Cyber Intelligence Platform Report prepared for Defence Research and Development Canada prepared by

4 Bell Canada 160 Elgin Street 17th Floor Ottawa, Ontario Sphyrna Security 340 Ridgeside Farm Drive Kanata, Ontario K2W 0A1 K1S 5N4 March 2015 March 2015 Bell Canadaa ii

5 Confidentiality This document is UNCLASSIFIED. Authors Bell / Sphyrna Team Role Alan Magar Security Architect Revision Control Revision Date Modifications March 2015 Draft Report March 2015 Final Report March 2015 Bell Canada iii

6 Table of Contents 1.0 INTRODUCTION BACKGROUND PURPOSE DOCUMENT STRUCTURE TECHNICAL OVERVIEW ARCHITECTURE STANDARDS STIX TAXII TLP CAPABILITIES PRODUCT EVALUATION DEPLOYED ENVIRONMENT CONFIGURED FEEDS ADAPTERS ASSESSMENT Release Cycle User Community Functionality Alternatives CONCLUSION & RECOMMENDATIONS ACRONYMS & ABBREVIATIONS March 2015 Bell Canada iv

7 List of Figures Figure 1 Soltra Edge Cyber Intelligence Platform... 4 Figure 2 Soltra Edge Upgrade Figure 3 Adding a Site Figure 4 Site Added Figure 5 Unconfigured Feeds Figure 6 Configure Feed Figure 7 Configured Feed Figure 8 Downloaded Feed Figure 9 Indicator Catalog Figure 10 Specific Indicator Figure 11 Observable Catalog Figure 12 Specific Observable Figure 13 Adapters Installed Figure 14 CSV Indicators Import Figure 15 CSV Indicators Preview Figure 16 Soltra Edge STIX/TAXII Integrations March 2015 Bell Canada v

8 March 2015 Bell Canada vi

9 1.0 Introduction Cyber threat intelligence has received a great deal of publicity of late. This is not surprising given the number of high profile cyber attacks that have figured prominently in the news over the past year. President Obama recently (February 2015) signed an executive order to improve the sharing of cyber threat information within the private sector and between the private sector and government. Specifically, the executive order enables the Department of Homeland Security (DHS) to share classified intelligence with the private sector and to develop standards to facilitate the sharing of cyber threat information. 1 Later the same month, President Obama announced the establishment of a cyber threat intelligence integration center aimed at coordinating ongoing federal efforts to counter hackers and other cyber threats aimed at the U.S. government and private industry Background The Centre for Operational Research and Analysis (CORA), which is a Defence Research & Development Canada (DRDC) research centre for systems analysis and operational research, is in the process of characterizing threat and building a Department of National Defence (DND) specific cyber threat model. The aggregation of cyber threat intelligence information from a variety of reputable sources and the ability to act on this information are likely to be important aspects of the overall cyber threat model being developed. 1.2 Purpose Soltra Edge is intended to serve as the intelligence hub for an organization, connecting to all threat intelligence communities and providing actionable data back to the organization s environment for integration with internal security tools/appliances. The intent is that Soltra Edge will allow organizations to receive, store and send cyber security threat intelligence automatically, allowing these organizations to better deploy safeguards against a potential cyber attack. 1 This announcement is mentioned in numerous locations including cyberthreat executive order html 2 This announcement is mentioned in numerous locations including create new cyber threat center March 2015 Bell Canada 1

10 The purpose of this report is to review and analyze the Soltra Edge Open Cyber Intelligence Platform and its components (Structured Threat Information expression (STIX)/Trusted Automated exchange of Indicator Information (TAXII)). 1.3 Document Structure This report consists of the following sections: Section 1.0 Introduction: provides an overview of the report; Section 2.0 Technical Overview: provides a high level overview of Soltra Edge including its architecture, standards and capabilities; Section 3.0 Product Evaluation: documents the evaluation of the platform, including the deployed environment, configured feeds, adapters and an assessment of the product; Section 4.0 Conclusions & Recommendations: summarizes the conclusions and recommendations derived from the development of this report; and Section 5.0 Acronyms & Abbreviations: lists the acronyms and abbreviations used throughout this report. March 2015 Bell Canada 2

11 2.0 Technical Overview The Security Automation Working Group (SAWG) within the Financial Services Information Sharing and Analysis Center (FS ISAC) initiated a project code named Avalanche to champion the use of standards based cyber threat intelligence sharing. In September 2014, FS ISAC and the Depository Trust & Clearing Corporation (DTCC) announced a joint effort to develop and market automation solutions that advance cyber security capabilities and the resilience of critical infrastructure organizations. The resulting solution, Soltra Edge, is based on the requirements, standards and overall roadmap from the SAWG group within FS ISAC. This section of the report will provide a technical overview of the product, including an examination of its architecture, standards and capabilities. 2.1 Architecture Soltra Edge, which runs on CentOS and utilizes MongoDB 4 for storage, is administered through a web interface. In terms of cyber threat intelligence services, Soltra Edge can be configured to accept structured (e.g., STIX/TAXIII) threat intelligence feeds and other file types through adapters. The threat information can be managed and then exported in STIX format to various STIXcompatible security tools/appliances including firewalls or proxy servers, Mail Transfer Agents (MTAs) and Security Incident and Event Management (SIEMs). It is the security appliances that are responsible for taking the threat information provided by Soltra Edge and acting upon it. For example, a list of malicious URLs could be sent to firewalls/proxy servers, which would then proceed to block traffic originating from those network addresses. The Soltra Edge Cyber Intelligence Platform is illustrated in Figure 1. 3 CentOS is an open source Linux distribution derived from the sources of Red Hat Enterprise Linux (RHEL). Additional information on CentOS can be found at 4 MongoDB (from humongous ) is an open source document database, and the leading NoSQL database. Additional information on MongoDB can be found at March 2015 Bell Canada 3

12 Figure 1 Soltra Edge Cyber Intelligence Platform 2.2 Standards Soltra Edge is intended to support a variety of open standards for cyber threat information sharing. Specifically, it currently supports the following standards: Structured Threat Information expression (STIX); Trusted Automated exchange of Indicator Information (TAXII); and Traffic Lightweight Protocol (TLP). Note Other Cyber Threat Standards It should be noted that there are other cyber threat standards that are supported to varying degrees by Soltra Edge. While there are likely many such standards, a few were identified during the development of this report. Interestingly enough, most of these standards have originated in private companies and then transitioned to the open source community to various degrees. The other standards identified include the following: Common Attack Pattern Enumeration and Classification (CAPEC) CAPECC is a comprehensive dictionary and classification taxonomy off known attacks that can be used by analysts, developers, testers, and educators to advance community understanding and enhancee defences; March 2015 Bell Canadaa 4

13 Cyber Information Sharing and Collaboration Program (CISCP) 5 The Critical Infrastructure and Key Resource (CIKR) CISCP is a DHS program to improve the security posture of organizations by providing threat data in the form of indicator bulletins, analysis bulletins, alert bulletins and recommended practices to participating organizations. It should be noted that Soltra Edge supports the conversion of CISCP indicators to a STIX list through the use of an adapter; Cyber Observable expression (CybOX) 6 CybOX is a standardized schema for the specification, capture, characterization, and communication of events or stateful properties that are observable in the operational domain. It should be noted that STIX uses CybOX language to describe observables; alware Attribute Enumeration and Characterization (MAEC) 7 MAEC is a standardized language for encoding and communicating high fidelity information about malware based upon attributes such as behaviours, artefacts, and attack patterns. It should be noted that STIX can describe malware using MAEC characterizations through the use of the MAEC schema extension; OpenIOC 8 9 OpenIOC is an extensible XML schema for the description of technical characteristics that identify a known threat, an attacker s methodology, or other evidence of compromise. It should be noted that STIX provides a default extension for OpenIOC; and Open Threat exchange (OTX) 10 OTX is an open threat information sharing and analysis network that provides real time, actionable cyber threat information. 5 Additional information on CISCP can be found at 06/ispab_june2013_menna_ciscp_one_pager.pdf 6 Additional information on CybOX can be found at and 7 Additional information on MAEC can be found at and 8 IOC stands for Indicators of Compromise 9 Additional information on OpenIOC can be found at 10 Additional information on OTX can be found at threatexchange March 2015 Bell Canada 5

14 2.2.1 STIX STIX 11 is a collaborative community driven effort to define and develop a standardized language to represent structured cyber threat information. STIX characterizes an extensive set of cyber threat information, to include indicators of adversary activity (e.g., IP addresses and file hashes) as well as additional contextual information regarding threats (e.g., adversary Tactics, Techniques and Procedures [TTPs]; exploitation targets; Campaigns; and Courses of Action [COA]) that together more completely characterize the cyber adversary s motivations, capabilities, and activities, and thus, how to best defend against them. 12 STIX, which is XML based, is sponsored by the office of Cybersecurity and Communications at the DHS. Soltra Edge supports the latest version (version 1.1.1) of STIX, including all objects. Since STIX basically provides a common language for describing cyber threat information so that it can be automatically shared, stored and used consistently, the following STIX definitions 13 have been included in the report: Observable An Observable is an event or stateful property that is observed or may be observed in the operational cyber domain, such as a registry key value, an IP address, deletion of a file, or the receipt of an http GET. STIX uses Cyber Observable expression (CybOX) to represent Observables; Indicator An Indicator is a pattern of relevant observable adversary activity in the operational cyber domain along with contextual information regarding its interpretation (e.g., this domain has been compromised, this is spoofed, this file hash is associated with this trojan, etc.), handling, etc. An Observable pattern captures what may be seen; the Indicator enumerates why this is Observable pattern is of interest; 11 Additional information on STIX can found at and Samples of STIX content can be found at These definitions are STIX language definitions that were taken directly from March 2015 Bell Canada 6

15 Incident An Incident is a set of related system and network activity that is associated with the same adversary activity and/or attack along with contextual information such as who is involved, when it occurred, what was affected, what was the impact, what actions were taken in response, etc.; TTP Tactics, Techniques and Procedures are a representation of the behaviour or modus operandi of a cyber adversary including the use of particular attack patterns, malware, exploits, tools, infrastructure, or the targeting of particular victims; ExploitTarget An ExploitTarget is something about a potential victim that may make them susceptible to a particular adversary TTP (e.g., a system vulnerability, weakness or configuration issue); CourseOfAction A CourseOfAction captures a particular action that could be taken to prevent, mitigate or remediate the effects of a given cyber threat. These actions could be remedial to proactively address known issues a priori or could be responses to specific adversary activity; Campaign A Campaign is a set of related adversary activity, to include TTPs, indicators, exploit targets, and incidents. It characterizes the modus operandi of a particular adversary in executing a particular intent; and ThreatActor A ThreatActor is a cyber adversary and his or her known characteristics. It is who is perpetrating the cyber attacks TAXII TAXII 14 defines a set of services and message exchanges that, when implemented, enable sharing of actionable cyber threat information across organization and product/service boundaries. Specifically, TAXII defines an XML data format and message protocols (Hypertext Transfer Protocol (HTTP)/Hypertext Transfer Protocol Secure (HTTPS)) for transporting STIX information. TAXII is 14 Additional information on TAXII can be found at and March 2015 Bell Canada 7

16 sponsored by the office of Cybersecurity and Communications at the DHS. Soltra Edge supports the latest version (version 1.1) of TAXII TLP TLP 15, which was developed by the U.S. Computer Emergency Readiness Team (US CERT), is a simple standard that is used to control the dissemination of shared data. It uses four distinct colours to distinguish how the information may be shared. Data that is tagged white can be distributed without restriction. Data that is tagged green can be shared within the community, but not publicly. Data that is tagged amber can only be shared within an organization. Data that is tagged red cannot be shared. TLP has been adopted within Soltra Edge to allow automated filtering of data by sensitivity level and for user access control. 2.3 Capabilities Soltra Edge is intended to be an aggregator of cyber threat intelligence information and the primary data store for structured intelligence within an organization. Consequently, it is intended to accept cyber intelligence feeds, in the form of STIX/TAXII feeds, from a variety of sources including the following: Commercial Feeds Commercial feeds are feeds that are purchased from professional intelligence providers; Organizational Feeds Organizational feeds are feeds that exist within the organizational environment; Open Source Feeds Open source feeds are Open Source Intelligence (OSINT) feeds provided by the open source community; Community Feeds Community feeds are feeds provided by business partners, associates, sharing communities or Information Sharing and Analysis Centers (ISACs); and Government Feeds Government feeds are typically provided by the federal government for the benefit of private industry. Soltra Edge is also capable of manually importing threat information using the web interface from a Comma Separated Values (CSV) file, a STIX file or CISCP indicators. In addition, organizations can export data from Soltra Edge in STIX formatted XML. Soltra has also demonstrated the creation of 15 Additional information on TLP can be found at cert.gov/tlp March 2015 Bell Canada 8

17 SNORT 16 rules from threat intelligence data. This was accomplished using a SNORT adapter that has yet to be released. 16 SNORT is an open source, lightweight network intrusion detection system. Additional information on SNORT can be found at March 2015 Bell Canada 9

18 3.0 Product Evaluation This section will document the results of the product evaluation performed. Specifically, this section will describe the deployed environment, configuring feeds, installing adapters, and an assessment of the solution. 3.1 Deployed Environment Soltra Edge was downloaded and deployed as a VMware Virtual Machine (VM) in a virtualized lab environment. The initial evaluation was of Soltra Edge 2.1, which was available for download as of 6 February However, version of Soltra Edge was released on 24 February The deployed environment was upgraded to this version so that the evaluation could be completed on the latest release. Version contains many security updates as well as fixes from member identified bugs. It is worth mentioning that the upgrade process, which is accomplished using yum, was seamless. The successful upgrade of the Soltra Edgee can be seen as Figure 2. Figure 2 Soltra Edge Upgrade March 2015 Bell Canadaa 10

19 3.2 Configured Feeds Soltra recommends configuringg two STIX/TAXII feeds in order to start experimenting with their product. Unfortunately, one of the two recommended feeds, FS ISAC intelligence, is only available to the FS ISAC membership. The remaining feed, Hail a TAXII.com, is a repository of Open Source Cyber Threat Intelligence feeds in STIX format. This section of the report will document the steps necessary to configure this feed on Soltra Edge. The first step in the process of configuring a feed is to add a site. In this case, the Hailataxii.com site was added as illustrated in Figure 3. The Addd Site windoww is accessiblee through Admin Sites Add Site. Figure 4 shows that the site has been added but that no feeds from the site have been configured. Figure 3 Adding a Site March 2015 Bell Canadaa 11

20 Figure 4 Site Added The next step is to configure feeds from the remote site. Figure 5 shows the ten unconfigured feeds available from the hailataxii site. One merely clicks to configure the feed of choice. In this case, the emerging threats feed was selected for configuration. Feeds can be set to update automatically or manually. This is illustrated in Figure 6. March 2015 Bell Canadaa 12

21 Figure 5 Unconfiguredd Feeds March 2015 Bell Canadaa 13

22 Figure 6 Configure Feed The configured feed can be seen in Figure 7. By clicking on poll now the latest threat intelligence information can be downloadedd for this feed. The successful completion of this operation can be seen in Figure 8. Figure 7 Configuredd Feed March 2015 Bell Canadaa 14

23 Figure 8 Downloaded Feed Once a site has been added, a feed configured and the threat intelligence information dowloaded for the feed, an examination of the threat intelligence information is possible. Soltra Edge allows administrators to browse the catalog of objects by any off the STIX parameters (discussed in Section 2.2.1) including campaigns, courses of action, exploit targets, incidents, indicators, observables, packages, threat actors and TTPs. For example, the indicator catalog, which is simply a list of indicators from the configured feeds, can be seen in Figure 9. The reader will note that of the indicators listed in Figure 9, all but one are domain watchlist, URL watchlistt indicators. The remaining indicator is an IP watchlist, URL watchlist indicator. Most indicators are used to denote domains orr IPs that have been compromised. Consequently, this information could be used to update firewalls and proxy servers. For each of the indicators listed in the catalog, there is additional information available. A specific indicator can be seen in Figure 10. Apparently, this site is being used as a command and control site for Athena malware. 17 The observable catalog, which is simply a list of observables from the configured feeds, can be seen in Figure 11. The reader will note that there are three types of observables listed in Figure 11; DomainNameObjectType, URIObjectType and AddressObjectType. Most observables are used to denote observed events in the operational cyber domain. A specific observable can be seen in Figure 12. Unfortunately, aside from a domain name for a botnet site there is no additional information available. This lack of additional informationn was standard across the observables listed in the catalog from the Hail a TAXII.com feed. 17 A description of the Athena malware is available at // a ddos malware odyssey March 2015 Bell Canadaa 15

24 Figure 9 Indicator Catalog March 2015 Bell Canadaa 16

25 Figure 10 Specific Indicator March 2015 Bell Canadaa 17

26 Figure 11 Observable Catalog March 2015 Bell Canadaa 18

27 Figure 12 Specific Observable 3.3 Adapters Soltra has made available two adapters for download on their site. One adapter supports the conversion of CISCP indicators to a STIX list, while the other allows forr the import of CSV based threatt information. The two adapters were both installedd successfully (see Figure 13). However, we were unable to test the CISCP adapter as no CISCP indicator file has been made available for testing. Apparently, US Cert files are classified TLP Amber meaning that they cannot be shared publicly. In addition, the CSV adapter failed to import the CSV test file provided. It resulted in an adapter error. Although this problem has been reported to Soltra (by three other members of the forum under two separate forums), at the time of writing this problem hadd yet to be resolved by Soltra staff. The lack of resolution for this issue is somewhat surprising given that Soltra staff are usually extremely responsive in resolving outstanding issues. The import and preview of the CSV indicators test file can be seen in Figure 14 and Figure 15 respectively. March 2015 Bell Canadaa 19

28 Figure 13 Adapters Installed March 2015 Bell Canadaa 20

29 Figure 14 CSV Indicators Import March 2015 Bell Canadaa 21

30 Figure 15 CSV Indicators Preview 3.4 Assessment This section of the report will assess Soltra Edge in terms of the following: Release Cycle; User Community; Functionality; and Alternatives Release Cycle Soltra Edge will eventually be released in two versions; a free community version and a paid version. The free community version, which is the version that is currently available for download, will contain the features most needed by many organizations. This version of Soltra Edge has undergone a number of releasee cycles in a relatively short period of time, demonstrating Soltra s commitment to the product. Version 2.0 was released onn 4 December 2014, version 2.1 on 6 February 2015 and version on 24 February The paid version, which will be presumably released once the product has matured, willl support thee requirements of larger entities. In all March 2015 Bell Canadaa 22

31 likelihood this will create a two tiered solution in which users of the community version are forced to upgrade to the paid version to take advantage of additional functionality User Community The Soltra Edge user community currently has 1720 members who have made in excess of eight hundred posts on the Soltra forum. 18 Given the relative infancy of the product these numbers are quite impressive. Furthermore, the Soltra staff (technical and business) are quite responsive in addressing both technical problems and business related issues Functionality In terms of functionality, Soltra Edge is currently somewhat hindered at this point due to its close integration with STIX/TAXII due to the lack of available threat intelligence feeds in this format and the relative lack of availability of security tools/appliances supporting these standards. A list of intelligence providers and security tool vendors that have validated STIX/TAXII implementations and integration with Soltra Edge is available on the Soltra site. 19 Unfortunately, the list, which was last updated on 18 December 2014, is not extensive. The list has also been included as Figure 16. However, it is worth mentioning that what current functionality is provided by Soltra Edge in terms of supporting/configuring STIX/TAXII feeds and aggregating/storing threat intelligence information seems to work quite well. Furthermore, the product is quite stable and quite easy to use. 18 The Soltra Edge forum is available at 19 The Soltra Edge STIX/TAXII integrations list is available at vendor stix taxii integrations/ March 2015 Bell Canada 23

32 Figure 16 Soltra Edge STIX/TAXII Integrationss Alternatives This report would be remiss if it did not mention cyber threat intelligence platform alternatives. Specifically, this section of the report will provide a brief overview of the following alternatives to Soltra Edge: Microsoft Interflow; ThreatConnect; and Vorstack Automation and Collaboration Platform (ACP) Microsoft Interflow Microsoft announced 20 their security and threat information exchange platform for professionals working in cybersecurity, called Microsoft Interflow 21, in June Unfortunately, since that date there has been very little additional information providedd except thatt the platform is currently 20 This announcement can be found in many places including // intelligence/microsoft unveils new intelligence 21 Additional information on the Microsoft Interflow Platform can be found at sharing platform/d/d id/ and //blogs.technet.com/b/msrc/archive/2014/06/23/announcing microsoft interflow.aspx https: ://technet.microsoft.com/en us/library/dn aspx March 2015 Bell Canadaa 24

33 available for private preview. Interflow uses industry specifications to create an automated, machine readable feed of threat and security information that can be shared across industries and groups in near real time. The goal of the platform is to help security professionals respond more quickly to threats. It will also help reduce cost of defense by automating processes that are currently performed manually. 22 In terms of industry specifications, Interflow will support STIX, TAXII and CybOX. It will also provide a means to feed threat and security information into firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and SIEMS. Interflow will run on the Microsoft Azure public cloud. While the data feeds will be free, organizations will require an Azure subscription to receive them ThreatConnect ThreatConnect 23 is a threat intelligence platform that allows an organization to aggregate, analyze, and act on all of the threat intelligence data it receives. While ThreatConnect supports the ingest of multiple data formats, including emerging standards such as STIX, the focus seems to be on integration with commercial threat intelligence feeds (e.g., CrowdStrike s Falcon Intelligence, isight s ThreatScape, Wapack Labs ThreatRecon) and products. There is a free community version, along with three paid versions (basic, team and enterprise) of the product. ThreatConnect also supports a variety of deployment models, including on premises, private cloud and public cloud Vorstack ACP Vorstack ACP 24 connects to third party (e.g., HP ArcSight, IBM QRadar, RSA Security Analytics, Splunk) SIEM and security log management tools to automate the ingestion, querying and reporting of threat intelligence data. Specifically, Vorstack ACP can automate the queries against these log management and analytics tools and then correlate the responses against other data points. The product supports STIX/TAXII, even providing a bridge to other software (e.g., Hadoop) so that the software doesn t have to support the standards directly microsoft interflow.aspx 23 Additional information on ThreatConnect can be found at 24 Additional information of Vorstack ACP can be found at March 2015 Bell Canada 25

34 4.0 Conclusion & Recommendations The Centre for Operational Research and Analysis (CORA), which is a Defence Research & Development Canada (DRDC) research centre for systems analysis and operational research, is in the process of characterizing threat and building a Department of National Defence (DND) specific cyber threat model. The aggregation of cyber threat intelligence information from a variety of reputable sources and the ability to act on this information are likely to be important aspects of the overall cyber threat model being developed. Soltra Edge is intended to serve as the intelligence hub for an organization, connecting to all threat intelligence communities and providing actionable data back to the organization s environment for integration with internal security tools/appliances. The intent is that Soltra Edge will allow organizations to receive, store and send cyber security threat intelligence automatically, allowing these organizations to better deploy safeguards against a potential cyber attack. To realize these goals, Soltra Edge has been designed to support the STIX/TAXII standards almost exclusively. While this may prove to be the prudent long term approach, as these standards seem to be getting a considerable amount of traction, it does limit what can be accomplished in the shortterm due to the lack of STIX/TAXII threat intelligence feeds and STIX/TAXII compliant security tools/appliances. It is anticipated that as Soltra Edge matures it will increase its support for commercial feeds and security tools/appliances, thus improving its overall utility as the central threat intelligence hub for an organization. This report makes the following recommendations: DRDC should continue to actively monitor Soltra Edge and STIX/TAXII development; DRDC should review and analyze the community version of ThreatConnect to ascertain how it compares to Soltra Edge; and DRDC should implement a virtualized, cyber threat intelligence proof of concept to demonstrate cyber threat intelligence capabilities and how they can be used to automatically configure an organization s security tools/appliances to thwart a cyber attack. March 2015 Bell Canada 26

35 5.0 Acronyms & Abbreviations ACP CAPEC CERT CIKR CISCP COA CORA CSV CyBOX DHS DRDC DTCC FS ISAC HTTP HTTPS IDS IOC IPS ISAC MAEC Automation and Collaboration Platform Common Attack Pattern Enumeration and Classification Computer Emergency Readiness Team Critical Infrastructure and Key Response Cyber Information Sharing and Collaboration Program Courses of Action Centre for Operational Research and Analysis Comma Separated Values Cyber Observable expression Department of Homeland Security Defence Research & Development Canada Depository Trust & Clearing Corporation Financial Services Information Sharing and Analysis Center Hypertext Transfer Protocol Hypertext Transfer Protocol Secure Intrusion Detection System Indicators of Compromise Intrusion Prevention System Information Sharing and Analytics Center Malware Attribute Enumeration and Characterization March 2015 Bell Canada 27

36 MTA OSINT OTX RHEL SAWG SIEM STIX TAXII TLP TTPs VM Mail Transfer Agent Open Source Intelligence Open Threat exchange Red Hat Enterprise Linux Security Automation Working Group Security Incident and Event Management Structured Threat Information expression Trusted Automated exchange of Indicator Information Traffic Lightweight Protocol Tactics, Techniques and Procedures Virtual Machine March 2015 Bell Canada 28

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Eight Essential Elements for Effective Threat Intelligence Management May 2015 INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent

More information

Security Intelligence Services. www.kaspersky.com

Security Intelligence Services. www.kaspersky.com Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats

More information

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily

More information

Attackers are reusing attacks (because they work)

Attackers are reusing attacks (because they work) The Problem Attackers are reusing attacks (because they work) Defenders are collecting and/or sharing information, but Often a manual process (copy-paste from a PDF) Different sources provide different

More information

FS-ISAC CHARLES BRETZ

FS-ISAC CHARLES BRETZ FS-ISAC CHARLES BRETZ Information Sharing To be forewarned is to be fore-armed MISSION: Sharing Timely, Relevant, Actionable Cyber and Physical Security Information & Analysis A nonprofit private sector

More information

Cyber Security Summit 2015

Cyber Security Summit 2015 Cyber Security Summit 2015 Threat Intelligence 101: Introduction and Foundations Matthew J. Harmon IT Risk Limited, LLC Matthew J. Harmon IT Risk Limited, Principal Consultant DFIR, Pen Testing, Risk Management,

More information

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Separating Signal from Noise: Taking Threat Intelligence to the Next Level SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges

More information

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

THREAT VISIBILITY & VULNERABILITY ASSESSMENT THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings

More information

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel @Ben_Smith Ben Smith, CISSP Field CTO (US East), Security Portfolio A Security Maturity Path CONTROLS COMPLIANCE IT RISK BUSINESS

More information

Threat Intelligence: STIX and Stones Will Break Your Foes

Threat Intelligence: STIX and Stones Will Break Your Foes Copyright 2014 Splunk Inc. Threat Intelligence: STIX and Stones Will Break Your Foes Fred Wilmot Director, Global Security PracCce Brad Lindow a.k.a. Superman Global Security Strategist, Splunk Disclaimer

More information

Standardizing Cyber Threat Intelligence Information with the Structured Threat Information expression (STIX )

Standardizing Cyber Threat Intelligence Information with the Structured Threat Information expression (STIX ) THREAT-BASED DEFENSE Standardizing Cyber Threat Intelligence Information with the Structured Threat Information expression (STIX ) 2012. The MITRE Corporation. All rights reserved. IT IS BECOMING INCREASINGLY

More information

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat

More information

All about Threat Central

All about Threat Central All about Threat Central Ted Ross & Nadav Cohen #HPProtect Forward-looking statements This is a rolling (up to three year) Roadmap and is subject to change without notice. This document contains forward

More information

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.

Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2. ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework

More information

After the Attack: RSA's Security Operations Transformed

After the Attack: RSA's Security Operations Transformed After the Attack: RSA's Security Operations Transformed Ben Smith, CISSP RSA Field CTO (East), Security Portfolio Senior Member, ISSA Northern Virginia 1 The Environment ~ 2,000 security devices ~55M security

More information

NASCIO 2015 State IT Recognition Awards

NASCIO 2015 State IT Recognition Awards NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA [email protected]

More information

US-CERT Year in Review. United States Computer Emergency Readiness Team

US-CERT Year in Review. United States Computer Emergency Readiness Team US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 What s Inside Welcome 1 Vison, Mission, Goals

More information

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC WHITE PAPER Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC www.openioc.org OpenIOC 1 Table of Contents Introduction... 3 IOCs & OpenIOC... 4 IOC Functionality... 5

More information

FROM INBOX TO ACTION EMAIL AND THREAT INTELLIGENCE:

FROM INBOX TO ACTION EMAIL AND THREAT INTELLIGENCE: WHITE PAPER EMAIL AND THREAT INTELLIGENCE: FROM INBOX TO ACTION There is danger in your email box. You know it, and so does everyone else. The term phishing is now part of our daily lexicon, and even if

More information

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index DIR Contract Number DIR-TSO-2621 Appendix C Index CenturyLink Technology s offers Tier 3 Cloud services: Public Cloud, Private Cloud and Hybrid Cloud provided over our Tier One network. We own and operate

More information

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security

More information

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4) Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware

More information

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Joe Goldberg Splunk Session ID: SPO-W09 Session Classification: Intermediate About Me Joe Goldberg Current: Splunk - Security Evangelist

More information

Symantec Cyber Security Services: DeepSight Intelligence

Symantec Cyber Security Services: DeepSight Intelligence Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with

More information

APPLICATION PROGRAMMING INTERFACE

APPLICATION PROGRAMMING INTERFACE DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With

More information

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security

More information

The Importance of Cybersecurity Monitoring for Utilities

The Importance of Cybersecurity Monitoring for Utilities The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive

More information

The Third Rail: New Stakeholders Tackle Security Threats and Solutions

The Third Rail: New Stakeholders Tackle Security Threats and Solutions SESSION ID: CXO-R03 The Third Rail: New Stakeholders Tackle Security Threats and Solutions Ted Ross Director, Threat Intelligence HP Security Research @tedross Agenda My brief background An example of

More information

Can We Become Resilient to Cyber Attacks?

Can We Become Resilient to Cyber Attacks? Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,

More information

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

Anatomy of Cyber Threats, Vulnerabilities, and Attacks Anatomy of Cyber Threats, Vulnerabilities, and Attacks ACTIONABLE THREAT INTELLIGENCE FROM ONTOLOGY-BASED ANALYTICS 1 Anatomy of Cyber Threats, Vulnerabilities, and Attacks Copyright 2015 Recorded Future,

More information

SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS

SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS Samir Saklikar RSA, The Security Division of EMC Session ID: CLE T05 Session Classification: Intermediate Agenda Advanced Targeted

More information

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an

More information

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform) McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload

More information

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Concierge SIEM Reporting Overview

Concierge SIEM Reporting Overview Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts

More information

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...

More information

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government

More information

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion

More information

Vulnerability Management

Vulnerability Management Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other

More information

Cyber Security Metrics Dashboards & Analytics

Cyber Security Metrics Dashboards & Analytics Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics

More information

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery

More information

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Recommended Practice Case Study: Cross-Site Scripting. February 2007 Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber

More information

Unified Security Management and Open Threat Exchange

Unified Security Management and Open Threat Exchange 13/09/2014 Unified Security Management and Open Threat Exchange RICHARD KIRK SENIOR VICE PRESIDENT 11 SEPTEMBER 2014 Agenda! A quick intro to AlienVault Unified Security Management (USM)! Overview of the

More information

SPEAR PHISHING UNDERSTANDING THE THREAT

SPEAR PHISHING UNDERSTANDING THE THREAT SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business

More information

Automate the Hunt. Rapid IOC Detection and Remediation WHITE PAPER WP-ATH-032015

Automate the Hunt. Rapid IOC Detection and Remediation WHITE PAPER WP-ATH-032015 Rapid IOC Detection and Remediation WP-ATH-032015 EXECUTIVE SUMMARY In the escalating war that is cyber crime, attackers keep upping their game. Their tools and techniques are both faster and stealthier

More information

Covert Operations: Kill Chain Actions using Security Analytics

Covert Operations: Kill Chain Actions using Security Analytics Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special

More information

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................

More information

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

White Paper: Leveraging Web Intelligence to Enhance Cyber Security White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence

More information

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, [email protected] Technical POC: George Romas, [email protected]

More information

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS

More information

Application for Splunk Enterprise

Application for Splunk Enterprise Application for Splunk Enterprise User Guide Document Version 1.77 28 October 2015 10004-01 EN Rev. A 2015 ThreatConnect, Inc. ThreatConnect is a registered trademark of ThreatConnect, Inc. UNIX is a registered

More information

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?

More information

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved. Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control

More information

Common Attack Pattern Enumeration and Classification CAPEC A Community Knowledge Resource for Building Secure Software

Common Attack Pattern Enumeration and Classification CAPEC A Community Knowledge Resource for Building Secure Software Common Attack Pattern Enumeration and Classification CAPEC A Community Knowledge Resource for Building Secure Software CAPEC is a publicly available catalog of attack patterns along with a comprehensive

More information

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion

More information

Cyber Watch. Written by Peter Buxbaum

Cyber Watch. Written by Peter Buxbaum Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs

More information

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Cyber in the News 1 Tactics, Techniques and Procedures These observed tactics, techniques

More information

Threat Intelligence Buyer s Guide

Threat Intelligence Buyer s Guide Threat Intelligence Buyer s Guide SANS CTI Summit, 10 February 2014 Rick Holland @rickhholland Principal Analyst Last year 2014 Forrester Research, Inc. Reproduction Prohibited 2 This year, Arnold s back!!

More information

Cisco RSA Announcement Update

Cisco RSA Announcement Update Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of

More information

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

Advanced Threat Protection with Dell SecureWorks Security Services

Advanced Threat Protection with Dell SecureWorks Security Services Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5

More information

Next Generation IPS and Reputation Services

Next Generation IPS and Reputation Services Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

CALNET 3 Category 7 Network Based Management Security. Table of Contents

CALNET 3 Category 7 Network Based Management Security. Table of Contents State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2

More information

Obtaining Enterprise Cybersituational

Obtaining Enterprise Cybersituational SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational

More information

Practical Threat Intelligence. with Bromium LAVA

Practical Threat Intelligence. with Bromium LAVA Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful

More information

Unified Security, ATP and more

Unified Security, ATP and more SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users

More information

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO

More information

Intelligence Driven Security

Intelligence Driven Security Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings

More information

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly

More information

IBM Advanced Threat Protection Solution

IBM Advanced Threat Protection Solution IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain

More information

ESG Threat Intelligence Research Project

ESG Threat Intelligence Research Project TM Enterprise Strategy Group Getting to the bigger truth. ESG Threat Intelligence Research Project May 2015 Jon Oltsik, Senior Principal Analyst Project Overview 304 completed online surveys with IT professionals

More information

The Cyber Threat Profiler

The Cyber Threat Profiler Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are

More information

CYBER SECURITY INFORMATION SHARING & COLLABORATION

CYBER SECURITY INFORMATION SHARING & COLLABORATION Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers

More information

WHITE PAPER: THREAT INTELLIGENCE RANKING

WHITE PAPER: THREAT INTELLIGENCE RANKING WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes

More information

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations

More information

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.

More information

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide

IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security

More information

Modern Approach to Incident Response: Automated Response Architecture

Modern Approach to Incident Response: Automated Response Architecture SESSION ID: ANF-T10 Modern Approach to Incident Response: Automated Response Architecture James Carder Director, Security Informatics Mayo Clinic @carderjames Jessica Hebenstreit Senior Manager, Security

More information

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations

More information

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:

More information

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult

More information

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE Network that Know Rasmus Andersen Lead Security Sales Specialist North & RESE Email Gateway vendor CERT AV vendor Law enforcement Web Security Vendor Network security appliance vendor IT Department App

More information

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon

More information

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems

Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems Security Tools (SecTools) UCR's implementationn of a security dashboard (nominally designated SecTools) is a wonderfully flexible and useful framework for viewing current security incidents and for gaining

More information

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division

More information