Soltra edge open cyber intelligence platform report
|
|
|
- Ashley Walton
- 10 years ago
- Views:
Transcription
1 Soltra edge open cyber intelligence platform report Prepared By: Alan Magar Sphyrna Security 340 Ridgeside Farm Drive Kanata, Ontario K2W 0A1 PWGSC Contract Number: W FE01/001/ST Task 33 CSA: Melanie Bernier, Defence Scientist, Scientific Authority: Melanie Bernier Defence Scientist DRDC CORA Research Centre The scientific or technical validity of this Contract Report is entirely the responsibility of the Contractor and the contents do not necessarily have the approval or endorsement of the Department of National Defence of Canada. Contract Report DRDC-RDDC-2015-C204 March 2015
2 This Contract Report was produced for the Cyber Decision Making and Response project (05ac) under the DRDC Cyber Operations S&T program. Her Majesty the Queen in Right of Canada, as represented by the Minister of National Defence, 2015 Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 2015
3 Soltra Edge Open Cyber Intelligence Platform Report prepared for Defence Research and Development Canada prepared by
4 Bell Canada 160 Elgin Street 17th Floor Ottawa, Ontario Sphyrna Security 340 Ridgeside Farm Drive Kanata, Ontario K2W 0A1 K1S 5N4 March 2015 March 2015 Bell Canadaa ii
5 Confidentiality This document is UNCLASSIFIED. Authors Bell / Sphyrna Team Role Alan Magar Security Architect Revision Control Revision Date Modifications March 2015 Draft Report March 2015 Final Report March 2015 Bell Canada iii
6 Table of Contents 1.0 INTRODUCTION BACKGROUND PURPOSE DOCUMENT STRUCTURE TECHNICAL OVERVIEW ARCHITECTURE STANDARDS STIX TAXII TLP CAPABILITIES PRODUCT EVALUATION DEPLOYED ENVIRONMENT CONFIGURED FEEDS ADAPTERS ASSESSMENT Release Cycle User Community Functionality Alternatives CONCLUSION & RECOMMENDATIONS ACRONYMS & ABBREVIATIONS March 2015 Bell Canada iv
7 List of Figures Figure 1 Soltra Edge Cyber Intelligence Platform... 4 Figure 2 Soltra Edge Upgrade Figure 3 Adding a Site Figure 4 Site Added Figure 5 Unconfigured Feeds Figure 6 Configure Feed Figure 7 Configured Feed Figure 8 Downloaded Feed Figure 9 Indicator Catalog Figure 10 Specific Indicator Figure 11 Observable Catalog Figure 12 Specific Observable Figure 13 Adapters Installed Figure 14 CSV Indicators Import Figure 15 CSV Indicators Preview Figure 16 Soltra Edge STIX/TAXII Integrations March 2015 Bell Canada v
8 March 2015 Bell Canada vi
9 1.0 Introduction Cyber threat intelligence has received a great deal of publicity of late. This is not surprising given the number of high profile cyber attacks that have figured prominently in the news over the past year. President Obama recently (February 2015) signed an executive order to improve the sharing of cyber threat information within the private sector and between the private sector and government. Specifically, the executive order enables the Department of Homeland Security (DHS) to share classified intelligence with the private sector and to develop standards to facilitate the sharing of cyber threat information. 1 Later the same month, President Obama announced the establishment of a cyber threat intelligence integration center aimed at coordinating ongoing federal efforts to counter hackers and other cyber threats aimed at the U.S. government and private industry Background The Centre for Operational Research and Analysis (CORA), which is a Defence Research & Development Canada (DRDC) research centre for systems analysis and operational research, is in the process of characterizing threat and building a Department of National Defence (DND) specific cyber threat model. The aggregation of cyber threat intelligence information from a variety of reputable sources and the ability to act on this information are likely to be important aspects of the overall cyber threat model being developed. 1.2 Purpose Soltra Edge is intended to serve as the intelligence hub for an organization, connecting to all threat intelligence communities and providing actionable data back to the organization s environment for integration with internal security tools/appliances. The intent is that Soltra Edge will allow organizations to receive, store and send cyber security threat intelligence automatically, allowing these organizations to better deploy safeguards against a potential cyber attack. 1 This announcement is mentioned in numerous locations including cyberthreat executive order html 2 This announcement is mentioned in numerous locations including create new cyber threat center March 2015 Bell Canada 1
10 The purpose of this report is to review and analyze the Soltra Edge Open Cyber Intelligence Platform and its components (Structured Threat Information expression (STIX)/Trusted Automated exchange of Indicator Information (TAXII)). 1.3 Document Structure This report consists of the following sections: Section 1.0 Introduction: provides an overview of the report; Section 2.0 Technical Overview: provides a high level overview of Soltra Edge including its architecture, standards and capabilities; Section 3.0 Product Evaluation: documents the evaluation of the platform, including the deployed environment, configured feeds, adapters and an assessment of the product; Section 4.0 Conclusions & Recommendations: summarizes the conclusions and recommendations derived from the development of this report; and Section 5.0 Acronyms & Abbreviations: lists the acronyms and abbreviations used throughout this report. March 2015 Bell Canada 2
11 2.0 Technical Overview The Security Automation Working Group (SAWG) within the Financial Services Information Sharing and Analysis Center (FS ISAC) initiated a project code named Avalanche to champion the use of standards based cyber threat intelligence sharing. In September 2014, FS ISAC and the Depository Trust & Clearing Corporation (DTCC) announced a joint effort to develop and market automation solutions that advance cyber security capabilities and the resilience of critical infrastructure organizations. The resulting solution, Soltra Edge, is based on the requirements, standards and overall roadmap from the SAWG group within FS ISAC. This section of the report will provide a technical overview of the product, including an examination of its architecture, standards and capabilities. 2.1 Architecture Soltra Edge, which runs on CentOS and utilizes MongoDB 4 for storage, is administered through a web interface. In terms of cyber threat intelligence services, Soltra Edge can be configured to accept structured (e.g., STIX/TAXIII) threat intelligence feeds and other file types through adapters. The threat information can be managed and then exported in STIX format to various STIXcompatible security tools/appliances including firewalls or proxy servers, Mail Transfer Agents (MTAs) and Security Incident and Event Management (SIEMs). It is the security appliances that are responsible for taking the threat information provided by Soltra Edge and acting upon it. For example, a list of malicious URLs could be sent to firewalls/proxy servers, which would then proceed to block traffic originating from those network addresses. The Soltra Edge Cyber Intelligence Platform is illustrated in Figure 1. 3 CentOS is an open source Linux distribution derived from the sources of Red Hat Enterprise Linux (RHEL). Additional information on CentOS can be found at 4 MongoDB (from humongous ) is an open source document database, and the leading NoSQL database. Additional information on MongoDB can be found at March 2015 Bell Canada 3
12 Figure 1 Soltra Edge Cyber Intelligence Platform 2.2 Standards Soltra Edge is intended to support a variety of open standards for cyber threat information sharing. Specifically, it currently supports the following standards: Structured Threat Information expression (STIX); Trusted Automated exchange of Indicator Information (TAXII); and Traffic Lightweight Protocol (TLP). Note Other Cyber Threat Standards It should be noted that there are other cyber threat standards that are supported to varying degrees by Soltra Edge. While there are likely many such standards, a few were identified during the development of this report. Interestingly enough, most of these standards have originated in private companies and then transitioned to the open source community to various degrees. The other standards identified include the following: Common Attack Pattern Enumeration and Classification (CAPEC) CAPECC is a comprehensive dictionary and classification taxonomy off known attacks that can be used by analysts, developers, testers, and educators to advance community understanding and enhancee defences; March 2015 Bell Canadaa 4
13 Cyber Information Sharing and Collaboration Program (CISCP) 5 The Critical Infrastructure and Key Resource (CIKR) CISCP is a DHS program to improve the security posture of organizations by providing threat data in the form of indicator bulletins, analysis bulletins, alert bulletins and recommended practices to participating organizations. It should be noted that Soltra Edge supports the conversion of CISCP indicators to a STIX list through the use of an adapter; Cyber Observable expression (CybOX) 6 CybOX is a standardized schema for the specification, capture, characterization, and communication of events or stateful properties that are observable in the operational domain. It should be noted that STIX uses CybOX language to describe observables; alware Attribute Enumeration and Characterization (MAEC) 7 MAEC is a standardized language for encoding and communicating high fidelity information about malware based upon attributes such as behaviours, artefacts, and attack patterns. It should be noted that STIX can describe malware using MAEC characterizations through the use of the MAEC schema extension; OpenIOC 8 9 OpenIOC is an extensible XML schema for the description of technical characteristics that identify a known threat, an attacker s methodology, or other evidence of compromise. It should be noted that STIX provides a default extension for OpenIOC; and Open Threat exchange (OTX) 10 OTX is an open threat information sharing and analysis network that provides real time, actionable cyber threat information. 5 Additional information on CISCP can be found at 06/ispab_june2013_menna_ciscp_one_pager.pdf 6 Additional information on CybOX can be found at and 7 Additional information on MAEC can be found at and 8 IOC stands for Indicators of Compromise 9 Additional information on OpenIOC can be found at 10 Additional information on OTX can be found at threatexchange March 2015 Bell Canada 5
14 2.2.1 STIX STIX 11 is a collaborative community driven effort to define and develop a standardized language to represent structured cyber threat information. STIX characterizes an extensive set of cyber threat information, to include indicators of adversary activity (e.g., IP addresses and file hashes) as well as additional contextual information regarding threats (e.g., adversary Tactics, Techniques and Procedures [TTPs]; exploitation targets; Campaigns; and Courses of Action [COA]) that together more completely characterize the cyber adversary s motivations, capabilities, and activities, and thus, how to best defend against them. 12 STIX, which is XML based, is sponsored by the office of Cybersecurity and Communications at the DHS. Soltra Edge supports the latest version (version 1.1.1) of STIX, including all objects. Since STIX basically provides a common language for describing cyber threat information so that it can be automatically shared, stored and used consistently, the following STIX definitions 13 have been included in the report: Observable An Observable is an event or stateful property that is observed or may be observed in the operational cyber domain, such as a registry key value, an IP address, deletion of a file, or the receipt of an http GET. STIX uses Cyber Observable expression (CybOX) to represent Observables; Indicator An Indicator is a pattern of relevant observable adversary activity in the operational cyber domain along with contextual information regarding its interpretation (e.g., this domain has been compromised, this is spoofed, this file hash is associated with this trojan, etc.), handling, etc. An Observable pattern captures what may be seen; the Indicator enumerates why this is Observable pattern is of interest; 11 Additional information on STIX can found at and Samples of STIX content can be found at These definitions are STIX language definitions that were taken directly from March 2015 Bell Canada 6
15 Incident An Incident is a set of related system and network activity that is associated with the same adversary activity and/or attack along with contextual information such as who is involved, when it occurred, what was affected, what was the impact, what actions were taken in response, etc.; TTP Tactics, Techniques and Procedures are a representation of the behaviour or modus operandi of a cyber adversary including the use of particular attack patterns, malware, exploits, tools, infrastructure, or the targeting of particular victims; ExploitTarget An ExploitTarget is something about a potential victim that may make them susceptible to a particular adversary TTP (e.g., a system vulnerability, weakness or configuration issue); CourseOfAction A CourseOfAction captures a particular action that could be taken to prevent, mitigate or remediate the effects of a given cyber threat. These actions could be remedial to proactively address known issues a priori or could be responses to specific adversary activity; Campaign A Campaign is a set of related adversary activity, to include TTPs, indicators, exploit targets, and incidents. It characterizes the modus operandi of a particular adversary in executing a particular intent; and ThreatActor A ThreatActor is a cyber adversary and his or her known characteristics. It is who is perpetrating the cyber attacks TAXII TAXII 14 defines a set of services and message exchanges that, when implemented, enable sharing of actionable cyber threat information across organization and product/service boundaries. Specifically, TAXII defines an XML data format and message protocols (Hypertext Transfer Protocol (HTTP)/Hypertext Transfer Protocol Secure (HTTPS)) for transporting STIX information. TAXII is 14 Additional information on TAXII can be found at and March 2015 Bell Canada 7
16 sponsored by the office of Cybersecurity and Communications at the DHS. Soltra Edge supports the latest version (version 1.1) of TAXII TLP TLP 15, which was developed by the U.S. Computer Emergency Readiness Team (US CERT), is a simple standard that is used to control the dissemination of shared data. It uses four distinct colours to distinguish how the information may be shared. Data that is tagged white can be distributed without restriction. Data that is tagged green can be shared within the community, but not publicly. Data that is tagged amber can only be shared within an organization. Data that is tagged red cannot be shared. TLP has been adopted within Soltra Edge to allow automated filtering of data by sensitivity level and for user access control. 2.3 Capabilities Soltra Edge is intended to be an aggregator of cyber threat intelligence information and the primary data store for structured intelligence within an organization. Consequently, it is intended to accept cyber intelligence feeds, in the form of STIX/TAXII feeds, from a variety of sources including the following: Commercial Feeds Commercial feeds are feeds that are purchased from professional intelligence providers; Organizational Feeds Organizational feeds are feeds that exist within the organizational environment; Open Source Feeds Open source feeds are Open Source Intelligence (OSINT) feeds provided by the open source community; Community Feeds Community feeds are feeds provided by business partners, associates, sharing communities or Information Sharing and Analysis Centers (ISACs); and Government Feeds Government feeds are typically provided by the federal government for the benefit of private industry. Soltra Edge is also capable of manually importing threat information using the web interface from a Comma Separated Values (CSV) file, a STIX file or CISCP indicators. In addition, organizations can export data from Soltra Edge in STIX formatted XML. Soltra has also demonstrated the creation of 15 Additional information on TLP can be found at cert.gov/tlp March 2015 Bell Canada 8
17 SNORT 16 rules from threat intelligence data. This was accomplished using a SNORT adapter that has yet to be released. 16 SNORT is an open source, lightweight network intrusion detection system. Additional information on SNORT can be found at March 2015 Bell Canada 9
18 3.0 Product Evaluation This section will document the results of the product evaluation performed. Specifically, this section will describe the deployed environment, configuring feeds, installing adapters, and an assessment of the solution. 3.1 Deployed Environment Soltra Edge was downloaded and deployed as a VMware Virtual Machine (VM) in a virtualized lab environment. The initial evaluation was of Soltra Edge 2.1, which was available for download as of 6 February However, version of Soltra Edge was released on 24 February The deployed environment was upgraded to this version so that the evaluation could be completed on the latest release. Version contains many security updates as well as fixes from member identified bugs. It is worth mentioning that the upgrade process, which is accomplished using yum, was seamless. The successful upgrade of the Soltra Edgee can be seen as Figure 2. Figure 2 Soltra Edge Upgrade March 2015 Bell Canadaa 10
19 3.2 Configured Feeds Soltra recommends configuringg two STIX/TAXII feeds in order to start experimenting with their product. Unfortunately, one of the two recommended feeds, FS ISAC intelligence, is only available to the FS ISAC membership. The remaining feed, Hail a TAXII.com, is a repository of Open Source Cyber Threat Intelligence feeds in STIX format. This section of the report will document the steps necessary to configure this feed on Soltra Edge. The first step in the process of configuring a feed is to add a site. In this case, the Hailataxii.com site was added as illustrated in Figure 3. The Addd Site windoww is accessiblee through Admin Sites Add Site. Figure 4 shows that the site has been added but that no feeds from the site have been configured. Figure 3 Adding a Site March 2015 Bell Canadaa 11
20 Figure 4 Site Added The next step is to configure feeds from the remote site. Figure 5 shows the ten unconfigured feeds available from the hailataxii site. One merely clicks to configure the feed of choice. In this case, the emerging threats feed was selected for configuration. Feeds can be set to update automatically or manually. This is illustrated in Figure 6. March 2015 Bell Canadaa 12
21 Figure 5 Unconfiguredd Feeds March 2015 Bell Canadaa 13
22 Figure 6 Configure Feed The configured feed can be seen in Figure 7. By clicking on poll now the latest threat intelligence information can be downloadedd for this feed. The successful completion of this operation can be seen in Figure 8. Figure 7 Configuredd Feed March 2015 Bell Canadaa 14
23 Figure 8 Downloaded Feed Once a site has been added, a feed configured and the threat intelligence information dowloaded for the feed, an examination of the threat intelligence information is possible. Soltra Edge allows administrators to browse the catalog of objects by any off the STIX parameters (discussed in Section 2.2.1) including campaigns, courses of action, exploit targets, incidents, indicators, observables, packages, threat actors and TTPs. For example, the indicator catalog, which is simply a list of indicators from the configured feeds, can be seen in Figure 9. The reader will note that of the indicators listed in Figure 9, all but one are domain watchlist, URL watchlistt indicators. The remaining indicator is an IP watchlist, URL watchlist indicator. Most indicators are used to denote domains orr IPs that have been compromised. Consequently, this information could be used to update firewalls and proxy servers. For each of the indicators listed in the catalog, there is additional information available. A specific indicator can be seen in Figure 10. Apparently, this site is being used as a command and control site for Athena malware. 17 The observable catalog, which is simply a list of observables from the configured feeds, can be seen in Figure 11. The reader will note that there are three types of observables listed in Figure 11; DomainNameObjectType, URIObjectType and AddressObjectType. Most observables are used to denote observed events in the operational cyber domain. A specific observable can be seen in Figure 12. Unfortunately, aside from a domain name for a botnet site there is no additional information available. This lack of additional informationn was standard across the observables listed in the catalog from the Hail a TAXII.com feed. 17 A description of the Athena malware is available at // a ddos malware odyssey March 2015 Bell Canadaa 15
24 Figure 9 Indicator Catalog March 2015 Bell Canadaa 16
25 Figure 10 Specific Indicator March 2015 Bell Canadaa 17
26 Figure 11 Observable Catalog March 2015 Bell Canadaa 18
27 Figure 12 Specific Observable 3.3 Adapters Soltra has made available two adapters for download on their site. One adapter supports the conversion of CISCP indicators to a STIX list, while the other allows forr the import of CSV based threatt information. The two adapters were both installedd successfully (see Figure 13). However, we were unable to test the CISCP adapter as no CISCP indicator file has been made available for testing. Apparently, US Cert files are classified TLP Amber meaning that they cannot be shared publicly. In addition, the CSV adapter failed to import the CSV test file provided. It resulted in an adapter error. Although this problem has been reported to Soltra (by three other members of the forum under two separate forums), at the time of writing this problem hadd yet to be resolved by Soltra staff. The lack of resolution for this issue is somewhat surprising given that Soltra staff are usually extremely responsive in resolving outstanding issues. The import and preview of the CSV indicators test file can be seen in Figure 14 and Figure 15 respectively. March 2015 Bell Canadaa 19
28 Figure 13 Adapters Installed March 2015 Bell Canadaa 20
29 Figure 14 CSV Indicators Import March 2015 Bell Canadaa 21
30 Figure 15 CSV Indicators Preview 3.4 Assessment This section of the report will assess Soltra Edge in terms of the following: Release Cycle; User Community; Functionality; and Alternatives Release Cycle Soltra Edge will eventually be released in two versions; a free community version and a paid version. The free community version, which is the version that is currently available for download, will contain the features most needed by many organizations. This version of Soltra Edge has undergone a number of releasee cycles in a relatively short period of time, demonstrating Soltra s commitment to the product. Version 2.0 was released onn 4 December 2014, version 2.1 on 6 February 2015 and version on 24 February The paid version, which will be presumably released once the product has matured, willl support thee requirements of larger entities. In all March 2015 Bell Canadaa 22
31 likelihood this will create a two tiered solution in which users of the community version are forced to upgrade to the paid version to take advantage of additional functionality User Community The Soltra Edge user community currently has 1720 members who have made in excess of eight hundred posts on the Soltra forum. 18 Given the relative infancy of the product these numbers are quite impressive. Furthermore, the Soltra staff (technical and business) are quite responsive in addressing both technical problems and business related issues Functionality In terms of functionality, Soltra Edge is currently somewhat hindered at this point due to its close integration with STIX/TAXII due to the lack of available threat intelligence feeds in this format and the relative lack of availability of security tools/appliances supporting these standards. A list of intelligence providers and security tool vendors that have validated STIX/TAXII implementations and integration with Soltra Edge is available on the Soltra site. 19 Unfortunately, the list, which was last updated on 18 December 2014, is not extensive. The list has also been included as Figure 16. However, it is worth mentioning that what current functionality is provided by Soltra Edge in terms of supporting/configuring STIX/TAXII feeds and aggregating/storing threat intelligence information seems to work quite well. Furthermore, the product is quite stable and quite easy to use. 18 The Soltra Edge forum is available at 19 The Soltra Edge STIX/TAXII integrations list is available at vendor stix taxii integrations/ March 2015 Bell Canada 23
32 Figure 16 Soltra Edge STIX/TAXII Integrationss Alternatives This report would be remiss if it did not mention cyber threat intelligence platform alternatives. Specifically, this section of the report will provide a brief overview of the following alternatives to Soltra Edge: Microsoft Interflow; ThreatConnect; and Vorstack Automation and Collaboration Platform (ACP) Microsoft Interflow Microsoft announced 20 their security and threat information exchange platform for professionals working in cybersecurity, called Microsoft Interflow 21, in June Unfortunately, since that date there has been very little additional information providedd except thatt the platform is currently 20 This announcement can be found in many places including // intelligence/microsoft unveils new intelligence 21 Additional information on the Microsoft Interflow Platform can be found at sharing platform/d/d id/ and //blogs.technet.com/b/msrc/archive/2014/06/23/announcing microsoft interflow.aspx https: ://technet.microsoft.com/en us/library/dn aspx March 2015 Bell Canadaa 24
33 available for private preview. Interflow uses industry specifications to create an automated, machine readable feed of threat and security information that can be shared across industries and groups in near real time. The goal of the platform is to help security professionals respond more quickly to threats. It will also help reduce cost of defense by automating processes that are currently performed manually. 22 In terms of industry specifications, Interflow will support STIX, TAXII and CybOX. It will also provide a means to feed threat and security information into firewalls, Intrusion Detection Systems (IDS), Intrusion Prevention Systems (IPS), and SIEMS. Interflow will run on the Microsoft Azure public cloud. While the data feeds will be free, organizations will require an Azure subscription to receive them ThreatConnect ThreatConnect 23 is a threat intelligence platform that allows an organization to aggregate, analyze, and act on all of the threat intelligence data it receives. While ThreatConnect supports the ingest of multiple data formats, including emerging standards such as STIX, the focus seems to be on integration with commercial threat intelligence feeds (e.g., CrowdStrike s Falcon Intelligence, isight s ThreatScape, Wapack Labs ThreatRecon) and products. There is a free community version, along with three paid versions (basic, team and enterprise) of the product. ThreatConnect also supports a variety of deployment models, including on premises, private cloud and public cloud Vorstack ACP Vorstack ACP 24 connects to third party (e.g., HP ArcSight, IBM QRadar, RSA Security Analytics, Splunk) SIEM and security log management tools to automate the ingestion, querying and reporting of threat intelligence data. Specifically, Vorstack ACP can automate the queries against these log management and analytics tools and then correlate the responses against other data points. The product supports STIX/TAXII, even providing a bridge to other software (e.g., Hadoop) so that the software doesn t have to support the standards directly microsoft interflow.aspx 23 Additional information on ThreatConnect can be found at 24 Additional information of Vorstack ACP can be found at March 2015 Bell Canada 25
34 4.0 Conclusion & Recommendations The Centre for Operational Research and Analysis (CORA), which is a Defence Research & Development Canada (DRDC) research centre for systems analysis and operational research, is in the process of characterizing threat and building a Department of National Defence (DND) specific cyber threat model. The aggregation of cyber threat intelligence information from a variety of reputable sources and the ability to act on this information are likely to be important aspects of the overall cyber threat model being developed. Soltra Edge is intended to serve as the intelligence hub for an organization, connecting to all threat intelligence communities and providing actionable data back to the organization s environment for integration with internal security tools/appliances. The intent is that Soltra Edge will allow organizations to receive, store and send cyber security threat intelligence automatically, allowing these organizations to better deploy safeguards against a potential cyber attack. To realize these goals, Soltra Edge has been designed to support the STIX/TAXII standards almost exclusively. While this may prove to be the prudent long term approach, as these standards seem to be getting a considerable amount of traction, it does limit what can be accomplished in the shortterm due to the lack of STIX/TAXII threat intelligence feeds and STIX/TAXII compliant security tools/appliances. It is anticipated that as Soltra Edge matures it will increase its support for commercial feeds and security tools/appliances, thus improving its overall utility as the central threat intelligence hub for an organization. This report makes the following recommendations: DRDC should continue to actively monitor Soltra Edge and STIX/TAXII development; DRDC should review and analyze the community version of ThreatConnect to ascertain how it compares to Soltra Edge; and DRDC should implement a virtualized, cyber threat intelligence proof of concept to demonstrate cyber threat intelligence capabilities and how they can be used to automatically configure an organization s security tools/appliances to thwart a cyber attack. March 2015 Bell Canada 26
35 5.0 Acronyms & Abbreviations ACP CAPEC CERT CIKR CISCP COA CORA CSV CyBOX DHS DRDC DTCC FS ISAC HTTP HTTPS IDS IOC IPS ISAC MAEC Automation and Collaboration Platform Common Attack Pattern Enumeration and Classification Computer Emergency Readiness Team Critical Infrastructure and Key Response Cyber Information Sharing and Collaboration Program Courses of Action Centre for Operational Research and Analysis Comma Separated Values Cyber Observable expression Department of Homeland Security Defence Research & Development Canada Depository Trust & Clearing Corporation Financial Services Information Sharing and Analysis Center Hypertext Transfer Protocol Hypertext Transfer Protocol Secure Intrusion Detection System Indicators of Compromise Intrusion Prevention System Information Sharing and Analytics Center Malware Attribute Enumeration and Characterization March 2015 Bell Canada 27
36 MTA OSINT OTX RHEL SAWG SIEM STIX TAXII TLP TTPs VM Mail Transfer Agent Open Source Intelligence Open Threat exchange Red Hat Enterprise Linux Security Automation Working Group Security Incident and Event Management Structured Threat Information expression Trusted Automated exchange of Indicator Information Traffic Lightweight Protocol Tactics, Techniques and Procedures Virtual Machine March 2015 Bell Canada 28
Eight Essential Elements for Effective Threat Intelligence Management May 2015
INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
Attackers are reusing attacks (because they work)
The Problem Attackers are reusing attacks (because they work) Defenders are collecting and/or sharing information, but Often a manual process (copy-paste from a PDF) Different sources provide different
FS-ISAC CHARLES BRETZ
FS-ISAC CHARLES BRETZ Information Sharing To be forewarned is to be fore-armed MISSION: Sharing Timely, Relevant, Actionable Cyber and Physical Security Information & Analysis A nonprofit private sector
Cyber Security Summit 2015
Cyber Security Summit 2015 Threat Intelligence 101: Introduction and Foundations Matthew J. Harmon IT Risk Limited, LLC Matthew J. Harmon IT Risk Limited, Principal Consultant DFIR, Pen Testing, Risk Management,
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel
Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel @Ben_Smith Ben Smith, CISSP Field CTO (US East), Security Portfolio A Security Maturity Path CONTROLS COMPLIANCE IT RISK BUSINESS
Threat Intelligence: STIX and Stones Will Break Your Foes
Copyright 2014 Splunk Inc. Threat Intelligence: STIX and Stones Will Break Your Foes Fred Wilmot Director, Global Security PracCce Brad Lindow a.k.a. Superman Global Security Strategist, Splunk Disclaimer
Standardizing Cyber Threat Intelligence Information with the Structured Threat Information expression (STIX )
THREAT-BASED DEFENSE Standardizing Cyber Threat Intelligence Information with the Structured Threat Information expression (STIX ) 2012. The MITRE Corporation. All rights reserved. IT IS BECOMING INCREASINGLY
Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC
Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat
All about Threat Central
All about Threat Central Ted Ross & Nadav Cohen #HPProtect Forward-looking statements This is a rolling (up to three year) Roadmap and is subject to change without notice. This document contains forward
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
After the Attack: RSA's Security Operations Transformed
After the Attack: RSA's Security Operations Transformed Ben Smith, CISSP RSA Field CTO (East), Security Portfolio Senior Member, ISSA Northern Virginia 1 The Environment ~ 2,000 security devices ~55M security
NASCIO 2015 State IT Recognition Awards
NASCIO 2015 State IT Recognition Awards Title: State of Georgia Private Security Cloud Implementation Category: Cybersecurity Contact: Mr. Calvin Rhodes CIO, State of Georgia Executive Director, GTA [email protected]
US-CERT Year in Review. United States Computer Emergency Readiness Team
US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 US-CERT Year in Review United States Computer Emergency Readiness Team CY 2012 What s Inside Welcome 1 Vison, Mission, Goals
Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC
WHITE PAPER Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC www.openioc.org OpenIOC 1 Table of Contents Introduction... 3 IOCs & OpenIOC... 4 IOC Functionality... 5
FROM INBOX TO ACTION EMAIL AND THREAT INTELLIGENCE:
WHITE PAPER EMAIL AND THREAT INTELLIGENCE: FROM INBOX TO ACTION There is danger in your email box. You know it, and so does everyone else. The term phishing is now part of our daily lexicon, and even if
DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index
DIR Contract Number DIR-TSO-2621 Appendix C Index CenturyLink Technology s offers Tier 3 Cloud services: Public Cloud, Private Cloud and Hybrid Cloud provided over our Tier One network. We own and operate
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate
GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS Joe Goldberg Splunk Session ID: SPO-W09 Session Classification: Intermediate About Me Joe Goldberg Current: Splunk - Security Evangelist
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
APPLICATION PROGRAMMING INTERFACE
DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With
Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst
INTEGRATED INTELLIGENCE CENTER Technical White Paper William F. Pelgrin, CIS President and CEO Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst This Center for Internet Security
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
The Third Rail: New Stakeholders Tackle Security Threats and Solutions
SESSION ID: CXO-R03 The Third Rail: New Stakeholders Tackle Security Threats and Solutions Ted Ross Director, Threat Intelligence HP Security Research @tedross Agenda My brief background An example of
Can We Become Resilient to Cyber Attacks?
Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,
Anatomy of Cyber Threats, Vulnerabilities, and Attacks
Anatomy of Cyber Threats, Vulnerabilities, and Attacks ACTIONABLE THREAT INTELLIGENCE FROM ONTOLOGY-BASED ANALYTICS 1 Anatomy of Cyber Threats, Vulnerabilities, and Attacks Copyright 2015 Recorded Future,
SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS
SHARING THREAT INTELLIGENCE ANALYTICS FOR COLLABORATIVE ATTACK ANALYSIS Samir Saklikar RSA, The Security Division of EMC Session ID: CLE T05 Session Classification: Intermediate Agenda Advanced Targeted
Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security
Foreword p. xvii Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security Information to Management p. 5 Example of an
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice
Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice Introduction There are numerous statistics published by security vendors, Government
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series
Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series Whitepaper Advanced Threat Detection: Necessary but Not Sufficient 2 Executive Summary Promotion
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Unified Security Management and Open Threat Exchange
13/09/2014 Unified Security Management and Open Threat Exchange RICHARD KIRK SENIOR VICE PRESIDENT 11 SEPTEMBER 2014 Agenda! A quick intro to AlienVault Unified Security Management (USM)! Overview of the
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Automate the Hunt. Rapid IOC Detection and Remediation WHITE PAPER WP-ATH-032015
Rapid IOC Detection and Remediation WP-ATH-032015 EXECUTIVE SUMMARY In the escalating war that is cyber crime, attackers keep upping their game. Their tools and techniques are both faster and stealthier
Covert Operations: Kill Chain Actions using Security Analytics
Covert Operations: Kill Chain Actions using Security Analytics Written by Aman Diwakar Twitter: https://twitter.com/ddos LinkedIn: http://www.linkedin.com/pub/aman-diwakar-ccie-cissp/5/217/4b7 In Special
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
White Paper: Leveraging Web Intelligence to Enhance Cyber Security
White Paper: Leveraging Web Intelligence to Enhance Cyber Security October 2013 Inside: New context on Web Intelligence The need for external data in enterprise context Making better use of web intelligence
Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC
Visualization, Modeling and Predictive Analysis of Internet Attacks Thermopylae Sciences + Technology, LLC Administrative POC: Ms. Jeannine Feasel, [email protected] Technical POC: George Romas, [email protected]
Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
Application for Splunk Enterprise
Application for Splunk Enterprise User Guide Document Version 1.77 28 October 2015 10004-01 EN Rev. A 2015 ThreatConnect, Inc. ThreatConnect is a registered trademark of ThreatConnect, Inc. UNIX is a registered
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Common Attack Pattern Enumeration and Classification CAPEC A Community Knowledge Resource for Building Secure Software
Common Attack Pattern Enumeration and Classification CAPEC A Community Knowledge Resource for Building Secure Software CAPEC is a publicly available catalog of attack patterns along with a comprehensive
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)
Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC) Cyber in the News 1 Tactics, Techniques and Procedures These observed tactics, techniques
Threat Intelligence Buyer s Guide
Threat Intelligence Buyer s Guide SANS CTI Summit, 10 February 2014 Rick Holland @rickhholland Principal Analyst Last year 2014 Forrester Research, Inc. Reproduction Prohibited 2 This year, Arnold s back!!
Cisco RSA Announcement Update
Cisco RSA Announcement Update May 7, 2009 Presented by: WWT and Cisco Agenda Cisco RSA Conference Announcements Collaborate with Confidence Overview Cisco s Security Technology Differentiation Review of
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY
EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY Dean Frye Sourcefire Session ID: SEC-W05 Session Classification: Intermediate Industrialisation of Threat Factories Goal: Glory,
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Intel Security Certified Product Specialist Security Information Event Management (SIEM)
Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking
CALNET 3 Category 7 Network Based Management Security. Table of Contents
State of California IFB STPD 12-001-B CALNET 3 Category 7 Network Based Security Table of Contents 7.2.1.4.a DDoS Detection and Mitigation Features... 1 7.2.2.3 Email Monitoring Service Features... 2 7.2.3.2
Obtaining Enterprise Cybersituational
SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter Agenda My Background Key components of the Cyber Situational
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR
Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO
Intelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
ESG Threat Intelligence Research Project
TM Enterprise Strategy Group Getting to the bigger truth. ESG Threat Intelligence Research Project May 2015 Jon Oltsik, Senior Principal Analyst Project Overview 304 completed online surveys with IT professionals
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
WHITE PAPER: THREAT INTELLIGENCE RANKING
WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
IBM Endpoint Manager Version 9.1. Patch Management for Red Hat Enterprise Linux User's Guide
IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide IBM Endpoint Manager Version 9.1 Patch Management for Red Hat Enterprise Linux User's Guide Note Before using
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: Large organizations have spent millions of dollars on security
Modern Approach to Incident Response: Automated Response Architecture
SESSION ID: ANF-T10 Modern Approach to Incident Response: Automated Response Architecture James Carder Director, Security Informatics Mayo Clinic @carderjames Jessica Hebenstreit Senior Manager, Security
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE
Network that Know Rasmus Andersen Lead Security Sales Specialist North & RESE Email Gateway vendor CERT AV vendor Law enforcement Web Security Vendor Network security appliance vendor IT Department App
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION How ThreatBLADES add real-time threat scanning and alerting to the Analytics Platform INTRODUCTION: analytics solutions have become an essential weapon
Campus. Impact. UC Riversidee Security Tools. Security Tools. of systems
Security Tools (SecTools) UCR's implementationn of a security dashboard (nominally designated SecTools) is a wonderfully flexible and useful framework for viewing current security incidents and for gaining
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
