Tactical View for Cyber Security Framework
|
|
|
- Shauna Murphy
- 10 years ago
- Views:
Transcription
1 Tactical View for Cyber Security Framework Collaboration with SPAWAR SoS Engineer (Ret.) / Cyber Security Consultant and Cyber Clarity [email protected] And [email protected]
2 What s Wrong With This Security? What level of protection is really provided here? When a capability is invisible, like IA, safety, reliability, etc, what you see is not the whole picture! The gates were fully locked, properly configured and validated. I could not get through them. But... Thus Cyber can be an illusion
3 Roadmap to Execution CSF value points. Threat overview / perspective CSF background / pressure points Tactical view Summary Be wary of a false sense of security Monitor & measure using CSF
4 Cyber Security Overall Status (Senior IA VIP (Mike Jacobs) - same issues as years ago, but better in last 10) Technology --- G trending We have what we NEED NOW Business --- Policy --- Procedures / standards --- Education --- Leadership --- Awareness --- Y Y G G R G Some LSIs resist change Legislation poor Can t be voluntary NIST done well Need uniform implementation NICE, 170+ CAEs (schools) 10,000+ / year Complexity vs CISO C-suite complacency and ability to absorb Education starting earlier, STEM, NICE We all need to provide an integrated, cyber package that is affordable
5 Gartner's 2013 Hype Cycle for Emerging Technologies How do we prove end-2-end security? Everything connected to everything? Comms Secure? What is an adequate level of security? Automation = machines in control? M2M Secure? Pervasive new technologies? Built secure? CYBER is all about SECURE: technologies, DATA and communications! ALL the technologies need built in security AND support Privacy!
6 SO what does matter in Cyber? CYBER is fundamentally all about TRUST and DATA ( Identity / authentication / secure comms - -- provenance, quality, pedigree, assured) It s NOT about expensive new cyber capabilities / toys but more about the interoperability glue (distributed trust, resiliency, automation, profiles) 90+% of security incidents are from lack of doing the basics! HAVE effective Security Continuous Monitoring (SCM / SIEM) a MUST DO! USE enforced: cyber hygiene, enterprise access control, & reduce complexity (APLs) Shift from only protecting the network, to the DATA security itself information centric view Embrace your Risk Management Plan (RMP) LIVE IT! Have an enforceable security policy what is allowed / not train to it KNOW your baseline - Protect the business from the unknown risks as well Employ a due diligence level of security then transfer residual risks! You can NOT buy cyber, so manage the cyber BASICS well! An achievable 90-95% solution to MOST vulnerabilities stabilize the environment!
7 Yes, It is ALL about the DATA! 2020 Vision (Courtesy of Dan Green / SPAWAR ): Themes and Memes (Technology vs Technology Adoption) Convergence = Genomics, Robotics, Informatics, Nanotech (each a $B+ market) CBAD = Cloud, Big Data, Analytics, Data Science (are you all-in? ) Telematics = Sensing robotics, Cyber Physical Systems (will kids need to learn to drive?) Interactive 3D = Augmented Reality, HTML 5, Three.js (3D graphics for WebGL) Embedded Computing = ehpc, Tessel (mcpu / Java), Programmable hardware LBS = Location Based Services, IPS, Beaconing, NFC IoT = Internet of Things, M2M, Quantified Self Mobilization = Preparation for Conflict/Competition, Autonomy, The Draft STEM = Science Technology Engineering Math, Generation NOW, Old Dogs (YOU) In a data-centric world, we need Privacy by Design (PbD) Meme: an idea, behavior, or style that spreads from person to person within a culture
8 Verizon Data Breach Investigations Report - DBIR (2014) A huge sample size! This includes YOUR business category too!!! 10 year series, 63,437 incidents, 1367 breaches, 95 countries WHAT - 92% incidents described by just nine patterns - from geopolitical attacks to large-scale attacks on payment card system Sectors - Public (47, 479), Information (1132) and Finance (856) Threats (%) - POS intrusions Web App Attacks Cyber espionage Card Skimmers Insider misuse Crimeware - 4 See also - Ponemon Institute s cyber report Key threats from cost based activities Malware, malicious insiders and web-based attacks Mitigations HYGIENE Factors - restrict remote access - enforce password policies - Minimize non POS activity on those terminals - Deploy A/V (everywhere, POS too) - evaluate threats to prioritize treatments - Look for suspicious network activity - Use two-factor authentication We have met the cyber enemy, and they are US 8
9 Integrated Business RMP Approach + Especially for Small / Medium Business (SMB) = THE ANSWER + Company Vision (business success factors) Security Policy (mobile, social media, etc) C&A / V&V (effective / automated) Known Baseline (security architecture) CMMI / Sustainment (SoPs / processes) RMP Insider Threat Company Intel (open source, FB, etc) SCM / SIEM (monitor / track / mitigate) Privacy by Design (manage PII, HIPAA, compliance) ) MSS / vciso (3 rd party IV&V support) Data Centric Security (DLP, reputation based methods) Cyber insurance (broker & legal council) Education / Training (targeted, JIT, needs based) Common Risk Management Plan (RMP) model AND IAW the NIST Cybersecurity Framework
10 DoD Cyber S&T Roadmap What matters? Key Capability Gaps / Areas 4+1 Support essential business success functions Autonomous responses and C3 Tools Environment is robust and self-healing Cyber M&S and Experimentation (Cross Cutter) Mixed trust levels in heterogeneous space Cyber PSC PA-Releasable Briefing November 2012 Page-10 Gaps are not things / capabilities but integration and interoperability!
11 Overview of Framework Framework Core Core presents industry standards, guidelines, and practices Focus on 5 functions (Identify, Protect, Detect, Respond, Recover) Framework Implementation Tiers Provide a way to view cybersecurity risk and to manage the risk Consideration from current risk management practices, threat environment, legal and regulatory environment, mission and organizational constraints Framework Profile Organization selecting the Framework Category and Subcategory Looking to improve As Is and To Be Used to conduct self-assessment and communications within an organization
12 Framework Roadmap what s still needed to enhance CSF Automated Indicator sharing more effective ways to detect and respond to events Conformity Assessment capability meets requirements within CSF Cybersecurity workforce adapt, design, develop maintain and improve security practices. Data Analytics tools with new computing methods = new processes to analyze all data Agency alignment Integrate CSF & RMF to enhance policy, reduce burden with common postures International alignment help effective operate globally and manage new risks. Technical privacy standards translate FIPPs into methods for effective privacy metrics / risks. Tools to easily assess and organization s CSF posture, Support analytics / trending, broad use including privacy
13 Our Tactical View Focus On:
14 Full Security Lifecycle Management Understand, Validate, Execute, Sustain Building a Positive Security Posture for an organization requires a focused approach Building a Compliance Automation Reporting (CAR) process is your first step Once an organization is reached a State of Positive Health, Enhanced Situational Awareness (ESA) can be executed Sustainability of ESA is crucial to a Positive Security Posture Integrates easily in a Compliance Risk Scoring Approach Meets CyberScope
15 The BIG PICTURE Prepare for a Positive State of Health Executing ESA Sustaining State of Health with People, Process and Technology
16 POA&M Workflow Maintain Current knowledge of vulnerabilities Compare NVD with found vulnerabilities and prioritize Map vulnerabilities to FISMA controls Maintain Situational Awareness on your POA&M National Vulnerability Database Scanned Data FISMA Controls POA&M Reports Vulnerability Management Process Manage FISMA
17 Architectural View of ESA with CAR Compliance Automation Report Employs GOTS & open source software Reduced cost of ownership Vendor Agnostic Conforms to Federal standards Real-time, federated architecture Consumes and Produces SCAP (XCCDF) CAR ESA integrated with CAR SQL Usage SCAP Usage
18 CAR Dashboard and Application (Advantages of using CAR) CAR s Functions Provides a unified dashboard to access and display multi-vendor security compliance and risk applications at the organizational level (lowest level) Inputs FDCC scores in XCCDF format Groups FDCC fail scores into 7 risk categories (0-6, risk category 0 = 100% compliance) Provides a per desktop compliance score (0-100%) vs. risk score (0 7) of the organization on a two-dimensional graph that clearly identifies outliers Transforms XCCDF to an industry standard lightweight data interchange format and compresses it to two orders of magnitude less than original format Distributes the compressed risk and compliance data up the organizational hierarchy via the Federated Framework Agencies can gain the ability to easily share and distribute compliance and risk information with CAR to provide a global defensive posture of your networks
19 Integrating this into a large enterprise HQ Data Sharing to HQ to provide Situational Awareness (SA) Subordinate Organization 1 Subordinate Organization 2
20 Data Flow Chart for a Federated Framework at each Tier 3 level Risk Management Cyber Analytics (API/Web Service) -Outlier Threshold Setting -Threat Analysis -Threat Vectoring - Building blocks for Predictive Analytics SQL or BIG DATA Architecture/Storage( Partnering with TeraData Malware Detection Complianc e Server Network Correlator DB Security IDS
21 Data Model of what you can view Site Site / Asset Information & Correlated information to the Asset Other Data tied to the asset Site Detail Location / Description POC POC Contact Info Roles of POC Assets Owned by POC IP/Subnet POA&M to the asset Last Vulnerability Scan System Logs Network Logs Security Logs CMDB Compliance Other Data Other Assets connected on the subnet Other Assets connected on the subnet Other Assets connected on the subnet Other Assets connected on the subnet Assets Owned by POC IP/Subnet POA&M to the asset Last Vulnerability Scan 21
22 Building a common Taxonomy 1) Describe their current cybersecurity posture; 2) Describe their target state for cybersecurity; 3) Identify and prioritize opportunities for improvement within the context of a continuous and repeatable process; 4) Assess progress toward the target state; 5) Communicate among internal and external stakeholders about cybersecurity risk.
23 Describe their current cybersecurity posture; Setting up agreed baseline metrics Example (Outlier Reports)
24 Outlier Explanation Unacceptable range of compliance (Outlier) 10% out of compliance In compliance
25 Old way of viewing a FDDC report Old Approach Metric 25
26 Applying Severity Rating to the FDCC Report Two inputs Severity and Metric Severity Metric 26
27 outlier Outlier Reports 1 0f 3 Cat 1 Cat 2 Cat 3 50% 100% Create multiple Outlier Reports
28 Outlier Reports 2 of 3 Create a Framework that inputs Severity & a Metric Idea is to create ways to measure impact universally Allows each client to set their OWN impact Still aligns with Strategic Data Strategy with some proprietary approach Cat 1 Create Multiple Outlier reports that help show Impact to the Mission Common Operational Picture Intuitive Can be re-purposed Cat 2 Cat 3 50% 100% Cat 1 Cat 2 Cat 3 50% 100% Outlier
29 Outlier Reports 3 of 3 Defining Severity & Metric in other areas Severity -Measuring against known vulnerabilities with a level of impact Cat1, Cat2, Cat 3 Finding Patches Signatures Malwares Metric Component that shows average usage for sustainment Time Software Version Certain Percentage score Item Severity Metric FDCC Network Operations Configuration Management Registry items Bandwidth Usage Software Vulnerability FDCC Score (0 100) Time of the day Versions 29
30 Aggregate View of FDCC/USCGB Report in our pilot application
31 Outlier Report on one section in our pilot application
32 Describe their target state for cybersecurity; Understanding the targeted area and what level we need to set them is implemented through Threshold Settings.
33 Threshold Settings 1 of 3 FDCC Report Outliers will help to set up the baseline status of Health and will be used to set up thresholds. Algorithm Risk Score = Total Assets/ number of severity
34 Threshold Settings 2 of 3 Setting up a threshold against the Highs will alert us when each location is exceeding the allowable threshold
35 Threshold Settings 3 of 3 Location Asset Over Threshold over 10% Cat Findings causing the issues Virginia CVE CVE Michigan CVE CVE New York CVE CVE Being able to identify assets that are outside of the thresholds are on the remediation list as soon as possible.
36 Identify and prioritize opportunities for improvement within the context of a continuous and repeatable process; Understanding the basic reporting and adding indicators to help prioritize the content I.E (FDCC/USCGB graphs)
37 Continuous Monitoring to help Identify and prioritize Outlier Threshold Settings
38 Assess progress toward the target state Defining baseline metrics through Outlier Reports and Threshold Settings can help your organization Assess Progress. Once you have set up the basic metrics, your organization can move into Threat Vectoring and Active Threat Management
39 Assess progress toward the target state (cont) Data Sources Algorithm Known Alerts Outlier Cat 1 Cat 2 Cat 3 Threshold Setting Known Behavior Outside Data Source Threat Vectoring Not waiting for trouble, Seek trouble Active Threat Management Explore the internet Gather Intelligence
40 Communicate among internal and external stakeholders about cybersecurity risk. Building Common Operation Picture (COP) and sharing definitions can help improve communications with stakeholders Having an open architecture to help communicate with other disparate data sources Implementing SCAP to provide automated reporting to other stakeholders
41 Open Architecture Data Flow Chart for a Federated Framework at each Tier 3 level Outliers Thresholds Threat Analysis Cyber Analytic Processes Threat Vectoring Risk Management Data Storage Message Management Services Web Services - Exposed API - Documented Data Structures Enterprise Service Bus Malware Detection DB Security Compliance Server Network Correlator IDS 41
42 Data flow through the open architecture Data Sources API Calls to the Data Sources Create a Common Operation Picture(COP) System Logs Network Logs CMDB Compliance Big Data Storage Enterprise Service Bus API / Web Services for System Log API/ Web Service for Network Log API/ Web Service for Security Log Security Logs Other Data API/ Web Service for Compliance Info 42
43 Share Views Common Operational Picture DHS/NPPD Organization A Organization B 43
44 Applying SCAP to help automate communications Command Main Unit Main Unit Subordinate Units 44
45 Common Operation Picture for CAR A vendor neutral network security capability Aggregates and distributes the networks defensive posture across the organizational hierarchy SCAP compliant LITS, Proprietary View System / Network View FISMA View SEIM View
46 After sustaining an organization, move into Active Threat Management (ATM) 46
47 1. Digital DNA detects zero-day malware on a host 2. Agent framework distributes malware signature to CATD 3. CATD monitors network for new malware signature, correlates signature, and runs business logic against data 4. CATD sends required network changes to block the spread of the malware from infected host to ATM 5. The ATM sends TTP the appropriate information to open ticket and alert security/network personnel 6. Human then accepts or denies suggested remediation 7. TTP communicates back to ATM server with response 8. ATM signals DDN to configure network devices to protect network from new malware if applicable 9. ATM distributes malware signature to all sites in federation and sends confirmation of applied network change to CATD if applicable 10. CATD sends confirmation of change back to ATM server if applicable and updates Black/White list 11. ATM sends confirmation of change back to TTP for ticket closure if applicable or apply open issues to RM Use Case for Active Threat Management Federated MOM DMZ (edge devices) Active Threat Management (ATM) Server Trouble Ticketing Process (TTP) Secure Communication Cyber Analysis Threat Detection (CATD) Dynamic Distributed Network Risk Management (RM) Black/ White List updated 47
48 Apply ATM to all Assets Correlate ATM Findings across the Enterprise Correlate Vulnerability Scans and other Intel across the environment Botnet_File.Exe ZeroDay_File.Exe Botnet_File.Exe ZeroDay_File.Exe Other Assets connected to that subnet Other Assets connected to that subnet Other Assets connected to that subnet Other Assets connected to that subnet Same Vulnerability Files found across GEO Locations 48
49 Business & Cyber Security opportunities (& related System Engineering / Integration efforts) IT / Cyber Global factors user pull World-wide B2B Trust / cloud / sharing TRUST Distributed / MLS CM / Hygiene patching / settings IoT / M2M Automation / Sensors Consumerization of IT Phones / wireless / apps GAPS / Needs (from the Federal cyber priority council S&T gaps) Resiliency SW / apps / APIs / services Agile operations BE the vanguard / integration Vulnerabilities / Threats (Verizon BDR, Forbes, etc threat reports - what ails us most) Access control Authentication is key TOP security mitigations Whitelist, patch, limit access Future Opportunities Privacy / Data IP / PII / compliance Effective missions Business success factors Risk Mgmt Adhoc / not global SIEM / SCM QA hygiene / sensors ESA / simple tools! Effective Business risk management (BRM) = cybersecurity framework (CMMI / RMF / COBIT) Reducing business risk / liabilities Managed security services (MSS) & cyber insurance Mobile Security Poor apps / IOS weak billions users = volume Mitigate Obsolescence Minimize patching, legacy vulnerabilities OA / modularity / APIs & SCRM Data Security Predictive analytics Privacy by design
50 Summary Applying algorithms to help define metrics Aggregate the metrics to define Threshold Settings Once your baseline metrics have been defined, Threat Vectoring can be achieved Moving to proactive posture through Active Threat Management And
What REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond!
What REALLY matters in Cloud Security? RE: Internet of things sensors, data, security and beyond! HOW to best integrate security into the office AND the cloud? And what is a thing is that MORE we have
Cyber Education triangle clarifying the fog of cyber security through targeted training
Cyber Education triangle clarifying the fog of cyber security through targeted training Curriculum & Resources Linked / leveraged (on-line, companies, colleges, etc) MS / BS Cyber CISSP / GISP / CISO /
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Intelligence Driven Security
Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1 Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings
The Value of Vulnerability Management*
The Value of Vulnerability Management* *ISACA/IIA Dallas Presented by: Robert Buchheit, Director Advisory Practice, Dallas Ricky Allen, Manager Advisory Practice, Houston *connectedthinking PwC Agenda
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Continuous Monitoring
Continuous Monitoring The Evolution of FISMA Compliance Tina Kuligowski [email protected] Overview Evolution of FISMA Compliance NIST Standards & Guidelines (SP 800-37r1, 800-53) OMB Memorandums
Ecom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Enterprise Security Tactical Plan
Enterprise Security Tactical Plan Fiscal Years 2011 2012 (July 1, 2010 to June 30, 2012) Prepared By: State Chief Information Security Officer The Information Security Council State of Minnesota Enterprise
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
An Enterprise Continuous Monitoring Technical Reference Architecture
An Enterprise Continuous Monitoring Technical Reference Architecture 12/14/2010 Presenter: Peter Mell Senior Computer Scientist National Institute of Standards and Technology http://twitter.com/petermmell
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Building Security In:
#CACyberSS2015 Building Security In: Intelligent Security Design, Development and Acquisition Steve Caimi Industry Solutions Specialist, US Public Sector Cybersecurity September 2015 A Little About Me
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask
Everything You Wanted to Know about DISA STIGs but were Afraid to Ask An EiQ Networks White Paper 2015 EiQ Networks, Inc. All Rights Reserved. EiQ, the EiQ logo, the SOCVue logo, SecureVue, ThreatVue,
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
The Emergence of Security Business Intelligence: Risk
The Emergence of Security Business Intelligence: Risk Management through Deep Analytics & Automation Mike Curtis Vice President of Technology Strategy December, 2011 Introduction As an industry we are
Metrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience
Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience Mike O Neill Managing Director Graeme McGowan Associate Director of Cyber Security
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Welcome to Modulo Risk Manager Next Generation. Solutions for GRC
Welcome to Modulo Risk Manager Next Generation Solutions for GRC THE COMPLETE SOLUTION FOR GRC MANAGEMENT GRC MANAGEMENT AUTOMATION EASILY IDENTIFY AND ADDRESS RISK AND COMPLIANCE GAPS INTEGRATED GRC SOLUTIONS
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cenzic Product Guide. Cloud, Mobile and Web Application Security
Cloud, Mobile and Web Application Security Table of Contents Cenzic Enterprise...3 Cenzic Desktop...3 Cenzic Managed Cloud...3 Cenzic Cloud...3 Cenzic Hybrid...3 Cenzic Mobile...4 Technology...4 Continuous
Enabling Security Operations with RSA envision. August, 2009
Enabling Security Operations with RSA envision August, 2009 Agenda What is security operations? How does RSA envision help with security operations? How does RSA envision fit with other EMC products? If
IBM Endpoint Manager Product Introduction and Overview
IBM Endpoint Manager Product Introduction and Overview David Harsent Technical Specialist Unified Endpoint IBM Endpoint Manager and IBM MobileFirst Protect (MaaS360) Any device. Identify and respond to
SIEM Implementation Approach Discussion. April 2012
SIEM Implementation Approach Discussion April 2012 Agenda What are we trying to solve? Summary Observations from the Security Assessments related to Logging & Monitoring Problem Statement Solution Conceptual
Secure Cloud Computing
Secure Cloud Computing Agenda Current Security Threat Landscape Over View: Cloud Security Overall Objective of Cloud Security Cloud Security Challenges/Concerns Cloud Security Requirements Strategy for
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization
Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization Neil MacDonald VP and Gartner Fellow Gartner Information Security, Privacy and Risk Research Twitter @nmacdona
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
High End Information Security Services
High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
Information Technology Policy
Information Technology Policy Security Information and Event Management Policy ITP Number Effective Date ITP-SEC021 October 10, 2006 Category Supersedes Recommended Policy Contact Scheduled Review [email protected]
McAfee Database Security. Dan Sarel, VP Database Security Products
McAfee Database Security Dan Sarel, VP Database Security Products Agenda Databases why are they so frail and why most customers Do very little about it? Databases more about the security problem Introducing
Avoiding the Top 5 Vulnerability Management Mistakes
WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)
ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM) CONTENT Introduction 2 Overview of Continuous Diagnostics & Mitigation (CDM) 2 CDM Requirements 2 1. Hardware Asset Management 3 2. Software
Continuous Diagnostics & Mitigation:
WHITE PAPER Continuous Diagnostics & Mitigation: CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL Table of Contents What is CDM Requirements, Mandates & Policy that drive for adoption of Continuous Monitoring....
Best Practices for Building a Security Operations Center
OPERATIONS SECURITY Best Practices for Building a Security Operations Center Diana Kelley and Ron Moritz If one cannot effectively manage the growing volume of security events flooding the enterprise,
ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014
1 ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014 About the Presenters Ms. Irene Selia, Product Manager, ClearSkies SecaaS SIEM Contact: [email protected],
How To Create Situational Awareness
SIEM: The Integralis Difference January, 2013 Avoid the SIEM Pitfalls Get it right the first time Common SIEM challenges Maintaining staffing levels 24/7 Blended skills set, continuous building of rules
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Information Technology Solutions
Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1
State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1 Introduction What s in a name? SIEM? SEM? SIM? Technology Drivers Challenges & Technology Overview Deciding what s right for you Worst
NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015
NEXPOSE ENTERPRISE METASPLOIT PRO Effective Vulnerability Management and validation March 2015 KEY SECURITY CHALLENGES Common Challenges Organizations Experience Key Security Challenges Visibility gaps
Caretower s SIEM Managed Security Services
Caretower s SIEM Managed Security Services Enterprise Security Manager MSS -TRUE 24/7 Service I.T. Security Specialists Caretower s SIEM Managed Security Services 1 Challenges & Solution Challenges During
An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011
An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011 Brian McLean, CISSP Sr Technology Consultant, RSA Changing Threats and More Demanding Regulations External
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
QRadar SIEM 6.3 Datasheet
QRadar SIEM 6.3 Datasheet Overview Q1 Labs flagship solution QRadar SIEM is unrivaled in its ability to provide an organization centralized IT security command and control. The unique capabilities of QRadar
Fight fire with fire when protecting sensitive data
Fight fire with fire when protecting sensitive data White paper by Yaniv Avidan published: January 2016 In an era when both routine and non-routine tasks are automated such as having a diagnostic capsule
Speed Up Incident Response with Actionable Forensic Analytics
WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents
AUTOMATING THE 20 CRITICAL SECURITY CONTROLS
AUTOMATING THE 20 CRITICAL SECURITY CONTROLS Wolfgang Kandek, CTO Qualys Session ID: Session Classification: SPO-T07 Intermediate 2012 the Year of Data Breaches 2013 continued in a similar Way Background
Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA
Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture
eguide: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success
: Designing a Continuous Response Architecture 5 Steps For Windows Server 2003 End of Life Success FAST FACTS Over 10 Million Windows Server 2003 Devices Still In Use Less Than 250 Days To Windows Server
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
ForeScout CounterACT. Continuous Monitoring and Mitigation
Brochure ForeScout CounterACT Real-time Visibility Network Access Control Endpoint Compliance Mobile Security Rapid Threat Response Continuous Monitoring and Mitigation Benefits Security Gain real-time
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
Cybersecurity Framework. Executive Order 13636 Improving Critical Infrastructure Cybersecurity
Cybersecurity Framework Executive Order 13636 Improving Critical Infrastructure Cybersecurity National Institute of Standards and Technology (NIST) Mission To promote U.S. innovation and industrial competitiveness
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT
ADDING NETWORK INTELLIGENCE INTRODUCTION Vulnerability management is crucial to network security. Not only are known vulnerabilities propagating dramatically, but so is their severity and complexity. Organizations
Network Security and Vulnerability Assessment Solutions
Network Security and Vulnerability Assessment Solutions Unified Vulnerability Management It s a known fact that the exponential growth and successful exploitation of vulnerabilities create increasingly
