What Does a Cyber Secure Navy Look Like?
|
|
|
- Erika Sandra Jordan
- 10 years ago
- Views:
Transcription
1 What Does a Cyber Secure Navy Look Like? Cyber Protection, Prioritization, and Plan May 2010 Brian D. Shaw DASN C4I / IO / Space Director of Cyber Warfare [email protected] [email protected] [email protected] (w) (c)
2 Is it really that bad? If the nation went to war today, in a cyber war we would lose. (Mike McConnell, former Director of National Intelligence, Feb 10) Cyber Shockwave We re not prepared! (Feb 10) Very tough to identify WHO is attacking internet anonymity President has little to no overall authority to direct industry actions Essentially impossible to prosecute cyber crime, as international borders hinder virtual legal reciprocity and enforcement There is no cyberwar but we need to focus on cybersecurity. (Howard Schmidt, Cyber-Security Coordinator (Mar 10) OUR collective mission / focus Collaboratively enable information dominance 2
3 Who s in Charge? Where? POTUS (Cyber Security Coordinator, et al) SECDEF / SECSTATE Congress STRATCOM USCYBERCOM FLTCYBERCOM Navy, Army, AF, Marine Corps Federal, Industry, Consumers Authority and Enforcement are KEY! Re: CIP is 85% industry - No direct federal control, so what then? Note - see the glossary for the many acronyms, while defense centric, we need a common cyber taxonomy / lexicon 3
4 Strategic Cyber Elements (1) Collaborate on DoN enterprise IA / cyber strategy and vision policy mapped to prioritized capabilities with assigned resources (2) Update DoN overall enterprise risk assessment (ERA) accounts for both significant threat vectors & vulnerability consequences (3) Prioritize enterprise level mitigations from the ERA Navy specific items complement and weighted within the existing CNCI 12 (4) Align and synchronize resources and cyber capabilities across DoN organizations and tier 1 tier 3 architecture perspectives (5) Address pervasive lack of basic cyber hygiene enterprise wide within our total claimancy s people, processes and products (technology) (6) Reduce complexity - Build a trusted cyber infrastructure on top of the existing IA/CND infrastructure, as an integrated SoS - with enforced CM (7) Better integrate / leverage education and IO / CNO thus optimize our overall cyber package and ensure synchronization and RESILIENCY! Top down approach to a balanced, prioritized cyber execution plan 4
5 What cyber variables can we affect? Effective as-is, or have a lower added ROI - Prosecution/enforcement need near real-time forensics, global reciprocity - Offensive tools good now, controlled use, escalation - Try to fix all issues/problems as many are intractable, givens, etc. - Continue to emphasize perimeter defense as they are already in! BEST potential impact and long term effectiveness - Improve education and training yet use checks / balances - Enterprise risk management using both threats & consequences - Effective IA/Cyber Management enforceable CM & a trust model - Proactive, dynamic CND/ IA defense DCD, as the best offense - Define & enforce network policy / SOPs cut off those not in compliance Continue to finesse the first set / Go full force on the last! 5
6 Integrated CND & IA as a SoS (all defensive protections must themselves act as one system) It s all about TRUST need a common enterprise trust model Some HAP/TSM is needed, but where to put which EAL devices? Need a common top-down, enforced IA/Cyber architecture/model Need an alternative to commercial ISP leverage existing dark fiber? Effective / secure enterprise access control is everything: IA&A implementation focus = authorization based access control complemented by ABAC, RBAC, even RAdAC as an end-state Proactive/Dynamic Defensive I&W - Detect abnormal patterns, characteristics, attributes, unusual requests. - Provide auto alerts; divert questionable actions; "wraps" issues/problems (This is the catch all capability, as we can t protect everything near 99%) Life cycle education and training must parallel acquisition Integrated Computer Security Operations Centers (eg: GNOSC, etc) Centralized V&V / assessment collection and reporting (NCDOC / NIOC) Institutionalize Dynamic Cyber Enterprise Management (DCEM) Protect the Cyber C 3 Crown Jewels! 6
7 Dynamic Cyber Enterprise Management 1 - Institutionalize enforceable configuration management - Established baselines, manage dynamic settings C.I.s - Properly configured/ccb (servers, routers, firewalls, etc) - Patches, updates, IAVA delta / increment change mgmt - Verification / Auditing / Certification & Accreditation (C&A) 2a - Continuous monitoring & reporting - Automatic reports/alerts fed to users & central repository - Integrated with NetOps and Infocon (IPS-like actions) 2b - Intuitive situational awareness automated dashboard - Must have an enterprise network picture can t manage unknowns 3 - Life cycle best practices/sops institutionalize rigor NSA IAD poor IA management factors (CM, monitoring, follow SOPs) = 80% NCDOC lack of IA accountability (poor CM, inadequate IAVA, misuse) = 90% Verizon Data Breach Report implementing known fixes and capabilities = 87% Effective, enforceable DCEM / enterprise cyber hygiene 7
8 CNE / CNA Provide near-real time OPSEC to IA Effectively leverage the black side Intel into secret (& below) protections Establish Cyber War Reserve Modes Isolated networks, C 2 order wire, mil using dark fiber, etc Fusion of diverse data, into KM we can use in all of cyber All sensors, CNE/A effects, OpSec, Intel, etc = improved CND/IA Can t easily / rapidly tell WHO the bad actors are Need cyber detection / forensic capabilities (Service's responsibility) Offensive uses best done by STRATCOM / USCYBERCOM / C10F Cyber War / ROE undefined, unclear if win-lose / lose-lose Offensive cyber methods / tools / activities require authorized and skilled subject matter experts 8
9 Key Tactical Thrusts Organize DoN cyber security approach / governance - RACI Update ERA, prioritize mitigations and resources Begin Dynamic Cyber Enterprise Management asap Top-down enforcement of IA / Cyber architecture Secure enterprise access control / Cyber IFF Overall Dynamic Cyber Defense (DCD) approach Proactive / dynamic defensive I&W monitor abnormal behavior Virtual storefront reacts quickly to predictive IO/IA I&W IA/CND treated as an integrated SoS with lead/lag feedback Common enterprise trust model Reduce complexity - IA Building blocks / APLs with pedigrees Integrate into an enterprise cyber security model / framework Execute lifecycle awareness, education, and training 95% security incident reduction High ROI Activities that get us all moving quickly 9
10 So what can WE collectively DO? NAVY way forward Sync with DOD cyber strategy / USCYBERCOM / other agencies Support OPNAV N2N6 cyber roadmap & C10F requirements Streamline acquisition process tie to CNO priorities = value / affordability Facilitate Collective / Collaborative Governance Integrated DON efforts: Plans / Policy, Operations, Acquisition, R&D, etc Overall execution coordination / cooperation between government, industry, academia, others key cyber stakeholders Cooperatively ACT on key tactical thrusts affordably! Focus on: highest ERA ROI items, reduce complexity, enforce resiliency Do the basics well & first - otherwise new toys matter little Enforce critical areas (like CM, hygiene...) and fix what ails us now Leverage the bleeding edge - let CNCI lead/sponsor COMMS, collaboration, alerts at cyber speed! 10
11 Information Dominance: The ability to seize and control the information domain high ground when, where and however required for decisive competitive advantage across the range of Navy missions... Questions? Comments? Suggestions? 11
12 Glossary APL/PPL approved/preferred product list ACL access control list CA certification authority C&A certification & accreditation CCB configuration control board CI configuration item CIP critical infrastructure protection CNCI Comprehensive National Cybersecurity Initiative CND/CNO computer network defense/operations CSIS Center for Strategic and International Studies DCD dynamic cyber defense DCEM dynamic cyber enterprise management EAL evaluation assurance level ERA enterprise risk assessment HAP high assurance platform HBSS host based security system IAD Information Assurance Directorate NSA) IAVA information assurance vulnerability alert IA&A identification, authentication and authorization (access control) IDS/IPS intrusion detection/ protection system IOS internetwork operating system (OS for routers) ITMC IT Management Council I&W indications and warnings KM knowledge management NIAP National IA Partnership SANS storage area network systems TSM trusted security module VM virtual machine V&V verification and validation ZBAC authorization-based access control 12
13 Back Ups 13
14 Trace Requirements to the top President's Cyber Plan 1 - Ensure accountability in federal agencies, cyber security will be designated as a key management priority. 2 - Work with ALL the key players, including state and local governments and the private sector. 3 - Strengthen the public-private partnerships. 4 - Continue to invest in the cutting-edge research and development necessary for the innovation and discovery. 5 - Begin a national campaign to promote cyber security awareness and digital literacy. DOD / DON cyber approach, must be global, as is the cyber landscape! 14
15 NSPD-54/HSPD-23: CNCI 12 Initiatives Comprehensive National Cyber Security Initiative Focus Area 2 Focus Area 1 Deploy Trusted TrustedInternet Deploy Passive Passive Pursue Pursue Deployment of of Coordinate and and Sensors Connections SensorsAcross Intrusion Prevention Redirect Redirect R&D R&D Federal Federal Systems Systems Systems Systems Efforts Efforts Establish a front line of defense Connect Connect Current Current Develop Develop Gov t-wide Increase Increase Security Security Expand Centers Centers to to Enhance Enhance Counterintelligence of of the the Classified Expand Education Situational Awareness Plan Plan for for Cyberspace Networks Networks Resolve to secure cyberspace / set conditions for long-term success Focus Area 3 Define Define and and Develop Develop Enduring Enduring Lead Lead Ahead Ahead Technologies, Strategies & Programs Define Define and and Develop Develop Enduring Enduring Deterrence Strategies & Programs Manage Manage Global Global Supply Supply Chain Chain Risk Risk Define Define Federal Federal Role Role for for Cybersecurity in in Critical Critical Infrastructure Domains Domains Shape future environment / secure U.S. advantage / address new threats Agency Cyber efforts must leverage the Federal Investments The HARD part is implementing enterprise integration, interoperability and controlling emergent behavior - that can affect most focus areas 15
16 LOCAL ENCLAVE DoD CND (and Cyber ) Defense in Depth CND SP CND SP - Incident Response / Management - Incident Response / Management - Prometheus - Prometheus - Threat Analysis - Threat Analysis - Compliance Scans - Compliance Scans - IAVM Management - IAVM Management Incident Response Incident Response IDS IDS NUDOP NUDOP DNS Blackholes DNS Blackholes PROMETHEUS PROMETHEUS HOST HOST Firewalls Firewalls Standard IP Blocks Standard IP Blocks ACLs ACLs LAN (POP/HUB) LAN (POP/HUB) NET Cool / INMS View NET Cool / INMS View IAP Monitoring IAP Monitoring Site Compliance Scans PKI Threat Analysis Site Compliance Scans PKI Threat Analysis NMCI NIPRNET IDS Feeds AV IAVM Implementation NMCI NIPRNET IDS Feeds AV IAVM Implementation TRICKLER / SIPRNET Firewall PPS Policy TRICKLER / Threat Assessment Alert Filtering SIPRNET Firewall PPS Policy CENTAUR Threat Assessment Alert Filtering CENTAUR Vulnerability Scanning CND Data Strategy PKI System Patching Vulnerability Scanning Metrics CND Data Strategy PKI System Patching Metrics NET Cool View CDS DITSCAP/DIACAP NET Cool View CDS ACLs DITSCAP/DIACAP NET Cool Data ACLs Vulnerability In-Line Filtering NET Cool Data Remediation Vulnerability In-Line Filtering Standard IP Block Lists Standard IP Block Lists IPS Remediation IPS CENTRIXS Monitoring Firewalls AV CENTRIXS Monitoring Firewalls AV In-Line Virus Scanning In-Line Virus Scanning CONOPS DITSCAP/DIACAP DNS Blackholing CONOPS DITSCAP/DIACAP DNS Blackholing CARS IASM DRRS-N RNOSC CARS IASM DRRS-N RNOSC IAVM Vulnerability Remediation HBSS Compliance IAVM Vulnerability Remediation Content Filtering HBSS Content Filtering SCCVI- Anti-virus Compliance ENMS SCCVI- Anti-virus PKI SCRI CARS Tier 3 SIM ENMS PKI SCRI CARS Tier 3 SIM WIDS IAVM Compliance WIDS IAVM Compliance TMAT IWCE TMAT HBSS CAC/PKI Wireless Mapping IWCE WAN SA HBSS CAC/PKI Wireless Mapping SLIDR WAN SA Deep Packet Inspection SLIDR Deep Packet Inspection SCCVI-SCRI WIDS SCCVI-SCRI WIDS NET Cool Data Standardized Configurations NET Cool Data Navy DMZ Standardized Configurations Navy DMZ DAR POR Management Enclave DMZ DAR POR Management Enclave DMZ Insider Threat Insider Threat SIPR NAC SIPR NAC TMAT TMAT PKI PKI TIER III WAN (Enclave) WAN (Enclave) Incident Handling Incident Handling NMCI SIPRNET IDS Feeds NMCI SIPRNET IDS Feeds TIER II GIAP GIAP IP Sonar IP Sonar Navy GIG (NCDOC) Navy GIG (NCDOC) Global CND UDOP Global CND UDOP Functional NIC Functional NIC Multi-Layer Protocol Multi-Layer Defense Protocol Defense In-Line Filtering In-Line Filtering Deep Packet Inspection Deep Packet Inspection CND POR CND POR Honey Grid Honey Grid Enterprise Enterprise DMZ DMZ Operational Operational Funded and Funded and Rolling Out Rolling Out Proposed or In Proposed or In Development Development DAPE DAPE TIER I DoD GIG (JTF-GNO) DoD GIG (JTF-GNO) Cyber = mostly Life-cycle education and and proactive, dynamic defense. (From NCDOC briefs) Secure Locally Defend Globally The smart integration and collaboration between MANY needed IO & IA functions Tutelage Tutelage 16
17 Integration of Cyber Security and Defense Capabilities Insider Threat Mobius Project Trends Analysis Online Surveys IDS Monitoring Incident Handling IAVM Threat Stolen Credentials Spear Phishing Zero Day Exploits Soft Cert Searches Web Based Attacks Social Engineering Compromised Password Files Known Trojans and Malware Commonly Known Vulnerabilities Indiscriminant Recon Threat CCZ NIOSC Construct Tactical IDS placement DNS Blackhole IP Block Initiative CAC/PKI Network Forensics Malware Analysis Signature Development Mobius Project Trends Analysis Online Surveys IDS Monitoring Incident Handling IAVM New/Custom Trojans CARS initiative Mobius to Prometheus Cyber Tactical Teams Enhanced Compliance LE/CI integration Threat Analysis Process Improvements CCZ NIOSC Construct Tactical IDS placement DNS Blackhole IP Block Initiative CAC/PKI Network Forensics Malware Analysis Signature Development Mobius Project Trends Analysis Online Surveys IDS Monitoring Incident Handling IAVM Where, lack of IA CM is pervasive and undermines it all Tactical Sensor Pilot HBSS Pilot SCCVI/SCRI Enhanced Collaboration IDS to IPS Transition CARS initiative Mobius to Prometheus Cyber Tactical Teams Enhanced Compliance LE/CI integration Threat Analysis Process Improvements CCZ NIOSC Construct Tactical IDS placement DNS Blackhole IP Block Initiative CAC/PKI Network Forensics Malware Analysis Signature Development Mobius Project Trends Analysis Online Surveys IDS Monitoring Incident Handling IAVM HBSS Deployment Content Filtering Joint Data Strategy NMIMC Integration SLIDR Pilot Insider Threat Tool Pilot OCRS / IAVA Spiral Tactical Sensor Pilot HBSS Pilot SCCVI/SCRI Enhanced Collaboration IDS to IPS Transition CARS initiative Mobius to Prometheus Cyber Tactical Teams Enhanced Compliance LE/CI integration Threat Analysis Process Improvements CCZ NIOSC Construct Tactical IDS placement DNS Blackhole IP Block Initiative CAC/PKI Network Forensics Malware Analysis Signature Development Mobius Project Trends Analysis Online Surveys IDS Monitoring Incident Handling IAVM 2003 / Synchronized cyber capabilities to to narrow the Threat Vectors (From NCDOC briefs) 17
18 SO what are were trying to institute? An integrated Cyber System using dynamic lead & lag feedback Establish proactive, dynamic CND / IA Defense = dynamic cyber defense (DCD) Cyber I&W Virtual Storefront NMS / Security Management tools Defensive assessments Incident results SA ****** (Sensors, CNA/E inputs OpSec, Intel, etc ) Users & CoC threats IA & CND threats V&V / C&A Defensive I&W Forensics Red Teams Upfront/Early feedback (leading indicators) Change soft settings (takes seconds to minutes) Upgrades Changes (developed & installed) (takes days to months / years) After-the-fact feedback (lagging indicators) 18
19 Building a Trusted Cyber Infrastructure an adequately assured, affordable, net-centric environment Focus on a few core capabilities & devices = PC, routers, IA suite, Servers, & SANS all with access control Standard IA/CND suite FW, A/V, IDS/IPS, CDS,, etc Treat as a SoS : with high EAL WAN Router IA Suite Core Router IAW: NNE 2016 / NGEN vision Assured IOS Various EAL EAL 4-5 EAL 4 Security Monitor HW / FW Secure OS kernel Secure Virtual Machine Strict access / ZBAC EAL 6 Servers Distribution Router ALL OSes (MS, Mac, Unix) SANS EAL 5 6 Data centric security Defensive I&W Strict access / ZBAC Network Devices PC End user devices Make IT security a commodity: Use IA building blocks = APLs/PPLs NIAP Interoperability and Compose-ability are built in upfront and help dramatically reduce complexity and ambiguity Thus.establishing known risks & pedigrees: Reduces attack surface, impacts & TOC EAL 3-4 Secure OS TSM HBSS ZBAC Eval Assur Level (EAL):
Joint Information Environment Single Security Architecture (JIE SSA)
Joint Information Environment Single Security Architecture (JIE SSA) Danielle Metz DISA JIE Special Assistant to the Mission Assurance Executive /JIE SSA Integrated Design Team Lead 12 May 2014 Problem
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
The Comprehensive National Cybersecurity Initiative
The Comprehensive National Cybersecurity Initiative President Obama has identified cybersecurity as one of the most serious economic and national security challenges we face as a nation, but one that we
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013
Security Architecture: From Start to Sustainment Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013 Security Architecture Topics Introduction Reverse Engineering the Threat Operational
Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP [email protected]
Security Frameworks An Enterprise Approach to Security Robert Belka Frazier, CISSP [email protected] Security Security is recognized as essential to protect vital processes and the systems that provide those
Can We Become Resilient to Cyber Attacks?
Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Improvements Needed With Host-Based Intrusion Detection Systems
Report No. DODIG-2012-050 February 3, 2012 Improvements Needed With Host-Based Intrusion Detection Systems Warning This report is a product of the Inspector General of the Department of Defense. Its contents
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Cyber Education triangle clarifying the fog of cyber security through targeted training
Cyber Education triangle clarifying the fog of cyber security through targeted training Curriculum & Resources Linked / leveraged (on-line, companies, colleges, etc) MS / BS Cyber CISSP / GISP / CISO /
Operationally Focused CYBER Training Framework
Operationally Focused CYBER Training Framework Deputy Director, Field Security Operations 9 May 2012 Agenda DISA Cyber Workforce Training Vision Basic Tenets Role-based Educational/Assessment implementation
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute
Wasting Money on the Tools? Automating the Most Critical Security Controls Bonus: Gaining Support From Top Managers for Security Investments Mason Brown Director, The SANS Institute The Most Trusted Name
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
ARF, ARCAT, and Summary Results. Lt Col Joseph L. Wolfkiel
ARF, ARCAT, and Summary Results Lt Col Joseph L. Wolfkiel Enterprise-Level Assessment and Reporting The Concept Assessment Results Format (ARF) Assessment Summary Results (ASR) The Assessment Results Consumer
The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
DoD IA Training Products, Tools Integration, and Operationalization
Defense Information Systems Agency A Combat Support Agency DoD IA Training Products, Tools Integration, and Operationalization Roger S. Greenwell, CISSP, CISA, CISM Technical Director / Capabilities Implementation
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
DoD Strategy for Defending Networks, Systems, and Data
DoD Strategy for Defending Networks, Systems, and Data November 13, 2013 Department DoDD of Defense Chief Information Officer DoD Strategy for Defending Networks, Systems, and Data Introduction In July
An Integrated CyberSecurity Approach for HEP Grids. Workshop Report. http://hpcrd.lbl.gov/hepcybersecurity/
An Integrated CyberSecurity Approach for HEP Grids Workshop Report http://hpcrd.lbl.gov/hepcybersecurity/ 1. Introduction The CMS and ATLAS experiments at the Large Hadron Collider (LHC) being built at
A Comprehensive Cyber Compliance Model for Tactical Systems
A Comprehensive Cyber Compliance Model for Tactical Systems Author Mark S. Edwards, CISSP/MSEE/MCSE Table of Contents July 28, 2015 Meeting Army cyber security goals with an IA advocate that supports tactical
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
DISA Testing Services for the Enterprise. Luanne Overstreet
DISA Testing Services for the Enterprise Luanne Overstreet DISA T&E Executive 13 December 2012 Our Mission DISA, a Combat Support Agency, provides, operates, and assures command and control, information
Meeting Cyber Security Challenges
Meeting Cyber Security Challenges Presented to Naval Postgraduate School Cyber Summit 29 October 2009 Cynthia Irvine, PhD, Professor Naval Postgraduate School UNCLASSIFIED Overview Challenges in Cyber
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
AGENDA. CNDSP Program CNDSP is a Team Sport. Protect Respond CNDSP Contacts Questions
DISA s Computer Network Defense Service Provider Program (CNDSP) 7 May 2012 AGENDA CNDSP Program CNDSP is a Team Sport DISA s CNDSP Program Detect Protect Respond CNDSP Contacts Questions CNDSP Program
NICE and Framework Overview
NICE and Framework Overview Bill Newhouse NIST NICE Leadership Team Computer Security Division Information Technology Lab National Institute of Standards and Technology TABLE OF CONTENTS Introduction to
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI
1 Closed loop endpoint compliance an innovative, standards based approach A case study - NMCI Tom Lerach Head of IA, HP DoD Rajat Bhargava StillSecure October 2009 Agenda endpoint compliance with NMCI
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Combating Spear-phishing:
Combating Spear-phishing: Convergence of Intel, Ops, Forensics, and Vulnerability Management Mr. Billy Rodriguez, GCIH Chief Intrusion Prevention Section Mr. Jacob Stauffer, GCFA, GREM Chief Intrusion
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative
(U) Appendix D: Evaluation of the Comprehensive National Cybersecurity Initiative (U) Presidential Directive NSPD 54/HSPD 23, Cybersecurity Policy, established United States policy, strategy, guidelines,
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700
OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC 20301-1700 OPERATIONAL TEST AND EVALUATION AUG 0 1 2014 MEMORANDUM FOR COMMANDER, ARMY TEST AND EVALUATION COMMAND COMMANDER, AIR
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives
How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives DON IT Conference // AFCEA West 2015 Presented by: RDML John Ailes Chief Engineer SPAWAR
A Combat Support Agency
Department t of Defense (DoD DoD) Enterprise Email May 9, 2012 v2 Agenda Purpose: Create awareness of Department of Defense (DoD) Enterprise Email and increase AGENDA understanding of the service ss benefits
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
Infrastructure Development Forecast to Industry
Infrastructure Development Forecast to Industry Mr. Jack Wilmer Executive, Infrastructure Directorate 2 November 2015 51 Infrastructure Development Mission & Vision Mission Vision Slogan Enabled by We
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
Network Management and Defense Telos offers a full range of managed services for:
Network Management and Defense Telos offers a full range of managed services for: Network Management Operations Defense Cybersecurity and Information Assurance Software and Application Assurance Telos:
The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era
The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era Ted Gruenloh Director of Operations Sentinel IPS * Agenda! Review of the current Network Security
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Triangle InfoSeCon. Alternative Approaches for Secure Operations in Cyberspace
Triangle InfoSeCon Alternative Approaches for Secure Operations in Cyberspace Lt General Bob Elder, USAF (Retired) Research Professor, George Mason University Strategic Advisor, Georgia Tech Research Institute
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Cybersecurity: An Innovative Approach to Advanced Persistent Threats
Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Reliable, Repeatable, Measurable, Affordable
Reliable, Repeatable, Measurable, Affordable Defense-in-Depth Across Your Cyber Security Life-Cycle Faced with today s intensifying threat environment, where do you turn for cyber security answers you
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense
Solving the CIO s Cybersecurity Dilemma: 20 Critical Controls for Effective Cyber Defense John M. Gilligan Information systems Security Association National Capital Chapter January 19, 2010 1 Topics Background
Actions and Recommendations (A/R) Summary
Actions and Recommendations (A/R) Summary Priority I: A National Cyberspace Security Response System A/R 1-1: DHS will create a single point-ofcontact for the federal government s interaction with industry
All Information is derived from Mandiant consulting in a non-classified environment.
Disclaimer: All Information is derived from Mandiant consulting in a non-classified environment. Case Studies are representative of industry trends and have been derived from multiple client engagements.
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY
PRINCIPLES AND PRACTICE OF INFORMATION SECURITY Protecting Computers from Hackers and Lawyers Linda Volonino, Ph.D. Canisius College Stephen R. Robinson Verity Partners, LLC with contributions by Charles
EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security Evangelist @StephenCoty
EMERGING THREATS & STRATEGIES FOR DEFENSE Stephen Coty Chief Security Evangelist @StephenCoty Industry Analysis 2014 Data Breaches - Ponemon Ponemon 2014 Data Breach Report *Statistics from 2013 Verizon
APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES
APPENDIX C - PRICING INDEX DIR-SDD-2514 VERIZON BUSINESS NETWORK SERVICES, INC SERVICES Application Vulnerability Scanning. A web-based application service hosted by Verizon Business to provide customers
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Some Thoughts on the Future of Cyber-security
Some Thoughts on the Future of Cyber-security Mike Thomas Information Assurance Directorate National Security Agency NSI IMPACT April 2015 1 Introduction, or Why are we here? National security missions
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
Intel Security Certified Product Specialist Security Information Event Management (SIEM)
Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
National Cyber Security Strategies: United States
National Cyber Security Strategies: United States Audrey L. Plonk Director, Cybersecurity and Internet Governance Intel Corporation 1 ICSS 2013 Trends: National Cybersecurity Strategies New strategies
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
New possibilities in latest OfficeScan and OfficeScan plug-in architecture
New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
