Rapid Fire Security : Evolution to Revolution
|
|
|
- Doris Perry
- 10 years ago
- Views:
Transcription
1 Rapid Fire Security : Evolution to Revolution
2 David O Berry, Previously Director of Strategic Development and ITS for SC Probation, Parole, & Pardon Services During my 19+ years with South Carolina MS-ISAC Executive Board SC Security Domain Chairman and Collaboration TL Midland s ISSA Chapter Founder and President Trusted Computing Group s Customer Advisory Council (TNC- CAC) Chairman, TOG s Improving The Digital EcoSytem Workgroup Chapters Published on IF-MAP, SCAP, TNC and Standard s Based Defense/Mitigation (ISMH 09,10,11) My Previous Life s Work and the IT Environment 800+ users, rapidly growing external user-base (1000s) 100% Mobile capable Plan started in Full-time IT including development, engineering, help desk, & remote support Decentralized work force Heterogeneous and Open Standards Deployments Core: McAfee, Dell, Juniper, APC Network: Juniper, BlueCoat, Citrix, Imprivata Data: McAfee EEPC, Device Control, Host DLP Endpoint: McAfee AV, HIPS, Policy Auditor Management: McAfee s epolicy Platform, STRM, NSM Manager, Cacti & other Open Source products 2
3 First of all some recognition for exceptional efforts 3
4 The Art of Security The Techno-Industrial Revolution 2.x is The ULTIMATE outcome of the application of human creative skills and imagination
5 Threat Radar = Answering The Question Why? Industrial Threats Will Mature Hacktivism: Reboot or be Marginalized Windows 8: BIOS and Hardware Attacks Mobile Botnets, Rootkits, and Attack Surface Oh MY! Rogue CERTs: Rooting Trust
6 Threat Trends: Unfathomable Numbers 70% Increase in the number of suspect URLs in 2013 now 98 million total! 1,000,000 New unique samples of ransomware in ,200,000 New MBR-attack-related samples in ,400, new Android malware samples 5,700,000 New malicious signed binaries in 2013 Source: McAfee Labs 200 New threats every minute, or more than 3 every second
7 Key Topic Mobile malware: The march continues! 2.47 million new Android mobile malware samples were added in 2013, up 197% from There were 744,000 new samples in Q4 alone!!
8 Key Topic Malicious signed binaries: Can we trust the Certificate Authority model? The number of malicious signed binaries in our library tripled in 2013 to more than 8 million. In Q4, there were 2.3 million new and unique malicious signed binaries. It includes stolen, purchased, or abused certificates, but the majority of growth is due to dubious content distribution networks (CDNs).
9 Key Trend Malware Attackers can now deliver nearly unique samples to every victim. As a result, the total number of known malware samples grew at an even faster rate in The McAfee Labs zoo grew by 81 million samples in It now contains more than 196 million unique malware samples. There are 200 new threats every minute, or more than 3 every second
10 Key Trend Ransomware The volume of new ransomware samples doubled from Q to Q McAfee Labs added 1 million new samples in 2013.
11 Key Trend Rootkits The volume of new rootkits is the lowest it has been in three years.
12 This was THEN Literally in Black and White!!!
13 Next generation data centers large scale virtualized utility fabric provides application services to millions of users - the utility computing vision access tier authentication, DNS, intrusion detect, VPN web cache processing elements web tier web page storage (NAS) application tier files (NAS) database tier internet switched fabric infrastructure on demand intranet edge routers routing switches storage elements 1st level firewall load balancing switches web servers 2nd level firewall switches application servers switches database SQL servers storage area network (SAN) Multi-tiered applications
14 Threats Rapidly Moving Down the Stack Attack and disable security products and hence all protection Compromise virtual machine and hence all guest machines within Ultimate APT s compromise devices below OS, either before or after shipment Applications/RDBMS AV HIPS Operating System Virtual Machine I/O Memory Disk Network Display BIOS CPU Traditional attacks and defenses focused primarily on the application layer Infect OS with APT s resulting in threats hidden from security products Rogue peripherals & firmware bypassing all other security measures
15 Past, Present, and Future 2007 (5 years ago) 1M malware samples 2013 (today s estimate) 130M malware samples By 2020 (in 7 years) 40% of data will be generated by IoT Connected Devices (IoT) *Will represent 24 Billion
16 And They Wonder Why We Seldom Sleep Peacefully?
17 Design includes security objectives End-to-end security management Protect attacks at physical layer Machine level integrity checks Identity linking and authorization Secure deployment of credentials UI to control security operations/manage security lifecycle Data management Techno-Industrial Revolution 2.x is absolutely all about MASSIVE SCALE!!!!!!!
18 Evolution of Cyber Security and the Cyber Intelligence Problem Yesterday s Security Today s Problem??? Tomorrow s Solution??? Network Awareness Protect the perimeter and patch the holes to keep out threats share knowledge internally. Increasing Cyber Risks Malicious actors have become much more sophisticated & money driven. Losses to US companies now in the tens of millions; WW hundreds of millions. Cyber Risks are now ranked #3 overall corporate risk on Lloyd s 2013 Risk Index. Intelligence Sharing Identify and track threats, incorporate knowledge and share what you know manually to trusted others, which Is extremely time consuming and ineffective in raising the costs to the attackers. Manually Sharing Ineffective Expensive because it is slow manual process between people. Not all cyber intelligence is processed; probably less than 2% overall = high risk. No way to enforce cyber intelligence sharing policy = non-compliance. Situational Awareness Automate sharing develop clearer picture from all observers input and pro-actively mitigate. Solving the Problem Security standards recently matured. Cyber Intelligence Sharing Platform revolutionizing sharing and utilization of threat intelligence.
19 Cyber Intelligence Problem Typical Sharing of Intelligence Today 1. Machines detect threats, typically stored in proprietary formats or PDFs 2. People export data and manually share via multiple media types 3. Other people rarely get a full picture of ongoing threats 4. Only some threats are mitigated 1 4 Org A 2 /phone, Secure portal 3 Org B 19
20 Impediments To Progress Trust isolated into like organizations based on similarly perceived threats/business line Vendor Interoperability Individual organization with manual processes Many elements of automation still disconnected Vendor driven Collaboration across organizations Competitors nervous to share data Liability Disagreement about system to use to share information Simplicity of automation to support small organizations Shortage of skilled analysts How to share without tipping off the enemy? 20
21 FS_ISAC MISSION: Sharing Timely, Relevant, Actionable Cyber and Physical Security Information & Analysis A nonprofit private sector initiative formed in 1999 Designed/developed/owned by financial services industry Assist to mitigate recent cybercrime & fraud activity Process thousands of threat indicators per month 2004: 68 members; 2014: 5,000+ members Sharing information globally 21
22 How FS-ISAC Works: Circles of Trust IRC CHEF BRC CYBER INTEL FS- ISAC PPSIC TIC PRC CIC CAC Clearing House and Exchange Forum (CHEF) Payments Risk Council (PRC) Payments Processor Information Sharing Council (PPISC) Business Resilience Committee (BRC) Threat Intelligence Committee (TIC) Community Institution Council (CIC) Insurance Risk Council (IRC) Compliance and Audit Council (CAC) Cyber Intelligence Listserv Education Committee Product and Services Review Committee Survey Review Committee Security Automation Working Group (SAWG) Member Reports Incident to Cyber Intel list, or via anonymous submission through portal Members respond in real time with initial analysis and recommendations SOC completes analysis, anonymizes the source, and generates alert to general membership 22
23 Sharing is key INFRASTRUCTURE TRUST To be forewarned is to be fore-armed
24 Traffic Light Protocol (TLP) Restricted to a defined group (e.g., only those present in a meeting.) Information labeled RED should not be shared with anyone outside of the group AMBER information may be shared with FS-ISAC members. GREEN Information may be shared with FS-ISAC members and partners (e.g., vendors, MSSPs, customers). Information in this category is not to be shared in public forums WHITE information may be shared freely and is subject to standard copyright rules 24
25 Other Models Common non-disclosure language developed and NDA s to enforce secrecy Consortia are built around common interest areas that define a common context of threat Organizations operate in an open environment (no anonymization) Organizations contribute what they are willing to share in a central automated repository with appropriate handling caveats (TLP and other) Participation accelerates when the percentage of Sharing organizations is high members share process and technology to improve sharing for everyone s benefit 25
26 Countermeasures Trends: Intelligence, Response, and Red Teams Extensive Red Teaming and SE Testing Develop Operational Readiness Focus on OSINT analysis and Forensics Extensive Internal CERT Team investments Partnerships for information sharing
27 Security Automation Will Revolutionize Information Sharing 27
28 Common Language(s) MITRE has been working with Industry to develop common structures STIX CYBOX TAXII CAPEC MAEC OVAL Implementations are still immature but there is a gathering storm Analysts must have a firm grasp of this entire space 28
29 Cyber Threat Intelligence Consider These Questions.. What Activity are we seeing? Where has this threat been Seen? What weaknesses does this threat Exploit? Who is responsible for this threat? What Threats should I be looking for and why? What does it Do? Why does it do this? What can I do? 29
30 That Machines Can Use Too <?xml version="1.0" encoding="utf-8"?> <cybox:observables xmlns:xsi=" xmlns:cybox=" xmlns:common=" xmlns:fileobj=" xsi:schemalocation=" cybox_major_version="1" cybox_minor_version="0(draft)"> <cybox:observable> <cybox:stateful_measure> <cybox:object id="cybox:a1" type="file"> <cybox:defined_object xsi:type="fileobj:fileobjecttype"> <FileObj:Hashes> <common:hash> <common:type datatype="string">md5</common:type> <common:simple_hash_value condition="isinset" value_set="4ec0027bef4d7e1786a04d021fa8a67f, 21F0027ACF4D B1D021FA8CF76,2B4D027BEF4D7E1786A04D021F A8CC01" datatype="hexbinary"/> </common:hash> </FileObj:Hashes> </cybox:defined_object> </cybox:object> </cybox:stateful_measure> </cybox:observable> </cybox:observables> <!-- STIX Indicator w/ Snort Example Copyright (c) 2013, The MITRE Corporation. All rights reserved. The contents of this file are subject to the terms of the STIX License located at This example demonstrates a simple usage of STIX to represent indicators with a Snort test mechanism. This demonstrates the ability of STIX indicators to represent external test mechanisms within an indicator. It demonstrates the use of: * STIX Indicators * STIX TestMechanisms * Extensions (Snort) * Controlled vocabularies Created by Mark Davidson --> <stix:stix_package xmlns:xsi=" xmlns:stix=" xmlns:indicator=" xmlns:stixvocabs=" xmlns:testmechsnort=" xmlns:example=" xsi:schemalocation= " id="example:stixpackage-0935d61b-69a4-4e64-8c4c-d9ce885f7fcc" version="1.0.1" > <stix:stix_header> <stix:title>example SNORT Indicator</stix:Title> <stix:package_intent xsi:type="stixvocabs:packageintentvocab-1.0">indicators - Network Activity</stix:Package_Intent> </stix:stix_header> <stix:indicators> <stix:indicator xsi:type="indicator:indicatortype" id="example:indicator-ad ede- 4abb-a4aa a2abf4"> <indicator:type xsi:type="stixvocabs:indicatortypevocab-1.0">exfiltration</indicator:type> <indicator:description> Indicator that contains a SNORT signature. This snort signature detects 'exfiltration attempts' to the /24 subnet. </indicator:description> <indicator:test_mechanisms> <indicator:test_mechanism id="example:testmechanism-5f5fde43-ee afaa-238a672f70b1" xsi:type="testmechsnort:snorttestmechanismtype"> <!-- From --> <testmechsnort:rule><![cdata[log udp any any -> /24 1:1024]]></testMechSnort:Rule> </indicator:test_mechanism> </indicator:test_mechanisms> </stix:indicator> </stix:indicators> </stix:stix_package> 30
31 Sharing Solution Instead of 2% or less of attacks blocked, detected, or prevented, a much higher percentage of attacks are stopped Org A 2 4 Intelligence Repository Many Trusted Orgs 31
32 Iterative Real Time Loops OODA Matters The ability to make this world happen exists now It is not futures or fiction.
33 Coordinated Security : Pub/Sub Rules the New World Asset Management System Endpoint Security (via NAC) SIM / SEM Nitro, epo, MAP Servers IPAM Open Infterfaces IF-MAP Protocol Physical Security ICS/SCADA Security AAA Routing Server or IDS Switching Wireless Firewalls Cloud Security
34 Data Exchange Layer An innovative, real-time, bi-directional communications fabric providing with product integration simplicity. Risk BPM Asset Threat Identity Security components operate as one to immediately share relevant data between endpoint, gateway, and other security products enabling security intelligence and adaptive security. Activity Data Location THE SECURITY CONNECTED FRAMEWORK ADAPTIVE SECURITY ARCHITECTURE
35 Current Standards Status Pilot group aka Friends and Family 25 Organizations Participating Vision Gaining Momentum Live at NH-ISAC Working with several others Released Version 1.2 to the group Focus on installability Enabled Collaboration Forums, Bug Tracker, Download System Conversion of Open Source Intel Feeds Approximately 14 sources 35
36 Automation Maturity Humans will always be in the loop Using STIX and TAXII repositories/gateways we can leverage already scarce talent Fewer analysts will have to develop their own signatures Using automation it is possible to move signatures faster Off the shelf COTS may not interoperate across vendors Open Source may require in-house development to automate information flow Ensuring security in information flow across systems??? Don t let your security solution become the problem! But, can you trust Analysts/Incident Handlers in other organizations? 36
37 What You Can Do Encourage Cyber Observable/Indicator sharing within your organization Work within standards that are widely adopted (STIX/TAXII) Don t wait for the perfect solution start now and help mature the process Engage with working and sharing groups Software Supply Chain Assurance Open Web Application Security Project ISAC find one that you fit InfraGard SANS/DSHIELD 37
38 Recap and Refocus The New Biz World Requires More Devices (Mobile etc.) Therefore Usually More Work Nothing Is Getting Easier Endpoints And Flowpoints Were/Are Unmanageable With Technology That Does Not Scale From A Visibility Perspective Standardize Where/What You Can BOTH Modularity And Scalability Of Both Product And Aggregator Of Relevant Data Required Slow Adoption Of Standard Solutions Cripples Innovation and Impacts Efficiency of the Overall Digital Ecosystem Safety We Are All Part Of One Organism In This Digital Ecosystem Immune System Concept, If Extremities Get An Infection It Can Easily Become Systemic Digital Feudalism or Castle And Moat Were Reasonable In The Past Now The Barbarians Can Draft Your Citizens, Dogs, Cats, Livestock, Refrigerators, etc. Into Service Against You Bad Security Threatens Innovation Which In Turn Threatens Productivity Don t Give Anyone An Excuse No to So 38
39 David O Berry McAfee/Intel Security
FS-ISAC CHARLES BRETZ
FS-ISAC CHARLES BRETZ Information Sharing To be forewarned is to be fore-armed MISSION: Sharing Timely, Relevant, Actionable Cyber and Physical Security Information & Analysis A nonprofit private sector
McAfee Deep Safe. Security beyond the OS. Kai-Ping Seidenschnur Senior Security Engineer. October 16, 2012
McAfee Deep Safe Security beyond the OS Kai-Ping Seidenschnur Senior Security Engineer October 16, 2012 Intel/McAfee Initiatives: epo Deep Command and Deep Defender McAfee epo Deep Command Security Management
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities
Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities Sean Barnum [email protected] September 2011 Overview What is SCAP? Why SCAP?
Digital Evidence and Threat Intelligence
Digital Evidence and Threat Intelligence 09 November 2015 Mark Clancy CEO www.soltra.com @soltraedge External Threats Growing 117,339 incoming attacks every day The total number of security incidents detected
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)
McAfee Security: Intrusion Prevention System REV: 0.1.1 (July 2011) 1 Contents 1. McAfee Network Security Platform...3 2. McAfee Host Intrusion Prevention for Server...4 2.1 Network IPS...4 2.2 Workload
Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA
Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology
ARCHITECT S GUIDE: Comply to Connect Using TNC Technology August 2012 Trusted Computing Group 3855 SW 153rd Drive Beaverton, OR 97006 Tel (503) 619-0562 Fax (503) 644-6708 [email protected]
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
High End Information Security Services
High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.
Orchestrated Security Network. Automated, Event Driven Network Security. Ralph Wanders Consulting Systems Engineer
Orchestrated Security Network Automated, Event Driven Network Security Ralph Wanders Consulting Systems Engineer Orchestrated Security Network! " TCG/ TNC Architecture! " IF-MAP! " Use cases of IF-MAP!
Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR
Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO
A Crisis Response, Information Sharing View of FFIEC Appendix J?
A Crisis Response, Information Sharing View of FFIEC Appendix J? Susan Rogers (MBCP, MBCI) Financial Services Information Sharing and Analysis Center FS-ISAC, Business Resiliency Director [email protected];
TNC: Open Standards for Network Security Automation. Copyright 2010 Trusted Computing Group
TNC: Open Standards for Network Security Automation Copyright 2010 Trusted Computing Group Agenda Introduce TNC and TCG Explanation of TNC What problems does TNC solve? How does TNC solve those problems?
Security Orchestration with IF-MAP
Security Orchestration with IF-MAP Gary Holland, Lumeta/IMRI 2 November 2011 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Trusted Network Connect Explanation of IF-MAP
Security Coordination with IF-MAP
Security Coordination with IF-MAP Matt Webster, Lumeta 28 Sept 2010 Copyright 2010 Trusted Computing Group Agenda Threat Landscape and Federal Networks Recap of TNC Explanation of IF-MAP What is IF-MAP?
Eight Essential Elements for Effective Threat Intelligence Management May 2015
INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
Practical Threat Intelligence. with Bromium LAVA
Practical Threat Intelligence with Bromium LAVA Practical Threat Intelligence Executive Summary Threat intelligence today is costly and time consuming and does not always result in a reduction of successful
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
The Sophos Security Heartbeat:
The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that
The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark
The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and
Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data
SEE everything in your environment LEARN by applying security intelligence to data ADAPT defenses automatically ACT in real-time Sourcefire Solutions Overview Security for the Real World Change is constant.
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform
How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform McAfee Endpoint Security 10 provides customers with an intelligent, collaborative framework, enabling endpoint defenses to
McAfee Security Management Adaptive Security Model & Threat Intelligence Exchange
Security Management Adaptive Security Model & Threat Intelligence Exchange David O Berry CSSLP, CISSP-ISSAP, ISSMP, CRISC, MCNE Worldwide Technical Strategist Left Margin Right Margin Security Obstacles
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.
Cyber Security Automation of energy systems provides attack surfaces that previously did not exist Cyber attacks have matured from teenage hackers to organized crime to nation states Centralized control
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense
Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense By: Daniel Harkness, Chris Strasburg, and Scott Pinkerton The Challenge The Internet is an integral part of daily
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
THREAT VISIBILITY & VULNERABILITY ASSESSMENT
THREAT VISIBILITY & VULNERABILITY ASSESSMENT Date: April 15, 2015 IKANOW Analysts: Casey Pence IKANOW Platform Build: 1.34 11921 Freedom Drive, Reston, VA 20190 IKANOW.com TABLE OF CONTENTS 1 Key Findings
How To Build Security By Silo
Leading The World Into Connected Security Building Security By Silo Technology Acquisition Process Has Delivered Security Chaos Endpoint Protection Firewall Gateway Security Network IPS Compliance Data
McAfee Security Architectures for the Public Sector
White Paper McAfee Security Architectures for the Public Sector End-User Device Security Framework Table of Contents Business Value 3 Agility 3 Assurance 3 Cost reduction 4 Trust 4 Technology Value 4 Speed
Cybersecurity Awareness. Part 2
Part 2 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
FIA Webinar Cybersecurity Threats: Preparation & Response June 29, 2015
FIA Webinar Cybersecurity Threats: Preparation & Response June 29, 2015 Moderator: Gregory Gist, Director, CBCP, Industry Relations, Office of Emergency Management, Citi Speakers: William Nelson, President
Unified Threat Management, Managed Security, and the Cloud Services Model
Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities
Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities John Skinner, Director, Secure Enterprise and Cloud, Intel Americas, Inc. May 2012 Agenda Intel + McAfee: What it means Computing trends
Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE
Network that Know Rasmus Andersen Lead Security Sales Specialist North & RESE Email Gateway vendor CERT AV vendor Law enforcement Web Security Vendor Network security appliance vendor IT Department App
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud
The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
Availability Digest. www.availabilitydigest.com. Prolexic a DDoS Mitigation Service Provider April 2013
the Availability Digest Prolexic a DDoS Mitigation Service Provider April 2013 Prolexic (www.prolexic.com) is a firm that focuses solely on mitigating Distributed Denial of Service (DDoS) attacks. Headquartered
Securing the Intelligent Network
WHITE PAPER Securing the Intelligent Network Securing the Intelligent Network New Threats Demand New Strategies The network is the door to your organization for both legitimate users and would-be attackers.
Memory Forensics & Security Analytics: Detecting Unknown Malware
Memory Forensics & Security Analytics: Detecting Unknown Malware SESSION ID: SEC-T09 Fahad Ehsan Associate Director Security Research and Analytics UBS AG Where it all started. ------------------------------------------------------------------------------------------
After the Attack: RSA's Security Operations Transformed
After the Attack: RSA's Security Operations Transformed Ben Smith, CISSP RSA Field CTO (East), Security Portfolio Senior Member, ISSA Northern Virginia 1 The Environment ~ 2,000 security devices ~55M security
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports
BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports Building a Security Operation Center Agenda: Auditing Your Network Environment Selecting Effective Security
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
GRC & Cyber Security Conference - Bringing the Silos Together ISACA Ireland 3 Oct 2014 Fahad Ehsan
Fahad Ehsan Cyber Security Researcher Where it all started. ------------------------------------------------------------------------------------------ Welcome to the Dungeon (c) 1986 Basit & Amjad (pvt)
Securing Office 365 with MobileIron
Securing Office 365 with MobileIron Introduction Office 365 is Microsoft s cloud-based productivity suite. It includes online versions of Microsoft s most popular solutions, like Exchange and SharePoint,
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Are you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the
Testimony of Mr. Anish Bhimani On behalf of the Financial Services Information Sharing and Analysis Center (FS-ISAC) before the Committee on Homeland Security United States House of Representatives DHS
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Symantec Endpoint Protection 12.1.5 Datasheet
Symantec Endpoint Protection 12.1.5 Datasheet Data Sheet: Endpoint Security Overview Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that
McAfee Next Generation Firewall Optimize your defense, resilience, and efficiency.
Optimize your defense, resilience, and efficiency. Table of Contents Need Stronger Network Defense? Network Concerns Security Concerns Cost of Ownership Manageability Application and User Awareness High
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System
Leading by Innovation McAfee Endpoint Security The Future of Malware-Detection: Activate protection on all Layers outside the Operating System Dipl.-Inform. Rolf Haas Principal Security Engineer, S+,CISSP
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity
Threat Intelligence for Dummies Karen Scarfone Scarfone Cybersecurity 1 Source Material Threat Intelligence for Dummies ebook Co-authored with Steve Piper of CyberEdge Group Published by Wiley Sponsored
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
Frontiers in Cyber Security: Beyond the OS
2013 DHS S&T/DoD ASD (R&E) CYBER SECURITY SBIR WORKSHOP Frontiers in Cyber Security: Beyond the OS Clear Hat Consulting, Inc. Sherri Sparks 7/23/13 Company Profile CHC was founded in 2007 by S. Sparks
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM
JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM May 2015 Nguyễn Tiến Đức ASEAN Security Specialist Agenda Modern Malware: State of the Industry Dynamic Threat Intelligence on the Firewall
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Zscaler Internet Security Frequently Asked Questions
Zscaler Internet Security Frequently Asked Questions 1 Technical FAQ PRODUCT LICENSING & PRICING How is Zscaler Internet Security Zscaler Internet Security is licensed on number of Cradlepoint devices
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
THE TOP 4 CONTROLS. www.tripwire.com/20criticalcontrols
THE TOP 4 CONTROLS www.tripwire.com/20criticalcontrols THE TOP 20 CRITICAL SECURITY CONTROLS ARE RATED IN SEVERITY BY THE NSA FROM VERY HIGH DOWN TO LOW. IN THIS MINI-GUIDE, WE RE GOING TO LOOK AT THE
Cybersecurity: An Innovative Approach to Advanced Persistent Threats
Cybersecurity: An Innovative Approach to Advanced Persistent Threats SESSION ID: AST1-R01 Brent Conran Chief Security Officer McAfee This is who I am 2 This is what I do 3 Student B The Hack Pack I used
Unified Security, ATP and more
SYMANTEC Unified Security, ATP and more TAKE THE NEXT STEP Martin Werner PreSales Consultant, Symantec Switzerland AG MEET SWISS INFOSEC! 27.01.2016 Unified Security 2 Symantec Enterprise Security Users
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Glasnost or Tyranny? You Can Have Secure and Open Networks!
AT&T is a proud sponsor of StaySafe Online Glasnost or Tyranny? You Can Have Secure and Open Networks! Steven Hurst CISSP Director - AT&T Security Services and Technology AT&T Chief Security Office 2009
Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats
Solution Overview Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats What You Will Learn The network security threat landscape is ever-evolving. But always
Detecting Unknown Malware: Security Analytics & Memory Forensics. Fahad Ehsan. Cyber Security Researcher @memfors4all #RSAC
SESSION ID: ANF-T09 Detecting Unknown Malware: Security Analytics & Memory Forensics Fahad Ehsan Cyber Security Researcher @memfors4all Where it all Started ------------------------------------------------------------------------------------------
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
McAfee. Firewall Enterprise. Application Note TrustedSource in McAfee. Firewall Enterprise. version 8.1.0 and earlier
Application Note TrustedSource in McAfee Firewall Enterprise McAfee version 8.1.0 and earlier Firewall Enterprise This document uses a question and answer format to explain the TrustedSource reputation
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
Using SIEM for Real- Time Threat Detection
Using SIEM for Real- Time Threat Detection Presentation to ISSA Baltimore See and secure what matters Joe Magee CTO and Co-Founder March, 27 2013 About us Vigilant helps clients build and operate dynamic,
SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper
SHARE THIS WHITEPAPER Top Selection Criteria for an Anti-DDoS Solution Whitepaper Table of Contents Top Selection Criteria for an Anti-DDoS Solution...3 DDoS Attack Coverage...3 Mitigation Technology...4
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Can We Become Resilient to Cyber Attacks?
Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,
Injazat s Managed Services Portfolio
Injazat s Managed Services Portfolio Overview Premium Managed Services to Transform Your IT Environment Injazat s Premier Tier IV Data Center is built to offer the highest level of security and reliability.
Enterprise Security Platform for Government
Enterprise Security Platform for Government Today s Cybersecurity Challenges in Government Governments are seeking greater efficiency and lower costs, adopting Shared Services models, consolidating data
Persistence Mechanisms as Indicators of Compromise
Persistence Persistence Mechanisms as Indicators of Compromise An automated technology for identifying cyber attacks designed to survive indefinitely the reboot process on PCs White Paper Date: October
