This is a picture of a kiqen
|
|
|
- Darren Crawford
- 10 years ago
- Views:
Transcription
1
2 Who am I? 11 years in InfoSec with 5 years of hobby work prior to that Primary interests: penetra;on tes;ng, intrusion detec;on, and log correla;on Currently employed as an InfoSec generalist at a cloud provider Previously worked at several Fortune 100 companies [email protected]
3 What is this
4 What is the Cloud? Harnesses the massively scalable Internet infrastructure to provide mul;ple users with on- demand access to data, applica;ons, and services Use of shared or virtualized resources to lower costs, reduce complexity, and increase flexibility For the purpose of this talk, we re talking about IaaS or SaaS
5 This is a picture of a kiqen
6 A Weapon of Mass Destruc;on? DefCon 17 Clobbering the Cloud (SensePost) DefCon 18 Cloud Compu;ng: A Weapon of Mass Destruc;on? (Bryan/Anderson) Cloud providers essen;ally aren t doing much internal policing of their clients Unofficial policy: As long as no complaints are received, nothing will be done
7 Vulnerabili;es of the Cloud Easy Access Anonymity/Fraud Conten;on for resources
8 Threats to the Cloud Provider Proven inability Infrastructure Damage Fraudulent/ Nonpaying Clients to address security
9 Threats to the Client One compromised client of a mul;- tenant environment can affect others Users can be unaware that their data is compromised
10 What are most cloud providers currently doing? Providers are trea;ng cloud security as a tradi;onal hos;ng environment Clients are given a virtual firewall with in- line IPS services Providers frequently offer Vulnerability Assessment for free Each client s virtual instance is independent Clients are fending for themselves with no coordinated enterprise security
11 Conven;onal Solu;on: IPS Very difficult for providers to offer prepackaged IPS that works for all clients and won t block legi;mate traffic Informa;on coming from an IPS is frequently incomplete (encryp;on, lack of end- point awareness) In- line IPS has to work at line speeds, so very complex correla;ons aren t possible
12 Conven;onal Solu;on: Tradi;onal Design Focus on external threats Assume internal hosts are trusted Clients can t benefit from security data being generated by other clients
13 By the way, how s that working? I can t say for certain what the security posture is inside a company I can guess the nature of the security posture based on behaviors of their network and personnel Guesses are based on how frequently a par;cular host contacted my network, and how long it took for it to stop Data is from first six months of 2011
14 (AWS) There was a single recurring host from AWS. Given their size, that s probably a very good indicator Wed Apr 20 06:54:50 PDT 2011 FW Block: Sweep Wed Apr 20 06:54:54 PDT 2011 Complaint: [email protected] ec2- [email protected] - [email protected] Wed Apr 20 21:34:48 PDT 2011 FW Block: AdminProtocol Wed Apr 20 21:34:49 PDT 2011 Complaint: [email protected] ec2- [email protected] - [email protected] Based on this, Amazon s response ;me to complaints/incidents is at least 14.5 hours
15 Rackspace/Slicehost There were 10 recurring hosts from Rackspace. The worst: Thu Mar 17 22:18:36 PDT 2011 FW Block: Sweep Thu Mar 17 22:18:37 PDT 2011 Complaint: ips.com Sat Mar 19 22:45:10 PDT 2011 FW Block: Sweep Sat Mar 19 22:45:11 PDT 2011 Complaint: ips.com Based on this, complaint/incident response ;me from Rackspace is greater than 48 hours
16 Soklayer: Your World Wild Web provider! 5 recurring hosts from Soklayer; all spanned mul;ple days Soklayer never responds to complaints or incidents, or at the very least, response is measured in months
17 The Proof: Soklayer Data Mon Feb 14 02:46:37 PST 2011 FW Block: Sweep Mon Feb 14 02:46:38 PST 2011 Complaint: Tue Apr 19 04:26:09 PDT 2011 FW Block: Sweep Tue Apr 19 04:26:11 PDT 2011 Complaint: Fri May 13 10:29:53 PDT 2011 FW Block: Sweep Fri May 13 10:29:53 PDT 2011 Complaint: Mon Jun 13 09:06:44 PDT 2011 FW Block: Sweep Mon Jun 13 09:06:45 PDT 2011 Complaint: Not as bad: Thu Mar 10 18:02:58 PST 2011 FW Block: AdminProtocol Thu Mar 10 18:03:20 PDT 2011 Complaint: Fri Mar 18 23:21:20 PDT 2011 FW Block: Sweep Fri Mar 18 23:21:20 PDT 2011 Complaint: Sun Mar 20 03:41:04 PDT 2011 FW Block: AdminProtocol Sun Mar 20 03:41:05 PDT 2011 Complaint:
18 Tighten it up Clients should have their own IDS/ firewall/etc, but Hosts that are aqacking mul;ple clients should be detected and shunned by the provider The provider should take steps to help their clients protect themselves The provider should also be looking for inten;onally malicious clients
19 DANGER! Consolida;ng events from all client environments to look for enterprise- threatening external agents would improve things, but The single largest unaddressed threat is the client networks
20 What Are Providers Dealing With? Frequent, rapid client changes Clients with a wide variety of services, users, and ways of u;lizing resources Clients who are in an unknown state A need to be as close to 0% false posi;ve as possible
21 What Stays the Same? In- line IPS, owned and controlled by the client Firewall, owned and controlled by the client Vulnerability Assessment (VA) Well- understood technologies that allow clients baseline control over their own networks within the cloud
22 What Are We Adding? Nerlow Analyzer On- access misconfigura;on detec;on IDS Log Consolida;on NAC Event Correla;on
23 Why Not OSSIM? hqp://alienvault.com/community OSSIM uses many of the same tools I m sugges;ng It makes assump;ons about the network it s placed into (tool/vendor lock- in) Correla;on engine is not as flexible as SEC; regardless, has advantages
24 Nerlow (nfdump) hqp://nfdump.sourceforge.net/ Used to monitor for excessive, prolonged network u;liza;on Can also trend network performance and flag suspicious spikes Data is sent from internal switches and other network devices for analysis Provides network server/service inventory data
25 Enterprise- Wide IDS (Snort) hqp:// Well- known, widely used Independent of clients; no client visibility AQached to network egress points No trusted networks: monitoring ALL traffic Provides network server/ service inventory data
26 NAC (PacketFence) hqp:// Post- admission behavioral quaran;ning This system will take input from our other systems, and use it to make decisions to quaran;ne devices
27 Log Consolida;on (syslog- ng) Well- known, widely used All infrastructure devices (servers, switches, IDS, etc) logging here
28 On- Access Misconfigura;on Detec;on Medusa hqp:// medusa.html Metasploit hqp:// Nmap hqp://nmap.org/ Others Tools called by correla;on system to run basic misconfigura;on checks of new services and servers
29 The Magic : Correla;on (SEC) hqp://simple- evcorr.sourceforge.net/ Keeps track of events from a variety of sources Isn t in- line, makes it possible to make slow, well- informed decisions Coordinates all other components
30 How does this work?
31 Iden;fying Misbehaving Hosts
32 nfdump Unusual traffic paqerns alone don t dictate an incident nfdump data should be compared with IDS, firewall and other data to look for anomalies Example: Traffic peak, combined with ARP collision messages from switches à ARP Cache Overflow Example: Traffic peak, combined with many IRC events à Botnet Par;cipa;on
33 Correlated IDS Logs Much beqer informa;on, but limited to what we can see Example: Single event type enters server, replayed by server mul;ple ;mes à Worm Infec;on Example: Server contacts successive servers using the same administra;ve protocol à Protocol Scanning
34 Limita;ons Err on the side of cau;on Reac;ve, so damage might already be done
35 Demonstra;on
36 Conclusion Cloud providers don t appear to be internally policing their clients networks Reliable measures should be be taken to detect both malicious clients and compromised clients
37 Ques;ons
Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones
Network Security Security in Compu5ng, Chapter 7 Topics l Network AAacks l Reconnaissance l AAacks l Spoofing l Web Site Vulnerabili5es l Denial of Service l Network Defences l Firewalls l Demilitarised
Splunk and Big Data for Insider Threats
Copyright 2014 Splunk Inc. Splunk and Big Data for Insider Threats Mark Seward Sr. Director, Public Sector Company Company (NASDAQ: SPLK)! Founded 2004, first sohware release in 2006! HQ: San Francisco
LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV)
LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY 1st TERM (14 SEPT - 27 NOV) Week 1 9.30-10.30 10.30-11.30 11.30-12.30 12.30-13.30 13.30-14.30 14.30-15.30 15.30-16.30
True in Depth Security through Next Generation SIEM. Ray Menard Senior Principal Security Consultant Q1 Labs
True in Depth Security through Next Generation SIEM Ray Menard Senior Principal Security Consultant Q1 Labs "Electronic intelligence, valuable though it is in its own way, serves to augment the daunting
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps
ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps Agenda Security Enablement Concepts for BYOD & SaaS Cloud Apps! Intro and background! BYOD
How To Protect A Network From Attack From A Hacker (Hbss)
Leveraging Network Vulnerability Assessment with Incident Response Processes and Procedures DAVID COLE, DIRECTOR IS AUDITS, U.S. HOUSE OF REPRESENTATIVES Assessment Planning Assessment Execution Assessment
Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology
Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology Alexey Kirichenko, F- Secure Corpora7on ICT SHOK, Future Internet program 30.5.2012 Outline 1. Security WP (WP6) overview
DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN
DNS Traffic Monitoring Dave Piscitello VP Security and ICT Coordina;on, ICANN Domain Names ICANN coordinates the administra2on of global iden2fier systems Domain names provide user friendly identification
NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age
NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age Dynamic Threat Protection for Enterprise Edge and Data Center Rasmus Andersen Lead Security Sales Specialist
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
There e really is No Place Like Rome to experience great Opera! Tel: 01213 573 866 to discuss your break to the Eternal City!
There e really is No Place Like Rome to experience great Opera! Tel: 01213 573 866 to discuss your break to the Eternal City! Date Fri Location 11 Sep 2015 Teatro dell'opera di Roma Opera Sat 12 Sep 2015
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Intrusion Detection Systems. Darren R. Davis Student Computing Labs
Intrusion Detection Systems Darren R. Davis Student Computing Labs Overview Intrusion Detection What is it? Why do I need it? How do I do it? Intrusion Detection Software Network based Host based Intrusion
How To Protect Virtualized Data From Security Threats
S24 Virtualiza.on Security from the Auditor Perspec.ve Rob Clyde, CEO, Adap.ve Compu.ng; former CTO, Symantec David Lu, Senior Product Manager, Trend Micro Hemma Prafullchandra, CTO/SVP Products, HyTrust
How To Perform a SaaS Applica7on Inventory in. 5Simple Steps. A Guide for Informa7on Security Professionals. Share this ebook
How To Perform a SaaS Applica7on Inventory in 5Simple Steps A Guide for Informa7on Security Professionals WHY SHOULD I READ THIS? This book will help you, the person in the organiza=on who cares deeply
Cloud Compu)ng. Yeow Wei CHOONG Anne LAURENT
Cloud Compu)ng Yeow Wei CHOONG Anne LAURENT h-p://www.b- eye- network.com/blogs/eckerson/archives/cloud_compu)ng/ 2011 h-p://www.forbes.com/sites/tjmccue/2014/01/29/cloud- compu)ng- united- states- businesses-
Main Research Gaps in Cyber Security
Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis
NETWORK DEVICE SECURITY AUDITING
E-SPIN PROFESSIONAL BOOK VULNERABILITY MANAGEMENT NETWORK DEVICE SECURITY AUDITING ALL THE PRACTICAL KNOW HOW AND HOW TO RELATED TO THE SUBJECT MATTERS. NETWORK DEVICE SECURITY, CONFIGURATION AUDITING,
Email/Endpoint Security and More Rondi Jamison
Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on
Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training
End- User Informa/on Security Awareness Training 1 Why Awareness Training? NCLM sanc:oned mul:ple Security Risk Assessments for a broad spectrum of member municipali:es The assessments iden:fied areas
PALO ALTO SAFE APPLICATION ENABLEMENT
PALO ALTO SAFE APPLICATION ENABLEMENT 1 Palo Alto Networks Product Overview James Sherlow SE Manager WEUR & Africa [email protected] @jsherlow Palo Alto Networks at a Glance Corporate Highlights
The Role of Nutanix in the Public /Private / Hybrid Cloud Spectrum
The Role of Nutanix in the Public /Private / Hybrid Cloud Spectrum Chris Howard Vice President, Nutanix Federal Phil Ditzel Senior SE Public Cloud Let s start with the definition NIST s Defini-on: A model
Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements
OpAuditTM from is the first compliance management product on the market to successfully track manual controls and technical controls in the same workflow-based system. This ingenious solution gathers &
Splunk for Networking and SDN
Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking
Cisco & Big Data Security
Cisco & Big Data Security 巨 量 資 料 的 傳 輸 保 護 Joey Kuo Borderless Networks Manager [email protected] The any-to-any world and the Internet of Everything is an evolution in connectivity and collaboration that
Virginia Government Finance Officers Association Spring Conference May 28, 2014. Cloud Security 101
Virginia Government Finance Officers Association Spring Conference May 28, 2014 Cloud Security 101 Presenters: John Montoro, RealTime Accounting Solutions Ted Brown, Network Alliance Presenters John Montoro
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
How to Grow and Transform your Security Program into the Cloud
How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management
CLOUD GUARD UNIFIED ENTERPRISE
Unified Security Anywhere CLOUD SECURITY CLOUD GUARD UNIFIED ENTERPRISE CLOUD SECURITY UNIFIED CLOUD SECURITY Cloudy with a 90% Chance of Attacks How secure is your cloud computing environment? If you
Windows Server 2003 End of Support. What does it mean? What are my options?
Windows Server 2003 End of Support What does it mean? What are my options? Windows Server 2003 End of Life- Why Care? The next big vulnerability (Heartbleed/Shellshock) is looming No more patches from
Environment. Attacks against physical integrity that can modify or destroy the information, Unauthorized use of information.
Cyber Security. Environment, Solutions and Case study. Special Telecommunications Service David Gabriel, Buciu Adrian Contact: [email protected] [email protected] Environment Network/services can be damaged
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT
WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT WHAT S INSIDE: 1. GENERAL INFORMATION 1 2. EXECUTIVE SUMMARY 1 3. BACKGROUND 2 4. QUESTIONS FOR CONSIDERATION
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
The Threat of Coexisting With an Unknown Tenant in a Public Cloud
royal holloway The Threat of Coexisting With an Unknown Tenant in a Public Cloud An examination of the vulnerabilities of the cloud, with a focus on the issues of attackers ability to load malicious programs
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems
WHITE PAPER FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems Abstract: Denial of Service (DoS) attacks have been a part of the internet landscape for
Ecom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
The Incident Response Playbook for Android and ios
SESSION ID: AIR-W03R The Incident Response Playbook for Android and ios Andrew Hoog CEO and Co-founder NowSecure @ahoog42 @NowSecureMobile Andrew Hoog Author of three books Incident Response for Android
Intrusion Detection Systems
Intrusion Detection Systems Advanced Computer Networks 2007 Reinhard Wallner [email protected] Outline Introduction Types of IDS How works an IDS Attacks to IDS Intrusion Prevention Systems
Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response
Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response Incident Response What is the most importance component of an Incident Response Program? Tools? Processes? Governance?
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna
DDOS Mi'ga'on in RedIRIS SIG- ISM. Vienna Index Evolu'on of DDOS a:acks in RedIRIS Mi'ga'on Tools Current DDOS strategy About RedIRIS Spanish Academic & research network. Universi'es, research centers,.
Corporate Account Takeover & Information Security Awareness
Corporate Account Takeover & Information Security Awareness The information contained in this session may contain privileged and confidential information. This presentation is for information purposes
The Sumo Logic Solution: Security and Compliance
The Sumo Logic Solution: Security and Compliance Introduction With the number of security threats on the rise and the sophistication of attacks evolving, the inability to analyze terabytes of logs using
Canaveral Port Authority Master Cruise Ship Schedule -- FY 2015
Dec 25, 2014 Thu CT10 Dec 25, 2014 Thu CT8 Dec 25, 2014 Thu CT6 Dec 25, 2014 Thu CT5 Dec 25, 2014 Thu CT1 Dec 25, 2014 Thu CT3 Dec 26, 2014 Fri CT10 Enchantment of the Seas 0700 1630 Royal Caribbean ICS
T2 IaaSand PCI Compliance. Robert Zigweid, IOActive
T2 IaaSand PCI Compliance Robert Zigweid, IOActive Introduction Robert M. Zigweid Principal Compliance Consultant at IOActive, Inc. PCI QSA, PCI PA-QSA QSA for Amazon Web Services 2 Creating a PCI Compliant
Computer Security Incident Handling Detec6on and Analysis
Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION
First Line of Defense
First Line of Defense SecureWatch ANALYTICS FIRST LINE OF DEFENSE OVERVIEW KEY BENEFITS Comprehensive Visibility Gain comprehensive visibility into DDoS attacks and cyber-threats with easily accessible
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars
Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Software Defined Perimeter
So#ware Defined Perimeter Software Defined Perimeter A new approach to access control Junaid Islam, Co Chair Before we start, two ideas we believe strongly Complexity is the primary reason security systems
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
ITDays Security issues
ITDays Security issues Malicious Intrusion, are we concerned in our Organiza;on? 7 steps to evaluate your situa;on! Christophe Bianco - Christophe Rosenkranz Paul Jung November 2014 1 Agenda Are you concerned?
Course Syllabus Revised: Dec. 20, 2011.
CFRS 663/TCOM 663 Operations of Intrusion Detection and Forensics Department of Electrical and Computer Engineering George Mason University Spring, 2012 Course Syllabus Revised: Dec. 20, 2011. Instructor
Managing Network-related Risk for SMEs
Managing Network-related Risk for SMEs SANS Information Security Webcast 20 Mar 2012 Geneva, Switzerland version 1b Jim Herbeck Managing Partner, Nouvel Strategies [email protected] Member
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
CONNECTRIA MANAGED AMAZON WEB SERVICES (AWS)
CONNECTRIA MANAGED AMAZON WEB SERVICES (AWS) Maximize the benefits of using AWS. With Connectria s Managed AWS, you can purchase and implement 100% secure, highly available, managed AWS solutions all backed
Security testing the Internet-of-things
Security testing the Internet-of-things Lindholmen Software Development Day 2014-10-16 Emilie Lundin Barse Informa(on Security Consultant, Combitech [email protected] Contents State of security
AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
WHAT IS LOG CORRELATION? Understanding the most powerful feature of SIEM WWW.ALIENVAULT.COM
WHAT IS LOG CORRELATION? Understanding the most powerful feature of SIEM WWW.ALIENVAULT.COM IT S ALWAYS IN THE LOGS. 84% of Organizations that had their security breached in 2011, had evidence of the breach
Chapter 3. Database Architectures and the Web Transparencies
Week 2: Chapter 3 Chapter 3 Database Architectures and the Web Transparencies Database Environment - Objec
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
Building a cloud- based SIEM with Splunk Cloud and AWS
Copyright 2014 Splunk Inc. Building a cloud- based SIEM with Splunk Cloud and AWS Joe Goldberg Product MarkeAng, Splunk Gary Mikula Senior Director InformaAon Security, FINRA Sivakanth Mundru Product Manager,
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
NORTH EAST Regional Road Safety Resource
NORTH EAST Regional Road Safety Resource Project Report: 1. Regional Overview of Pedal Cycle Accidents 2005 2007. Produced May 2008. Natalie Goodman Project is supported by the Department of Transport.
Secure Cloud-Ready Data Centers Juniper Networks
Secure Cloud-Ready Data Centers Juniper Networks JUNIPER SECURITY LEADERSHIP A $1B BUSINESS Market Leadership Data Center with High- End Firewall #1 at 42% Secure Mobility with SSL VPN #1 at 25% Security
Adding Value to Automated Web Scans. Burp Suite and Beyond
Adding Value to Automated Web Scans Burp Suite and Beyond Automated Scanning vs Manual Tes;ng Manual Tes;ng Tools/Suites At MSU - QualysGuard WAS & Burp Suite Automated Scanning - iden;fy acack surface
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Data Management in the Cloud: Limitations and Opportunities. Annies Ductan
Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management
Design and Evalua.on of a Real- Time URL Spam Filtering Service
Design and Evalua.on of a Real- Time URL Spam Filtering Service Kurt Thomas, Chris Grier, Jus.n Ma, Vern Paxson, Dawn Song University of California, Berkeley Interna.onal Computer Science Ins.tute Mo.va.on
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
2016 Examina on dates
Please note the following informa on: The following exams are available throughout the year: Please click on the exam for which you wish to see the dates. When you have finished, you can select to return
