The Importance of. Reputation. Proactive enterprise security involves turning data into actionable information that s where reputation comes in.
|
|
|
- Gervase Moody
- 10 years ago
- Views:
Transcription
1 The Importance of Reputation Proactive enterprise security involves turning data into actionable information that s where reputation comes in. 1 Information Security Media Group 2013
2 THE IMPORTANCE OF REPUTATION Proactive enterprise security involves turning data into actionable information that s where reputation comes in. In the past, security meant tall, strong walls as in forts, citadels, castles, etc. (think Great Wall of China). Eventually, warring parties figured ways around those vertically oriented defenses. The same dynamic is at play today in the electronic realm. In the hyper-dynamic environment of the Internet, the fortress mentality of IT security is a throwback. With evolving online models such as mobile computing and the cloud, and sophisticated malware such as botnets and advanced persistent threats, an information security defense strategy oriented around securing an enterprise s perimeter is misguided and inadequate. What is needed is a way to leverage IT s most valuable asset: data. As is true in every area of IT, security technology generates a plethora of data which can be something of a mixed blessing. What companies are wrestling with is the fact that security has a lot of data associated with it, says industry analyst Steve Hunt, author of the Security Dreamer blog. But only when that data is organized, contextualized, does it become security information, he adds. Turning security data into actionable information is key. In the context of today s constantly shifting security environment, adequate defense demands not only reactive data collected from internal networks, but active, up-to-the-minute reputation data reconnoitered from the wilds of the Internet, combined in the most effective manner to generate meaningful recommendations and remediations. Such reputation data can make the difference between passive resistance and proactive security. The Threat Landscape It is important to understand the hothouse environment that surrounds IT security these days. Public outrage over increasing reports of data compromises, along with political reaction in the form of widespread public disclosure laws, has made finding breaches and minimizing data loss a corporate priority. Malicious motivations have changed over the years, as have their means to an end. Sophisticated criminal gangs, along with spies sponsored by nation-states and agenda-oriented hacktivists, have replaced teenage tinkerers as the most menacing digital marauders. Alongside brute-force virus attacks have come stealth tactics that emphasize the long, slow, multi-stage exfiltration of data and resources, such as the widespread surreptitious implementation of robot networks and the personalized targeted incursions known as spear phishing. It is also important to understand where security threats come from. While much handwringing goes on over the threat represented by internal 2 Information Security Media Group 2013
3 Given the stealth nature of many of these outsider attacks, it is not surprising that many organizations have security problems and do not know it. In a recent analysis of security trends, Forrester Research called out this blindness to vulnerability as a major concern: Most organizations don t have the visibility or awareness to know if their networks are breached. 3 Security = Data personnel, the fact is that most security breaches come from the outside. More than three quarters (86%) of the breaches examined by Verizon security researchers for the company s most recent data-breach report had no internal element. 1 Given the stealth nature of many of these outsider attacks, it is not surprising that many organizations have security problems and do not know it. Two-thirds of the breaches examined by Verizon s researchers took months, even years, to discover. 2 Information security has always been about data. Intrusion detection systems were intended to monitor networks and detect and report anomalies, while intrusion prevention systems checked for malware against lists of known signatures. Unfortunately, early versions of both tended to suffer from a surfeit of data, frustrating effective remediation with an overload of false positives. With its sensors and dashboards, data collection and interpretation is the point of security 3 Information Security Media Group 2013
4 Up-to-date reputation data can serve as a watchlist for organizations to guard their own Internet status and reputations. information and event management technology (SIEM). SIEM found its foothold in the enterprise as a tool to document compliance with industry and governmental regulations. Still, the ability to collect and correlate massive amounts of data and make recommendations based on defined rules has made SIEM an important security tool for mid-size and large organizations. As the malware landscape evolved, signature data became an important element in the fight against the rising tide of malicious code. Viruses, worms and Trojan horses were captured and catalogued, their identifiable characteristics added into the lists used by anti-virus applications. Also, software vendors tracked vulnerabilities inadvertently incorporated into their applications and systems and began publishing regular patches to address those potential problems. In the online world, just as important as the what of malicious code is the where, who and how. Toward that end, some third-party organizations took it upon themselves to monitor the Internet for emerging threat areas. For instance, the SANS Institute, a computer security-training firm, provides an online public service known as the Internet Storm Center, which collates data on infrastructure events from sensors covering over 500,000 IP addresses in more than 50 countries, and adds analysis in the form of a daily blog. 4 It is a valuable public resource for monitoring and evaluating emerging Internet attack trends. The Necessary Element Security technology providers have realized the significance of such online reputation services to their customers overall defense postures and to the effectiveness of their products. Being able to provide data about the most recent Internet threat areas means customers can use networkmonitoring technology to detect even extremely subtle intrusions. Perhaps more importantly, users can check outgoing network traffic for communication with known bad actors, such as botnet command-and-control servers, to spot security threats already implanted within the enterprise. Being made aware of just how riddled with vulnerabilities your network is can be traumatic, says George Daglas, chief operations officer of Obrela Security Industries, a managed security services provider. One customer compared it to, Daglas says, living in a dark room, and suddenly someone turned on the lights, and all around us were dragons and snakes (see sidebar Case Study: Obrela Security Industries, pg. 7). Up-to-date reputation data can serve as a watchlist for organizations to guard their own Internet status and reputations whether your Web assets (and those of customers and partners) are harboring malignant entities. This is a more efficient and effective (and less embarrassing) way to uncover internal security vulnerabilities than by being 4 Information Security Media Group 2013
5 made aware by some third-party source, which is how most organizations find out. According to the Verizon report, 69% of the breaches they studied were spotted by external parties 9% by customers. 5 Reputation data has a performance aspect to it as well. By helping to block unknown and unwanted communication from inside the organization to outside sources, reputation data can help increase network performance for mission-critical applications. Benefiting From Benchmarks It is worth noting that not all reputation security services are created equal. Some security technology providers rely on reputation research from publicly available sources, such as SANS, as well as that from major vendors, versus expending the resources to generate research of their own. Not that public data has no value, but it does not necessarily furnish security technology providers or their potential customers with a competitive advantage. That is why it is important that organizations look closely at where reputation data comes from and how the security technology provider makes use of that data. One of the criteria for evaluating a security vendor is to look at their threat intelligence research organization what their linkage is to services and products, says security analyst Chris Christiansen, program vice president for IDC s Security Products and Services group. 5 Information Security Media Group 2013
6 When evaluating a security technology provider, especially in terms of threat research and reputation service, potential customers should pay close attention to these benchmarks: The extent and currency of the reputation data how much, from where, and how often is it updated? Commitment is the key to currency, and currency is the key to actionable reputation data. A viable scoring mechanism for reputation data. Practical scoring provides potential customers with the ability to determine the granular level at which they want to filter potential threats. The integration of reputation data with existing technology. Reputation data can be a very powerful add-on to an IPS, ensuring filters are kept valid and purposeful. Similarly, reputation data can be used in connection with a SIEM system to bolster the effectiveness of the correlation engine and policy-based recommendations. Extensive, proactive research regarding reputation data as well as tight integration with existing products will not happen by accident. It must be a part of a provider s dynamic effort to keep security technology and services as close to the cutting-edge as possible. Potential customers will benefit from close scrutiny of such practices before committing. A Proactive Strategy If there is one thing the last few tumultuous years have taught us, it is that information technology is not static it is a dynamic process that companies must leverage or risk being left behind. In the same way, enterprise security can no longer be a static, defensive stance but must take the form of a dynamic, proactive strategy or organizations continue to risk being victims. Due to its currency and relevance, data is the most dynamic aspect of IT. The catch-phrase big data points to its potential, through analytics and data mining, for providing actionable insights. That same potential applies to security. More data points related to the evolving threat landscape as it mutates and multiplies on the Internet can mean more effective security technology better adapted to address current and future security vulnerabilities. But such reputation data is only as effective as it is made to be. Potential customers must examine closely how such data is employed by security service providers where it comes from, how current it is, and how it is leveraged in existing technology. When used correctly, reputation data, and the services and technologies related to it, represent the next most effective weapon in the war on information security. Footnotes 1. Verizon 2013 Data Breach Investigations Report 2. Ibid. (62% of breaches took months to discover; 4% took years) 3. Forrester Research, Inc.: Top 15 Trends S&R Pros Should Watch: Q2 2013; April 9, Verizon 2013 Data Breach Investigations Report 6 Information Security Media Group 2013
7 Case Study: Obrela Security Industries Headquarters: Athens, Greece. Mission: Provide managed services in the areas of risk management and information security for complex enterprise environments. Obrela is a beta class startup, three years into the startup scene and expanding rapidly, says Kimon Skarlatos, chief commercial officer. Customers: Financial services, payment processors, public sector, telecommunications. Problem: Find flexible, extendable, interoperable, scalable, multi-platform, multi-tenant SIEM system with sophisticated correlation engine on which to base growing security-as-a-service business. Solution: HP ArcSight Enterprise Security Manager plus HP RepSM service. Reason for using HP ArcSight: We were looking for something open enough to allow us to build our own content, our own rules, (along with) multiple levels of correlation not be the limiting factor of what we wanted to do, says George Daglas, co-founder and chief operations officer. Reason for using HP RepSM: With RepSM being constantly updated, we are able to correlate normal internal behavior with what is happening on the outside, says Daglas. We have identified threats in financial organizations that had been there for years, that information was being transmitted and collected by malicious third- parties for years we were able to identify this very quickly with the RepSM environment, he says. HP Reputation Services Among the reputation solutions offered by HP: HP DVLabs Research organization focused on vulnerability discovery and analysis Maintains a database of 1-million-plus IPv4 and IPv6 addresses and 1-million-plus DNS names Receives reputation data from three sources: public providers, such as SANS; open source providers, including various malware/phishing/botnet communities; generates own threat data from honeypot network, ThreatlinQ network, and community of TippingPoint customers Aggregates and normalizes these data sources into one coherent database Scores database entries (0 to 100) based on threat potential HP Reputation Digital Vaccine (RepDV) An add-on service to HP s TippingPoint NGIPS (next generation intrusion prevention system) Based on data feeds from HP DVLabs Automatically updates every two hours HP Reputation Security Monitor (RepSM) An add-on service to HP s ArcSight SIEM (security information and event management) Enterprise Security Manager system Based on data feeds from HP DVLabs Automatically updates every six hours HP ArcSight Security Intelligence Platform HP s SIEM (security information and event management) solution, which offers visibility into security and compliancerelated data across the IT infrastructure Enables organizations to identify and respond quickly to security threats, transform Big Data into security intelligence, and automate compliance Collects, stores, and analyzes data from any device, any source, and in any format from 350+ connectors Closely integrated with HP RepSM for a complete view of security-related data 7 Information Security Media Group 2013
8 About ISMG Headquartered in Princeton, New Jersey, Information Security Media Group, Corp. (ISMG) is a media company focusing on Information Technology Risk Management for vertical industries. The company provides news, training, education and other related content for risk management professionals in their respective industries. Contact (800) [email protected] This information is used by ISMG s subscribers in a variety of ways researching for a specific information security compliance issue, learning from their peers in the industry, gaining insights into compliance related regulatory guidance and simply keeping up with the Information Technology Risk Management landscape. 902 Carnegie Center Princeton, NJ Information Security Media Group 2013
Next Generation IPS and Reputation Services
Next Generation IPS and Reputation Services Richard Stiennon Chief Research Analyst IT-Harvest 2011 IT-Harvest 1 IPS and Reputation Services REPUTATION IS REQUIRED FOR EFFECTIVE IPS Reputation has become
Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products
Threat Intelligence: The More You Know the Less Damage They Can Do Charles Kolodgy Research VP, Security Products IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Agenda Evolving Threat Environment
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: ESG data indicates that many enterprise organizations
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Symantec Cyber Security Services: DeepSight Intelligence
Symantec Cyber Security Services: DeepSight Intelligence Actionable intelligence to get ahead of emerging threats Overview: Security Intelligence Companies face a rapidly evolving threat environment with
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Whitepaper. Advanced Threat Hunting with Carbon Black
Advanced Threat Hunting with Carbon Black TABLE OF CONTENTS Overview Threat Hunting Defined Existing Challenges and Solutions Prioritize Endpoint Data Collection Over Detection Leverage Comprehensive Threat
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
The Future of the Advanced SOC
The Future of the Advanced SOC Developing a platform for more effective security management and compliance Steven Van Ormer RSA Technical Security Consultant 1 Agenda Today s Security Landscape and Why
Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊
應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊 HP Enterprise Security 林 傳 凱 (C. K. Lin) Senior Channel PreSales, North Asia HP ArcSight, Enterprise Security 1 Rise Of The Cyber Threat Enterprises and Governments are experiencing
Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks
Business white paper Missioncritical defense Creating a coordinated response to application security attacks Table of contents 3 Your business is under persistent attack 4 Respond to those attacks seamlessly
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Getting Ahead of Advanced Threats
Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil Territory Manager Israel & Greece 1 Threats are Evolving Rapidly Criminals Petty criminal s Unsophisticated Organized
Gaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research
Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research 2 3 6 7 9 9 Issue 1 Welcome From the Gartner Files Definition:
Cyber and Operational Solutions for a Connected Industrial Era
Cyber and Operational Solutions for a Connected Industrial Era OPERATIONAL & SECURITY CHALLENGES IN A HYPER-CONNECTED INDUSTRIAL WORLD In face of increasing operational challenges and cyber threats, and
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
Security Operations Metrics Definitions for Management and Operations Teams
Whitepaper Security Operations Metrics Definitions for Management and Operations Teams Measuring Performance across Business Imperatives, Operational Goals, Analytical Processes and SIEM Technologies Research
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Overcoming Five Critical Cybersecurity Gaps
Overcoming Five Critical Cybersecurity Gaps How Active Threat Protection Addresses the Problems that Security Technology Doesn t Solve An esentire White Paper Copyright 2015 esentire, Inc. All rights reserved.
Changing the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
Separating Signal from Noise: Taking Threat Intelligence to the Next Level
SESSION ID: SPO2-T09 Separating Signal from Noise: Taking Threat Intelligence to the Next Level Doron Shiloach X-Force Product Manager IBM @doronshiloach Agenda Threat Intelligence Overview Current Challenges
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
The Value of QRadar QFlow and QRadar VFlow for Security Intelligence
BROCHURE The Value of QRadar QFlow and QRadar VFlow for Security Intelligence As the security threats facing organizations have grown exponentially, the need for greater visibility into network activity
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
IBM Advanced Threat Protection Solution
IBM Advanced Threat Protection Solution Fabio Panada IBM Security Tech Sales Leader 1 Advanced Threats is one of today s key mega-trends Advanced Threats Sophisticated, targeted attacks designed to gain
Using LYNXeon with NetFlow to Complete Your Cyber Security Picture
Using LYNXeon with NetFlow to Complete Your Cyber Security Picture 21CT.COM Combine NetFlow traffic with other data sources and see more of your network, over a longer period of time. Introduction Many
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
WHITE PAPER: THREAT INTELLIGENCE RANKING
WHITE PAPER: THREAT INTELLIGENCE RANKING SEPTEMBER 2015 2 HOW WELL DO YOU KNOW YOUR THREAT DATA? HOW THREAT INTELLIGENCE FEED MODELING CAN SAVE MONEY AND PREVENT BREACHES Who are the bad guys? What makes
Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity
Threat Intelligence for Dummies Karen Scarfone Scarfone Cybersecurity 1 Source Material Threat Intelligence for Dummies ebook Co-authored with Steve Piper of CyberEdge Group Published by Wiley Sponsored
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
Endpoint Threat Detection without the Pain
WHITEPAPER Endpoint Threat Detection without the Pain Contents Motivated Adversaries, Too Many Alerts, Not Enough Actionable Information: Incident Response is Getting Harder... 1 A New Solution, with a
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Speed Up Incident Response with Actionable Forensic Analytics
WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents
The Next Generation Security Operations Center
The Next Generation Security Operations Center Vassil Barsakov Regional Manager, CEE & CIS RSA, the Security Division of EMC 1 Threats are Evolving Rapidly Criminals Petty criminals Unsophisticated Organized
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
Решения HP по информационной безопасности
Решения HP по информационной безопасности Евгений Нечитайло [email protected] Mobile: +380 67 464 0218 Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise
HP ENTERPRISE SECURITY Protecting the Instant-On Enterprise HP SECURITY INTELLIGENCE AND RISK MANAGEMENT PLATFORM Advanced Protection Against Advanced Threats 360 Security Monitoring to Detect Incidents
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking
Sikkerhet Network Protector SDN app Geir Åge Leirvik HP Networking Agenda BYOD challenges A solution for BYOD Network Protector SDN matched with industry leading service How it works In summary BYOD challenges
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
IBM Security QRadar QFlow Collector appliances for security intelligence
IBM Software January 2013 IBM Security QRadar QFlow Collector appliances for security intelligence Advanced solutions for the analysis of network flow data 2 IBM Security QRadar QFlow Collector appliances
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
www.obrela.com Swordfish
Swordfish Web Application Firewall Web Application Security as a Service Swordfish Web Application Security provides an innovative model to help businesses protect their brand and online information, incorporating
Open Source Software for Cyber Operations:
W H I T E P A P E R Open Source Software for Cyber Operations: Delivering Network Security, Flexibility and Interoperability Introduction For the last decade, the use of open source software (OSS) in corporate
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
SPEAR PHISHING AN ENTRY POINT FOR APTS
SPEAR PHISHING AN ENTRY POINT FOR APTS threattracksecurity.com 2015 ThreatTrack, Inc. All rights reserved worldwide. INTRODUCTION A number of industry and vendor studies support the fact that spear phishing
Requirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR
Achieving Actionable Situational Awareness... McAfee ESM Ad Quist, Sales Engineer NEEUR The Old SECURITY Model Is BROKEN 2 Advanced Targeted Attacks The Reality ADVANCED TARGETED ATTACKS COMPROMISE TO
Things To Do After You ve Been Hacked
Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise
Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications
Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
RETHINKING CYBER SECURITY
RETHINKING CYBER SECURITY Introduction Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time, the traditional cyber security vendor
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
The Evolution of Application Monitoring
The Evolution of Application Monitoring Narayan Makaram, CISSP, Director, Solutions Marketing, HP Enterprise Security Business Unit, May 18 th, 2012 Rise of the cyber threat Enterprises and Governments
Cisco Advanced Malware Protection for Endpoints
Data Sheet Cisco Advanced Malware Protection for Endpoints Product Overview With today s sophisticated malware, you have to protect endpoints before, during, and after attacks. Cisco Advanced Malware Protection
HP ESP 2013 Solution Roadmap
HP ESP 2013 Solution Roadmap C. K. Lin ( 林 傳 凱 ) Senior Channel Solution Manager, North Asia [email protected] March 8, 2013 資 安 要 聞 議 程 HP ESP 簡 介 HP ESP 解 決 方 案 HP ESP 2013 Solution Roadmap Q&A HP ESP 簡
A New Perspective on Protecting Critical Networks from Attack:
Whitepaper A New Perspective on Protecting Critical Networks from Attack: Why the DoD Uses Advanced Network-traffic Analytics to Secure its Network 2014: A Year of Mega Breaches A Ponemon Study published
