The Art of Layered Security - Data Protection in a Threatscape of Modern Malware
|
|
|
- Ralph Gallagher
- 10 years ago
- Views:
Transcription
1 - Data Protection in a Threatscape of Modern Malware A New Net Technologies Whitepaper Mark Kedgley CTO - New Net Technologies 2012 new net technologies
2 Abstract Trojans were 72 percent of malware detected in H1, 2011, up from 55 percent in H2, 2010 ( reports/apwg_trends_report_ h1_2011.pdf) Threats to theft of Intellectual Property, financial data, Cardholder Data, PII (Personally Identifiable Information) are more diverse and increasingly difficult to defend against. The traditional internet vandalism from viruses is still an issue but the threatscape in 2012 is far more diverse and dangerous than ever before. Not only is it becoming more difficult to protect your confidential data, but more important too. Your enterprise is under attack right now and if a breach is successful, you could lose your Intellectual Property, your sensitive company planning and financial data, your market intelligence and with it, your overall competitive edge could be setback by years. But this could be the best case scenario. If you lose cardholder data or customer personal information, not only would you be left with the costs of financial compensation and system repairs to be paid, but with your brand value and company reputation severely damaged. The 2012 Threatscape - Modern Malware in 2012 Modern Malware - The Headlines Trojans and Viruses - are still in the wild and pose a renewed threat when combined with social engineering techniques for distribution - AV systems will never be 100% effective against even known malware whilst zero day threats i.e. previously unknown malware are never ending Phishing Attacks - bypass firewalls, Intrusion Protection Systems and Anti- Virus by Users unwittingly welcoming in malware Vulnerability Exploits - year after year when the Top Ten of security breaches is published, straightforward Cross-Site Scripting (XSS) and SQL Injection exploits of Web applications are always at or near the top of the list Insider Threats - by definition, bypass even the best firewalls, Intrusion Protection Systems and Anti-Virus defenses. Clearly there is a big advantage of being inside the firewall, but when the attacker has Admin rights to key systems, a different approach to data protection is needed The Advanced Persistent Threat (APT) - the best orchestrated professional attacks play the long game. The classic APT is run as a tactical campaign over a prolonged period of several months as a progressive hack. The APT typically originates with a phishing attack (in the case of the APT, a spear phishing attack, being carefully targeted) or Inside Man to implant spyware, which can then be used as a vector to hack deeper into systems and steal data over a period of months page 1
3 Silver Bullets or Magic Bullets for Security? From January to June 2011, 11,777,775 new malware samples were registered, 13 percent more than the number of samples registered in H2, In other words, every month that goes by sees an increase of zero-day threats over the previous month - how will AV and IPS systems ever keep ahead? The truth is that there is no such thing as the best security defense measure. The range of threats in terms of sophistication and anatomy used in conjunction with dirty tricks and cunning mean that we also need to similarly harness and blend all security measures at our disposal. Essentially the range of measures can be summarized as Firewall and IPS (Intrusion Protection System) use rules and attack-signature recognition to block attacks Anti Virus uses a dictionary of file signatures to block and remove malware Best Practice Security Procedures such as hardening, change control, user account management, patching and physical security DLP (Data Leakage Prevention) works by blocking data export functions such as USB ports, DVD writers and other transfer mechanisms for copying data Encryption and Tokenization render data unusable in different ways - encryption scrambles data to make it unreadable on any device not authorized to use it, while tokenization translates data into a token, with the resulting tokens meaningless unless used in conjunction with the tokenized data store White listing blocks any processes not pre-authorized from running on a system, good for preventing virus and trojan malware SIEM (Security Incident and Event Management) provides analysis and correlation of all system event log activity in order to identify irregular or unusual activity FIM (File Integrity Monitoring) detects any file system activity affecting system/program files, and any configuration changes that may affect security External Threats Figure 1: The Art of Layered Security - security measures need to be varied and layered to provide an effective defense to your organization s confidential data FIR E WALL IDS /IPS HAR DE NING /PATC HING FILE C HANG E /C ONFIG MGMT ANTI-VIRUS/DLP/ENCRYPTION/TOKENIZATION INTE GR ITY & E VE NT LOG MONITOR Protected Data ING NNT protected environment Insider Threats Zero Day Threats page2
4 But OUR security isn t weak? The number one threat to security is complacency...once you come to terms with the reality that your organization is constantly under threat...you are beginning to practise The Art of Layered Security The multi-billion dollar security technology market is always going to be rife with reassuring claims that Appliance X will fully protect you whilst Technology Y has so much intelligence it can spot a piece of malware within a nanosecond of it hitting your network. They all work well and will defend your data 24/7 - apart from the threats they don t cater for. For example, there is a new wave in real-time sandbox technology which exploits the higher power processing appliance platforms now available. The concept is sound - assume that all incoming data is potentially unsafe, and before any of it hits your internal network, intercept and analyze its behavior in a safe sandbox environment. It s the equivalent of taking a biopsy and cultivating a culture to see what pathogens exist - but doing it in milliseconds. The theory is good as a way of detecting zero day malware, but you wouldn t stop using anti-virus technology on servers and desktops, because malware can be introduced via other means, not least because laptops leave the corporate network and the protection of the sandbox technology. And what about new generation malware that is able to evade the sandbox, or that is deliberately introduced by an Inside Man with Administrator privileges to do so? In summary, great idea and great technology implementations are available, but is it the only security measure you ll ever need? Of course not! As we have already highlighted, Inside Man threats exist and any other trusted employee can import malware knowingly (or unknowingly). The Number One Threat to any organization s security? Complacency - but before you go and check whether your AV package can detect this new polymorphous-worm, we are referring to an organizations attitude to security rather than any malware. Before you can take action to defend your organization you first need to come to terms with the inescapable fact that it is under constant and unpredictable threats of attack. There are three key questions to ask yourself on a regular basis - What does each of my security measures provide protection for? Where are the gaps in my security layers? And most crucially if we are to avoid the biggest threat of complacency What are my checks and balances? How do I validate that security measures are effective? To get an honest, self-assessment of your organization s security posture can be difficult as the security threatscape is always changing, so getting accurate answers to the first of these two questions is harder than it seems. If you have a firewall and you have a brand-leader anti-virus package then you have defenses against the large proportion of everyday threats, but as in our opening summary of Modern Malware, these measures alone are only partial defenses, especially when you consider your defenses against Inside Man threats, which may not actually utilize any form of malware. page 3
5 The Number One threat to any organiszation s security? contd. Therefore the best additional security measure you can implement is to be on your guard. This may sound like a government-sponsored anti-terrorism poster slogan, but when we are trying to defend against threats that can come from any direction, and take any form, then we need to know about anything unusual and irregular happening on our systems that may render the system more prone to attack. Being vigilant at all times, not just when an audit is due, is a habit that needs to be adopted. Once you come to terms with the reality that your organization is under threat constantly, both from external and internal attacks, and that your technological protection may not always be effective at preventing these, then you are beginning to practise The Art of Layered Security. The Art of Layered Security With attacks becoming phased and layered in order to evade malware protection measures in a progressive, step by step iterative attack, we need a security strategy that is also layered. The Art of Layered Security means combining different security technologies in order that all possible avenues of attack are blocked or, where prevention is not an option, ensuring that threats are always detected. This approach to security requires technologies to be hedged. The philosophy needed is an assumption that any layer of defense has at least some weaknesses or blindspots. Once weaknesses have been evaluated, other measures can then be selected that will compensate. But this isn t all about buying malware-detection/blocking technology. Bringing us back to the anti-complacency measure, vigilance. Given that we are going to need to be capable of detecting malware and user activities that may be very subtle and trying to avoid detection, we will need to utilize highly sensitive monitoring capabilities. Being highly sensitive will mean lots of false positives, so we will need to deploy the monitoring in a focused manner and make it highly intelligent and automated. Hence the use of the term Art - there is a need to be creative and pragamtic in terms of enforcing security within the context of your organization and its risk of attack. It will also require our regular activities to become more controlled - for instance, if patches are being applied at any time to any server by anyone, then it will be impossible to distinguish between a legitimate maintenance task and a malware infiltration. This is why change management/change control is such a vital part of any security policy. The two key metrics to monitor in order to confirm that change control is being observed are file system/configuration file changes and system access. In a wellmanaged environment with tight change control, there should only be one period of system access and file changes every month during Patch Thursday. At all other times, systems should be isolated and change-free. Therefore we need an additional two key security layers which combine to give all the checks and balances we need at a forensic level, namely File Integrity Monitoring and System Event Log Analysis. page 4
6 File Integrity Monitoring and System Event Log/Audit Trail Analysis These two technologies work together to provide the ultimate forensic-level detail of activities on a server (or laptop, appliance, desktop, firewall etc). File Integrity Monitoring serves to record any changes to the file system i.e. core operating system files or program components, and the systems configuration settings i.e. user accounts, password policy, services, installed software, management and monitoring functions etc. The beauty of FIM as a security measure is two-fold. Firstly, it is utterly comprehensive in detecting any changes to the file system and configuration settings. Secondly, particularly in the case of system or program file changes, it makes no assumptions as to whether the changes are good or bad. This makes it an infallible tool for identifying malware, detecting even the most subtle change to a file (as with a Trojan impersonating a genuine system file, for example). For this reason it brings the need for tight change management procedures to be observed, although of course, change management is a must in order to govern system security anyway. FIM should be used as a means of verifying that only planned and expected changes are made to devices so that any unplanned change is treated as a potential security threat. Contemporary state of the art FIM technology allows for precise focusing on file types and specific paths to monitor so that only changes to files that shouldn t change are detected. For example, image files on a website may change regularly but pose no potential security risk so can be excluded from the FIM policy. Figure 2: FIM (File Integrity Monitoring) works closely in conjunction with Event Log Analysis (SIEM) to provide essential checks and balances that security is being maintained, and that critical procedures such as Change and Configuration Management (CCM) are being operated correctly SIEM ccm FIM Similarly, significant configuration file changes need to be recorded in case the security of the component - server, firewall, router, EPoS device etc - is weakened. Unix and Linux platforms are straightforward in that security settings are governed by text-based configuration files. Similarly firewalls and other network appliances will typically expose their configuration settings via a TFTP export or through interrogation via an SSH session. Windows servers pose more of a problem due to security settings being governed by a range of registry keys, Local Security Policy, file system controls, Installed Programs and updates, service startup and running states and actual processes running on the server. This requires a specialized agent in order to efficiently monitor all these attributes in real-time against a policy. page 5
7 File Integrity Monitoring and System Event Log/Audit Trail Analysis contd. System Event Log or Audit Trail analysis provides a further check and balance to record all user activity within the protected IT estate. Again this is ideally used in conjunction with tight change control procedures so that any access to a device outside of a planned change window should be treated as a potential breach. Gathering a full audit trail of user activity also allows for an after the event W5 (who, what, when, where, and why) forensic reconstruction of user activity. In this way, FIM and Event Log Analysis provide both an advance warning system for any potential security threats, and also a means of deterring Inside Man threats - a System Administrator may well have access rights to some confidential data on the network by virtue of their privileges, but if they know their activities will be detected and recorded then there is no future in data theft. GATHER - 100% OF EVENTS Implement the SIEM system to gather all events centrally PROFILE - 30% OF EVENTS Refine event type identification and tune alert thresholds FOCUS - <1% OF EVENTS Correlate and pattern-match events to ensure only genuine security threats are alerted DECREASING EVENT LOG VOLUMES CAPTURE FILTER INDEX ANALYZE CORRELATE THRESHOLD Figure 3: Event Log Analysis (SIEM) must intelligently correlate events from all servers and network security appliances in order to automatically detect unusual or irregular activity symptomatic of potential security breaches page 6
8 Conclusion - The NNT View Good data protection requires all available security technologies to be deployed in harmony to give you a fighting chance of defending your organizations digital assets. But there will never be any substitute for sound adherence to best practice security measures. Good change control, device hardening, no default user accounts but always named user accounts being used, restricted assignment of privileges to users - the list goes on, but technology can be used to automate the checks and balances required to operate best practice measures. File Integrity Monitoring combined with a Change Management process will make detection of any unusual file system activity straightforward to detect - malware cannot infiltrate a system without touching a server file system. Similarly Event Log analysis can be highly automated to learn what regular system activity looks like and in this way makes identification of unusual or irregular activity easy to identify in order to head off any potential security threat. About NNT NNT Change Tracker and Log Tracker Enterprise - The Art of Layered Security NNT is a global provider of data security and compliance solutions, with a particular emphasis on the PCI DSS. We are firmly focused on helping organizations protect their sensitive data against security threats and network breaches in the most efficient and cost effective manner. Our easy to use security monitoring and change detection software combines Device Hardening, SIEM, CCM and FIM in one integrated solution, making it straightforward and affordable for organizations of any size to ensure their IT systems remain healthy, secure and compliant at all times. NNT will safeguard your systems and data, freeing you to focus on delivering your corporate goals New Net Technologies Audit Configuration Settings - The core function of NNT Change Tracker Enterprise is to first understand how your IT estate is configured Compare Audited Settings Against Policy - Configuration settings are assessed for compliance with any policy or standard relevant to your organization and deviations highlighted Continuously Monitor Configuration Settings - Configuration attributes are then monitored continuously for all changes, both from a compliance standpoint and from a general change management/control standpoint Attributes covered include File Integrity, File Content, Registry Key Settings and Values, Service States, Processes, User Accounts, Installed Programs and Vital Signs Change Management Process Underpinned - Authorized changes which have been approved via the formal change management process are reconciled with the original RFC to ensure the correct changes were implemented accurately The Change Management Safety Net - All unplanned changes are flagged up for review immediately to mitigate security integrity or service delivery performance SIEM Event Log Correlation - Centralize and correlate event logs messages from all windows, unix/linux, firewall and IPS systems UK Office - Spectrum House, Dunstable Road, Redbourn, AL3 7PR Tel: TO REQUEST A FREE TRIAL OR DISCUSS ANY AREA COVERED IN THIS WHITEPAPER, PLEASE CONTACT US AT [email protected] US Office Strand Blvd, Suite 306, Naples Florida Tel: page 7
PCI DSS File Integrity Monitoring
PCI DSS File Integrity Monitoring Explained Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2011 broadband testing and new net technologies www.nntws.com Abstract...anti-virus
Event Log Monitoring and the PCI DSS
Event Log Monitoring and the PCI DSS Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies www.nntws.com Striking a Balance Between
File Integrity Monitoring - The Last line of Defense in the PCI Data Security Standard
File Integrity Monitoring - The Last line of Defense in the PCI Data Security Standard Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net
File Integrity Monitoring - The Last line of Defense in the PCI Data Security Standard
File Integrity Monitoring - The Last line of Defense in the PCI Data Security Standard A New Net Technologies Whitepaper Mark Kedgley CTO - New Net Technologies 2012 new net technologies Which Tier or
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance
Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance Produced on behalf of New Net Technologies by STEVE BROADHEAD BROADBAND TESTING 2010 broadband testing and new net technologies
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks
White Paper Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks A Guide for CIOs, CFOs, and CISOs White Paper Contents The Problem 3 Why You Should Care 4 What You Can Do About It
File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions
File Integrity Monitoring Challenges and Solutions Introduction (TOC page) A key component to any information security program is awareness of data breaches, and yet every day, hackers are using malware
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Security Best Practices and File Integrity Monitoring
Security Best Practices and File Integrity Monitoring A New Net Technologies Whitepaper Mark Kedgley CTO - New Net Technologies 2013 new net technologies www.nntws.com Abstract...the term file integrity
The Hillstone and Trend Micro Joint Solution
The Hillstone and Trend Micro Joint Solution Advanced Threat Defense Platform Overview Hillstone and Trend Micro offer a joint solution the Advanced Threat Defense Platform by integrating the industry
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities
Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities Protecting a business s IT infrastructure is complex. Take, for example, a retailer operating a standard multi-tier infrastructure
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements
How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements I n t r o d u c t i o n The Payment Card Industry Data Security Standard (PCI DSS) was developed in 2004 by the PCI Security Standards
Did you know your security solution can help with PCI compliance too?
Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Cisco IPS Tuning Overview
Cisco IPS Tuning Overview Overview Increasingly sophisticated attacks on business networks can impede business productivity, obstruct access to applications and resources, and significantly disrupt communications.
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker
PCI-DSS and Application Security Achieving PCI DSS Compliance with Seeker www.quotium.com 1/14 Summary Abstract 3 PCI DSS Statistics 4 PCI DSS Application Security 5 How Seeker Helps You Achieve PCI DSS
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Integrated Protection for Systems. João Batista [email protected] Territory Manager
Integrated Protection for Systems João Batista [email protected] Territory Manager 2 McAfee Overview Proven Expertise And what it means to you Proof of Expertise Impact of Expertise 1 17 100 300
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
Information & Asset Protection with SIEM and DLP
Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions What s driving the
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management This guide will show you how a properly implemented and managed SIEM solution can solve
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
MITIGATING LARGE MERCHANT DATA BREACHES
MITIGATING LARGE MERCHANT DATA BREACHES Tia D. Ilori Ed Verdurmen January 2014 1 DISCLAIMER The information or recommendations contained herein are provided "AS IS" and intended for informational purposes
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Advanced Persistent Threats
White Paper INTRODUCTION Although most business leaders and IT managers believe their security technologies adequately defend against low-level threats, instances of (APTs) have increased. APTs, which
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
The Key to Secure Online Financial Transactions
Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on
SORTING OUT YOUR SIEM STRATEGY:
SORTING OUT YOUR SIEM STRATEGY: FIVE-STEP GUIDE TO TO FULL SECURITY INFORMATION VISIBILITY AND CONTROLLED THREAT MANAGEMENT INTRODUCTION It s your business to know what is happening on your network. Visibility
How To Create Situational Awareness
SIEM: The Integralis Difference January, 2013 Avoid the SIEM Pitfalls Get it right the first time Common SIEM challenges Maintaining staffing levels 24/7 Blended skills set, continuous building of rules
What is Penetration Testing?
White Paper What is Penetration Testing? An Introduction for IT Managers What Is Penetration Testing? Penetration testing is the process of identifying security gaps in your IT infrastructure by mimicking
MCTS Guide to Microsoft Windows 7. Chapter 7 Windows 7 Security Features
MCTS Guide to Microsoft Windows 7 Chapter 7 Windows 7 Security Features Objectives Describe Windows 7 Security Improvements Use the local security policy to secure Windows 7 Enable auditing to record security
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6
WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL Ensuring Compliance for PCI DSS 6.5 and 6.6 CONTENTS 04 04 06 08 11 12 13 Overview Payment Card Industry Data Security Standard PCI Compliance for Web Applications
Avoiding the Top 5 Vulnerability Management Mistakes
WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
FERPA: Data & Transport Security Best Practices
FERPA: Data & Transport Security Best Practices April 2013 Mike Tassey Privacy Technical Assistance Center FERPA and Data Security Unlike HIPAA and other similar federal regulations, FERPA does not require
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
Information Security Services. Achieving PCI compliance with Dell SecureWorks security services
Information Security Services Achieving PCI compliance with Dell SecureWorks security services Executive summary In October 2010, the Payment Card Industry (PCI) issued the new Data Security Standard (DSS)
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
Threat Center. Real-time multi-level threat detection, analysis, and automated remediation
Threat Center Real-time multi-level threat detection, analysis, and automated remediation Description Advanced targeted and persistent threats can easily evade standard security, software vulnerabilities
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Nine Steps to Smart Security for Small Businesses
Nine Steps to Smart Security for Small Businesses by David Lacey Co-Founder, Jericho Forum Courtesy of TABLE OF CONTENTS INTRODUCTION... 1 WHY SHOULD I BOTHER?... 1 AREN T FIREWALLS AND ANTI-VIRUS ENOUGH?...
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Preempting
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
AB 1149 Compliance: Data Security Best Practices
AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
Security Analytics The Beginning of the End(Point)
Security Analytics The Beginning of the End(Point) Arie Joosse [email protected] It s 10am, what do you know about your endpoints? What applications are running? New ones that you didn t deploy
IT Security Risks & Trends
IT Security Risks & Trends Key Threats to All Businesses 1 1 What do the following have in common? Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical contractor Health
The Four-Step Guide to Understanding Cyber Risk
Lifecycle Solutions & Services The Four-Step Guide to Understanding Cyber Risk Identifying Cyber Risks and Addressing the Cyber Security Gap TABLE OF CONTENTS Introduction: A Real Danger It is estimated
Modular Network Security. Tyler Carter, McAfee Network Security
Modular Network Security Tyler Carter, McAfee Network Security Surviving Today s IT Challenges DDos BOTS PCI SOX / J-SOX Data Exfiltration Shady RAT Malware Microsoft Patches Web Attacks No Single Solution
Student Tech Security Training. ITS Security Office
Student Tech Security Training ITS Security Office ITS Security Office Total Security is an illusion security will always be slightly broken. Find strategies for living with it. Monitor our Network with
Host/Platform Security. Module 11
Host/Platform Security Module 11 Why is Host/Platform Security Necessary? Firewalls are not enough All access paths to host may not be firewall protected Permitted traffic may be malicious Outbound traffic
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
Protecting personally identifiable information: What data is at risk and what you can do about it
Protecting personally identifiable information: What data is at risk and what you can do about it Virtually every organization acquires, uses and stores personally identifiable information (PII). Most
Simple Steps to Securing Your SSL VPN
Simple Steps to Securing Your SSL VPN A five-point strategy for secure remote access Managing secure remote access is a tough job. Because remote systems may directly connect to the Internet rather than
Things To Do After You ve Been Hacked
Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise
By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION
THE NEXT (FRONT) TIER IN SECURITY When conventional security falls short, breach detection systems and other tier 2 technologies can bolster your network s defenses. By John Pirc THREAT HAS moved beyond
Securing SharePoint 101. Rob Rachwald Imperva
Securing SharePoint 101 Rob Rachwald Imperva Major SharePoint Deployment Types Internal Portal Uses include SharePoint as a file repository Only accessible by internal users Company Intranet External Portal
Compliance Guide: PCI DSS
Compliance Guide: PCI DSS PCI DSS Compliance Compliance mapping using Huntsman INTRODUCTION The Payment Card Industry Data Security Standard (PCI DSS) was developed with industry support by the PCI Security
74% 96 Action Items. Compliance
Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated
3 Email Marketing Security Risks. How to combat the threats to the security of your Email Marketing Database
3 Email Marketing Security Risks How to combat the threats to the security of your Email Marketing Database Email Marketing Guide June 2013 Security Threats PROTECTING YOUR EMAIL DATABASE FROM HACKERS
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
