Den strategiske og operationelle cyber platform. Jesper Zerlang, CEO
|
|
|
- Sybil Dennis
- 10 years ago
- Views:
Transcription
1 Den strategiske og operationelle cyber platform Jesper Zerlang, CEO 1
2 Agenda Introduktion til LogPoint Hvad er SIEM og Logpoint? Den forretningsmæssige værdi af SIEM Implementering af SIEM og den organisatoriske forankring Lessons Learned SIEM fremtiden 2
3 LogPoint History - Scandinavian company nonus customers in Europe employees 35+ in development - Offices in DK, SE, DACH, UK and France - 100% y/y growth LogInspect 2 is launched Founded in Copenhagen, Denmark as ImmuneSecurity 2010 LogPoint 4 No-SQL +50 customers European wide expansion Launch of LogPoint 3 LogPoint V5 Big Data as platform 2012 Venture Capital +100 customers % growth, significant international orders EAL 3 cert. process 2014 France and South EMEA 2016 Global reach Gartner positioning LogPoint 6 Vision: To create the best SIEM platform worldwide
4 Selected References 4
5 Selected References 5
6 Danish software company partners with Boeing Per Beith, Director, Information Security Solutions Network and Space Systems, Boeing, highlights the importance of access to the best of the best within the type of technology ImmuneSecurity [LogPoint red.] delivers even for a company like Boeing. Read more: 6
7 EAL 3 certification LogPoint recently received the EAL3+ certification Common Criteria Co-sponsored by The Boeing Company Enabling implementation Cyber Security units as: NATO Homeland Security organizations Police Military Intelligence Services
8 SIEM and LogPoint What is it really? 8
9
10 Opsamlede logs UDEN LogPoint Opsamlede logs MED LogPoint
11 Security Operations Center View 11
12 Real-tids dashboards og alarmer 12
13 Security Operations Center View 13
14 LogPoint V5 Scaling (1/4) Single Server Installation One LogPoint server can have one or multiple internal Repositories Multiple Server Installation Two or more LogPoint servers can be monitored in the same Dashboard LogPoint can be installed as: VMware or HyperV Appliance, Hardware Appliance, or Software
15 LogPoint V5 Scaling (2/4) Load Balancer Monitoring LogPoint Cluster Using multiple LogPoint Servers makes it possible to build a LogPoint Cluster where logs are sent through an (existing) Load Balancer. The LogPoint Cluster is easy to scale by simply adding LogPoint Server(s) when needed, and supporting Fail Over/High Availiability out of the box.
16 LogPoint V5 Scaling (3/4) Distributed Environment In a distributed environment it is possible to monitor all LogPoint installations via one interface and data can be aggregated and correlated across systems while respecting user rights.
17 LogPoint V5 Scaling (4/4) Firewall Multi Tenancy Environment Multi tenancy: Log can be collected by LogPoint collectors collectors normalize the logs before being forwarded to the central LogPoint server(s). On the central server(s) user rights can be related to the collector.
18 Den forretningsmæssige værdi af SIEM 18
19 Why SIEM and LogPoint? (1/3) Today, the majority of our communication takes place digitally travelling through various networks, and across enterprises, organisations, nations and continents. This very communication is now susceptible to crime, espionage and terrorism. Cyber security is now an essential part of our lives and business operations. So while digital communication has become our global lifeline, breakdowns and intrusions in our networks are bringing global threats to our economy and society. 19
20 Why SIEM and LogPoint (2/3) With racing volumes of increasingly complex data coursing through our networks, effectively monitoring such digital crimes seems an impossible task. At the same time, we all have a fundamental need for privacy. No one likes the idea that someone else may be watching our information. But our digital communication leaves a log a trail of critical information about time, place and routes. LogPoint monitors the behavior of this log traffic without invading privacy. 20
21 Why SIEM and LogPoint (3/3) LogPoint is a tool that collects and organises logs from activities anywhere on our networks, from applications to computers to servers to switches, routers and mobile devices. LogPoint makes log analysis and information assessment an easy, swift process to help you track and reveal security breaches in your network in real time. LogPoint constantly monitors your network's overall condition, identifying traffic bottlenecks and detecting attempts of intrusion so you can take prompt action to prevent future disruption and protect your assets. 21
22 Market Analytics Market size/year: Licenses: USD 1,6 billion Services: USD 1,2 billion EU = 30% Bottom Line: Enterprise architects have to plan for IT deployments of ever-increasing complexity and deal with increasing threats and risks. These and other trends create the need to expand security visibility throughout the entire stack of IT tools and technologies. Security information and event management (SIEM) is a pivotal technology that currently provides security visibility, and it is likely to hold the same role for the next two to three years. SIEM faces opportunities for growth in five core areas: new types of log and context data, shared intelligence, novel analytic algorithms, monitoring of emerging environments, and application security monitoring. Gartner Report (SIEM Futures) 22
23 Tool or Business Critical Application? What many enterprises think when they hear about LogPoint: We already have sufficient control of our logs! We don t want another monitoring tool! No demand from the business units consequently: nice-to-have! BUT An Enterprise without SIEM = A community without law enforcement! SIEM protects business assets SIEM creates overview SIEM discovers abnomal behaviours SIEM is the Enterprise Business Intelligence platform for IT Security at the same level as e.g. SAP og SalesForce etc 23
24 Data deles - forudsætningen for digitalisering lykkes Sundhedssektoren Regioner Læger Sygeplejesker SOSU Kommuner Hjemmehjælpere Sygeplejesker Læger / Behandlere i bredere forstand Legitimt at kunne lave opslag Begrænsning af legitim adgang har uacceptable konsekvenser
25 IT-Drift eller helpdesk? Administratorer Kan ikke installere et program der kigger efter specifikke brugere Ingen change-request Ingen kobling mellem arbejds-kontekst og adfærd Automatiseret opslag Mistænkelige frekvenser Mistænkelige tidspunkter Opslag på VIP-brugere Support-brugere Snagen i data identificeres Har kunden været i røret? Er der en sag på kunden? Eller blev den lavet bagefter? Kundens file har ingen normal aktivitet Mistænkelig frekvens Mistænkeligt mønster i valg af kunde-opslag VIP opslag 25
26 Log Management / SIEM Key Benefits 26
27 LogPoint Key Benefits Compliance Log data is consolidated, secure, and tamper proof => log data is always available and in a trusted format Rigorous and strict processes for ALL log data from all systems No retention of log data in a distributed and non-controlled environment where logs can be tampered with Compliance reports for all standards (PCI, ISO...) => automatizing procedures is cost saving Audit trails => lower costs for audits due to prefab reports Documentation of user behavior => can be used internally and in trials Monitoring all changes on the infrastructure Persondata forordning fra EU /2016 og frem! 27
28 LogPoint Key Benefits Business Intelligence for IT-operations Capacity analysis => optimized use of the already existing it platform Monitoring of services => better performance and lower down time Fewer incidents over time => more stabile environment Faster and more precise forensics and analysis of data => better customer service and lower down time, and less time spent on troubleshooting Finding and monitoring bottlenecks => higher performance and lower down time Automation of processes (reports, operational procedures, correlation, etc.) Monitoring of access to all data and services Monitoring hacker attacks Monitoring APTs, Malware, DDOS, Phishing Monitoring all changes on the infrastructure Monitoring of Service Level Agreement 28
29 LogPoint Benefits IT Security Proactive it-security Documentation of user behavior => can be used internally and in trials Unified (security) controls and processes for old and new systems, databases, applications, etc. Log data is consolidated, secure, and tamper proof => log data is always available and in a trusted format Rigorous and strict processes for ALL log data from all systems Protection of IP (Intellectual Property) Audit trails => lower costs for audits due to prefab reports Higher security level => protection of sensitive data (customers and employees) Monitoring of privilege users => securing of employees Detection of anomaly user and system behavior => higher level of security 29
30 LogPoint Key Benefits Cost Drivers Consolidation of different tools for firewall log management, local log management, and many other silo management systems Automation of processes (reports, operational procedures, correlation, etc.) Audit trails => lower costs for audits due to prefab reports Fewer incidents over time => more stabile environment Faster and more precise forensics and analysis of data => better customer service and lower down time, and less time spent on troubleshooting 30
31 LogPoint Deployment Implementering af SIEM og den organisatoriske forankring 31
32 Deployment Process BLUEPRINT AND LOGPOINT INSTALLATION STEP 1 LOGPOINT IMPLEMENTATION OF CRITICAL SYSTEMS IMPLEMENTATION OF REMAINING SYSTEMS AND REPORTING / CUSTOMIZATION PHASE BUSINESS-SPECIFIC VEJDIREKTORATET USE- CASE DEVELOPMENT AND ORGANIZATIONAL INTEGRATION STEP STEP 2 STEP 3 4 Collection of documentation on the infrastructure Development of project plan for STEP 2 Interview with key IT stakeholders Quick-wins workshop Hardware installation LogPoint installation Development of collectiondocumentation Implementation of critical Client system First reporting / SIEM workshop with focus on compliance and security operations: GPG13 Other compliance domains Continued installation of systems Step wise installation of custom applications Development and integration of LogPoint in terms of business processes Second workshop on Integration, Reporting Business apps. Continued installation of systems Continued installation of custom applications Third workshop: Training Sign-off Adjustments Option Business-process integration Feature-request workshop AS-IS Blueprint Plan for Step2 LogPoint Installation document Documentation: Surrey County Solution Reporting Components Plan for Step3 Reporting and compliance templates Integration documentation: Custom apps BP-integration Cust. Reporting Plan for Step 4 Reporting template Finalized report Next-step- Guidelines Documentation Project finalization document Value-creation Thorough logical documentation of the network. Stakeholder views captured First Quarter Deep system-knowledge Guidelines for implementation Quantified compliancerequirements. Integration of SIEM in the organization. Business-process integration Second Quarter Knowledge hand-over to the Client LogPoint tuned to fit the Client s needs
33 LOGPOINT / partner CUSTOMER Deployment Process LogPoint recommends a process where the client contributes with essential knowledge and sparring, as well as actively participates in the development. LogPoint can manage the project management activities and the process management and has the responsibility of the development of documentation. THE ROLES IN THE COLLABORATION BETWEEN LOGPOINT AND THE CLIENT 1 STEP 2 STEP 3 STEP 4 STEP Participate in workshop: 3 hours per participant Technical resources during installation: 2-3 weeks Technical resources during installation: 2-3 weeks Continued participation in installation. Interview: 1 hour per participant Providing documentation Participating in workshops: 5 hours per participant Reporting review: 2 hours per participant Participating in workshops: 5 hours per participant Documentation review: 2 hours per participant Training: 2 days per participant (superuser) Training: 1 day per participant (user) SAMARBEJDE COLLABORATION Facilitate workshop Review documentation Conduct Interview LogPoint installation Develop plan for STEP 2 Facilitates meetings Responsible for LogPoint installation Compliance and Security-Operations documentation development Develop plan for STEP3 Facilitates meetings Responsible for system-integration Development of reporting templates Develop plan for STEP4 Facilitates meetings Development of final documentation Project hand-over Optional business process integration Optional featurerequest workshop ~4 weeks ~6 weeks ~5 weeks ~4 weeks
34 LogPoint Lessons Learned 34
35 Lessons Learned Planlæg Planlæg Planlæg 35
36 Lessons Learned Ekstern konsulent Where to Start? Kompleksitet Where not to Start Forretningsværdi Ressourcer Tid 36
37 Lessons Learned EASY WINS Active Directory/LDAP DNS/DHCP Firewalls IDS/IPS AntiVirus Use Cases Admin Behavior User Behavior Configuration Changes System Communication Performance tracking and alerting Service Level monitoring internally and externally Malware Detection Simple Analytics Simple Incident Handling 37
38 Lessons Learned WINS Network and General Infrastructure VM ware Standard Applications Databases Use Cases Network Communication User tracking in applications Business Intelligence for IToperation Advanced Security Analytics Operational Analytics Online Transaction Analytics Support and Helpdesk Incident Handling 38
39 Lessons Learned HARD WINS Home grown systems Complex Applications Transactions ICS (SCADA) RFID data GPS data Uses Cases Abnormal traffic/comm. Complex correlations between systems Complex Incident Handling including SOC/SAC approach 39
40 LogPoint our Vision To have the worlds best SIEM solution To have a 15% market share in Europe (=50M$) To have the most innovate working environment To attract the most skilled people in the industry To have the best management team in the industry.and to have a fun and a profitable journey! 40
41 Thank you
42 SAP Application Security - as an example
43 The forgotten world: Corporate Business Application Systems Security Monitoring / Tactical View Security Silos: Applications have versatile security models, interfaces, formats Network Exposure: Applications and threats pass network barriers Manual Handling: Audits are snapshots and expensive as they are done manually LogPoint After-The-Fact: Only real-time monitoring and alerting allows counter-actions Multiple ID s: Administrators, technical users, account sharing, Incomplete, undetected: SAP / Transactional data It s the blind spot of IT-Security
44 SAP stores the most critical business info. and you are loosing control. SECURTY patches Program vulnerabilities The number of SAP Security Notes has increased drastically over the last 3 years. Most of these issues affect the B business runtime. Architecture flaws Configuration errors 44
45 Why are Business Applications in Focus of Attacks? Why ERP? Espionage. Sabotage. Fraud. All business processes are generally contained in ERP systems. Any information an attacker want is stored in a company s ERP. The most critical data to be targeted in ERP are: Financial Data, Financial Planning (FI) HR data, personal, contact details (HR) Corporate Secrets (PLM) Supplier tenders (SRM) Customer Lists (CRM) SCADA and ERP systems are often connected. And prone to sabotage. Software has vulnerabilities. ERP has more issues; being different: Customization No two SAP systems are the same. Complexity kills security. - ERP systems are huge complex landscapes that contain different DBs, APP servers, middleware, frontend SW, OS, use many technologies. Risky ERP systems store and process business-critical data. Any downtime incurs significant costs. Patching is risky. Vulnerable SW lives for years. Unknown ERP systems are less researched, much less scrutinized, less targeted but often contain simple and easy to discover vulnerabilities and now get connected to the Internet. 45
46 Business-driven use-cases Detect invoices without purchase orders Identify vendors where alternate payee names have been changed before payment Multiple use of one-time vendors Detection of payments more than the threshold value to one time vendors Identify transactions where the purchase approver is equal to the goods receipt creator Identify transactions where the order approver is equal to the invoice creator Identify transactions where the order creator is equal to the payment creator Identify purchase orders that were created on or after the date the invoice was issued Invoice receipt is more than goods receipt document Detect value increases for purchases orders over a certain threshold Check for bank accounts bookings not processed with one of the known transactions Check suspicious manual bookings at unusual times Detect split invoices to avoid increasing certain threshold 46
47 Technically-driven use-cases Standard User Accounts (status and usage) Account status (locked, initial passwords) Standard user activity Data integrity/non-changeability (Debugging) Debugging activity per system System enablement and authorizations OS Command (execution and authorizations) Changes to critical data SAL is not enough (SAL does not provide sufficient information) SAL transaction monitoring Administrator priviledge use High priviledged accounts, special accounts (e.g. Firefighter usage) Changes to user master records by SAP*, DDIC* 47
48 Technically-driven use-cases II Change documents User Master Records Authorization Assignment (Roles, Profiles) Other changes to user master records (validity, password reset, ) Remote system access (e.g. SOAP service active) Access Control Violations (100% DSAG compliance) Active user accounts vs. Corporate Directory Failed Logins Check Transport Imports Especially Transport of authorizations and access rights Especially Transport of authorization assignments Check transports at unusual time window Scan objects by given list and check target client
49 LogPoint in the GRC Landscape Check for critical authorizations Assign illegitimate authorizations Use of critical authorizations Realtime- Landscape Realtime- Landscape Realtime- Landscape LogPoint agilesi Snapshot Landscape On-Demand Landscape fire fighter -only monitoring SAP GRC Snapshop Single Systems N/A N/A Manual Audit A
50 Visit and Download 50
Security Information & Event Management (SIEM) Sri Carlyle Country Manager
Security Information & Event Management (SIEM) Sri Carlyle Country Manager LogPoint Introduction Founded i 2001, Copenhagen, Denmark 100 % Danish ownership Yearly growth: 100 percent 70 employees: 20 Sales/admin
Ecom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled.
LogPoint 5.1 Product Features Robust. Dynamic. Unparalleled. LOGPOINT Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics,
Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security
Andreas Mertz (Founder/Man. Dir. it-cube SYSTEMS, CISSP) 360 SAP Security Agenda Motivation SAP Threat Vectors / SAP Hack Solution Approach the 360 of agilesi Threat Detection Secenarios / SIEM use cases
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
LogInspect 5 Product Features Robust. Dynamic. Unparalleled.
LogInspect 5 Product Features Robust. Dynamic. Unparalleled. Enjoy ultra fast search capabilities in simple and complex modes optimized for Big Data Easily filter and display relevant topics, eg: Top 10
High End Information Security Services
High End Information Security Services Welcome Trion Logics Security Solutions was established after understanding the market's need for a high end - End to end security integration and consulting company.
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
Is your SIEM ready.???
New security threats: Is your SIEM ready.??? May 2011 Security is more than just compliance Compliance Measure of processes and procedures Conformity with policy and directive Reporting against rules Security
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Protect the data that drives our customers business. Data Security. Imperva s mission is simple:
The Imperva Story Who We Are Imperva is the global leader in data security. Thousands of the world s leading businesses, government organizations, and service providers rely on Imperva solutions to prevent
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security
Breach Findings for Large Merchants 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security Disclaimer The information or recommendations contained herein are
The webinar will begin shortly
The webinar will begin shortly An Introduction to Security Intelligence Presented by IBM Security Chris Ross Senior Security Specialist, IBM Security Agenda The Security Landscape An Introduction to Security
Securing and protecting the organization s most sensitive data
Securing and protecting the organization s most sensitive data A comprehensive solution using IBM InfoSphere Guardium Data Activity Monitoring and InfoSphere Guardium Data Encryption to provide layered
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Security Information & Event Management (SIEM)
Security Information & Event Management (SIEM) Peter Helms, Senior Sales Engineer, CISA, CISSP September 6, 2012 1 McAfee Security Connected 2 September 6, 2012 Enterprise Security How? CAN? 3 Getting
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
FISMA / NIST 800-53 REVISION 3 COMPLIANCE
Mandated by the Federal Information Security Management Act (FISMA) of 2002, the National Institute of Standards and Technology (NIST) created special publication 800-53 to provide guidelines on security
ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014
Solution Brief EventTracker Enterprise v7.x Publication Date: July 22, 2014 EventTracker 8815 Centre Park Drive, Columbia MD 21045 About EventTracker EventTracker delivers business critical solutions that
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management
Prevent cyber attacks. SEE what you are missing. See Your Network MAPS. Prevent cyber attacks. [RedSeal] is meeting our expectations and is playing an integral role as it feeds right into our overall risk
What is Security Intelligence?
2 What is Security Intelligence? Security Intelligence --noun 1. the real-time collection, normalization, and analytics of the data generated by users, applications and infrastructure that impacts the
The Power of Risk, Compliance & Security Management in SAP S/4HANA
The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution
Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow
Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned
Q1 Labs Corporate Overview
Q1 Labs Corporate Overview The Security Intelligence Leader Who we are: Innovative Security Intelligence software company One of the largest and most successful SIEM vendors Leader in Gartner 2011, 2010,
Microsoft Technologies
NETWORK ENGINEERING TRACK Microsoft Technologies QUARTER 1 DESKTOP APPLICATIONS - ESSENTIALS Module 1 - Office Applications This subject enables users to acquire the necessary knowledge and skills to use
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
How To Buy Nitro Security
McAfee Acquires NitroSecurity McAfee announced that it has closed the acquisition of privately owned NitroSecurity. 1. Who is NitroSecurity? What do they do? NitroSecurity develops high-performance security
When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs
White Paper Meeting PCI Data Security Standards with Juniper Networks SECURE ANALYTICS When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs Copyright 2013, Juniper Networks,
Netzwerkvirtualisierung? Aber mit Sicherheit!
Netzwerkvirtualisierung? Aber mit Sicherheit! Markus Schönberger Advisory Technology Consultant Trend Micro Stephan Bohnengel Sr. Network Virtualization SE VMware Agenda Background and Basic Introduction
Critical Controls for Cyber Security. www.infogistic.com
Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability
Detecting Anomalous Behavior with the Business Data Lake. Reference Architecture and Enterprise Approaches.
Detecting Anomalous Behavior with the Business Data Lake Reference Architecture and Enterprise Approaches. 2 Detecting Anomalous Behavior with the Business Data Lake Pivotal the way we see it Reference
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
Compliance Guide: PCI DSS
Compliance Guide: PCI DSS PCI DSS Compliance Compliance mapping using Huntsman INTRODUCTION The Payment Card Industry Data Security Standard (PCI DSS) was developed with industry support by the PCI Security
Take Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
SORTING OUT YOUR SIEM STRATEGY:
SORTING OUT YOUR SIEM STRATEGY: FIVE-STEP GUIDE TO TO FULL SECURITY INFORMATION VISIBILITY AND CONTROLLED THREAT MANAGEMENT INTRODUCTION It s your business to know what is happening on your network. Visibility
Copyright 11/1/2010 BMC Software, Inc 1
Copyright 11/1/2010 BMC Software, Inc 1 Copyright 11/1/2010 BMC Software, Inc 2 Copyright 11/1/2010 BMC Software, Inc 3 The current state of IT Service How we work today! INCIDENT SERVICE LEVEL DATA SERVICE
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Lot 1 Service Specification MANAGED SECURITY SERVICES
Lot 1 Service Specification MANAGED SECURITY SERVICES Fujitsu Services Limited, 2013 OVERVIEW OF FUJITSU MANAGED SECURITY SERVICES Fujitsu delivers a comprehensive range of information security services
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
CLOUD SECURITY: THE GRAND CHALLENGE
Government Ware: GovWare Singapore September 29, 2010 CLOUD SECURITY: THE GRAND CHALLENGE Glen Gooding Asia Pacific Security Leader IBM Corporation [email protected] Rest safe: Google saves the day
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM
Kevin Hayes, CISSP, CISM MULTIPLY SECURITY EFFECTIVENESS WITH SIEM TODAY S AGENDA Describe the need for SIEM Explore different options available for SIEM Demonstrate a few Use Cases Cover some caveats
Metrics that Matter Security Risk Analytics
Metrics that Matter Security Risk Analytics Rich Skinner, CISSP Director Security Risk Analytics & Big Data Brinqa [email protected] April 1 st, 2014. Agenda Challenges in Enterprise Security, Risk
Compliance Management, made easy
Compliance Management, made easy LOGPOINT SECURING BUSINESS ASSETS SECURING BUSINESS ASSETS LogPoint 5.1: Protecting your data, intellectual property and your company Log and Compliance Management in one
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Clavister InSight TM. Protecting Values
Clavister InSight TM Clavister SSP Security Services Platform firewall VPN termination intrusion prevention anti-virus anti-spam content filtering traffic shaping authentication Protecting Values & Enterprise-wide
Speed Up Incident Response with Actionable Forensic Analytics
WHITEPAPER DATA SHEET Speed Up Incident Response with Actionable Forensic Analytics Close the Gap between Threat Detection and Effective Response with Continuous Monitoring January 15, 2015 Table of Contents
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF
Splunk Enterprise Log Management Role Supporting the ISO 27002 Framework EXECUTIVE BRIEF Businesses around the world have adopted the information security standard ISO 27002 as part of their overall risk
SIEM is only as good as the data it consumes
SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management
Sorting out SIEM strategy Five step guide to full security information visibility and controlled threat management This guide will show you how a properly implemented and managed SIEM solution can solve
An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011
An Introduction to SIEM & RSA envision (Security Information and Event Management) January, 2011 Brian McLean, CISSP Sr Technology Consultant, RSA Changing Threats and More Demanding Regulations External
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
integrating cutting-edge security technologies the case for SIEM & PAM
integrating cutting-edge security technologies the case for SIEM & PAM Introduction A changing threat landscape The majority of organizations have basic security practices in place, such as firewalls,
Security Analytics The Beginning of the End(Point)
Security Analytics The Beginning of the End(Point) Arie Joosse [email protected] It s 10am, what do you know about your endpoints? What applications are running? New ones that you didn t deploy
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
Analyzing HTTP/HTTPS Traffic Logs
Advanced Threat Protection Automatic Traffic Log Analysis APTs, advanced malware and zero-day attacks are designed to evade conventional perimeter security defenses. Today, there is wide agreement that
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
Securing your IT infrastructure with SOC/NOC collaboration
Technical white paper Securing your IT infrastructure with SOC/NOC collaboration Universal log management for IT operations Table of contents Executive summary 2 IT operations: Handle IT incidents and
IBM Security. 2013 IBM Corporation. 2013 IBM Corporation
IBM Security Security Intelligence What is Security Intelligence? Security Intelligence --noun 1.the real-time collection, normalization and analytics of the data generated by users, applications and infrastructure
agilesi tm Whitepaper September 2012 Version 1.1 SAP Security Monitoring with agilesi Business Whitepaper Securing SAP Landscapes
SAP Security Monitoring with agilesi Business Whitepaper Securing SAP Landscapes How to Protect Exposed Business-Critical Applications? Today SAP business solutions are the first choice for many organizations
A COMPLETE APPROACH TO SECURITY
A COMPLETE APPROACH TO SECURITY HOW TO ACHEIVE AGILE SECURITY OPERATIONS THREAT WATCH Cyber threats cost the UK economy 27 billion a year 200,000 new threats are identified every day 58% of businesses
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
Concierge SIEM Reporting Overview
Concierge SIEM Reporting Overview Table of Contents Introduction... 2 Inventory View... 3 Internal Traffic View (IP Flow Data)... 4 External Traffic View (HTTP, SSL and DNS)... 5 Risk View (IPS Alerts
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
Big Data and Security: At the Edge of Prediction
Big Data and Security: At the Edge of Prediction Mark Seward Splunk Inc. Fred Wilmot Splunk Inc. Session ID: Session Classification: SPO2-T17 Intermediate The Way Cyber Adversaries Think Where is the most
Scalability in Log Management
Whitepaper Scalability in Log Management Research 010-021609-02 ArcSight, Inc. 5 Results Way, Cupertino, CA 95014, USA www.arcsight.com [email protected] Corporate Headquarters: 1-888-415-ARST EMEA Headquarters:
Overcoming PCI Compliance Challenges
Overcoming PCI Compliance Challenges Randy Rosenbaum - Security Services Exec. Alert Logic, CPISM Brian Anderson - Product Manager, Security Services, SunGard AS www.sungardas.com Goal: Understand the
LogRhythm and PCI Compliance
LogRhythm and PCI Compliance The Payment Card Industry (PCI) Data Security Standard (DSS) was developed to encourage and enhance cardholder data security and facilitate the broad adoption of consistent
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Meeting the Challenges of Virtualization Security
Meeting the Challenges of Virtualization Security Coordinate Security. Server Defense for Virtual Machines A Trend Micro White Paper August 2009 I. INTRODUCTION Virtualization enables your organization
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
Bridging the gap between COTS tool alerting and raw data analysis
Article Bridging the gap between COTS tool alerting and raw data analysis An article on how the use of metadata in cybersecurity solutions raises the situational awareness of network activity, leading
PCI DSS Reporting WHITEPAPER
WHITEPAPER PCI DSS Reporting CONTENTS Executive Summary 2 Latest Patches not Installed 3 Vulnerability Dashboard 4 Web Application Protection 5 Users Logging into Sensitive Servers 6 Failed Login Attempts
