Cyber Threat Management platform. Defense against known and unknown threats
|
|
|
- Kathleen Davidson
- 10 years ago
- Views:
Transcription
1 Cyber Threat Management platform Defense against known and unknown threats Management Summary April 2015
2 The cyber threat landscape is constantly evolving Cyber security is not just about technology What do Sony, Target, Home Depot, JPMorgan Chase, AT&T and Gemalto have in common? They have all been hacked recently. Valuable customer and business secrets were stolen, resulting in great financial loss, bruised reputations and in some cases departure of company management. In recent years the number of IT security incidents have risen sharply. Digital scams, fraud, espionage and blackmail seem to be daily news. The overall cyber threat landscape has changed to a degree we have not seen since our establishment in Unfortunately it is getting even more problematical. From our intelligence operations we see international criminal groups operating increasingly under the protection, and in some cases with the help of governments. We have been involved in a number of high-profile espionage cases where we led the emergency response. From this we see highly advanced malware used by state actors, that is designed to circumvent current (state of the art) detection methods. Eventually, this type of sophisticated malware finds its way into the hands of criminals. Employed by criminal groups, hackers could disrupt the economic and financial interests of companies as well as their reputations. Hackers with more political motives may even be positioned to endanger national security. This means the cyber threat landscape is about to change even further. It continues to threaten the economic growth, geopolitical relations, business interests and through the internet of things our personal safety. Our belief is that the current state of cyber security solutions is insufficient to protect against these threats. We feel a more holistic, intelligence-driven and operational approach to cyber security is required to protect against such advanced threats. First off, cyber security is not just about technology. To counter the evolving cyber threat facing organizations today, business leaders must ensure they have an understanding of the cyber threat landscape specific to their organizations. From this insight, an integrated approach to cyber security can be developed that is tailored to the threat landscape and underlying business risk, addressing not only the technical aspects of their defense, but also the human and organizational elements. Ronald Prins CTO and co-founder Previously, Ronald Prins worked as a scientific researcher at the Netherlands Forensic Institute (NFI). He gained recognition by breaking codes on cryptographic security systems encountered by law enforcement in criminal investigations. Ronald also contributed to new methods and best practices for obtaining digital information in criminal investigations. He co-founded Fox-IT with Menno van der Marel in 1999, seeking to fully apply his creativity in developing innovative security solutions for highly sensitive environments. Ronald studied applied math e- matics and went on to specialize in cryptography at the Delft University of Technology. This is why we are presenting our approach and Cyber Threat Management platform in this brochure informing you how you can be better prepared against advanced attacks. 2 fox-it Cyber Threat Management Platform Management Summary April 2015
3 How to manage your risks? Dealing with the unknown Dealing with the unknown That pretty much sums up the problem all organizations face with regards to defending against cyber threats. The challenges we face as a community are part of risk management and mitigation more than anything else. The people, processes and technology we employ cater for this necessity. Just a couple of years ago, attackers mostly used the same tools & techniques, and by looking for these knowns and incorporating such information into semi-automated detection systems, we had a reasonable line of defense. Today this is no longer the case. We are constantly being confronted with unknown actors as well as new attack vectors and changing methods and customized tooling. Protecting an organization with a high-risk profile against cyber threats has become a game of cat and mouse. Once a new security system is implemented, hackers will immediately be trying to break it. It is therefore important to understand the threat landscape and the associated risks. To stay ahead of the cyber adversaries it is no longer sufficient to protect against known threats. Organizations also have to be able to protect against unknown threats. The difference between known and unknown threats The common denominator is time. Even relatively novel and highly sophisticated techniques like Stuxnet, Regin and Quantum Insert eventually become known. The challenge then, becomes shortening this time differential as much as possible. Traditional and current solutions focus on attempting to incorporate as many known threats in the form of static information such as IP addresses into detection and blocking mechanisms. This makes sense, and is good practice to maintain a baseline level of security. The trouble is that the effectiveness of this method is rapidly decreasing and is primarily protecting organizations mostly Unknown threats Known threats Time (Potential) risk and impact Low High High Low Volume of intelligence against nuisance. As attackers are getting ever more nimble with their attack infrastructure, the life-cycle of static information is rapidly becoming shorter. What s more, the detection solutions that rely on static intelligence don t focus on the specific organizational context. The time-delay of information on more sophisticated attacks is relatively long. Advanced Persistent Threats (APT s) sit at the top with a high-risk profile range and are rarely known. This means that the effectiveness of this method is becoming limited. Another issue with these traditional and current solutions is that they aren t designed to facilitate security analytics. When something is blocked, they typically do not offer context or metrics to help an organization to fully understand or learn from the security event. Addressing these two aspects is in our view the next critical challenge, and implies that organizations should not merely rely on vendor intelligence, but require the capability to detect both known and unknown threats from their own environment. fox-it Cyber Threat Management platform Management Summary April
4 1 5 Know your adversaries The continuous process of advanced cyber security operations In our view, it is no longer tenable for organizations to assume they can cope with the current threat landscape by employing fragmented and static solutions. To stand a fighting chance against the more advanced threats, organizations need to build up (or outsource) operational capabilities in the four critical areas of intelligence, prevention, detection and response. CS Strategy, policy and architecture 2 Asset & vulnerability Advanced threat management management 8 Intelligence (P) Prevent Intelligence know your adversaries! Without knowing your enemies and their intent, it is impossible to protect against the threats they pose. To counter the evolving cyber threats organizations face today, business leaders must ensure they have an understanding about their organization s specific cyber threat landscape and how it relates to their critical assets. From this insight, an integrated approach to cyber security can be developed that it is tailored to particular risks of the organization. 3 Threat analysis intelligence Respond Intelligence (R) 7 Detect Emergency response and investigation Threat detection Intelligence (D) (triage) 6 Effective Security Operations Developed from Incident Response experience 4 Security monitoring Operational security incident management This should not only address the technical aspects of their defense, but also the people and organizational elements. On an operational level, all information and knowledge about current threats and threat actors should be stored and used to derive threat coverage pertaining to the security operations. Prevent the key here is to develop a layered defense in accordance with the overall threat landscape, aiming to increase the odds of threat coverage, detection and remediation. This forms the basis for cyber security strategy formulation, architecture design and policy formulation. Once implemented, this is followed by the active monitoring and control of critical assets. This includes continuous scanning for vulnerabilities that may be exploited by adversaries to gain access to the organization. Detect threat detection is as good as the relevant intelligence that is feeding into the deployed solutions to detect relevant (business) threats. This increasingly means developing the ability to detect as yet unknown threats from an organization s own environment. This requires an operational environment that facilitates intelligence-driven security analytics, where threat intelligence can be translated to threat coverage models, tested for effective detection and efficient deployment into the threat management platform. When new threat coverage is deployed, the security analytics team needs to continuously research and optimize the threat detection output. 4 fox-it Cyber Threat Management Platform Management Summary April 2015
5 Adversaries This is typically done by expert threat analysts with in-depth knowledge of the threat environment (actors, attack vectors and modus operandi, etc). The output of this process will then feed the operational security monitoring and provide relevant threat context to the analysts with knowledge about the organization s IT environment. They then perform triage and investigations to assess (prioritized) security events on their potential business risk and initiate the response accordingly. Unknown threats Threat intelligence Prevent Detect Known threats Threat intelligence Respond the respond process gets activated when security incidents have been validated through triage and initial investigation. Once it has been confirmed that no false positives exist, a swift response is required. The incident response management process depends on the severity of the incident. Most incidents will have relatively little business impact (as they are detected directly upon entry), while some could imply serious business risks, such as a large data breach, financially-related crime, espionage or even worse. These are crisis situations that require an emergency response & investigation process. In some cases this may also require observing attacker behavior as part of their intelligence gathering before removing a specific threat. These are considered advanced threat management techniques and are primarily reserved for organizations with high maturity in cyber security. This essentially describes the continuous process of advanced cyber security operations. This process can Respond Time Cyber Threat Management greatly increase the overall posture through its intelligence-driven, operational approach that investigates not merely known threats but also indications of unknown threats. When executed well, it increases the speed of translation from coverage, to intelligence and back. This process should be as seamless as possible and can be reflected in the model above. Traditional products fox-it Cyber Threat Management platform Management Summary April
6 1 Data breach investigations Verizon Report Denial of service attacks 14 % Crimeware 31 % Web application attacks 38 % Cyber-espionage 7 % Everything else 3 % Miscellaneous errors 2 % Card skimming 0 % Physical theft or loss 1 % Insider misuse 3 % Point-of-sale intrusions 0 % Insight into the overall threat landscape The Data Breach Investigations Report (DBIR) is an annual study conducted by Verizon with contributions from 50 organizations, representing public and private entities from around the world. The dataset that underpins the DBIR is comprised of over 63,000 confirmed security incidents. Security incidents are therefore no longer restricted to confirmed data breaches. This evolution of the Verizon DBIR reflects the experience of many security practitioners and executives who know that an incident need not result in data infiltration for it to have a significant impact on the targeted business. Security incidents are defined as: 1. Incident a security event that compromises the integrity, confidentiality, or availability of an information asset 2. Breach an incident that results in the disclosure or potential exposure of data 3. Data disclosure a breach for which it was confirmed that data was actually disclosed (not just exposed) to an unauthorized party As the Verizon DBIR report includes confirmed incidents, it provides insight into the overall threat landscape. The threat landscape picture per sector accurately matches that of Fox-IT, with the notable exception of cyber espionage-related incidents. Based on our data, Fox-IT recognizes a larger espionage threat for the public sector than outlined in the Verizon DBIR report. 6 fox-it Cyber Threat Management Platform Management Summary April 2015 Miscellaneous errors 34 % Cyber-espionage <1 % Denial of service attacks 10 % Point-of-sale intrusions 75 % Crimeware 21 % Physical theft or loss 19 % Insider misuse 24 % Web application attacks <1 % Point-of-sale intrusions 0 % Everything else 4 % Card skimming 1 % Crimeware 1 % Miscellaneous errors 1 % Cyber-espionage <1 % Denial of service attacks <1 % Card skimming 0 % Physical theft or loss 1 % Insider misuse 8 % Everything else 2 % Web application attacks 1 % Public sector Travel and hospitality Everything else 10 % CS Strategy, policy Cyber-espionage <1 % and architecture Denial of service attacks 2 % 2 Asset & vulnerability Advanced threat management Card skimming <1 % management 8 Crimeware 3 % Energy and utilities Miscellaneous errors 12 % Physical theft or loss 46 % Intelligence (P) Health care Insider misuse 15 % Prevent 3 Threat a intellig Resp Intellige 7 Emergency and inves Web application attacks 3 % Point-of-sale intrusions 9 %
7 5 1 % Point-of-sale intrusions nalysis ence ond Detect nce (R) 27 % Web application attacks response tigation 7 % Insider misuse 3 % Physical theft or loss Financial services Threat detection Intelligence (D) Retail 5 % Miscellaneous errors (triage) 6 4 % Crimeware 4 Security 22 % Card skimming monitoring Operational security incident management 2 % Crimeware 2 % Miscellaneous errors 2 % Physical theft or loss 4 % Insider misuse 26 % Denial of service attacks <1 % Cyber-espionage 6 % Everything else <1 % Point-of-sale intrusions Manufacturing professional services 10 % Web application attacks 8 % Everything else 14 % Web application attacks 8 % Insider misuse 4 % Physical theft or loss 2 % Miscellaneous errors <1 % Card skimming 9 % Crimeware <1 % Card skimming 3 % Crimeware 31 % Point-of-sale intrusions 29 % Cyber-espionage 9 % Everything else 1 % Point-of-sale intrusions 6 % Insider misuse 4 % Physical theft or loss 3 % Miscellaneous errors 24 % Denial of service attacks 37 % Denial of service attacks 30 % Cyber-espionage 9 % Web application attacks Top 10 discovery methods within Cyber-espionage (n=302) 85% Total External 15% Total Internal 65% Related party 16% Law enforcement 8% Antivirus 2% NIDS 2% Reported by user 1% Log review 1% Unknown 1% Other 1% Customer <1% Audit Significant increases in cyber security spending Although the increased awareness of cyber threats and related business risks has led to significant increases in cyber security spending, according to several studies, this does not result in a significant reduction in cyber security incidents (see chart above). This raises questions on the effectiveness of the current cyber security strategies and implementation. First off, cyber security is not just about technology. To counter the evolving threats facing organizations today, business leaders must ensure they have a clear understanding about their organization s specific cyber threat landscape. From this specific insight, an integrated approach to cyber security can be developed that is tailored to the particular business risks, addressing not only the technical aspects of their defense, but also the people and organizational elements. Drawing on this experience, organizations can reduce the risks to their business significantly by building up (or outsourcing) specialized and dedicated operational capabilities in the four critical areas intelligence, prevention, detection and response. The effectiveness of cyber security investments and overall posture can greatly increase through an intelligence-driven, operational approach that investigates not merely known threats but also indications of unknown threats. Source: Verizon DBIR 2014 <1 % Cyber-espionage 6 % Card skimming 10 % Everything else 33 % Denial of service attacks fox-it Cyber Threat Management platform Management Summary April
8 The need for integrated solutions How to conduct your operations successfully Following the challenges and conclusions outlined in the above sections, Fox-IT is expanding on its existing cyber security technology, and is continuously developing additional functionalities and more efficient operations to address these new challenges. This intelligence-driven Cyber Threat Management platform is in essence the underlying technology for conducting advanced cyber security operations. General overview Our experience is that most clients already have a myriad of solutions in place providing functionality like antivirus, firewalling, and baseline intrusion prevention. Many companies then choose to feed the output from this disparate solution landscape into a Security Information and Event Management (SIEM) appliance where correlation is then applied. This works, up to a point. SIEM s excel at applying well thought-out use cases, but lack the depth of information required to provide the investigative and intelligence cycles required for successful advanced threat management. One of the reasons is the lack of a feedback loop to most of the data generators (or log sources). This means that you need visibility and the ability to control and manipulate output, particularly on network and host levels. Accordingly, Fox-IT has developed solutions for both these levels. In order to actually make use of this visibility, these solutions must work together in a logical way. To do this, we are developing the following components: 1. Cyber Threat Management Portal The portal serves as the gateway to all underlying systems in the Cyber Threat Management environment. It will be used by our own analysts, or those of our partners (managed service deployment) or by end-customers (hybrid service deployment) to conduct cyber security operations on various levels. The portal also abstracts the technical and operational information for tactical and strategic management. The level determines the functionality, information form, and abstraction. On the operational layer, analysts are presented with a threat analytics environment with integrated workflow from which they are able to see and investigate security incidents. The environment also enables analysts to do threat research and apply intelligence to the overall platform. Operational The portal provides an operational environment that streamlines the day-to-day security operations and boosts security effectiveness, through a multi-layered defense model that prevents or detects threats at each stage of the attack. The workflows in this environment are based on our experience in conducting cyber security operations for many years, and are currently in use in our Security Operations Center. Tactical & Strategic On these levels the portal incorporates intelligence and operational data to provide a useful overview showing the current threat landscape for an organization. This enables both the reduction and prioritization of security alerts that the security teams will handle in the operational 8 fox-it Cyber Threat Management Platform Management Summary April 2015
9 Processing & operations Data capture Intelligence Contextual Applied Cyber Threat Management Cyber Threat Components Forensic Retention SIEM Bidirectional Management SIEM Operations Intelligence & analysis-driven Normal sources Unidirectional Use case-driven security monitoring and incident response functions. The tactical response benefits from the fusion of intelligence-based context to security events. On a strategic level, the portal feeds the CISO and senior management with threat landscape information as a basis for both cyber threat mitigation and risk management. This is added by the contextual intelligence from which an understanding is gained of adversarial motives and intents, enabling organizations to transition from a reactive security model to a proactive model based on risk management, and driving better, more informed responses to security incidents. 2. Intelligence as a core component Intelligence is delivered as a central component of the entire platform via our Cyber Threat Management Portal. The intelligence module consists of two major divisions in terms of the information supplied: Contextual intelligence Contextual information is the information which, when combined with the experience of an analyst, enables an organization to make informed decisions about attackers, their methods and any infrastructure that is available as part of the platform. This information often includes very detailed descriptions of major participants in the current threat landscape, which is either applicable to any organization or specific to a sector, or organization. From this starting point, it is often possible to draw conclusions regarding the intent of an attacker. When an alert is received, this information is correlated and is accessible to the analyst. Applied intelligence Contextual information is translated into detection mechanisms for use on network- and endpoint systems. Where contextual information describes the attacker and his or her modus operandi, applied intelligence focuses on how to detect it. This information is maintained in a specialized coverage system, giving an overview of what threats the organization is protected against, and how this was determined. This is an important aspect in making the translation from operations to a strategic overview. This intelligence is delivered via correlation on alerting and incidents, and on-demand via our Cyber Threat Management Portal. In both contextual and applied reporting, it is possible to ask our threat analysts questions about the information presented. 3. Network module Based on our existing network monitoring service, the network module provides broad coverage over the entire network. The primary functionality of the network module is designed to investigate and apply detection to known (rules) and unknown (heuristics) threats. It therefore has built-in forensic data retention capabilities allowing for retroactive investigation. The network fox-it Cyber Threat Management platform Management Summary April
10 The Nuclear Security Summit in 2014 was a huge challenge for our city. Because of its diplomatic intensity, we knew there were chances of being targeted by sophisticated cyber adversaries. That s why we needed the best experts in cyber security. For us it was self-evident to work with Fox-IT, our partner within The Hague Security Delta. The result? A successful and safe summit, thanks also to Fox-IT s hard work in the background. Jan Willem Duijzer CIO of The Municipality of The Hague module also enables the rapid deployment of customized detection policies following from events from other modules. 4. Endpoint module The endpoint module provides both prevention and threat visibility to hosts (endpoints and servers). It uses a signature-less approach to provide strong prevention and detection layers to hosts, enabling the detection of both known and unknown threats. Additionally, it also forms an integral part of the investigation and response functions. It allows for the deployment of customized policies and rules for specifically identified threats and has functionality for remote remediation. Where the network module provides breadth to the Cyber Threat Management platform, the endpoint module provides depth. by definition an anomaly and is an instant trigger for further investigation. The adaptive defense module not only provides organizations with awareness of attack and breach activity, but it is also contributing to intelligence by making unknown threats known. 6. Log module to enable SIEM integration The Cyber Threat Management platform can communicate with existing SIEM technology through the open common event format standard. We are able to feed events in various SIEM s to prioritize customers operational security monitoring activities. Currently under development is the ability to provide intelligence context to specific SIEM s. Where most SIEM s have correlation rules, we foresee the ability to enhance these existing rules by providing intelligence from both an applied and contextual standpoint. 5. Adaptive Defense module As cyber attacks are becoming increasingly advanced in nature, it becomes imperative for organizations to deploy security tools that enable the detection of targeted attacks by as yet unknown attack vectors or methods. The adaptive defense module will provide the possibility to detect heretofore unknown attacks, and complements other modules. The adaptive defense module is essentially a honeypot network of fake end-points and servers. When unsimulated activity is noted on these machines, it is 10 fox-it Cyber Threat Management Platform Management Summary April 2015
11 Ten key benefits Our clients have worked with us to develop the Cyber Threat Management platform. They have had a wide array of reasons for challenging us to develop a solution platform that offers: 1. Intelligence on adversaries in such a way that tactics can be developed to protect their business interests from them. 2. Enhanced communications between the security teams, Security Operations Center (SOC), management and board members. 3. One integrated platform that brings network-, cloud- and endpoint security into a common architecture, with complete visibility and control, ensuring that analysts can prevent, detect and respond to advanced cyber attacks. 4. An operational environment that streamlines the day-to-day security operations and boosts security effectiveness, through a multi-layered defense model that prevents or detects threats at each stage of the attack. 5. An environment that enables security analysts to have visibility on all attack stages in a unified way, enabling a seamless threat analytics workflow to confidently investigate both known and unknown threats before they impact the business. If you are interested in our Cyber Threat Management solutions, please contact For clients Marcel van Oirschot Sales Director [email protected] For partnerships Jurjen Harskamp Chief Strategy Officer [email protected] 6. Reduction of security alerts that overwhelm most security teams by providing threat intelligence-based context and prioritization to alerts as well as improve tactical response by merging intelligence context with security events. 7. Change from a reactive security model to a proactive model based on risk management, driving better, more informed responses to security incidents. 8. A hybrid service delivery model that enables them to start with a fully managed offering and to granularly take operations in-house as their overall Cyber Threat Management capabilities improve. 9. Intelligence to security events to gain an understanding of adversarial motives and intents, and prioritizing policies and security investments around them. 10. Insight into threat intelligence coverage for greater transparency about the applied intelligence used in the platform and against what threats they provide coverage. fox it White Paper Cyber Threat Management April
12 fox-it Fox-IT was founded in 1999 as a consultancy firm for Forensic Expertise (the name was derived from Forensic Experts). Within the first few years of operations, Fox-IT was asked by a large telecommunications operator to deliver a service based on network monitoring. This led to the first Cyber Security Operations Center in the Netherlands and one of an initial handful in Europe. From these beginnings, Fox-IT has developed into Europe s largest specialized cyber security company. Fox-IT operates in three business areas: 1. Cyber Threat Management this is a solution portfolio aimed at reducing the risks of cyber threats, and includes: professional services, managed security services, and technology 2. Web/Mobile event analytics this is a solution portfolio that is aimed at reducing financial risks in (online) payment transactions 3. High Assurance these are solutions that make trusted communication possible to the highest classification levels Fox-IT has been involved in many high-profile Incident Response cases. Most of the high profile cases we worked on are secret, but DigiNotar, KPN are public examples. Fox-IT continuously uses its experience from its professional services to improve its managed security services and underlying technology platform to enhance prevention, detection and responses to known and unknown cyber threats. fox-it Olof Palmestraat 6, Delft po box 638, 2600 ap Delft The Netherlands t +31 (0) f +31 (0) e [email protected]
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center
Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored. It takes an average
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs
IBM Global Technology Services Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs Achieving a secure government
Advanced Threats: The New World Order
Advanced Threats: The New World Order Gary Lau Technology Consulting Manager Greater China [email protected] 1 Agenda Change of Threat Landscape and Business Impact Case Sharing Korean Incidents EMC CIRC
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE
IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE Solution Brief SUMMARY New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council
Rethinking Information Security for Advanced Threats CEB Information Risk Leadership Council Advanced threats differ from conventional security threats along many dimensions, making them much more difficult
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Requirements When Considering a Next- Generation Firewall
White Paper Requirements When Considering a Next- Generation Firewall What You Will Learn The checklist provided in this document details six must-have capabilities to look for when evaluating a nextgeneration
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"
GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA" A Roadmap for "Big Data" in Security Analytics ESSENTIALS This paper examines: Escalating complexity of the security management environment, from threats
The Benefits of an Integrated Approach to Security in the Cloud
The Benefits of an Integrated Approach to Security in the Cloud Judith Hurwitz President and CEO Marcia Kaufman COO and Principal Analyst Daniel Kirsch Senior Analyst Sponsored by IBM Introduction The
THE EVOLUTION OF SIEM
THE EVOLUTION OF SIEM WHY IT IS CRITICAL TO MOVE BEYOND LOGS Despite increasing investments in security, breaches are still occurring at an alarming rate. 43% Traditional SIEMs have not evolved to meet
Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape
WHITE PAPER: SYMANTEC GLOBAL INTELLIGENCE NETWORK 2.0.... ARCHITECTURE.................................... Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Who
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service
Business Case Outsourcing Information Security: The Benefits of a Managed Security Service seccuris.com (866) 644-8442 Contents Introduction... 3 Full- Time Experts vs. a Part- Time In- House Staff...
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT
BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT Rashmi Knowles RSA, The Security Division of EMC Session ID: Session Classification: SPO-W07 Intermediate APT1 maintained access to
RETHINKING CYBER SECURITY
RETHINKING CYBER SECURITY Introduction Advanced Persistent Threats (APTs) and advanced malware have been plaguing IT professionals for over a decade. During that time, the traditional cyber security vendor
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
Changing the Enterprise Security Landscape
Changing the Enterprise Security Landscape Petr Hněvkovský Presales Consultant, ArcSight EMEA HP Enterprise Security Products 2012 Hewlett-Packard Development Company, L.P. The information contained herein
Internet Safety and Security: Strategies for Building an Internet Safety Wall
Internet Safety and Security: Strategies for Building an Internet Safety Wall Sylvanus A. EHIKIOYA, PhD Director, New Media & Information Security Nigerian Communications Commission Abuja, NIGERIA Internet
Content Security: Protect Your Network with Five Must-Haves
White Paper Content Security: Protect Your Network with Five Must-Haves What You Will Learn The continually evolving threat landscape is what makes the discovery of threats more relevant than defense as
Vulnerability Management
Vulnerability Management Buyer s Guide Buyer s Guide 01 Introduction 02 Key Components 03 Other Considerations About Rapid7 01 INTRODUCTION Exploiting weaknesses in browsers, operating systems and other
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief
RSA Solution Brief RSA envision Platform Real-time Actionable Information, Streamlined Incident Handling, Effective Measures RSA Solution Brief The job of Operations, whether a large organization with
McAfee Network Security Platform
McAfee Network Security Platform Next Generation Network Security Youssef AGHARMINE, Network Security, McAfee Network is THE Security Battleground Who is behind the data breaches? 81% some form of hacking
with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief
RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
The session is about to commence. Please switch your phone to silent!
The session is about to commence. Please switch your phone to silent! 1 Defend with Confidence Against Advanced Threats Nicholas Chia SE Manager, SEA RSA 2 TRUST? Years to earn, seconds to break 3 Market
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products
Threat Intelligence: The More You Know the Less Damage They Can Do Charles Kolodgy Research VP, Security Products IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Agenda Evolving Threat Environment
Introducing IBM s Advanced Threat Protection Platform
Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM
SECURITY. Risk & Compliance Services
SECURITY Risk & Compliance s V1 8/2010 Risk & Compliances s Risk & compliance services Summary Summary Trace3 offers a full and complete line of security assessment services designed to help you minimize
IBM QRadar Security Intelligence April 2013
IBM QRadar Security Intelligence April 2013 1 2012 IBM Corporation Today s Challenges 2 Organizations Need an Intelligent View into Their Security Posture 3 What is Security Intelligence? Security Intelligence
Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model
White Paper Addressing the Full Attack Continuum: Before, During, and After an Attack It s Time for a New Security Model Today s threat landscape is nothing like that of just 10 years ago. Simple attacks
SOLUTION BRIEF. Next Generation APT Defense for Healthcare
SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform
Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Solution Brief Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform Finding
Why a Network-based Security Solution is Better than Using Point Solutions Architectures
Why a Network-based Security Solution is Better than Using Point Solutions Architectures In This Paper Many threats today rely on newly discovered vulnerabilities or exploits CPE-based solutions alone
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.
Experience the commitment WHITE PAPER Information Security Continuous Monitoring Charting the Right Course May 2014 cgi.com 2014 CGI GROUP INC. During the last few months of 2013, six federal agencies
Effective Threat Management. Building a complete lifecycle to manage enterprise threats.
Effective Threat Management Building a complete lifecycle to manage enterprise threats. Threat Management Lifecycle Assimilation of Operational Security Disciplines into an Interdependent System of Proactive
Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA
Advanced Visibility Moving Beyond a Log Centric View Matthew Gardiner, RSA & Richard Nichols, RSA 1 Security is getting measurability worse Percent of breaches where time to compromise (red)/time to Discovery
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst
ESG Solution Showcase Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst Abstract: Information security practices are in the midst
A HELPING HAND TO PROTECT YOUR REPUTATION
OVERVIEW SECURITY SOLUTIONS A HELPING HAND TO PROTECT YOUR REPUTATION CONTENTS INFORMATION SECURITY MATTERS 01 TAKE NOTE! 02 LAYERS OF PROTECTION 04 ON GUARD WITH OPTUS 05 THREE STEPS TO SECURITY PROTECTION
2011 Cyber Security and the Advanced Persistent Threat A Holistic View
2011 Cyber and the Advanced Persistent Threat A Holistic View Thomas Varney Cybersecurity & Privacy BM Global Business Services 1 31/10/11 Agenda The Threat We Face A View to Addressing the Four Big Problem
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
The SIEM Evaluator s Guide
Using SIEM for Compliance, Threat Management, & Incident Response Security information and event management (SIEM) tools are designed to collect, store, analyze, and report on log data for threat detection,
Boosting enterprise security with integrated log management
IBM Software Thought Leadership White Paper May 2013 Boosting enterprise security with integrated log management Reduce security risks and improve compliance across diverse IT environments 2 Boosting enterprise
Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection
White Paper: Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection Prepared by: Northrop Grumman Corporation Information Systems Sector Cyber Solutions Division
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
2012 North American Managed Security Service Providers Growth Leadership Award
2011 South African Data Centre Green Excellence Award in Technology Innovation Cybernest 2012 2012 North American Managed Security Service Providers Growth Leadership Award 2011 Frost & Sullivan 1 We Accelerate
The Future of the Advanced SOC
The Future of the Advanced SOC Developing a platform for more effective security management and compliance Steven Van Ormer RSA Technical Security Consultant 1 Agenda Today s Security Landscape and Why
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
An New Approach to Security. Chris Ellis McAfee Senior System Engineer [email protected]
An New Approach to Security Chris Ellis McAfee Senior System Engineer [email protected] Advanced Targeted Attack Challenges Criminal Theft Sabotage Espionage After the Fact Expensive Public Uncertainty
Big Data and Security: At the Edge of Prediction
Big Data and Security: At the Edge of Prediction Mark Seward Splunk Inc. Fred Wilmot Splunk Inc. Session ID: Session Classification: SPO2-T17 Intermediate The Way Cyber Adversaries Think Where is the most
IT Security Strategy and Priorities. Stefan Lager CTO Services [email protected]
IT Security Strategy and Priorities Stefan Lager CTO Services [email protected] Cyberthreat update Why would anyone want to hack me? I am not a bank! Security Incidents with Confirmed Data Loss Source:
WHITE PAPER SPLUNK SOFTWARE AS A SIEM
SPLUNK SOFTWARE AS A SIEM Improve your security posture by using Splunk as your SIEM HIGHLIGHTS Splunk software can be used to operate security operations centers (SOC) of any size (large, med, small)
Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA
Advanced SOC Design Next Generation Security Operations Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA 1 ! Why/How security investments need to shift! Key functions of a Security Operations
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
BT Assure Threat Intelligence
BT Assure Threat Intelligence Providing you with the intelligence to help keep your organisation safe BT Assure. Security that matters At all times, organisations are vulnerable to all kinds of cyber attacks
ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst
ESG Lab Spotlight ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst Abstract: This ESG Lab Spotlight examines the
The Cyber Threat Profiler
Whitepaper The Cyber Threat Profiler Good Intelligence is essential to efficient system protection INTRODUCTION As the world becomes more dependent on cyber connectivity, the volume of cyber attacks are
Protecting against cyber threats and security breaches
Protecting against cyber threats and security breaches IBM APT Survival Kit Alberto Benavente Martínez [email protected] IBM Security Services Jun 11, 2015 (Madrid, Spain) 12015 IBM Corporation So
Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity
Cyber threat intelligence and the lessons from law enforcement kpmg.com/cybersecurity Introduction Cyber security breaches are rarely out of the media s eye. As adversary sophistication increases, many
Security Analytics for Smart Grid
Security Analytics for Smart Grid Dr. Robert W. Griffin Chief Security Architect RSA, the Security Division of EMC [email protected] blogs.rsa.com/author/griffin @RobtWesGriffin 1 No Shortage of Hard
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION
WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the
IBM Security Intelligence Strategy
IBM Security Intelligence Strategy Delivering Insight with Agility October 17, 2014 Victor Margina Security Solutions Accent Electronic 12013 IBM Corporation We are in an era of continuous breaches Operational
REVOLUTIONIZING ADVANCED THREAT PROTECTION
REVOLUTIONIZING ADVANCED THREAT PROTECTION A NEW, MODERN APPROACH Blue Coat Advanced Threat Protection Group GRANT ASPLUND Senior Technology Evangelist 1 WHY DO I STAND ON MY DESK? "...I stand upon my
A Primer on Cyber Threat Intelligence
A Primer on Cyber Threat Intelligence AS ADVERTISED 2 BUZZWORD BINGO! 3 TODAY S CYBER SECURITY CHALLENGES CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly
