CROWDSTRIKE // WHITE PAPER CYBER ATTACK SURVIVAL CHECKLIST
|
|
|
- Joseph McCarthy
- 10 years ago
- Views:
Transcription
1 CROWDSTRIKE // WHITE PAPER CYBER ATTACK SURVIVAL CHECKLIST
2 The Threat Landscape The threat level has never been higher for organizations charged with protecting valuable data. In fact, as recent headlines will attest, no company or agency is completely immune to targeted attacks by persistent, skilled adversaries. The unprecedented success of these attacks against large and well-equipped organizations around the world has led many security executives to question the efficacy of traditional layered defenses as their primary protection against targeted attacks. At the same time, many organizations have begun reviewing and revising their security best practices in advance of suffering a debilitating cyber attack. Based on extensive use of CrowdStrike's nextgeneration endpoint protection platform to detect and prevent sophisticated attacks against large organizations, CrowdStrike s in-house team of security experts, adversary hunters, intelligence analysts and incident responders have pooled their knowledge to produce this valuable guidebook and checklist for proactively enhancing your corporate information.
3 Cyber Attack Survival Checklist Table of Contents:» Proactive Defense Checklist» Common Mistakes with Existing Security Measures» Steps for Enhancing Your Security Team» Best Practices for Responding to a Targeted Attack» Top Five Reasons for Reporting to Law Enforcement
4 Proactive Defense Checklist In an environment where 60 percent of attacks do not use any known malware, it is clear that conventional malware-based protection is insufficient to stop targeted, persistent attacks. CrowdStrike recommends the following steps to address threats proatively in this post-malware environment in which we operate today. Gain Complete Visibility into Endpoint Data Deploy cloud-based endpoint protection solutions to accelerate recovery time after a cyber attack. Ensure that damage is limited, data exfiltration has stopped, and remediation can begin by leveraging the full power provided by endpoint technology. The ability to access endpoint data allows for complete visibility into the full scope of an intrusion. Consolidate and Monitor Internet Egress Points In the event of an intrusion, monitoring egress points is a critical part of identifying attacker activity. All connections to the Internet from your corporate environment should be monitored to identify data leaving the network. The fewer egress points to monitor, the easier it is to detect malicious activity.
5 Identify, Isolate, and Log Access to Critical Data Focus your limited resources on those areas of the network that are most critical to your business. Determine where your most sensitive data or networks are located and implement increased logging and network monitoring. Actively monitor network access and conduct frequent log reviews. Implement Centralized Logging DHCP, DNS, Active directory, server event Logs, Firewall Logs, ids, and Proxy Logs should all be stored in a protected centralized system that is time synchronized and easily searchable. Allocate resources to perform regular log analysis and stress test your logging process via tabletop intrusion exercises. Securing Web Applications and Internal Software Projects Web applications and homegrown software are regularly targeted and frequently compromised. Incorrect implementation of web application platforms can introduce vulnerabilities even on fully patched servers. Create a development culture focused on secure coding and conduct frequent
6 Patch, Patch, and Patch Again Patching operating systems and third-party applications is one of the most inexpensive and effective ways to harden a network, while leaving your resources to be better spent on detecting advanced adversaries. Build a strong patch management process and ensure critical security patches are installed as soon as possible. If you have legacy operating systems or software packages in your enterprise, develop and implement an upgrade plan. Microsoft estimates that Windows 8 and server 2012 is six times more secure than Windows 7 and twenty-one times more secure than Windows XP. Minimize or Remove Local Admin Privileges Users should not utilize accounts with local administrator privileges as this opens multiple ways for targeted attackers to move laterally and compromise credentials. Disable the local administrator account on all workstations and servers via Active directory. If this is impossible within your environment, develop a password checkout procedure to ensure that every local admin account has a strong and unique password.
7 Implement a Tiered Active Directory Admin Mode Use at least three levels of administration to isolate credentials and limit the damage due to compromise of critical accounts. A minimum implementation would be the creation of domain Admins, server Admins, and workstation Admins. No single account should be able to access all systems. Enhance logging and monitor the use of these privileged accounts. Develop Incident Response and Data Breach Response Plans Take active steps to prepare for a breach in advance. Incident response Plans tend to focus on efforts to restore data and systems confidentiality, integrity, and availability. Data Breach Plans tend to focus on external requirements, to include for example contacting insurance carriers, law enforcement, regulators, customers, vendors, and public relations teams in response to the loss of personally identifiable information.
8 COMMON MISTAKES Treating compliance as security It is clearly a rational decision for organizations to focus on protecting data with regulatory scrutiny or requiring breach notification, and much of this oversight relates directly to the handling of personally identifiable information (PII). However, this data is rarely the only important information in your enterprise. Today s attackers can be just as interested in your intellectual property as they are in your customer s information. It all depends on which adversary you are facing. Good threat intelligence and counter-threat assessments can help you better understand your data risk. Only protecting systems within your network perimeter As the workforce becomes more mobile, centralized intrusion detection, file sandboxing, and other security safeguards are not always capable of protecting all endpoint devices at all times. Advanced adversaries often compromise devices outside of your perimeter, taking advantage of the endemic poor security of other networks. Ensure that your endpoint solutions provide the same protection regardless of the location of the device. Single-Factor remote authentication Remote access into your network should always require two-factor authentication. Consider also requiring two-factor authentication for sensitive administrative accounts. Out-of-band authentication methods like SMS and soft tokens are commonplace, widely accepted by users, and relatively easy to implement due to the prevalence of smartphones. Storing account credentials with outdated hashing standards The media is littered with companies that did not adequately protect their user accounts. If your organization maintains user accounts, audit your password storage functions. Well-known functions like pbkdf2 and bcrypt make password management straightforward, but they require proper implementation. Not changing default passwords Default passwords, especially for hardware devices (e.g. Wi-Fi routers), can allow direct access to critical data. Extra care should be taken to require strong passwordsfor all users, including default or built-in accounts. Responding to an incident with an untrained team Security/IT teams that are not intimately familiar with incident response may only uncover part of a compromise, lengthen an investigation, and leave a backdoor in place that allows the attackers to come right back into the enterprise. Incident responders must be well-trained, well resourced, and solely dedicated towards hunting for targeted attacks. Not allocating money for security needs The average data breach in 2013 cost $5.4 million. Many breaches could have been detected sooner or prevented entirely if analysts were alerted to anomalous or potentially malicious behaviors within their environment. A common mistake is to purchase new security solutions without budgeting for the human capital necessary to make use of them. Not leveraging your security team to educate the masses Spearphishing continues to top the list of initial attack vectors as users continue to click on suspicious links or open suspicious attachments. Basic security training and awareness for all employees can be very important to the overall security posture of the company. Use recent and relevant examples and do so regularly. Let employees know that everyone has a responsibility to protect the company.
9 STEPS FOR ENHANCING YOUR SECURITY TEAM feeds and ensure continuous monitoring via security platforms with the ability to automatically ingest intelligence data. Encourage information sharing Organizations that are better able to detect and respond to breaches generally have integrated fraud and it security departments. Encourage regular information sharing in your organization. IP addresses and system names associated with fraudulent transactions can be the indicators needed to identify other suspicious network activity, or ultimately a data breach. Train like you fight Testing incident response readiness with tabletop exercises can be hugely beneficial. Working through roles, responsibilities, and the steps of a complete IR plan prepares a team for action and quickly identifies any weaknesses in your plan, processes, data collection efforts, and team capabilities. This exercise may be helped along by working with an IR services team with real-world expertise and up-to-date scenarios. Education and awareness Phishing attacks are still the most common attack vector. User awareness efforts and developing a network of human sensors can pay dividends. Have an incident response services retainer in place Most breaches require the expertise and added manpower that come from an IR services team that faces these situations on a daily basis. A professional IR services team can greatly complement the capabilities of an in-house security/it team, while getting the answers needed on a timely basis and providing court-ready experience. Companies that do not have a contractual relationship in place with an IR firm in advance of a breach typically take two to three times longer to get the surge support they need. Cyber intelligence feeds You can t focus on all threats at once. Train responders to identify the most relevant threats by leveraging cyber threat intelligence. Cyber threat intelligence should be considered to be as important as other forms of business intelligence. Subscribe to vulnerability intelligence
10 RESPONDING TO A TARGETED ATTACK Do not disconnect! The majority of targeted attacks go on for months to years before detection. When a compromised system is hastily disconnected, it is highly probable that the attacker will compromise additional systems to establish new forms of persistence that may go undetected. If a computer must be disconnected, ensure that a forensic image (to include a memory image) of the system is preserved prior to disconnecting power. Establish out-of-band communication channels Assume that your network is completely compromised and the attacker can read messages. Make phone calls, meet in person, and use accounts not tied to the corporate environment. Do not let them know you know, and do not let them know how you plan to fix it. Contact an incident response services company Even large security teams often need surge assistance early in the incident response cycle and during remediation efforts. Consider proactively identifying a service provider who can be available in case of emergencies. Establishing a retainer and getting initial paperwork in place can minimize delays to your investigative efforts when help is required. Preserve all logs Validate that all centralized host-based and networkbased logs are being preserved and that backups of critical servers are being maintained. These logs may be crucial in determining how the incident occurred, when the incident began, the range of systems affected and the data that was accessed or targeted. The incident may have started over a year ago, making all rolling logs valuable regardless of age. The attacker may also be quick to clear any unprotected logging if they feel they have been discovered. Scope and investigate the incident Conduct network forensics to identify active malware in your environment, the source of attack, and attacker attribution. Conduct host forensics to determine how many systems have been accessed or compromised, which data may have been accessed, how long the incident has been occurring, the initial attack vector, persistence mechanisms in your environment, and exfiltrated data. Determine if a cardholder data environment has been affected. Remediate the attack Isolate critical systems (e.g. Point of sale) from the broader network. Block access to adversary command and control infrastructure. Remove and completely refresh infected hosts. Perform credential resets where needed. Assess additional measures to harden the environment based on findings of the incident response investigation and security review.
11 RESPONDING TO A TARGETED ATTACK Report Reporting requirements will vary based on the data accessed. As details become known throughout the course of the incident response investigation, prepare reporting per requirements and determine if media reporting is necessary. Prepare a FAQ resource or contact information for additional details. Enable logging now Logs of all kind prove invaluable during an incident response. However, it is often discovered duringan IR that logging was not enabled in many critical places, or that retention was very limited. Not only can logs help eliminate assumptions and provide faster tracking of an incident, their regular review may have detected a breach before it got off the ground, and certainly before it persisted for months. Police and remove unused systems, services, software, accounts, and data Dormant items in an enterprise are a major liability. They often fall under the radar of your patch management and administration efforts and can harbor significant vulnerabilities that are often targeted. The same is true for services, accounts, and miscellaneous data. It is not unusual for a company to update their security posture on a database, only to set aside the previously unprotected records for the taking. Regularly review system, software, and account inventories and purge those that are unused or not necessary. WORKING WITH LAW ENFORCEMENT WHO WILL YOU BE WORKING WITH? Top-notch technical folks from the FBI or secret service. These two organizations are the most active in breach investigations within the United States. WHAT WILL THEY WANT?» Avoid tipping off the attacker» Evidence collection and preservation» Internal and external threat landscape specific to your company» Investigative assistance» When will it end?» Weeks on-site, months off-site. HOW DOES IT END? Ideally, the combination of your company s internal vulnerability mitigation, detection efforts, and incident response along with meaningful law enforcement coordination stops the attack at its source.
12 WHY REPORT TO LAW ENFORCEMENT? TOP 5 REASONS: 1 - Catching the bad guys is the surest way to get them out of your system. 2 - Apprehending the perpetrators also can result in the complete recovery of your data or otherwise minimize the harm of an intrusion. 3 - Working with law enforcement is more likely to helpfully inform your internal security efforts than to waylay them. 4 - If an intrusion results in the loss of personal data, law enforcement notification will likely be required, and depending on the status of the investigation, may allow for delaying a public notification. 5 - Reporting cybercrime provides government agencies with the data necessary to follow trends, calculate the impact of this growing problem, and ultimately lower your risk.
13 ABOUT CROWDSTRIKE CrowdStrike is a leading provider of next-generation endpoint protection, threat intelligence, and pre- and post incident response services. CrowdStrike Falcon is the first true Software as a Service (SaaS) based platform for nextgeneration endpoint protection that detects, prevents, and responds to attacks, at any stage - even malware-free intrusions. Falcon s patented lightweight endpoint sensor can be deployed to over 100,000 endpoints in hours providing visibility into billions of events in real-time. CrowdStrike operates on a highly scalable subscription-based business model that allows customers the flexibility to use CrowdStrike-as-a-Service to multiply their security team s effectiveness and expertise with 24/7 endpoint visibility, monitoring, and response. Request a demo of CrowdStrike Falcon and learn how to detect, prevent, and respond to attacks, at any stage - even malware-free intrusions.
14 ABOUT CROWDSTRIKE SERVICES CROWDSTRIKE SERVICES, a wholly owned subsidiary of CrowdStrike, Inc., provides pre and post Incident Response services to proactively defend against and respond to cyber incidents. CrowdStrike s seasoned team of Cyber Intelligence professionals, Incident Responders, and Malware Researchers consists of a number of internationally recognized authors, speakers, and experts who have worked on some of the most publicized and challenging intrusions and malware attacks in recent years. The CrowdStrike Services team leverages our Security Operations Center to monitor the full CrowdStrike Falcon Platform and provide cutting-edge advanced adversary intrusion detection services. The full spectrum of proactive and response services helps customers respond tactically as well as continually mature and strategically evolve Incident Response program capabilities. CrowdStrike Services is accredited by the NSA for Cyber Incident Response Services. NEED IMMEDIATE ASSISTANCE? TALK TO AN EXPERT NOW CROWD.IR ( ) [email protected]
15 CROWDSTRIKE
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Critical Security Controls
Critical Security Controls Session 2: The Critical Controls v1.0 Chris Beal Chief Security Architect MCNC [email protected] @mcncsecurity on Twitter The Critical Security Controls The Critical Security
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Defending against modern threats Kruger National Park ICCWS 2015
Defending against modern threats Kruger National Park ICCWS 2015 Herman Opperman (CISSP, ncse, MCSE-Sec) - Architect, Cybersecurity Global Practice Microsoft Corporation Trends from the field Perimeter
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
24/7 Visibility into Advanced Malware on Networks and Endpoints
WHITEPAPER DATA SHEET 24/7 Visibility into Advanced Malware on Networks and Endpoints Leveraging threat intelligence to detect malware and exploitable vulnerabilities Oct. 24, 2014 Table of Contents Introduction
Top 20 Critical Security Controls
Top 20 Critical Security Controls July 2015 Contents Compliance Guide 01 02 03 04 Introduction 1 How Rapid7 Can Help 2 Rapid7 Solutions for the Critical Controls 3 About Rapid7 11 01 INTRODUCTION The Need
SIEM is only as good as the data it consumes
SIEM is only as good as the data it consumes Key Themes The traditional Kill Chain model needs to be updated due to the new cyber landscape A new Kill Chain for detection of The Insider Threat needs to
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Things To Do After You ve Been Hacked
Problem: You ve been hacked! Now what? Solution: Proactive, automated incident response from inside the network Things To Do After You ve Been Hacked Tube web share It only takes one click to compromise
INTRODUCING isheriff CLOUD SECURITY
INTRODUCING isheriff CLOUD SECURITY isheriff s cloud-based, multi-layered, threat protection service is the simplest and most cost effective way to protect your organization s data and devices from cyber-threats.
Avoiding the Top 5 Vulnerability Management Mistakes
WHITE PAPER Avoiding the Top 5 Vulnerability Management Mistakes The New Rules of Vulnerability Management Table of Contents Introduction 3 We ve entered an unprecedented era 3 Mistake 1: Disjointed Vulnerability
WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform
WHITE PAPER Cloud-Based, Automated Breach Detection The Seculert Platform Table of Contents Introduction 3 Automatic Traffic Log Analysis 4 Elastic Sandbox 5 Botnet Interception 7 Speed and Precision 9
Fighting Advanced Threats
Fighting Advanced Threats With FortiOS 5 Introduction In recent years, cybercriminals have repeatedly demonstrated the ability to circumvent network security and cause significant damages to enterprises.
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
INCIDENT RESPONSE CHECKLIST
INCIDENT RESPONSE CHECKLIST The purpose of this checklist is to provide clients of Kivu Consulting, Inc. with guidance in the initial stages of an actual or possible data breach. Clients are encouraged
Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team
Symantec Cyber Threat Analysis Program Symantec Cyber Threat Analysis Program Team White Paper: Symantec Security Intelligence Services Symantec Cyber Threat Analysis Program Contents Overview...............................................................................................
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Protecting Sensitive Data Reducing Risk with Oracle Database Security
Protecting Sensitive Data Reducing Risk with Oracle Database Security [email protected] Information Security Architect Agenda 1 2 Anatomy of an Attack Three Steps to Securing an Oracle Database
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge
Targeted Intrusion Remediation: Lessons From The Front Lines Jim Aldridge All information is derived from MANDIANT observations in non-classified environments. Information has beensanitized where necessary
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz) Domain.Local DC Client DomainAdmin Attack Operator Advise Protect Detect Respond
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Cloud Assurance: Ensuring Security and Compliance for your IT Environment
Cloud Assurance: Ensuring Security and Compliance for your IT Environment A large global enterprise has to deal with all sorts of potential threats: advanced persistent threats (APTs), phishing, malware
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
Click to edit Master title style
EVOLUTION OF CYBERSECURITY Click to edit Master title style IDENTIFYING BEST PRACTICES PHILIP DIEKHOFF, IT RISK SERVICES TECHNOLOGY THE DARK SIDE AGENDA Defining cybersecurity Assessing your cybersecurity
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
Cybersecurity Enhancement Account. FY 2017 President s Budget
Cybersecurity Enhancement Account FY 2017 President s Budget February 9, 2016 Table of Contents Section 1 Purpose... 3 1A Mission Statement... 3 1.1 Appropriations Detail Table... 3 1B Vision, Priorities
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
White Paper. Emergency Incident Response: 10 Common Mistakes of Incident Responders
Emergency Incident Response: 10 Common Mistakes of Incident Responders Table of Contents This white paper was written by: Michael G. Spohn Principal Consultant McAfee Foundstone Professional Services Incident
Carbon Black and Palo Alto Networks
Carbon Black and Palo Alto Networks Bring Together Next-Generation Endpoint and Network Security Solutions Endpoints and Servers in the Crosshairs of According to a 2013 study, 70 percent of businesses
Cisco Advanced Malware Protection
Solution Overview Cisco Advanced Malware Protection Breach Prevention, Detection, Response, and Remediation for the Real World BENEFITS Gain unmatched global threat intelligence to strengthen front-line
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective
Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective Reaching the Cloud era in the EU Riga 16 June 2015 Jonathan Sage Government and Regulatory Affairs Cyber Security
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Managed Services. Business Intelligence Solutions
Managed Services Business Intelligence Solutions Business Intelligence Solutions provides an array of strategic technology services for life science companies and healthcare providers. Our Managed Services
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)
Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus February 3, 2015 (Revision 4) Table of Contents Overview... 3 Malware, Botnet Detection, and Anti-Virus Auditing... 3 Malware
The Sumo Logic Solution: Security and Compliance
The Sumo Logic Solution: Security and Compliance Introduction With the number of security threats on the rise and the sophistication of attacks evolving, the inability to analyze terabytes of logs using
Gaining the upper hand in today s cyber security battle
IBM Global Technology Services Managed Security Services Gaining the upper hand in today s cyber security battle How threat intelligence can help you stop attackers in their tracks 2 Gaining the upper
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness
Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness Wayne A. Wheeler The Aerospace Corporation GSAW 2015, Los Angeles, CA, March 2015 Agenda Emerging cyber
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
eguide: Designing a Continuous Response Architecture Executive s Guide to Windows Server 2003 End of Life
Executive s Guide to Windows Server 2003 End of Life Facts About Windows Server 2003 Introduction On July 14, 2015 Microsoft will end support for Windows Sever 2003 and Windows Server 2003 R2. Like Windows
NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011
NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011 Executive Summary BACKGROUND The NYS Local Government Vulnerability Scanning Project was funded by a U.S. Department of Homeland Security
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples The
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Bio-inspired cyber security for your enterprise
Bio-inspired cyber security for your enterprise Delivering global protection Perception is a network security service that protects your organisation from threats that existing security solutions can t
Foundstone ERS remediation System
Expediting Incident Response with Foundstone ERS Foundstone Inc. August, 2003 Enterprise Risk Solutions Platform Supports Successful Response and Remediation Introduction The Foundstone Enterprise Risk
Preemptive security solutions for healthcare
Helping to secure critical healthcare infrastructure from internal and external IT threats, ensuring business continuity and supporting compliance requirements. Preemptive security solutions for healthcare
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
How We're Getting Creamed
ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for
A COMPLETE APPROACH TO SECURITY
A COMPLETE APPROACH TO SECURITY HOW TO ACHEIVE AGILE SECURITY OPERATIONS THREAT WATCH Cyber threats cost the UK economy 27 billion a year 200,000 new threats are identified every day 58% of businesses
The Sophos Security Heartbeat:
The Sophos Security Heartbeat: Enabling Synchronized Security Today organizations deploy multiple layers of security to provide what they perceive as best protection ; a defense-in-depth approach that
Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP
Session 334 Incident Management Jeff Roth, CISA, CGEIT, CISSP SPEAKER BIOGRAPHY Jeff Roth, CISA, CGEIT Jeff Roth has over 25 years experience in IT audit, security, risk management and IT Governance experience
FROM INBOX TO ACTION EMAIL AND THREAT INTELLIGENCE:
WHITE PAPER EMAIL AND THREAT INTELLIGENCE: FROM INBOX TO ACTION There is danger in your email box. You know it, and so does everyone else. The term phishing is now part of our daily lexicon, and even if
White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation
White Paper Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation Table of Contents Introduction... 3 Common DDoS Mitigation Measures...
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
How To Create An Insight Analysis For Cyber Security
IBM i2 Enterprise Insight Analysis for Cyber Analysis Protect your organization with cyber intelligence Highlights Quickly identify threats, threat actors and hidden connections with multidimensional analytics
Defence Cyber Protection Partnership Cyber Risks Profile Requirements
Good Governance L.01 Define and assign information security relevant roles and responsibilities. L.02 Define and implement a policy that addresses information security risks within supplier relationships.
Performing Advanced Incident Response Interactive Exercise
Performing Advanced Incident Response Interactive Exercise Post-Conference Summary Merlin Namuth Robert Huber SCENARIO 1 - PHISHING EMAILS... 3... 3 Mitigations... 3 SCENARIO 2 - IDS ALERT FOR PSEXEC...
Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited
Practice Good Enterprise Security Management Presented by Laurence CHAN, MTR Corporation Limited About Me Manager Information Security o o o o Policy formulation and governance Incident response Incident
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow
Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned
