Intelligence Driven Security



Similar documents
Best Practices to Improve Breach Readiness

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

Security Analytics for Smart Grid

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

The session is about to commence. Please switch your phone to silent!

Advanced Threats: The New World Order

Security Operations. Key technologies for your Security Operations Center. Davide Veneziano - RSA Technology Consultant

Defending against modern cyber threats

Caretower s SIEM Managed Security Services

RSA Security Analytics

Accenture Cyber Security Transformation. October 2015

IBM QRadar Security Intelligence April 2013

Logging In: Auditing Cybersecurity in an Unsecure World

Italy. EY s Global Information Security Survey 2013

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Continuous Network Monitoring

The Five W's of SOC Operations. Kevin

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Concierge SIEM Reporting Overview

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

IBM Security IBM Corporation IBM Corporation

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

SIEM Implementation Approach Discussion. April 2012

Rashmi Knowles Chief Security Architect EMEA

The webinar will begin shortly

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

High End Information Security Services

How To Create Situational Awareness

Enabling Security Operations with RSA envision. August, 2009

THE EVOLUTION OF SIEM

SANS Top 20 Critical Controls for Effective Cyber Defense

Evolution Of Cyber Threats & Defense Approaches

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Critical Controls for Cyber Security.

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

FIVE PRACTICAL STEPS

Metrics that Matter Security Risk Analytics

Ecom Infotech. Page 1 of 6

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Security strategies to stay off the Børsen front page

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Advanced Threat Protection with Dell SecureWorks Security Services

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Security Business Intelligence Big Data for Faster Detection/Response

Vulnerability Management

End-user Security Analytics Strengthens Protection with ArcSight

The Role of Security Monitoring & SIEM in Risk Management

Cybersecurity The role of Internal Audit

Discover & Investigate Advanced Threats. OVERVIEW

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Defending Against Data Beaches: Internal Controls for Cybersecurity

Detect & Investigate Threats. OVERVIEW

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

The Next Generation Security Operations Center

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

D. Grzetich 6/26/2013. The Problem We Face Today

QRadar SIEM and FireEye MPS Integration

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

IBM SECURITY QRADAR INCIDENT FORENSICS

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

MassMutual Cyber Security. University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management

IBM Security QRadar SIEM Product Overview

QRadar SIEM and Zscaler Nanolog Streaming Service

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

An enterprise grade information security & forensic technical team

What s New in Security Analytics Be the Hunter.. Not the Hunted

Unified Security, ATP and more

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

White Paper. Emergency Incident Response: 10 Common Mistakes of Incident Responders

Data Science Transforming Security Operations

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

IBM Security Intelligence Strategy

Continuous Cyber Situational Awareness

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

Protecting critical infrastructure from Cyber-attack

Transcription:

Intelligence Driven Security RSA Advanced Cyber Defense Workshop Shane Harsch Senior Solutions Principal, RSA 1

Agenda Approach & Activities Operations Intelligence Infrastructure Reporting & Top Findings 2

Present Reality The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him. - Sun Tzu, The Art of War 3

Objective Readiness Completely prepared for immediate action Responsiveness The ability to adjust quickly to suddenly altered conditions Resilience The ability to return to the original state after an incident 4

Focus Areas Operations Infrastructure Intelligence Business & Risk Alignment Organization Structure, Roles & Responsibilities Incident Handling processes & procedures Education & Awareness Vulnerability Assessment & Remediation Capabilities SIEM, DLP, IAM & GRC Posture and Application Ingress/Egress/Lateral Visibility Capabilities Cyber Intelligence Trending & Analytics APT Modeling & Simulation Counter Threat Operations + Attack Sensing & Warning 5

Evaluation Criteria Contribution (binary) Maturity (scaled) Readiness Responsiveness Resilience 0 Non-Existent Management processes are not applied at all 1 Initial/Ad-Hoc Processes are ad hoc and disorganized 2 Repeatable But Intuitive Processes follow a regular pattern 3 Defined Process Processes are documented and communicated 4 Managed & Measurable Processes are monitored and measured 5 Optimized Good practices are followed and automated 6

Additional Activities Marketing Legal Network Facilities Storage Other IT Profile PR disclosure readiness Brand impact analysis Map relations with law enforcement and third parties, etc. Architecture and Topology Segmentation and Zoning Profile SOC layout Determine upgrade requirements Business Continuity Planning Back-up, Recovery & Archiving Big Data Analysis Ticketing 7

Business & Risk Alignment Review of organizational mission and security strategy 8

Organizational Structure User Personas Threat Intel Analyst L1 Analyst L2 Analyst SOC Analysts SOC Manager Persona Driven Design CISO/CSO SOC Management CIO Business Mgr. Privacy Officer Compliance Legal HR Cross Functional Teams Incident Management Threat Intelligence Management Breach Management SOC Program Management IT Security Risk Management 9

Incident Response Review of roles, responsibilities and workflow 10

People & Process 11

Defense-In-Depth Review of traditional and advanced countermeasures Review of overall defense-indepth capabilities, including traditional security countermeasure & capabilities Enables Breach Management to be considered within the larger context of the organizations overall security posture Source: CyberEdge Group, 2014 12

Content Intelligence Review of capabilities for collecting controls intelligence SIEM DLP Packet Data Host Data File Data Security Controls Data Parsing & Correlation Content Intelligence Getting the right data from the right controls! 13

Analytic Intelligence Review of capabilities for analyzing actionable intelligence Example: Proactive traffic review for unusual country destinations, actions and host names e.g. Analysis of traffic going to Russia and finding POST actions for aus-post.info Malware dropper downloaded Malware analyzed in sandbox Bogus certificates & beaconing confirmed Analytic Intelligence results in IOCs Downloader site C2 site Self signed certificate (named mojolicious ) Destination IP addresses for Downloader & C2 14

Threat Intelligence Review of capabilities for tracking adversary intelligence 15

A journey with many intersections Networking Policy Analytics Log Data Intelligence Alerting Staffing Cloud Facilities Big Data Baselining Reporting Access Controls Workflow 16

Security Operations If you cannot measure it, you cannot manage it. - Ancient Business Proverb 17

Reporting & Metrics Review of metrics tracking process and capabilities Source: NIST SP 800-55 Performance Measurement Guide Metrics include: SIEM Maturity level; Incident Response; Vulnerability Management; Patch Management ; Configuration & Change Management; Application Management, etc. 18

Top Gaps People Inadequate security resources R&R not clearly defined No user awareness training for advanced threats Process Ad hoc processes/procedures Poor patch management No post-incident lessons learned Technology No IR tracking/workflow system No centralized or real-time monitoring/alerting No forensic analysis capabilities No cyber threat intelligence capability 19

Security Objective Readiness Responsiveness Resilience People Process Technology 20

Intelligence Driven Infrastructure A/V IDS/IPS Firewall/VPN Proxy DLP Content SIEM Log Alerts DLP Alerts Visibility Single UI Incident Management & Reporting Context Business Context Risk Context Line of Business Owner Policy Assessments Criticality Vulnerability Packets Host File Signatureless Alerts Threat Context Subscriptions Community Open Source Workflow & Automation, Rules, Alerts & Reports Content Intelligence Level 1 Triage Level 2 Triage Analytic Intelligence Expertise Level 3 Triage Threat Triage Threat Intelligence 21

Q&A 22