Countering Insider Threats Jeremy Ho



Similar documents
Improving Business Outcomes: Plug in to Security As A Service Adrian Covich

Integrating MSS, SEP and NGFW to catch targeted APTs

Find the needle in the security haystack

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Cyber and Mobile Landscape, Challenges, & Best Practices

Secure Your Mobile Workplace

Symantec Managed Security Services The Power To Protect

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Securing OS Legacy Systems Alexander Rau

Payment Card Industry Data Security Standard

IBM QRadar Security Intelligence April 2013

Under the Hood of the IBM Threat Protection System

How To Get A Cloud Service For A Small Business

INFORMATION PROTECTED

#ITtrends #ITTRENDS SYMANTEC VISION

Streamlining Web and Security

Big Data in Action: Behind the Scenes at Symantec with the World s Largest Threat Intelligence Data

Protecting the Infrastructure: Symantec Web Gateway

UP L13: Leveraging the full protection of SEP 12.1.x

Unified Security, ATP and more

Better Together: Microsoft Office 365 & Symantec Office 365

Defending Against Data Beaches: Internal Controls for Cybersecurity

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

ITAR Compliance Best Practices Guide

AB 1149 Compliance: Data Security Best Practices

Risk and threats everywhere, all the time

Evolving Threat Landscape

You ll learn about our roadmap across the Symantec and gateway security offerings.

Security Management. Keeping the IT Security Administrator Busy

Securing the endpoint and your data

Innovations in Network Security

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Security Intelligence

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Security.cloud Configuring DLP on to your flow and applying security to your hosted deployment

Advanced Threat Detection: Necessary but Not Sufficient The First Installment in the Blinded By the Hype Series

Finding Security in the Cloud

Data Center security trends

On and off premises technologies Which is best for you?

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Internet threats: steps to security for your small business

OVERVIEW. Enterprise Security Solutions

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Symantec Endpoint Security Management Solutions Presentation and Demo for:

43% Figure 1: Targeted Attack Campaign Diagram

Quarterly Report: Symantec Intelligence Quarterly

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Extreme Networks Security Analytics G2 Vulnerability Manager

CA Host-Based Intrusion Prevention System r8.1

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

The webinar will begin shortly

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

White Paper. What the ideal cloud-based web security service should provide. the tools and services to look for

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

Symantec Mobile Security

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

Beyond the Hype: Advanced Persistent Threats

IBM Security X-Force Threat Intelligence

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

How To Secure Your System From Cyber Attacks

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

IC L10: Seamless Encryption of Data Sync'ing to Dropbox Using Symantec File Share Encryption

The Impact of HIPAA and HITECH

The Hillstone and Trend Micro Joint Solution

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

Best Practices for a BYOD World

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Protecting against cyber threats and security breaches

Public, Private, Hybrid:

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Defending Against Cyber Attacks with SessionLevel Network Security

IBM Global Technology Services Preemptive security products and services

IBM Security QRadar Vulnerability Manager

Symantec Consulting Services

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Symantec Advanced Threat Protection: Network

Symantec Enterprise Vault.cloud Giovanni Alberici

Clavister InSight TM. Protecting Values

How To Test For Security On A Network Without Being Hacked

INTRODUCING isheriff CLOUD SECURITY

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Symantec Protection Suite Enterprise Edition for Servers Complete and high performance protection where you need it

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Symantec Brightmail Gateway Real-time protection backed by the largest investment in security infrastructure

Small and Midsize Business Protection Guide

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Symantec Cyber Security Services: DeepSight Intelligence

Transcription:

Countering Insider Threats Jeremy Ho Strategic Sales Group (ASEAN) 1

CONFIDENTIAL Key Challenges Impacting Organization Today REGULATORY COMPLIANCE Rising Data Volumes Changing Requirements Prioritization Challenges Countering Insider Threats 2

The faces of Threats to Information Security It s about people Well-meaning Insiders Malicious Insiders Malicious Outsiders Countering Insider Threats 3

Symantec knows Data Loss Trends, News & What s at Stake 88% experienced data loss 59% of employees leave with data $7.2 million average cost of a breach Legal & compliance penalties A corporate black eye Symantec Data Loss Prevention 5

Accidental Insider Threats 1. Employees respond to phishing emails and disclose confidential information. 2. Employees to get malware infections that disclose account credentials. 3. Employees to lose laptops, PDAs or other devices that contain confidential information. Protecting Your Crown Jewels - How SCSP Does It 6

Threat Landscape Social Networking + Social Engineering = Compromise More Info: Detailed review of Social Media threats available in The Risks of Social Networking Hackers have adopted social networking Use profile information to create targeted social engineering Impersonate friends to launch attacks Leverage news feeds to spread spam, scams and massive attacks The Evolving Threat Landscape: Web, Spam and Phishing Attacks 7

What Can We Do About It? Well-meaning Insiders Malicious Insiders Malicious Outsiders Countering Insider Threats 9

Symantec Approach People + Process + Technology PEOPLE PROCESS TECHNOLOGY Requires solutions training, incident response and appropriate defenses that address all three areas 10

The Core IT Security Develop and Enforce IT Policies Protect the Information Authenticate Identities Manage Systems Protect the Infrastructure Changing Threat Landscape August 2011

Symantec is Focused on Meeting These Challenges Develop and Enforce IT Policies Protect the Information Authenticate Identities Manage Systems Control Suite Data Loss Prevention Suite and Encryption VeriSign Identity and Authentication IT Suite Protect the Infrastructure Symantec Suites

Defense in Depth (DiD) A concept as old, or older, than moats and drawbridges Definition: The siting of mutually supporting defense positions designed to absorb and progressively weaken attack, prevent initial observations of the whole position by the enemy, and to allow the commander to maneuver his reserve Defense in Depth 14

Security Policy Security Client Messaging Server File Server Application Server Database Server

Information Policy Security Policy Information Archiving Security Client Messaging Server File Server Application Server Database Server

Information Policy Security Policy Information Archiving Security Endpoint FW, AV, HIPS/HIDS, Device and App Control Client Messaging Server File Server Application Server Database Server

Information Policy Security Policy Information Archiving Security User Authentication 2-Factorr MPKII Encryption Full Disk, Pre-Boot Auth Removal Storage Endpoint FW, AV, HIPS/HIDS, Device and App Control Client Messaging Server File Server Application Server Database Server

Help Desk Legal Dept Security Information Event Logging Log Consolidation Correlation! Information Policy Security Policy Information Archiving Security User Authentication 2-Factorr MPKII Encryption Full Disk, Pre-Boot Auth Removal Storage Brightmail Message Security Traffic Shaping Anti-Spam / Virus Data Loss Prevention Discovery Detection Workflow Webgateway Malware URL Filtering Endpoint FW, AV, HIPS/HIDS, Device and App Control Client Messaging Server File Server Application Server Database Server

Help Desk Legal Dept Security Information Event Logging Log Consolidation Correlation! Control Suite Policy View Infrastructure View Risk View Information Policy Security Policy Information Archiving Security User Authentication 2-Factorr MPKII Encryption Full Disk, Pre-Boot Auth Removal Storage Brightmail Message Security Traffic Shaping Anti-Spam / Virus Data Loss Prevention Discovery Detection Workflow Webgateway Malware URL Filtering Endpoint FW, AV, HIPS/HIDS, Device and App Control Client Messaging Server File Server Application Server Database Server

Symantec Services Security Assessments to Reveal Gaps in DATA LOSS RISK ASSESSMENT MALICIOUS ACTIVITY ASSESSMENT SECURITY AWARENESS PROGRAM ADVISORY SERVICES Penetration Testing Vulnerability Assessment Security Program Assessment Advanced Persistent Threats: Cutting Through the Hype 22

Intelligence sources Lots of information Internet Security Threat Report (ISTR) - Annual Interim ISTR Deep Dive Reports (1 2 per year) - Rogueware applications - Web Attack Toolkits & Malicious Websites Quarterly Intelligence Updates - Speeds and Feeds update Security Response Blog - Dozens of articles each month written by analysts http://www.symantec.com/connect/symantec-blogs/sr Business Security Response Website - >25% of all symantec.com traffic is to a Response page http://www.symantec.com/ 24

Thank you! Jeremy_Ho@Symantec.com Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This document is provided for informational purposes only and is not intended as advertising. All warranties relating to the information in this document, either express or implied, are disclaimed to the maximum extent allowed by law. The information in this document is subject to change without notice. 25