The business Side of threat Intelligence. Cyber Squared Inc.



Similar documents
Threat Intelligence Platforms: The New Essential Enterprise Software

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Unified Security, ATP and more

Integrating MSS, SEP and NGFW to catch targeted APTs

Threat Intelligence Buyer s Guide

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

Requirements When Considering a Next- Generation Firewall

Advanced Threat Protection with Dell SecureWorks Security Services

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Obtaining Enterprise Cybersituational

What is Cyber Threat Intelligence and why do I need it?

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

The session is about to commence. Please switch your phone to silent!

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Defending Against Cyber Attacks with SessionLevel Network Security

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Dealing with Big Data in Cyber Intelligence

Security Information & Event Management (SIEM)

The SIEM Evaluator s Guide

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

How to Use Cyber Threat Intelligence in my Workflows?

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

The Sophos Security Heartbeat:

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

RSA Security Analytics

WHITE PAPER: THREAT INTELLIGENCE RANKING

Unified Security Management and Open Threat Exchange

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

You ll learn about our roadmap across the Symantec and gateway security offerings.

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Cyber Threat Management platform. Defense against known and unknown threats

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Redefining SIEM to Real Time Security Intelligence

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Intelligence Driven Security

Symantec Cyber Security Services: DeepSight Intelligence

FIVE PRACTICAL STEPS

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Developing Cyber Threat Intelligence or not failing in battle.

Don t let your SIeM become your Nightmare!

Cyber Security Metrics Dashboards & Analytics

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

The Next Generation Security Operations Center

Cybersecurity Enhancement Account. FY 2017 President s Budget

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

2011 Forrester Research, Inc. Reproduction Prohibited

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

THREAT INTELLIGENCE PLATFORMS Everything You ve Ever Wanted to Know But Didn t Know to Ask.

SANS Top 20 Critical Controls for Effective Cyber Defense

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Combating a new generation of cybercriminal with in-depth security monitoring

Risk Analytics for Cyber Security

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

US-CERT Year in Review. United States Computer Emergency Readiness Team

Vulnerability Management

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

North American Electric Reliability Corporation (NERC) Cyber Security Standard

The Business Justification for Cyber Threat Intelligence. How advanced intelligence improves security, operational efficiency and strategic planning

Zak Khan Director, Advanced Cyber Defence

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

THE EVOLUTION OF SIEM

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

The Changing Nature of Risk and the Role of Big Data

The Emergence of Security Business Intelligence: Risk

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Are you prepared to be next? Invensys Cyber Security

Security Analytics for Smart Grid

Cisco Remote Management Services for Security

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

All about Threat Central

Practical Threat Intelligence. with Bromium LAVA

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Advanced Threats: The New World Order

Microsoft s cybersecurity commitment

Find the needle in the security haystack

The Comprehensive National Cybersecurity Initiative

Transcription:

The business Side of threat Intelligence 1

WhoAm I? CEO of CyberSquared Inc., the company behindthreatconnect TM. Founding member of the company, started in 2011. Experience inprogramming, network security, penetration testing, cryptography design & cryptanalysis, identity and access control, and a detailed expertise in information security. 2

BusinessNeed Every other part of the business has evolved to necessitate a Enterprise Security platform to increase productivity and measure effectiveness. Marketing 2015 Support/Helpdesk Finance/HR ERP/Manufacturing CRM/Sales 1980 s 3

TM ForumCatalyst Phase 2 Goingbeyond: ThisThreat Intelligence stuffis a greatidea! : AT&T, Bell Canada, Birmingham City University,cVidya,ThreatConnect,Edge Technologies, EMC/RSA, MITRE, Orange, Security Fabric Alliance, Symantec, Telecom New Zealand, Telstra, and the UK MOD sdefencescience and Technology Laboratory (DSTL). TM ForumSharing Threat Intelligence Catalyst Phase 2 Phase 1: Sharing Threat IntelligenceArchitecture &Whitepaper Phase 2:Defined SecurityPersonnel Personas Phase 2: Produced Threat Intelligence ROI Calculator Phase 2: Demonstration showing successful implementationof ThreatIntelligence sharing in support of asophisticated Distributed Denial of Service (DDoS)use case. 4

What Makes goodthreat Intelligence? Lifecycle Attributes to Measure Threat Intelligence: Accurate Aligned with your requirements Integrated Predictive Relevant Tailored Timely Source: Rick Holland (Principal Forrester Analyst) Blog Post Titled Actionable Intelligence, Meet Terry Tate, Office Linebacker 5

Day in the life Infrastructure Discovery Open Source Shared Threat Intelligence TTP Awareness Reports to Executives Analysis Asset Tracking Persona SIEM Adversary Tracking Data Geopolitical Context Data Correlation Incident Response Courses of Action Analyst Mitigation Planning Exploit Email Vector Analysis Protocol Analysis Signature Management Security Controls Malware Analysis 6

More than a feed:platform & Process Analyst Aggregate Analyze Act Diamond Methodology Multiple Sources Knowledge Management Communities Automation Robust API Workflow Data Visualization Enterprise Integrations Control 7

ROIof Threat Intelligence Threat Intelligence Security Investment Cost Knowledge Assumptions + = Existing Automate Collaborate 8

Securityprocesses Calculator Example: 8 Step Incident Response Process: Identify the Intrusion Step 1:Create and task defensive signatures Step2:Maintainawareness of adversary changes to Threat Activity/Infrastructure Scope the Intrusion Step3:Performexploit/malware analysis Step4:Updatesignature base Step5:Linkactivity to any known groups of related activity Mitigate/Step the Intrusion Step6:Take action to cut off intruder access to the network Step7:Monitor for changes inthreat Activity Strategically React to Threats Step8:Generate reports on Threat trends for executives 9

Find morethreats,faster Analyst IR and Threat Correlation Tasks Time Comparison: withand without TI Threat Discovery andfocusedpursuitactivities 4x/Day Spearphish Email Analysis and Conviction 1x/Day Malware Correlation with past targeting 4x/Day Analyze, Correlate, Database New Domains, IP Addresses,RegistrantInfo 5x/Day Track Malicious Domains, IP addresses, Registrant Info 100x/Day 10

UserTypes I need to protect corporateassetsbut don t have the resources I need to make my organization better and reduce my risk I need to find what I m looking for faster I need to coordinate what I m finding with everyone else I need to make my threat analysis faster, easier, and morethorough 11

Assumptions Process Assumptions: PersonaCosts What is the hourly cost per Persona? Steps What are steps of the security process? Personas Involved Who are the actors of the process? Knowledge Assumptions (Defined Per Process Step): Existing How likely is it that you will find knowledge in a finished state when you need it? Automation How much efficiency is gained via automation? Collaboration What is the efficiency gained by working with others? Cost Assumptions: Incidents per Year How many events will you have that require process? Average Cost of anintrusion What is the average cost of an intrusion? 12

Modeling Hourly Cost per Persona Collaboration Automation Make Assumptions Existing Model & Measure Potential Cost of Compromise V1.0 contributed to TM Forum for incorporation to Fx13.5 release 13

Results (from sample) Measurement Topics Type Value Time Commitment to understand Threat to business operations Hours 200 Lower Costs to obtain a larger understanding of the threat $$ Savings $33,450 Obtain insights that would not be otherwise obvious (from existing knowledge) Insights 37% Increase Automation to increase efficiencies Efficiency 45% Increase insights due to collaboration Additional Insights 2% Total Efficiencies from applying CTI Total Efficiency/Insights 84% Number of Incidents per Year 5 Projected Annual Cost without CTI $199,000 Projected Annual Cost with CTI $31,750 Projected Annual Savings $167,250 Savings Percentage 84% 14

Collaboration is powerful! Each Organization hastheir own Peer to private data Peercollaborationbetweenorganiza tions MultipleTrustedCommunities 15

Taking Action Prioritize Understand Threats to your Organization Learn Defend Plan 16

ThreatIntelligencePlatform Aggregate Act Commercial SOC SIEM Incid Open Source CISO/ CIO Analyze ent Resp onse IPS/IDS, Firewalls Communities Malw are Threa t Gateways Analy Analy Sharing sts IT/ Compli sts Endpoint, Response Internal ance DLP, NAV Automate 17

Take away Youdon thave a choice Cyber Threat Intelligence starts withunderstanding Your Needs Sharing is a newparadigmin cyber security This calculatorhelps you measuresomething that historically has not been measured Youneed apowerful platformtomanage allthe data 18

Thank you & Questions Download the Threat Intelligence Sharing ROI Calculator from: http://bit.ly/threatcalc Visit www.threatconnect.com for more information. Adam Vincent,CEO, avincent@cybersquared.com 19