Risk Analytics for Cyber Security



Similar documents
Best Practices for Vulnerability Management

Scanless Vulnerability Assessment. A Next-Generation Approach to Vulnerability Management

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

How To Manage A Network Security Risk

Next-Generation Vulnerability Management

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

IBM Security IBM Corporation IBM Corporation

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Cyber Security RFP Template

CYBER SECURITY SERVICES PWNED

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Vulnerability Management

Skybox Security Survey: Next-Generation Firewall Management

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Defending against modern cyber threats

Automated Firewall Change Management. Ensure continuous compliance and reduce risk with secure change management workflows

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Attack Your Attack Surface

Cloud Infrastructure Security Management

Vulnerability management lifecycle: defining vulnerability management

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

2015 Enterprise Vulnerability Management Trends Report

PCI DSS Overview and Solutions. Anwar McEntee

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Best Practices for Threat & Vulnerability Management. Don t let vulnerabilities monopolize your organization.

FIVE PRACTICAL STEPS

Speed Up Incident Response with Actionable Forensic Analytics

Using Risk Modeling & Attack Simulation for Proactive Cyber Security Predictive Solutions for Effective Security Risk Management

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Average annual cost of security incidents

I D C A N A L Y S T C O N N E C T I O N

BT Assure Threat Intelligence

Cybersecurity: What CFO s Need to Know

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Using Skybox Solutions to Ensure PCI Compliance. Achieve efficient and effective PCI compliance by automating many required controls and processes

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Shifting Roles for Security in the Virtualized Data Center: Who Owns What?

Update On Smart Grid Cyber Security

User s Guide. Skybox Risk Control Revision: 11

Requirements When Considering a Next- Generation Firewall

THE EVOLUTION OF SIEM

Obtaining Enterprise Cybersituational

Breaking the Cyber Attack Lifecycle

IBM Security Intelligence Strategy

2011 Forrester Research, Inc. Reproduction Prohibited

Redefining SIEM to Real Time Security Intelligence

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Metrics that Matter Security Risk Analytics

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

CYBER SECURITY, A GROWING CIO PRIORITY

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Intelligence Driven Security

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

A Primer on Cyber Threat Intelligence

McAfee Database Security. Dan Sarel, VP Database Security Products

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Address C-level Cybersecurity issues to enable and secure Digital transformation

How To Test For Security On A Network Without Being Hacked

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Digital Pathways. Penetration Testing

October 24, Mitigating Legal and Business Risks of Cyber Breaches

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

HP and netforensics Security Information Management solutions. Business blueprint

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Vulnerability Management Isn t Simple (or, How to Make Your VM Program Great)

2010 Data Breach Investigations Report

After the Attack. The Transformation of EMC Security Operations

BeyondInsight Version 5.6 New and Updated Features

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

IMPROVING RISK VISIBILITY AND SECURITY POSTURE WITH IDENTITY INTELLIGENCE

BlackStratus for Managed Service Providers

WHITE PAPER: THREAT INTELLIGENCE RANKING

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

STREAM Cyber Security

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

IBM QRadar Security Intelligence April 2013

nfx One for Managed Service Providers

Advanced Threats: The New World Order

SANS Top 20 Critical Controls for Effective Cyber Defense

Optimizing Network Vulnerability

Transcription:

Risk Analytics for Cyber Security Justin Coker, VP EMEA, Skybox Security IT Challenges 2015, Belgium 2nd October 2014 www.skyboxsecurity.com justin.coker@skyboxsecurity.com +44 (0) 7831 691498

Risk Analytics For Cyber Security 2014 Skybox Security Inc. 2

Agenda Cyber Risk - The Management Challenge Risk Analytics - Attack Surface Visibility Making Use of Risk Analytics Network Security Management Vulnerability and Threat Management 2014 Skybox Security Inc. 3

WEF Global Risks Landscape 2014 Cyber Attacks #5 Top Global Risk in Terms of Likelihood While cyberspace has proved largely resilient to attacks and other disruptions so far, its underlying dynamic has always been such that attackers have an easier time than defenders. There are reasons to believe that resilience is gradually being undermined, allowing this dynamic of vulnerability to become more impactful. 2014 Skybox Security Inc. 4

Lloyds Risk Index 2013 The World Catches Up With Cyber Risk It appears that businesses across the world have encountered a partial reality check about the degree of cyber risk. Their sense of preparedness to deal with the level of risk, however, still appears remarkably complacent. 2014 Skybox Security Inc. 5

Cyber Espionage Incidents tripled over last year s already much increased number Patch ALL THE THINGS Segment your network Stop lateral movement within your network 2014 Skybox Security Inc. 6

Enterprises are Unable to Defend Against Cyber Attacks 63,000 Hacking incidents reported in 20131 110 Million Data records lost at Target stores alone 1 9M EUR Coordinated ATM heist 2 Annual cost of cyber attacks reported by enterprise 2 Sources: 1 2013 Verizon Data Breach Report, 2 2013 Ponemon Cost of Cyber Crime Study 2014 Skybox Security Inc. 7

Security Management is Challenging Today Problems our customers face Too much output from security tools Lack of visibility across silos Maintaining continuous compliance Making agile and secure changes Understanding risk implications Evolving threat landscape 2014 Skybox Security Inc. 8

Skybox Security Overview Risk Analytics for Cyber Security Market leader. 10 years in the market Used by 6 of the top 10 global banks Powerful security management platform Clients include: 2014 Skybox Security Inc. 9

View Of The Battlefield 2014 Skybox Security Inc. 10

Attackers Understand Your Attack Surface You Don t Expansion Drivers Contraction Drivers Vulnerabilities Network segmentation Endpoints Fixing vulnerabilities Exploits Technical Controls Network Access Hours to attack, months to defend 2014 Skybox Security Inc. 11

Use Risk Analytics to Understand Your Attack Surface - Continuously Network Visibility: Topology Routing Policies Firewalls Endpoints Visibility: Software Patches Vulnerabilities Classification Attack Vectors Risk Metrics Remediation Plan Network Visualization Contextual Analysis 2014 Skybox Security Inc. 12

Models are all around us 2014 Skybox Security Inc. 13

We Combine Data from 80 Different Systems All integrated with Skybox 2014 Skybox Security Inc. 14

Our Clients Can See The Battlefield!

Network Visibility Complete understanding of network topology, segmentation and connectivity Hosts, devices, zones Firewall rules(acls) Routing, NAT, VPN Path Analysis Firewall allows port open from the internet 2014 Skybox Security Inc. 16

Scanless Vulnerability Discovery (Passive) Hosts & Network Devices System config repository Create a profile of the products Installed products, missing patches (CPE) Apply rules to extract vulnerabilities Vuln List (CVE) ~50x FASTER THAN ACTIVE SCANNER 2014 Skybox Security Inc. 17

Risk and Exposure Based Prioritization Enabling Optimal and Timely Remediation Look for Hot Spots Vulnerability Severity Vendor Security Bulletins Business Units Geo/ Tech Group Look for Attack Vectors Attack Vectors Virtual pen test Target concentrations of vulns to reduce overall risk Target specific high risk attack vectors to assets Target attack vectors against critical assets 2014 Skybox Security Inc. 19

Skybox Product Portfolio Risk Analytics Platform Network model, security context, visualization, predictive analytics, workflow, reporting, dashboards, API Vulnerability and threat intelligence Solutions Vulnerability & Threat Management Vulnerability assessment and prioritization Threat impact analysis Security Policy Management Firewall assessment and optimization Network compliance monitoring Scalable, Context-Aware, Automated, Actionable Network change management 2014 Skybox Security Inc. 20

Skybox A Critical Component of Next Gen Cyber Security Operations Center (SOC) Cyber Security Analysts IT-GRC - Integrated Security Dashboard & Reporting Risk Analytics Security Information & Event Management Security intelligence to minimise risk exposure Event monitoring to detect & respond to incidents 2014 Skybox Security Inc. 21

In Summary Risk Approach - Focus on the Attack Surface Continuous visibility of attack surface is critical Combine network and endpoint data Use analytics to examine attack vectors Integrate into Security Processes Drive automation at every step Stay ahead of the attacks 2014 Skybox Security Inc. 22

Thank you. See the Skybox solutions at our stand www.skyboxsecurity.com 2013 Skybox Security Inc. 23