Gregg Gerber. Strategic Engagement, Emerging Markets



Similar documents
Dealing with Big Data in Cyber Intelligence

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Symantec Cyber Security Services: DeepSight Intelligence

Practical Threat Intelligence. with Bromium LAVA

Practical Steps To Securing Process Control Networks

Security and Privacy

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Promoting a cyber security culture and demand compliance with minimum security standards;

Digital Evidence and Threat Intelligence

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Protecting against cyber threats and security breaches

Security Analytics for Smart Grid

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

IBM Security Strategy

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

CSM-ACE 2014 Cyber Threat Intelligence Driven Environments

The session is about to commence. Please switch your phone to silent!

Breach Found. Did It Hurt?

Cyber Security Metrics Dashboards & Analytics

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Into the cybersecurity breach

How To Create Situational Awareness

Research Topics in the National Cyber Security Research Agenda

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

WHITE PAPER: THREAT INTELLIGENCE RANKING

IBM Security re-defines enterprise endpoint protection against advanced malware

Symantec Managed Security Services The Power To Protect

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Next Generation IPS and Reputation Services

Defensible Strategy To. Cyber Incident Response

Symantec Protection Center Enterprise 3.0. Release Notes

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

24/7 Visibility into Advanced Malware on Networks and Endpoints

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Next-Generation Penetration Testing. Benjamin Mossé, MD, Mossé Security

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Knowing Your Enemy How Your Business is Attacked. Andrew Rogoyski June 2014

Staying Ahead of the Cyber Security Game. Nigel Tan ASEAN Technical Leader IBM Security

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Combating a new generation of cybercriminal with in-depth security monitoring

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

How To Handle A Threat From A Corporate Computer System

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Web 2.0 and Data Protection. Paul Tsang Security Consultant McAfee

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Getting real about cyber threats: where are you headed?

Middle Class Economics: Cybersecurity Updated August 7, 2015

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

Cybersecurity and internal audit. August 15, 2014

MISSION-ESSENTIAL INTELLIGENCE AND CYBER SOLUTIONS

Cybersecurity Awareness. Part 1

EXTREME CYBER SCENARIO PLANNING & ATTACK TREE ANALYSIS

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Extreme Networks Security Analytics G2 Vulnerability Manager

Cyber Intelligence Workforce

Continuous Network Monitoring

Advanced Persistent Threats

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Gaining the upper hand in today s cyber security battle

Using big data analytics to identify malicious content: a case study on spam s

Addressing Cyber Risk Building robust cyber governance

Securing the endpoint and your data

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Integrating MSS, SEP and NGFW to catch targeted APTs

Zak Khan Director, Advanced Cyber Defence

Content Security: Protect Your Network with Five Must-Haves

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Stephen Coty Director, Threat Research

Working with the FBI

Cisco & Big Data Security

Modular Network Security. Tyler Carter, McAfee Network Security

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Protecting critical infrastructure from Cyber-attack

Transcription:

Government of Mauritius Gregg Gerber Strategic Engagement, Emerging Markets

2

(Advanced) Persistent Targeted attacks 2010 2011 2012 Time

1986-1991 Era of Discovery 1992-1998 Era of Transition 1999-2005 Era of Fame & Glory 2006 - Present Era of Mass Cybercrime Vision & Security Solution Strategy - Confidential 4

Attackers Malicious Outsiders State Nation Government Sponsored Hack-tivists Hacking for a Cause Insiders Malicious and Non-Malicious Cyber Criminals Hacking for Profit Vision & Security Solution Strategy - Confidential 5

APT Attacker (Malicious Outsider) Insider (Malicious and Non-malicious) Hack-tivist Cyber Criminals State Nation RECON Free Scanners Insider Knowledge Social Networks / Google Data Mining Espionage / Collusion INCURSION Basic Scripts /MetaSploit Privileged Access Social Engineering Attack Kits / Malcode / Bots / Affiliates Tailored Malcode / 0-Day DISCOVERY Random Targeting Asset Awareness Targets of Chance Targets of Chance / Choice Targets of Choice CAPTURE Visible / Low Value Critical Assets Media Worthy Asset or Access Monetized Assets High Value IP / Government Secrets EXFILTRATE Tagging and Damage Theft and Damage DDoS, Theft and Damage Fraud and Financial Gain Gain / Maintain Strategic Advantage Vision & Security Solution Strategy - Confidential 6

Strategy Rethink: Anatomy of an attack 1. Research 2. Incursion 3. Discovery 4. Capture 5. Exfiltrate Risk Posture and Policies Strong security awareness, counter intelligence Continuous enforcement of controls according to risk policy (mgmt and protection) Actively monitor infrastructure (endpoint to perimeter), information and users Control unusual internal movement and access of sensitive data Counter intelligence, forensics, damage mitigations and information recovery 7

IT Security pressures changing world User demands - Social Networking - Fav technology Time - to enable - to respond Reduce costs Information - Supply chain - De-perimeterisation New Tech adoption Governance Compliance Security Complexity (More controls) Threats - Volume - Type

Where Does Your Threat Intelligence Reside? Internal Targeted Attacks Are meant specific organizations They re not seen at a global level, Symantec can provide researcher-level tools & local assistance to help you detect and prevent these types of attacks Global Intelligence Network Like-minded organizations can share intelligence to help peers, some industries and agencies are not able to for National Security Reasons External 9

Symantec Cyber Threat Intelligence Cyber Awareness Cyber Briefing Center Strategist Advisories Cyber Risk Assessments Cyber Training Cyber Readiness Assessments Cyber Preparedness Security Base lining Threat Intelligence Reports Reputation Analysis Business Risk Modeling Cyber Forensics Security Base lining Incident & Event Management Threat Analysis & Response Threat Impact Assessment Cyber Response Product & Threat Analysis Support Cyber Incident Advice Cyber Threat Response Scribe January 3, 2013

What Makes Symantec Unique? 2 Million URLs 6.3 Billion Files 1.5 Million Machines Leaders in Threat Research & Technology The Biggest Organisations Trust our People & Services Provide Risk-Based Perspective Market Validation 11

Symantec Cyber Threat Intelligence Summary Government Engagement Security Intelligence Group Highly Targeted Threat Analysis Leverage Existing Investments Cyber Readiness Programs Participation in National Cyber Strategies Our Global Intelligence Network and Reputation Feeds add Threat Context to YOUR Infrastructure The Symantec s Threat Analysis Tools Used by Our Researchers Are Also Available to You to Analyze Highly Targeted Attacks Our Modular Approach means we can Leverage Investments in Your Existing Security Controls, and Demonstrate Where to allocate resources With Risk Modeling We Help you understand YOUR risks and Prepare for Cyber Threats

Attack Scenarios Economically motivated steal money/info to resell 17 th century privateering and modern cybercrime Link between crime and national security actors 13

Targets - Depend on the objective of the attacker Consumers Small Business Large Business Trusted Stepping Stone / Economic IPR / Economic / Espionage CII Operators Defense Government Economic / Intel / Warfare / Political Intel / Warfare / Political Economic / Intel / Warfare / Political 14

Modus operandi Because there is no patch for stupidity Social Engineering Unique Malware Mass Scale Targeted APT Democratization of Malware 15

Modus operandi Value of Information Jumping the Air Gap SCADA Zero-Day Vulnerabilities Smart Grid OS Intelligence 16

Specifically on defense 5th Domain of Warfare Land Sea Air Space Cyber Merge of EW and SIGINT with cyber Bletchley Park Codebreaker 17

Specifically on defense Makes sense from a military point of view Sensors, communications and robotics technologies dominating future battlefield 18

Specifically on defense Historically listen to information & deny access to information New paradigms include modifying information to create a false operational picture and damage the infrastructure, or remotely control it 19

Cyber Awareness Strategist Cyber Advisories Summary business reports defining best practices for mitigating the attack Cyber Training Cyber threat detection and incident response course (10day) Cyber Briefing Center Briefing on the latest threats, Understand the processes and techniques required to deal with today s cyber attacks Cyber Risk Assessments Information risk assessments, cyber security policy assessments Cyber Readiness Join in Symantec s Cyber war games to test and develop your skills and capability 20

Cyber Preparedness Security Base Lining Threat Intelligence Feeds & Reports Business Risk Modeling Define/validate the state of your environment & security controls Map & validate potential risks to the business & Apply controls Define/validate the state of your environment & security controls CCS Policy/Assessment Mgr. Altiris SEP/CSP Cyber V Assessments Enterprise Security Assessment CCS Vulnerability Mgr. DeepSight Feeds Reputation Feeds Threat Analyst service Vulnerability assessment CCS Risk Manager SPC Business Continuity Planning service * 21

Cyber Response Business Critical Services Cyber Incident Advisory Malware Research Cyber Threat Response Product and threat analysis support Symantec strategists help drive response process and provide business guidance Symantec Partners provide on-site expertise including forensics and other technical capabilities 24x7 Access Personalized Priority Access to Strategists Trusted Partner Ecosystem Scribe 22

Cyber Forensics In-Progress & Post Incident Security Base Lining (Re) Define/validate the state of your environment & security controls Incident/Event Management Malware Research Gather logs & event data to identify anomalous behavior Threat Analysis & Response (Technical) Identify and quantify new attacks, define and apply technical responses Threat Impact Assessment (Business) Identify the threat genealogy to assess threat actor and motives. Define potential business impact CCS Policy/Assessme nt Mgr. Altiris SEP/CSP Cyber V Assessments Enterprise Security Assessment Managed Security Services SSIM DeepSight Feeds SIM design & optimization Threat Analyst Non-classified Reputation Feeds STAR BCS - Scribe Classified Smart Harness Threat Expert Security cleared Threat Analysis Non-classified Reputation Feeds DeepSight Feeds Threat Analyst Classified Reputation Feeds Data Cache DeepSight Feeds Security cleared Threat Analyst 23

Symantec Cyber Lifecycle Offering Cyber Awareness Cyber Preparedness Strategist Advisories Cyber Risk Assessments Cyber Training Cyber Readiness Security Base Lining Threat Intelligence Feeds & Reports Business Risk Modeling Cyber SOC Tour Threat Impact Assessment Threat Analysis & Response Incident & Event Mgmt. Security Base Lining Cyber Threat Response Cyber Incident Advice BCS Cyber Forensics Cyber Response

Thank You Gregg Gerber Gregg_gerber@symantec.com @gregg_gerber