Benefits of Big Data Analytics in Security Helping Proactivity and Value Creation. June 2015



Similar documents
SANS Top 20 Critical Controls for Effective Cyber Defense

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Global Security Program Overview

ASSET Connect. The next level in Critical Environment Operational Efficiency

W H I T E P A P E R I m p a c t o f C y b e r s e c u r i t y A t t a c k s a n d N e w - A g e S e c u r i t y S t r a t e g i e s

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

INFORMATION TECHNOLOGY POLICY

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

Cybersecurity The role of Internal Audit

Cybersecurity Awareness for Executives

A COMPLETE APPROACH TO SECURITY

Can We Become Resilient to Cyber Attacks?

Protecting Organizations from Cyber Attack

HIPAA and Mental Health Privacy:

How To Manage Security On A Networked Computer System

Italy. EY s Global Information Security Survey 2013

Metrics that Matter Security Risk Analytics

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Intelligence Driven Security

Managing the Unpredictable Human Element of Cybersecurity

Audit of NRC s Network Security Operations Center

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Certified Identity and Access Manager (CIAM) Overview & Curriculum

Cloud security architecture

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Information Security Incident Management Guidelines

Lessons Learned CIP Reliability Standards

Project Management and ITIL Transitions

Service Children s Education

Employee Embezzlement and Fraud. Defending Against Insider Threats

Manage and secure your workplace by controlling who, what, when, why, where and how people are allowed in your facility. Marquee

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Stay ahead of insiderthreats with predictive,intelligent security

Summary of CIP Version 5 Standards

TENANT ACCESS COORDINATOR HANDBOOK

Root Cause Analysis Concepts and Best Practices for IT Problem Managers

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Cybersecurity. Are you prepared?

The Value of Vulnerability Management*

How-To Guide: Cyber Security. Content Provided by

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Fraud Risk Management

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Network & Information Security Policy

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

CHAPTER 1 COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)

Hands on, field experiences with BYOD. BYOD Seminar

Defending against modern cyber threats

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

The Cloud App Visibility Blindspot

Do you know your privacy risks? How new technologies, changing business models, and emerging regulations are changing the data-protection landscape

Specific observations and recommendations that were discussed with campus management are presented in detail below.

HIPAA Security Alert

Establish Collaborative Strategies to Better Manage a Global Vendor Network Devise a Proper Float Plan

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

Data Management Policies. Sage ERP Online

<COMPANY> P01 - Information Security Policy

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Data Science Transforming Security Operations

ACI Response to FFIEC Guidance

Protection & Compliance are you capturing what s going on? Alistair Holmes. Senior Systems Consultant

Security and Privacy

ITSM Maturity Model. 1- Ad Hoc 2 - Repeatable 3 - Defined 4 - Managed 5 - Optimizing No standardized incident management process exists

Provision Tech Support Frequently Asked Questions

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Business Performance & Data Quality Metrics. David Loshin Knowledge Integrity, Inc. loshin@knowledge-integrity.com (301)

SECURITY RISK MANAGEMENT

Islington ICT Physical Security of Information Policy A council-wide information technology policy. Version 0.7 June 2014

University of Brighton School and Departmental Information Security Policy

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Identity and Access. Management Services. HCL Information Security Practice. Terrorist Sabotage. Identity Theft. Credit Card Fraud

CYBER SECURITY, A GROWING CIO PRIORITY

Integrated Identity Management Whitepaper

Information Technology Engineers Examination

Music Recording Studio Security Program Security Assessment Version 1.1

Risk Options. Avoid Assume Mitigate Transfer Prevent?

Analytics: The Future of Security

With Great Power comes Great Responsibility: Managing Privileged Users

Question: 1 Which of the following should be the FIRST step in developing an information security plan?

How To Protect Decd Information From Harm

Transcription:

Benefits of Big Data Analytics in Security Helping Proactivity and Value Creation June 2015

The Security Landscape Held the door to let 5 people into the data center Who, Where, Why, For How Long & Who Authorized It? Shares credentials with temp contractors Laptop bag was stolen with badge inside Uses her badge to try to get into restricted areas Has started coming in late at night on the weekend Copied your sales database to a USB drive, just in case Lost her company badge forgot to tell you

Agenda Understanding Big Data and Predictive Analytics Proactive Risk Identification Transforming Physical Security from Reactive to Proactive Best Practices for Adopting Predictive Security Solutions Q & A

Big Data? Predictive? Behavioral? Risk-based Profiling?

Big Data Analytics Introduction Predictive analytics solutions evaluate patterns found in existing data sets to predict potential future outcomes Descriptive Analysis Predictive Analysis Ad Hoc Reports: How many, how often, where? Standard Reports: What happened? Descriptive Example: Which systems have the most alarms Forecasting/Extrapolation: What if these trends continue? Optimization: What s the best that can happen? Predictive Example: Based on the time and frequency of the alarms, which of the doors are more likely to need repair

Physical Security and Predictive Data Solutions Predictive solutions help security transition from being a reactive resource to a proactive strategic business partner 33% 31% 67% 69% More than two-thirds of Security Directors consider it important to be able to do predictive analysis to improve operational effectiveness and reduce risk According to an IDG Research survey conducted October 21-November 3, 2014. Yet, just under one-third of Security Directors have technology in place to capture predictive security metrics

Proactive Risk Identification Why this technology and why now? - Data technology has matured - Hardware cost have made it practical - Tools that connect to systems without a Herculean effort - Management Imperative

Examples Credential Fraud Policy Violations Systems Maintenance Managing Spending & Growth

What is an IOC? An IOC is an Indicator of Compromise that can be identified to a person, device (reader/site), application or network. IOCs provide early indications of bad actors, or deviation from norms that can help you identify and contain security incidents before they result in loss Sample IOCs: Multiple physical access and/or logical (IT) access denied for same person. Same badge used at different geographical locations. Tailgate derived on the basis of site/door hierarchy.

IOC Category #1: Credential Fraud Examples: Shared Credentials Lost/Stolen Credentials Why is this important? Security owns credentials need to track Need to loop in employee charged with credential Is this you? Helps keeps employees efficient Likely target for advanced adversaries

Badge Fishing High-risk identity tries to access high-risk areas (badge fishing) Actions: Automated Responses Email - Is this you? No response within 30 minutes, badge suspended Automate turning badge back on

IOC Category #2: Policy Violations When processes haven t been followed risk liabilities increase Was our audit done well? How long did you spend per person making decisions in this audit? Examples: Requesting and approving access by same person Abusing visitor system by adding same contractor day-after-day to avoid background checks

Tailgating Large number of people tailgating at the London location Actions: Remind offenders about policies Re-train personnel

IOC Category #3: Systems Maintenance Set thresholds to understand when you should repair something Measure how failing devices affect organization

Alarm Analytics Exceptionally high alarm count at a particular site Actions: Attempt to restart the device centrally Create work order

IOC Category #4: Managing Spending & Growth Letting you know about areas with high access Sub-lease extra space Temp hike due to event Shut down office Add new office High personnel growth forecast Capacity Low Med High

Facility Analytics Utilization of facilities less than 50% for each day of the week Actions: Generate utilization reports for the facilities team to take apt decision

A Smart Predictive Data Security Strategy Helps Answer: What is the source of the next possible threat? Which assets are most vulnerable and likely to be targeted? Which processes need improvement? Was our audit effective?

Best Practices for Adopting Predictive Data Solutions Identify decisions and/or actions you intend to improve Partner with systems vendor who brings expertise in your department and with your systems Look for extensible solutions that can contribute to the bigger picture Avoid generic big data solutions from vendors that don t understand security

Making Security Proactive Understand organizational risk, threats and vulnerabilities Identify key metrics Measure adherence to policy Improvement to SLAs Measure risk Measure risks in real-time Measure risk based on people s actions/behavior Use metrics to guide actions Target programs Spend efficiently

Contact Information Don Campbell Director of Product Management and Product Marketing dcampbell@quantumsecure.com

Thank you! 2014 Quantum Secure, Incorporated. All Rights Reserved. Confidential. (408) 453-1008