Dr. Konstantinos Ap. Eleftherianos Dr. Konstantinos Papapanagiotou ISACA Athens Chapter Conference Athens 4/11/2013
Arms race Information security awareness has risen Constantly increasing number of information security experts with unparalleled expertise Security budget spending is at an all-time high But at the same time Number of security incidents is increasing. What are we doing wrong? 2
Penetration Testing 2 weeks of pen testing per year > 10 years of system and application development 3
Investments in Information Security Solutions 4
The InfoSec Landscape - Past and Present 10+ years ago Security at the perimeter: Firewall, IDS/IPS Antivirus Antispam 5-10 years ago Policies and procedures Security at the perimeter: Firewall, IDS/IPS, etc. Antivirus Antispam Hardening, Pen-testing and fixing 5
The InfoSec Landscape - Today Policies and procedures Firewall, IDS/IPS, etc. Antivirus Antispam Hardening, Pen-testing and fixing Data Loss Prevention Whole Disk Encryption Removable Disk Encryption E-mail Encryption E-Mail Security Web Security IDM/SSO Authentication/Authorization Host IDS/IPS Database Security Data Masking Vulnerability Management Network Access Control Mobile Security Event Log Management Compliance Application Security Web Application Firewall Virtualization Security Cloud Security VPN/Remote Access 6
Traditional Security Is Not Working 99% of breaches led to compromise within days or less with 85% leading to data exfiltration in the same time Source: Verizon 2012 Data Breach Investigations Report 85% of breaches took weeks or more to discover 7
Threats Evolve! 8
Security is becoming a big data problem 9
Who monitors technologies and relevant data? 10
With what Expertise? 11
So what is finally wrong / what should be done? What s wrong Although we invest in Security, we do not monitor what is happening in our infrastructure, the messages produced by security systems, etc. What should be done The need for Managed Security Services arises. 12
SIEM Needs To Evolve Into Security Analytics Gartner, Information Security is Becoming a Big Data Analytics Problem, Neil Macdonald, Mar. 23, 2012 13
Let us manage everything for you! 14
Service Architecture 15
High-Powered Analytics Monitoring and Analytics Incident Investigation Long-Term Warehouse Single platform for capturing and analyzing large amounts of network, log, and other data. Accelerate security investigations by enabling analysts to pivot through terabytes of metadata, log data, and recreated network sessions. Archive and analyze longterm security data through a distributed computing architecture. Provides built-in compliance reports covering a multitude of regulatory regimes. 16
OTE Security Offerings Consulting Services Managed Security Services Solutions 17
Your service is your SLA Service and platform availability commitment (>99.9%) Guaranteed incident notification within 15 Response to emergency assistance request within 30 Response to critical support issues within 60 Response to customer enquiries within 4 hours. 18
Advantages Infrastructure People Processes Intelligence SOC based in Greece State of the art technology 100% Greekspeaking team of certified Security Analysts Unparalleled expertise All services are governed by strict SLAs ISO 27001 certified SOC Focused insight on attacks that target Greek organizations Fully customizable services based on your needs 19
Business Value Demonstrate compliance Reduce operational cost Maximize investment on security technologies Insight on security threats and attacks Access to advanced intelligence Focus on core business processes Safeguard the enterprise Faster response and remediation 20
Thank You! Dr. Konstantinos Ap. Eleftherianos keleftherianos@ote.gr Mob.: 6974999691 Tel.: 2106118079 Dr. Konstantinos Papapanagiotou kostas.papapanagiotou@voice-net.gr Mob.: 6981238900 Tel.: 2111760119