Dr. Konstantinos Ap. Eleftherianos Dr. Konstantinos Papapanagiotou. ISACA Athens Chapter Conference Athens 4/11/2013

Similar documents
Discover & Investigate Advanced Threats. OVERVIEW

Detect & Investigate Threats. OVERVIEW

Caretower s SIEM Managed Security Services

Payment Card Industry Data Security Standard

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

The Future of the Advanced SOC

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

2012 North American Managed Security Service Providers Growth Leadership Award

RSA Security Analytics

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Getting Ahead of Advanced Threats

The SIEM Evaluator s Guide

Clavister InSight TM. Protecting Values

integrating cutting-edge security technologies the case for SIEM & PAM

IBM QRadar Security Intelligence April 2013

UiBScfs Cloud Financial Services

Vulnerability Management

IT Security Strategy and Priorities. Stefan Lager CTO Services

IBM ISS Optimizacija Sigurnosti

Data Security and Privacy Principles for IBM SaaS How IBM Software as a Service is protected by IBM s security-driven culture

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Increase insight. Reduce risk. Feel confident.

Managed Security Protection & Outsourcing Services

Q1 Labs Corporate Overview

Symantec Managed Security Services The Power To Protect

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

What is Security Intelligence?

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Securing the Service Desk in the Cloud

Ahead of the threat with Security Intelligence

A Case for Managed Security

Lot 1 Service Specification MANAGED SECURITY SERVICES

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

Changing the Enterprise Security Landscape

ClearSkies. Re-Defining SIEM

Protecting against cyber threats and security breaches

BMC s Security Strategy for ITSM in the SaaS Environment

SECURITY OVERVIEW FOR MY.ENDNOTE.COM. In line with commercial industry standards, Thomson Reuters employs a dedicated security team to protect our

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

RSA Solution Brief. The RSA Solution for Cloud Security and Compliance

Modern IT Security. Jerry Craft Sr. Security & Networking Consultant

Penetration Testing //Vulnerability Assessment //Remedy

The RSA Solution for. infrastructure security and compliance. A GRC foundation for VMware. Solution Brief

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Cyber Security. Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP

IBM Internet Security Systems products and services

Cyber Situational Awareness for Enterprise Security

Discover Security That s Highly Intelligent.

PCI Compliance for Cloud Applications

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

RMS. Privacy Policy for RMS Hosting Plus and RMS(one) Guiding Principles

Presented by Evan Sylvester, CISSP

IBM: An Early Leader across the Big Data Security Analytics Continuum Date: June 2013 Author: Jon Oltsik, Senior Principal Analyst

Logging In: Auditing Cybersecurity in an Unsecure World

Click to edit Master title style. How To Choose The Right MSSP

Security Analytics for Smart Grid

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

5 TIPS FOR MAXIMIZING THE VALUE OF YOUR SECURITY ASSESSMENT

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Securing and protecting the organization s most sensitive data

Teradata and Protegrity High-Value Protection for High-Value Data

Application Security Center overview

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Advanced Threats: The New World Order

Point-of-Sale (POS) Malware: Tactics and Strategies for Protecting Customer Payment Information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Security Camp Conference Fine Art of Balancing Security & Privacy

Securing ephi with Effective Database Activity Monitoring. HIMSS Webcast 4/26/2011. p. 1

CYBERSECURITY: ISSUES AND ISACA S RESPONSE

IBM Global Technology Services Preemptive security products and services

eguide: Designing a Continuous Response Architecture Disrupting the Threat: Identify, Respond, Contain & Recover in Seconds

KEY TRENDS AND DRIVERS OF SECURITY

Overcoming PCI Compliance Challenges

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Analyzing HTTP/HTTPS Traffic Logs

Cybersecurity: What CFO s Need to Know

Cyber Security Solutions

Security and Privacy

SOC & HIPAA Compliance

The Emergence of the ISO in Community Banking Patrick H. Whelan CISA IT Security & Compliance Consultant

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Managed Security Services for Data

A COMPLETE APPROACH TO SECURITY

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

What s New in Security Analytics Be the Hunter.. Not the Hunted

Cloud Vendor Evaluation

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

security changes with Orange focus on your business, we focus on your security

The Evolving Threat Landscape

Bio-inspired cyber security for your enterprise

Defending Against Cyber Attacks with SessionLevel Network Security

With Cloud Defender, Alert Logic combines products to deliver outcome-based security

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Transcription:

Dr. Konstantinos Ap. Eleftherianos Dr. Konstantinos Papapanagiotou ISACA Athens Chapter Conference Athens 4/11/2013

Arms race Information security awareness has risen Constantly increasing number of information security experts with unparalleled expertise Security budget spending is at an all-time high But at the same time Number of security incidents is increasing. What are we doing wrong? 2

Penetration Testing 2 weeks of pen testing per year > 10 years of system and application development 3

Investments in Information Security Solutions 4

The InfoSec Landscape - Past and Present 10+ years ago Security at the perimeter: Firewall, IDS/IPS Antivirus Antispam 5-10 years ago Policies and procedures Security at the perimeter: Firewall, IDS/IPS, etc. Antivirus Antispam Hardening, Pen-testing and fixing 5

The InfoSec Landscape - Today Policies and procedures Firewall, IDS/IPS, etc. Antivirus Antispam Hardening, Pen-testing and fixing Data Loss Prevention Whole Disk Encryption Removable Disk Encryption E-mail Encryption E-Mail Security Web Security IDM/SSO Authentication/Authorization Host IDS/IPS Database Security Data Masking Vulnerability Management Network Access Control Mobile Security Event Log Management Compliance Application Security Web Application Firewall Virtualization Security Cloud Security VPN/Remote Access 6

Traditional Security Is Not Working 99% of breaches led to compromise within days or less with 85% leading to data exfiltration in the same time Source: Verizon 2012 Data Breach Investigations Report 85% of breaches took weeks or more to discover 7

Threats Evolve! 8

Security is becoming a big data problem 9

Who monitors technologies and relevant data? 10

With what Expertise? 11

So what is finally wrong / what should be done? What s wrong Although we invest in Security, we do not monitor what is happening in our infrastructure, the messages produced by security systems, etc. What should be done The need for Managed Security Services arises. 12

SIEM Needs To Evolve Into Security Analytics Gartner, Information Security is Becoming a Big Data Analytics Problem, Neil Macdonald, Mar. 23, 2012 13

Let us manage everything for you! 14

Service Architecture 15

High-Powered Analytics Monitoring and Analytics Incident Investigation Long-Term Warehouse Single platform for capturing and analyzing large amounts of network, log, and other data. Accelerate security investigations by enabling analysts to pivot through terabytes of metadata, log data, and recreated network sessions. Archive and analyze longterm security data through a distributed computing architecture. Provides built-in compliance reports covering a multitude of regulatory regimes. 16

OTE Security Offerings Consulting Services Managed Security Services Solutions 17

Your service is your SLA Service and platform availability commitment (>99.9%) Guaranteed incident notification within 15 Response to emergency assistance request within 30 Response to critical support issues within 60 Response to customer enquiries within 4 hours. 18

Advantages Infrastructure People Processes Intelligence SOC based in Greece State of the art technology 100% Greekspeaking team of certified Security Analysts Unparalleled expertise All services are governed by strict SLAs ISO 27001 certified SOC Focused insight on attacks that target Greek organizations Fully customizable services based on your needs 19

Business Value Demonstrate compliance Reduce operational cost Maximize investment on security technologies Insight on security threats and attacks Access to advanced intelligence Focus on core business processes Safeguard the enterprise Faster response and remediation 20

Thank You! Dr. Konstantinos Ap. Eleftherianos keleftherianos@ote.gr Mob.: 6974999691 Tel.: 2106118079 Dr. Konstantinos Papapanagiotou kostas.papapanagiotou@voice-net.gr Mob.: 6981238900 Tel.: 2111760119