Chaos to Simplicity: Making Sense of the Security Marketplace. Paul Adamonis Director, Security Solutions Forsythe



Similar documents
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Barracuda Web Site Firewall Ensures PCI DSS Compliance

Voice Over IP and Firewalls

Deploying Firewalls Throughout Your Organization

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Jort Kollerie SonicWALL

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Recommended IP Telephony Architecture

Cisco ASA 5500 Series Business Edition

Best Practices for Outdoor Wireless Security

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Chapter 9 Firewalls and Intrusion Prevention Systems

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

Release the full potential of your Cisco Call Manager with Ingate Systems

The Cisco ASA 5500 as a Superior Firewall Solution

VoIP Security Challenges: 25 Ways to Secure your VoIP Network from Versign Security, Dec 01, 2006

An outline of the security threats that face SIP based VoIP and other real-time applications

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

Network Security. Intertech Associates, Inc.

Gabriel Coimbra Research & Consulting Director IDC Portugal. Porto, 29 de Maio

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Securing SIP Trunks APPLICATION NOTE.

Today's security needs in networking

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

INSTANT MESSAGING SECURITY

2010 White Paper Series. Top Ten Security Issues Voice over IP (VoIP)

Best Practices for Securing IP Telephony

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Ingate Firewall/SIParator SIP Security for the Enterprise

Readiness Assessments: Vital to Secure Mobility

Security threats and attackers are turning

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Data Security and Healthcare

Lucent VPN Firewall Security in x Wireless Networks

Achieving PCI-Compliance through Cyberoam

VoIP Security regarding the Open Source Software Asterisk

A POLYCOM WHITEPAPER Polycom. Recommended Best Security Practices for Unified Communications

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Voice over IP. VoIP (In) Security. Presented by Darren Bilby NZISF 14 July 2005

Securing a Converged Network By Steven Sullivan

IxLoad-Attack: Network Security Testing

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS

Security and Risk Analysis of VoIP Networks

VOICE OVER IP SECURITY

Our Mission. Provide traveling, remote and mobile laptop users with corporate-level security

Voice over IP Security

VoIP Resilience and Security Jim Credland

Introduction to Cyber Security / Information Security

How are we keeping Hackers away from our UCD networks and computer systems?

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Next Generation IPv6 Network Security a Practical Approach Is Your Firewall Ready for Voice over IPv6?

CompTIA Security+ (Exam SY0-410)

Section 12 MUST BE COMPLETED BY: 4/22

Voice Over IP (VoIP) Denial of Service (DoS)

Cisco ASA 5500 Series Unified Communications Deployments

FIREWALLS & CBAC. philip.heimer@hh.se

How To Prevent Hacker Attacks With Network Behavior Analysis

Fortinet Solutions for Compliance Requirements

Voice over IP (VoIP) Vulnerabilities

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cconducted at the Cisco facility and Miercom lab. Specific areas examined

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Security Guidance for Deploying IP Telephony Systems

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Clavister InSight TM. Protecting Values

Choose Your Own - Fighting the Battle Against Zero Day Virus Threats

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

agenda 5 IBM ISS security consulting solutions 6 Reduzca costos y la complejidad de la seguridad en su negocio

ICANWK406A Install, configure and test network security

Firewalls, Tunnels, and Network Intrusion Detection

Voice Over Internet Protocol (VOIP) SECURITY. Rick Kuhn Computer Security Division National Institute of Standards and Technology

INTRODUCTION TO FIREWALL SECURITY

Payment Card Industry Data Security Standard

Maintaining Strong Security and PCI DSS Compliance in a Distributed Retail Environment

Networking for Caribbean Development

Cisco ASA 5500 Series Content Security Edition for the Enterprise

Application Note. Onsight TeamLink And Firewall Detect v6.3

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

When it Comes to Monitoring and Validation it Takes More Than Just Collecting Logs

VoIP Security Threats and Vulnerabilities

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Cyber Security Awareness

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Multi-layered Security Solutions for VoIP Protection

Introduction (Contd )

VoIP Time to Make the Call? Abstract

Permeo Technologies WHITE PAPER. HIPAA Compliancy and Secure Remote Access: Challenges and Solutions

Internet Content Provider Safeguards Customer Networks and Services

Top five strategies for combating modern threats Is anti-virus dead?

A Brief Overview of VoIP Security. By John McCarron. Voice of Internet Protocol is the next generation telecommunications method.

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Bendigo and Adelaide Bank Ltd Security Incident Response Procedure

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Name: Position held: Company Name: Is your organisation ISO27001 accredited:

CS5008: Internet Computing

Transcription:

Chaos to Simplicity: Making Sense of the Security Marketplace Paul Adamonis Director, Security Solutions Forsythe 1

What Will Be Covered Market Trends What Security Vendors Do Security Vendor Framework IPT Security Measures 2

Webster Definition Definition of Chaos Chaos: (kā ŏs) n. A State or place of total confusion and disorder. Conventional Wisdom KAOS: Killing and Other Stuff 3

Regulatory pressures are creating a storm of compliance issues 4

Market Trend Viruses and Threats are constantly mutating! 5

Market Trend Information Security is dependent on Physical Security Tapes are missing!! My laptop was stolen! 6

Market Trend It is harder to determine what is a legitimate user 7

2006 Breaches in the news May 22 Department of Veterans Affairs 28.6 Million Veterans June 2006 Net2Phone VoIP Scam Millions in revenue, 15 companies affected June 2 YMCA, Providence RI 65,000 members with health information July 5, - Bisys Group, Roseland NJ 61,000 hedge fund investors Total number of Individuals affected since Feb 15, 2005 Over 88 Million!! 8

Typical Company Response We have to do something NOW! Stop the bleeding Respond to Chaos Identify the issues Determine need Research vendor solutions Square peg into a round hole Add management to someone s role 9

Anti-Spam Two Factor Authentication Spyware Patch Management IM Content Control Endpoint Security Email Encryption File Encryption URL Filtering Security Event/Incident Management Intrusion Prevention Media/Tape Encryption Band Aids and Solutions Biometrics Data Loss Prevention Single Sign On Firewall VPN Anti-Virus Integrated Appliances Application Firewalls Database Encryption SSL VPN Compliance Monitoring Wireless Identity Provisioning Storage Encryption AND MORE! 10

Security Vendor Chaos There are a multitude of Security Vendors in the market today. 11

Security Vendor Consolidation $16 Billion Security market Remove the top 5-10 vendors Left with $12 Billion over 600 vendors = $20 million per vendor Result: Departures and Convergence RSA Security bought by EMC CipherTrust Merges with Secure Computing ISS rumored to be bought by IBM 12

Point to Ponder I do not think that the wireless waves I have discovered will have any practical application Heinrich Rudolf Hertz 13

Security Vendor Framework Why is it needed Proper Approach Value of structured approach 14

Categorize the Need Advice People s Sales Take Not Do Please Application Presentation Session Transport Network Data Physical Host Layers Media Layers 15

Turning the Security Program Rightside Up Technology Standards Technology Standards Policy Policy Strategy Strategy 16

Where Do Enterprises Start? Security Assessments: set a baseline Identify risks, threats, vulnerabilities, current state, define strategy Security Program: make a statement Charter, Policy, Standards, Procedures, Guidelines Awareness and training, user education Security Architecture: apply technology Solutions and products for specific security areas Monitoring, detection and incident response 17

Information Security Governance EXTERNAL VARIABLES Fiduciary Responsibility Regulatory Compliance Threats & Vulnerabilities Standards and Frameworks Business Risk Management INTERNAL VARIABLES Business & IT Initiatives Corporate Objectives Existing Security Controls Internal Audit Security Modeling (Framework & Strategy) Awareness Policy Collaborative Administration Standards & Procedures Incident Management Infrastructure Change Control Monitoring and Risk Assessment 18

Solid Security Approach 19

Anti-Spam Two Factor Authentication Spyware Patch Management IM Content Control Endpoint Security Email Encryption File Encryption URL Filtering Security Event/Incident Management Intrusion Prevention Media/Tape Encryption Categorize Your Vendors Biometrics Data Loss Prevention Single Sign On Firewall VPN Anti-Virus Integrated Appliances Application Firewalls Database Encryption SSL VPN Compliance Monitoring Wireless Identity Provisioning Storage Encryption 20

Current Security Technologies Anti-Spam Spyware IM Content Control URL Filtering Data Loss Prevention Anti-Virus Biometrics Two Factor Authentication Single Sign On Identity Provisioning Compliance Monitoring Security Event/Incident Management Content Identity Security Program Firewall VPN Integrated Appliances SSL VPN Intrusion Prevention Wireless Application Firewalls Email Encryption Database Encryption Patch Management Endpoint Security File Encryption Media/Tape Encryption Storage Encryption Network Application Host 21

Security Vendor Framework Information Security Governance Compliance Requirements Content Host Application Identity Network Security Program Data Generated or Requested by a User Endpoint Assets: Desktops, Servers, Storage, Handhelds Programs/Access for employees, partners, and customers User Provisioning, Access, and Control Infrastructure Protection Reporting, Compliance, Audit and Enforcement of Policy 22

Point to Ponder Intelligence is the ability to adapt to change. Stephen Hawking 23

Current VoIP Attacks HTTP Skype MGCP Long Endpoint NetMeeting Directory Traversal H225 Invalid Field DoS CiscoSccp Invalid MessageID MGCP Long Tid H225 Invalid Length DoS Cisco H23 Overflow H323 Detected SIP Long Header Name H225 Signaling Message SIP Large Content Length Protos H225 Attack Tool H225 Suspicious Field Length SIP Blank Header Value SIP Long Method Name SIP Unknown Method Name MGCP LongField STUN Message STUN KPhone DoS Cisco Sccp Message Underflow Cisco Open Receive Channel Cisco CallMgrDB DoS Cisco CallMgrDB Bo SIP Content Length Mismatch SIP Large Max Forwards HTTP Skye Callto Overflow Cisco Start Media Transmission Cisco Stop Media Transmission 24

Security Framework Best Practices 1. Maintain Current Patch Levels Inadequate patching exposes risk, unnecessary. 2. Install Anti-Virus Goes without mentioning 3. Apply Intrusion Detection/Prevention Systems Current/emerging threats Worms, trojans, spyware, etc. Call processing environment 4. Install Application Gateways between trusted/untrusted zones Specific read/interpret/act Monitor legitimate/bogus call set ups. H.323/MGCP call registration SIP media stream, dynamic assigned port changing per call 25

Security Framework Best Practices 5. Enforce SIP security by AAA and IPSec Monitoring/Spoofing/Registration Hijacking AAA and IPSec/VPN 6. Establish Policy Based Security Zones Isolate call processing 7. VoIP over VPN Reduce chances of eavesdropping in un-trusted portions of network. 8. Use VLAN s to prioritize and protect voice from data network attacks. Prevent and prioritize 26

Security Framework Best Practices 9. Apply encryption selectively Consider encrypting signaling and/or media streams. Use selectively, not as broad policy. Performance? 10. Protect against UDP flooding Enable UDP flood protection (firewall) feature. 11. Develop holistic security policy Documentation of security policies and procedures. Monitor computing resources constantly. Disable unneeded services on all VoIP components. 27

Point to Ponder Before I came here I was confused about this subject. Having listened to your lecture I am still confused, but on a higher level. Enrico Fermi 28

QUESTIONS? Contact: Paul Adamonis Director, Security Solutions padamonis@forsythe.com 847-213-7360 29