Obtaining Enterprise Cybersituational



Similar documents
How To Manage Security On A Networked Computer System

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Critical Security Controls

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Vulnerability Management

Extreme Networks Security Analytics G2 Vulnerability Manager

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

IBM SECURITY QRADAR INCIDENT FORENSICS

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Continuous Network Monitoring

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

SANS Top 20 Critical Controls for Effective Cyber Defense

Update On Smart Grid Cyber Security

THE TOP 4 CONTROLS.

IBM Security QRadar Vulnerability Manager

What is Security Intelligence?

Attack Intelligence: Why It Matters

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Patch and Vulnerability Management Program

Management (CSM) Capability

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Cisco Security Optimization Service

Symantec Cyber Security Services: DeepSight Intelligence

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Enterprise Security Tactical Plan

Security Issues in Cloud Computing

Cybersecurity Awareness for Executives

FREQUENTLY ASKED QUESTIONS

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

Q1 Labs Corporate Overview

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

White Paper: Leveraging Web Intelligence to Enhance Cyber Security

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

How to Grow and Transform your Security Program into the Cloud

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

AUTOMATING THE 20 CRITICAL SECURITY CONTROLS

Advanced Threats: The New World Order

End-user Security Analytics Strengthens Protection with ArcSight

NERC CIP VERSION 5 COMPLIANCE

IBM QRadar Security Intelligence April 2013

Metrics that Matter Security Risk Analytics

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

The Emergence of Security Business Intelligence: Risk

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Vulnerability Management Nirvana: A Study in Predicting Exploitability

All Information is derived from Mandiant consulting in a non-classified environment.

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

SIEM Implementation Approach Discussion. April 2012

Defending Against Data Beaches: Internal Controls for Cybersecurity

Module 1: Overview. Module 2: AlienVault USM Solution Deployment. Module 3: AlienVault USM Basic Configuration

FIVE PRACTICAL STEPS

Cisco Advanced Services for Network Security

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Metric Matters. Dain Perkins, CISSP

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Technology Blueprint. Assess Your Vulnerabilities. Maintain a continuous understanding of assets and manage vulnerabilities in real time

QRadar SIEM and FireEye MPS Integration

Looking at the SANS 20 Critical Security Controls

Preemptive security solutions for healthcare

IBM Security IBM Corporation IBM Corporation

Breaking down silos of protection: An integrated approach to managing application security

Vistara Lifecycle Management

Cyber threat intelligence and the lessons from law enforcement. kpmg.com/cybersecurity

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Hunting for the Undefined Threat: Advanced Analytics & Visualization

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

How To Create Situational Awareness

Into the cybersecurity breach

Requirements When Considering a Next- Generation Firewall

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

How To Monitor Your Entire It Environment

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Security Coordination with IF-MAP

Active Network Defense: Real time Network Situational Awareness and a Single Source of Integrated, Comprehensive Network Knowledge

Microsoft s cybersecurity commitment

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

TRIPWIRE NERC SOLUTION SUITE

Assuring Application Security: Deploying Code that Keeps Data Safe

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

The Cloud App Visibility Blindspot

High End Information Security Services

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Transcription:

SESSION ID: SPO-R06A Obtaining Enterprise Cybersituational Awareness Eric J. Eifert Sr. Vice President Managed Security Services DarkMatter

Agenda My Background Key components of the Cyber Situational Awareness - What? Key rationale for Cyber Situational Awareness - Why? Implementing Cyber Situational Awareness - How? Final Takeaway 2

Agenda My Background Key components of the Cyber Situational Awareness - What? Key rationale for Cyber Situational Awareness - Why? Implementing Cyber Situational Awareness - How? Final Takeaway 3

My Background Over 20 years experience in Cyber Security Special Agent investigating cyber crime and computer intrusions Program Manager for large U.S. Cyber Security Operations Centers Executive running cyber security line of business ($125+M) Adjunct professor teaching graduate students cyber investigations 4

Agenda My Background Key components of the Cyber Situational Awareness - What? Key rationale for Cyber Situational Awareness - Why? Implementing Cyber Situational Awareness - How? Final Takeaway 5

What is Cyber Situational Awareness? Visibility At the most basic level it is having true visibility across your own environment Knowing what is on your network Knowing how your network is configured Knowing who is on your network At an intermediate level it is understanding external influences and their relevance to your environment At an advanced level it is the integration of all this information to allow continuous monitoring and rapid decision making 6

Agenda My Background Key components of the Cyber Situational Awareness - What? Key rationale for Cyber Situational Awareness - Why? Implementing Cyber Situational Awareness - How? Final Takeaway 7

Visibility Why Visibility Visibility Type Hardware Software Configuration Identity and Access Data Rationale Knowing what hardware is in the environment as well as when new hardware is introduced to the environment allows you to ensure they conform with your secure baseline and are authorized devices Software vulnerabilities, bugs and security updates are common, knowing if you are vulnerable and rapidly resolving your vulnerable state is critical Maintaining a secure configuration baseline is important to prevent unauthorized access and subversion of defenses Confirming the identity of authorized users as well as ensuring they have access to the appropriate resources and data sources Knowing what data within your organization is sensitive allows you to focus your resources on what is most important

Visibility Practical Examples On 23 Sep 2015 Cisco released a new version of its IOS Software to resolve a critical RSA-Based User Authentication Bypass Vulnerability How quickly could you determine 1) if you had a vulnerable Cisco device on your network and 2) was it configured to use RSA-Based User Authentication? Firefox 41 fixes 30 vulnerabilities Can you quickly determine who is impacted? 9

Visibility Why Type Vulnerabilities Threat Actors Adversarial Capabilities Government Industry Rationale Understanding what vulnerabilities exist within your environments as well as when new vulnerabilities are discovered allows for rapid remediation Understanding the types of adversaries targeting you and their motivation helps to focus resources and security investments Up to date knowledge of the specific tactics, techniques, procedures, and technologies being used by an adversary allows for better detection Government agencies have access to rich threat intelligence that can be leveraged to gain better insight into the threat landscape Industry peer groups can provide insight into sector specific cyber threats as well as share lessons learned to increase your security posture

Visibility Why Type Diverse Technology Legacy Technology Logs and Diagnostics Visualization Automation Rationale Proper integration of diverse technologies reduces the potential for the introduction of security weaknesses Legacy applications running on insecure hardware and software need to be known and mitigated through other means Diverse log and diagnostic formats can make it difficult to leverage the content for decision making Aggregation of information into a dashboard for decision makers helps prioritize and speed up the decision making process Acting at the speed of cyber to mitigate issues reduces the potential of cyber events

Agenda My Background Key components of the Cyber Situational Awareness - What? Key rationale for Cyber Situational Awareness - Why? Implementing Cyber Situational Awareness - How? Final Takeaway 12

Visibility How to increase visibility (1/2) Obtain leadership support for a continuous monitoring program focused on people, process, and technology Deploy hardware asset management technologies that will provide a comprehensive list of technologies deployed and monitor changes Deploy software asset management technologies that will provide a comprehensive list of software installed and on which devices Deploy configuration management technologies that will provide a comprehensive list of the secure configurations across all devices Deploy a vulnerability management capability to understand the vulnerable state of the enterprise on an ongoing basis 13

Visibility How to increase visibility (2/2) Implement an Identity and Assess Management capability that will allow you to understand who is accessing the environment, from where, and with what privileges Conduct information and data discovery to understand what type of sensitive information is within your environment, where it is stored, and in what format Deploy technologies that will provide you access to full content network traffic (internal and external) for advanced analysis Develop a dashboard that will consolidate and correlate data feeds to provide decision makers with full visibility into the environment 14

Visibility How to increase your intelligence Monitor feeds from the technology vendors utilized within your environment to obtain vulnerability information Receive feeds from vulnerability research firms to stay current on discovered vulnerabilities and bugs that can be exploited Obtain information from cyber threat intelligence providers Develop partnerships with government information sharing organizations to send and receive threat information Develop partnerships with industry peers to share threat information between similar organizations 15

Visibility How to better integrate Understand the technology landscape within the organization and influence the roadmap with an focus on better integration Attend user conferences to obtain best practices from other organizations with similar environments Understand the Application Program Interfaces (APIs) of the technologies in use and how to leverage it for integration purposes Understand the format of data feeds and how to normalize the information into a common useable format Develop an integration laboratory to test configurations and integrations prior to deployment 16

Agenda My Background Key components of the Cyber Situational Awareness - What? Key rationale for Cyber Situational Awareness - Why? Implementing Cyber Situational Awareness - How? Final Takeaway 17

Final takeaway Ultimate goal is to increase your cyber security and rapidly detect, inform, and respond to reduce the probability of a successful cyber security event Evaluate your organization s maturity across visibility, intelligence, and integration Visibility Consider performing a formal gap assessment to determine what is necessary to achieve your desired cyber situational awareness 18

Questions?