Cyber Security Defense Services Portfolio Development Status. February 2016



Similar documents
RETHINKING CYBER SECURITY Changing the Business Conversation

Service Description DDoS Mitigation Service

National Initiative for Cybersecurity Education

INSERT COMPANY LOGO HERE

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

Intelligence Driven Security

WHITE PAPER Hybrid Approach to DDoS Mitigation

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

SP Monitor. nfx One gives MSPs the agility and power they need to confidently grow their security services business. NFX FOR MSP SOLUTION BRIEF

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Business Case for a DDoS Consolidated Solution

SecurityDAM On-demand, Cloud-based DDoS Mitigation

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

REMOVING THE BARRIERS FOR DATA CENTRE AUTOMATION

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

Cybersecurity Delivering Confidence in the Cyber Domain

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

How To Buy Nitro Security

Security Solutions for the New Threads

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Powered by. Incapsula Cloud WAF

2012 North American Managed Security Service Providers Growth Leadership Award

Mata : Garuda An advanced Network Monitoring System The S.L.A.D Network Security Framework. FIRST Conference Berlin, 19 June 2015

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

A COMPLETE APPROACH TO SECURITY

Changing the Enterprise Security Landscape

High End Information Security Services

Developing and Enhancing Cyber Security Capabilities in the Region. Khaled Gamo Technology Advisor Ministry of communication and informatics

First Line of Defense

2015 Michigan NASCIO Award Nomination. Cyber Security Initiatives: Michigan Cyber Disruption Response Strategy

Defending against modern cyber threats

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

Complete Cloud Solutions

Enterprise Security and Risk Management

SECURITY 2.0 LUNCHEON

Unified Security, ATP and more

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

First Line of Defense

Corero Network Security plc

Business Case for Data Center Network Consolidation

Injazat s Managed Services Portfolio

NICE and Framework Overview

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

How To Protect Your State From Cybercrime

Distributed Denial of Service protection

Requirements When Considering a Next- Generation Firewall

Cybersecurity in the States 2012: Priorities, Issues and Trends

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Comprehensive real-time protection against Advanced Threats and data theft

Microsoft s cybersecurity commitment

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

NASCIO 2014 State IT Recognition Awards

Managed Security Services for Data

Pravail 2.0 Technical Overview. Exclusive Networks

Cisco Cloud Web Security

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

State of Florida Cyber Security Services RFI

Making the Internet Business-Ready

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Personal Security Practices of the CAO

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Lessons from Defending Cyberspace

VM-Series for VMware. PALO ALTO NETWORKS: VM-Series for VMware

Stop advanced targeted attacks, identify high risk users and control Insider Threats

How do you give cybersecurity the highest priority in your organization? Cyber Protection & Resilience Solutions from CGI

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

SOLUTION BRIEF. Next Generation APT Defense for Healthcare

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Seamus Reilly Director EY Information Security Cyber Security

Accenture Cyber Security Transformation. October 2015

Enhancing NASA Cyber Security Awareness From the C-Suite to the End-User

Corero Network Security First Line of Defense Executive Overview

Transcription:

Cyber Security Defense Services Portfolio Development Status February 2016 1

Agenda Merit s Six Strategic Thrusts Merit s current security offerings Member feedback Mission and vision statement for this initiative New cyber security service categories New services under consideration as the portfolio develops 2

Merit s Six Strategic Thrusts 1. Network: The highest-performing and most-adopted statewide network in the U.S., connecting diverse communities 2. Security: Security and information privacy defender 3. Community: Merit providing a digital commons for continuous statewide IT community collaboration 4. Diversification: Select portfolio of financially strong services 5. Workforce: Staffing shared services 6. Business: Merit as a pre-approved Michigan service provider to streamline business with customers

Merit s Current Security Offerings Cyber security training and certifications Michigan Cyber Range exercises and testing in a preconfigured environment Secure Sandbox custom testing environment Enabling services QuadMetrics cyber risk posture assessment Duo Security AT&T Managed Firewall Service Defense services Above Security Managed Services 4

Current Hidden Value-Add in Merit Services Peak flow reports BGP black hole services 24x7 Merit Support Center and easy access to real engineering talent Coming: statewide cyber security information sharing via our new Merit Commons, private social network 5

CEO Findings Member Organizations Trust in Merit Community Network Merit Support Center Responsiveness and flexibility Professional development, training & events Cyber security needs Staffing needs

Encouraging Progress Pell Center for Interna-onal Rela-ons and Public Policy, State of the States on Cybersecurity : (h7p://pellcenter.org/wp- content/uploads/2015/11/pell- Center- State- of- the- States- Report.pdf). The State of Michigan has established itself as a leader among states in implemenjng state government cybersecurity measures and in promojng cyber industry growth. The cornerstone of Michigan s strategy to enhance cybersecurity has been its collaborajve and inclusive nature and an enterprise approach to informajon security that allows state agencies and private and public sector organizajons to work in a highly coordinated and efficient manner with recogni-on of Merit s work 7

The Vision of Merit Cybersecurity The Merit security portfolio is designed to be member-focused and member-driven, providing best-in-class services at lower costs. Through the use of these services, the security posture of our membership will increase, making the state of Michigan the security leader. 8

The Mission of Merit Cybersecurity Merit's cybersecurity mission is to lead and defend the research, education and public sector communities. Merit will raise the security posture of our community in Michigan and beyond through training, knowledge-sharing, and delivering valuable security services. 9

New Cyber Security Categories 1. Proactive 2. Active 3. Reactive 10

New Services Under Consideration 1. Proactive QuadMetrics report and analysis services CISO professional services Critical infrastructure assessment and recommendations Pen testing End user education 2. Active Open source embedded/managed firewall (pfsense) SOC 3. Reactive DDoS Forensics (with 3 rd -party expertise) 11

Merit-Managed Firewall High demand / good alignment with network services Lower cost option to Premium managed firewall option E-Rate eligible Evaluating technology options pfsense open source is a strong contender Staff training required 12

DDoS Threat

Higher Ed DDoS Incidents University of Alaska August 2014 ~500,000 sessions debilitating their border firewall Arizona State University April 2015 Attacks directory toward login systems Rutgers University April, March & Dec. 2015 Six attacks in one year March attack last entire weekend December attack lasted four days

Merit Network Targeted RADb DDoS attack Several day sustained attack Attack coupled with normal traffic congested Internet flow Last day 25Gbps Visualization 1 Visualization 2

Cyber Defense - DDoS No solution is perfect or 100% DDoS detection and mitigation Service provider approach Appliance at border (Chicago and Southfield) Protect the whole network including members Provide a mechanism for members to view events via a portal Will not mitigate member to member Uniformed policies Increase mitigation response Economies of scale Develop and implement SOC Fully managed 24/7 Will need to add staff and staff training Use cloud service when events exhaust border appliances Option of additional appliance at member site 16

Cyber Defense - DDoS Solution: Implementing an Arbor Networks TMS 2800 ( Threat Management System) to be installed in Chicago 40 Gbps of inspected throughput TMS 2310 to be installed in data center 10Gbps of inspected throughput Atlas Intelligence Feed with automatic content updates across the TMS deployment Arbor Cloud for Service Providers Large tier protection of 2Gbps of clean traffic diverted using BGP System Admin, DDoS User/Admin training Configure and perform ongoing SP administration functions Administration and support of mitigation of DDoS attacks 10 seats available 17

CISO Professional Services (CaaS) High demand / trust in Merit Scalable Affordable Value to wide array of Membership: security architecture, security assessment, pen test interpretation, etc. Use QuadMetrics reports as conversation starters Aligned with overall portfolio offerings: Proactive Active Reactive 18