Belgacom Security Convention. Tuesday 15 October 2013, Aula Magna, Louvain-la-Neuve



Similar documents
SourceFireNext-Generation IPS

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Cisco and Sourcefire. AGILE SECURITY : Security for the Real World. Stefano Volpi

Requirements When Considering a Next- Generation Firewall

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

Threat-Centric Security Solutions. György Ács Security Consulting Systems Engineer 3 rd November 2015

Sourcefire Next-Generation IPS

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Deploying Next Generation Firewall with ASA and Firepower services

Protection Against Advanced Persistent Threats

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Sourcefire Next-Generation IPS

How To Protect Your Network From A Threat From A Rogue Host Or A Rogue Server From A Hacker (For A Fee)

Unified Threat Management, Managed Security, and the Cloud Services Model

Network Security Solution. Arktos Lam

Braindumps QA

McAfee Network Security Platform

The Hillstone and Trend Micro Joint Solution

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

SANS Top 20 Critical Controls for Effective Cyber Defense

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Cisco Cybersecurity Pocket Guide 2015

Cisco ASA with FirePOWER Services. October 2014

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

IBM Security IBM Corporation IBM Corporation

Concierge SIEM Reporting Overview

How Attackers are Targeting Your Mobile Devices. Wade Williamson

QRadar SIEM and Zscaler Nanolog Streaming Service

Security Information & Event Management (SIEM)

Network as a Sensor and Enforcer Leverage the Network to Protect Against and Mitigate Threats

Next Generation Enterprise Network Security Platform

Defending Against Data Beaches: Internal Controls for Cybersecurity

Modular Network Security. Tyler Carter, McAfee Network Security

Vulnerability Management

Cisco & Big Data Security

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

QRadar SIEM and FireEye MPS Integration

BEFORE. DURING. AFTER. CISCO'S INTEGRATED SECURITY STRATEGY NIALL MOYNIHAN CISCO EMEAR

Fortinet Advanced Threat Protection- Part 3

Решения HP по информационной безопасности

Bridging the gap between COTS tool alerting and raw data analysis

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

Critical Controls for Cyber Security.

Enabling Security Operations with RSA envision. August, 2009

HP NonStop Server Security and HP ArcSight SIEM

Cisco ASA und FirePOWER Services

Enhancing Your Network Security

Secure Cloud-Ready Data Centers Juniper Networks

REVOLUTIONIZING ADVANCED THREAT PROTECTION

End-user Security Analytics Strengthens Protection with ArcSight

Evolution Of Cyber Threats & Defense Approaches

McAfee Network Security Platform Services solutions for Managed Service Providers (MSPs)

CLOUD GUARD UNIFIED ENTERPRISE

Paul Cochran - Account Manager. Chris Czerwinski System Engineer

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

How Traditional Firewalls Fail Today s Networks And Why Next-Generation Firewalls Will Prevail

Intro to NSX. Network Virtualization VMware Inc. All rights reserved.

Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Product Factsheet MANAGED SECURITY SERVICES - FIREWALLS - FACT SHEET

Introducing IBM s Advanced Threat Protection Platform

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Advanced Threats: The New World Order

Intelligence Driven Security

Cisco RSA Announcement Update

Threat-Centric Security for Service Providers

High Performance NGFW Extended

IT Security Strategy and Priorities. Stefan Lager CTO Services

Cisco Advanced Malware Protection

On and off premises technologies Which is best for you?

Security Coordination with IF-MAP

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

How To Manage Sourcefire From A Command Console

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

Next Generation IPS and Reputation Services

How To Create Situational Awareness

Next-Generation Firewalls: Critical to SMB Network Security

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Defending Against Cyber Attacks with SessionLevel Network Security

FROM PRODUCT TO PLATFORM

Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

RAVEN, Network Security and Health for the Enterprise

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

How To Protect Your Virtual Infrastructure From Attack From A Cyber Threat

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Security Services. 30 years of experience in IT business

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

Transcription:

Belgacom Security Convention Tuesday 15 October 2013, Aula Magna, Louvain-la-Neuve

Belgacom Security Convention The new, continuous security model Hans De Raeve Product Manager Belgacom Sean Newman Product Manager Sourcefire 10/17/2013 Slide 2

Agenda The Core elements of ICT Security The new, continuous security model The perfect blend Sourcefire within the continuous security model Q&A Slide 3

Attackers, Focused on YOUR Data! Hacktivists Organised crime Nation States 25% of attacks targeted at a specific individual or company Verizon Data Breach report 2013

Why? The Underground Economy is Booming The Underground Embraces the Cloud Business Model Exploit-as-a-Service, Malware-as-a-Service, Botnet as a Service, Source : McAfee Threat report Q4 2012

Today s Reality Today s Reality: 621 breaches in 2012 92% stemmed from external agents 52% utilized some form of hacking 40% incorporated malware 78% of attacks not highly difficult 1 in 5 attributed to Cyber Espionage 2013 Verizon Data Breach Investigation Report All were smart, all had security. All were compromised.

Confidentiality Integrity Availability New Security model The goal of ICT Security ICT Security Focus Shift Slide 7

Customer Feedback Feedback Approval End User ROC * Event Management Operations Analyst Security Analyst Management New Service Call Identification & Logging Categorization & Prioritization Investigation & Diagnosis Solve on this Level? Yes Resolution & Recovery Closure Service Call Closed No Record Escalation End User Agrees? Yes No SDK 1st Line Agent 1st Line Support Engineer 2nd Line Support Engineer Customer Care Officer Threshold Exceeded Configuration Issue Problem Candidate Change Request Monitoring & Escalation CMDB Maintain Configuration Management Problem Management Change Management Confidentiality Integrity Availability New Security Model The Core Elements of any organisation ICT Security Your People Focus Shift Remote Operations Center * Your Processes Your Technologies Slide 8

Customer Feedback Feedback Approval End User ROC * Event Management Operations Analyst Security Analyst Management New Service Call Identification & Logging Categorization & Prioritization Investigation & Diagnosis Solve on this Level? Yes Resolution & Recovery Closure Service Call Closed No Record Escalation End User Agrees? Yes No SDK 1st Line Agent 1st Line Support Engineer 2nd Line Support Engineer Customer Care Officer Threshold Exceeded Configuration Issue Problem Candidate Change Request Monitoring & Escalation CMDB Maintain Configuration Management Problem Management Change Management Confidentiality Before Integrity During Availability After New Security Model The Core Elements of any organisation Security ICT Security Threats Your People Remote Operations Center * Your Processes Your Technologies Prevent & Reduce Detect & Reduce React Detect Impact & Remediate Slide 9

The Core Elements of ICT Security People People are NOT your most important asset.

The Core Elements of ICT Security People People are NOT your most important asset. The right people are!

The Core Elements of ICT Security People They are difficult to find and hard to keep Treat them well Training Challenging work environment Salary Bonus Job Rotation Career path

Sensitivity : "Unrestricted", "Internal Use Only" or "Confidential" 10/17/2013 Slide 13

The Core Elements of ICT Security People & There Roles Security Threats Before During After Business Analysts IT Architects Sec. Officers CIO HR Process managers Policy managers Engineering End users Prevent & Reduce IT Engineering Sec. Analysts Service Desk End users Detect & Reduce React Forensics Specialists Sec. Engineering CxO End users Business Analysts PR Detect Impact & Remediate

Customer Feedback Feedback Approval End User ROC * Event Management Operations Analyst Security Analyst Management New Service Call Identification & Logging Categorization & Prioritization Investigation & Diagnosis Solve on this Level? Yes Resolution & Recovery Closure Service Call Closed No Record Escalation End User Agrees? Yes No SDK 1st Line Agent 1st Line Support Engineer 2nd Line Support Engineer Customer Care Officer Threshold Exceeded Configuration Issue Problem Candidate Change Request Monitoring & Escalation CMDB Maintain Configuration Management Problem Management Change Management Confidentiality Before Integrity During Availability After The Core Elements of ICT Security Security Cyber Security Threats Remote Operations Center * Prevent & Reduce Detect & Reduce React Detect Impact & Remediate Slide 15

The Core Elements of ICT Security Processes Security Threats Before During After ISO 20000 Focus IT Governance on IT Service IT Management ITILv3 IT Service Continuity Management IT Management = good shepherding of assets & resources (operational BS 25999 Focus on Business Continuity Management level) ISO 27k Focus on Information Security Risk IT Management Governance = good Operations shepherding + vision and Problem leadership Man. Risk Assessment (strategic BCM and tactical level) Man. BCM Man. BCM Awareness Communication Policies Training Prevent & Reduce Detect & Reduce React Detect Impact & Remediate

The Core Elements of ICT Security Processes at Belgacom

Customer Feedback Feedback Approval End User ROC * Event Management Operations Analyst Security Analyst Management New Service Call Identification & Logging Categorization & Prioritization Investigation & Diagnosis Solve on this Level? Yes Resolution & Recovery Closure Service Call Closed No Record Escalation End User Agrees? Yes No SDK 1st Line Agent 1st Line Support Engineer 2nd Line Support Engineer Customer Care Officer Threshold Exceeded Configuration Issue Problem Candidate Change Request Monitoring & Escalation CMDB Maintain Configuration Management Problem Management Change Management Confidentiality Before Integrity During Availability After The Core Elements of ICT Security Security Cyber Security Threats Remote Operations Center * Prevent & Reduce Detect & Reduce React Detect Impact & Remediate Slide 18

The Core Elements of ICT Security Technologies FW/VPN AV Block or Allow PKI IDS / IPS UTM It matches the pattern NAC No key, no access Application Control Self Defending Network No false positives, no false negatives. Fix the Firewall

The Core Elements of ICT Security Technologies

Security Technologies at Belgacom ICT Security

The Core Elements of ICT Security Technologies Security Threats Before During After Patch management Firewall DLP VAM Proxy NAC DNSSEC SSL IAM (N) (H) IPS AVAS DDOS NBA Botnet Detect (N) (H) IPS SIEM Forensics Full Packet Capturing Anti-Phishing & Brand Protection Prevent & Reduce Detect & Reduce React Detect Impact & Remediate

Customer Feedback Feedback Approval End User ROC * Event Management Operations Analyst Security Analyst Management New Service Call Identification & Logging Categorization & Prioritization Investigation & Diagnosis Solve on this Level? Yes Resolution & Recovery Closure Service Call Closed No Record Escalation End User Agrees? Yes No SDK 1st Line Agent 1st Line Support Engineer 2nd Line Support Engineer Customer Care Officer Threshold Exceeded Configuration Issue Problem Candidate Change Request Monitoring & Escalation CMDB Maintain Configuration Management Problem Management Change Management Security Threats Before During After Business Analysts, IT Architects Sec. Officers, CIO, HR Process mgr., Policy mgr., Engineering, End users IT Engineering Sec. Analysts Service Desk End users Forensics Specialists Sec. Engineering CxO, End users Business Analysts, PR Remote Operations Center * Risk Management Risk Assessment BCM, Awareness Policies, Training 80% 20% Operations BCM Management Problem Man. Man. BCM Communication Patch man, FW, DLP VAM, Proxy, NAC DNSSEC SSL IAM Prevent & Reduce (N) (H) IPS AVAS DDOS NBA Botnet Detect Detect & Reduce React (N) (H) IPS SIEM Forensics Full Packet Capturing Anti-Phishing & Brand Protection Detect Impact & Remediate

Sensitivity : "Unrestricted", "Internal Use Only" or "Confidential" 10/17/2013 Slide 24

Sensitivity : "Unrestricted", "Internal Use Only" or "Confidential" 10/17/2013 http://www.willitblend.com/ Slide 25

Belgacom Flashlight Sensitivity : "Unrestricted", "Internal Use Only" or "Confidential" 10/17/2013 Slide 27

Combine The Core Elements of ICT Security Flashlight Managed Security Services

Flashlight Supported Technologies DNS/DHCP IPS/IDS FW/UTM N.Forensics WAF SSL Sec. Remote Access Sec. Internet Access Strong Auth. AVAS Server OS Web Proxy AVAS DDOS WLAN Contr. 17/10/2013 Slide 29 Confidential - Belgacom

Flashlight Service Portfolio Confidential - Belgacom 17/10/2013 Slide 30

Flashlight Remote Operation Centre (ROC) International Customer base +60 customers +400 milion Sec. Event Day ROC Build to Nato Specs. 7500 mgd devices Security Analysts Confidential - Belgacom 24/7 17/10/2013 Slide 31 17/10/2013 Slide 31

ICT (Security) Solutions Automatic Syslog, SNMP, Flow, CEF, Log Management Reporting Dashboard Manual Content Rules Topology info Normalisation Correlation Security Analysts Analysis and Forensics Confidential - Belgacom 17/10/2013 Slide 32 Security

Belgacom Flashlight The Value of Managed Security Services Cost Saving: No big investments -> OPEX You can benefit from High-end shared and specialised Tools, People and Processes You can count on highly skilled and certified security specialists 70+ Customer oriented security experts 24/7 redundant ROC Trusted advisor, supporting multiple vendors and technologies Centralised visibility and control. Benefit from trends we detect over multiple customers Tools Processes People 17/10/2013

Customer Feedback Feedback Approval End User ROC * Event Management Operations Analyst Security Analyst Management New Service Call Identification & Logging Categorization & Prioritization Investigation & Diagnosis Solve on this Level? Yes Resolution & Recovery Closure Service Call Closed No Record Escalation End User Agrees? Yes No SDK 1st Line Agent 1st Line Support Engineer 2nd Line Support Engineer Customer Care Officer Threshold Exceeded Configuration Issue Problem Candidate Change Request Monitoring & Escalation CMDB Maintain Configuration Management Problem Management Change Management Security Threats Before During After Business Analysts, IT Architects Sec. Officers, CIO, HR Process mgr., Policy mgr., Engineering, End users IT Engineering Sec. Analysts Service Desk End users Forensics Specialists Sec. Engineering CxO, End users Business Analysts, PR Remote Operations Center * Risk Management Risk Assessment BCM, Awareness Policies, Training Operations BCM Management Problem Man. Man. BCM Communication Patch man, FW, DLP VAM, Proxy, NAC DNSSEC SSL IAM Prevent & Reduce (N) (H) IPS AVAS DDOS NBA Botnet Detect Detect & Reduce React (N) (H) IPS SIEM Forensics Full Packet Capturing Anti-Phishing & Brand Protection Detect Impact & Remediate

A New Model for Security A T T A C K C O N T I N U U M BEFORE DURING AFTER See it, Control it Intelligent & Context Aware Retrospective Security Network Endpoint Mobile Virtual Point-in-Time Continuous 35

Before Pre-Emptive Security Discover everything - continuously Harden assets most at risk Implement Access Policy to reduce attack surface Threats Devices Applications Network Vulnerabilities OS Users Information Superiority Files 36

During Intelligent Security Identify and Block known malware Detect and Prevent conventional hacking In the Network and at the End Point Contextual Intelligence 37

After Retrospective Security Sees Everything Never Forgets Turns Back Time Track all network activity Track all file, process and application activity Big data analysis to correlate weak signals for Indicators of Compromise Scope, Contain and Remediate threats Turn back the clock on advanced malware 38

Sourcefire Agile Security Solutions Management Center APPLIANCES VIRTUAL APPLICATION & ACCESS CONTROL NEXT- GENERATION INTRUSION PREVENTION ADVANCED MALWARE PROTECTION COLLECTIVE SECURITY INTELLIGENCE CONTEXTUAL AWARENESS HOSTS VIRTUAL MOBILE APPLIANCES VIRTUAL 39

Independent Validation Leadership* Class leader in detection Class leader in performance Class leader in vulnerability coverage Completely evasion free Ratings* 99% detection & protection 34 Gbps inspected throughput 60M concurrent connections $15 TCO / protected Mbps "For the past five years, Sourcefire has consistently achieved excellent results in security effectiveness based on our real-world evaluations of exploit evasions, threat block rate and protection capabilities. Vikram Phatak, CTO NSS Labs, Inc. it is Sourcefire s dedication to understanding, detecting, and blocking the most advanced threats facing enterprise networks that enables these products to stand out amongst the competition. Frost & Sullivan.** Leading Threat Prevention Best-in-Class Performance Advanced Malware Protection Scalable FirePOWER platform Flexibile NGIPS/App/Access Ctrl * NSS Labs, Network IPS Product Analysis Sourcefire 3D8260 v4.10, April 2012 ** Frost & Sullivan 2013 Global Intrusion Prevention Systems Product Leadership Award May 2013 40

FireSIGHT is built into all Sourcefire next-generation security solutions delivering the network intelligence and context you need to respond to changing conditions and threats.

FireSIGHT Sees Everything Categories Examples Sourcefire FireSIGHT Typical IPS Threats Attacks, Anomalies Users AD, LDAP, POP3 Web Applications Facebook Chat, Ebay Application Protocols HTTP, SMTP, SSH File Transfers PDF, Office, EXE, JAR Malware Conficker, Flame Command & Control Servers C&C Security Intelligence Client Applications Firefox, IE6, BitTorrent Network Servers Apache 2.3.1, IIS4 Operating Systems Windows, Linux Routers & Switches Cisco, Nortel, Wireless Mobile Devices iphone, Android, Jail Printers HP, Xerox, Canon Sensitive Data Credit Cards, SSNs, Custom VoIP Phones Avaya, Polycom Virtual Machines VMware, Xen, RHEV Typical NGFW

FireSIGHT Contextual Awareness Improves Security and Saves Money IT Insight Spot rogue hosts, traffic anomalies, policy violations, and more Impact Assessment Threat correlation reduces actionable events by up to 99% Automated Tuning Adjust IPS policies automatically based on network change User Identification Associate users with security and compliance events 43

FireSIGHT Context Explorer All application traffic Risky applications Who is sending the most data? Where is data coming from/going to? Which file types? What does User traffic look like over time?

FireSIGHT Awareness Who is at the host OS & version Identified What other systems / IPs did user have, when? Server applications and version Client Applications Client Version Web Application

Reduce Risk Through Granular Control Control access for applications, users and devices Employees may view Facebook, but only Marketing may post to it No one may use peer-to-peer file sharing apps 2,000+ apps, devices, and more! 46

Web URL Filtering Block non-business-related sites by category Based on user and user group Block access to know bad site 47

Sourcefire Advanced Malware Protection with Retrospective Security Comprehensive Monitoring Continuous Analysis Big Data Analytics Integrated Response Control & Remediation Collective Security Intelligence 48

File Trajectory Which systems are affected? File introducing threat Rate of Propagation Point of entry root cause Time of entry how long? Retrospective action Trajectory acts as a flight recorder 49

Device Trajectory Is it infected and how? Trajectory acts as a flight recorder 50

Device Flow Correlation Is there a connection to a known bad location? Associate applications with network connections Detect weak signals in application network traffic Link files to known bad sites Link sites to known bad files Cloud scalability for advanced analysis and detection Network Tracking Custom Blacklists Cloud Intelligence Dropper Detection Multiple ways to stop threats and eliminate root causes 51

Indicators of Compromise Spotlight high-risk systems Automated compromise analysis & determination Prioritized list of compromised devices Drill down for quick root cause analysis and remediation 52

Assume you will be Compromised Sourcefire s New Continuous Security Model A T T A C K C O N T I N U U M BEFORE DURING AFTER See it, Control it Intelligent & Context Aware Retrospective Security Network Endpoint Mobile Virtual Point-in-Time Continuous 53

World s Leading Security Team #1 Market Share in Network Security & Data Center Security Leader in Magic Quadrants for IPS, Email Security, Web Security, NAC, & SSL VPN NSS Labs Security Value Map Leadership for NGIPS & NGFW World-class security research team & threat data Open source projects: Snort, ClamAV, Razorback 54

Industry Analysts Weigh in The deal will allow Sourcefire to leverage Cisco's deep market penetration and expand its technology footprint. In return, Cisco has obtained technology that helps bolster not only its network security offering, but also its credentials in the wider antimalware space. 451 Group "Cisco/Sourcefire: A Potential Game Changer for Cisco and the Cybersecurity Industry. ESG Cisco will reap advanced threat prevention technology within FireAMP and obtain well-respected security research talent from Sourcefire's VRT. FireAMP will give Cisco malware- detection technology that could enable it to develop an advanced threat platform, helping malware mitigation teams fight complex threats. Gartner 55

Sean Newman snewman@sourcefire.com Hans De Raeve hans.deraeve@belgacom.be Sensitivity : "Unrestricted", "Internal Use Only" or "Confidential" 10/17/2013 Slide 56

Thank you Do not forget the evaluation form and the contest! The winners will be designated at 16.30 on the Belgacom booth. Win tickets for Belgium-Wales or a free hacking training