How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)



Similar documents
Defending against modern threats Kruger National Park ICCWS 2015

Cyber attack on Twitter, 250,000 accounts hacked

Microsoft Services Premier Support. Security Services Catalogue

Protecting Your Organisation from Targeted Cyber Intrusion

Advanced Threat Protection with Dell SecureWorks Security Services

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

IBM Security re-defines enterprise endpoint protection against advanced malware

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Protecting against cyber threats and security breaches

Microsoft s cybersecurity commitment

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Security Best Practices for Microsoft Azure Applications

IBM Security Strategy

Perspectives on Cybersecurity in Healthcare June 2015

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

I D C A N A L Y S T C O N N E C T I O N

IBM QRadar Security Intelligence April 2013

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

ALERT LOGIC FOR HIPAA COMPLIANCE

End-user Security Analytics Strengthens Protection with ArcSight

Endpoint Security for DeltaV Systems

How To Buy Nitro Security

The Cyber Threat Profiler

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Addressing the United States CIO Office s Cybersecurity Sprint Directives

Strengthen security with intelligent identity and access management

Enterprise Cybersecurity: Building an Effective Defense

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Defending Against Cyber Attacks with SessionLevel Network Security

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Cisco Advanced Malware Protection

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

CASSIDIAN CYBERSECURITY

SANS Top 20 Critical Controls for Effective Cyber Defense

Ben Hall Technical Pre-Sales Manager Barry Kew Pre-Sales Consultant

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Lessons from Defending Cyberspace

Unified Security, ATP and more

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Protecting Point-of-Sale Environments Against Multi-Stage Attacks

Click to edit Master title style

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Seven Strategies to Defend ICSs

This is the cloud that helps enterprises move faster

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

AppGuard. Defeats Malware

The Protection Mission a constant endeavor

and Security in the Era of Cloud

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

24/7 Visibility into Advanced Malware on Networks and Endpoints

INDUSTRY OVERVIEW: HEALTHCARE

Advanced Threats: The New World Order

ENABLING FAST RESPONSES THREAT MONITORING

Does your Citrix or Terminal Server environment have an Achilles heel?

Operational security for online services overview

Information Security for the Rest of Us

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Combating a new generation of cybercriminal with in-depth security monitoring

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

How To Secure Your System From Cyber Attacks

The Education Fellowship Finance Centralisation IT Security Strategy

Find the needle in the security haystack

SECURITY. Risk & Compliance Services

Cybersecurity Enhancement Account. FY 2017 President s Budget

Security Intelligence Services.

Defending Against Data Beaches: Internal Controls for Cybersecurity

Symantec Advanced Threat Protection: Network

Securing the Microsoft Cloud

Under the Hood of the IBM Threat Protection System

Cloud Security Primer MALICIOUS NETWORK COMMUNICATIONS: WHAT ARE YOU OVERLOOKING?

McAfee Security Architectures for the Public Sector

SPEAR PHISHING AN ENTRY POINT FOR APTS

Cybersecurity and internal audit. August 15, 2014

Cisco Advanced Services for Network Security

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

ISO27032 Guidelines for Cyber Security

IBM Endpoint Manager for Core Protection

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

IBM Security IBM Corporation IBM Corporation

Strategic Plan On-Demand Services April 2, 2015

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

US-CERT Year in Review. United States Computer Emergency Readiness Team

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Teradata and Protegrity High-Value Protection for High-Value Data

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Securing the endpoint and your data

Transcription:

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Domain.Local DC Client DomainAdmin Attack Operator

Advise Protect Detect Respond E N G A G E

Assessment, Education, Mitigations Premier Security Advisor Security Assessments Workshops Active Directory Windows SQL Exchange Securing Windows Client Securing Windows Server Forensics (english) Web Servers Sharepoint Direct Access PKI Bitlocker and MBAM Right Management Services Certificate Services Mitigations POP - Securing Lateral Account Movements POP - EMET POP Hardening AD Domain and DC Bulletin Advisor Direct Access Endpoint Protection Enterprise Auditing Microsoft Confidential

Protect Protection for your most valuable assets and accounts to help prevent compromise from cyber-attacks Microsoft Security Risk Assessment (MSRA) Rapid review of customer s IT security program, tailored to business and security needs On-site, in-person interviews and technical examination to provide a comprehensive look at security technologies and operational practices Examination of the program s business foundations, including security goals, risk posture, and policies and standards Security Development Lifecycle Services (SDL) Microsoft provides an assessment of your software assurance program, identifies enhancements, and delivers a roadmap to strengthen and mature your software development practices. Enhanced Security Administration Environment (ESAE) & Privileged Administrator Workstation (PAW) The ESAE offering leverages advanced security technologies and recommended practices to provide administrative environments and workstations with enhanced security protection. EMET Enterprise Reporting (EMET ERS) Pilot deployment of (EMET) to including deployment of Enterprise Reporting Services and dashboard for all EMET mitigated events. Detect Respond Continuous monitoring of your network for attacks, vulnerabilities, and persistent threats Investigate and disrupt suspicious events to provide a diagnosis and potential mitigations Microsoft Threat Detection Service (MTDS) Allows customers to detect errors and report them to check for malicious activity. It also helps in deriving intelligence from the error reports to regulate and manage errors efficiently. Persistent Adversary Detection Service (PADS) Proactively determine whether a system is under threat via a discreet incident response prior to an actual emergency and examines high value assets or a sample of systems for signs of advanced implants not typically found by commodity anti-virus or intrusion detection system technologies. Incident Response Microsoft offers the IR&R service to determine whether a system is under targeted exploitation via a discreet incident response engagement that examines high value assets or exploited systems for signs of advanced implants not typically found by commodity anti-virus or intrusion detection system technologies.

Our approach consists of the following strategic assessments to help assess the current environment and processes, and then deliver a roadmap for meeting business goals and objectives: Assessments The MSRA was developed by Microsoft to provide a Risk Assessment service to help customers manage risk in their complex enterprise environments. SDL is a software development process that helps customers build more secure software and address security compliance requirements while reducing development cost.

The main recommendations concern credential hygiene, security monitoring, and configuration management. All three of these items should be done as quickly as possible because of the extreme risk of credential theft and of compromise to the CUSTOMER systems

48 hours - The average time it takes to get Domain Administrator credentials once a single machine has been compromised within the environment.

With 8.1/2012 R2 Features Production Domain(s) Domain and Forest Enhanced Security Admin Environment (ESAE) Domain and Forest Administration Security Alerting Hardened Hosts and Accounts Application & Service Hardening Server and System Management App and Data Management Privileged Account Workstation (PAW) Lateral Traversal Mitigations Helpdesk and Workstation Management User Assistance and Support Managed Access Request System (MARS) Protected Users Auth Policies and Silos RDP w/restricted Admin

EMET Production Pilot Assist with your EMET Deployment to pilot group of workstations EMET ERS (Enterprise Reporting Services) Deployment and Configuration Provides a Dashboard roll-up view of EMET events Top 10 Machines; Hourly EMET mitigation events; Compliance Reports; Trending and Analysis Benefits: All EMET Agents will act as a sensor on your network EMET ERS can be used to help speed tune EMET during your pilot and deployment and provide basic detection EMET will also work in conjunction with MTDS

MTDS On premise MTDS Hosted Malware will normally cause applications or the whole operating system to crash. These crashes which include a memory dump can be collected and analysed. No agent required simple configuration update to point error logs to a central collector. Can detect 0-day and custom unique malware code. Robust Security Technologies Reporting with Actionable Data Unique to Microsoft Unique malware database which is built up by the worlds largest sensor network

Worldwide Sensor Network and Ecosystem Insight

Respond - IR/PADS

The Incident Response and Recovery Service (IR&R) is an offering for clients who are looking to investigate and disrupt today s determined human adversaries and similar advanced actors who specialize in targeted exploitation. The service is an onsite, discreet incident response engagement that involves the examination of high value assets or known exploited systems for signs of advanced implants not typically found by commodity AV or IDS technologies. A team of Microsoft IR&R consultants travel to the customer site and perform analyses on the affected servers or endpoints as a starting point. The team utilizes a sophisticated toolset that leverage custom Microsoft capabilities including specialized detection tools, malware analysis, signature generation, and custom cyber intelligence. Typical period of performance is one work week at the customer site, but can be customized for large clients with multiple geographic sites or organizational components.

What if I have a Cybersecurity Incident? For Incident Response, start using your existing Microsoft Premier Services agreement GBS Security Deep Remote Technical Support Cybersecurity IR&R Team Onsite Security Incident Response Team Any staff member who has been authorized with access to open Premier Support cases should do so with a Severity A classification for Cyber incidents. GBS First Responder Global Onsite Support within 24-hours or less

Under attack Suspicious of an attack/needs detection Cybersecurity strategy & approach IR&R PADS MTDS MSRA, ADSA SDL ESAE PAW EMET-ERS

Massive global telemetry Software and Services company Target for cyber attacks Malicious Software Removal Tool 700 millions monthly Bing +18B pages scans per month Windows Defender 250 millions Exchange Online 35 billion messages scanned Digital Crimes Unit (CITP) Builds the software people relies on Security Development Lifecycle ISO/IEC 27034-1:2011 Operates major online and cloud services Cloud Security Alliance Unparalleled visibility into the threat environment MSIT ISRM internal experiences ACE team Global Foundation Services Global Business Support Security

Massimo Agrelli CyberSecurity Architect Microsoft Services Cybersecurity Global Practice Massimo.Agrelli@Microsoft.com 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows, Windows Vista and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.