Defending against modern threats Kruger National Park ICCWS 2015



Similar documents
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Cyber attack on Twitter, 250,000 accounts hacked

Microsoft Services Premier Support. Security Services Catalogue

Protecting Your Organisation from Targeted Cyber Intrusion

Microsoft s cybersecurity commitment

External Supplier Control Requirements

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Defending Against Data Beaches: Internal Controls for Cybersecurity

Advanced Threat Protection with Dell SecureWorks Security Services

Cybersecurity and internal audit. August 15, 2014

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Seven Strategies to Defend ICSs

IBM Security re-defines enterprise endpoint protection against advanced malware

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Protecting against cyber threats and security breaches

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

Critical Security Controls

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

IBM Security Strategy

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

How To Secure Your System From Cyber Attacks

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

The Education Fellowship Finance Centralisation IT Security Strategy

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Securing the Cloud Infrastructure

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Security as Architecture A fine grained multi-tiered containment strategy

Cybersecurity Health Check At A Glance

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

CROWDSTRIKE // WHITE PAPER CYBER ATTACK SURVIVAL CHECKLIST

05 June 2015 A MW TLP: GREEN

Security Issues in Cloud Computing

MEDICAL DEVICE Cybersecurity.

Does your Citrix or Terminal Server environment have an Achilles heel?

Security Information & Event Management (SIEM)

Ed McMurray, CISA, CISSP, CTGA CoNetrix

INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Caretower s SIEM Managed Security Services

Practical Steps To Securing Process Control Networks

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Perspectives on Cybersecurity in Healthcare June 2015

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Cyber Security for NERC CIP Version 5 Compliance

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

Developing Secure Software in the Age of Advanced Persistent Threats

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Supplier Information Security Addendum for GE Restricted Data

A COMPLETE APPROACH TO SECURITY

Defending Against Cyber Attacks with SessionLevel Network Security

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

L evoluzione del Security Operation Center tra Threat Detection e Incident Response & Management

IBM Security QRadar Vulnerability Manager

THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS

Cybersecurity: What CFO s Need to Know

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Information security controls. Briefing for clients on Experian information security controls

CyberArk Privileged Threat Analytics. Solution Brief

BeyondInsight Version 5.6 New and Updated Features

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Cybersecurity Policies and Best Practices: Protecting small firms, large firms, and professional services from malware and other cyber-threats

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

DoD Strategy for Defending Networks, Systems, and Data

integrating cutting-edge security technologies the case for SIEM & PAM

Written Testimony. Dr. Andy Ozment. Assistant Secretary for Cybersecurity and Communications. U.S. Department of Homeland Security.

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Defensible Strategy To. Cyber Incident Response

Persistence Mechanisms as Indicators of Compromise

Vulnerability Management

Zak Khan Director, Advanced Cyber Defence

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Fighting Advanced Threats

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

SPEAR PHISHING UNDERSTANDING THE THREAT

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Enterprise Cybersecurity: Building an Effective Defense

ABB s approach concerning IS Security for Automation Systems

Industrial Control Systems Security Guide

Transcription:

Defending against modern threats Kruger National Park ICCWS 2015 Herman Opperman (CISSP, ncse, MCSE-Sec) - Architect, Cybersecurity Global Practice Microsoft Corporation

Trends from the field

Perimeter Security DiD Cyber Strategy Trust All Internal Assume Breach

THREAT REACTIVE PROACTIVE Reconnaissance Operations Governance Weaponization Delivery Network Data Physical Exploitation Installation Host Application Command & Control Action on Objectives

Source: microsoft.com/sir Microsoft SIR Vol. 17 The Security Intelligence Report (SIR) is an analysis of the current threat landscape based on data from over a billion systems worldwide. Featured Intelligence: Securing account credentials The challenge of expired security software The Microsoft DCU and the legal side of fighting malware Worldwide threat assessment Vulnerabilities Exploits Malware

CGP Portfolio CYBERSECURITY STRATEGY SECURE ADMINISTRATION SECURE PLATFORM SECURE SOFTWARE DEVELOPMENT Protect SYSTEMS MEMORY DEFENCE LONGTERM CYBERSECURITY ARHITECTURE Detect Respond ADVANCED PERSISTENT THREAT DETECTION RESPONSE AND RECOVERY PROACTIVE DISCOVERY FOR INDICATORS OR THREAT

* http://www.eweek.com/security/java-primary-cause-of-91-percent-of-attacks-cisco.html 4 Security Essentials Run Latest Microsoft & Third Party Products Implement Good Patch Management Practices Align Active Directory to Current Threat Environment Assess Threats & Countermeasures of IT Infrastructure and Operational Practices Implement Secure Software Development Practices

Thank you for your time.

CGP Portfolio Microsoft Security Risk Assessment (MSRA) Rapid review of customer s IT security program, tailored to business and security needs On-site, in-person interviews and technical examination to provide a comprehensive look at security technologies and operational practices Examination of the program s business foundations, including security goals, risk posture, and policies and standards Enhanced Security Administration Environment (ESAE) In addition to enforcing two-factor authentication for domain administrative accounts with smartcards, ESAE implements auditing and monitoring of high-impact administrative activity Protect Privileged Administrator Workstation (PAW) Focuses on protecting administrator credentials (Tier 1) by adding layer of protection to administrative workstations. Enhanced Mitigation Experience Toolkit (EMET ERS) Pilot deployment of (EMET) to including deployment of Enterprise Reporting Services and dashboard for all EMET mitigated events. Security Development Lifecycle Services (SDL) Customers learn and apply the secure software development practices Microsoft has developed and implemented internally Reduces the number and severity of software vulnerabilities in a customer s custom software solution Cybersecurity Architect (CSA) Detect Persistent Adversary Detection Service (PADS) Microsoft offers the PADS service to proactively determine whether a system is under threat via a discreet incident response prior to an actual emergency and examines high value assets or a sample of systems for signs of advanced implants not typically found by commodity anti-virus or intrusion detection system technologies. Microsoft Threat Detection Service (MTDS) Allows customers to detect errors and report them to check for malicious activity both in a hosted or On Premises solution. It also helps in deriving intelligence from the error reports to regulate and manage errors efficiently. Respond Incident Response and Recovery (IR&R) Microsoft offers the IR&R service to determine whether a system is under targeted exploitation via a discreet incident response engagement that examines high value assets or exploited systems for signs of advanced implants not typically found by commodity anti-virus or intrusion detection system technologies.