Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente



Similar documents
Modern Approach to Incident Response: Automated Response Architecture

Intelligence Driven Security

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

A Primer on Cyber Threat Intelligence

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Find the intruders using correlation and context Ofer Shezaf

Niara Security Analytics. Overview. Automatically detect attacks on the inside using machine learning

Using SIEM for Real- Time Threat Detection

Be Prepared. For Anything. Cyber Security - Confronting Current & Future Threats The role of skilled professionals in maintaining cyber resilience

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

Ty Miller. Director, Threat Intelligence Pty Ltd

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Enterprise Organizations Need Contextual- security Analytics Date: October 2014 Author: Jon Oltsik, Senior Principal Analyst

Cyber Security Operations: Building or Outsourcing

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Hunting for the Undefined Threat: Advanced Analytics & Visualization

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

DYNAMIC DNS: DATA EXFILTRATION

Dealing with Big Data in Cyber Intelligence

The Next Generation Security Operations Center

WHITE PAPER: THREAT INTELLIGENCE RANKING

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Rashmi Knowles Chief Security Architect EMEA

Concierge SIEM Reporting Overview

IBM Security IBM Corporation IBM Corporation

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Threat Intelligence is Dead. Long Live Threat Intelligence!

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

IBM Security Intelligence Strategy

Evolution Of Cyber Threats & Defense Approaches

RSA Security Analytics

Advanced Threats: The New World Order

The Role of Security Monitoring & SIEM in Risk Management

QRadar SIEM and FireEye MPS Integration

SQRRL ENTERPRISE Building the Modern Security Operations Center (SOC)

Cyber Security Metrics Dashboards & Analytics

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

QRadar SIEM and Zscaler Nanolog Streaming Service

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

RSA Security Anatomy of an Attack Lessons learned

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection

EITC Lessons Learned: Building Our Internal Security Intelligence Capability

After the Attack: RSA's Security Operations Transformed

Performing Advanced Incident Response Interactive Exercise

State of Security Monitoring of Public Cloud

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Accenture Cyber Security Transformation. October 2015

Security strategies to stay off the Børsen front page

The Future of the Advanced SOC

Security Operations Metrics Definitions for Management and Operations Teams

Metric Matters. Dain Perkins, CISSP

Applied Security Metrics

IBM QRadar Security Intelligence April 2013

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Defining, building, and making use cases work

Advanced Threat Protection with Dell SecureWorks Security Services

The Five W's of SOC Operations. Kevin

Building a Security Operations Center (SOC)

I D C A N A L Y S T C O N N E C T I O N

Software that provides secure access to technology, everywhere.

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Integrating MSS, SEP and NGFW to catch targeted APTs

EXTENDING NETWORK SECURITY: TAKING A THREAT CENTRIC APPROACH TO SECURITY

HP ArcSight User Behavior Analytics

Breach Found. Did It Hurt?

Caretower s SIEM Managed Security Services

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Data Science Transforming Security Operations

Continuous Network Monitoring

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

ALERT LOGIC FOR HIPAA COMPLIANCE

Guidance Software Whitepaper. Best Practices for Integration and Incident Response Automation Using EnCase Endpoint Security

Towards Threat Wisdom

How To Manage Security On A Networked Computer System

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

Cyber security Building confidence in your digital future

Protecting against cyber threats and security breaches

A Cyber Security Integrator s perspective and approach

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

F-Secure Detection Service Service description

IBM Security Strategy

CLOSING THE GAP ON BREACH READINESS INSIGHTS FROM THE SECURITY FOR BUSINESS INNOVATION COUNCIL

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Cisco Advanced Malware Protection

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Transcription:

Gaining and Maintaining Support for a SOC Jim Goddard Executive Director, Kaiser Permanente

Objectives Agenda 1 Lessons learned 2 How to build interest 3 Producing tangible benefits 4 Building momentum 5 Communicating success 6 Expanding the ecosystem 7 Quantitative metrics

Lessons learned while building a SOC Investment is multi-year Agile development, not waterfall Mission must be focused Remember the triad of people, process and technology Seasoned leadership is essential Be visible Avoid silo s Manage 24/7 expectations LESSONS LEARNED

Why support is so important Investment is for the long haul SOC is not self-reliant Expectations can be too easily misplaced LESSONS LEARNED

Common objections must be overcome Aren t we already compliant? Can we just purchase a tool? INVESTMENT DECISION PROCESS Will this guarantee against a breach? What is the ROI? Can t we just outsource this? LESSONS LEARNED

Crisis events whether internal or external often stimulate interest, but you have to take it home from there UNCERTAINTY Explaining events in a way people understand Illustrating a solution Overcoming objections BUILD INTEREST

Produce tangible benefits people get Physical presence with visualization Diverse skillsets Actionable events, not data analysis Rapid, high touch response BENEFITS

Physical design Map to how you work and collaborate NASA versus open design Open floor Incident Command Center Manager offices Floor Design Space Productivity Security Interactive visualization Sound system Telepresence Clean images Biometrics Mantrap Secure network Dirty network PHYSICAL

Make sure your organization has enough reach Executive Leader Infrastructure SOC Manager Threat intel analysts Kill chain analysts Policy engineers Team leaders IR Manager Incident handlers Forensic specialists Investigators E-Discovery handlers Remediation engineers Analytics Manager Use case engineers Data scientists Quality assurance analysts ORGANIZATION

Build momentum with quick wins Year 1 Security & Event Management (SIEM) Flow data Security control data (e.g., malware) Threat intel & IOC detection Reference lists Year 2 Log data analytics Raw data capture IOC sweeps & quarantine Lateral movement Data visualization Year 3 Application level analysis Countermeasure automation Big data analytics MOMENTUM

Startup use cases can get you more actionable events Day 1 domains Imposter domains Threat & reputation feeds Internal scanning Connection anomalies User baselining Advanced Warning Infiltration Escalation Exfiltration Callbacks IDS exploits Domain name entropy Volumetric analysis Entropy analysis Frequency analysis MOMENTUM

Communicate wins that people will read Give up the techie talk and explain Make the communication accessible (no Powerpoint; simple text that looks good on a phone). Be brief (2-3 swipes on a phone). Executives don t have time to figure out what you are trying to say. Give them what they want to know, not what you want to say. Never be late. COMMUNICATION

What you should try to communicate (with responsibility) Incident alerts and updates Countermeasure application Threat intelligence (formal and informal) Operational metrics Customer inquiries COMMUNICATION

Continue to expand your ecosystem INITIAL GROUPS TO CO-OPT: Incident Response Legal Compliance Senior executives LONGER TERM VALUE: Infrastructure Service Desk Architecture & Strategy Sales ECOSYSTEM

Operational metrics will also help drive perception Area Detection Response Metrics Detected versus reported Correct designations for response Time to analyze and resolve False positives Time to contain, by severity Indicators of compromise with actionable events Remediation Time to remediate, by severity Repeat incidents METRICS

Questions?