Information & Asset Protection with SIEM and DLP



Similar documents
HP and netforensics Security Information Management solutions. Business blueprint

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Cisco Security Optimization Service

Tivoli Security Information and Event Manager V1.0

LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE

How To Improve Your Business

What is Security Intelligence?

Eric Moriak - CISSP, CISM, CGEIT, CISA, CIA Program Manager - IT Audit Children s Medical Center Dallas. Dallas, Texas

Q1 Labs Corporate Overview

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Proven LANDesk Solutions

QRadar SIEM 6.3 Datasheet

Avoiding the Top 5 Vulnerability Management Mistakes

Security Information & Event Management (SIEM)

Enterprise Security Solutions

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

Cloud Security Trust Cisco to Protect Your Data

IBM QRadar Security Intelligence April 2013

IBM Data Security Services for endpoint data protection endpoint data loss prevention solution

Preemptive security solutions for healthcare

Data Loss Prevention Program

SIEM Implementation Approach Discussion. April 2012

Payment Card Industry Data Security Standard

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Best Practices for Building a Security Operations Center

Enterprise Security Tactical Plan

How can Identity and Access Management help me to improve compliance and drive business performance?

Become a hunter: fi nding the true value of SIEM.

State of Oregon. State of Oregon 1

Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?

Vulnerability Management

IBM QRadar as a Service

How To Buy Nitro Security

Dr. Anton Security Warrior Consulting

Using SIEM for Real- Time Threat Detection

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

Symantec DLP Overview. Jonathan Jesse ITS Partners

LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE

Clavister InSight TM. Protecting Values

Boosting enterprise security with integrated log management

"Service Lifecycle Management strategies for CIOs"

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Remote Management Services Portfolio Overview

Total Protection for Compliance: Unified IT Policy Auditing

NEC Managed Security Services

FIVE PRACTICAL STEPS

McAfee Data Protection Solutions

The Impact of HIPAA and HITECH

RFI Template for Enterprise MDM Solutions

IBM Global Technology Services Preemptive security products and services

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Compliance Management, made easy

Enabling Security Operations with RSA envision. August, 2009

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

ARS v2.0. Solution Brief. ARS v2.0. EventTracker Enterprise v7.x. Publication Date: July 22, 2014

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

RSA SIEM and DLP Infrastructure and Information Monitoring in One Solution

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

An enterprise grade information security & forensic technical team

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Accelerate Your Enterprise Private Cloud Initiative

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Ovation Security Center Data Sheet

How To Create Situational Awareness

Sarbanes-Oxley Act. Solution Brief. Sarbanes-Oxley Act. Publication Date: March 17, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Metrics that Matter Security Risk Analytics

Alcatel-Lucent Services

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Securing and protecting the organization s most sensitive data

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Cisco Remote Management Services for Security

Managed Security Services Portfolio

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

A Websense White Paper Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway

Kelvin Wee CISA, CISM, CISSP Principal Consultant (DLP Specialist) Asia Pacific and Japan

Data Protection McAfee s Endpoint and Network Data Loss Prevention

How To Protect Your Network From Attack From A Network Security Threat

The Protection Mission a constant endeavor

LogRhythm and NERC CIP Compliance

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

What is SIEM? Security Information and Event Management. Comes in a software format or as an appliance.

Intelligence Driven Security

Continuous Network Monitoring

INCIDENT RESPONSE CHECKLIST

IBM Internet Security Systems

Defending against modern cyber threats

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Cisco Network Optimization Service

Cisco Security IntelliShield Alert Manager Service

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Lot 1 Service Specification MANAGED SECURITY SERVICES

nfx One for Managed Service Providers

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

The Cloud App Visibility Blindspot

Transcription:

Information & Asset Protection with SIEM and DLP Keeping the Good Stuff in and the Bad Stuff Out Professional Services: Doug Crich Practice Leader Infrastructure Protection Solutions

What s driving the need? Corporate Governance Do employees respect and adhere to internal policies and controls? Are my assets protected against illicit behaviour? Critical Infrastructure Are intruders gaining access and removing data? Is my network open to existing and emerging threats? Competitive Advantage Are insiders putting the organization at risk? What about my customers and partners data? Compliance Are there regulatory risks? Are all mandated controls in place? Page 2

IT security challenges Gap between Corporate Security Policy and the business use of IT Lack of integrated tools to enable situational awareness of security threats Thousands of devices & countless applications on Windows, Unix, Linux, etc. Spending countless hours investigating incidents Regulatory retention and reporting requirements are costly Decentralized responsibility for managing data and IT assets across the enterprise Functional teams require different types of log data for numerous reasons; Inventory of assets is not available or not up to date No clear view of where critical information and assets reside within the IT infrastructure. Page 3

Making sense of events Firewalls Firewalls Firewalls/ VPN IDS/IPS SIEM / DLP Network Equipment Server and Desktop OS Anti-Virus Applications Anti Anti Databases Virus Virus Mainframes Sign-On Sign-On Identity Management Directory Services User Attributes Physical Infrastructure Business Processes Centralized view provides: Detection of sophisticated threats Ability to monitor compliance Control of Risk to business continuity Page 4

DLP and SIEM what are they? Data Loss Prevention (DLP) refers to technologies and inspection techniques that detect and prevent the unauthorized use and transmission of confidential information. Aka Data leakage protection, Data leak prevention, Information leak prevention Security Information and Event Management (SIEM) consists of managing and reacting to the information and events produced by IT Infrastructure Aka SIM and SEM Page 5

What SIEM and DLP have in common DLP SIEM In-Motion At-Rest In-Use e Mail Web mail IM / Chat Blogs File Sharing Web Uploads Desktops Notebooks Databases File Shares Doc Mgmt Sys USB Sticks CD / DVD Hard drives Printouts File share Preventive Control Used to develop, educate and enforce security policies and governance related to handling and transmission of sensitive data Mitigates risk through identity aware policy based remediation and enforcement. Network, Host /endpoint and discovery (stored) Performs some level of remedial action - notification /alerting to active blocking based on policy settings. Detective Control Provides real-time security alerting and monitoring through log collection Filters, aggregates large quantities of data Correlates, analyses and scores events to isolate high risk threats Primary drivers are regulatory compliance, user activity and resource access monitoring, and; Real time event management for network security Key Elements of a Multi Layered Information Security and Risk Management Plan Page 6

Implementation Considerations

The vendor s value proposition The Promise Out of the Box: DLP is ideal for information security and compliance SIEM technology provides a holistic view of internal and external threats DLP deployment is quick and requires low operational cost SIEM solutions improve operational efficiencies and cut administrative costs The Reality Not Without Considerable Planning,Configuration and Integration Page 8

The SIEM/DLP objective To be effective, an organization s SIEM/DLP framework must address and support the business objectives Strategic Protect the confidentiality, integrity and availability of systems and information, Improve Service, Legal and Regulatory Compliance; Tactical Install Safe Guards and Countermeasures to prevent loss and minimize threats- mitigate risk; Operational Implement security policies and workflow that ensures the organization functions in an efficient and predicable manner. Page 9

Common SIEM / DLP deployment mistakes Technology implemented without formalized planning. Failing to understand what the technology is capable of and how and what to properly integrate it with. Lack of understanding of what and where sensitive data reside Inappropriate and/or ineffective log generation and capture Lack of commitment of project resources Little or no integration- systems, ops and workflow. Environment is not modelled Impacts of outsourcing arrangements are not considered You Can t Hit A Bulls Eye If You Don t Know Where The Target Is!! Page 10

Implementation best practices Stakeholder Participation Confirm Alignment to Business Goals Identify Data that Needs Protection Develop Use Cases Architect for CIA Implement by priority for Quick Hits Resolve conflicts between security controls IT Asset Classification Model the Network Integrate IDM or AD for more granular role level monitoring and reporting System Configuration and Tuning Technology Is Not A Silver Bullet Provide mentoring and support following Go Live Page 11

Build an Ops framework Develop an organizational model; Create job descriptions and workflows; Perform an inventory of existing skills; Benchmark existing skills against best practices; Recruit and train qualified personnel; Short Term Staff Augmentation Outsourcing Align operations processes and procedures with technology workflow Provide training on functions, processes and technology to maximize productivity Page 12

Bell s implementation methodology Advise Design Develop Implement Operate Planning & Design Requirements Gathering Security Policy Alignment Privacy and Compliance IT Security Objectives Data Classification &Handling Use Case Development Solution Architecture Network and Asset Modeling Organizational Model Design Sign-off Transition to Delivery Delivery & Implementation Infrastructure Implementation Systems Configuration Integration of tools and processes Content Development Training and Knowledge Transfer Testing and Tuning Sign-off Go Live Operation Monitoring and Reporting Incident Response and Remediation Content Management Updates Solution Evolution/Tuning Analysis Forensics Auditing Continuously Refined to Maintain Alignment with Objectives Page 13

Benefits of proper implementation Benefit Pre-emptive Information Security and Risk Management Benefit Increased Operational Efficiency Benefit Key Elements of a Multi Layered Information Security and Risk Management Plan Page 14

Bell is uniquely positioned to address SIEM/DLP requirements Broad experience developing and deploying information security infrastructure from concept to completion Users of leadership SIEM/DLP technologies passing best practices to our customers; Extensive internal/external ISO17799 compliant security policy development experience ; Multiple SOCs providing Security Services to Bell Customers and internally. Breadth and depth of ICT Security Solutions offerings provide key building blocks Extensive network of labs for solution testing,innovation and execution Comprehensive, Professional Services with packaged toolkits for planning, deploying and operating SIEM/DLP within Government, Health, Finance, Manufacturing, etc. Experience implementing and integrating complex, multi-vendor solutions; Leverage our multiple partnerships with leading vendors for comprehensive solutions portfolio Page 15

Bell Security Summit Special Offer SIEM or DLP Architecture Workshop Bell will provide a 2 hour Architecture Planning Workshop for either SIEM or DLP Define Client s Requirements and Business Objectives Develop a High Level Solution Architecture Limited time offer valid until November 30. Page 16

Case Study Large Canadian Financial Institution The Need/Challenge Financial institution is facing increasing challenges and pressure through legislative, public and internal means to safeguard corporate and operational information by instituting stronger infrastructure safeguards and controls. Required to secure and support over 22 different technologies from a multitude of vendors Existing vendors included Microsoft Windows Server 2008, Cisco, Symantec,Check Point, IBM, CA The Bell Solution Understand current log management infrastructure Through Consultation with stakeholders and knowledge Experts Analysis of log management ecosystem Categorization of the criticality of each network device Determine key business and security imperatives Provide a Vision with clearly defined measurable goals Conduct Survey or Log Mgmt. maturity within Canadian FIs Create a strategy and roadmap for The Result The Strategy and Roadmap provides a structured approach for the FI to evolve towards Log Management/SIEM Best Practices nationally Page 17

Case Study Large Manufacturer SUMMARY The Need/Challenge The organization had separate consoles for four different solutions that was resulting in lost efficiencies, missed security events, extensive manual processes and effort for the organization. Client required a all encompassing GRC Security plan including an automated event management process to ensure no critical events were missed. The Bell Solution Bell engaged the client in creating a GRC Security Roadmap. Bell partnered with ArcSight to Provide a "single pane of glass" consolidating event management and monitoring and enabling a Proactive response to events based on threat correlation and triggers. Bell partnered with best in class Vendors to enhance their security posture through deployment of SIEM, DLP and Secure Content Solutions. The Result Faster and more efficient determination of real actionable events that require immediate attention. Increase in productivity and Proactive response of the security team. Mitigated Corporate Risk Associated by protecting Intellectual Property. Preventive response to Data Loss. Page 18

Q&A For more information on Bell s SIEM, DLP and other Security expertise and offerings, please contact: Palma Petrilli palma.petrilli@bell.ca