BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY



Similar documents
Getting Ahead of Advanced Threats

The Next Generation Security Operations Center

Security Analytics for Smart Grid

The Future of the Advanced SOC

Using Network Forensics to Visualize Advanced Persistent Threats

The session is about to commence. Please switch your phone to silent!

SECURITY MEETS BIG DATA. Achieve Effectiveness And Efficiency. Copyright 2012 EMC Corporation. All rights reserved.

Rashmi Knowles Chief Security Architect EMEA

RSA Security Anatomy of an Attack Lessons learned

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Advanced Persistent Threats

Advanced Threats: The New World Order

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Detect & Investigate Threats. OVERVIEW

RSA Security Analytics the complete approach to security monitoring or how to approach advanced threats

CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics

Discover & Investigate Advanced Threats. OVERVIEW

What s New in Security Analytics Be the Hunter.. Not the Hunted

IBM Security IBM Corporation IBM Corporation

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Bernard Montel Directeur Technique RSA. Copyright 2012 EMC Corporation. All rights reserved.

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Combating a new generation of cybercriminal with in-depth security monitoring

ECOMMERCE AND MERCHANT FRAUD PREVENTION

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

KNOW THE UNKNOWN WITH SECURITY ANALYTICS

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Data Analytics for a Secure Smart Grid

Bridging the gap between COTS tool alerting and raw data analysis

The SIEM Evaluator s Guide

JUNIPER NETWORKS SPOTLIGHT SECURE THREAT INTELLIGENCE PLATFORM

After the Attack. The Transformation of EMC Security Operations

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Increase insight. Reduce risk. Feel confident.

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Extending security intelligence with big data solutions

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

State of Security Monitoring of Public Cloud

Security strategies to stay off the Børsen front page

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Security Trends. The Case for Intelligence-Driven Security. Copyright 2013 EMC Corporation. All rights reserved.

The Purview Solution Integration With Splunk

FIRST Conference ISOC CARIS Workshop ACDC European Cyber Defence Pilot Experience

Repave the Cloud-Data Breach Collision Course

Caretower s SIEM Managed Security Services

IBM QRadar as a Service

Is your SIEM ready.???

REVOLUTIONIZING ADVANCED THREAT PROTECTION

The Trends and the Customer Challenges in Identity and Access Management

Continuous Network Monitoring

IBM QRadar Security Intelligence April 2013

IBM SECURITY QRADAR INCIDENT FORENSICS

CIAB FINANCE & DISRUPTION

Dr. Konstantinos Ap. Eleftherianos Dr. Konstantinos Papapanagiotou. ISACA Athens Chapter Conference Athens 4/11/2013

Joining Forces: Bringing Big Data to your Security Team

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Discover Security That s Highly Intelligent.

QRadar SIEM and FireEye MPS Integration

Real-Time Security Intelligence for Greater Visibility and Information-Asset Protection

RSA Security Analytics

Cyber Situational Awareness for Enterprise Security

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

How To Buy Nitro Security

Security for the Cloud of Clouds

Microsoft s cybersecurity commitment

Data Science Transforming Security Operations

Defending Against Data Beaches: Internal Controls for Cybersecurity

Find the intruders using correlation and context Ofer Shezaf

Log Analysis: Overall Issues p. 1 Introduction p. 2 IT Budgets and Results: Leveraging OSS Solutions at Little Cost p. 2 Reporting Security

Addressing the Full Attack Continuum: Before, During, and After an Attack. It s Time for a New Security Model

How To Make Data Streaming A Real Time Intelligence

What is Security Intelligence?

End-user Security Analytics Strengthens Protection with ArcSight

THE EVOLUTION OF SIEM

Teradata and Protegrity High-Value Protection for High-Value Data

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Intelligence Driven Security

Information Technology Policy

Protecting against cyber threats and security breaches

VISIBLY BETTER RISK AND SECURITY MANAGEMENT

IBM Security Intelligence Strategy

DYNAMIC DNS: DATA EXFILTRATION

Security and Privacy

Demystifying Big Data Government Agencies & The Big Data Phenomenon

Mucho Big Data y La Seguridad para cuándo?

SITUATIONAL AWARENESS MITIGATE CYBERTHREATS

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

Attack Intelligence: Why It Matters

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Introduction to the Event Analysis and Retention Dilemma

A New Era Of Analytic

Minder. simplifying IT. All-in-one solution to monitor Network, Server, Application & Log Data

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Transcription:

BIG DATA CHANGING THE REALM OF POSSIBILITY IN SECURITY Shaun McLagan General Manager, RSA Australia and New Zealand 1

Things have changed #2 Buzz word 2012 Big Data only behind something called Fiscal Cliff - TIME Magazine 2

Market Disruptors Mobile Cloud Big Data Extended Workforce Networked Value Chains APTs Sophisticated Fraud Infrastructure Transformation Less control over access device and back-end infrastructure Business Transformation More hyper-extended, more digital Threat Landscape Transformation Fundamentally different tactics, more formidable than ever 3

Traditional Security is Not Working 99% of breaches led to compromise within days or less with 85% leading to data exfiltration in the same time 85% of breaches took weeks or more to discover Source: Verizon 2012 Data Breach Investigations Report 4

Big Data Is everywhere Volume, Variety, Velocity 5

How Big is Big Data? Social and Personal 1,000,000,000 Queries a Day 900ms Average Response Time 250,000,000 New Photo s/day 900,000,000 Active Users 47,000 Apps Downloads per Minute 125,000,000 Users (icloud) 290,000,000 Updates/Day 135,000,000 Resumes Archived 6

Business and Transactional European Organization for Nuclear Research Generates 40TB of Scientific Data per Second More than 1 Million Transactions per Hour Generates 1 TB of New Trading Data per Day Credit Card Fraud Detection System Protects 2.1 Billion Active Accounts World-wide 137 Million Customers, 895 Million Products Real-time Recommendations 7

Big Data The world we live in. 8

BIG Data driving change 9

Opportunities $ 10

Challenges. 11

Bridge to Anatomy 12

Anatomy of an attack Attacker Surveillance Target Analysis Access Probe Attack Set-up System Intrusion Attack Begins Discovery/ Persistence Cover-up Starts Leap Frog Attacks Complete Cover-up Complete Maintain foothold TIME Source: NERC HILF Report, June 2010 (http://www.nerc.com/files/hilf.pdf) 14

Anatomy of a response TIME Physical Security Threat Analysis Defender Discovery Attack Forecast Source: NERC HILF Report, June 2010 (http://www.nerc.com/files/hilf.pdf) Monitoring & Controls Attack Identified Incident Reporting Containment & Eradication Impact Analysis Damage Identification System Reaction Response Recovery 15

Reducing Attacker Free Time Attacker Surveillance Target Analysis Access Probe Attack Set-up System Intrusion Attack Begins Discovery/ Persistence Cover-up Starts Leap Frog Attacks Complete Cover-up Complete Maintain foothold TIME ATTACKER FREE TIME TIME Physical Security Threat Analysis Defender Discovery Attack Forecast Source: NERC HILF Report, June 2010 (http://www.nerc.com/files/hilf.pdf) Monitoring & Controls Incident Reporting Attack Identified Containment & Eradication Damage Identification Impact Analysis Respons e Recovery System Reaction 16

Must learn to live in a state of compromise Constant compromise does not mean constant loss 17

Big Data and Analytics Addressing the Challenges 18

Companies require Comprehensive Visibility Agile Analytics Analyze everything that s happening in my infrastructure Enable me to efficiently analyze and investigate potential threats Actionable Intelligence Optimised Incident Management Help me identify targets, threats & incidents Enable me to manage these incidents 19

Changing The Security Management Status Unified platform for security monitoring, incident investigations and compliance reporting SIEM Compliance Reports Device XMLs Log Parsing RSA Security Analytics Fast & Powerful Analytics Logs & Packets Unified Interface Analytics Warehouse Network Security Monitoring High Powered Analytics Big Data Infrastructure Integrated Intelligence SEE DATA YOU DIDN T SEE BEFORE, UNDERSTAND DATA YOU DIDN T EVEN CONSIDER BEFORE 20

Trend Analysis and Pattern Detection Big Data Analytics Enables Risk Mitigation and Behavioral Prediction Security Analytics Live Trend Detected Small Grain, Continuous Streaming Data Web packets Email traffic Intra-org traffic Server Logs Security Logs Data Models Parsers& Alerts Fast Active Data Trend Validated & Details Big Historical Data 21

Summary Things have changed and continue to rapidly Traditional security is not working Existing tools are becoming less effective Combating advanced threats requires a new approach to security operations Security Analytics is RSAs new tool to support this approach 22

Next Steps - Recommendations Create a transformational security strategy Migrate from point products to a unified security architecture using open and scalable Big Data Tools Strengthen your operation s data science skills Leverage external threat intelligence Finally, create a shared data architecture for security information 23

Security Management Architecture 24

THANK YOU 25