IT Security Strategy and Priorities. Stefan Lager CTO Services stefan.lager@addpro.se



Similar documents
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Advanced Threats: The New World Order

End-user Security Analytics Strengthens Protection with ArcSight

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Payment Card Industry Data Security Standard

2012 North American Managed Security Service Providers Growth Leadership Award

Overcoming PCI Compliance Challenges

Modular Network Security. Tyler Carter, McAfee Network Security

Clavister InSight TM. Protecting Values

White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

The Role of Security Monitoring & SIEM in Risk Management

Click to edit Master title style. How To Choose The Right MSSP

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

INCIDENT RESPONSE CHECKLIST

Speed Up Incident Response with Actionable Forensic Analytics

Unknown threats in Sweden. Study publication August 27, 2014

Discover Security That s Highly Intelligent.

Security Information & Event Management (SIEM)

Security Analytics The Beginning of the End(Point)

24/7 Visibility into Advanced Malware on Networks and Endpoints

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

Software that provides secure access to technology, everywhere.

Data Center Security in a World Without Perimeters

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Logging In: Auditing Cybersecurity in an Unsecure World

RSA Security Analytics

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Unified Threat Management, Managed Security, and the Cloud Services Model

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

McAfee Security Architectures for the Public Sector

IBM Security Operations Center Poland! Wrocław! Daniel Donhefner SOC Manager!

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

AppGuard. Defeats Malware

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö

Time Is Not On Our Side!

SOC & HIPAA Compliance

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

How To Buy Nitro Security

Endpoint Security - HIPS. egambit, your defensive cyber-weapon system. You have the players. We have the game.

HP NonStop Server Security and HP ArcSight SIEM

Cyber Situational Awareness for Enterprise Security

Caretower s SIEM Managed Security Services

IBM Security Strategy

REVOLUTIONIZING ADVANCED THREAT PROTECTION

After the Attack: RSA's Security Operations Transformed

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Continuous Network Monitoring

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Risk-based security buyer s guide:

IBM QRadar Security Intelligence April 2013

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Q1 Labs Corporate Overview

Operational Lessons from the RSA/EMC CIRC: People, Process, & Threat Intel

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!

you us MSSP are a Managed Security Service Provider looking to offer Advanced Malware Protection Services

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Endpoint & Server Protection. Brent Biernat First Vice President Network Services May 13, 2014

Is Your Network a Sitting Duck? 3 Secrets to Securing Your Information Systems. Presenter: Matt Harkrider. Founder, Alert Logic

What is Security Intelligence?

Current IBAT Endorsed Services

Towards Threat Wisdom

Security Services. 30 years of experience in IT business

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

SourceFireNext-Generation IPS

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

Vulnerability Intelligence & 3 rd party patch management

Analyzing HTTP/HTTPS Traffic Logs

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

CYBER SECURITY SERVICES PWNED

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Information Technology Policy

Security and Privacy

Uncover security risks on your enterprise network

North American Electric Reliability Corporation (NERC) Cyber Security Standard

The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era

Verve Security Center

Vulnerability Management

What does it mean to be secure?

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

2012 Data Breach Investigations Report

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

Protecting Your Organisation from Targeted Cyber Intrusion

Managed Security Services for Data

Breach Found. Did It Hurt?

The Next Generation Security Operations Center

Memory Forensics & Security Analytics: Detecting Unknown Malware

Changing the Enterprise Security Landscape

MANAGED SECURITY SERVICES (MSS)

The Cloud App Visibility Blindspot

Transcription:

IT Security Strategy and Priorities Stefan Lager CTO Services stefan.lager@addpro.se

Cyberthreat update

Why would anyone want to hack me?

I am not a bank!

Security Incidents with Confirmed Data Loss Source: Verizon Data Breach Report 2014

This is only a subjective American view of the problem!

Countries Represented in Data Breach Source: Verizon Data Breach Report 2014

8

KPMG Study Highlights 14 Organizations 5.000 Average number of employees 70.000 Hosts Breached Organizations 17% Exfiltrating Organizations 93% No Detected Breach Breached Organisations 79% 21% No Detected Data Exfiltration Detected Data Exfiltration 9

Malware Data 15.586 Security Events 195 Unique Malware Objects Malware Type 52% 48% Known Malware Unknown Malware Unknown=Tested against 53 different AV vendors using VirusTotal.com with no match 10

Average time between breach and detection is 229 days Source: Mandiant Incident Response 2014

Amount of companies that learns from a third party that they have been breached: 67% Only 1/3 of the companies discovered that they had been breached by themselves Source: Mandiant Incident Response 2014

Conclusion #1 Most of you are probably already infected Most of you already have Firewalls and Antivirus Conclusion: Develop a strategy for limiting the impact of a breach

Attack Lifecycle

Attack Lifecycle 1. 2. 4. 1. Attack phase Exploit vulnerability on client or server. 2. Control phase Establish remote control and download tools 3. Explore phase Search for more valuable data 3. 4. Extract phase Extract valuable data

Different technologies addresses different phases Attack Control Explore Extract Firewall Intrusion Prevention AntiVirus WebFiltering SIEM Threat Intelligence Advanced AntiMalware Network Forensics SIEM/NBAD Intrusion Prevention Network Forensics Intrusion Deception File Integrity Monitoring DLP Threat Intelligence Network Forensics

Conclusion #2 We need to have a technology for protecting against attacks AND We need to have a technology for detecting anomalies

The three pillars of security Your business! Technology Configuration 24x7 Operations

Difficulty Level Rocket Science Very Hard The Configuration Challenge Hard Medium Security Access Control (ex: FW/WF) Attack Mitigation (ex: IPS/AV) Security Analytics (ex: SIEM/FIM) Security Forensics

The Operation Challenge Example: Increase team to be able to support 24x7 operations SOC Employee Cost 700 000 SEK 600 000 SEK 500 000 SEK 400 000 SEK 300 000 SEK 200 000 SEK 100 000 SEK - SEK 676 440 SEK TeamCost 24x7 250 532 SEK TeamCost 8x5 TeamCost 24x7 TeamCost 8x5

Summary Develop a strategy for detecting infected hosts. Develop a strategy for limit the impact of a breach. If you don t have the expertise or resources in-house, consider buying as a service.

AddPro Security and Communication AddPro S&C is one of the leading Network Security VARs in the Nordic. Our best-in-class Professional Services team and our 24x7 managed security services are helping some of the largest customers in the Nordic to address the growing challenge of providing the Security and Availability they need to stay competitive. AddPro S&C Customers Products Professional Services Managed Services

Thanks for listening! Stefan Lager CTO Services stefan.lager@addpro.se

Let s get this out of the way: some MSSPs REALLY suck! Dr Anton Chuvakin Research VP at Gartner's GTP Security and Risk Management group 26

Challenges with MSSPs So let s take a hard look at some challenges with using an MSSP for security: Local knowledge Lack of customization and one-size-fits-all Delineation of responsibilities Inherent third-partiness AddPro S&K Customers Products Professional Services Managed Services 27

Example of a Managed Security Services Customer Security Auditing 764 Servers with FIM File Integrity Monitoring 5128 Log Sources with SIEM Log Collection and Correlation: 290 IPS Network Intrusion Prevention System Security scanning 11.000 Internal vulnerability scanning 1.700 External perimeter vulnerability scanning Malware analysis Endpoint security (AV, HIPS, FW) investigation Trend analysis Correlation (semi automatic) with external system (mail gateways / proxy services)

Grow with AddPro!

Grow with AddPro! AddPro Support AddPro NOC AddPro Managed Services AddPro SOC Certifies Engineers Addpro portfolio Vendor support partner Strategic vendors Alert Monitoring Performance Trending Life cycle management Change management Strategic vendors Security monitoring Security analysing PCI compliance Post incident analysis

Service Portfolio Professional Services Network Operations Center Security Operations Center Security Incident Response Team Design Installation Configuration Reactive alert monitoring Proactive trending Lifecycle Management Change Management Event Correlation Event Analytics Threat Intelligence Vulnerability Assessment Response Readiness Assessment Incident Response

Grow with AddPro!

Tackar för tiden Vi bygger digitala motorvägar