REN-ISAC Research and Education Networking Information Sharing and Analysis Center



Similar documents
Research and Educational Networking Information Analysis and Sharing Center (REN-ISAC)

Security Topics Update. Christopher Misra Doug Pearson April 2008

Information Security in Higher Education

SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012

Security Activities Update

Computer and Network Security in Higher Education

Security Incident Management Essentials Compiled as a service to the community by Internet2, EDUCAUSE, and REN-ISAC

Statement of John (Jack) Suess, CIO, UMBC, and Cochair of the EDUCAUSE/Internet2 Computer and Network Security Task Force

FS-ISAC CHARLES BRETZ

Romanian National Computer Security Incident Response Team CERT-RO.

DANCERT RFC2350 Description Date: Dissemination Level:

Cyber security in an organization-transcending way

US-CERT Year in Review. United States Computer Emergency Readiness Team

A Crisis Response, Information Sharing View of FFIEC Appendix J?

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

INFRAGARD.ORG. Portland FBI. Unclassified 1

Developing Cyber Threat Intelligence or not failing in battle.

Use of Honeypots for Network Monitoring and Situational Awareness

Trends in Security Incidents and Hitachi s Activities

Report on CAP Cybersecurity November 5, 2015

Department of Homeland Security

Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia

Threat Intelligence for Dummies. Karen Scarfone Scarfone Cybersecurity

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for K-12 Education

A BRAINSTORMING ON SECURITY FIRE DRILLS

Cyber Incident Annex. Cooperating Agencies: Coordinating Agencies:

Cyber Security Threats Shehzad Mirza Director of the MS ISAC SOC

Data Driven Assessment of Cyber Risk:

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

NUIT Tech Talk. Peeking Behind the Curtain of Security. Jeff Holland Security Vulnerability Analyst Information & Systems Security/Compliance

Microsoft s cybersecurity commitment

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Get the most out of Public Sector Cyber Security Associations & Collaboration

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

Continuous Penetration Testing

Cisco Remote Management Services for Security

Can We Become Resilient to Cyber Attacks?

5 IT Security Planning and Practice

The Importance of a Multistakeholder Approach to Cybersecurity Effectiveness

2. OVERVIEW OF THE PRIVATE INFRASTRUCTURE

Water Security in New Jersey: Partnership and Services

Rashmi Knowles Chief Security Architect EMEA

Guide to Cyber Threat Information Sharing (Draft)

Department of Homeland Security Federal Government Offerings, Products, and Services

aecert Roadmap Eng. Mohammed Gheyath Director, Technical Affairs TRA

Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India grai@mit.gov.in

Cyber Information-Sharing Models: An Overview

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

About Botnet, and the influence that Botnet gives to broadband ISP

US-CERT Overview & Cyber Threats

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Cyber Security Metrics Dashboards & Analytics

Network Security Deployment (NSD)

Cyber Watch. Written by Peter Buxbaum

Introduction. Special thanks to the following individuals who were instrumental in the development of the toolkits:

How To Improve Federal Network Security

Cisco & Big Data Security

Thomas J. Schlagel Chief Information Officer, BNL

I D C T E C H N O L O G Y S P O T L I G H T

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Application for Membership

NASCIO 2015 State IT Recognition Awards

Cyber Incident Annex. Federal Coordinating Agencies. Coordinating Agencies. ITS-Information Technology Systems

Coordinating Attack Response at Internet Scale (CARIS)

MassMutual Cyber Security. University of Massachusetts Internship Opportunities Within Enterprise Information Risk Management

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

Sharing Intelligence is our Best Defense: Cyber Security Today Is a bit Like the Keystone Cops

National Initiative for Cybersecurity Education

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

State Engagement with the Energy Sector to Improve Cyber Security

Cyber Intelligence Workforce

Incident Management ITU Pillars & Qatar Case Study Michael Lewis, Deputy Director

Defense Security Service

Privacy Impact Assessment EINSTEIN Program

Practical Steps To Securing Process Control Networks

Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc

Working with the FBI

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES. second edition

Statement of. Mike Sena. President, National Fusion Center Association. Director, Northern California Regional Intelligence Center (NCRIC)

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

How To Understand And Manage Cybersecurity Risk

Steering Committee. Working Group 2A. Cyber Security Best Practices. March 14, Presented By: Phil Agcaoili, Co Chair Gary Toretti

Ty Miller. Director, Threat Intelligence Pty Ltd

Protecting against cyber threats and security breaches

Homeland Security: Information Assurance Challenges and Opportunities. Building the National Cyber Security Division

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Unified Security Management and Open Threat Exchange

Microsoft Security Systemats

honeytarg Chapter Activities

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Situational Awareness A Discussion

Cyber Security Defense Services Portfolio Development Status. February 2016

Network Security Deployment Obligation and Expenditure Report

Transcription:

REN-ISAC Research and Education Networking Sharing and Analysis Center EDUCAUSE and Internet2 Security Professionals Conference April 2007

Introductions Mark Bruhn AVP for Telecommunications, IU AD, Center for Applied Cybersecurity Research Executive Director REN-ISAC mbruhn@iu.edu Chris Misra Network Analyst, UMass Chair, REN-ISAC Technical Advisory Group cmisra@nic.umass.edu Doug Pearson Technical Director REN-ISAC dodpears@ren-isac.net Jack Suess VPIT and CIO, UMBC Chair, REN-ISAC Executive Advisory Group jack@umbc.edu Dave Monnier Principal Security Engineer, REN-ISAC dmonnier@ren-isac.net

In this presentation, we ll: Presentation Outline describe ISACs in general, give a general description of the REN-ISAC, give details regarding what REN-ISAC does, make an important announcement(!), outline the REN-ISAC organization, talk about REN-ISAC membership.

ISACs in general Formation encouraged by U.S. Government Presidential Decision Directive 63: Protecting America's Critical Infrastructures (1998) and subsequently affirmed in The National Strategy to Secure Cyberspace (2003) Collect, derive, analyze, and disseminate security threat information, including: the physical security of infrastructure, operations, and facilities, and computing and networking infrastructures Provide resources to support member understanding of threats, protection, and mitigation, so that member organizations can better defend and secure their infrastructures and operations. Most are private-sector entities.

ISACs Communications Chemical Industry Electricity Sector Energy Emergency Mgmt and Response Financial Services Highway Technology Multi-State Public Transit Research and Education Networking Surface Transportation Supply Chain Water

The REN-ISAC: REN-ISAC is an integral part of U.S. higher education s strategy to improve network security through information collection, analysis, dissemination, early warning, and response; is specifically designed to support the unique environment and needs of higher education and research organizations; and, supports efforts to protect national cyber infrastructure by participating in the formal U.S. ISAC structure. Foremost, REN-ISAC is a member-driven trusted community for sharing sensitive information regarding cybersecurity threat, incidents, response, and protection.

Members 24x7 Watch Desk Sharing Served Networks Collect, analyze, and disseminate intelligence Products Education Intel Relationships Registry Tools Exercises

Members 24x7 Watch Desk Sharing Served Networks Collect, analyze, and disseminate intelligence Products Education Intel Relationships Registry Tools Exercises

network instrumentation and sensors backbone netflow REN-ISAC darknet Shared Darknet Project Global NOC operational monitoring members direct reconnaissance Collect, analyze, and disseminate intelligence REN-ISAC staff members 24x7 Watch Desk information sharing relationships

Members 24x7 Watch Desk Sharing Served Networks Collect, analyze, and disseminate intelligence Products Education Intel Relationships Registry Tools Exercises

private threat collection and mitigation efforts e.g. among ISPs,.edu regional groups, etc. other sector ISACs daily inter-isac status conference DHS/US-CERT and other national CERTS and CSIRTS Intel Relationships Global Research NOC at IU servicing Internet2 Abilene, NLR, and international connecting networks vendors Microsoft / REN-ISAC SCPe

Microsoft / REN-ISAC SCPe New Partnership announced today! Security Cooperation Program for Education The program provides a focal point for Microsoft to share vital security information with the research and higher education communities. Under the agreement, Microsoft and the REN- ISAC will share information regarding vulnerabilities, exploits, and fixes, as well as other information at a level of depth and detail that will help both parties become more proactive and responsive to issues affecting the global community. Provides access to materials to support member security awareness programs.

Microsoft / REN-ISAC SCPe This unique trust relationship with Microsoft will provide an information source from which we can impart important security and product information to our membership, and through which we can give feedback to Microsoft regarding our security experiences with their products. The relationship will be supported and facilitated through a REN-ISAC Microsoft Analysis Team Ryan Eads, University of Illinois, Urbana-Champaign Brad Judy, University of Colorado, Boulder Sean Krulewitch, Indiana University Brian Smith-Sweeney, New York University Dave Monnier, REN-ISAC / Indiana University Doug Pearson, REN-ISAC / Indiana University

Additional information Microsoft / REN-ISAC SCPe http://www.ren-isac.net/relationships/microsoft.html http://www.ren-isac.net/advisory.html/#microsoft

Members 24x7 Watch Desk Sharing Served Networks Collect, analyze, and disseminate intelligence Products Education Intel Relationships Registry Tools Exercises

private Trust Community facilitates the sharing of sensitive information Sharing actionable information for protection and response Products and peer sharing within Trusted Communities members intel relationships Trust Community channels private mailing list secure IRC community web portal incident data downloads outside the Trust Community non-member.edu we send notifications of compromised machines

Members 24x7 Watch Desk Sharing Served Networks Collect, analyze, and disseminate intelligence Products Education Intel Relationships Registry Tools Exercises

Daily Weather Report provides situational awareness Alerts provide timely information concerning new or increasing threat. Notifications are sent to contacts at sources and targets of active threat or incident involving member networks. Threat Resources provide information regarding known active sources of threat. Monitoring views provide aggregate information for situational awareness. Products

Members 24x7 Watch Desk Sharing Served Networks Collect, analyze, and disseminate intelligence Products Education Intel Relationships Registry Tools Exercises

TechBurst webcasts inform on technical topics relevant to security protection and response; are presented monthly by members. Examples include: BotNet Detection Using DNS Methods Netflow Advanced Topics DNS: Protocols, Operation and Security Education Advisories inform regarding specific practices or approaches that can improve security posture. Peer interaction (IRC and mailing list)

Members 24x7 Watch Desk Sharing Served Networks Collect, analyze, and disseminate intelligence Products Education Intel Relationships Registry Tools Exercises

Internet2 Abilene Operational security exercises First held November 2005: Day-long table top exercise (talking only, no flows) Abilene backbone infrastructure attacks, 2 scenarios Report identifies ~40 observations Second (date TBD) will include domestic and international participants Exercises

Members 24x7 Watch Desk Sharing Served Networks Collect, analyze, and disseminate intelligence Products Education Intel Relationships Registry Tools Exercises

services malware analysis system (dev) passive DNS replication service (dev).edu notification system Cyber Security Registry (dev) wiki IRC listserv community portal RENOIR (WPI / CSI2 dev) monitors and sensors REN-ISAC darknet Shared Darknet Project (R-I / CSI2) netflow collection and analysis Traffic Grapher Arbor Peakflow flow-tools DNS infrastructure monitoring Tools

Members 24x7 Watch Desk Sharing Served Networks Collect, analyze, and disseminate intelligence Products Education Intel Relationships Registry Tools Exercises

Registry Rich information about.edu security contacts people and institutions (under development)

Members 24x7 Watch Desk Sharing Served Networks Collect, analyze, and disseminate intelligence Products Education Intel Relationships Registry Tools Exercises

24x7 Watch Desk

REN-ISAC : organization Trust community Member participation Supporting organizations Contributors Advisory groups Analysis teams Organizational Relationships

REN-ISAC : organization Trust community Member participation Supporting Organizations Contributors Advisory groups Analysis teams Organizational Relationships A trusted community for sharing sensitive information regarding cybersecurity threat, incidents, response, and protection, specifically designed to support the unique environment and needs of higher education and research organizations. Rigorous guidelines for membership and member vetting are used to engender and maintain a community of trust requisite for sharing sensitive information.

REN-ISAC : organization Trust community Member participation Supporting Organizations Contributors Advisory groups Analysis teams Organizational Relationships cornerstone of REN-ISAC types of contributions sharing w/ peers Dedicated commitment of resources Informal commitment of resources Daily reports authoring Systems administration TechBurst webcasts Sensor and monitor data sharing Tool development Advisory groups Analysis Teams

REN-ISAC : organization Trust community Member participation Supporting Organizations Contributors Indiana University (host) Internet2 EDUCAUSE Louisiana State University Advisory groups Analysis teams Organizational Relationships

REN-ISAC : organization Trust community Member participation Supporting Organizations Contributors.edu members others Advisory groups Analysis teams Organizational Relationships Berkeley (TAG) Brandeis (wiki) Colorado (MAT) Cornell (TAG) IU (host, EAG, TAG) LSU (daily reports, EAG) Oakland (EAG) Oregon (TAG) MOREnet (TAG, TechBursts) NYU (MAT) Reed College (EAG) UMass (TAG) UMBC (EAG) UMN (TAG) UMT (EAG) WPI (TAG, systems)

REN-ISAC : organization Trust community Member participation Supporting Organizations Contributors edu members others Advisory groups Analysis teams Organizational Relationships Team Cymru Neustar Sunbelt (TAG) (TAG, tools) (systems)

REN-ISAC : organization Trust community Member participation Supporting Organizations Contributors Advisory groups Analysis teams Organizational Relationships Executive Advisory Group (EAG) advises regarding policies, legal issues, plans and strategies, and other non-technical aspects of REN-ISAC operations. Technical Advisory Group (TAG) advises regarding useful REN-ISAC products and services, guided by evaluation of member needs.

Executive Advisory Group Advises regarding policies, legal issues, plans and strategies, and other non-technical aspects of REN-ISAC operations. Jack Seuss, chair University of Maryland-Baltimore County Ray Ford University of Montana Ken Klingenstein Internet2 & University of Colorado Rodney Petersen EDUCAUSE Marty Ringle Reed College Theresa Rowe Oakland University Brian Voss Louisiana State University Ex-officio Members: Mark Bruhn REN-ISAC/Indiana University Chris Misra, TAG Chair University of Massachusetts Amherst Doug Pearson REN-ISAC/Indiana University

Technical Advisory Group Advises regarding useful products, services, and methods guided by the REN-ISAC mission and survey of member needs. Chris Misra, chair University of Massachusetts Amherst Daniel Aldinolfi Cornell University Phil Deneault Worcester Polytechnic Institute Brian Eckman University of Minnesota Stephen Gill Team Cymru Andrew Korty Indiana University John Kristoff UltraDNS Randy Raw Missouri Research and Education Network Michael Sinatra University of California Berkeley Joe St Sauver University of Oregon Ex-officio Members Dave Monnier REN-ISAC/Indiana University Doug Pearson REN-ISAC/Indiana University

REN-ISAC : organization Trust community Member participation Supporting Organizations Contributors Advisory groups Analysis teams Organizational Relationships Microsoft Analysis Team serves as the technical interface between REN-ISAC and Microsoft for the SCPe. Guides the objectives for the relationship, and receives, analyzes, and disseminates information shared under the Partnership. Ryan Eads, UIUC Brad Judy, U Colorado, Boulder Sean Krulewitch, IU Brian Smith-Sweeney, NYU Dave Monnier, REN-ISAC / IU Doug Pearson, REN-ISAC / IU

REN-ISAC : organization Trust community Member participation Supporting Organizations Contributors Advisory groups Analysis teams Org. Relationships Internet2 EDUCAUSE Internet2/EDUCAUSE Computer & Network Security Task Force National ISAC Council Internet2 SALSA Internet2 CSI2 Working Group

REN-ISAC : membership Membership is open and free to: institutions of higher education, teaching hospitals, research and education network providers, and government-funded research organizations. Membership guidelines are roughly: must be permanent staff, with organization-wide responsibilities for cybersecurity protection and response, and be vouched-for by 2 existing members http://www.ren-isac.net/membership.html

Summary REN-ISAC is a member-driven trusted community for sharing sensitive information regarding cybersecurity threat, incidents, response, and protection. The information facilitates and enhances your local protection and response efforts. REN-ISAC serves the higher education and research communities. REN-ISAC is a product of its members. Membership is free, but according to a particular job profile and vouched-for trust.

References and Contacts http://www.ren-isac.net 24x7 Watch Desk: ren-isac@ren-isac.net +1(317)274-6630 Mark Bruhn, Executive Director, mbruhn@iu.edu Doug Pearson, Technical Director dodpears@ren-isac.net Dave Monnier, Principal Security Engineer dmonnier@ren-isac.net