CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Similar documents
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

CyberReady Solutions. Integrated Threat Intelligence and Cyber Operations MONTH DD, YYYY SEPTEMBER 8, 2014

Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity

Cybersecurity: Mission integration to protect your assets

Advanced Threat Protection with Dell SecureWorks Security Services

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Combating a new generation of cybercriminal with in-depth security monitoring

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Attack Intelligence: Why It Matters

Data Lake-based Approaches to Regulatory- Driven Technology Challenges

Cybersecurity Delivering Confidence in the Cyber Domain

RETHINKING CYBER SECURITY

CyberArk Privileged Threat Analytics. Solution Brief

A HELPING HAND TO PROTECT YOUR REPUTATION

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Breaking down silos of protection: An integrated approach to managing application security

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Booz Allen Cloud Solutions. Our Capability-Based Approach

Protecting against cyber threats and security breaches

Preemptive security solutions for healthcare

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Predictive Intelligence

Gaining the upper hand in today s cyber security battle

Into the cybersecurity breach

SOCIAL MEDIA LISTENING AND ANALYSIS Spring 2014

How To Create An Insight Analysis For Cyber Security

Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

State of Security Survey GLOBAL FINDINGS

Statement for the Record. Martin Casado, Senior Vice President. Networking and Security Business Unit. VMware, Inc. Before the

POWERFUL SOFTWARE. FIGHTING HIGH CONSEQUENCE CYBER CRIME. KEY SOLUTION HIGHLIGHTS

WHITE PAPER. Attack the Attacker HOW A MANAGED SECURITY SERVICE IMPROVES EFFICIENCY AND SAVES COST

COUNTERINTELLIGENCE. Protecting Key Assets: A Corporate Counterintelligence Guide

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Cybersecurity Awareness. Part 1

Getting real about cyber threats: where are you headed?

Endpoint Threat Detection without the Pain

Advanced Threats: The New World Order

Niara Security Intelligence. Overview. Threat Discovery and Incident Investigation Reimagined

2011 Cyber Security and the Advanced Persistent Threat A Holistic View

Middle Class Economics: Cybersecurity Updated August 7, 2015

Symantec Cyber Security Services: DeepSight Intelligence

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

The Importance of Cybersecurity Monitoring for Utilities

CLOSING THE DOOR TO CYBER ATTACKS HOW ENTERPRISES CAN IMPLEMENT COMPREHENSIVE INFORMATION SECURITY

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

How To Protect Your Network From Attack From A Network Security Threat

BIG SHIFTS WHAT S NEXT IN AML

Developing a Mature Security Operations Center

CyberM 3 Business Enablement: Cybersecurity That Empowers Your Business with Comprehensive Information Security

Risk-based solutions for managing application security

Security Intelligence Services.

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

High End Information Security Services

24/7 Visibility into Advanced Malware on Networks and Endpoints

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

10 Things Every Web Application Firewall Should Provide Share this ebook

Cybersecurity and internal audit. August 15, 2014

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Managed Security Services

Content Security: Protect Your Network with Five Must-Haves

WRITTEN TESTIMONY OF

The Next Generation Security Operations Center

Continuous Network Monitoring

DoD Strategy for Defending Networks, Systems, and Data

Extreme Networks Security Analytics G2 Vulnerability Manager

A Primer on Cyber Threat Intelligence

Bridging the gap between COTS tool alerting and raw data analysis

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Boosting enterprise security with integrated log management

CORE Security and GLBA

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Cyber Security Metrics Dashboards & Analytics

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

How To Manage Security On A Networked Computer System

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Anatomy of Cyber Threats, Vulnerabilities, and Attacks

Transcription:

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations can mount effective defenses. Advanced threats are increasingly targeting corporations and government agencies with industrial espionage, undermining business and financial operations, or sabotaging critical infrastructure. Most organizations rely on static defenses that identify known vulnerabilities and then fix them one-by-one. This is a reactive strategy where they wait to be attacked and are locked into a never-ending react-and-fix loop. This is an insufficient approach. It can t keep up with threat actors who are too fast, too many, and growing too sophisticated for static defenses alone. An effective security posture requires anticipatory, predictive intelligence to enable an organization to get ahead of these threats, assess risks, and take appropriate defensive actions before an attack actually occurs. CYBER4SIGHT products and services from Booz Allen Hamilton provide proactive, anticipatory threat intelligence from the world s leader in cybersecurity. With probability-based warnings of future cyber attacks, your organization is able to anticipate an attack and understand the chances of an attacker s success. This actionable threat intelligence enables an organization to take defensive action before the attack occurs. Benefits are avoiding the cost of post-event recovery and remediation, plus preventing the theft, destruction, and/or public release of critical data. 1

THE CYBER4SIGHT SERVICES DIFFERENCE: FAST, FOCUSED ALERTS OF PENDING ATTACKS Commodity service providers offer generic reports of vulnerabilities that might (or might not) affect an organization s cyber assets. CYBER4SIGHT services are different because they provide alerts and warnings of specific pending attacks that threaten an organization. CYBER4SIGHT services quickly tailor and deliver anticipatory threat intelligence by collecting and analyzing the motivations, intentions, objectives, and capabilities of specific threat actors around the world most likely to launch an attack against a client. The threat actors may include nation states and their proxies, hacktivist groups, crime syndicates, and rogue insiders. CYBER4SIGHT services are built upon decades of Booz Allen s intelligence analysis and cybersecurity experience at a scale spanning federal government agencies 2

OUR PROPRIETARY DATA SUPPLY CHAIN DELIVERS REAL-TIME CYBER THREAT & RELATED DATA 16 LIVE SOCIAL MEDIA FEEDS. (Facebook, Twitter, YouTube, etc.) 1,250 REAL-TIME FEEDS ACROSS 8,000 BLOG, MICROBLOG, & NEWS SOURCES IN MULTIPLE LANGUAGES. Real-time data feeds to monitor 89M+ MALWARE 87M+ UNIQUE IP ADDRESSES 300M+ NETWORK ACCESS POINTS 50M+ MALICIOUS URLs 90K KNOWN MALICIOUS THREATS CLIENT-SPECIFIC NETWORK DATA

Our big data analysis answers the so what and why should we care questions -- making the alerts and warnings concrete and highly actionable. 1: TRADECRAFT-DRIVEN INTELLIGENCE ANALYSIS We deploy Booz Allen s substantial tradecraft legacy of analytic capabilities to collect and analyze real-time threat actor activities by highly experienced intelligence analysts, native language linguists, and socio-cultural analysts. Our vast team operates 24-hours-a-day year-round supporting a state of the art Predictive Intelligence Operations Center. We assess the risk and quickly provide anticipatory threat alerts enabling a client to take appropriate defensive actions immediately. CYBER4SIGHT services analyze an organization s dynamic attack surface as a threat actor would. Our holistic, integrated, and actionable insights provide the client with a fluid defense against high risk, high consequence cyber threats. CYBER4SIGHT services tradecraft factors all data sources specific to the client s industry and business. It links external human intelligence with technical intelligence derived from a client s network environment. Our advanced analysis uses behavioral detection-based, proprietary algorithms to analyze an organization s network data such as network traffic, server logs, web cache/proxy, firewall data, and mail services. CYBER4SIGHT services use all these data sources to connects the dots and determine if threat actors are present within the client s environment or if they may be in the beginning stages of an advanced attack. All alerts are specific and immediately actionable. 4

2: AUTOMATING RAPID DELIVERY OF ALERTS Speed is a major benefit of CYBER4SIGHT services. Typical threat intelligence services provide generic vulnerability alerts days after a potential threat arises. CYBER4SIGHT services provide operationally specific contextual intelligence often within minutes of discovery. It accelerates analysis and alert delivery thanks to Booz Allen s multi-million dollar investment in a real-time global intelligence collection and analysis system. Our proprietary intelligence analysis knowledge repository, called ThreatBase, contains thousands of custom threat objects for in-depth pattern and trend analysis of cyber threat vectors. These enable our intelligence analysts to quickly identify emerging threats specific to our clients in near real time. Advanced visualization allows clients to customize CYBER4SIGHT services by tapping the ThreatBase with real-time queries. Our goal is providing clients with the shortest possible time to discovery and notification of threats that matter most. 3: CLARITY WITH BIG DATA ANALYTICS With a client s internal network data, our alerts and warnings become more targeted and effective. We maintain and continuously update a library of algorithms to detect patterns of anomalous behaviors and evidence of a threat actor s presence inside of a client s networks. This creates the analytic speed needed to keep pace with Advanced Persistent Threats as they rapidly evolve. Our big data analysis answers the so what and why should we care questions -- making the alerts and warnings concrete and highly actionable. These differentiators allow our products and services to provide an organization with an early warning capability at a fraction of the cost of building a comparable intelligence analysis center internally. 5

CASE STUDY: GLOBAL FINANCIAL INSTITUTION REPELS FREQUENT DISTRIBUTED DENIAL-OF-SERVICE ATTACKS PROBLEM: A global financial institution had a deep bench of in-house talent but needed a cyber defense system that could better identify, analyze, and prioritize cyber threats. The goal was to cost-effectively reduce risk and protect its customers sensitive data, particularly from frequent Distributed Denial-of-Service (DDoS) attacks causing millions of dollars in lost revenue and damages. SOLUTION: CYBER4SIGHT Threat Alert and Warning Services RESULTS: Prior to engaging CYBER4SIGHT services, the cost of a single DDoS attack was $129.6 million on one day. Now, early detection and warnings significantly mitigate the impact of DDoS attacks and deliver further immeasurable benefits by preventing future breaches. In addition, CYBER4SIGHT services have allowed the client to better utilize its in-house staff, saving the company more than $1 million annually in cyber threat intelligence collection, analysis, and timely warning. 7

CASE STUDY: GLOBAL FINANCIAL INSTITUTION DEFENDS IP AND TRADE SECRETS WITH CYBER4SIGHT SERVICES PROBLEM: A global enterprise services firm with large-scale government and commercial clients was stung by a string of network breaches that undermined its intellectual capital and market reputation. The client s reactive cyber defense posture provided no intelligence to prioritize resource allocation and thwart dangerous threats that compromised its networks. SOLUTION: CYBER4SIGHT Threat Alert and Warning Services RESULTS: In the first four months, CYBER4SIGHT services delivered more than 100 serialized threat intelligence summaries and 700 analytic insights. Daily threat intelligence briefings helped guide the client s ongoing tactical operations, fostering an anticipatory approach that exponentially decreased cyber events. The insight provided by CYBER4SIGHT services now allows the client to prepare for major cyber events before they occur, saving billions of dollars in lost Intellectual Property (IP) and brand equity. 8

DIRECT BENEFITS FOR FINANCIAL SERVICES Financial services companies are a primary target of organized criminals and hackers. A cyber breach can harm the reputation of a financial services firm, lower consumer confidence, and trigger massive losses. Predictive intelligence provided by CYBER4SIGHT services helps companies to effectively manage key risks to financial services. PREVENT EXPOSURE OF PII AND IP: The loss or theft of confidential information is a major risk. This includes Personally Identifiable Information (PII) of customers and a company s proprietary Intellectual Property (IP). Actionable predictive intelligence from CYBER4SIGHT services helps prevent unauthorized exposure of confidential data. 10

ENSURE COMPLIANCE: Financial institutions operate under strict regulations for cybersecurity. CYBER4SIGHT services will help comply with regulations by providing data that prove when specified controls are operating in accordance with federal requirements. PROTECT BUSINESS CONTINUITY: Denial of Service (DOS) attacks can block customers from accessing their accounts and processing financial transactions. CYBER4SIGHT services provide advance warnings of specific DOS attacks that allow a company to take preventative action and ensure continuity of operations. AVOID COSTS: As a managed service, CYBER4SIGHT services enables significant cost avoidance while providing more scale, depth, and breadth of capability than creating a comparable internal resource. The cost of data feeds alone often exceed $1 million a year plus the costs of sustaining 24/7 operations with a large crew of subject matter experts in security analytics, linguistic, and socio-cultural analysis. 11

LEARN MORE With CYBER4SIGHT services, your organization will receive actionable intelligence of future attacks in near real time. Our products and services will provide your organization with an early warning capability at a fraction of the cost to build a comparable intelligence analysis center internally. CYBER4SIGHT services provide anticipatory cyber threat situational awareness, serving as your organization s headlights in the dark to avoid tactical or strategic surprise. FOR MORE INFORMATION ABOUT CYBER4SIGHT SERVICES, CONTACT Fred Blackburn Executive Vice President blackburn_fred@bah.com 703-377-8999 Randy Hayes Vice President hayes_randy@bah.com 703-377-5501 12

ABOUT BOOZ ALLEN Booz Allen Hamilton has been at the forefront of strategy and technology consulting for nearly a century. The firm provides business and technology solutions to major corporations in the financial services, health, and energy markets, leveraging capabilities and expertise developed over decades of helping US government clients in the defense, intelligence, and civil markets to solve their toughest problems. Booz Allen is headquartered in McLean, Virginia, employs more than 23,000 people, and had revenue of $5.76 billion for the 12 months ended March 31, 2013. To learn more, visit www.boozallen.com. (NYSE: BAH)