CyberSecurity Innovation Assessing your Organizations Vulnerability to a Cyber breach



Similar documents
Moving to the Cloud? Take Your Application Security Solution with You. A WhiteHat Security Whitepaper. September 2010

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Breaking the Cyber Attack Lifecycle

2015 Vulnerability Statistics Report

Addressing FISMA Assessment Requirements

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

AppGuard. Defeats Malware

Vulnerability Management

10 Things Every Web Application Firewall Should Provide Share this ebook

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Cutting the Cost of Application Security

IT Security & Compliance. On Time. On Budget. On Demand.

Production Security and the SDLC. Mark Kraynak Sr. Dir. Strategic Marketing Imperva

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

UNIVERSE. Protect Your. with ArcSight

Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA

Perspectives on Cybersecurity in Healthcare June 2015

CAS8489 Delivering Security as a Service (SIEMaaS) November 2014

Introduction to QualysGuard IT Risk SaaS Services. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

We Prevent Breaches (and surprises) Intelligent Prevention

Closing the Antivirus Protection Gap

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Website Security: It s Not all About the Hacker Anymore

HP ENTERPRISE SECURITY. Protecting the Instant-On Enterprise

2011 Forrester Research, Inc. Reproduction Prohibited

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

The Hillstone and Trend Micro Joint Solution

Avoiding the Top 5 Vulnerability Management Mistakes

HTML5 and security on the new web

A COMPLETE APPROACH TO SECURITY

YOUR DATA UNDER SIEGE: GUARD THE GAPS WITH PATCH MANAGEMENT. With Kaspersky, now you can. kaspersky.com/business Be Ready for What s Next

Vulnerability Risk Management 2.0. Best Practices for Managing Risk in the New Digital War

Enterprise Cybersecurity: Building an Effective Defense

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

SourceFireNext-Generation IPS

Whitepaper. Securing Visitor Access through Network Access Control Technology

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Achieving Actionable Situational Awareness... McAfee ESM. Ad Quist, Sales Engineer NEEUR

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Stallion SIA Seminar PREVENTION FIRST. Introducing the Enterprise Security Platform. Sami Walle Regional Sales Manager

Braindumps QA

RSA Security Analytics

White Paper. Managing Risk to Sensitive Data with SecureSphere

A Strategic Approach to Web Application Security

Bad Romance: Three Reasons Hackers <3 Your Web Apps & How to Break Them Up

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

A Modern Framework for Network Security in Government

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cyber Security for Competitve Advantage: How SaaS Providers are Transforming their Business

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

Integrated Protection for Systems. João Batista Territory Manager

Integrated Threat & Security Management.

Overview of F5 Networks. Fatih Bilger Senior Systems Engineer, Prolink.

Accelerating Software Security With HP. Rob Roy Federal CTO HP Software

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks

Risk Analytics for Cyber Security

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Cyber Security for Start-ups: An Affordable 10-Step Plan

Web Security. Discovering, Analyzing and Mitigating Web Security Threats

How To Buy Nitro Security

SANS Top 20 Critical Controls for Effective Cyber Defense

2012 Application Security Gap Study: A Survey of IT Security & Developers

The webinar will begin shortly

ESKISP Manage security testing

Devising a Server Protection Strategy with Trend Micro

Security Information & Event Management (SIEM)

Application Security Manager ASM. David Perodin F5 Engineer

Symantec Endpoint Protection Datasheet

Introduction. Special thanks to the following individuals who were instrumental in the development of the toolkits:

SECURITY RISK MANAGEMENT. FIRST 2007 Seville, Spain

Cyber Security Metrics Dashboards & Analytics

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

Intro to QualysGuard IT Risk & Asset Management. Marek Skalicky, CISM, CRISC Regional Account Manager for Central & Adriatic Eastern Europe

Symantec Endpoint Protection

Web Application Security: Connecting the Dots

Devising a Server Protection Strategy with Trend Micro

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

Report. Bromium: Endpoint Protection Attitudes & Trends Increasing Concerns Around Securing End Users

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Unified Threat Management, Managed Security, and the Cloud Services Model

Cisco Cloud Web Security Key Functionality [NOTE: Place caption above figure.]

CaaS Think as a bad guy Petr Hněvkovský, CISA, CISSP HP Enterprise Security

FROM PRODUCT TO PLATFORM

SECURE YOUR BUSINESS WHEREVER IT TAKES YOU. Protection Service for Business

Symantec Endpoint Protection

Cyber Security RFP Template

Trend Micro Cloud Security for Citrix CloudPlatform

THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE

Concierge SIEM Reporting Overview

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Network Security Administrator

CASE STUDY. AUSTRIAN AIRLINES Modernizes Network Security for First Class Performance

Is Your Network a Sitting Duck? 3 Secrets to Securing Your Information Systems. Presenter: Matt Harkrider. Founder, Alert Logic

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

AB 1149 Compliance: Data Security Best Practices

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Transcription:

CyberSecurity Innovation Assessing your Organizations Vulnerability to a Cyber breach Steve Mullan Co Founder of Cognition Secure Ltd https://cognitionsecure.com

Thank You 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

The Evolving Face (and audience) of IT Security 2006 ISA Firewall VPN Throughput Nears 150Mbps ISAserver.org 2010 Consolidate Network Security to Reduce Cost and Maximise Enterprise Protection 2015 Coming into Focus: Cyber Security Operational Risk 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

Cognition A Cyber Security Integrator What is cyber security? Cyber security can be described as the digital or human measures you can take to reduce the risk and harm to your company's information and information based systems through theft, alteration or destruction. (HM Government Report to Non Exec Directors, Dec 14) Digital AND Human PEOPLE PROCESS TECHNOLOGY 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

So why is Cyber Security Integration so important? Traditional Security still has an important role to play Dec 2014 report 317 Million new pieces of malware, 1 Million/day Adopt a policy for implementing Innovative & Emerging Technology Integrate the solutions correctly it s not about rip & replace or about single point solutions, a multi layered approach. 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

WhiteHat Sentinel Andrew Lawton VP EMEA WhiteHat Security

The Reality 6

Internal Audit and Cybersecurity Definition: An independent, objective assurance and consulting activity designed to add value and improve an organisation s operations. It helps an organisation accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control and governance processes This definition of internal audit is taken from the International Standards for the Professional Practice of Internal Auditing of the Institute of Internal Auditors. 2014 WhiteHat Security, Inc. 7

Current challenges Application security is normally annual pentest plus scanning. 1. No consistency Data is delivered in different formats 2. Lack of trust Data is often false positive 3. No standardisation Assessments are undertaken in different ways 4. No disciplined approach assessments adhoc or annual 2014 WhiteHat Security, Inc. 8

ABOUT WHITEHAT Company Overview Pioneer in Application Security Founder: Jeremiah Grossman Headquartered in Santa Clara CA Employees: 370+ (180 security engineers) Customers: 900+ Long term customers strategic partner and trusted advisor Websites under assessment: 45,000 WhiteHat a leader in the Gartner Magic Quadrant for Application Security Testing 2013 and 2014 Whitehat a Leader in the Forrester Wave: Application Security Review

A Comprehensive Approach To Threats

The Value Visibility

Whitehat Security Index

Enhanced Reporting

Key Value Deliverable Value Expert and professional team Highly accurate assessments Unlimited consulting hours through Ask a question feature An extension of your security team Remediation advice provided Continuous assessment Catch vulns in new code as it is pushed and zero days as they happen The business apps changes all the time so the assessments must continue all the time Zero false positive output Saves a huge amount of time and money in filtering through the noise Means that data can be trusted to be fed into automation XML API Open XML API allows simple integration with security and compliance infrastructure Out of the box with: o F5 ASM o Imperva o RSA Archer o Jira

Internal Audit and Whitehat Definition: An independent, objective assurance and consulting activity designed to add value and improve an organisation s operations. It helps an organisation accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of risk management, control and governance processes This definition of internal audit is taken from the International Standards for the Professional Practice of Internal Auditing of the Institute of Internal Auditors. 2014 WhiteHat Security, Inc. 15

WhiteHat Security Summary Differentiators Strategic partner for end to end security in the SDLC Continuous and unlimited assessments Zero false positives Threat Research Centre Overlay One service covering code in development and live applications Massive speed and scalability throughout SDLC Production safe Value Save time and money on determining what needs action Clear information on vulnerability and remediation to communicate from security to developers Access to security team to help an extension of your team Integrates with and feeds actionable intelligence into your security infrastructure Clear metrics and analysis trending and drill down capability Validation Happy customers 94% renewal rate Gartner and Forrester position us as a Leader

We pre We prevent. DDoS Attacks Data breach

DDoS attack

Web Application Security Bank ransomed Customers blackmailed Account & transaction details published online

Application Breaches

Data breach Network security Databases Applications

Zenedge solution Databases Applications

Simple Process driven Security Intelligence

Imagine there s no malware Paul Davis VP EMEA December, 2015

Current Threat Prevention Solutions: Good vs Bad Mistakes are inevitable and costly 28

Can I get infected by just surfing a site? Yes! Malware can be injected into your system without clicking on any downloads, plugins or intentionally opening any files! Drive By Malware, Malvertising, etc. Numerous Examples Forbes.com Sept 2015 Yahoo Aug 3 2015 Huffington Post 2014 Menlo Security, Inc. 29

Why it s so easy to get infected with a single click... Website Lines of Source Code on Front Page # Of Different Domains Connected To (In Background) Lines of Source Code Executed from Different Domains Total Lines of Code You Are Exposed To! www.forbes.com 2,555 36 7,168 9,723 www.forbes.com User 36 Sites Forbes Connects to in the Background. These Random Sites Execute Code in Your Browser! Adsafeprotected.com Realtime.co Sharethrough.com Forbesmig.com Googletagservices.com Liftdna.com Media.net etc.. 2014 Menlo Security, Inc. 30

UAE Top 25 Sites Average # Scripts per site 18 Average # Domains serving scripts 7 Average Amount of code downloaded 1.3 MB Top site for #scripts? facebook.com (85) Top site for #3 rd party domains? Abs cbnnews.com (23) Top Site for amount of script code? Gulfnews.com (3.3MB) 2014 Menlo Security, Inc. 31

Isolation Security Promising, but Challenging Completely contain and execute Web content, including any malware Significant promise No false positives or negatives The potential for perfect security Significant challenges to date Hard to deploy (endpoint software) Poor user experience Brittle 2015 Menlo Security Inc., Confidential 32

Menlo Security is Introducing a New Isolation Platform Eliminates malware from the Web & email Public (SaaS) or private cloud deployment No endpoint software any device, OS, browser No latency or impact on user experience 2015 Menlo Security, Inc. 33 CONFIDENTIAL

Eliminate Web Malware Internet Users All content (good and bad) executes in Disposable Virtual Containers Native user experience Malware free Execute, Render 100% safe rendering info Dispose (every domain, every session) Adaptive Clientless Rendering (ACR) Any Device Any OS Any Browser Open up the Web and reduce risk 2015 Menlo Security Inc., Confidential 34

Powerful Platform Supports Multiple Use Cases Isolate uncategorized Web sites all Web sites Eliminate Java and Flash Read only for social sites Proxy replacement Email security (links & phishing) Prevent attacks; Reduce trouble tickets, alerts & patching 2014 Menlo Security, Inc. 35 35

Panel Discussion: Q1: What are some of the simple things that people can do to reduce risk in the organisation? 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

Panel Discussion: Q2: Why do organisations find it so hard to measure and reduce the risk associated with cyber attack? 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

Panel Discussion: Q3: How much responsibility should Internal Audit & Risk take for their Organisations Cyber Security policy? 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

Panel Discussion: Q4: With Dubai planning to transition to a Smart City over the next couple of years, what role could you play in this to assist the enablement? 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

Panel Discussion: Q5: My organisation currently runs annual Penetration testing surely that s a sufficient measure for my risk strategy. 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

Panel Discussion: Q6: The Internet of Things (IoT) is a phenomenon which will be critical to a range of industries across the Middle East. How will we take steps to ensure we can implement IoT securely. 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

Panel Discussion: Q7: Moving forward, where do you see an Organisations IT Security department reporting into? 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

Conclusion An effective Security Posture needs to incorporate: People Process Technology Innovative Technology is vital for dealing with the threat of the Unknown and reducing your business risk exposure You need to have a starting point and an understanding of where you are today otherwise how do you know if you re making improvements Ensure your organisation adopts a Proactive stance on it s Cyber Security Strategy it s a question of when, not if 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC

Steve Mullan Cognition Secure Ltd steve@cognitionsecure.com Thank you Andrew Lawton WhiteHat Security andrew.lawton@whitehatsec.com Simon Minton ZenEdge simon@zenedge.com Paul Davis Menlo Security Paul.davis@menlosecurity.com 7/12/2015 Copyright Cognition Secure Ltd 2015 The 5th CAE Annual Conference SM PUBLIC