SlideShare a Scribd company logo
Incidents Happen! Management in a
BYOD Environment
Presented to: CENIC Conference
March 22, 2017
The Naval Postgraduate School
2
Graduate School of Operational and Information Sciences
Graduate School of Engineering and Applied Sciences
Graduate School of Business and Public Policy
School of International Graduate Studies
Enrollment 2,600 Students
Representing 40 Countries
Mission
To provide technology and
communications support for the NPS core
mission of teaching, research, and service
to the Navy and Department of Defense.
To provide voice, video, and data
infrastructure as mission crucial enablers
of innovation and experimentation within
the educational enterprise.
Incident Handling in a BYOD Environment
Network Upgrade
• Every router and switch at NPS upgraded
• Edge router now connected to CENIC at 100GigE
• Core and BDFs upgraded to 160GigE and
80GigE, respectively.
• Select edge ports connected with 20GigE
– High Performance Computing
– Select research labs
• NPS Network
– Allows NPS to take full advantage of 100GigE CENIC
backbone
– Support high-Speed Switch Fabrics
– Provide the backbone infrastructure for Software
Defined Networking.
5
NPS Wireless
6
• New Ruckus network has 360 Access Points with faster
802.11AC radios
• Replaced ~200 old APs from various technologies
• Improved campus coverage including strategic outdoor
locations with faster speeds
• New onboarding features with simplified administration
options
Educational Technologies
• Labs/Classrooms
– 141 classrooms/labs/conference rooms
• 87 classrooms
• 13 labs
• 5 auditoria
• 7 VTE suites
• 17 conference rooms
– Classrooms include:
• Audio visual equipment: projectors and audio
equipment
• Faculty podium: desktop computer with access
8
High Performance Computing
“Hamming” Supercomputer
• Over 100 servers in 8 cabinets;
• Over 4,600 CPU “cores” tied together by fast network;
• Over 3 Petabytes of disk storage (= 3,000 Terabytes);
• Scientific Computation (number-crunching): weather/ice
forecasting, turbopropulsion models, earthquake prediction);
• “Big Data”: searching for text and imagery in huge datasets;
think of “Google Search” applied to DoD interests. $1M grant
in FY15 for hardware procurement;
• Used for teaching as well as research;
• Instrumental in recruiting faculty.
• 100 Gigabit/s network: will allow us to move large datasets
into/out to/from collaborators.
Cloud Initiatives
• MS Office 365:
– Exchange Online
– Sharepoint Online
– Skype for Business
• Box storage
– Unlimited file storage
• Amazon Web Services
– Infrastructure-as-a-Service
– ITACS backups, web
development and operations
9
Incident Handling
Naval Postgraduate School
DLI Cybersecurity Team
Compliance - Prevention Detection – Response
Internal & External Monitoring, Audit & Reporting
SOC Manager
Sr. Incident
Handler
Sr. Cyber Analyst
End Point
Protection
Director of Cybersecurity
Jr. Cyber Analyst Jr. Cyber AnalystSr. Cyber Analyst
Jr. Incident
Handler
Scanning / Compliance
Sr. Cyber Analyst
ISSM – DREN &
Higher
Director
NCIS | SSO/Security Manager | Command IG | IT Task Force
FLTCYBERCOM | NCDOC | HPCMP CND |SPAWAR CA
Jr. Cyber Analyst
CS Plans / Projects ISSM - EDU
Cybersecurity Organization
Function Device
SIEM AlienVault
Firewall PA-7050
IDS1 HPCMP, NCDOC, Snort
Network Access 802.1x, SafeConnect
A/V SEP, PA-7050, Wildfire
Web PA-7050
Mail Barracuda
Scanning ACAS (Nessus), Netsparker
Endpoint management LANDESK / WSUS / Puppet
EMM2 Airwatch
2FA2 Duo Security
1 Both the High Performance Computing Management Program Office and Navy Cyber
Defense Operations Command have sensors on the NPS EDU Network; additionally NPS
contracts for internal CND services that use Snort.
2 Pending deployment
Technology
Processes
Ø Documentation of incident handling / response
standard operating procedures.
13
Ø Templates and workflow / task management of
incident handling actions.
Ø Real-time collaboration between team members
during significant cyber events.
Incident Handling - the Basics
• Step by step Incident Handling (IH) process
• Quick reference for IH personnel to perform
duties
• Template / Automate as much as possible
• Historical record
– Document, document, document
– Have we seen something similar before?
– Did the adversary modify their TTPs?
• Facilitate reporting and trend analysis
14
A Few More Basics
• Handlers should have as much access as
required to take immediate action
– Remove phish / spearphish from user’s inbox
– Blacklist IP and / or Domain
– Disable account
– Block device from accessing network
• But know contact info for technical SMEs if
required
– Email
– DNS
– Firewall
– Routers 15
Incident Handling Step-by-Step
1. Identify
2. Contain
3. Neutralize
4. Recover / Report
5. Document / Assess
16
NIST SP 800-61 Rev 2
Handler Morning Routine
• Provides initial
situational awareness of
detected / reported
events
• To-do list to start the
handler’s day
• Repeatable / sustainable
• Hosted on wiki ->
collaborative effort
17
Incident Handling Step-by-Step
1. Identify
2. Contain
3. Neutralize
4. Recover / Report
5. Document / Assess
18
NIST SP 800-61 Rev 2
Incident Handling Step-by-Step
1. Identify
2. Contain
3. Neutralize
4. Recover / Report
5. Document / Assess
19
NIST SP 800-61 Rev 2
Incident Handling Step-by-Step
1. Identify
2. Contain
3. Neutralize
4. Recover / Report
5. Document / Assess
20
NIST SP 800-61 Rev 2
Incident Handling Step-by-Step
1. Identify
2. Contain
3. Neutralize
4. Recover / Report
5. Document / Assess
21
NIST SP 800-61 Rev 2
Incident Handling Step-by-Step
1. Identify
2. Contain
3. Neutralize
4. Recover / Report
5. Document / Assess
22
NIST SP 800-61 Rev 2
JIRA Incident Template - Example
23
JIRA Incident Template - Example
24
JIRA Incident Template - Example
25
JIRA Incident Template - Example
26
JIRA Incident Template – Example
27
JIRA Incident Template - Example
28
JIRA Incident Template - Example
29
Summary
• BYOD environment increases IH complexity
• Maximize automation and use of templates to
standardize process
• Document as much as possible
• Marathon – not a sprint – Wiki / JIRA provide
for collaboration and rapid, continuous
changes to SOPs, etc.
• User training and reporting mechanism
(abuse@nps.edu) critical
30
QUESTIONS?
31

More Related Content

PPTX
New Threats, New Approaches in Modern Data Centers
PPTX
Solving ICS Cybersecurity Challenges in the Electric Industry
PPTX
Securing Electric Utility Infrastructure
PDF
Consequence Informed Cyber Security
PPTX
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
PDF
Industrial Control Systems Cybersecurity Technology Selection
PPTX
45 Minutes to PCI Compliance in the Cloud
PPT
Cloud Security: Make Your CISO Successful
New Threats, New Approaches in Modern Data Centers
Solving ICS Cybersecurity Challenges in the Electric Industry
Securing Electric Utility Infrastructure
Consequence Informed Cyber Security
Dragos & SRP, PI World 2019: Utilizing Operations Data for Enhanced Cyber Thr...
Industrial Control Systems Cybersecurity Technology Selection
45 Minutes to PCI Compliance in the Cloud
Cloud Security: Make Your CISO Successful

What's hot (20)

PDF
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
PPTX
PLC Virtualization Dragos S4 2019
PDF
Security Advantages of Software-Defined Networking
PPTX
CLOUD NATIVE SECURITY
PDF
Cloud Native Security: New Approach for a New Reality
PPTX
Plnog13 2014 security intelligence_pkedra_v1
PPTX
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
PDF
Cisco amp for meraki
PDF
The Network as a Sensor, Cisco and Lancope
PPTX
Sasa milic, cisco advanced malware protection
PPTX
Security and Compliance for Enterprise Cloud Infrastructure
PDF
Secure Cloud Development Resources with DevOps
PPTX
How to Increase ICS Cybersecurity Return on Investment (ROI)
PDF
DNS Measurement Activity on ITB 2010
PDF
Cisco's 2016 Annual Security report
PDF
TechWiseTV Workshop: Tetration Analytics
PDF
Tenable Solutions for Enterprise Cloud Security
PPTX
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
PPTX
TechWiseTV Workshop: Cisco TrustSec
PDF
2021 01-13 reducing risk-of_ransomware
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
PLC Virtualization Dragos S4 2019
Security Advantages of Software-Defined Networking
CLOUD NATIVE SECURITY
Cloud Native Security: New Approach for a New Reality
Plnog13 2014 security intelligence_pkedra_v1
6° Sessione VMware NSX: la piattaforma di virtualizzazione della rete per il ...
Cisco amp for meraki
The Network as a Sensor, Cisco and Lancope
Sasa milic, cisco advanced malware protection
Security and Compliance for Enterprise Cloud Infrastructure
Secure Cloud Development Resources with DevOps
How to Increase ICS Cybersecurity Return on Investment (ROI)
DNS Measurement Activity on ITB 2010
Cisco's 2016 Annual Security report
TechWiseTV Workshop: Tetration Analytics
Tenable Solutions for Enterprise Cloud Security
ICS Cybersecurity: How to Protect the Proprietary Cyber Assets That Hackers C...
TechWiseTV Workshop: Cisco TrustSec
2021 01-13 reducing risk-of_ransomware
Ad

Similar to Incident Handling in a BYOD Environment (20)

PDF
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
PPTX
CapTechTalks Webinar May 2025 Janosek Kittner Shelton.pptx
DOCX
Computer Security Incident Handling Guide Recommendati.docx
PPTX
You Will Be Breached
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
PDF
Beyond NIST, CMMC certification_webinar.pdf
PDF
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
PDF
CNIT 152: 3 Pre-Incident Preparation
DOCX
Computer Security Incident Handling Guide Recommendati
PPTX
Cybersecurity by the numbers
PDF
Nist.sp.800 61r2
PDF
“Computer Security Incident handling Guide,” Special Publication 800-61
PDF
Computer security incident response has become an important component of info...
PDF
Computer Security Incident Handling Guide
PDF
Setting up CSIRT
PDF
Nist ir
PDF
ECIHv12 Course Outline.pdf
PDF
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
PDF
YBB-NW-distribution
Workshop incident response n handling-bssn 12 nop 2019-ignmantra
CapTechTalks Webinar May 2025 Janosek Kittner Shelton.pptx
Computer Security Incident Handling Guide Recommendati.docx
You Will Be Breached
Today's Cyber Challenges: Methodology to Secure Your Business
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
Beyond NIST, CMMC certification_webinar.pdf
Sscp Systems Security Certified Practitioner Allinone Exam Guide Third Editio...
CNIT 152: 3 Pre-Incident Preparation
Computer Security Incident Handling Guide Recommendati
Cybersecurity by the numbers
Nist.sp.800 61r2
“Computer Security Incident handling Guide,” Special Publication 800-61
Computer security incident response has become an important component of info...
Computer Security Incident Handling Guide
Setting up CSIRT
Nist ir
ECIHv12 Course Outline.pdf
SSCP Systems Security Certified Practitioner All in One Exam Guide Third Edit...
YBB-NW-distribution
Ad

More from Iben Rodriguez (8)

DOCX
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
PDF
CENIC Conference agenda 2017_v1
PPTX
Verigraph
PPTX
Iben from Spirent talks at the SDN World Congress about the importance of and...
PPT
Re-Engineering Engineering
PDF
Vmworld 2005-sln241
PDF
Fine grained monitoring
PDF
Getput suite
Ipv6 test plan for opnfv poc v2.2 spirent-vctlab
CENIC Conference agenda 2017_v1
Verigraph
Iben from Spirent talks at the SDN World Congress about the importance of and...
Re-Engineering Engineering
Vmworld 2005-sln241
Fine grained monitoring
Getput suite

Recently uploaded (20)

PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
“AI and Expert System Decision Support & Business Intelligence Systems”
Chapter 3 Spatial Domain Image Processing.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Unlocking AI with Model Context Protocol (MCP)
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
MYSQL Presentation for SQL database connectivity
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
MIND Revenue Release Quarter 2 2025 Press Release
Per capita expenditure prediction using model stacking based on satellite ima...
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing

Incident Handling in a BYOD Environment

  • 1. Incidents Happen! Management in a BYOD Environment Presented to: CENIC Conference March 22, 2017
  • 2. The Naval Postgraduate School 2 Graduate School of Operational and Information Sciences Graduate School of Engineering and Applied Sciences Graduate School of Business and Public Policy School of International Graduate Studies Enrollment 2,600 Students Representing 40 Countries
  • 3. Mission To provide technology and communications support for the NPS core mission of teaching, research, and service to the Navy and Department of Defense. To provide voice, video, and data infrastructure as mission crucial enablers of innovation and experimentation within the educational enterprise.
  • 5. Network Upgrade • Every router and switch at NPS upgraded • Edge router now connected to CENIC at 100GigE • Core and BDFs upgraded to 160GigE and 80GigE, respectively. • Select edge ports connected with 20GigE – High Performance Computing – Select research labs • NPS Network – Allows NPS to take full advantage of 100GigE CENIC backbone – Support high-Speed Switch Fabrics – Provide the backbone infrastructure for Software Defined Networking. 5
  • 6. NPS Wireless 6 • New Ruckus network has 360 Access Points with faster 802.11AC radios • Replaced ~200 old APs from various technologies • Improved campus coverage including strategic outdoor locations with faster speeds • New onboarding features with simplified administration options
  • 7. Educational Technologies • Labs/Classrooms – 141 classrooms/labs/conference rooms • 87 classrooms • 13 labs • 5 auditoria • 7 VTE suites • 17 conference rooms – Classrooms include: • Audio visual equipment: projectors and audio equipment • Faculty podium: desktop computer with access
  • 8. 8 High Performance Computing “Hamming” Supercomputer • Over 100 servers in 8 cabinets; • Over 4,600 CPU “cores” tied together by fast network; • Over 3 Petabytes of disk storage (= 3,000 Terabytes); • Scientific Computation (number-crunching): weather/ice forecasting, turbopropulsion models, earthquake prediction); • “Big Data”: searching for text and imagery in huge datasets; think of “Google Search” applied to DoD interests. $1M grant in FY15 for hardware procurement; • Used for teaching as well as research; • Instrumental in recruiting faculty. • 100 Gigabit/s network: will allow us to move large datasets into/out to/from collaborators.
  • 9. Cloud Initiatives • MS Office 365: – Exchange Online – Sharepoint Online – Skype for Business • Box storage – Unlimited file storage • Amazon Web Services – Infrastructure-as-a-Service – ITACS backups, web development and operations 9
  • 11. DLI Cybersecurity Team Compliance - Prevention Detection – Response Internal & External Monitoring, Audit & Reporting SOC Manager Sr. Incident Handler Sr. Cyber Analyst End Point Protection Director of Cybersecurity Jr. Cyber Analyst Jr. Cyber AnalystSr. Cyber Analyst Jr. Incident Handler Scanning / Compliance Sr. Cyber Analyst ISSM – DREN & Higher Director NCIS | SSO/Security Manager | Command IG | IT Task Force FLTCYBERCOM | NCDOC | HPCMP CND |SPAWAR CA Jr. Cyber Analyst CS Plans / Projects ISSM - EDU Cybersecurity Organization
  • 12. Function Device SIEM AlienVault Firewall PA-7050 IDS1 HPCMP, NCDOC, Snort Network Access 802.1x, SafeConnect A/V SEP, PA-7050, Wildfire Web PA-7050 Mail Barracuda Scanning ACAS (Nessus), Netsparker Endpoint management LANDESK / WSUS / Puppet EMM2 Airwatch 2FA2 Duo Security 1 Both the High Performance Computing Management Program Office and Navy Cyber Defense Operations Command have sensors on the NPS EDU Network; additionally NPS contracts for internal CND services that use Snort. 2 Pending deployment Technology
  • 13. Processes Ø Documentation of incident handling / response standard operating procedures. 13 Ø Templates and workflow / task management of incident handling actions. Ø Real-time collaboration between team members during significant cyber events.
  • 14. Incident Handling - the Basics • Step by step Incident Handling (IH) process • Quick reference for IH personnel to perform duties • Template / Automate as much as possible • Historical record – Document, document, document – Have we seen something similar before? – Did the adversary modify their TTPs? • Facilitate reporting and trend analysis 14
  • 15. A Few More Basics • Handlers should have as much access as required to take immediate action – Remove phish / spearphish from user’s inbox – Blacklist IP and / or Domain – Disable account – Block device from accessing network • But know contact info for technical SMEs if required – Email – DNS – Firewall – Routers 15
  • 16. Incident Handling Step-by-Step 1. Identify 2. Contain 3. Neutralize 4. Recover / Report 5. Document / Assess 16 NIST SP 800-61 Rev 2
  • 17. Handler Morning Routine • Provides initial situational awareness of detected / reported events • To-do list to start the handler’s day • Repeatable / sustainable • Hosted on wiki -> collaborative effort 17
  • 18. Incident Handling Step-by-Step 1. Identify 2. Contain 3. Neutralize 4. Recover / Report 5. Document / Assess 18 NIST SP 800-61 Rev 2
  • 19. Incident Handling Step-by-Step 1. Identify 2. Contain 3. Neutralize 4. Recover / Report 5. Document / Assess 19 NIST SP 800-61 Rev 2
  • 20. Incident Handling Step-by-Step 1. Identify 2. Contain 3. Neutralize 4. Recover / Report 5. Document / Assess 20 NIST SP 800-61 Rev 2
  • 21. Incident Handling Step-by-Step 1. Identify 2. Contain 3. Neutralize 4. Recover / Report 5. Document / Assess 21 NIST SP 800-61 Rev 2
  • 22. Incident Handling Step-by-Step 1. Identify 2. Contain 3. Neutralize 4. Recover / Report 5. Document / Assess 22 NIST SP 800-61 Rev 2
  • 23. JIRA Incident Template - Example 23
  • 24. JIRA Incident Template - Example 24
  • 25. JIRA Incident Template - Example 25
  • 26. JIRA Incident Template - Example 26
  • 27. JIRA Incident Template – Example 27
  • 28. JIRA Incident Template - Example 28
  • 29. JIRA Incident Template - Example 29
  • 30. Summary • BYOD environment increases IH complexity • Maximize automation and use of templates to standardize process • Document as much as possible • Marathon – not a sprint – Wiki / JIRA provide for collaboration and rapid, continuous changes to SOPs, etc. • User training and reporting mechanism (abuse@nps.edu) critical 30