SlideShare a Scribd company logo
Session ID:
Session Classification:
The Information Arms Race
2
OLD ATTACKS NEW ATTACKS
• Amateurs
• Noisy
• Curious/mischievous
• Script driven
• Untargeted
• Professionals
• Stealthy
• For profit/intentional damage
• Professionally developed
• Targeted
Suspect
Identify
Mitigate
Scope
Tools
Fixed
Permanent
Protection
Incident Response Lifecycle
3
EnergyExpended/Expense
Time
Incident Response Lifecycle
4
COST
Incident Response Lifecycle
5
Reduced Frequency
Minimize Scope of Impact
Faster
Remediation
ID the Root
Attack
Security Management Chaos
• Console hopping
• Manual investigation
• Waiting for answers
• Waiting for updates
• Missing what’s important
February 25, 20136
Shortening the Process
• Intelligent recognition of threats
– Rich context, risk based analysis
• Real-time active inspection of system state
– Moving from spreadsheets and phone calls to real-time
queries
• Respond with precision
– Automate key steps and surgically addressing threat
February 25, 20137
8 Security Connected
Getting There
CAN?How?
Security Maturity Model
OPTIMIZED
(~4% of IT Budget on Security)
REACTIVE
(~3% of IT Budget on Security)
COMPLIANT/PROACTIVE
(~8% of IT Budget on Security)
TCO
(CapEx + OpEx)
SECURITY
POSTURE
SECURITY OPTIMIZATION
Security Connected9
Connected, Intelligent, Real Time
February 25, 2013
10
Bridge Silos
Security
Operations
Security
Analytics
Endpoint
Vulnerability
Management
Network
Real Time Action
Operations Analytics
Threat Intelligence Data User
Application Application
LEARN QUICKLY
Turn billions of
“so what” events
into Actionable
Information via
context, content
and advanced
analytics
MOVE FAST
Performance in all
areas – insertion,
enrichment,
queries,
dashboards,
analytics – is
essential
ACT DECISIVELY
Understand
common
scenarios,
automate steps,
streamline
processes
Security Analytics Needs
External
IP 1
External
IP 2
HTTP
File
Download
Missing Something?
Verdict
Misconfiguration
Verdict:
USER
ERROR
Access
Denied
February
:
File Share
Access
March:
UDP
! Internal Services
January
:
Email
Sent
Quarantine File,
add Tag—Investigate
Laptop (ePO/DLP)
System Owner in Dev.
Mgrs. Access to Core IP
IP File
Downloaded—
Name and
Extension Changed
!
Set Server and
Laptop
Security
to High
(ePO/Endpoin
t)
Run Scan (MVM)
Quarantine Actor (NSP)
Quarantine:
Source and Destination
External
IP 1
External
IP 2
HTTP
File
Download
Bad Actor!
Communication
with North Korea
!
Activity
Outside
the Norm
!
Acting with Context
UNUSUAL
PACKET
SIZE
Access
Denied
Core IP
Internal ServicesFebruary
:
File Share
Access
March:
UDP
!
January
:
Email
Sent
Intelligent Integration Example
Dynamic
Enrichment
GTI
Endpoint & SIA
Alerts
& Policy
Enforcement
ePO
Network
Alerts
&
Quarantine
NSP
Asset
Inventory &
On-demand
scan
MVM
ADM
FW
DLP
MWG
MEG
MAM
NTBA
DAM
ESM
Consolidating Operations
Host IPS
Agent
Systems
Management
Agent
Audit
Agent
Antivirus
Agent
Encryption
NAC
DLP
Agent
EVERY
SOLUTION HAS
AN AGENT
EVERY
AGENT HAS
A CONSOLE
EVERY
CONSOLE
REQUIRES
A SERVER
EVERY
SERVER REQUIRES
AN OS/DB
EVERY OS/DB REQUIRES
PEOPLE, MAINTENANCE,
PATCHING
WHERE DOES
IT END?
15 Security Connected
Non-Optimized Optimized
Unknown Threat
Common Security Use Cases
Non-Optimized Optimized
Consumerization of IT
Non-Optimized Optimized
Advanced Persistent Threats
Non-Optimized Optimized
Continuous Compliance
Non-Optimized Optimized
Data Protection
Non-Optimized Optimized
Next Generation Network Security
Manual
Scans
Log
Analysis
Managed
Systems
Analysis
!
Un-
managed
Systems
Exposed
Risk
Existing
Counter-
measures
IPS
FW
AV
Priority
Next
Steps
Protection
Status
Vulnerable
Systems
IPS AV
Patch/
Updates
IPS
FW
AV
Policy
Config
IPS
FW
AV
Contact
Vendor
IPS
FW
AV
Monitor
Ops
Team
Ops
Team
Contact
Vendor
Policy
Config
Patch
!
Recomm-
endations
Situational
Awareness
Monitor
16 Security Connected
Streamlining Security
Management
February 25, 201317
AUTOMATIC,
INTELLIGENT,
CONNECTED
• Drastically shorten time to
respond and improve visibility
• Actionable intelligence through
contextual SIEM
• The answers you need….Now

More Related Content

PPTX
Machine Learning for Threat Detection
PPTX
Cyber Incident Response Triage - CPX 360 Presentation
PPTX
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
PDF
Leveraging red for defense
PDF
SOC Architecture - Building the NextGen SOC
PDF
SACON16 - SOC Architecture
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PPTX
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...
Machine Learning for Threat Detection
Cyber Incident Response Triage - CPX 360 Presentation
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
Leveraging red for defense
SOC Architecture - Building the NextGen SOC
SACON16 - SOC Architecture
Advanced Persistent Threats (APTs) - Information Security Management
Cybersecurity Incident Response Readiness: How to Find and Respond to Attacke...

What's hot (20)

PPTX
Incident Response: Validation, Containment & Forensics
PDF
Breaking and entering how and why dhs conducts penetration tests
PDF
Using automation to improve the effectiveness of security operations
PPTX
Persistence is Key: Advanced Persistent Threats
PDF
Annual OktCyberfest 2019
PDF
Rapid Threat Modeling Techniques
PPTX
NextGen Endpoint Security for Dummies
DOC
Arun_Rai_Resume
PDF
Building a Cyber Security Operations Center for SCADA/ICS Environments
PPTX
7 Steps to Build a SOC with Limited Resources
PDF
Security Fundamentals and Threat Modelling
PPTX
Modern SOC Trends 2020
PPTX
SOC Duties and Training Needs
PPTX
WTF is Penetration Testing v.2
PPTX
SOC Architecture Workshop - Part 1
PDF
What is pentest
PDF
Penetration testing & Ethical Hacking
PPTX
Advanced persistent threat (apt)
PPTX
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
Incident Response: Validation, Containment & Forensics
Breaking and entering how and why dhs conducts penetration tests
Using automation to improve the effectiveness of security operations
Persistence is Key: Advanced Persistent Threats
Annual OktCyberfest 2019
Rapid Threat Modeling Techniques
NextGen Endpoint Security for Dummies
Arun_Rai_Resume
Building a Cyber Security Operations Center for SCADA/ICS Environments
7 Steps to Build a SOC with Limited Resources
Security Fundamentals and Threat Modelling
Modern SOC Trends 2020
SOC Duties and Training Needs
WTF is Penetration Testing v.2
SOC Architecture Workshop - Part 1
What is pentest
Penetration testing & Ethical Hacking
Advanced persistent threat (apt)
SANS Ask the Expert: An Incident Response Playbook: From Monitoring to Opera...
Ad
Ad

Similar to Spo2 w23 a (20)

PPTX
Operational Security Intelligence
PDF
[Bucharest] Attack is easy, let's talk defence
PDF
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
PDF
Threat intel- -content-curation-organizing-the-path-to-successful-detection
PDF
Intelligence-Led Security: Powering the Future of Cyber Defense
PDF
Making a SOC Analyst
PDF
CNIT 50: 9. NSM Operations
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
PPTX
Janitor vs cleaner
PDF
Make IR Effective with Risk Evaluation and Reporting
PPT
RSA 2006 - Visual Security Event Analysis
PDF
Incident response before:after breach
PPTX
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
PDF
MT 117 Key Innovations in Cybersecurity
PDF
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
PDF
The Art and Science of Alert Triage
PPTX
Be the Hunter
PPTX
Optimizing Security Operations: 5 Keys to Success
PDF
IOCs Are Dead—Long Live IOCs!
PPTX
Operationalizing Security Intelligence
Operational Security Intelligence
[Bucharest] Attack is easy, let's talk defence
What We’ve Learned Building a Cyber Security Operation Center: du Case Study
Threat intel- -content-curation-organizing-the-path-to-successful-detection
Intelligence-Led Security: Powering the Future of Cyber Defense
Making a SOC Analyst
CNIT 50: 9. NSM Operations
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
Janitor vs cleaner
Make IR Effective with Risk Evaluation and Reporting
RSA 2006 - Visual Security Event Analysis
Incident response before:after breach
LogRhythm_-_Modern_Cyber_Threat_Pandemic.pptx
MT 117 Key Innovations in Cybersecurity
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
The Art and Science of Alert Triage
Be the Hunter
Optimizing Security Operations: 5 Keys to Success
IOCs Are Dead—Long Live IOCs!
Operationalizing Security Intelligence

More from SelectedPresentations (20)

PDF
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
PDF
Трансграничное пространство доверия. Доверенная третья сторона.
PDF
Варианты реализации атак через мобильные устройства
PDF
Новые технологические возможности и безопасность мобильных решений
PDF
Управление безопасностью мобильных устройств
PDF
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
PDF
Кадровое агентство отрасли информационной безопасности
PDF
Основное содержание профессионального стандарта «Специалист по безопасности и...
PDF
Основное содержание профессионального стандарта «Специалист по безопасности а...
PDF
Основное содержание профессионального стандарта «Специалист по технической за...
PDF
Основное содержание профессионального стандарта «Специалист по безопасности т...
PDF
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
PDF
Запись активности пользователей с интеллектуальным анализом данных
PDF
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
PDF
Обеспечение защиты информации на стадиях жизненного цикла ИС
PDF
Документ, как средство защиты: ОРД как основа обеспечения ИБ
PDF
Чего не хватает в современных ids для защиты банковских приложений
PDF
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
PDF
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
PDF
Об угрозах информационной безопасности, актуальных для разработчика СЗИ
Длительное архивное хранение ЭД: правовые аспекты и технологические решения
Трансграничное пространство доверия. Доверенная третья сторона.
Варианты реализации атак через мобильные устройства
Новые технологические возможности и безопасность мобильных решений
Управление безопасностью мобильных устройств
Современные технологии контроля и защиты мобильных устройств, тенденции рынка...
Кадровое агентство отрасли информационной безопасности
Основное содержание профессионального стандарта «Специалист по безопасности и...
Основное содержание профессионального стандарта «Специалист по безопасности а...
Основное содержание профессионального стандарта «Специалист по технической за...
Основное содержание профессионального стандарта «Специалист по безопасности т...
О профессиональных стандартах по группе занятий (профессий) «Специалисты в об...
Запись активности пользователей с интеллектуальным анализом данных
Импортозамещение в системах ИБ банков. Практические аспекты перехода на росси...
Обеспечение защиты информации на стадиях жизненного цикла ИС
Документ, как средство защиты: ОРД как основа обеспечения ИБ
Чего не хватает в современных ids для защиты банковских приложений
Об участии МОО «АЗИ» в разработке профессиональных стандартов в области инфор...
Оценка состояния, меры формирования индустрии информационной безопасности Рос...
Об угрозах информационной безопасности, актуальных для разработчика СЗИ

Spo2 w23 a

  • 2. The Information Arms Race 2 OLD ATTACKS NEW ATTACKS • Amateurs • Noisy • Curious/mischievous • Script driven • Untargeted • Professionals • Stealthy • For profit/intentional damage • Professionally developed • Targeted
  • 5. Incident Response Lifecycle 5 Reduced Frequency Minimize Scope of Impact Faster Remediation ID the Root Attack
  • 6. Security Management Chaos • Console hopping • Manual investigation • Waiting for answers • Waiting for updates • Missing what’s important February 25, 20136
  • 7. Shortening the Process • Intelligent recognition of threats – Rich context, risk based analysis • Real-time active inspection of system state – Moving from spreadsheets and phone calls to real-time queries • Respond with precision – Automate key steps and surgically addressing threat February 25, 20137
  • 9. Security Maturity Model OPTIMIZED (~4% of IT Budget on Security) REACTIVE (~3% of IT Budget on Security) COMPLIANT/PROACTIVE (~8% of IT Budget on Security) TCO (CapEx + OpEx) SECURITY POSTURE SECURITY OPTIMIZATION Security Connected9
  • 10. Connected, Intelligent, Real Time February 25, 2013 10 Bridge Silos Security Operations Security Analytics Endpoint Vulnerability Management Network Real Time Action Operations Analytics Threat Intelligence Data User Application Application
  • 11. LEARN QUICKLY Turn billions of “so what” events into Actionable Information via context, content and advanced analytics MOVE FAST Performance in all areas – insertion, enrichment, queries, dashboards, analytics – is essential ACT DECISIVELY Understand common scenarios, automate steps, streamline processes Security Analytics Needs
  • 12. External IP 1 External IP 2 HTTP File Download Missing Something? Verdict Misconfiguration Verdict: USER ERROR Access Denied February : File Share Access March: UDP ! Internal Services January : Email Sent
  • 13. Quarantine File, add Tag—Investigate Laptop (ePO/DLP) System Owner in Dev. Mgrs. Access to Core IP IP File Downloaded— Name and Extension Changed ! Set Server and Laptop Security to High (ePO/Endpoin t) Run Scan (MVM) Quarantine Actor (NSP) Quarantine: Source and Destination External IP 1 External IP 2 HTTP File Download Bad Actor! Communication with North Korea ! Activity Outside the Norm ! Acting with Context UNUSUAL PACKET SIZE Access Denied Core IP Internal ServicesFebruary : File Share Access March: UDP ! January : Email Sent
  • 14. Intelligent Integration Example Dynamic Enrichment GTI Endpoint & SIA Alerts & Policy Enforcement ePO Network Alerts & Quarantine NSP Asset Inventory & On-demand scan MVM ADM FW DLP MWG MEG MAM NTBA DAM ESM
  • 15. Consolidating Operations Host IPS Agent Systems Management Agent Audit Agent Antivirus Agent Encryption NAC DLP Agent EVERY SOLUTION HAS AN AGENT EVERY AGENT HAS A CONSOLE EVERY CONSOLE REQUIRES A SERVER EVERY SERVER REQUIRES AN OS/DB EVERY OS/DB REQUIRES PEOPLE, MAINTENANCE, PATCHING WHERE DOES IT END? 15 Security Connected
  • 16. Non-Optimized Optimized Unknown Threat Common Security Use Cases Non-Optimized Optimized Consumerization of IT Non-Optimized Optimized Advanced Persistent Threats Non-Optimized Optimized Continuous Compliance Non-Optimized Optimized Data Protection Non-Optimized Optimized Next Generation Network Security Manual Scans Log Analysis Managed Systems Analysis ! Un- managed Systems Exposed Risk Existing Counter- measures IPS FW AV Priority Next Steps Protection Status Vulnerable Systems IPS AV Patch/ Updates IPS FW AV Policy Config IPS FW AV Contact Vendor IPS FW AV Monitor Ops Team Ops Team Contact Vendor Policy Config Patch ! Recomm- endations Situational Awareness Monitor 16 Security Connected
  • 17. Streamlining Security Management February 25, 201317 AUTOMATIC, INTELLIGENT, CONNECTED • Drastically shorten time to respond and improve visibility • Actionable intelligence through contextual SIEM • The answers you need….Now