2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Malware\Host Analysis for Level 1 Analysts “Decrease exposure time from detection to eradication” Garrett Schubert – EMC Corporation Critical Incident.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
RSA Approach for Securing the Cloud Bernard Montel Directeur Technique RSA France Juillet 2010.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
© Centrify Corporation. All Rights Reserved. Unified Identity Management across Data Center, Cloud and Mobile.
Governance, Risk, and Compliance Bill Greene Senior Industry Director.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Unify and Simplify: Security Management
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Dell Connected Security Solutions Simplify & unify.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Secure & Unified Identity for End Users & Privileged Users.
The Changing World of Endpoint Protection
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Ali Alhamdan, PhD National Information Center Ministry of Interior
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Security Information and Event Management
2015 Security Conference Dave Gill Intel Security.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
IBM Security Pelin Konakçı IBM Security Software Sales Leader
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
GRC: Aligning Policy, Risk and Compliance
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
Blue Coat Cloud Continuum
Copyright © 2007 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 Juniper Security Threat Response Manager (STRM)
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Surveillance and Security Systems Cyber Security Integration.
Protect your Digital Enterprise
Your Partner for Superior Cybersecurity
OIT Security Operations
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Active Cyber Security, OnDemand
Governance, Risk, and Compliance Bill Greene Senior Industry Director
Governance, Risk Management & Compliance (GRC) Market Share, Segmentation, Report 2024
Securing Your Digital Transformation
Understanding IDENTITY Assurance
Strong Security for Your Weak Link:
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Securing the Threats of Tomorrow, Today.
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Managing IT Risk in a digital Transformation AGE
Microsoft Data Insights Summit
Presentation transcript:

2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE

3© Copyright 2013 EMC Corporation. All rights reserved. The CIO Challenge Costs, Revenue and……………………………………………….. Risk

4© Copyright 2013 EMC Corporation. All rights reserved. Assess and Manage Threats Align with Business Build Trusted Infrastructure The CIO Challenge Risk

5© Copyright 2013 EMC Corporation. All rights reserved. Threats Used to Be Simple INTRUSION TRADITIONAL ATTACKS FOCUS ON PREVENTION TRADITIONAL DEFENSES FOCUS ON

6© Copyright 2013 EMC Corporation. All rights reserved. B Response A Identification 1 STEALTHY LOW AND SLOW 2 TARGETED SPECIFIC OBJECTIVE 3 INTERACTIVE HUMAN INVOLVEMENT Advanced Security for a New World

7© Copyright 2013 EMC Corporation. All rights reserved. Example Attack: Data Exfiltration Unusual Network Traffic Authentication Check Authorization ChecksEx-filtration ****** PASSWORD Spear Phishing

8© Copyright 2013 EMC Corporation. All rights reserved. Source: Verizon 2012 Data Breach Investigations Report, NYT Can You Respond Within Two Hours? breaches take weeks or more to discover risk reduced when breach response under 2 hours 85 % 60%

9© Copyright 2013 EMC Corporation. All rights reserved. Threats Today Require a New Approach Proprietary and Confidential To Silver Tail Systems

10© Copyright 2013 EMC Corporation. All rights reserved. Advanced Security is Intelligence Driven Analytic Systems with Adaptive Capacity for Big Data Appreciation of Risk Data Analytics Agile Controls

11© Copyright 2013 EMC Corporation. All rights reserved. Today’s Priorities Prevention 80% Monitoring 15% Response 5% Prevention 80% Monitoring 15% Response 5% Prevention 33% Intelligence-Driven Defenses Monitoring 33% Response 33% Budget for Monitoring and Response

12© Copyright 2013 EMC Corporation. All rights reserved. Security Market Shift Sources: IDC. Projected CAGR for CONTROL PLANE Identity Mgmt & Governance Authentication & Access Mgmt IDENTITY Endpoint Controls Network / Messaging Controls INFRASTRAS TRUCTURE Web App Security / Fraud Prev Encryption/DLP/IRM INFO / APP MANAGEMENT PLANE GRC SOLUTIONS: IT/eGRC Data Discovery & Classification, Policy & Compliance  DEFINE POLICY  MAP POLICY  MEASURE POLICY GRC SIEM, Network and Endpoint Forensics & Incident Invest., Advanced Analytics  DETECT Potential Threats  INVESTIGATE Attacks  RESPOND To Attacks SECURITY OPERATIONS ITaaS Management Enterprise CRM ERP BI *** Data Center Applications Infrastructure Information To DC Admins Users Anti-malware -11.3% Firewalls 0% Advanced Authentication 12.7% SIEM 10.7% Forensics & Incident Investigation 16.9%

13© Copyright 2013 EMC Corporation. All rights reserved. RSA and The Security Industry CONTROL PLANE Identity Mgmt & Governance Authentication & Access Mgmt IDENTITY Endpoint Controls Network / Messaging Controls INFRASTRAS TRUCTURE Web App Security / Fraud Prev Encryption/DLP/IRM INFO / APP MANAGEMENT PLANE GRC SOLUTIONS: IT/eGRC Data Discovery & Classification, Policy & Compliance  DEFINE POLICY  MAP POLICY  MEASURE POLICY GRC SIEM, Network and Endpoint Forensics & Incident Invest., Advanced Analytics  DETECT Potential Threats  INVESTIGATE Attacks  RESPOND To Attacks SECURITY OPERATIONS ITaaS Management Enterprise CRM ERP BI *** Data Center Applications Infrastructure Information To DC Admins Users ARCHER eGRC SUITE SECURITY ANALYTICS AUTH MGR / SECURID ADAPTIVE AUTH DLP, DATA PROTECTION MGR SILVER TAIL, FRAUDACTION

14© Copyright 2013 EMC Corporation. All rights reserved. Public & Private Threat Intel Governance A Security Analytics Platform Compliance Incident Management Remediation AnalyticsBig Data

15© Copyright 2013 EMC Corporation. All rights reserved. Discussion Topic Are Security Analytics within your team’s current capabilities? What is your approach?

16© Copyright 2013 EMC Corporation. All rights reserved. The CIO Dashboard: Focus on Risk Availability RiskOperational RiskSecurity RiskCompliance Risk OVERALL IT RISK RSA Archer

17© Copyright 2013 EMC Corporation. All rights reserved. CIO CISO CRO Incident Response Audit InfoSec Engineering/Ops Security Analytics Organization

18© Copyright 2013 EMC Corporation. All rights reserved. Leading Edge Incident Response  Capture and Reverse Events  Analysis and Correlation (Data Science)  Virtual/Live Forensics  Rapid Response  Collaboration

19© Copyright 2013 EMC Corporation. All rights reserved. Leading Edge InfoSec Teams  Threat and Vulnerability Prioritization  Endpoint and Network Visibility  Controls Close to Data  Business Alignment  Visualization

20© Copyright 2013 EMC Corporation. All rights reserved. Leading Edge Auditors  Support Policy With Technology  Real-Time Compliance Stats  Support IT Transformation  Comprehensive View

21© Copyright 2013 EMC Corporation. All rights reserved. Critical Incident Response Center Case Study: RSA Best Practice L2 Incident Handlers Work with L1 on complex incidents Reverse Malware Engineering Host & Network Forensic Cause & Origin Determination Cyber Threat Intelligence Open/All Source Actor Attribution Review unstructured threat intel Attack Sensing & Warning Social Media High Value Target (HVT) tracking L1 Incident Handlers Eyes-on-Glass End User Intake Event Triage Incident Containment & Remediation 24x7 Coverage Content Analytics Integration Content Development Reporting Alert & Rule Creation CIRC Director/Manager Incident Coordinators (per site/shift)

22© Copyright 2013 EMC Corporation. All rights reserved. Discussion Topic How does your Security and GRC organization compare to this model? What do you expect from your CSO/CISO?

23© Copyright 2013 EMC Corporation. All rights reserved. RSA Conference 2013 Takeaways  Intelligence-driven security –January 2013 announcement of RSA Security Analytics release  Big Data-Driven Risk Analytics –Merger of strong authentication with risk analytics –RSA announces Authentication Manager 8  RSA and Juniper Expand Partnership Around Advanced Threats –Intelligence-Sharing Addresses Advanced Threats  Intelligence-driven Next Generation Security Operations Services –Helps customers build cyber-defenses and SOCs

24© Copyright 2013 EMC Corporation. All rights reserved. RSA and EMC Resources RSA Blog RSA Security Briefs EMC CIO ConnectEMC Product Security RSA Features

25© Copyright 2013 EMC Corporation. All rights reserved. Industry Resources 2013 Global Security Report Data Breach Investigations Report (DBIR) investigations-report-2012-ebk_en_xg.pdf Security Intel Analysis/Internet Threat Research Security Threat Report threat-report.aspx Security Bulletin ecurity_Bulletin_2012_Malware_Evolution Threat Report secure.com/static/doc/labs_global/Research/Threat_Report_H2_2012.pdf

26© Copyright 2013 EMC Corporation. All rights reserved. Intelligence-Driven Security SOC | GRC | Identity | Anti-Fraud

27© Copyright 2013 EMC Corporation. All rights reserved. Thank You