Presentation is loading. Please wait.

Presentation is loading. Please wait.

Thursday, January 23, 2014 10:00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.

Similar presentations


Presentation on theme: "Thursday, January 23, 2014 10:00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2."— Presentation transcript:

1 Thursday, January 23, 2014 10:00 am – 11:30 am

2 Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2

3 State of Hawaii’s Transformation Programs 3

4 Cyber Security Center of Excellence Strengthen the ability to detect and respond to enterprise-wide cyber incidents/threats Design a formal enterprise-wide incident response plan Accelerate integration of tools to support SOC Security Operations Center Mission Statement: “To enhance the cyber security posture of the Hawaii State Government through continuous monitoring to proactively identify, isolate and manage security incidents thereby reducing the risks from potential cyber threats.” 4

5 Assess Plan Implementation Verify and Validate Project Phase 4 Phased Approach 5

6 6 Implementation - Security Devices

7 Lessons Learned Integration Process Training Detect AnalyzeRespond Recover Implementation 7 Enterprise-Wide Incident Response Plan

8  Detection through ArcSight ◦ Detect intrusions at perimeter, internal network, hosts, applications Implementation - Detect 8

9  Detailed Analysis with LiveAction ◦ Determine severity, scope, business impact Implementation - Analyze 9

10  Initial Cyber Incident Report ◦ Notification to Business and Program Owners Implementation - Analyze 10

11  Response Options ◦ Can stop attack at perimeter, access layer, host, or somewhere in between Implementation - Respond 11

12  Recover systems to normal state ◦ Includes threat removal, damage assessment, forensics, reporting and lessons learned  Plan the Recovery  Collect Incident Data  Cleanup & Recovery of Incident  Forensics - Reconstruct  Damage & Cost assessment  Revise plan & response  Complete post-incident analysis and reporting  Reporting internally & to authorities Implementation - Recover 12

13  Ensure mitigation efforts were successful ◦ Watch-list monitoring with multiple Cyber Tools ArcSight LiveAction Intrusion Prevention System Implementation – Verify and Validate 13

14 Next Steps  Continue Server Categorization  Defining use cases for Alerting, Reporting and Dashboards in ArcSight  Continue Adversary Hunting  Continued Ingestion of Devices (Servers, Databases, Routers, Switches, Security Systems)  Begin Enterprise-Wide Incident Response Program Development Thank You 14


Download ppt "Thursday, January 23, 2014 10:00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2."

Similar presentations


Ads by Google