Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Nathan Labadie Systems Engineer, US-Central FireEye
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Palo Alto Networks Jay Flanyak Channel Business Manager
© Blue Coat Systems, Inc All Rights Reserved. APTs Are Not a New Type of Malware 1 Source: BC Labs Report: Advanced Persistent Threats.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Breaking the Lifecycle of the Modern Threat Santiago Polo Sr. Systems Engineer Palo Alto Networks, Inc.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
By Hiranmayi Pai Neeraj Jain
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Copyright (c) 2012, FireEye, Inc. All rights reserved. | CONFIDENTIAL 1 FireEye Overview John Bolger Manager Channels, US-Central FireEye.
“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14.
Joshua Senzer, CISSP Sr. Systems Engineer – North East Channel
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
David Flournoy Bit9 Mid-Atlantic Regional Manager
LittleOrange Internet Security an Endpoint Security Appliance.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Trend Micro Confidential 9/23/2015 Threat Rules Sharing Advanced Threats Research.
Observer Platform Network Security Forensics. Agenda Introduction o Today’s security challenges o Observer Platform network forensics benefits Five Steps.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Sky Advanced Threat Prevention
Cryptography and Network Security Sixth Edition by William Stallings.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Web Application (In)security Note: Unless noted differently, all scanned figures were from the textbook, Stuttard & Pinto, 2011.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Why SIEM – Why Security Intelligence??
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Introducing Dell SonicWALL Capture Advanced Threat Protection Service
Introducing Kaspersky Anti-Virus 6.0 for Windows Workstations Introducing Kaspersky ® Anti-Virus 6.0 for Windows Workstations.
Final Project: Advanced Security Blade IPS and DLP blades.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Proactive Incident Response
Protect your Digital Enterprise
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Your Partner for Superior Cybersecurity
Sophos Intercept Next-Gen Endpoint Protection
Ilija Jovičić Sophos Consultant.
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Active Cyber Security, OnDemand
TOPIC 8 ADVANCED PERSISTENT THREAT (APT) 進階持續性滲透攻擊
Sophos Intercept Next-Gen Endpoint Protection
IPS Express Security Account Manager Representative Exam : practice-questions.html.
Automated Response with Windows Defender ATP
ADVANCED PERSISTENT THREATS (APTs) - Simulation
Jon Peppler, Menlo Security Channels
Closing the Breach Detection Gap
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Home Internet Vulnerabilities
The Next Generation Cyber Security in the 4th Industrial Revolution
Panda Adaptive Defense Platform and Services
Secure once, run anywhere Simplify your security with Sophos
What’s new in the Fall Creators Update for Windows Defender ATP
Motivation and Problem Statement
Information Protection
Information Protection
Fortify YOUR Defense with CyberSponse Adaptive Security
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon

© Fidelis Cybersecurity The Challenges 2 PEOPLE Security Skills Shortage TECHNOLOGY Patchwork of Security Solutions PROCESS Manual, Ad-Hoc Processes Not enough security experts for effective defense Reviewing alerts is time consuming and critical alerts are missed Overlapping tools create more work and lead to alert fatigue

© Fidelis Cybersecurity What It Takes to Find Attackers 3 Changing Data/Hijacking Services Content Staging Insider Threat SQL Injection Suspicious App & User Behavior Cross-Site Scripting (XSS) Zero-Day Exploits Data & Credential Theft Web Shells Surveillance/ Espionage Unusual User Behavior Malicious Content & Services It’s About More than Malware

© Fidelis Cybersecurity See patterns in network activity The Day-to-Day Reality All facets must be brought together for rapid detection and response Monitor for exfiltration of data See beaconing and block it Identify malicious network behavior See lateral movement Perform real-time and historical analysis 4

© Fidelis Cybersecurity Attack Lifecycle Overview Detection at Every Stage of an Attack Preventing attackers from achieving their mission requires detection and visibility at every stage of the attack. Initial CompromiseEstablish FootholdEscalate PrivilegesMove LaterallyData Theft Gain Initial Access Strengthen Position Steal Valid User Credentials Access Other Servers & Files Package & Steal Target Data Attacker Objective Sample Tools & Tactics Phishing Watering-hole attack Removable media Malicious download Custom malware Command and control 3 rd party application exploitation Credential theft “Pass-the-hash” Window & Linux lateral movement techniques Reverse shell access Staging servers & directories Data consolidation Data theft 5

© Fidelis Cybersecurity The Threat Timeline Milliseconds to Minutes Time-to- Compromise Minutes to Days Time-to- Exfiltration Data Exfiltration Window Months to Years Attacker Timeline Months to YearsDays to Weeks Time-to-Discovery Time-to-Containment Milliseconds to Minutes Time-to- Prevention Defender Timeline Defense Options: 1.Prevent the Initial Compromise 2.Compress or Eliminate the Data Exfiltration Window by reducing the Time-to-Discovery and Time-to-Containment Speed Matters – you are in a race with the attacker! 6

© Fidelis Cybersecurity Traditional Security -Looks Here- Threats that make it past the Perimeter/Gateway Insider Threat operates here Initial CompromiseEstablish FootholdEscalate PrivilegesMove LaterallyData Theft The Value Gap 7 $$$$$ Cost of Incident Response and Remediation Cohesive Threat Lifecycle Visibility

© Fidelis Cybersecurity Rapid Detection and Response Model 8

© Fidelis Cybersecurity Firewalls (FW / NGFW) Network Malware Detection/Sandbox Network DLP / Data Theft Network Security Analytics / Forensics Security Information and Event Management Network Protocols (TCP / UDP) Content / Embedded Content Business Applications / Run-time Environment (PDF, Office, JAVA, Flash) Signature-base CVE Detection - Packet- based Protocol Attacks, Exploits, and Evasions, Access Control, Protocol Misuse Signature-based CVE Detection - Packet- based Network Application Attacks and Exploits Commodity Malware Targeted Data Theft and Insider Threat Adv. Targeted Attacks – Advanced Malware, RATs Rich, Content-infused Metadata & Packet Capture IPS / IDS (IPS / NGIPS) Network Applications (HTTP, SMTP, SSL, DNS…) Fully Decoded Forensic Detail-Historical Analysis Defense in Depth Event Correlation, Data Correlation, Alerting, Dashboard Endpoint Detection & Response (EDR) Functional Components Features Endpoint Protection Platforms (EPP) Antivirus, Network Protocols, Application Security Detect, Contain, Investigate, Remediate Advancing Security Traditional Security 9 Functional Components Features Attack Vectors

© Fidelis Cybersecurity Advancing Security Traditional Security 10 Case in Point Rapid Remediation AUTOMATE Required Case Scenario Automate = Minutes

Questions?