Proactive Incident Response

Slides:



Advertisements
Similar presentations
Chapter ADCS CS262/0898/V1 Chapter 1 An Introduction To Computer Security TOPICS Introduction Threats to Computer Systems –Threats, Vulnerabilities.
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Security Life Cycle for Advanced Threats
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
The Most Analytical and Comprehensive Defense Network in a Box.
1© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threat Sachin Deshmanya & Srinivas Matta.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
David Flournoy Bit9 Mid-Atlantic Regional Manager
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Information Systems Security Computer System Life Cycle Security.
Thursday, January 23, :00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.
The Most Analytical and Comprehensive Defense Network in a Box.
1 Panda Malware Radar Discovering hidden threats Channel Presentation Name Date.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Intrusion Detection Systems Paper written detailing importance of audit data in detecting misuse + user behavior 1984-SRI int’l develop method of.
About Us Vulsec’s security experts deliver versatile tactics tailored to arm your IT department in the fight against hackers. We assess your organization.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Role Of Network IDS in Network Perimeter Defense.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Why SIEM – Why Security Intelligence??
Koustav Sadhukhan, Rao Arvind Mallari and Tarun Yadav DRDO, Ministry of Defense, INDIA Cyber Attack Thread: A Control-flow Based Approach to Deconstruct.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
An Anatomy of a Targeted Cyberattack
Understanding and breaking the cyber kill chain
Defining your requirements for a successful security (and compliance
SIEM Rotem Mesika System security engineering
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Hurricanes, Earthquakes, and Threat Intelligence
OIT Security Operations
Ilija Jovičić Sophos Consultant.
Cybersecurity, competence and preparedness
Firmware threat Dhaval Chauhan MIS 534.
Cyber Security: State of the Nation
Lecture 8. Cyber Security, Ethics and Trust
Intelligence Driven Defense, The Next Generation SOC
Active Cyber Security, OnDemand
Joe, Larry, Josh, Susan, Mary, & Ken
Cyber Security coordination in Europe CERT-EU’s perspective
Cyber Threat Intelligence Sharing Standards-based Repository
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
Risk of the Internet At Home
Combining the best of Audit and Penetration Testing
Secure Browsing Because malware usually doesn’t identify itself.
The Discipline of Decision
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Top Security Priorities 2018
Shifting from “Incident” to “Continuous” Response
Four Generations of Security Devices Putting IDS in Context
Evolution Of Cybersecurity
Security as Risk Management
Faculty of Science IT Department By Raz Dara MA.
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Risk Mitigation & Incident Response Week 12
Strategic threat assessment
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Cyber Security For Civil Engineering
UDTSecure TM.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Proactive Incident Response

What is an incident? Hacking attack Password theft Data theft Denial of service There are many types of security incidents: Hacking attack Denial of service Virus attack Data theft Data deletion Password theft Leak of sensitive material We are looking at computer incidents in this training, and it does not include incidents caused by natural disaster. Virus attack Data deletion Leak of sensitive material Incident Response and Recover

Maturity Level 0 No incident response capability Ad-hoc incident response Technology driven/Signature based Process driven Intelligence driven Predictive defense

Average Maturity

Ad-hoc incident response Detection Users report to IT News Response No plan Googling Format, Re-install, Reboot Call vendor Risk awareness Very low

Technology Driven/Signature based Detection Alerts by signature matching Response Standard incident response plan Processes based on tools used Risk awareness Low

Reactive Approaches Usually takes more investigation time and cost Security controls is limited to notification, containment, and remediation capabilities Encourage cyber attacks Damage first, fix later Only capable of handling the known threats

Process Driven Use case hunting Threat modeling Correlation rules Detection Use case hunting Threat modeling Correlation rules Response Specific incident response plan Service driven Process SLA Risk awareness Medium Initial risk management Selective sensor placement

Intelligence Driven Detection Constantly transform use case to Correlation rules Security Operations Center Response Threat driven Vulnerability assessment Security intelligence networks Risk awareness High Intensive risk management Fully aware of asset values and protections

Predictive Defense Cyber Kill Chain Big data analytics Detection Cyber Kill Chain Big data analytics Artificial Intelligence Response Very early in the chain Better kill 10 good people than let 1 bad guy in Risk awareness Extremely high Risk management is embedded into security operation

Risk awareness

Example: Targeted Attack No full time IT security staffs Operate 8 x 5 There is a standard incident response plan Undefined security controls Firewalls, Anti-Virus Think about how you could handle the incident (with these capabilities) if it happens

Stage 1

Planning Phase Reconnaissance is an activity to gain information about something through observation or other detection methods Use Google, Shodan Public announcement, TOR,RFP Social media Objectives Look for vulnerabilities in people process and technology Attack surfaces

Preparation Phase Weaponization and Targeting includes modifying an otherwise harmless file, such as a document, for the purpose of enabling the adversary’s next step. PDFs, that have an exploit contained within them. Macros in Word documents. People target: Social engineering tactics Technical target: Network, VPN, etc.

Cyber Intrusion Phase Delivery and Exploit Phishing, Fake calls, Bribery, Threatening Install Remote Access Trojan Modify PowerShell, Non-malware based

Management and Enablement Phase With a successful cyber intrusion the adversary moves to the next phase, Management and Enablement. Here the actor will establish command and control (C2), using methods such as a connection to the previously installed capability or abusing trusted communications such as the VPN. Capable and persistent actors often establish multiple C2 paths to ensure connectivity is not interrupted if one is detected or removed

Sustainment, Entrenchment, Development, and Execution phase discovery of new systems or data, lateral movement around the network, installation and execution of additional capabilities, launching of those capabilities, capturing transmitted communications such as user credentials, collection of desired data, exfiltration of that data out of the environment and anti-forensic techniques such as cleaning traces of the attack activity or defending his or her foothold when encountering defenders such as incident responders.

Stage 2 It is in Stage 2 that the attacker must use the knowledge gained in Stage 1 to specifically develop and test a capability that can meaningfully attack the ICS.

Attack Development and Tuning Phase Attack Development and Tuning phase, in which the aggressor develops a new capability tailored to affect a specific ICS implementation and for the desired impact. They will mimic the system to test never test in the production environment. Stage 1 and 2 may be months or years lag.

Validation Phase Test and make sure that the attack will work in the first time. Attacker will need the same equipment as target to test therefore we can use this purchase as a trace to track down the attacker.

ICS attack Ultimately, the last phase is the ICS Attack, in which the adversary will deliver the capability, install it or modify existing system functionality, and then execute the attack. Usually fool the plant operator that everything is normal until too late to fix.

Find the gaps People Process Technology 24 x 7 Incident response plan that is specific to a Targeted attack SIEM SME Targeted attack use cases Monitoring technology

Plan for your expected maturity and stay Proactive!

THANK YOU