Agenda Enterprise Situational Awareness Active Defense

Slides:



Advertisements
Similar presentations
The Most Analytical and Comprehensive Defense Network in a Box.
Advertisements

© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Advanced Metering Infrastructure AMI Security Roadmap April 13, 2007.
Unified Logs and Reporting for Hybrid Centralized Management
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
©2003–2008 Check Point Software Technologies Ltd. All rights reserved. CheckPoint new security architecture and R70 highlights.
EEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Automating Enterprise IT Management by Leveraging Security Content Automation Protocol (SCAP) John M. Gilligan May, 2009.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
Security Automation May 26th, Security Automation: the challenge “Tower of Babel” – Too much proprietary, incompatible information – Costly – Error.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
Blue Coat Cloud Continuum
Companies of All Sizes Can Realize the Benefits of Big Data Fast with the Power of Microsoft Azure and Organon Analytics’ Analytics-as-a- Service MICROSOFT.
Clouding with Microsoft Azure
CS457 Introduction to Information Security Systems
Viewtrust software overview
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
AuraPortal Cloud Helps Empower Organizations to Organize and Control Their Business Processes via Applications on the Microsoft Azure Cloud Platform MICROSOFT.
Service Assurance in the Age of Virtualization
Univa Grid Engine Makes Work Management Automatic and Efficient, Accelerates Deployment of Cloud Services with Power of Microsoft Azure MICROSOFT AZURE.
COMPANY PROFILE: CORENT TECHNOLOGY INC.
Critical Security Controls
Accenture Proprietary, All Rights Reserved, Not for Distribution
CIM Modeling for E&U - (Short Version)
Microsoft Azure-Powered BlueCielo Meridian360 Portal Improves Asset Data Integrity and Facilitates Secure Collaboration with External Stakeholders MICROSOFT.
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Nicho Joins Microsoft Azure Certified Program to Transform Brand Engagement, Boost Customer Acquisition and Conversions with Scalable Ease MICROSOFT AZURE.
Ralleo Enterprise-Grade Solution for Managing Change and Business Transformation Provides Opportunities to Better Analyze Real-Time Data MICROSOFT AZURE.
Compliance with hardening standards
Active Cyber Security, OnDemand
Couchbase Server is a NoSQL Database with a SQL-Based Query Language
Measure Effectiveness of Communication, Engage Your Employees, and Bridge Communication Gaps with Sparrow App and Power of Microsoft Azure MICROSOFT AZURE.
Stylelabs Develops the Marketing Content Hub to Offer Enterprises a High-End Marketing Content Management Platform Based on Microsoft Azure MICROSOFT AZURE.
Hosted on Azure, LoginRadius’ Customer Identity
Speaker’s Name, SAP Month 00, 2017
Security Automation Standards Landscape
Get Real Value and Insights from Your Data: Biin Solutions Provides Predictive Analytics, IoT, and Business Intelligence with Microsoft Azure Power MICROSOFT.
Built on the Powerful Microsoft Azure Platform, Lievestro Delivers Care Information, Capacity Management Solutions to Hospitals, Medical Field MICROSOFT.
Yellowfin: An Azure-Compatible Business Intelligence Platform That Connects People with Their Data for Better Decision Making MICROSOFT AZURE APP BUILDER.
Scalable SoftNAS Cloud Protects Customers’ Mission-Critical Data in the Cloud with a Highly Available, Flexible Solution for Microsoft Azure MICROSOFT.
Logsign All-In-One Security Information and Event Management (SIEM) Solution Built on Azure Improves Security & Business Continuity MICROSOFT AZURE APP.
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Utilizing the Capabilities of Microsoft Azure, Skipper Offers a Results-Based Platform That Helps Digital Advertisers with the Marketing of Their Mobile.
Partner Logo Reblaze Utilizes Microsoft Azure Cloud Technology to Provide Web Assets with a Comprehensive, Robust, Protective Shield Against Internet Threats.
On-Premises, or Deployed in a Hybrid Environment
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
XtremeData on the Microsoft Azure Cloud Platform:
Resonate Solutions and Microsoft Azure Provide the Power to Easily and Reliably Operationalize Closed-Loop Feedback and get Actionable Insights Partner.
Improve Patient Experience with Saama and Microsoft Azure
Last.Backend is a Continuous Delivery Platform for Developers and Dev Teams, Allowing Them to Manage and Deploy Applications Easier and Faster MICROSOFT.
AMI Security Roadmap April 13, 2007.
Viewtrust Continuous Security, Risk and Compliance Management
IT Management Services Infrastructure Services
COMPANY PROFILE: REELWAY
Built on the Powerful Azure Platform, Angoss Helps Businesses Turn Data into Actionable Insights That Reduce Risk, Increase Organizational Performance.
Customer 360.
Presentation transcript:

Accenture Cyber Security Enterprise Situational Awareness, Risk Assessment, and Active Defense Accenture Proprietary, All Rights Reserved, Not for Distribution Copyright © 2010 Accenture. All right reserved

Agenda Enterprise Situational Awareness Active Defense Open Architecture for Data Processing and Distribution Prioritization Risk Management

Enterprise Situational Awareness- Problem and Challenges Active Defense Open Architecture for Data Processing and Distribution Prioritization Risk Management Problem Without full visualization and situational awareness of the GIG, it is difficult to provide an adequate cyber defense Currently no means to validate the network defensive posture Need enhanced situational awareness to improve network defense and effective combat operations Providing the effective and efficient means for COCOMS, Agencies, and other organizations to share compliance information A comprehensive solution includes Making it easy to share and distribute information Information must be relevant for each level of the organizational hierarchy The data transmission must not negatively impact the computational and network resources of the organizations and the GIG A vendor neutral capability that provides and distributes the networks’ defensive posture across the organizational hierarchy

Accenture Compliance Automation Reporting for Enhanced Situational Awareness Enterprise Situational Awareness Active Defense Open Architecture for Data Processing and Distribution Prioritization Risk Management Accenture Compliance Automation Reporting (CAR) provides near-real time reporting throughout the organizational hierarchy Aggregates information from the lower levels and rolls up to the higher levels up to headquarters Data is summarized, transformed, and compressed to provide appropriate information at each level, which minimizes amount of data transmitted CAR, Powered by the Accenture Federated Framework, provides enterprise wide enhanced situational awareness

CAR Dashboard and Application Enterprise Situational Awareness Active Defense Open Architecture for Data Processing and Distribution Prioritization Risk Management CAR’s Functions Provides a unified dashboard to access and display multi-vendor security compliance and risk applications at the organizational level (lowest level) Inputs FDCC scores in XCCDF format Groups FDCC fail scores into 7 risk categories (0-6, risk category 0 = 100% compliance) Provides a per desktop compliance score (0-100%) vs. risk score (0 – 7) of the organization on a two-dimensional graph that clearly identifies outliers Transforms XCCDF to an industry standard lightweight data interchange format and compresses it to two orders of magnitude less than original format Distributes the compressed risk and compliance data up the organizational hierarchy via the Accenture Federated Framework

Accenture Compliance Automation Reporting (CAR) Architecture and Data Flow Enterprise Situational Awareness Active Defense Open Architecture for Data Processing and Distribution Prioritization Risk Management CAR, Powered by Accenture Federated Framework Employs GOTS & open source software Reduced cost of ownership Vendor Agnostic Conforms to Federal standards Real-time, federated architecture Consumes and Produces SCAP (XCCDF) HBSS Environment SQL Usage SCAP Usage

Accenture Federated Framework Enterprise Situational Awareness Active Defense Open Architecture for Data Processing and Distribution Prioritization Risk Management Java based framework comprised of three components Application Layer - allows for custom business logic development (e.g., CAR) Data Processing Layer – provides access to enterprise data and interfaces to applications and software tools Federated Message-Oriented Middleware – distributes compressed data securely to all other Accenture Federated Framework nodes in the enterprise CAR

Start Demo CAR Demo Enterprise Situational Awareness Active Defense Open Architecture for Data Processing and Distribution Prioritization Risk Management Start Demo

Active Defense Forensic Quarantine Enterprise Situational Awareness Active Defense Open Architecture for Data Processing and Distribution Prioritization Risk Management Zero-day attacks …. We propose an approach to detect and stop the spread zero-day malware when the data is in motion. The proposed solution includes HBGary’s Digital DNA McAfee ePO Server Virtual Armor’s Blockhouse Accenture’s CAR and Dynamic Distributed Network (DDN)

Goals Indentify zero-day malware Determine if malware is spreading Enterprise Situational Awareness Active Defense Open Architecture for Data Processing and Distribution Prioritization Risk Management Indentify zero-day malware Determine if malware is spreading Determine where it has spread Assess impact Prevent it from spreading further Isolate compromised machines Determine vector Remediate

Proposed Architecture and Process Flow Enterprise Situational Awareness Active Defense Open Architecture for Data Processing and Distribution Prioritization Risk Management Digital DNA detects zero-day malware HBGary distributes malware signature to BlockHouse Blockhouse sends malware signature and network device change requests Blockhouse monitors firewall and network devices and identifies malware DDN configure network devices to protect network from new malware CAR distributes malware signature to all sites in federation to update other Blockhouse servers 5 6 3, 4 2 1

HBGary Digital DNA

Virtual Armor BlockHouse

Still Working on the this summary Recommended Approach Think Big: Develop a Multi-Tiered offering for aggregation of data. Use a customer-focused approach within in the framework of a broad strategy that can achieve value through economies of scale. Develop a prioritization and risk management process from the visual views Collaborate from Cyber Command down to the services and agencies. Start Small: Provide Compliance Automation Reporting Framework at a lower command Develop the compliance definition and apply it into the report. 3 Month engagement Write a Governance process for Compliance Reporting Write a prioritization and risk management plan Initial releases will have minimal features that meet the customer needs Scale Fast: Build on success by quickly pulling in additional groups In parallel, evolve the Tiers with the lowest TCO to make them applicable to a broader audience Re-visit the “waterfall” after each change to the app set to re-evaluate candidacy for a higher Tier to help drive down costs. Subsequent releases will increase features to deliver capabilities not currently possible with the current desktop approach. Accenture Proprietary, All Rights Reserved, Not for Distribution Copyright © 2010 Accenture. All right reserved 13

Backup Slides

Threat Analysis Center Asset Capabilities Cyber Range (Virtualized) Compliance Automation Reporting Framework Cyber Tool Set as a service Security Operation Center Transfer of data using SCAP (ARF) Past (Trend Analysis) Present (Real Time Mitigation and Remediation) Future (Predictive Analytics) Forensic Tools (Non Criminal activity) Threat Anomaly Correlation Malware Detection, Analysis and reverse engineering Vulnerability Replay Software Quality Assurance Security Engineering Monitoring Triage Coordination with outside SOC Arc Sight, Symantec, or McAfee Tools Consider A Security Operations Analysis Center – Everyone already has a NOC and SOC All can be reused throughout the Threat Analysis Framework Accenture Proprietary, All Rights Reserved, Not for Distribution Copyright © 2010 Accenture. All right reserved

GeoCode View GEO Code View - SAS