DHS Phase II SBIR Contract Vice President Business Development

Slides:



Advertisements
Similar presentations
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Advertisements

The Technology Tool Kit version 2.0 August 2014 Presenter: Deborah Watson InfraGard Houston Chapter - SIG Security Guide & Tool Development Manager.
© 2014 The MITRE Corporation. All rights reserved. Approved for Public Release: Case # iOS App Integrity – Got Any? Research Team: Gregg Ganley(PI)
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Website Hardening HUIT IT Security | Sep
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Disclaimer The Content, Demonstration, Source Code and Programs presented here is "AS IS" without any warranty or conditions.
APT29 HAMMERTOSS Jayakrishnan M.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
User Manager Pro Suite Taking Control of Your Systems Joe Vachon Sales Engineer November 8, 2007.
OPSWAT Presentation for XXX Month Date, Year. OPSWAT & ____________ Agenda  Overview of OPSWAT  Multi-scanning with Metascan  Controlling Data Workflow.
The Changing World of Endpoint Protection
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Transforming video & photo collections into valuable resources John Waugaman President - Tygart Technology, Inc.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
How to Make Cyber Threat Intelligence Actionable
Artificial Intelligence. Real Threat Prevention.
Powerpoint presentation on Drive-by download attack -By Yogita Goyal.
©2014 Check Point Software Technologies Ltd Security Report “Critical Security Trends and What You Need to Know Today” Nick Hampson Security Engineering.
A Solution for Maintaining File Integrity within an Online Data Archive Dan Scholes PDS Geosciences Node Washington University 1.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
Internet Vulnerabilities & Criminal Activity Internet Forensics 12.1 April 26, 2010 Internet Forensics 12.1 April 26, 2010.
Air Force Research Labs Dept Homeland Security (HSARPA)
“Enterprise Malware Detection”
Air Force Research Labs Dept Homeland Security (HSARPA)
Protect your Digital Enterprise
ACTIVE DEFENSE Leveraging Threat Intelligence in the Enterprise
Understanding Cyber Attacks: Technical Aspects of Cyber Kill Chain
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Botnets A collection of compromised machines
Abusing 3rd-Party Services For Command And Control
HBGary Marketing Update
Application Communities
Actionable Intelligence
Company Overview.
Detecting Tomorrows Threats Today
Live Malware Analysis for the Incident Responder
ARSTRAT Cyber Threat Center
Cisco ASA 5500 Series Transition and Migration Guide for Distributors
Cyber Physiology Analysis Framework Concept
Detect Malware No One Else Can… Rapidly Identify it’s capabilities, Mitigate the Threat with Actionable Risk Intelligence.
Malware Reverse Engineering Process
Company Overview.
Configuring Windows Firewall with Advanced Security
Real-time protection for web sites and web apps against ATTACKS
Enterprise Botnet Detection and Mitigation System DHS Phase II SBIR Contract QUESTION: By a show of hands, how many of you believe that your networks.
Enterprise Botnet Detection and Mitigation System
DHS Phase II SBIR Contract Senior Security Engineer
Rootkit Detection and Mitigation
Defeat Tomorrow’s Threats Today
Air Force Research Labs Dept Homeland Security (HSARPA)
Malware Reverse Engineering Process
Active Cyber Security, OnDemand
Overview.
Defeat Tomorrow’s Threats Today
Components of A Successful Data Warehouse
ACTIVE DEFENSE Leveraging Threat Intelligence in the Enterprise
Botnets A collection of compromised machines
Professional Malware is Unstoppable
Panda Adaptive Defense Platform and Services
AppExchange Security Certification
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Pass-the-Hash.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

DHS Phase II SBIR Contract Vice President Business Development Enterprise Botnet Detection & Mitigation DHS Phase II SBIR Contract Bob Slapnik Vice President Business Development

Agenda NABC Technical Accomplishments Milestones, Deliverables, and Schedule Recent Public Relations Technology Transition Plan Quad Chart

Are Cybercriminals Targeting You? Next Generation Software to Detect, Diagnose, & respond See what you’ve been missing

Business Needs Sophisticated attackers Have time, resources and skill Criminals motivated by financial gain State sponsored espionage Any cyber defense can and will be defeated

Business Needs Loss of sensitive data and intellectual property FBI - $100 Billion lost annually National security is compromised

SANS Institute’s Top 5 Attacks for 2008 Web Browser exploits Botnets Cyber Espionage Mobile Phone Threats Insider Threat 6

Problems 80% of new malware is not detected Stealthy rootkits Malware variants Targeted attacks Lack of endpoint visibility Traditional disk security and forensics tools are not enough

Traditional Forensics HBGary’s Approach HBGary Responder Memory Analytics Volatile Data Traditional Forensics Traditional Security Data at rest

Information found in RAM Running processes and drivers Unpacked bots and malware Unencrypted network data Open ports and network sockets Open files and file contents Strings and symbols Passwords and keys in clear text Registry info

Why Reverse Engineer Binaries? Computer Forensics Identify a binary’s capabilities Recover Command & Control functions Recover passwords and encryption keys View decrypted packets and files Computer Network Defense Understand bots and malware Create signatures Bolster defenses Attribution This looks suspicious!

HBGary’s Approach Automated host analysis Detect, Diagnose, Respond Physical Memory (RAM) Binaries, bots and malware Detect, Diagnose, Respond Find the bad guy on computers and tell you what he is doing Workstation product  Enterprise product

Benefits Best memory analysis system Automated behavioral detection to identify suspect binaries Automated bot and malware forensics Lower the skills bar Enterprise host visibility

Competition Memory Analysis KnTTools Various open source Malware Analysis IDA Pro OllyDbg Norman Analyzer CWSandbox

NABC Technical Accomplishments Milestones, Deliverables, and Schedule Recent Public Relations Technology Transition Plan Quad Chart

Technical Accomplishments Commercial software released in April 2008 HBGary Responder

16

RAM Analytics RESPONDER Offline Memory Analysis Object Manager Reconstruction Rootkit & Zero-Day Detection Object Extraction Live Physical Memory Preservation 17

Runtime & Binary Forensics RESPONDER Runtime & Binary Forensics Automated Malware Analysis & Reporting Runtime Forensics “live binary” Analysis Binary Forensics “static Analysis” Analyze Packed & Obfuscated Malware Recover Malware executed instructions 18

Malware Analysis Plugin RESPONDER Malware Analysis Plugin Stealth Techniques Network Communications How is it installed? File System Access & Modifications Registry Access & Modifications Malware Survivability Cryptographic Routines File Packing & Obfuscation Remote Command and Control Intelligence 19

Responder Screenshot

Responder Screenshot

Interactive Binary Graphing

Enterprise Software (Developed, not released) Host Agent DLL plug-in, Command line utility, or Service Management console Remote node management Concentrator / project server Network Recon module

Active Defense (5) HBGary Responder

Enterprise Mgt. Console

Digital DNA In-memory fuzzy hashing Detect malware variants Partial matching Calculate DDNA from disk object Detection within memory Detect malware variants Developed with HBGary IR&D private funds outside of the SBIR contract Patent pending

Flypaper New runtime analysis system Observe binary behaviors Causes processes to “stick” in memory Analyze “droppers” Used with Responder Developed with HBGary IR&D private funds outside of the SBIR contract

NABC Technical Accomplishments Milestones, Deliverables, and Schedule Recent Public Relations Technology Transition Plan Quad Chart

Milestones HBGary Responder™ Enterprise Active Defense Released April 2008 Enterprise Active Defense Pilot site in Q1 2009 Bayesian Reasoning Engine Q2 2009

Schedule Oct 2008 Recover passwords and keys from RAM Nov 2008 Recover page file Dec 2008 Recover hiberfil.sys file Jan 2009 FIPS compliant encryption (openSSL) Feb 2009 Pilot enterprise deployment / “1000 nodes” Mar 2009 Recover NDIS buffers and PCAP files Apr 2009 Complete first set of reasoning models May 2009 Integrate the Bayesian Reasoning Engine Jul 2009 Extend detection rules for indirect indicators

NABC Technical Accomplishments Milestones, Deliverables, and Schedule Recent Public Relations Technology Transition Plan Quad Chart

Press Releases Guidance Software to Offer HBGary Responder for Live Memory Analysis in Digital Investigations, May 22, 2008 HBGary Joins McAfee Partner Program, the McAfee Security Innovation Alliance, August 25, 2008

Conference Trade Shows Guidance’s CEIC May 2008 BlackHat August 2008 McAfee FOCUS 2008 Oct 20-23, 2008

NABC Technical Accomplishments Milestones, Deliverables, and Schedule Recent Public Relations Technology Transition Plan Quad Chart

Technology Transition Plan Sell HBGary Responder as a workstation product now Go to market with an enterprise product in near future Sell direct and through partners

Technology Transition Current Customers Customer Type DoD Civilian Agencies Government Contractors Fortune 500 Foreign Governments Universities No. of Customers 13 12 5 4 3

Multiple strategies for enterprise deployable solution Strategic Partners Guidance Software (Encase) Reselling Responder worldwide Integrating Responder to Encase Enterprise McAfee Integration with ePolicy Orchestrator DoD’s HBSS Program Multiple strategies for enterprise deployable solution

NABC Technical Accomplishments Milestones, Deliverables, and Schedule Recent Public Relations Technology Transition Plan Quad Chart

SBIR H-SB06.1-008 Title: Enterprise Botnet Detection and Mitigation Contractor Name: HBGary, Inc. Date: September 10, 2008 Operational Capabilities: Host agents deployed throughout the enterprise Achieve enterprise scalability with hierarchical concentrators Remotely configurable agent operation Centralized, hierarchical, automated reasoners Actionable information for computer incident response teams Low Total Cost of Ownership: Lightweight host agents deployable as command line utility Provide host visibility remotely across the enterprise Distributed reasoning with centralized control Performance Targets: Deploy first enterprise pilot installations for at least 500 nodes Detect previously undetected bots and botnets Proposed Technical Approach: Automated physical memory analysis Collect vast amount of evidence from physical memory Organize evidence into a structured user interface Start with workstation product and expand to enterprise solution Reason over evidence using Bayesian Network models Automated bot and malware analysis Leverage enterprise technologies of large strategic partners Status: Had alpha workstation software before start of Phase II contract Released workstation product, HBGary Responder, April 2008 Excellent marketplace acceptance with growing customer base Enterprise pilot deployment scheduled for Q1 2009 Schedule and Cost: Year 1 Development Year 2 Development Year 2 Deployment Total: Team: HBGary, SAIC Contact: Deliverables: Software Code, User Manuals, Empirical Test Data, Reports, and Solution Demonstration Bob Slapnik Vice President 301-652-8885 x104 bob@hbgary.com HBGary, Inc. 3941 Park Drive, Suite 20-305 El Dorado Hills, CA 95762 www.hbgary.com

Thank you Any Questions? www.hbgary.com 40