Building, Maturing & Rocking a Security Operations Center

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

STORAGE MANAGEMENT/ GETTING STARTED: Storage Management 101 Everything you always wanted to know about Storage Management (but were afraid to ask) Stephen.
David A. Brown Chief Information Security Officer State of Ohio
Security Controls – What Works
project management office(PMO)
Click to add text © 2010 IBM Corporation OpenPages Solution Overview Mark Dinning Principal Solutions Consultant.
Standardization. Introduction A standard is a document. It is a set of rules that control how people should develop and manage materials, products, services,
Network security policy: best practices
SEC835 Database and Web application security Information Security Architecture.
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Capability Maturity Model Part One - Overview. History Effort started by SEI and MITRE Corporation  assess capability of DoD contractors First.
Thursday, January 23, :00 am – 11:30 am. Agenda  Cyber Security Center of Excellence  Project Phase  Implementation  Next Steps 2.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Event Management & ITIL V3
Georgia Institute of Technology CS 4320 Fall 2003.
Appendix C: Designing an Operations Framework to Manage Security.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Network security Product Group 2 McAfee Network Security Platform.
HO © 2012 Fluor. All rights reserved. Quick Wins in Vulnerability Management Classification: Confidential Owner: Michael Holcomb Approver: Phil.
IT Priorities Minimize CAPEX Maximize employee productivity Grow the business Add new compute resources real- time to support growth Meet compliance requirements.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Module 1: Overview of Microsoft Office SharePoint Server 2007.
Organizing a Privacy Program: Administrative Infrastructure and Reporting Relationships Presented by: Samuel P. Jenkins, Director Defense Privacy Office.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Chapter 15 Telecommunication Department Management.
Donald JG Chiarella, PhD, CISM, CDMP, PEM, CHS-CIA, MBA.
Proactive Incident Response
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
3 Do you monitor for unauthorized intrusion activity?
Lessons from the Field: 7 Steps to Proactive Cybersecurity
Kentico CMS Intranet Solution
To simplify the workflow in the modern Enterprise environment
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
“Introduction to Azure Security Center”
CS4311 Spring 2011 Process Improvement Dr
Deployment Planning Services
Active Cyber Security, OnDemand
WEBINAR The Rise Of Insights Services
Make Your Management and Board Meetings More Effective and Paperless with Microsoft Office 365, SharePoint, and the Pervasent Board Papers App Partner.
Office 365 with confidence: security features for Office 365
SECURITY INFORMATION AND EVENT MANAGEMENT
Decisions Delivers an Easy Way to Plan, Organize and Run Efficient Board and Leadership Meetings Along with the Security of Microsoft Office 365 OFFICE.
بهترین راهکار را انتخاب کنید...
I have many checklists: how do I get started with cyber security?
SAM GDPR Assessment <Insert partner logo here>
Healthcare Cloud Security Stack for Microsoft Azure
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Power BI in the New Age!.
Shifting from “Incident” to “Continuous” Response
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
National Cyber Security
Healthcare Cloud Security Stack for Microsoft Azure
Enterprise Program Management Office
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Risk Mitigation & Incident Response Week 12
Cyber Security in a Risk Management Framework
3 Do you monitor for unauthorized intrusion activity?
Microsoft Data Insights Summit
Microsoft Data Insights Summit
ServiceDesk 7 Preview.
3 Do you monitor for unauthorized intrusion activity?
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Building, Maturing & Rocking a Security Operations Center Brandie Anderson Sr. Manager, Global Cyber Security Threat & Vulnerability Management Hewlett-Packard

Agenda To be or Not to be… What is a SOC? Use Case Creation People Process & Procedure Documentation Workflow Metrics I don’t want to grow up Rocking a SOC Questions Agenda

To be or Not to be… Building a SOC is a business decision Organization size Compliance factors Reduce the impact of an incident ROI Proactive reaction To be or Not to be…

Through people, processes and technology, a SOC is dedicated to detection, investigation, and response of log events triggered through security related correlation logic What is a SOC?

ArcSight Correlation

2012: The year malware surged 'dramatically‘ Use Case Creation 91% of Targeted Attacks Start with Spear-phishing Email Large-Scale Water Holing Attack Campaigns Hitting Key Targets Microsoft's Patch Tuesday Leaves Out Crucial Internet Explorer Fix Cyberattacks Against U.S. Corporations Are on the Rise Adobe Data Breach Exposes Military Passwords

People

Roles and Responsibilities Level-1 and Level-2 Analysts Operations Lead Incident Handler SEIM Engineer Content Developer SOC Manager Staffing Models Establishing coverage Determining the right number of resources 8x5 = Min 2 Analyst w/ on-call 12x5/7 = Min 4-5 Analysts w/on-call 24x7 = Min 10-12 Analysts Finding the right skills Ensuring on-shift mentoring Continuous improvement Resource Planning Security Device Engineers System Administrators Network Administrators Physical Security

Training Information security basics On-the-job training SEIM training SANS GCIA and GCIH Career development Avoiding burnout Providing challenges Outlining career progression Exactly how do I get from level 1 to level 2 to lead, etc Skill assessments Certifications

Process & Procedure Business & Technology Operational Analytical Access Management Architecture Compliance DR/BCP Process Improvement Use Cases Process & Procedure Operational Call Out Case Management Event Handling Monitoring On-boarding Shift Log Shift Turn Over Triage Analytical Event Analysis Incident Response Reporting Research Threat Intelligence

Documentation Repository Choices Microsoft SharePoint Pro Approved by Policy Already deployed, supported both internal & by Microsoft Integrates with Active Directory & MS Office Allows for Calendars, Task Assignment, Notifications, Document Revision Tracking Con Complicated to use Typically hard to find information (search) Not very flexible No real revision control Documentation Repository Choices File Shares Pro Everyone has MS Office Everyone knows how to use a file share Does not require specific technology knowledge Con Cluttered Overlap of information Nearly impossible to search for information Requires someone in charge of upkeep No revision control Wiki Pro Open Source Editor utilizes Markup Language (HTML-like) Easy to Search Malleable Revision Control Plugins allow extensive customization Con Open Source Not Vendor supported

Event Incident Case SOC Departmental Organizational Workflows

Metrics How many events are coming in? Raw Events What is coming out? How many data endpoints are collected / monitored How may different types of data How many use cases What is coming out? Correlated Events Incidents / Cases How quickly are things handled? Event recognition Event escalation Event resolution Further defined Per hour/day/week/month Per analyst Per hour of day/ per day of week Incident / case category / severity

Maturing Understand the 80/20 rule Leverage metrics Expand senior leader dashboard view Institute CMM methodology Monitor organizational health Increase complexity Maturing

According to the book Pragmatic Security Metrics – Applying Metametrics to Information Security*, an information security version of the Capability Maturity Model (CMM) looks loosely like this: “Level 1: Ad hoc: information security risks are handled on an entirely informational basis. Processes are undocumented and relatively unstable. Level 2: Repeatable but intuitive: there is an emerging appreciation of information security. Security processes are not formally documented, depending largely on employee’s knowledge and experience. Level 3: Defined process: information security activities are formalized throughout the organization using policies, procedures, and security awareness. Level 4: Managed and measurable: information security activities are standardized using policies, procedures, defined and assigned roles and responsibilities, etc., and metrics are introduced for routing security operations and management purposes. Level 5: Optimized: Metrics are used to drive systematic information security improvements, including strategic activities.” *Brotby & Hinson, 2013 p. 47 CMM – Capability Maturity Model is registered to Carnegie Mellon University CMM Example

Rocking It Lessons Learned Recovery Eradication Containment Preparation Identification Containment Eradication Recovery Lessons Learned Rocking It

Questions

Thank you!