Develop a Next-Gen Security Operations Program

Slides:



Advertisements
Similar presentations
Kathy Corbiere Service Delivery and Performance Commission
Advertisements

GRC: Aligning Policy, Risk and Compliance
Practical IT Research that Drives Measurable Results Manage Help Desk Staffing 1Info-Tech Research Group.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Get Started Bringing Order to Help Desk Request Chaos.
Practical IT Research that Drives Measurable Results 1Info-Tech Research Group Get Moving with Server Virtualization.
Info-Tech Research Group1 V3.1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services.
Plan for Application Consolidation. Successful application consolidation relies on assessment of the application portfolio to determine the best candidates.
Practical IT Research that Drives Measurable Results Make the Case for IP Telephony 1Info-Tech Research Group.
Practical IT Research that Drives Measurable Results Establish an Effective IT Steering Committee.
Info-Tech Research Group1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Practical IT Research that Drives Measurable Results Vendor Landscape Plus: Enterprise Content Management Suite ECM: A vendor marketing concept, not an.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 1 Info-Tech Research Group, Inc. is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
Info-Tech Research Group1 Make the Decision to Upgrade to Microsoft Exchange 2010 It’s Time for a Change: Let’s Talk about Exchange Info-Tech's products.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Build an IT Strategy for the Small Enterprise
Drive a Robust Systems Strategy for HR to Achieve HR Objectives and Enable the Business Save time, optimize your resources, and engage the business by.
Integrate Threat Intelligence Into Your Security Operations
Build an Enterprise IT Security Training Program
Create a Comprehensive BPM Strategy for Successful Process Automation
Shadow Brokers – Details on Leaked Cyberintelligence Tools and Vulnerabilities A brief research note for Info-Tech’s members.
OIT Security Operations
Vendor Landscape Plus: IP Telephony Vendors
Updating the Value Proposition:
Optimize the HR Department to Support the Organizational People Strategy Enhance your HR departmental structure, process, technology, and capability to.
Develop a Next-Gen Security Operations Program
Redesign IT Governance to Drive Optimal Business Results
Select the Right Vendor for Desktop Virtualization
Design an EA Strategy to Articulate the Value Proposition of the EA Function Maximize the likelihood of EA success by communicating EA’s expected contributions.
Become a Strategic CIO Create a personal development plan to take your CIO career to the next level. Info-Tech's products and services combine actionable.
Five Secrets to Optimize Your People, Technology, and Budget
Ensure Cloud Security in IaaS and PaaS Environments
Use Experience Design to Drive Empathy With the Business
Create Data Strategies for the Small Enterprise
Gain Control of Cloud Integration Strategies Before they Float Away
Prepare for a DRP Audit Assess your current DRP maturity, identify required improvements, and complete an audit-ready DRP summary document. Info-Tech's.
Bridge IT and the Business with Business Architecture
SAMPLE Develop a Comprehensive Competency Framework
Select an EA Tool Based on Business and User Need
Lead Strategic Decision Making With Service Portfolio Management
Design & Build a User-Facing Service Catalog
Maximize Business Value from IT Through Benefits Realization
Develop and Document a Disaster Recovery Plan for the Small Enterprise
Improve Business Satisfaction by 10% Through Business Relationship Management Relationship management is the #1 driver of business satisfaction with IT.
Integrate Threat Intelligence Into Your Security Operations
Speaker’s Name, SAP Month 00, 2017
Establish a Right-Sized Incident Management Process
SAMPLE Optimize the Referral Program Learn about becoming a member
Develop a Security Operations Strategy
Transforming IT Management
I have many checklists: how do I get started with cyber security?
Managed Content Services
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Managing IT Risk in a digital Transformation AGE
Define Your IT Strategy
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
KEY INITIATIVE Financial Data and Analytics
Anatomy of a Common Cyber Attack
Presentation transcript:

Develop a Next-Gen Security Operations Program Transition from a security operations center to a threat collaboration environment. Info-Tech's products and services combine actionable insight and relevant advice with ready-to-use tools and templates that cover the full spectrum of IT concerns.© 1997 - 2016 Info-Tech Research Group

ANALYST PERSPECTIVE The evolution of the cyber threat landscape has forced organizations to think differently about security operations. Threat teams must actively collaborate in order to prevent, detect, analyze, and respond to cyber events with the potential to impact an organization’s brand, business operation, or technical infrastructure. TJ Minichillo, Senior Director, Security, Risk & Compliance Info-Tech Research Group

Our understanding of the problem Chief Information Officer (CIO) Chief Information Security Officer (CISO) Chief Operating Officer (COO) Security / IT Management Security Operations Director / SOC Network Operations Director / NOC Systems Administrator Threat Intelligence Staff Security Operations Staff Security Incident Responders Vulnerability Management Staff Patch Management Enhance your security program by implementing and streamlining next-generation security operations processes. Increase organizational situational awareness through active collaboration between core threat teams, enriching internal security events with external threat intelligence and enhancing security controls. Develop a comprehensive threat analysis and dissemination process: align people, process, and technology to scale security to threats. Identify the appropriate technological and infrastructure-based sourcing decisions. Design a step-by-step security operations implementation process. Pursue continuous improvement: build a measurement program that actively evaluates program effectiveness. Board / Chief Executive Officer Information Owners (Business Directors/VP) Security Governance & Risk Management Fraud Operations Human Resources Legal & Public Relations Aid decision making by staying abreast of cyber threats that could impact the business. Increase visibility into the organization’s threat landscape to identify likely targets or identify exposed vulnerabilities. Ensure the business is compliant with regularity, legal, and/or compliance requirements. Understand the value and return on investment of security operations offerings.

Executive summary Security operations is no longer a center, but a process. The need for a physical security hub has evolved into the virtual fusion of prevention, detection, analysis, and response efforts. When all four functions operate as a unified process, your organization will be able to proactively combat changes in the threat landscape. Raw data without correlation is a waste of time, money, and effort. A SIEM on its own will not provide this contextualization. Prevention, detection, analysis, and response processes must contextualize threat data to supplement one another – true value will only be realized once all four functions operate as a unified process. If you are not communicating, then you are not secure. Collaboration eliminates siloed decisions by connecting people, processes, and technologies. You leave less room for error, consume fewer resources, and improve operational efficiency with a transparent security operations process. Organizations are struggling to defend against and prevent threats while juggling business, compliance, and consumer obligations. The increasing prevalence of public data breaches is highlighting the importance of proactive defensive measures. Threat management has become resource intensive, requiring continuous monitoring, collection, and analysis of massive volumes of security event data. There is an onslaught of security data – generating information in different formats, storing it in different places, and forwarding it to different locations. The organization lacks a dedicated enterprise security team. There is limited resourcing available to stand up or mature a security operations center. Many organizations are developing ad hoc security capabilities that result in operational inefficiencies, the misalignment of resources, and the misuse of their security technology investments. It is difficult to communicate the value of a security operations program when trying to secure organizational buy-in to gain the appropriate resourcing. There is limited communication between security functions due to a centralized security operations organizational structure. A unified security operations process actively transforms security events and threat information into actionable intelligence, driving security prevention, detection, analysis, and response processes, addressing the increasing sophistication of cyber threats, and guiding continuous improvement. This blueprint will walk through the steps of developing a flexible and systematic security operations program relevant to your organization.

Organizations are having trouble distilling security events If you cannot effectively manage the growing volume of security events flooding the enterprise, you cannot secure one’s business. 16,937 events per week for the average organization. The average organization spent $1.27 million per year responding to erroneous events. Only 19% of those events were deemed reliable. Only 4% of those events were investigated. “The Cost of Malware Containment.” Ponemon Institute, 2015. Eliminating false positives is paramount to the success of security operations. Don’t waste unnecessary resources fighting imaginary fires.

Data breaches are resulting in major costs across industries Incident detection and escalation costs: Forensic and investigative activities, assessment and audit services, crisis team management and communications to executive management and board of directors. Average cost is at an all-time high of $0.61 million per breach. Notification costs: Creation of contact databases, determination of regulatory requirements, engagement of outside experts, postal expenses, secondary contacts to mail or email bounce-backs, and inbound communication set up. Average cost was $0.56 million per breach. Post data breach costs: Help desk activities, communications, investigative activities, remediation activities, legal costs, product discounts, identity protection services, and regulatory interventions. Average cost increased to $1.64 million per breach. Lost business costs: Abnormal turnover of customers, increased customer acquisition activities, reputation losses and diminished goodwill. Average cost was $3.72 million per breach. Average data breach costs per compromised record hit an all-time high of $217 (in 2015); $74 is direct cost (e.g. legal fees, technology investment) and $143 is indirect cost (e.g. abnormal customer churn). Source: “2015 Cost of Data Breach Study: United States.” Ponemon Institute.

Traditional security operations centers are fragmented Legacy security operations centers (SOCs) fail to address gaps between data sources, network controls, and human capital. There is limited visibility and collaboration between departments, resulting in siloed decisions that do not support the best interests of the organization at large. Of organizations say security operation teams have little understanding of each other’s requirements. SOC Traditional SOC Next-Gen Security Operations Program Security Operations Prevent Detect Analyze Respond Of executives report that poor coordination leads to excessive labor and IT operational costs. 38% – 100% Increase in efficiency after closing operational gaps with collaboration. Protect your organization with an interdependent and collaborative security operations program. Source: “The Game Plan for Closing the SecOps Gap.” Forbes, 2016.

Common security operations challenges 1. 2. Organizational barriers separating prevention, detection, analysis, and response efforts. Siloed operations limits collaboration and internal knowledge sharing. Lack of knowledgeable security staff. Human capital is transferrable between roles & functions and must be cross-trained to wear multiple hats. When an emergency security incident strikes, weak collaboration and poor coordination among critical business functions will magnify inefficiencies in the IR process, impacting the organization’s ability to minimize damage and downtime. When we train our customers’ incident response teams, 90% of our efforts go to stronger interlock and collaboration between key stakeholders. Ismael Valenzuela, IR/Forensics Technical Practice Manager, Foundstone® Services, Intel Security 3. 4. Protecting everything. Avoid a shotgun approach. Prioritize and protect the assets that truly matter with the appropriate network controls. Doing so will also save unnecessary human capital costs. Failure to evaluate and improve security operations. The effectiveness of operations must be frequently measured and (re)assessed through an iterative system of continuous improvement. 5. 6. Lack of standardization. Pre-established use cases and policies outlining tier 1 operational efforts will eliminate ad hoc remediation efforts and streamline operations. Failure to acknowledge the auditor as a customer. Many compliance & regulatory obligations require organizations to have comprehensive documentation of their security operations practices.

Benefits of an integrated operations process Tactical Benefits Insufficient security personnel resourcing has been identified as the most prevalent challenge in security operations.1 Identifying threats earlier in the intrusion kill chain. Dynamic correlation and rule logic to improve the analysis process. Focused efforts on the most dangerous threats and vulnerabilities. Prioritized threat indicators to rapidly identify potential events. Operational Benefits Improved situational awareness; data is provided with context, allowing security operations teams to shift their investigation from indicators to attackers’ tactics, tools, and procedures. Intelligence-driven security operational processes, reducing incident response times through the contextualization of incidents. Collaborative and unified prevention, detection, analysis, and response processes. Enhanced communication through the use of a central web/knowledge portal, defined escalation procedures, and a comprehensive ticketing function. A more intelligence-driven patch management process. Threat intelligence provides actionable vulnerability and exploitation data to identify critical vulnerabilities to patch. Standardized use cases that predefine the appropriate data collection, analysis, remediation and escalation protocol, reducing operational analysis efforts. Improved effectiveness of internal defense controls such as SIEM, NGFWs, IPS, IDS, SWGs, anti-malware and anti-spam packages. Increased operational efficiency in terms of asset and human capital management. However, “RSA has seen SOCs with 5 analysts outperform SOCs with 25 analysts through tools and process optimization.”2 Strategic Benefits “The goal is to empower a few administrators with the best information to enable fast, automated responses.”3 Improved organizational situational awareness; executives can understand relevant threats and appropriately allocate resources where necessary. Improved internal and external communication with top executives and board members about risks to the business, the probable actions of adversaries in the future, and the return on investments in security. 1Ponemon. "2016 State of Cybersecurity in Small & Medium-Sized Businesses (SMB).“ 2EMC. "Building An Intelligence-Driven Security Operations Center.“ 2014 3David Nathans. Designing and Building a Security Operations Center. 2014

Effective security operations will improve capabilities and lower costs Effective security operations management will help you do the following: Improve efficiency Effective security operations management practices develop structured processes to automate activities and increase process consistency across the IT organization. Improve visibility and information sharing Good operations management practices will expose weaknesses and potential problems to anticipate in the future and help security operations better prepare to move from a firefighting role to an innovator role. Good security operations management practices will also promote information sharing across different functions to enable good decision making. Create and clarify accountability and responsibility Security operations management practices will set a clear level of accountability throughout the IT organization, and ensure role responsibility for all tasks and processes involved in IT service delivery. Control security costs Security operations management is concerned with delivering promised services in the most efficient way possible. Good security operations management practices will provide insight into current costs across the organization and present opportunities for cost savings. Identify opportunities for continuous improvement Increased visibility into current performance levels and the ability to accurately identify opportunities for continuous improvement. Improve threat protection Stronger network controls through the hardening of perimeter defenses, an intelligence-driven analysis process, and a streamlined incident remediation process.

A collaborative security operations process drives significant value Info-Tech’s security operations blueprint ties together various initiatives: Value of Info-Tech’s Security Operations Blueprint Formalized standards & processes tailored to your organization. Templates & tools to facilitate the improvement of your security operations. Streamlined prevention, detection, analysis, and response processes. Strategy to incorporate intelligence into relevant security operation processes such as incident response and vulnerability management. Process around effective maintenance and optimization of your security operations. Appropriate security operations procedures relevant to your organization. Impact Build an Information Security Strategy Select and Implement a SIEM Solution Integrate Threat Intelligence Into Your Security Operations Short term: Streamline the process of formalizing a unified security operations program tailored to your organization-specific strategic needs. Assess current operational gaps and begin to develop your unique implementation process in a structured manner. Long term: Greater visibility into your immediate threat environment, improved effectiveness of internal defensive controls, increased operational efficiency and collaboration between prevention, detection, analysis, and response efforts, and ultimately an enhanced security pressure posture. Impact Develop and Implement a Security Incident Management Program Design and Implement a Vulnerability Management Program Manage Security Outsourcing (Coming Soon)

Info-Tech Research Group Helps IT Professionals To: Quickly get up to speed with new technologies Make the right technology purchasing decisions – fast Deliver critical IT projects, on time and within budget Manage business expectations Justify IT spending and prove the value of IT Train IT staff and effectively manage an IT department Sign up for free trial membership to get practical solutions for your IT challenges “Info-Tech helps me to be proactive instead of reactive – a cardinal rule in a stable and leading edge IT environment. - ARCS Commercial Mortgage Co., LP Toll Free: 1-888-670-8889 www.infotech.com