Cyber Security and the National Broadband Strategy

Slides:



Advertisements
Similar presentations
Security Administration Tools and Practices Amit Bhan Usable Privacy and Security.
Advertisements

Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
Solutions & Services to ‘Multiply your Business Performance’ 2013.
Workshop on High Confidence Medical Device Software and Systems (HCMDSS) Research & Roadmap June 2-3, 2005 Philadelphia, PA. Manufacturer/Care-Giver Perspective.
TAC Vista Security. Target  TAC Vista & Security Integration  Key customer groups –Existing TAC Vista users Provide features and hardware for security.
The State of Security Management By Jim Reavis January 2003.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Unified Logs and Reporting for Hybrid Centralized Management
Lesson 14-Desktop Protection. Overview Protect against malicious code. Use the Internet. Protect against physical tampering.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Smart Grid Cyber Security Framework
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
Skybox® Security Solutions for Symantec CCS Comprehensive IT Governance Risk and Access Compliance Management Skybox Security's.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
1 IS 8950 Managing Network Infrastructure and Operations.
114 W. 1 st Street Sanford, FL
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Larry Clinton Operations Officer Internet Security Alliance
1 GE Fanuc ©2008 GE Fanuc Intelligent Platforms All Rights Reserved Proficy* DataMart v1.0 Barry Lynch Product Manager GE Fanuc Software Puts the “E” in.
An Approach To Automate a Process of Detecting Unauthorised Accesses M. Chmielewski, A. Gowdiak, N. Meyer, T. Ostwald, M. Stroiński
Network security Product Group 2 McAfee Network Security Platform.
Randy Beavers CS 585 – Computer Security February 19, 2009.
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Implementing Server Security on Windows 2000 and Windows Server 2003 Fabrizio Grossi.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
SQL Database Management
OIT Security Operations
Hybrid Management and Security
Discovering Computers 2010: Living in a Digital World Chapter 14
CIM Modeling for E&U - (Short Version)
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Real-time protection for web sites and web apps against ATTACKS
Secure Software Confidentiality Integrity Data Security Authentication
Active Cyber Security, OnDemand
PCD MEM Medical Device IT Management
Wonderware Online Cost-Effective SaaS Solution Powered by the Microsoft Azure Cloud Platform Delivers Industrial Insights to Users and OEMs MICROSOFT AZURE.
CCNET Managed Services
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Speaker’s Name, SAP Month 00, 2017
Transforming IT Management
I have many checklists: how do I get started with cyber security?
Securing Your Digital Transformation
Real World use cases for BizTalk360
Network management system
PowerHub on Microsoft Azure Enables Renewable Energy Professionals to Track and Manage Projects from a Centralized Platform Accessible Anywhere MICROSOFT.
The University of Adelaide, School of Computer Science
Skybox Cyber Security Best Practices
Panda Adaptive Defense Platform and Services
XtremeData on the Microsoft Azure Cloud Platform:
Networking for Home and Small Businesses – Chapter 8
CIPSEC Framework components: XL-SIEM
Maintaining order and safety in a city is no small task
DATS International Portfolio.
Matteo Merialdo RHEA Group Innovative aspects in cyber range solutions.
ES SYSTEM SYSTEM BRIEF.
The CYBERWISER.eu project
GRC - A Strategic Approach
Networking for Home and Small Businesses – Chapter 8
Data Governance & Management Skills and Experience
Networking for Home and Small Businesses – Chapter 8
Pitch Deck.
Supports launch of cloud-based endpoint management service
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Presentation transcript:

Cyber Security and the National Broadband Strategy John C. Nagengast nagengast@att.com

What is Cyber Security? For AT&T, cyber security is the collective set of capabilities, procedures, and practices that protect our customers and the services we provide them from the full spectrum of cyber threats. Cyber Security assures the information, applications, and services our customers want are secure, accurate, reliable, and available wherever and whenever they are desired.

Increasingly difficult for systems administrators What we see every day! COTS Software with Bugs and Vulnerabilities Insecure “out-of-the-box” configurations Increasing speed of Zero-day Attacks Relentless stream of patches from Vendors Complexity, Complexity, Complexity Increasingly difficult for systems administrators and users to manage complex security solutions against ever more sophisticated attacks

“What You Expect as Normal” “What you Actually See” How AT&T Identifies Cyber Threats Correlation Across Network, Servers & Applications 2842 17 20 5 2 8 Security Analysis (Profile/Anomaly Based) Real-Time Alerts & Alarms with Severity & Likely Source Profiling Engine “What You Expect as Normal” Normalized Database of Alerts Monitoring Engine “What you Actually See” AT&T Security Professionals Correlation Engine

Security Event & Threat Analysis Portal

Our Cyber Security Tool Set – BotNet Tracking Conficker Worm April 01, 2009 This graphic shows the deliberate efforts of botnet operators to create a resilient botnet. In particular, note the yellow dots that represent control points: 2 on US west coast 2 on US east coast 2 in Europe 2 in Asia In order to disable this botnet, all of these controllers would need to be stopped nearly simultaneously. But these will be located in a variety legal jurisdictions and hosted within a variety of network service providers. Cooperation between all of the entities is very unlikely; particularly if the botnet remains relatively stealth and unknown. This one (for example) is basically unknown relative to Conficker. 15,136 visible members, 8 control servers, tracked since 7/2006 Page 6 6 6 6

Some Basic Principles – Broadband Strategy & Cyber Security Expand Security Education and Awareness Fulfill Market Needs & Demand for Cyber Security Spur Innovation and Investment Leverage Core Network Intelligence to Optimize Broadband’s Security, Reliability and Efficiency Make Managed Security an integral part of Broadband Services Simplify User Experience and Increase Security