The Security Operations Hierarchy of Needs

Slides:



Advertisements
Similar presentations
© 2013 Bradford Networks. All rights reserved. Rapid Threat Response From 7 Days to 7 Seconds.
Advertisements

The Most Analytical and Comprehensive Defense Network in a Box.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Access Control Chapter 3 Part 5 Pages 248 to 252.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
Problem Determination Your mind is your most important tool!
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
“ For A Moment, I Had A Feeling Of Total Security. Then Someone Said Cloud! “
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
1 Joe Roebuck The challenges & benefits of implementing Strategic and Tactical Planning Processes and Tools in Workforce Management.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
Proactive Incident Response
Protect your Digital Enterprise
Information Technology Acceptable Use An Overview
IoT Security Part 2, The Malware
OIT Security Operations
Security Virtualization
Security measures deployed by e-communication providers
Firmware threat Dhaval Chauhan MIS 534.
Adam Backman Chief Cat Wrangler – White Star Software
Solving the CF Programmer Shortage
Now, let’s implement/trial Windows Defender Advanced Threat Protection
Outsourcing Database Administration
Defeat Tomorrow’s Threats Today
DBA and IT Professional for ~9 years. Currently I am a Data Architect
Damned if you do and Damned if you don’t
Defeat Tomorrow’s Threats Today
Kay Ousterhout, Christopher Canel, Sylvia Ratnasamy, Scott Shenker
Swapping Segmented paging allows us to have non-contiguous allocations
SECURITY INFORMATION AND EVENT MANAGEMENT

Climate Change Design Challenge Unit Lesson 2
Programming – Touch Sensors
DevOps Database Administration
Is Your Online Security Intelligent? Internet Performance Management
Securing Cloud-Native Applications Jason Schmitt CEO
Secure Browsing Because malware usually doesn’t identify itself.
Practical IPv6 Filtering
cyberopsalliance.com |
DevOps Database Administration
Is your deployment in pants-down mode?
Forensics Week 4.
Integrating CSC into our Schedules
Shifting from “Incident” to “Continuous” Response
Continuing Education Module
INFO 344 Web Tools And Development
Brandon Traffanstedt Systems Engineer - Southeast
Panda Adaptive Defense Platform and Services
Human (user) behavior patterns and analytics
How to Keep Running When Things Go Wrong
Automating Security Operations using Phantom
DBA for ~4+years, IT Professional for 7.5 years.
Outsourcing Database Administration
NSX Data Center for Security
Climate Change Design Challenge Unit Lesson 2
Topic 5: Communication and the Internet
Reflective Log Unit ## Name....
Starting a Data Center on your Campus
Data Security and Privacy Techniques for Modern Databases
MODULE 1 Introduction WELCOME to the ROOT CAUSE ANALYSIS WORKSHOP
I think the... came first because...
Michael Stephenson Microsoft MVP - Azure
By Sissy Osteen, Ph.D., CFP PowerPoint by Cindy Clampet Revised 2017
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
10 Signs You Should Invest In Security Automation
Implementation Plan system integration required for each iteration
Presentation transcript:

The Security Operations Hierarchy of Needs Business challenge Reduce the burden on manpower by automating detection, data collection and clean-up Automated Response Investigation Detection Visibility Audit key events, understand the impact of attacks, and the TTPs of attackers, and drive clean-up efforts Understand when attacks are happening, and see what resources are compromised Facilitate many security and operational use cases, while avoiding stability and performance risks Discovery Determine current risk posture by understanding the true infrastructure landscape For each of the four SOC-less Hierarchy areas, we are interesting in learning: ● Why each stage of the hierarchy is important, what the challenges are at each stage, and the technologies and approaches needed to make it happen (including what people are using today)? DISCOVERY - Under now - add fragmented - if security pros know they are lucky - might be other tools in infra/ops that re doing discovery that may/may not be covering cloud (BYOD), fragmented or nothing, developers may be just telling them “this is what we have this is where it is” and developers do what they want Is it getting better bc of AWS, inventory, etc. That’s on I&O side, we’re paying for these instances, but doesn't tell them if they are running containers, falls back to fragmented view, what do we really know and who knows it Paying so could buddy up w I&O, if using instances as code, know what is substantiated, know, but need I&O folks HUGE issue - it’s a blind spot We don’t ask if pleasantly surprised by assets - don't have data on it VISIBILITY - what are containers and what are they doing, visibility layer, what is going on on a system and not just what we do but could be operational, cpu memory utilization as well, function lacking bc it’s been an network appliance, need it closer to the endpoint If they are saying they have SDLC and say they can handle zero day they are totally lying Most this comes from if they’ve done next gen firewalls, they’ve implemented IAM, both are extremely high level and know who is coming in and out but not what is happening on the system, could catch large number of files in and out but can’t see if someone is doing something they shouldn't/is this process normal/expected World of containers is a little better (twistlock/aqua/stackrox) will monitor and learn, piece together from the outside in, here’s what we think is happening, here is what we think is normal, etc. Do you have tools that are watching/modeling behavior (most don't) and be super careful about the training data Not just a technology problem, don’t have the people behind it either Has to be done w/ technology, no bodies you can rely on Need to see what is happening, what is normal, but have to watch out for training data Learning what normal looks like in a world where you're pushing code to production every day or so, adds to the alert fatigue problem Visibility sets the stage for detection - camera example - enhance enhance enhance DETECTION - reactionary at this point, piecing together from different sources, if you’re lucky people have access to syslog, dump into analytics or SIEM, tie them together to understand if there is a problem or not Not only is there alert fatigue bc everything looks terrible, so much to sort through and figure out what it means On integration and continuous delivery side of the house, integration creating dictionaries where they are saying “this field means this” Need architecture for the industry - if i create an integration - this is what this means and why, dumping my log on you means nothing What we mean when we say XYZ, industry wide, better defined, better analytics to say “when I see these three pieces that is an attack”