Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Incident Response Managing Security at Microsoft Published: April 2004.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
1© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threat Sachin Deshmanya & Srinivas Matta.
National Protection and Programs Directorate Department of Homeland Security The Office of Infrastructure Protection Cybersecurity Brief [Date of presentation]
David Flournoy Bit9 Mid-Atlantic Regional Manager
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Website Hardening HUIT IT Security | Sep
Financial Advisory & Litigation Consulting Services Risk Management 2006 September 14-15, 2006 The Metropolitan Club, New York, NY Workshop B: Information.
© 2001 by Carnegie Mellon University PSM-1 OCTAVE SM : Senior Management Briefing Software Engineering Institute Carnegie Mellon University Pittsburgh,
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
INNOVATE THROUGH MOTIVATION MSP Services Overview KEVIN KIRKPATRICK – OWNER, MSP INC LOGO.
OCTAVE By Matt White. OCTAVE  OCTAVE® (Operationally Critical Threat, Asset, and Vulnerability Evaluation) is a risk-based strategic assessment and planning.
Security and Resilience Pat Looney Brookhaven National Laboratory April 2016.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
How to Make Cyber Threat Intelligence Actionable
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Surveillance and Security Systems Cyber Security Integration.
Proactive Incident Response
Protect your Digital Enterprise
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
OIT Security Operations
Office 365 Security Assessment Workshop
Firmware threat Dhaval Chauhan MIS 534.
Cybersecurity - What’s Next? June 2017
Now, let’s implement/trial Windows Defender Advanced Threat Protection
A lustrum of malware network communication: Evolution & insights
Enterprise Botnet Detection and Mitigation System
Rootkit Detection and Mitigation
Compliance with hardening standards
Intelligence Driven Defense, The Next Generation SOC
Active Cyber Security, OnDemand
CIO Forum Briefing 3rd November, 2015
Cyber Security coordination in Europe CERT-EU’s perspective
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Cyber defense management
بهترین راهکار را انتخاب کنید...
5G Security Training
Ali Dehghantanha; Myths and Truths: Cyber Threat Hunting and Intelligence in IoT Environments Ali Dehghantanha;
Combining the best of Audit and Penetration Testing
Healthcare Cloud Security Stack for Microsoft Azure
Cyber Defense Matrix Cyber Defense Matrix
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
CRITICAL INFRASTRUCTURE CYBERSECURITY
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Cyber Risk & Cyber Insurance - Overview
Healthcare Cloud Security Stack for Microsoft Azure
Enhanced alerting and collaborative incident management
Coordinated Security Response
Risk Mitigation & Incident Response Week 12
Strategic threat assessment
The MobileIron® Threat Detection difference:
5/12/2019 2:57 PM © Microsoft Corporation. All rights reserved.
Healthcare Cloud Security Stack for Microsoft Azure
Healthcare Cloud Security Stack for Microsoft Azure
Plan and design the solution
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Cybriant Partner Partner Program White Label Materials
50% Introducing the Cybersecurity Assessment
Presentation transcript:

Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts to provide clients with proactive incident response focused on gaining rapid visibility into customer networks to detemine adversary presence, scope and scale of an infection, and root cause analysis to move clients towards total threat remediation Combining years of Intelligence Community experience conducting offensive cyber operations against advanced threat actors, our experts understand and anticipate adversary behavior and tradecraft, providing a unique ability to predict and determine an attackers presence within a network and identify compromised hosts Adversary HUNT Pursue Operations Threat Baseline Assessments Incident Response and Digital Forensics

Concept of Operations HUNT Pursue Remediation Agent Deployment HUNT operators perform detection and analysis techniques to evaluate telemetry returned from customer endpoints to identify adversary presence and compromised assets HUNT Operators perform malware and forensic analysis to provide actionable intelligence and indicators of compromise to proesecute and remediate threats Agent Deployment Response Planning Indigenous endpoint detection response agents are deployed to customer endpoints to provide HUNT team with visibility into customer networks to determine adversary presence Our HUNT team members work with customer security staff to develop tailored response plans focused on protection of critical assets and holistic remediation 01. CONOP

Phase I: Predeployment Counter APT Concept of Operations Analysts deploy to customer site to develop an understanding of customer network enterprise environment, interview customer security team to gather context surrounding security incident, and determine connectivity requirements to prepare for agent deployment Phase will include malware analysis and reverse engineering of any known suspected malicious software samples and review of any known indicators or compromise related to intrusion Establish a plan of action and safe communications channels with customer team Identify critical assets and key cyber terrain as a function of customer business impact to prioritize actions and response strategy Develop detailed evaluation deployment plan Deliverables Provide customer with detailed agent deployment plan 02. Predeployment Phase

Phase II: Agent Deployment Counter APT Concept of Operations On-site analyst works with customer to deploy software agents and serves as an onsite point of contact for ensuring constant communication and interaction with customer security team Ensures secure communications with remote HUNT team Enables full HUNT support to enable timely and efficient prosecution of threats Duration 1 Day of onsite support, performed by one forward deployed analyst Deliverables Tailored communications channel for SNOW sensors to enable joint operational HUNT infrastructure access to SNOWBoard Analysis and Command and Control Interface 03. Agent Deployment

Phase III: HUNT & Remediation Counter APT Concept of Operations Remote HUNT operators actively HUNT in customer networks to determine adversary presence and determine the conditions for deliberate response in accordance with customer operating requirements Identified indicators of compromise and analyzed to identify compromised hosts and determine scope and scale of infection A response plan is developed for remediating including root cause analysis of intrusion to provide a path to infection by the adversary and recommendations for mitigating security vulnerabilities Duration Approximately five days, performed by one onsite analyst in addition to remote HUNT operators Deliverables Detection reporting Response Plans Post-Operation Remediation Support 04. HUNT and Response Actions

Pricing Incident Response & HUNT (USD) Incident Response (Remote HUNT) | $200/hr Incident Response (Urgent Onsite Support) | $280/hr Incident Response (Nonurgent Onsite Support) | $240/hr Travel | $100/hr Pricing Incident Response & HUNT (USD)