AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
The Most Analytical and Comprehensive Defense Network in a Box.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 SIEM Based Intrusion Detection Jim Beechey March 2010 GSEC Gold, GCIA Gold, GCIH,
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Microsoft Ignite /16/2017 4:54 PM
(Geneva, Switzerland, September 2014)
IBM Security Network Protection (XGS)
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Ken Paiboon User Behavior Intelligence Fundamentals: Behaviors, Characteristics, and Facts Ken Paiboon
Network security policy: best practices
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
The Most Analytical and Comprehensive Defense Network in a Box.
Dell Connected Security Solutions Simplify & unify.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Ali Alhamdan, PhD National Information Center Ministry of Interior
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
HP World September 2002 Scott S. Blake, CISSP Vice President, Information Security BindView Corporation Vulnerability Assessment and Action.
Marin Frankovic Datacenter TSP
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Role Of Network IDS in Network Perimeter Defense.
IS3220 Information Technology Infrastructure Security
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.
2015 TCPA WASHINGTON SUMMIT | SEPT. 27TH-29TH | WASHINGTON DC The Anatomy of a Breach Phillip Naples, Pritchard & Jerden, Inc. Jeremy Henley, ID Experts.
Why SIEM – Why Security Intelligence??
Logging and Monitoring. Motivation Attacks are common (see David's talk) – Sophisticated – hard to reveal, (still) quite limited in our environment –
Nuts and Bolts of ATA Chris Lloyd 2016 Redmond Summit | Identity Without Boundaries May 24, 2016 Senior Architect
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Ken Paiboon User Behavior Intelligence Fundamentals: Behaviors, Characteristics, and Facts Ken Paiboon
Proactive Incident Response
Protect your Digital Enterprise
Advanced Endpoint Security Data Connectors-Charlotte January 2016
OIT Security Operations
Deployment Planning Services
Centralized Security Event Management
The next frontier in Endpoint security
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Compliance with hardening standards
Active Cyber Security, OnDemand
Forensics Week 11.
Cybersecurity Insider Threat Analytics
Security Operations Without Going Blind
cyberopsalliance.com |
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Cyber Security Incident Response Playbooks
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
Human (user) behavior patterns and analytics
Chapter 4: Protecting the Organization
Enhanced alerting and collaborative incident management
Information Protection
Microsoft Data Insights Summit
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Security intelligence: solving the puzzle for actionable insight
Information Protection
Cybriant Partner Partner Program White Label Materials
Presentation transcript:

AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations du Telecom, UAE

84% 1,400 Log sources 4,000 Events per second 72 SIEM correlation rules 84% of breaches had available forensic evidence* Integration of Windows Update Server Correlation rules such as failed login and account lockout Source: Verizon 2012 data breach investigation report

The Approach We asked our selves 6 questions. Iterative and not in order

Prioritize The Efforts Business impact assessment Critical business processes Credential repositories Compliance requirements Confidential data High value targets HLR AAA servers High value targets include executive management and privileged users

Recognize The Threats Data leakage Malicious insider Web defacement Loss of revenue Malware infection Denial of service The story of leaked blocked websites list in du network We rely heavily on outsourcing, so malicious insider is one of our biggest threats

Identity and access information Privilege access confinement Understand The Environment Vendors and partners Business processes Security policies Identity and access information Expected activities Privilege access confinement The story of the service account that was trying to access mailboxes Commands that hide caller IDs and parameter not to bill a customer

Enhance Security Visibility Advanced endpoint visibility User behavior analytics Database activity monitoring Open source intelligence Usage of Nexthink; an IT technical support tool. This tool as well as malware analysis contributed to 24% of detected incidents in 2014 The story of sales agent keeps longing in weekends and making huge number of activations compared to his peers.

Advanced Security tools Search For Digital Crumbs SIEM Advanced Security tools User awareness Hunting Building our use cases looking for violation of policies and processes. Looking for abnormal behavior. Looking for indicators of compromise The story of suspecting user whose password was not working revealed a bug in one of our applications that could be used to changed passwords remotely.

Measure The Performance Visibility status Detection method Successful breaches Weaknesses Detection time Response time Phase of detection We stopped worrying about false positives

The Outcome

Visibility Vs Quality The more rules and information sources, the more we discover issues; cyber or insider related. However, the more rules, the more the alerts, the higher the noise

Detection time The increase of 2016 average number of days was due to hunting activities.

Phase of incident detection We are moving towards the left which an indication that we are detecting incidents earlier We compare this with the outcome of the investigations

What’s after detection? <1.5hrs Time between compromise and detection <4hrs <8hrs <24hrs >7 days 1–7 days <1.5hrs Time between detection and start of incident response <4hrs <8hrs <24hrs >7 days 1–7 days <1.5hrs Time between incident response and containment <4hrs <8hrs <24hrs >7 days 1–7 days Our issue is related to engaging of incident response as early as possible.

What We Learned

Insider threat Developers access to production revealed an infected developers machine VVIP data case

Context OOO status Identity Geolocation Threat score Vulnerabilities Access details Vulnerabilities IP reputation True positive score Employment status Compliance status Job role Threat score calculations True positive predictability We detected large amount of e-mails sent to personal e-mail because of he is in Notice Period

User behavior analytics Hunting Endpoint visibility User behavior analytics Known IOCs Experience 18% of 2016 detected incidents happened through hunting

Suspicion If you can’t explain, it might be an attack. The story of billing system connecting to the outside world on port 25

Automation Periodic reports Response actions User notifications Evidence collection 8 minutes between alerts and 20 minutes analysis time. Automation is meant to reduce the mean time between alerts and increase the analysis time. Time saving per rule is 12 days per year.

Automation Sample Average saving is 12 man days per year per rule

Deterrence Insider threats Reduces noise Sending e-mails to users of their suspicious activities. Remote access using VPNs. Access after working hours. Upload of data to external portals

Show your work

Dashboard_Video_v3.0

Apply what we discussed Next week you should: Decide the appropriate security KPIs for your organization and what their targets should be In the first three months following this presentation you should: Identify critical assets, processes, and high value targets within your organization Understand what the major threats you are concerned about are Know your environment and what its good state is Within six months you should: Build different use cases that would look for IOCs in your environment Select the security intelligence solutions that you would consider to implement