©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Security Life Cycle for Advanced Threats
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
By Hiranmayi Pai Neeraj Jain
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
©2013 Bit9. All Rights Reserved Next-Generation Endpoint and Server Security Real-time monitoring and protection for endpoints and servers.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Validata Release Coordinator Accelerated application delivery through automated end-to-end release management.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
David Flournoy Bit9 Mid-Atlantic Regional Manager
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Norman Endpoint Protection Advanced security made easy.
Website Hardening HUIT IT Security | Sep
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
ANTIVIRUS SOFTWARE.  Antivirus software is the most widespread mechanism for defending individual hosts against threats associated with malicious software,
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Network security Product Group 2 McAfee Network Security Platform.
Sky Advanced Threat Prevention
Cryptography and Network Security Sixth Edition by William Stallings.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Role Of Network IDS in Network Perimeter Defense.
IS3220 Information Technology Infrastructure Security
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Security Log Visualization with a Correlation Engine: Chris Kubecka Security-evangelist.eu All are welcome in the House of Bytes English Language Presentation.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Get Full Protection on Microsoft Azure with Symantec™ Endpoint Protection 12.1 MICROSOFT AZURE ISV PROFILE: SYMANTEC Symantec™ Endpoint Protection is an.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
HIPS. Host-Based Intrusion Prevention Systems  One of the major benefits to HIPS technology is the ability to identify and stop known and unknown attacks,
Understanding and breaking the cyber kill chain
Proactive Incident Response
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Sophos Intercept Next-Gen Endpoint Protection
Ilija Jovičić Sophos Consultant.
Today’s cyber security landscape
Cybersecurity - What’s Next? June 2017
Vikas Uberoy -Channel Director ANZ
Real-time protection for web sites and web apps against ATTACKS
Intelligence Driven Defense, The Next Generation SOC
Active Cyber Security, OnDemand
Sophos Intercept Next-Gen Endpoint Protection
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Shifting from “Incident” to “Continuous” Response
Brandon Traffanstedt Systems Engineer - Southeast
Panda Adaptive Defense Platform and Services
Chapter 4: Protecting the Organization
Strategic threat assessment
Information Protection
Counter APT Counter APT HUNT operations combine best of breed endpoint detection response technology with an experienced cadre of cybersecurity experts.
Information Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions Engineer, Bit9

The Malware Problem By the Numbers 66% of malware took months or even years to discover (up 10% from previous year) 1 69% of intrusions are discovered by an external party Verizon Data Breach Investigations Report | 2. McAfee Threats Report: First Quarter 2013 | 3. Ponemon Institute 2013 Cost of a Data Breach Study $5.4M The average total cost of a data breach 3 155k The number of new malware samples that are seen daily 2 The number of breaches that incorporated malware 1 40%

Malware: Actors + Actions + Assets = Endpoint ActorsActions Assets *2013 Verizon Data Breach Report

Why is the Endpoint Under Attack? 1. Host-based security software still relies on AV signatures –Antivirus vendors find a routine process: Takes time and can no longer keep up with the massive malware volume –Host-based security software’s dependency on signatures and scanning engines remains an Achilles heel when addressing modern malware 2. Evasion techniques can easily bypass host-based defenses –Malware writers use compression and encryption to bypass AV filters –Malware developers use software polymorphism or metamorphism to change the appearance of malicious code from system to system 3. Cyber adversaries test malware against popular host-based software –There are criminal web sites where malware authors can submit their exploits for testing against dozens of AV products

Significant Data Breaches in Last Twelve Months Jan Feb March April May June July Sept Oct Nov Dec Aug

A New Generation of Security is Coming… Next-Gen Prevention “Reduce your attack surface” Block newly discovered attacks on the fly Threat Detection & Response “Respond quickly when under attack” Pervasive monitoring and centralized recording As defined by Gartner

Detection effective here Prevention effective here Reducing Your Attack Surface Across the Kill Chain Reconnaissance Attacker Researches potential victim Weaponization Attacker creates deliverable payload Delivery Attacker transmits weapon in environment Exploitation Attacker exploits vulnerability Installation Attacker changes system configuration C2 Attacker establishes control channel Action Attacker attempt to exfiltrate data

Real-time Visibility & Detection (Bit9) vs. Scan-based (AV) Unknown malware Known malware

Real-time Visibility & Detection Enables Rapid Response Visibility & Detection Real-time recorded history of entire environment Detect known and unknown files as they happen Know if and when you are under attack Visibility & Detection Real-time recorded history of entire environment Detect known and unknown files as they happen Know if and when you are under attack Response Identify, scope, contain and remediate faster Proactively respond to attacks in motion Simplify and expedite investigations Non-intrusive and no perceived end user impact Response Identify, scope, contain and remediate faster Proactively respond to attacks in motion Simplify and expedite investigations Non-intrusive and no perceived end user impact Next-gen Security Needs:

Failures Within the IR Process Preparation Failure: No IR plan with processes and procedures in place Identification & Scoping Failure: Do not have recorded history to fully identify or scope threat Containment Failure: Does not properly identify threat so cannot fully contain Eradication & Remediation Failure: After failing to fully scope threat, remediation is is impossible Recovery Failure: Organization resumes operations with false sense of security Follow Up & Lessons Learned Failure: No post-incident process in place or does not implement expert recommendations The Six-Step IR Process

Response Process Simplified Identify Scope Contain Remediate

Response Process Pre and Post Bit9: Identify Seek InformationReview System Changes Malware Analysis Gather artifacts: File, System and Network Information 1.First name 2.Hash, Trust 3.Time first seen 4.Group (relation) 5.Connector alert 1.First name 2.Hash, Trust 3.Time first seen 4.Group (relation) 5.Connector alert Identify Scope Contain Remediate

Response Process Pre and Post Bit9: Identify Seek InformationReview System Changes Malware Analysis Gather artifacts: File, System and Network Information 1.Search machine 2.History of change and events 1.Search machine 2.History of change and events Identify

Response Process Pre and Post Bit9: Identify Seek InformationReview System Changes Malware Analysis Gather artifacts: File, System and Network Information Identify 1.SRS Analysis 2.Acquire file remotely 3.Submit to Connector 1.SRS Analysis 2.Acquire file remotely 3.Submit to Connector

Response Process Pre and Post Bit9: Scope Discover all compromised systems Determine attack progression, propagate, what systems are and have been impacted Review Attack HistoryIdentify All Systems Find Patient Zero Complete history of files (the attack) Identify Scope Contain Remediate

Response Process Pre and Post Bit9: Scope Discover all compromised systems Determine attack progression, propagate, what systems are and have been impacted Review Attack HistoryIdentify All Systems Find Patient Zero Complete history of machines the files are, and were, on And where executed Complete history of machines the files are, and were, on And where executed Scope

Response Process Pre and Post Bit9: Scope Discover all compromised systems Determine attack progression, propagate, what systems are and have been impacted Review Attack HistoryIdentify All Systems Find Patient Zero Patient 0 (Initial attack vector) Patient 0 (Initial attack vector) Scope

Response Process Pre and Post Bit9: Contain Short term steps to halt the attack: Block or ban content Halt ExfiltrationDisrupt Attack Ban Globally, stop further executions Identify Scope Remediate Contain

Response Process Pre and Post Bit9: Remediate Review PostureUpdate Prevention & Detection Longer term changes to prevent & detect attacks Update policies across an organization Review Policy For endpoint controls Review Policy For endpoint controls Identify Scope Contain Remediate

Response Process Pre and Post Bit9: Remediate Review PostureUpdate Prevention & Detection Longer term changes to prevent & detect attacks Update policies across an organization Update Prevention policies Update detection Capabilities Update Prevention policies Update detection Capabilities Update Prevention policies Update detection Capabilities Update Prevention policies Update detection Capabilities Remediate

Full Visibility Fuels Full Detection & Response Without Bit9 fully deployed Limited coverage = limited security With Bit9 fully deployed

Takeaways Assume you will get breached Reduce your attack surface with visibility & detection How to do this? –Have real-time recorded history that continuous monitors and records every endpoint/server –Detect both known and unknown malware without signatures –Rapidly respond using recorded history Establish an IR plan Understand security solutions that can simplify and expedite response Fully deploy security solutions across entire environment Limited coverage means limited visibility, detection, response and prevention “In 2020, enterprises will be in a state of continuous compromise.”

Bit9 Benefits Always know what’s on your endpoints and servers Detect and stop advanced threats Reduce incident response time Reduce remediation time Improve compliance Know what’s running on every endpoint and server right now See and record everything; detect threats in real-time without signatures New proactive, signature-less prevention techniques A full history about what’s happened on every machine; contain and control threats Integrate network and endpoint security for real- time response and prevention Visibility Integration Prevention Detection Response

Thank you! Q&A