The Cyber Threat Intelligence Experts

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Security Life Cycle for Advanced Threats
Threats to the Aviation Sector
Ezra T. Ernst Chief Executive Officer Swets Information Services, Inc. The Long Tail and its’ application To Scholarly Information.
Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
Who Is Attacking You? Distinguishing Motivation to Prioritize Threats John Hultquist Senior Manager, Cyber Espionage Threat Intelligence iSIGHT Partners.
David A. Brown Chief Information Security Officer State of Ohio
Management’s Role in Information Security V.T. Raja, Ph.D., Oregon State University.
Building a Threat Intel Team Ryan Olson Director of Threat Intelligence October, 2014.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Microsoft Ignite /16/2017 4:54 PM
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Delivering significant, measurable reductions within Retail’s Greatest Area of Loss 18 th September 2014.
Lessons Learned in Smart Grid Cyber Security
Network Security Policy Anna Nash MBA 737. Agenda Overview Goals Components Success Factors Common Barriers Importance Questions.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
Know the Difference™ ITIL Solution Martin Perlin Marketing Director, Evolven BOOST YOUR ITIL ® INITIATIVES Evolven Comparison assists in many ITIL v3 areas.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
Why build a strategy? 7/15/2015 University of Wisconsin–Madison2 Options: Detection or Prevention Last strategic plan was five years old and never formally.
How to Gain Comfort in Losing Control to the Cloud Randolph Barr CSO - Qualys, Inc SourceBoston, 23. April 2010.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Class 8 The State of Cybercrime Today- Threads & Solutions.
Digital Economy New Challenges and Opportunities from the point of Information Security Ing. Petra Hochmannová – csirt.sk.
Cyber Security Nevada Businesses Overview June, 2014.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
The Changing World of Endpoint Protection
Ali Alhamdan, PhD National Information Center Ministry of Interior
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Marin Frankovic Datacenter TSP
Copyright © 2014 BAE Systems. All Rights Reserved. BAE Systems is a trade mark of BAE Systems plc 1 Commercial in Confidence Intelligence-led security.
Empowering Organisations to Thrive in the Face of Cyber Attacks An introduction to Resilient Systems Paul Ayers – General Manager, EMEA Chris Neely - Director.
UNCLASSIFIED Homeland Security Introduction to the National Cybersecurity & Communications Integration Center (NCCIC) “A Partnership for Strength” 1.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
1 CREATING AND MANAGING CERT. 2 Internet Wonderful and Terrible “The wonderful thing about the Internet is that you’re connected to everyone else. The.
1 1 Syniverse Proprietary Fraud Management in the Cloud.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
IS3220 Information Technology Infrastructure Security
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
How to Make Cyber Threat Intelligence Actionable
© Copyright 2015 EMC Corporation. All rights reserved. 1 RSA FRAUDACTION DANIEL COHEN * FRAUDACTION ANTI-FRAUD SERVICES.
Why SIEM – Why Security Intelligence??
Program Overview and 2015 Outlook Finance & Administration Committee Meeting February 10, 2015 Sheri Le, Manager of Cybersecurity RTD.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Cyber Security for the real world Tim Brown Dell Fellow and CTO Dell Security Solutions.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Proactive Incident Response
Hurricanes, Earthquakes, and Threat Intelligence
Cloud University Live: 8 Steps to Build Your Cloud Go to Market Plan
Introduction to a Security Intelligence Maturity Model
Teri Takai EXECUTIVE DIRECTOR, CENTER FOR DIGITAL GOVERNMENT.
Dissecting the Cyber Security Threat Landscape
Information Security: Risk Management or Business Enablement?
بهترین راهکار را انتخاب کنید...
Cyber Security in Ports Business as Usual?
THE NEXT GENERATION MSSP
How to Operationalize Big Data Security Analytics
cyberopsalliance.com |
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Strategic threat assessment
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

The Cyber Threat Intelligence Experts iSIGHT Partners The Cyber Threat Intelligence Experts

iSIGHT Partners 200+ experts, 16 Countries, 24 Languages, 1 Mission Global Reach Be the world’s leading global cyber threat intelligence provider, connecting security technology and operations to the business. iSIGHT is the leading Cyber Threat Intelligence company in the world. We have been in business for more than seven years and manage a worldwide operation with threat researchers situated around the globe to collect the latest threat information close to the source. Our researchers are native-language speakers that can decode and understand threat context first hand. Our threat fusion center in Chantilly Virginia is where our expert team of cyber threat analysts produce and disseminate forward looking, adversary focused and actionable intelligence to our customers. Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com

Understand Your Threat Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 3

Today’s Cyber Security Challenges CISOs finding it difficult to define security ROI to executives Short shelf life for CISOs Vastly expanding attack surface area Mobile, cloud, virtualization, global business operations Large protection investments and no good prioritization filter Who, why, when, how Operational chaos Too many alarms, not enough people, poor prioritization “Brain dead” security tools that rely on past events/signatures Verses extremely agile adversaries Severe breaches continue… There are a number of factors that are driving a sea change in how security is resourced and operated. Advanced organizations are well on their way through this transition… many others are following suit. Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 4

Global Cyber Threat Landscape Active & Global Transcends Geographies and Sectors Multiple Motivations Cyber Crime, Espionage, Hacktivism, Destruction, etc. Low Entry Barriers Actors use what works; not necessarily sophisticated methods Open marketplace providing capabilities Structured & Vibrant Ecosystem providing better tools, infrastructure, sharing ideas and methods, pooling resources The Global Threat Landscape is vibrant and rapidly maturing. The bad guys don’t pay attention to boarders. These bad guys, or “Threat Actors” have multiple different reasons for attacking you ranging from cyber criminals interested in money to Espionage Actors that want your intellectual property or mission secrets One of the major changes in the threat landscape is that it is very easy to get into the business. Many lower level bad guys often use unsophisticated methods because they still work. But there is also a very vibrant marketplace where bad guys can buy the latest tools, rent infrastructure and share ideas and best practices. In a nutshell this marketplace for capability is rapidly raising the sophistication of hackers globally. Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com

Threat Intelligence VS Threat Data ThreatScape® Cyber Threat Intelligence WHO/WHAT? - Actors - Groups - Government Sponsors HOW? - TTPs - Methods - Play Books WHY/WHEN? - Motivation - Intent - Capabilities Based On Multiple Collection Methods “Actionable Intelligence” Multi-faceted, forward looking, validated, highly contextual analysis Threat Data Feeds One dimensional data Narrow collection focus Increased alerts = wasted effort Little/no prioritization context No or limited validation and analysis High noise-to-signal = many false positives There is a very clear distinction between Threat Data and Threat Intelligence. There are multiple vendors that provide threat “data feeds” with very limited context and often no actual analysis. These “feeds” can sometimes be helpful but they can also have multiple issues (name a few from the bullets on the slide) Threat Intelligence by contrast is very rich information as represented by the multi-faceted balls. With the rich contextual information that we provide with ThreatScape subscriptions provides “ACTIONABLE INTELLIGENCE” ThreatScape intelligence provides provides many data points including WHO the “Actors” (a.k.a bad guys) that are targeting you are, WHAT their motivation is, HOW they are or plan to come after you. This starts with data collected through multiples sources but ends with a comprehensive “high-fidelity” intelligence report. Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com

How Can Cyber Threat Intelligence Help? CISO Recommendation: “Use a commercial threat intelligence service to develop informed tactics for current threats, and plan for threats that may exist in the midterm future.” Rob McMillan & Kelly Kavanagh Technology Overview for Security Threat Intelligence Service Providers Published: 16 October 2013 Be Proactive Shrink the Problem Improve Prioritization Enhance Executive Communications Connect Security With Business So how can Cyber Threat Intelligence Help? Let’s explore some of the key things cyber threat intelligence can help you do: With cyber threat intelligence, you can ACTUALLY become proactive. For years “proactive” as used by the marketing teams from security vendors really meant “quickly reactive”. With cyber threat intelligence you can understand the adversaries you are facing, the methods and tactics they will likely use against you. With this knowledge you can proactively tune your defensive strategies. Cyber threat intelligence you can This enables organizations to improve prioritization at the business, operational and tactical level. Many of our customers get thousands or even tens of thousands of alarms each day. But they only have the capacity to investigate a small fraction of them. So which ones do you choose? Cyber threat intelligence can have a major impact on security operations by enabling organizations focus on the alerts and alarms that are most important based on the nature and severity of the threat. Lastly, it is has been very difficult for many security teams to communicate with business leaders about the security program. With robust cyber threat intelligence you can say communicate, for example, that you blocked an attack by a major cyber espionage group that was targeting your intellectual property, or that you were able to thwart an attack by a hactivist group bent on damaging the corporate brand. This is a much different conversation than “we blocked 200 pieces of malware last week or responded to 1000 alarms.” Cyber threat intelligence provides the context that enables security professionals to connect with the business to better articulate return on investment from the security program or make a sound business case for additional funding. Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com

All Cyber Threat Intelligence is Not Created Equal “Many vendors can provide raw information, but there are only a comparative few that provide true intelligence capabilities.” Rob McMillan & Kelly Kavanagh Technology Overview for Security Threat Intelligence Service Providers Published: 16 October 2013 Actionable Intelligence is: Accurate Aligned with your intelligence requirements Integrated Predictive Relevant Tailored Timely Rick Holland Blog: Actionable Intelligence, Meet Terry Tate, Office Linebacker Published: 11 February 2014 Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 8

VERIFIED THREAT INDICATORS PRE-PROCESSED ANALYSIS Shrink the problem Attack Surface INCIDENT INDICATORS CORRELATED EVENTS ATTACK ALERTS Customer Side People, process, and technology helps them determine possible risks. Noise to Signal Intelligence from iSIGHT iSIGHT Intelligence helps them determine which events pose the greatest risk to their unique organization. VERIFIED THREAT INDICATORS PRE-PROCESSED ANALYSIS RAW OBSERVATIONS Threat Sources Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 9

Geek Speak Business Impact Changing the Cyber Security Discussion Putting “Threat” Back Into the Risk Equation Geek Speak Business Impact Analyzed 1,452,134 logs Detected 423,132 viruses Blocked 2,028,438 connections Closed 3,095 Incident Tickets Patched 30,000 Systems Prevented 2 Cyber-Crime Attacks Linked to ABC Criminal Organization Targeting POS Systems Prevented theft of 10M Customer Credit Cards Avoided $78M Loss: Cleanup, Notification, Brand Reputation & Revenue Shareholder Lawsuit & Stock Drop VS Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 10

How Is Intelligence Led Security Defined? Intelligence-led security isn’t: Just big-data technology integration Just “dedicated” intelligence teams Faster response times to security intelligence feeds Our theory: A paradigm shift from technology-based decisions to threat-based decisions Adding context and prioritization to technical environments and observations Workflow changes from reactive to proactive Connecting to the business Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com

How Is Intelligence Led Security Defined? Intelligence-led security isn’t: Just big-data technology integration Just “dedicated” intelligence teams Faster response times to security intelligence feeds Our theory: A paradigm shift from technology-based decisions to threat-based decisions Adding context and prioritization to technical environments and observations Workflow changes from reactive to proactive Connecting to the business Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com

Threat Examples Confluence of Cyber Espionage and Cyber Crime TTPs Overview of Point of Sale (PoS) Malware Development Cyber Espionage: Use of Social Networking in Victimization Analysts of the Ukrainian Conflict from a Hactivism Viewpoint Critical Infrastructure Under Threat The Increasing Confluence of Cyber Crime and Cyber Espionage https://portal.isightpartners.com/tfc/portal/reports/viewerfull/trpt112022 Operational Net Assessment of Hacktivist Threats - January to March 2014 https://portal.isightpartners.com/tfc/portal/reports/viewer/trpt112643 Are Cyber Weapons a Good Military Option Against Critical Infrastructures? https://portal.isightpartners.com/tfc/portal/reports/viewer/trpt110315 Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com

Lessons Learned - Consortiums Establish strong information sharing protocols Drive Public/Private Partnership Enable a culture of (Information) Security Change the conversation to include business context Employ basic information security hygiene Continuously seek to understand the evolving threat Recognize that you are not unique Understand third party connections Agree on standards and support them as a community Security as a business driver Proprietary and Confidential Information. © Copyright 2014, iSIGHT Partners, Inc. All Rights Reserved www.isightpartners.com 14