“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14.

Slides:



Advertisements
Similar presentations
Intrusion Prevention anno 2012: Widening the IPS concept.
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
Breaking the Lifecycle of the Modern Threat Santiago Polo Sr. Systems Engineer Palo Alto Networks, Inc.
New Solutions to New Threats. The Threats, They Are A Changing Page 2 | © 2008 Palo Alto Networks. Proprietary and Confidential.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
An Analysis of Recent Cyber Attacks WADE WILLIAMSON.
Cyber Threats: Industry Trends and Actionable Advice Presented by: Elton Fontaine.
Current Security Threats WMO CBS ET-CTS Toulouse, France May 2008 Allan Darling, NOAA’s National Weather Service WMO CBS ET-CTS Toulouse, France.
Palo Alto Networks Threat Prevention. Palo Alto Networks at a Glance Corporate Highlights Founded in 2005; First Customer Shipment in 2007 Safely Enabling.
11 Zero Trust Networking PALO ALTO NETWORKS Zero Trust Networking April 2015 | ©2014, Palo Alto Networks. Confidential and Proprietary.1 Greg Kreiling.
Zombie or not to be: Trough the meshes of Botnets - Guillaume Lovet AVAR 2005 Tianjin, China.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Blue Coat Systems Securing and accelerating the Remote office Matt Bennett.
Expose The Underground Advanced Persistent Threats
About Palo Alto Networks
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
What Are We Missing? Practical Use of the Next-Generation Firewall: Controlling Modern Malware and Threats Jason Wessel – Solutions Architect.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
CS426Fall 2010/Lecture 361 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls.
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
NW Security and Firewalls Network Security
Palo Alto Networks Modern Malware Cory Grant Regional Sales Manager Palo Alto Networks.
What Did You Do At School Today Junior?
Dell Connected Security Solutions Simplify & unify.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CIO Perspectives on Security Marcos Alves Regional Sales Manager Protegendo seu Ambiente em tempo de Ameaças modernas.
© 2014 VMware Inc. All rights reserved. Palo Alto Networks VM-Series for VMware vCloud ® Air TM Next-Generation Security for Hybrid Clouds Palo Alto Networks.
1 مديريت فناوري اطلاعات و ارتباطات نشست تخصصي كاربرد ارتباطات ماهواره اي در مديريت بحران و راهكارهاي نوين محافظت اطلاعات سازمان ها 27 مهرماه 1390 مديريت.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
The Changing World of Endpoint Protection
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
Managed Security Vikas Khanduri CCIE#13516,CCSP,CCDP,CCNP,MCSE.
Security fundamentals Topic 10 Securing the network perimeter.
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
Sky Advanced Threat Prevention
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Ton den Braber Channel Manager Benelux Dell SonicWALL The Promises and Pitfalls of BYOD.
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Security Log Visualization with a Correlation Engine: Chris Kubecka Security-evangelist.eu All are welcome in the House of Bytes English Language Presentation.
An Introduction to Deception Based Technology Asif Yaqub Nick Palmer February 5, 2016.
Palo Alto Networks - Next Generation Security Platform
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
Understanding and breaking the cyber kill chain
Protect your Digital Enterprise
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Barracuda Firewall The Next-Generation Firewall for Everyone
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Real-time protection for web sites and web apps against ATTACKS
Securing the Network Perimeter with ISA 2004
Prevent Costly Data Leaks from Microsoft Office 365
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
The Next Generation Cyber Security in the 4th Industrial Revolution
Secure once, run anywhere Simplify your security with Sophos
Information Protection
Information Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Cybriant Partner Partner Program White Label Materials
Presentation transcript:

“Next Generation Security” ISACA June Training Seminar Philip Hurlston 6/20/14

ISACA June Training Seminar Agenda Today’s threat landscape is next generation Definition of Next Generation Security What really makes it different 20 things your next generation security must do Closing & Questions

ISACA June Training Seminar Today’s Threat Landscape Organized Attackers Increasing Volume Sophisticated Remediation is broken Must prevent attacks across perimeter, cloud and mobile Limited correlation across disjointed security technologies. Limited security expertise CSO challenges

ISACA June Training Seminar SaaS - Apps are moving off the network

ISACA June Training Seminar CLOUD + VIRTUALIZATION Servers are moving to private and public clouds BETA Verizon Cloud

ISACA June Training Seminar Over 27% of applications can use SSL encryption Which represents nearly 25% of enterprise bandwidth ENCRYPTION Traffic is increasingly being encrypted

ISACA June Training Seminar MOBILITY Users are moving off the network Over 300 new malicious Android APKs discovered per week by our Threat Research Team

ISACA June Training Seminar Known threats Enterprise risk Zero-day exploits/Vulnerabilities Unknown & polymorphic malware Evasive command-and-control Lateral movement TODAY’S APTBEFORE Sophisticated & multi-threaded SSL encryption Changing application environment Clear-text Limited or known protocols Known malware & exploits Known vulnerabilities Known command-and-control COMMODIZATION OF THREATS Advanced tools available to all

ISACA June Training Seminar Tectonic Shifts Create the Perfect Storm SOCIAL + CONSUMERIZATION SaaS CLOUD + VIRTUALIZATION MOBILITY + BYOD ENCRYPTION Massive opportunity for cyber attackers COMMODIZATION OF THREATS

ISACA June Training Seminar Target data breach – APTs in action Maintain access Spear phishing third-party HVAC contractor Moved laterally & installed POS Malware Exfiltrated data C&C servers over FTP Recon on companies Target works with Breached Target with stolen payment credentials

ISACA June Training Seminar Agenda Today’s threat landscape is next generation Definition of Next Generation Security What really makes it different 20 things your next generation security must do Closing & Questions

ISACA June Training Seminar Definition of a Next Generation Firewall (NGFW) From the Gartner IT Glossary, a NGFW is a: Deep-packet inspection firewall, Moves beyond port/protocol inspection and blocking, Adds application-level inspection, Adds intrusion prevention, and Brings intelligence from outside the firewall.

ISACA June Training Seminar Definition of a Next Generation Firewall (NGFW) Should not be confused with: A stand-alone network intrusion prevention system (IPS), which includes a commodity or non- enterprise firewall, or A firewall and IPS in the same appliance that are not closely integrated.

ISACA June Training Seminar Agenda Today’s threat landscape is next generation Definition of Next Generation Security What really makes it different 20 things your next generation security must do Closing & Questions

ISACA June Training Seminar 20 Years of Security Technology Sprawl Enterprise Network Ports and IP addresses aren’t reliable anymore More stuff has become the problem Too many policies, limited integration Lacks context across individual products URL AV IPS DLP Sandbox Proxy UTM Internet

ISACA June Training Seminar Sample of a True Next Generation Architecture Single Pass Identifies applications User/group mapping Threats, viruses, URLs, confidential data One policy to manage Correlates all security information to Apps and Users

ISACA June Training Seminar Firewall Next Generation vs. Legacy Firewalls App-IDLegacy Firewalls Firewall Rule: ALLOW SMTPFirewall Rule: ALLOW Port 25 SMTP=SMTP: Packet on Port 25: Allow ✔ ✔ SMTP Bittorrent ✗ Bittorrent≠SMTP: Visibility: Bittorrent detected and blocked Deny Bittorrent ✔ Packet on Port 25:Allow Visibility: Port 25 allowed Bittorrent

ISACA June Training Seminar App IPS Firewall Next Generation vs. Legacy Firewall + App IPS App-IDLegacy Firewalls Firewall Rule: ALLOW SMTPFirewall Rule: ALLOW Port 25 SMTP=SMTP: Packet on Port 25: Allow ✔ ✔ SMTP Bittorrent ✗ Bittorrent ≠ SMTP: Visibility: Bittorrent detected and blocked Deny Bittorrent ✔ Bittorrent: Deny Visibility: Bittorrent detected and blocked ✔ SMTP Bittorrent ✗ Application IPS Rule: Block Bittorrent

ISACA June Training Seminar App IPS Firewall App-IDLegacy Firewalls Firewall Rule: ALLOW SMTPFirewall Rule: ALLOW Port 25 SMTP=SMTP: Packet on Port 25: Allow ✔ ✔ SMTP ✗ Bittorrent ✔ Visibility: Packets on Port 25 allowed ✔ SMTP Bittorrent ✗ Application IPS Rule: Block Bittorrent Bittorrent ✗ ✔ ✔ Packet ≠ Bittorrent: Allow Visibility: each app detected and blocked DenySkype≠SMTP: SSH≠SMTP: Ultrasurf≠SMTP: Deny SSH, Skype, Ultrasurf Next Generation vs. Legacy Firewall + App IPS

ISACA June Training Seminar Firewall App-IDLegacy Firewalls Firewall Rule: ALLOW SMTPFirewall Rule: ALLOW Port 25 SMTP=SMTP: Packet on Port 25: Allow ✔ ✔ SMTP C & C ✗ Command & Control ≠ SMTP: Visibility: Unknown traffic detected and blocked Deny Bittorrent ✔ Visibility: Packet on Port 25 allowed ✔ SMTP Bittorrent ✗ Application IPS Rule: Block Bittorrent Bittorrent ✗ C & C ✔ ✔ C & C ≠ Bittorrent: Allow App IPS Next Generation vs. Legacy Firewall + App IPS

ISACA June Training Seminar Next Generation Closes the Loop for Threats Scan ALL applications, including SSL – Reduces attack surface, and Provides context for forensics Prevent attacks across ALL attack vectors – Exploits, Malwares, DNS, Command & Control, and URLs Detect zero day malware – Turn unknown into known, and update the firewall

ISACA June Training Seminar Sandboxing for Turning Unknown into Known

ISACA June Training Seminar Security Context from Next Generation Policies: Allowing to on port 80  does not provide context. Allowing Sales Users on Corporate LAN to access Salesforce.com but look for threats and malware inside the decrypted SSL tunnel, and easily seeing you have done so  is context. Threats: Seeing you had 10 tunneling apps, 15 IPS hits, and 4 visits to malware sites  no context. Seeing Dave Smith visited a malware site, downloaded 0-day Malware, and his device is visiting other known malware sites, and using tunneling apps  that is context.

ISACA June Training Seminar Next Generation and the Attack Kill-chain Attack kill-chain Initial compromise Deliver malware and communicate with attacker Move laterally and infect additional hosts Steal intellectual property Prevent attacks by stopping one step in the kill-chain EXFILTRATE DATA ENDPOINT OPERATIONS DELIVER MALWARE BREACH PERIMETER

ISACA June Training Seminar Security Use Cases for Next Generation Security Mobile/BYOD Devices Internet Offload Identify & Control Violators Zero Day Protection Securing Microsoft Apps Audit & Compliance Zero Trust Networks Flexible HR Policies Virtual Desktops & Apps Application Visibility DNS Sinkhole Data Center Virtualization Targeted Attacks Emergency Networks SCADA Networks Windows & Mac Laptops Contractors / Partners Denial of Service Attacks Network Segmentation Window XP Protection M&A / Divestitures / JV’s Traffic Control/QoS

ISACA June Training Seminar Agenda Today’s threat landscape is next generation Definition of Next Generation Security What really makes it different 20 things your next generation security must do Closing & Questions

ISACA June Training Seminar 20 Things Your Next Gen Security Must Do 1. Control applications and components regardless of Port or IP 2. Identify users regardless of IP address 3. Protect real-time against threats and exploits 4. Identify Circumventors (Tor, Ultrasurf, proxy, anonymizers) 5. Decrypt SSL Traffic 6. Packet shape traffic to Prioritize Critical Applications or De- Prioritize Unproductive applications 7. Visualize Application Traffic 8. Block Zero Day Malware, Botnets, C&C and APT’s 9. Block Peer-to-Peer 10. Manage Bandwidth for a group of Users

ISACA June Training Seminar 20 Things Your Next Gen Security Must Do 11. Prevent or Monitor Data Leakage 12. Single Pass Inspection 13. Same security at mobile end-point 14. Central management console with relay logs & events 15. Policy for unknown traffic 16. Be cost effective by combining multiple functionalities 17. Deliver protection today, tomorrow, and in the future by being firmware upgradeable 18. Interface with other end-point solutions to have a consistent protection 19. Sinkhole DNS capabilities 20. Block base on URL

ISACA June Training Seminar Agenda Today’s threat landscape is next generation Definition of Next Generation Security What really makes it different 20 things your next generation security must do Closing & Questions