©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Mary Ann Fitzsimmons Regional.
Security Life Cycle for Advanced Threats
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
An Analysis of Recent Cyber Attacks WADE WILLIAMSON.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
David Flournoy Bit9 Mid-Atlantic Regional Manager
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Network security Product Group 2 McAfee Network Security Platform.
Sky Advanced Threat Prevention
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
Boris Ulík Technology Solutions Professional Microsoft Slovakia Microsoft ® System Center 2012: System Center Endpoint Protection 2012.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
1 Current Trends in Enterprise IT Network Security Key Takeaways Based on 100 Survey Responses © 2016 Lumeta Corporation.
Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
Why SIEM – Why Security Intelligence??
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Title Line Subtitle Line Top of Content Box Line Top of Footer Line Left Margin LineRight Margin Line Top of Footer Line Top of Content Box Line Subtitle.
An Anatomy of a Targeted Cyberattack
Proactive Incident Response
Protect your Digital Enterprise
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Sophos Intercept X Matt Cooke – Senior Product Marketing Manager.
Today’s cyber security landscape
Juniper Software-Defined Secure Network
Now, let’s implement/trial Windows Defender Advanced Threat Protection
The next frontier in Endpoint security
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Vikas Uberoy -Channel Director ANZ
Hybrid Management and Security
Microsoft Operations Management Suite Insight and Analytics
Real-time protection for web sites and web apps against ATTACKS
6/10/2018 5:07 PM THR2218 Deploying Windows Defender AV and more with Intune and Configuration Manager Amitai Senior Program Manager,
Introduction to a Security Intelligence Maturity Model
Active Cyber Security, OnDemand
Automate, or Die Building a Continuous Response Architecture
Automated Response with Windows Defender ATP
Virtualization & Security real solutions
Cyber Threat Intelligence Sharing Standards-based Repository
Closing the Breach Detection Gap
How to Operationalize Big Data Security Analytics
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Brandon Traffanstedt Systems Engineer - Southeast
Panda Adaptive Defense Platform and Services
Secure once, run anywhere Simplify your security with Sophos
What’s new in the Fall Creators Update for Windows Defender ATP
BACHELOR’S THESIS DEFENSE
BACHELOR’S THESIS DEFENSE
The MobileIron® Threat Detection difference:
STEALTHbits Technologies, Inc.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture

CONTINUOUS endpoint recorder INSTANT, aggregated threat intel. COMPLETE kill chain analysis CUSTOMIZED detection CONTINUOUS RECORDING IMMEDIATE endpoint threat isolation LIVE endpoint investigation REAL-TIME attack termination COMPREHENSIVE threat remediation LIVE RESPONSE First & only solution with continuous endpoint recording and live response Carbon Black: Industry’s Best ETDR Solution

“There are two kinds of companies: those that have been breached and those that don’t know it yet.” *Sources: Mandiant, Verizon CIO Fortune 100 company Days to discover* 243 Discovered externally* 69 % Average cost* $ 5.4 MILLION “In 2020, enterprises will be in a state of continuous compromise.” The Problem: Advanced Threats = $$$

July 2014 The Network is Not the Target “Organizations continue to spend a lot of money on network security solutions, but it’s the endpoint that is the ultimate target of advanced threats and attacks.” “Firewalls [are] becoming less and less effective in a perimeter-less world ” Dec “When the perimeter disappears, we certainly would argue that the endpoint is the perimeter.” Dec. 2014

Traditional Defenses Were Designed for Opp. Attacks OPPORTUNISTIC ADVANCED Goal for attacker is to compromise as few endpoints as possible Goal for attacker is to compromise as many endpoints as possible Hosts Compromised Time DETECTION THRESHOLD Signature available Hosts Compromised Time Signature available (if ever) ?

DETECTION RESPONSE RECOVERY Reduce Dwell Time By Prioritizing Data Collection Compromised (attacker present) Recovered (attacker expelled) Breach Discovered (attacker identified) DWELL TIME Proactively collecting data here is automated, efficient & conclusive Reactively collecting data here is time consuming, expensive & incomplete DETECTION RESPONSE RECOVERY Compromised (attacker present) Recovered (attacker expelled) Breach Discovered (attacker identified) DWELL TIME Eliminate expensive data collection process Optimize security team Instant answers to complex IR questions Avoid blind reimaging Zero end-user/endpoint impact Reduce dwell time

Expand Detection Beyond the Moment of Compromise Abnormal Behavior Lateral Movement & User Accounts Exfiltration & Data Gathering Weeks to Months (Years) Traditional Focus Missed without continuous data collection Only See Individual Detection Event You can’t know what’s bad ahead of time

Java exploitation User visits website Is sent malicious Java applet Spawns first stage payload Spawns second stage payload Injects code into Windows Explorer Takes malicious actions DETECTED Goal: Understand root cause Detection probability increases over time Investigations seek root cause Traditional detection filters out endpoint visibility missing the full context of the attack Highlight detected activity within continuous recording to understand root cause and scope faster DETECTED Proactive data collection also enables ability to detect entire attack processes Highlight As Opposed to Filter Endpoint Visibility

IT and Company Culture: Is Your Environment Like This?

Or This?

Prioritize Alerts with Data Collection & Threat Intelligence !!! ! !!!!!!!!!!! ALERT FATIGUE Too many alerts to manage & prioritize ACTIONABLE ALERTS Accelerate threat discovery Customize detection for organization Detect every threat vector Narrow focus by understanding data Detection Discovery Threat Intelligence

Respond at the Moment of Discovery Spawns second stage payload Injects code into Windows Explorer Takes malicious actions Instantly “Roll back the tape” with a recorded history to understand scope DISCOVERED Prioritize investigations with applied threat intelligence User visits website Is sent malicious Java applet Spawns first stage payload Spawns second stage payload Injects code into Windows Explorer Takes malicious actions Lateral Movement User visits website Downloads PDF Deleted Payload Spawns second stage payload Injects code into Windows Explorer Takes malicious actions User visits website Is sent malicious Java applet Spawns first stage payload Spawns second stage payload Injects code into Windows Explorer Takes malicious actions Deleted Payload Lateral Movement DISCOVERED Learn from investigation to build detection moving forward ! DISCOVERED

Drive Action on Endpoints with Live Response User visits website Is sent malicious Java applet Spawns first stage payload Spawns second stage payload Injects code into Windows Explorer Takes malicious actions Deleted payload BLOCK NETWORK COMMUNICATION KILL ATTACK PROCESS IDENTIFY ROOT CAUSE & REMEDIATE MACHINE ✓ Responders manage multiple tools for continuous recording & live response MODERN VIEW One comprehensive IR solution ISOLATED Use one IR solution without dropping admin. credentials Built by responders for responders Customize on-sensor actions by executing third-party tools Remove IT out of SecOps equation

Security as a process versus as a solution

CONTINUOUS endpoint recorder INSTANT, aggregated threat intel. COMPLETE kill chain analysis CUSTOMIZED detection CONTINUOUS RECORDING IMMEDIATE endpoint threat isolation LIVE endpoint investigation REAL-TIME attack termination COMPREHENSIVE threat remediation LIVE RESPONSE First & only solution with continuous endpoint recording and live response Carbon Black: Industry’s Best ETDR Solution

Bit9 + Carbon Black: Arm Your Endpoints For IT and Security Teams Managing Desktops, Servers, and Fixed-function Devices +World’s most widely deployed application control/whitelisting solution +Single agent for visibility, detection, response, prevention +Trust-based and policy-driven The Most Comprehensive Endpoint Threat Protection Solution For Security Operations Center and Incident Response Teams +Only solution with continuous recording; live response; threat isolation, termination and remediation +Real-time customizable detection +Complete kill chain analysis based on recorded history and attack visualization The Leading Endpoint Threat Detection and Response Solution Open API and Integrations Threat Intelligence Cloud ReputationThreat IndicatorsAttack Attribution Supported Operating Systems Network Security, Analytics and SIEM, In-House & Custom Tools

Questions?