ISSA QUARTER MEETING 2015 David Eilken Co-Chair FS-ISAC Security Automation Working Group Intelligence Driven Community Defense.

Slides:



Advertisements
Similar presentations
Company Name Sample Template Presenter Name
Advertisements

Chapter 3 E-Strategy.
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Mike Goffin and Wesley Shields Approved for Public Release; Distribution Unlimited. Case Number
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
© 2013 The MITRE Corporation. All rights reserved. Sean Barnum Nov Sponsored by the US Department of Homeland Security PRACTICAL.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Microsoft Ignite /16/2017 4:54 PM
Unified Logs and Reporting for Hybrid Centralized Management
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Mike Goffin Who am I? Mike Goffin Lead DeveloperProject Manager Senior Cyber Security Research Engineer The MITRE Corporation.
Preparedness for cybersecurity threats domestic aspects of cyber security Jaan Priisalu.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Dell Connected Security Solutions Simplify & unify.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Akamai Technologies - Overview RSA ® Conference 2013.
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
© 2010 Cisco and/or its affiliates. All rights reserved. 1 Managing Microsoft Applications with Cisco UCS Manager & PowerTool.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
Ali Alhamdan, PhD National Information Center Ministry of Interior
Threat context TLP WHITE Cyber security panel
Network security Product Group 2 McAfee Network Security Platform.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Virtual Classes Provides an Innovative App for Education that Stimulates Engagement and Sharing Content and Experiences in Office 365 MICROSOFT OFFICE.
Marin Frankovic Datacenter TSP
Chapter 4 Intranets and Extranets. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Robert Mahowald August 26, 2015 VP, Cloud Software, IDC
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
The VERSO Product Returns Portal Incorporates Office 365 Outlook and Excel Add-Ins to Create Seamless Workflow for All Participating Users OFFICE 365 APP.
ECAT 4.1 – Rule Your Endpoints What’s New Customer Overview.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
How to Make Cyber Threat Intelligence Actionable
Why SIEM – Why Security Intelligence??
Cyber Security Foundations Part 1. Cyber Security defined:  Protects computer base information and equipment  Deals with confidentiality of data  Protects.
Nuts and Bolts of ATA Chris Lloyd 2016 Redmond Summit | Identity Without Boundaries May 24, 2016 Senior Architect
Proactive Incident Response
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
The Impact of Digital Labour on Outsourcing
Juniper Software-Defined Secure Network
Hybrid Management and Security
DISA Global Operations
Introduction to a Security Intelligence Maturity Model
Security Automation Standards Landscape
Cyber Threat Intelligence Sharing Standards-based Repository
بهترین راهکار را انتخاب کنید...
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Shifting from “Incident” to “Continuous” Response
Skybox Cyber Security Best Practices
Coordinated Security Response
Strategic threat assessment
Presentation transcript:

ISSA QUARTER MEETING 2015 David Eilken Co-Chair FS-ISAC Security Automation Working Group Intelligence Driven Community Defense

OVERVIEW  Cyber Intelligence – What, Why, Where  A Vision for Community Defense  Cyber Threat Intelligence Standards  Maturing the Ecosystem  How do We Get There

EXTERNAL THREATS GROWING 117,339 incoming attacks every day The total number of security incidents detected by respondents climbed to 42.8 million this year, an increase of 48% over Findings from The Global State of Information Security Survey 2015 Graphic Source: PwC

Fun Technically curious individuals Fame Technically adept groups leaving their mark on public websites Fortune Cyber criminals and organized gangs stealing money, data ransom schemes and competitive information Force Nation states and non- nation state groups launching targeted attacks for strategic purposes EVOLUTION OF CYBER ATTACKS Cyber Threats on the Private Sector Academic “Script Kiddies” Commodity Threats Advanced Persistent Threats (APT) – Targeting government entities APT– Targeting private sector Nature of Threat

WHO ARE THE ADVERSARIES? Attacker Motivation, Capability & Intent Criminals Money And more money Large number of groups Skills from basic to advanced Present in virtually every country Up to $$$ Hacktivists Protest Revenge Large number of groups Groups tend to have basic skills with a few 'standout' individuals with advanced technical and motivational skills" Up to $ -$$ Espionage Acquiring Secrets for national security or economic benefit Small but growing number of countries with capability Larger array of ‘supported’ or ‘tolerated’ groups Up to $$$$+ War Motivation is to destroy, degrade, or deny capabilities of an adversary Politics by other means Small but growing number of countries with capability Non-state actors may utilize ‘war’ like approaches Up to $$$$$ ? …but, a lot less expensive than a nuclear weapon $ - Under thousands $$ - Tens to hundreds of thousands $$$ - Millions $$$$ - Tens to hundreds of millions $$$$$ - Billions August 2014

THE NEED FOR SPEED Attackers Act 150x Faster Than Victims Respond  Minutes vs. Weeks/ Months Initial Attack to Initial Compromise (Shorter Time Worse) Initial Compromise to Discovery (Longer Time Worse) SecondsMinutesHoursDaysWeeksMonths 12%2%0%1% 14%25%8% 0% 2% Response is SLOW Attackers are FAST 13%29%54% Initial Compromise to Data Exfiltration (Shorter Time Worse) 10%75% 8%38%

EVOLUTION OF CYBER SECURITY DEFENSE Increasing Cyber Risks Malicious actors have become much more sophisticated & money driven. Losses to US companies now in the tens of millions; WW hundreds of millions. Cyber Risks are now ranked #3 overall corporate risk on Lloyd’s 2013 Risk Index. We are Solving the Problem Security standards are maturing FS-ISAC has become the trusted model for sharing industry threat intelligence. Soltra Edge Cyber Intelligence Sharing Platform revolutionizing sharing and utilization of threat intelligence. Manually Sharing Ineffective Time consuming and ineffective in raising the costs to the attackers. Not all cyber intelligence is processed; probably less than 2% overall = high risk. No way to enforce cyber intelligence sharing policy = non-compliance. Yesterday’s Security Intelligence Sharing Identify and track threats, incorporate knowledge and share what you know manually to trusted others. Network Awareness Protect the perimeter and patch the holes to keep out threats share knowledge internally. Situational Awareness Automate sharing – develop clearer picture from all observers’ input and pro- actively mitigate. Present Day ProblemFuture Solution ? ? ? ? ? ?

WHAT IS CYBER INTELLIGENCE Information about cyber threats Bad people, things, or events Plans to attack victims Tactics used by bad people Actions to deal with bad events Weaknesses targeted by bad people

WHY CYBER INTELLIGENCE IS IMPORTANT Tactical Uses  Proactively detect or defend against attacks before they happen  Diagnose infected corporate systems Strategic Uses  Compile and track bad people or things that don’t like you, your industry, or your company – report out and potentially sent to authorities  Improve your security posture - The more you understand the things, people, and organizations that are attacking you, the have the better you can defend yourself Intelligence Can Help Protect You!

WHERE DOES CYBER INTELLIGENCE COME FROM? Buy It  Purchase from professional intelligence providers Collect for Free  From inside your organizational environment  The Internet has many Open Source Intelligence (OSINT) feeds available From Friends  Information Sharing Communities or ISACs  Business partners, associates, peers, etc. Get from Authorities  Government – DHS, FBI, etc.

INTELLIGENCE LIFE-CYCLE Graphic Source: FBI #1 Collect #2 Process #3 Analyze #4 Disseminate Security Operations Intelligence Starts Here What Do We Do With It? (What are we supposed to do with it?)

STEP #1 – IN THE REAL-LIFE CYCLE Firm X SOC Analysts Firm X SOC Analysts Company Y CIRC Analyst Company Y CIRC Analyst Time Waning Cyber Analysts Eyes of Distrust “My Wheel Better”

…Machines Need a Language to Talk about Threats STIX – Structured Threat Intelligence eXpression  Structured language used by machines to describe cyber threats TAXII – Trusted Automated eXchange of Indicator Information  Transport mechanism for cyber threat information represented in STIX MACHINES CAN HELP, BUT FIRST… Like HTML Like TCP/ IP Like HTML stix.mitre.orgtaxii.mitre.org

INTELLIGENCE DRIVEN COMMUNITY DEFENSE ISAC Organization Attacked Trusted Organizations Protected Automated Defense FS-ISAC Extended Trusted Organizations Protected Machines

An open standard to categorize cyber threat intelligence information STIX CONSTRUCTS Strategic Atomic Tactical Operational What threat activity are we seeing? What can I do about it? What threats should I look for on my networks and systems and why? Where has this threat been seen? Who is responsible for this threat? Why do they do this?What do they do? What weaknesses does this threat exploit?

STIX ARCHITECTURE The Power of Structured Intelligence  Key to effective strategic cyber intelligence analysis and threat tracking  Ability to pivot, view, analyze, and enrich complex relationships

STIX SAMPLE Message Object Fw:Draft US-China Joint Statement T12:48:50+08:00 multipart/mixed; boundary=90e6ba10b0e7fbf25104cdd9ad Microsoft CDO for Windows 2000

HOW HUMANS VIEW INTELLIGENCE Pamina Republic Army Unit Associated Actor Leet Electronic Address Initial Compromise Indicator Observable Spear Phishing Establish Foothold Observed TTP WEBC2 Malware Behavior Escalate Privilege Observed TTP Uses Tool cachedump lslsass MD5: d8bb32a7465f55c368230bb52d52d885 Indicator Observed TTP Internal Reconnaissance Attack Pattern ipconfig net view net group “domain admins” Observed TTP Exfiltration Uses Tool GETMAIL Targets Khaffeine Bronxistan Perturbia Blahniks... Leverages Infrastructure IP Range: C2 Servers Observable Sender: John Smith Subject: Press Release Hey Mom! Watch Me Pivot!

LET’S NOT FORGET THE TRANSPORT STANDARD STIX with STIX without …Like a wheel without an axle

STIX & TAXII… JUST THE BEGINNING Cyber Security Measurement and Management Architecture Source: MITRE Standards across the Security Lifecycle

YOU ARE HERE Awareness STIX & TAXII Adoption Curve Maturity % Time Excel Notepad Trial Adoption Ubiquity Intelligence Server Intelligence Network

MATURING AN ECOSYSTEM Sharing Communities  ISACs  Government  Individuals Security Vendors  Service Providers  Vendor Products Consumers of Security Products and Intelligence  Large  Medium  Small

CHANGING THE ECONOMICS Cyber Warfare Symmetry Cost to Defend Cost to Attack Policy Effectiveness Advantage: DefendersAdvantage: Attackers Cost Min Max Future State of Cyber-Symmetry (Only Most Advanced Can Play) Current State of Cyber-Symmetry (Unsophisticated Adversaries Can Play) Cost to Firms  The current cost to process a single piece of intelligence is 7 hours. Equal to 2014 =$100m; 2015 = $1b; 2016 = $4b Cost to Adversaries  Adversaries must “re-tool” much more often and their exploits cause less damage Risks from Cyber Threats  Frequency and impact of threats decrease while higher adoption leads to exponential benefits

CYBER INTELLIGENCE MATURITY Accessible Far beyond just a select few that have access to organized data; an entire community can now be empowered. D ATA Discrete Elements Linked Elements I NFORMATION K NOWLEDGE Organized Information Actionable Intelligence P ROCESSING A NALYSIS J UDGMENT S ITUATIONAL A WARENESS W ISDOM Aggregation and Normalization Localized Data Correlation Pattern Recognition Some Contextual Knowledge Deductive Reasoning Pro-Active Auto-Response Increasing Situational Awareness => Increasing Cost to Adversaries Levels of Cyber Intelligence Enriched Communities of industry verticals fight the same threats, and have the most to share about their adversaries. Actionable Structured data can be understood by machines. Machines can detect, share, and make defensive adjustments at wire-speed.

COMMUNITY – IT TAKES A VILLAGE… Operational Intelligence Strategic Intelligence

CONSUMER FREEDOM

HISTORY OF AVALANCHE Security Automation Working Group  Started in early 2012 prior to STIX 1.0  Small group of security professionals  Steadily grew STIX & TAXII awareness and involvement Started with an idea to automate sharing of intelligence Listened to security analysts – Broke down the problem Prioritized and built in chunks – Didn’t boil the ocean  Relied on open standards as the base and became STIX & TAXII experts  Built an initial Central Intelligence Repository for the SAWG members  Utilized scripts to pull data, then push data (the SAWG community helped a lot)  Realized we needed not just a server and some client side scripts…

WHAT IS SOLTRA A Company for the Community  Increasing adoption of STIX & TAXII to reduce friction in security operations  Formed with the support of the FS-ISAC community & backing of DTCC scalability  Market Changing - created for the good of the information security consumer  At-Cost Business Model – generates revenue just to keep the lights on Continue Driving the Technology  Innovate on open standards to automate the sharing of cyber threat intelligence  A Platform for Everyone – can be extended to all sizes of financial services firms, other sharing communities and industry verticals  Enabling seamless integration across security lifecycle solutions (threat intelligence, firewalls, intrusion detection, anti-virus, etc.)  10x reduction to collect/ process intelligence & cost to respond SOLTRA | AN FS-ISAC DTCC COMPANY

SOLTRA EDGE OVERVIEW Basis for an Cyber Intelligence Sharing Network  Like an Intelligence Server and Router  Big Data STIX Store, Sends & Receives via TAXII w/ Access Control Key Features  Instant Aggregation of Intelligence from Sources You Choose  On-Premise – you own and control your data and sharing  Collect, Process, and Disseminate (Internal & External) to Standards Based Devices  De-Duplication and Automatic Sightings (+1)  Trust Groups and Traffic Light Protocol Control Data Access  Hides Complex STIX & TAXII with simple user interface SOLTRA | AN FS-ISAC DTCC COMPANY

THANK YOU FOR PARTICIPATING David Eilken VP Product Strategy Soltra

SOLTRA EDGE The Center of an Open Framework  Primary Data Store for Structured Intelligence  Connects your STIX and TAXII enabled tools

SOLTRA EDGE Foundation of a Security Network  Structured Intelligence Server and Router  Can act as a TAXII Gateway to other STIX sources

SOLTRA EDGE Hides Complexity of STIX & TAXII  Simple and Intuitive Interface  Visualize, Create, and Move Intelligence