SIEMs - Decoding The Mayhem Bill Dean Director of Computer Forensics Sword & Shield Enterprise Security Inc.

Slides:



Advertisements
Similar presentations
Innovation Change Transformation Enterprise Security Office Enterprise Security: Planning Today for Tomorrows Unknown Threats.
Advertisements

OneBridge Mobile Data Suite Product Positioning. Target Plays IT-driven enterprise mobility initiatives Extensive support for integration into existing.
BalaBit Shell Control Box
SIEM Based Intrusion Detection Jim Beechey May 2010 GSEC, GCIA, GCIH, GCFA, GCWN twitter: jim_beechey.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
The Most Analytical and Comprehensive Defense Network in a Box.
1 SANS Technology Institute - Candidate for Master of Science Degree 1 SIEM Based Intrusion Detection Jim Beechey March 2010 GSEC Gold, GCIA Gold, GCIH,
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Security Services Svetlana.
Managing A Secure Infrastructure – Tales From the Trenches November 6, 2003.
Cyber Security Discussion Craig D’Abreo – VP Security Operations.
Enterprise security How to bring security transparency into your organization ISSA EDUCATIONAL SESSION Nicklaus Schleicher, VP Support & Customer Service.
Security Track Day 1 Richard Stiennon Chief Research Analyst IT-Harvest Blog: ThreatChaos.com twitter.com/stiennon IT-Harvest Confidential.
12.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft® Windows® Server 2003 Active Directory Infrastructure.
Contact Center Security Strategies Grant Sainsbury Practice Director, Dimension Data.
Nate Olson-Daniel Director of Strategic Development & Principal Engineer The Inevitable Attack.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Account Reset Console Delegated and secure self password resets Joe Vachon Sales Engineer.
Enterprise Security. Mark Bruhn, Assoc. VP, Indiana University Jack Suess, VP of IT, UMBC.
Mastering Windows Network Forensics and Investigation Chapter 14: Other Audit Events.
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
Correlations, Alarms and Policies
Copyright 2009 Trend Micro Inc. Harish Agastya, Director Server Security Product Marketing Server Security Press Presentation.
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Auditing for Security Management By Cyril Onwubiko Network Security Analyst at COLT Telecom Invited Guest Lecture delivered at London Metropolitan University,
Module 9 Configuring Server Security Compliance. Module Overview Securing a Windows Infrastructure Overview of EFS Configuring an Audit Policy Overview.
Intrusion Detection Presentation : 1 OF n by Manish Mehta 01/24/03.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
The Most Analytical and Comprehensive Defense Network in a Box.
Information Security 2013 Roadshow. Roadshow Outline  Why We Care About Information Security  Safe Computing Recognize a Secure Web Site (HTTPS) How.
Event Management & ITIL V3
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Copyright © 2014 Rockwell Automation, Inc. All Rights Reserved. PUBLIC PUBLIC CO900G L03 - Design, Implement, and Manage FactoryTalk Security.
Ph No: Mob: , plot No-27, NGGO's Colony, Pattabhi reddy gardens, Visakhapatnam-07 Oracle.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Frontline Enterprise Security
Incident Response November 2015 Navigating a Cybersecurity Incident.
Cyber Security Management Lesson Introduction ●Understand organizational context for cyber security ●Understand the people, process and technology dimensions.
BUSINESS USER MONITORING OBSERVEIT 5.8. Firewall IDS IAM SIEM Business Users IT Users USERS ARE GATEWAYS OF RISK Contractors Systems AppsData.
Rob Davidson, Partner Technology Specialist Microsoft Management Servers: Using management to stay secure.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
1 © 2004, Cisco Systems, Inc. All rights reserved. Wireless LAN (network) security.
IS3220 Information Technology Infrastructure Security
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Dr. Hussein Al-Bahadili Faculty of Information Technology Petra University Week #5 1/10 Securing E-Transaction - SIEM.
2015 TCPA WASHINGTON SUMMIT | SEPT. 27TH-29TH | WASHINGTON DC The Anatomy of a Breach Phillip Naples, Pritchard & Jerden, Inc. Jeremy Henley, ID Experts.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Labs. Session 1 Lab: Installing and Configuring Windows 7 Exercise 1: Migrating Settings by Using Windows Easy Transfer Exercise 2: Configuring a Reference.
SIEM Rotem Mesika System security engineering
Major focus areas derived from NIST Guidelines
Configuring Windows Firewall with Advanced Security
Security Automation Standards Landscape
SECURITY INFORMATION AND EVENT MANAGEMENT
Healthcare Cloud Security Stack for Microsoft Azure
Shifting from “Incident” to “Continuous” Response
Healthcare Cloud Security Stack for Microsoft Azure
CIPSEC Framework components: XL-SIEM
Security week 1 Introductions Class website Syllabus review
Agile Security Management
Detection Detect the breach and protect the data. By,
Fortify YOUR Defense with CyberSponse Adaptive Security
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Cybriant Partner Partner Program White Label Materials
Presentation transcript:

SIEMs - Decoding The Mayhem Bill Dean Director of Computer Forensics Sword & Shield Enterprise Security Inc.

Outline Today’s Threat Landscape Why Do I Need a SIEM? Choosing and Deploying a SIEM This Will Not Be Boring

Computer Security LandScape You Are Being Blamed Your Money Isn’t Safe Your Information Isn’t Safe Your Reputation Is at Stake More Threats, Less People

Your Are Being Blamed BotNets Pivoting

Stealing Your $$

Stealing Your Information Computers Are No Longer for “Productivity” You Have Valuable Information You ARE A Target You Aren’t Dealing With “Amateurs”

Hactivists – Exposing Your Secrets

Hactivists – Business Disruption

Your Challenge

SIEMS

You Need An “Oracle” Know The Past Knows The Present Knows The Future Knows How to CYA

SIEM Basics Provides “Instant Replay” 24 X 7 Security Guard SIEMs v. Firewall v. IDS v. IPS SIEM v. SEIM v. SIM Typically Compliance Driven

Compliance HIPAA PII Data Breach Notification Laws

Why Do I Need A SIEM? Infrastructure Monitoring Reporting Threat Correlation Instant Replay Incident Response

What Is Monitored? Account Activity Availability IDS/Context Correlation Data Exfiltration Client Side Attacks Brute Force Attacks

19 Windows Accounts Accounts Created, By Whom, and When New Accounts That Aren’t Standard New Accounts Created At Odd Time New Workstation Account Created Key Group Membership Change Accounts Logon Hours

Availability System Uptime Statistics Availability Reporting Uptime is “Relative”

21 IDS Context/Correlation Place Value On Assets Context Is Essential Maintain Current Vulnerability DBs Create Priority Rules

22 Data Exfiltration You Must Know What Is “Normal” Deviations From The Norm Warrant An Alert Some Events Are “Non-Negotiable” “You” Typically Initiate Data Transfers

23 Client Side Attacks Windows Event Logs Information Process Status Changes New Services Created Scheduled Tasks Creations Changes to Audit Policies

24 Brute-force Attacks Detailed Reports of Failed Logins Source Of Failed Login Attempts Locked Accounts Report

Incident Response

Incident Response Scenario #1 Law Firm With Dealings In China Law Firm Was “Owned” More Than A Year Access To Every Machine On Network Thousands of “Responsive” s Obtained “Privilege” Was Not Observed

Incident Response Scenario #2 VP of Finance Promoted to CFO Attack on the “Weakest” Link

AV Will Save Us!!

Incident Response Scenario #3

How SIEMs Would Have Helped Accounts Enabled Services Created Firewall Changes Data Exfiltration Network Communications Incident Response Costs

Choosing A SIEM Not a Replacement for Security Engineers Must Support Disparate Devices (Agentless) Don’t Plan To Monitor? DON’T BOTHER

Deploying a SIEM Architecture Options Tuning Out The “Noise”

SIEM Option$ OutSourced Options SecureWorks High-Cost ArcSight, Q1 Labs Radar, RSA, Tripwire Lower-Cost Q1 Labs FE, TriGEO, Splunk No-Cost OSSIM OSSEC

Summary You Must Anticipate Today’s Threats SIEMs Are Extremely Valuable SIEMs Are Not A Silver Bullet

Questions? Bill Dean Director of Computer Forensics Sword & Shield Enterprise Security Inc.