NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

Slides:



Advertisements
Similar presentations
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
Advertisements

Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
The twenty-four/seven database Oracle Database Security David Yahalom Senior database consultant
David A. Brown Chief Information Security Officer State of Ohio
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
 Controls that provide security against internal and external threats  2 Types of access controls: › Physical controls › Logical controls.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
Stephen S. Yau CSE , Fall Security Strategies.
Didzis Balodis, CISSP, Head of IT Security and Infrastructure at SQUALIO Using the Cloud - practical security implications.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Oklahoma Chapter Information Systems Security Association Oklahoma Chapter, Tulsa Oklahoma City Chapter, OKC Student Chapter, Okmulgee Oklahoma Chapter,
Intranet, Extranet, Firewall. Intranet and Extranet.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
1©2012 Check Point Software Technologies Ltd. Squashing Politics with Policy.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
Assessment Presentation Philip Robbins - July 14, 2012 University of Phoenix Hawaii Campus Fundamentals of Information Systems Security.
® Copyright 2008 Adobe Systems Incorporated. All rights reserved. Bobby Caudill Solution Architect, Global Government August 2008 Adobe Solutions for Government.
K E M A, I N C. Ten Steps To Secure Control Systems APPA 2005 Conference Session: Securing SCADA Networks from Cyber Attacks Memphis, TN April 18, 2005.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
IT Security – Scanning / Vulnerability Assessment David Geick State of Connecticut IT Security.
Ali Alhamdan, PhD National Information Center Ministry of Interior
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Network security Product Group 2 McAfee Network Security Platform.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
Security Trends & Industry Insights
South Wales Cyber Security Cluster A networking group with a purpose Membership Open to anyone with an interest in Cyber Security.
SecSDLC Chapter 2.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
UNCLASSIFIED 1 National Security in Cyberspace: It Takes a Nation Sandra Stanar-Johnson NSA/CSS Representative to the Department of Homeland Security February.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Latest Strategies for IT Security Margaret Myers Principal Director, Deputy CIO United States Department of Defense North American Day 2006.
OTech CalCloud Security General 1  Meets the operational and compliance requirements of the State  SAM/SIMM  NIST  FedRAMP v2  Other necessary regulatory.
IS3220 Information Technology Infrastructure Security
DR LEE BUCHANAN Venture Partner PALADIN CAPITAL GROUP.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
Why SIEM – Why Security Intelligence??
Best Cyber Security Practices for Counties An introduction to cybersecurity framework.
1© Copyright 2016 EMC Corporation. All rights reserved. VIEWTRUST SOFTWARE OVERVIEW RISK MANAGEMENT AND COMPLIANCE MONITORING.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
Brian Ventura SANS Community Instructor
Your Partner for Superior Cybersecurity
Cybersecurity - What’s Next? June 2017
Team 1 – Incident Response
Lessons Learned in Managing IT Risk
Security Standard: “reasonable security”
Security Risk Profiles – Tips and Tricks
Capabilities Matrix Access and Authentication
From “Groundhog Day” to “Independence Day”
Secure & Unified Identity
5G Security Training
Growing Up In Cyber… but is Cyber Growing Up?
Company Overview & Strategy
Secure Browsing Because malware usually doesn’t identify itself.
Auburn Information Technology
EU GDPR a Cyber Security Perspective
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Be WISE! Bringing into reality global information security collaboration Alessandra Scicchitano GÉANT - Project Development Officer.
Shifting from “Incident” to “Continuous” Response
Network Security Best Practices
Technology Convergence
IT Management Services Infrastructure Services
Presentation transcript:

NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management

The optimal place to solve a security problem is … …never where you found it. --Corollary: and the information for the solution is never in the right form.

If it is happening to you today, then... …it happened to someone else yesterday, and it will happen to someone else tomorrow. --Corollary: and you probably don’t know them

After you figured out what happened, there were... …plenty of signs that could have told you it was coming. --Corollary: but not all the signs are in “cyberspace”, or available to “cyber defenders”

So the future of cyberdefense is... …an information management problem.

Information Plumbing

The Security “Fog of More” standards SDL supply-chain security security bulletins user awareness training browser isolation two-factor authentication encryption incident response security controls threat intelligence whitelisting need-to-know SIEM virtualization sandbox compliance maturity model anti-malware penetration testing audit logs baseline configuration risk management framework continuous monitoring DLP threat feed certification assessment best practice governance

Some Unfortunate Facts The vast majority of compromises are based on known problems that have known solutions 85% of the incidents managed by the US-CERT come down to the same 5 basic defenses Most attacks should have been blocked at the perimeter Very few attackers use “stealth” techniques Very few defenders have automated workflow

The Defender’s Challenges How can I extend my information ‘reach’ to get a more complete picture of what’s going on? Who can I trust to help me cut through the fog? How can the data be translated into prioritized action? How will I know if something relevant changes? How can I do the right thing – and then prove it?!?

The management of cyber information… from many sources “inside my borders” – and of many types (not just security) must be findable from “over the horizon” in forms that are actionable “passively collected” and “actively generated” in a churn of constant new information where each bit of information has a trust value

The Critical Security Controls

The Center for Internet Security “making best practice common practice”