Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.

Slides:



Advertisements
Similar presentations
1 Confidential and proprietary material for authorized Verizon Foundation personnel only. Use, disclosure or distribution of this material is not permitted.
Advertisements

Identifying and Responding to Security Incidents in the Law Firm
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.
ORACLE ON VERIZON CLOUD Proprietary & Confidential, Verizon Enterprise Solutions Oracle OpenWorld September, Anne Plese, Verizon Enterprise.
© 2012 IBM Corporation IBM Security Systems 1 © 2014 IBM Corporation IBM Security Network Protection (XGS) Advanced Threat Protection Integration Framework.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted.
PCM2U Presentation by Paul A Cook IT SERVICES. PCM2U Our History  Our team has been providing complete development and networking solutions for over.
APA of Isfahan University of Technology In the name of God.
The influence of PCI upon retail payment design and architectures Ian White QSA Head of UK&I and ME PCI Team September 4, 2013 Weekend Conference 7 & 8.
© 2011 Verizon. All Rights Reserved. Reserved Net Conference for Cisco WebEx Event Center Presenter Name Presenter Title Month XX, 2013.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
1 Secure Telework Connectivity Peggy Ward Chief Information Security Officer July 22,
1 Visualizer for Firewall Display & Analysis Tool.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
© 2010 Verizon. All Rights Reserved. PTE / DBIR.
Confidential and proprietary material for authorized Verizon personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized.
Welcome to the 3 rd Plenary Meeting February 5-7 th, 2013.
Consistency in Reporting Data Breaches
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
TOP TEST SECURITY RECOMMENDATIONS FOR SCHOOL DISTRICTS John Fremer, Ph.D. President Caveon Test Security October 25, 2006.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Sky Advanced Threat Prevention
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
IoT Standards Harm Jan Arendshorst Head of Product Management Professional Services Confidential and proprietary materials for authorized Verizon personnel.
Role Of Network IDS in Network Perimeter Defense.
Incident Response Christian Seifert IMT st October 2007.
2015 TCPA WASHINGTON SUMMIT | SEPT. 27TH-29TH | WASHINGTON DC The Anatomy of a Breach Phillip Naples, Pritchard & Jerden, Inc. Jeremy Henley, ID Experts.
Confidential and proprietary material for authorized Verizon Incorporated personnel only. Use, disclosure or distribution of this material is not permitted.
Primary and Backup Connectivity. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or.
Travel & Hospitality. Guest services Digital signage Automated retail Mobile operations management Remote monitoring Learn how new technologies pave the.
Federal Civilian. Mobile health Private network traffic management Remote monitoring Field force automation Fleet management See how to go from aging.
Construction. Asset management Field force management Fleet management Mobile job site Automated maintenance Learn how to turn job site chaos into choreography.
Manufacturing. Mobile workforce management Asset management Intelligent track and trace Condition-based maintenance Remote monitoring Learn how to ramp.
K-12 Education. Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of.
Why Verizon. Network performance Breadth of solutions See why better matters when doing business: Confidential and proprietary materials for authorized.
Retail. Business connectivity Asset management Fleet management Mobile POS Automated retail Learn how to expand your business with better technology:
Automotive. Intelligent lighting Lot management Intelligent video Business continuity Remote monitoring Learn how to increase productivity through innovative.
Department of Defense. Business continuity Private network traffic management Logistics automation Fleet management Field force automation See how to.
Energy & Utilities. Smart metering Demand response Meter data management Distribution monitoring Fleet management Find out what Verizon can do for utilities.
Why Verizon. Network performance Breadth of solutions See why better matters when doing business: Confidential and proprietary materials for authorized.
Verizon Intelligent Track and Trace: Serialization and Cold Chain
Deliver cloud to the enterprise—simply,
2016 Data Breach Investigations Report
Secure Software Confidentiality Integrity Data Security Authentication
Professional Services
Finance Speaker notes:
Verizon Innovative Learning Minority Males
Agriculture Speaker notes:
Out of the Breach and Into the Fire
Give priority to your critical communications.
Healthcare Speaker notes:
ISMS Information Security Management System
One Talk from Verizon One TalkSM offers a flexible, scalable phone system that combines employees’ desk phones and mobile phones using the same number.
The business view Operations Business processes Productivity
Presentation transcript:

Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. IR/Forensics Team Tactics Panel Best Incident Response and Forensics Techniques Eric GentryChristopher J Novak

Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Quickly Determining What Type of Data Was Compromised Know What/Where Sensitive Data Resides in Environment  Network Diagram  Map Data Flows Forensic Analysis Identify / Analyze Corroborating Sources  Netflows, IDS and Firewall Logs, etc.  Web Server Logs  Database Content

Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Determining How a Breach Occurred Malware Analysis  Analysis in Sandbox Environment  IP Addresses  Filenames, Processes  Hacker Handles Leverage Other Intelligence Sources  Underground Monitoring  Coordination with Law Enforcement  e.g. Known Information Black Market forums Circumstantial Evidence  Overall Security Posture

Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Identify Malware on Hosts Forensic Analysis  Known Keywords  Analysis of File Times/Dates  Known “Bad” IP Addresses  Known Malware Hash Values Other Evidence Sources  Web Server Logs  Application Logs

Confidential and proprietary material for authorized Verizon Business personnel only. Use, disclosure or distribution of this material is not permitted to any unauthorized persons or third parties except by written agreement. Thank You Eric GentryChristopher J Novak