Information Security Management: Protecting IT Assets from Current and Future Threats John McCumber Strategic Program Manager.

Slides:



Advertisements
Similar presentations
Security Administration Tools and Practices Amit Bhan Usable Privacy and Security.
Advertisements

Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
The Most Analytical and Comprehensive Defense Network in a Box.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Blended Threats and Layered Defenses Security Protection in Today’s Environment Marshall Taylor
Security Controls – What Works
The State of Security Management By Jim Reavis January 2003.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
The Way Ahead for Information Systems Security: What You Don’t Know Can Hurt You Christopher Baum Research Vice President Global Government NYSCIO Conference.
Security Awareness: Applying Practical Security in Your World Chapter 6: Total Security.
Simple and Complex Threats Shape the Future Linda McCarthy Executive Security Advisor November 22, 2003.
Computer Security: Principles and Practice
Stephen S. Yau CSE , Fall Security Strategies.
Barracuda Networks Confidential1 Barracuda Backup Service Integrated Local & Offsite Data Backup.
Demonstrating IT Relevance to Business Aligning IT and Business Goals with On Demand Automation Solutions Robert LeBlanc General Manager Tivoli Software.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Patch Management Strategy
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
APA of Isfahan University of Technology In the name of God.
SEC835 Database and Web application security Information Security Architecture.
HIPAA COMPLIANCE WITH DELL
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
CS 325: Software Engineering April 14, 2015 Software Security Security Requirements Software Security in the Life Cycle.
Dell Connected Security Solutions Simplify & unify.
1Cisco Security NOW © 2003, Cisco Systems, Inc. All rights reserved. THIS IS THE POWER OF CISCO SECURITY. now.
Talking points Attacks are more frequent, more aggressive, require more time to repair and prevent Machines get compromised in 2003 for the same reasons.
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Classification 10/3/2015 Worry-Free Business Security 5.0.
Critical National Infrastructure What is attacking your network, and how do you know? By Frode Rein ICT Manager, The Norwegian Parliament – Stortinget.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
Sample Security Model. Security Model Secure: Identity management & Authentication Filtering and Stateful Inspection Encryption and VPN’s Monitor: Intrusion.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
JEnterprise Suite For Network Monitoring and Security Dr. Sureswaran Ramadass, Dr. Rahmat Budiarto, Mr. Ahmad Manasrah, Mr. M. F. Pasha.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Managing the Integrity of Employee Devices and Data “Security Life Cycle Best Practices” Pacific NW Digital Gov’t. Summit David Cantey CISSP SCSP Principal.
1 Managing A Global Corporate Protection Infrastructure Jeannette Jarvis Association of Anti Virus Asia Researchers November 26, 2004.
National HMIS Conference September 14th and 15th, 2004 Chicago, IL Sponsored by the U.S. Department of Housing and Urban Development1 Information Security.
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 1 Automate your way to.
Data Center Management Microsoft System Center. Objective: Drive Cost of Data Center Management 78% Maintenance 22% New Issue:Issue: 78% of IT budgets.
Computer Security Status C5 Meeting, 2 Nov 2001 Denise Heagerty, CERN Computer Security Officer.
“Lines of Defense” against Malware.. Prevention: Keep Malware off your computer. Limit Damage: Stop Malware that gets onto your computer from doing any.
IS3220 Information Technology Infrastructure Security
1 Integrated Site Security Project Denise Heagerty CERN 22 May 2007.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Your Partner for Superior Cybersecurity
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Compliance with hardening standards
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Microsoft’s Security Strategy
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Information Security Awareness
In the attack index…what number is your Company?
Presentation transcript:

Information Security Management: Protecting IT Assets from Current and Future Threats John McCumber Strategic Program Manager

Key Information Security Challenges: Blurring lines: “securing” IT assets vs. “managing” them: who ultimately has the responsibility? Too much information: deluge of security news (i.e. viruses, new patches) must be custom formatted for my environment – takes time! Shortage of trained and experienced personnel Need to wrap protection around evolving architectures and business models (i.e. wireless LANs, remote access) Investment in new security tools necessitates a new console to manage, alerts to correlate “Undesired” ranks are expanding: blended threats, P2P, spam, “spyware,” insider threats – together require more than traditional server and desktop solutions

25,000 50,000 75, , , ,000 World-Wide Attack Trends Infection Attempts *Analysis by Symantec Security Response using data from Symantec, IDC & ICSA; 2003 estimated **Source: CERT 100M 200M 300M 400M 500M 600M 700M 800M 900M Network Intrusion Attempts 0 Blended Threats (CodeRed, Nimda, Slammer) Denial of Service (Yahoo!, eBay) Mass Mailer Viruses (Love Letter/Melissa) Zombies Polymorphic Viruses (Tequila) Malicious Code Infection Attempts * Network Intrusion Attempts **

Source: Bugtraq Vulnerabilities Software Vulnerabilities Average number of new vulnerabilities discovered every week

Vulnerability Trend Highlights Newly discovered vulnerabilities are increasingly severe. Accordingly, the number of low severity vulnerabilities is decreasing. High-severity vulnerabilities give increased privileges and access to more prominent targets. Month New vulnerabilities Breakdown of Volume by Severity

Vulnerability Trend Highlights Symantec reports that 70% of the vulnerabilities found in 2003 could be easily exploited, due to the fact that an exploit was either not required or was readily available. This is a 10% increase over 2002, where only 60% were easily exploitable. Month Percentage of vulnerabilities Percentage of Easily Exploitable New Vulnerabilities

Attack Trend Highlights Almost one third of all attacking systems targeted the vulnerability exploited by Blaster and its successors. Other worms that surfaced in previous periods continue to survive and target Firewall and IDS systems globally. A sufficient number of unpatched systems remain to sustain them. RankPortDescription Percentage of Attackers 1TCP/135 Microsoft / DCE-Remote Procedure Call (Blaster) 32.9% 2TCP/80HTTP / Web19.7% 3TCP/4662E-donkey / Peer-to-peer file sharing9.8% 4TCP/6346Gnutella / Peer-to-peer file sharing8.9% 5TCP/445Microsoft CIFS Filesharing6.9% 6UDP/53DNS5.9% 7UDP/137Microsoft CIFS Filesharing4.7% 8UDP/41170Blubster / Peer-to-peer Filesharing3.2% 9TCP/7122Unknown2.5% 10UDP/1434Microsoft SQL Server (Slammer)2.4%

How do we achieve proactive security management to mitigate current and future risks? Focus on four key elements: Alert - gain early warning, take evasive action Protect – deploy defense-in-depth Respond – react in prioritized fashion Manage – applies to a 360-degree view of security and managing the secure lifecycles of our individual assets

 Early awareness of threats  “Listening posts”  Prevent unwanted attacks  Detect physical breaches  Security of information assets  Internal Workflow Auto-configuration Disaster recovery  External Hotline Signature updates Environment Policies and Vulnerabilities Device/Patch Configuration User Access Identity Management Information Events and incidents Alert Protect ManageRespond Proactive Control Security Fundamentals

Alert: Spotting the ‘Blaster’ worm early DeepSight Notification IP Addresses Infected With The Blaster Worm 7/16 - DeepSight Alerts & TMS initial alerts on the RPC DCOM attack 7/23 - DeepSight TMS warns of suspected exploit code in the wild. Advises to expedite patching. 7/25 - DeepSight TMS & Alerts update with a confirmation of exploit code in the wild. Clear text IDS signatures released. 8/5 - DeepSight TMS Weekly Summary, warns of impending worm. 8/7 TMS alerts stating activity is being seen in the wild. 8/11 - Blaster worm breaks out. ThreatCon is raised to level 3 Alert

The Convergence Imperative Assure security policy compliance Receive early awareness of threats Prevent & detect attacks & breaches Protect privacy of information Rapidly & easily recover from loss of critical systems & information Insure via policies that adequate storage available for applications & backup Create secure archives for preserving information assets Discover & track HW/SW assets Provision, update & configure systems via automated policies Instantly push security patches & signatures to all managed devices Assure software license compliance & remove unauthorized applications De-provision & repurpose systems securely

Threat, vulnerability & event-driven patch & configuration management Solving the Convergence Challenge Policy-driven backup Monitor storage resources & perform corrective action System & data recovery Threat, vulnerability & event-driven backup Recovery from attack

Normal Protect Depth & Frequency of backup Management in Action: Integrated Security, Systems & Storage Threat Vulnerabilities Attack SEA platform Rapid Recovery from Attack, Faulty Patch Adjust Protection Granularity High Risk Alert Normal ScanTestDeploy Remove Vulnerability Recover Alert Action Policie s

Summary Risk is escalating: Threats are more complex, exploiting more vulnerabilities in less time – requires more comprehensive strategies leveraging integrated capabilities and strengths In the public sector, there are additional strong catalysts driving the “A.P.R.M.” approach, such as compliance (i.e. FISMA) and safely enabling information-sharing. Take advantage of tools that serve multiple needs (i.e. asset inventory, policy compliance and patch management) Given the nature of threats, we need to play to natural strengths gained through merging security, system and storage functions – on both a technology and personnel level Knowing what we have, how it is configured, and how it can be restored – in the context of what is happening “in the wild” (exploits, vulnerabilities, patterns) is the best defense for what the future brings

Thank You!