© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets, the (3) mark and the Level 3 Communications.

Slides:



Advertisements
Similar presentations
© 2012 YP Intellectual Property LLC. All rights reserved. YP, the YP logo and all other YP marks contained herein are trademarks of YP Intellectual Property.
Advertisements

1 ASEAN Regional Forum Meeting 28 – 30 April 2010 Bandar Seri Begawan, Brunei CERT-Ins Initiative on International Information Security Dr A S Kamble Director.
© 2010 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
‘Changing environment – changing security’ - Cyber-threat challenges today – Budapest, September 17-18, Industry and the fight against cybercrime.
Blue Coat and the Blue Coat logo are trademarks of Blue Coat Systems, Inc., and may be registered in certain jurisdictions. All other product or service.
Threat Intelligence Use in Information Security: History, Theory and Practice Tim Gallo Cyber Security Field Engineering 1.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© 2008 Verizon. All Rights Reserved. PTEXXXXX XX/08 GLOBAL CAPABILITY. PERSONAL ACCOUNTABILITY. Customized Net Conference New Features in Microsoft Office.
SAP checks if USER ID & Password combination is valid. No identification. User requests Log-on, enters USER ID & Password, (not necessarily their own)!
1 Getting Beyond Standalone Antivirus to Advanced Threat Protection Eric Schwake Sr. Product Marketing
Forensic and Investigative Accounting Chapter 15 Cybercrime Management: Legal Issues © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago, IL.
Lloyds 360 Risk Insight Dec 2010 Malcolm Harkins Malcolm Harkins Chief Information and Security Officer General Manager Intel Information Risk and Security.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Windows 7 Training. Windows ® 7 Compatibility Installer Detection.
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Laurent Bugnion Senior Software Engineer Siemens Building Technologies.
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
1 Enforcing Compliance: A Patch Management Strategy That Works.
© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets and the Level 3 Communications logo are service.
© 2012 Intel-GE Care Innovations LLC. All rights reserved. *All other third-party trademarks referenced herein belong to their respective owners. Multiplying.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
WE SEE YOUR VOICE TM. © Copyright SecureLogix Corporation. All Rights Reserved. ETM, We See Your Voice, SecureLogix, SecureLogix Corporation,
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
© Experian Limited All rights reserved. Experian and the marks used herein are service marks or registered trademarks of Experian Limited. Other.
People © 2013 The Sleeter Group All rights reserved. Intuit, the Intuit logo and QuickBooks, among others, are registered trademarks of Intuit Inc. Other.
Symantec Managed Security Services The Power To Protect Duncan Evans Director, Cyber Security Services 1.
© 2008 Verizon. All Rights Reserved. PTEXXXXX XX/08 GLOBAL CAPABILITY. PERSONAL ACCOUNTABILITY. Instant Net Conference Powered by Cisco WebEx Technology.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
1 Safely Using Shared Computers Amanda Grady December 2013.
© Siemens AG All rights reserved. openlab III Board of Sponsors 3-4 May 2011 at CERN Joint Report Siemens - CERN.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Randy Beavers CS 585 – Computer Security February 19, 2009.
© 2005 CompuCom Systems, Inc. All rights reserved. CompuCom is a registered trademark of CompuCom Systems, Inc. The names and logos of any companies or.
The transition from live to file – How it’s changing video transmission networks? Keith Goldberg, VP, Transmission Operations, Fox Networks Ryan Korte,
Detecting Attacks on Internet Infrastructure and Monitoring of Service Restoration in Real Time Andy Ogielski FCC Workshop on Cyber Security 30 September.
© 2012 Autodesk Autodesk Structural Curriculum 2013 Unit 5: Advanced Structural Analysis & Coordination Advanced Structural Analysis & Coordination.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. HP Confidential Level.
© 2008 Verizon. All Rights Reserved. PTE /08 GLOBAL CAPABILITY. PERSONAL ACCOUNTABILITY. Verizon Instant Net Conference powered by Cisco-WebEx T26.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
THE WORLD’S LEADING BUSINESSES TRUST BLACKBERRY. THE WORLD’S LEADING BUSINESSES ARE SECURE WITH BLACKBERRY.
© 2008 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Cyber Security and the National.
© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets and the Level 3 Communications logo are registered.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
TLP:Green FIRST/TF-CSIRT Technical Colloquium January 25 th – 27 th, 2016 Prague, CZ TLP:Green.
A Solution Perspective An Open Source Collaborative and Foundational Solution Targeted at Non-OECD Member Countries February 9, 2016.
Albany Bank Corporation Security Incident Management Program.
© 2008 Verizon. All Rights Reserved. PTEXXXXX XX/08 GLOBAL CAPABILITY. PERSONAL ACCOUNTABILITY. Reserved Net Conference New Features in Microsoft Office.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Microsoft NDA Material Adwait Joshi Sr. Technical Product Manager Microsoft Corporation.
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Deployment Planning Services
Information Technology Sector
Deployment Planning Services
1 Topic Title First slide 2 line 3 line 4 line
Identity Infrastructure Fundamentals and Key Capabilities
Disaster Recovery as a Service
ე ვ ი ო Ш Е Т И О А С Д Ф К Ж З В Н М W Y U I O S D Z X C V B N M
Matías Heinrich VP Operations Latam October 2011
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
How do I register and log in to the WBT?
Business Continuity Program Overview
Technology Convergence
Tom Walsh, CISSP President
Cyber Security in a Risk Management Framework
1 Topic Title First slide 2 line 3 line 4 line
Presentation transcript:

© 2009 Level 3 Communications, LLC. All Rights Reserved. Level 3 Communications, Level 3, the red 3D brackets, the (3) mark and the Level 3 Communications logo are registered service marks of Level 3 Communications, LLC in the United States and/or other countries. Level 3 services are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service, product or company names recited herein may be trademarks or service marks of their respective owners. FCC Cyber Security Workshop Panel 2: Detect and Respond Dale Drew, Global Security Level 3 Communications, LLC

2  2009 Level 3 Communications, LLC. All Rights Reserved. 2 Detection: The Tools Monitoring for trends and techniques  Industry and government forums  Grey and Blackhat forums  Netflow & SFlow– Core and Edge Real time detection of events  Netflow & SFlow – better sampling capability needed  DPI - Swarming  Element log files  Registration data  Physical Security integration  Etc

3  2009 Level 3 Communications, LLC. All Rights Reserved. 3 Detection: The Tools People  Skilled and trained personnel are key!  Regular incident testing  Continuous training Attacks are becoming much more social in nature  Go after the infrastructure by attacking the people who operate it

4  2009 Level 3 Communications, LLC. All Rights Reserved. 4 Detect and Respond: Commercial Plenty of formal and informal avenues exist to share information  Who to include/exclude often becomes the problem  ISP Threat sharing forums  Vendor coordination – although becoming more difficult On the topic of vendors  Edge vendors are becoming more versatile, more capable in detecting/stoping attacks  Core vendors care about speed

5  2009 Level 3 Communications, LLC. All Rights Reserved. 5 Detect and Respond: Government Plenty of formal and informal avenues exist to share information  Circle of trust is easier here  MANY forums to choose from  Information sharing needs to be more bi-directional

6  2009 Level 3 Communications, LLC. All Rights Reserved. 6 ISP Needs Vendors to be more accountable for security of their products Better capable DPI systems Better Netflow monitoring capabilities More information sharing between forums and from the Government More focus on the Layer 8 (end user) problem; social networking attacks  Captcha + passwords?

7  2009 Level 3 Communications, LLC. All Rights Reserved. 7 THANK YOU!