‹#› September 2015 Cloud-CISC Cloud Cyber Incident Information Sharing Center.

Slides:



Advertisements
Similar presentations
The Future of Social Collaboration Randy Williams Enterprise Trainer and Evangelist AvePoint.
Advertisements

Lance Spitzner
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Symantec Vision and Strategy for the Information-Centric Enterprise Muhamed Bavçiç Senior Technology Consultant SEE.
Geneva, Switzerland, September 2014 Overview of Kenya’s Cybersecurity Framework Michael K. Katundu Director, Information Technology Communications.
Security Offering. Cyber Security Solutions 2 Assessment Analysis & Planning Design & Architecture Development & Implementation O&M Critical Infrastructure.
* The Role of Threat Intelligence and Layered Security for Intrusion Prevention in the Post-Target Breach Era Ted Gruenloh Director of Operations Sentinel.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
Cloud Computing Stuart Dillon-Roberts. “In the simplest terms, cloud computing means storing & accessing data & programs over the Internet instead of.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
EEye Digital Security    On the Frontline of the Threat Landscape: Simple configuration goes a long way.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Akamai Technologies - Overview RSA ® Conference 2013.
© 2013 Cisco and/or its affiliates. All rights reserved. This document is Cisco Confidential. For Channel Partners only. Do not distribute. C
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
1 Commonwealth Security Information Resource Center Michael Watson Security Incident Management Director 10/17/2008
Ali Alhamdan, PhD National Information Center Ministry of Interior
Network security Product Group 2 McAfee Network Security Platform.
Legitimate Vulnerability Markets By: Jeff Wheeler.
Consistency in Reporting Data Breaches
1 9/14/2010 Cloud Network Defense Tom Byrnes Founder & CEO x4242 Cloud Network Defense.
© Cloud Security Alliance, 2015 Jim Reavis CEO, Cloud Security Alliance.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
2015 NetSymm Overview NETSYMM OVERVIEW December
Develop your Legal Practice using “Cloud” applications, but … Make sure your data is safe! Tuesday 17 November 2015 The Law Society, London Allan Carton,
Security A Payments Perspective Terry Dooley EVP & CIO SHAZAM Network.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
The cost of Cybercrime 1 Steve Lamb Regional Marketing Manager – EMEA, Enterprise Security Products Twitter: actionlamb.
©2015 Check Point Software Technologies Ltd. 1 [Restricted] ONLY for designated groups and individuals CHECK POINT MOBILE THREAT PREVENTION.
InsideView Proprietary & Confidential CRMUG PARTNER SHOWCASE KNOW MORE. WIN MORE. InsideView Proprietary & Confidential Heidi Tucker, VP Global Alliances.
Why SIEM – Why Security Intelligence??
Activu-Powered Video Wall Prominently Featured during President Obama’s Visit to the National Cybersecurity and Communications Integration Center On January.
Mobile & Compliant MOBILE & COMPLIANT Peter Heather & David Costello.
Mobile Security Solution Solution Overview Check Point Mobile Threat Prevention is an innovative approach to mobile security that detects and stops advanced.
TruSTAR Sensitive & Proprietary Cloud CISC: Cyber incident exchange and collaboration February, 2016 “We cannot solve problems with the same thinking we.
Total Enterprise Mobility Comprehensive Management and Security
Tripwire Threat Intelligence Integrations. 2 Threat Landscape by the Numbers Over 390K malicious programs are found every day AV-Test.org On day 0, only.
Surveillance and Security Systems Cyber Security Integration.
Cybersecurity as a Business Differentiator
Stop Cyber Threats With Adaptive Micro-Segmentation
Comprehensive Security and Compliance at an Affordable Price.
“Introduction to Azure Security Center”
The Game has Changed… Ready or Not! Andrew Willetts Technologies, Inc.
Information Security.
Hybrid Management and Security
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Behavior Analytics Market to surpass $3.5bn by 2024: Global Market Insights,
Reducing Cost and Risk During an Investigation
Nicole Steen-Dutton, ClickDimensions
The utility belt for managing security and compliance in Office 365
Cyber Threat Intelligence Sharing Standards-based Repository
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Dynamic Application Security.
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
ECM for Legal & Law.
Strong Security for Your Weak Link:
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Securing the Internet of Things: Key Insights and Best Practices Across the Industry Theresa Bui Revon IoT Cloud Strategy.
Panda Adaptive Defense Platform and Services
DevOps in Localization Continuous Delivery
Anatomy of a Large Scale Attack
The MobileIron® Threat Detection difference:
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

‹#› September 2015 Cloud-CISC Cloud Cyber Incident Information Sharing Center

‹#› -Albert Einstein

‹#› Agenda Review the Problem Cloud-CISC & TruSTAR Product Demo Questions and Open Discussion

‹#› Review the problem

TruSTAR Sensitive & Proprietary ‹#› TruSTAR Sensitive & Proprietary The problem 75% of enterprise attacks spread from the first company to the next within 24 hours Verizon DBIR Median number of days threats are present on a victims network prior to detection is 205 days Verizon DBIR

‹#› The problem The bad guys collaborate in real-time and share exploit intelligence on a global scale Countries Affected Major Attacks * The good guys report incidents internally, but rarely share information. Steady Growth of Incident Reports * *Cisco 2014 Security Report, **Verizon 2014 DBIR Report The bad guys collaborate and share information… …and the bad guys are winning. TruSTAR Sensitive & Proprietary

‹#› But, why don’t the good guys coordinate? Legal Concerns over disclosing Personally Identifiable Information, IP and discovery. Market Concerns over brand reputation and financial implications of disclosing a breach. Government Concerns over being seen as in bed with government and/or anti-trust violations. “Legislation removes legal excuses and puts pressure on companies to share, but legal concerns pale in comparison to market risk of sharing cyber incident information.” -Bryan Cunningham, Former NSC Legal Counsel, Data Security Attorney, May 2015 TruSTAR Sensitive & Proprietary

‹#› Where has sharing gone wrong in the past? We have learned from the benefits and challenges faced by current and past sharing groups. We have also learned from our own experience with Cloud-CERT. Without protection from market / reputation risk and incentive to share early in the incident cycle, sharing is limited to: Recycled threat data Ad-hoc/’out-of-band’ personal relationships Stale incident data TruSTAR Sensitive & Proprietary

‹#› Cloud-CISC built for valuable sharing.

‹#› Cloud-CISC changes the paradigm to “Connective Defense” With Cloud-CISC companies can collaborate and decrease their dependence on their own security providers to discover and mitigate attacks. TruSTAR Sensitive & Proprietary ● Anonymity enables security operators to share real incident data by protecting them from market and reputation risk. ● Correlation incentivizes operators to share early in an incident to gain immediate insight from correlated data. ●Mobile Alerting enables operators to learn about incidents based on their user preferences. ●Automated Extraction of indicators of compromise accelerates risk identification and mitigation. ●End-to-End Encrypted Collaboration enables secure, real- time chat to drive toward collective mitigation.

‹#› With Cloud-CISC the sharer gains immediate insight and the community gains early warning. Share + Correlate + Collaborate = Mitigate Powered by TruSTAR - A Technology pioneered by the leadership of CSA. TruSTAR Sensitive & Proprietary

‹#› Product Demo

‹#› We have a simple sharing script that utilizes our anonymity tools... You can compare redacted and original text from the terminal and submit. You can then export indicators with an export script and report ID. All of this can be easily automated and integrated with your workflow! The UI is helpful for some, but we also have an API and command line tools for automation and integration... TruSTAR Sensitive & Proprietary $ python import-trustar.py AnonymizerTemplate.json $ export-trustar.sh

‹#› Next Steps?

‹#› How do I get involved? TruSTAR Sensitive & Proprietary Getting Involved? Elite enterprise cyber security teams have already begun on-boarding and sharing is happening. Early adopters are rewarded with free access for the first year of the Cloud-CISC. Send to to join Co-Chairs Dave Cullinane - Chairman, CSA Brian Kelly - CSO, Rackspace Still open to nominations for steering committee leaders and members! Contact for leadership

‹#› Questions ? THANK YOU.