Ali Alhamdan, PhD National Information Center Ministry of Interior

Slides:



Advertisements
Similar presentations
Security Life Cycle for Advanced Threats
Advertisements

Security intelligence: solving the puzzle for actionable insight Fran Howarth Senior analyst, security Bloor Research.
1© Copyright 2014 EMC Corporation. All rights reserved. Securing the Cloud Gintaras Pelenis Field Technologist RSA, the Security Division of EMC
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
The Business Value of CA Solutions Ovidiu VALEANU Senior Consultant DNA Software – CA Regional Representative.
© 2015 Cisco and/or its affiliates. All rights reserved. 1 The Importance of Threat-Centric Security William Young Security Solutions Architect It’s Our.
Security Controls – What Works
The State of Security Management By Jim Reavis January 2003.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
SEC835 Database and Web application security Information Security Architecture.
Information Security Update CTC 18 March 2015 Julianne Tolson.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Dell Connected Security Solutions Simplify & unify.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
STRATEGIC INTELLIGENCE MANAGEMENT Chapter by Paul de Souza Chapter 18 - National Cyber Defense Strategy, Pg. 224.
Center of Excellence for IT at Bellevue College. Cyber security and information assurance refer to measures for protecting computer systems, networks,
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Information Warfare Playgrounds to Battlegrounds.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The Changing World of Endpoint Protection
Security Innovation & Startup. OPEN THREAT EXCHANGE (OTX): THE HISTORY AND FUTURE OF OPEN THREAT INTELLIGENCE COMMUNITY ALIENVAULT OTX.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Features Governmental organization Critically important ICT objects Distributed infrastructure Three levels of confidentiality Dozens of subsidiary organizations.
Enterprise Cybersecurity Strategy
13LECTURE NET301 11/23/2015Lect13 NET THE PROBLEM OF NETWORK SECURITY The Internet allows an attacker to attack from anywhere in the world from.
Information Warfare Playgrounds to Battlegrounds.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Information Security In the Corporate World. About Me Graduated from Utica College with a degree in Economic Crime Investigation (ECI) in Spring 2005.
Computer Security By Duncan Hall.
NATIONAL CYBER SECURITY GOVERNANCE & EMERGING CYBER SECURITY THREATS
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
Contextual Security Intelligence Suite™ Preventing Data Breaches without Constraining Business.
Why SIEM – Why Security Intelligence??
© ITT Educational Services, Inc. All rights reserved. IS3220 Information Technology Infrastructure Security Unit 10 Network Security Management.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Information Management System Ali Saeed Khan 29 th April, 2016.
IT Security Mandatory Solutions Andris Soroka 2nd of July, RIGA.
Protect your Digital Enterprise
Your Partner for Superior Cybersecurity
Cybersecurity - What’s Next? June 2017
Juniper Software-Defined Secure Network
Team 1 – Incident Response
Security Standard: “reasonable security”
THR2099 What to do BEFORE all hell breaks loose: Building a modern cybersecurity strategy.
Wenjing Lou Complex Networks and Security Research (CNSR) Lab
Dissecting the Cyber Security Threat Landscape
بهترین راهکار را انتخاب کنید...
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Panda Adaptive Defense Platform and Services
Information Security Awareness
How to Mitigate the Consequences What are the Countermeasures?
Enhanced alerting and collaborative incident management
Net301 LECTURE 11 11/23/2015 Lect13 NET301.
Overview UA has formed is forming a Security Operations Center (SOC) with Students supporting Tier 1 Activities. The SOC provides benefits to the University.
Information Protection
Security in SDR & cognitive radio
Security intelligence: solving the puzzle for actionable insight
Information Protection
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Presentation transcript:

Ali Alhamdan, PhD National Information Center Ministry of Interior Secure C2 Systems Ali Alhamdan, PhD National Information Center Ministry of Interior April 28th, 2015

Command and Control Systems Collection of technology, people, information and business All military functions and operations War is a complex phenomenon and interact with enemy’s complex system in a competitive way A process of continuous adaptation Technology People Information Business Alhamdan

Command and Control Systems Trusted and secure C2 systems High availability C2 systems Right access from right people or systems Consider security methodology, standard and technology Vulnerabilities can be exploited anywhere and anytime Threats and APT C2 is targeted Alhamdan

Commanders rely HEAVILY on trusted and available systems C2 and Security Commanders rely HEAVILY on trusted and available systems Alhamdan

Security Statistics Estimated annual cost globally around 100 Billion and expected to be 120.1 Billion by 20171 556 Million victims per year1 10% of social network users are fallen victim1 59% of ex-employees admitted to steal company data after leaving job1 92% of 100,000 security incidents are covered by 9 attack patterns2 Sources: 1) Go-Gulf (http://www.go-gulf.com/blog/cyber-crime/) 2) Verizon - 2014 Data breach investigations report 3) Symantec, 2014 Internet Security Threat Report, Volume 19 Alhamdan

Motivations of Cyber Attacks Percentage (%) Cyber Crime 40% Hacktivism 50% Cyber Warfare 3% Cyber Espionage 7% Source: Go-Gulf (http://www.go-gulf.com/blog/cyber-crime/) Alhamdan

Characteristics of New Threats Open Hidden Known & Patchable Unknown & Zero Day TRADITIONAL THREATS ADVANCED THREATS Broad Targeted One Time Persistent Alhamdan

Security Statistics 10 years of threat actions leading to data breaches Number of breaches per threat action category over time Source: Verizon - 2014 Data breach investigations report Alhamdan

Widening Security Gap Sources: IDC Alhamdan

Security and C2 Implementation attacks Insecure channels Use cryptograph: Confidentiality: preventing unauthorized disclosure of information Integrity: maintaining and assuring the accuracy and consistency of data over its entire life-cycle and ensuring the information originality Availability: ensuring resources are accessible when required by an authorized user Access control Identification Authentication (multi factors) Authorization (level privileges) Alhamdan

Security Defense Security culture (awareness) Security operation center (SOC) Analytic methods Investigation and forensics Defines of depth Challenge: most tools discover around 90% of the total attacks, APT!! Alhamdan

Security Baseline Apply and comply with the international standards e.g. ISO 27001 and 27002 NIST (e.g. 800-53, 800-37, 800-14,... etc.) Business Continuity Management Alhamdan Ali

To be Should build required capabilities (Human & Tech) Enhance security culture Adapt automated and sophisticated tools and methods of cyber security Share knowledge and information about attacks with others Adopt intelligent systems (monitoring, analyzing, detecting and preventing) Alhamdan

Should Be Predictive Proactive Reactive Privileged access management Multi factor authentication VA/PT & DLP Real time policy enforcement Analytics based on live feeds from multiple sources integrated with management consoles Reactive Proactive Predictive Single sign on Encryption Mobile device management Logging and monitoring Network management SIEM solutions Access control One factor authentication Device password Acceptable use policy Alhamdan

Alhamdan