1 9/14/2010 Cloud Network Defense Tom Byrnes Founder & CEO 760.542.1550 x4242 Cloud Network Defense.

Slides:



Advertisements
Similar presentations
Marc Grégoire, DRDC Ottawa Luc Beaudoin, Bologik Inc.
Advertisements

Security Life Cycle for Advanced Threats
Decreasing Incident Response Time ______________________________ Benefits of Packet Capture & Real-time NetFlow Generation Boni Bruno, CISSP, CISM, CGEIT.
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
Presentation by: Peter Thomas Blue Lance, Inc Using SIEM Solutions Effectively to meet Security, Audit, and Compliance Requirements.
©2014 Bit9. All Rights Reserved The Evolution of Endpoint Security: Detecting and Responding to Malware Across the Kill Chain Chris Berninger, Sr. Solutions.
The Most Analytical and Comprehensive Defense Network in a Box.
We’ve got what it takes to take what you got! NETWORK FORENSICS.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
CERT ® System and Network Security Practices Presented by Julia H. Allen at the NCISSE 2001: 5th National Colloquium for Information Systems Security Education,
CSCD 434 Spring 2011 Lecture 1 Course Overview. Contact Information Instructor Carol Taylor 315 CEB Phone: Office.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Security Guidelines and Management
COEN 252 Computer Forensics
Network Forensics: When conventional forensic analysis is not enough Manuel Humberto Santander Peláez GIAC GCFA Gold, GNET Silver, GCIA Gold.
The Most Analytical and Comprehensive Defense Network in a Box.
What is FORENSICS? Why do we need Network Forensics?
Monitoring for network security and management Cyber Solutions Inc.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
1 © 2001, Cisco Systems, Inc. All rights reserved. Cisco Info Center for Security Monitoring.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
The Real Deal With SIM/SEM The Promise of Security Information / Event Management Scott Sidel Sr. Security Manager Computer Sciences Corp.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
1 Figure 10-4: Intrusion Detection Systems (IDSs) IDSs  Event logging in log files  Analysis of log file data  Alarms Too many false positives (false.
Scott Charney Cybercrime and Risk Management PwC.
Lecture 19 Page 1 CS 236 Online Securing Your System CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
International Cyber Warfare & Security and B2B Conference Participation of Brazilian Cyber Defense Centre ( )
CS526: Information Security Chris Clifton November 25, 2003 Intrusion Detection.
Role Of Network IDS in Network Perimeter Defense.
Project 2: Windows Logging. UTSA IS 6353 Incident Response Ranum on Forensics “The real value of intrusion detection is diagnosing what is going on…never.
IS3220 Information Technology Infrastructure Security
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Palindrome Technologies all rights reserved © 2016 – PG: Palindrome Technologies all rights reserved © 2016 – PG: 1 Peter Thermos President & CTO Tel:
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Visual Analytics for Cyber Defense Decision-Making Anita D’Amico, Ph.D. Secure Decisions division of Applied Visions, Inc.
Proactive Incident Response
IoT Security Part 2, The Malware
OIT Security Operations
Cloud App Security vs. O365 Advanced Security Management
Today’s cyber security landscape
Putting It All Together
Putting It All Together
IPS Express Security Account Manager Representative Exam : practice-questions.html.
Evaluating a Real-time Anomaly-based IDS
Security Automation Standards Landscape
IPS Express Security Account Manager Representative practice-questions.html.
Network Forensics: When conventional forensic analysis is not enough
Strong Security for Your Weak Link:
Cyber Defense Matrix Cyber Defense Matrix
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Shifting from “Incident” to “Continuous” Response
Intrusion detection systems?
Chapter 4: Protecting the Organization
Forensics Week 6.
Case Study 1: Security Considerations
Defending high value targets in the cloud using IP Reputation
CIPSEC architecture CIPSEC workshop Frankfurt 16/10/2018
Bethesda Cybersecurity Club
Cybersecurity Simplified: Phishing
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
IoT in Healthcare: Life or Death
Presentation transcript:

1 9/14/2010 Cloud Network Defense Tom Byrnes Founder & CEO x Cloud Network Defense

2 9/14/2010 Cloud Network Defense Network Forensics  RANUM: “the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents.”

3 9/14/2010 Cloud Network Defense The “Fire”Wall

4 9/14/2010 Cloud Network Defense Issues:  Time to detection.  Preservation and non repudiation of record.  Certainty of Actor.  Volume of data.  Often long after event.  Often not admissible in court (rw storage, chain of custody).  What machine had that IP AT THAT TIME?  Who was logged on?  Most irrelevant, alerts, etc.

5 9/14/2010 Cloud Network Defense Threat List Management Sensors Users Firewall Standard DNS Lists Updated Every 2 Hours For Real Time Protection

6 9/14/2010 Cloud Network Defense Filter, correlate, alert, in real time. The best event is one that didn’t happen. Block, alert, remediate. At the very least, alert. “We make your firewall better.” Source IPDestination IPDestination PortNumber of Attacks F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F F

7 9/14/2010 Cloud Network Defense How it works

8 9/14/2010 Cloud Network Defense Public tool

9 9/14/2010 Cloud Network Defense Tom Byrnes Founder & CEO x Cloud Network Defense