DDoS Readiness Program. About Red Button Red Button A Leader in DDoS Consulting Founded in 2014 Service based Self funded Found by Ziv Gadot – Formerly.

Slides:



Advertisements
Similar presentations
The Queen’s University of Belfast JISC BS7799 Pilot The Queen’s University of Belfast Dr. Ricky Rankin.
Advertisements

EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
The Carbon Reduction Commitment (CRC) “A Participants Perspective” (NI Water) Climate Change and NI Water Criticisms of Carbon Trading Schemes Carbon Reduction.
Attackers Vs. Defenders: Restoring the Equilibrium Ron Meyran Director of Security Marketing January 2013.
Radware DoS / DDoS Attack Mitigation System Orly Sorokin January 2013.
A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
©2012 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. Check Point DDoS Protector June 2012.
Jak zwiększyć bezpieczeństwo i wysoką dostępność aplikacji wg
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
1 Disaster Recovery Planning & Cross-Border Backup of Data among AMEDA Members Vipin Mahabirsingh Managing Director, CDS Mauritius For Workgroup on Cross-Border.
ISSA Nashville Chapter, May 17 th 2013 Alexander Karstens Senior Systems Engineer IXIA Communications Preparing your organization for DDoS.
2012 Infrastructure Security Report Darren Anstee, Arbor Solutions Architect 8 th Annual Edition.
Chapter 12 Implementation
Nick Wildgoose 8 March 2012 BCI Workshop DELETE THIS TEXT AND PUT COMPANY LOGO IN THIS WHITE SPACE Understanding Risk within your Supply Chain SC1(V1)Jul/05/10GC/ZCA.
Lean and (Prepared for) Mean: Application Security Program Essentials Philip J. Beyer - Texas Education Agency John B. Dickson.
How STERIS is using Cloud Technology to Protect Web Access Presented By: Ed Pollock, CISSP-ISSMP, CISM CISO STERIS Corporation “Enabling Business”
Chapter 11: Project Risk Management
Security Risk Management
CSC 386 – Computer Security Scott Heggen. Agenda Security Management.
Developing the local offer for mainstream schools -Children’s Therapy Team.
It’s Not Just You! Your Site Looks Down From Here Santo Hartono, ANZ Country Manager March 2014 Latest Trends in Cyber Security.
© 2008 Eventure Events. All rights reserved. Mitigating Business Risks with Strategic Workforce Planning Lina Doucet Bruce Power.
Microsoft Office Project 2003: Selling EPM in your Organization Matt Wilson Business Solutions Specialist LMR Solutions.
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
ENISA efforts for securing European Internet Infrastructure
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Internet Security Trends LACNOG 2011 Julio Arruda LATAM Engineering Manager.
Gordon Shevlin Founder, Chief Executive Officer Allgress, Inc.
What Can Go Wrong During a Pen-test? Effectively Engaging and Managing a Pen-test.
1 Figure 11-3: Risk Analysis Financially Sensible Protections  Risk analysis: Balance risks and countermeasture costs Enumeration of Assets  Assets:
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Vendor Management from a Vendor’s Perspective. Agenda Regulatory Updates and Trends Examiner Trends Technology and Solution Trends Common Issues and Misconceptions.
“Making the most of our dollars & sense” CoE Roadshow.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Partners Red Button DDoS Readiness. DDoS Readiness Program The service itself is described in the ‘DDoS Readiness Program’ slide deck.
Continual Service Improvement Methods & Techniques.
Investor Presentation May Safe Harbor Disclaimer This presentation may contain forward-looking information with respect to plans, projections, or.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Info-Tech Research Group1 Info-Tech Research Group, Inc. Is a global leader in providing IT research and advice. Info-Tech’s products and services combine.
IS&T Project Reviews September 9, Project Review Overview Facilitative approach that actively engages a number of key project staff and senior IS&T.
For more course tutorials visit
Security Development Lifecycle (SDL) Overview
Cloud University Live: 8 Steps to Build Your Cloud Go to Market Plan
Updating the Value Proposition:
Real-time protection for web sites and web apps against ATTACKS
Grid Security Risks Mike Surridge
Cyber Protections: First Step, Risk Assessment
Recognization and management of RISK in educational projects
Beyond Today’s Perimeter Defense: Radware Attack Mitigation System (AMS) Benjamin Radtke Senior SE Radware North/East Germany September 2011.
MISSION STRATEGIC DIRECTION
Effects of DoS.
Amendment Invoice Task Force Progress Report
National Cyber Security
IS&T Project Reviews September 9, 2004.
Amendment Invoice Task Force Progress Report
Stepping up to the Cloud iomart Group Cloud Services 1.
Amendment Invoice Task Force Progress Report
Contract Number: PR Yong-Yi Wang
Third-party risk management (TPRM)
Amendment Invoice Task Force Progress Report
Modelli di Controllo e Mitigazione per Attacchi DDoS
V1.1 1.
Presentation transcript:

DDoS Readiness Program

About Red Button Red Button A Leader in DDoS Consulting Founded in 2014 Service based Self funded Found by Ziv Gadot – Formerly Radware ERT (Emergency Response Team) founder and manager – 10 years at Radware, Check Point, Inter – Participated in numerous DDoS mitigation defense MEDIAPPLICATIONS

DDoS

Brief History of DDoS Intensity OpPayback “wikileaks” Dec 2010 DDoS Era First Bullet OpAbabil Sep Oct 2013 The largest attack ever Anonymous Attacks DDoS is a simple to generate OpJustina Boston Children Hospital Jan 2014 Everyone can become a target DDoS continue to be a Mainstream Attack

How to be Prepared for DDoS Attacks? PREPARATION before attack QUICK RESPONSE during attack Design & Execution Response Validation Emergency Response Assessment Gap Analysis Design POC Game Plan Mitigation Technologies Integration Procedures Training Pen Test War Games 24/7 Emergency Response Architecture & DesignExecutionOn-going

Is this Really Done? PREPARATION before attack QUICK RESPONSE during attack Design & Execution Response Validation Emergency Response Assessment Gap Analysis Design POC Game Plan Mitigation Technologies Integration Procedures Training Pen Test War Games 24/7 Emergency Response Architecture & DesignExecutionOn-going ✔ ✔ ✘ ✘ ✘ ✘ ✘ ✘ ✔ ✔ ✘ ✘

Red Button Building Blocks

DDoS Readiness Score

Definition “The ‘DDoS Readiness Score’ is an open standard representing how much DDoS pressure can the organization withstand prior to outage where 0 is none and 7 is any.”

DDoS Readiness Score Attacks Sophistication Attacks Volume 1 “poking” 2 “script kiddy” 3 “basic” 4 “sophisticated” 5 “APT” 6 “extreme” 7 “state sponsored”

‘Tsunami’ DDoS Simulation

‘Tsumani’ DDoS Simulation

DDoS Readiness Assessment Expert System (DRAES)

DDoS Readiness Assessment Expert System Where are your assets located? Are you using CDN? What is you internet pipe size? Which mitigation do you have in place? Expert System DDoS Readiness Score

Gap Analysis

DDoS Readiness Score Score = 2.3 DDoS Readiness Assessment Expert System Tsunami DDoS Simulation Black-box White-box

Gap Analysis Threat Level DDoS Readiness Score Balanced Line 3.7 Vertical Balanced Point

Design

Design Phase 3Phase 2Phase $ per month4000$ per month5,000$ (once)Cost 5 weeks8 weeks3 weeksDuration 3 days5 days1 daysInternal Resources Purchase SSL protection DDoS Simulation Purchase Cloud mitigation SOC Training Existing device hardening Action Uplift score Phase 1 Phase 2 Phase 3

Red Button USP PREPARATION before attack QUICK RESPONSE during attack Design & Execution Response Validation Emergency Response Assessment Gap Analysis Design POC Game Plan Mitigation Technologies Integration Procedures Training Pen Test War Games 24/7 Emergency Response Architecture & DesignExecutionOn-going “We are Devoted to Provision All Required Building Blocks with Vendor Neutrality” ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✔ ✘ ✘ ✘ ✘ ✘ ✘ ✘ ✘

DDoS Readiness Program “Solution-based packages to be ready for DDoS attacks”

DDoS Readiness On-going Platinum On-going Gold Uplift Silver Uplift Bronze ✔✔✔✔ Architecture & Design ✔✔✔ Design Execution ✔ On-going Validation ✔✔ Emergency Response DDoS Readiness Program zero outage tolerance Large organizations Banks, ecommerce Five nines Reduce risks at reasonable costs Medium size organizations Protect reputation Two nines

Red Button Resell Mitigation Design & Execution Response Validation Emergency Response Architecture & Design ExecutionOn-going Design PS Only c ustomer by mitigation direction PS + Resell ✔ vendor neutral Near vendor neutral ✔ Turn-key ✔ Cost reduction

Summary

Attack Vector Analysis AFTER BEFORE DDoS Attack Vector Game Plan Automatic ✔✔ ✔ SYN Flood Network / Volumetric ✔✔ ✘ RST flood ✔✔ ✘ UDP Flood ✔✔ ✘ HTTP Flood Application ✔✔ ✔ HTTPS Flood ✔✘ ✘ DNS Reflective ✔✔ ✘ DNS Recursive ✔✔ ✔ Slowloris Low & Slow ✔✔ ✘ R.U.D.Y. ✔✔ ✘ SSL Renegotiation Good PoorOverall Readiness

DDoS Made Transparent Management CISO We have visibility We have understand and quantified our DDoS mitigation posture We have already improved mitigation We have improved mitigation by scale by hardening our existing technology and procedures with minimal investment Management to decide on next step Per business needs we can further improve our mitigation at quantified costs Backup plan Even if decision will be negative, we have a game- plan to minimize business impact under sever attack, buying time for another management decision

“Bad new”“Good news” No one represent the customer’s genuine interest (customer is alone) Customer are looking zero-touch solution DDoS mitigation technology generally mature Many mature organization has at least one protection in place Several experienced vendors Higher Ground Perspective No DDoS simulation (“no QA”) Lack of procedures/protocols Lack of training and war games Poor POC process Effective technologies: challenge, proxy, on-demand diversion, always-on diversion Technical Perspective DDoS Mitigation Challenges