2010 hewlett-packard1 cyber defense alexandar alexandrov

17
2010 Hewlett-Packard 1 CYBER DEFENSE Alexandar Alexandrov

Upload: karson-cooter

Post on 15-Jan-2016

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard1

CYBER DEFENSE

Alexandar Alexandrov

Page 2: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard2

CYBER SECURITY

President Barack Obama,May 29, 2009

“Our technological advantage is a key …. But our defense and military networks are under constant attack. .... Indeed, in today's world, acts of terror could come not only from a few extremists …but from a few key strokes on the computer -- a weapon of mass disruption. ... it's now clear that this cyber threat is one of the most serious economic and national security challenges we face as a nation.”

Page 3: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard3

OPERATING KPIs--------------------------------PROCESS/FUNCTION

OPERATING KPIs--------------------------------PROCESS/FUNCTION

EXECUTIVE KPI(Direction)

CORE FINANCIAL KPI(Direction)

EXECUTIVE KPI(Direction)

CORE FINANCIAL KPI(Direction)

INFORMATION ASSURANCE

INFORMATION ASSURANCE

EFFICIENCY

---------------

EFFICIENCY

---------------

TRUST

TRUST OUTCOMES

---------

OUTCOMES

---------

• Incidents / Attacks Prevented• Infrastructure Protection • Access to Services

• Incidents / Attacks Prevented• Infrastructure Protection • Access to Services

• Services delivered quickly• Agencies operate within budgets• Leverage Technology

• Services delivered quickly• Agencies operate within budgets• Leverage Technology

ULTIMATE BUSINESS GOAL PUBLIC VALUE IN NATIONAL SECURITY: CYBERSECURITY

BUSINESSINITIATIVES(Strategy/Priority Language)

BUSINESSINITIATIVES(Strategy/Priority Language)

HP SOLUTION: Cybersecurity

Reduce Network Intrusions/ Internet

Crime

Improve Incident

Response

Increase IT Efficiency

and Effectiveness

Capital Investment

Management

Develop Intelligence Capabilities

Reduce Network Attacks / Internet Crime Rates

Risk Assessments / Awareness

_______________

Forensics / Law Enforcement

Improve Incident Response

______________Detection, Response,

Recovery

Reduce IT Operating Costs

______________

Budget, Capital, HR, Procurement, Training

Prevent Critical System Intrusions

__________Cyber Security

Intelligence

PUBLIC VALUE NATIONAL SECURITY

Budget, Labor,

Operating Cost

Management

• Strengthen Security and Resilience at Home• Secure Cyberspace• Critical Infrastructure Protection

• Strengthen Security and Resilience at Home• Secure Cyberspace• Critical Infrastructure Protection

• Coordinate with Emergency Mgt., Public Safety / Justice Agencies

• Coordinate with Emergency Mgt., Public Safety / Justice Agencies

Citizen’s Trust:• Privacy• Civil Liberties• Protection /

Security • Gov’t

Transparency

Citizen’s Trust:• Privacy• Civil Liberties• Protection /

Security • Gov’t

Transparency

Identity / Access

Management

Network / Datacenter

Security

Security Operations

Business Continuity / Recovery

Risk Management / Compliance

Application / Data Security

Page 4: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard4

Stakeholders The Source of the Threat What’s at Risk

THE THREAT

– Military, Intelligence, Homeland Security

– Federal, state, local and tribal governments

– Businesses & Consumers

– Nation states

– Ideological Movements

– Organized Criminal Elements

– Fame Seekers

– Industry Competitors

– Insiders

– Merely Curious

– Economic security

– National security

– Competitive Advantage

– Public safety

– Personal Information, intellectual property, privacy

– Critical infrastructure (e.g. power grids, transportation)

Page 5: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard5

HP SECURITY SERVICES

Delivering on your mission with confidence

Cyber Control to Achieve

Mission

Mission Integration

Cyber Dominance

Situational Awareness

Informed Decision Making

Cyber/Network Analytics & Prediction

Page 6: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard6

– Proven integrated building blocksCOMPREHENSIVE CYBER SECURITY SERVICES PORTFOLIO

Application Security: Services for testing applications (including vulnerability assessment and penetration testing) and for building security and privacy controls into applications

Data & Content Security: Services for data encryption, key management, data loss prevention, secure e-mail, and web content filtering

End Point Security: Services including anti-virus, anti-spyware, mobile device security, and host intrusion detection & prevention

Network Security: Services for protecting the network, including firewalls, wireless security, remote access, network access control, etc.

Data Center Security: Security services for servers, storage, virtualization, and cloud computing

Risk Management & Compliance: Services to train clients in security policies and procedures, to measure and manage risk, to define appropriate security controls and governance, and to achieve and sustain compliance

Security Operations: Services for managing security events including log management, security incident response, reporting and root cause analysis

Business Continuity & Recovery: Services for ensuring the continuity of IT-based business processes

Identity & Access Management: Services for establishing authentication and authorization of user access to business assets

Research & Development: Working with clients to develop next generation approaches to cyber security.

Research & Developme

nt

Page 7: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard7

HP SECURITY SERVICES PORTFOLIO

1. Application Penetration Testing2. Application and Code Testing/Scanning3. Web Application Security Assessments4. Web Application Penetration Testing5. Web Application Firewalls6. SOA Security7. SAP Security8. Middleware & Mainframe Security9. Midrange/Server Security

1. Web Content Filtering2. Email Security

1. Disk/File Encryption2. Database Security 3. Data Loss Prevention4. Enterprise Rights Management5. PKI6. Key Management

1. End Point Threat Mgmt (AV, AS, HIDS, Personal F/W)

2. End Point Application & Device Control

3. Host Intrusion Detection & Prevention Services

4. Mobile Device Security

1. Network Intrusion Detection & Prevention Services

2. Adaptive Network Architecture3. Managed Firewall4. VPN, UTM 5. Network Access Control6. Wireless Security7. Managed Proxy / Cache / Filtering

1. Server Threat Management2. Storage Security3. Virtualization Security4. Cloud Computing Security5. Fusion Center

Page 8: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard8

HP SECURITY SERVICES PORTFOLIO

1. IT Governance, Risk & Compliance (GRC)

2. eDiscovery & Archiving3. Customer Specific Training and

Awareness4. Operational Risk and Exceptions to

Policy5. Account Delivery Continuity6. ISO 27001 Certification7. Information Risk Advisory Service8. PCI Compliance Scanning9. PCI Managed Compliance10. C & A: NIST SP 800-3711. C & A: DIACAP12. SCADA/Process Control System

Security Assessment13. NERC CIP Design, Audit and

Implementation14. IV&V Test and Evaluation15. Compliance Assessments16. Threat & Risk Assessments17. MCSS Capabilities

1. PKI Management2. Token Management3. Managed Remote Access4. Directory Services5. Meta & Virtual Directory6. Active Directory7. User administration8. IDAM - Current State Assessment9. IDAM - Architecture Blueprint10. IDAM Design & Implement11. Web SSO 12. Federation13. Provisioning14. E-SSO15. Risk Based Authentication16. PAM Management

Page 9: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard9

HP SECURITY SERVICES PORTFOLIO

1. Enterprise Security Information & Event Management

2. Log Management3. Compliance Management4. Security Dashboard5. System Hardening Services6. Security Incident Response7. Forensics8. Threat Monitoring & Alerting9. Live Network Service10. Vulnerability Scanning11. Vulnerability Detection & Management

Services12. Security Configuration Management13. Global Security Operations Centers

(GSOC)14. Mainframe Platform/OS Security15. Midrange/Server Platform/OS Security

1. Research, Development, Test & Evaluation services

2. DARPA, IARPA and Military Department research agency opportunity

3. DOE National Labs support4. NMCI Research & Analysis

capabilities and support5. Large comprehensive cyber

security pursuits

Page 10: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard10

VULNERABILITY ASSESSMENT SERVICES

Network Assessments (Internet & Intranet)– Network Vulnerability Scanning (State of Art Tools)– Network Penetration Testing– System and Host Vulnerability Testing (White Box & Black Box)– Wireless Network Surveys and Penetration Testing

Application Assessments (COTS and Custom)– Application Development Life Cycle Security Gap Analysis– Application Development/Design Training– Application Code Analysis (From C to Cobol)– Application Cyber Red Team– Application Automated Vulnerability Scanning (Web & Database)– Application Regression Testing– Independent Validation and Verification (IV&V)

Page 11: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard11

HP COMPREHENSIVE APPLICATIONS THREAT ANALYSIS

Fast Facts:

– 40,000 vulnerabilities in National Vulnerabilities Database

– Estimate 800,000 vulnerabilities not yet exploited

– Vulnerabilities patched late cost some 30X more that those patched early

– “70%+ of all successful attacks have exploited application vulnerabilities” (Gartner, Microsoft)

– Typical security audits find ~20 issues, uncovering dozens or hundreds of vulnerabilities

– One action which avoids a single data breach pays for itself 100 fold

Services & Solutions:– Security Requirements Gap Analysis– Architectural Threat Analysis

HP’s industry-leading highly efficient and effective security quality assessment. This service is designed to greatly reduce the problem of latent security defects reducing TCO.

Page 12: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard12

HP ASSURED IDENTITYTM PLUS SERVICESEnd-to-end

Security Solutions

Business Readiness Workshop

Detailed Design & Architecture

Implementation

Run

Industry Frameworks

Strategic & Technology Partnerships

Services Offered

Strategy & Roadmap

Assessment Service

Audit Compliance & Validation

Assured Identity ManagementTM

Gate SecureTMAssured Identity TM

Fed SecureTM

Page 13: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard13

HP Assured IdentityTM Plus

Assured Identity™

–Credential Enrollment

–Credential Issuance

–FIPS 201 Compliance

–PIV.XX Support

Gate Secure™

–Physical Security

–Automated PACS provisioning system

–New, single use, common credentials across multiple agencies

Fed Secure™

–Federation in a Box

–Cross Credentialing

–Federation Broker

–Access Management Services

Assured Identity Management™

–Life Cycle Management

–User Provisioning

–Workflow

–Delegated Admin

–Self-Service

Consulting Services

Page 14: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard14

CROSS INDUSTRY EXPERIENCE

HealthcareGovernment

Communications, Media &

Entertainment

Consumer Industries and

Retail Financial Services

Manufacturing

Energy

Transportation

• Deep HP Security experience in all industries• Industry focused security consultants

We serve/manage critical cyber infrastructures across all US Critical Infrastructure/Key Resource sectors

Page 15: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard15

HP Personnel Dedicated to Cyber Security

– Over 2,500 cyber security professionals worldwide

– Includes specialists for advisory and consulting engagements

– Certified security staff with CISSP, CISM, CAP, CIS, CSSLP or GSEC

Page 16: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard16

INAILIPZS

Minesterio di Grazia e Guist

Ministro Pubblica Intruzione

INAILIPZS

Minesterio di Grazia e Guist

Ministro Pubblica IntruzioneState of California

City of AnaheimState of Michigan

State of OhioCommonwealth of

Pennsylvania

State of CaliforniaCity of Anaheim

State of MichiganState of Ohio

Commonwealth of Pennsylvania

Consulting ATPConsulting ATP

South Australian GovernmentSouth Australian Government

Federal ReserveWorld Bank

Federal ReserveWorld Bank

European Space AgencyEuropean Space Agency

Alberta Sustainable Resource Div.BC Ministry of LabourBC Ministry of Provincial Revenue & Citizen Services Edmonton DeliveryPWGSC – Pension ModernizationGovernment of Manitoba

Alberta Sustainable Resource Div.BC Ministry of LabourBC Ministry of Provincial Revenue & Citizen Services Edmonton DeliveryPWGSC – Pension ModernizationGovernment of Manitoba

Tax Administration Service of Mexico (SAT)

Tax Administration Service of Mexico (SAT)

Sweden PostSweden Post

UK Ministry of DefenceUK Dept. For Work & Pensions

UK Justice &Offender Management

UK Ministry of DefenceUK Dept. For Work & Pensions

UK Justice &Offender Management

Israel Ministry of JusticeIsrael Ministry of Justice

IDA of SingaporeIDA of Singapore

Ministry of the Flemish Gov’t.

Ministry of the Flemish Gov’t.

Spanning all Tiers of Government in 83 countries with >3,500 government accounts

GLOBAL REACH AND SUPPORTTop 50 Accounts US Dept. of Defense

US GovernmentComptroller of the CurrencyDefense Logistics AgencyUS Dept. of AgricultureUS Dept of JusticeUS Dept. of EducationUS Dept. of EnergyUS Dept. of Health & Human ServicesUS Dept. of Homeland SecurityUS Dept. of Housing & Urban DevelopmentNHIC/ MedicareUS Dept. of TreasuryDept. of the ArmyDept. of the NavyDept . Of Veterans AffairsDFASDISAUS PostalFood & Drug AdministrationSocial Security AdministrationUS Dept. of State

US Dept. of DefenseUS GovernmentComptroller of the CurrencyDefense Logistics AgencyUS Dept. of AgricultureUS Dept of JusticeUS Dept. of EducationUS Dept. of EnergyUS Dept. of Health & Human ServicesUS Dept. of Homeland SecurityUS Dept. of Housing & Urban DevelopmentNHIC/ MedicareUS Dept. of TreasuryDept. of the ArmyDept. of the NavyDept . Of Veterans AffairsDFASDISAUS PostalFood & Drug AdministrationSocial Security AdministrationUS Dept. of State

Page 17: 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov

2010 Hewlett-Packard17

Q&A