Download - Spo2 w23 a

Transcript
Page 1: Spo2 w23 a

Session ID:

Session Classification:

Page 2: Spo2 w23 a

The Information Arms Race

2

OLD ATTACKS NEW ATTACKS

• Amateurs

• Noisy

• Curious/mischievous

• Script driven

• Untargeted

• Professionals

• Stealthy

• For profit/intentional damage

• Professionally developed

• Targeted

Page 3: Spo2 w23 a

Suspect

Identify

Mitigate

Scope

Tools Fixed

Permanent Protection

Incident Response Lifecycle

3

Ener

gy E

xpen

ded

/Exp

ense

Time

Page 4: Spo2 w23 a

Incident Response Lifecycle

4

COST

Page 5: Spo2 w23 a

Incident Response Lifecycle

5

Reduced Frequency

Minimize Scope of Impact

Faster Remediation

ID the Root Attack

Page 6: Spo2 w23 a

Security Management Chaos

• Console hopping

• Manual investigation

• Waiting for answers

• Waiting for updates

• Missing what’s important

February 25, 2013 6

Page 7: Spo2 w23 a

Shortening the Process

• Intelligent recognition of threats

– Rich context, risk based analysis

• Real-time active inspection of system state

– Moving from spreadsheets and phone calls to real-time queries

• Respond with precision

– Automate key steps and surgically addressing threat

February 25, 2013 7

Page 8: Spo2 w23 a

8 Security Connected

Getting There

CAN? How?

Page 9: Spo2 w23 a

Security Maturity Model

OPTIMIZED (~4% of IT Budget on Security)

REACTIVE (~3% of IT Budget on Security)

COMPLIANT/PROACTIVE (~8% of IT Budget on Security)

TCO (CapEx + OpEx)

SECURITY POSTURE

SECURITY OPTIMIZATION

Security Connected 9

Page 10: Spo2 w23 a

Connected, Intelligent, Real Time

February 25, 2013 10

Bridge Silos

Security

Operations

Security

Analytics

Endpoint Vulnerability Management

Network

Real Time Action

Operations Analytics

Threat Intelligence Data User

Application Application

Page 11: Spo2 w23 a

LEARN QUICKLY

Turn billions of “so what” events into Actionable Information via context, content

and advanced analytics

MOVE FAST

Performance in all areas – insertion,

enrichment, queries,

dashboards, analytics – is

essential

ACT DECISIVELY

Understand common

scenarios, automate steps,

streamline processes

Security Analytics Needs

Page 12: Spo2 w23 a

External IP 1

External IP 2

HTTP File Download

Missing Something?

Verdict

Misconfiguration

Verdict:

USER ERROR

Access Denied

February: File Share Access

March: UDP

! Internal Services January: Email Sent

Page 13: Spo2 w23 a

Quarantine File, add Tag—Investigate Laptop (ePO/DLP)

System Owner in Dev. Mgrs. Access to Core IP

IP File Downloaded—Name and Extension Changed

!

Set Server and Laptop Security to High (ePO/Endpoint)

Run Scan (MVM) Quarantine Actor (NSP)

Quarantine: Source and Destination

External IP 1

External IP 2

HTTP File Download

Bad Actor !

Communication with North Korea

!

Activity Outside the Norm

!

Acting with Context

UNUSUAL PACKET SIZE

Access Denied

Core IP

Internal Services February: File Share Access

March: UDP

! January: Email Sent

Page 14: Spo2 w23 a

Intelligent Integration Example

Dynamic

Enrichment

GTI

Endpoint & SIA

Alerts

& Policy

Enforcement

ePO

Network

Alerts

&

Quarantine

NSP

Asset

Inventory &

On-demand

scan

MVM

ADM

FW

DLP

MWG

MEG

MAM

NTBA

DAM

ESM

Page 15: Spo2 w23 a

Consolidating Operations

Host IPS

Agent

Systems

Management

Agent

Audit

Agent

Antivirus

Agent

Encryption

NAC

DLP

Agent

EVERY

SOLUTION HAS

AN AGENT

EVERY

AGENT HAS

A CONSOLE

EVERY

CONSOLE

REQUIRES

A SERVER

EVERY

SERVER REQUIRES

AN OS/DB

EVERY OS/DB REQUIRES

PEOPLE, MAINTENANCE,

PATCHING

WHERE DOES

IT END?

15 Security Connected

Page 16: Spo2 w23 a

Non-Optimized Optimized

Unknown Threat

Common Security Use Cases

Non-Optimized Optimized

Consumerization of IT

Non-Optimized Optimized

Advanced Persistent Threats

Non-Optimized Optimized

Continuous Compliance

Non-Optimized Optimized

Data Protection

Non-Optimized Optimized

Next Generation Network Security

Manual Scans

Log Analysis

Managed Systems

Analysis

!

Un- managed Systems

Exposed Risk

Existing Counter-measures

IPS FW

AV

Priority

Next Steps

Protection Status

Vulnerable Systems

IPS AV

Patch/ Updates

IPS FW

AV

Policy Config

IPS

FW

AV

Contact Vendor

IPS

FW AV

Monitor

Ops Team

Ops Team

Contact Vendor

Policy Config

Patch

!

Recomm- endations

Situational Awareness

Monitor

16 Security Connected

Page 17: Spo2 w23 a

Streamlining Security Management

February 25, 2013 17

AUTOMATIC,

INTELLIGENT,

CONNECTED

• Drastically shorten time to respond and improve visibility

• Actionable intelligence through contextual SIEM

• The answers you need….Now


Top Related