threat detection & response - sans leak password guessing breach ... brand credibility landscape...

21
Threat Detection & Response Control Point Management Developing a Visibility and Measurement Platform that Manages and Improves Operations Nancy Thompson Director of Operations CYBER RISK DEFENSE CENTER

Upload: phamthuan

Post on 09-Mar-2018

222 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

Threat Detection & Response Control Point Management Developing a Visibility and Measurement Platform that Manages and Improves Operations

Nancy Thompson Director of Operations

CYBER RISK DEFENSE CENTER

Page 2: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

1 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Introduction

Log Layer

Correlation

Events

Thompson’s Dashboard

Page 3: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

2 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

NETWORK

ANTHEM

LOSS OF MEMBER TRUST

SERVER

CREDENTIALS LOSS OF TRUST

SONY LEAK

PASSWORD GUESSING

BREACH

DATA THEFT COMPROMISE PHISHING

BACK DOOR

PHISHING CRIMINAL

CYBER SECURITY COST

HEART BLEED

PERSONAL INFORMATION STOLEN ATTACK MALWARE IP ADDRESS

TARGET COMPLEXITY BRAND CREDIBILITY

Landscape

Page 4: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

© 2015 Kaiser Foundation Health Plan, Inc. CYBER RISK DEFENSE CENTER

Agenda

Approach Resulting Approach Complexity Solution Challenges Results

Page 5: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

4 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Exfiltration Escalation Infiltration Advanced Warning

Approach

System exploitation

Malware

Account hijacking

Privilege escalation

Lateral movement

Data transmission &

theft

External intel

System probes

Phishing

Account hijacking

Privilege escalation

Lateral movement

Addressing the Lockheed Martin Cyber Kill Chain®

Page 6: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

5 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Resulting Complexity

Page 7: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

6 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Solution Requirements

Process flow flexibility

Ability to add in “control points” where we needed them

Dashboards which manage work, issues & offer visibility to operations

Page 8: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

7 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Control (management) Characteristics

Control in management means setting standards, measuring

actual performance and taking corrective actions.

Solution Objective

• Control is a Continuous Process

• Control is Forward Looking

• Control Helps to Achieve the Standard

Control (management) Process

• Setting, Measuring & Comparing Performance Standards

• Analyzing Deviations

• Take Corrective Measures

Page 9: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

8 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Solution Challenges

Compliance

Risk

Governance

Page 10: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

© 2015 Kaiser Foundation Health Plan, Inc. CYBER RISK DEFENSE CENTER

Results

Page 11: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

10 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Evolution of the Threat Activity Case

December 2014 March 2015 April 2015

Page 12: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

11 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Components of Operations

• Input • Team Checklists • Non-Actionable Events • False Positives • Actionable Events • Critical Events • Incident • Child Processes

• Remediation Request • Use Case Request • Tuning Request • Policy Engineering Request

Page 13: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

12 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Team Control Point - Checklists

Customized Forms

Help Boxes

Links to Processes (ePO process in sharepoint)

Page 14: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

13 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Management Control Point - Team Conflict Escalation

If an escalation is rejected by Incident Handlers 2 or more times, leadership is notified

Page 15: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

14 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Audit Control Point - Closure and Feedback

Page 16: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

15 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Legal Control Point

Page 17: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

16 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Operations Management– Team Focused Dashboards

Page 18: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

17 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Operations Management – Leadership Dashboard

Page 19: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

18 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

Eye Candy

Page 20: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

19 © 2015 Kaiser Foundation Health Plan, Inc. Technology Risk Office CYBER RISK DEFENSE CENTER

What’s Next

Input Work Integrations

Dispatch System Integration

Dynamic Visualization Tools

Page 21: Threat Detection & Response - SANS LEAK PASSWORD GUESSING BREACH ... BRAND CREDIBILITY Landscape . ... Audit Control Point - Closure and Feedback

© 2015 Kaiser Foundation Health Plan, Inc. CYBER RISK DEFENSE CENTER

Questions?

“Thompson, great job…you’ve delivered the wedding cake!”