discover, analyze, remediate...sql injection watering hole physical access third-party malware...

35
Discover, Analyze, Remediate

Upload: others

Post on 06-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Discover, Analyze, Remediate

Page 2: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

The NanjgelCyber Security

Framework

Jude Pereira

Managing Director

Nanjgel Solutions FZ-LLC

Page 3: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates
Page 4: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates
Page 5: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

We are in an era of continuous breaches

Operational Sophistication

Year of the Security Breach

Near Daily Leaks of Sensitive Data

40% increase in reported data

breaches and incidents

Relentless Use of Multiple Methods

500,000,000+ records were leaked, while the future

shows no sign of change

2013 2014 2015

SQL injection

Watering hole

Physical access

MalwareThird-party software

DDoSSpear phishing

XSS Undisclosed

Attack types

Page 6: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

SQL injection

Watering hole

Physical access

MalwareThird-party software

DDoSSpear phishing

XSS Undisclosed

Attack types

Note: Size of circle estimates relative impact of incident in terms of cost to business

2013Year of the breach

201440% increase

2015500,000,000+ records breached

The era of continuous breaches carry on…

Page 7: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Bring your own IT

Social business

Cloud and virtualization

1 billion mobile workers

1 trillion connected

objects

Innovative technology changes everything

Page 8: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

PARADIGM SHIFT In Crime

Page 9: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Today’s challenges

Escalating Attacks Increasing Complexity Resource Constraints

• Increasingly sophisticated attack methods

• Disappearing perimeters

• Accelerating security breaches

• Constantly changing infrastructure

• Too many products from multiple vendors; costly to configure and manage

• Inadequate and ineffective tools

• Struggling security teams

• Too much data with limited manpower and skills to manage it all

• Managing and monitoring increasing compliance demands

Spear Phishing

Persistence

Backdoors

Designer Malware

Page 10: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates
Page 11: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

IT Security Challenges

11

Security products are silos.

Human beings are needed to compensate for lack of automation.

SecOps teams are overwhelmed and cannot respond

in timely fashion.

Firewall SIEM ATD VA Endpoint Patch EMM

IBMIBM

“70 to 90 percent of all malicious incidents could have been prevented or found sooner if existing logs and alerts had been monitored”

Verizon Data Breach Investigations Report

“Average time to contain a cyber attack is 31 days”

Ponemon Institute “2014 Global Report on the Cost of Cyber Crime”

Fragmented security

lets attackers in

Page 12: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Yesterday’s practices are not working

$3.5M+

45 vendors

85 tools fromAverage cost

of a data breach

Page 13: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Your security team sees noise

13

Page 14: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates
Page 15: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates
Page 16: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Security Intelligence –Core Functionality for Cyber Security

Page 17: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates
Page 18: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Our Approach

INTELLIGENCE

Use insightsand analytics

to identifyoutliers

INTEGRATION

Develop an integrated approach tostay ahead

of the threat

INNOVATION

Use cloudand mobilefor bettersecurity

Page 19: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

”More Context” means more Integration

Page 20: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Integration” means easier & more comprehensive

Page 21: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Establish Security as a System

Page 22: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Establish Security as an Eco-System

Page 23: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

NETWORK SECURITY

APPLICATION SECURITY

DATA SECURITYENHANCED

USER SECURITY

ENDPOINT SECURITY

Cross-domain Analytics, Reporting, Forensics and Management Capabilities

Security IntelligenceInformation and event management, Advanced correlation

and deep analytics, External threat research

Our Methodology

Page 24: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

What we need to do ?

Visibility Get full visibility into your Environment, Understand what is happening & what is not.

DetectExternal & Internal Threats, Vulnerabilities, User Activity, Loss of System and personal or sensitive Data.

ReportProvide evidence in investigation, Historic & Real Time Data gathering.

Page 25: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

What we else also do ?

Respond Virtual Firewalling, Data Protection, Block Access, Turn off switch Port , Notification.

RemediateIncident management, Open Trouble Ticket, Self Remediation, Integration with 3rd Party tools

Page 26: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

SANS 20 CRITICAL CONTROLS

Page 27: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

NIST – CYBER SECURITY FRAMEWORK

Page 28: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

NANJGEL AUTOMATED CYBER SECURITY FRAMEWORK

Page 29: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Infrastructure

• NGFW• NG IPS• IPS/IDS• Email GW• Web GW• Anti Malware• Anti Phishing• NAC• Virtual Patching

• Database Activity Monitoring

• Database Vulnerability• Encryption• Data Masking• Data Redaction• Data Loss Prevention• IRM/ DRM

• Endpoint Management• Device Control• HDLP• Encryption• TFA• Malware Protection• Fraud Protection• Power Management

• Dynamic/ Static Scans• App Source Code

Review• App Vulnerability Scan• Web Application FW• Pen Testing

Hardware Enhanced

Security

Network Data Endpoint Application

Identity Access Management Privilege Management Session Recording Single Sign-On (SSO) Access ControlIdentity / Privileged

Management

Behavior Analysis Vulnerability Scans ForensicsAnalytics

Security Information & Event ManagementRisk & Compliance

Mgmt

Automated Framework Architecture

IT- Governance, Risk & ComplianceGRC

Page 30: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Cyber Analytics – Using IBM QRadar

Page 31: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Cyber Security Automation – EVAS – ForeScout

Page 32: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Automated End User Risk Analysis

Page 33: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

Automated Global Threat Intelligence

Page 34: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates

About Us

We lead the way in a

different approach to information

security

Established in 2005providing IT

SecuritySolutions

Presence in Middle East , Europe &

India with over 12 strategic partners

& alliances

Long standing customer

relationships across all verticals

We provide next generation IT solutions for

secured business operations

Page 35: Discover, Analyze, Remediate...SQL injection Watering hole Physical access Third-party Malware software Spear DDoS phishing XSS Undisclosed Attack types Note: Size of circle estimates