threat hunting and incident response with fireeye - …...agenda •about cs computer systems...

14
Threat hunting and incident response with FireEye Jure Šimundić CS Computer Systems RiSK Conference 2019, Laško

Upload: others

Post on 21-May-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

Threat hunting and incident response with FireEye

Jure Šimundić

CS Computer Systems

RiSK Conference 2019, Laško

Page 2: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

Agenda

• About CS Computer Systems

• Security Timeline

• Threat Hunting and Incident Response

• FireEye technology

• FireEye processes & FireEye people

• FireEye EcoSytem

Page 3: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

CS Computer Systems

• 30 years on the market

• 150 employees

• 500 certificates

• 18 mil EUR annual revenue

• IT Service Provider and System integrator

• Security Solutions

• Computer Solutions

• Communications Solutions

• Audio and Video Solutions

• CRM and Digital Marketing

Page 4: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

Security Customers

• Government

• Finance

• Telco & Communications

• Energy

• Industry

• Media

Page 5: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

Vendors

Computer Solutions HP,IBM,NetApp,Lenovo,Microsoft,RedHat,Vmware

Communications Cisco,HP,Juniper,BrandRex

SecurityFireEye,F5,CheckPoint,Imperva, Exabeam,IBM,

TrendMicro,Kaspersky,Forcepoint,CISCO,Tenable,

ReversingLabs

Audio&Video Avid,Harmonic,Evertz, Aviion

CRM, Digital Marketing OracleSiebel

Page 6: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

Securitytimeline

Capability

Time

SIEM

monitoring

Response

Capability

ThreatIntel&

DataAnalytics

Antivirus

Firewall

IDS/IPS

NextGenFirewall

SIEM

AdvancedThreatProtection

ThreatDetectionandResponse

LogAnalytics

On-DemandCIRTservices

Forensics

IncidentResponse

ThreatIntelSubscription

APThunting

Page 7: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

Threat Hunting and Incident Response

People

Processes

Technology

with …

FireEye

Page 8: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

FireEye Technology

Page 9: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

FireEye People & Processes

AXHX

CM

IA

SOC

Threat

Intelligence

Managed

Defense

Education

& Processes

Security

operations

platform

FaaS

Mandiant Helix

iSight

Page 10: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

FireEye EcoSystem

Page 11: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

Questions, vprašanja, pitanja

FaaS

Mandiant

Helix

iSight

Page 12: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

Conclusion

• Have a complete view of security:

§ educate and train peple

§ detection & prevention phase is important, but not everything

§ breaches are inevitable, sooner or later it can happen

§ be prepared for forensic analysis and incident response

§ work with a vendor that offers both detection and prevention, but can also help with forensic analysis and incident response

§ work with a partner that has the capability to help you solve the security incident, not just resell / install the technology

Page 13: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

Visit @ RiSK 2019 …

FireEye Detecting and hunting lateral movement

• Anca Holban, Senior Systems Engineer CEE

• Red Hall workshop, March 21st, 11:30 – 12:00

Page 14: Threat hunting and incident response with FireEye - …...Agenda •About CS Computer Systems •Security Timeline •Threat Hunting and Incident Response •FireEye technology •FireEye

PeopleTechnology

Processes

El fin

CSComputerSystemsPrečko1a|HR-10110Zagreb

T. +38513855855

F. +38513882555

W. www.cs.hr

E. [email protected]