Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

Similar documents
Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

May the (IBM) X-Force Be With You

The New Era of Cognitive Security

Integrated, Intelligence driven Cyber Threat Hunting

Fabrizio Patriarca. Come creare valore dalla GDPR

Cyber Resilience. Think18. Felicity March IBM Corporation

IBM MaaS360 Kiosk Mode Settings

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

Be effective in protecting against the cybercrime

ISAM Federation STANDARDS AND MAPPINGS. Gabriel Bell IBM Security L2 Support Jack Yarborough IBM Security L2 Support.

Ponemon Institute s 2018 Cost of a Data Breach Study

Cyber Resiliency. Felicity March. May 2018

BigFix 101- Server Pricing

ISAM Advanced Access Control

Let s Talk About Threat Intelligence

Securing global enterprise with innovation

IBM Guardium Data Encryption

Modern Realities of Securing Active Directory & the Need for AI

Notice on Names and Logos Used in This Presentation

IBM Security Network Protection Solutions

Healthcare Cognitive Security

Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER

How to Secure Your Cloud with...a Cloud?

BigFix Query Unleashed!

Are we breached? Deloitte's Cyber Threat Hunting

MITIGATE CYBER ATTACK RISK

Combatting advanced threats with endpoint security intelligence

SWD & SSA Updates 2018

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Predators are lurking in the Dark Web - is your network vulnerable?

The McGill University Health Centre (MUHC)

RSA NetWitness Suite Respond in Minutes, Not Months

Symantec Security Monitoring Services

IBM Application Security on Cloud

2017 Annual Meeting of Members and Board of Directors Meeting

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

MSS VSOC Portal Single Sign-On Using IBM id IBM Corporation

Brussels. Cyber Resiliency Minimizing the impact of breaches on business continuity. Jean-Michel Lamby Associate Partner - IBM Security

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Cisco Security: Advanced Threat Defense for Microsoft Office 365

GUIDE. Navigating the General Data Protection Regulation Mini Guide

Continuous Diagnostics and Mitigation demands, CyberScope and beyond

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Optimizing IBM QRadar Advisor with Watson

Penetration testing a building automation system

RiskSense Attack Surface Validation for IoT Systems

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

SOLUTION BRIEF RSA NETWITNESS EVOLVED SIEM

Business continuity management and cyber resiliency

IBM Security Guardium: : Sniffer restart & High CPU correlation alerts

Analyzing Hardware Inventory report and hardware scan files

Panelists. Moderator: Dr. John H. Saunders, MITRE Corporation

CYBER SOLUTIONS & THREAT INTELLIGENCE

Accelerating growth and digital adoption with seamless identity trust

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

Identity Governance Troubleshooting

SIEM Solutions from McAfee

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

Deploying BigFix Patches for Red Hat

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Protecting your next investment: The importance of cybersecurity due diligence

McAfee Endpoint Threat Defense and Response Family

ForeScout ControlFabric TM Architecture

Cyber Threat Landscape April 2013

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Incident Response Services

IBM BigFix Compliance

AUTHENTICATION. Do You Know Who You're Dealing With? How Authentication Affects Prevention, Detection, and Response

Junction SSL Debugging With Wireshark

RSA INCIDENT RESPONSE SERVICES

CYBER FRAUD & DATA BREACHES 16 CPE s May 16-17, 2018

Introduction to IBM Security Network Protection Manager

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

RSA INCIDENT RESPONSE SERVICES

Gujarat Forensic Sciences University

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Staying GDPR Ready with MaaS360. Ankur Acharya Offering Manager, IBM MaaS360

Comprehensive Database Security

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

You ve Been Hacked Now What? Incident Response Tabletop Exercise

Assessing Your Incident Response Capabilities Do You Have What it Takes?

Symantec Advanced Threat Protection: Endpoint

with Advanced Protection

align security instill confidence

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

The Resilient Incident Response Platform

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

IBM Cloud Lessons Learned: VMware Cloud Foundation on IBM Cloud VMworld 2017 We are a cognitive solutions and cloud platform company that leverages th

DHS Cybersecurity: Services for State and Local Officials. February 2017

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak

Best Practices in Securing a Multicloud World

AKAMAI CLOUD SECURITY SOLUTIONS

Copyright 2016 EMC Corporation. All rights reserved.

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

CYBER RISK MANAGEMENT: ADDRESSING THE CHALLENGE SIMON CRUMPLIN, FOUNDER & CEO

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Transcription:

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

Agenda Welcome Threat Intelligence EcoSystem Cyber Resiliency Life Cycle Questions KEVIN ALBANO IBM X-FORCE IRIS Global Threat Intelligence Leader Exploits have an average life span of A. 2 years B. 175 days C. 6.9 years D. 9.5 years 2 IBM Security

Threat Intel Personas Doers protect their domain from relevant threats Decision makers / Influencers affect resource management in response to relevant threats Doers Watchers Watchers communicate key threats relevant to their domain Decision makers Experts Experts identify and curate threat information from around the globe 3 IBM Security

Responsibility Timeline Steady State Early Event Peak Event Late Event Steady State Field Questions Prioritize Determine if the threat is new or known Start deconfliction as new data comes in Experts Triage new data For new threat, write rule Write report Update decision makers Publish report Give presentations about detections Doers Ingest/Normalize data Check for observable Collect more data Ingest/Normalize data Questions about chatter Going on TV Review Report Watchers Core intel requirements Do I have the appliance I need to detect Compare answers Decision makers/ Influencers Media breaks news 4 IBM Security

Reality Timeline Phishing Email Credentials Stolen Database Stolen Encrypted Communication Law Enforcement Calls CEO Twitter Sentiment Falls Update C-Level Executives Insider? Victim? Validate Altered Financial Reports Response Website Legal Deposition Malware Deployed Remote Access to Network Additional Compromises First Public Indicator Stock Price Falls Press Conference Forensic Research Notify Customers & Partners Board of Directors Meeting Regulation Authority Investigation Media breaks news 5 IBM Security

The Attack Chain BREAK-IN LATCH-ON EXPAND GATHER OBJECTIVE 1 2 3 4 5 PEOPLE The right level of expertise to handle advanced attacks Respond quickly and efficiently; onsite and / or remotely Understand business process and security requirements Focused on protecting a clients intellectual property PROCESS Controlled standards-based incident response plans Intelligence and malware analysis and reporting TECHNOLOGY Endpoint event analysis in near real-time Watson for Cybersecurity bringing cognitive solutions 6 IBM Security

Common Threat Vectors Zero-Day Attacks Exploits RAND Study have an Zero-Days, average life Thousands span of of Nights Exploits have A. 2 an years average life of 6.9 years 25% will not B. survive 175 days a year C. 6.9 years 25% will survive more than 9.5 years D. 9.5 years The median time to develop an exploit is 22 days from vulnerability discovery For organizations that stockpile vulnerabilities, approximately 5.7 percent have been discovered and disclosed by others within 1 year How Would You Respond? Ablon, Lillian and Timothy Bogart, Zero Days, Thousands of Nights: The Life and Times of Zero-Day Vulnerabilities and Their Exploits, Santa Monica, Calif.: RAND Corporation, RR-1751-RC, 2017. As of September 30, 2017: https://www.rand.org/pubs/research_reports/rr1751.html 7 IBM Security

The Cyber Resiliency Life Cycle and Organizations Today Detect unknown threats with advanced analytics See attacks across the enterprise Investigate active threats hiding inside the enterprise Detect attacks coming from outside the enterprise Protect against attacks by discovering vulnerabilities before they are exploited Disrupt malware and exploits Discover and patch systems Automatically fix vulnerabilities Zero Trust as a guiding principle of your network policy Protect Prepare Detect Recover Respond Respond to cyber outbreaks Engage cyber incident responders leveraging threat intelligence to repel the attackers Remediate the attack damage by restoring systems and closing vulnerabilities Utilize network resource to defend against outside threats Recover access to critical data and applications Rebuild mission-critical business applications Restore data from back up Prioritize network resources to speed recovery 8 Prepare a cyber resiliency plan Assess cyber resiliency readiness, process and posture Orchestrate and automate recovery workflow 8 IBM Security

ASK AWAY! Questions?

THANK YOU FOLLOW US ON: ibm.com/security securityintelligence.com xforce.ibmcloud.com @ibmsecurity youtube/user/ibmsecuritysolutions Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. Any statement of direction represents IBM's current intent, is subject to change or withdrawal, and represent only goals and objectives. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM does not warrant that any systems, products or services are immune from, or will make your enterprise immune from, the malicious or illegal conduct of any party.