Big Data & Security Analytics. David J. White February 2016

Similar documents
INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Virus Outbreak

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

AT&T Endpoint Security

Compare Security Analytics Solutions

Security. Made Smarter.

CloudSOC and Security.cloud for Microsoft Office 365

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

SIEM: Five Requirements that Solve the Bigger Business Issues

THE RSA SUITE NETWITNESS REINVENT YOUR SIEM. Presented by: Walter Abeson

RSA NetWitness Suite Respond in Minutes, Not Months

SentryWire Next generation packet capture and network security.

SentryWire Next generation packet capture and network security.

Agile Security Solutions

Changing face of endpoint security

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

External Supplier Control Obligations. Cyber Security

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Cisco Firepower NGFW. Anticipate, block, and respond to threats

CipherCloud CASB+ Connector for ServiceNow

Cybersecurity Auditing in an Unsecure World

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Unlocking the Power of the Cloud

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Threat Containment and Operations. Yong Kwang Kek, Director of Presales SE, APJ

Security Operations & Analytics Services

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

MAKING THE CLOUD A SECURE EXTENSION OF YOUR DATACENTER

RSA INCIDENT RESPONSE SERVICES

Total Threat Protection. Whitepaper

STAY ONE STEP AHEAD OF THE CRIMINAL MIND. F-Secure Rapid Detection & Response

RSA Security Analytics

with Advanced Protection

Office 365 Buyers Guide: Best Practices for Securing Office 365

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

TRUE SECURITY-AS-A-SERVICE

Key Technologies for Security Operations. Copyright 2014 EMC Corporation. All rights reserved.

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Ο ρόλος της τεχνολογίας στο ταξίδι της συμμόρφωσης με τον Γενικό Κανονισμό. Αντιγόνη Παπανικολάου & Νίκος Αναστόπουλος

Automated Threat Management - in Real Time. Vectra Networks

WHITE PAPER. Operationalizing Threat Intelligence Data: The Problems of Relevance and Scale

SYMANTEC DATA CENTER SECURITY

You ve Been Hacked Now What? Incident Response Tabletop Exercise

GDPR: Get Prepared! A Checklist for Implementing a Security and Event Management Tool. Contact. Ashley House, Ashley Road London N17 9LZ

Understanding Network Access Control: What it means for your enterprise

Transforming Security from Defense in Depth to Comprehensive Security Assurance

CS 356 Operating System Security. Fall 2013

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

MESSAGING SECURITY GATEWAY. Solution overview

CYBERBIT P r o t e c t i n g a n e w D i m e n s i o n

BUILT FOR THE STORM. AND THE NORM.

Technical Brochure F-SECURE THREAT SHIELD

Security analytics: From data to action Visual and analytical approaches to detecting modern adversaries

Symantec Advanced Threat Protection: Endpoint

Cisco Firepower NGFW. Anticipate, block, and respond to threats

2018 Edition. Security and Compliance for Office 365

Information Security Controls Policy

Cisco Stealthwatch Improves Threat Defense with Network Visibility and Security Analytics

Security Diagnostics for IAM

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Cloud Security & Advance Threat Protection. Cloud Security & Advance Threat Protection

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

Cisco Cloud Security. How to Protect Business to Support Digital Transformation

Copyright 2011 Trend Micro Inc.

Cisco Security: Advanced Threat Defense for Microsoft Office 365

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Scrutinizer Flow Analytics

Artificial Intelligence Drives the next Generation of Internet Security

Defending Against Unkown Automation is the Key. Rajesh Kumar Juniper Networks

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

Machine-Powered Learning for People-Centered Security

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

1110 Cool Things Your Firewall Should Do. Extend beyond blocking network threats to protect, manage and control application traffic

Security and Compliance for Office 365

Isla Web Malware Isolation and Network Sandbox Solutions Security Technology Comparison and Integration Guide

Security Automation. Challenge: Automatizzare le azioni di isolamento e contenimento delle minacce rilevate tramite soluzioni di malware analysis

CIS Controls Measures and Metrics for Version 7

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

VARONIS CASE STUDY. Kirton McConkie. A Financial Services Design And Distribution Firm

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER

BREACHES HAPPEN: BE PREPARED. Endpoint Detection & Response

Course Outline. CCNA Cyber Ops SECOPS Official Cert Guide (Course & Labs)

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

The Internet of Everything is changing Everything

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

TRUSTED IT: REDEFINE SOCIAL, MOBILE & CLOUD INFRASTRUCTURE. Ralf Kaltenbach, Regional Director RSA Germany

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

First Look Showcase. Expanding our prevention, detection and response solutions. Marco Rottigni Chief Technical Security Officer, Qualys, Inc.

ForeScout CounterACT. Continuous Monitoring and Mitigation. Real-time Visibility. Network Access Control. Endpoint Compliance.

CYBERSECURITY RISK LOWERING CHECKLIST

Security Information & Event Management (SIEM)

BT Compute Protect Schedule to the General Terms

Transcription:

Big Data & Security Analytics David J. White February 2016 AlixPartners, LLP 2013

Introduction David J. White Director, Information Management Services - AlixPartners, LLP +1.213.437.7147 dwhite@alixpartners.com www.alixpartners.com David is a Director in the Data Privacy, Security, and Information Governance practice group at AlixPartners. His practice focuses on issues regarding Information Lifecycle Governance with a particular focus on global data privacy and security. He has over two decades of experience assisting corporations to implement compliant privacy & security programs. Prior to joining AlixPartners, he was a Partner in the Commercial Litigation practice group at a top AmLaw100 law firm. David is a certified Six Sigma Green Belt, and Certified Information Privacy Professional (CIPP/E/US), and a registered US Patent Attorney. He also holds a U.S. Juris Doctorate degree and a an LL.M. from London University. 2

2015: 79,000 Security Incidents & 2,122 Confirmed Breaches 3

Increasingly Complex Environments Compound Problem IoT BYOD Social Media Partner Integration Migration to Cloud and Hosted Environments Virtualization Encryption 4

Traditional Security Isn t Enough Virus, Malware, and Spyware Scanning Endpoint Security Personal firewalls Spam filtering URL filtering Application controls File integrity monitoring Intrusion Prevention Systems Secure Mail and Web Gateways Network Behavior Analysis Data Loss Prevention Systems Security Information and Event Management (SIEM) 5

Guarding the Perimeter is No Longer Practical 6

A Simple Truth No matter how hard you try or how much money your organization spends, your network will be compromised at some point and it probably already has been. 7

Big Data Big Solution? 8

What is Big Data A New Ginormous Black Box Data System that is Scary.VERY Scary! 9

What is Big Data Just Another Name For The Same Data Analytics We Have Always Done Just With Bigger Data Sets. Why Worry! 10

What is Big Data Four V s: Volume, Velocity, Variety, & Veracity 11

What is Big Data A Computational Ecosystem Comprised Of Specialized File Systems, Programs, And Algorithms Used To Extract Actionable Intelligence From Disparate Data Sources Without The Need To Make The Source Data Conform To A Predefined Tabular Format Of Columns And Rows 12

Big Data - A Short History Massive Growth in Data in Past Decade BD Build to Address Needs to Process Massive Amounts of Data Very Quickly Google Wanted to Index the Internet Input Coming From Large Diversity of Sources and Formats Traditional Data Systems Not Equipped to Handle Volume or Processing Speed 13

What's Wrong with Traditional RMDB Hardware is Slow and Expensive Data Must Be Uniform and Made to Conform to Predefined Structures Before Loading Requires Predefined Relationships Between Data Objects/Elements Query Language Not Very Flexible or Powerful Output is Slow 14

Big Data Is born 2005 Hadoop Designed to Address These Exact Issues Not Just Distributed Array of Hard Drives (RAID) New File System Built To Access Massive Arrays of Raw Format Data Files No Need to Cram Internet Into Massive Structured Data Tables More Akin to Book Index Broken Across Large Numbers of Small Files Google is Now More Than 1 Million Petabytes in Size and Processes More Than 24 Petabytes of Data a Day 15

Key Technical Differences FILE Level Differences VS. Structured Relational Database A Large Array of Unstructured Data 16

Key Technical Differences FILE Level Differences VS. Structured Relational Database Large Array of Unstructured Data 17

Key Technical Differences 18

Key Technical Differences Application Layer Output 19

What Does This Mean? ETL VS ELT Extract Predefined Requirements Transform Traditional RDBS Limited Data Sets Based on Needs Preplanned Updates Driven by Business Rules & Requirements Significant Cleansing& Validation Data Normalized to Fit Predefined Structure LOAD Clean Normalized Data to System Extract Theoretically ALL Source Data Data With No Yet Known Purpose Load All Data Big Data System Bulk Data Sets or Live Streams No Cleansing or Normalization Needed Whenever Available & Ready Transform Only as Needed During Analysis Schema on Write vs Schema on Read 20

Impact On Security http://www.ibmbigdatahub.com/infographic/four-vs-big-data 21

How It Works for Security Analaytics Computer network Equivalent Of A Closed circuit Security Camera System Always On 24/7 Captures And Analyzes Data (Including Packet Header And Payload, OSI Layers 2 Through 7) At Wire Speed Provides Complete, Forensically Sound Record Of All Network Activity Real time & Back in time Analysis of Files, Applications, Flows, and Packets 22

Big Data and Security - Typical Internal Sources All IP traffic flowing across your network, including web traffic, email, file transfers, and IoT traffic Network flow records (such as NetFlow, cflow, jflow, and sflow) from network routers and switches VM to VM (virtual machine to virtual machine) IP traffic on VMware, Xen, and other virtualization platforms User account directories, such as Microsoft Active Directory and LDAP Detonation and behavioral analysis result feeds from malware analysis appliances 23

Big Data and Security - Typical External Sources Cyberthreat and reputation feeds, such as Emerging Threats, Google Safe Browsing, Malware Domain List, SANS Internet Storm Center, SORBS (Spam and Open Relay Blocking System), VirusTotal, and other spam or IP address blacklists IP geolocation services, such as Digital Envoy, Geobytes, MaxMind, and Quova Website intelligence services, such as DomainTools, Robtex, and the global domain registry database 24

External Source Use - Geolocation Analytics Geolocation is the practice of assessing the real world location of an Internet connected computer or device. Geolocation integration enables users to view the origin, destination, and flow of network traffic. 25

Security Analytics Key Uses Incident Response And Forensics Situational Awareness Cyber Threat Detection Data Loss Monitoring And Analysis Verification Of An Organization s Policy Compliance Security Assurance (Always on Verification Of The Effectiveness Of Your Other Security Tools) End-Point Behavior Monitoring 26

Big Data Security Example CSIRT Investigation Do we know who did this to us? How did they do it? What systems were compromised? Can we be sure that the attack is over? How can we be sure that it won t happen again? 27

CSIRT Investigations Before An Attack Gain situational awareness. The system helps set a baseline and familiarizes you with the types of traffic on your network so that you can recognize out of the ordinary communications. Reduce your network s attack surface. The system identifies applications, communications, and operating systems that pose a security risk and/or aren t approved for use in your organization. Distinguish Normal from Abnormal During An Attack Detect the threat. Identify anomalous communications, such as an internal host connecting to an outside host for unusually long periods, an internal host transmitting an abnormally large amount of data, or an end user host (desktop or laptop) communicating with other end user hosts rather than servers. Identify rogue hosts. Rogue hosts (computers planted inside the organization for nefarious reasons) are clearly outside the operating system and/or application parameters set by your IT department. Quarantine the threat. Identify other hosts that may have been compromised so you can quarantine them for remediation. After An Attack Verify attack termination. Verify the attack has ended and confirm whether any lingering threats need to be remediated. Confirm exfiltrated data. Determine the scope and extent of the data breach. Identify the root cause. Understand exactly how the breach happened so you can ensure that it doesn t happen again. 28

Tips for Getting Started 29

AlixPartners is ready to field a team of relevant experts whenever and wherever they are needed. Our professionals speak more than 50 languages and have experience in every corner of the world. Call us. We ll be there when it really matters. AlixPartners, LLP 2013 AlixPartners, LLP, 2012 30