Our Journey To Estonia

Similar documents
Position Title: IT Security Specialist

locuz.com SOC Services

May the (IBM) X-Force Be With You

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Cybersecurity Today Avoid Becoming a News Headline

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

THE ACCENTURE CYBER DEFENSE SOLUTION

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Jens Thonke, EVP, Cyber Security Services Jyrki Rosenberg, EVP, Corporate Cyber Security CORPORATE SECURITY

Securing Your Digital Transformation

Delivering Integrated Cyber Defense for the Cloud Generation Darren Thomson

Designing and Building a Cybersecurity Program

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

<Partner Name> <Partner Product> RSA Ready Implementation Guide for. Rapid 7 Nexpose Enterprise 6.1

SIEM (Security Information Event Management)

Cybersecurity Session IIA Conference 2018

CipherCloud CASB+ Connector for ServiceNow

Put Identity at the Heart of Security

CONE 2019 Project Proposal on Cybersecurity

Digital Healthcare. Yordan Iliev Director R&D Healthcare. Regional Cybersecurity Forum, November 2016, Grand Hotel Sofia, Bulgaria

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Cyber Security Program

to Enhance Your Cyber Security Needs

in PCI Regulated Environments

Hacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK

IoT & SCADA Cyber Security Services

ALIENVAULT USM FOR AWS SOLUTION GUIDE

Automated Response in Cyber Security SOC with Actionable Threat Intelligence

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

How to Prepare a Response to Cyber Attack for a Multinational Company.

Risk Advisory Academy Training Brochure

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Certified Cyber Security Specialist

Key Findings from the Global State of Information Security Survey 2017 Indonesian Insights

Security by Default: Enabling Transformation Through Cyber Resilience

AT&T Endpoint Security

Transforming Security Part 2: From the Device to the Data Center

PULLING OUR SOCS UP VODAFONE GROUP AT RSAC Emma Smith. Andy Talbot. Group Technology Security Director Vodafone Group Plc

SIEM: Five Requirements that Solve the Bigger Business Issues

Comodo Certificate Manager

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Cybersecurity is a Journey and Not a Destination: Developing a risk management culture in your business. Thursday, May 21, 2015

Your Trusted Partner in Europe European Business Reliance Centre

Vulnerability Management & Vulnerability Assessment. Nessus Attack Scripting Language (NASL). CVE databases, NVD database

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Ransomware A case study of the impact, recovery and remediation events

Deep instinct For MSSPs

THE RISE OF GLOBAL THREAT INTELLIGENCE

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

Cyber Risk Services Going beyond limits

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

Emerging Technologies The risks they pose to your organisations

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Defensible and Beyond

DIGITAL TRUST Making digital work by making digital secure

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Symantec Ransomware Protection

Cyber-Threats and Countermeasures in Financial Sector

Cyber Security: Threat and Prevention

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

CompTIA Security+ Study Guide (SY0-501)

Cybersecurity for Service Providers

Agile Security Solutions

GEORGIA CYBERSECURITY WORKFORCE ACADEMY. NASCIO 2018 State IT Recognition Awards

Predstavenie štandardu ISO/IEC 27005

ISE North America Leadership Summit and Awards

Cyber Threat Landscape April 2013

Human factor in CyberSecurity

Client Health Key Features Datasheet. Client Health Key Features Datasheet

About Issues in Building the National Strategy for Cybersecurity in Vietnam

Cybersecurity. Securely enabling transformation and change

Symantec & Blue Coat Technical Update Webinar 29. Juni 2017

Office 365 Buyers Guide: Best Practices for Securing Office 365

Cyber Security: It s all about TRUST

Securing the Cloud Today: How do we get there?

A Working Paper of the EastWest Institute Breakthrough Group. Increasing the Global Availability and Use of Secure ICT Products and Services

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

ICBA Summary of FFIEC Cybersecurity Assessment Tool (May 2017 Update)

The Role of Public Sector Audit and Risk Committees in Cybersecurity & Digital Transformation. ISACA All Rights Reserved.

Tripwire State of Cyber Hygiene Report

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

*** THIS DOCUMENT IS CLASSIFIED FOR PUBLIC ACCESS ***

Comodo cwatch Web Security Software Version 1.1

COST OF CYBER CRIME STUDY INSIGHTS ON THE SECURITY INVESTMENTS THAT MAKE A DIFFERENCE

Cybersecurity in Government

Integrated, Intelligence driven Cyber Threat Hunting

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

INFORMATION SECURITY GOVERNANCE, RISK & COMPLIANCE CLOUD CONSULTING SERVICES CIO & CISO SERVICES. forebrook

The Bank of Zambia Experience

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Gujarat Forensic Sciences University

Sophos. Allan Widell Channel Account Executive. 24. August 2017

ACM Retreat - Today s Topics:

Transcription:

Our Journey To Estonia

Knowledge ELEctrical Systems 1991 1991

Product Era and Innovation Engineering culture Science-intensive software 10 engineers 1991 1995

ISV Era and New Markets First ISV clients in the US and UK New strategic direction towards Outsourcing The largest real-time motions control system in the US 30 people 1991 1995 2000

New Opportunities from UK Government First Fortune 500 customers Complex, highly automated, paperless, e-customs system developed for The States of Jersey 300+ people 1991 1995 2000 2008

Scaling up to Enterprise Level Transforming into a matrix-structured software company AMO, R&D and Engagement 1991 1995 2000 2008 2012 Comprehensive credit risk management system developed from scratch 500+ people

ELEKS Fact Sheet New York, USA Las Vegas, USA London, UK Rzeszow, Poland Tallinn, Estonia Lviv, Ukraine 3TOP 1200+ IT BUSINESS IN UKRAINE PROFESSIONALS COUNTRIES 9 5 26 OFFICES YEARS of experience delivering value to customers

We Cooperate Globally 50 + 10 ACTIVE CUSTOMERS YEARS working with Fortune 500

What Eleks does in Estonia? The most digital country in the world E-Residency Managing Director, Kaspar Korjus: A study conducted by the American company Intuit suggests that there will be over 100 million new online workers by 2025. Through e-residency, countries like Estonia will be in a position to attract people like this by becoming the best place to run a location independent business in the world. We think that countries will soon be competing for citizens, residents, and e-residents just like private companies compete for customers now..

1st in International Tax Competitiveness Index eleks.com

eleks.com

12th in Ease of Doing Business Report 2016 (World Bank) eleks.com

eleks.com

22nd in Corruption Perception Index 2016 (Transparency International) eleks.com

eleks.com

5th in Global Cybersecurity Index (International Telecommunications Union) eleks.com

eleks.com

eleks.com

eleks.com

eleks.com Eleks Cyber Security

ELEKS cyber security approach: be aware of what is happening; partner with niche professionals; balance risk, resilience, usability and price Structure 1. Information security policies 2. Human resources security 3. Asset management 4. Access control 5. Cryptography 6. Physical security 7. Operations security 8. Communication security 9. System acquisition, development, and maintenance 10. Supplier relationships 11. Information security incident management 12. Information security aspects of business continuity management 13. Compliance eleks.com

eleks.com

ELEKS security services Centers of Excellence Key Certificates Preemptive Incident Response Threat Hunting Security Risk Management Forensic Big Data and Cloud Security Data Security and Privacy Security Compliance Management Security Services Project Management Security Outsourcing ISO 27001 LA CISM CISA CIA CCSP CCSK MBA PhD SCST eleks.com

eleks.com

Template Security Services Monthly Report Extract eleks.com eleks.com

Remediation strategy: Disable service Close port Blacklist file and application Install updates/patches Blocking malicious IP/Domains/ email adresses Kill-switch deployment Locky domain FileHash-SHA256 URL IOC Threat Intelligence: AlienVault OTX Cyber-Daily Virus Total Twitter Hybrid-analysis Petya CVE email FileHash-MD5 FileHash-SHA256 Rapid reporting (up to 3h): WSUS Updates Status Reports Secdo Analytics Nexpose Reports WannaCry domain URL Indicator Type Quantity Indicator Type Quantity domain 6 FileHash-SHA256 11 URL 8 eleks.com Grand Total 25 CVE 1 email 1 FileHash-MD5 4 FileHash-SHA256 9 Grand Total 15 Indicator Type Quantity domain 15 URL 12 Grand Total 27

The installation status of the last 2017-08 cumulative Microsoft update for Windows Machines 100% 100% Windows 7 Windows Server 2008 R2 3,6% Not reported 100% 96,4% Windows 8.1 Windows 10 eleks.com

Weekly vulnerability report from Nexpose 7 Critical vulnerabilities 4 Remediation in progress 3 Resolved Vulnerability Task Vulnerability resolution SMTP unauthenticated 3rd-party mail relay (smtp-general-openrelay) Default or Guessable SNMP community names: public (snmp-read-0001) TELNET access with no account and password admin (telnet-generic-0001) Apache HTTPD: ap_get_basic_auth_pw() Authentication Bypass (CVE-2017-3167) (apache-httpd-cve-2017-3167) VNC remote control service installed (backdoor-vnc-0001) PHP Vulnerability: CVE-2017-11362 (php-cve- 2017-11362) Oracle MySQL Vulnerability: CVE-2017-3599 (oracle-mysql-cve-2017-3599) eleks.com https://jd.eleks.com/browse/itspp-18388 https://jd.eleks.com/browse/itspp-18390 https://jd.eleks.com/browse/itspp-18393 https://jd.eleks.com/browse/itspp-18393 https://jd.eleks.com/browse/itspp-18413 https://jd.eleks.com/browse/itspp-18415 https://jd.eleks.com/browse/itspp-18414 Resolved In progress Resolved In progress In progress Resolved In progress

Monthly vulnerability monitoring status September 18, 2017. CCleaner v.5.33 Hacked to Distribute Malware. Remediation: The affected version has not been detected. September 12, 2017. Critical Bluetooth Attack: BlueBorne. Remediation: Patched by Microsoft updates. September 05, 2017. Critical Vulnerability in Apache Struts2. Remediation: Performed a vulnerability scan, not detected. August 31, 2017. Massive Email Campaign Sends Locky Ransomware. Remediation: Sent the awareness, conduct the Information Security Training, installed Microsoft updates centrally, Secdo antiransomware module enabled + updated IOC. August 30, 2017. Critical Vulnerability in LabVIEW. Remediation: This software is not installed. August 24, 2017. Virus Spreading Through Facebook Messenger. Remediation: Sent the awareness. SIEM + Secdo continuous monitoring. August 17, 2017. Two Critical Zero-Day Vulnerabilities in Foxit PDF Reader. Remediation: Sent the awareness, secure configuration is set up on all workstations by default. eleks.com

OSSIM monthly report (19.08.2017 till 19.09.2017) Top 20 Events Customer 180000 160000 140000 120000 100000 80000 60000 40000 Quantity 20000 Source IP(unique) 0 Destenation IP(unique) eleks.com