Click to edit Master title style. DIY vs. Managed SIEM

Similar documents
Unlocking the Power of the Cloud

Security Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:

National Cyber Security Operations Center (N-CSOC) Stakeholders' Conference

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Security Operations & Analytics Services

DEVELOP YOUR TAILORED CYBERSECURITY ROADMAP

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

BUILDING AND MAINTAINING SOC

Gujarat Forensic Sciences University

K12 Cybersecurity Roadmap

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Security and Compliance Powered by the Cloud. Ben Friedman / Strategic Accounts Director /

PCI DSS COMPLIANCE 101

Managed Endpoint Defense

From Managed Security Services to the next evolution of CyberSoc Services

White Paper. How to Write an MSSP RFP

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

Security

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Digital Forensics Readiness PREPARE BEFORE AN INCIDENT HAPPENS

Background FAST FACTS

Security Monitoring. Managed Vulnerability Services. Managed Endpoint Protection. Platform. Platform Managed Endpoint Detection and Response

to Enhance Your Cyber Security Needs

Cybersecurity The Evolving Landscape

TRUE SECURITY-AS-A-SERVICE

Protecting organisations from the ever evolving Cyber Threat

Security. Protect your business from security threats with Pearl Technology. The Connection That Matters Most

Cybersecurity Auditing in an Unsecure World

SECURITY OPERATIONS CENTER BUY BUILD BUY. vs. Which Solution is Right for You?

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

CORPORATE BUSINESS SOLUTIONS

Security Aspects Control Rationale Best Practices Self-Assessment (Click all that applicable) 1. Security Policy and Security Management

RFP/RFI Questions for Managed Security Services. Sample MSSP RFP Template

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

OPERATIONS CENTER. Keep your client s data safe and business going & growing with SOC continuous protection

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

A Comprehensive Guide to Remote Managed IT Security for Higher Education

Suma Soft s IT Risk & Security Management Solutions for Global Enterprises

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

RSA NetWitness Suite Respond in Minutes, Not Months

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

ISE North America Leadership Summit and Awards

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

CERT Development EFFECTIVE RESPONSE

One Hospital s Cybersecurity Journey

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

IT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18

Department of Management Services REQUEST FOR INFORMATION

SANS Top 20 CIS. Critical Security Control Solution Brief Version 6. SANS Top 20 CIS. EventTracker 8815 Centre Park Drive, Columbia MD 21045

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

NOTHING IS WHAT IT SIEMs: COVER PAGE. Simpler Way to Effective Threat Management TEMPLATE. Dan Pitman Principal Security Architect

Cyber Security Stress Test SUMMARY REPORT

ISACA Arizona May 2016 Chapter Meeting

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Ransomware A case study of the impact, recovery and remediation events

locuz.com SOC Services

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER

ORACLE MANAGED CLOUD SECURITY SERVICES - SERVICE DESCRIPTIONS. December 1, 2017

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Secure Access & SWIFT Customer Security Controls Framework

Case Study. Encode helps University of Aberdeen strengthen security and reduce false positives with advanced security intelligence platform

CCISO Blueprint v1. EC-Council

Cyber Security Program

DATA SHEET RSA NETWITNESS PLATFORM PROFESSIONAL SERVICES ACCELERATE TIME-TO-VALUE & MAXIMIZE ROI

Agenda. Why we need a new approach to endpoint security. Introducing Sophos Intercept X. Demonstration / Feature Walk Through. Deployment Options

BHConsulting. Your trusted cybersecurity partner

SIEMLESS THREAT DETECTION FOR AWS

4/13/2018. Certified Analyst Program Infosheet

Reinvent Your 2013 Security Management Strategy

MANAGED DETECTION AND RESPONSE

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Business Context: Key for Successful Risk Management

Sirius Security Overview

Designing an Adaptive Defense Security Architecture. George Chiorescu FireEye

Your Trusted Partner in Europe European Business Reliance Centre

Les joies et les peines de la transformation numérique

External Supplier Control Obligations. Cyber Security

Ingram Micro Cyber Security Portfolio

Cyber Security in the time of Austerity. Shannon Simpson, CCO CNS Group

SIEM (Security Information Event Management)

Securing Dynamic Data Centers. Muhammad Wajahat Rajab, Pre-Sales Consultant Trend Micro, Pakistan &

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

KEDAYAM A KAAPAGAM MANAGED SECURITY SERVICES. Kaapagam Technologies Sdn. Bhd. ( T)

Human factor in CyberSecurity

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Cybersecurity for Service Providers

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Elevation of Privilege

Symantec Security Monitoring Services

Automating the Top 20 CIS Critical Security Controls

IBM Security Services Overview

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Technical Review Managing Risk, Complexity, and Cost with SanerNow Endpoint Security and Management Platform

Forensics and Active Protection

CoreMax Consulting s Cyber Security Roadmap

Transcription:

DIY vs. Managed SIEM

Meet Paul Paul Caiazzo Principal, Chief Security Architect CISSP, CISA, CEH M.S. Information Security and Assurance 15+ years of experience in Information Security Connect with me: @Paul_Caiazzo https://www.linkedin.com/in/pcaiazzo pcaiazzo@trushieldinc.com

Meet TruShield We are a global cyber security company based in the Washington DC metro area. Provider of the following high-quality, concierge security services: Managed Security Services Risk Assessment Services Penetration Testing Vulnerability Assessments Threat Protection Incident Management Security Consulting Security Architecture

What is SIEM?

SIEM Basics Why do you need one? Global average compromise detection time is 210 days Compliance (PCI, ISO, FISMA, NCUA, etc) What kinds of SIEM are out there? PICK TWO, AND ONLY TWO: Effective/Inexpensive/Easy to Use

SIEM Basics How does a SIEM work? SIEM device(s) installed on network Collect event logs from nodes on network Normalize/Aggregate/Correlate Scrub against threat signatures or behavioral database Generate alerts someone has to review, investigate, and respond to http://resources.infosecinstitute.com/book-advanced-network-design/

SIEM Basics What is involved in configuring and installing a SIEM? Complex, many moving parts Misconfiguration or incomplete rollout are common pitfalls Management and administration tasks: Updates and management Dashboard and analyses Tuning, tuning, tuning

SIEM Basics And, in order to actually realize any value for all of that hard work

SIEM Basics Someone still has to monitor and actually respond to these alerts!

SIEM Costs SIEM License Average for Enterprise SIEM is ~$50,000 for mid-to large sized organizations License maintenance costs in out-years is usually 20% Hardware Software Installation and Configuration Management/administration Monitoring and response Companies waste a lot of money on SIEM by not adequately planning for monitoring and response

MSSP Basics How does Managed SIEM work?

MSSP Basics What are the key functional differences? Initial architecture and rollout included MSSP then manages and runs day-to-day operations 24/7/365 monitoring, alerting and incident response Dedicated team of cyber security professionals, incident handlers and researchers Certified forensics investigators

MSSP Basics http://trushieldinc.com/monthly-cyber-threat-intelligence-reports/ What are the key functional differences? Threat Intelligence extends far beyond your network boundary Big-data analysis on attack trends and indicators of compromise Threat Intelligence Reports published frequently Ongoing vulnerability and threat research delivered in the form of Threat Alerts, Advisories and recommended remediation strategies

MSSP Costs Per-device monthly subscription fee Options for service enhancements Active security appliance management (firewall, IDS/IPS, UTM, Web Content Filter, etc) Managed vulnerability scanning/remediation Patch Management Endpoint protection (anti-virus/anti-malware, encryption, DLP, etc)

Our Recommendation Do you have: The resources to buy a SIEM, considering all of its ancillary infrastructure and deployment costs? The resources to adequately manage and tune the SIEM? Sufficiently skilled and trained staff to monitor and investigate alerts? Sufficiently skilled and trained staff to respond to, contain, and eradicate threats? 24/7/365? If no to any of the above, we highly advise you consider an MSSP

Our Recommendation Key benefits you can realize via an MSSP Significantly reduced cost to achieve: Advanced threat detection capability 24/7 monitoring, alerting and response by a team of certified experts Actionable intelligence based upon actual events occurring on your network, in real time Global perspective on threat patterns and trends resulting in immediate reduction in risks Ability to focus on your core mission rather than chasing SIEM alerts

Q & A

Thank You! 877.583.2841 www.trushieldinc.com