If you were under cyber attack would you ever know?

Similar documents
Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Does someone else own your company s reputation? EY Global Information Security Survey 2018

Introduction. When it comes to GDPR compliance, is OK for now enough? Minds made for protecting financial services

Global Information Security Survey. A life sciences perspective

Are we breached? Deloitte's Cyber Threat Hunting

Cybersecurity. Securely enabling transformation and change

Big data privacy in Australia

Forensic analysis with leading technology: the intelligent connection Fraud Investigation & Dispute Services

IT Consulting and Implementation Services

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Danish Cloud Maturity Survey 2018

CYBER RESILIENCE & INCIDENT RESPONSE

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

RSA INCIDENT RESPONSE SERVICES

Protecting your data. EY s approach to data privacy and information security

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

Real estate predictions 2017 What changes lie ahead?

Demonstrating data privacy for GDPR and beyond

Developing your GDPR response for competitive advantage. EU General Data Protection Regulation (GDPR)

FOR FINANCIAL SERVICES ORGANIZATIONS

Cybersecurity Risk Mitigation: Protect Your Member Data. Introduction

Cyber Security Incident Response Fighting Fire with Fire

CYBER SOLUTIONS & THREAT INTELLIGENCE

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

THE POWER OF TECH-SAVVY BOARDS:

EY Norwegian Cloud Maturity Survey 2018

Emerging Technologies The risks they pose to your organisations

The New Healthcare Economy is rising up

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

NEXT GENERATION SECURITY OPERATIONS CENTER

ISACA Cincinnati Chapter March Meeting

EY s data privacy service offering

MENA Digital Security Operations Center (DSOC)

Cyber Espionage A proactive approach to cyber security

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

RSA INCIDENT RESPONSE SERVICES

Cyber Incident Response. Prepare for the inevitable. Respond to evolving threats. Recover rapidly. Cyber Incident Response

Safeguarding unclassified controlled technical information (UCTI)

Cybersecurity Fortification Initiative (CFI) infrastructure whitepaper

Step 1: Open browser to navigate to the data science challenge home page

Six Weeks to Security Operations The AMP Story. Mike Byrne Cyber Security AMP

Managing Cyber Risk. Robert Entin Executive Vice President Chief Information Officer Vornado Realty Trust

Accelerate Your Enterprise Private Cloud Initiative

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

locuz.com SOC Services

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Staffing Services UnderDefense your source of experienced professionals to solve security staffing challenges today

Cybersecurity requirements for financial services companies

CYBERSECURITY AND THE MIDDLE MARKET

Security in India: Enabling a New Connected Era

Sage Data Security Services Directory

Incident Response Services to Help You Prepare for and Quickly Respond to Security Incidents

Achieving effective risk management and continuous compliance with Deloitte and SAP

Customer Breach Support A Deloitte managed service. Notifying, supporting and protecting your customers through a data breach

whitepaper How to Measure, Report On, and Actually Reduce Vulnerability Risk

Why you should adopt the NIST Cybersecurity Framework

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Tax News Update: Global Edition (GTNU) User Guide

13.f Toronto Catholic District School Board's IT Strategic Review - Draft Executive Summary (Refer 8b)

RIMS Perk Session Protecting the Crown Jewels A Risk Manager's guide to cyber security March 18, 2015

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Building a Threat Intelligence Program

2018 GLOBAL CHANNEL PARTNER SURVEY THYCOTIC CHANNEL PARTNER SURVEY REPORT

EY Norwegian Cloud Maturity Survey Current and planned adoption of cloud services

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

G7 Bar Associations and Councils

Gujarat Forensic Sciences University

SWIFT Customer Security Program

NetWitness Overview. Copyright 2011 EMC Corporation. All rights reserved.

RSA NetWitness Suite Respond in Minutes, Not Months

RSA RISK FRAMEWORKS MAKING DIGITAL RISK MANAGEABLE

Risk Advisory Academy Training Brochure

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

to Enhance Your Cyber Security Needs

SOLUTION BRIEF RSA NETWITNESS SUITE 3X THE IMPACT WITH YOUR EXISTING SECURITY TEAM

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Digital trends in real estate, hospitality and construction. Building blocks for future growth. Brochure title RR. Brochure subtitle RR

FTA 2017 SEATTLE. Cybersecurity and the State Tax Threat Environment. Copyright FireEye, Inc. All rights reserved.

Reducing the Cost of Incident Response

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Incident Response Services

CyberArk Privileged Threat Analytics

Advanced Security Centers. Enabling threat and vulnerability services in a borderless world

Digital innovation? Cyber secure? Digital security: a Financial Services perspective

OUTSMART ADVANCED CYBER ATTACKS WITH AN INTELLIGENCE-DRIVEN SECURITY OPERATIONS CENTER

Vulnerability Management. June Risk Advisory

The Windstream Enterprise Advantage for Banking

Introducing Cyber Observer

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

Cyber Security and Cyber Fraud

PALANTIR CYBERMESH INTRODUCTION

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

Using Threat Analytics to Protect Privileged Access and Prevent Breaches

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

SOC 2 examinations and SOC for Cybersecurity examinations: Understanding the key distinctions

Transcription:

If you were under cyber attack would you ever know? EY and Los Alamos National Laboratory introduce a shift in cybersecurity strategy and bring behavioral analytics inside

Asking behavioral questions inside Constantly under cyber attack In today s cyber threat environment, attackers approaches to targeting victims have significantly matured. Breaches are inevitable where threat actors are highly sophisticated, strategic and agile, and when their targets are growing in complexity and size. Traditional defense mechanisms perimeter controls and end-point antivirus protection cannot keep pace with these increasingly innovative and sophisticated adversaries. Because it is no longer a matter of if but a question of when, an intelligent, complementary approach is necessary to quickly identify intruders and contain their impact. Sophisticated threat agents mobile technology, third-party risk and malicious insiders. Large and complex organizations Los Alamos National Laboratory and EY bringing innovative approaches to cybersecurity The collection and storage of digital information have empowered businesses to create new markets and deliver services more effectively to their customers. As data volume and sources continue to grow, threat actors are increasing their activities, and defense efforts have become largely ineffective in keeping pace. Organizations now have greater areas of exposure and increased vulnerability due to mobile technology, third-party risk and malicious insiders. The US Government, however, has long confronted this issue. Having been under attack for decades, by many of the same criminal organizations and nation-state actors that are now attacking industry with such zeal, Government security researchers have developed innovative approaches to protecting networks and the national security data that they contain. Industry is now seeing transition efforts on the part of the Government to bring that experience and technology to bear in the protection of private sector data. After a competitive selection process, EY is proud to announce that we have been chosen by Los Alamos National Laboratory to bring to market the technologies developed by it to protect its most sensitive US networks. This relationship will leverage the power of that prestigious research institution and EY s deep business knowledge and security experience to bring these innovative services to clients. Perimeter defenses Transversal detection and real-time analysis A shift in strategy behavioral analytics inside Recent breaches and elevated concerns over insider threats have demonstrated that perimeter security is not a complete solution to today s cyber threats. Continuously monitoring all assets within the firewall is necessary for situational awareness and rapid response to active attacks. However, because hackers continue to innovate and insiders already have access, signature-based methods that recognize patterns already seen are insufficient. Zeroday behavioral analytics promise to change the game in network security by asking, Is this activity expected, or is it deviating significantly? Statistical models have proven to be effective at quantifying the significance of deviations from modeled behavior. In an organization made up of complex, changing relationships and dependencies, identifying this irregular activity can feel like looking for the proverbial needle in a haystack. It requires the following: Advanced tools that can sift through unprecedented amounts of data Continuous, automated learning of dynamic network patterns Statistical models that capture relevant behavioral attributes Extracting actionable intelligence to threats Minimizing false positives when billions of events are observed 1 Asking behavioral questions inside 2

About EY As one of the largest professional services organizations in the world, EY firms have implemented enterprise-wide technology, strategy and design programs for some of the most complex IT infrastructures in the world, including those of Fortune 100 companies. Our knowledge of clients businesses and industries has enabled us to help companies better understand their day-today transactions and behaviors, and identify the true risk that cyber-related events pose to their organization. Additionally, EY brings extensive experience in cyberforensics and cyberincident response. This means that the cybersecurity strategies we develop are aligned to the specific business needs and threats our clients face. In a survey of information consulting firms and services, Forrester ranked EY as the leader in cybersecurity strategy, which includes new service offerings, future directions, R&D investment and information security business value. About Los Alamos National Laboratory Los Alamos scientists have extraordinary access to the most advanced technology and they consider the hardest security problems. Applied mathematics, machine-learning experts, and statisticians collaborate with front line security operations personnel to provide relevant, cutting-edge solutions. Los Alamos is focused on national security threats to the nation s cyber infrastructure. They develop innovative technologies for detection, response, and predictive vulnerability analysis. As a capability leader in information security and networking science, Los Alamos is dedicated to predicting and solving critical problems in the cyber domain using novel yet practical solutions. Information security and networking science is a growth area of the Laboratory, and diverse customers are leveraging excellence via the Laboratory s cybersecurity capabilities. Collaboration with the Los Alamos National Laboratory Today, Los Alamos National Laboratory continues to focus its resources on making significant achievements in national security issues such as cybersecurity. It is now beginning to share the technologies that have been designed and used to protect some of the most sensitive national security information with the broader private sector. Included among these is a behavioral analysis tool to find threat actors PathScan. EY s collaboration with Los Alamos allows for this tool to be used by organizations in the private sector. EY s knowledge of its clients IT environments and market forces has honed Pathscan for private sector and industry-specific needs. EY and Los Alamos have worked together to test this tool in live fire environments to make it applicable to a business s priorities and risk appetite. EY and Los Alamos, through a collaborative research and development agreement, will continue to innovate for the nation s most demanding security needs. PathScan PathScan is a network anomaly detection tool that seeks to identify traversal through by an adversary. Unlike traditional security tools that look for malware or network signatures, PathScan searches for deviations from normal patterns of communication that are indicative of an intruder s presence. By creating a deep behavioral model of your network, it can expose intruders and insiders causing local anomalies during their activity. PathScan s three-step approach: 1. Builds statistical models to characterize the normal flows of traffic between each pair of communicating computers 2. Actively enumerates multi-hop paths of communication 3. Passively monitors each path and tests whether the flows observed are expected in the context of the statistical models or whether they are unlikely and, therefore, indicators of a possible adversary moving through The tool s modeling capabilities are as dynamic as your network, continuously updating parameters in step with the non-stationary use of, thus reducing alerts due to unusual but non-threatening behavior. PathScan can work with an organization s legacy information security framework and does not require significant infrastructure development or vast stores of data to operate. Its network collection is passive, limiting impact to operations. Mitigating cybersecurity threats is no longer about deterring and detecting something that looks like a threat. It is now about being able to identify and anticipate something that acts like a threat. Source: Call for Commercialization and/or CRADA Partners for PathScan, Los Alamos National Laboratory (LANL), http://www.lanl.gov/ PathScan received support from the Transition to Practice program, an initiative of the Department of Homeland Security Science and Technology Directorate that helps to advance and raise the visibility of promising technologies that are developed in the national laboratories and deemed ready for transition to the commercial marketplace. Source: The Forrester Wave : Information Security Consulting Services, Q1 2013, Forrester Research, Inc. 4

Securing your organization Through the practical business application of PathScan, EY can help deliver robust: Assessments point-in-time perspectives of an organization s cybersecurity environment and topography Transformations cybersecurity program improvements through integration with your legacy security tools Managed services and subscription services a full suite of services to help clients establish and manage an effective security operations center This tool can also enhance the following programs: Threat intelligence manageable action plans to anticipate threats and create actionable intelligence to rapidly detect and respond to incidents and remediate areas of exposure Security monitoring monitoring threat indicators and detecting attacks before critical services are disrupted or high-value sensitive assets are compromised Incident response investigations to determine cause and scope of security incidents, coordinate containment and recovery and support forensic analysis Countermeasure planning methodologies to mitigate identified risks, inclusive of threat intelligence, business priorities and risk tolerance The EY cyber threat management framework Business priorities Security monitoring Incident response a Threat intelligence Prioritized risks Data and context Reactive and proactive actions Countermeasure planning e Vulnerability identification Remediation Complicate and detect Risk appetite Through collaboration with Los Alamos National Laboratory, EY is committed to making your organization more secure and building a better working world. 5 Asking behavioral questions inside 6

Contacts Stan Brown Ernst & Young LLP +1 513 612 1836 stan.brown@ey.com Chip Tsantes Ernst & Young LLP +1 703 618 6816 chip.tsantes@ey.com EY Assurance Tax Transactions Advisory About EY EY is a global leader in assurance, tax, transaction and advisory services. The insights and quality services we deliver help build trust and confidence in the capital markets and in economies the world over. We develop outstanding leaders who team to deliver on our promises to all of our stakeholders. In so doing, we play a critical role in building a better working world for our people, for our clients and for our communities. EY refers to the global organization, and may refer to one or more, of the member firms of Ernst & Young Global Limited, each of which is a separate legal entity. Ernst & Young Global Limited, a UK company limited by guarantee, does not provide services to clients. For more information about our organization, please visit ey.com. Ernst & Young LLP is a client-serving member firm of Ernst & Young Global Limited operating in the US. EY is a leader in serving the global financial services marketplace Nearly 43,000 EY financial services professionals around the world provide integrated assurance, tax, transaction and advisory services to our asset management, banking, capital markets and insurance clients. In the Americas, EY is the only public accounting organization with a separate business unit dedicated to the financial services marketplace. Created in 2000, the Americas Financial Services Office today includes more than 6,900 professionals at member firms in over 50 locations throughout the US, the Caribbean and Latin America. EY professionals in our financial services practices worldwide align with key global industry groups, including EY s Global Wealth & Asset Management Center, Global Banking & Capital Markets Center, Global Insurance Center and Global Private Equity Center, which act as hubs for sharing industry-focused knowledge on current and emerging trends and regulations in order to help our clients address key issues. Our practitioners span many disciplines and provide a well-rounded understanding of business issues and challenges, as well as integrated services to our clients. With a global presence and industry-focused advice, EY s financial services professionals provide high-quality assurance, tax, transaction and advisory services, including operations, process improvement, risk and technology, to financial services companies worldwide. About Los Alamos National Laboratory (www.lanl.gov) Los Alamos National Laboratory, a multidisciplinary research institution engaged in strategic science on behalf of national security, is operated by Los Alamos National Security, LLC, a team composed of Bechtel National, the University of California, BWX Technologies, Inc., and URS for the Department of Energy s National Nuclear Security Administration. Los Alamos enhances national security by ensuring the safety and reliability of the U.S. nuclear stockpile, developing technologies to reduce threats from weapons of mass destruction and solving problems related to energy, environment, infrastructure, health and global security concerns. 2015 Ernst & Young LLP. All Rights Reserved. SCORE No. BT0521 1503-1417784NY ED none This material has been prepared for general informational purposes only and is not intended to be relied upon as accounting, tax or other professional advice. Please refer to your advisors for specific advice. ey.com