SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
© Copyright Selex ES S.p.A 2014 All rights reserved
A perspective from a Cyber Integrator
From Reactive to Proactive:
The power of managed situation awareness
Presentation to Kingdom Cyber Security Forum
May 2014
© Copyright Selex ES S.p.A 2014 All rights reserved
What is a Cyber Integrator?
Situation Awareness – of what?
Building a specific response
Benefit from wider system collaboration
© Copyright Selex ES S.p.A 2014 All rights reserved
What is a Cyber Integrator?
Situation Awareness – of what?
Building a specific response
Benefit from wider system collaboration
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
Threats, vulnerabilities and underlying information technology are
changing at a ferocious pace; so must all the countermeasures
Viruses
Trojans
Botnets
Phishing
Waterhole
Man in
the email
Policy
Training
Hardening
Intrusion
detection
Anomaly
detection
Malware
analysis
Certification
And in complex environments, no single product or service
specialist can keep up
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
Defence (National & NATO)
National Security Agencies
Governments & institutions
Law Enforcement
Telecommunications
Banking & Insurance
Healthcare
Transport & Utilities
Prime Contractors
Large Enterprises
A Cyber Integrator is typically a systems integrator and manufacturer with
a broad perspective of security requirements
– and a dedicated security practice
© Copyright Selex ES S.p.A 2014 All rights reserved
Understand
factors,
methods
and history
Driven by nature and extent of
measures required to achieve
desired security
In some cases, an annual check up Is sufficient.
In others, constant monitoring is recommended!
Level of threat X Level of vulnerability = Extent of security measures required
Understand
technical
vulnerabilities
and weaknesses in
security governance
and user habits
A practiced Cyber Integrator seeks to
diagnose before prescribing
© Copyright Selex ES S.p.A 2014 All rights reserved
• Customer desired business objectives
SOLUTIONS ARE BUILT ON:
• Customers’ direct threats and vulnerabilities
• Customers’ indirect risks and challenges
• Engineered solutions and services
A Cyber Integrator takes a systems
engineering approach
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
Compromising
Ability to Perform Intellectual
Property Theft
Loss of
Financial Control
Ability to
Recover
Threat to Human Safety
Affecting
Compliance Status
Threatening
Reputation
Clients suffering data loss, theft and cyber attack
with serious to existential consequences
© Copyright Selex ES S.p.A 2014 All rights reserved
Selex ES: What is a Cyber Integrator?
Situation Awareness – of what?
Building a specific response
Benefit from wider system collaboration
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
Our customers are beset by the same global issues
Front office Operations
IT and Administration
Back office Operations
Internal Contractors
Bought-in
Services
Trusted
Partners
Executive
Tactics
Relentless
Spam
Socially
engineered
Botnet
Attack
Insider
Attack
Techniques
Phishing
Waterhole
Spam
Insider
Procedures
Reconnoitre
Penetrate
Sleep
Propagate
Control
Transmit
Transform
Weapons
Virus
Trojan
Worm
Rootkit
Logger
Dialler
Toolkits
VANDALS
PROTESTORS
THIEVES
SPIES
NATIONS
Deface
Destroy
Steal
Cheat
Impair
Customer
POS, ATM etc
BranchPhone
Online
Contact with
Enterprise
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
And the evidence suggests that the money to be made
attracts the very best talent – of the wrong sort
• Face to face
• Online payment
• Man in the email
(China, Nigeria and South Africa)
Fraud
Banking
Account takeover
Automated clearing
Global fraud losses linked to ACH and
wire fraud for banking institutions
Corporate finance
Mobile banking and financial
transaction threats
• $455 million 2012
• 2013 projection - $523 million
• 2016 projection - $795 million
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
https://
https://
And enterprises share
common vulnerabilities
POORLY INSTALLED
FIREWALLS
USING DEFAULT
PASSWORDS
POORLY PROTECTED
CUSTOMER DATA
AT REST
POORLY MAINTAINED
APPLICATIONS
AND SYSTEMS
IRRATIONALLY APPLIED
ORGANISATION
SECURITY POLICY
POORLY MAINTAINED
ANTI-VIRUS
AND IPS/DLP SYSTEMS
LOOSE
UNDERSTANDING OF
NETWORK
ACTIVITY
INSUFFICIENT
ENCRYPTION
OF DATA IN TRANSIT
LOOSE
‘NEED TO KNOW’
POLICY
POORLY PROTECTED
CUSTOMER DATA
AT REST
POORLY MAINTAINED
APPLICATIONS
AND SYSTEMS
IRRATIONALLY APPLIED
ORGANISATION
SECURITY POLICY
POORLY MAINTAINED
ANTI-VIRUS
AND IPS/DLP SYSTEMS
LOOSE
UNDERSTANDING OF
NETWORK
ACTIVITY
INSUFFICIENT
ENCRYPTION
OF DATA IN TRANSIT
LOOSE
‘NEED TO KNOW’
POLICY
USING DEFAULT
PASSWORDS
POORLY INSTALLED
FIREWALLS
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
So, we work with enterprises to improve awareness of
Vulnerabilities, Threats and Attacks
Processes
People
Culture
Systems
Tools
TechniquesDrivers
Organisation
ThreatsVulnerabilities
Level of
Damage
Tolerance of
Damage
Technology Procedures
And then we start to build the appropriate responses…
© Copyright Selex ES S.p.A 2014 All rights reserved
Selex ES: What is a Cyber Integrator?
Situation Awareness – of what?
Building a specific response
Benefit from wider system collaboration
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
CYBER DOCTRINE
Assess
CYBER SERVICES
Assessment Guidance Remediation
Projects
Managed
Services
Managed
Services
A Cyber Integrator draws on a coherent set of services
designed to address threats and resolve vulnerabilities
• Vulnerability
• Maturity
Assure
Prevent
Protect
Detect
Resist
Defend
Respond
Contain
Eradicate
Recover
Learn
• Policy
• Certification
• Training • System hardening
• System provision
• Enterprise
protective
monitoring
• Incident
response
forensics
COMPETITIVE ADVANTAGE. INFORMATION SUPERIORITY.
© Copyright Selex ES S.p.A 2014 All rights reserved
Taking an Integrators’ approach, we then develop
the Advisory, Skills transfer, Change and enduring
Services solution to meet the need.
Understand
factors,
methods
and history
Driven by nature and extent of
measures required to achieve
desired security
But to keep up with changing threats, exploits and attack methods, our services have to be agile,
flexible and truly innovative.
Level of threat X Level of vulnerability = Extent of security measures required
Understand
technical
vulnerabilities
and weaknesses in
security governance
and user habits
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
• Policy and legislation background
• Essential industry architecture
• Key industry governance processes
• Key financial functions and processes
• Key systems
We immerse ourselves in your
environment:
How does a cyber services integrator
achieve agility and flexibility?
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
• Understand and model predominant
attack/exploit methods
• Develop and maintain a library and understanding
of characteristic system vulnerabilities
• Anticipate next generation exploits
• Characterise key domain processes that are
subject to attack
We maintain sector specific technical expertise,
backed by our own wider technical expertise and context
Which enables us to provide a coherent set of
appropriate services to the companies operating within
the particular sector
How does a cyber services integrator
achieve agility and flexibility?
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
What would the outcome look like?
Achievement and
maintenance of
security compliance
Monitoring and real time analysis
of anomalies plus development
of intelligence data
-plus reaching out to external
sources
Response to incidents:
containment, eradication
and recovery
Development and maintenance
of situation awareness, dynamic
risk analysis and feed back for
training and process improvement
- plus deeper malware / TTP
analysis (DIY or bought-in)
Hardening of
key systems
Regular
vulnerability
assessment
DeterDetect
Through
life
security
AssureRespond
Learn Assess
Your Cyber Security Capability
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
Detect
Resist
Defend
Respond
- Contain
- Eradicate
- Recover
- Learn
Deter
Protect
OrganisationUsersCore Systems
Assess Assure
© Copyright Selex ES S.p.A 2013 All rights reserved
An Enterprise CIRT or equivalent managed
service provides the right focus
Enterprise CIRT
© Copyright Selex ES S.p.A 2014 All rights reserved
Selex ES: What is a Cyber Integrator?
Situation Awareness – of what?
Building a specific response
Benefit from wider system collaboration
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
The key characteristic of national
and international response to cyber
threats is collaboration
© Copyright Selex ES S.p.A 2013 All rights reserved
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
The key characteristic of response is
collaboration
• Joint research centre – vulnerabilities etc
• Pan European exercises
• Sector and National CSIRTs
• Europol and Interpol: cooperation for Cyber
EU CYBER STRATEGY
RESTS ON COLLABORATION
© Copyright Selex ES S.p.A 2013 All rights reserved
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
• To optimise information sharing,
collaboration and interoperability
NATO: LISBON DECLARATION
The key characteristic of response is
collaboration
© Copyright Selex ES S.p.A 2013 All rights reserved
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
Comprehensive National Cyber security Initiative
• Connecting Cyber Operations Centres
• Shared Situational Awareness
• Federal, State, Local and Private Sector
• Supply chain initiative
US INITIATIVES:
© Copyright Selex ES S.p.A 2013 All rights reserved
The key characteristic of response is
collaboration
• Education and R&D initiative
• FUNDING!
The concept of sector and national nodes and hubs for reporting,
correlating data and sharing intelligence is gaining momentum
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
And what does all that
collaboration provide to the
participants?
A massive surface area to gather
cyber intelligence
So, where does one start?
© Copyright Selex ES S.p.A 2014 All rights reserved
Plans
Procedures
Lessons learned
Vulnerabilities
Threats
Impact
Breach and
incident data
Technical indicators
of compromise
Suggested
remediation actions
© Copyright Selex ES S.p.A 2013 All rights reserved
Vulnerabilities
Threats
Impact
Breach and
incident data
Sector CIRT
Secure and
trusted
information
sharing
Enterprise CIRTEnterprise CIRT
Within any Business or Government Sector, a federated and
trustworthy Sector CIRT would encourage collaboration
© Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved
The national effect: shared situational awareness of network
vulnerabilities, threats, and events
Banking
Oil & GasPower
generation
Aviation
TelecomsMedical
Are you
seeing what
we are
seeing?
© Copyright Selex ES S.p.A 2014 All rights reserved
Presentation to Kingdom Cyber Security Forum
Thank you for listening
May 2014

Más contenido relacionado

La actualidad más candente

SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
Rodrigo Piovesana
 

La actualidad más candente (20)

Cyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercatoCyber Warfare e scenari di mercato
Cyber Warfare e scenari di mercato
 
DHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber ResilienceDHS Cybersecurity Services for Building Cyber Resilience
DHS Cybersecurity Services for Building Cyber Resilience
 
New Paradigms for the Next Era of Security
New Paradigms for the Next Era of SecurityNew Paradigms for the Next Era of Security
New Paradigms for the Next Era of Security
 
Cyber Security Needs and Challenges
Cyber Security Needs and ChallengesCyber Security Needs and Challenges
Cyber Security Needs and Challenges
 
Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2Total Digital Security Introduction 4.2
Total Digital Security Introduction 4.2
 
SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4SegurançA Da InformaçãO Faat V1 4
SegurançA Da InformaçãO Faat V1 4
 
WHY SOC Services needed?
WHY SOC Services needed?WHY SOC Services needed?
WHY SOC Services needed?
 
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | EdurekaTop 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
Top 10 Reasons to Learn Cybersecurity | Why Cybersecurity is Important | Edureka
 
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
Leveraging Vulnerability Management Beyond DPR (Discovery - Prioritization - ...
 
Understanding cyber resilience
Understanding cyber resilienceUnderstanding cyber resilience
Understanding cyber resilience
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration  Fidelis Endpoint® - Live Demonstration
Fidelis Endpoint® - Live Demonstration
 
Understanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor LandscapeUnderstanding the Cyber Security Vendor Landscape
Understanding the Cyber Security Vendor Landscape
 
Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)Pöyry ICS Cyber Security brochure (English)
Pöyry ICS Cyber Security brochure (English)
 
A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...A holistic approach to risk management 20210210 w acfe france & cyber rea...
A holistic approach to risk management 20210210 w acfe france & cyber rea...
 
Extending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWSExtending Your Network Cloud Security to AWS
Extending Your Network Cloud Security to AWS
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Secure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAltoSecure Access – Anywhere by Prisma, PaloAlto
Secure Access – Anywhere by Prisma, PaloAlto
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 

Destacado

Destacado (20)

CDS_2015_PER(1)
CDS_2015_PER(1)CDS_2015_PER(1)
CDS_2015_PER(1)
 
What's behind a cyber attack
What's behind a cyber attackWhat's behind a cyber attack
What's behind a cyber attack
 
The Proactive Approach to Cyber Security
The Proactive Approach to Cyber SecurityThe Proactive Approach to Cyber Security
The Proactive Approach to Cyber Security
 
SESAR Project Awards - Best in class Nomination for Pj14.01.04
SESAR Project Awards - Best in class Nomination for Pj14.01.04SESAR Project Awards - Best in class Nomination for Pj14.01.04
SESAR Project Awards - Best in class Nomination for Pj14.01.04
 
Dual-use technologies for sustainable development
Dual-use technologies for sustainable developmentDual-use technologies for sustainable development
Dual-use technologies for sustainable development
 
Il contributo di Finmeccanica all'Italia: tecnologia, crescita, investimenti ...
Il contributo di Finmeccanica all'Italia: tecnologia, crescita, investimenti ...Il contributo di Finmeccanica all'Italia: tecnologia, crescita, investimenti ...
Il contributo di Finmeccanica all'Italia: tecnologia, crescita, investimenti ...
 
Precisazione Finmeccanica
Precisazione FinmeccanicaPrecisazione Finmeccanica
Precisazione Finmeccanica
 
Finmeccanica 3 q 9m 2015 results presentation
Finmeccanica 3 q 9m 2015 results presentationFinmeccanica 3 q 9m 2015 results presentation
Finmeccanica 3 q 9m 2015 results presentation
 
Varese Living Lab, il progetto e le sue evoluzioni. La presentazione di Franc...
Varese Living Lab, il progetto e le sue evoluzioni. La presentazione di Franc...Varese Living Lab, il progetto e le sue evoluzioni. La presentazione di Franc...
Varese Living Lab, il progetto e le sue evoluzioni. La presentazione di Franc...
 
Finmeccanica Full Year 2013 Results Presentation
Finmeccanica Full Year 2013 Results PresentationFinmeccanica Full Year 2013 Results Presentation
Finmeccanica Full Year 2013 Results Presentation
 
Finmeccanica 3Q/9M 2014 Results Presentation
Finmeccanica 3Q/9M 2014 Results Presentation Finmeccanica 3Q/9M 2014 Results Presentation
Finmeccanica 3Q/9M 2014 Results Presentation
 
Finmeccanica First Quarter 2014 Result Presentation
Finmeccanica First Quarter 2014 Result PresentationFinmeccanica First Quarter 2014 Result Presentation
Finmeccanica First Quarter 2014 Result Presentation
 
3Q and 9M Results Presentation- November 08th 2013
3Q and 9M Results Presentation- November 08th 20133Q and 9M Results Presentation- November 08th 2013
3Q and 9M Results Presentation- November 08th 2013
 
Audizione Alessandro Pansa alla Commissione Attività Produttive della Camera-...
Audizione Alessandro Pansa alla Commissione Attività Produttive della Camera-...Audizione Alessandro Pansa alla Commissione Attività Produttive della Camera-...
Audizione Alessandro Pansa alla Commissione Attività Produttive della Camera-...
 
CP Expo 2014: Cybersecurity and Cybercrime
CP Expo 2014: Cybersecurity and CybercrimeCP Expo 2014: Cybersecurity and Cybercrime
CP Expo 2014: Cybersecurity and Cybercrime
 
Finmeccanica First Quarter 2015 Result Presentation
Finmeccanica First Quarter 2015 Result PresentationFinmeccanica First Quarter 2015 Result Presentation
Finmeccanica First Quarter 2015 Result Presentation
 
Audizione dell'AD Alessandro Pansa al Senato della Repubblica-20 marzo 2014
Audizione dell'AD Alessandro Pansa al Senato della Repubblica-20 marzo 2014Audizione dell'AD Alessandro Pansa al Senato della Repubblica-20 marzo 2014
Audizione dell'AD Alessandro Pansa al Senato della Repubblica-20 marzo 2014
 
Finmeccanica First Half 2015 results presentation
Finmeccanica First Half 2015 results presentationFinmeccanica First Half 2015 results presentation
Finmeccanica First Half 2015 results presentation
 
Cyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital worldCyber trust: cornerstone of a digital world
Cyber trust: cornerstone of a digital world
 
Finmeccanica 2014 First Half Results Presentation - update
Finmeccanica 2014 First Half Results Presentation - updateFinmeccanica 2014 First Half Results Presentation - update
Finmeccanica 2014 First Half Results Presentation - update
 

Similar a Selex Es main conference brief for Kingdom Cyber Security Forum

Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkAchieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Kevin Fealey
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
Darren Argyle
 

Similar a Selex Es main conference brief for Kingdom Cyber Security Forum (20)

Yaksas CSC - Vulnerability Assessment & Penetration Testing
Yaksas CSC - Vulnerability Assessment & Penetration Testing Yaksas CSC - Vulnerability Assessment & Penetration Testing
Yaksas CSC - Vulnerability Assessment & Penetration Testing
 
Cyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative WorldCyber Security Management in a Highly Innovative World
Cyber Security Management in a Highly Innovative World
 
OpenText Cyber Resilience Fastrak
OpenText Cyber Resilience FastrakOpenText Cyber Resilience Fastrak
OpenText Cyber Resilience Fastrak
 
The Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and LancopeThe Network as a Sensor, Cisco and Lancope
The Network as a Sensor, Cisco and Lancope
 
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity FrameworkAchieving Visible Security at Scale with the NIST Cybersecurity Framework
Achieving Visible Security at Scale with the NIST Cybersecurity Framework
 
Shift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber ResilienceShift Toward Dynamic Cyber Resilience
Shift Toward Dynamic Cyber Resilience
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Accuvant Intro
Accuvant IntroAccuvant Intro
Accuvant Intro
 
Security Testing for Test Professionals
Security Testing for Test ProfessionalsSecurity Testing for Test Professionals
Security Testing for Test Professionals
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Company_Profile_Updated_17032016
Company_Profile_Updated_17032016Company_Profile_Updated_17032016
Company_Profile_Updated_17032016
 
Enterprise Mobility: Secure Containerization
Enterprise Mobility: Secure ContainerizationEnterprise Mobility: Secure Containerization
Enterprise Mobility: Secure Containerization
 
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation  Securing the Extended Enterprise with Mobile Security - Customer Presentation
Securing the Extended Enterprise with Mobile Security - Customer Presentation
 
ePlus CyberSecurity Management Program
ePlus CyberSecurity Management ProgramePlus CyberSecurity Management Program
ePlus CyberSecurity Management Program
 
Security Testing for Testing Professionals
Security Testing for Testing ProfessionalsSecurity Testing for Testing Professionals
Security Testing for Testing Professionals
 
Tesseract Service Portfolio
Tesseract Service PortfolioTesseract Service Portfolio
Tesseract Service Portfolio
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 

Más de Leonardo

Más de Leonardo (20)

The Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results PresentationThe Leonardo 1Q 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
 
Leonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdfLeonardo - Technologies for a Safer Future.pdf
Leonardo - Technologies for a Safer Future.pdf
 
The Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results PresentationThe Leonardo FY 2023 Preliminary Results Presentation
The Leonardo FY 2023 Preliminary Results Presentation
 
Leonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results PresentationLeonardo 3Q/9M Results Presentation
Leonardo 3Q/9M Results Presentation
 
Leonardo 1H 2023 Results
Leonardo 1H 2023 ResultsLeonardo 1H 2023 Results
Leonardo 1H 2023 Results
 
Leonardo 1Q 2023 Results
Leonardo 1Q 2023 ResultsLeonardo 1Q 2023 Results
Leonardo 1Q 2023 Results
 
Leonardo FY 2022 Results
Leonardo FY 2022 ResultsLeonardo FY 2022 Results
Leonardo FY 2022 Results
 
Leonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 ResultsLeonardo 3Q/9M 2022 Results
Leonardo 3Q/9M 2022 Results
 
Leonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results PresentationLeonardo 2Q/1H2022 Results Presentation
Leonardo 2Q/1H2022 Results Presentation
 
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
 
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
 
Leonardo 1Q 2022 Results
Leonardo 1Q 2022 ResultsLeonardo 1Q 2022 Results
Leonardo 1Q 2022 Results
 
Leonardo FY2021 Results
Leonardo FY2021 ResultsLeonardo FY2021 Results
Leonardo FY2021 Results
 
European Rotors - Certification by Simulation
European Rotors - Certification by SimulationEuropean Rotors - Certification by Simulation
European Rotors - Certification by Simulation
 
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
European Rotors - Mission Management System’s Capabilities for Law Enforcemen...
 
European Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL SymposiumEuropean Rotors - Rotorcraft and VTOL Symposium
European Rotors - Rotorcraft and VTOL Symposium
 
European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day European Rotors - Contributing to the Swiss Innovation Day
European Rotors - Contributing to the Swiss Innovation Day
 
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation FuelEuropean Rotors - Helioffshore panel on Sustainable Aviation Fuel
European Rotors - Helioffshore panel on Sustainable Aviation Fuel
 
European Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft OperationsEuropean Rotors - PBN and GNSS for Rotorcraft Operations
European Rotors - PBN and GNSS for Rotorcraft Operations
 
European Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS MarketEuropean Rotors - AW609 for HEMS Market
European Rotors - AW609 for HEMS Market
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 

Selex Es main conference brief for Kingdom Cyber Security Forum

  • 1. © Copyright Selex ES S.p.A 2014 All rights reserved A perspective from a Cyber Integrator From Reactive to Proactive: The power of managed situation awareness Presentation to Kingdom Cyber Security Forum May 2014
  • 2. © Copyright Selex ES S.p.A 2014 All rights reserved What is a Cyber Integrator? Situation Awareness – of what? Building a specific response Benefit from wider system collaboration
  • 3. © Copyright Selex ES S.p.A 2014 All rights reserved What is a Cyber Integrator? Situation Awareness – of what? Building a specific response Benefit from wider system collaboration
  • 4. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved Threats, vulnerabilities and underlying information technology are changing at a ferocious pace; so must all the countermeasures Viruses Trojans Botnets Phishing Waterhole Man in the email Policy Training Hardening Intrusion detection Anomaly detection Malware analysis Certification And in complex environments, no single product or service specialist can keep up
  • 5. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved Defence (National & NATO) National Security Agencies Governments & institutions Law Enforcement Telecommunications Banking & Insurance Healthcare Transport & Utilities Prime Contractors Large Enterprises A Cyber Integrator is typically a systems integrator and manufacturer with a broad perspective of security requirements – and a dedicated security practice
  • 6. © Copyright Selex ES S.p.A 2014 All rights reserved Understand factors, methods and history Driven by nature and extent of measures required to achieve desired security In some cases, an annual check up Is sufficient. In others, constant monitoring is recommended! Level of threat X Level of vulnerability = Extent of security measures required Understand technical vulnerabilities and weaknesses in security governance and user habits A practiced Cyber Integrator seeks to diagnose before prescribing
  • 7. © Copyright Selex ES S.p.A 2014 All rights reserved • Customer desired business objectives SOLUTIONS ARE BUILT ON: • Customers’ direct threats and vulnerabilities • Customers’ indirect risks and challenges • Engineered solutions and services A Cyber Integrator takes a systems engineering approach
  • 8. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved Compromising Ability to Perform Intellectual Property Theft Loss of Financial Control Ability to Recover Threat to Human Safety Affecting Compliance Status Threatening Reputation Clients suffering data loss, theft and cyber attack with serious to existential consequences
  • 9. © Copyright Selex ES S.p.A 2014 All rights reserved Selex ES: What is a Cyber Integrator? Situation Awareness – of what? Building a specific response Benefit from wider system collaboration
  • 10. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved Our customers are beset by the same global issues Front office Operations IT and Administration Back office Operations Internal Contractors Bought-in Services Trusted Partners Executive Tactics Relentless Spam Socially engineered Botnet Attack Insider Attack Techniques Phishing Waterhole Spam Insider Procedures Reconnoitre Penetrate Sleep Propagate Control Transmit Transform Weapons Virus Trojan Worm Rootkit Logger Dialler Toolkits VANDALS PROTESTORS THIEVES SPIES NATIONS Deface Destroy Steal Cheat Impair Customer POS, ATM etc BranchPhone Online Contact with Enterprise
  • 11. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved And the evidence suggests that the money to be made attracts the very best talent – of the wrong sort • Face to face • Online payment • Man in the email (China, Nigeria and South Africa) Fraud Banking Account takeover Automated clearing Global fraud losses linked to ACH and wire fraud for banking institutions Corporate finance Mobile banking and financial transaction threats • $455 million 2012 • 2013 projection - $523 million • 2016 projection - $795 million
  • 12. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved https:// https:// And enterprises share common vulnerabilities POORLY INSTALLED FIREWALLS USING DEFAULT PASSWORDS POORLY PROTECTED CUSTOMER DATA AT REST POORLY MAINTAINED APPLICATIONS AND SYSTEMS IRRATIONALLY APPLIED ORGANISATION SECURITY POLICY POORLY MAINTAINED ANTI-VIRUS AND IPS/DLP SYSTEMS LOOSE UNDERSTANDING OF NETWORK ACTIVITY INSUFFICIENT ENCRYPTION OF DATA IN TRANSIT LOOSE ‘NEED TO KNOW’ POLICY POORLY PROTECTED CUSTOMER DATA AT REST POORLY MAINTAINED APPLICATIONS AND SYSTEMS IRRATIONALLY APPLIED ORGANISATION SECURITY POLICY POORLY MAINTAINED ANTI-VIRUS AND IPS/DLP SYSTEMS LOOSE UNDERSTANDING OF NETWORK ACTIVITY INSUFFICIENT ENCRYPTION OF DATA IN TRANSIT LOOSE ‘NEED TO KNOW’ POLICY USING DEFAULT PASSWORDS POORLY INSTALLED FIREWALLS
  • 13. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved So, we work with enterprises to improve awareness of Vulnerabilities, Threats and Attacks Processes People Culture Systems Tools TechniquesDrivers Organisation ThreatsVulnerabilities Level of Damage Tolerance of Damage Technology Procedures And then we start to build the appropriate responses…
  • 14. © Copyright Selex ES S.p.A 2014 All rights reserved Selex ES: What is a Cyber Integrator? Situation Awareness – of what? Building a specific response Benefit from wider system collaboration
  • 15. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved CYBER DOCTRINE Assess CYBER SERVICES Assessment Guidance Remediation Projects Managed Services Managed Services A Cyber Integrator draws on a coherent set of services designed to address threats and resolve vulnerabilities • Vulnerability • Maturity Assure Prevent Protect Detect Resist Defend Respond Contain Eradicate Recover Learn • Policy • Certification • Training • System hardening • System provision • Enterprise protective monitoring • Incident response forensics COMPETITIVE ADVANTAGE. INFORMATION SUPERIORITY.
  • 16. © Copyright Selex ES S.p.A 2014 All rights reserved Taking an Integrators’ approach, we then develop the Advisory, Skills transfer, Change and enduring Services solution to meet the need. Understand factors, methods and history Driven by nature and extent of measures required to achieve desired security But to keep up with changing threats, exploits and attack methods, our services have to be agile, flexible and truly innovative. Level of threat X Level of vulnerability = Extent of security measures required Understand technical vulnerabilities and weaknesses in security governance and user habits
  • 17. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved • Policy and legislation background • Essential industry architecture • Key industry governance processes • Key financial functions and processes • Key systems We immerse ourselves in your environment: How does a cyber services integrator achieve agility and flexibility?
  • 18. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved • Understand and model predominant attack/exploit methods • Develop and maintain a library and understanding of characteristic system vulnerabilities • Anticipate next generation exploits • Characterise key domain processes that are subject to attack We maintain sector specific technical expertise, backed by our own wider technical expertise and context Which enables us to provide a coherent set of appropriate services to the companies operating within the particular sector How does a cyber services integrator achieve agility and flexibility?
  • 19. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved What would the outcome look like? Achievement and maintenance of security compliance Monitoring and real time analysis of anomalies plus development of intelligence data -plus reaching out to external sources Response to incidents: containment, eradication and recovery Development and maintenance of situation awareness, dynamic risk analysis and feed back for training and process improvement - plus deeper malware / TTP analysis (DIY or bought-in) Hardening of key systems Regular vulnerability assessment DeterDetect Through life security AssureRespond Learn Assess Your Cyber Security Capability
  • 20. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved Detect Resist Defend Respond - Contain - Eradicate - Recover - Learn Deter Protect OrganisationUsersCore Systems Assess Assure © Copyright Selex ES S.p.A 2013 All rights reserved An Enterprise CIRT or equivalent managed service provides the right focus Enterprise CIRT
  • 21. © Copyright Selex ES S.p.A 2014 All rights reserved Selex ES: What is a Cyber Integrator? Situation Awareness – of what? Building a specific response Benefit from wider system collaboration
  • 22. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved The key characteristic of national and international response to cyber threats is collaboration © Copyright Selex ES S.p.A 2013 All rights reserved
  • 23. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved The key characteristic of response is collaboration • Joint research centre – vulnerabilities etc • Pan European exercises • Sector and National CSIRTs • Europol and Interpol: cooperation for Cyber EU CYBER STRATEGY RESTS ON COLLABORATION © Copyright Selex ES S.p.A 2013 All rights reserved
  • 24. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved • To optimise information sharing, collaboration and interoperability NATO: LISBON DECLARATION The key characteristic of response is collaboration © Copyright Selex ES S.p.A 2013 All rights reserved
  • 25. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved Comprehensive National Cyber security Initiative • Connecting Cyber Operations Centres • Shared Situational Awareness • Federal, State, Local and Private Sector • Supply chain initiative US INITIATIVES: © Copyright Selex ES S.p.A 2013 All rights reserved The key characteristic of response is collaboration • Education and R&D initiative • FUNDING! The concept of sector and national nodes and hubs for reporting, correlating data and sharing intelligence is gaining momentum
  • 26. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved And what does all that collaboration provide to the participants? A massive surface area to gather cyber intelligence So, where does one start?
  • 27. © Copyright Selex ES S.p.A 2014 All rights reserved Plans Procedures Lessons learned Vulnerabilities Threats Impact Breach and incident data Technical indicators of compromise Suggested remediation actions © Copyright Selex ES S.p.A 2013 All rights reserved Vulnerabilities Threats Impact Breach and incident data Sector CIRT Secure and trusted information sharing Enterprise CIRTEnterprise CIRT Within any Business or Government Sector, a federated and trustworthy Sector CIRT would encourage collaboration
  • 28. © Copyright Selex ES S.p.A 2014 All rights reserved© Copyright Selex ES S.p.A 2014 All rights reserved The national effect: shared situational awareness of network vulnerabilities, threats, and events Banking Oil & GasPower generation Aviation TelecomsMedical Are you seeing what we are seeing?
  • 29. © Copyright Selex ES S.p.A 2014 All rights reserved Presentation to Kingdom Cyber Security Forum Thank you for listening May 2014