SlideShare una empresa de Scribd logo
1 de 22
Descargar para leer sin conexión
MANAGED DETECTION AND RESPONSE
APRIL 2018
RISK
SECURITY
SIM, SEM & SO ON
MSP & MSSP’s
GARTNER
Why MDR?
EXAMPLE
WRAP UP
David King
Head of Research & Innovation
D A T A C L A S S I F I C A T I O N & G D P R
PREVENT DETECT RESPONDPROTECT
4 PILLARS.
SEMSIM
I N C I D E N T S D A T A E V E N T S
SIEM
Combination and
correlation of events and
incidents, displayed in
textual or graphical form
Concerned with real-
time monitoring of logs
and correlation of events
Data retention and the
later analysis and
reporting on log data and
security records
TRADITIONAL
APPROACH.
M A N A G E D S E R V I C E
P R O V I D E R S
M A N A G E D S E C U R I T Y S E R V I C E
P R O V I D E R S
MSP & MSSP.
‘Pay as you go’
infrastructure &
service
Assistance &
consulting
Remote
monitoring &
reporting
Monitoring of
security devices
Consultancy &
advice
Security
operations centre
… u s e M D R s e r v i c e s t o a u g m e n t
e x i s t i n g s e c u r i t y m o n i t o r i n g
c a p a b i l i t i e s t o a d d r e s s g a p s
[ … ] b e f o r e i n v e s t i n g i n m o r e
s e c u r i t y m o n i t o r i n g t o o l s ( e . g .
s e c u r i t y i n f o r m a t i o n a n d e v e n t
m a n a g e m e n t [ S I E M ] , a n d h o s t
t h r e a t d e t e c t i o n ) , a n d
a s s o c i a t e d s t a f f a n d e x p e r t i s e .
“
“
Market Guide for Managed Detection and Response, Gartner, May 2016
WHY
MDR?
SERVICE
Managed 24 X 7 via the security operations
centre.
STAFFING
Highly skilled, highly trained.
Allows your staff to focus on business issues.
COST
Typically much lower cost solution than SIEM.
Delivered as an operating expense allowing for easier
budgeting.
COMPLEXITY
Networks are complicated.
Tools are complicated and require a lot of
maintenance.
STATE OF
THE ART
CUTTING EDGE
APPROPRIATE
TECHNICAL AND
ORGANISATIONAL
ME ASURE
Phrase appears 18 times.
‘Technical’ and ‘technical
measures’ appears 40
times!
BREACH
NOTIFICATION
You must tell the
supervisory authority
within 72 hours of
detection or finding out.
You must tell the affected
data subjects (if their
rights and freedoms may
be at risk) within 72
hours.
PENALTIES
€20M or 4% of global
annual turnover.
€10m or 2% of global
annual turnover.
When developing and
designing […] and, with
due regard to the state of
the art, to make sure that
controllers and
processors are able to
fulfil their data protection
obligations.
CONTROLS TIME SENSITIVE FINES
WHY
SECON CYBER?
ALWAYS-ON SECURITY
Managed 24 X 7 via our Security-as-a-Service.
EXPERTISE
RESPONSE
Fast and human.
Relationships with vendors.
VALUE
SIEM is expensive to deploy & manage.
Low cost per device per month.
Minimal additional hardware/software investment.
Easy to deploy.
Highly skilled, trained and motivated engineers.
High retention rates.
Excellent communication skills.
OUR
PLATFORM.
o Hardened CentOS appliance (local)
o Minimal hardware requirements
o Secure communications using TLS
o Load balanced with multiple ingestion engines
o Uses AWS ElasticCloud and Databases-as-a-Service
o Portal accessible only over secure channels
WANNACRY.
WannaCry
FIRST LOG RECEIVED
13:31pm – Logs indicate an unknown
threat taking advantage of a known
exploit
FIRST RESPONSE
13:34pm – Engineer notifiesTrust of problems
and requests they prepare their incident
response teams.
Engineers continue to investigate.
17
SUBSEQUENT CONTACT
13:45pm - Method of propagation identified.
Policy change communicated to trust prior to
implementation.
ACTION
13:45pm - Policy changed to prevent further
propagation.
Approximately 300 machines infected.
NEXT ACTION
Engineers continue investigation based on
several logs.
Logs shared with vendors.
First real-time example received by vendor from
Secon Cyber
REVIEW
Post incident review.
Recommendation to deploy vulnerability
protection.
Regular health checks & maintenance.
Review of incident response plans.
REPORT
15:30pm - Reports produced identifying all
impacted machines, including IP address, last user
logged on, location (if known)
120 MINUTES
All machines identified and isolated.
Local recovery plans implemented.
Environment review scheduled.
Established in 1999 we have long standing experience of providing class leading cyber security solutions to
customers ranging from small to large enterprises. Our expertise lies in our deep understanding of the cyber
security market and unique position in bringing some of the best of breed products and services to provide
a fit for purpose and value for money security solution. This is evidenced by our high customer retention
rate.
US
ABOUT
Over 3 billion
logs processed to date
30,000+
endpoints monitored
Installed in a day!*
David King
Head of Research & Innovation
@TechSecDAK
STAND - R502
WORK
PLAY
LIVE

Más contenido relacionado

La actualidad más candente

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
ReZa AdineH
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
Albert Hui
 

La actualidad más candente (20)

Security operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیتSecurity operations center-SOC Presentation-مرکز عملیات امنیت
Security operations center-SOC Presentation-مرکز عملیات امنیت
 
Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Introduction to MITRE ATT&CK
Introduction to MITRE ATT&CKIntroduction to MITRE ATT&CK
Introduction to MITRE ATT&CK
 
Soc
SocSoc
Soc
 
Building A Security Operations Center
Building A Security Operations CenterBuilding A Security Operations Center
Building A Security Operations Center
 
MITRE ATT&CK framework
MITRE ATT&CK frameworkMITRE ATT&CK framework
MITRE ATT&CK framework
 
Building Security Operation Center
Building Security Operation CenterBuilding Security Operation Center
Building Security Operation Center
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
Strategy considerations for building a security operations center
Strategy considerations for building a security operations centerStrategy considerations for building a security operations center
Strategy considerations for building a security operations center
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
A Guide to Managed Security Services
A Guide to Managed Security ServicesA Guide to Managed Security Services
A Guide to Managed Security Services
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Incident Response Triage
Incident Response TriageIncident Response Triage
Incident Response Triage
 
Cybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHSCybersecurity Priorities and Roadmap: Recommendations to DHS
Cybersecurity Priorities and Roadmap: Recommendations to DHS
 
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...Next Generation  Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
Next Generation Defense in Depth Model - Tari Schreider, CCISO, Chief Cybers...
 
Cyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in DepthCyber Security Layers - Defense in Depth
Cyber Security Layers - Defense in Depth
 
Cloud Security Strategy by McAfee
Cloud Security Strategy by McAfeeCloud Security Strategy by McAfee
Cloud Security Strategy by McAfee
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 

Similar a A case for Managed Detection and Response

Similar a A case for Managed Detection and Response (20)

Prezentare_RSA.pptx
Prezentare_RSA.pptxPrezentare_RSA.pptx
Prezentare_RSA.pptx
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Cyber Defense Matrix: Reloaded
Cyber Defense Matrix: ReloadedCyber Defense Matrix: Reloaded
Cyber Defense Matrix: Reloaded
 
Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1
 
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
Travis Perkins: Building a 'Lean SOC' over 'Legacy SOC'
 
What We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATPWhat We Learned as the First and Best Customer of Symantec ATP
What We Learned as the First and Best Customer of Symantec ATP
 
Container Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptxContainer Workload Security Solution Ideas by Mandy Sidana.pptx
Container Workload Security Solution Ideas by Mandy Sidana.pptx
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Sourcefire Webinar - NEW GENERATION IPS
Sourcefire Webinar -  NEW GENERATION IPSSourcefire Webinar -  NEW GENERATION IPS
Sourcefire Webinar - NEW GENERATION IPS
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Juniper competitive cheatsheet
Juniper competitive cheatsheetJuniper competitive cheatsheet
Juniper competitive cheatsheet
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Top reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | SysforeTop reasons why Endpoint Security should move to Cloud | Sysfore
Top reasons why Endpoint Security should move to Cloud | Sysfore
 
Big data for cybersecurity - skilledfield slides - 25032021
Big data for cybersecurity - skilledfield slides - 25032021Big data for cybersecurity - skilledfield slides - 25032021
Big data for cybersecurity - skilledfield slides - 25032021
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security EssentialWhy Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
Why Today’s Hybrid IT Complexity Makes 'as a Service' Security Essential
 
Enterprise incident response 2017
Enterprise incident response   2017Enterprise incident response   2017
Enterprise incident response 2017
 
Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...Top Cited Papers - International Journal of Network Security & Its Applicatio...
Top Cited Papers - International Journal of Network Security & Its Applicatio...
 
Hunting Hard & Failing Fast (ScotSoft 2019)
Hunting Hard & Failing Fast (ScotSoft 2019)Hunting Hard & Failing Fast (ScotSoft 2019)
Hunting Hard & Failing Fast (ScotSoft 2019)
 

Más de Digital Transformation EXPO Event Series

Más de Digital Transformation EXPO Event Series (20)

Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketingWho’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
Who’s afraid of GDPR: the application of Legitimate Interest in B2B marketing
 
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
Unleashing the Potential of Object Storage & Accelerating Cloud-First Initiat...
 
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile EraThe Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
The Future of SD-WAN: WAN Transformation in the Cloud and Mobile Era
 
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
Cloud in the Spotlight: How a National Institution ripped up the rule book wi...
 
What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?What happens if you’re not ready for the GDPR?
What happens if you’re not ready for the GDPR?
 
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WANMoving Beyond the Router to a Thin-branch or Application-driven SD-WAN
Moving Beyond the Router to a Thin-branch or Application-driven SD-WAN
 
A modern approach to cloud computing
A modern approach to cloud computing A modern approach to cloud computing
A modern approach to cloud computing
 
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Citrix NetScaler SD-WAN - What’s New, What’s Hot?Citrix NetScaler SD-WAN - What’s New, What’s Hot?
Citrix NetScaler SD-WAN - What’s New, What’s Hot?
 
Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV Evolving the WAN for the Cloud, using SD-WAN & NFV
Evolving the WAN for the Cloud, using SD-WAN & NFV
 
Splunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learningSplunk for AIOps: Reduce IT outages through prediction with machine learning
Splunk for AIOps: Reduce IT outages through prediction with machine learning
 
Lean Analytics: How to get more out of your data science team
Lean Analytics: How to get more out of your data science teamLean Analytics: How to get more out of your data science team
Lean Analytics: How to get more out of your data science team
 
Top 5 Lessons Learned in Deploying AI in the Real World
Top 5 Lessons Learned in Deploying AI in the Real WorldTop 5 Lessons Learned in Deploying AI in the Real World
Top 5 Lessons Learned in Deploying AI in the Real World
 
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
Bringing Enterprise to the Blockchain - Moving from Science Experiment to Pra...
 
Data Science Is More Than Just Statistics
Data Science Is More Than Just StatisticsData Science Is More Than Just Statistics
Data Science Is More Than Just Statistics
 
Breaking down the Microsoft AI Platform
Breaking down the Microsoft AI Platform Breaking down the Microsoft AI Platform
Breaking down the Microsoft AI Platform
 
The convergence of Data Science and Software Development
The convergence of Data Science and Software DevelopmentThe convergence of Data Science and Software Development
The convergence of Data Science and Software Development
 
The future impact of AI in cybercrime
The future impact of AI in cybercrimeThe future impact of AI in cybercrime
The future impact of AI in cybercrime
 
Digital Innovation in Medical Gases
Digital Innovation in Medical GasesDigital Innovation in Medical Gases
Digital Innovation in Medical Gases
 
AI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industryAI is moving from its academic roots to the forefront of business and industry
AI is moving from its academic roots to the forefront of business and industry
 
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any LongerWhy Your Business Can’t Ignore the Need for a Password Manager Any Longer
Why Your Business Can’t Ignore the Need for a Password Manager Any Longer
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 

A case for Managed Detection and Response

  • 1. MANAGED DETECTION AND RESPONSE APRIL 2018
  • 2. RISK SECURITY SIM, SEM & SO ON MSP & MSSP’s GARTNER Why MDR? EXAMPLE WRAP UP
  • 3. David King Head of Research & Innovation D A T A C L A S S I F I C A T I O N & G D P R
  • 4.
  • 5.
  • 6.
  • 7.
  • 9. SEMSIM I N C I D E N T S D A T A E V E N T S SIEM Combination and correlation of events and incidents, displayed in textual or graphical form Concerned with real- time monitoring of logs and correlation of events Data retention and the later analysis and reporting on log data and security records TRADITIONAL APPROACH.
  • 10. M A N A G E D S E R V I C E P R O V I D E R S M A N A G E D S E C U R I T Y S E R V I C E P R O V I D E R S MSP & MSSP. ‘Pay as you go’ infrastructure & service Assistance & consulting Remote monitoring & reporting Monitoring of security devices Consultancy & advice Security operations centre
  • 11. … u s e M D R s e r v i c e s t o a u g m e n t e x i s t i n g s e c u r i t y m o n i t o r i n g c a p a b i l i t i e s t o a d d r e s s g a p s [ … ] b e f o r e i n v e s t i n g i n m o r e s e c u r i t y m o n i t o r i n g t o o l s ( e . g . s e c u r i t y i n f o r m a t i o n a n d e v e n t m a n a g e m e n t [ S I E M ] , a n d h o s t t h r e a t d e t e c t i o n ) , a n d a s s o c i a t e d s t a f f a n d e x p e r t i s e . “ “ Market Guide for Managed Detection and Response, Gartner, May 2016
  • 12. WHY MDR? SERVICE Managed 24 X 7 via the security operations centre. STAFFING Highly skilled, highly trained. Allows your staff to focus on business issues. COST Typically much lower cost solution than SIEM. Delivered as an operating expense allowing for easier budgeting. COMPLEXITY Networks are complicated. Tools are complicated and require a lot of maintenance.
  • 13. STATE OF THE ART CUTTING EDGE APPROPRIATE TECHNICAL AND ORGANISATIONAL ME ASURE Phrase appears 18 times. ‘Technical’ and ‘technical measures’ appears 40 times! BREACH NOTIFICATION You must tell the supervisory authority within 72 hours of detection or finding out. You must tell the affected data subjects (if their rights and freedoms may be at risk) within 72 hours. PENALTIES €20M or 4% of global annual turnover. €10m or 2% of global annual turnover. When developing and designing […] and, with due regard to the state of the art, to make sure that controllers and processors are able to fulfil their data protection obligations. CONTROLS TIME SENSITIVE FINES
  • 14. WHY SECON CYBER? ALWAYS-ON SECURITY Managed 24 X 7 via our Security-as-a-Service. EXPERTISE RESPONSE Fast and human. Relationships with vendors. VALUE SIEM is expensive to deploy & manage. Low cost per device per month. Minimal additional hardware/software investment. Easy to deploy. Highly skilled, trained and motivated engineers. High retention rates. Excellent communication skills.
  • 15. OUR PLATFORM. o Hardened CentOS appliance (local) o Minimal hardware requirements o Secure communications using TLS o Load balanced with multiple ingestion engines o Uses AWS ElasticCloud and Databases-as-a-Service o Portal accessible only over secure channels
  • 16. WANNACRY. WannaCry FIRST LOG RECEIVED 13:31pm – Logs indicate an unknown threat taking advantage of a known exploit FIRST RESPONSE 13:34pm – Engineer notifiesTrust of problems and requests they prepare their incident response teams. Engineers continue to investigate.
  • 17. 17 SUBSEQUENT CONTACT 13:45pm - Method of propagation identified. Policy change communicated to trust prior to implementation. ACTION 13:45pm - Policy changed to prevent further propagation. Approximately 300 machines infected. NEXT ACTION Engineers continue investigation based on several logs. Logs shared with vendors. First real-time example received by vendor from Secon Cyber
  • 18. REVIEW Post incident review. Recommendation to deploy vulnerability protection. Regular health checks & maintenance. Review of incident response plans. REPORT 15:30pm - Reports produced identifying all impacted machines, including IP address, last user logged on, location (if known) 120 MINUTES All machines identified and isolated. Local recovery plans implemented. Environment review scheduled.
  • 19. Established in 1999 we have long standing experience of providing class leading cyber security solutions to customers ranging from small to large enterprises. Our expertise lies in our deep understanding of the cyber security market and unique position in bringing some of the best of breed products and services to provide a fit for purpose and value for money security solution. This is evidenced by our high customer retention rate. US ABOUT
  • 20. Over 3 billion logs processed to date 30,000+ endpoints monitored Installed in a day!*
  • 21. David King Head of Research & Innovation @TechSecDAK STAND - R502