SlideShare a Scribd company logo
1 of 20
Download to read offline
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Shifting from “Incident”
to “Continuous” Response
Bill White CISSP, CISA, CRISC
Information Security Architecture
Nov 10, 2017
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Disclaimer:
The opinions and content expressed in this presentation are my
own and should not be assumed to be in alignment with those of
my employer.
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Incident Response:
An organized approach to addressing and managing
the aftermath of a security breach or attack (also
known as an incident). The goal is to handle the
situation in a way that limits damage and reduces
recovery time and costs.
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command &
Control (C2)
Internal
Reconnaissance
Privileged
Operations
Internal Pivot
Maintain
Presence
Mission
Objectives
How?
Kill the attacker as early as possible in the Cyber Attack
Lifecycle
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Incident Response:
An organized approach to addressing and managing
the aftermath of a security breach or attack (also
known as an incident). The goal is to handle the
situation in a way that limits damage and reduces
recovery time and costs.
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command &
Control (C2)
Internal
Reconnaissance
Privileged
Operations
Internal Pivot
Maintain
Presence
Mission
Objectives
No, Really, How?
• Really! Find them and stop them!
• Take the knowledge you just gained and watch for
that to happen again.
• AGGREGATION of intelligence is the key!
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Reconnaissance
Weaponization
Delivery
Exploitation
Installation
Command &
Control (C2)
Internal
Reconnaissance
Privileged
Operations
Internal Pivot
Maintain
Presence
Mission
Objectives
This IP address has been
scanning the perimeter
A new exploit is identified in
the wild
A email was delivered with a file
attachment
Application error on
workstation
Powershell execution or new
executable
Anomalous DNS traffic
detected
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
The core of the next-generation security protection process will be continuous,
pervasive monitoring and visibility that is constantly analyzed for indications of
compromise.
“Designing an Adaptive Security Architecture for Protection from Advanced Attacks,” by Neil MacDonald and Peter Firstbrook, 12 February 2014, refreshed 28
January 2016, ID G00259490, https://www.gartner.com/doc/2665515/designing-adaptive-security- architecture-protection
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Security Monitoring will encompass as many layers of the IT stack as possible
including network activity, endpoints, system interactions, application
transactions and user activity.
The design and benefit of joining the foundational elements of intelligence,
context, and correlation with an adaptive architecture will be explored.
Intelligence Driven
Adaptive Security Architecture
Continuous
Monitoring
& Analytics
Continuous
Monitoring
Embedded
Analytics
ThreatIntelligence
CommunityIntelligence
VendorLabs
Policy
VulnerabilityScans
Context
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
This presentation will provide
security related scenarios where
centralized security data analytics
and adaptive security architecture
are used to respond in a dynamic
way to enable this next
generation security protection.
Cyberspace
Enterprise
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
Access ControlAccess Control
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
Associate
BYOD
Associate
BYOD
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
Corporate Mobil
Endpoint
Corporate Mobil
Endpoint
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
FirewallFirewall
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
ProxyProxy
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
Data ProtectionData Protection
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
Applications
Applications
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
Infrastructure
Infrastructure
Externally
Supplied
Security Intel
and Assets
Externally
Supplied
Security Intel
and Assets
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
Advanced
Detective
Controls
Advanced
Detective
Controls
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
VPN
ThreatsThreats CustomersCustomers
VendorsVendors
AssociatesAssociates
· On alert, it performs Enterprise-defined
policy based operations (i.e. a particular
analytic workflow) to enrich the alert
· It queries internal or external data sources
for sightings of similar behavior, file
hashes, etc
· In the case of a malware file, it may send
the file to a file detonation service
· It determines whether further action is
required
· If further action is required, it passes an
action alert to the Decision-Making Engine
· Otherwise, it logs its activities
Policy Engine
Enrichment and
Analytics Engine
Decision Making
Engine
Response/
Action Engine
· Acts on notification of a Security Event.
· Compares event to Enterprise-defined
policies
· Determines if a security event requires
further action
· On further action, passes the security
event to the Enrichment/Analytic engine
as an alert
· Otherwise, it logs the security event
· On action alert, it determines which
Enterprise-defined policy based Course of
Actions (COA(s)) are appropriate
· A selected COA might block all traffic from
a specific internet address or quarantine a
specific host system
· Enterprise policies and processes may
require notification and involvement of a
human decision maker
· No enterprise COA might exist for a given
action alert and it may initiate a manual
workflow via CSDC
· On selection, it passes the selected COA(s)
to the Response Engine
· The Response Engine translates the COA
into a machine translatable execution
workflow
· It sends this workflow to the Output
Framework
· On receipt of a workflow, the Output
Framework translates the workflow into
device-specific response actions and sends
to the appropriate enterprise sensors and
controls
· Asset Data· Asset Data
Threats and
Vulnerabilities
Business Value
and Context
Security and
Operational
· SIEM Alert Data· SIEM Alert Data
· Vulnerability Data· Vulnerability Data
· Endpoint and Network Protection· Endpoint and Network Protection
· Data Loss Incidents· Data Loss Incidents
· Vendor Threat Intelligence· Vendor Threat Intelligence
· Community Intelligence· Community Intelligence
· Organizational Data· Organizational Data
· User Data· User Data
· Role and Privilege Data· Role and Privilege Data
· HR Data· HR Data
· Legal and Regulatory Data· Legal and Regulatory Data
· Geolocation Data· Geolocation Data
· Authentication Data· Authentication Data
· Security Data· Security Data
· Endpoint and Network Data· Endpoint and Network Data
· Application Log Data· Application Log Data
· File and Data Movement Data· File and Data Movement Data
· Remote Access Data· Remote Access Data
· Physical Access Data· Physical Access Data
· Enterprise Information Security Policy· Enterprise Information Security Policy
· Enterprise and Information Security Standards· Enterprise and Information Security Standards
SIEMSIEM
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
We will look behind the curtain of "marketecture" to the real and aspirational
solutions for a SOC that will likely materialize as vendor products mature over
the next few years.
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
What makes up the next generation of security protection?
“Integrated Adaptive Cyber Defense (IACD) Baseline Reference Architecture”, Johns Hopkins Applied Physics Laboratory
https://secwww.jhuapl.edu/IACD/Resources/Architecture/IACD%20Baseline%20Reference%20Architecture%20-%20Final%20PR.pdf
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
The first step occurs when the Sensor/Control Interface receives notification of
a Security Event from enterprise sensors.
Based on enterprise-defined policies and processes, the Policy Engine will
determine that either the security event requires further action or it does not.
If further action is required, it will pass the security event information to the
Enrichment/ Analytic Framework as an alert. Otherwise, it will simply log the
security event.
Sensor (source)
Sensor (source)
Sensor (source)
Sensor (source)
Sensor (source)
Sensor / Control
InterfaceSecurity
Event
Policy Engine
ALERT
Aggregation
Analytics
Policy EnginePolicy Engine
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Enrichment and Analytic Framework receives an alert, it will perform any number of
operations (i.e. a particular analytic workflow) to enrich the alert information.
Based on the enriched information and enterprise policies and processes, the Analytic
Framework will determine whether further action is required or not.
If further action is required, it will pass the enriched information as an action alert to the
Decision-Making Engine. If no further action is required, it will simply log its activities.
Policy Engine Enrichment and Analytics Engine
ALERT
Sandbox Analytics
Full Packet Capture
3rd
Party Analytics
Asset/Information Query
Vulnerability Query
Aggregation
Decision
Policy EnginePolicy Engine Enrichment EngineEnrichment Engine
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Decision-Making Engine will determine what Course of Action
(COA) is appropriate
For example, a selected COA might block all traffic from a specific
internet address or quarantine a specific host system.
It is possible that enterprise policies and processes require the
notification and involvement of a human decision maker.
It is also possible that no enterprise COA exists for a given action
alert and the Decision-Making Engine may simply initiate a manual
workflow via SOC.
Once a COA is selected, the Decision-Making Engine will pass the
selected COA(s) to the Response Engine.
Decision-Making EngineResponse / Action Engine
Courses of
Action
Enrichment and Analytics Engine
Action Alert
Decision EngineDecision EngineAction EngineAction Engine
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
The Response/Action Engine
translates the COA into a machine
translatable execution workflow,
which it sends to the Sensor
interface.
Upon receipt of an execution
workflow, the Sensor Interface
translates the workflow into
device-specific response actions
that it sends to the appropriate
enterprise sensors and controls.
Sensor /
Control
Interface
Control
Control (Action
Point)
Policy Engine
Response / Action Engine
Response
Action
Work Flow
Decision-Making Engine
Courses of
Action
Action EngineAction Engine
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
An Basic Example
Policy:
• Is the laptop in the authorized
asset inventory?
• Is the laptop configured and
patched to standards?
Analytics:
• Retrieve asset history from CMDB
or ARM
• Retrieve vulnerability information
on this asset from VM
Decision:
• Allow DHCP to complete
• Move the asset to the remediation
network for mitigation
Action:
• Do or do not. There is no try.
IDASA Framework
Is this asset in
inventory?
Does it meet
baseline config?
Remediation Network
Patch Management
YES
NO
YES
NO
EWR
Domain
CMDB
Service Ticket
Laptop Connects
to the network
DHCP
CSDC
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Another Basic Example
Policy:
• High Risk User?
• High Risk Geo?
• Prior Authentication Risk?
• New Asset?
IDASA Framework
Is this a
high-risk
user?
Authentication
Domain
High Risk Users
YES
NO
Authentication Remediation Steps
* Challenge/response
* MFA
Fail Geo Testing?
Security
Analytics
High Prior
Failed
Attempts?
NO
YES
Different
Device?
YES
NO
YES
AuthorizationNO
Analytics:
• Retrieve credential memberships
• Retrieve IP history
• Retrieve authentication history
• Retrieve asset information
Decision:
Allow, Step Up Authentication, Send to
remediation network
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
A Mature Example
Policy:
• Approved executable?
• Normal?
• Privileged?
Analytics:
• Retrieve asset inventory
• Retrieve executable history
• Retrieve user/action history
Decision:
• Run the executable in sandbox
• Send Executable to malware
analytics
• Enable full packet capture
• Step up authentication
Executable
Is this an
approved
application?
User Behavior
Analytics
YES
NO
YES
NO
Sandbox
Application
Malware
Analysis
Open Service
Ticket
Applications
Sandbox
Application
Full Packet
Capture
Elevated HIDS
Updated/Additional Intel
CMDB
Auth
Remediation
YES
Security
Analytics
Is this normal
usage?
Priv
Operation?
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Intelligence Driven Adaptive Security Architecture
Time to mature
• Focus on addressing specific use cases while
building the engines
• Leverage automation and orchestration
• Fail CLOSED! (throw unknowns back to
humans for analysis and decision)
Advantages
• Detect, Respond, Recover at machine speed
• Free up analysts to address complex incidents
• Focus on gathering intelligence to feed
analytics
Stop being reactive!
Change from
“Incident Response”
to
“Continuous Response”
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
Shifting from
“Incident” to “Continuous” Response
QUESTIONS?
By: Bill White CISSP, CISA, CRISC
@riskofinfosec
NTXISSA Cyber Security Conference – November 10-11, 2017
@NTXISSA #NTXISSACSC5
20
Thank you

More Related Content

What's hot

What's hot (19)

A Guide to Managed Security Services
A Guide to Managed Security ServicesA Guide to Managed Security Services
A Guide to Managed Security Services
 
Cyber threat detection by siem tools
Cyber threat detection by siem toolsCyber threat detection by siem tools
Cyber threat detection by siem tools
 
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS ReportingPCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
PCI DSS Reporting Requirements for People Who Hate PCI DSS Reporting
 
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
 
SIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analystSIEM evaluator guide for soc analyst
SIEM evaluator guide for soc analyst
 
Tictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security ServicesTictaclabs Managed Cyber Security Services
Tictaclabs Managed Cyber Security Services
 
Threat Life Cycle Management
Threat Life Cycle ManagementThreat Life Cycle Management
Threat Life Cycle Management
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...Auditing & Assessing The  Risk Of Cloud Service Providers at Auditworld 2015 ...
Auditing & Assessing The Risk Of Cloud Service Providers at Auditworld 2015 ...
 
Hexis Cyber Solutions: Rules of Engagement for Cyber Security Automation
Hexis Cyber Solutions: Rules of Engagement for Cyber Security AutomationHexis Cyber Solutions: Rules of Engagement for Cyber Security Automation
Hexis Cyber Solutions: Rules of Engagement for Cyber Security Automation
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
What's Next : A Trillion Event Logs, A Million Security Threat
What's Next : A Trillion Event  Logs, A Million Security ThreatWhat's Next : A Trillion Event  Logs, A Million Security Threat
What's Next : A Trillion Event Logs, A Million Security Threat
 
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
Kevin Watkins, Enterprise Security Architect at BAT - BAT’s Managed Security ...
 
Tyler Technology Expo
Tyler Technology ExpoTyler Technology Expo
Tyler Technology Expo
 
How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...How to Choose the Right Security Information and Event Management (SIEM) Solu...
How to Choose the Right Security Information and Event Management (SIEM) Solu...
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Chamber Technology Committee Presentation
Chamber Technology Committee PresentationChamber Technology Committee Presentation
Chamber Technology Committee Presentation
 

Viewers also liked

NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
North Texas Chapter of the ISSA
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
North Texas Chapter of the ISSA
 

Viewers also liked (16)

Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghanNtxissacsc5 blue 6-securityawareness-laurianna_callaghan
Ntxissacsc5 blue 6-securityawareness-laurianna_callaghan
 
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using DeceptionNTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
NTXISSACSC4 - Detecting and Catching the Bad Guys Using Deception
 
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeqNtxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
Ntxissacsc5 blue 5-holistic approach to cybersecurity-abu_sadeq
 
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
Ntxissacsc5 yellow 2-evidence driven infosec compliance strategy-garrettp1
 
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_muellerNtxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
Ntxissacsc5 blue 4-the-attack_life_cycle_erich_mueller
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higginsNtxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
Ntxissacsc5 blue 7-zerotrust more effective approach to security-ed higgins
 
Ntxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompsonNtxissacsc5 purple 5-insider threat-_andy_thompson
Ntxissacsc5 purple 5-insider threat-_andy_thompson
 
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
Ntxissacsc5 yellow 6-abusing protocols for dynamic addressing in space-jacenr...
 
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowiczNtxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
Ntxissacsc5 gold 1--mimecast email resiliency- erez-haimowicz
 
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomeyNtxissacsc5 blue 2-herding cats and security tools-harold_toomey
Ntxissacsc5 blue 2-herding cats and security tools-harold_toomey
 
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florerNtxissacsc5 purple 1-eu-gdpr_patrick_florer
Ntxissacsc5 purple 1-eu-gdpr_patrick_florer
 
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersenNtxissacsc5 yellow 1-beginnerslinux bill-petersen
Ntxissacsc5 yellow 1-beginnerslinux bill-petersen
 
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykesNtxissacsc5 red 6-diy-pentest-lab dustin-dykes
Ntxissacsc5 red 6-diy-pentest-lab dustin-dykes
 
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
Ntxissacsc5 red 1 & 2   basic hacking tools ncc groupNtxissacsc5 red 1 & 2   basic hacking tools ncc group
Ntxissacsc5 red 1 & 2 basic hacking tools ncc group
 
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczulNtxissacsc5 purple 4-threat detection using machine learning-markszewczul
Ntxissacsc5 purple 4-threat detection using machine learning-markszewczul
 

Similar to Ntxissacsc5 blue 3-shifting from incident to continuous response bill white

Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
karlhennesey
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
Merlin Govender
 

Similar to Ntxissacsc5 blue 3-shifting from incident to continuous response bill white (20)

Database development and security certification and accreditation plan pitwg
Database development and security certification and accreditation plan  pitwgDatabase development and security certification and accreditation plan  pitwg
Database development and security certification and accreditation plan pitwg
 
CCA study group
CCA study groupCCA study group
CCA study group
 
Data Security and Compliance in Enterprise Cloud Migration.pdf
Data Security and Compliance in Enterprise Cloud Migration.pdfData Security and Compliance in Enterprise Cloud Migration.pdf
Data Security and Compliance in Enterprise Cloud Migration.pdf
 
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013   SIEM based …
Data Security Solutions @ISACA LV Chapter Meeting 15.05.2013 SIEM based …
 
Automating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS CloudAutomating Event Driven Security in the AWS Cloud
Automating Event Driven Security in the AWS Cloud
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP'sAlienVault MSSP Overview - A Different Approach to Security for MSSP's
AlienVault MSSP Overview - A Different Approach to Security for MSSP's
 
Overall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docxOverall Security Process Review CISC 6621Agend.docx
Overall Security Process Review CISC 6621Agend.docx
 
Infosec cert service
Infosec cert serviceInfosec cert service
Infosec cert service
 
SIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEBSIEM brochure A4 8pp FINAL WEB
SIEM brochure A4 8pp FINAL WEB
 
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
[EB100510] Evelyn del Monte: Context-Aware and Adaptive Security
 
Webinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM SolutionWebinar - Feel Secure with revolutionary OTM Solution
Webinar - Feel Secure with revolutionary OTM Solution
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Security and-visibility
Security and-visibilitySecurity and-visibility
Security and-visibility
 
Virtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - DeloitteVirtual Gov Day - Security Breakout - Deloitte
Virtual Gov Day - Security Breakout - Deloitte
 
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdfTop Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
Top Cloud Infrastructure Practices And Strategies For Maximum Security.pdf
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
Using Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise SecurityUsing Event Processing to Enable Enterprise Security
Using Event Processing to Enable Enterprise Security
 
Splunk for Security Breakout Session
Splunk for Security Breakout SessionSplunk for Security Breakout Session
Splunk for Security Breakout Session
 
ComResource - NW Agent Cybersecurity
ComResource - NW Agent CybersecurityComResource - NW Agent Cybersecurity
ComResource - NW Agent Cybersecurity
 

More from North Texas Chapter of the ISSA

NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
North Texas Chapter of the ISSA
 
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
North Texas Chapter of the ISSA
 

More from North Texas Chapter of the ISSA (14)

Purple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcuttPurple seven-ntxissacsc5 walcutt
Purple seven-ntxissacsc5 walcutt
 
Ntxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cepNtxissacsc5 yellow 7 protecting the cloud with cep
Ntxissacsc5 yellow 7 protecting the cloud with cep
 
Ntxissacsc5 gold 4 beyond detection and prevension remediation
Ntxissacsc5 gold 4 beyond detection and prevension   remediationNtxissacsc5 gold 4 beyond detection and prevension   remediation
Ntxissacsc5 gold 4 beyond detection and prevension remediation
 
Ntxissacsc5 gold 1 mimecast e mail resiliency
Ntxissacsc5  gold 1 mimecast e mail resiliencyNtxissacsc5  gold 1 mimecast e mail resiliency
Ntxissacsc5 gold 1 mimecast e mail resiliency
 
Ntxissacsc5 blue 1-nine cybersecurity habits-george_finney
Ntxissacsc5 blue 1-nine cybersecurity habits-george_finneyNtxissacsc5 blue 1-nine cybersecurity habits-george_finney
Ntxissacsc5 blue 1-nine cybersecurity habits-george_finney
 
NTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New WorldNTXISSACSC4 - Security for a New World
NTXISSACSC4 - Security for a New World
 
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
NTXISSACSC4 - Intellectual Property Protection― Cross Roads between Ethics, I...
 
NTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan HorseNTXISSACSC4 - How Not to Build a Trojan Horse
NTXISSACSC4 - How Not to Build a Trojan Horse
 
NTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in DepthNTXISSACSC4 - Layered Security / Defense in Depth
NTXISSACSC4 - Layered Security / Defense in Depth
 
NTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of DiscoveryNTXISSACSC4 - World of Discovery
NTXISSACSC4 - World of Discovery
 
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
NTXISSACSC4 - Business Geekdom: 1 = 3 = 5
 
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions ArchitectNTXISSACSC4 - Day in the Life of a Security Solutions Architect
NTXISSACSC4 - Day in the Life of a Security Solutions Architect
 
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human DashboardNTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
NTXISSACSC4 - Red, Amber, Green Status: The Human Dashboard
 
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green GameNTXISSACSC4 - Hacking Performance Management, the Blue Green Game
NTXISSACSC4 - Hacking Performance Management, the Blue Green Game
 

Recently uploaded

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
Diya Sharma
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
soniya singh
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
ellan12
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Sheetaleventcompany
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
SofiyaSharma5
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 

Recently uploaded (20)

Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
Hire↠Young Call Girls in Tilak nagar (Delhi) ☎️ 9205541914 ☎️ Independent Esc...
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 

Ntxissacsc5 blue 3-shifting from incident to continuous response bill white

  • 1. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Shifting from “Incident” to “Continuous” Response Bill White CISSP, CISA, CRISC Information Security Architecture Nov 10, 2017
  • 2. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Disclaimer: The opinions and content expressed in this presentation are my own and should not be assumed to be in alignment with those of my employer.
  • 3. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Incident Response: An organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident). The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Internal Reconnaissance Privileged Operations Internal Pivot Maintain Presence Mission Objectives How? Kill the attacker as early as possible in the Cyber Attack Lifecycle
  • 4. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Incident Response: An organized approach to addressing and managing the aftermath of a security breach or attack (also known as an incident). The goal is to handle the situation in a way that limits damage and reduces recovery time and costs. Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Internal Reconnaissance Privileged Operations Internal Pivot Maintain Presence Mission Objectives No, Really, How? • Really! Find them and stop them! • Take the knowledge you just gained and watch for that to happen again. • AGGREGATION of intelligence is the key!
  • 5. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Reconnaissance Weaponization Delivery Exploitation Installation Command & Control (C2) Internal Reconnaissance Privileged Operations Internal Pivot Maintain Presence Mission Objectives This IP address has been scanning the perimeter A new exploit is identified in the wild A email was delivered with a file attachment Application error on workstation Powershell execution or new executable Anomalous DNS traffic detected
  • 6. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 The core of the next-generation security protection process will be continuous, pervasive monitoring and visibility that is constantly analyzed for indications of compromise. “Designing an Adaptive Security Architecture for Protection from Advanced Attacks,” by Neil MacDonald and Peter Firstbrook, 12 February 2014, refreshed 28 January 2016, ID G00259490, https://www.gartner.com/doc/2665515/designing-adaptive-security- architecture-protection
  • 7. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Security Monitoring will encompass as many layers of the IT stack as possible including network activity, endpoints, system interactions, application transactions and user activity. The design and benefit of joining the foundational elements of intelligence, context, and correlation with an adaptive architecture will be explored. Intelligence Driven Adaptive Security Architecture Continuous Monitoring & Analytics Continuous Monitoring Embedded Analytics ThreatIntelligence CommunityIntelligence VendorLabs Policy VulnerabilityScans Context
  • 8. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 This presentation will provide security related scenarios where centralized security data analytics and adaptive security architecture are used to respond in a dynamic way to enable this next generation security protection. Cyberspace Enterprise · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards Access ControlAccess Control · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards Associate BYOD Associate BYOD · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards Corporate Mobil Endpoint Corporate Mobil Endpoint · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards FirewallFirewall · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards ProxyProxy · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards Data ProtectionData Protection · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards Applications Applications · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards Infrastructure Infrastructure Externally Supplied Security Intel and Assets Externally Supplied Security Intel and Assets · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards Advanced Detective Controls Advanced Detective Controls · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards VPN ThreatsThreats CustomersCustomers VendorsVendors AssociatesAssociates · On alert, it performs Enterprise-defined policy based operations (i.e. a particular analytic workflow) to enrich the alert · It queries internal or external data sources for sightings of similar behavior, file hashes, etc · In the case of a malware file, it may send the file to a file detonation service · It determines whether further action is required · If further action is required, it passes an action alert to the Decision-Making Engine · Otherwise, it logs its activities Policy Engine Enrichment and Analytics Engine Decision Making Engine Response/ Action Engine · Acts on notification of a Security Event. · Compares event to Enterprise-defined policies · Determines if a security event requires further action · On further action, passes the security event to the Enrichment/Analytic engine as an alert · Otherwise, it logs the security event · On action alert, it determines which Enterprise-defined policy based Course of Actions (COA(s)) are appropriate · A selected COA might block all traffic from a specific internet address or quarantine a specific host system · Enterprise policies and processes may require notification and involvement of a human decision maker · No enterprise COA might exist for a given action alert and it may initiate a manual workflow via CSDC · On selection, it passes the selected COA(s) to the Response Engine · The Response Engine translates the COA into a machine translatable execution workflow · It sends this workflow to the Output Framework · On receipt of a workflow, the Output Framework translates the workflow into device-specific response actions and sends to the appropriate enterprise sensors and controls · Asset Data· Asset Data Threats and Vulnerabilities Business Value and Context Security and Operational · SIEM Alert Data· SIEM Alert Data · Vulnerability Data· Vulnerability Data · Endpoint and Network Protection· Endpoint and Network Protection · Data Loss Incidents· Data Loss Incidents · Vendor Threat Intelligence· Vendor Threat Intelligence · Community Intelligence· Community Intelligence · Organizational Data· Organizational Data · User Data· User Data · Role and Privilege Data· Role and Privilege Data · HR Data· HR Data · Legal and Regulatory Data· Legal and Regulatory Data · Geolocation Data· Geolocation Data · Authentication Data· Authentication Data · Security Data· Security Data · Endpoint and Network Data· Endpoint and Network Data · Application Log Data· Application Log Data · File and Data Movement Data· File and Data Movement Data · Remote Access Data· Remote Access Data · Physical Access Data· Physical Access Data · Enterprise Information Security Policy· Enterprise Information Security Policy · Enterprise and Information Security Standards· Enterprise and Information Security Standards SIEMSIEM
  • 9. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 We will look behind the curtain of "marketecture" to the real and aspirational solutions for a SOC that will likely materialize as vendor products mature over the next few years.
  • 10. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 What makes up the next generation of security protection? “Integrated Adaptive Cyber Defense (IACD) Baseline Reference Architecture”, Johns Hopkins Applied Physics Laboratory https://secwww.jhuapl.edu/IACD/Resources/Architecture/IACD%20Baseline%20Reference%20Architecture%20-%20Final%20PR.pdf
  • 11. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 The first step occurs when the Sensor/Control Interface receives notification of a Security Event from enterprise sensors. Based on enterprise-defined policies and processes, the Policy Engine will determine that either the security event requires further action or it does not. If further action is required, it will pass the security event information to the Enrichment/ Analytic Framework as an alert. Otherwise, it will simply log the security event. Sensor (source) Sensor (source) Sensor (source) Sensor (source) Sensor (source) Sensor / Control InterfaceSecurity Event Policy Engine ALERT Aggregation Analytics Policy EnginePolicy Engine
  • 12. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Enrichment and Analytic Framework receives an alert, it will perform any number of operations (i.e. a particular analytic workflow) to enrich the alert information. Based on the enriched information and enterprise policies and processes, the Analytic Framework will determine whether further action is required or not. If further action is required, it will pass the enriched information as an action alert to the Decision-Making Engine. If no further action is required, it will simply log its activities. Policy Engine Enrichment and Analytics Engine ALERT Sandbox Analytics Full Packet Capture 3rd Party Analytics Asset/Information Query Vulnerability Query Aggregation Decision Policy EnginePolicy Engine Enrichment EngineEnrichment Engine
  • 13. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Decision-Making Engine will determine what Course of Action (COA) is appropriate For example, a selected COA might block all traffic from a specific internet address or quarantine a specific host system. It is possible that enterprise policies and processes require the notification and involvement of a human decision maker. It is also possible that no enterprise COA exists for a given action alert and the Decision-Making Engine may simply initiate a manual workflow via SOC. Once a COA is selected, the Decision-Making Engine will pass the selected COA(s) to the Response Engine. Decision-Making EngineResponse / Action Engine Courses of Action Enrichment and Analytics Engine Action Alert Decision EngineDecision EngineAction EngineAction Engine
  • 14. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 The Response/Action Engine translates the COA into a machine translatable execution workflow, which it sends to the Sensor interface. Upon receipt of an execution workflow, the Sensor Interface translates the workflow into device-specific response actions that it sends to the appropriate enterprise sensors and controls. Sensor / Control Interface Control Control (Action Point) Policy Engine Response / Action Engine Response Action Work Flow Decision-Making Engine Courses of Action Action EngineAction Engine
  • 15. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 An Basic Example Policy: • Is the laptop in the authorized asset inventory? • Is the laptop configured and patched to standards? Analytics: • Retrieve asset history from CMDB or ARM • Retrieve vulnerability information on this asset from VM Decision: • Allow DHCP to complete • Move the asset to the remediation network for mitigation Action: • Do or do not. There is no try. IDASA Framework Is this asset in inventory? Does it meet baseline config? Remediation Network Patch Management YES NO YES NO EWR Domain CMDB Service Ticket Laptop Connects to the network DHCP CSDC
  • 16. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Another Basic Example Policy: • High Risk User? • High Risk Geo? • Prior Authentication Risk? • New Asset? IDASA Framework Is this a high-risk user? Authentication Domain High Risk Users YES NO Authentication Remediation Steps * Challenge/response * MFA Fail Geo Testing? Security Analytics High Prior Failed Attempts? NO YES Different Device? YES NO YES AuthorizationNO Analytics: • Retrieve credential memberships • Retrieve IP history • Retrieve authentication history • Retrieve asset information Decision: Allow, Step Up Authentication, Send to remediation network
  • 17. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 A Mature Example Policy: • Approved executable? • Normal? • Privileged? Analytics: • Retrieve asset inventory • Retrieve executable history • Retrieve user/action history Decision: • Run the executable in sandbox • Send Executable to malware analytics • Enable full packet capture • Step up authentication Executable Is this an approved application? User Behavior Analytics YES NO YES NO Sandbox Application Malware Analysis Open Service Ticket Applications Sandbox Application Full Packet Capture Elevated HIDS Updated/Additional Intel CMDB Auth Remediation YES Security Analytics Is this normal usage? Priv Operation?
  • 18. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Intelligence Driven Adaptive Security Architecture Time to mature • Focus on addressing specific use cases while building the engines • Leverage automation and orchestration • Fail CLOSED! (throw unknowns back to humans for analysis and decision) Advantages • Detect, Respond, Recover at machine speed • Free up analysts to address complex incidents • Focus on gathering intelligence to feed analytics Stop being reactive! Change from “Incident Response” to “Continuous Response”
  • 19. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 Shifting from “Incident” to “Continuous” Response QUESTIONS? By: Bill White CISSP, CISA, CRISC @riskofinfosec
  • 20. NTXISSA Cyber Security Conference – November 10-11, 2017 @NTXISSA #NTXISSACSC5 20 Thank you