SlideShare uma empresa Scribd logo
1 de 31
Baixar para ler offline
1
GAME-CHANGING DEFENSIVE
STRATEGIES FOR 2019
Sponsored by Fidelis
1
© Copyright 2019 SANS Institute
Today’s Speakers
ALISSA TORRES
Analyst &
Principal Instructor
SANS Institute
Dr. ABDUL RAHMAN
Chief Scientist
Fidelis Cybersecurity
TOM CLARE
Product Strategy
Fidelis Cybersecurity
© Copyright 2019 SANS Institute 2
• The fabric of the enterprise has morphed and now
includes cloud, mobile, IoT of all types in addition to
the traditional managed assets
• A shift in security mindset is required to perform
accurate risk assessment on today’s environments and
to anticipate future threats
© Copyright 2019 SANS Institute 3
Evolving Defensible Assets:
what is a network comprised of?
© Copyright 2019 SANS Institute 4
What device
types are
connecting
to your
network or
part of your
network?
Are they
included in
your security
programs?
SANS Endpoint Security Survey 2018
• With the increase in mobile, cloud & IoT devices,
today’s enterprises are effectively de-perimeterized
• Old boundaries of “inside” and “outside” or “trusted”
and “untrusted” no longer apply
• Successful defense is achieved with multiple
prevention and detection solutions
© Copyright 2019 SANS Institute 5
What is Defensible Security Architecture?
• Leverage & harden current infrastructure (switches,
routers & firewalls)
• Harden systems & networks at every layer from physical
to application & data
• Greenfielding a network not realistic, most enterprises
are comprised of entrenched legacy technologies
• Private VLANS, Network Access Control, 802.1x
© Copyright 2019 SANS Institute 6
Evolution of Best Practices for Defensible
Security Architecture
• Cost of additional rework caused by choosing an easy
solution now instead of a better approach that work take
longer
• Can there be smart technical debt?
• How does it relate to defensible security architecture?
© Copyright 2019 SANS Institute 7
Best Practices for Defensible Security Architecture
Quantify Technical Debt
• Network is presumed compromised
• Role-based Access, every user, every device
must be validated/authenticated
• Log and Inspect all traffic
• Network access control - device hygiene
• Moving towards this requires a roadmap with
identified milestones (ex. PVLAN)
© Copyright 2019 SANS Institute 8
Best Practices for Defensible Security Architecture
Zero-Trust Architecture
• Cloud-hybrid networks growing, making for a
complex and difficult defend attack surface
© Copyright 2019 SANS Institute
Best Practices for Defensible Security Architecture
Perimeter-less Networks
9
• Most enterprises are heterogeneous with both
modern and legacy technologies that require
integration.
• Backward compatibility requirements for modern
technologies can create vulnerabilities.
 Identify Business Use Case
 Harden & Monitor
© Copyright 2019 SANS Institute 10
Best Practices for Defensible Security Architecture
Technology Integrations
• Continuous security
monitoring with critical
log archival
• Identify and categorize
assets
 Critical
 Non-viable
 Unmanaged
© Copyright 2019 SANS Institute 11
Best Practices for Defensible Security Architecture
Enterprise Auditing
• Map normal internal/external network/device activity:
 Host-to-Host
 User agents
 Protocols
 Services
• Determine normal use and abuse cases for systems.
• Design controls to monitor and detect anomalies.
© Copyright 2019 SANS Institute
 Netflow/Bandwidth Utilization
 System Resource Utilization
 User/Entity Behavior Analytics
 Security Operations Procedures
 Application Interactions & Data Flow
Best Practices for Defensible Security Architecture
Create Enterprise Baselines
12
• Host-based IDS/IPS
 File Integrity Monitoring
 Signature-based Detection
 Heuristic-based Detection
• Host-based Firewalls
 Port modifications
 Lateral movement Detection
© Copyright 2019 SANS Institute
• Endpoint Detection &
Response (EDR)
• Exploit Detection &
Mitigation Technologies
• Endpoint Auditing &
Aggregation
Best Practices for Defensible Security Architecture
Correlate Endpoint & Network Sensor Data
13
© Copyright 2019 SANS Institute
Endpoint Data Collection
14
Requirements for Successful Deception
Implementations
© Copyright 2019 SANS Institute 15
Centralized
Management
Decoy Auditing
Low Threshold to Entry
Decoys require monitoring and management to be
effective
Activity occurring on decoy systems must be
monitored and collected for threat intel consumption
Decoys must be complex enough to appear
authentic but easy to deploy & monitor
“Cyber terrain exists across the cyberspace planes and there are
many features of cyber terrain that can provide an advantage to one
side or the other. By understanding this cyber key terrain, a network
defender knows where to focus his energy to prevent penetration and
an attacker can select a target within a network that provides
maximum potential for success.”
D. Raymond, G. Conti, T. Cross, and M. Nowatkowski, “Key terrain in cyberspace:
Seeking the high ground,” in Cyber Conflict (CyCon), 2014 6th International
Conference on, June 2014.
What is Key Terrain in Cyber Space?
© Copyright 2019 SANS Institute
© Copyright 2019 SANS Institute 17
Defensive Cyber Battlefield
© Copyright 2019 SANS Institute 18
Define your terrain: Asset Database = Facilitate Hunt
© Copyright 2019 SANS Institute 19
SANS Center for Internet Security Controls
CIS Basic Controls
© Copyright 2019 SANS Institute 20
Understand your terrain
© Copyright 2019 SANS Institute 21
CIS Foundation Controls
Fundamentals of Cyber Analysis
© Copyright 2019 SANS Institute 22
Fundamentals of Cyber Analysis
© Copyright 2019 SANS Institute 23
Fundamentals of Cyber Analysis
© Copyright 2019 SANS Institute 24
Fundamentals of Cyber Analysis
© Copyright 2019 SANS Institute 25
Fundamentals of Cyber Analysis
© Copyright 2019 SANS Institute 26
Fundamentals of Cyber Analysis
© Copyright 2019 SANS Institute 27
© Copyright 2019 SANS Institute 28
Quantity of
Exploitable
Terrain
Quantity of
Total Terrain
Lower this number
by patching
vulnerabilities,
decommissioning
Increase this number
by deploying
unexploitable terrain
(i.e. decoy hosts)
Percentage of
Exploitable
Terrain
Cyber Protection should seek to understand
and lower the percentage of exploitable terrain
© Copyright 2019 SANS Institute 29
• Asset classification & profiling (Cyber Terrain)
• Network deep session inspection (DSI)
 All ports, known protocols, content, recursive file extraction
 DLP at gateways, internal networks, email and web gateways
 Metadata and custom tags for real-time & retrospective analysis
 Threat prevention, detection, and threat hunting
• Endpoint prevention, detection and response
 SW Inventory, Known Vulnerabilities, Process/Event Metadata
• Deception layers of breadcrumbs & decoys
• Cloud-sandboxing, threat intelligence/research
• MDR and IR services
Fidelis Provides…
© Copyright 2019 SANS Institute 30
The Fidelis Architecture
from the most trusted name in information security
Q&A
3
1
© Copyright 2019 SANS Institute

Mais conteúdo relacionado

Mais procurados

Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksFidelis Cybersecurity
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPFidelis Cybersecurity
 
Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensiveFidelis Cybersecurity
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyFidelis Cybersecurity
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3Shawn Croswell
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]David Sweigert
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on VehiclesPriyanka Aash
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?marketingunitrends
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditorsmdagrossa
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceTom K
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityPriyanka Aash
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessStorage Switzerland
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeDragos, Inc.
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Shah Sheikh
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz Asia Pte Ltd
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trustscoopnewsgroup
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Core Security
 

Mais procurados (20)

Applying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacksApplying intelligent deception to detect sophisticated cyber attacks
Applying intelligent deception to detect sophisticated cyber attacks
 
Secure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLPSecure Your Data with Fidelis Network® for DLP
Secure Your Data with Fidelis Network® for DLP
 
Putting Cyber Attackers on the Defensive
Putting Cyber Attackers on the DefensivePutting Cyber Attackers on the Defensive
Putting Cyber Attackers on the Defensive
 
Critical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You BuyCritical Capabilities for MDR Services - What to Know Before You Buy
Critical Capabilities for MDR Services - What to Know Before You Buy
 
kill-chain-presentation-v3
kill-chain-presentation-v3kill-chain-presentation-v3
kill-chain-presentation-v3
 
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?Ransomware: Why Are Backup Vendors Trying To Scare You?
Ransomware: Why Are Backup Vendors Trying To Scare You?
 
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal AuditorsION-E Defense In Depth Presentation for The Institiute of Internal Auditors
ION-E Defense In Depth Presentation for The Institiute of Internal Auditors
 
Cyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General AudienceCyber Kill Chain Deck for General Audience
Cyber Kill Chain Deck for General Audience
 
Why Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum SecurityWhy Zero Trust Yields Maximum Security
Why Zero Trust Yields Maximum Security
 
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup SuccessWebinar: Backup vs. Ransomware - 5 Requirements for Backup Success
Webinar: Backup vs. Ransomware - 5 Requirements for Backup Success
 
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and PracticeMeet Me in the Middle: Threat Indications and Warning in Principle and Practice
Meet Me in the Middle: Threat Indications and Warning in Principle and Practice
 
Symantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security SimulationSymantec Cyber Security Services: Security Simulation
Symantec Cyber Security Services: Security Simulation
 
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
Cyber Security 101 - Back to Basics (HP Secure Print Event 2018)
 
Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security Netpluz DDoS Mitigation - Managed Cyber Security
Netpluz DDoS Mitigation - Managed Cyber Security
 
Moving Beyond Zero Trust
Moving Beyond Zero TrustMoving Beyond Zero Trust
Moving Beyond Zero Trust
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
 

Semelhante a Game Changing Cyber Defensive Strategies for 2019

Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksSynopsys Software Integrity Group
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxcaesar92
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...Synopsys Software Integrity Group
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Intel IT Center
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Decisions
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Decisions
 
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...scoopnewsgroup
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Denim Group
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security Cristian Garcia G.
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathClubHack
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPrime Infoserv
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxGhofraneFerchichi2
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudAmazon Web Services
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedNorm Barber
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedUnifyCloud
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...Criminal IP
 

Semelhante a Game Changing Cyber Defensive Strategies for 2019 (20)

Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service RisksWebinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
Webinar–Creating a Modern AppSec Toolchain to Quantify Service Risks
 
Forcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptxForcepoint Corporate Presentation_Short.pptx
Forcepoint Corporate Presentation_Short.pptx
 
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
RSA Conference Presentation–Creating a Modern AppSec Toolchain to Quantify Se...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary Cloud Security Checklist and Planning Guide Summary
Cloud Security Checklist and Planning Guide Summary
 
Scalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary PresentationScalar Security Roadshow - Calgary Presentation
Scalar Security Roadshow - Calgary Presentation
 
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver PresentationScalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Vancouver Presentation
 
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
Forcepoint Raised the Bar: What's Next in the Cross Domain Community-george k...
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...Assessing Business Operations Risk With Unified Vulnerability Management in T...
Assessing Business Operations Risk With Unified Vulnerability Management in T...
 
Business Continuity and app Security
Business Continuity and app Security Business Continuity and app Security
Business Continuity and app Security
 
Infrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy HiremathInfrastructure Security by Sivamurthy Hiremath
Infrastructure Security by Sivamurthy Hiremath
 
PaloAlto Enterprise Security Solution
PaloAlto Enterprise Security SolutionPaloAlto Enterprise Security Solution
PaloAlto Enterprise Security Solution
 
chapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptxchapitre1-cloud security basics-23 (1).pptx
chapitre1-cloud security basics-23 (1).pptx
 
The Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the CloudThe Art of CyberSecurity in the Cloud
The Art of CyberSecurity in the Cloud
 
Webinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or RealityWebinar–AppSec: Hype or Reality
Webinar–AppSec: Hype or Reality
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...Criminal IP ASM | Threat Intelligence-based  Automated Attack Surface Managem...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
 

Último

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKJago de Vreede
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 

Último (20)

Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 

Game Changing Cyber Defensive Strategies for 2019

  • 1. 1 GAME-CHANGING DEFENSIVE STRATEGIES FOR 2019 Sponsored by Fidelis 1 © Copyright 2019 SANS Institute
  • 2. Today’s Speakers ALISSA TORRES Analyst & Principal Instructor SANS Institute Dr. ABDUL RAHMAN Chief Scientist Fidelis Cybersecurity TOM CLARE Product Strategy Fidelis Cybersecurity © Copyright 2019 SANS Institute 2
  • 3. • The fabric of the enterprise has morphed and now includes cloud, mobile, IoT of all types in addition to the traditional managed assets • A shift in security mindset is required to perform accurate risk assessment on today’s environments and to anticipate future threats © Copyright 2019 SANS Institute 3 Evolving Defensible Assets: what is a network comprised of?
  • 4. © Copyright 2019 SANS Institute 4 What device types are connecting to your network or part of your network? Are they included in your security programs? SANS Endpoint Security Survey 2018
  • 5. • With the increase in mobile, cloud & IoT devices, today’s enterprises are effectively de-perimeterized • Old boundaries of “inside” and “outside” or “trusted” and “untrusted” no longer apply • Successful defense is achieved with multiple prevention and detection solutions © Copyright 2019 SANS Institute 5 What is Defensible Security Architecture?
  • 6. • Leverage & harden current infrastructure (switches, routers & firewalls) • Harden systems & networks at every layer from physical to application & data • Greenfielding a network not realistic, most enterprises are comprised of entrenched legacy technologies • Private VLANS, Network Access Control, 802.1x © Copyright 2019 SANS Institute 6 Evolution of Best Practices for Defensible Security Architecture
  • 7. • Cost of additional rework caused by choosing an easy solution now instead of a better approach that work take longer • Can there be smart technical debt? • How does it relate to defensible security architecture? © Copyright 2019 SANS Institute 7 Best Practices for Defensible Security Architecture Quantify Technical Debt
  • 8. • Network is presumed compromised • Role-based Access, every user, every device must be validated/authenticated • Log and Inspect all traffic • Network access control - device hygiene • Moving towards this requires a roadmap with identified milestones (ex. PVLAN) © Copyright 2019 SANS Institute 8 Best Practices for Defensible Security Architecture Zero-Trust Architecture
  • 9. • Cloud-hybrid networks growing, making for a complex and difficult defend attack surface © Copyright 2019 SANS Institute Best Practices for Defensible Security Architecture Perimeter-less Networks 9
  • 10. • Most enterprises are heterogeneous with both modern and legacy technologies that require integration. • Backward compatibility requirements for modern technologies can create vulnerabilities.  Identify Business Use Case  Harden & Monitor © Copyright 2019 SANS Institute 10 Best Practices for Defensible Security Architecture Technology Integrations
  • 11. • Continuous security monitoring with critical log archival • Identify and categorize assets  Critical  Non-viable  Unmanaged © Copyright 2019 SANS Institute 11 Best Practices for Defensible Security Architecture Enterprise Auditing
  • 12. • Map normal internal/external network/device activity:  Host-to-Host  User agents  Protocols  Services • Determine normal use and abuse cases for systems. • Design controls to monitor and detect anomalies. © Copyright 2019 SANS Institute  Netflow/Bandwidth Utilization  System Resource Utilization  User/Entity Behavior Analytics  Security Operations Procedures  Application Interactions & Data Flow Best Practices for Defensible Security Architecture Create Enterprise Baselines 12
  • 13. • Host-based IDS/IPS  File Integrity Monitoring  Signature-based Detection  Heuristic-based Detection • Host-based Firewalls  Port modifications  Lateral movement Detection © Copyright 2019 SANS Institute • Endpoint Detection & Response (EDR) • Exploit Detection & Mitigation Technologies • Endpoint Auditing & Aggregation Best Practices for Defensible Security Architecture Correlate Endpoint & Network Sensor Data 13
  • 14. © Copyright 2019 SANS Institute Endpoint Data Collection 14
  • 15. Requirements for Successful Deception Implementations © Copyright 2019 SANS Institute 15 Centralized Management Decoy Auditing Low Threshold to Entry Decoys require monitoring and management to be effective Activity occurring on decoy systems must be monitored and collected for threat intel consumption Decoys must be complex enough to appear authentic but easy to deploy & monitor
  • 16. “Cyber terrain exists across the cyberspace planes and there are many features of cyber terrain that can provide an advantage to one side or the other. By understanding this cyber key terrain, a network defender knows where to focus his energy to prevent penetration and an attacker can select a target within a network that provides maximum potential for success.” D. Raymond, G. Conti, T. Cross, and M. Nowatkowski, “Key terrain in cyberspace: Seeking the high ground,” in Cyber Conflict (CyCon), 2014 6th International Conference on, June 2014. What is Key Terrain in Cyber Space? © Copyright 2019 SANS Institute
  • 17. © Copyright 2019 SANS Institute 17 Defensive Cyber Battlefield
  • 18. © Copyright 2019 SANS Institute 18 Define your terrain: Asset Database = Facilitate Hunt
  • 19. © Copyright 2019 SANS Institute 19 SANS Center for Internet Security Controls
  • 20. CIS Basic Controls © Copyright 2019 SANS Institute 20 Understand your terrain
  • 21. © Copyright 2019 SANS Institute 21 CIS Foundation Controls
  • 22. Fundamentals of Cyber Analysis © Copyright 2019 SANS Institute 22
  • 23. Fundamentals of Cyber Analysis © Copyright 2019 SANS Institute 23
  • 24. Fundamentals of Cyber Analysis © Copyright 2019 SANS Institute 24
  • 25. Fundamentals of Cyber Analysis © Copyright 2019 SANS Institute 25
  • 26. Fundamentals of Cyber Analysis © Copyright 2019 SANS Institute 26
  • 27. Fundamentals of Cyber Analysis © Copyright 2019 SANS Institute 27
  • 28. © Copyright 2019 SANS Institute 28 Quantity of Exploitable Terrain Quantity of Total Terrain Lower this number by patching vulnerabilities, decommissioning Increase this number by deploying unexploitable terrain (i.e. decoy hosts) Percentage of Exploitable Terrain Cyber Protection should seek to understand and lower the percentage of exploitable terrain
  • 29. © Copyright 2019 SANS Institute 29 • Asset classification & profiling (Cyber Terrain) • Network deep session inspection (DSI)  All ports, known protocols, content, recursive file extraction  DLP at gateways, internal networks, email and web gateways  Metadata and custom tags for real-time & retrospective analysis  Threat prevention, detection, and threat hunting • Endpoint prevention, detection and response  SW Inventory, Known Vulnerabilities, Process/Event Metadata • Deception layers of breadcrumbs & decoys • Cloud-sandboxing, threat intelligence/research • MDR and IR services Fidelis Provides…
  • 30. © Copyright 2019 SANS Institute 30 The Fidelis Architecture
  • 31. from the most trusted name in information security Q&A 3 1 © Copyright 2019 SANS Institute