40
10 Steps to Better Security Incident Detection

10 Steps to Better Security Incident Detection

Embed Size (px)

DESCRIPTION

* Why many organizations don’t successfully detect security breaches * How to best use existing security information and event management and log management tools * Other sources, including external ones, that can provide early indicators of a security breach * How to maximize the security resources you already have Watch the webcast here: http://www.tripwire.com/register/10-steps-to-better-security-incident-detection/

Citation preview

Page 1: 10 Steps to Better Security Incident Detection

10 Steps to Better Security Incident Detection

Page 2: 10 Steps to Better Security Incident Detection

10 Steps to Better Security Incident Detection

Page 3: 10 Steps to Better Security Incident Detection

10 Steps to Better Security Incident DetectionBrian Honan, BH ConsultingCindy Valladares, Tripwire, Inc.

Page 4: 10 Steps to Better Security Incident Detection

IT SECURITY & COMPLIANCE AUTOMATION

Today’s Speakers

Brian Honan

BH Consulting

Cindy Valladares

Tripwire, Inc.

Page 5: 10 Steps to Better Security Incident Detection

IT SECURITY & COMPLIANCE AUTOMATION

Tripwire, Inc.

Headquartered in Portland, Oregon Founded in 1997 | Open source legacy since ‘80s Over 315 employees worldwide

Over 5,500 customers in 87 countries 43% of Fortune 500 rely on Tripwire

Award-winning, patented technology

5

Page 6: 10 Steps to Better Security Incident Detection

Helping You Piece IT Together

http://www.bhconsulting.ie [email protected]

10 Steps to Better Security Incident Detection

Page 7: 10 Steps to Better Security Incident Detection

Infosec Certainties

Page 8: 10 Steps to Better Security Incident Detection

Systems Under Constant Threat

Page 9: 10 Steps to Better Security Incident Detection

Threats Are Evolving

Page 10: 10 Steps to Better Security Incident Detection

Resurgence of Hacktivism

WE DO NOT FORGIVE. WE DO NOT FORGET. EXPECT US

Page 11: 10 Steps to Better Security Incident Detection

Traditional IT Security

Page 12: 10 Steps to Better Security Incident Detection

Breach Detection

92%

8%

Detected by 3rd PartyDetected by Org

Source: Verizon DBIR 2012

Page 13: 10 Steps to Better Security Incident Detection

Time To Discover Breach

85%

15%

More than 1 WeekLess than 1 Week

Source: Verizon DBIR 2012

Page 14: 10 Steps to Better Security Incident Detection

Avoidable?

97%

3%

Avoidable Using Simple ControlsNot avoidable

Source: Verizon DBIR 2012

Page 15: 10 Steps to Better Security Incident Detection

Difficulty

96%

4%

Not DifficultDifficult

Source: Verizon DBIR 2012

Page 16: 10 Steps to Better Security Incident Detection

Examples of Bad IR

Page 17: 10 Steps to Better Security Incident Detection

Why Are We Bad in Detecting Incidents?

Page 18: 10 Steps to Better Security Incident Detection

Are Tools Fit For Purpose?

Page 19: 10 Steps to Better Security Incident Detection

Volume of Information

Page 20: 10 Steps to Better Security Incident Detection

Drowning In Data

Page 21: 10 Steps to Better Security Incident Detection

The Rumsfeld Effect

Page 22: 10 Steps to Better Security Incident Detection

Results in You In Line Of Fire

Page 23: 10 Steps to Better Security Incident Detection

So …

Page 24: 10 Steps to Better Security Incident Detection

Improving Incident Response

Page 25: 10 Steps to Better Security Incident Detection

Detect Incidents Early

Page 26: 10 Steps to Better Security Incident Detection

(1) Understand Your Business

Page 27: 10 Steps to Better Security Incident Detection

(2) Analyze Network Patterns

Page 28: 10 Steps to Better Security Incident Detection

(3) Segment Your Information

Page 29: 10 Steps to Better Security Incident Detection

(4) Harden Systems

Page 30: 10 Steps to Better Security Incident Detection

(5) Monitor Logs

Page 31: 10 Steps to Better Security Incident Detection

(6) Use Security Tools

Page 32: 10 Steps to Better Security Incident Detection

(7) Train Staff & Partners

Page 33: 10 Steps to Better Security Incident Detection

(8) Use Open Source Data

Page 34: 10 Steps to Better Security Incident Detection

(9) Set Traps

Page 35: 10 Steps to Better Security Incident Detection

(10) Share with Peers

Page 36: 10 Steps to Better Security Incident Detection

More Information

White Paper:

“10 Steps for Early Incident Detection”

Available Online In the Resources Section on Tripwire Inc.’s website.

http://www.tripwire.com/data-security/

Page 37: 10 Steps to Better Security Incident Detection

IT SECURITY & COMPLIANCE AUTOMATION

Tripwire Secures Today’s Enterprise

Prevent attacks by implementing secure configurations and enforcing security policies

Reducethe AttackSurface

Find Vulnerabilities & Attacks Faster

MakeSecurity Data

Useful

Continuously monitor systems to identify, evaluate,and prioritize evidence of compromise

Make risk and incidentsvisible, measurable and actionable

37

Page 38: 10 Steps to Better Security Incident Detection

IT SECURITY & COMPLIANCE AUTOMATION

Tripwire Security Solutions

Page 39: 10 Steps to Better Security Incident Detection

IT SECURITY & COMPLIANCE AUTOMATION

Tripwire Solutions

Content Context Analytics Workflow

System Hardening

Incident Detection

Continuous Monitoring

39

Page 40: 10 Steps to Better Security Incident Detection

Questions ?