SlideShare ist ein Scribd-Unternehmen logo
1 von 37
© 2014 IBM Corporation
IBM Security
0© 2014 IBM Corporation
IBM Support to Continuous
Diagnostics & Mitigation
© 2014 IBM Corporation
IBM Security
1
Agenda
 Why CDM?
 A new Security Reality
 IBM Security Overview
 Why Risk Management
© 2014 IBM Corporation
IBM Security
2
Why CDM? (according to John Streufert, DHS)
Customers have spent an inordinate amount of time, effort and
resources on a variety of products that have NOT delivered the results
promised
CDM Solutions MUST Allow for
–Search, Mitigation and Reporting of cyber problems in real time.
–Enable System Administrators to:
• Respond to exploits at network speed
• Fulfill A-130 responsibilities as intended
• Implement NIST Publications on Continuous Monitoring
(800-137 and parts of 800-37)
–Use strategic sourcing to lower cost
2 James A. Lewis, Raising the Bar for Cybersecurity. Washington, DC: CSIS, 2013.
© 2014 IBM Corporation
IBM Security
3
In search of buy-in for continuous monitoring [FCW]
“Persuading federal IT managers that continuous diagnostics and monitoring
is a boon for their agencies is one of the most challenging elements of
implementing the cybersecurity technology, according to IT chiefs at the
forefront of spreading the CDM message across government.”
“While federal agencies are beginning to grasp what CDM can do for their
organizations, risk-averse IT managers who treasure the status quo and are
reluctant to shift from old practices still have to be won over, say IT leaders at GSA
and the departments of Homeland Security and Energy.”
“DHS has become an "evangelist" for CDM, according to Jeff Eisensmith, chief
information security officer at the department, which is charged with facilitating other
agencies' installation and implementation of CDM technology. Before
CDM, agencies were "getting picked off like zebras on the Serengeti" by cyber
attackers, he said.”
http://fcw.com/articles/2014/03/19/continuous-monitoring-buy-in.aspx?s=fcwdaily_200314
© 2014 IBM Corporation
IBM Security
4
CDM – The Opportunity For Government
 Government’s compelling reason to act or business urgency:
– Cyber threats are constantly changing and evolving – not static
– Government recognizes a need for a modified approach to protect
cyber infrastructure
– This new approach moves away from historical compliance reporting
toward combating threats to the nation's networks in real time
– This initiative is in direct support of the Administration’s Cross-
Agency Priority (CAP) goal for implementing continuous monitoring
across the Federal networks
© 2014 IBM Corporation
IBM Security
5
Continuous Diagnostics &
Mitigation
• IBM supports Phase 1 now
• IBM has a Security Framework
that addresses Risk
Management across Phases 1
though 3
• IBM’s Security Portfolio answers
the how in applying CDM
© 2014 IBM Corporation
IBM Security
6
The evolving Motivations and sophistication of attackers is a driving
force for CMasS and CDM
National
Security
Nation-state
actors
Stuxnet
Espionage,
Activism
Competitors and
Hacktivists
Aurora
Monetary
Gain
Organized
crime
Zeus
Revenge,
Curiosity
Insiders and
Script-kiddies
Code Red
© 2014 IBM Corporation
IBM Security
7
83%
of enterprises
have difficulty finding the
security skills they need
tools from
vendors
85
45
IBM client example
70%
of security exec’s
are concerned about
cloud and mobile security
Mobile malware grew
614%
from March 2012 to March 2013
in one year
A New Security Reality Is Here
61%
Data theft and cybercrime
are the greatest threats
to their reputation
of organizations say
Average U.S.
breach cost
$7million+
2013 Cost of Cyber Crime Study
Ponemon Institute 2013 Juniper Mobile Threat Report
2012 IBM Global Reputational Risk & IT Study 2013 IBM CISO Survey 2012 ESG Research
© 2014 IBM Corporation
IBM Security
8
Our traditional security practices and defenses are not keeping up
Source: IBM client example
© 2014 IBM Corporation
IBM Security
9
more than
half a billion records
of personally identifiable information (PII) were leaked in 2013
© 2014 IBM Corporation
IBM Security
10
© 2014 IBM Corporation
IBM Security
11
Businesses face unprecedented security challenges
Evolving
Threats
Shifts in business environment
Escalating Threats
Targeted attacks are the new norm
Competing
Priorities
Too little time, too few resources
Unsustainable Practices
Few resources, no clear strategy
Inadequate
tools
Source: Verizon 2013 Data Breach Investigations ReportTools are lacking
Inadequate Tools
Too many silos, protection lacking
Business
Pressures
Shifts in business environment
Disruptive Technologies
New innovation can introduce risk
Source: IBM X-Force Trend Report, Sept 2013
Source: IBM CISO Study, Oct 2013
Source: Forrester Surviving The Technical Security Skills Crisis, May 2013
© 2014 IBM Corporation
IBM Security
12
At IBM, the world is our security lab
v13-016,000
IBM researchers, developers,
and subject matter experts
ALL focused on security
3,000IBM security
patents
More than
Security Operations Centers
Security Research and Development Labs
Institute for Advanced Security Branches
© 2014 IBM Corporation
IBM Security
13
IBM Security: Helping clients optimize IT security
Integrated Portfolio
Managed and Professional Services
Extensive Partner Ecosystem
IBM Research
© 2014 IBM Corporation
IBM Security
14
• Own the security
agenda for innovation
• Embed security on
day one
• Leverage cloud,
mobile, social, big data
to improve security
• Develop a risk-aware
security strategy
• Deploy a systematic
approach to security
• Harness the knowledge
of professionals
• Use intelligence and
anomaly detection
across every domain
• Build an intelligence
vault around your
crown jewels
• Prepare your response
for the inevitable
IBM’s approach is helping customers gain an advantage on
attackers and seize new opportunities
Get help to
develop an
integrated approach
3
Employ cloud and
mobile to
improve security
2
Use analytics and
insights for
smarter defense
1
© 2014 IBM Corporation
IBM Security
15
They are looking for a trusted partner who…
CISOs are looking for strategic partners to chart a path
© 2014 IBM Corporation
IBM Security
16
Why a New Approach
Attackers will not relent
and every agency
is a target
New technologies
create opportunities
to transform IT security
Security leaders
are more accountable
than ever before
© 2014 IBM Corporation
IBM Security
17
Security teams must also shift from a conventional ―perimeter and
point defense‖ mindset and begin thinking like an attacker
Detect, Analyze & Remediate
Think like an attacker,
counter intelligence mindset
 Protect high value assets
 Emphasize the data
 Harden targets and weakest links
 Use anomaly-based detection
 Baseline system behavior
 Consume threat feeds
 Collect everything
 Automate correlation and analytics
 Gather and preserve evidence
Audit, Patch & Block
Think like a defender,
defense-in-depth mindset
 Protect all assets
 Emphasize the perimeter
 Patch systems
 Use signature-based detection
 Scan endpoints for malware
 Read the latest news
 Collect logs
 Conduct manual interviews
 Shut down systems
Broad Targeted
What has Changed?
© 2014 IBM Corporation
IBM Security
18
Gaining insights across the entire security event timeline
VULNERABILITY REMEDIATIONEXPLOIT
Pre-Exploit Post-Exploit
Security Intelligence
The actionable information derived from the analysis
of all security-relevant data available to an organization
• Gain visibility over the organization’s
security posture
• Detect deviations from the norm
and initiate preventive procedures
• Attain awareness of vulnerabilities
and assess exposures
• Discover anomalies and investigate
to evaluate the risk
• Explore and analyze data to devise
countermeasures for the attack
• Formulate new security best practices
to adapt to emerging threats
What was
the impact?
What is happening
right now?
Are we configured
to protect against
these threats?
What are the external
and internal threats?
© 2014 IBM Corporation
IBM Security
19 © 2012IBM Corporation
CDM Implementation Phases
Local Computing - Devices
Local Computing Environment - People
Infrastructure and Network - Devices
Local Computing Environment - Events
Infrastructure and Network – Events
Enclave (Organization – Devices and Events
© 2014 IBM Corporation
IBM Security
20 20
Four Tool Functional Areas and IBM tools for CDM Phase 1
 For supporting the Hardware Asset Management Tool Functional Area…
– QRadar
– IBM Endpoint Manager
– Augmentation tools: IBM Cognos (dashboard)
 For supporting the Software Asses Management Tool Functional Area…
– QRadar
– IBM Endpoint Manager
– Augmentation tools: IBM Cognos (dashboard)
 For supporting the Configuration Management Tool Functional Area…
– QRadar
– IBM Endpoint Manager
– Augmentation tools: IBM Cognos (dashboard)
 For supporting the Vulnerability Management Tool Functional Area…
– QRadar
– IBM Endpoint Manager
– Augmentation tools: IBM Cognos (dashboard) & IBM Rationale Appscan
© 2014 IBM Corporation
IBM Security
21
Delivering security solutions via a single, integrated platform
Security Intelligence Platform
© 2014 IBM Corporation
IBM Security
22
Security Intelligence platform that enables security
optimization through advanced threat detection, meet
compliance and policy demands and eliminating data silos
Security Intelligence and Analytics Portfolio Overview
QRadar SIEM
•Integrated log, threat, compliance management
•Asset profiling and flow analytics
QRadar Risk Manager
•Predictive threat modeling & simulation
•Scalable configuration monitoring and audit
QRadar Log Manager
•Turnkey log management
•Upgradeable to enterprise SIEM
Network Activity Collectors (QFlow / VFlow)
•Network analytics, behavior and anomaly detection
•Fully integrated with SIEM
QRadar Vulnerability Manager
•Integrated Network Scanning & Workflow
•Leverage SIEM, Threat, Risk to prioritize Vulns
New: QRadar Incident Forensics
•Integrated full packet capture
•Meta-data extraction, reconstruction and replay
© 2014 IBM Corporation
IBM Security
23
Infrastructure - Endpoint
Providing endpoints, servers, and mobile devices with
security to remain compliant, updated, and protected
against today’s threats
Portfolio Overview
IBM Endpoint Manager for Software Usage Analysis
•Network Discovery: agent-less mechanism to identify all IP-
based devices on a network
•HW & SW Inventory: continuous and automated agent-
based inventory
•SW Usage Analysis: advanced software asset management
capabilities
IBM Endpoint Manager for Security and Compliance
•Security Configuration Management: SCAP validation for
both configuration assessment and remediation
•Patch Management: patch compliance and remediation
•Vulnerability Management: discover, identify, and locate
known security vulnerabilities by assessing systems against
OVAL-based vulnerability definitions
•Client Manager for Endpoint Protection: ―health-check‖ for
third-party anti-virus and anti-malware solutions
•Network Self Quarantine: endpoint control and quarantine
capabilities for systems already running the IEM agent, via
internet protocol security policy
© 2014 IBM Corporation
IBM Security
24
Application
Portfolio Overview
IBM AppScan Enterprise
•Manage application security and risk management with advanced
security testing
•Mitigate risk by collaborating with developers to remediate security
vulnerabilities
•Empower security teams to drive security testing throughout the
software development life cycle (SDLC)
•Integrate with web-application firewalls to provide custom tuning
based on actual vulnerabilities
•Execute DAST against applications in development and production
•Hybrid analysis to perform correlation of DAST and SAST results
IBM AppScan Source
•Source code analysis to identify the latest security threats with SAST
•Automated security testing within build environments
IBM AppScan Standard
•Desktop application for security analysts and penetration testers
•Advanced security testing based primarily on DAST, but also
includes static analysis for client-side JavaScript
•Glass box testing
•Coverage of the latest rich-Internet applications and web
technologies (web services, SOAP, Flash, Ajax and more)
JK2012-04-26
© 2014 IBM Corporation
IBM Security
25
Data
Enterprise-wide solutions for helping secure the privacy
and integrity of trusted information in your data center
Portfolio Overview
IBM InfoSphere Guardium Product Family
•Database Activity Monitoring – continuously monitor
and block unauthorized access to databases
•Privileged User Monitoring – detect or block
malicious or unapproved activity by DBAs, developers
and outsourced personnel
•Database Leak Prevention – help detect and block
leakage in the data center
•Database Vulnerability Assessment – scan databases
to detect vulnerabilities and take action
•Audit and Validate Compliance – simplify SOX, PCI-
DSS, and Data Privacy processes with pre-configured
reports and automated workflows
IBM Security Key Lifecycle Manager
•Centralize and automate the encryption key
management process
•Simplify administration with an intuitive user interface
for configuration and management
JK2012-04-26
© 2014 IBM Corporation
IBM Security
26
The Cybersecurity Framework…
• Provides a structure organizations can use to create, guide, assess or improve
comprehensive cybersecurity programs based on risks
• Offers a common language to address and manage cyber risk in a cost-effective way
based on business needs, without placing additional regulatory requirements on
businesses
• Allows organizations—regardless of size, degree of cyber risk or cybersecurity
sophistication—to apply the principles and best practices of risk management to
improve the security and resilience of critical infrastructure
• Helps companies prove to themselves and their stakeholders that good cybersecurity
is good business
• Builds on global and other standards, guidelines, and best practices
• Provides a means of expressing cybersecurity requirements to business partners and
customers
• Assists organizations in incorporating privacy and civil liberties as part of a
comprehensive cybersecurity program
Source: NIST
© 2014 IBM Corporation
IBM Security
27
Framework Components
Framework Core
• Cybersecurity Activities and informative references common across critical
infrastructure sectors and organized around particular outcomes
• Enables communication of cyber risk across an organization
Framework Profile
• Aligns industry standards and best practices to the framework Core in a particular
implementation scenario
• Supports prioritization and measurement of progress toward the Target Profile,
while factoring in other business needs— including cost-effectiveness and
innovation
Framework Implementation Tiers
• Describes how cybersecurity risk is managed by an organization
• Describes degree to which an organization’s cybersecurity risk management
practices exhibit the key characteristics (e.g., risk and threat aware, repeatable, and
adaptive)
Source: NIST
© 2014 IBM Corporation
IBM Security
28
Framework Core
Source: NIST
© 2014 IBM Corporation
IBM Security
29
How to Use the Cybersecurity Framework
The Framework is designed to complement existing business and
cybersecurity operations, and can be used to:
• Understand security status
• Establish / Improve a cybersecurity program
• Communicate cybersecurity requirements with stakeholders, including partners and
suppliers
• Identify opportunities for new or revised informative references
• Identify tools and technologies to help organizations use the Framework
• Integrate privacy and civil liberties considerations into a cybersecurity program
Source: NIST
© 2014 IBM Corporation
IBM Security
30
Influencers
• Confident / prepared
• Strategic focus
Protectors
• Less confident
• Somewhat strategic
• Lack necessary
structural elements
Responders
• Least confident
• Focus on protection
and compliance
have a dedicated CISO
have a security/risk
committee
have information security
as a board topic
use a standard set of
security metrics to track
their progress
focused on improving
enterprise communication/
collaboration
focused on providing
education and awareness
How they differ
IBM’s 2012 Chief Information Security Officer Study revealed the
changing role of the CISO
Source: IBM Center for Applied Insights, Finding a Strategic Voice: Insights from the 2012 IBM Chief Information Security Officer Assessment , May 2012
© 2014 IBM Corporation
IBM Security
31
Reaching security maturity
13-09-17
Security Intelligence
Predictive Analytics, Big Data Workbench, Flow Analytics
SIEM and Vulnerability Management
Log Management
Advanced Fraud Protection
People Data Applications Infrastructure
Identity governance
Fine-grained
entitlements
Privileged user
management
Data governance
Encryption key
management
Fraud detection
Hybrid scanning
and correlation
Multi-faceted
network protection
Anomaly detection
Hardened systems
User provisioning
Access management
Strong authentication
Data masking / redaction
Database activity
monitoring
Data loss prevention
Web application protection
Source code scanning
Virtualization security
Asset management
Endpoint / network
security management
Directory
management
Encryption
Database access control
Application
scanning
Perimeter security
Host security
Anti-virus
Optimized
Proficient
Basic
© 2014 IBM Corporation
IBM Security
32
IBM Security Systems Portfolio
People Data Applications Network Infrastructure Endpoint
Identity
Management
Guardium Data Security
and Compliance
AppScan
Source
Network
Intrusion Prevention
Trusteer Apex
Access
Management
Guardium DB
Vulnerability
Management
AppScan
Dynamic
Next Generation
Network Protection
Mobile and Endpoint
Management
Privileged Identity
Manager
Guardium / Optim
Data Masking
DataPower Web
Security Gateway
SiteProtector
Threat Management
Virtualization and
Server Security
Federated
Access and SSO
Key Lifecycle
Manager
Security Policy
Manager
Network
Anomaly Detection
Mainframe
Security
IBM X-Force Research
Advanced Fraud Protection
Trusteer
Rapport
Trusteer Pinpoint
Malware Detection
Trusteer Pinpoint
ATO Detection
Trusteer Mobile
Risk Engine
Security Intelligence and Analytics
QRadar
Log Manager
QRadar
SIEM
QRadar
Risk Manager
QRadar
Vulnerability Manager
IBM offers a comprehensive portfolio of security products
© 2014 IBM Corporation
IBM Security
33
Using Security Frameworks to Achieve Effectiveness & Compliance
33
© 2014 IBM Corporation
IBM Security
34
Highlighted announcements
NEW: QRadar Incident Forensics
NEW: Critical Infrastructure Services
NEW: “All-in-one” Access Management
NEW: Secure Network Optimization Services
NEW: Virtual IPS & Identity Service for Cloud
Planned future announcements
© 2014 IBM Corporation
IBM Security
35
For more information
Peter Allor
Security Strategist- Federal, IBM
pallor@us.ibm.com
Contact
Jerry Jarvis jjarvis@us.ibm.com
David Nagel dnagel@us.ibm.com
Additional Information – White Papers on CDM
http://www.ibm.com/common/ssi/cgi-
bin/ssialias?subtype=WH&infotype=SA&appname=SWGE_WG_WG_USEN
&htmlfid=WGW03019USEN&attachment=WGW03019USEN.PDF
http://www-
304.ibm.com/industries/publicsector/us/en/promotion/!!/xmlid=242300
35
© 2014 IBM Corporation
IBM Security
36 © 2014 IBM Corporation
IBM Security Systems
36
www.ibm.com/security
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational
purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages
arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the
effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the
applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services
do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in
these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to
be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are
trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product,
or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated
or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be
considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or
access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve
additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT
ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS
OR ILLEGAL CONDUCT OF ANY PARTY.

Weitere ähnliche Inhalte

Mehr von IBM Security

Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
IBM Security
 

Mehr von IBM Security (20)

Integrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM ResilientIntegrated Response with v32 of IBM Resilient
Integrated Response with v32 of IBM Resilient
 
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
The Resilient End-of-Year Review: The Top Cyber Security Trends in 2018 and P...
 
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
Leveraging Validated and Community Apps to Build a Versatile and Orchestrated...
 
Accelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon BlackAccelerating SOC Transformation with IBM Resilient and Carbon Black
Accelerating SOC Transformation with IBM Resilient and Carbon Black
 
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent OrchestrationHow to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
How to Build a Faster, Laser-Sharp SOC with Intelligent Orchestration
 
Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?Are You Ready to Move Your IAM to the Cloud?
Are You Ready to Move Your IAM to the Cloud?
 
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat IntelligenceOrchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
Orchestrate Your Security Defenses to Optimize the Impact of Threat Intelligence
 
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
Your Mainframe Environment is a Treasure Trove: Is Your Sensitive Data Protec...
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
Understanding the Impact of Today's Security Breaches: The 2017 Ponemon Cost ...
 
WannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do NowWannaCry Ransomware Attack: What to Do Now
WannaCry Ransomware Attack: What to Do Now
 
How to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security OperationsHow to Improve Threat Detection & Simplify Security Operations
How to Improve Threat Detection & Simplify Security Operations
 
IBM QRadar UBA
IBM QRadar UBA IBM QRadar UBA
IBM QRadar UBA
 
Mobile Vision 2020
Mobile Vision 2020Mobile Vision 2020
Mobile Vision 2020
 
Retail Mobility, Productivity and Security
Retail Mobility, Productivity and SecurityRetail Mobility, Productivity and Security
Retail Mobility, Productivity and Security
 
Close the Loop on Incident Response
Close the Loop on Incident ResponseClose the Loop on Incident Response
Close the Loop on Incident Response
 
Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats Orchestrate Your Security Defenses; Protect Against Insider Threats
Orchestrate Your Security Defenses; Protect Against Insider Threats
 
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
Ponemon Institute Reviews Key Findings from “2017 State of Mobile & IoT Appli...
 
See How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile MetricsSee How You Measure Up With MaaS360 Mobile Metrics
See How You Measure Up With MaaS360 Mobile Metrics
 
Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware Valuing Data in the Age of Ransomware
Valuing Data in the Age of Ransomware
 

Kürzlich hochgeladen

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Kürzlich hochgeladen (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Employing CDM: How Government can Protect Itself from Cyber Attacks

  • 1. © 2014 IBM Corporation IBM Security 0© 2014 IBM Corporation IBM Support to Continuous Diagnostics & Mitigation
  • 2. © 2014 IBM Corporation IBM Security 1 Agenda  Why CDM?  A new Security Reality  IBM Security Overview  Why Risk Management
  • 3. © 2014 IBM Corporation IBM Security 2 Why CDM? (according to John Streufert, DHS) Customers have spent an inordinate amount of time, effort and resources on a variety of products that have NOT delivered the results promised CDM Solutions MUST Allow for –Search, Mitigation and Reporting of cyber problems in real time. –Enable System Administrators to: • Respond to exploits at network speed • Fulfill A-130 responsibilities as intended • Implement NIST Publications on Continuous Monitoring (800-137 and parts of 800-37) –Use strategic sourcing to lower cost 2 James A. Lewis, Raising the Bar for Cybersecurity. Washington, DC: CSIS, 2013.
  • 4. © 2014 IBM Corporation IBM Security 3 In search of buy-in for continuous monitoring [FCW] “Persuading federal IT managers that continuous diagnostics and monitoring is a boon for their agencies is one of the most challenging elements of implementing the cybersecurity technology, according to IT chiefs at the forefront of spreading the CDM message across government.” “While federal agencies are beginning to grasp what CDM can do for their organizations, risk-averse IT managers who treasure the status quo and are reluctant to shift from old practices still have to be won over, say IT leaders at GSA and the departments of Homeland Security and Energy.” “DHS has become an "evangelist" for CDM, according to Jeff Eisensmith, chief information security officer at the department, which is charged with facilitating other agencies' installation and implementation of CDM technology. Before CDM, agencies were "getting picked off like zebras on the Serengeti" by cyber attackers, he said.” http://fcw.com/articles/2014/03/19/continuous-monitoring-buy-in.aspx?s=fcwdaily_200314
  • 5. © 2014 IBM Corporation IBM Security 4 CDM – The Opportunity For Government  Government’s compelling reason to act or business urgency: – Cyber threats are constantly changing and evolving – not static – Government recognizes a need for a modified approach to protect cyber infrastructure – This new approach moves away from historical compliance reporting toward combating threats to the nation's networks in real time – This initiative is in direct support of the Administration’s Cross- Agency Priority (CAP) goal for implementing continuous monitoring across the Federal networks
  • 6. © 2014 IBM Corporation IBM Security 5 Continuous Diagnostics & Mitigation • IBM supports Phase 1 now • IBM has a Security Framework that addresses Risk Management across Phases 1 though 3 • IBM’s Security Portfolio answers the how in applying CDM
  • 7. © 2014 IBM Corporation IBM Security 6 The evolving Motivations and sophistication of attackers is a driving force for CMasS and CDM National Security Nation-state actors Stuxnet Espionage, Activism Competitors and Hacktivists Aurora Monetary Gain Organized crime Zeus Revenge, Curiosity Insiders and Script-kiddies Code Red
  • 8. © 2014 IBM Corporation IBM Security 7 83% of enterprises have difficulty finding the security skills they need tools from vendors 85 45 IBM client example 70% of security exec’s are concerned about cloud and mobile security Mobile malware grew 614% from March 2012 to March 2013 in one year A New Security Reality Is Here 61% Data theft and cybercrime are the greatest threats to their reputation of organizations say Average U.S. breach cost $7million+ 2013 Cost of Cyber Crime Study Ponemon Institute 2013 Juniper Mobile Threat Report 2012 IBM Global Reputational Risk & IT Study 2013 IBM CISO Survey 2012 ESG Research
  • 9. © 2014 IBM Corporation IBM Security 8 Our traditional security practices and defenses are not keeping up Source: IBM client example
  • 10. © 2014 IBM Corporation IBM Security 9 more than half a billion records of personally identifiable information (PII) were leaked in 2013
  • 11. © 2014 IBM Corporation IBM Security 10
  • 12. © 2014 IBM Corporation IBM Security 11 Businesses face unprecedented security challenges Evolving Threats Shifts in business environment Escalating Threats Targeted attacks are the new norm Competing Priorities Too little time, too few resources Unsustainable Practices Few resources, no clear strategy Inadequate tools Source: Verizon 2013 Data Breach Investigations ReportTools are lacking Inadequate Tools Too many silos, protection lacking Business Pressures Shifts in business environment Disruptive Technologies New innovation can introduce risk Source: IBM X-Force Trend Report, Sept 2013 Source: IBM CISO Study, Oct 2013 Source: Forrester Surviving The Technical Security Skills Crisis, May 2013
  • 13. © 2014 IBM Corporation IBM Security 12 At IBM, the world is our security lab v13-016,000 IBM researchers, developers, and subject matter experts ALL focused on security 3,000IBM security patents More than Security Operations Centers Security Research and Development Labs Institute for Advanced Security Branches
  • 14. © 2014 IBM Corporation IBM Security 13 IBM Security: Helping clients optimize IT security Integrated Portfolio Managed and Professional Services Extensive Partner Ecosystem IBM Research
  • 15. © 2014 IBM Corporation IBM Security 14 • Own the security agenda for innovation • Embed security on day one • Leverage cloud, mobile, social, big data to improve security • Develop a risk-aware security strategy • Deploy a systematic approach to security • Harness the knowledge of professionals • Use intelligence and anomaly detection across every domain • Build an intelligence vault around your crown jewels • Prepare your response for the inevitable IBM’s approach is helping customers gain an advantage on attackers and seize new opportunities Get help to develop an integrated approach 3 Employ cloud and mobile to improve security 2 Use analytics and insights for smarter defense 1
  • 16. © 2014 IBM Corporation IBM Security 15 They are looking for a trusted partner who… CISOs are looking for strategic partners to chart a path
  • 17. © 2014 IBM Corporation IBM Security 16 Why a New Approach Attackers will not relent and every agency is a target New technologies create opportunities to transform IT security Security leaders are more accountable than ever before
  • 18. © 2014 IBM Corporation IBM Security 17 Security teams must also shift from a conventional ―perimeter and point defense‖ mindset and begin thinking like an attacker Detect, Analyze & Remediate Think like an attacker, counter intelligence mindset  Protect high value assets  Emphasize the data  Harden targets and weakest links  Use anomaly-based detection  Baseline system behavior  Consume threat feeds  Collect everything  Automate correlation and analytics  Gather and preserve evidence Audit, Patch & Block Think like a defender, defense-in-depth mindset  Protect all assets  Emphasize the perimeter  Patch systems  Use signature-based detection  Scan endpoints for malware  Read the latest news  Collect logs  Conduct manual interviews  Shut down systems Broad Targeted What has Changed?
  • 19. © 2014 IBM Corporation IBM Security 18 Gaining insights across the entire security event timeline VULNERABILITY REMEDIATIONEXPLOIT Pre-Exploit Post-Exploit Security Intelligence The actionable information derived from the analysis of all security-relevant data available to an organization • Gain visibility over the organization’s security posture • Detect deviations from the norm and initiate preventive procedures • Attain awareness of vulnerabilities and assess exposures • Discover anomalies and investigate to evaluate the risk • Explore and analyze data to devise countermeasures for the attack • Formulate new security best practices to adapt to emerging threats What was the impact? What is happening right now? Are we configured to protect against these threats? What are the external and internal threats?
  • 20. © 2014 IBM Corporation IBM Security 19 © 2012IBM Corporation CDM Implementation Phases Local Computing - Devices Local Computing Environment - People Infrastructure and Network - Devices Local Computing Environment - Events Infrastructure and Network – Events Enclave (Organization – Devices and Events
  • 21. © 2014 IBM Corporation IBM Security 20 20 Four Tool Functional Areas and IBM tools for CDM Phase 1  For supporting the Hardware Asset Management Tool Functional Area… – QRadar – IBM Endpoint Manager – Augmentation tools: IBM Cognos (dashboard)  For supporting the Software Asses Management Tool Functional Area… – QRadar – IBM Endpoint Manager – Augmentation tools: IBM Cognos (dashboard)  For supporting the Configuration Management Tool Functional Area… – QRadar – IBM Endpoint Manager – Augmentation tools: IBM Cognos (dashboard)  For supporting the Vulnerability Management Tool Functional Area… – QRadar – IBM Endpoint Manager – Augmentation tools: IBM Cognos (dashboard) & IBM Rationale Appscan
  • 22. © 2014 IBM Corporation IBM Security 21 Delivering security solutions via a single, integrated platform Security Intelligence Platform
  • 23. © 2014 IBM Corporation IBM Security 22 Security Intelligence platform that enables security optimization through advanced threat detection, meet compliance and policy demands and eliminating data silos Security Intelligence and Analytics Portfolio Overview QRadar SIEM •Integrated log, threat, compliance management •Asset profiling and flow analytics QRadar Risk Manager •Predictive threat modeling & simulation •Scalable configuration monitoring and audit QRadar Log Manager •Turnkey log management •Upgradeable to enterprise SIEM Network Activity Collectors (QFlow / VFlow) •Network analytics, behavior and anomaly detection •Fully integrated with SIEM QRadar Vulnerability Manager •Integrated Network Scanning & Workflow •Leverage SIEM, Threat, Risk to prioritize Vulns New: QRadar Incident Forensics •Integrated full packet capture •Meta-data extraction, reconstruction and replay
  • 24. © 2014 IBM Corporation IBM Security 23 Infrastructure - Endpoint Providing endpoints, servers, and mobile devices with security to remain compliant, updated, and protected against today’s threats Portfolio Overview IBM Endpoint Manager for Software Usage Analysis •Network Discovery: agent-less mechanism to identify all IP- based devices on a network •HW & SW Inventory: continuous and automated agent- based inventory •SW Usage Analysis: advanced software asset management capabilities IBM Endpoint Manager for Security and Compliance •Security Configuration Management: SCAP validation for both configuration assessment and remediation •Patch Management: patch compliance and remediation •Vulnerability Management: discover, identify, and locate known security vulnerabilities by assessing systems against OVAL-based vulnerability definitions •Client Manager for Endpoint Protection: ―health-check‖ for third-party anti-virus and anti-malware solutions •Network Self Quarantine: endpoint control and quarantine capabilities for systems already running the IEM agent, via internet protocol security policy
  • 25. © 2014 IBM Corporation IBM Security 24 Application Portfolio Overview IBM AppScan Enterprise •Manage application security and risk management with advanced security testing •Mitigate risk by collaborating with developers to remediate security vulnerabilities •Empower security teams to drive security testing throughout the software development life cycle (SDLC) •Integrate with web-application firewalls to provide custom tuning based on actual vulnerabilities •Execute DAST against applications in development and production •Hybrid analysis to perform correlation of DAST and SAST results IBM AppScan Source •Source code analysis to identify the latest security threats with SAST •Automated security testing within build environments IBM AppScan Standard •Desktop application for security analysts and penetration testers •Advanced security testing based primarily on DAST, but also includes static analysis for client-side JavaScript •Glass box testing •Coverage of the latest rich-Internet applications and web technologies (web services, SOAP, Flash, Ajax and more) JK2012-04-26
  • 26. © 2014 IBM Corporation IBM Security 25 Data Enterprise-wide solutions for helping secure the privacy and integrity of trusted information in your data center Portfolio Overview IBM InfoSphere Guardium Product Family •Database Activity Monitoring – continuously monitor and block unauthorized access to databases •Privileged User Monitoring – detect or block malicious or unapproved activity by DBAs, developers and outsourced personnel •Database Leak Prevention – help detect and block leakage in the data center •Database Vulnerability Assessment – scan databases to detect vulnerabilities and take action •Audit and Validate Compliance – simplify SOX, PCI- DSS, and Data Privacy processes with pre-configured reports and automated workflows IBM Security Key Lifecycle Manager •Centralize and automate the encryption key management process •Simplify administration with an intuitive user interface for configuration and management JK2012-04-26
  • 27. © 2014 IBM Corporation IBM Security 26 The Cybersecurity Framework… • Provides a structure organizations can use to create, guide, assess or improve comprehensive cybersecurity programs based on risks • Offers a common language to address and manage cyber risk in a cost-effective way based on business needs, without placing additional regulatory requirements on businesses • Allows organizations—regardless of size, degree of cyber risk or cybersecurity sophistication—to apply the principles and best practices of risk management to improve the security and resilience of critical infrastructure • Helps companies prove to themselves and their stakeholders that good cybersecurity is good business • Builds on global and other standards, guidelines, and best practices • Provides a means of expressing cybersecurity requirements to business partners and customers • Assists organizations in incorporating privacy and civil liberties as part of a comprehensive cybersecurity program Source: NIST
  • 28. © 2014 IBM Corporation IBM Security 27 Framework Components Framework Core • Cybersecurity Activities and informative references common across critical infrastructure sectors and organized around particular outcomes • Enables communication of cyber risk across an organization Framework Profile • Aligns industry standards and best practices to the framework Core in a particular implementation scenario • Supports prioritization and measurement of progress toward the Target Profile, while factoring in other business needs— including cost-effectiveness and innovation Framework Implementation Tiers • Describes how cybersecurity risk is managed by an organization • Describes degree to which an organization’s cybersecurity risk management practices exhibit the key characteristics (e.g., risk and threat aware, repeatable, and adaptive) Source: NIST
  • 29. © 2014 IBM Corporation IBM Security 28 Framework Core Source: NIST
  • 30. © 2014 IBM Corporation IBM Security 29 How to Use the Cybersecurity Framework The Framework is designed to complement existing business and cybersecurity operations, and can be used to: • Understand security status • Establish / Improve a cybersecurity program • Communicate cybersecurity requirements with stakeholders, including partners and suppliers • Identify opportunities for new or revised informative references • Identify tools and technologies to help organizations use the Framework • Integrate privacy and civil liberties considerations into a cybersecurity program Source: NIST
  • 31. © 2014 IBM Corporation IBM Security 30 Influencers • Confident / prepared • Strategic focus Protectors • Less confident • Somewhat strategic • Lack necessary structural elements Responders • Least confident • Focus on protection and compliance have a dedicated CISO have a security/risk committee have information security as a board topic use a standard set of security metrics to track their progress focused on improving enterprise communication/ collaboration focused on providing education and awareness How they differ IBM’s 2012 Chief Information Security Officer Study revealed the changing role of the CISO Source: IBM Center for Applied Insights, Finding a Strategic Voice: Insights from the 2012 IBM Chief Information Security Officer Assessment , May 2012
  • 32. © 2014 IBM Corporation IBM Security 31 Reaching security maturity 13-09-17 Security Intelligence Predictive Analytics, Big Data Workbench, Flow Analytics SIEM and Vulnerability Management Log Management Advanced Fraud Protection People Data Applications Infrastructure Identity governance Fine-grained entitlements Privileged user management Data governance Encryption key management Fraud detection Hybrid scanning and correlation Multi-faceted network protection Anomaly detection Hardened systems User provisioning Access management Strong authentication Data masking / redaction Database activity monitoring Data loss prevention Web application protection Source code scanning Virtualization security Asset management Endpoint / network security management Directory management Encryption Database access control Application scanning Perimeter security Host security Anti-virus Optimized Proficient Basic
  • 33. © 2014 IBM Corporation IBM Security 32 IBM Security Systems Portfolio People Data Applications Network Infrastructure Endpoint Identity Management Guardium Data Security and Compliance AppScan Source Network Intrusion Prevention Trusteer Apex Access Management Guardium DB Vulnerability Management AppScan Dynamic Next Generation Network Protection Mobile and Endpoint Management Privileged Identity Manager Guardium / Optim Data Masking DataPower Web Security Gateway SiteProtector Threat Management Virtualization and Server Security Federated Access and SSO Key Lifecycle Manager Security Policy Manager Network Anomaly Detection Mainframe Security IBM X-Force Research Advanced Fraud Protection Trusteer Rapport Trusteer Pinpoint Malware Detection Trusteer Pinpoint ATO Detection Trusteer Mobile Risk Engine Security Intelligence and Analytics QRadar Log Manager QRadar SIEM QRadar Risk Manager QRadar Vulnerability Manager IBM offers a comprehensive portfolio of security products
  • 34. © 2014 IBM Corporation IBM Security 33 Using Security Frameworks to Achieve Effectiveness & Compliance 33
  • 35. © 2014 IBM Corporation IBM Security 34 Highlighted announcements NEW: QRadar Incident Forensics NEW: Critical Infrastructure Services NEW: “All-in-one” Access Management NEW: Secure Network Optimization Services NEW: Virtual IPS & Identity Service for Cloud Planned future announcements
  • 36. © 2014 IBM Corporation IBM Security 35 For more information Peter Allor Security Strategist- Federal, IBM pallor@us.ibm.com Contact Jerry Jarvis jjarvis@us.ibm.com David Nagel dnagel@us.ibm.com Additional Information – White Papers on CDM http://www.ibm.com/common/ssi/cgi- bin/ssialias?subtype=WH&infotype=SA&appname=SWGE_WG_WG_USEN &htmlfid=WGW03019USEN&attachment=WGW03019USEN.PDF http://www- 304.ibm.com/industries/publicsector/us/en/promotion/!!/xmlid=242300 35
  • 37. © 2014 IBM Corporation IBM Security 36 © 2014 IBM Corporation IBM Security Systems 36 www.ibm.com/security © Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks or service marks of others. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

Hinweis der Redaktion

  1. On February 12, 2013 Jim Lewis of CSIS reported:Executive Summary Analysis of successful attacks has provided good data on both the techniques used in breaching corporatenetworks and the steps needed to prevent such breaches. However, this information is not reflected inpractice. Companies underestimate the risk they face of being breached or hacked. Most companies only find out thatthey have been hacked when told by a third party. This could raise questions of fiduciary responsibility asgreater awareness of risk grows in the business community and in government. Hacking is incredibly easy; survey data consistently shows that 80 to 90 percent of successful breaches ofcorporate networks required only the most basic techniques. Hacking tools are easily acquired from the Internet, including tools that “crack” passwords in minutes. In the last few years, in 2009 and 2010, Australia’s Defense Signals Directorate (DSD) and the U.S. NationalSecurity Agency (NSA) independently surveyed the techniques hackers used to successfully penetrate networks.NSA (in partnership with private experts) and DSD each came up with a list of measures that stop almost allattacks. DSD found that four risk reduction measures block most attacks. Agencies and companies implementing thesemeasures saw risk fall by 85 percent and, in some cases, to zero.CDM includes 3 of 4 measures in Phase I.
  2. A new security reality is hereSophisticated attackers break through conventional safeguards every day.Organized criminals, hacktivists, governments and adversaries are compelled by financial gain, politics and notoriety to attack your most valuable assets. Their operations are well-funded and business-like ‒ attackers patiently evaluate targets based on potential effort and reward. Their methods are extremely targeted ‒ they use social media and other entry points to track down people with access, take advantage of trust, and exploit them as vulnerabilities. Meanwhile, negligent employees inadvertently put the business at risk via human error. Even worse, security investments of the past fail to protect against these new classes of attacks. The result is more severe security breaches more often. In fact, 61% of organizations say data theft and cybercrime are the greatest threats to their reputation.1 And the costs are staggering. By one estimate, the average cost of a breach is over $7million.2Sources: (1) 2012 Global Reputational Risk & IT Study, IBM; (2) 2013 Cost of Cyber Crime Study, Ponemon Institute<MOUSE CLICK> Cloud, mobile, social and big data drive unprecedented change.  Businesses are adopting mobile, social, big data and cloud to analyze and share information at unprecedented rates. This influx of new innovation, technologies, and end-points push more and more business transactions outside company walls and completely transform enterprise security as we know it. As the traditional network perimeter permanently dissolves, it is more difficult to defend company data from the increasing gaps in security, and to verify that users accessing data are protected. In one study, 70% of security executives expressed concern about cloud and mobile security.3Theft or loss of mobile devices, privacy concerns associated with cloud, and accidental sharing of sensitive data are some of the key fears. Without dynamic protection, an organization may spend more time recovering from attacks than it does preventing them. And those who do not prepare for change are leaving their companies dangerously exposed.Sources: (3) 2013 CISO Survey, IBM;2013 Juniper Mobile Threat Report<MOUSE CLICK> Yesterday’s security practices are not sustainable Up to now, organizations have responded to security concerns by deploying a new tool to address each new risk. Now they have to install, configure, manage, patch, upgrade, and pay for dozens of non-integrated solutions with limited views of the landscape. Costly and complex, these fragmented security capabilities do not provide the visibility and coordination needed to stop today’s sophisticated attacks. Moreover, the skills and expertise needed to keep up with a constant stream of new threats is not always available. 83% of enterprises report having difficulty finding the security skills they need.4And as new risks emerge, the environment will grow more complex and the skills gap wider. 49% of IT executives say that they are challenged by an inability to measure the effectiveness of their current security efforts5and 31% of IT professionals have no risk strategy at all6. Many security teams are simply operating in the dark.Sources: (4) 2012 ESG Research; (5) Security Intelligence Can Deliver Value Beyond Expectations And Needs To Be Prioritized, Forrester; (6) 2013 Global Reputational Risk & IT Study, IBM
  3. Challenge #2 – Tools lacking…Too Many ProductsWe have multiple examples of customers who have invested in many, many tools. One US government agency alone has 200 security products – that entails the license costs, but perhaps more problematically, the configuration and maintenance of all of those products in a constantly changing infrastructure. They’re not getting their money’s worth. They can’t. It’s too complex and too costly.Point ProductsBesides having too many products, they have too many vendors – point products from each vendor that do not integrate in any way. And those point products cannot find the advanced attacks that these enterprises are experiencing.Products don’t workAntivirus products cannot reliably defend against malware.http://krebsonsecurity.com/ 
  4. 2012 was a record year for reported data breaches and security incidents, with a 40 percent increase in total volume over 2011.1 In the first half of 2013, security incidents have already surpassed the total number reported in 2011 and are on track to surpass 2012.This year kicked off with a number of high profile sophisticated attacks on major websites, media, and tech companies
  5. With more than 6,000 researchers, developers and subject matter experts engaged in security initiatives, IBM operates one of the world’s broadest enterprise security research, development and delivery organizations. This powerful combination of expertise is made up of the award-winning X-Force research and development team—with one of the largest vulnerability databases in the industry—and includes nine security operations centers, nine IBM Research centers, 14 software security development labs and the IBM Institute for Advanced Security with chapters in the United States, Europe and the Asia Pacific region.________________________Security Operations Centers: Atlanta, Georgia; Detroit, Michigan; Boulder, Colorado; Toronto, Canada; Brussels, Belgium; Tokyo, Japan; Brisbane, Australia; Hortolandia, Brazil; Bangalore, India; Wroclaw, Poland  Security Research Centers: Yorktown Heights, NY; Atlanta, GA; Almaden, CA; Ottawa, Canada; Zurich, CH; Kassel, DE; Herzliya, IL; Haifa, IL; New Delhi, IN; Tokyo, JPSecurity Development Labs: Littleton, MA; Raleigh, NC; Atlanta, GA; Austin, TX; Costa Mesa, CA; Fredericton, Canada; Toronto, CAN; Ottowa, CAN; Belfast, NIR; Delft, NL; Pune, IN; Bangalore, IN, Taipei, TW; Singapore, SG; Gold Coast, AUNote: IBM patent search performed by Paul Landsberg, IBM IP Office
  6. To support the role of successful CISO’s, IBM offers integrated security intelligence and industry-leading experience enabled by the IBM Security Framework solution capabilities. All of the IBM Security offerings are backed by an extensive business partner ecosystem which consists of industry-leading technology, sales and service partners.These capabilities are delivered through a comprehensive and robust set of tools and best practices (including software and hardware) that are supported by the services needed to address:Intelligence: Through a common and intuitive view that combines deep analytics with real-time security intelligence.Integration: Through unifying existing tools and infrastructures with new forms of defense in order to reduce complexity and lower the cost of maintaining a strong security posture.Expertise: Through a more proactive and trusted source of truth in order to stay ahead of emerging threats and risks.Addressing these three key imperatives enables a more holistic, comprehensive perspective and can enhance your security maturity.
  7. Why should organizations act now?... Because your department is a keystroke away from being in the headlines.  Criminals will not relent: Once you are a target, criminals will spend as much time trying to break into your enterprise as you do on your core business. If you do not have visibility, they will succeed.Recently, Trusteer came across a complex new criminal scheme involving the Tatanga Trojan that conducts an elaborate Man in the Browser (MitB) attack to bypass SMS based transaction authorization to commit online banking fraud.  The scam targets online banking customers of several German banks. When the victim logs on to the online banking application, Tatanga uses a MitBwebinject that alleges the bank is performing a security check on their computer and ability to receive a Transaction Authorization Number (TAN) on their mobile device. In the background, Tatanga initiates a fraudulent money transfer to a mule account. It even checks the victim’s account balance, and will transfer funds from the account with the highest balance if there is more than one to choose from. The victim is asked to enter the SMS-delivered TAN they receive from the bank into the fake web form, as a way to complete this security process. By entering the TAN in the injected HTML page the victim is in fact approving the fraudulent transaction originated by Tatanga against their account. Even though the victim is presented with the fund transfer amount and the destination account information in the SMS message that contains the TAN, the injected HTML page claims that the process uses “experimental” data and that no money will leave their account. Once the victim enters the TAN in the fake form and hits submit, the funds are transferred to the fraudster’s account. Meanwhile, Tatanga modifies the account balance reports in the online banking application to hide the fraudulent transaction. This is a very sophisticated and multi-faceted attack. By combining a MitB attack and social engineering, Tatanga is able to circumvent out-of-band authentication used by many banks. Then it goes one step further by hiding evidence of the fraudulent transaction from the victim using a post transaction attack mechanism. Fortunately, the text in the injected HTML page is littered with grammar and spelling mistakes and appears not to have been written by a German speaker. This may make it less effective. Clearly, grammar is easy for fraudsters to improve. The fact that they are blending multiple attack methods in a single fraud scam is not good news. However, they still need to compromise the endpoint with malware, which can be prevented.Torpig is a notorious criminal gang that has their own malware. They targeted one of our customers (a large financial services company) and put up a long battle with us. They kept changing and evolving their malware in order for it to avoid being detected by our products. FYI: Products used: Rapport and PPMD (our cloud based solution) was used by the client.Every business is impacted: In the past, banks were the primary targets of cyber criminals. Today, diverse actors move with lightning speed to steal money, intellectual property, customer information, and state-secrets across all sectors.Your perimeter is breached, criminals are inside: Recent attacks demonstrate that victims were compromised for months before they discovered it. Assuming that you have been breached is today’s prudent security posture.Because this new era offers an opportunity to transform IT security. Change will expand and accelerate: Cloud, Mobile, Social and Big Data are radically changing the business landscape. Adoption is accelerating as your business realizes the opportunity they present – the new era is here to stay.New innovations provide the opportunity to get it right: By building security in from the start, you have a chance to secure the new era of computing better than the old.Big Data, Social and Cloud will enable greater security: Now is the chance to embrace the new era of computing to modernize your security capability. Assess how your security team can leverage these disruptive forces to strengthen and streamline your security infrastructure.Because security leaders are held more accountable than ever before.  Your Board and CEO demand a strategy: After reading about recent breaches, business leaders are asking you for a plan. You need a strategy and roadmap that gets you to best-in-class. Security is now a business, not technology, initiative.Your team is blind to the business risk: With disparate IT security tools deployed and silos preventing visibility, your team is blindfolded and unable to develop an effective risk-based program for improvement. You cannot do this alone: Skills shortages and rapidly changing techniques mean you lack the staff and expertise to counter the threat at hand.
  8. Building new, proactive defenses requires thinking like an attacker--------------------------------------------------------------------------Identify, discover, protect high-value assetsGather and preserve evidenceSecuring the weakest link (most attractive), all linksBaselining systems and networksFollowing the trail
  9. Securing today’s businesses requires a new approach. Companies need to gain insights across the entire security event timeline. While IBM is widely known for our Security Information and Event Management or SIEM, and for our Log Management solutions, our product strategy delivers a complete set of solutions that span the security event timeline that all IT organizations wrestle with. Our SIEM, Log Management and Network behavioral analysis solutions lead the market in helping customers react and respond to exploits as they occur in a network. But we also provide much needed value to customers as they seek to predict and prevent incidents in the first place through our solutions that help to model risk, evaluate configurations and prioritize vulnerabilities.“Security Intelligence” is the actionable information derived from the sum of all security data available to an organization, which improves accuracy and provides context throughout the entire security event timeline – from detection and protection through remediation. Our product strategy supports the entire security intelligence timeline. What you want in these sorts of situations is to recognize the attack as early as possible, flag it to the appropriate manager and activate your incident response processes, aimed at stopping the attack on the one hand and identifying the culprit on the other.
  10. The Framework does NOT:Require organizations to use the framework - This is a voluntary approach that should be used because it provides a structure for creating, guiding, assessing or improving comprehensive cybersecurity programs based on risksLimit the choice of standards, guidelines, and practices to be used by any organization - The framework suggests references that are widely recognized as useful and up-to-dateProvide a one-size-fits all approach to addressing cybersecurity risks - Each organization should customize the way in which it uses the framework based on its degree of risk, current cybersecurity efforts, and business needs. The framework does not specify how much risk organizations should takeRely strictly on U.S.–based approaches - It builds on global standards that will harmonize practices
  11. Core:Consists of Functions, Categories, Subcategories, and Informative ReferencesFunctions: Identify, Protect, Prevent, Respond, RecoverFunctions provide the anchor that enable communication of cyber risk across an organization.Profiles:Helps organizations progress from current level of cybersecurity sophistication to a target improved state that meets business needsTiers:Tier options: Partial (Tier 1) Risk-Informed (Tier 2) Risk-Informed and Repeatable (Tier 3) Adaptive (Tier 4)Each organization will decide which tier matches its risk management needs and capabilities.It is not a race to the top.
  12. Graphical representation of the Framework CoreFunctions (Identify, Protect, Detect, Respond, Recover)CategoriesSubcategoriesInformative References (identified standards and guidelines: ISO 27001:2013; ISO/IEC 62443; COBIT5; Critical Security Controls (CSC) Top 20; NIST Special Publication 800-53 Revision 4
  13. <Presenter note: Slide animates>According to the insights gathered from the 2012 IBM Chief Information Security Officer Assessment from May of 2012…<mouse click>Responders are the…Least confidentFocus on protection and compliance<mouse click>Protectors are…Less confidentSomewhat strategicLack necessary structural elements<mouse click>Influencers are…Confident / preparedStrategic focusThe Influencers have the attention of business leaders and their boards. Security is not an ad hoc topic, but rather a regular part of business discussions and, increasingly, the culture. These leaders understand the need for more pervasive risk awareness – and are far more focused on enterprise-wide education, collaboration and communication. They are working closely with business functions to create a culture in which employees take a more proactive role in protecting the enterprise. Because they are more integrated with the business, these security organizations are also able to influence the design of new products and services, incorporating security considerations early in the process. Security leaders are going to become more key to their organizations, their budgets will increase and they will move from the fringe to being embedded.
  14. The IBM Security Systems portfolio is built around protecting the security domains of People, Data, Applications, and Infrastructure, with a layer of Security Intelligence and Analytics providing true integration and visibility into the enterprise security landscape, and underpinned by IBM X-Force Research providing threat intelligence. The acquisition of Trusteer provides enhanced endpoint protection and threat research, while extending the portfolio with a layer of advanced fraud protection.