2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov.
-
Upload
karson-cooter -
Category
Documents
-
view
220 -
download
0
Transcript of 2010 Hewlett-Packard1 CYBER DEFENSE Alexandar Alexandrov.
2010 Hewlett-Packard1
CYBER DEFENSE
Alexandar Alexandrov
2010 Hewlett-Packard2
CYBER SECURITY
President Barack Obama,May 29, 2009
“Our technological advantage is a key …. But our defense and military networks are under constant attack. .... Indeed, in today's world, acts of terror could come not only from a few extremists …but from a few key strokes on the computer -- a weapon of mass disruption. ... it's now clear that this cyber threat is one of the most serious economic and national security challenges we face as a nation.”
2010 Hewlett-Packard3
OPERATING KPIs--------------------------------PROCESS/FUNCTION
OPERATING KPIs--------------------------------PROCESS/FUNCTION
EXECUTIVE KPI(Direction)
CORE FINANCIAL KPI(Direction)
EXECUTIVE KPI(Direction)
CORE FINANCIAL KPI(Direction)
INFORMATION ASSURANCE
INFORMATION ASSURANCE
EFFICIENCY
---------------
EFFICIENCY
---------------
TRUST
TRUST OUTCOMES
---------
OUTCOMES
---------
• Incidents / Attacks Prevented• Infrastructure Protection • Access to Services
• Incidents / Attacks Prevented• Infrastructure Protection • Access to Services
• Services delivered quickly• Agencies operate within budgets• Leverage Technology
• Services delivered quickly• Agencies operate within budgets• Leverage Technology
ULTIMATE BUSINESS GOAL PUBLIC VALUE IN NATIONAL SECURITY: CYBERSECURITY
BUSINESSINITIATIVES(Strategy/Priority Language)
BUSINESSINITIATIVES(Strategy/Priority Language)
HP SOLUTION: Cybersecurity
Reduce Network Intrusions/ Internet
Crime
Improve Incident
Response
Increase IT Efficiency
and Effectiveness
Capital Investment
Management
Develop Intelligence Capabilities
Reduce Network Attacks / Internet Crime Rates
Risk Assessments / Awareness
_______________
Forensics / Law Enforcement
Improve Incident Response
______________Detection, Response,
Recovery
Reduce IT Operating Costs
______________
Budget, Capital, HR, Procurement, Training
Prevent Critical System Intrusions
__________Cyber Security
Intelligence
PUBLIC VALUE NATIONAL SECURITY
Budget, Labor,
Operating Cost
Management
• Strengthen Security and Resilience at Home• Secure Cyberspace• Critical Infrastructure Protection
• Strengthen Security and Resilience at Home• Secure Cyberspace• Critical Infrastructure Protection
• Coordinate with Emergency Mgt., Public Safety / Justice Agencies
• Coordinate with Emergency Mgt., Public Safety / Justice Agencies
Citizen’s Trust:• Privacy• Civil Liberties• Protection /
Security • Gov’t
Transparency
Citizen’s Trust:• Privacy• Civil Liberties• Protection /
Security • Gov’t
Transparency
Identity / Access
Management
Network / Datacenter
Security
Security Operations
Business Continuity / Recovery
Risk Management / Compliance
Application / Data Security
2010 Hewlett-Packard4
Stakeholders The Source of the Threat What’s at Risk
THE THREAT
– Military, Intelligence, Homeland Security
– Federal, state, local and tribal governments
– Businesses & Consumers
– Nation states
– Ideological Movements
– Organized Criminal Elements
– Fame Seekers
– Industry Competitors
– Insiders
– Merely Curious
– Economic security
– National security
– Competitive Advantage
– Public safety
– Personal Information, intellectual property, privacy
– Critical infrastructure (e.g. power grids, transportation)
2010 Hewlett-Packard5
HP SECURITY SERVICES
Delivering on your mission with confidence
Cyber Control to Achieve
Mission
Mission Integration
Cyber Dominance
Situational Awareness
Informed Decision Making
Cyber/Network Analytics & Prediction
2010 Hewlett-Packard6
– Proven integrated building blocksCOMPREHENSIVE CYBER SECURITY SERVICES PORTFOLIO
Application Security: Services for testing applications (including vulnerability assessment and penetration testing) and for building security and privacy controls into applications
Data & Content Security: Services for data encryption, key management, data loss prevention, secure e-mail, and web content filtering
End Point Security: Services including anti-virus, anti-spyware, mobile device security, and host intrusion detection & prevention
Network Security: Services for protecting the network, including firewalls, wireless security, remote access, network access control, etc.
Data Center Security: Security services for servers, storage, virtualization, and cloud computing
Risk Management & Compliance: Services to train clients in security policies and procedures, to measure and manage risk, to define appropriate security controls and governance, and to achieve and sustain compliance
Security Operations: Services for managing security events including log management, security incident response, reporting and root cause analysis
Business Continuity & Recovery: Services for ensuring the continuity of IT-based business processes
Identity & Access Management: Services for establishing authentication and authorization of user access to business assets
Research & Development: Working with clients to develop next generation approaches to cyber security.
Research & Developme
nt
2010 Hewlett-Packard7
HP SECURITY SERVICES PORTFOLIO
1. Application Penetration Testing2. Application and Code Testing/Scanning3. Web Application Security Assessments4. Web Application Penetration Testing5. Web Application Firewalls6. SOA Security7. SAP Security8. Middleware & Mainframe Security9. Midrange/Server Security
1. Web Content Filtering2. Email Security
1. Disk/File Encryption2. Database Security 3. Data Loss Prevention4. Enterprise Rights Management5. PKI6. Key Management
1. End Point Threat Mgmt (AV, AS, HIDS, Personal F/W)
2. End Point Application & Device Control
3. Host Intrusion Detection & Prevention Services
4. Mobile Device Security
1. Network Intrusion Detection & Prevention Services
2. Adaptive Network Architecture3. Managed Firewall4. VPN, UTM 5. Network Access Control6. Wireless Security7. Managed Proxy / Cache / Filtering
1. Server Threat Management2. Storage Security3. Virtualization Security4. Cloud Computing Security5. Fusion Center
2010 Hewlett-Packard8
HP SECURITY SERVICES PORTFOLIO
1. IT Governance, Risk & Compliance (GRC)
2. eDiscovery & Archiving3. Customer Specific Training and
Awareness4. Operational Risk and Exceptions to
Policy5. Account Delivery Continuity6. ISO 27001 Certification7. Information Risk Advisory Service8. PCI Compliance Scanning9. PCI Managed Compliance10. C & A: NIST SP 800-3711. C & A: DIACAP12. SCADA/Process Control System
Security Assessment13. NERC CIP Design, Audit and
Implementation14. IV&V Test and Evaluation15. Compliance Assessments16. Threat & Risk Assessments17. MCSS Capabilities
1. PKI Management2. Token Management3. Managed Remote Access4. Directory Services5. Meta & Virtual Directory6. Active Directory7. User administration8. IDAM - Current State Assessment9. IDAM - Architecture Blueprint10. IDAM Design & Implement11. Web SSO 12. Federation13. Provisioning14. E-SSO15. Risk Based Authentication16. PAM Management
2010 Hewlett-Packard9
HP SECURITY SERVICES PORTFOLIO
1. Enterprise Security Information & Event Management
2. Log Management3. Compliance Management4. Security Dashboard5. System Hardening Services6. Security Incident Response7. Forensics8. Threat Monitoring & Alerting9. Live Network Service10. Vulnerability Scanning11. Vulnerability Detection & Management
Services12. Security Configuration Management13. Global Security Operations Centers
(GSOC)14. Mainframe Platform/OS Security15. Midrange/Server Platform/OS Security
1. Research, Development, Test & Evaluation services
2. DARPA, IARPA and Military Department research agency opportunity
3. DOE National Labs support4. NMCI Research & Analysis
capabilities and support5. Large comprehensive cyber
security pursuits
2010 Hewlett-Packard10
VULNERABILITY ASSESSMENT SERVICES
Network Assessments (Internet & Intranet)– Network Vulnerability Scanning (State of Art Tools)– Network Penetration Testing– System and Host Vulnerability Testing (White Box & Black Box)– Wireless Network Surveys and Penetration Testing
Application Assessments (COTS and Custom)– Application Development Life Cycle Security Gap Analysis– Application Development/Design Training– Application Code Analysis (From C to Cobol)– Application Cyber Red Team– Application Automated Vulnerability Scanning (Web & Database)– Application Regression Testing– Independent Validation and Verification (IV&V)
2010 Hewlett-Packard11
HP COMPREHENSIVE APPLICATIONS THREAT ANALYSIS
Fast Facts:
– 40,000 vulnerabilities in National Vulnerabilities Database
– Estimate 800,000 vulnerabilities not yet exploited
– Vulnerabilities patched late cost some 30X more that those patched early
– “70%+ of all successful attacks have exploited application vulnerabilities” (Gartner, Microsoft)
– Typical security audits find ~20 issues, uncovering dozens or hundreds of vulnerabilities
– One action which avoids a single data breach pays for itself 100 fold
Services & Solutions:– Security Requirements Gap Analysis– Architectural Threat Analysis
HP’s industry-leading highly efficient and effective security quality assessment. This service is designed to greatly reduce the problem of latent security defects reducing TCO.
2010 Hewlett-Packard12
HP ASSURED IDENTITYTM PLUS SERVICESEnd-to-end
Security Solutions
Business Readiness Workshop
Detailed Design & Architecture
Implementation
Run
Industry Frameworks
Strategic & Technology Partnerships
Services Offered
Strategy & Roadmap
Assessment Service
Audit Compliance & Validation
Assured Identity ManagementTM
Gate SecureTMAssured Identity TM
Fed SecureTM
2010 Hewlett-Packard13
HP Assured IdentityTM Plus
Assured Identity™
–Credential Enrollment
–Credential Issuance
–FIPS 201 Compliance
–PIV.XX Support
Gate Secure™
–Physical Security
–Automated PACS provisioning system
–New, single use, common credentials across multiple agencies
Fed Secure™
–Federation in a Box
–Cross Credentialing
–Federation Broker
–Access Management Services
Assured Identity Management™
–Life Cycle Management
–User Provisioning
–Workflow
–Delegated Admin
–Self-Service
Consulting Services
2010 Hewlett-Packard14
CROSS INDUSTRY EXPERIENCE
HealthcareGovernment
Communications, Media &
Entertainment
Consumer Industries and
Retail Financial Services
Manufacturing
Energy
Transportation
• Deep HP Security experience in all industries• Industry focused security consultants
We serve/manage critical cyber infrastructures across all US Critical Infrastructure/Key Resource sectors
2010 Hewlett-Packard15
HP Personnel Dedicated to Cyber Security
– Over 2,500 cyber security professionals worldwide
– Includes specialists for advisory and consulting engagements
– Certified security staff with CISSP, CISM, CAP, CIS, CSSLP or GSEC
2010 Hewlett-Packard16
INAILIPZS
Minesterio di Grazia e Guist
Ministro Pubblica Intruzione
INAILIPZS
Minesterio di Grazia e Guist
Ministro Pubblica IntruzioneState of California
City of AnaheimState of Michigan
State of OhioCommonwealth of
Pennsylvania
State of CaliforniaCity of Anaheim
State of MichiganState of Ohio
Commonwealth of Pennsylvania
Consulting ATPConsulting ATP
South Australian GovernmentSouth Australian Government
Federal ReserveWorld Bank
Federal ReserveWorld Bank
European Space AgencyEuropean Space Agency
Alberta Sustainable Resource Div.BC Ministry of LabourBC Ministry of Provincial Revenue & Citizen Services Edmonton DeliveryPWGSC – Pension ModernizationGovernment of Manitoba
Alberta Sustainable Resource Div.BC Ministry of LabourBC Ministry of Provincial Revenue & Citizen Services Edmonton DeliveryPWGSC – Pension ModernizationGovernment of Manitoba
Tax Administration Service of Mexico (SAT)
Tax Administration Service of Mexico (SAT)
Sweden PostSweden Post
UK Ministry of DefenceUK Dept. For Work & Pensions
UK Justice &Offender Management
UK Ministry of DefenceUK Dept. For Work & Pensions
UK Justice &Offender Management
Israel Ministry of JusticeIsrael Ministry of Justice
IDA of SingaporeIDA of Singapore
Ministry of the Flemish Gov’t.
Ministry of the Flemish Gov’t.
Spanning all Tiers of Government in 83 countries with >3,500 government accounts
GLOBAL REACH AND SUPPORTTop 50 Accounts US Dept. of Defense
US GovernmentComptroller of the CurrencyDefense Logistics AgencyUS Dept. of AgricultureUS Dept of JusticeUS Dept. of EducationUS Dept. of EnergyUS Dept. of Health & Human ServicesUS Dept. of Homeland SecurityUS Dept. of Housing & Urban DevelopmentNHIC/ MedicareUS Dept. of TreasuryDept. of the ArmyDept. of the NavyDept . Of Veterans AffairsDFASDISAUS PostalFood & Drug AdministrationSocial Security AdministrationUS Dept. of State
US Dept. of DefenseUS GovernmentComptroller of the CurrencyDefense Logistics AgencyUS Dept. of AgricultureUS Dept of JusticeUS Dept. of EducationUS Dept. of EnergyUS Dept. of Health & Human ServicesUS Dept. of Homeland SecurityUS Dept. of Housing & Urban DevelopmentNHIC/ MedicareUS Dept. of TreasuryDept. of the ArmyDept. of the NavyDept . Of Veterans AffairsDFASDISAUS PostalFood & Drug AdministrationSocial Security AdministrationUS Dept. of State
2010 Hewlett-Packard17
Q&A