NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

12
NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management

Transcript of NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

Page 1: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

NoVA ARMAFebruary 2015

Tony Sager

The Future of Cyberdefense is… Information Management

Page 2: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

The optimal place to solve a security problem is …

…never where you found it.

--Corollary: and the information for the solution is never in the right form.

Page 3: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

If it is happening to you today, then ...

…it happened to someone else yesterday, and it will happen to someone else tomorrow.

--Corollary: and you probably don’t know them

Page 4: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

After you figured out what happened, there were...

…plenty of signs that could have told you it was coming.

--Corollary: but not all the signs are in “cyberspace”, or available to “cyber defenders”

Page 5: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

So the future of cyberdefense is...

…an information management problem.

Page 6: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

Information Plumbing

Page 7: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

The Security “Fog of More”

standards SDL

supply-chain security

security bulletins

user awareness training

browser isolationtwo-factor authentication

encryptionincident response

security controls

threat intelligence

whitelistingneed-to-know

SIEMvirtualizationsandbox

compliance

maturity model

anti-malware

penetration testing

audit logs

baseline configuration

risk management framework

continuous monitoring

DLP

threat feed

certification

assessmentbest practice

governance

Page 8: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

Some Unfortunate Facts

• The vast majority of compromises are based on known problems that have known solutions

• 85% of the incidents managed by the US-CERT come down to the same 5 basic defenses

• Most attacks should have been blocked at the perimeter

• Very few attackers use “stealth” techniques• Very few defenders have automated workflow

Page 9: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

The Defender’s Challenges

• How can I extend my information ‘reach’ to get a more complete picture of what’s going on?

• Who can I trust to help me cut through the fog?

• How can the data be translated into prioritized action?

• How will I know if something relevant changes?

• How can I do the right thing – and then prove it?!?

Page 10: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

The management of cyber information…

• from many sources “inside my borders”– and of many types (not just security)

• must be findable from “over the horizon”• in forms that are actionable • “passively collected” and “actively generated”• in a churn of constant new information • where each bit of information has a trust value

Page 11: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

The Critical Security Controls

1 23

4

5

6

7

89

10111213

14

15

16

17

1819

20

1) Inventory of Authorized and Unauthorized Devices

11) Limitation and Control of Network Ports, Protocols and Services

2) Inventory of Authorized and Unauthorized Software

3) Secure Configurations for Hardware, Software on Mobile Device, Workstations, and Servers

4) Continuous Vulnerability Assessment and Remediation

5) Malware Defenses

6) Application Software Security

7) Wireless Access Control

8) Data Recovery Capability

9) Security Skills Assessment, Appropriate Training to Fill Gaps

10) Secure Configuration for Network Devices

20) Penetration Tests and Red Team Exercises

19) Secure Network Engineering

18) Incident Response Capability

17) Data Protection

15) Controlled Access Based on Need to Know

14) Maintenance, Monitoring and Analysis of Audit Logs

13) Boundary Defense

12) Controlled Use of Administrative Privileges

16) Account Monitoring and Control

Page 12: NoVA ARMA February 2015 Tony Sager The Future of Cyberdefense is… Information Management.

The Center for Internet Security“making best practice common practice”

http://www.cisecurty.org