Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving...

9
Using Security Intelligence To Mitigate Today’s Real Threats Ken Westin Tripwire Inc. Product Marketing Manager [email protected]

Transcript of Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving...

Page 1: Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving from Log Management to SIEM ... VULNERABILITY MANAGEMENT SECURITY CONFIGURATION MANAGEMENT

Using Security Intelligence To Mitigate Today’s Real Threats

Ken Westin Tripwire Inc. Product Marketing Manager [email protected]

Page 2: Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving from Log Management to SIEM ... VULNERABILITY MANAGEMENT SECURITY CONFIGURATION MANAGEMENT

Why Big SIEM Implementations Fail

•  “Big SIEM” deployments are a massive project, requires management buy-in for the long haul

•  Requires a great deal of “care and feeding”

•  Long time-to-value

•  Lack of out-of-the-box functionality

People + Process + Technology

Page 3: Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving from Log Management to SIEM ... VULNERABILITY MANAGEMENT SECURITY CONFIGURATION MANAGEMENT

Walk Before You Run

“Deploy log management functions before you attempt wide-scale implementations of real-time event management” – Dr. Anton Chuvakin

Page 4: Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving from Log Management to SIEM ... VULNERABILITY MANAGEMENT SECURITY CONFIGURATION MANAGEMENT

Moving from Log Management to SIEM

•  Monitoring process in place and properly staffed

•  Ability to respond to alerts

•  Tuning and customizing

•  Who has access to information, how will reporting requests be handled?

People + Process + Technology

Page 5: Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving from Log Management to SIEM ... VULNERABILITY MANAGEMENT SECURITY CONFIGURATION MANAGEMENT

VULNERABILITY DATA

HOSTS & SERVER

DATABASE ACTIVITY

USER ACTIVITY

CONFIGURATION DATA

SECURITY DEVICES (IDS – FIREWALLS)

ACTIVE DIRECTORY

APP ACTIVITY

PHYSICAL ACCESS

ACTIONABLE INTELLIGENCE

ANALYTICS, FORENSICS & COMPLIANCE

Page 6: Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving from Log Management to SIEM ... VULNERABILITY MANAGEMENT SECURITY CONFIGURATION MANAGEMENT

LOG INTELLIGENCE

SECURITY CONFIGURATION

MANAGEMENT

VULNERABILITY MANAGEMENT

Which systems are vulnerable? Which systems are being attacked? Which systems have already been compromised? Which systems should we fix first? Have we seen this before? When was it in a trusted state? How can we keep this from happening again?

Security Intelligence

Page 7: Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving from Log Management to SIEM ... VULNERABILITY MANAGEMENT SECURITY CONFIGURATION MANAGEMENT

Vulnerable system visits website with active exploit targeting Internet Explorer 1

APT Exploit Server “watering hole”

DETECT & PREVENT IE 0-DAY THREATS WITH TRIPWIRE CVE-2014-1776

VULNERABILITY MANAGEMENT

SECURITY CONFIGURATION MANAGEMENT

3 Real-time intelligence of threat: correlation of vulnerabilities, configuration and business context of target system

Alerts, Automation & Reporting

LOG INTELLIGENCE

Firewall or IDS detects exploit attempt and passes alert to Tripwire Log Center 2

Exploit Alert

Page 8: Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving from Log Management to SIEM ... VULNERABILITY MANAGEMENT SECURITY CONFIGURATION MANAGEMENT

Log Intelligence

Are we being attacked? Have we seen it before? Security

Configuration

What has changed? What is the trusted state?

Vulnerability Management

What is vulnerable? What is the risk?

HEARTBLEED AND OTHER REMOTE EXPLOITS WITH TRIPWIRE

!

Page 9: Using Security Intelligence To Mitigate Today’s Real Threats · – Dr. Anton Chuvakin . Moving from Log Management to SIEM ... VULNERABILITY MANAGEMENT SECURITY CONFIGURATION MANAGEMENT

Learn More

•  Visit www.tripwire.com

•  We will be at Black Hat again this year booth #141 Contact Info Ken Westin [email protected] Twitter: @kwestin