are we breached? deloitte's cyber threat hunting · rochure report title goes here | section...

12
Are we breached? Deloitte's Cyber Threat Hunting

Upload: others

Post on 11-Mar-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

Are we breached? Deloitte's Cyber Threat Hunting

Page 2: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

Brochure / report title goes here | Section title goes here

02

Have we been breached?

How do we proactively detect an attack and minimize the risk to our organization and our customers?

Are we exposed?

Page 3: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

Brochure / report title goes here | Section title goes here

03

Deloitte’s Cyber Threat Hunting will proactively detect if your organization has been compromised and whether the attacker is still in your environment, helping you contain the size of the impact sooner rather than later.

Page 4: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

Brochure / report title goes here | Section title goes here

04

Page 5: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

05

Are we breached? | Deloitte’s Cyber Threat Hunting

• Initiated by nation states and organized crime networks

• Target government and organizations with high-value, high-worth information

• APT groups steal information, disrupt marketplace, damage brand and reputation

• APTs are “ low and slow”, penetrating without detection and impossible to identify with traditional methods

The adversary: Advanced Persistent Threats (“APTs”)

Did you know?

Most organizations are completely unaware that APTs are presently embedded within their infrastructure and have been for months or years, exfiltrating critical information without detection

Page 6: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

06

Are we breached? | Deloitte’s Cyber Threat Hunting

The ATP group identifies an organization based on specific objective and attempts to gain initial access through a targeted attack (e.g. spear-phishing)

The ATP group establishes an entry point through which to begin compromising, a single system on the network at first

APT groups need only find onevulnerability to exploit in order to compromise a system and persist on a network hidden out of view.

Most organizations have to defend against many vulnerabilities. This means organizations are struggling to defend against such APTs withtheir current security program

Deloitte’s Cyber Threat Hunting helps organizations hunt the APT group and stop further compromise fromhappening.

Using the initial compromise, the attack will move laterally across the internal network, gathering more intelligence to further its attack

(e.g., administrative controls)

Once further penetration is established, the APT group can acquire and exfiltrate data from the network without being detected.

Then the ATP group will cover its track and persist within the network for future exploits.

Understanding an Advanced Persistent ThreatA typical attack progression

Pre-compromise Initial compromise

Further compromise

Exfiltrate and Hide

01

Page 7: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

07

Are we breached? | Deloitte’s Cyber Threat Hunting

Using Intelligence to Unlock the impact of an APT Deloitte’s Threat Intelligence and Analytics (TIA) service

02

Deloitte’s Threat Intelligence and Analytics (TIA) service provides critical information for our Cyber Threat Hunting team.

The intelligence gathered from Cyber Threat Hunting also feeds into our TIA service to help us with the on-going monitoring and management of cyber threats.

Cyber Threat Hunting Team is able to identify the type of threat actors that may be targeting your industry and companies like yours, the zero-day vulnerabilities APT groups are exploiting, and the indicators of compromise (IOCs) associated with APT groups.

Critical to detecting and responding to APTs is leveraging the latest intelligence to understand the anatomy of the APT group, the extent of the compromise and the overall impact to your organization and organizations like yours. Intelligence is a key factor not only in identifying the APT but also in building an appropriate remediation plan. Our intelligence driven solution helps your organization proactively detect threats, improve your security posture and reduce the risk to your organization.

TIA provides information

Manage & Monitor

Identify Threats

Page 8: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

08

Are we breached? | Deloitte’s Cyber Threat Hunting

Deloitte’s goal is to find the APT before the attacker can syphon critical informationfrom your organization.

Deloitte will help you minimize the impact of the attack and identify how best to reduce future compromise.

Deloitte's Cyber Threat Huntings is the proactive approach that enables you to address incidents sooner, when incidents are less costly to remediate.

Deloitte provides a clear, executive-level report outlining your exposure.

This helps your management team understand the organization’s gaps and prioritize investmentfor improved cyber defenses.

How Cyber Threat Hunting helps you03

The constantly evolving APT landscape shows us that no organization, regardless of size or industry may be immune to an attack. And when an attack happens, most organizations take far too long to identify the breach and avoid costly remediation activities.

Cyber Threat Hunting is a proactive means to improve an organization’s security posture and protect its reputation.

Page 9: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

09

Are we breached? | Deloitte’s Cyber Threat Hunting

Deloitte will provide the endpoint appliance, endpoint agents and network appliances that are to be deployed at the client’s data centre. The client will be responsible for the physical deployment of the equipment and the software deployment of the agent. Once all technology is deployed, Deloitte requires remote access to the infrastructure to access the equipment. During the 2-week deployment, Deloitte will provide up to 40 hours of remote monitoring.

Deloitte will utilize the endpoint technology to perform sweeps of all systems that have an agent deployed. Leveraging the latest threat intelligence and indicators of compromise (IoCs), we will perform sweeps across the network with an agreed-upon schedule to limit the impact to IT operations.

At the same time of our endpoint assessment, Deloitte will analyze all Internet bound network traffic for IoCs that may indicate a compromise. If any malicious traffic is detected, we will capture this traffic for further analysis.

Upon completion of the assessment, Deloitte will provide a report and executive briefing to present our findings and recommendations.

Our Approach to Cyber Threat Hunting3-phase Minimal Burden Engagement

04

Once our technology is deployed, Deloitte remotely managesthe solution to conduct both a host-based and network review. During the host-based review, Deloitte will search for potential IoCs that would point to an intrusion. These IoCs are used for identifying compromises, anomalies, malware, vulnerabilities or other conditions that would expose a threat. During the network review, Deloitte searches for malicious communication and potential command and control activity from attackers, using network sensors we place at each major Internet egresspoint.

DeployTechnology deployment

AnalyzeEndpoint and networkassessment

Report

Page 10: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

10

Are we breached? | Deloitte’s Cyber Threat Hunting

You’ve been breached, now what?Deloitte’s Cyber Incidence Response05

Deloitte has extensive experience helping organizations understand the implications of an APT and develop remediation plans. Where our clients do not have an incident response capability, Deloitte’s Cyber Incident Response team can help you manage the incident effectively and resume normal operations as soon as possible.

Our service offers clients the ability to call upon specialist support should they experience a cyber incident. This support can be provided remotely or on client site as required and helps the client understand and mitigate the cyber incident. Where the incident involves personal information, we can assist with notification, credit monitoring and protection services, and standing up a call centre or social media platform to communicate with affected individuals. We have partnerships with Public Relations and Communications firms, law firms, credit unions, call centres, fulfillment houses to quickly communicate with the public, customers, shareholders, and regulators andto manage brand and reputation

Once an incident has been remediated, organizations need to take a long-term view to managing cyber risk. Deloitte’s Managed APT service provides a 24/7 “hunting” solution. Leveraging the endpoint and network visibility Deloitte established through your initial Cyber Threat Hunting engagement, Deloitte’s Cyber Intelligence Centre will monitor your environment and enable you to proactively detect threat actors from compromising your network.

IncidenceResponse

Monitoring Service

Page 11: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

Brochure / report title goes here | Section title goes here

11

Cyber Govern

Align and evolve the Cyber Security Program with your business continuity objectives.

Cyber Monitor

Advanced analyticsmonitoring, sensory, and analysis solutions to provide the threat analysis.

Cyber Protect

Breach detection, advanced threat protection, secure code development services to provide focused managed threat solutions.

Cyber Respond

Threat response, containment, and eradication –including cyber take-down, recovery, and forensics.

Cyber Manage

Manage cyber readinessand preparation processes at all levels of the organization.

Cyber Sense

Intelligence, surveillance,and brand monitoring capabilities to reduce exposure and threat profiles.

Cyber Check

Life-cycle based validation of security and threat posture from both an enterprise and threat actor perspective.

The Deloitte Difference06

Deloitte’s Cyber Threat Hunting is one component in a suite of services Deloitte offers to help your company become Secure, Vigilant and Resilient in the face of ever evolving cyber threats.

Page 12: Are we breached? Deloitte's Cyber Threat Hunting · rochure report title goes here | Section title goes here 03 Deloitte’s Cyber Threat Hunting will proactively detect if your organization

Deloitte refers to one or more of Deloitte Touche Tohmatsu Limited, a UK private company limited by guarantee, and its network of member firms, each of which is a legally separate and independent entity. Please see www.deloitte.com/mx/aboutus for a detailed description of the legal structure of Deloitte Touche Tohmatsu Limited and its member firms.

Deloitte provides audit, tax, consulting, and advisory to public and private clients spanning multiple industries. With a globally connected network of member firms in more than 150 countries, Deloitte brings world-class capabilities and high-quality service to clients, delivering the insights they need to address their most complex business challenges. Deloitte’s more than 225,000 professionals are committed to making an impact that matters.

As used in this document, “Deloitte” means Galaz, Yamazaki, Ruiz Urquiza, S.C., which has the exclusive legal right to engage in, and limit its business to, providing auditing, tax consultancy, financial advisory, and other professional services in Mexico, under the name “Deloitte”.

This publication contains general information only, and none of Deloitte Touche Tohmatsu Limited, its member firms, or their related entities (collectively the “Deloitte Network”) is, by means of this publication, rendering professional advice or services. Before making any decision or taking any action that may affect your finances or your business, you should consult a qualified professional adviser. No entity in the Deloitte Network shall be responsible for any loss whatsoever sustained by any person or entity who relies on this publication.

© 2016 Galaz, Yamazaki, Ruiz Urquiza, S.C.

Santiago Gutierrez+52 (55) 5080 [email protected]

Fernando Bojorges+52 (55) 5080 [email protected]

Ivan Campos+52 (55) 5080 [email protected]

Ricardo Zarazua+52 (55) 5080 [email protected]

Contact