observeit customer webcast: aig pioneers user-centric security strategy

21
Presented by Snir Hoffman

Upload: observeit

Post on 07-Jan-2017

106 views

Category:

Software


1 download

TRANSCRIPT

Page 1: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

Presented by Snir Hoffman

Page 2: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

Who is AIG? Journey to User Activity Monitoring Brief Introduction to ObserveIT 5.7 Q & A

AGENDA

Page 3: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

WHO IS AIG?

Over 88 million customer

64,000 employees worldwide

AIG Israel has 1,000 Employees

Infrastructure Architect

A loyal customer for 2 years

Page 4: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

WHY USER ACTIVITY MONITORING?

“Requirement 10: Monitor Access to Network Resources and Cardholder Data”

“Requirement 12: Maintain Policy that Addresses IT Security for all Personnel”

Bought it for PCI Compliance

Initially “Set it and forget it”

Was our “insurance policy”

Page 5: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

OUR PCI REGULATED ENVIRONMENT 40+ Servers / 10+

Desktops

All PCI providers get a virtual Citrix workstation with minimal applications

Try to minimize RDP access and usage

Page 6: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

FIRST INSURANCE CLAIM:PRODUCTION ISSUE Discovered that a config

file was changed, but didn’t know who or why?

Went to all our vendors and they all said they didn’t do it.

ObserveIT showed definitive proof of who did what

Page 7: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

EXPANDED COVERAGE TO ALL VENDORS Record all of our external

vendors, not just PCI

Turn on notification of recording for transparency and privacy

Noticed a change in behavior and realized the power of deterrence

Mitigated risk across all vendors who access our systems

Page 8: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

COMPLETE COVERAGE Cover All Users – risk from internal users larger than

external vendors

Integrate User Context - To SIEM and our ticketing system

Get proactive - setup alerts for users within key applications and systems

Page 9: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

LESSONS LEARNED Infrastructure monitoring only tells half the picture

Even trusted vendors are a major risk - verify all activity

Activity monitoring is a real deterrent that changes behavior

Vendors aren’t the only risk, any privileged access is a potential threatDON’T FORGET ABOUT

YOUR PRIVILEGED USERS!

Page 10: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

GO-FORWARD ADVICE1. Limit what vendors can do – VDI restricted

environment

2. Leverage user monitoring to deter risk and threats

3. Don’t ignore your biggest risk, privileged access!

Page 11: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

USER ACTIVITY MONITORING:

OBSERVEIT 5.7 BRIEF INTRO

Presented by Dimitri Vlachos

Page 12: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

76% OF DATA BREACHES INVOLVE ACCOUNTS WITH ACCESS TO SENSITIVE DATA Trustwave Global Security

Report

Page 13: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

INFRASTRUCTURE-CENTRIC

HISTORIC APPROACH:

Page 14: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

WE FORGOT ABOUTOUR USERS!

Page 15: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

WHO DID WHAT?

Capture & record all user activity

Page 16: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

WHO DID WHAT?

Monitor, Detect and Respond to

user-based threats

Page 17: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy
Page 18: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

Session activity alerts

Session alert summary

Page 19: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

Alert indication per screenshot on the timeline

Alert indication per activity

Message suspicious users, and terminate sessions

Page 20: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

1,200+ CUSTOMERS

Page 21: ObserveIT Customer Webcast: AIG Pioneers User-Centric Security Strategy

Q&ATRY IT TODAY!

WWW.OBSERVEIT.COM/TRYITNOW