reduce the attacker's roi with collaborative threat intelligence

22
Reduce the Attacker’s ROI with Collaborative Threat Intelligence

Upload: alienvault

Post on 15-Jan-2015

222 views

Category:

Technology


2 download

DESCRIPTION

The cost to attack and compromise a system is orders of magnitude less than the cost to defend. A single machine can target thousands of targets searching for one with susceptible defenses while each new attack vector requires defenders to deploy and maintain additional security controls. So, how can we increase the cost for the attacker? One way is through collaborative threat intelligence. Join Wendy Nather of 451 Research and Jaime Blasco, Director of AlienVault Labs for a discussion of the value of collaborative threat intelligence. Wendy and Jaime will discuss how a collaborative approach differs from other threat intelligence sources, along with practical considerations to help you evaluate threat intelligence offerings and protect your environment.

TRANSCRIPT

Page 1: Reduce the Attacker's ROI with Collaborative Threat Intelligence

Reduce the Attacker’s ROI with Collaborative Threat Intelligence

Page 2: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault2

Meet today’s presenters

INTRODUCTIONS

Jaime BlascoDirector, AlienVault Labs

AlienVault@jaimeblascob

Wendy NatherResearch Director, Security

451 Research@451Wendy

Page 3: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

What is Threat Intelligence?

Provides data that you did not already have• Examples: reputation scoring, attack tools, threat actors

Provides data (or analysis of data) that helps you make more decisions about defense

• Example: helping you figure out what else to look for, or what proactive measures to take

Verizon Business VERIS taxonomy: includes both actor and action

Data sold separately; customer can decide how to apply it further

Platform or technology specifically for threat intel collection, analysis or sharing

Page 4: Reduce the Attacker's ROI with Collaborative Threat Intelligence
Page 5: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Threat Intelligence is …

Additive – made to be collectedSecretive – part of the value is that not everyone else knows itTransitive – built on transitive trust relationshipsElusive – can quickly expire, degrade or dry up

Page 6: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

2H '13

2H '12

2H '11

36%

31%

28%

2%1%

3%

4%

2%

3%

1%

8%

53%

59%

61%

4%

6%

Threat intelligence trends

Page 7: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Threat Intelligence Trends

Page 8: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Questions to Ask When Evaluating Threat Intelligence

Which indicators are being offered? Where does the TI come from? How is the TI generated?How rich is the metadata?Is the information useful to my organization?Does it help detect incidents?Does it help me when responding to an incident?Does it help triaging?Am I able to consume the data with the technologies/tools within my enterprise?

Page 9: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Evaluating Threat Intelligence Offerings

OriginVarietyFreshnessSpeed and scaleRelevanceFalse-positive rateConfidenceCompletenessConsumability

Page 10: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

The Power of the “Crowd” for Threat Detection

Cyber criminals are reusing the same tactics to attack multiple targets.

Collaborative threat intelligence makes us all more secure.

Identify, flag and block known attackers

Update policies/alerts to detect threats

Reduce the attacker’s ROI

Page 11: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Traditional Response

First Street Credit Union

Alpha Insurance Group

John Elway Auto Nation

Regional Pacific Telecom

Marginal Food Products

Page 12: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Traditional Response

First Street Credit Union

Alpha Insurance Group

John Elway Auto Nation

Regional Pacific Telecom

Marginal Food Products

Attack

Page 13: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Traditional Response

First Street Credit Union

Alpha Insurance Group

John Elway Auto Nation

Regional Pacific Telecom

Marginal Food Products

Attack

Detect

Page 14: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Traditional Response

First Street Credit Union

Alpha Insurance Group

John Elway Auto Nation

Regional Pacific Telecom

Marginal Food Products

Attack

DetectRespond

Page 15: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Traditional Response

First Street Credit Union

Alpha Insurance Group

John Elway Auto Nation

Regional Pacific Telecom

Marginal Food Products

Attack

DetectRespond

Page 16: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Threat Sharing Enables Preventative response

Through an automated, real-

time, threat exchange framework

Page 17: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

A Real-Time Threat Exchange framework

First Street Credit Union

Alpha Insurance Group

John Elway Auto Nation

Regional Pacific Telecom

Marginal Food Products

Attack

Detect

Open Threat Exchange

Puts Preventative Response Measures in Place Through Shared Experience

Page 18: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

A Real-Time Threat Exchange framework

First Street Credit Union

Alpha Insurance Group

John Elway Auto Nation

Regional Pacific Telecom

Marginal Food Products

Attack

Detect

Open Threat Exchange

Protects Others in the Network With the Preventative Response Measures

Page 19: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Global threat detection for local response

Page 20: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

Security Technologies Needed to Consume Threat Intelligence

Proxy

Log Management

SIEM

Intrusion Detection System

Intrusion Prevention System

Network Monitoring

Firewall

End Point Protection

Forensic Tools

Page 21: Reduce the Attacker's ROI with Collaborative Threat Intelligence

@AlienVault

powered by AV Labs Threat

Intelligence

USMASSET DISCOVERY• Active Network Scanning• Passive Network Scanning• Asset Inventory• Host-based Software

Inventory

VULNERABILITY ASSESSMENT• Continuous

Vulnerability Monitoring• Authenticated /

Unauthenticated Active Scanning

BEHAVIORAL MONITORING• Log Collection• Netflow Analysis• Service Availability Monitoring

SECURITY INTELLIGENCE• SIEM Event Correlation• Incident Response

THREAT DETECTION• Network IDS• Host IDS• Wireless IDS• File Integrity Monitoring

USM Product Capabilities

Page 22: Reduce the Attacker's ROI with Collaborative Threat Intelligence

More Questions? Tweet

@AlienVault

NOW FOR SOME Q&A…

Join the Open Threat Exchange

http://www.alienvault.com

/open-threat-exchange

Download a free 30-day trial of USM

http://www.alienvault.com/free-trial

Join us for a live demo

http

://www.alienvault.com/marketing/alienvau

lt-usm-live-demo

@jaimeblascob @451Wendy