stay ahead of threats with advanced security protection - fortinet

34
Stay Ahead of Threats with Advanced Security Protection John Gleason – CISSP

Upload: marcotechnologies

Post on 23-Jan-2017

72 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Stay Ahead of Threats with Advanced Security Protection

John Gleason – CISSP

Page 2: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Risk - The common driverStay ahead…. Have a goal and a plan!

• Threat Landscape• Cyber Security finally reaches #1 in C-Level concerns• Security Program vs. Compliance checkboxes• Definitions are important• Security basics – blocking and tackling before technology• The end goal – Lower residual risk = Acceptable level of risk

Page 3: Stay Ahead of Threats with Advanced Security Protection - Fortinet
Page 4: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Virus Lifecycle to Scale

Virus.A (#1) Virus.B (#2) Virus.AA (#27) Virus.BL (#120)

Vend

or U

pdat

e (V

irus.

A )

+0 +30 Sec +13 Min +1 Hour

Page 5: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Cyber Security finally reaches #1 in C-level concerns:Top 5 Business Risks - according to World Economic Forum (US, Japan, Germany, Netherlands & others)

• #1 Cyber attacks• #2 Data fraud and theft• #3 Terrorist attack• #4 Fiscal crisis• #5 Asset bubbleThis underscores the significance of understanding the cyber threat

landscape and associated insights related to intruder detection.

Page 6: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Security Program vs. Compliance checkboxes

• Security/Governance Frameworks• NIST (Multiple)• COBIT• ISO 27000• ITIL• SIGMA6

• Compliance• HIPPA / HITECH• PCI / DSS• CIPA / FERPA• GLBA• Sarbanes Oxley (SOX)

Page 7: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Security Programs address the 360 degree view

• Controls – Require People, Process, and Technology• Administrative• Technical• Physical

• • ISO 27002 defines information security policy in section 5• • COBIT defines it in the section "Plan and Organize"• • Sarbanes Oxley defines it as "Internal Environment"• • HIPAA defines it as "Assigned Security Responsibility"• • PCI DSS defines it as "Maintain an Information Security

Policy"

Page 8: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Definitions are importantUnderstanding can only come through common terminology and definitions

• Security Triad• Roles & Responsibilities• Data Classification• Asset Value• Threat, Threat Agent, Vulnerability, Risk, Counter measure• Controls• Residual Risk

Page 9: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Security triadLike a three legged stool - Possible Fourth = Authenticity

Page 10: Stay Ahead of Threats with Advanced Security Protection - Fortinet

• Confidentiality - Access Control• Identification, Authentication, Authorization (Authenticity)• Least Privilege / Need to know

• Integrity• Assurance, Accuracy, Reliability

• Availability• Perform in a predictable manor, acceptable level of performance• Recover securely from disruption so productivity will not be negatively

impacted• Single points of failure ???? (BC/DR)

Page 11: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Roles & Responsibilities

Page 12: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Roles and ResponsibilitiesWhere do you identify? Owner, GM, Coach, Lineman, Linebacker, Safety?

• Data Owner• Concerned about terms like legal, regulatory, compliance, due care & due

diligence, negligence, reasonable and expected. Generally not IT.

• Data Custodian• Typically IT. Responsible for implementing the policies and guidelines

established by the Data Owner. include physical data storage, back-up and recovery, and the operation of security and data management systems.

Page 13: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Data ClassificationHow do you view and categories your assets?

Public / Private Business & OrganizationsMilitary/GovernmentRestricted/Confidential/Proprietary Top SecretPrivate SecretSensitive ConfidentialPublic Sensitive but Unclassified

Unclassified

Page 14: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Asset ValueQuantitative or Qualitative?

• Cost – to Acquire or develop? Maintain & protect? Replace?• Value – to Adversaries, Intellectual Property• Operational and productivity loss when unavailable• Liability if asset is compromised – Compliance, Legal

• Value of knowing your values – cost/benefit analysis, wise selection of countermeasures, risk awareness, due diligence

Page 15: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Risk Management – What (NIST Cyber Security Framework)

• Risk management is the ongoing process of identifying, assessing, and responding to risk. To manage risk, organizations should understand the likelihood that an event will occur and the resulting impact. With this information, organizations can determine the acceptable level of risk for delivery of services and can express this as their risk tolerance.

• Organizations may choose to handle risk in different ways, including mitigating the risk, transferring the risk, avoiding the risk, or accepting the risk, depending on the potential impact to the delivery of critical services.

Page 16: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Risk Management – Why (NIST Cyber Security Framework)

• With an understanding of risk tolerance, organizations can prioritize cybersecurity activities, enabling organizations to make informed decisions about cybersecurity expenditures.

• Implementation of risk management programs offers organizations the ability to quantify and communicate adjustments to their cybersecurity programs.

• Organizations may choose to handle risk in different ways, including

mitigating the risk, transferring the risk, avoiding the risk, or accepting the risk, depending on the potential impact to the delivery of critical services

Page 17: Stay Ahead of Threats with Advanced Security Protection - Fortinet

• Threat, Threat Agent, Vulnerability, Risk, Counter measure

Page 18: Stay Ahead of Threats with Advanced Security Protection - Fortinet
Page 19: Stay Ahead of Threats with Advanced Security Protection - Fortinet
Page 20: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Controls – Compensating Controls• Administrative • Technical• Physical

• Preventative / Protective• Detective• Corrective / Reactive

Page 21: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Residual risk

• According to ISO 27001,

residual risk is “the risk

remaining after risk

treatment”.

Page 22: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Turning traditional risk analysis upside down

• Threats of today have increased in frequency and impact

• 75-90% enter via E-mail.• 10-20% compromised website

• Avoiding the activity is not an option

Page 23: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Did You Know…79,790Number of incidents investigated by Verizon in 2015

229Average number of days attackers were on a network before detection

70-90%Percent of time unique malware was found

Gartner: All organizations should assume they are in a state of continuous compromise

Page 24: Stay Ahead of Threats with Advanced Security Protection - Fortinet

New world strategies

Page 25: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Breaking the Kill Chain of Advanced Threats

Spam

MaliciousLink

Malware

Bot Commands& Stolen Data

SpamMaliciousEmail

MaliciousLink

Exploit MaliciousWeb Site

MalwareCommand &Control Center

Bot Commands& Stolen Data

Anti-spam

Web Filtering

Intrusion Prevention

Antivirus

App Control/IP Reputation

Sand

box

Page 26: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Layered Defense + Shared Intelligence

Web Filter

Web Filter – Known malicious siteIP ReputationBotnet site

Intrusion Prevention

Anti-Virus/MalwareIntrusion Prevention

Sandbox candidate

Page 27: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Sandbox = Isolation

Page 28: Stay Ahead of Threats with Advanced Security Protection - Fortinet

FortiGuard Labs – Augment your security staffNearly 300 threat researchers

Page 29: Stay Ahead of Threats with Advanced Security Protection - Fortinet

FortiGuard Labs Statistics

Page 30: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Shared threat intelligence

Page 31: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Only ATP Solution NSS Recommended Edge to Endpoint

Page 32: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Fortinet Security Fabric – Shared threat intelligence

Page 33: Stay Ahead of Threats with Advanced Security Protection - Fortinet

Questions ??Thank you

Page 34: Stay Ahead of Threats with Advanced Security Protection - Fortinet

3:00 – 3:45 PM BREAKOUT SESSIONS

KONICA MINOLTABreakout Room: Guest Locker Room “What is your Print Transformation Strategy?”Emil Enstrom, Vice President of Enterprise Accounts

BARRACUDABreakout Room: Delta 360 Club“Protecting Data Everywhere”Rod Mathews, Senior Vice President and General Manager

MARCOBreakout Room: Main Field“Uncovering the Cloud: Is it Right for You?”Steve Knutson, Chief Technology Officer and Vice President of Service

MITEL Breakout Room: Interview Room“Deliver a Flexible, Engaging Customer Contact Center Experience”Brian Spencer, General Manager – Contact Center