creating a security conscious environment with compliance ......“holistic approach that enhances...

55
Creating a Security Conscious Environment with Compliance Going Beyond Minimums With FireEye Endpoint Security presenter photo presenter photo presenter photo Robert Kusters Product Marketing, FireEye Jim Waggoner Senior Director of PM, FireEye Toby Barber Information Security Architect, UCSF

Upload: others

Post on 31-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

Creating a Security Conscious Environment with Compliance Going Beyond Minimums With FireEye Endpoint Security

presenter photo

presenter photo

presenter photo

Robert KustersProduct Marketing, FireEye

Jim WaggonerSenior Director of PM, FireEye

Toby BarberInformation Security Architect, UCSF

Page 2: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye2

$5,000 to $100,000 a month

€20 million or 4% annual revenue

$50,000 to $$Millionsper Breach

Page 3: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

Providing Regulatory Compliance and Protecting Users

Page 4: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

23 Years protecting the enterprise & patient information

Silicon Valley à Stanford à UCSF

Passion for the fascinating challenges in cyber security

Toby Barber

4

Page 5: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye5

Page 6: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

§ Public Education and Healthcare– University of California – 17 Campuses and Medical

Centers– Combined both Campus and

Medical Center computing– Merged patient care and

research computing environments § Award Winning– Top 10 Medical Center,

U.S. News & World Report– “Most Wired” multiple times

UCSF Background

6

Page 7: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye7

UCSF Environment§ Academic freedom fuels

research and patient care§ Creates an unusual cyber

security challenge– Endpoints + medical, IoT, ICS and

mobile devices

– Users and servers

– World-wide faculty and staff

– Patient care focus with troves of PHI§ Research data + patient health data

Page 8: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

Our Experience

8

Visibility Gaps

Continuous Attacks

HIPAACompliance

InvestigationTime

Page 9: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

External§ Compliance with Regulations§ Third party data use agreements§ Breach Notification Rules§ Students and Health Professionals§ Partner research institutions§ Clinical affiliates with the hospital§ Healthcare cost and

reimbursement rates

Internal§ University Budget§ Staffing constraints§ Talent acquisition in the Bay Area§ Shifting from old educational

mindset of all open networks§ Freedom of research focus creates

a challenging acceptable use environment

§ BYOD§ Funding silos for research projects

Our Challenges

Page 10: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

§Visibility – All endpoints; clients,

servers, on network or off

Our Need

§Comply with Regulation (HIPAA)– Context on probability

of compromise

§Reduce– Time spent performing forensics – Time of incident response – Impact to user

§Understand– Risk of data – Risk of systems

Page 11: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

§Common view of system-wide security– Inform readiness –Allocate budget –Measure risk reduction

strategies

§ Single tool, manage & reduce cybersecurity risk

§Consistently spot bad actors

§Uniformly respond quickly to threats

§ Ensure return on investment

§Mature incident response

§Reduce friction in response

–User and cyber security team

Our Goals

Page 12: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

§Pop-up security campaign

§Campaign: Plug YourSecurity Holes

“It’s OK to have a hole in your donut, but not in your security!”

§ Outreach drove action! “Between January 1, 2019, and April 10, 2019, there were 39,962 security software downloads, with only 1.9 % resulting in Service Desk tickets.”

Awareness Approach

Page 13: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

§Started with Internet facing hosts§Security and IT eat our own dog food§Lots of client testing reducing

perceived security agent overload§Performance baselining§Privacy, legal and risk discussions§ Identifying indicators obtained by the

FireEye agent

Testing

Page 14: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

§Training IT teams§Baseline reporting of incidents§Pre-staging policies for issue§Phased rollout, 40,000 endpoints§Daily and Weekly stand ups§Leadership reporting§Pass through version upgrade cycle

Implementation

Page 15: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

What’s changed

Contact userPhysically collect system TriagePerform forensicsProvide loaner machine

Automatic triage collectionRemote containmentUser only interrupted after issue confirmation

Machines would “build up” waiting for security analysis

Investigation speed translates to team availability

Multi-system issues would remove security staff from other duties

Automation opportunities

Page 16: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

Our Current State

§ Lowered network detectiontickets by 50%

§ Improving Four-Factor Breach Risk Assessment as required by HIPAA

§ Moving into high performance computing and IaaS workloads

§ Maturing analysis and playbooks§ Leveraging MITRE ATT&CK

for validation and threat intel

Page 17: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

Next Steps§ FireEye Orchestrator

§New Linux support

§Helix workflow for endpoint investigations

§Develop and test cloud workload protection

What We Learned§Awareness works

§ EDR is a key capability

§ Integration saves time and improves efficacy

§ Talent issues can be partially addressed with technology

Next Steps and Lessons Learned

Page 18: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

Endpoint Security

Page 19: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

The FireEye Ecosystem

19

Page 20: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

How We Do It

Protect Against Threats

Respond to Incidents

Detect the Breaches

§ Malware Protection

§ MalwareGuard

§ ExploitGuard

§ Platform Interaction

§ Event Recording

§ Indicators of Compromise

§ Enterprise Search

§ Investigative Data Acquisition

§ Auto Remediation

§ Containment

§ On/off network

§ Respond at scale

Page 21: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

Industry Validation - Protection

21

Forthcoming99.6%

Ultra Low False Rate100%

99.1%100% Certified

Test Yourself

Page 22: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

Investigations and Response

Yesterday Today Tomorrow

AcquisitionsOn the box inspection

StreamsOff the box inspection

§ Metadata that can be stored for months

§ Activity that is too expensiveto stream

§ All registry changes§ All new files

Page 23: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

Introduction to Modules

§ Future of agent innovation

§ Scales for in-field, on-demand features

§ Primary driver: Consultant driven features for current engagements

§ Customer benefit: Field tested features proven to find threat actors

Page 24: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

§ Identifying new potential risky processes§ Identify new or unexpected credentials§ Blocking credential dumping§ Provide intelligence context for all alerts§ Investigative Modules used by Mandiant– Installed and recently run applications– Recently access application files and actions (like RDP)– Parse Windows shortcut files– Parse shellbags from reg hive for evidence of folders accessed on local machine– Identify GUI program execution– Identify WMI persistence items and convert data storage

Module Examples

24

Page 25: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

Modules in Action

OR

Select a module to load into FireEye Endpoint Security

Modules work across all deployment environments

Enable by policy per host set or

across your console

Page 26: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

§Support on major Linux distributions§Real time alerting on active threats§Streaming of data for investigations§Enrichment of suspicious files§MVX submissions on Linux binaries§Acquisitions on data sets

Expansive Linux Detection

26

Page 27: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

Endpoint Security – What’s Next

27

Innovation Architecture

Protection, Detection, Response

Endpoint Protection Suite

Simplified Management Platform Coverage Evergreen

Page 28: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

Let’s Wrap This Up

28

Page 29: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

FireEye Helix, A Contextualized View

29

“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance”

Contextual Intelligence

Integrates disparate security tools and augments them with next generation SIEM, orchestration, and threat intelligence capabilities

+Compliance Reporting

Workflow and Case Management

Page 30: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

Managed Defense, A Force Multiplier

30

“A level of coverage and visibility that organizations could not duplicate by other means”

Answers, not Alerts

Threat Focused Defense

FireEye Managed Defense for Endpoint is an endpoint detection and response service that provides 24 x 7 protection against threats, combining front line experience with industry leading technology and intelligence.+

Analyst Driven Detection

Page 31: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

Expertise on Demand, A Team Amplification

31

“Cyber security programs perform at their top potential when expertise works seamlessly with technologies and processes.”

Consulting and Response

Threat Intelligence

Product Services and Training

An annual subscription that extends the capabilities of security teams with services and threat intelligence expertise including intelligence, investigation and training.

+

Page 32: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

Expertise on Demand in Action

32

Page 33: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

Visit the Solution Showcase

Thinking about Endpoint Security§MITRE ATT&CK Reference§ Self-guided tour§ Try it for yourself

Current Customers§ Try a Module from the Market§Become a Lighthouse Reference§Provide a review, Gartner peer reviews booth

Call to Action

33

Page 34: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

Thank you.

Page 35: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 36: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 37: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 38: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 39: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 40: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 41: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye41

Page 42: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

Insert headline here anduse medium for emphasis

42

Page 43: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye43

Page 44: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

“Lorem ipsum dolor sit amet, consecteturadipiscing elit. In cursus fermentum elit, necporta ligula.”— Name

Title, Company

What Customers Are Saying

44

Page 45: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye

COLUMN TITLE COLUMN TITLE COLUMN TITLE

Row text

Row text

Row text

Row text

Row text

Row text

Table Example

45

Page 46: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

Insert pictogram

Insert text about solutionInsert Solution Name

Insert supporting charts, diagrams or details about solution

46

Page 48: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 49: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 50: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 51: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 52: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 53: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual
Page 54: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

Icons Library

54

FireEye Security Suite

FireEye Cloud Security

FireEye Email Security

FireEye Endpoint Security

FireEye Helix

FireEye Network Security

FireEye Intelligence

FireEye Managed Defense

FireEye Expertise On-Demand

FireEye Mandiant

Page 55: Creating a Security Conscious Environment with Compliance ......“Holistic approach that enhances our overall security ecosystem and makes it easy to show security compliance” Contextual

©2019 FireEye©2019 FireEye©2019 FireEye©2019 FireEye

0.75in Icons Library

55

FireEye Network Security

FireEye Email Security

FireEye Helix

FireEye Mandiant FireEye Security

SuiteFireEye Cloud Security

FireEye Managed Defense

FireEye Expertise On-Demand

FireEye Intelligence

FireEye Endpoint Security