hexis cybersecurity mission possible: taming rogue ghost alerts

34
Mission Possible Taming Rogue Ghost Alerts Ethan Hunt aka Todd Weller VP Corporate Development July 2015

Upload: hexis-cyber-solutions

Post on 26-Jan-2017

277 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Mission Possible Taming Rogue Ghost Alerts

Ethan Hunt aka Todd Weller VP Corporate Development

July 2015

Page 2: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Cyber = The Newer Battlefield

Page 3: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 4

Cyber Attacks from All Angles

• Casual Hackers

• Hacktivists

• Cyber criminals

• Corporations

• Nation states

Page 4: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 5

Your Mission: Should you choose to accept it…

…is to increase your ability to detect, verify, and respond to threats efficiently and effectively.

Page 5: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Focusing on Threats vs. Chasing Ghosts

Page 6: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

The Problem

Despite significant investment in security, organizations continue to experience challenges detecting, verifying & responding to threats.

Not enough skilled people to respond fast enough

AV and Network Perimeter not blocking threats

1

Too many events and false positives to review

2 3

Page 7: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Blind to the Breach

Source: Mandiant, Verizon

Page 8: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Spending Shift to Detection and Response

Detection & Response

Prevention

Prevention necessary but not 100% effective

Nature of attacks is changing

Response more top of mind

Page 9: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 10

AUTOMATED RESPONSE DETECTION VERIFICATION

1 2 3

Critical Cyber Defense Elements

Page 10: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 11

DETECTION

VERIFICATION

AUTOMATED RESPONSE

Verification is the Critical Link

Page 11: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 12

Visibility Is The First Step

Page 12: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Increasing adoption of behavior- based detection

Initial focus = network-based sandboxing

Focus shifting to Endpoint Detection & Response

DETECTION

No. I just want to get the bad guys, but if I can't see them I can't shoot them.

“You got some kinda savior complex?”

-American Sniper

Page 13: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Visibility is Eye Opening…

Page 14: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

…and Overwhelming

Source: Ponemon Institute

Page 15: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

The Response Challenge

Page 16: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Security Talent Shortage

Source: Burning Glass Technologies “Job Market Intelligence: Report on the Growth of Cybersecurity Jobs”

“The talent you’re looking for in incident response is absolutely the hardest I’ve seen to find in security in general”

- Christine Gadsby, Manager, Blackberry Product Security Incident response Team

Page 17: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Attack Velocity Increasing

Page 18: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Shift to Continuous Response

Velocity Continuous Automation

Page 19: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 20

The Double Whammy

Page 20: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

STRATEGIC: Corroboration and threat fusion to improve detection and prioritize investigation and response

TACTICAL: Solving false positive issue related to network security alerts

VERIFICATION

Page 21: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Cyber Defense Requires an Integrated Approach

Automated Response

Detection Verification

Integration Orchestration Automation

Page 22: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Cyber Defense Requires an Integrated Approach

Page 23: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

An integrated approach to threat detection, verification, and

response that leverages flexible, policy-based responses to

remove threats before they do damage.

INTEGRATED DETECTION. AUTOMATED RESPONSE.

Page 24: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

HawkEye G = “Defender’s Advantage”

1

DETECT

Integrated platform: • Real-time endpoint agents • Network edge detection • 3rd party ecosystem

2

VERIFY

Host and Network correlation confirms the threat to pinpoint where

you really need to respond

3

RESPOND

Automation and machine-guided is a force multiplier to remove the

threat before breach

Page 25: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 26

HawkEye G

Manager

Hexis

Threat Feed HawkEye G

Network Sensor

Third-Party Integrations

FireEye® NX

PAN NGFW + WildFire®

19

HawkEye G

Host Sensor

174

Detect

Endpoints + Network

174 Heuristics

19 Threat Feeds

3rd Party Integration

Page 26: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 27

174

Hexis

Threat Feed Third-Party Integrations HawkEye G

Network Sensor

ThreatSync

FireEye® NX

PAN NGFW + WildFire®

HawkEye G

Host Sensor

19

Introducing ThreatSync™

Threat Fusion

Threat Analytics

Indicator Scoring

Device Incident Score Verify

Page 27: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 28

174

Hexis

Threat Feed Third-Party Integrations HawkEye G

Network Sensor

Policy Manager Countermeasures

Kill

Quarantine

Block

Expire

Forensics

Future

ThreatSync

FireEye® NX

PAN NGFW + WildFire®

HawkEye G

Host Sensor

19

Surgical

Machine Guided

Automatic Respond

Page 28: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 29

Hexis

Threat Feed Third-Party Integrations HawkEye G

Network Sensor

Policy Manager Countermeasures

Kill

Quarantine

Block

Expire

Forensics

Future

ThreatSync

+

FireEye® NX

PAN NGFW + WildFire®

174

HawkEye G

Host Sensor

19

Machine Guided

Automatic

Page 29: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Detect, Verify, Respond

Endpoint + network

Improve detection effectiveness

Verify endpoint infections

Enable automated response

U.S. Intelligence Community reference architecture (SHORTSTOP)

Integrated Active Cyber Defense (ACD) solution

Includes Hexis, Palo Alto, FireEye, and Splunk

Tackling Integration on Multiple Fronts

Architectures Integrated Platform ThreatSync™

Page 30: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

“How do I stop an active campaign before compromise or breach?”

“I’ve got no clear picture of threat actor activity, malware or infection spread across my enterprise”

“I’m wasting time and resources chasing down network alerts to confirm if my hosts are infected”

“My antivirus isn’t working and I need better visibility into activity on my endpoints”

“How do I respond more effectively and efficiently?

HawkEye G Common Use Cases

Page 31: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Real-world Deployment Metrics

Feature Customer A Customer B Customer C

Host sensor distribution

(initial)

1,872 host sensors (out of 30,000 total)

400 host sensors (out of 1,000 total)

20 host sensors (out of 2,000 total)

Prevention Security Technologies

in-place

Cisco ASA FireEye

McAfee AV Malwarebytes

Cisco ASA/IPS/SSM OpenDNS

TrendMicro AV

Palo Alto FireEye

McAfee AV

Infection % 637 infected hosts

36% infection 50 infected hosts

12% infection

20 infected hosts (89 malicious binaries)

100% infection

Value-add Automated verification of ghost

FireEye alerts Reduce manual verify and

remove by 50% Machine-guided removal on

remote devices

Page 32: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Hexis Key Differentiators

Integrated platform to detect, verify, and respond

Endpoint + network including correlation

Endpoint sensing capabilities – heuristics, real-time eventing

ThreatSync™ analytics fuses Hexis detection with 3rd party indicators

Full arsenal of machine-guided and automated responses that can be flexibly deployed based on policy

Developed using military-grade cyber capabilities and state-of-the-art commercial technologies

RESPOND

Page 33: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Key Takeaways

Cyber defense requirements are driving increased investment in detection & response

Efficient and effective detection & response requires verification

Verification benefits are both strategic and tactical

Integration and automation are critical in your efforts to detect, verify, and respond to threats before they do damage

Page 34: Hexis Cybersecurity Mission Possible:  Taming Rogue Ghost Alerts

Copyright © 2015, Hexis Cyber Solutions, Inc. All rights reserved. Page 35

Questions?

Thank You!