Scalar Security Roadshow
April 15, 2015
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 1
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 2
Vancouver Calgary
Toronto
Ottawa
London
Montreal
100%
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 3
We studied the Canadian market
Believe they are winning the
CyberSecurity war
Suffered a breach leading to loss or
disclosure of sensitive data
Average annual number of attacks
Average cost to address a security
breach
41%
46%
34
$200,000
•  Security is more complicated than ever;
hackers are funded and motivated
•  Many organizations struggle to understand
and effectively control security risk
•  Traditional security approaches have not
been effective
•  Companies who invest in security are still
suffering catastrophic breaches
Traditional Approaches Have Failed
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
“Good Enough” always fails
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
•  Are more aware of the threat landscape
•  Have a higher percentage of their IT
budget dedicated to security
•  Invest in cutting edge technologies
•  Measure the ROI of those technologies
•  And have a security strategy that is
aligned with their business objectives
and mission
High-performers – 25% less breaches
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
Be more aware of threats and align your security
strategy with business objectives. Build effective
security programs to protect critical assets.
Design and build robust security solutions using
leading technologies that provide visibility
understanding and control.
Develop or acquire expertise to monitor and respond
to security events. Continuously validate the
effectiveness of security controls.
What do Top Performers do?
Prepare
Respond
Defend
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 8
Winning The War
•  Addressing business risk
•  Effective reduction of attack surface
•  Understandable and actionable security
intelligence
•  Rapid incident containment and response
•  Continuous validation and meaningful reporting
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 9
Today’s Agenda
Isolated. Protected.
Bromium.
Security Architecture 1.0…
Traditional Security Technologies
ANY CO. PLC
usDon’t stop next generation threats
Endpoint: The Path of Least Resistance
THREAT TARGETS
DESKTOPS
USERS
WINDOWS 7
WINDOWS 8.1
LAPTOPS
INTERNET EXPLORER
The key security threat channels are Web
and Email. The key threat vectors are
web-links and downloaded files.
Your security posture is significantly
improved by negating the key security
issues of users clicking malicious web-
links and opening infected attachments
Prioritize
Focus
THREAT VECTORS
VIDEOS
PICTURES
DOCUMENTS
WEBLINKS
MAIL
WEB
THREAT CHANNELS
The Business Problem: The Bromium Cure
SECURE
WEB BROWSING
SECURE
EMAIL
SECURITY
PATCHING
Endpoint Isolation Technology
How It Works – Bromium
ISOLATED. PROTECTED.DISRUPTIVE DAMAGING
HARDWARE
OS KERNEL
Untrusted user tasks and any malware
are isolated in a super-efficient micro-VM.
All micro-VMs destroyed, eliminating all
traces of malware with them.
Hardware-isolated
micro-VMs
Why Bromium?
Open Anything,
From Anyone,
Anywhere…
Isolated. Protected.
WhiteHat Security
Application Testing
Rob Stonehouse, CISSP
Chief Security Architect
© 2014 Scalar Decisions Inc. Not for distribution outside of intended audience. 17
About WhiteHat Security
•  Application security testing leader in Gartner Magic Quadrant
•  HQ in Santa Clara, California
•  Employees: 300
•  Customers: 650+
•  Sites under management: 30,000+
18
SAST - “Sentinel Source” Static Testing
•  Integrates into your
development process
•  Directly connects to source
code repository
•  Designed for Agile
•  Your code stays onsite
•  Verified vulnerabilities avoid
false positives
•  Assesses partial code, as
often as needed
19
Sentinel Mobile - Secure Mobile Devices
§  Assesses both iOS and Android
applications
§  Tests native mobile code and server-side
APIs
§  Identifies critical vulnerabilities including
OWASP Mobile Top 10
§  Verified findings:
Zero false positives reduce overhead for
developers
Results prioritized by risk
§  Covers traffic analysis between client and
server-side
DAST – Dynamic Application Testing
•  Non-intrusive, non-disruptive, 24x7
coverage
•  Meets and exceeds PCI 6.5/6.6
requirements
•  Full service and support included in
all offerings
•  Unlimited retests, integration
support, and remediation guidance
at no additional charge
•  Persistent, consistent testing and
results
Cross-site scripting
Credential/Session
Prediction
Weak Password
Recovery Validation
Information Leakage
Brute Force
SQL Injection
Insufficient
Authentication
Application Security Lifecycle
Integrated Application
Security Lifecycle
Software
Development 
Lifecycle
SAST
22
How to Remediate Vulnerabilities?
Continuous Testing
•  Full SDLC coverage: training, development, QA, and
production
•  Stop using Tiger teams!
Expert hands-on guidance from the Threat Research Center
•  100% verified vulnerabilities, 0 false positives
•  150+ security engineers available by phone/email/WebEx
Retest, Retest, Retest
•  Trending of vulnerabilities across time and continuous
assessment of deployment
How Deep to Test?
§  Sentinel PE (Fully Targeted / High Risk)
•  Ideal for high impact sites with sensitive
user and financial information
•  Technical and business logic
vulnerabilities, complete WASC v2
§  Baseline Edition (Static Webpages)
•  Unauthenticated, Verified Results
§  Standard Edition (Directed/Opportunistic)
•  Custom configured logins and multi-step
sequences
•  Comprehensive coverage for technical
vulnerabilities
Scalar Security Roadshow: Toronto Presentation - April 15, 2015
Scan Scheduling
27
© WhiteHat Security 2013 28
© WhiteHat Security 2013 29
Flexible Reporting
§  Web & PDF Based
§  Bi-Directional XML API
§  Integration with popular technologies like
Jira, Archer, F5 & Imperva
Command Execution
§  Buffer Overflow
§  Format String Attack
§  LDAP Injection
§  OS Commanding
§  SQL Injection
§  SSI Injection
§  XPath Injection
Information Disclosure
§  Directory Indexing
§  Information Leakage
§  Path Traversal
§  Predictable Resource Location
Business Logic: Hands-on Inspection
Authentication
§  Brute Force
§  Insufficient Authentication
§  Weak Password Recovery Validation
Authorization
§  Credential/Session Prediction
§  Insufficient Authorization
§  Insufficient Session Expiration
§  Session Fixation
Logical Attacks
§  Abuse of Functionality
§  Insufficient Anti-automation
§  Insufficient Process Validation
Premium Edition Baseline Edition Standard Edition
WhiteHat Sentinel Vulnerability Coverage
Client-Side
§  Content Spoofing
§  Cross-site Scripting
§  HTTP Response Splitting
§  Insecure Content
Protecting the Network with
LogRhythm
Nyron Samaroo, Security Architect
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 32
Introduction
Questions:
•  What is SIEM?
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 33
Answers:
•  Security Information and Event Management (SIEM) is a
tool used to gather and report on security information.
•  Who is LogRhythm?
•  LogRhythm is a global leader in security intelligence and
analytics empowering organizations to rapidly detect,
respond and neutralize cyber threats. Their Security
Intelligence platform unifies next-gen SIEM, log
management, network and endpoint forensics, and
advanced security analytics.
•  How will LogRhythm
defend my network?
•  Through the process of Intelligent and Behavioral
Analytics LogRhythm is capable of detecting and
protecting in near real-time security events not just on
the network but on critical assets residing on the
network.
LogRhythm in Motion
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 34
LogRhythm Agents
Workstations and Servers
Archiving
AI Engine
Log Manager
LogRhythm Personal
Dashboard / Web UI
Event Manager
Network Devices
Identification
Classification
Normalization
Prioritization
Aggregation
Events
Console
Reporting
Alarming
Configuration
Behavior Analytics /
Advanced Correlation
The Platform for Security Intelligence
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 35
Input Analytics Output
LogRhythm System Monitor
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 36
Host Activity Monitoring
•  Independently collects forensic detail
•  Ideal for hosts with sensitive data or critical applications
•  Support for Microsoft, Linux, and Unix platforms
File Integrity and
Windows Registry
Monitoring
•  Meet Compliance Requirements
•  Recognize “who” performed unauthorized
file changes or moves
•  Build whitelists for recognizing malware
or blacklists of undesired applications
•  Identify new, non-whitelisted network
services
•  Detect anomalous network activity
indicating data exfiltration or botnet C&C
•  Monitor unauthorized data movement to
prevent data theft
Process Monitoring
Network
Connection
Monitoring
Data Loss Defender
LogRhythm Network Monitor
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 37
1.  True Application Identification for over 2800
applications
2.  SmartFlow™: Search and analyze packet data from
each network session up to Layer7
3.  SmartCapture™: Full or selective packet capture
for deeper forensic analysis
Google Docs
PostGres
SMTP
Facebook Apps
TorSkype DropBox
XBoxLive
AWS
BitTorrent
GoToDevice
Gmail
Source IP: 192.168.12.59
Destination IP: 192.168.2.84
Command: smb2 change
Filename: SethMy Documents
todayspreso.ppt
Path: serverfileUsers
ApplicationPath: /tcp/netbios/smb
Login: seth.goldhammer
Bytes: 4.52 Mb
Time Start: 2013/10/10 19:30:38
Time Updated: 2013/10/10
………………
Samba
Source IP: 192.168.12.59
Destination IP: 192.168.18.2
Sender: seth@logrhythm.com
Receiver: kbroughton@recruiter.com
Attachment File Name: SethMy Docs
employeedata.txt
Mime Type: http/text
Bytes: 4.52 Mb
Time Start: 2013/10/10 19:30:38
Time Updated: 2013/10/10
………………
Real-time Forensic Monitoring
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 38
System Monitoring
•  Capture host activities not
represented by log data
•  Gain deep visibility on valuable
hosts, sensitive data
Network Monitoring
•  Capture network activities not
captured by standard flow data
•  Recognize applications and perform
Deep Packet Inspection (DPI) on all
network traffic
Independent collection of forensic detail is
CRITICAL for recognizing high risk activities
The Platform for Security Intelligence
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 39
Input Analytics Output
Data Classification
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 40
• LogRhythm not only structures incoming
data but adds contextual information
such as:
• Classification
• Common Event
• Risk Score
• Reduces time required for analysis and
ensures query results are complete
• Provides deep intelligence on more than
600 different systems, devices, apps,
databases, etc.
• 20-30 added each quarter
Confidential Information
0
100
200
300
400
500
600
700
Total
Customer Relations Management
Data Loss Prevention
File Integrity Monitor
Network Controllers
Unified Threat Managers
UPS
Anti-Spam
Physical Security
Encryption
Wireless Access Management
Vulnerability Assessment
Directory Services
Point-Of-Sale
VOIP
Storage
Virtualization
Wireless Access Point
Remote Access
VPN
E-Mail Security
Load Balancers
Content Inspection/Filters
Routers
Anti-Virus
Email Servers
Switch
Access Control
Other
Databases
Web Servers
Network Management
IDS/IPS
Firewalls
Applications
Operating Systems
Scenario Building Blocks
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 41
Log	
  Observed	
  
Log	
  Not	
  Observed	
  
Log	
  Not	
  Observed	
  
Scheduled	
  
Threshold	
  Observed	
  
Threshold	
  Not	
  Observed	
  
Threshold	
  Not	
  Observed	
  
Scheduled	
  
Unique	
  Value	
  Observed	
  
Unique	
  Value	
  	
  
Not	
  Observed	
  
Unique	
  Value	
  Not	
  
Observed	
  Scheduled	
  
Whitelist	
  
Trend	
  
Sta;s;cal	
  
Scenario Examples
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 42
Log	
  Observed	
  
Log	
  Observed	
  
Account	
  Created	
  
Account	
  Deleted	
  
Account=Account	
  
Short	
  ;me	
  period	
  
Log	
  Observed	
  
Log	
  Not	
  Observed	
  
Secure	
  Panel	
  Accessed	
  
No	
  Badge	
  Swipe	
  
Short	
  ;me	
  period	
  before	
  
Detec%ng	
  Temporary	
  Accounts	
   Detec%ng	
  Forced	
  Physical	
  Access	
  
Complex Scenario
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 43
Trend	
  
Abnormal	
  Access	
  and	
  Authen%ca%on	
  Failures	
  	
  
Log	
  count	
  
comparison	
  of	
  
auth	
  and	
  access	
  
failures	
  per	
  user	
  
Trend	
  
Abnormal	
  Authen%ca%on	
  Behavior	
  
Histogram	
  of	
  auth	
  
success	
  and	
  
failures	
  per	
  user	
  
Trend	
  
Abnormal	
  Authen%ca%on	
  Loca%ons	
  
Histogram	
  of	
  auth	
  
success	
  loca;ons	
  
per	
  user	
  
Unique	
  Value	
  Observed	
  
Same	
  user	
  
with	
  mul;ple	
  
anomalies	
  
Event	
  Loop	
  Back	
  
The Platform for Security Intelligence
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 44
Input Analytics Output
Smart Response (closing the loop)
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 45
SmartResponse™ delivers immediate
action on real-world issues, such as when
suspicious behavior patterns are detected,
specific internal or compliance-driven
policies are violated, or critical
performance thresholds are crossed.
•  Pull Attacking IP from Alarm and add to firewall
ACL. Terminating dangerous access to network
•  Suspend or remove newly added or recently
modified privileged user account until activity is
verified as legitimate
•  Remove suspicious users from network during
investigative period
•  Restart operational processes from alarms
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 46
Analytics Driven Defense Modules
Privileged User Monitoring
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 47
Use Case: Detect a rogue
administrator account
Details: Identify when a privileged
user is abusing authority, indicating
either insider threat activity or
compromised credentials
AIE Rules look for:
•  New Admin Activity
•  Mass Object Deletion
•  Users added to privileged group
•  Recently disabled privileged account activity
Retail Cyber Crime Module
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 48
Use Case: Detect Compromised Back
Office Systems
Details: Identify suspicious changes on
back office systems and the network
activity they generate.
AIE Rules look for:
•  New processes
•  New authentications
•  New FIM access events
•  Any FIM modification event
•  Any DLD Activity
•  New Common Event
•  New Network Activity
Analytics Modules
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 49
Rapid-Time
to-Value
Knowledge
•  Industry	
  experts	
  
•  Machine	
  Data	
  
Intelligence	
  
•  Security	
  
•  Compliance	
  	
  
•  Advanced	
  Threat	
  Research	
  
•  Embedded	
  Exper;se	
  
•  Ready-­‐to-­‐use	
  content	
  
•  Frequent,	
  automa;c	
  
updates	
  
•  Knowledge	
  aligned	
  to	
  
organiza;onal	
  goals	
  
•  Quick	
  benefit	
  
recogni;on	
  
•  Ongoing	
  addi;onal	
  value	
  
We deliver IT.
50© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. April 18, 2015
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 51
Thank you
Download our 2015 Security Study: The Cyber
Security Readiness of Canadian Organizations
Download Here: http://blog.scalar.ca/security-
study-2015
What’s Next?
© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
Connect with us!
© 2014 Scalar Decisions Inc. 53
facebook.com/scalardecisions
@scalardecisions linkedin.com/company/scalar-decisions
slideshare.net/scalardecisions

More Related Content

PDF
Cloud Perspectives - Ottawa Seminar - Oct 6
PDF
Scalar Security Roadshow April 2015
PDF
Scalar - a brief introduction
PDF
Thin Air or Solid Ground? Practical Cloud Security
PDF
How to Keep your Atlassian Cloud Secure
PDF
CSA Introduction 2013 David Ross
PPTX
Security and governance in the cloud
PDF
Cloud security design considerations
Cloud Perspectives - Ottawa Seminar - Oct 6
Scalar Security Roadshow April 2015
Scalar - a brief introduction
Thin Air or Solid Ground? Practical Cloud Security
How to Keep your Atlassian Cloud Secure
CSA Introduction 2013 David Ross
Security and governance in the cloud
Cloud security design considerations

What's hot (19)

PPT
Securing Servers in Public and Hybrid Clouds
PDF
Losing Control to the Cloud
PPSX
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
PDF
Digital Transformation
PDF
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
PDF
Cloud Security 101 by Madhav Chablani
PPTX
Accelerated Saa S Exec Briefing V2
PPTX
Security that works with, not against, your SaaS business
PPTX
GSS IT Infrastructure Transformation Services
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
PDF
Cloud security: Accelerating cloud adoption
PDF
Biznet Gio Presentation - Database Security
PDF
Ofer Maor - Security Automation in the SDLC - Real World Cases
PPTX
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
PDF
CSA Security Guidance Cloud Computing v3.0
PPTX
What is SASE and How Can Partners Talk About it?
PPTX
The evolution of IT in a cloud world
PDF
Cloud Adoption - Journey of IT Service Management
Securing Servers in Public and Hybrid Clouds
Losing Control to the Cloud
Robert Brzezinski - Office 365 Security & Compliance: Cloudy Collaboration......
Digital Transformation
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Cloud Security 101 by Madhav Chablani
Accelerated Saa S Exec Briefing V2
Security that works with, not against, your SaaS business
GSS IT Infrastructure Transformation Services
Secure your cloud applications by building solid foundations with enterprise ...
NIST Cybersecurity Framework (CSF) on the Public Cloud
Cloud security: Accelerating cloud adoption
Biznet Gio Presentation - Database Security
Ofer Maor - Security Automation in the SDLC - Real World Cases
Defending Threats Beyond DDoS Attacks: Featuring Guest Speaker from IDC
CSA Security Guidance Cloud Computing v3.0
What is SASE and How Can Partners Talk About it?
The evolution of IT in a cloud world
Cloud Adoption - Journey of IT Service Management
Ad

Viewers also liked (20)

PPTX
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
PPTX
Scalar Security Roadshow - Calgary Presentation
PDF
Vancouver security road show master deck final
PDF
Scalar Technical session - Network Functions Virtualization leveraging Brocade
PPT
Alfa Tech VestAsia 2012
PDF
Scalar customer case study: Rainmaker Entertainment
PPTX
Scalar Security Roadshow - Vancouver Presentation
PDF
Scalar Security Roadshow - Toronto Stop
PDF
Scalar Decisions: Emerging Trends and Technologies in Storage
PPTX
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
PPTX
12210943 pss7
PDF
Optimize IT Infrastructure
PDF
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
PDF
Calgary security road show master deck final
PDF
Keys to success and security in the cloud
PDF
Scalar Security Roadshow - Toronto Presentation
PDF
Scalar Decisions 2013 Overview
PDF
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
PDF
2016 Scalar Security Study Roadshow
PDF
4000 sf downtown dt
Task Incident Readiness with Veris, Judy Nowak at TASK Toronto, April 27, 2...
Scalar Security Roadshow - Calgary Presentation
Vancouver security road show master deck final
Scalar Technical session - Network Functions Virtualization leveraging Brocade
Alfa Tech VestAsia 2012
Scalar customer case study: Rainmaker Entertainment
Scalar Security Roadshow - Vancouver Presentation
Scalar Security Roadshow - Toronto Stop
Scalar Decisions: Emerging Trends and Technologies in Storage
Heather Enlow & Chris Ingram - Cybersecurity Act of 2015 and Other Hot Privac...
12210943 pss7
Optimize IT Infrastructure
Connect the Dots: Draw a Clear Picture of Social’s Impact on Business Results
Calgary security road show master deck final
Keys to success and security in the cloud
Scalar Security Roadshow - Toronto Presentation
Scalar Decisions 2013 Overview
Design Thinking: Beyond the Bounds of Your Own Head (a phenomenological persp...
2016 Scalar Security Study Roadshow
4000 sf downtown dt
Ad

Similar to Scalar Security Roadshow: Toronto Presentation - April 15, 2015 (20)

PPT
Core.co.enterprise.deck.06.16.10
PDF
Revolutionizing Advanced Threat Protection
PDF
From SIEM to SA: The Path Forward
 
PDF
DOCX
Overall Security Process Review CISC 6621Agend.docx
PDF
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
PPTX
Splunk for Enterprise Security featuring User Behavior Analytics
PDF
WhiteHat’s Website Security Statistics Report 2015
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
PPTX
Automation: Embracing the Future of SecOps
PPTX
Enterprise IT Security| CIO Innovation and Leadership
PPT
Ibm security overview 2012 jan-18 sellers deck
PDF
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
PDF
Jonathan raymond 2010 rotman telus - atlseccon2011
PDF
finalreportsoarnew (1).pdf
PDF
finalreportsoarnew.pdf
PPTX
SAM05_Barber PW (7-9-15)
PPT
SLVA - Security monitoring and reporting itweb workshop
PPTX
Bordless Breaches and Migrating Malware
Core.co.enterprise.deck.06.16.10
Revolutionizing Advanced Threat Protection
From SIEM to SA: The Path Forward
 
Overall Security Process Review CISC 6621Agend.docx
DETECTE E INVESTIGUE LAS AMENAZAS AVANZADAS
Splunk for Enterprise Security featuring User Behavior Analytics
WhiteHat’s Website Security Statistics Report 2015
Today's Cyber Challenges: Methodology to Secure Your Business
Endpoint (big) Data In The Age of Compromise, Ian Rainsburgh
Automation: Embracing the Future of SecOps
Enterprise IT Security| CIO Innovation and Leadership
Ibm security overview 2012 jan-18 sellers deck
2014 Threat Detection Checklist: Six ways to tell a criminal from a customer
 
Jonathan raymond 2010 rotman telus - atlseccon2011
finalreportsoarnew (1).pdf
finalreportsoarnew.pdf
SAM05_Barber PW (7-9-15)
SLVA - Security monitoring and reporting itweb workshop
Bordless Breaches and Migrating Malware

More from Scalar Decisions (20)

PPTX
La transformation numérique de Scalar
PDF
2017 Scalar Security Study Summary
PDF
Scalar cloud study2016_slideshare
PDF
Résumé de l’étude sur la sécurité de Scalar 2016
PDF
Executive Summary of the 2016 Scalar Security Study
PDF
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PDF
Web scale with-nutanix_rev
PDF
Cloudforms Workshop
PDF
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
PDF
PDF
Hyperconverged Infrastructure: The Leading Edge of Virtualization
PDF
The road to clustered data ontap.
PDF
The Cyber Security Readiness of Canadian Organizations
PDF
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
PDF
Cyber Security trends and tactics for 2015
PDF
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
PDF
Scalar Security Roadshow - Ottawa Presentation
PDF
Sheridan College: Scalar Customer Case Study
PDF
City of Airdrie: Scalar Customer Case Study
La transformation numérique de Scalar
2017 Scalar Security Study Summary
Scalar cloud study2016_slideshare
Résumé de l’étude sur la sécurité de Scalar 2016
Executive Summary of the 2016 Scalar Security Study
2016 Scalar Security Study: The Cyber Security Readiness of Canadian Organiza...
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Web scale with-nutanix_rev
Cloudforms Workshop
Scalar Case Study: Strong Project Management Helps McMaster University Succes...
Hyperconverged Infrastructure: The Leading Edge of Virtualization
The road to clustered data ontap.
The Cyber Security Readiness of Canadian Organizations
Where Technology Meets Medicine: SickKids High Performance Computing Data Centre
Cyber Security trends and tactics for 2015
Scalar Customer Case Study: Toronto 2015 Pan Am/Parapan Am Games
Scalar Security Roadshow - Ottawa Presentation
Sheridan College: Scalar Customer Case Study
City of Airdrie: Scalar Customer Case Study

Recently uploaded (20)

PDF
SaaS reusability assessment using machine learning techniques
PDF
Comparative analysis of machine learning models for fake news detection in so...
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PPTX
future_of_ai_comprehensive_20250822032121.pptx
PDF
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PPTX
Training Program for knowledge in solar cell and solar industry
PPTX
SGT Report The Beast Plan and Cyberphysical Systems of Control
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PPTX
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
SaaS reusability assessment using machine learning techniques
Comparative analysis of machine learning models for fake news detection in so...
Convolutional neural network based encoder-decoder for efficient real-time ob...
future_of_ai_comprehensive_20250822032121.pptx
Aug23rd - Mulesoft Community Workshop - Hyd, India.pdf
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
Training Program for knowledge in solar cell and solar industry
SGT Report The Beast Plan and Cyberphysical Systems of Control
Introduction to MCP and A2A Protocols: Enabling Agent Communication
giants, standing on the shoulders of - by Daniel Stenberg
Dell Pro Micro: Speed customer interactions, patient processing, and learning...
NewMind AI Weekly Chronicles – August ’25 Week IV
agenticai-neweraofintelligence-250529192801-1b5e6870.pptx
Advancing precision in air quality forecasting through machine learning integ...
Lung cancer patients survival prediction using outlier detection and optimize...
Rapid Prototyping: A lecture on prototyping techniques for interface design
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Basics of Cloud Computing - Cloud Ecosystem
Auditboard EB SOX Playbook 2023 edition.
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf

Scalar Security Roadshow: Toronto Presentation - April 15, 2015

  • 1. Scalar Security Roadshow April 15, 2015 © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 1
  • 2. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 2 Vancouver Calgary Toronto Ottawa London Montreal 100%
  • 3. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 3 We studied the Canadian market Believe they are winning the CyberSecurity war Suffered a breach leading to loss or disclosure of sensitive data Average annual number of attacks Average cost to address a security breach 41% 46% 34 $200,000
  • 4. •  Security is more complicated than ever; hackers are funded and motivated •  Many organizations struggle to understand and effectively control security risk •  Traditional security approaches have not been effective •  Companies who invest in security are still suffering catastrophic breaches Traditional Approaches Have Failed © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
  • 5. “Good Enough” always fails © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
  • 6. •  Are more aware of the threat landscape •  Have a higher percentage of their IT budget dedicated to security •  Invest in cutting edge technologies •  Measure the ROI of those technologies •  And have a security strategy that is aligned with their business objectives and mission High-performers – 25% less breaches © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
  • 7. Be more aware of threats and align your security strategy with business objectives. Build effective security programs to protect critical assets. Design and build robust security solutions using leading technologies that provide visibility understanding and control. Develop or acquire expertise to monitor and respond to security events. Continuously validate the effectiveness of security controls. What do Top Performers do? Prepare Respond Defend © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
  • 8. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 8 Winning The War •  Addressing business risk •  Effective reduction of attack surface •  Understandable and actionable security intelligence •  Rapid incident containment and response •  Continuous validation and meaningful reporting
  • 9. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 9 Today’s Agenda
  • 11. Security Architecture 1.0… Traditional Security Technologies ANY CO. PLC usDon’t stop next generation threats
  • 12. Endpoint: The Path of Least Resistance THREAT TARGETS DESKTOPS USERS WINDOWS 7 WINDOWS 8.1 LAPTOPS INTERNET EXPLORER The key security threat channels are Web and Email. The key threat vectors are web-links and downloaded files. Your security posture is significantly improved by negating the key security issues of users clicking malicious web- links and opening infected attachments Prioritize Focus THREAT VECTORS VIDEOS PICTURES DOCUMENTS WEBLINKS MAIL WEB THREAT CHANNELS
  • 13. The Business Problem: The Bromium Cure SECURE WEB BROWSING SECURE EMAIL SECURITY PATCHING
  • 14. Endpoint Isolation Technology How It Works – Bromium ISOLATED. PROTECTED.DISRUPTIVE DAMAGING HARDWARE OS KERNEL Untrusted user tasks and any malware are isolated in a super-efficient micro-VM. All micro-VMs destroyed, eliminating all traces of malware with them. Hardware-isolated micro-VMs
  • 15. Why Bromium? Open Anything, From Anyone, Anywhere…
  • 17. WhiteHat Security Application Testing Rob Stonehouse, CISSP Chief Security Architect © 2014 Scalar Decisions Inc. Not for distribution outside of intended audience. 17
  • 18. About WhiteHat Security •  Application security testing leader in Gartner Magic Quadrant •  HQ in Santa Clara, California •  Employees: 300 •  Customers: 650+ •  Sites under management: 30,000+ 18
  • 19. SAST - “Sentinel Source” Static Testing •  Integrates into your development process •  Directly connects to source code repository •  Designed for Agile •  Your code stays onsite •  Verified vulnerabilities avoid false positives •  Assesses partial code, as often as needed 19
  • 20. Sentinel Mobile - Secure Mobile Devices §  Assesses both iOS and Android applications §  Tests native mobile code and server-side APIs §  Identifies critical vulnerabilities including OWASP Mobile Top 10 §  Verified findings: Zero false positives reduce overhead for developers Results prioritized by risk §  Covers traffic analysis between client and server-side
  • 21. DAST – Dynamic Application Testing •  Non-intrusive, non-disruptive, 24x7 coverage •  Meets and exceeds PCI 6.5/6.6 requirements •  Full service and support included in all offerings •  Unlimited retests, integration support, and remediation guidance at no additional charge •  Persistent, consistent testing and results Cross-site scripting Credential/Session Prediction Weak Password Recovery Validation Information Leakage Brute Force SQL Injection Insufficient Authentication
  • 22. Application Security Lifecycle Integrated Application Security Lifecycle Software Development Lifecycle SAST 22
  • 23. How to Remediate Vulnerabilities? Continuous Testing •  Full SDLC coverage: training, development, QA, and production •  Stop using Tiger teams! Expert hands-on guidance from the Threat Research Center •  100% verified vulnerabilities, 0 false positives •  150+ security engineers available by phone/email/WebEx Retest, Retest, Retest •  Trending of vulnerabilities across time and continuous assessment of deployment
  • 24. How Deep to Test? §  Sentinel PE (Fully Targeted / High Risk) •  Ideal for high impact sites with sensitive user and financial information •  Technical and business logic vulnerabilities, complete WASC v2 §  Baseline Edition (Static Webpages) •  Unauthenticated, Verified Results §  Standard Edition (Directed/Opportunistic) •  Custom configured logins and multi-step sequences •  Comprehensive coverage for technical vulnerabilities
  • 27. 27
  • 30. Flexible Reporting §  Web & PDF Based §  Bi-Directional XML API §  Integration with popular technologies like Jira, Archer, F5 & Imperva
  • 31. Command Execution §  Buffer Overflow §  Format String Attack §  LDAP Injection §  OS Commanding §  SQL Injection §  SSI Injection §  XPath Injection Information Disclosure §  Directory Indexing §  Information Leakage §  Path Traversal §  Predictable Resource Location Business Logic: Hands-on Inspection Authentication §  Brute Force §  Insufficient Authentication §  Weak Password Recovery Validation Authorization §  Credential/Session Prediction §  Insufficient Authorization §  Insufficient Session Expiration §  Session Fixation Logical Attacks §  Abuse of Functionality §  Insufficient Anti-automation §  Insufficient Process Validation Premium Edition Baseline Edition Standard Edition WhiteHat Sentinel Vulnerability Coverage Client-Side §  Content Spoofing §  Cross-site Scripting §  HTTP Response Splitting §  Insecure Content
  • 32. Protecting the Network with LogRhythm Nyron Samaroo, Security Architect © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 32
  • 33. Introduction Questions: •  What is SIEM? © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 33 Answers: •  Security Information and Event Management (SIEM) is a tool used to gather and report on security information. •  Who is LogRhythm? •  LogRhythm is a global leader in security intelligence and analytics empowering organizations to rapidly detect, respond and neutralize cyber threats. Their Security Intelligence platform unifies next-gen SIEM, log management, network and endpoint forensics, and advanced security analytics. •  How will LogRhythm defend my network? •  Through the process of Intelligent and Behavioral Analytics LogRhythm is capable of detecting and protecting in near real-time security events not just on the network but on critical assets residing on the network.
  • 34. LogRhythm in Motion © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 34 LogRhythm Agents Workstations and Servers Archiving AI Engine Log Manager LogRhythm Personal Dashboard / Web UI Event Manager Network Devices Identification Classification Normalization Prioritization Aggregation Events Console Reporting Alarming Configuration Behavior Analytics / Advanced Correlation
  • 35. The Platform for Security Intelligence © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 35 Input Analytics Output
  • 36. LogRhythm System Monitor © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 36 Host Activity Monitoring •  Independently collects forensic detail •  Ideal for hosts with sensitive data or critical applications •  Support for Microsoft, Linux, and Unix platforms File Integrity and Windows Registry Monitoring •  Meet Compliance Requirements •  Recognize “who” performed unauthorized file changes or moves •  Build whitelists for recognizing malware or blacklists of undesired applications •  Identify new, non-whitelisted network services •  Detect anomalous network activity indicating data exfiltration or botnet C&C •  Monitor unauthorized data movement to prevent data theft Process Monitoring Network Connection Monitoring Data Loss Defender
  • 37. LogRhythm Network Monitor © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 37 1.  True Application Identification for over 2800 applications 2.  SmartFlow™: Search and analyze packet data from each network session up to Layer7 3.  SmartCapture™: Full or selective packet capture for deeper forensic analysis Google Docs PostGres SMTP Facebook Apps TorSkype DropBox XBoxLive AWS BitTorrent GoToDevice Gmail Source IP: 192.168.12.59 Destination IP: 192.168.2.84 Command: smb2 change Filename: SethMy Documents todayspreso.ppt Path: serverfileUsers ApplicationPath: /tcp/netbios/smb Login: seth.goldhammer Bytes: 4.52 Mb Time Start: 2013/10/10 19:30:38 Time Updated: 2013/10/10 ……………… Samba Source IP: 192.168.12.59 Destination IP: 192.168.18.2 Sender: [email protected] Receiver: [email protected] Attachment File Name: SethMy Docs employeedata.txt Mime Type: http/text Bytes: 4.52 Mb Time Start: 2013/10/10 19:30:38 Time Updated: 2013/10/10 ………………
  • 38. Real-time Forensic Monitoring © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 38 System Monitoring •  Capture host activities not represented by log data •  Gain deep visibility on valuable hosts, sensitive data Network Monitoring •  Capture network activities not captured by standard flow data •  Recognize applications and perform Deep Packet Inspection (DPI) on all network traffic Independent collection of forensic detail is CRITICAL for recognizing high risk activities
  • 39. The Platform for Security Intelligence © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 39 Input Analytics Output
  • 40. Data Classification © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 40 • LogRhythm not only structures incoming data but adds contextual information such as: • Classification • Common Event • Risk Score • Reduces time required for analysis and ensures query results are complete • Provides deep intelligence on more than 600 different systems, devices, apps, databases, etc. • 20-30 added each quarter Confidential Information 0 100 200 300 400 500 600 700 Total Customer Relations Management Data Loss Prevention File Integrity Monitor Network Controllers Unified Threat Managers UPS Anti-Spam Physical Security Encryption Wireless Access Management Vulnerability Assessment Directory Services Point-Of-Sale VOIP Storage Virtualization Wireless Access Point Remote Access VPN E-Mail Security Load Balancers Content Inspection/Filters Routers Anti-Virus Email Servers Switch Access Control Other Databases Web Servers Network Management IDS/IPS Firewalls Applications Operating Systems
  • 41. Scenario Building Blocks © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 41 Log  Observed   Log  Not  Observed   Log  Not  Observed   Scheduled   Threshold  Observed   Threshold  Not  Observed   Threshold  Not  Observed   Scheduled   Unique  Value  Observed   Unique  Value     Not  Observed   Unique  Value  Not   Observed  Scheduled   Whitelist   Trend   Sta;s;cal  
  • 42. Scenario Examples © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 42 Log  Observed   Log  Observed   Account  Created   Account  Deleted   Account=Account   Short  ;me  period   Log  Observed   Log  Not  Observed   Secure  Panel  Accessed   No  Badge  Swipe   Short  ;me  period  before   Detec%ng  Temporary  Accounts   Detec%ng  Forced  Physical  Access  
  • 43. Complex Scenario © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 43 Trend   Abnormal  Access  and  Authen%ca%on  Failures     Log  count   comparison  of   auth  and  access   failures  per  user   Trend   Abnormal  Authen%ca%on  Behavior   Histogram  of  auth   success  and   failures  per  user   Trend   Abnormal  Authen%ca%on  Loca%ons   Histogram  of  auth   success  loca;ons   per  user   Unique  Value  Observed   Same  user   with  mul;ple   anomalies   Event  Loop  Back  
  • 44. The Platform for Security Intelligence © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 44 Input Analytics Output
  • 45. Smart Response (closing the loop) © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 45 SmartResponse™ delivers immediate action on real-world issues, such as when suspicious behavior patterns are detected, specific internal or compliance-driven policies are violated, or critical performance thresholds are crossed. •  Pull Attacking IP from Alarm and add to firewall ACL. Terminating dangerous access to network •  Suspend or remove newly added or recently modified privileged user account until activity is verified as legitimate •  Remove suspicious users from network during investigative period •  Restart operational processes from alarms
  • 46. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 46 Analytics Driven Defense Modules
  • 47. Privileged User Monitoring © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 47 Use Case: Detect a rogue administrator account Details: Identify when a privileged user is abusing authority, indicating either insider threat activity or compromised credentials AIE Rules look for: •  New Admin Activity •  Mass Object Deletion •  Users added to privileged group •  Recently disabled privileged account activity
  • 48. Retail Cyber Crime Module © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 48 Use Case: Detect Compromised Back Office Systems Details: Identify suspicious changes on back office systems and the network activity they generate. AIE Rules look for: •  New processes •  New authentications •  New FIM access events •  Any FIM modification event •  Any DLD Activity •  New Common Event •  New Network Activity
  • 49. Analytics Modules © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 49 Rapid-Time to-Value Knowledge •  Industry  experts   •  Machine  Data   Intelligence   •  Security   •  Compliance     •  Advanced  Threat  Research   •  Embedded  Exper;se   •  Ready-­‐to-­‐use  content   •  Frequent,  automa;c   updates   •  Knowledge  aligned  to   organiza;onal  goals   •  Quick  benefit   recogni;on   •  Ongoing  addi;onal  value  
  • 50. We deliver IT. 50© 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. April 18, 2015
  • 51. © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience. 51 Thank you
  • 52. Download our 2015 Security Study: The Cyber Security Readiness of Canadian Organizations Download Here: http://blog.scalar.ca/security- study-2015 What’s Next? © 2015 Scalar Decisions Inc. Not for distribution outside of intended audience.
  • 53. Connect with us! © 2014 Scalar Decisions Inc. 53 facebook.com/scalardecisions @scalardecisions linkedin.com/company/scalar-decisions slideshare.net/scalardecisions