Multinational Cybersecurity
Partnerships & Alliances:
Building & Managing a Comprehensive
Computer Incident Response Capability
Outline of our talk
Outline
 Introductions
 Starting with Protection & Defence
 Scope and ambition of CIRC
 Approach to tooling
 The need for collaboration
February 2012
British led
consortium
28 Nations 22,000 users
October 2013
FOC
We help clients that are key national organisations
The risks our clients run from data loss, theft or cyber
attack are serious to existential
Ability to recover
Human Safety
Accreditation Status
Reputation
Financial control
Ability to perform
Intellectual Property
Drives the nature and extent of
measures required to achieve
desired security
The services we provide
depend on the problem we find
level of threat
level of vulnerability
Understanding the threat
actors, methods and history
Understanding the technical
vulnerabilities and
weaknesses in security
governance and user habits
Extent of security measures required
X
=
Assess Confirm
Competitive Advantage. Information Superiority.
Aware,
Deter,
Detect
&
Resist,
DefendAssure
Audit
Discovery
Health Checks
Policy
Training
Accreditation support
Design, build, operate
Secure systems
Protective
Monitoring
Services
Respond
Investigation
Forensics
Protect
Implement
Selex ES cyber services are a coherent set,
designed to address threats and resolve
vulnerabilities
Ensure:
The Mission
Protect:
The Data
Continuously monitor:
The Network
Northrop Grumman Approach to Cybersecurity
Full Dimensional Assurance Blueprint
People and Processes Technology
 Enhanced automation
 Temporal improvement
 Information protection strategy
 Risk based approach
 Data centric protection
 Application integrity
 Adaptive architecture
 Continuous situation awareness & response
Integrated and Continual Improvements
It’s how we view our job for our networks and our customer’s networks
The Northrop Grumman
Cybersecurity Operations Center (CSOC)
9
Computer Network Defense Activities:
1. Monitoring
o Monitors the NGGN and related devices for signs of malicious
activity
2. Vulnerability Management
o Security risks and ensuring appropriate remediation
3. Patch Management
o Rapid deployment of vendor provided fixes to identified
vulnerabilities
4. Forensics
o Information security post-incident analysis
5. Incident Response
o Rapid response to malicious activity on the NGGN and related
environments
6. Cyber Threat
o Analysis of emerging threats to the NGGN and related environments
7. Sector
o Sector-specific computer network defense requirements
LD-CA-BOK-004, Rev. 16, March 2013, ISHQ-2013-0024
Don’t start by building a CIRC
Instead, analyse your enterprise vulnerabilites:
 People- yours, your suppliers and partners and your
customers
 Processes
 Organisation
 Leadership and governance
 Physical sites
 Data
 Applications
 Information and telecoms infrastructure and bought-
in services
 Your security maturity (e.g. ISO 27001)
Getting the house in order
Probably not enough:
Implementation of an appropriate defensive suite:
 automated vulnerability scanning
 ICT infrastructure and systems log collation and
storage
 IDS/IPS and associated log collection
 potentially, a spectrum of active protective
monitoring:
o Security Information and Event
Management
o Full Packet Capture
o Deep Packet Inspection
o associated management, storage and
alerting / reporting service level
Credit: Active Audit Agency: Ukraine
Scope and ambition
Assuming your vulnerabilities are managed,
it depends on the threat you face and your
freedom of movement
Typical Threat World
(Offense)
Time
Attacker Surveillance
Access
Probe
Target
Analysis
Attack
Set-up
Performing
Reconnaissance
Attack
Begins
System
Intrusion
Affecting
The
Attack
Attack
Complete
Packaging
Exfiltration
Modification
Executing
The
Mission
Cover-up
Complete
Covering
The
Tracks
LD-CA-BOK-004, Rev. 16, March 2013, ISHQ-2013-0024
Attack
Forecast
Physical
Security
Intrusion
Detection
Analysis
Begins
System
ReactionDamage
Identification
Recovery
Defender Reconnaissance
Entry
Monitoring &
Control
Impact
Analysis
Response
Threat
Analysis
Attack
Identified
Time
Preparing the
Defense
Monitoring
For an Attack
Triage and
Situation
Assessment
After
Action
LD-CA-BOK-004, Rev. 16, March 2013, ISHQ-2013-0024
Typical Threat World
(Defense)
It Doesn’t Always Line Up
Attacker Free Time
Recovery
Attack
Forecast
Physical
Security
Intrusion
Detection
Analysis
Begins System
ReactionDamage
Identification
Defender Reconnaissance
Entry
Monitoring
& Control
Impact
Analysis
Response
Threat
Analysis Attack
Identified
Time
Defender Action
Time
Time
Attack
Begins
System
Intrusion
Attacker Surveillance
Access
Probe
Attack
Complete
Target
Analysis
Attack
Set-up
Packaging
Exfiltration
Modification
Cover-up
Complete
Reduce
This
By moving/shrinking this
LD-CA-BOK-004,
Rev. 16, March 2013, ISHQ-2013-0024
Factors affecting your respond
posture:
Your legal entitlement – you have heard this today!
Cost of maintaining the capability
The return on investment you would expect (consider insurance!)
Approach to tooling
Detection
Incident management
Analysis
Active response or reporting to Authority
Evidence management
Not forgetting the people!
Layered Cybersecurity
Defense Framework
Computer Network Defense
Defense-In-Depth
The FanTM
Perimeter
Firewall
Perimeter
IDS/IPS
Advanced
Sensor
Honeypot
Message Security
(anti-virus, anti-malware)
DLP
Secure DMZs
Application Security
Malware
Analysis
NAC/Endpoint
Profiler
Enclave
Firewall DLP
Wireless/Mobile
Protection
Web Proxy
Content Filtering
Enterprise
IDS/IPS
VoIP
Protection
Virtual Network
Security
Enterprise
Message Security
Enterprise
Remote
Access
Endpoint Security
Enforcement
DLP
Desktop
Firewall
Host IDS/IPS
Content Security
(anti-virus,
anti-malware)
Patch
Management
USGCB
Compliance
SIEM Digital Forensics Security SLA/SLO Reporting
Escalation
Management
Focused Ops
SOC/NOC Monitoring (24x7)
Incident Reporting,
Detection, Response (CIRT)
Security Dashboard
Continuous
Monitoring
and Assessment
Situational
AwarenessVulnerability
Assessment
Security Awareness
Training
Continuous
C&A
IT Security
Governance
Security Policies
& Compliance
Security
Architecture
& Design
Threat
Modeling
Penetration
Testing
Cyber Threat Intelligence
Security
Technology Evaluation
Risk Management
Framework
WAF
Static App
Testing/Code
Review
Database
Secure Gateway
(Shield)
Database
Monitoring /Scanning
Dynamic App Testing
DAR/DIM/DIU
Protection
Data Wiping
Cleansing
PKI
FICAM
Enterprise Right
Management
DLP
Data
Classification
Data/Drive
Encryption
Data Integrity
Monitoring
© 2013 Northrop Grumman Corporation
Acronyms & Abbreviations:
DAR: Data At Rest
DIM: Data In Motion
DIU: Data In Use
DLP: Data Loss Prevention
IDP: Intrusion Detection and Prevention
FICAM: Federal Identity Credential and
Access Management
NAC: Network Access Control
PKI: Public Key Infrastructure
SIEM: Security Information Event Management
USGCB: US Govt Configuration Baseline
OUTSIDE THREAT
Mission
Critical Assets
Inside Threats
The “Fan™” - Layered Cybersecurity Defensive Reference
Model
Why COTS Security Will Always Be a Step Behind
19
Well funded adversaries have access to the same technologies as the defenders
Advanced Adversaries’ Attack Tool
Test Environment
Defender’s COTS-based Security
Architecture
Good Guys Have Some Ways to Level the Field
 Behavioral analytics (Who talks and works
with who)
 Partnerships for threat information sharing
 Threat intelligence team augmentation
 Custom file analysis
 Custom monitoring of network traffic for
C2 channels
 Organizational agility to respond to
changing threat tactics
Perimeter
Firewall
Perimeter
IDS/IPS Advanced
Sensor
Honeypot
Message Security
(anti-virus, anti-malware)
DLP
Secure DMZs
Application Security
Malware
AnalysisNAC/Endpoint
Profiler
Enclave
Firewall
DLP
Wireless/Mobile
Protection
Web Proxy
Content Filtering
Enterprise
IDS/IPS
VoIP
Protection
Virtual Network
Security
Enterprise
Message Security
Enterprise
Remote
Access
Endpoint Security
Enforcement
DLP
Desktop
Firewall
Host IDS/IPS
Content Security
(anti-virus,
anti-malware)
Patch
Management
USGCB
Compliance
SIEM Digital Forensics Security SLA/SLO Reporting
Escalation
Management
Focused Ops
SOC/NOC Monitoring (24x7)
IncidentReporting,
Detection, Response (CIRT)
Security Dashboard
Continuous
Monitoring
and Assessment
Situational
Awareness
Vulnerability
Assessment
Security Awareness
Training
Continuous
C&A
IT Security
Governance
Security Policies
& Compliance
Security
Architecture
& Design
Threat
Modeling
Penetration
Testing
Cyber Threat Intelligence
Security
Technology Evaluation
Risk Management
Framework
WAF
Static App
Testing/Code
Review
Database
Secure Gateway
(Shield)
Database
Monitoring /Scanning
Dynamic App Testing
DAR/DIM/DIU
Protection
Data Wiping
Cleansing
PKI
FICAM
Enterprise Right
Management
DLP
Data
Classification
Data/Drive
Encryption
Data Integrity
Monitoring
Mission
CriticalAssets
Defenders Have to Be Right Every Time… The Field Can Be Leveled
by Leveraging Information Available Only to the Defender
The need for collaboration
The value of developing and sharing
intelligence, securely
The common theme across EU, NATO, other
nations and Industry bodies globally
Towards Cyber Systems Interoperability:
STIX: Structured Threat Information eXpression Language
Associated Campaigns[*]
HistoricalCampaigns[*]
AssociatedActors[*]
RelatedIncidents[*]
RelatedThreatActors[*]
PotentialCOAs[*]
ExploitTargets[*]
LeveragedTTPs[*]
RelatedIndicators[*
]
RelatedTTPs[*]
RelatedIndicators[*]
Related Indicators[*]
ObservedTTPs[*]
Attribution[*]
RelatedTTPs[*] IndicatedTTPs[*]
Observables[*]
Sub-Observables[*]
RelatedIncidents[*]
COATaken[*]
COARequested[*]
SuggestedCOA[*]
Campaign
TTP
Threat
Actor
Exploit
Target
COA
Incident
ObservableIndicator
Source:
MITRE Structured Threat Information eXpression (STIX) v.1.0
Source: CJCS/NATO Joint Terminology for Cyberspace Operations

More Related Content

PPTX
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
PPTX
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
PPTX
Summer internship - Cybersecurity
PPTX
Cyber Security Professionals Viewed via Supply Chain
PDF
Whitepaper Avira about Artificial Intelligence to cyber security
PPTX
Three trends in cybersecurity
PPT
The Future of Cyber Security
PDF
Sizing the Cyber Skills Gap
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
NUS-ISS Learning Day 2017 - Security Dynamics - Moving IoT and Beyond
Summer internship - Cybersecurity
Cyber Security Professionals Viewed via Supply Chain
Whitepaper Avira about Artificial Intelligence to cyber security
Three trends in cybersecurity
The Future of Cyber Security
Sizing the Cyber Skills Gap

What's hot (20)

PDF
Etude sur le marché de la cyber sécurité (2011)
PDF
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
PPT
Breaking down the cyber security framework closing critical it security gaps
PPSX
Cyber security & Data Protection
PPTX
2016 - Cyber Security for the Public Sector
PPTX
Navigating Cybersecurity
PPT
Challenges in implementating cyber security
PDF
Combating Cyber Security Using Artificial Intelligence
PPTX
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
PDF
NATO Cyber Security Conference: Creating IT-Security Start-Ups
PDF
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
PDF
Cybersecurity concepts & Defense best practises
PPT
Introduction to Cyber Security
PDF
Cyber Risk Management in 2017: Challenges & Recommendations
PPTX
Cyber Security in AI (Artificial Intelligence)
PPTX
cybersecurity strategy planning in the banking sector
PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
PDF
A Strategy for Addressing Cyber Security Challenges
PDF
Outlook Briefing 2016: Cyber Security
PDF
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Etude sur le marché de la cyber sécurité (2011)
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
Breaking down the cyber security framework closing critical it security gaps
Cyber security & Data Protection
2016 - Cyber Security for the Public Sector
Navigating Cybersecurity
Challenges in implementating cyber security
Combating Cyber Security Using Artificial Intelligence
[CB21] Keynote1:Shaking the Cybersecurity Kaleidoscope – An Immersive Look in...
NATO Cyber Security Conference: Creating IT-Security Start-Ups
[4YFN]Cyber Security Innovation, an urgent call to cyber heroes SM
Cybersecurity concepts & Defense best practises
Introduction to Cyber Security
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Security in AI (Artificial Intelligence)
cybersecurity strategy planning in the banking sector
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
A Strategy for Addressing Cyber Security Challenges
Outlook Briefing 2016: Cyber Security
Cyber Security For Organization Proposal PowerPoint Presentation Slides
Ad

Viewers also liked (18)

DOC
9 класс итог за 8
PDF
Izolacje przeciwogniowe
DOC
News SA 47 2015
PDF
CFO-Asia presentation for Nov16, 2006
PDF
9789862218723
DOC
Programa jjm
PDF
9543 Zadanie 3
PDF
9789862218860
PDF
Desdobravel Pais/EE set_2011
PDF
Acordo ortográfico
PPTX
Secondary Research
PDF
Planif criterios alunos_breve
PPTX
Lecture 1: Urban & Regional Planning (Risk Mitigation Concept)
PPS
La legión española
PDF
小詩磨坊:泰華卷(2)
DOCX
Программа 95 лет
9 класс итог за 8
Izolacje przeciwogniowe
News SA 47 2015
CFO-Asia presentation for Nov16, 2006
9789862218723
Programa jjm
9543 Zadanie 3
9789862218860
Desdobravel Pais/EE set_2011
Acordo ortográfico
Secondary Research
Planif criterios alunos_breve
Lecture 1: Urban & Regional Planning (Risk Mitigation Concept)
La legión española
小詩磨坊:泰華卷(2)
Программа 95 лет
Ad

Similar to Selex ES at Le Bourget 2013 Cyber Partnership (20)

PPTX
New Developments in Cybersecurity and Technology for RDOs: Howland
PPT
IBM Security Strategy Intelligence,
PDF
Mobile Security Training, Mobile Device Security Training
PDF
WSO2CON 2024 - How to Run a Security Program
PPTX
IMPORTANCE OF IN THE WORLD Cyber security.pptx
PDF
5 Essential Network Security Strategies to Defend Against Modern Cyberattacks...
PPTX
Best cyber security course in Jalandhar, PUNJAB
PPT
IBM security systems overview v1.0 - rohit nagarajan
PDF
What is Cyber Security_ The Different Types of Cybersecurity.pdf
PPT
Integrating Physical And Logical Security
PPT
Security Overview - Updates and Trends In Detail
PDF
best cyber security course in Jalandhar , PUNJAB
PPTX
Database development and security certification and accreditation plan pitwg
DOCX
Security architecture principles isys 0575general att
PDF
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
PDF
Cyber Security | Information Security
PDF
Top 10 Cybersecurity Trends in 2024: Benefits, Challenges | Insider Market Re...
PPT
Security_Updates_cybersecuirty ppt presentation.ppt
PDF
8 Top Cybersecurity Tools.pdf
PPTX
SHIELD_overview_presentation_INFOCOM2018.pptx
New Developments in Cybersecurity and Technology for RDOs: Howland
IBM Security Strategy Intelligence,
Mobile Security Training, Mobile Device Security Training
WSO2CON 2024 - How to Run a Security Program
IMPORTANCE OF IN THE WORLD Cyber security.pptx
5 Essential Network Security Strategies to Defend Against Modern Cyberattacks...
Best cyber security course in Jalandhar, PUNJAB
IBM security systems overview v1.0 - rohit nagarajan
What is Cyber Security_ The Different Types of Cybersecurity.pdf
Integrating Physical And Logical Security
Security Overview - Updates and Trends In Detail
best cyber security course in Jalandhar , PUNJAB
Database development and security certification and accreditation plan pitwg
Security architecture principles isys 0575general att
Segurança da Informação e Estrutura de Redes - Café Empresarial 15/05
Cyber Security | Information Security
Top 10 Cybersecurity Trends in 2024: Benefits, Challenges | Insider Market Re...
Security_Updates_cybersecuirty ppt presentation.ppt
8 Top Cybersecurity Tools.pdf
SHIELD_overview_presentation_INFOCOM2018.pptx

More from Leonardo (20)

PDF
Leonardo 1H 2025 Results Presentation - July 30, 2025
PDF
The Leonardo 1Q 2025 Results Presentation
PDF
Leonardo Industrial Plan 2025 Update (2025-2029)
PDF
Leonardo FY 2024 Preliminary Results Presentation
PDF
Leonardo 3Q/9M 2024 Results Presentation
PDF
Leonardo 2Q/1H 2024 Results Presentation
PDF
The Leonardo 1Q 2024 Results Presentation
PDF
Leonardo - Technologies for a Safer Future.pdf
PDF
The Leonardo FY 2023 Preliminary Results Presentation
PDF
Leonardo 3Q/9M Results Presentation
PDF
Leonardo 1H 2023 Results
PDF
Leonardo 1Q 2023 Results
PDF
Leonardo FY 2022 Results
PDF
Leonardo 3Q/9M 2022 Results
PDF
Leonardo 2Q/1H2022 Results Presentation
PDF
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
PDF
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
PDF
Leonardo 1Q 2022 Results
PDF
Leonardo FY2021 Results
PDF
European Rotors - Certification by Simulation
Leonardo 1H 2025 Results Presentation - July 30, 2025
The Leonardo 1Q 2025 Results Presentation
Leonardo Industrial Plan 2025 Update (2025-2029)
Leonardo FY 2024 Preliminary Results Presentation
Leonardo 3Q/9M 2024 Results Presentation
Leonardo 2Q/1H 2024 Results Presentation
The Leonardo 1Q 2024 Results Presentation
Leonardo - Technologies for a Safer Future.pdf
The Leonardo FY 2023 Preliminary Results Presentation
Leonardo 3Q/9M Results Presentation
Leonardo 1H 2023 Results
Leonardo 1Q 2023 Results
Leonardo FY 2022 Results
Leonardo 3Q/9M 2022 Results
Leonardo 2Q/1H2022 Results Presentation
1st Leonardo Helicopters SAR Workshop - AW139 SAR Overview and Updates
1st Leonardo Helicopters SAR Workshop - Training Services & Solutions for SAR...
Leonardo 1Q 2022 Results
Leonardo FY2021 Results
European Rotors - Certification by Simulation

Recently uploaded (20)

PDF
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Auditboard EB SOX Playbook 2023 edition.
PPTX
Presentation - Principles of Instructional Design.pptx
PDF
Human Computer Interaction Miterm Lesson
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
PDF
Rapid Prototyping: A lecture on prototyping techniques for interface design
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PPTX
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
PDF
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
LMS bot: enhanced learning management systems for improved student learning e...
PDF
The AI Revolution in Customer Service - 2025
PDF
4 layer Arch & Reference Arch of IoT.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PDF
Connector Corner: Transform Unstructured Documents with Agentic Automation
PDF
Early detection and classification of bone marrow changes in lumbar vertebrae...
ment.tech-Siri Delay Opens AI Startup Opportunity in 2025.pdf
Introduction to MCP and A2A Protocols: Enabling Agent Communication
Co-training pseudo-labeling for text classification with support vector machi...
Auditboard EB SOX Playbook 2023 edition.
Presentation - Principles of Instructional Design.pptx
Human Computer Interaction Miterm Lesson
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Rapid Prototyping: A lecture on prototyping techniques for interface design
Electrocardiogram sequences data analytics and classification using unsupervi...
AI-driven Assurance Across Your End-to-end Network With ThousandEyes
CXOs-Are-you-still-doing-manual-DevOps-in-the-age-of-AI.pdf
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Data Virtualization in Action: Scaling APIs and Apps with FME
Module 1 Introduction to Web Programming .pptx
LMS bot: enhanced learning management systems for improved student learning e...
The AI Revolution in Customer Service - 2025
4 layer Arch & Reference Arch of IoT.pdf
Advancing precision in air quality forecasting through machine learning integ...
Connector Corner: Transform Unstructured Documents with Agentic Automation
Early detection and classification of bone marrow changes in lumbar vertebrae...

Selex ES at Le Bourget 2013 Cyber Partnership

  • 1. Multinational Cybersecurity Partnerships & Alliances: Building & Managing a Comprehensive Computer Incident Response Capability
  • 2. Outline of our talk Outline  Introductions  Starting with Protection & Defence  Scope and ambition of CIRC  Approach to tooling  The need for collaboration
  • 3. February 2012 British led consortium 28 Nations 22,000 users October 2013 FOC
  • 4. We help clients that are key national organisations
  • 5. The risks our clients run from data loss, theft or cyber attack are serious to existential Ability to recover Human Safety Accreditation Status Reputation Financial control Ability to perform Intellectual Property
  • 6. Drives the nature and extent of measures required to achieve desired security The services we provide depend on the problem we find level of threat level of vulnerability Understanding the threat actors, methods and history Understanding the technical vulnerabilities and weaknesses in security governance and user habits Extent of security measures required X =
  • 7. Assess Confirm Competitive Advantage. Information Superiority. Aware, Deter, Detect & Resist, DefendAssure Audit Discovery Health Checks Policy Training Accreditation support Design, build, operate Secure systems Protective Monitoring Services Respond Investigation Forensics Protect Implement Selex ES cyber services are a coherent set, designed to address threats and resolve vulnerabilities
  • 8. Ensure: The Mission Protect: The Data Continuously monitor: The Network Northrop Grumman Approach to Cybersecurity Full Dimensional Assurance Blueprint People and Processes Technology  Enhanced automation  Temporal improvement  Information protection strategy  Risk based approach  Data centric protection  Application integrity  Adaptive architecture  Continuous situation awareness & response Integrated and Continual Improvements It’s how we view our job for our networks and our customer’s networks
  • 9. The Northrop Grumman Cybersecurity Operations Center (CSOC) 9 Computer Network Defense Activities: 1. Monitoring o Monitors the NGGN and related devices for signs of malicious activity 2. Vulnerability Management o Security risks and ensuring appropriate remediation 3. Patch Management o Rapid deployment of vendor provided fixes to identified vulnerabilities 4. Forensics o Information security post-incident analysis 5. Incident Response o Rapid response to malicious activity on the NGGN and related environments 6. Cyber Threat o Analysis of emerging threats to the NGGN and related environments 7. Sector o Sector-specific computer network defense requirements LD-CA-BOK-004, Rev. 16, March 2013, ISHQ-2013-0024
  • 10. Don’t start by building a CIRC Instead, analyse your enterprise vulnerabilites:  People- yours, your suppliers and partners and your customers  Processes  Organisation  Leadership and governance  Physical sites  Data  Applications  Information and telecoms infrastructure and bought- in services  Your security maturity (e.g. ISO 27001)
  • 11. Getting the house in order Probably not enough: Implementation of an appropriate defensive suite:  automated vulnerability scanning  ICT infrastructure and systems log collation and storage  IDS/IPS and associated log collection  potentially, a spectrum of active protective monitoring: o Security Information and Event Management o Full Packet Capture o Deep Packet Inspection o associated management, storage and alerting / reporting service level Credit: Active Audit Agency: Ukraine
  • 12. Scope and ambition Assuming your vulnerabilities are managed, it depends on the threat you face and your freedom of movement
  • 13. Typical Threat World (Offense) Time Attacker Surveillance Access Probe Target Analysis Attack Set-up Performing Reconnaissance Attack Begins System Intrusion Affecting The Attack Attack Complete Packaging Exfiltration Modification Executing The Mission Cover-up Complete Covering The Tracks LD-CA-BOK-004, Rev. 16, March 2013, ISHQ-2013-0024
  • 14. Attack Forecast Physical Security Intrusion Detection Analysis Begins System ReactionDamage Identification Recovery Defender Reconnaissance Entry Monitoring & Control Impact Analysis Response Threat Analysis Attack Identified Time Preparing the Defense Monitoring For an Attack Triage and Situation Assessment After Action LD-CA-BOK-004, Rev. 16, March 2013, ISHQ-2013-0024 Typical Threat World (Defense)
  • 15. It Doesn’t Always Line Up Attacker Free Time Recovery Attack Forecast Physical Security Intrusion Detection Analysis Begins System ReactionDamage Identification Defender Reconnaissance Entry Monitoring & Control Impact Analysis Response Threat Analysis Attack Identified Time Defender Action Time Time Attack Begins System Intrusion Attacker Surveillance Access Probe Attack Complete Target Analysis Attack Set-up Packaging Exfiltration Modification Cover-up Complete Reduce This By moving/shrinking this LD-CA-BOK-004, Rev. 16, March 2013, ISHQ-2013-0024
  • 16. Factors affecting your respond posture: Your legal entitlement – you have heard this today! Cost of maintaining the capability The return on investment you would expect (consider insurance!)
  • 17. Approach to tooling Detection Incident management Analysis Active response or reporting to Authority Evidence management Not forgetting the people!
  • 18. Layered Cybersecurity Defense Framework Computer Network Defense Defense-In-Depth The FanTM Perimeter Firewall Perimeter IDS/IPS Advanced Sensor Honeypot Message Security (anti-virus, anti-malware) DLP Secure DMZs Application Security Malware Analysis NAC/Endpoint Profiler Enclave Firewall DLP Wireless/Mobile Protection Web Proxy Content Filtering Enterprise IDS/IPS VoIP Protection Virtual Network Security Enterprise Message Security Enterprise Remote Access Endpoint Security Enforcement DLP Desktop Firewall Host IDS/IPS Content Security (anti-virus, anti-malware) Patch Management USGCB Compliance SIEM Digital Forensics Security SLA/SLO Reporting Escalation Management Focused Ops SOC/NOC Monitoring (24x7) Incident Reporting, Detection, Response (CIRT) Security Dashboard Continuous Monitoring and Assessment Situational AwarenessVulnerability Assessment Security Awareness Training Continuous C&A IT Security Governance Security Policies & Compliance Security Architecture & Design Threat Modeling Penetration Testing Cyber Threat Intelligence Security Technology Evaluation Risk Management Framework WAF Static App Testing/Code Review Database Secure Gateway (Shield) Database Monitoring /Scanning Dynamic App Testing DAR/DIM/DIU Protection Data Wiping Cleansing PKI FICAM Enterprise Right Management DLP Data Classification Data/Drive Encryption Data Integrity Monitoring © 2013 Northrop Grumman Corporation Acronyms & Abbreviations: DAR: Data At Rest DIM: Data In Motion DIU: Data In Use DLP: Data Loss Prevention IDP: Intrusion Detection and Prevention FICAM: Federal Identity Credential and Access Management NAC: Network Access Control PKI: Public Key Infrastructure SIEM: Security Information Event Management USGCB: US Govt Configuration Baseline OUTSIDE THREAT Mission Critical Assets Inside Threats The “Fan™” - Layered Cybersecurity Defensive Reference Model
  • 19. Why COTS Security Will Always Be a Step Behind 19 Well funded adversaries have access to the same technologies as the defenders Advanced Adversaries’ Attack Tool Test Environment Defender’s COTS-based Security Architecture
  • 20. Good Guys Have Some Ways to Level the Field  Behavioral analytics (Who talks and works with who)  Partnerships for threat information sharing  Threat intelligence team augmentation  Custom file analysis  Custom monitoring of network traffic for C2 channels  Organizational agility to respond to changing threat tactics Perimeter Firewall Perimeter IDS/IPS Advanced Sensor Honeypot Message Security (anti-virus, anti-malware) DLP Secure DMZs Application Security Malware AnalysisNAC/Endpoint Profiler Enclave Firewall DLP Wireless/Mobile Protection Web Proxy Content Filtering Enterprise IDS/IPS VoIP Protection Virtual Network Security Enterprise Message Security Enterprise Remote Access Endpoint Security Enforcement DLP Desktop Firewall Host IDS/IPS Content Security (anti-virus, anti-malware) Patch Management USGCB Compliance SIEM Digital Forensics Security SLA/SLO Reporting Escalation Management Focused Ops SOC/NOC Monitoring (24x7) IncidentReporting, Detection, Response (CIRT) Security Dashboard Continuous Monitoring and Assessment Situational Awareness Vulnerability Assessment Security Awareness Training Continuous C&A IT Security Governance Security Policies & Compliance Security Architecture & Design Threat Modeling Penetration Testing Cyber Threat Intelligence Security Technology Evaluation Risk Management Framework WAF Static App Testing/Code Review Database Secure Gateway (Shield) Database Monitoring /Scanning Dynamic App Testing DAR/DIM/DIU Protection Data Wiping Cleansing PKI FICAM Enterprise Right Management DLP Data Classification Data/Drive Encryption Data Integrity Monitoring Mission CriticalAssets Defenders Have to Be Right Every Time… The Field Can Be Leveled by Leveraging Information Available Only to the Defender
  • 21. The need for collaboration The value of developing and sharing intelligence, securely The common theme across EU, NATO, other nations and Industry bodies globally
  • 22. Towards Cyber Systems Interoperability: STIX: Structured Threat Information eXpression Language Associated Campaigns[*] HistoricalCampaigns[*] AssociatedActors[*] RelatedIncidents[*] RelatedThreatActors[*] PotentialCOAs[*] ExploitTargets[*] LeveragedTTPs[*] RelatedIndicators[* ] RelatedTTPs[*] RelatedIndicators[*] Related Indicators[*] ObservedTTPs[*] Attribution[*] RelatedTTPs[*] IndicatedTTPs[*] Observables[*] Sub-Observables[*] RelatedIncidents[*] COATaken[*] COARequested[*] SuggestedCOA[*] Campaign TTP Threat Actor Exploit Target COA Incident ObservableIndicator Source: MITRE Structured Threat Information eXpression (STIX) v.1.0 Source: CJCS/NATO Joint Terminology for Cyberspace Operations