29
Local Edition

Source Fire Handling Network Threat

Embed Size (px)

Citation preview

Page 1: Source Fire Handling Network Threat

Local Edition

Page 2: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Local Edition

Network Monitoring, Malware, And responding to Advanced Cyber ThreatsMike Mercier

<SESSION ID>

Page 3: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Local Edition

Agenda• Goals for Threat Detection & Response / Challenges

• Preparing for the Threat

• Real-Time Detection and Response

• Finding the Unexpected

• Completing the Threat “Kill Chain”

Page 4: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Network Security Monitoring

4

The collection, analysis, and escalation of indications and warnings to detect (or block) and respond to the wide range of attacks that are in your network.

GOAL:To find and resolve every security relevant condition.

Page 5: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Know your Attack Continuum

5

AFTERScope

ContainRemediate

Attack Continuum

DURINGDetectBlock

Defend

BEFOREDiscoverEnforceHarden

Page 6: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Know your Attack Continuum

6

AFTERScope

ContainRemediate

Attack Continuum

DURINGDetectBlock

Defend

BEFOREDiscoverEnforceHarden

DISCOVER: Network Visibility – Asset Awareness – Vulnerability Intelligence

Page 7: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Know your Attack Continuum

7

AFTERScope

ContainRemediate

Attack Continuum

DURINGDetectBlock

Defend

BEFOREDiscoverEnforceHarden

DISCOVER: Network Visibility – Asset Awareness – Vulnerability Intelligence

DETECT & BLOCK: Threat Detection & Change Awareness

Page 8: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Know your Attack Continuum

8

AFTERScope

ContainRemediate

Attack Continuum

DURINGDetectBlock

Defend

BEFOREDiscoverEnforceHarden

DISCOVER: Network Visibility – Asset Awareness – Vulnerability Intelligence

DETECT & BLOCK: Threat Detection & Change Awareness

AFTER: Forensics – Remediation – Building a Story

Page 9: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Tools We Need

9

AFTERScope

ContainRemediate

Attack Continuum

DURINGDetectBlock

Defend

BEFOREDiscoverEnforceHarden

Network IPS

Real-Time Asset Info (Vulnerability & Risk)

File Detection / Tracking

Traffic / Flow Monitoring

Correlation Tools

Detail Logging / Visualization

Page 10: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Local Edition

Agenda• Goals for Threat Detection & Response / Challenges

• Preparing for the Threat

• Real-Time Detection and Response

• Finding the Unexpected

• Telling the Story

BEFOREDiscoverEnforceHarden

Page 11: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Gain Visibility

• NGIPS Placement

‒ On the Perimeter

‒ Inside the Network

‒ Know where the import

• Network Intelligence

‒ Collecting Data from the wire

‒ Best places to get this data

• Inline, Tap or SPAN ?

• Know what type of data is relevant and where to find it

Deploying Visibility of the Network

11

Page 12: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Tra

ffic

Data Acquisition

Stream Re-assembly

IP Defragmentation

Packet Decode

Security Intelligence

Application Identification

NGFW Rules

Network Discovery IPS NetworkAMP URLReputation

User IPMapping

The More you Know the Better Off You Are

Packet Collection

Reputation

Normalization

Application ContentOperating Systems

VulnerabilityServices / Client AppsUsers, GEO, Devices

Traffic and Application FlowFile Data (Type or Malware)

TrajectoryReal-Time Change

Current State Information

Page 13: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

How data can be leveraged BEFORE

• Application Data tells you where you need to refine enforcement policies‒ Show the breadth of visible application information

• Host Profiles Tell you about Risk / Vulnerabilities

‒ Can Auto Tune – Removing the FALSE NEGATIVE

• So Many Events!

‒ Impact Analysis – Pocus only on what can exploit you or already HAS exploited you

• White Listing for Real-Time change

13

Page 14: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Local Edition

Agenda• Goals for Threat Detection & Response / Challenges

• Preparing for the Threat

• Real-Time Detection and Response

• Finding the Unexpected

• Telling the Story

DURINGDetectBlock

Defend

Page 15: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

The “Easy” Stuff

• Impact 1 Events NOT stopped

• Indicators of Compromise (Often Outbound)

• Malware Detections

15

Page 16: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

More Subtle Indicators of Compromise• Hosts with Policy Violations

16

• Network Changes (New Hosts or Unexpected Services)

• Unsafe Reputation Connections

Page 17: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Local Edition

Agenda• Goals for Threat Detection & Response / Challenges

• Preparing for the Threat

• Real-Time Detection and Response

• Finding the Unexpected

• Telling the Story

AFTERScope

ContainRemediate

Page 18: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Scope, Contain, Remediate• Everywhere the problem’s we KNOW Are:

• Known Malware Detections

• Endpoint Cleanup‒ IPS Event Documentation‒ Host Profiles

18

Page 19: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

File Trajectory

19

Page 20: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Local Edition

Agenda• Goals for Threat Detection & Response / Challenges

• Preparing for the Threat

• Real-Time Detection and Response

• Finding the Unexpected

• Telling the Story

AFTERScope

ContainRemediate

Page 21: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Have you Dashboard put your concerns up front

21

Page 22: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Organize by Tabs

22

Page 23: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Quickly Build (or automate) Your Reports

23

Page 24: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Feedback

• Give us your feedback. Fill out your surveys.

• Don’t forget to activate your Cisco Live Virtual account for access to all session material, communities, and on-demand and live activities throughout the year.

24

Page 25: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Register for Cisco Live - Orlando

Cisco Live - OrlandoJune 23 – 27, 2013

www.ciscolive.com/us

2525

Page 26: Source Fire Handling Network Threat
Page 27: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 27

R: 242

G: 112

B: 33

R: 255

G: 161

B: 0

R: 190

G: 214

B: 0

R: 0

G: 185

B: 228

R: 22

G: 138

B: 203

R: 177

G: 0

B: 157

R: 154

G: 155

B: 156

Title Only Slide - Primary Colour Pallette

Page 28: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public 28

“Optional quote slide option two has text that is left aligned, set in Arial Regular with a point size of 36pts. The maximum quote length should not be more than six lines of text per quote.”

Source Name

Company XY

Page 29: Source Fire Handling Network Threat

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Public

Local Edition

Divider Slide