Top Banner
0 Copyright 2016 FUJITSU Fujitsu Forum 2016 #FujitsuForum
26

Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

Jan 06, 2017

Download

Technology

Fujitsu Global
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

0 Copyright 2016 FUJITSU

Fujitsu Forum 2016

#FujitsuForum

Page 2: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

1 Copyright 2016 FUJITSU

Mapping the territory of Cyber threats. Prevent, detect and respond to Cyber attacks

Rob Norris

Head of Enterprise & Cyber Security EMEIA, Fujitsu

Richard Curran

Security Officer EMEA , Intel

Bryan Campbell

Senior Security Researcher , Fujitsu, @Bry_Campbell

Page 3: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

2 Copyright 2016 FUJITSU

Delivering Intelligent Led Security - Agenda

Threat Landscape

Legislation – NIS & GDPR

Security Predictions

Intelligent Security Operations Centre (ISOC)

Fujitsu Security Capabilities

Summary & Q&A

Page 4: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

3 Copyright 2016 FUJITSU

Threats

Weak Supply chains

Hacktivism

Credit Card Data

Customer Data

IPR Theft

Insider Threat

Prevent

Detect

Respond

The Landscape – Case of When not If

Page 5: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

4 Copyright 2016 FUJITSU

By 2018 - New Legislation will drive Security Requirements Network & Information Security Directive (NIS) & General Data Protection Regulation (GDPR)

New Legislation Main Customer Tasks Prepare Now!

Network and Information Security Directive (NIS) • Harmonized requirements on

each Member State’s legislation

• Each member state must pass a national law based on the directive by 2018

General Data Protection Regulation (GDPR) • Regulation is valid as is in every

country from 2018 on

• Countries may add national extensions

• Open issue: is relevant law that of consumer’s or provider’s jurisdiction?

Information Systems and Data Governance • Evidence of policies and effective

implementation, e.g.

• Security Audit • Data Protection Impact

Assessments • Data Protection Officer to be

implemented

Reporting • Records of Processing • Specific reporting of security

incidents / data breaches without undue delay

Severe Fines • GDPR: 20M€ or 4% of annual

turnover

Governance, Risk and Compliance • Security Consulting, e.g.

Continuity & Resilience

• Data Protection, e.g. IAM, encryption

• MSS, e.g. vulnerability management, perimeter protection, content inspection

Assessments & Audits • Security Audits • Privacy Impact Assessment

Detect and Response • Cyber Threat Intelligence • SIEM enhanced by reporting

according to NIS/GDPR

Page 6: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

5 INTERNAL USE ONLYINTERNAL USE ONLY Copyright 2016 FUJITSU

Major threats predictions for 2015

State sponsored cyber

espionage POS Malware

Major Software Flaws Ransomware ATM

Jackpotting Crimeware as a service

Banking Trojans

DDOS attacks

Mobile platform threat IoT Attacks

Page 7: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

6 Copyright 2016 FUJITSU

2015 – The Year of banking Trojans

2015 – Fujitsu Cyber Threat Intelligence provided intelligence about banking Trojans

Further assisted Government & Law enforcement agencies by sharing information & key learnings

Our work has helped protect both Fujitsu existing & non Fujitsu Customers

2016 – Despite the above Banking Trojans still pose a significant threat

Page 8: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

7 Copyright 2016 FUJITSU

Major Threat Predictions for 2016

Flash in the spotlight

The Insider Threat

Web Attacks under attack

Data Remains King

IoT growth equals DDoS

Biometrics on the Rise

Check the mail

Things get Personal

Companies need expert

help

Page 9: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

8 Copyright 2016 FUJITSU

The IoT of Distrbuted Denial of Service (DDoS) Attack

Page 10: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

9 Copyright 2016 FUJITSU

Data Remains King

Page 11: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

10 Copyright 2016 FUJITSU

Flash in the Spotlight

Page 12: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

11 Copyright 2016 FUJITSU

Check The Mail

Page 13: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

12 Copyright 2016 FUJITSU

Phishing

Page 14: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

13 Copyright 2016 FUJITSU

How do we combat these - Intelligence led Security

Page 15: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

14 Copyright 2016 FUJITSU

Title

Page 16: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

15 Copyright 2016 FUJITSU

Our own Intelligence gathering…

Page 17: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

16 Copyright 2016 FUJITSU

Page 18: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

17 Copyright 2016 FUJITSU

A Day in the life of a SOC Agent

Page 19: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

18 Copyright 2016 FUJITSU

Security by Design : In the DNA of Your Organization

Enable Your Business to go FAST, SAFELY

BUSINESS OBJECTIVES Does your board recognize the

opportunity in embracing security as an

opportunity?

How do you approach developing or

enhancing a security-minded culture?

What do you expect from your partners

to deliver secure services?

Page 20: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

19 Copyright 2016 FUJITSU

A Hardened Infrastructure is paramount?

Hardware

Applications

Operating System

Virtual Machine (Optional)

Attacks disable security products

OS infected with APTs:Threats are hidden from security products

Traditional attacks: Focused primarily on the application layer

Ultimate APTs: Compromise platform and devices below the OS, using rootkits as cloaks

Compromise virtual machine

New stealth attacks: Embed themselves below the OS and Virtual Machine, so they can evade current solutions

VISIBILITY/

CONTROL

Cloud

Trusted

Trusted

Untrusted Unknown

Identity Protection

HW-based IT-policy managed, Multi-

Factor Authentication

Protecting authentication factors, IT

policy decision and credentials

Page 21: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

20 Copyright 2016 FUJITSU

40+ Year History in design, delivery and Integration of large scale cyber security

services

Highest Strategic Technology Partner

Accreditations

Operating across Public and Private

sector, and National Defence Businesses

R&D Capability – developing/delivering

Fujitsu security products, e.g.

PalmSecure and SURIENT

Security Operations Centres operating to

highest National Government security

levels

350+ Security professionals today moving to 1000+ in

next 3 years

PalmSecure

SURIENT Web & Email security

Endpoint protection

Firewalls and IDS/IPS

Managed Security Services

Cloud and DLP Security

Assessments

Continuity and Resilience

Consultancy

Technical Design and Integration

Assessment Services

Security Consultancy

Data Loss Prevention

Advanced Threat Protection

SIEM and SIEMaaS

Vulnerability Management

Identity & Access Mgmt

Consultancy and Advisory

Cyber Threat Intelligence and Threat Response

Products

Fujitsu EMEIA Security Offerings

Page 22: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

21 Copyright 2016 FUJITSU

Developing Fujitsu own Security Portfolio SURIENT as well as Artificial Intelligence Tools

Managed Rack Sol. Sealed Rack Sol. Stealth Connect Sol. AI - Zinrai

New way of caging in data center for secured physical access (for housing and hosting services)

Server rack opens only for authorized people and logs all openings/closings for audits

Biometric Authentication via PalmSecure ID Match

Installation Services included

New to the world high end solution to protect from intrusion and manipulation with completely separated zones

Fujitsu stealth technologies implemented in control unit

Exceeds MRS security by far

High Secure blocking tool for external communication to a Data Center

Attackers see only closed ports (even behind the same NAT as a user signed in)

Secure strongly against elevation of rights, MitM, Zero Day Exploits, Untrusted Platform

Developed in Japan Zinrai meaning lightning fast in Japanese, is an AI platform that allows Predictive Analysis of Security attacks

Anomaly detection is a typical use case for machine learning systems

Anomaly detection is applied to network traffic information (IDS Logs) to detect cber attacks

Page 23: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

22 Copyright 2016 FUJITSU

Biometric Technology - PalmSecure – Visit the Cyber area to see Portfolio & Typical User Cases

Page 24: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

23 Copyright 2016 FUJITSU

Summary - People & Service Matter…

Collaborative

Strong Vendor

Relationships

Vendor & Technology Agnostic

Deep Real World Experience

Service Integration Background

Co-located

Technical Skills

Pragmatic &

Realistic

Extension of our

Customers’ Business

Market

Intelligence

Service Flexibility

Proven Services

Sense & Respond

Gen X & Gen Y

Hybrid Delivery Model

Service Culture

Service Intimacy

Extra Mile

Proactive

Customer Experience

Page 25: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

24 Copyright 2016 FUJITSU

SECURITY Updates November 16:

Nov 16, 13:00 - 13:30 New European Legislation - impact on Security requirements

What is GDPR and how will it affect you ?

Ralf Adebar

Nov 16, 13:30 - 14:00 Top 10 Cyber Predictions Review & Predictions from our Fujitsu Security Operations Center

Luke Smalley & Bryan Campbell

Nov 16, 15:00 - 15:30 Cyber Threat Intelligence

Why you cannot afford your organization to be without it Ryan Smith & Bryan Campbell

Nov 16, 15:30 - 16:00 Next Generation SIEM With the growing requirement to be able to make alerts relevant, what is the future of SIEM

Martin Cook from LogRhythm @ Ian Whittingham

Nov 16, 16:00 - 16:30 Security Operation Centers (SOC)

How should a SOC operate and how you can benefit Iain Slater & Ian Whittingham

November 17

Nov 17, 10:00 - 10:30 E2E Security Challenges and solutions - demonstrated with innovative usage scenarios based on our SURIENT technology

Dr. Heinz-Josef Claes

Nov 17, 10:30 - 11:00 Intelligent Security Solutions - based on R&D Own developments, cooperation with partners and relationship with academia

Thorsten Höhnke & Daniel Prince

Nov 17, 15:00 - 15:30 Identity and Access Management Challenges and solutions - demonstrated with innovative usage scenarios based on PalmSecure technology

Thomas Bengs

Nov 17, 15:30 - 16:00 Advanced Threat Protection (ATP)

Why Prevention alone isn’t enough and why organizations should shift focus to Detection and Response.

Symantec

Page 26: Mapping the Territory of Cyber Threats - Prevent, Detect and Respond to Cyber Attacks

25 Copyright 2016 FUJITSU