22
Developing A Cyber Security Incident Response Program Boğaziçi University - Istanbul @2015

Developing A Cyber Security Incident Response Program

Embed Size (px)

Citation preview

Page 1: Developing A Cyber Security Incident Response Program

Developing A Cyber Security Incident Response Program

Boğaziçi University - Istanbul @2015

Page 2: Developing A Cyber Security Incident Response Program

Ozan UÇAR• Co-Founder at BGA Bilgi Güvenliği A.Ş • Senior Security Consultant

blog.bga.com.trwww.cehturkiye.com

[email protected]/ucarozan

About Me

Page 3: Developing A Cyber Security Incident Response Program

About BGA

Page 4: Developing A Cyber Security Incident Response Program

Know How & Know WhyThis presentation will let you know why

you should do …... before the “cyber attacks are happened” but won’t let you know how you can do that.

Page 5: Developing A Cyber Security Incident Response Program

Type of Cyber Attacks• Denial Of Service - DOS/DDOS• Client-Side Attack Vectors – Browser/File Format

Exploitation• Social Engineering - Phishing/Vishing• Web App. Attacks• Data Theft• Backdoor• Physical Security

Page 6: Developing A Cyber Security Incident Response Program

ADOBE

600M

SONY400M

Ashley Madiso

n200M

RSA120M

Total$2

Billion

Evernote

80M

Gov40M

Reality

Page 7: Developing A Cyber Security Incident Response Program

Realitywww.shodan.io

Page 8: Developing A Cyber Security Incident Response Program

Realitywww.zoomeye.org

Page 9: Developing A Cyber Security Incident Response Program

Open source intelligence (OSINT)

Social media

Search engines

Blogs and user generated content

Activist forums

User groups

Chat rooms

Data leakage

• E-mail harvesting

• People search

• Password search

• Access user account

• Mass / Spear phishing

• Fraudulent domain

• Malware

• Data theft

Reality

Page 10: Developing A Cyber Security Incident Response Program

Have I been Hacked ? • theharvaster• haveibeenpwned.com• hacked-emails.com

Page 11: Developing A Cyber Security Incident Response Program

Just do it !• Zero Trust• Security Operation Center (SecOps)• Simulation of Cyber Attacks and Anomalies• Advanced Persistent Threat (APT)• Continuous Security Scan (CSS)• Cyber Threat Intelligence (CTI)

watch it if you need motivation https://www.youtube.com/watch?v=ZXsQAXx_ao0

Page 12: Developing A Cyber Security Incident Response Program

Zero Trust• On February 12, 2013, President Obama signed Executive Order 13636,

“Improving Critical Infrastructure Cybersecurity.” The Executive Order is designed to increase the level of core capabilities for our critical infrastructure to manage cyber risk.

• It does this by focusing on three key areas: 1. information sharing2. privacy3. the adoption of cybersecurity practices.

• https

://www.whitehouse.gov/issues/foreign-policy/cybersecurity/eo-13636

Page 13: Developing A Cyber Security Incident Response Program

Why we need “Security Operation Center / SecOps”

• Establishing 360 degrees of field dominance• Catching (capturing) successful cyber attacks• Identifying unnormal (or unexpected) issues of our

network in advance• Measuring damage of possible successful security

risks (!)• Minimize loss of the valuable data

Page 14: Developing A Cyber Security Incident Response Program

What we need for “Security Operation Center / SecOps”

• Incident response team• Log correlation (SIEM)• Netflow / Sflow collection• Full packet capture• Anomaly detection mechanism• Effective communication with ..

1. Local CSIRT Teams (usom.gov.tr)2. Nation CSIRT Teams (trusted-introducer.org)3. Internet Service Providers (Turktelekom, Superonline etc.)4. and BGA as a strong company : ))

Page 15: Developing A Cyber Security Incident Response Program

Why should we do “Simulation of Cyber Attacks and Anomalies”

Page 16: Developing A Cyber Security Incident Response Program

Example Case for Simulation of Cyber Attacks and Anomalies

Page 17: Developing A Cyber Security Incident Response Program

Advanced Persistent Threat (APT)

Page 18: Developing A Cyber Security Incident Response Program
Page 19: Developing A Cyber Security Incident Response Program

Data Leakage Monitoring

Social Network Monitoring

DeepWeb / DarkWeb Digging

Fraudulent Domain Tracking

Brand Watch

Smart Intelligence

Botnet Control

Fraudulent Mobile App Monitoring

Phishing Web Site Monitoring

DNS / Domain Whois Monitoring

Passive Vulnerability Scanning

Paste Site Monitoring

Cyber Intelligence

Page 20: Developing A Cyber Security Incident Response Program

Management Portal

Your Assets

Admin/Analysts

Notifications

Customers/Clients

Effective Vulnerability Management !http://www.slideshare.net/bgasecurity/stsec-2015-norm-shield-why

Vulnerability Management

Page 21: Developing A Cyber Security Incident Response Program

Solution: Vulnerability Management & Cyber Threat

Intelligent

Page 22: Developing A Cyber Security Incident Response Program