21
PAGE Predictive Security Intelligence – Driving a Productive Partnership between security, audit and risk Tuesday October 23, 2012 FS-ISAC Fall Summit Vickie Miller, Sr. Director, Information Security FICO Seema Sheth-Voss Director, Solutions Marketing Core Security

Fs isac fico and core presentation10222012

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: Fs isac fico and core presentation10222012

P A G E

Predictive Security Intelligence – Driving a Productive Partnership between security, audit and riskTuesday October 23, 2012FS-ISAC Fall Summit

Vickie Miller,Sr. Director, Information SecurityFICO

Seema Sheth-VossDirector, Solutions MarketingCore Security

Page 2: Fs isac fico and core presentation10222012

P A G E

Agenda

• Overview of FICO and security organization• Security analytics journey at FICO• Parallel between FICO’s business & challenges with security data• CORE Insight solution and value• Building a resilient and predictive security architecture

Page 3: Fs isac fico and core presentation10222012

P A G E

A bit about FICO

• Founded in 1956, FICO is a leading provider of credit scoring, decision management, fraud detection and credit risk score services. • The concepts that are of interest include:

− Multi-dimensional profiling capabilities − Neural networks − Adaptive analytics − Self-calibrating outlier analytics − Integration with man-made rules to detect anomalous activity − Integration with man-made rules to determine courses of action based

on the output of machine generated anomaly detection and output of man-made anomaly detection.

Page 4: Fs isac fico and core presentation10222012

P A G E

Security organization at FICO

• Application Security with static and dynamic code analysis• Security Operations - logging, IDS/IPS, FIM, PVM• Governance, Risk and Compliance – internal, external audits

Defense focused

Proactive and Predictive

Need to shift and evolve to

Page 5: Fs isac fico and core presentation10222012

P A G E

Challenges at FICO

Challenge of internal communication

• Managing Up!• Communicating

across the matrix and the globe

Need for operational efficiency• Multiple IT Delivery Models• Cloud• Challenges with SLAs

Need to protect our environment • Risk and Compliance

Pressure• Need for scalability

and automation in risk assessment but with the ability to react quickly

• Cost of labor and lost opportunity cost

Page 6: Fs isac fico and core presentation10222012

P A G E

Parallels between our business and my team

• FICO’s business uses advanced predictive analytics in the transaction stream to prevent fraud loss.• Security uses Snort rules and packet inspection to detect

anomalous activity• FICO uses consortium of data & real-time input to detect

changing nature of fraud (Card Alert – Michaels)• Millions and millions of log files looking for event correlations.

Page 7: Fs isac fico and core presentation10222012

P A G E

Security organizations lack preventative or predictive tools that other businesses have

Page 8: Fs isac fico and core presentation10222012

P A G E

Predictive Security Intelligence - Taking a performance and analytics driven approach

What should we do about risks?

How do we convey the risk to get action?

What is happening? Why? What is likely?

What really matters and what doesn’t?

Page 9: Fs isac fico and core presentation10222012

P A G E

Layered controls at each part of technology stack but no correlation

9

• The vast majority at the management software layer are built to defend, react or monitor

• This model has inherent gaps:− Overwhelming amounts of data− Little correlation /

communication between solutions

− By the time alerts go off, it’s too late

?

Page 10: Fs isac fico and core presentation10222012

P A G E

FICO’s solutionWhat is likely to happen? Understand security posture before a breach happens

Page 11: Fs isac fico and core presentation10222012

P A G E

Visualize the most likely attack paths to crown jewel assets or data

Focus on the most critical vulnerabilities which have business or reputation impact

Page 12: Fs isac fico and core presentation10222012

P A G E

What really matters? Get above the noise of the security data..

Challenge: false positives and make sense of the noise..

Simulate or Test

Identify and prove critical

exposures

Remediation

Apply patches and other updates

Repeat Validate fix

effectiveness

Incident and Scan data

Discover assets , collect incident

data and scan for vulnerabilities

Page 13: Fs isac fico and core presentation10222012

P A G E 1 3

Before• Small security staff• Needed to scale and enhance

testing, understand risk to most critical assets

• Getting 82,000 vulnerability signatures from scanner

• Yet only working on 300 results due to resource constraints (hopefully the right 300?)

• Yearly vulnerability management cost: $144,000

• Yearly remediation/Patch management estimate at 300 tickets passed to IT: $700,000

Value of getting above the noise of data

After• Proactively determine attack path

across 1000 assets• Identified the 30 most critical

exploitable vulnerabilities of the 82,000 worth addressing first

• Prioritize & validate vulnerabilities

Savings• VM costs per year: $43,200• Trouble tickets passed ~ 30

Page 14: Fs isac fico and core presentation10222012

P A G E 1 4

Conveying risk & prompting action A balancing act between risk reduction and making security “easier” and cost efficient

Audi

t Offi

cer

“We need security to let us know whether controls are in place and working.”

Chie

f Ris

k O

ffice

r

“Security metrics need to be conveyed in language of enterprise risk.”

VP o

f IT

“The business needs new functionality, but my team is fixing things that may not even be real.”

“We’re spending a lot on tools, but I can’t say whether we’re improving our overall security posture …”

CISO

Com

plia

nce

Offi

cer “Security needs to be

an enabler, but checkbox mentality creates a divide.”

Pen

Test

Team

“We have the best team, but we can’t scale and periodic assessments quickly become outdated.”

Secu

rity

Dire

ctor

“Our security data log contains over X million records, but it’s difficult to determine what is truly most vulnerable.”

Technology

Business

Page 15: Fs isac fico and core presentation10222012

P A G E

What should we do with security data?

• Security Metrics and Reporting with Continuous Assessment• Status of the safeguards• Trending• Change management• Hand-off to remediation

systems

• Enterprise Risk Management• Business continuity• Reputation

Enabling Performance Management like best practices for security

Page 16: Fs isac fico and core presentation10222012

P A G E

Core Security – Our journey to Security Intelligence

• Leading provider of predictive security intelligence solutions− Established: 1996, first commercial product: Core Impact 2001− Headquartered in Boston, CoreLabs in Buenos Aires− 1,400 customers, ~200 employees

• Diverse, experienced organization driving segment leadership− Experienced management -- backgrounds include Sophos, CA, Symantec, Seagate, IBM− Active Customer Advisory Board and Core Customer Community group− Consistent award recognition from industry groups and media

• Groundbreaking research & product development− Leading-edge consulting services brings field experience− CoreLabs vulnerability research team world renowned− 9 patents approved / 12 pending

Page 17: Fs isac fico and core presentation10222012

P A G E

CORE’s security intelligence solution in action

1 7

1. Environment Profiling and security data

collectionTell Insight about your

environment.

3. Threat Planning and Simulation

Insight calculates likely attack paths to your

defined assets.

2. Campaign Definition

You define critical IT assets (aka goals), scope and timing.

5. Adaptive Path Adjustment

Insight seeks new paths as systems are

compromised.

4. Threat Replication

Insight attempts to exploit vulnerabilities

along the paths.

GOAL 6. Infrastructure Change

Campaigns can automatically adapt as

you deploy new systems.

Security Verified!

Security Verified!

New system added to environment!

7. Dashboard / Reporting

Insight presents findings in terms relevant to your

organization.

Page 18: Fs isac fico and core presentation10222012

P A G E

CORE Insight: Start improving the effectiveness of your vulnerability management program

Based on what I outlined above I see this type of dashboard capability as a real need for security officers. As I like to say: “You get what you measure.” Metrics change

behaviors; that’s their value. Sharing those measurements so people know the value of your efforts is a best practice – Ed Ferrara, Forrester blog in ComputerWorldUK

Blog October 8, 2012

Page 19: Fs isac fico and core presentation10222012

P A G E

CORE Insight Platform tomorrow – Predictive Intelligence to your existing security ecosystem

1 9

SIEM

CORE Insight Enterprise

Security Suite

GRC

Security Data

Alerts to be Validated

Vulnerability and Threat Validation

Threat Path Vector Analysis

• Firewall• IDS/IPS

• Vuln Scan• DLP

Page 20: Fs isac fico and core presentation10222012

P A G E

Intelligence and Measurement drives cross-organizational partnership

Secu

rity

Team

Audi

t and

Com

plia

nce

VP o

f IT

Ope

ratio

nal R

isk

Offi

cer

Track remediation and fix the right things

Streamline workflow and correlate data across multiple vulnerability management tools

Validate vulnerabilities and test controls

Convey cyber risk in operational terms

Strike the BalanceLet’s Predict to keep bad guys out

&Make better decisions and not

‘break the bank’

Page 21: Fs isac fico and core presentation10222012

P A G E