Incident Response: Tools & Techniques

7
INCIDENT RESPONSE: TOOLS & TECHNIQUES 1 Neil Thacker, Information Security & Strategy Officer EMEA, Websense

Transcript of Incident Response: Tools & Techniques

Page 1: Incident Response: Tools & Techniques

INCIDENT RESPONSE:

TOOLS & TECHNIQUES

1

Neil Thacker, Information Security & Strategy Officer EMEA, Websense

Page 2: Incident Response: Tools & Techniques

2

THREAT STAGE MODELLING

RECON LURE REDIRECT EXPLOIT KIT DROPPER

FILECALL HOME DATA THEFT

Page 3: Incident Response: Tools & Techniques

DATA CONTROL MAPPING

3

Page 4: Incident Response: Tools & Techniques

4

ACTION NOT MONITORING

Who

Human Resources

Customer Service

Finance

Accounting

Legal

Sales

Marketing

Technical Support

Engineering

What

Source Code

Business Plans

M&A Plans

Employee Salary

Personal Information

Financial Statements

Customer Records

Technical Documentation

Competitive Information

Where

Benefits Provider

Personal Web Storage

Blog

Customer

USB

Spyware Site

Business Partner

Competitor

Analyst

How

File Transfer

Instant Messaging

Peer-to-Peer

Print

Email

Web

Audit

Notify

Remove

Quarantine

Encrypt

Block

Removable Media

Copy/Paste

Print Screen

Action

Confirm

Page 5: Incident Response: Tools & Techniques

5

INCIDENT RESPONSE - PREPARATION

Before

• Data Collection & Monitoring Infrastructure

• Incident Command Principles

• Roles and OrganisationalStructure

• Response Infrastructure and Preparatory Steps

After

• Trigger, Escalate, and Size appropriately

• Detect, Contain & Mitigate

• Triage• Analyse• QA effectiveness

During

Page 6: Incident Response: Tools & Techniques

6

INCIDENT RESPONSE

Technology requirements:

• Malware analysis

• Digital/Data forensics

• Composite scoring

• Real-time event correlation

• Kill-chain analysis

Page 7: Incident Response: Tools & Techniques

THANK YOU

7

Neil ThackerInformation Security & Strategy Officer EMEAWebsense

@nt_hacker