Security Transformation Overview - Oxford Computer Group...

51
Security Transformation Overview James Cowling, CTO NYC CISO Forum

Transcript of Security Transformation Overview - Oxford Computer Group...

Page 1: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Security Transformation Overview

James Cowling, CTO

NYC CISO Forum

Page 2: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Page 3: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

•••

Agenda

Page 4: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

•••••

Introductions

Page 5: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Page 6: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

•••

•••

Technical and Market Drivers

Page 7: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

••

•••

•••

What is the Security Transformation?

Page 8: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Cyber Attack Cycles

Page 9: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Red Team vs Blue Team

Recon Delivery Foothold Persist Move Elevate Exfiltrate

Gather Detect Alert Triage Context Plan Execute

Page 10: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Increasing Response Speed

Recon Delivery Foothold Persist Move Elevate Exfiltrate

Gather Detect Alert Triage Context Plan Execute

Page 11: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

•••

Massive Data and Machine Learning

Page 12: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Security Solutions

Page 13: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Security Solutions

Page 14: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

•••

••

Data Protection

Page 15: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

••

Cloud App Security - Discovery

Page 16: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

App Security Scoring

Page 17: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Data Leak Visibility

Page 18: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Data Leak Analysis

Page 19: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Policy Controls

Page 20: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Policy Violations

Page 21: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Security Solutions

Page 22: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Security Solutions

Page 23: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Endpoint Protection

Page 24: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Malware Protection and Analysis

Page 25: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Incident Analysis

Page 26: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Malware Deep Analysis

Page 27: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Global Signals, used Globally

Page 28: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Correlation as Data Graph

Page 29: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

••

Azure Security Graph

Page 30: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Malware Machine Activity

Page 31: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

O365 Threat Protection

Page 32: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Machine Activity Details

Page 33: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Real-Time Threat Analysis

Page 34: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Microsoft Advanced Threat AnalyticsSecurity Information and Event Management (SIEM)

ATA

Devices and servers

Behavioral analytics

Forensics for known attacks and issues

Advanced Threat Analytics

Profile normal entity behavior (normal versus abnormal)

Search for known security attacks and issues

Detect suspicious user activities, known attacks, and issues

SIEM Active

Directory

Page 35: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Security Solutions

Azure Security Graph

Page 36: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Anomaly detection• Heuristic and machine learning

Risk event detection• Per user risk level

Risk based policies• Require MFA for risky accounts

Azure AD Identity protection

Page 37: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Azure AD Identity Protection -Dashboard

Page 38: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Azure AD Identity Protection –Risk Events

Page 39: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Identity-Driven Security

Conditions

Allow accessOr

Block access

Actions

Enforce MFA per user/per app

Location (IP range)

Device state

User groupUser

NOTIFICATIONS, ANALYSIS, REMEDIATION,

RISK-BASED POLICIESCLOUD APP DISCOVERY PRIVILEGED IDENTITY MANAGEMENT

MFA

IDENTITY

PROTECTION

Risk

Page 40: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Operations Management Suite

Page 41: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Gain Insight

Page 42: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Create Alerts

Page 43: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Security Solutions

Azure Security Graph

Page 44: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Security Solutions

Azure Security Graph

Page 45: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

••••••

••

Identity Governance and Protection

Page 46: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

•••••

Third Party solutions

Page 47: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Security Solutions

Azure Security Graph

Page 48: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Security Solutions

Azure Security Graph

Page 49: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

Impact of the Security Transformation

Page 50: Security Transformation Overview - Oxford Computer Group USoxfordcomputergroup.com/.../Security-Transformation-Overview-5-10 … · Security Transformation Overview James Cowling,

Do Not Distribute

•••

Can you profit from Security Transformation?