SlideShare a Scribd company logo
1 of 33
SESSION ID:
#RSAC
Timothy Lee
Cyber Security Operations Center
(CSOC) for
Critical Infrastructure Protection
CXO-F02
CISO
City of Los Angeles
@tswlj316
#RSAC
AGENDA
 Introduction
 Why do we need Cyber Security Operations Center (CSOC)?
 How did we sell it?
 How did we implement it?
 Results
 Summary
2
#RSAC
Introduction
#RSAC
The Port of Los Angeles
 7,500 acres, 43 miles of
waterfront, 270 berths, 23 cargo
terminals, moving 8 million
Twenty-foot Equivalent (TEU) per
year
 Busiest container port in US
 $300 billion cargo value per year
 $23 billion tax revenue per year
 1.2 million jobs throughout CA
 3.6 million jobs throughout the US
 Identified by DHS as nation’s
critical infrastructure
4
#RSAC
The Project – CSOC
 Project Cost: $2.2 million
 Source of Funding: FEMA Port Security Grant Program (PSGP) FY
2012 (80/20)
 Project began: December 2013
 Project completed: August 2014
 Winner of 2014 American Association of Port Authorities (AAPA)
Information Technology Award of Excellence
5
#RSAC
The Project - CSOC
 Technology/Services Included:
 incident/threat Management
 intrusion detection/prevention
 security analytics
 APT defense
 network access control
 network traffic aggregation and visibility
 digital forensics
 facility design and build
6
#RSAC
Why did we need CSOC?
7
#RSAC
Nation’s Critical Infrastructure
 President’s Executive Order (EO) 13636 - Improving Critical
Infrastructure Cybersecurity
 Presidential Policy Directive (PPD) 21 - Critical Infrastructure
Security and Resilience
 Mayor of Los Angeles’ Executive Directive No. 2 on Cybersecurity
#RSAC
Problem
 IT Security team is understaffed
 Dispersed log capturing capabilities
 Minimal use of collaboration tools
 High value assets are not identified or tracked
 Lack of Incident Management System and IR training
 A threat intelligence program does not exist
 Incident workflow process and procedures
 Limited operational metrics
 Heavy reliance on vendor auto-updating of security tools
 Growing Cyber Threats
9
#RSAC
Solution – CSOC
10
Staff
Tools &
Technology
Facility
Processes &
Procedures
CSOC
#RSAC
How did we sell it?
11
#RSAC
How did we sell it?
 Prepare to answer why you need CSOC
 Security Audit Report (Recommendation and Action Plan)
 Compliance Gap Assessment Report
 Security metrics (numbers of intrusion attempts, incidents, outages caused by incidents,
top attackers, threat activity and trends etc.
 Present it from the business risk perspective
 Engage others outside of IT to also help sell it for us
 Provide potential risks of not implementing CSOC
 Provide real-world examples of cyber incidents and costs that your audience can relate to
 Provide source of funding for implementation and operations
 Align results to organizational goals
#RSAC
How did we implement it?
13
#RSAC
14
CSOC Components
#RSAC
Tools and Technology
 Incident/Threat Management
 Intrusion Detection/Prevention
 Security Analytics
 APT Defense
 SIEM
 Network Access Control
 Network traffic aggregation and visibility
 Digital Forensics
15
#RSAC
Technology Integration
16
Log/Event Sources
• Checkpoint
• SourceFire
• Juniper SSL VPN
• ForeScout
• AD Event Logs
• FireEye
• IronPort
• Symantec Endpoint Protection
• Syslogs
Threat Intel Feeds
• MS-ISAC Feeds
• RSA Live Feeds
• In-house Threat Feeds
DataSources
Correlation&Analysis
Situational Awareness, Metrics & Workflow
#RSAC
CSOC Organizational Structure
17
#RSAC
CSOC RACI
18
Activity
L1 Analyst L2 Analyst Content Admin SOC Manager CISO Asset Owner IT Help
Desk
Initiate Incident Remediation R R A
Define Remediation Requirements I R A
Plan Remediation I C A R R
Perform Remediation I C A R R
R – Responsible A – Accountable C – Consulted I - Informed
#RSAC
Processes & Procedures
 SOC Operations Manual (Run Book)
 SOC Policies
 Incident Service Level Objective Policy
 Incident Escalation Policy
 Critical Incident Declaration Policy
 Incident Response Plan
 Level 1 , Level 2 Workflows
 Critical Incident Management
 Reporting and Metrics
 CISO Dashboard, SOC Manager Dashboards
 Situational Awareness, Daily Analysis Report
19
#RSAC
Facility Build Requirements
 Room Specifications
 Length – 19’, Width 15’, Height – 20’
 Physical Security – Badge access, Privacy window film
 Power requirements
 Air conditioning
 Electrical and network requirements
20
#RSAC
Facility Build Requirements - Continued
 SOC Room Consoles
 Remote Graphics Unit (RGU)
 Video Display Wall
 6 LED-based 55” full HD ultra narrow bezel arranged 2-high by 3-wide
 Display wall controller
 DVI cabling
 Cabling and mounting hardware
 The wall needed to be structurally enforced to hold the weight of the
displays
 Audio System
21
#RSAC
CSOC Conceptual Drawing
22
#RSAC
Results
23
#RSAC
24
#RSAC
25
#RSAC
Dashboard 1 - Overview
26
#RSAC
Dashboard 2 – National Cybersecurity Posture
27
#RSAC
Dashboard 4 – Malware
28
#RSAC
CISO Dashboard
29
#RSAC
The Project was featured in Seaports Magazine
30
#RSAC
Apply
 Conduct SOC readiness assessment before anything
 Look for grant opportunities
 Pick the right tools and technology
 Be mindful of Operating Cost
 Pick the right contractor
 Pick the right team. Invest in people
 Cybersecurity collaboration and information sharing are essential
31
#RSAC
Resources
 Security Operation Center Concepts & Implementation – Renaud
Bidou
 Cybercrime Kill Chain vs Defense Effectiveness – Stefan Frei,
Phd; Francisco Artes – NSS Labs
 Ten Strategies of a World-Class Cybersecurity Operations Center
– Carson Zimmerman, October 2014
 Building An Intelligence Driven Security Operations Center – RSA
Technical Brief, June 2014
#RSAC
Timothy Lee, CISSP PMP
CISO
City of Los Angeles
timothy.lee@lacity.org
www.linkedin.com/in/timothyswlee
33

More Related Content

What's hot

QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
Risk Analysis Consultants, s.r.o.
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Positive Hack Days
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 

What's hot (20)

Lessons Learned from the NIST CSF
Lessons Learned from the NIST CSFLessons Learned from the NIST CSF
Lessons Learned from the NIST CSF
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
QualysGuard InfoDay 2013 - QualysGuard Security & Compliance Suite supporting...
 
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
Laying the Foundation:  The Need for  Cybersecurity in  U.S. ManufacturingLaying the Foundation:  The Need for  Cybersecurity in  U.S. Manufacturing
Laying the Foundation: The Need for Cybersecurity in U.S. Manufacturing
 
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in EuropeIndustrial Cybersecurity and Critical Infrastructure Protection in Europe
Industrial Cybersecurity and Critical Infrastructure Protection in Europe
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Should I Patch My ICS?
Should I Patch My ICS?Should I Patch My ICS?
Should I Patch My ICS?
 
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat ProtectionSymantec Cyber Security Solutions | MSS and Advanced Threat Protection
Symantec Cyber Security Solutions | MSS and Advanced Threat Protection
 
Cybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoDCybersecurity Metrics: Reporting to BoD
Cybersecurity Metrics: Reporting to BoD
 
Introduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity FrameworkIntroduction to NIST Cybersecurity Framework
Introduction to NIST Cybersecurity Framework
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Dragos year in review (yir) 2018
Dragos year in review (yir) 2018Dragos year in review (yir) 2018
Dragos year in review (yir) 2018
 
Bulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat LandscapefinalBulding Soc In Changing Threat Landscapefinal
Bulding Soc In Changing Threat Landscapefinal
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Cybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architectureCybersecurity roadmap : Global healthcare security architecture
Cybersecurity roadmap : Global healthcare security architecture
 
Hardware Security on Vehicles
Hardware Security on VehiclesHardware Security on Vehicles
Hardware Security on Vehicles
 
Assessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS SolutionsAssessing the Security of Cloud SaaS Solutions
Assessing the Security of Cloud SaaS Solutions
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
Tools Of The Hardware Hacking Trade Final
Tools Of The Hardware Hacking Trade FinalTools Of The Hardware Hacking Trade Final
Tools Of The Hardware Hacking Trade Final
 
NISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best PracticeNISTs Cybersecurity Framework -- Comparison with Best Practice
NISTs Cybersecurity Framework -- Comparison with Best Practice
 

Viewers also liked

Top 8 chief information security officer resume samples
Top 8 chief information security officer resume samplesTop 8 chief information security officer resume samples
Top 8 chief information security officer resume samples
porichfergu
 
Knowledge-driven Implicit Information Extraction
Knowledge-driven Implicit Information ExtractionKnowledge-driven Implicit Information Extraction
Knowledge-driven Implicit Information Extraction
Artificial Intelligence Institute at UofSC
 
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
Artificial Intelligence Institute at UofSC
 
Automatic Emotion Identification from Text
Automatic Emotion Identification from TextAutomatic Emotion Identification from Text
Automatic Emotion Identification from Text
Artificial Intelligence Institute at UofSC
 
Mining and Analyzing Subjective Experiences in User-generated Content
Mining and Analyzing Subjective Experiences in User-generated ContentMining and Analyzing Subjective Experiences in User-generated Content
Mining and Analyzing Subjective Experiences in User-generated Content
Artificial Intelligence Institute at UofSC
 
Prateek Jain's Dissertation Defense - Linked Open Data Alignment and Querying
Prateek Jain's Dissertation Defense - Linked Open Data Alignment and QueryingPrateek Jain's Dissertation Defense - Linked Open Data Alignment and Querying
Prateek Jain's Dissertation Defense - Linked Open Data Alignment and Querying
Artificial Intelligence Institute at UofSC
 
Ashutosh Jadhav PhD Defense: Knowledge Driven Search Intent Mining
Ashutosh Jadhav PhD Defense: Knowledge Driven Search Intent MiningAshutosh Jadhav PhD Defense: Knowledge Driven Search Intent Mining
Ashutosh Jadhav PhD Defense: Knowledge Driven Search Intent Mining
Artificial Intelligence Institute at UofSC
 
Contrast Pattern Aided Regression and Classification
Contrast Pattern Aided Regression and ClassificationContrast Pattern Aided Regression and Classification
Contrast Pattern Aided Regression and Classification
Artificial Intelligence Institute at UofSC
 
Cartic Ramakrishnan's dissertation defense
Cartic Ramakrishnan's dissertation defenseCartic Ramakrishnan's dissertation defense
Cartic Ramakrishnan's dissertation defense
Cartic Ramakrishnan
 
Personalized and Adaptive Semantic Information Filtering for Social Media - P...
Personalized and Adaptive Semantic Information Filtering for Social Media - P...Personalized and Adaptive Semantic Information Filtering for Social Media - P...
Personalized and Adaptive Semantic Information Filtering for Social Media - P...
Artificial Intelligence Institute at UofSC
 

Viewers also liked (20)

Top 10 Essentials for Building a Powerful Security Dashboard
Top 10 Essentials for Building a Powerful Security DashboardTop 10 Essentials for Building a Powerful Security Dashboard
Top 10 Essentials for Building a Powerful Security Dashboard
 
Critical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challengesCritical Infrastructure and Cyber Security: trends and challenges
Critical Infrastructure and Cyber Security: trends and challenges
 
SplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunk for Operational Security IntelligenceSplunkLive Brisbane Splunk for Operational Security Intelligence
SplunkLive Brisbane Splunk for Operational Security Intelligence
 
Top 8 chief information security officer resume samples
Top 8 chief information security officer resume samplesTop 8 chief information security officer resume samples
Top 8 chief information security officer resume samples
 
Infrastructure dependability
Infrastructure dependabilityInfrastructure dependability
Infrastructure dependability
 
Critical national infrastructure
Critical national infrastructureCritical national infrastructure
Critical national infrastructure
 
User-Generated Content on Social Media
User-Generated Content on Social MediaUser-Generated Content on Social Media
User-Generated Content on Social Media
 
Knowledge-driven Implicit Information Extraction
Knowledge-driven Implicit Information ExtractionKnowledge-driven Implicit Information Extraction
Knowledge-driven Implicit Information Extraction
 
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
Hemant Purohit PhD Defense: Mining Citizen Sensor Communities for Cooperation...
 
A Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine PerceptionA Semantics-based Approach to Machine Perception
A Semantics-based Approach to Machine Perception
 
Automatic Emotion Identification from Text
Automatic Emotion Identification from TextAutomatic Emotion Identification from Text
Automatic Emotion Identification from Text
 
Mining and Analyzing Subjective Experiences in User-generated Content
Mining and Analyzing Subjective Experiences in User-generated ContentMining and Analyzing Subjective Experiences in User-generated Content
Mining and Analyzing Subjective Experiences in User-generated Content
 
Prateek Jain's Dissertation Defense - Linked Open Data Alignment and Querying
Prateek Jain's Dissertation Defense - Linked Open Data Alignment and QueryingPrateek Jain's Dissertation Defense - Linked Open Data Alignment and Querying
Prateek Jain's Dissertation Defense - Linked Open Data Alignment and Querying
 
Ashutosh Jadhav PhD Defense: Knowledge Driven Search Intent Mining
Ashutosh Jadhav PhD Defense: Knowledge Driven Search Intent MiningAshutosh Jadhav PhD Defense: Knowledge Driven Search Intent Mining
Ashutosh Jadhav PhD Defense: Knowledge Driven Search Intent Mining
 
PhD thesis defense of Christopher Thomas
PhD thesis defense of Christopher ThomasPhD thesis defense of Christopher Thomas
PhD thesis defense of Christopher Thomas
 
Pablo Mendes' Defense: Adaptive Semantic Annotation of Entity and Concept Men...
Pablo Mendes' Defense: Adaptive Semantic Annotation of Entity and Concept Men...Pablo Mendes' Defense: Adaptive Semantic Annotation of Entity and Concept Men...
Pablo Mendes' Defense: Adaptive Semantic Annotation of Entity and Concept Men...
 
Contrast Pattern Aided Regression and Classification
Contrast Pattern Aided Regression and ClassificationContrast Pattern Aided Regression and Classification
Contrast Pattern Aided Regression and Classification
 
PhD thesis defense of Ajith Ranabahu
PhD thesis defense of Ajith RanabahuPhD thesis defense of Ajith Ranabahu
PhD thesis defense of Ajith Ranabahu
 
Cartic Ramakrishnan's dissertation defense
Cartic Ramakrishnan's dissertation defenseCartic Ramakrishnan's dissertation defense
Cartic Ramakrishnan's dissertation defense
 
Personalized and Adaptive Semantic Information Filtering for Social Media - P...
Personalized and Adaptive Semantic Information Filtering for Social Media - P...Personalized and Adaptive Semantic Information Filtering for Social Media - P...
Personalized and Adaptive Semantic Information Filtering for Social Media - P...
 

Similar to For Critical Infrastructure Protection

str-w04_next-wave-of-security-operationalization
str-w04_next-wave-of-security-operationalizationstr-w04_next-wave-of-security-operationalization
str-w04_next-wave-of-security-operationalization
peter lam
 
Track-2307_KUKREJA.potx
Track-2307_KUKREJA.potxTrack-2307_KUKREJA.potx
Track-2307_KUKREJA.potx
Puneet Kukreja
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
ChristopherSumner7
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
awish11
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security Sensemaking
Anita D'Amico
 

Similar to For Critical Infrastructure Protection (20)

Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?Securing 100 products - How hard can it be?
Securing 100 products - How hard can it be?
 
Attacks on Critical Infrastructure: Insights from the “Big Board”
Attacks on Critical Infrastructure: Insights from the “Big Board”Attacks on Critical Infrastructure: Insights from the “Big Board”
Attacks on Critical Infrastructure: Insights from the “Big Board”
 
str-w04_next-wave-of-security-operationalization
str-w04_next-wave-of-security-operationalizationstr-w04_next-wave-of-security-operationalization
str-w04_next-wave-of-security-operationalization
 
Track-2307_KUKREJA.potx
Track-2307_KUKREJA.potxTrack-2307_KUKREJA.potx
Track-2307_KUKREJA.potx
 
inSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdfinSOC Sales Deck Dec 2020.pdf
inSOC Sales Deck Dec 2020.pdf
 
What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?What Is Next-Generation Endpoint Security and Why Do You Need It?
What Is Next-Generation Endpoint Security and Why Do You Need It?
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccfAdaptive & Unified Approach to Risk Management & Compliance-via-ccf
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
 
Detect Threats Faster
Detect Threats FasterDetect Threats Faster
Detect Threats Faster
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Integrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk ManagementIntegrating Cybersecurity into Supply Chain Risk Management
Integrating Cybersecurity into Supply Chain Risk Management
 
Be the Hunter
Be the Hunter Be the Hunter
Be the Hunter
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
Cybersecurity Skills Audit
Cybersecurity Skills AuditCybersecurity Skills Audit
Cybersecurity Skills Audit
 
Secure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security SensemakingSecure Decisions - Cyber Security Sensemaking
Secure Decisions - Cyber Security Sensemaking
 
AppSec Awareness: A Blueprint for Security Culture Change
AppSec Awareness: A Blueprint for Security Culture ChangeAppSec Awareness: A Blueprint for Security Culture Change
AppSec Awareness: A Blueprint for Security Culture Change
 
Hardening the cloud : Assuring agile security in high-growth environments
Hardening the cloud : Assuring agile security in high-growth environmentsHardening the cloud : Assuring agile security in high-growth environments
Hardening the cloud : Assuring agile security in high-growth environments
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
Adaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven ApproachAdaptive Security and Incident Response - A Business-Driven Approach
Adaptive Security and Incident Response - A Business-Driven Approach
 
AWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWSAWS live hack: Atlassian + Snyk OSS on AWS
AWS live hack: Atlassian + Snyk OSS on AWS
 

More from Priyanka Aash

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 

For Critical Infrastructure Protection

  • 1. SESSION ID: #RSAC Timothy Lee Cyber Security Operations Center (CSOC) for Critical Infrastructure Protection CXO-F02 CISO City of Los Angeles @tswlj316
  • 2. #RSAC AGENDA  Introduction  Why do we need Cyber Security Operations Center (CSOC)?  How did we sell it?  How did we implement it?  Results  Summary 2
  • 4. #RSAC The Port of Los Angeles  7,500 acres, 43 miles of waterfront, 270 berths, 23 cargo terminals, moving 8 million Twenty-foot Equivalent (TEU) per year  Busiest container port in US  $300 billion cargo value per year  $23 billion tax revenue per year  1.2 million jobs throughout CA  3.6 million jobs throughout the US  Identified by DHS as nation’s critical infrastructure 4
  • 5. #RSAC The Project – CSOC  Project Cost: $2.2 million  Source of Funding: FEMA Port Security Grant Program (PSGP) FY 2012 (80/20)  Project began: December 2013  Project completed: August 2014  Winner of 2014 American Association of Port Authorities (AAPA) Information Technology Award of Excellence 5
  • 6. #RSAC The Project - CSOC  Technology/Services Included:  incident/threat Management  intrusion detection/prevention  security analytics  APT defense  network access control  network traffic aggregation and visibility  digital forensics  facility design and build 6
  • 7. #RSAC Why did we need CSOC? 7
  • 8. #RSAC Nation’s Critical Infrastructure  President’s Executive Order (EO) 13636 - Improving Critical Infrastructure Cybersecurity  Presidential Policy Directive (PPD) 21 - Critical Infrastructure Security and Resilience  Mayor of Los Angeles’ Executive Directive No. 2 on Cybersecurity
  • 9. #RSAC Problem  IT Security team is understaffed  Dispersed log capturing capabilities  Minimal use of collaboration tools  High value assets are not identified or tracked  Lack of Incident Management System and IR training  A threat intelligence program does not exist  Incident workflow process and procedures  Limited operational metrics  Heavy reliance on vendor auto-updating of security tools  Growing Cyber Threats 9
  • 10. #RSAC Solution – CSOC 10 Staff Tools & Technology Facility Processes & Procedures CSOC
  • 11. #RSAC How did we sell it? 11
  • 12. #RSAC How did we sell it?  Prepare to answer why you need CSOC  Security Audit Report (Recommendation and Action Plan)  Compliance Gap Assessment Report  Security metrics (numbers of intrusion attempts, incidents, outages caused by incidents, top attackers, threat activity and trends etc.  Present it from the business risk perspective  Engage others outside of IT to also help sell it for us  Provide potential risks of not implementing CSOC  Provide real-world examples of cyber incidents and costs that your audience can relate to  Provide source of funding for implementation and operations  Align results to organizational goals
  • 13. #RSAC How did we implement it? 13
  • 15. #RSAC Tools and Technology  Incident/Threat Management  Intrusion Detection/Prevention  Security Analytics  APT Defense  SIEM  Network Access Control  Network traffic aggregation and visibility  Digital Forensics 15
  • 16. #RSAC Technology Integration 16 Log/Event Sources • Checkpoint • SourceFire • Juniper SSL VPN • ForeScout • AD Event Logs • FireEye • IronPort • Symantec Endpoint Protection • Syslogs Threat Intel Feeds • MS-ISAC Feeds • RSA Live Feeds • In-house Threat Feeds DataSources Correlation&Analysis Situational Awareness, Metrics & Workflow
  • 18. #RSAC CSOC RACI 18 Activity L1 Analyst L2 Analyst Content Admin SOC Manager CISO Asset Owner IT Help Desk Initiate Incident Remediation R R A Define Remediation Requirements I R A Plan Remediation I C A R R Perform Remediation I C A R R R – Responsible A – Accountable C – Consulted I - Informed
  • 19. #RSAC Processes & Procedures  SOC Operations Manual (Run Book)  SOC Policies  Incident Service Level Objective Policy  Incident Escalation Policy  Critical Incident Declaration Policy  Incident Response Plan  Level 1 , Level 2 Workflows  Critical Incident Management  Reporting and Metrics  CISO Dashboard, SOC Manager Dashboards  Situational Awareness, Daily Analysis Report 19
  • 20. #RSAC Facility Build Requirements  Room Specifications  Length – 19’, Width 15’, Height – 20’  Physical Security – Badge access, Privacy window film  Power requirements  Air conditioning  Electrical and network requirements 20
  • 21. #RSAC Facility Build Requirements - Continued  SOC Room Consoles  Remote Graphics Unit (RGU)  Video Display Wall  6 LED-based 55” full HD ultra narrow bezel arranged 2-high by 3-wide  Display wall controller  DVI cabling  Cabling and mounting hardware  The wall needed to be structurally enforced to hold the weight of the displays  Audio System 21
  • 26. #RSAC Dashboard 1 - Overview 26
  • 27. #RSAC Dashboard 2 – National Cybersecurity Posture 27
  • 28. #RSAC Dashboard 4 – Malware 28
  • 30. #RSAC The Project was featured in Seaports Magazine 30
  • 31. #RSAC Apply  Conduct SOC readiness assessment before anything  Look for grant opportunities  Pick the right tools and technology  Be mindful of Operating Cost  Pick the right contractor  Pick the right team. Invest in people  Cybersecurity collaboration and information sharing are essential 31
  • 32. #RSAC Resources  Security Operation Center Concepts & Implementation – Renaud Bidou  Cybercrime Kill Chain vs Defense Effectiveness – Stefan Frei, Phd; Francisco Artes – NSS Labs  Ten Strategies of a World-Class Cybersecurity Operations Center – Carson Zimmerman, October 2014  Building An Intelligence Driven Security Operations Center – RSA Technical Brief, June 2014
  • 33. #RSAC Timothy Lee, CISSP PMP CISO City of Los Angeles timothy.lee@lacity.org www.linkedin.com/in/timothyswlee 33