© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
© Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without n...
Upcoming SlideShare
Loading in …5
×

Retail security-services--client-presentation

598 views

Published on

My Retail Security Deck

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Retail security-services--client-presentation

  1. 1. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Evolveyour approachto retail security Enterprise Security Services
  2. 2. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.2 Name: Joseph Schorr Role: Strategic Security Architect Key Solution Area: Strategy, Health & Retail Industries Location: Largo, FL Contact Details: Joe.Schorr@hp.com +1 (727) 433-5018 Summary of Experience: Joe Schorr has over 17 years professional services and industry experience in Information Technology and Information Security. Before joining HP, Joe was the Principal Security Strategist and directed the InfoSec Practice for a Symantec Platinum Partner. As part of that role he was a full-time Resident working as a Product Manager at Symantec. Previously, as Managing Consultant for the British Telecom (BT) Ethical Hacking Center of Excellence he led an 11,000 hour PCI Compliance test for a large telco and led a dedicated Red Team that tested over 100 Web Apps per year for a Top 5 global bank. Prior to that, Joe was the CIO of a major non-profit for several years. He has performed many social engineering, physical security and network assessments over the years. Joe has been published and also presented on a range of topics including HIPAA, APTs, attacker mindset, social engineering, penetration testing, wireless security, enterprise risk management and security awareness at DefCON, GrrCon, DerbyCon and a number of other venues. Specific Technology or Solution Skills: • Advanced Threats Defense • ‘Offensive Security’ • Vulnerability and Risk Assessment • Cyber Warfare and Crime • Compliance Auditing and Remediation • Virtual CISO
  3. 3. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.3 Agenda The Retail Threat Environment Breach Detection /Imminent Threat Response Security Consulting Managed Security Services Threat Intelligence and Research
  4. 4. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.4 Discovery The adversary attack ecosystem Research Retail Enterprises Their ecosystem Infiltration Capture Exfiltration
  5. 5. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.5 0010110111 0001001101 Anatomy of the Retailer (Target) Breach Hacker researches target Selects HVAC vendor for phishing attack Steal passwords via Citadel Access Target’s internal servers & network via web portals using stolen credentials Use SQLi to deliver Malware to POS systems and servers CC data scraped using BlackPOS and sent to ‘owned’ internal staging server Data exported to external ‘Dump Server’ Credit cards ‘Dumps’ sold for $26 - $44 per credit card
  6. 6. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.6 Lessons Learned The growing attack surface allows for multiple avenues for compromise Respect the underground marketplace of ideas & weapons available to those willing to pay Expect to be compromised - have your incident response plans & processes been tested between all relevant stakeholders & groups? Integration between threat data, security events and intelligence is critical to making informed decisions How are the risks in your partner community measured and governed?
  7. 7. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.7 Discovery HP builds the capability to disrupt the market Research Retail Enterprises Their ecosystem Infiltration Capture Exfiltration Protecting the target asset Finding them Vendor Security Counter intel Blocking access Damage mitigation
  8. 8. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.8 HP ESS Perimeter Compromise Check Let’s find them Hybrid Service & Technology: • Two HP Security experts for two weeks onsite • Industry-leading hw/sw tools used inline on ingress/egress point to detect compromised hosts • Consultants focus on interviews and discussions with client to discuss security architecture, initiatives and response/mitigation strategies Internet DNS Proxy Infected Devices Firewall/Egress Point HP Sensor
  9. 9. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.9 HP Rapid Incident Response (RIR) Respond in real-time The challenge lies in effectively obtaining and applying the skills of experienced security incident responders in order to minimize the impact. This obstacle to success is only exacerbated by a lack of in-depth experience and the inability to gather and action threat data points as they are being created.
  10. 10. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.10 average time to detect breach243 days
  11. 11. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.11 RIR-enabled Solution DIS specialists become the driving point of threat detection, data collection, analysis, and remediation driving down time to mitigation and remediation and resultant impact.
  12. 12. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.12 HP RIR RIR / Proof of Concept DIS onsite demonstration of service and technologies • Less than a week on site • Limited scope of engagement • Used to − Identify “low hanging fruit” − Demonstrate HP hardware, software, and services − Demonstrate reduced time of response / investigation / resolution − Implementation of remediation • Single ‘box’ ready to deploy solution Active Threat Response Ad-hoc engagement of DIS team driving RIR technologies to affect a meaningful, timely resolution to a full breach • HP’s premier consulting service in real-world scenario with immediate client benefit • Single ‘box’ ready to deploy solution Deployed as Service DIS driving a fully configured and steady state deployment of services, hardware, and software • Fully solutioned service − DIS – Staffing, response, custom tuning − DIS – Monitoring and tuning − Threat intelligence – means of integrating new intel into operations • Implemented for full, multi- network coverage • Ability to scale to meet any size client One team solving many problems
  13. 13. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.13 How HP addresses the attacker ecosystem Disrupt the adversary• #1 in identifying security vulnerabilities and threats (Rated by Frost & Sullivan, top security vulnerability research organization) • Continuously finds more vulnerabilities than the rest of the market combined Manage risk & compliance • On average 92% of major incidents are resolved within 2 hours of identification with HP Managed Security Services - get ahead of threats & avoid costly non-compliance consequences. • Supplier Compliance Management (SCM) to mitigate common vendor-based breaches such a the recent retail breaches • HP Security has 5,000 security industry specialists, providing initial security assessments, security transformation programs and full environment management • HP’s scale gives unique understanding of legal, regulatory and compliance requirements . Threat Intelligence Security Consulting Managed Security Services Know the Adversary Manage Risk & Compliance Extend your Capabilities Services to strengthen security posture, proactively manage incidents and extend security capabilities Expertise to help clients understand, manage and reduce business and security risks. Actionable security intelligence through published reports, threat briefings and enhancements to the HP security portfolio
  14. 14. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.
  15. 15. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Appendix
  16. 16. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.16 Comprehensive threat intelligence and research • ~3000 researchers • 2000+ customers sharing data • 7000+ managed networks globally • Crowd sourced security intelligence • Leading security research • Continuously finds more vulnerabilities than the rest of the market combined • Tangible awareness of potential threats • Collaborative effort of market leading teams: DV Labs, ArcSight, Fortify, HPLabs, HPSR, Application Security Center • Collect network and security data from around the globe Ecosystem partners ESS HP Global Research
  17. 17. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.17 Providing enterprise-level, security-focused expertise Expertise to help clients understand, manage and reduce business and security risks. Security Consulting HP Security Consulting Advisory & Assessment Architecture & Design Security Transformation Programs Security Solution Integration
  18. 18. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.18 HP MSS and Security Operations Offerings to strengthen security posture, proactively manage incidents and extend security capabilities Managed Security Services
  19. 19. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.19 Industry leading scale Global Security Operations Centers Global SOC Planned regional SOC 8 Brazil China Japan MEMA India Australia Texas Costa Rica Virginia UK Malaysia Bulgaria Spain Philippines HP secured user accounts 47m Monthly security events 23b5000+ HP security professionals 10000+ HP Security customers
  20. 20. © Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.20 Enterprise Security Services Global Security Scale # 2 Trusted Brand 8 Global Cyber Centers 5000+ Professionals Innovative Security Solutions Governance, Risk & Compliance Security Breach Managed Security Services Leading Security Intelligence Actionable security intelligence through published reports, threat briefings and enhancements to the HP security portfolio DISRUPT- MANAGE - EXTEND

×