SlideShare a Scribd company logo
1 of 77
Download to read offline
Incident Response
Requires Superhumans
Presented by

Dinesh O Bareja
&
Vineet Kumar
Dubai, October 30, 2013
• 2010 (base year)
• 2011
• 2012 ... NOW ?

Incident Response Requires Superhumans

Audience Profiling

• How many CISOs
• How many IS Managers
• How many pure play Incident Managers
• How many CISO/ISM with IM responsibility
()
• Do you sleep well …
• Overview: InfoSec Evolution / History
• Exponentially Growing Expectations
• Superhumans in Enterprise and LEA
• Superhuman: why, how..
• Today’s Takeaway – Risks and being a SH

Incident Response Requires Superhumans
Even a young
man has to use
a walking stick !

Technology advancement has brought about dramatic change
in life and work and continues it’s march of dynamic growth
It was an era of innocence and invention when computing
started upto the time when the internet was unveiled

Over the years it has metamorphosed into a force we are still
trying to understand and has brought with it ‘great
expectations’ from the human beings who are in charge!
Incident Response Requires Superhumans
http://www.geeksaresexy.net/2013/04
/26/the-evolution-of-essentials-comic/

Incident Response Requires Superhumans
http://www.geeksaresexy.net/2013/04
/26/the-evolution-of-essentials-comic/

Incident Response Requires Superhumans
Jokes apart, coming back to serious business..
To relive the past, we will (briefly) look at the
growth, maturity and metamorphoses of some
practices, solutions, strategies and technologies.

Incident Response Requires Superhumans
• Information Security yet to be discovered
but phone phreaking was around
• Security meant securing areas where
computers were housed
• System security meant administrator control
on who could write – edit – delete data
• Data breach prevention was through
controlled access to printer room
• Compliance was the accountants job
Incident Response Requires Superhumans
• Ides of March1992 – Michaelangelo virus
• Y2K
• 1994 ISACA (from earlier avatars of ’67, ‘69)
• Viruses to APTs
• Security lives are ruled by GRC, CIA Triad,
PDCA Cycle, MM, ROSI, KPI
• Compliance means regulatory and internal
policies and audit findings
Incident Response Requires Superhumans
• These all morph into professional art forms …
Risk Management, Incident Management,
Configuration Management, Problem…
Patch… Access… Change…

Incident Response Requires Superhumans
Virus – Worm – Trojan - Malware – Rootkit –
Backdoor - Botnets - APT
NMS – SIEM – Network Forensics
Simple Access Control – IDAM / SSO / Privilege
User Management / Provisioning…
LAN, WAN, Virtualization, Fabric, Wireless, Cloud
dBase, Lotus, Access, Excel, MS SQL, MySQL,
Oracle
Incident Response Requires Superhumans
http://movetheworld.wordpress.com/2008/01/16/evolution-of-information-security-technologies/
Incident Response Requires Superhumans
• Illiterate Messengers deliver written
messages so they cannot copy or read
• Cutting off a messenger’s tongue to disable
gossip risk
• Da Vinci’s ‘cryptex’ device
• Shoot the messenger
• Encrypted messages, smoke signals
• Eunuchs to protect Harems
Incident Response Requires Superhumans
Incident Response Requires Superhumans
risks – tech / business

flight timings

sales

what phone to buy/gift

global events

how to do a web checkin

gadgets

…….

people issues

enterprise targets
enterprise finance
all processes

business

onboarding /exits
background checks

compliance liabilities

IT networks
org growth

systems
© freedigitalphotos (royaltyfree, attribution)

contribute ideas
email

Incident Response Requires Superhumans
In fact the
CISO is still a
combined
responsibility
in a number of
small / midsized
organizations
Incident Response Requires Superhumans
Incident Response Requires Superhumans
Incident Response Requires Superhumans
Incident Response Requires Superhumans
• Overview: InfoSec Evolution / History

•Exponentially Growing
Expectations
• Superhumans in Enterprise and LEA
• Superhuman: why, how..
• Today’s Takeaway – Risks and being a SH

Incident Response Requires Superhumans
Incident Response Requires Superhumans
Incident Response Requires Superhumans
Incident Response Requires Superhumans
Incident Response Requires Superhumans
• Standards : ISO27001, ITIL, ISO20000,
ISO22301, OWASP Top 10, SOX, SSAE16/SAS-70, HIPAA.. + regulatory
requirements + policies
• SANS-CSC…. According to SANS ~73%
respondents are aware of SANS-CSC and
have adopted or are planning to… and the
primary driver is to improve enterprise
visibility and reduce security incidents
Incident Response Requires Superhumans
1.

2.
3.
4.
5.
6.
7.
8.
9.
10.

Inventory of Authorized and
Unauthorized Devices
Inventory of Authorized and
Unauthorized Software
Secure Configurations for Hardware
and Software on Mobile Devices,
Laptops, Workstations, and Servers
Continuous Vulnerability Assessment
and Remediation
Malware Defenses
Application Software Security
Wireless Device Control
Data Recovery Capability
Security Skills Assessment and
Appropriate Training to Fill Gaps
Secure Configurations for Network
Devices such as Firewalls, Routers, and
Switches

11.

12.
13.
14.
15.
16.

17.
18.
19.

20.

Critical Control 11: Limitation and Control of
Network Ports, Protocols, and Services
Critical Control 12: Controlled Use of
Administrative Privileges
Critical Control 13: Boundary Defense
Critical Control 14: Maintenance,
Monitoring, and Analysis of Audit Logs
Critical Control 15: Controlled Access Based
on the Need to Know
Critical Control 16: Account Monitoring and
Control
Critical Control 17: Data Loss Prevention
Critical Control 18: Incident Response and
Management
Critical Control 19: Secure Network
Engineering
Critical Control 20: Penetration Tests and
Red Team Exercises

Incident Response Requires Superhumans
• Overview: InfoSec Evolution / History
• Exponentially Growing Expectations

•Superhumans in
Enterprise and LEA
• Superhuman: why, how..
• Today’s Takeaway – Risks and being a SH

Incident Response Requires Superhumans
Incident Response Requires Superhumans
•
•
•
•
•
•
•
•
•
•
•
•

Company Policies, DR
Analytical Tools: RCA, SWOT etc
Business Operations & Depts
IT Operations
Applicable Laws, Regulations
Databases
Applications
Hardware
Malware, APT
Forensics investigation
Forensic analysis
Evidence collection, preservation..

•
•
•
•
•
•
•
•
•
•
•
•

SIEM, DLP, IPS/IDS, UTM
Log Analysis
Phishing
Windows, Linux (AIX, UX, MacOS)
Android, iOS, Symbian, BB
Mobile devices incl laptops
Network devices – firewalls etc
Configuration and hardening
Know all patches from year 0 (BC)
VAPT
Web servers, AD, MS Exchange
… more….

Incident Response Requires Superhumans
• Can Work under pressure
• Can go on without sleep, food or..
• Can walk in sleep
• Excellent communication skills
• Can win over and influence anyone
• Multi-lingual: geekspeak, normal-speak,
baby-speak

Incident Response Requires Superhumans
• Life is a bummer
• One has to have all that the IM has…. Plus:
• Deep knowledge and understanding of
Law (domestic/international) and statutes
• Criminal modus operandi
• ATM, Credit cards, financial fraud, email,
internet banking, data breach, IP theft,
espionage, social media crimes
Incident Response Requires Superhumans
• Traditional Policing

+

• Cyber Crime Investigation
• Cyber Security & Cyber
Forensics
• Cyber Forensics (Network,
Mobile, Cloud etc)
• Reverse Engineer &
Troubleshooter
• Evidence Handling &
presentation in the court of
law

• Cyber Intelligence, Social
Media Intel
• Security Researcher
• WhatsApp, Wechat, Viber
• Interception
• Excellent Presenter
• Trainer
• Participating in
International & National
Conferences
• CDR, Tower dump analysis,
location mapping
• CCTV Camera recording
recovery

Incident Response Requires Superhumans
• Good Negotiator, Facilitator
• Can Pitch for Funds
• Prepare RFP’s
• Event Manager
• Response in a flash expected
• Good magician (cracking Symmetric,
Asymmetric encryption, password hashes
within seconds)
• Software Developer, Programmer
• And the list goes on……
Incident Response Requires Superhumans
Incident Response Requires Superhumans
Incident Response Requires Superhumans
Incident Response Requires Superhumans
PRE-INCIDENT PREPARATION

RESPONSE

POST-INCIDENT

Identify Legal, Regulatory Obligations

Contain, Restore,
Quarantine

Clean Up and
Dispose

Evidence
Collection

Root Cause
Analysis

Identify
Weaknesses

Recommend
Changes

Forensic
Response

Update CMDB,
Risk Register

Policy
Development

Governance and
Awareness

CERT
Enablement

Threat
Intelligence

Tabletop Testing

Advanced Threat
Preparedness

Vendor
Enablement

Communication
Plan

Disciplinary Actions, Report to LEA

Incident Response Requires Superhumans
Incident Response Requires Superhumans
Incident Response Requires Superhumans
PREVENTIVE
ACTIVITIES

TECHNOLOGY CRIME (INCIDENT)
RESPONSE

POST-INCIDENT

Crime /Threat
Intelligence

Complaint Registration

Chain of
Custody

Response Team
Training

Categorization & Case Assignment

Crime Scene Visit, Evidence Collection

Evidence
Integrity
Arrests and
Case Filing

Information
Sharing

Technical
Investigation

Forensic
Investigation

Advisories and
Awareness

International
Vectors

Data
Extraction

Departmental
Report

Citizen
Outreach

Domestic
Vectors

Forensic
Analysis

Statistical
Update

Obtain Service Provider Evidence
Analysis and Report Preparation

Incident Response Requires Superhumans
•
•
•
•
•

•
•
•
•
•

6 complaints gets registered daily on our helplines
1.5 Crore Fraud
Cyber Stalking – Big Boss Contestant, Aashka Garodia
Email Threats – Anil Ambani
Facebook Case ( Fake Profile, Confession Pages, Fraud
Pages)
Cases reported statewide
Nigerian Scam
Credit / Debit Card Frauds
POS fraud – Car polish Scam
Cyber Attacks: Botnet, DOS, DDOS
Incident Response Requires Superhumans
• Day to Day traditional crime control
• Crime investigation (Murder, Dacoity,
Stalking, Threats etc)
• Raids
• Interrogation
• Intelligence Gathering
• Chain of custody
• Presentation in the court of law
Incident Response Requires Superhumans
• MS In Information & Cyber Forensics
• Well versed with the latest technologies and
research
• Programmer
• Malware Researcher

Incident Response Requires Superhumans
• Overview: InfoSec Evolution / History
• Exponentially Growing Expectations
• Superhumans in Enterprise and LEA

•Superhuman: why, how..
• Today’s Takeaway – Risks and being a SH

Incident Response Requires Superhumans
Incident Response Requires Superhumans
• Build threat intelligence capability
• Subscribe to mailing lists, attend
conferences, read, get certified, write
• Automate network monitoring with NMS,
DLP, SIEM, Network Forensics etc
• Risk Threats and Vulnerability Management
• Information Sharing
• Breach advisories and CERT bulletins
Incident Response Requires Superhumans
• The Incident Manager is informed about an
incident and decides whether it is an
incident or not before blowing the
whistle !
• Sets Incident priority
• Triage
• Pray !

Incident Response Requires Superhumans
• Set up war room
• Mobilize cross functional IM team
• Rollout containment procedures
• Initiate Communication plan
• Mobilize vendors
• Follow up with recovery and eradication
procedures
• Visit incident site, collect and save evidence
Incident Response Requires Superhumans
• Forensic Analysis
• Reporting to Authorities and Police
• Internal Root Cause Analysis
• Prepare Management Report
• Recommendations for improvement
• Obtain permissions and budget
• Update systems, policies and controls
Incident Response Requires Superhumans
Incident Response Requires Superhumans
Incident Response Requires Superhumans
Incident Response Requires Superhumans
• Phd/MS in Information Security
• Cyber Security Researcher
• Knowledge about 0 Days, APTs, Vulnerability Assessment,
Penetration Testing, Source Code Auditing, Web
• Data Analytics
• BigData
• Cloud Computing
• Cyber Security
• Cyber Defence
• Cyber Forensics (Network, Mobile, Tablet, Satphones, Gogles)
• Cyber law Expert

Incident Response Requires Superhumans
• Overview: InfoSec Evolution / History
• Exponentially Growing Expectations
• Superhumans in Enterprise and LEA
• Superhuman: why, how..

•Today’s Takeaway – Risks
and being a SH
Incident Response Requires Superhumans
• Capability and Capacity development in
Private sector is slow and in Government
sector it is slower
• Skills required are multi faceted and can
ONLY be acquired by hard core practical
on-the-job hands-on experience
• Institutes and training programs yet to be
developed to impart some skills, or, show
the path to aspirants
Incident Response Requires Superhumans
risks – tech / business

flight timings

sales

what phone to buy/gift

global events

…….

gadgets

…….

people issues

enterprise targets
enterprise finance
all processes

business

onboarding /exits
background checks

compliance liabilities

IT networks
org growth

systems
© freedigitalphotos (royaltyfree, attribution)

contribute ideas
email

Incident Response Requires Superhumans
In the near future, a bigger challenge:
Internet of Things

Incident Response Requires Superhumans
Incident Response Requires Superhumans
http://www.intel.com/content/www/us/en/intelligent-systems/iot/internet-of-things-infographic.html
Incident Response Requires Superhumans
• Re-learn continuous learning … you did it
passionately when you were junior, you
did it to rise – then why did you stop!
• Recognize your skill and strength….
Information Security is not an apology. It is
no longer a support function for a support
function. It is an essential function and high
time this is recognized by management
Incident Response Requires Superhumans
Information / Data Security is a
dynamic
domain,
constantly
changing hues and continually
exciting.

Practitioners, researchers, hackers,
auditors constantly face up to
new challenges

Incident Response Requires Superhumans
And we want to take
this opportunity to
present our unit – Cyber
Defence Research
Centre & Cyber Peace
Foundation
Incident Response Requires Superhumans
CDRC is a joint initiative of the Government of
the State of Jharkhand (India) and Jharkhand
Police.
The unit is operational since January 2012.
It is the first of it’s kind organization in the
country, and (probably) the ninth in the
world
Incident Response Requires Superhumans
Incident Response Requires Superhumans
Technology Research,
System Dev & Deployment

Cyber Patrol

eSamadhan
Citizen Outreach Tollfree
Helpline

PROTECTION

DETECTION

LEA Training,
Capacity &
Capability
Building

Statewide Security
Awareness program
for children,
citizens, industry

CDR Analysis, IMS,
Cyber Lab, VA/PT,
AppSec, Digital
Forensics

1

EDUCATION
eRaksha

Intelligence Gathering,
Honeynets

PREVENTION

INVESTIGATION

JH CERT
Incident Response,
Advisories,
Responsible Disclosure
Incident Response Requires Superhumans

eKavach
Critical Infrastructure
Protection – Training,
Intel, Response and
Knowledge Sharing
Law Enforcement

Investigation, Response, Evidence Gathering, Forensics, Cyber Policing

Jharkhand Secure

State Infrastructure Protection, Department al IT Security, State CERT

Technical Services

VA/PT, Application Security Testing, Technology Evaluation

Training
Public Outreach
Research

National Security

State Police, Judiciary and Govt, CID, CBI, NPA, IB,

Awareness, Toll free helpline, eSamadhan, Cyber café controls, ATM security

Cyber Patrol, India Honeynetwork, SCADA and Spam Honeynets,

National Infrastructure Protection under CIIP, Responsible Disclosure

Incident Response Requires Superhumans
OCTOBER
SCADA honeypot
development

AUGUST

APRIL
Moved into CDRC
Building, PHQ
Ranchi

FEBRUARY
Launch eSamadhan,
manual CDR analysis,
IMEI database, Lost
mobile cases
Establishment Planning
System Development:
Internet Monitoring
System and CDR +
Location Mapping
Analysis System

Program Launches:
- Judiciary Training
- “eKavach” Critical
Infrastructure
Protection
- Online knowledge
base for Cyber café
owners re open
source
- Bi lingual safety
guidelines for
Government
employees, parents
and children

JUNE
eKavach onsite
assessment at HEC

CID Training launch

India honeynetwork setup
with five sensors
CISF, RPF training
ATS interaction re cyber
security

NOVEMBER

Team Augmentation
and orientation

2012
09 JANUARY
Formation Day

MARCH
Jharkhand Cyber Café Rules
sent to Home Dept
Development of cyber café
software and Cyber Café
guidelines for owners

eRaksha program
launched

Event Partner
c0c0n 2012 ,
Thiruvananthpuram

MAY
ATM, Cyber Café
statewide Threat
Survey
Wi-fi War driving

Case: Interstate
credit card fraudsters
interrogated
Disclosure – threat to
CBI central server

Team training for
forensics tools

ISO 27001 Audit of Police Data
Center
Internal team training

Joint Meeting – Home
Dept, SB Jharkhand
Police, All Banks

JULY

JANUARY
High profile cases –
Hazaribagh (Sonia
Gandhi email threat)

Testing Vulnerability
disclosure system

Incident Response Requires Superhumans

SEPTEMBER
Cyber Lab setup
plan at PTC
Development for
Responsible
Disclosure system
Training delivery at
NPA

DECEMBER
Citizen Helpline
Toll free number
activated
1800-3456-533
Cyber Surveillance,
Social Media
Intelligence

Internet Monitoring, Social media Intelligence, Inputs
from cyber patrol and threat intelligence, Intelligence
from Social media (Orkut, Facebook, Linkedin, Twitter
etc.)

Critical Infrastructure
Protection

Inventory, response procedures and proactive security
training

Responsible Disclosure Vulnerability disclosure and intelligence information to
and Threat Intelligence affected parties
Public Helpline

Web based and toll free helpline

Research

Indian Honeynet collection and malware analysis

Cyber Patrol

Underground intelligence gathering activities
Incident Response Requires Superhumans
Incident Response Requires Superhumans
• Cyber Peace foundation, a NGO is founded by
senior officials of Jharkhand Police & experts to
promote information sharing between LEA
across countries to promote the public and
private partnership through it’s Public & Private
Partnership(PPP) through it’s Cyber Bridge
program
• Revealed for the first time today at ISACA Dubai
• Request all your support for this organization
Incident Response Requires Superhumans
ABOUT
US
CONTACT
INFORMATION
Incident Response Requires Superhumans
• Professional Positions

•
•
•
•
•

Pyramid Cyber Security & Forensics (Principal Advisor)
Jharkhand Police (Cyber Surveillance Advisor)
Open Security Alliance (Principal and CEO)
Bombay Stock Exchange (IGRC Technical Member)
Indian Honeynet Project (Founder)

• Professional skills and special interest areas

• Govt & Enterprise - Security Consulting, Advisory, Strategy,
Architecture, Analysis, Policy Development, Optimization
• Technologies - SOC, DLP, IRM, SIEM…
• Practices - Incident Response, SAM, Forensics, Regulatory
guidance, Government
• Blogger, Occasional columnist, wannabe photographer, research & survey
Incident Response Requires Superhumans
Contact Information
E: dinesh@opensecurityalliance.org

T: +91.9769890505

Twitter: @bizsprite

Facebook: dineshobareja

L: http://in.linkedin.com/in/dineshbareja

Also on Slideshare and Flickr

Acknowledgements & Disclaimer
Various resources on the internet have been referred to, to contribute to the information
presented here. Images have been acknowledged where possible and if we have infringed
on your rights it is unintentional – we assure you the immediate removal on being notified, of
any infringing material. The use (if any) of company names, brand names, trade marks is only
to facilitate understanding of the message being communicated - no claim is made to
establish any sort of relation (exclusive or otherwise) by the author(s), unless otherwise
mentioned. We apologize for any infraction, as this will be wholly unintentional, and
objections may please be communicated to us for remediation of the erroneous action(s).

A newer version of this presentation will be uploaded to Slideshare (dineshobareja).

Incident Response Requires Superhumans
• Professional Positions

•
•
•
•
•
•
•

Jharkhand Police – CTO & Head of CDRC
Cyber Peace Foundation – President (Honorary)
National Anti-Hacking Group (Founder)
Security Pulse – Honorary Advisor
Darnster – Honorary Advisor & Mentor
Attify – Honorary Advisor
Visiting Faculty for International & National Universities/Institutions
such as National Police Academy, Railway Staff College, College of
Millitary Engineering, Railway Staff College, Indian Institute of
Management, Indian Institute of Technology, Government of Gujarat

• Professional skills and special interest areas

• Ethical hacking, cybercrime, Cyber Intelligence, Cyber Forensics
• Intelligence, Forensics, Cyber Security, Cyber Defence, Cyber Crime
Investigation, Cyber Peace
Incident Response Requires Superhumans
• Awards

6 International, 11 National and 15 state level awards &
honors’
• Contact Information

• Email: cto@jhpolice.gov.in
• Phone: +91-9570000065
• L: http://in.linkedin.com/in/vineet707

Incident Response Requires Superhumans
• ENISA
• http://www.enisa.europa.eu/activities/cert/sup
port/incident-management
• http://tvtropes.org/pmwiki/pmwiki.php/Main/
GoalOrientedEvolution
• NIST
• http://www.intel.com/content/www/us/en/in
telligent-systems/iot/internet-of-thingsinfographic.html
• Google, Bing
Incident Response Requires Superhumans
Incident Response Requires Superhumans

More Related Content

What's hot

Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCDinesh O Bareja
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionDinesh O Bareja
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingDaniel P Wallace
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceInderjeet Singh
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark, CISSP, CISA
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOlivier Busolini
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas IndonesiaIGN MANTRA
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetRichardus Indrajit
 
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...Jane Alexander
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesStephen Cobb
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingKimberly Hood
 

What's hot (18)

Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Can Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRCCan Cyber Insurance Enforce Change in Enterprise GRC
Can Cyber Insurance Enforce Change in Enterprise GRC
 
ISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introductionISE - InfoSec Essentials .. an introduction
ISE - InfoSec Essentials .. an introduction
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Combating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial IntelligenceCombating Cyber Security Using Artificial Intelligence
Combating Cyber Security Using Artificial Intelligence
 
Julius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers MiserableJulius Clark is Making Criminal Hackers Miserable
Julius Clark is Making Criminal Hackers Miserable
 
Overview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in CybersecurityOverview of Artificial Intelligence in Cybersecurity
Overview of Artificial Intelligence in Cybersecurity
 
Trustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education CatalogTrustwave Cybersecurity Education Catalog
Trustwave Cybersecurity Education Catalog
 
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
2019-09-11 Workshop incident response n handling honeynet Universitas Indonesia
 
Information security
Information securityInformation security
Information security
 
IT compliance
IT complianceIT compliance
IT compliance
 
Cyber Six: Managing Security in Internet
Cyber Six: Managing Security in InternetCyber Six: Managing Security in Internet
Cyber Six: Managing Security in Internet
 
Funsec3e ppt ch05
Funsec3e ppt ch05Funsec3e ppt ch05
Funsec3e ppt ch05
 
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
#MCN2014 - Risk Management, Security, and Getting Things Done: Creating Win-W...
 
NCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and ResourcesNCSAM = Cyber Security Awareness Month: Trends and Resources
NCSAM = Cyber Security Awareness Month: Trends and Resources
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Best Practices for Security Awareness and Training
Best Practices for Security Awareness and TrainingBest Practices for Security Awareness and Training
Best Practices for Security Awareness and Training
 

Viewers also liked

Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India ReadyDinesh O Bareja
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITDinesh O Bareja
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked InDinesh O Bareja
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information SecurityDinesh O Bareja
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident ResponseDinesh O Bareja
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSDinesh O Bareja
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its PreventionDinesh O Bareja
 

Viewers also liked (7)

Cyberwar - Is India Ready
Cyberwar - Is India ReadyCyberwar - Is India Ready
Cyberwar - Is India Ready
 
Business - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of ITBusiness - IT Alignment Increases Value Of IT
Business - IT Alignment Increases Value Of IT
 
Mind Your Manners On Linked In
Mind Your Manners On Linked InMind Your Manners On Linked In
Mind Your Manners On Linked In
 
Indian Thoughts in Information Security
Indian Thoughts in Information SecurityIndian Thoughts in Information Security
Indian Thoughts in Information Security
 
Community Disaster Incident Response
Community Disaster  Incident ResponseCommunity Disaster  Incident Response
Community Disaster Incident Response
 
Common Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CSCommon Sense 101 - so much to learn about CS
Common Sense 101 - so much to learn about CS
 
Hacking And Its Prevention
Hacking And Its PreventionHacking And Its Prevention
Hacking And Its Prevention
 

Similar to Incident Response Requires Superhumans

Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...Graeme Wood
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityRishi Kant
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation♟Sergej Epp
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session Splunk
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilAndris Soroka
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for businessDaniel Thomas
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber SecurityAllen Zhang
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsIBM Security
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKelly Robertson
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account securityRaleigh ISSA
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...Andris Soroka
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksAngeloluca Barba
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteWork-Bench
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Preventioncentralohioissa
 

Similar to Incident Response Requires Superhumans (20)

Cybersecurity.pptx
Cybersecurity.pptxCybersecurity.pptx
Cybersecurity.pptx
 
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...Jd sherry howard a. schmidt   cyber crime, cyberspy, cyberwar - taking the le...
Jd sherry howard a. schmidt cyber crime, cyberspy, cyberwar - taking the le...
 
Cognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber securityCognitive automation with machine learning in cyber security
Cognitive automation with machine learning in cyber security
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
DSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_AprilDSS and Security Intelligence @IBM_Connect_2014_April
DSS and Security Intelligence @IBM_Connect_2014_April
 
Cyber security
Cyber securityCyber security
Cyber security
 
File000119
File000119File000119
File000119
 
Cyber security for business
Cyber security for businessCyber security for business
Cyber security for business
 
2015 Cyber Security
2015 Cyber Security2015 Cyber Security
2015 Cyber Security
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network InsightsNowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
Nowhere to Hide: Expose Threats in Real-time with IBM QRadar Network Insights
 
Keeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application SecurityKeeping Secrets on the Internet of Things - Mobile Web Application Security
Keeping Secrets on the Internet of Things - Mobile Web Application Security
 
Managing privileged account security
Managing privileged account securityManaging privileged account security
Managing privileged account security
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...DSS   ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
 
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS NetworksLessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit KeynoteGus Hunt's Work-Bench Enterprise Security Summit Keynote
Gus Hunt's Work-Bench Enterprise Security Summit Keynote
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 

More from Dinesh O Bareja

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers Dinesh O Bareja
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Dinesh O Bareja
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITDinesh O Bareja
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Dinesh O Bareja
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013Dinesh O Bareja
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in IndiaDinesh O Bareja
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security AwarenessDinesh O Bareja
 

More from Dinesh O Bareja (8)

WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers WFH Cybersecurity Basics Employees and Employers
WFH Cybersecurity Basics Employees and Employers
 
Cybersecurity 2.0
Cybersecurity 2.0Cybersecurity 2.0
Cybersecurity 2.0
 
Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing Basics in IT Audit and Application Control Testing
Basics in IT Audit and Application Control Testing
 
Finance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with ITFinance and Accounting professionals to bridge the gap with IT
Finance and Accounting professionals to bridge the gap with IT
 
Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0Bug Bounty Hunter's Manifesto V1.0
Bug Bounty Hunter's Manifesto V1.0
 
India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013India Top5 Information Security Concerns 2013
India Top5 Information Security Concerns 2013
 
OSA - Internet Security in India
OSA - Internet Security in IndiaOSA - Internet Security in India
OSA - Internet Security in India
 
20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness20100224 Presentation at RGIT Mumbai - Information Security Awareness
20100224 Presentation at RGIT Mumbai - Information Security Awareness
 

Recently uploaded

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 

Recently uploaded (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Incident Response Requires Superhumans

  • 1. Incident Response Requires Superhumans Presented by Dinesh O Bareja & Vineet Kumar Dubai, October 30, 2013
  • 2. • 2010 (base year) • 2011 • 2012 ... NOW ? Incident Response Requires Superhumans Audience Profiling • How many CISOs • How many IS Managers • How many pure play Incident Managers • How many CISO/ISM with IM responsibility () • Do you sleep well …
  • 3. • Overview: InfoSec Evolution / History • Exponentially Growing Expectations • Superhumans in Enterprise and LEA • Superhuman: why, how.. • Today’s Takeaway – Risks and being a SH Incident Response Requires Superhumans
  • 4. Even a young man has to use a walking stick ! Technology advancement has brought about dramatic change in life and work and continues it’s march of dynamic growth It was an era of innocence and invention when computing started upto the time when the internet was unveiled Over the years it has metamorphosed into a force we are still trying to understand and has brought with it ‘great expectations’ from the human beings who are in charge! Incident Response Requires Superhumans
  • 7. Jokes apart, coming back to serious business.. To relive the past, we will (briefly) look at the growth, maturity and metamorphoses of some practices, solutions, strategies and technologies. Incident Response Requires Superhumans
  • 8. • Information Security yet to be discovered but phone phreaking was around • Security meant securing areas where computers were housed • System security meant administrator control on who could write – edit – delete data • Data breach prevention was through controlled access to printer room • Compliance was the accountants job Incident Response Requires Superhumans
  • 9. • Ides of March1992 – Michaelangelo virus • Y2K • 1994 ISACA (from earlier avatars of ’67, ‘69) • Viruses to APTs • Security lives are ruled by GRC, CIA Triad, PDCA Cycle, MM, ROSI, KPI • Compliance means regulatory and internal policies and audit findings Incident Response Requires Superhumans
  • 10. • These all morph into professional art forms … Risk Management, Incident Management, Configuration Management, Problem… Patch… Access… Change… Incident Response Requires Superhumans
  • 11. Virus – Worm – Trojan - Malware – Rootkit – Backdoor - Botnets - APT NMS – SIEM – Network Forensics Simple Access Control – IDAM / SSO / Privilege User Management / Provisioning… LAN, WAN, Virtualization, Fabric, Wireless, Cloud dBase, Lotus, Access, Excel, MS SQL, MySQL, Oracle Incident Response Requires Superhumans
  • 13. • Illiterate Messengers deliver written messages so they cannot copy or read • Cutting off a messenger’s tongue to disable gossip risk • Da Vinci’s ‘cryptex’ device • Shoot the messenger • Encrypted messages, smoke signals • Eunuchs to protect Harems Incident Response Requires Superhumans
  • 15. risks – tech / business flight timings sales what phone to buy/gift global events how to do a web checkin gadgets ……. people issues enterprise targets enterprise finance all processes business onboarding /exits background checks compliance liabilities IT networks org growth systems © freedigitalphotos (royaltyfree, attribution) contribute ideas email Incident Response Requires Superhumans
  • 16. In fact the CISO is still a combined responsibility in a number of small / midsized organizations Incident Response Requires Superhumans
  • 20. • Overview: InfoSec Evolution / History •Exponentially Growing Expectations • Superhumans in Enterprise and LEA • Superhuman: why, how.. • Today’s Takeaway – Risks and being a SH Incident Response Requires Superhumans
  • 25. • Standards : ISO27001, ITIL, ISO20000, ISO22301, OWASP Top 10, SOX, SSAE16/SAS-70, HIPAA.. + regulatory requirements + policies • SANS-CSC…. According to SANS ~73% respondents are aware of SANS-CSC and have adopted or are planning to… and the primary driver is to improve enterprise visibility and reduce security incidents Incident Response Requires Superhumans
  • 26. 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers Continuous Vulnerability Assessment and Remediation Malware Defenses Application Software Security Wireless Device Control Data Recovery Capability Security Skills Assessment and Appropriate Training to Fill Gaps Secure Configurations for Network Devices such as Firewalls, Routers, and Switches 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. Critical Control 11: Limitation and Control of Network Ports, Protocols, and Services Critical Control 12: Controlled Use of Administrative Privileges Critical Control 13: Boundary Defense Critical Control 14: Maintenance, Monitoring, and Analysis of Audit Logs Critical Control 15: Controlled Access Based on the Need to Know Critical Control 16: Account Monitoring and Control Critical Control 17: Data Loss Prevention Critical Control 18: Incident Response and Management Critical Control 19: Secure Network Engineering Critical Control 20: Penetration Tests and Red Team Exercises Incident Response Requires Superhumans
  • 27. • Overview: InfoSec Evolution / History • Exponentially Growing Expectations •Superhumans in Enterprise and LEA • Superhuman: why, how.. • Today’s Takeaway – Risks and being a SH Incident Response Requires Superhumans
  • 29. • • • • • • • • • • • • Company Policies, DR Analytical Tools: RCA, SWOT etc Business Operations & Depts IT Operations Applicable Laws, Regulations Databases Applications Hardware Malware, APT Forensics investigation Forensic analysis Evidence collection, preservation.. • • • • • • • • • • • • SIEM, DLP, IPS/IDS, UTM Log Analysis Phishing Windows, Linux (AIX, UX, MacOS) Android, iOS, Symbian, BB Mobile devices incl laptops Network devices – firewalls etc Configuration and hardening Know all patches from year 0 (BC) VAPT Web servers, AD, MS Exchange … more…. Incident Response Requires Superhumans
  • 30. • Can Work under pressure • Can go on without sleep, food or.. • Can walk in sleep • Excellent communication skills • Can win over and influence anyone • Multi-lingual: geekspeak, normal-speak, baby-speak Incident Response Requires Superhumans
  • 31. • Life is a bummer • One has to have all that the IM has…. Plus: • Deep knowledge and understanding of Law (domestic/international) and statutes • Criminal modus operandi • ATM, Credit cards, financial fraud, email, internet banking, data breach, IP theft, espionage, social media crimes Incident Response Requires Superhumans
  • 32. • Traditional Policing + • Cyber Crime Investigation • Cyber Security & Cyber Forensics • Cyber Forensics (Network, Mobile, Cloud etc) • Reverse Engineer & Troubleshooter • Evidence Handling & presentation in the court of law • Cyber Intelligence, Social Media Intel • Security Researcher • WhatsApp, Wechat, Viber • Interception • Excellent Presenter • Trainer • Participating in International & National Conferences • CDR, Tower dump analysis, location mapping • CCTV Camera recording recovery Incident Response Requires Superhumans
  • 33. • Good Negotiator, Facilitator • Can Pitch for Funds • Prepare RFP’s • Event Manager • Response in a flash expected • Good magician (cracking Symmetric, Asymmetric encryption, password hashes within seconds) • Software Developer, Programmer • And the list goes on…… Incident Response Requires Superhumans
  • 37. PRE-INCIDENT PREPARATION RESPONSE POST-INCIDENT Identify Legal, Regulatory Obligations Contain, Restore, Quarantine Clean Up and Dispose Evidence Collection Root Cause Analysis Identify Weaknesses Recommend Changes Forensic Response Update CMDB, Risk Register Policy Development Governance and Awareness CERT Enablement Threat Intelligence Tabletop Testing Advanced Threat Preparedness Vendor Enablement Communication Plan Disciplinary Actions, Report to LEA Incident Response Requires Superhumans
  • 40. PREVENTIVE ACTIVITIES TECHNOLOGY CRIME (INCIDENT) RESPONSE POST-INCIDENT Crime /Threat Intelligence Complaint Registration Chain of Custody Response Team Training Categorization & Case Assignment Crime Scene Visit, Evidence Collection Evidence Integrity Arrests and Case Filing Information Sharing Technical Investigation Forensic Investigation Advisories and Awareness International Vectors Data Extraction Departmental Report Citizen Outreach Domestic Vectors Forensic Analysis Statistical Update Obtain Service Provider Evidence Analysis and Report Preparation Incident Response Requires Superhumans
  • 41. • • • • • • • • • • 6 complaints gets registered daily on our helplines 1.5 Crore Fraud Cyber Stalking – Big Boss Contestant, Aashka Garodia Email Threats – Anil Ambani Facebook Case ( Fake Profile, Confession Pages, Fraud Pages) Cases reported statewide Nigerian Scam Credit / Debit Card Frauds POS fraud – Car polish Scam Cyber Attacks: Botnet, DOS, DDOS Incident Response Requires Superhumans
  • 42. • Day to Day traditional crime control • Crime investigation (Murder, Dacoity, Stalking, Threats etc) • Raids • Interrogation • Intelligence Gathering • Chain of custody • Presentation in the court of law Incident Response Requires Superhumans
  • 43. • MS In Information & Cyber Forensics • Well versed with the latest technologies and research • Programmer • Malware Researcher Incident Response Requires Superhumans
  • 44. • Overview: InfoSec Evolution / History • Exponentially Growing Expectations • Superhumans in Enterprise and LEA •Superhuman: why, how.. • Today’s Takeaway – Risks and being a SH Incident Response Requires Superhumans
  • 46. • Build threat intelligence capability • Subscribe to mailing lists, attend conferences, read, get certified, write • Automate network monitoring with NMS, DLP, SIEM, Network Forensics etc • Risk Threats and Vulnerability Management • Information Sharing • Breach advisories and CERT bulletins Incident Response Requires Superhumans
  • 47. • The Incident Manager is informed about an incident and decides whether it is an incident or not before blowing the whistle ! • Sets Incident priority • Triage • Pray ! Incident Response Requires Superhumans
  • 48. • Set up war room • Mobilize cross functional IM team • Rollout containment procedures • Initiate Communication plan • Mobilize vendors • Follow up with recovery and eradication procedures • Visit incident site, collect and save evidence Incident Response Requires Superhumans
  • 49. • Forensic Analysis • Reporting to Authorities and Police • Internal Root Cause Analysis • Prepare Management Report • Recommendations for improvement • Obtain permissions and budget • Update systems, policies and controls Incident Response Requires Superhumans
  • 53. • Phd/MS in Information Security • Cyber Security Researcher • Knowledge about 0 Days, APTs, Vulnerability Assessment, Penetration Testing, Source Code Auditing, Web • Data Analytics • BigData • Cloud Computing • Cyber Security • Cyber Defence • Cyber Forensics (Network, Mobile, Tablet, Satphones, Gogles) • Cyber law Expert Incident Response Requires Superhumans
  • 54. • Overview: InfoSec Evolution / History • Exponentially Growing Expectations • Superhumans in Enterprise and LEA • Superhuman: why, how.. •Today’s Takeaway – Risks and being a SH Incident Response Requires Superhumans
  • 55. • Capability and Capacity development in Private sector is slow and in Government sector it is slower • Skills required are multi faceted and can ONLY be acquired by hard core practical on-the-job hands-on experience • Institutes and training programs yet to be developed to impart some skills, or, show the path to aspirants Incident Response Requires Superhumans
  • 56. risks – tech / business flight timings sales what phone to buy/gift global events ……. gadgets ……. people issues enterprise targets enterprise finance all processes business onboarding /exits background checks compliance liabilities IT networks org growth systems © freedigitalphotos (royaltyfree, attribution) contribute ideas email Incident Response Requires Superhumans
  • 57. In the near future, a bigger challenge: Internet of Things Incident Response Requires Superhumans
  • 60. • Re-learn continuous learning … you did it passionately when you were junior, you did it to rise – then why did you stop! • Recognize your skill and strength…. Information Security is not an apology. It is no longer a support function for a support function. It is an essential function and high time this is recognized by management Incident Response Requires Superhumans
  • 61. Information / Data Security is a dynamic domain, constantly changing hues and continually exciting. Practitioners, researchers, hackers, auditors constantly face up to new challenges Incident Response Requires Superhumans
  • 62. And we want to take this opportunity to present our unit – Cyber Defence Research Centre & Cyber Peace Foundation Incident Response Requires Superhumans
  • 63. CDRC is a joint initiative of the Government of the State of Jharkhand (India) and Jharkhand Police. The unit is operational since January 2012. It is the first of it’s kind organization in the country, and (probably) the ninth in the world Incident Response Requires Superhumans
  • 65. Technology Research, System Dev & Deployment Cyber Patrol eSamadhan Citizen Outreach Tollfree Helpline PROTECTION DETECTION LEA Training, Capacity & Capability Building Statewide Security Awareness program for children, citizens, industry CDR Analysis, IMS, Cyber Lab, VA/PT, AppSec, Digital Forensics 1 EDUCATION eRaksha Intelligence Gathering, Honeynets PREVENTION INVESTIGATION JH CERT Incident Response, Advisories, Responsible Disclosure Incident Response Requires Superhumans eKavach Critical Infrastructure Protection – Training, Intel, Response and Knowledge Sharing
  • 66. Law Enforcement Investigation, Response, Evidence Gathering, Forensics, Cyber Policing Jharkhand Secure State Infrastructure Protection, Department al IT Security, State CERT Technical Services VA/PT, Application Security Testing, Technology Evaluation Training Public Outreach Research National Security State Police, Judiciary and Govt, CID, CBI, NPA, IB, Awareness, Toll free helpline, eSamadhan, Cyber café controls, ATM security Cyber Patrol, India Honeynetwork, SCADA and Spam Honeynets, National Infrastructure Protection under CIIP, Responsible Disclosure Incident Response Requires Superhumans
  • 67. OCTOBER SCADA honeypot development AUGUST APRIL Moved into CDRC Building, PHQ Ranchi FEBRUARY Launch eSamadhan, manual CDR analysis, IMEI database, Lost mobile cases Establishment Planning System Development: Internet Monitoring System and CDR + Location Mapping Analysis System Program Launches: - Judiciary Training - “eKavach” Critical Infrastructure Protection - Online knowledge base for Cyber café owners re open source - Bi lingual safety guidelines for Government employees, parents and children JUNE eKavach onsite assessment at HEC CID Training launch India honeynetwork setup with five sensors CISF, RPF training ATS interaction re cyber security NOVEMBER Team Augmentation and orientation 2012 09 JANUARY Formation Day MARCH Jharkhand Cyber Café Rules sent to Home Dept Development of cyber café software and Cyber Café guidelines for owners eRaksha program launched Event Partner c0c0n 2012 , Thiruvananthpuram MAY ATM, Cyber Café statewide Threat Survey Wi-fi War driving Case: Interstate credit card fraudsters interrogated Disclosure – threat to CBI central server Team training for forensics tools ISO 27001 Audit of Police Data Center Internal team training Joint Meeting – Home Dept, SB Jharkhand Police, All Banks JULY JANUARY High profile cases – Hazaribagh (Sonia Gandhi email threat) Testing Vulnerability disclosure system Incident Response Requires Superhumans SEPTEMBER Cyber Lab setup plan at PTC Development for Responsible Disclosure system Training delivery at NPA DECEMBER Citizen Helpline Toll free number activated 1800-3456-533
  • 68. Cyber Surveillance, Social Media Intelligence Internet Monitoring, Social media Intelligence, Inputs from cyber patrol and threat intelligence, Intelligence from Social media (Orkut, Facebook, Linkedin, Twitter etc.) Critical Infrastructure Protection Inventory, response procedures and proactive security training Responsible Disclosure Vulnerability disclosure and intelligence information to and Threat Intelligence affected parties Public Helpline Web based and toll free helpline Research Indian Honeynet collection and malware analysis Cyber Patrol Underground intelligence gathering activities Incident Response Requires Superhumans
  • 70. • Cyber Peace foundation, a NGO is founded by senior officials of Jharkhand Police & experts to promote information sharing between LEA across countries to promote the public and private partnership through it’s Public & Private Partnership(PPP) through it’s Cyber Bridge program • Revealed for the first time today at ISACA Dubai • Request all your support for this organization Incident Response Requires Superhumans
  • 72. • Professional Positions • • • • • Pyramid Cyber Security & Forensics (Principal Advisor) Jharkhand Police (Cyber Surveillance Advisor) Open Security Alliance (Principal and CEO) Bombay Stock Exchange (IGRC Technical Member) Indian Honeynet Project (Founder) • Professional skills and special interest areas • Govt & Enterprise - Security Consulting, Advisory, Strategy, Architecture, Analysis, Policy Development, Optimization • Technologies - SOC, DLP, IRM, SIEM… • Practices - Incident Response, SAM, Forensics, Regulatory guidance, Government • Blogger, Occasional columnist, wannabe photographer, research & survey Incident Response Requires Superhumans
  • 73. Contact Information E: dinesh@opensecurityalliance.org T: +91.9769890505 Twitter: @bizsprite Facebook: dineshobareja L: http://in.linkedin.com/in/dineshbareja Also on Slideshare and Flickr Acknowledgements & Disclaimer Various resources on the internet have been referred to, to contribute to the information presented here. Images have been acknowledged where possible and if we have infringed on your rights it is unintentional – we assure you the immediate removal on being notified, of any infringing material. The use (if any) of company names, brand names, trade marks is only to facilitate understanding of the message being communicated - no claim is made to establish any sort of relation (exclusive or otherwise) by the author(s), unless otherwise mentioned. We apologize for any infraction, as this will be wholly unintentional, and objections may please be communicated to us for remediation of the erroneous action(s). A newer version of this presentation will be uploaded to Slideshare (dineshobareja). Incident Response Requires Superhumans
  • 74. • Professional Positions • • • • • • • Jharkhand Police – CTO & Head of CDRC Cyber Peace Foundation – President (Honorary) National Anti-Hacking Group (Founder) Security Pulse – Honorary Advisor Darnster – Honorary Advisor & Mentor Attify – Honorary Advisor Visiting Faculty for International & National Universities/Institutions such as National Police Academy, Railway Staff College, College of Millitary Engineering, Railway Staff College, Indian Institute of Management, Indian Institute of Technology, Government of Gujarat • Professional skills and special interest areas • Ethical hacking, cybercrime, Cyber Intelligence, Cyber Forensics • Intelligence, Forensics, Cyber Security, Cyber Defence, Cyber Crime Investigation, Cyber Peace Incident Response Requires Superhumans
  • 75. • Awards 6 International, 11 National and 15 state level awards & honors’ • Contact Information • Email: cto@jhpolice.gov.in • Phone: +91-9570000065 • L: http://in.linkedin.com/in/vineet707 Incident Response Requires Superhumans
  • 76. • ENISA • http://www.enisa.europa.eu/activities/cert/sup port/incident-management • http://tvtropes.org/pmwiki/pmwiki.php/Main/ GoalOrientedEvolution • NIST • http://www.intel.com/content/www/us/en/in telligent-systems/iot/internet-of-thingsinfographic.html • Google, Bing Incident Response Requires Superhumans