SlideShare a Scribd company logo
1 of 28
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
Title: 
Replacing the SOC with a modernized Cyber Intelligence 
Operations Center (CIOC) 
A paper by INFOSECFORCE 
804-855-4988 
infosecforce@yahoo.com
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
Introduction ......................................................................................................................................4 
Purpose ............................................................................................................................................4 
The Cyber Threat Situation..............................................................................................................5 
The CIOC Corrective Action Plan ....................................................................................................8 
Description our current SOC think ...................................................................................................9 
Big Data ….. what is it and what does it mean for security........................................................... 10 
Security industry reflection on managing the BD challenge...................................................... 10 
The IBM solution for Intelligence and Big Data...................................................................... 11 
Solution Overview ................................................................................................................... 11 
CIOC Operational description (draft) ............................................................................................. 17 
Intelligence management cycle ..................................................................................................... 17 
FBI Intelligence Cycle .................................................................................................................... 18 
“ Requirements ........................................................................................................................... 18 
Planning and Direction ............................................................................................................... 18 
Collection .................................................................................................................................... 19 
Processing and Exploitation....................................................................................................... 19 
Analysis and Production............................................................................................................. 19 
Dissemination ............................................................................................................................. 19 
Defense in Depth core function descriptions................................................................................. 19 
Predict attacks on an organization’s assets .............................................................................. 19 
Prevent attacks on an organization’s assets ............................................................................. 20 
Detect attacks on an organization’s assets ............................................................................... 21 
Respond to attacks on an organization’s assets ....................................................................... 22 
A CIOC Control Framework ........................................................................................................... 23 
SANS 20 Critical Controls ...................................................................................................... 24 
Summary ........................................................................................................................................ 24 
Future think Epilogue ..................................................................................................................... 25 
Appendix 1 The overall summary of a SOC organization...................................................... 26 
Other interesting references .......................................................................................................... 28
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
Figure 1 Defines the Defense in Depth approach to enterprise security .......................................5 
Figure 2 SC Magazine’s report on the staggering number of data breaches in the US ................8 
Figure 3 The IBM Intelligence and Big Data reference model ..................................................... 12 
Figure 4 RSA SIEM Envision reference model ............................................................................ 14 
Figure 5 Depicts the FBI Intelligence Management Cycle ........................................................... 18 
Figure 6 Depicts the CWE overall vulnerability management framework ( I love this image ) ... 22 
Table 1 Shows the integration of Controls, DID and Intelligence Management .......................... 24
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
Creating a Cyber Intelligence Operations Center 
(CIOC) and why it is needed to fight the undeclared 
Cyber War 
Introduction 
I am a retired Air Force Intelligence Officer. After the Air Force, I have had the good fortune to 
have worked at interesting jobs in the private sector in places like CSC at JP Morgan, The 
HSBC, the Federal Reserve, Northrop Grumman, and AIG/UGC. I am highly concerned about 
the fractured approach in various organizations for command and control processes and 
procedures to fight the global Cyber War as it relates to an organization’s vital information 
assets. I created this paper to suggest an organizational and process structure to dynamically 
manage the threat. If you manage a SOC or are in the business of building one, may I suggest 
you adopt the below suggested framework and change the name of the SOC to the CIOC. Here 
is my linked in connection: 
w ww.linkedin.com/pub/bill-ross/0/20b/a11 
Purpose 
We are fighting a global undeclared global cyber war. We are in a cyber warfare arms race 
between the offense and defense and how we deal with cyber thugs. We are using old 
methods, tools and structures to fight the expanding cyber war. To modernize our approach to 
fighting this war this paper will address replacing old think SOCs with the modern Cyber 
Intelligence Operations Center (CIOC). The CIOC will serve as the convergence organizational 
structure to integrate the Department of Defense type intelligence cycle, the organization’s 
defense in depth cyber battle management strategy, Big Data analytics and an organization’s 
control management framework. The CIOC is applicable to the private and public sectors. The 
CIOC is needed to: 
 modernize strategy, tactics, and procedures in the security profession, 
 integrate the new wave of security product intelligence and analytics inputs, 
 create the new paradigm for Cyber War Fighting in the private and public sectors,
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
 create common frameworks for information sharing between private and public sectors, 
 create an awareness of Cyber War Fighting strategy, doctrine, and tactics, 
 defeat the cyber enemy through the CIOC command and control of an organization’s 
cyber defense in depth 
The Cyber Threat Situation 
For numerous years, I emphasized that we should not use fear, uncertainty and doubt (FUD) to 
achieve our organizational security objectives. My belief is that one should make a logical 
business case based on metrics, return on investment and expected results to acquire new staff 
and increase our security tool budget. I have shifted my paradigm a bit and have begun 
stressing the lack of cyber warfare mobilization and threat management in the private sector in 
particular. Global organizations need to embrace and accept that there is an undeclared cyber 
war being waged against industry and government and that we must define our private sector 
and government agencies’ strategy, doctrine, and tactics to fight the cyber war. 
Prevention 
Prevents or 
deters attacks so 
no loss is 
experienced 
Detection 
Detect attacks 
not prevented to 
allow for rapid 
and thorough 
response 
Matt Rosenquist, Intel 
Defense in Depth 
Information Security 
Strategy 
Prediction: Proactive measures to identify attackers, 
their objectives and their methods prior to materialization 
of viable attacks. 
Enables and maximizes Prevention activities. 
Information 
Security 
Strategy 
Prevention: Securing the computing environment 
with current tools, patches, updates 
and best-known-methods in a timely manner. 
Represents the bulk of cost ef fective security capabilities 
and facilitates better Detection. 
Detection: Visibility to key areas and activities. 
Ef fective monitoring to identify issues, 
breaches, and attacks. Drives immediate 
interdiction by Response capabilities 
Response: Efficient management of ef forts to 
contain, repair, and recover as needed to return the 
environment to normal operations. Reduces losses by 
rapidly addressing issues and feeds intelligence into 
IT Strategy 
Prediction and Prevention areas 
Prediction 
Predict the 
most likely 
attacks, 
targets, and 
methods 
Response 
Respond rapidly 
to security 
incidents to 
minimize losses 
and return to a 
normal state 
Figure 1 Defines the Defense in Depth approach to enterprise security 
Private and government sectors are, at times, being clobbered by an invisible enemy that 
seems to own numerous government, private networks and business applications. Information 
Security Teams across the globe are fighting the good fight and win and lose in this battle. 
Cyber war is almost the perfect terrorist structure of compartmentalization of multiple global 
cells dedicated to very similar goals and objectives but they have no or limited cross
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
communication and planning. One reason they do not need this coordination is that there is a 
target rich environment that all cyber miscreants attack and achieve their goals of nation state 
espionage, SCADA terrorist attacks, identity theft, financial theft and etc. 
Every year, thousands of articles and conferences across the globe address the tactics and 
procedures to address this challenge and when one reads the literature and attends the 
meetings, one knows that the most fundamental and missing piece to orchestrating and defining 
a cyber security arsenal is a cohesive, risked-based methodology that needs to define and 
implement solutions to the sometimes chaotic response to threats. A primary solution to 
managing this cyber theater of war is to create a central organizational cyber command and 
control battle space management element and that is the Cyber CIOC. 
KPMG articulated the business case for greater threat awareness and the application of 
intelligence solutions in its excellent White Paper 
“Cyber threat intelligence and the lessons from law enforcement” 
“ Cyber security breaches are rarely out of the media’s eye. As adversary sophistication 
increases, many organizations react when it is too late – the attack is underway. Few 
organizations have the capability to anticipate cyber threats and implement preventative 
strategies, despite prevention being more cost effective and customer focused. 
This is not a new threat and hackers have been infiltrating sensitive government systems since 
the early 1990s. However, the focus on cyber security is increasing rapidly due to many high 
profile and highly disruptive/damaging security breaches threatening financial and physical 
damage across critical national and corporate infrastructures. It also appears the nature of the 
threat is changing. In our most recent survey, 67 percent of data loss resulted from external 
hacking, while the insider threat is surprisingly at an all time low. 
The Information Security landscape is constantly evolving. Private and public sector 
organizations find it difficult to believe they could be a target for cyber attacks. This mindset 
needs to change – as the best offence is a good defense. At the same time, it is no longer 
viable to rely on defense. The determined adversary will get through eventually. As a result, 
organizations must know what is going on around them so that they can identify when an attack 
has taken place or when an attack is imminent. Intelligence and the insight that it brings is at the 
heart of next generation Information Security. “ Source: KPMG
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
While KPMG does a great job defining threat intelligence, it did not discuss how to “pull it all 
together” in an organizational structure. The CIOC is the integration and command and control 
intelligence element to manage the threats and actions defined by KPMG. 
I think Leon Panetta’s powerful observation on cyberwarfare punctuates the magnitude 
of today’s’ cyber threat. He equates the cyber war strategic threat to a similar problem 
we had with the nuclear threat of the past: 
“Just as nuclear was the strategic warfare of the industrial era, cyberwarfare has become the 
strategic war of the information era,” says U.S. Secretary of Defense Leon Panetta. 
Cyberespionage and cybersabotage are already a reality. Outside the realm of states and their 
proxies, corporate spies are using increasingly advanced techniques to steal company 
secrets or customer data for profit. Hactivists with political and anti business agendas are also 
busy. The string of media revelations about security breaches this year suggests that the 
business world is just as vulnerable to attack as ever “ 
Source: SYMANTEC 2013 threat report and Aviation Week & Space Technology, October 22, 
2012, 82 
I had considered inserting a detailed comprehensive summary of the cyber threat. However, I 
could no better job than Symantec did in its excellent 2013 threat report seen at the below link. 
Source: http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_ 
main_report_v18_2012_21291018.en-us.pdf 
Symantec summarized the threat landscape in its executive summary in its 2013 Threat 
Report. 
“ Threats to online security have grown and evolved considerably in 2012. From the threats of 
cyberespionage and industrial espionage to the widespread, chronic problems of malware 
and phishing, we have seen constant innovation from malware authors. 
We have also seen an expansion of traditional threats into new forums. In particular, social 
media and mobile devices have come under increasing attack in 2012, even as spam and 
phishing attacks via traditional routes have fallen. Online criminals are following users onto 
these new platform.”
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
INFOSECFORCES’s perspective is the threat is pervasive, highly intelligent, omnipotent, 
sometimes incomprehensible in such areas as the success of the “Advance Persistent Threat” 
(APT) and the advancement of SCADA attacks. 
The threat pervades almost every part of an organization’s processes, its applications, 
infrastructure, people, access control management, and almost every part of the OSI stack. 
One core graphic from SC Magazine’s excellent monthly threat report summarizes one of the 
most critical data management failures and that is staggering number of data breeches since 
2005. 
SC September 2013 
Figure 2 SC Magazine’s report on the staggering number of data breaches in the US 
I recently spoke with a highly respected CISO who said to me “Bill, I just cannot keep up as 
there is just too much out there anymore to keep track of it all”. How do we deal with his 
concerns? 
The CIOC Corrective Action Plan
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
To fight the Cyber War at the grassroots level, every major corporation should create a Cyber 
Intelligence Operations Center (CIOC) to replace the older model SOCs. CIOCs will truly 
produce the finished intelligence from the raw data our systems are collecting. Even when the 
data is correlated to a degree in the SIEM, the human still needs to derive the intelligence from 
the data reported as it relates to the organization’s integrated defense in depth program ……. 
prediction, prevention, detection, and response? Figure 1 depicts an integrated DID. 
The situation is this: 
Many security companies now say they can provide intelligence services and create intelligence 
information. Some can do so more than others. Likewise, they tout that they operate in the "Big 
Data" space but they really do not yet as we, as an industry, are maturing our processes and 
doctrine to operate in this space. When I have discussed with vendors the process by which 
they turn data into intelligence, they do not really understand the art form of building intelligence 
process, tactics, techniques, procedures, and strategies for a CIOC-like intelligence function 
and develop the corporate intelligence requirements needed to fight the ongoing Cyber War. 
They are rapidly learning how to do so. 
When creating a CIOC, a primary requirement should be that at all costs it should be collocated 
physically or virtually with the network operations center (NOC). It never made sense to me 
when I would see separated SOCs and NOCs. The best model for responding to a threat and 
incident is to have shared resources and information to understand the possible initial 
indications and warnings (I&W) that an attack or compromise could, is, or has happened. Some 
organizations do geo locate the SOC and NOC in what is called an NSOC. 
The short below narration from a Wikipedia reference defines the old think approach to 
managing the cyber threat environment in a SOC. For more information on a SOCs structure 
and organization, refer to appendix one. 
Description our current SOC think 
SOC Objective 
“ A SOC is the people, processes and technologies involved in providing situational awareness 
through the detection, containment, and remediation of IT threats. A SOC manages incidents for 
the enterprise, ensuring they are properly identified, analyzed, communicated, 
actioned/defended, investigated and reported. The SOC also monitors applications to identify a 
possible cyber-attack or intrusion (event) and determine if it is a real, malicious threat (incident), 
and if it could have a business impact.” 
NOTE: The above is a good summary of what a mature SOC should have done as our model 
deployed. The fundamental energy missing from the description is that we have moved passed
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
just “situational” awareness that we are “now playing with live ammo” and the cyber war threat 
situation requires a real time battle management function that is connected in real time to the 
variety of threats and the time-space warp in which they occur. There must be an 
organizational dynamic intelligence process using the below intelligence management cycle 
core functions that feeds the CIOC battle management requirements. 
Given the magnitude of the global threat environment, the SOC must migrate to the CIOC 
model. The CIOC model is defined below but we must first examine the impact of Big Data and 
Security Intelligence on our current operational state. 
Big Data ….. what is it and what does it mean for security 
While this paper will not address how to secure “Big Data” (BD) and data warehouses (topic for 
another paper), we must reflect on the impact of BD in relationship to Cyber Attacks, 
Intelligence collection and processing, and the fact that that BD is creating numerous new 
vectors from which a threat can explode and where the risks, vulnerabilities and exposures can 
reside. 
It seems the term “big data” is everywhere in business and technical writings. BD is the new 
target rish environment that we need to protect. In the simplest reflection of what BD is, it is the 
aggregation and business use of far more data than we have ever had before in far more places 
than it has ever been before. The exponential growth of BD means that security professionals 
have a far more complex problem of performing our primary mission of protecting the 
corporation’s assets. Likewise, given the magnitude of the data storage and use by numerous 
businesses within an organization, how do we now secure this data? 
Firstly, I would create a new role called the Data Security Manager (DSM) and embed him in the 
CIOC. The DSM would know all aspects of how the organization uses data, where it is at, 
define the data security strategy and be familiar with all data usage tools like Data Analytics, 
Hadoop, Cognos, organic data base security functions like SQL and Oracle Security and etc. 
Secondly, I would modernize my security architecture and organizational structure in the CIOC 
to manage the fluid and dynamic nature of our ‘Data World” 
Security industry reflection on managing the BD challenge 
While this paper is not designed to endorse certain products and services, we do recognize the 
extensive work that our security colleagues have done in the areas of Cyber Intelligence and 
BD. We will quote some industry leaders in the below paragraphs. 
NOTE: Our paper is designed to suggest how and where to manage the Cyber Threat in the 
CIOC. The point to take away from this section is how should security professionals think about 
the BD challenge as it relates to developing your Cyber Intelligence Collection Plan and your 
Defense in Depth Programs within your organization’s Control Objective Frame work.
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
With that in mind, let’s look at some of the writings about BD from IBM and RSA/EMC. 
The IBM solution for Intelligence and Big Data 
“ IBM Security Intelligence with Big Data provides exceptional threat and risk detection, 
combining deep security expertise with analytical insights on a massive scale. For forward-leaning 
organizations seeking advanced insight into security risks, the IBM solution – 
including IBM QRadar Security Intelligence Platform and IBM Big Data Platform – provides a 
comprehensive, integrated approach that combines real-time correlation for continuous insight, 
custom analytics across massive structured and unstructured data, and forensic capabilities for 
irrefutable evidence. The combination can help you address advanced persistent threats, fraud 
and insider threats. 
The IBM solution is designed to answer questions you could never ask before, by widening the 
scope and scale of investigation. You can now analyze a greater variety of data – such as DNS 
transactions, emails, documents, social media data, full packet capture data and business 
process data – over years of activity. By analyzing structured, enriched security data alongside 
unstructured data from across the enterprise, the IBM solution helps find malicious activity 
hidden deep in the masses of an organization’s data. 
IBM Security intelligence: 
Security intelligence is the continuous real-time collection, normalization and analysis of data 
generated by users, applications and infrastructure. It integrates functions that have typically 
been segregated in first-generation security information and event management (SIEM) 
solutions, including log management, security event correlation and network activity monitoring. 
Data collection and analysis goes well beyond traditional SIEM, with support for not only logs 
and events, but also network flows, user identities and activity, asset profiles and configurations, 
system and application vulnerabilities, and external threat intelligence within the single 
warehouse. 
Solution Overview 
IBM Security Intelligence with Big Data combines the real-time security visibility of the IBM 
QRadar Security Intelligence Platform with the custom analytics of the IBM Big Data Platform. 
QRadar performs real-time correlation, anomaly detection and reporting for immediate threat 
detection, and also sends enriched security data to IBM big data products, such as IBM 
InfoSphere BigInsights. 
IBM big data products analyze enriched security information from QRadar along with vast 
amounts of data from unstructured and semi-structured sources, accommodating both the 
variety and volume of data needed for advanced security and risk use cases. Information is 
subsequently fed back to QRadar, providing a facility for closed-loop, continuous learning.
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
The result is an integrated, intelligent solution that collects, monitors, analyzes, explores and 
reports on security and enterprise data in ways previously not possible. And the solution is 
designed so you can start with any product in the IBM solution and add complementary 
capabilities as your needs evolve. 
Key capabilities include: 
 Real-time correlation and anomaly detection of diverse security data 
 High-speed querying of security intelligence data 
 Flexible big data analytics across structured and unstructured data – including 
security data; email, document and social media content; full packet capture data; 
business process data; and other information 
 Graphical front-end tool for visualizing and exploring big data 
 Forensics for deep visibility “ 
Figure 3 The IBM Intelligence and Big Data reference model 
http://www-03.ibm.com/security/solution/intelligence-big-data/
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
Please see an awesome security analytics and intelligence brief by Anand Ranganathan, 
TJ Watson research Center at this link. 
http://www.slideshare.net/SwissHUG/big-data- for-cybersecurity 
INFOSECFORCE Comment: Similar to KPMG, IBM does not suggest an organizational 
structure like a CIOC to manage all their new product output. 
EMC/RSA Envision and Art Coviello’s dead on speech 
This section reflects the RSA EMC methodology for SIEMS in the era of security analytics, big 
data, and cyber intelligence requirements. IBM and RSA have similar and mature reflections on 
Security Intelligence. It seems IBM is tuned to the BD Intelligence and analytics focus while 
RSA EMC is more tuned to the actual SIEM operations space. If I were a rich man, I would 
integrate the two solutions. 
There are numerous other SIEMS out there like the famous Splunk and one of my favorites, Log 
Rhythm. However, I really like the deep and advanced thinking Art Caviello, CEO RSA-EMC 
has given to the convergence of BD, Intelligence, and Analytics and thus have included 
Envision as an example of what you can use to build your CIOC methodology around. Art’s 
vision is included in this section at the end of the Envision product descriptions. 
“ The RSA® enVision® platform provides a centralized log management service that enables 
organizations to simplify their compliance programs and optimize their security incident 
management. The RSA enVision solution facilitates the automated collection, analysis, 
alerting, auditing, reporting, and secure storage of all logs. Organizations can simplify 
compliance by using regulation-specific, out-of-the-box reports, alerts and correlations 
rules. Reports can be scheduled to be delivered at a specific time or run on an ad-hoc 
basis. Alerts can be delivered through the intuitive user interface, via SMS, or email. 
Administrators don’t have to be glued to the interface at all times. Auditors can even be 
granted read-only access to the enVision platform so that they can access the reports 
whenever they need them. 
Security incident management is optimized by using the purpose-built incident 
management tool within the enVision platform. Incidents can be identified, tagged with 
evidence, and passed along through the organization’s ticketing system. The RSA 
enVision platform is also integrated with RSA Archer™ eGRC enabling business context to
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
be applied to each incident. Business context means applying relating incidents to larger 
business objectives. “ 
Source: http://www.emc.com/collateral/data-sheet/9245-h9037-3in1-ds.pdf 
Figure 4 RSA SIEM Envision reference model 
Source: http://virtualization.info/en/news/2010/10/hytrust-partners-with-rsa.html 
“ The traditional cyber security model has become almost useless as a result of the massive 
proliferation of smart phones, Web-based apps, social networks, and Internet-connected 
machines. But just as the new world of BD provides cover for cyber attackers, big data is also 
the only answer for devising a next-gen security system that can cope with emerging threats “, 
RSA executive chairman Art Coviello said at a conference last week. 
Speaking at the Third Annual International Cybersecurity Conference in Tel Aviv, Israel, Coviello 
highlighted how today's approach to information security is losing effectiveness, and laid out
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
plans for a new "intelligence driven" approach that can spot the signal in the noise, and cope 
with the rapid fire growth of technology. 
"In the first two decades of the new millennia, we'll have gone from a cyber attack surface that 
has just a few points of egress and ingress through a controlled firewall perimeter, to almost 
infinity, when you think of the impact of mobility, web apps, big data, social media, and the 
Internet of things," Coviello said in a video of the speech. 
"Already in 2013, we're in a hyperconnected world that has facilitated access and productivity 
for all of us, but with unintended consequence of doing the same for our adversaries," he said. 
"And if all that weren't enough, it's getting easier and easier with the advent of social media for 
our adversaries, to trick, spoof, and assume our digital personas." 
Coviello recommends that organizations stop spending up to 80 percent of their security 
budgets on building perimeter defenses that have steadily been losing effectiveness against 
attacks from rouge states, "hactivists," and cyber criminals. Instead, organizations ought to 
prepare for the transition to intelligence-driven systems that have big data at their hearts. 
This new system, which Coviello also discussed at the RSA conference earlier this year, will be 
characterized by the use of "dynamic and agile controls" on the perimeter and a central 
management system "that has the ability to analyze vast streams of data from numerous 
sources to produce actionable information." 
The central security management system "must be able to gain full visibility into all data-- 
unstructured, structured, internal, and external. The underlying big data architectures will be 
scalable enough such that all data will be analyzed, no matter how expansive or fast changing," 
he said. 
"As a result, organizations will be able to build a mosaic of specific information about digital 
assets, users, and infrastructures… and correlate abnormal behavior in people and in the flow 
and use of data," Coviello said. "The management system must be well integrated with GRC 
[governance, risk, and compliance] systems and specific tools, so that we can detect those 
attacks early or even in advance, and then trigger automated defenses, such as blocking 
network traffic, quarantining systems, and requiring additional identity verification." 
The access controls will also be smart in the new big data-driven security world. "They will also 
have the capacity to be self learning," he said. "They will be able to inform or be informed by
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
other controls. They'll be able to feed or receive intelligence from security management 
systems, and report to and receive instructions from GRC systems. Armed with a thorough 
understanding of risk at the outset, this big data oriented management and control environment 
completes a vision of intelligent driven security." 
Such a big data-driven security system will be able to "find the hidden patterns, the unexpected 
correlation, the surprising connections" between data points in the wild, he said. "It's about 
analyzing vast and complex data sets at high speed, which in our case will allow us to spot the 
fake signal of an attack. Because at some point, no matter how clever the attacker, they must 
do something anomalous." 
Today, the most a cyber attacker can expect to achieve is to disrupt an organization's activities, 
such as through a denial of service attack. But thanks to the proliferation of big data and greater 
sophistication and coordination on the part of attackers, destructive attacks executed solely 
through the Internet will soon become the norm, Coviello said. 
"Despite the hype, destructive attacks are still next to impossible to carry out solely through the 
Internet without manual intervention," he said. "But as we transition to IPV6 and create the 
Internet of things, IP enabling more and more elements of our physical infrastructure, attacks on 
digital systems that result in physical destruction will become a reality--a chilling, sobering 
thought." 
There must be a sense of urgency among stakeholders to deal with the "ongoing expansion of 
the attack surface and the escalation of the threat environment," he said. "The only way to reach 
and maintain the appropriate level of understanding is through knowledge," he said. "From a 
much higher level of collaboration between public, private, and vendor organizations, knowledge 
will replace fear with confidence, knowledge will guide our actions." 
Source: http://www.datanami.com/datanami/2013-07- 
03/big_data_at_the_heart_of_a_new_cyber_security_model.html 
INFOSECFORCE comment: Similar to IB and KPMG, RSA/EMC did not suggest a specific 
new type of organization to manage new security Intelligence demand. Although, Art did make 
references to the new “central security management system”. I propose the new management 
system is the CIOC and its strategy, tactics, and procedures meet his goal of a central security 
management system.
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
CIOC Operational description (draft) 
The CIOC is the private or public sector dynamic cyber battle management operations center for 
managing an organization’s defense in depth and intelligence collection strategies to 
predict, prevent, detect, and respond to all forms of cyber security threats against an 
organization’s vital human, information, production, and infrastructure assets. These demands 
are detailed above. The CIOC operates within the organization’s defined control management 
framework. The 24 X 7 CIOC is led by the chief security operations officer (CSOO) and 
includes a highly skilled and trained cyber security staff. As much as possible, the CSOO 
should hire prior military personnel with Cyber War Fighting experience. 
The CIOC is the center for managing the security of an organization’s data challenges where 
ever sensitive data may reside …… data centers, the cloud, big data storage, end points, 
customer sites, out sourced sites, BYOD, partner sites, and etc. The CIOC processes large 
amounts of data from a variety amount of information sources that include but are not limited to 
the Security Incident and Event Management (SIEM) tool. The CIOC will consume data from a 
host of other information sources to include such major information sources like the Big Data 
and business intelligence tools, ERP tools, People Soft, SAP and etc and will turn that data into 
actionable intelligence. 
Based on the organization’s intelligence collection plan, the CIOC will produce actionable 
intelligence that will not only influence the complete cyber security span of control nut it will also 
provide another form of business intelligence that the CEO can use for profit and loss decisions 
base on a cyber risk-based analyses. 
The CIOC should have NOC real time information feeds to quickly correlate network anomalies 
to possible security events. 
Intelligence management cycle 
DoD and government agencies have historically use the Intelligence collection cycle model to 
drive and frame its intelligence collection plan in peacetime and wartime. The private sector can 
and should use this simple but powerful framework to drive its security intelligence operations 
from the CIOC. 
I have adopted the FBI’s intelligence cycle against which to model a possible private sector 
intelligence collection plan.
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
FBI Intelligence Cycle 
Figure 5 Depicts the FBI Intelligence Management Cycle 
Source: http://www.fbi.gov/about-us/intelligence/intelligence-cycle 
The CISO and the CSOO must use the Intelligence Cycle to manage their information collection 
process and intelligence collection cycle to support the below tenants of the organization’s 
Defense in Depth Strategy. 
NOTE: The below definitions are extracted from the FBI Intelligence Cycle. I have modified 
the instructions to align the FBI Intelligence Cycle to the CIOC requirements. If you want to see 
original FBI writings, please go to the above FBI web site for same. 
“ Requirements are identified information needs—what we must know to safeguard the 
organization. Intelligence requirements are established by the CISO according to guidance 
received from the CIO. Requirements are developed based on critical information required to 
protect the organization from national security and criminal threats. The security team and 
technical team managers participate in the formulation of organizational intelligence 
requirements. 
Planning and Direction is management of the entire effort, from identifying the need for 
information to delivering an intelligence product to a consumer. It involves implementation plans 
to satisfy requirements levied on the organization, as well as identifying specific collection 
requirements based on the organization’s needs. Planning and direction also is responsive to 
the end of the cycle, because current and finished intelligence, which supports decision-making, 
generates new requirements. The director for the security operations and DSOO Branch leads 
intelligence planning.
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
Collection is the gathering of raw information based on requirements. Activities such as 
security product technical means, interviews, technical reconnaissance, human source 
operation, and liaison relationships result in the collection of intelligence. 
Processing and Exploitation involves converting the vast amount of information 
collected into a form usable by analysts. This is done through a variety of methods including 
decryption, language translations, and data reduction. Processing includes the entering of raw 
data into databases where it can be exploited for use in the analysis process. The above IBM 
and RSA models support this area. 
Analysis and Production is the conversion of raw information into intelligence at the 
CIOC. It includes integrating, evaluating, and analyzing available data, and preparing 
intelligence products. The information’s reliability, validity, and relevance is evaluated and 
weighed. The information is logically integrated, put in context, and used to produce intelligence. 
This includes both "raw" and finished intelligence. Raw intelligence is often referred to as "the 
dots"—individual pieces of information disseminated individually. Finished intelligence reports 
"connect the dots" by putting information in context and drawing conclusions about its 
implications. 
Dissemination—the last step—is the distribution of raw or finished intelligence to the 
consumers whose needs initiated the intelligence requirements. The FBI disseminates 
information in three standard formats: Intelligence Information Reports (IIRs), FBI Intelligence 
Bulletins, and FBI Intelligence Assessments. FBI intelligence products are provided daily to the 
attorney general, the president, and to customers throughout the FBI and in other agencies. 
These FBI intelligence customers make decisions—operational, strategic, and policy—based on 
the information. These decisions may lead to the levying of more requirements, thus continuing 
the FBI intelligence cycle. “ 
INFOSECFORCE comment: I purposely left the “ dissemination” section intact as I 
recommend that similar to the FBI approach that each organization create Intelligence reports 
that your customers need. Be creative and responsive to all your customers and the need to 
protect the organizations vital assets !!! 
Defense in Depth core function descriptions 
More specifically, as mentioned above, the CIOC is the cyber battle management function that 
manages the multiple attack vectors against an organization’s vital assets through the CIOC 
management of the organization’s DID posture. Specific actions behaviors required for the 
defense in depth concept and functional management include: 
Predict attacks on an organization’s assets 
 Serious consideration of the results of the ongoing intelligence reports generated 
by the CIOC intelligence analyses and report team.
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
 Analyses of internal vulnerabilities, risks and exposures and the likelihood that 
specific exposures can be realized against the organization due unmitigated 
exposures. 
 Review SIEM and all other awareness dashboards that you might have at least 
twice a day 
 Constant analyses of the types of attacks that happen every day on the 
organization that might provide indications and warnings (I&W) of site 
enumeration 
 The introduction of new technologies that could cause a disruption of current 
processes and procedures. Cloud adoption could be considered a disruptive 
technology that could present new exposures non mitigated exposure. 
 High vigilance to Cyber Open Source Intelligence (COSI) information and 
intelligence sources to include multiple information security magazines, blogs, 
threat reports 
 Get feedback from other teams like network engineering on possible Indications 
and warnings you can integrate into you Prediction Strategy 
 Membership in core information sharing organizations like FS-ISAC 
 Membership in INFRAGUARD and similar organizations 
 Relationships with local law enforcement 
Prevent attacks on an organization’s assets 
 Define and build an state of the art security architecture that is aligned with an 
organizations risk profile 
 Build excellent security architecture documents 
 Tune all tools such as firewalls, access control functions, logging and alerting 
systems for maximum efficiency and regularly test same 
 Write process and procedures for all major procedures such as patch 
management, vulnerability management, Intelligence development, incident 
response and etc. 
 Ensure that security is aggressively built into the enterprise architecture and 
requirements documents 
 Base security management on IT governance such as ITIL 
 Define security standards and policies 
 Ensure the basic security blocking and tackling is done before implementing 
advanced tools and procedures 
 Use change control for all things that could affect the IT environment 
 Harden all platforms and applications against attack 
 Select a control environment such as SANS Top 20, FISMA, NIST 800-53, ISO 
27000 series 
 Implement a superb patch management process that sets metric for current 
patch status at 95 per cent for all platforms, end points, data bases, applications, 
network devices and etc
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
 Strictly limit administrative access and manage with privilege management tools 
 Monitor access in real time 
 Implement robust static and in transit data loss protection plans (DLP) 
 Implement a robust secure software development program. 
 100 per cent compliance to government regulation and business compliance 
requirements like PCI 
 Conduct regular internal scans and pen tests using anyone of the host 
vulnerability assessment tools for platform and applications exposures. 
 Implement a ongoing security training program that is not given once a year 
 Invest in training the security staff 
 Build robust security metrics briefed by the CIOC CSOO to executives once a 
month to C level and once a quarter to Board level executives. 
 Lead your staff and all organization personnel in data protection 
Detect attacks on an organization’s assets 
 Prevent incidents form happening in the first place 
 Ensure a 24 X 7 detection capability is available 
 Deploy state of the art static and dynamic detection tools that your organization 
can fund 
 Define real time detection processes 
 Ensure employees are aware of how to report suspicious end point, platform and 
network intrusions 
 Extend detection to all BYOD and external systems 
 Mange threat detection in all cloud based services 
 Define SLAs for responding to threats 
 Determine which security systems should be in your DR and BC planning 
 Ensure you have managed out as many false positives and false negatives as 
possible 
 Use the CWE tools whenever possible http://cwe.mitre.org/. CWE is tuned to 
application security but it is an excellent but complex framework.
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
Figure 6 Depicts the CWE overall vulnerability management framework ( I love this image ) 
Source: http://cwe.mitre.org/ 
Respond to attacks on an organization’s assets 
 Determine what the company’s appetite for incident response is. Is it willing to 
accept automated shut down of business processes and network segments. 
 Determine if you want to hire a DDOS threat mitigation service like Prolexic 
 Create and practice detailed incident repose process 
 Define response thresholds based on the attack areas and magnitude of same 
 Ensure global partners and external business customers are aware of incident 
response processes 
 Define escalation process 
 Conduct table top exercises to train entire staff on incident response and cyber 
crises management 
 Contract with external forensics investigator
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
 Ensure two incident management lines are established, one for executives and 
one for those doing the work to manage and terminate the incident 
 Develop and train on the RACI chart for incident management. Platform security 
incidents possibly could be managed by the platform manager. 
 Train internal staff for forensics investigations and but tools like EnCase 
 Conduct prior planning with all technical and c level staff 
 Know obligations and response procedures for such laws concerning a data 
breech. Let legal and marketing work the customer notification obligations. 
 Ensure incident response team is aware of all threat intelligence generated by 
the SOC 
 Ensure systems are configured to respond to attacks, is your IPS set to deny 
attacks 
 Oversee and be aware of all preventive measures that should prevent incidents 
from happening in the first place 
 Ensure that you have proper incident close out processes 
A CIOC Control Framework 
Building a CIOC and making it a organizational cyber battle management function is as much an 
art form as it is building the CIOC function and team. One needs to develop an organic 
approach on how the intelligence, BD, and Defense in Depth methodologies integrate and 
complement each other. Implementing an overarching control framework that keeps the 
organization focused on maintaining a positive risk posture is the cement upon which to base 
measurement and success. 
I developed the below table to show the possible integration of how the Intelligence Lifecycle, 
the core components of a defense in depth program could integrate with an organization’s 
control framework. In this case, I used the SANS Top 20 controls. The links are hot if you want 
to reach out to each SANS control. 
What this table does is it provides a reflection on the obvious and subtle dynamics that will 
happen within the CIOC. This dynamic combination for a Cyber Command and Control 
approach to protecting your vital assets expands the current definition and processes seen in a 
SOC. 
Intelligence Cycle Framework Predict Prevent Detect Respond 
Requirements X 
Planning and Direction X 
Collection X 
Processing and exploitation X X
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
Analyses and production X X X 
Dissemination X X X 
SANS 20 Critical Controls 
1: Inventory of Authorized and Unauthorized 
Devices 
X X 
2: Inventory of Authorized and Unauthorized 
Software 
X X 
3: Secure Configurations for Hardware and 
Software on Mobile Devices, Laptops, 
Workstations, and Servers 
X X 
4:Continuous Vulnerability Assessment and 
Remediation 
X X X X 
5: Malware Defenses X X X X 
6: Application Software Security X 
7: Wireless Device Control X X X 
8: Data Recovery Capability X 
9: Security Skills Assessment and Appropriate 
Training to Fill Gaps 
X X X X 
10: Secure Configurations for Network Devices 
such as Firewalls, Routers, and Switches 
X X 
11: Limitation and Control of Network Ports, 
Protocols, and Services 
X X X 
12: Controlled Use of Administrative Privileges X X X 
13: Boundary Defense X X X X 
14: Maintenance, Monitoring, and Analysis of 
Audit Logs 
X X X X 
15: Controlled Access Based on the Need to 
Know 
X X X 
16: Account Monitoring and Control X X X 
17: Data Loss Prevention X X X 
18: Incident Response and Management X X 
19: Secure Network Engineering X X X 
20: Penetration Tests and Red Team Exercises X X X X 
Table 1 Shows the integration of Controls, DID and Intelligence Management 
http://www.sans.org/critical-security-controls/guidelines.php 
Summary 
Colleagues
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
We are in an undeclared cyber war. The enemy is extremely talented, fluid, fast moving and 
highly compartmentalized. They can rapidly adapt and adjust to the defenses that we develop 
such as the Tuesday Patch Release and the AV and Malware definition update. 
Unlike the days of the old days of a SOC when the battle was relatively static, the cyber 
battlefield of today is fluid and changes every day. We must reflect similar nimbleness to 
counter and when possible, defeat the threat. The private and public sectors have begun to 
unite in the Strategic War that Leon Panetta defined above. We must advance this partnership 
and collaterally build similar tools, tactics and procedures that the public and private sector 
mutually understand. 
In our own right, we must now execute a convergence of a variety and complimentary new 
processes that might be somewhat disruptive into a new cyber security and intelligence 
management framework. 
Embracing the intelligence cycle, defining the defense in depth structure to protect our assets, 
creating common control frameworks, and building the CIOC to serve as the “new management 
system” that has a common doctrine that aligns the public and private sector is an essential 
solution to manage the time-space based cyber war that we will continuously wage as the war 
that never ends. 
Thank you for reading my paper 
Bill Ross, Greensboro, September 2013 
Future think Epilogue 
I have touted and implemented a host of intelligence solutions while in the military that in one 
form or another used the principles of the Army's Intelligence Preparation of the Battlefield (IPB) 
methodology. In a way, I have applied IPB to private industry threat management teams. ESRI 
company geospatial mapping supports IPB as seen in the below link. My desire, over the years 
of being in Private Industry, is that we should have IPB solutions for Cyber Security and when I 
read about all of ESRI's capabilities and the ability to modify its amazing mapping capabilities, it 
hit me like a steam roller that if ESRI wants to get into the Cyber Warfare Space that there is no 
doubt in my mind that ESRI can build the first ever Intelligence Preparation of the Cyber 
Battlefield (IPCB) tool that will finally merge military intelligence principles with the intelligence 
functions that security companies are now promoting for private industry, and for the 
government/military for that matter. Private industry knows it needs to become more war like 
and DOD like in its approach to using security data and transforming the raw data into an 
intelligence product. The ESRI IPCB would be the front end tool that will help them do this by 
managing security intelligence data, see where the vulnerabilities are on their "ESRI mapped 
networks" and efficiently use their multiple collection methods to plan their CIOC end-to-end 
Cyber Intelligence campaigns.
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
Appendix 1 The overall summary of a SOC organization 
http://en.wikipedia.org/wiki/Information_security_operations_center 
1 Objective 
2 Alternative names 
3 Technology 
4 People 
5 Organization 
6 Facilities 
7 Process and Procedures 
8 See also 
9 References 
An information security operations center (or "SOC") is a location where enterprise information 
systems (web sites, applications, databases, data centers and servers,networks, desktops and other 
endpoints) are monitored, assessed, and defended. 
Objective 
A SOC is the people, processes and technologies involved in providing situational awareness through 
the detection, containment, and remediation of IT threats. A SOC manages incidents for the 
enterprise, ensuring they are properly identified, analyzed, communicated, actioned/defended, 
investigated and reported. The SOC also monitors applications to identify a possible cyber-attack or 
intrusion (event) and determine if it is a real, malicious threat (incident), and if it could have a business 
impact. 
Technology 
SOCs typically are based around a security information and event management (SIEM) system which 
aggregates and correlates data from security feeds such as network discovery and vulnerability 
assessment systems; governance, risk and compliance (GRC) systems; web site assessment and 
monitoring systems, application and database scanners; penetration testing tools; intrusion detection 
systems (IDS); intrusion prevention system (IPS); log management systems; network behavior analysis 
and denial of service monitoring; wireless intrusion prevention system; firewalls, enterprise antivirus and 
unified threat management (UTM). The SIEM technology creates a "single pane of glass" for the security 
analysts to monitor the enterprise. 
People 
SOC staff includes analysts, security engineers and SOC managers who are seasoned information and 
communication systems professionals. They are usually trained in computer 
engineering, cryptography, network engineering, or computer science and are credentialed (e.g. Certified
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
Information Systems Security Professional (CISSP) from (ISC)², GIAC fromSANS, or Certified Information 
Security Manager (CISM) from ISACA). 
SOC staffing plans range from eight hours a day, five days a week (8x5) to twenty four hours a day, 7 
days a week (24x7). Shifts should include at least 2 analysts and the responsibilities should be clearly 
defined. 
Organization 
Large organizations and governments may operate more than one SOC to manage different groups 
of information and communication technology or to provide redundancy in the event one site is 
unavailable. SOC work can be outsourced, for instance by using a Managed security service. The term 
SOC was traditionally used by governments and managed computer security providers, although a 
growing number of large corporations and other organizations also have such centers. 
The SOC and the network operations center (NOC) complement each other and work in tandem. The 
NOC is usually responsible for monitoring and maintaining the overall network infrastructure—its primary 
function is to ensure uninterrupted network service. The SOC is responsible for protecting networks, as 
well as web sites, applications, databases, servers and data centers, and other technologies. Likewise, 
the SOC and the physical security operations center coordinate and work together. The physical SOC is a 
facility in large organizations where security staff monitor and control security officers/guards, alarms, 
CCTV, physical access, lighting, vehicle barriers, etc. 
In some cases the SOC, NOC or physical SOC may be housed in the same facility or organizationally 
combined. Typically, larger organizations maintain a separate SOC to ensure focus and expertise. The 
SOC then collaborates closely with network operations and physical security operations. 
Facilities 
SOCs usually are well protected with physical, electronic, computer, and personnel security. Centers are 
often laid out with desks facing a video wall, which displays significant status, events and alarms; ongoing 
incidents; a corner of the wall is sometimes used for showing a news or weather TV channel, as this can 
keep the SOC staff aware of current events which may have an impact on information systems. The back 
wall of the SOC is often transparent, with a room attached to this wall which is used by team members to 
meet while able to watch events unfolding in the SOC. Individual desks are generally assigned to a 
specific group of systems, technology or geographic area. A security engineer or security analyst may 
have several computer monitors on their desk, with the extra monitors used for monitoring the systems 
covered from that desk. 
Process and Procedures 
Processed and procedures within a SOC clearly spell out roles and responsibilities as well as monitoring 
procedures. These Process include business, technology, operational and analytical processes. They lay 
out what steps are to be taken in the event of an alert or breach including escalation procedures, 
reporting procedures, and breach response procedures. 
http://en.wikipedia.org/wiki/Information_security_operations_center
CIOC DRAFT ….. by Bill Ross, 5 October 2013 
http://blogs.esri.com/esri/arcgis/2012/08/29/the-military-aspects-of-terrain-template-is-available-for- 
download/ 
Other interesting references 
http://catalog.ferris.edu/programs/538 
http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/ 
idefense/index.xhtml?loc=en_US 
http://en.wikipedia.org/wiki/Intelligence_cycle_security 
http://www.slideshare.net/DeloitteAnalytics/cyber-intelligence

More Related Content

What's hot

Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehReZa AdineH
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Outpost24
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...idsecconf
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat IntelligenceOWASP Delhi
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)Ahmad Haghighi
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...Raffael Marty
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence pptKumar Gaurav
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRTAPNIC
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationPriyanka Aash
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlienVault
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...IBM Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat IntelligenceZaiffiEhsan
 
What operational technology cyber security is?
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?sohailAhmad304
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations CenterMDS CS
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...North Texas Chapter of the ISSA
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementPriyanka Aash
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centersBrencil Kaimba
 

What's hot (20)

Effective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza AdinehEffective Security Operation Center - present by Reza Adineh
Effective Security Operation Center - present by Reza Adineh
 
Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30Defense In Depth Using NIST 800-30
Defense In Depth Using NIST 800-30
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...Extended Detection and Response (XDR)An Overhyped Product Category With Ulti...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
 
Cyber threat intelligence ppt
Cyber threat intelligence pptCyber threat intelligence ppt
Cyber threat intelligence ppt
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity CollaborationIntegrated Security Operations Center (ISOC) for Cybersecurity Collaboration
Integrated Security Operations Center (ISOC) for Cybersecurity Collaboration
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Alien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligenceAlien vault sans cyber threat intelligence
Alien vault sans cyber threat intelligence
 
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
Meet the New IBM i2 QRadar Offense Investigator App and Start Threat Hunting ...
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
What operational technology cyber security is?
What operational technology cyber security is?What operational technology cyber security is?
What operational technology cyber security is?
 
Security Operations Center
Security Operations CenterSecurity Operations Center
Security Operations Center
 
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
NTXISSACSC2 - The Role of Threat Intelligence and Layered Security for Intrus...
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Governance of security operation centers
Governance of security operation centersGovernance of security operation centers
Governance of security operation centers
 

Viewers also liked

101 run commands
101 run commands101 run commands
101 run commandsSunil Patel
 
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primeramiable_indian
 
Networking session-4-final by aravind.R
Networking session-4-final by aravind.RNetworking session-4-final by aravind.R
Networking session-4-final by aravind.RNavaneethan Naveen
 
Information gathering using windows command line utility
Information gathering using windows command line utilityInformation gathering using windows command line utility
Information gathering using windows command line utilityVishal Kumar
 
100+ run commands for windows
100+ run commands for windows 100+ run commands for windows
100+ run commands for windows Anand Garg
 
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003  -may10_-_lect02a_-_intro_to_networking_commands_softwareUccn1003  -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_softwareShu Shin
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security PresentationAllan Pratt MBA
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and SolutionsColin058
 

Viewers also liked (13)

Oasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITILOasys Stonesoft Aligned with ITIL
Oasys Stonesoft Aligned with ITIL
 
101 run commands
101 run commands101 run commands
101 run commands
 
The Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A PrimerThe Top 10/20 Internet Security Vulnerabilities – A Primer
The Top 10/20 Internet Security Vulnerabilities – A Primer
 
1218 MVT
1218 MVT1218 MVT
1218 MVT
 
Trace route
Trace routeTrace route
Trace route
 
Networking session-4-final by aravind.R
Networking session-4-final by aravind.RNetworking session-4-final by aravind.R
Networking session-4-final by aravind.R
 
Information gathering using windows command line utility
Information gathering using windows command line utilityInformation gathering using windows command line utility
Information gathering using windows command line utility
 
100+ run commands for windows
100+ run commands for windows 100+ run commands for windows
100+ run commands for windows
 
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003  -may10_-_lect02a_-_intro_to_networking_commands_softwareUccn1003  -may10_-_lect02a_-_intro_to_networking_commands_software
Uccn1003 -may10_-_lect02a_-_intro_to_networking_commands_software
 
Windows network security
Windows network securityWindows network security
Windows network security
 
Network Security Presentation
Network Security PresentationNetwork Security Presentation
Network Security Presentation
 
Network security
Network securityNetwork security
Network security
 
Network Security Threats and Solutions
Network Security Threats and SolutionsNetwork Security Threats and Solutions
Network Security Threats and Solutions
 

Similar to Cyber Intelligence Operations Center

A New Approach to Healthcare Security
A New Approach to Healthcare SecurityA New Approach to Healthcare Security
A New Approach to Healthcare SecurityAngel Villar Garea
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonPatricia M Watson
 
Carbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityCarbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityMighty Guides, Inc.
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive ActionMighty Guides, Inc.
 
vmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepapervmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepaperTony Amaddio
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentJonathan Sinclair
 
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013drewz lin
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterEMC
 
Industry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityIndustry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityEMC
 
" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "Bill Ross
 
Career Opportunities in Cyber Security
Career Opportunities in Cyber SecurityCareer Opportunities in Cyber Security
Career Opportunities in Cyber Securitystjohns9
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksMighty Guides, Inc.
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdSusan Darby
 
White Paper: The Cyber Resilience Blueprint: A New Perspective on Security
White Paper: The Cyber Resilience Blueprint: A New Perspective on SecurityWhite Paper: The Cyber Resilience Blueprint: A New Perspective on Security
White Paper: The Cyber Resilience Blueprint: A New Perspective on SecuritySymantec
 

Similar to Cyber Intelligence Operations Center (20)

Cisco 2017 Midyear Cybersecurity Report
Cisco 2017 Midyear Cybersecurity ReportCisco 2017 Midyear Cybersecurity Report
Cisco 2017 Midyear Cybersecurity Report
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
 
Cyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdfCyber security report 2017 cisco 2017 acr_pdf
Cyber security report 2017 cisco 2017 acr_pdf
 
A New Approach to Healthcare Security
A New Approach to Healthcare SecurityA New Approach to Healthcare Security
A New Approach to Healthcare Security
 
CIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 WatsonCIA Trifecta ISACA Boise 2016 Watson
CIA Trifecta ISACA Boise 2016 Watson
 
Carbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint SecurityCarbon Black: Justifying the Value of Endpoint Security
Carbon Black: Justifying the Value of Endpoint Security
 
Using Security Metrics to Drive Action
Using Security Metrics to Drive ActionUsing Security Metrics to Drive Action
Using Security Metrics to Drive Action
 
vmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepapervmware-best-practices-healthcare-it-security-whitepaper
vmware-best-practices-healthcare-it-security-whitepaper
 
Cyber speed – the unknown velocity component
Cyber speed – the unknown velocity componentCyber speed – the unknown velocity component
Cyber speed – the unknown velocity component
 
Job help
Job helpJob help
Job help
 
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
Ast 0079872 1505924-esg_wp_rsa_big_data_and_security_analytics_jan_2013
 
Building an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations CenterBuilding an Intelligence-Driven Security Operations Center
Building an Intelligence-Driven Security Operations Center
 
Industry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven SecurityIndustry Overview: Big Data Fuels Intelligence-Driven Security
Industry Overview: Big Data Fuels Intelligence-Driven Security
 
" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "" The Invisible Person ... the Security Architect "
" The Invisible Person ... the Security Architect "
 
Career Opportunities in Cyber Security
Career Opportunities in Cyber SecurityCareer Opportunities in Cyber Security
Career Opportunities in Cyber Security
 
Cyberedge 2015 Defense Report
Cyberedge 2015 Defense Report Cyberedge 2015 Defense Report
Cyberedge 2015 Defense Report
 
Carbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down AttacksCarbon Black: Keys to Shutting Down Attacks
Carbon Black: Keys to Shutting Down Attacks
 
Cyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sdCyber Resilience white paper 20160401_sd
Cyber Resilience white paper 20160401_sd
 
CSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUPCSCSS / DEFENCE INTELLIGENCE GROUP
CSCSS / DEFENCE INTELLIGENCE GROUP
 
White Paper: The Cyber Resilience Blueprint: A New Perspective on Security
White Paper: The Cyber Resilience Blueprint: A New Perspective on SecurityWhite Paper: The Cyber Resilience Blueprint: A New Perspective on Security
White Paper: The Cyber Resilience Blueprint: A New Perspective on Security
 

More from Bill Ross

Cyber Security Command, Control, Communications, Computers Intelligence Surve...
Cyber Security Command, Control, Communications, Computers Intelligence Surve...Cyber Security Command, Control, Communications, Computers Intelligence Surve...
Cyber Security Command, Control, Communications, Computers Intelligence Surve...Bill Ross
 
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_ExaminationCyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_ExaminationBill Ross
 
Cyber_Space_is_not_Cyber_Security
Cyber_Space_is_not_Cyber_SecurityCyber_Space_is_not_Cyber_Security
Cyber_Space_is_not_Cyber_SecurityBill Ross
 
Infosecforce security services
Infosecforce security servicesInfosecforce security services
Infosecforce security servicesBill Ross
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software developmentBill Ross
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanBill Ross
 
Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Bill Ross
 
INFOSECFORCE llc security services
INFOSECFORCE llc security servicesINFOSECFORCE llc security services
INFOSECFORCE llc security servicesBill Ross
 
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of..." Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...Bill Ross
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management ProcessBill Ross
 

More from Bill Ross (10)

Cyber Security Command, Control, Communications, Computers Intelligence Surve...
Cyber Security Command, Control, Communications, Computers Intelligence Surve...Cyber Security Command, Control, Communications, Computers Intelligence Surve...
Cyber Security Command, Control, Communications, Computers Intelligence Surve...
 
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_ExaminationCyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
Cyber_Warfare_Escalation_to_Nuclear_Warfare_Examination
 
Cyber_Space_is_not_Cyber_Security
Cyber_Space_is_not_Cyber_SecurityCyber_Space_is_not_Cyber_Security
Cyber_Space_is_not_Cyber_Security
 
Infosecforce security services
Infosecforce security servicesInfosecforce security services
Infosecforce security services
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition Plan
 
Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015Security architecture analyses brief 21 april 2015
Security architecture analyses brief 21 april 2015
 
INFOSECFORCE llc security services
INFOSECFORCE llc security servicesINFOSECFORCE llc security services
INFOSECFORCE llc security services
 
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of..." Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
" Soviet Military Doctrine ... a Blueprint for the Future or an Indictment of...
 
Security Lifecycle Management Process
Security Lifecycle Management ProcessSecurity Lifecycle Management Process
Security Lifecycle Management Process
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSSIVASHANKAR N
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...ranjana rawat
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
(SHREYA) Chakan Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Esc...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

Cyber Intelligence Operations Center

  • 1. CIOC DRAFT ….. by Bill Ross, 5 October 2013 Title: Replacing the SOC with a modernized Cyber Intelligence Operations Center (CIOC) A paper by INFOSECFORCE 804-855-4988 infosecforce@yahoo.com
  • 2. CIOC DRAFT ….. by Bill Ross, 5 October 2013 Introduction ......................................................................................................................................4 Purpose ............................................................................................................................................4 The Cyber Threat Situation..............................................................................................................5 The CIOC Corrective Action Plan ....................................................................................................8 Description our current SOC think ...................................................................................................9 Big Data ….. what is it and what does it mean for security........................................................... 10 Security industry reflection on managing the BD challenge...................................................... 10 The IBM solution for Intelligence and Big Data...................................................................... 11 Solution Overview ................................................................................................................... 11 CIOC Operational description (draft) ............................................................................................. 17 Intelligence management cycle ..................................................................................................... 17 FBI Intelligence Cycle .................................................................................................................... 18 “ Requirements ........................................................................................................................... 18 Planning and Direction ............................................................................................................... 18 Collection .................................................................................................................................... 19 Processing and Exploitation....................................................................................................... 19 Analysis and Production............................................................................................................. 19 Dissemination ............................................................................................................................. 19 Defense in Depth core function descriptions................................................................................. 19 Predict attacks on an organization’s assets .............................................................................. 19 Prevent attacks on an organization’s assets ............................................................................. 20 Detect attacks on an organization’s assets ............................................................................... 21 Respond to attacks on an organization’s assets ....................................................................... 22 A CIOC Control Framework ........................................................................................................... 23 SANS 20 Critical Controls ...................................................................................................... 24 Summary ........................................................................................................................................ 24 Future think Epilogue ..................................................................................................................... 25 Appendix 1 The overall summary of a SOC organization...................................................... 26 Other interesting references .......................................................................................................... 28
  • 3. CIOC DRAFT ….. by Bill Ross, 5 October 2013 Figure 1 Defines the Defense in Depth approach to enterprise security .......................................5 Figure 2 SC Magazine’s report on the staggering number of data breaches in the US ................8 Figure 3 The IBM Intelligence and Big Data reference model ..................................................... 12 Figure 4 RSA SIEM Envision reference model ............................................................................ 14 Figure 5 Depicts the FBI Intelligence Management Cycle ........................................................... 18 Figure 6 Depicts the CWE overall vulnerability management framework ( I love this image ) ... 22 Table 1 Shows the integration of Controls, DID and Intelligence Management .......................... 24
  • 4. CIOC DRAFT ….. by Bill Ross, 5 October 2013 Creating a Cyber Intelligence Operations Center (CIOC) and why it is needed to fight the undeclared Cyber War Introduction I am a retired Air Force Intelligence Officer. After the Air Force, I have had the good fortune to have worked at interesting jobs in the private sector in places like CSC at JP Morgan, The HSBC, the Federal Reserve, Northrop Grumman, and AIG/UGC. I am highly concerned about the fractured approach in various organizations for command and control processes and procedures to fight the global Cyber War as it relates to an organization’s vital information assets. I created this paper to suggest an organizational and process structure to dynamically manage the threat. If you manage a SOC or are in the business of building one, may I suggest you adopt the below suggested framework and change the name of the SOC to the CIOC. Here is my linked in connection: w ww.linkedin.com/pub/bill-ross/0/20b/a11 Purpose We are fighting a global undeclared global cyber war. We are in a cyber warfare arms race between the offense and defense and how we deal with cyber thugs. We are using old methods, tools and structures to fight the expanding cyber war. To modernize our approach to fighting this war this paper will address replacing old think SOCs with the modern Cyber Intelligence Operations Center (CIOC). The CIOC will serve as the convergence organizational structure to integrate the Department of Defense type intelligence cycle, the organization’s defense in depth cyber battle management strategy, Big Data analytics and an organization’s control management framework. The CIOC is applicable to the private and public sectors. The CIOC is needed to:  modernize strategy, tactics, and procedures in the security profession,  integrate the new wave of security product intelligence and analytics inputs,  create the new paradigm for Cyber War Fighting in the private and public sectors,
  • 5. CIOC DRAFT ….. by Bill Ross, 5 October 2013  create common frameworks for information sharing between private and public sectors,  create an awareness of Cyber War Fighting strategy, doctrine, and tactics,  defeat the cyber enemy through the CIOC command and control of an organization’s cyber defense in depth The Cyber Threat Situation For numerous years, I emphasized that we should not use fear, uncertainty and doubt (FUD) to achieve our organizational security objectives. My belief is that one should make a logical business case based on metrics, return on investment and expected results to acquire new staff and increase our security tool budget. I have shifted my paradigm a bit and have begun stressing the lack of cyber warfare mobilization and threat management in the private sector in particular. Global organizations need to embrace and accept that there is an undeclared cyber war being waged against industry and government and that we must define our private sector and government agencies’ strategy, doctrine, and tactics to fight the cyber war. Prevention Prevents or deters attacks so no loss is experienced Detection Detect attacks not prevented to allow for rapid and thorough response Matt Rosenquist, Intel Defense in Depth Information Security Strategy Prediction: Proactive measures to identify attackers, their objectives and their methods prior to materialization of viable attacks. Enables and maximizes Prevention activities. Information Security Strategy Prevention: Securing the computing environment with current tools, patches, updates and best-known-methods in a timely manner. Represents the bulk of cost ef fective security capabilities and facilitates better Detection. Detection: Visibility to key areas and activities. Ef fective monitoring to identify issues, breaches, and attacks. Drives immediate interdiction by Response capabilities Response: Efficient management of ef forts to contain, repair, and recover as needed to return the environment to normal operations. Reduces losses by rapidly addressing issues and feeds intelligence into IT Strategy Prediction and Prevention areas Prediction Predict the most likely attacks, targets, and methods Response Respond rapidly to security incidents to minimize losses and return to a normal state Figure 1 Defines the Defense in Depth approach to enterprise security Private and government sectors are, at times, being clobbered by an invisible enemy that seems to own numerous government, private networks and business applications. Information Security Teams across the globe are fighting the good fight and win and lose in this battle. Cyber war is almost the perfect terrorist structure of compartmentalization of multiple global cells dedicated to very similar goals and objectives but they have no or limited cross
  • 6. CIOC DRAFT ….. by Bill Ross, 5 October 2013 communication and planning. One reason they do not need this coordination is that there is a target rich environment that all cyber miscreants attack and achieve their goals of nation state espionage, SCADA terrorist attacks, identity theft, financial theft and etc. Every year, thousands of articles and conferences across the globe address the tactics and procedures to address this challenge and when one reads the literature and attends the meetings, one knows that the most fundamental and missing piece to orchestrating and defining a cyber security arsenal is a cohesive, risked-based methodology that needs to define and implement solutions to the sometimes chaotic response to threats. A primary solution to managing this cyber theater of war is to create a central organizational cyber command and control battle space management element and that is the Cyber CIOC. KPMG articulated the business case for greater threat awareness and the application of intelligence solutions in its excellent White Paper “Cyber threat intelligence and the lessons from law enforcement” “ Cyber security breaches are rarely out of the media’s eye. As adversary sophistication increases, many organizations react when it is too late – the attack is underway. Few organizations have the capability to anticipate cyber threats and implement preventative strategies, despite prevention being more cost effective and customer focused. This is not a new threat and hackers have been infiltrating sensitive government systems since the early 1990s. However, the focus on cyber security is increasing rapidly due to many high profile and highly disruptive/damaging security breaches threatening financial and physical damage across critical national and corporate infrastructures. It also appears the nature of the threat is changing. In our most recent survey, 67 percent of data loss resulted from external hacking, while the insider threat is surprisingly at an all time low. The Information Security landscape is constantly evolving. Private and public sector organizations find it difficult to believe they could be a target for cyber attacks. This mindset needs to change – as the best offence is a good defense. At the same time, it is no longer viable to rely on defense. The determined adversary will get through eventually. As a result, organizations must know what is going on around them so that they can identify when an attack has taken place or when an attack is imminent. Intelligence and the insight that it brings is at the heart of next generation Information Security. “ Source: KPMG
  • 7. CIOC DRAFT ….. by Bill Ross, 5 October 2013 While KPMG does a great job defining threat intelligence, it did not discuss how to “pull it all together” in an organizational structure. The CIOC is the integration and command and control intelligence element to manage the threats and actions defined by KPMG. I think Leon Panetta’s powerful observation on cyberwarfare punctuates the magnitude of today’s’ cyber threat. He equates the cyber war strategic threat to a similar problem we had with the nuclear threat of the past: “Just as nuclear was the strategic warfare of the industrial era, cyberwarfare has become the strategic war of the information era,” says U.S. Secretary of Defense Leon Panetta. Cyberespionage and cybersabotage are already a reality. Outside the realm of states and their proxies, corporate spies are using increasingly advanced techniques to steal company secrets or customer data for profit. Hactivists with political and anti business agendas are also busy. The string of media revelations about security breaches this year suggests that the business world is just as vulnerable to attack as ever “ Source: SYMANTEC 2013 threat report and Aviation Week & Space Technology, October 22, 2012, 82 I had considered inserting a detailed comprehensive summary of the cyber threat. However, I could no better job than Symantec did in its excellent 2013 threat report seen at the below link. Source: http://www.symantec.com/content/en/us/enterprise/other_resources/b-istr_ main_report_v18_2012_21291018.en-us.pdf Symantec summarized the threat landscape in its executive summary in its 2013 Threat Report. “ Threats to online security have grown and evolved considerably in 2012. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media and mobile devices have come under increasing attack in 2012, even as spam and phishing attacks via traditional routes have fallen. Online criminals are following users onto these new platform.”
  • 8. CIOC DRAFT ….. by Bill Ross, 5 October 2013 INFOSECFORCES’s perspective is the threat is pervasive, highly intelligent, omnipotent, sometimes incomprehensible in such areas as the success of the “Advance Persistent Threat” (APT) and the advancement of SCADA attacks. The threat pervades almost every part of an organization’s processes, its applications, infrastructure, people, access control management, and almost every part of the OSI stack. One core graphic from SC Magazine’s excellent monthly threat report summarizes one of the most critical data management failures and that is staggering number of data breeches since 2005. SC September 2013 Figure 2 SC Magazine’s report on the staggering number of data breaches in the US I recently spoke with a highly respected CISO who said to me “Bill, I just cannot keep up as there is just too much out there anymore to keep track of it all”. How do we deal with his concerns? The CIOC Corrective Action Plan
  • 9. CIOC DRAFT ….. by Bill Ross, 5 October 2013 To fight the Cyber War at the grassroots level, every major corporation should create a Cyber Intelligence Operations Center (CIOC) to replace the older model SOCs. CIOCs will truly produce the finished intelligence from the raw data our systems are collecting. Even when the data is correlated to a degree in the SIEM, the human still needs to derive the intelligence from the data reported as it relates to the organization’s integrated defense in depth program ……. prediction, prevention, detection, and response? Figure 1 depicts an integrated DID. The situation is this: Many security companies now say they can provide intelligence services and create intelligence information. Some can do so more than others. Likewise, they tout that they operate in the "Big Data" space but they really do not yet as we, as an industry, are maturing our processes and doctrine to operate in this space. When I have discussed with vendors the process by which they turn data into intelligence, they do not really understand the art form of building intelligence process, tactics, techniques, procedures, and strategies for a CIOC-like intelligence function and develop the corporate intelligence requirements needed to fight the ongoing Cyber War. They are rapidly learning how to do so. When creating a CIOC, a primary requirement should be that at all costs it should be collocated physically or virtually with the network operations center (NOC). It never made sense to me when I would see separated SOCs and NOCs. The best model for responding to a threat and incident is to have shared resources and information to understand the possible initial indications and warnings (I&W) that an attack or compromise could, is, or has happened. Some organizations do geo locate the SOC and NOC in what is called an NSOC. The short below narration from a Wikipedia reference defines the old think approach to managing the cyber threat environment in a SOC. For more information on a SOCs structure and organization, refer to appendix one. Description our current SOC think SOC Objective “ A SOC is the people, processes and technologies involved in providing situational awareness through the detection, containment, and remediation of IT threats. A SOC manages incidents for the enterprise, ensuring they are properly identified, analyzed, communicated, actioned/defended, investigated and reported. The SOC also monitors applications to identify a possible cyber-attack or intrusion (event) and determine if it is a real, malicious threat (incident), and if it could have a business impact.” NOTE: The above is a good summary of what a mature SOC should have done as our model deployed. The fundamental energy missing from the description is that we have moved passed
  • 10. CIOC DRAFT ….. by Bill Ross, 5 October 2013 just “situational” awareness that we are “now playing with live ammo” and the cyber war threat situation requires a real time battle management function that is connected in real time to the variety of threats and the time-space warp in which they occur. There must be an organizational dynamic intelligence process using the below intelligence management cycle core functions that feeds the CIOC battle management requirements. Given the magnitude of the global threat environment, the SOC must migrate to the CIOC model. The CIOC model is defined below but we must first examine the impact of Big Data and Security Intelligence on our current operational state. Big Data ….. what is it and what does it mean for security While this paper will not address how to secure “Big Data” (BD) and data warehouses (topic for another paper), we must reflect on the impact of BD in relationship to Cyber Attacks, Intelligence collection and processing, and the fact that that BD is creating numerous new vectors from which a threat can explode and where the risks, vulnerabilities and exposures can reside. It seems the term “big data” is everywhere in business and technical writings. BD is the new target rish environment that we need to protect. In the simplest reflection of what BD is, it is the aggregation and business use of far more data than we have ever had before in far more places than it has ever been before. The exponential growth of BD means that security professionals have a far more complex problem of performing our primary mission of protecting the corporation’s assets. Likewise, given the magnitude of the data storage and use by numerous businesses within an organization, how do we now secure this data? Firstly, I would create a new role called the Data Security Manager (DSM) and embed him in the CIOC. The DSM would know all aspects of how the organization uses data, where it is at, define the data security strategy and be familiar with all data usage tools like Data Analytics, Hadoop, Cognos, organic data base security functions like SQL and Oracle Security and etc. Secondly, I would modernize my security architecture and organizational structure in the CIOC to manage the fluid and dynamic nature of our ‘Data World” Security industry reflection on managing the BD challenge While this paper is not designed to endorse certain products and services, we do recognize the extensive work that our security colleagues have done in the areas of Cyber Intelligence and BD. We will quote some industry leaders in the below paragraphs. NOTE: Our paper is designed to suggest how and where to manage the Cyber Threat in the CIOC. The point to take away from this section is how should security professionals think about the BD challenge as it relates to developing your Cyber Intelligence Collection Plan and your Defense in Depth Programs within your organization’s Control Objective Frame work.
  • 11. CIOC DRAFT ….. by Bill Ross, 5 October 2013 With that in mind, let’s look at some of the writings about BD from IBM and RSA/EMC. The IBM solution for Intelligence and Big Data “ IBM Security Intelligence with Big Data provides exceptional threat and risk detection, combining deep security expertise with analytical insights on a massive scale. For forward-leaning organizations seeking advanced insight into security risks, the IBM solution – including IBM QRadar Security Intelligence Platform and IBM Big Data Platform – provides a comprehensive, integrated approach that combines real-time correlation for continuous insight, custom analytics across massive structured and unstructured data, and forensic capabilities for irrefutable evidence. The combination can help you address advanced persistent threats, fraud and insider threats. The IBM solution is designed to answer questions you could never ask before, by widening the scope and scale of investigation. You can now analyze a greater variety of data – such as DNS transactions, emails, documents, social media data, full packet capture data and business process data – over years of activity. By analyzing structured, enriched security data alongside unstructured data from across the enterprise, the IBM solution helps find malicious activity hidden deep in the masses of an organization’s data. IBM Security intelligence: Security intelligence is the continuous real-time collection, normalization and analysis of data generated by users, applications and infrastructure. It integrates functions that have typically been segregated in first-generation security information and event management (SIEM) solutions, including log management, security event correlation and network activity monitoring. Data collection and analysis goes well beyond traditional SIEM, with support for not only logs and events, but also network flows, user identities and activity, asset profiles and configurations, system and application vulnerabilities, and external threat intelligence within the single warehouse. Solution Overview IBM Security Intelligence with Big Data combines the real-time security visibility of the IBM QRadar Security Intelligence Platform with the custom analytics of the IBM Big Data Platform. QRadar performs real-time correlation, anomaly detection and reporting for immediate threat detection, and also sends enriched security data to IBM big data products, such as IBM InfoSphere BigInsights. IBM big data products analyze enriched security information from QRadar along with vast amounts of data from unstructured and semi-structured sources, accommodating both the variety and volume of data needed for advanced security and risk use cases. Information is subsequently fed back to QRadar, providing a facility for closed-loop, continuous learning.
  • 12. CIOC DRAFT ….. by Bill Ross, 5 October 2013 The result is an integrated, intelligent solution that collects, monitors, analyzes, explores and reports on security and enterprise data in ways previously not possible. And the solution is designed so you can start with any product in the IBM solution and add complementary capabilities as your needs evolve. Key capabilities include:  Real-time correlation and anomaly detection of diverse security data  High-speed querying of security intelligence data  Flexible big data analytics across structured and unstructured data – including security data; email, document and social media content; full packet capture data; business process data; and other information  Graphical front-end tool for visualizing and exploring big data  Forensics for deep visibility “ Figure 3 The IBM Intelligence and Big Data reference model http://www-03.ibm.com/security/solution/intelligence-big-data/
  • 13. CIOC DRAFT ….. by Bill Ross, 5 October 2013 Please see an awesome security analytics and intelligence brief by Anand Ranganathan, TJ Watson research Center at this link. http://www.slideshare.net/SwissHUG/big-data- for-cybersecurity INFOSECFORCE Comment: Similar to KPMG, IBM does not suggest an organizational structure like a CIOC to manage all their new product output. EMC/RSA Envision and Art Coviello’s dead on speech This section reflects the RSA EMC methodology for SIEMS in the era of security analytics, big data, and cyber intelligence requirements. IBM and RSA have similar and mature reflections on Security Intelligence. It seems IBM is tuned to the BD Intelligence and analytics focus while RSA EMC is more tuned to the actual SIEM operations space. If I were a rich man, I would integrate the two solutions. There are numerous other SIEMS out there like the famous Splunk and one of my favorites, Log Rhythm. However, I really like the deep and advanced thinking Art Caviello, CEO RSA-EMC has given to the convergence of BD, Intelligence, and Analytics and thus have included Envision as an example of what you can use to build your CIOC methodology around. Art’s vision is included in this section at the end of the Envision product descriptions. “ The RSA® enVision® platform provides a centralized log management service that enables organizations to simplify their compliance programs and optimize their security incident management. The RSA enVision solution facilitates the automated collection, analysis, alerting, auditing, reporting, and secure storage of all logs. Organizations can simplify compliance by using regulation-specific, out-of-the-box reports, alerts and correlations rules. Reports can be scheduled to be delivered at a specific time or run on an ad-hoc basis. Alerts can be delivered through the intuitive user interface, via SMS, or email. Administrators don’t have to be glued to the interface at all times. Auditors can even be granted read-only access to the enVision platform so that they can access the reports whenever they need them. Security incident management is optimized by using the purpose-built incident management tool within the enVision platform. Incidents can be identified, tagged with evidence, and passed along through the organization’s ticketing system. The RSA enVision platform is also integrated with RSA Archer™ eGRC enabling business context to
  • 14. CIOC DRAFT ….. by Bill Ross, 5 October 2013 be applied to each incident. Business context means applying relating incidents to larger business objectives. “ Source: http://www.emc.com/collateral/data-sheet/9245-h9037-3in1-ds.pdf Figure 4 RSA SIEM Envision reference model Source: http://virtualization.info/en/news/2010/10/hytrust-partners-with-rsa.html “ The traditional cyber security model has become almost useless as a result of the massive proliferation of smart phones, Web-based apps, social networks, and Internet-connected machines. But just as the new world of BD provides cover for cyber attackers, big data is also the only answer for devising a next-gen security system that can cope with emerging threats “, RSA executive chairman Art Coviello said at a conference last week. Speaking at the Third Annual International Cybersecurity Conference in Tel Aviv, Israel, Coviello highlighted how today's approach to information security is losing effectiveness, and laid out
  • 15. CIOC DRAFT ….. by Bill Ross, 5 October 2013 plans for a new "intelligence driven" approach that can spot the signal in the noise, and cope with the rapid fire growth of technology. "In the first two decades of the new millennia, we'll have gone from a cyber attack surface that has just a few points of egress and ingress through a controlled firewall perimeter, to almost infinity, when you think of the impact of mobility, web apps, big data, social media, and the Internet of things," Coviello said in a video of the speech. "Already in 2013, we're in a hyperconnected world that has facilitated access and productivity for all of us, but with unintended consequence of doing the same for our adversaries," he said. "And if all that weren't enough, it's getting easier and easier with the advent of social media for our adversaries, to trick, spoof, and assume our digital personas." Coviello recommends that organizations stop spending up to 80 percent of their security budgets on building perimeter defenses that have steadily been losing effectiveness against attacks from rouge states, "hactivists," and cyber criminals. Instead, organizations ought to prepare for the transition to intelligence-driven systems that have big data at their hearts. This new system, which Coviello also discussed at the RSA conference earlier this year, will be characterized by the use of "dynamic and agile controls" on the perimeter and a central management system "that has the ability to analyze vast streams of data from numerous sources to produce actionable information." The central security management system "must be able to gain full visibility into all data-- unstructured, structured, internal, and external. The underlying big data architectures will be scalable enough such that all data will be analyzed, no matter how expansive or fast changing," he said. "As a result, organizations will be able to build a mosaic of specific information about digital assets, users, and infrastructures… and correlate abnormal behavior in people and in the flow and use of data," Coviello said. "The management system must be well integrated with GRC [governance, risk, and compliance] systems and specific tools, so that we can detect those attacks early or even in advance, and then trigger automated defenses, such as blocking network traffic, quarantining systems, and requiring additional identity verification." The access controls will also be smart in the new big data-driven security world. "They will also have the capacity to be self learning," he said. "They will be able to inform or be informed by
  • 16. CIOC DRAFT ….. by Bill Ross, 5 October 2013 other controls. They'll be able to feed or receive intelligence from security management systems, and report to and receive instructions from GRC systems. Armed with a thorough understanding of risk at the outset, this big data oriented management and control environment completes a vision of intelligent driven security." Such a big data-driven security system will be able to "find the hidden patterns, the unexpected correlation, the surprising connections" between data points in the wild, he said. "It's about analyzing vast and complex data sets at high speed, which in our case will allow us to spot the fake signal of an attack. Because at some point, no matter how clever the attacker, they must do something anomalous." Today, the most a cyber attacker can expect to achieve is to disrupt an organization's activities, such as through a denial of service attack. But thanks to the proliferation of big data and greater sophistication and coordination on the part of attackers, destructive attacks executed solely through the Internet will soon become the norm, Coviello said. "Despite the hype, destructive attacks are still next to impossible to carry out solely through the Internet without manual intervention," he said. "But as we transition to IPV6 and create the Internet of things, IP enabling more and more elements of our physical infrastructure, attacks on digital systems that result in physical destruction will become a reality--a chilling, sobering thought." There must be a sense of urgency among stakeholders to deal with the "ongoing expansion of the attack surface and the escalation of the threat environment," he said. "The only way to reach and maintain the appropriate level of understanding is through knowledge," he said. "From a much higher level of collaboration between public, private, and vendor organizations, knowledge will replace fear with confidence, knowledge will guide our actions." Source: http://www.datanami.com/datanami/2013-07- 03/big_data_at_the_heart_of_a_new_cyber_security_model.html INFOSECFORCE comment: Similar to IB and KPMG, RSA/EMC did not suggest a specific new type of organization to manage new security Intelligence demand. Although, Art did make references to the new “central security management system”. I propose the new management system is the CIOC and its strategy, tactics, and procedures meet his goal of a central security management system.
  • 17. CIOC DRAFT ….. by Bill Ross, 5 October 2013 CIOC Operational description (draft) The CIOC is the private or public sector dynamic cyber battle management operations center for managing an organization’s defense in depth and intelligence collection strategies to predict, prevent, detect, and respond to all forms of cyber security threats against an organization’s vital human, information, production, and infrastructure assets. These demands are detailed above. The CIOC operates within the organization’s defined control management framework. The 24 X 7 CIOC is led by the chief security operations officer (CSOO) and includes a highly skilled and trained cyber security staff. As much as possible, the CSOO should hire prior military personnel with Cyber War Fighting experience. The CIOC is the center for managing the security of an organization’s data challenges where ever sensitive data may reside …… data centers, the cloud, big data storage, end points, customer sites, out sourced sites, BYOD, partner sites, and etc. The CIOC processes large amounts of data from a variety amount of information sources that include but are not limited to the Security Incident and Event Management (SIEM) tool. The CIOC will consume data from a host of other information sources to include such major information sources like the Big Data and business intelligence tools, ERP tools, People Soft, SAP and etc and will turn that data into actionable intelligence. Based on the organization’s intelligence collection plan, the CIOC will produce actionable intelligence that will not only influence the complete cyber security span of control nut it will also provide another form of business intelligence that the CEO can use for profit and loss decisions base on a cyber risk-based analyses. The CIOC should have NOC real time information feeds to quickly correlate network anomalies to possible security events. Intelligence management cycle DoD and government agencies have historically use the Intelligence collection cycle model to drive and frame its intelligence collection plan in peacetime and wartime. The private sector can and should use this simple but powerful framework to drive its security intelligence operations from the CIOC. I have adopted the FBI’s intelligence cycle against which to model a possible private sector intelligence collection plan.
  • 18. CIOC DRAFT ….. by Bill Ross, 5 October 2013 FBI Intelligence Cycle Figure 5 Depicts the FBI Intelligence Management Cycle Source: http://www.fbi.gov/about-us/intelligence/intelligence-cycle The CISO and the CSOO must use the Intelligence Cycle to manage their information collection process and intelligence collection cycle to support the below tenants of the organization’s Defense in Depth Strategy. NOTE: The below definitions are extracted from the FBI Intelligence Cycle. I have modified the instructions to align the FBI Intelligence Cycle to the CIOC requirements. If you want to see original FBI writings, please go to the above FBI web site for same. “ Requirements are identified information needs—what we must know to safeguard the organization. Intelligence requirements are established by the CISO according to guidance received from the CIO. Requirements are developed based on critical information required to protect the organization from national security and criminal threats. The security team and technical team managers participate in the formulation of organizational intelligence requirements. Planning and Direction is management of the entire effort, from identifying the need for information to delivering an intelligence product to a consumer. It involves implementation plans to satisfy requirements levied on the organization, as well as identifying specific collection requirements based on the organization’s needs. Planning and direction also is responsive to the end of the cycle, because current and finished intelligence, which supports decision-making, generates new requirements. The director for the security operations and DSOO Branch leads intelligence planning.
  • 19. CIOC DRAFT ….. by Bill Ross, 5 October 2013 Collection is the gathering of raw information based on requirements. Activities such as security product technical means, interviews, technical reconnaissance, human source operation, and liaison relationships result in the collection of intelligence. Processing and Exploitation involves converting the vast amount of information collected into a form usable by analysts. This is done through a variety of methods including decryption, language translations, and data reduction. Processing includes the entering of raw data into databases where it can be exploited for use in the analysis process. The above IBM and RSA models support this area. Analysis and Production is the conversion of raw information into intelligence at the CIOC. It includes integrating, evaluating, and analyzing available data, and preparing intelligence products. The information’s reliability, validity, and relevance is evaluated and weighed. The information is logically integrated, put in context, and used to produce intelligence. This includes both "raw" and finished intelligence. Raw intelligence is often referred to as "the dots"—individual pieces of information disseminated individually. Finished intelligence reports "connect the dots" by putting information in context and drawing conclusions about its implications. Dissemination—the last step—is the distribution of raw or finished intelligence to the consumers whose needs initiated the intelligence requirements. The FBI disseminates information in three standard formats: Intelligence Information Reports (IIRs), FBI Intelligence Bulletins, and FBI Intelligence Assessments. FBI intelligence products are provided daily to the attorney general, the president, and to customers throughout the FBI and in other agencies. These FBI intelligence customers make decisions—operational, strategic, and policy—based on the information. These decisions may lead to the levying of more requirements, thus continuing the FBI intelligence cycle. “ INFOSECFORCE comment: I purposely left the “ dissemination” section intact as I recommend that similar to the FBI approach that each organization create Intelligence reports that your customers need. Be creative and responsive to all your customers and the need to protect the organizations vital assets !!! Defense in Depth core function descriptions More specifically, as mentioned above, the CIOC is the cyber battle management function that manages the multiple attack vectors against an organization’s vital assets through the CIOC management of the organization’s DID posture. Specific actions behaviors required for the defense in depth concept and functional management include: Predict attacks on an organization’s assets  Serious consideration of the results of the ongoing intelligence reports generated by the CIOC intelligence analyses and report team.
  • 20. CIOC DRAFT ….. by Bill Ross, 5 October 2013  Analyses of internal vulnerabilities, risks and exposures and the likelihood that specific exposures can be realized against the organization due unmitigated exposures.  Review SIEM and all other awareness dashboards that you might have at least twice a day  Constant analyses of the types of attacks that happen every day on the organization that might provide indications and warnings (I&W) of site enumeration  The introduction of new technologies that could cause a disruption of current processes and procedures. Cloud adoption could be considered a disruptive technology that could present new exposures non mitigated exposure.  High vigilance to Cyber Open Source Intelligence (COSI) information and intelligence sources to include multiple information security magazines, blogs, threat reports  Get feedback from other teams like network engineering on possible Indications and warnings you can integrate into you Prediction Strategy  Membership in core information sharing organizations like FS-ISAC  Membership in INFRAGUARD and similar organizations  Relationships with local law enforcement Prevent attacks on an organization’s assets  Define and build an state of the art security architecture that is aligned with an organizations risk profile  Build excellent security architecture documents  Tune all tools such as firewalls, access control functions, logging and alerting systems for maximum efficiency and regularly test same  Write process and procedures for all major procedures such as patch management, vulnerability management, Intelligence development, incident response and etc.  Ensure that security is aggressively built into the enterprise architecture and requirements documents  Base security management on IT governance such as ITIL  Define security standards and policies  Ensure the basic security blocking and tackling is done before implementing advanced tools and procedures  Use change control for all things that could affect the IT environment  Harden all platforms and applications against attack  Select a control environment such as SANS Top 20, FISMA, NIST 800-53, ISO 27000 series  Implement a superb patch management process that sets metric for current patch status at 95 per cent for all platforms, end points, data bases, applications, network devices and etc
  • 21. CIOC DRAFT ….. by Bill Ross, 5 October 2013  Strictly limit administrative access and manage with privilege management tools  Monitor access in real time  Implement robust static and in transit data loss protection plans (DLP)  Implement a robust secure software development program.  100 per cent compliance to government regulation and business compliance requirements like PCI  Conduct regular internal scans and pen tests using anyone of the host vulnerability assessment tools for platform and applications exposures.  Implement a ongoing security training program that is not given once a year  Invest in training the security staff  Build robust security metrics briefed by the CIOC CSOO to executives once a month to C level and once a quarter to Board level executives.  Lead your staff and all organization personnel in data protection Detect attacks on an organization’s assets  Prevent incidents form happening in the first place  Ensure a 24 X 7 detection capability is available  Deploy state of the art static and dynamic detection tools that your organization can fund  Define real time detection processes  Ensure employees are aware of how to report suspicious end point, platform and network intrusions  Extend detection to all BYOD and external systems  Mange threat detection in all cloud based services  Define SLAs for responding to threats  Determine which security systems should be in your DR and BC planning  Ensure you have managed out as many false positives and false negatives as possible  Use the CWE tools whenever possible http://cwe.mitre.org/. CWE is tuned to application security but it is an excellent but complex framework.
  • 22. CIOC DRAFT ….. by Bill Ross, 5 October 2013 Figure 6 Depicts the CWE overall vulnerability management framework ( I love this image ) Source: http://cwe.mitre.org/ Respond to attacks on an organization’s assets  Determine what the company’s appetite for incident response is. Is it willing to accept automated shut down of business processes and network segments.  Determine if you want to hire a DDOS threat mitigation service like Prolexic  Create and practice detailed incident repose process  Define response thresholds based on the attack areas and magnitude of same  Ensure global partners and external business customers are aware of incident response processes  Define escalation process  Conduct table top exercises to train entire staff on incident response and cyber crises management  Contract with external forensics investigator
  • 23. CIOC DRAFT ….. by Bill Ross, 5 October 2013  Ensure two incident management lines are established, one for executives and one for those doing the work to manage and terminate the incident  Develop and train on the RACI chart for incident management. Platform security incidents possibly could be managed by the platform manager.  Train internal staff for forensics investigations and but tools like EnCase  Conduct prior planning with all technical and c level staff  Know obligations and response procedures for such laws concerning a data breech. Let legal and marketing work the customer notification obligations.  Ensure incident response team is aware of all threat intelligence generated by the SOC  Ensure systems are configured to respond to attacks, is your IPS set to deny attacks  Oversee and be aware of all preventive measures that should prevent incidents from happening in the first place  Ensure that you have proper incident close out processes A CIOC Control Framework Building a CIOC and making it a organizational cyber battle management function is as much an art form as it is building the CIOC function and team. One needs to develop an organic approach on how the intelligence, BD, and Defense in Depth methodologies integrate and complement each other. Implementing an overarching control framework that keeps the organization focused on maintaining a positive risk posture is the cement upon which to base measurement and success. I developed the below table to show the possible integration of how the Intelligence Lifecycle, the core components of a defense in depth program could integrate with an organization’s control framework. In this case, I used the SANS Top 20 controls. The links are hot if you want to reach out to each SANS control. What this table does is it provides a reflection on the obvious and subtle dynamics that will happen within the CIOC. This dynamic combination for a Cyber Command and Control approach to protecting your vital assets expands the current definition and processes seen in a SOC. Intelligence Cycle Framework Predict Prevent Detect Respond Requirements X Planning and Direction X Collection X Processing and exploitation X X
  • 24. CIOC DRAFT ….. by Bill Ross, 5 October 2013 Analyses and production X X X Dissemination X X X SANS 20 Critical Controls 1: Inventory of Authorized and Unauthorized Devices X X 2: Inventory of Authorized and Unauthorized Software X X 3: Secure Configurations for Hardware and Software on Mobile Devices, Laptops, Workstations, and Servers X X 4:Continuous Vulnerability Assessment and Remediation X X X X 5: Malware Defenses X X X X 6: Application Software Security X 7: Wireless Device Control X X X 8: Data Recovery Capability X 9: Security Skills Assessment and Appropriate Training to Fill Gaps X X X X 10: Secure Configurations for Network Devices such as Firewalls, Routers, and Switches X X 11: Limitation and Control of Network Ports, Protocols, and Services X X X 12: Controlled Use of Administrative Privileges X X X 13: Boundary Defense X X X X 14: Maintenance, Monitoring, and Analysis of Audit Logs X X X X 15: Controlled Access Based on the Need to Know X X X 16: Account Monitoring and Control X X X 17: Data Loss Prevention X X X 18: Incident Response and Management X X 19: Secure Network Engineering X X X 20: Penetration Tests and Red Team Exercises X X X X Table 1 Shows the integration of Controls, DID and Intelligence Management http://www.sans.org/critical-security-controls/guidelines.php Summary Colleagues
  • 25. CIOC DRAFT ….. by Bill Ross, 5 October 2013 We are in an undeclared cyber war. The enemy is extremely talented, fluid, fast moving and highly compartmentalized. They can rapidly adapt and adjust to the defenses that we develop such as the Tuesday Patch Release and the AV and Malware definition update. Unlike the days of the old days of a SOC when the battle was relatively static, the cyber battlefield of today is fluid and changes every day. We must reflect similar nimbleness to counter and when possible, defeat the threat. The private and public sectors have begun to unite in the Strategic War that Leon Panetta defined above. We must advance this partnership and collaterally build similar tools, tactics and procedures that the public and private sector mutually understand. In our own right, we must now execute a convergence of a variety and complimentary new processes that might be somewhat disruptive into a new cyber security and intelligence management framework. Embracing the intelligence cycle, defining the defense in depth structure to protect our assets, creating common control frameworks, and building the CIOC to serve as the “new management system” that has a common doctrine that aligns the public and private sector is an essential solution to manage the time-space based cyber war that we will continuously wage as the war that never ends. Thank you for reading my paper Bill Ross, Greensboro, September 2013 Future think Epilogue I have touted and implemented a host of intelligence solutions while in the military that in one form or another used the principles of the Army's Intelligence Preparation of the Battlefield (IPB) methodology. In a way, I have applied IPB to private industry threat management teams. ESRI company geospatial mapping supports IPB as seen in the below link. My desire, over the years of being in Private Industry, is that we should have IPB solutions for Cyber Security and when I read about all of ESRI's capabilities and the ability to modify its amazing mapping capabilities, it hit me like a steam roller that if ESRI wants to get into the Cyber Warfare Space that there is no doubt in my mind that ESRI can build the first ever Intelligence Preparation of the Cyber Battlefield (IPCB) tool that will finally merge military intelligence principles with the intelligence functions that security companies are now promoting for private industry, and for the government/military for that matter. Private industry knows it needs to become more war like and DOD like in its approach to using security data and transforming the raw data into an intelligence product. The ESRI IPCB would be the front end tool that will help them do this by managing security intelligence data, see where the vulnerabilities are on their "ESRI mapped networks" and efficiently use their multiple collection methods to plan their CIOC end-to-end Cyber Intelligence campaigns.
  • 26. CIOC DRAFT ….. by Bill Ross, 5 October 2013 Appendix 1 The overall summary of a SOC organization http://en.wikipedia.org/wiki/Information_security_operations_center 1 Objective 2 Alternative names 3 Technology 4 People 5 Organization 6 Facilities 7 Process and Procedures 8 See also 9 References An information security operations center (or "SOC") is a location where enterprise information systems (web sites, applications, databases, data centers and servers,networks, desktops and other endpoints) are monitored, assessed, and defended. Objective A SOC is the people, processes and technologies involved in providing situational awareness through the detection, containment, and remediation of IT threats. A SOC manages incidents for the enterprise, ensuring they are properly identified, analyzed, communicated, actioned/defended, investigated and reported. The SOC also monitors applications to identify a possible cyber-attack or intrusion (event) and determine if it is a real, malicious threat (incident), and if it could have a business impact. Technology SOCs typically are based around a security information and event management (SIEM) system which aggregates and correlates data from security feeds such as network discovery and vulnerability assessment systems; governance, risk and compliance (GRC) systems; web site assessment and monitoring systems, application and database scanners; penetration testing tools; intrusion detection systems (IDS); intrusion prevention system (IPS); log management systems; network behavior analysis and denial of service monitoring; wireless intrusion prevention system; firewalls, enterprise antivirus and unified threat management (UTM). The SIEM technology creates a "single pane of glass" for the security analysts to monitor the enterprise. People SOC staff includes analysts, security engineers and SOC managers who are seasoned information and communication systems professionals. They are usually trained in computer engineering, cryptography, network engineering, or computer science and are credentialed (e.g. Certified
  • 27. CIOC DRAFT ….. by Bill Ross, 5 October 2013 Information Systems Security Professional (CISSP) from (ISC)², GIAC fromSANS, or Certified Information Security Manager (CISM) from ISACA). SOC staffing plans range from eight hours a day, five days a week (8x5) to twenty four hours a day, 7 days a week (24x7). Shifts should include at least 2 analysts and the responsibilities should be clearly defined. Organization Large organizations and governments may operate more than one SOC to manage different groups of information and communication technology or to provide redundancy in the event one site is unavailable. SOC work can be outsourced, for instance by using a Managed security service. The term SOC was traditionally used by governments and managed computer security providers, although a growing number of large corporations and other organizations also have such centers. The SOC and the network operations center (NOC) complement each other and work in tandem. The NOC is usually responsible for monitoring and maintaining the overall network infrastructure—its primary function is to ensure uninterrupted network service. The SOC is responsible for protecting networks, as well as web sites, applications, databases, servers and data centers, and other technologies. Likewise, the SOC and the physical security operations center coordinate and work together. The physical SOC is a facility in large organizations where security staff monitor and control security officers/guards, alarms, CCTV, physical access, lighting, vehicle barriers, etc. In some cases the SOC, NOC or physical SOC may be housed in the same facility or organizationally combined. Typically, larger organizations maintain a separate SOC to ensure focus and expertise. The SOC then collaborates closely with network operations and physical security operations. Facilities SOCs usually are well protected with physical, electronic, computer, and personnel security. Centers are often laid out with desks facing a video wall, which displays significant status, events and alarms; ongoing incidents; a corner of the wall is sometimes used for showing a news or weather TV channel, as this can keep the SOC staff aware of current events which may have an impact on information systems. The back wall of the SOC is often transparent, with a room attached to this wall which is used by team members to meet while able to watch events unfolding in the SOC. Individual desks are generally assigned to a specific group of systems, technology or geographic area. A security engineer or security analyst may have several computer monitors on their desk, with the extra monitors used for monitoring the systems covered from that desk. Process and Procedures Processed and procedures within a SOC clearly spell out roles and responsibilities as well as monitoring procedures. These Process include business, technology, operational and analytical processes. They lay out what steps are to be taken in the event of an alert or breach including escalation procedures, reporting procedures, and breach response procedures. http://en.wikipedia.org/wiki/Information_security_operations_center
  • 28. CIOC DRAFT ….. by Bill Ross, 5 October 2013 http://blogs.esri.com/esri/arcgis/2012/08/29/the-military-aspects-of-terrain-template-is-available-for- download/ Other interesting references http://catalog.ferris.edu/programs/538 http://www.verisigninc.com/en_US/products-and-services/network-intelligence-availability/ idefense/index.xhtml?loc=en_US http://en.wikipedia.org/wiki/Intelligence_cycle_security http://www.slideshare.net/DeloitteAnalytics/cyber-intelligence