VeriSign ®  iDefense ®  Security Intelligence Services Overview  <ul><li>Anchises M. G. de Paula,  CISSP </li></ul><ul><li...
Security Incidents Dominate Headlines Oracle to fix 73 security bugs next week   Computerworld, April 2011 WikiLeaks Relea...
Increased Sophistication of Attacks / Attackers More than  286 million  new malware variants detected in 2010  1 93%   inc...
New and Emerging Attack Vectors—Real & Present <ul><li>Mobile Threats </li></ul><ul><li>Virtualization; Cloud Computing </...
The Challenge of Keeping Up Which  patches  are critical? Which aren’t? Is this a  real threat ? Are there threats I don’t...
The Solution Proactively Protect Respond In Real-time Understand Global Implications   Remediate Online Fraud Prioritized ...
What Can VeriSign iDefense Do for You? <ul><li>VeriSign iDefense pinpoints which threats pose the greatest risk </li></ul>...
VeriSign iDefense Security Intelligence Services The Leading Security Intelligence Research Shop VeriSign iDefense deliver...
VeriSign iDefense Security Intelligence Services <ul><li>Zero-day threat protection </li></ul><ul><li>Vulnerability manage...
The VeriSign iDefense Intelligence Process  VeriSign iDefense executes a disciplined process to get intelligence data to u...
The VeriSign iDefense Original Vulnerability Process  Each Vendor Works with VeriSign on Public Disclosure Schedule Discov...
Get the Best Security Intelligence with iDefense Quick Stats <ul><li>Over 170,000 published Intelligence reports </li></ul...
iDefense Portal
Intelligence that Warns when a Threat Is Real <ul><li>What VeriSign iDefense can do for its customers when a real threat e...
Ways to Consume VeriSign iDefense Intelligence Frequency of Research Delivery  Daily <ul><li>Intelligence Feed </li></ul><...
VeriSign iDefense Integrated Intelligence <ul><li>Integrating deep and analytical research from VeriSign iDefense brings v...
iDefense Service Bundles:  Support Security Ops *VeriSign iDefense offers several integration scenarios with leading secur...
iDefense Threat Protection-Level Service Bundles Core Service Standard Service <ul><li>iDefense ®  Intelligence Feed </li>...
Intelligence In Action—A Case Study A top 10 enterprise services firm saved about  $5M  by using VeriSign iDefense analysi...
Intelligence In Action—A Case Study On Feb 26, 2009, a mass mailer virus was identified internally within a top global ent...
Intelligence In Action—A Case Study A top 10 US bank leveraged VeriSign iDefense world-class  malcode  analysis services t...
Intelligence In Action—A Case Study Recently, a VeriSign iDefense client was considering expansion into Russia and need to...
The Bottom Line <ul><li>Manage security risk. Not just threats </li></ul><ul><li>Know which threats matter most.  (And whi...
Q & A
 
APPENDIX
iDefense Service Bundles:  Support Security Ops *VeriSign iDefense offers several integration scenarios with leading secur...
iDefense Threat Protection-Level Service Bundles Core Service Standard Service <ul><li>iDefense ®  Intelligence Feed </li>...
VeriSign iDefense Security Intelligence Services <ul><li>Vulnerability Aggregation Team </li></ul><ul><li>Vulnerability Ad...
VeriSign iDefense Intelligence Organization <ul><li>Vulnerability Applied  Research Labs </li></ul><ul><li>Vulnerability C...
VeriSign iDefense Intelligence Organization <ul><li>Vulnerability Aggregation Team </li></ul><ul><li>24X7 Operations </li>...
VeriSign iDefense Intelligence Organization <ul><li>Financial Services Information Sharing and Analysis Center  (FS-ISAC) ...
VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations ...
VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations ...
VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations ...
VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations ...
VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations ...
Ways to Consume VeriSign iDefense Intelligence <ul><li>VeriSign iDefense ®  Topical Research Reports </li></ul><ul><ul><li...
Security Incidents Dominate Headlines Monster.com Hit With Possible Monster-Sized Data Breach   InformationWeek , January ...
Growth of Threats and Exposure / Risk Your Business Network
Intelligence that Warns when a Threat Is Not <ul><li>What really occurred with CONFICKER… </li></ul><ul><li>Attracted sign...
What Customers Tell Us <ul><li>This translates into a security strategy that consistently delivers:  </li></ul><ul><li>Sub...
VeriSign iDefense Research Methodology <ul><li>Vulnerability Aggregation Team </li></ul><ul><li>Vulnerability Advanced Res...
Ways to Consume VeriSign iDefense Intelligence <ul><li>VeriSign iDefense Research / Report Packages </li></ul><ul><ul><li>...
VeriSign iDefense Security Operational Support <ul><li>VeriSign iDefense ®  Global Threat Intelligence Services </li></ul>...
VeriSign iDefense in Summary <ul><li>Your IT security strategy needs  timely, detailed   and  actionable cyber threat inte...
Upcoming SlideShare
Loading in …5
×

VeriSign iDefense Security Intelligence Services

2,071 views

Published on

Visão geral sobre a solução iDefense da VeriSign de resposta a incidentes em tempo real, remediação de fraudes on-line, gerenciamento de riscos, conhecimentos dos impactos globais das ameaças, proteção proativa, entre outros benefícios.

Published in: Technology, Business
  • Be the first to comment

  • Be the first to like this

VeriSign iDefense Security Intelligence Services

  1. 1. VeriSign ® iDefense ® Security Intelligence Services Overview <ul><li>Anchises M. G. de Paula, CISSP </li></ul><ul><li>May, 2011 </li></ul>
  2. 2. Security Incidents Dominate Headlines Oracle to fix 73 security bugs next week Computerworld, April 2011 WikiLeaks Releases Guantánamo Bay Prisoner Reports Wired , April 2011 Royal Navy hacker claims to have broken into space agency site The Register , April 2011 Malware Aimed at Iran Hit Five Sites, Report Says New York Tim , February 2011 Sony PlayStation suffers massive data breach Reuters , April 2011
  3. 3. Increased Sophistication of Attacks / Attackers More than 286 million new malware variants detected in 2010 1 93% increase in malware attacks in 2011 1 56% of malicious code infections were Trojans in 2010 1 Reported online crime losses totaled $559.7M USD in 2009 – a total of 336,655 complaints, a 111% and 22.3% increase from 2008, respectively. 2 Cyber criminals are targeting Web 2.0 and cloud technologies Ecommerce fraud in 2010 estimated to $2.7 billion 3 More than 115,000 reported phishing attacks in 2010 4
  4. 4. New and Emerging Attack Vectors—Real & Present <ul><li>Mobile Threats </li></ul><ul><li>Virtualization; Cloud Computing </li></ul><ul><li>IPv6 </li></ul>Source: Lattuf2: http://tinyurl.com/djyqk4 Source: Waldec : CarnalOwnage, 01/09 <ul><li>Social Engineering Attacks </li></ul><ul><li>Phishing/Whaling/Spear Phishing </li></ul><ul><li>Data Stealing Trojans </li></ul>Underground Evolution Malicious Infrastructure Technology Disruptors Waldec Trojan: 2500 Unique IPS
  5. 5. The Challenge of Keeping Up Which patches are critical? Which aren’t? Is this a real threat ? Are there threats I don’t know about? How do I get the most out of our security infrastructure investments ? How can I stay ahead of the threat curve? How do I maximize our incident response efforts? How can I make sense of global thr eat implications? How do I best inform executive management of the most relevant risk factors ?
  6. 6. The Solution Proactively Protect Respond In Real-time Understand Global Implications Remediate Online Fraud Prioritized Vulnerability and Patch Management Enable Risk Management
  7. 7. What Can VeriSign iDefense Do for You? <ul><li>VeriSign iDefense pinpoints which threats pose the greatest risk </li></ul><ul><li>Know what you need to do to proactively protect your networks, Web applications and sensitive data </li></ul><ul><li>Apply customized threat intelligence to your unique geographical and contextual needs of your business </li></ul><ul><li>Access to exclusive research and VeriSign iDefense analysts – far beyond publicly known vulnerabilities </li></ul><ul><li>Support faster and smarter incident response capabilities </li></ul>™
  8. 8. VeriSign iDefense Security Intelligence Services The Leading Security Intelligence Research Shop VeriSign iDefense delivers deep analysis and actionable intelligence related to vulnerabilities, malicious code and geopolitical threats to enable protection against critical infrastructure attacks Industry-Leading Services Offerings <ul><li>Intelligence is our core competency 24/7 </li></ul><ul><li>100% vendor-agnostic </li></ul>Actively Gathering Global Intelligence Since 1998 <ul><li>Based in the Greater Washington DC Area </li></ul><ul><li>Worldwide Reach </li></ul>Recognized by Frost & Sullivan The Leading Provider of Exclusive Vulnerabilities (2009)
  9. 9. VeriSign iDefense Security Intelligence Services <ul><li>Zero-day threat protection </li></ul><ul><li>Vulnerability management support </li></ul><ul><li>Critical infrastructure protection through public/private sector analysis and information sharing </li></ul><ul><li>Faster and smarter incident response </li></ul><ul><li>Fraud mitigation and response strategies </li></ul><ul><li>Increased global threat awareness </li></ul>VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs Delivering Security Operational Support
  10. 10. The VeriSign iDefense Intelligence Process VeriSign iDefense executes a disciplined process to get intelligence data to users Discovery Analysis Publication Delivery XML Appliance Portal Email Original Vulnerabilities Geopolitical Threats Malicious Code Intelligence Report Archive Archive Intelligence Reports Publish Intelligence Reports Create Intelligence Reports Analyst Desktop Original Vulnerabilities & VeriSign iDefense Labs The World Public Sources Centralized Data Collection Public Vulnerabilities Desktop Tools & Freeware VeriSign Intelligence Network RSS Feed Int’l Cyber Intelligence
  11. 11. The VeriSign iDefense Original Vulnerability Process Each Vendor Works with VeriSign on Public Disclosure Schedule Discovery Notification Responsible Disclosure Public Disclosure By Vendor The World VeriSign iDefense Vulnerability Advanced Research Labs Verification Original Vulnerabilities VeriSign iDefense process for notifying customers and vendors of vulnerabilities VCP Network VeriSign iDefense Customers Vendor
  12. 12. Get the Best Security Intelligence with iDefense Quick Stats <ul><li>Over 170,000 published Intelligence reports </li></ul><ul><li>On average 8 research reports published per major threat </li></ul><ul><li>Reported on over 10,000 vulnerabilities of which 602 are exclusive vulnerabilities discovered over past three years </li></ul><ul><ul><li>On average, warns customers of Microsoft vulnerabilities 100 days in advance of Microsoft </li></ul></ul><ul><ul><li>181 days in advance for other vendors’ vulnerabilities </li></ul></ul><ul><li>Customized and Customer-Driven Tracking </li></ul><ul><ul><li>21,500 + Products and Technologies </li></ul></ul><ul><ul><li>250 + Vendors </li></ul></ul><ul><ul><li>1550 + Public sources </li></ul></ul><ul><li>1200+ Underground and Private sources tracked/infiltrated </li></ul>Key Attributes <ul><li>50 + full-time, dedicated security analysts </li></ul><ul><ul><li>= 500,000 + hours of collective experience & insight </li></ul></ul><ul><li>More than 600 Security Research Contributors Worldwide </li></ul><ul><li>Multi-Lingual Threat Collection </li></ul><ul><ul><li>Over 20 Spoken Languages Covered </li></ul></ul><ul><li>Ongoing Global Field Operations in suspect countries </li></ul><ul><li>Threat Data, Analysis and Attribution </li></ul><ul><ul><li>Not just “what”, but the “who”, “why” and “how” </li></ul></ul><ul><li>Access VeriSign iDefense Analysts </li></ul><ul><li>Greater network visibility through the VeriSign .com/.net Global Infrastructure </li></ul>
  13. 13. iDefense Portal
  14. 14. Intelligence that Warns when a Threat Is Real <ul><li>What VeriSign iDefense can do for its customers when a real threat emerges </li></ul><ul><li>December 2008: Microsoft announces out-of-band patch with a zero-day tolerance </li></ul><ul><li>Within 17 hours, VeriSign iDefense updated the alert for this one vulnerability 7x with new information about: </li></ul><ul><ul><li>How the vulnerability works </li></ul></ul><ul><ul><li>Potential impact </li></ul></ul><ul><ul><li>How to mitigate with the patch and other workarounds </li></ul></ul>Midnight Microsoft Announces Out of Band Patch; Exploit Code in the Wild 2 AM First Leader Team Discussion 5 AM Decision to go to War Room 10 AM First Meeting; Situational Awareness 3 PM Last Meeting; Situational Awareness 5:30 PM Customer Call 1 PM MS releases OOB Patch VAT issued an alert Exploit Code Found PCAPS Developed; Sigs Developed Customer Information Coming In Exploit Code Built VeriSign iDefense Threat Report Updated 7X
  15. 15. Ways to Consume VeriSign iDefense Intelligence Frequency of Research Delivery Daily <ul><li>Intelligence Feed </li></ul><ul><ul><li>Public Vulnerability Reports </li></ul></ul><ul><ul><li>VeriSign iDefense ® Exclusive Vulnerability Reports </li></ul></ul><ul><ul><li>Malicious Code Reports </li></ul></ul><ul><ul><li>VeriSign iDefense ® Threat Reports </li></ul></ul><ul><li>Flash Reports </li></ul>Weekly / Bi-Weekly <ul><li>Weekly Threat Report </li></ul><ul><li>Weekly Vulnerability Summary Report </li></ul><ul><li>Weekly Malicious Code Summary Report </li></ul><ul><li>VeriSign iDefense ® Threat Briefings </li></ul>Monthly <ul><li>Topical Research Reports </li></ul><ul><li>Patch Tuesday Report </li></ul>By Request <ul><li>VeriSign iDefense ® Analyst Service </li></ul><ul><li>Rapid Response Service </li></ul><ul><li>Focused Intelligence Reports </li></ul><ul><li>Malicious Code Rapid Report Service </li></ul><ul><li>Phishing Shutdown Service </li></ul><ul><li>Malicious Code Shutdown Service </li></ul>8 Reports / Year <ul><li>Global Threat Research Report </li></ul>Automated <ul><li>Malicious Code Credential Recovery Service </li></ul><ul><li>IP Reputation Service </li></ul><ul><li>Integration Services: </li></ul><ul><ul><li>QualysGuard </li></ul></ul><ul><ul><li>Archer </li></ul></ul><ul><ul><li>Agiliance </li></ul></ul><ul><ul><li>Skybox </li></ul></ul><ul><ul><li>ArcSight </li></ul></ul>
  16. 16. VeriSign iDefense Integrated Intelligence <ul><li>Integrating deep and analytical research from VeriSign iDefense brings value to the landscape of security management tools and platforms </li></ul><ul><li>Integration can maximize security infrastructure and management investments </li></ul><ul><li>Future integrations are in development with leading Patch Management, Ticketing and IDS/IPS device vendors </li></ul>Vulnerability Management SIEM Platform IT GRC
  17. 17. iDefense Service Bundles: Support Security Ops *VeriSign iDefense offers several integration scenarios with leading security management platforms and tools. Please consult your Account Executive to review a full list of available integrations and discuss the value of integrated analytical intelligence into your enterprise environment. Global Threat Intelligence Services <ul><li>iDefense ® Threat Briefings </li></ul><ul><li>Weekly Threat Report </li></ul><ul><li>Vulnerability Summary Reports </li></ul><ul><li>Malicious Code Summary Reports </li></ul><ul><li>Topical Research Reports </li></ul><ul><li>Global Threat Research Reports </li></ul><ul><li>iDefense ® Analyst Service </li></ul>Vulnerability Intelligence Services <ul><li>FLASH Reports </li></ul><ul><li>Threat Reports </li></ul><ul><li>Public Vulnerability Intelligence Reports </li></ul><ul><li>iDefense ® Exclusive Vulnerability Reports </li></ul><ul><li>Vulnerability Summary Reports </li></ul><ul><li>Malicious Code Intelligence Reports </li></ul><ul><li>Patch Tuesday Reports </li></ul><ul><li>iDefense ® Analyst Service </li></ul><ul><li>Optional iDefense Integration Services* </li></ul>Incident Response Services <ul><li>Threat Reports </li></ul><ul><li>Malicious Code Intelligence Report </li></ul><ul><li>Malicious Code Summary Report </li></ul><ul><li>Malicious Code Rapid Report Service </li></ul><ul><li>iDefense ® Rapid-Response Service </li></ul><ul><li>iDefense ® Analyst Service </li></ul>Fraud Mitigation Services <ul><li>IP Reputation Service </li></ul><ul><li>Victim IP Feed </li></ul><ul><li>iDefense ® Analyst Service </li></ul><ul><li>Optional Phishing Shutdown Service </li></ul><ul><li>Optional Malicious Code Shutdown Service </li></ul>Add-On Services <ul><li>Focused Intelligence Report </li></ul><ul><li>Custom Intelligence Report </li></ul><ul><li>Artifact Analysis On-Demand Service </li></ul><ul><li>iDefense ® Rapid-Response Service </li></ul><ul><li>Phishing Shutdown Service </li></ul><ul><li>Malicious Code Shutdown Service </li></ul><ul><li>*iDefense Integration Services for: </li></ul><ul><ul><li>QualysGuard VM </li></ul></ul><ul><ul><li>Skybox Threat Alert Manager </li></ul></ul><ul><ul><li>Archer </li></ul></ul><ul><ul><li>ArcSight </li></ul></ul><ul><ul><li>Agiliance </li></ul></ul>
  18. 18. iDefense Threat Protection-Level Service Bundles Core Service Standard Service <ul><li>iDefense ® Intelligence Feed </li></ul><ul><ul><li>Public Vulnerability Reports </li></ul></ul><ul><ul><li>Threat Reports </li></ul></ul><ul><li>FLASH Reports </li></ul>Tactical Research <ul><li>iDefense ® Intelligence Feed </li></ul><ul><ul><li>Public Vulnerability Reports </li></ul></ul><ul><ul><li>Threat Reports </li></ul></ul><ul><ul><li>iDefense ® Exclusive Vulnerability Reports </li></ul></ul><ul><ul><li>Malicious Code Reports </li></ul></ul><ul><li>FLASH Reports </li></ul><ul><li>Cyber Threat Brief </li></ul>Tactical Research Comprehensive Service Tactical Research iDefense ® Intelligence Feed FLASH Reports Strategic Research iDefense ® Analyst Service iDefense ® Threat Briefings iDefense ® Designated Analyst Service Malcode Rapid Report Service IP Reputation Service Analyst Team Weekly Threat Report Vulnerability Summary Reports Malicious Code Summary Reports Patch Tuesday Reports Topical Research Reports Global Threat Research Reports <ul><li>iDefense ® Intelligence Feed </li></ul><ul><ul><li>Public Vulnerability Reports </li></ul></ul><ul><ul><li>iDefense® Exclusive Vulnerability Reports </li></ul></ul><ul><ul><li>Malicious Code Reports </li></ul></ul><ul><ul><li>Threat Reports </li></ul></ul><ul><li>FLASH Reports </li></ul>iDefense ® Analyst Service iDefense ® Threat Briefings Malcode Rapid Report Service Enhanced Service Strategic Research Tactical Research Weekly Threat Report Vulnerability Summary Reports Malicious Code Summary Reports Microsoft Patch Tuesday Reports Topical Research Reports Analyst Team
  19. 19. Intelligence In Action—A Case Study A top 10 enterprise services firm saved about $5M by using VeriSign iDefense analysis to decide—correctly—not to install three out-of-cycle patches … even though other security organizations were recommending them Vulnerability Management Assistance Save time and money
  20. 20. Intelligence In Action—A Case Study On Feb 26, 2009, a mass mailer virus was identified internally within a top global enterprise services firm attempting to spread to all addresses within an address book. Within 3 hours of submission to VeriSign iDefense Rapid Response Team, analysis and remediation strategies were delivered that enabled institution of immediate and accurate file restrictions and updated AV signatures to thwart the threat of the Waledec Mass Email Worm. Incident Response Faster and smarter remediation
  21. 21. Intelligence In Action—A Case Study A top 10 US bank leveraged VeriSign iDefense world-class malcode analysis services that lead to the identification and cancelation of a fraudulent online bank transaction in the amount of $82K. Fraud Mitigation Gain visibility and confidence
  22. 22. Intelligence In Action—A Case Study Recently, a VeriSign iDefense client was considering expansion into Russia and need to understand how this might impact their risk level. By leveraging iDefense Global Threat Intelligence Services, the organization increased awareness of prominent insider threats in the region . As a result, intelligence delivered in the context of the client’s geographical needs was used in making better decisions around review of local security practices, hiring of local personnel and background checks. Global Threat Intelligence Drives Threat Awareness
  23. 23. The Bottom Line <ul><li>Manage security risk. Not just threats </li></ul><ul><li>Know which threats matter most. (And which ones don’t) </li></ul><ul><li>Get an average 100+ days advanced notification on Zero-day vulnerabilities </li></ul><ul><li>Strengthen your security team </li></ul><ul><li>Trust the industry’s truly vendor-independent provider of global cyber threat intelligence </li></ul>
  24. 24. Q & A
  25. 26. APPENDIX
  26. 27. iDefense Service Bundles: Support Security Ops *VeriSign iDefense offers several integration scenarios with leading security management platforms and tools. Please consult your Account Executive to review a full list of available integrations and discuss the value of integrated analytical intelligence into your enterprise environment. Global Threat Intelligence Services <ul><li>iDefense ® Threat Briefings </li></ul><ul><li>Weekly Threat Report </li></ul><ul><li>Vulnerability Summary Reports </li></ul><ul><li>Malicious Code Summary Reports </li></ul><ul><li>Topical Research Reports </li></ul><ul><li>Global Threat Research Reports </li></ul><ul><li>iDefense ® Analyst Service </li></ul>Vulnerability Intelligence Services <ul><li>FLASH Reports </li></ul><ul><li>Threat Reports </li></ul><ul><li>Public Vulnerability Intelligence Reports </li></ul><ul><li>iDefense ® Exclusive Vulnerability Reports </li></ul><ul><li>Vulnerability Summary Reports </li></ul><ul><li>Malicious Code Intelligence Reports </li></ul><ul><li>Patch Tuesday Reports </li></ul><ul><li>iDefense ® Analyst Service </li></ul><ul><li>Optional iDefense Integration Services* </li></ul>Incident Response Services <ul><li>Threat Reports </li></ul><ul><li>Malicious Code Intelligence Report </li></ul><ul><li>Malicious Code Summary Report </li></ul><ul><li>Malicious Code Rapid Report Service </li></ul><ul><li>iDefense ® Rapid-Response Service </li></ul><ul><li>iDefense ® Analyst Service </li></ul>Fraud Mitigation Services <ul><li>IP Reputation Service </li></ul><ul><li>Victim IP Feed </li></ul><ul><li>iDefense ® Analyst Service </li></ul><ul><li>Optional Phishing Shutdown Service </li></ul><ul><li>Optional Malicious Code Shutdown Service </li></ul>Add-On Services <ul><li>Focused Intelligence Report </li></ul><ul><li>Custom Intelligence Report </li></ul><ul><li>Artifact Analysis On-Demand Service </li></ul><ul><li>iDefense ® Rapid-Response Service </li></ul><ul><li>Phishing Shutdown Service </li></ul><ul><li>Malicious Code Shutdown Service </li></ul><ul><li>*iDefense Integration Services for: </li></ul><ul><ul><li>QualysGuard VM </li></ul></ul><ul><ul><li>Skybox Threat Alert Manager </li></ul></ul><ul><ul><li>Archer </li></ul></ul><ul><ul><li>ArcSight </li></ul></ul><ul><ul><li>Agiliance </li></ul></ul>
  27. 28. iDefense Threat Protection-Level Service Bundles Core Service Standard Service <ul><li>iDefense ® Intelligence Feed </li></ul><ul><ul><li>Public Vulnerability Reports </li></ul></ul><ul><ul><li>Threat Reports </li></ul></ul><ul><li>FLASH Reports </li></ul>Tactical Research <ul><li>iDefense ® Intelligence Feed </li></ul><ul><ul><li>Public Vulnerability Reports </li></ul></ul><ul><ul><li>Threat Reports </li></ul></ul><ul><ul><li>iDefense ® Exclusive Vulnerability Reports </li></ul></ul><ul><ul><li>Malicious Code Reports </li></ul></ul><ul><li>FLASH Reports </li></ul><ul><li>Cyber Threat Brief </li></ul>Tactical Research Comprehensive Service Tactical Research iDefense ® Intelligence Feed FLASH Reports Strategic Research iDefense ® Analyst Service iDefense ® Threat Briefings iDefense ® Designated Analyst Service Malcode Rapid Report Service IP Reputation Service Analyst Team Weekly Threat Report Vulnerability Summary Reports Malicious Code Summary Reports Patch Tuesday Reports Topical Research Reports Global Threat Research Reports <ul><li>iDefense ® Intelligence Feed </li></ul><ul><ul><li>Public Vulnerability Reports </li></ul></ul><ul><ul><li>iDefense® Exclusive Vulnerability Reports </li></ul></ul><ul><ul><li>Malicious Code Reports </li></ul></ul><ul><ul><li>Threat Reports </li></ul></ul><ul><li>FLASH Reports </li></ul>iDefense ® Analyst Service iDefense ® Threat Briefings Malcode Rapid Report Service Enhanced Service Strategic Research Tactical Research Weekly Threat Report Vulnerability Summary Reports Malicious Code Summary Reports Microsoft Patch Tuesday Reports Topical Research Reports Analyst Team
  28. 29. VeriSign iDefense Security Intelligence Services <ul><li>Vulnerability Aggregation Team </li></ul><ul><li>Vulnerability Advanced Research Labs </li></ul><ul><li>Malicious Code Intelligence and Operations </li></ul><ul><li>Rapid-Response Team </li></ul><ul><li>International Cyber Intelligence Team </li></ul><ul><li>FS-ISAC (SOC) </li></ul><ul><li>VeriSign iDefense Fusion Cell </li></ul><ul><li>Editorial Team </li></ul>Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs VeriSign iDefense Intelligence Organization Editorial
  29. 30. VeriSign iDefense Intelligence Organization <ul><li>Vulnerability Applied Research Labs </li></ul><ul><li>Vulnerability Contributor Program (VCP) </li></ul><ul><ul><li>A network of 600+ researchers worldwide </li></ul></ul><ul><li>Original Vulnerability Analysis and Discovery </li></ul><ul><li>Responsible Disclosure of Original Vulnerability Discovery </li></ul>Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs Provides vulnerability mitigation intelligence by conducting leading-edge reverse-engineering research and analysis of submitted and internally uncovered computer vulnerabilities, exploits, and attacks
  30. 31. VeriSign iDefense Intelligence Organization <ul><li>Vulnerability Aggregation Team </li></ul><ul><li>24X7 Operations </li></ul><ul><li>Infiltration, Aggregation, Analysis </li></ul><ul><li>Customer-driven, Customized Tracking </li></ul><ul><ul><li>Tracks 1,550+ Public and Private Sources </li></ul></ul><ul><ul><li>21,500 + Products and Technologies </li></ul></ul><ul><ul><li>250 + Vendors </li></ul></ul><ul><li>Websites, Forums, Mailing Lists, Underground </li></ul><ul><li>De-conflict Resolution </li></ul><ul><ul><li>Analysis of conflicting information </li></ul></ul><ul><li>Deep Human Analysis in Every Report </li></ul><ul><ul><li>Not just aggregated data </li></ul></ul>Provides in-depth research and analysis on public vulnerabilities and exploits to ensure customers receive actionable vulnerability notification and mitigation options Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs
  31. 32. VeriSign iDefense Intelligence Organization <ul><li>Financial Services Information Sharing and Analysis Center (FS-ISAC) </li></ul><ul><li>Security Operations Center (SOC) for 4,000+ member organization </li></ul><ul><li>Collaborates with U.S. Department of Treasury </li></ul><ul><li>Serves as the operational arm of the Financial Services Sector Coordinating Council </li></ul><ul><li>Acts as the primary communications channel for financial services sector </li></ul>The mission of the FS-ISAC is to enhance the ability of the financial services sector, and its critical infrastructure, to prepare and respond to cyber and physical threats, vulnerabilities and incidents Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs
  32. 33. VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs <ul><li>Rapid Response Team </li></ul><ul><li>First Line of Defense to Customers </li></ul><ul><ul><li>Extension of Your Research Team </li></ul></ul><ul><li>Targeted Attack Analysis </li></ul><ul><ul><li>Expert Code Analysis </li></ul></ul><ul><li>Timely Research </li></ul><ul><ul><li>10 Minutes, 3 Hours, 2 Days </li></ul></ul><ul><li>Comprehensive Reporting </li></ul><ul><ul><li>Remediation and Workaround Strategies </li></ul></ul>Provides a 24/7/365 incident response service in the form of an executive briefing to occur within three (3) hours of a customer submission and discussion of incident
  33. 34. VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs <ul><li>Malcode Intelligence & Operations </li></ul><ul><li>Global Aggregation </li></ul><ul><ul><li>Websites, IRC, Forums, Honey Pots </li></ul></ul><ul><li>De-conflict Resolution </li></ul><ul><ul><li>Analysis of conflicting information </li></ul></ul><ul><li>Code Analysis Lab </li></ul><ul><ul><li>Goat Machines, VM Network </li></ul></ul><ul><li>Reverse Code Engineering </li></ul><ul><ul><li>Industry Leading Engineers </li></ul></ul><ul><li>Malware Discovery </li></ul><ul><ul><li>New tactics and new targets </li></ul></ul>Provides notification of malicious code threats to IT security breaches to augment customers’ risk management process
  34. 35. VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs <ul><li>International Cyber Intelligence </li></ul><ul><li>Geopolitical Analysis and Actor Attribution </li></ul><ul><ul><li>Answers the “Who” and “Why” behind Attacks </li></ul></ul><ul><li>Field Research and Investigations </li></ul><ul><ul><li>Russia, China, Middle East, South America </li></ul></ul><ul><li>Threats in Context </li></ul><ul><ul><li>Trends, Events, Techniques </li></ul></ul><ul><li>Multilingual Analysts </li></ul><ul><ul><li>20 Spoken Languages </li></ul></ul><ul><ul><ul><li>Arabic, Cantonese, Chinese Mandarin, Dari, Farsi, French, German, Hindi, Japanese, Kannada, Marathi, Russian, Sinhala, Spanish, Tagalog, Tajik, Turkish, Urdu, Wu, etc. </li></ul></ul></ul>Provides research on the dynamics of the world’s cyber security environments and its interconnections through combined analytical methods—From the behavioral and information sciences to the development of research programs and networks of relationships
  35. 36. VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs Editorial <ul><li>VeriSign iDefense Editorial Team </li></ul><ul><li>Seven editors on staff available 24/7 to deliver on the publishing needs of up-to-the minute VeriSign iDefense intelligence </li></ul><ul><li>VeriSign iDefense delivers on an average over 500 pages of text-based research per month in addition to daily threat reports and customer requested Focused Intelligence reports </li></ul><ul><li>VeriSign iDefense editors have contributed to an industry-wide reputation of high quality VeriSign iDefense research and reporting </li></ul>
  36. 37. VeriSign iDefense Intelligence Organization Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs <ul><li>VeriSign iDefense Fusion Cell </li></ul><ul><li>Plans and directs cross-functional VeriSign iDefense intelligence process and knowledge sharing </li></ul><ul><li>Enables a comprehensive perspective of the threat environment to be shared across all intelligence teams </li></ul><ul><li>Serves as the hub for public and private research and partnership </li></ul><ul><li>Underground Operations </li></ul><ul><ul><li>Engage illicit markets with the aim of identifying core actors, methods and assets </li></ul></ul><ul><ul><li>Maintaining reputable aliases and acquiring compromised information are the teams core capabilities </li></ul></ul>
  37. 38. Ways to Consume VeriSign iDefense Intelligence <ul><li>VeriSign iDefense ® Topical Research Reports </li></ul><ul><ul><li>Notable Malware for 2010 , 3/2010 </li></ul></ul><ul><ul><li>Domain Name System Security Extensions (DNSSEC), 11/2009 </li></ul></ul><ul><ul><li>IPv6 Technology, 11/2009 </li></ul></ul><ul><ul><li>Mobile Threats, 11/2009 </li></ul></ul><ul><ul><li>Review of MPLS Security Considerations, 10/2009 </li></ul></ul><ul><ul><li>Browser Security, 5/2009 </li></ul></ul><ul><ul><li>Cloud Computing, 5/2009 </li></ul></ul><ul><ul><li>Exploring Stolen Data Markets Online, 3/2009 </li></ul></ul><ul><li>VeriSign iDefense ® Global Threat Research Reports </li></ul><ul><ul><li>Cyber Threat Landscape of Russia </li></ul></ul><ul><ul><li>Cyber Threat Landscape of Hong Kong </li></ul></ul><ul><ul><li>Cyber Threat Landscape of Saudi Arabia </li></ul></ul><ul><ul><li>Cyber Threat Landscape of China </li></ul></ul><ul><li>VeriSign iDefense ® Focused Intelligence Reports </li></ul><ul><ul><li>Expanding More Sophisticated Online Censorship Efforts, 7/2009 </li></ul></ul><ul><ul><li>Cisco VLAN Technology, 9/2008 </li></ul></ul><ul><li>VeriSign iDefense ® Weekly Threat Report – Sample Table of Contents </li></ul><ul><ul><li>Overview of Last Week's Publications </li></ul></ul><ul><ul><li>News in Brief </li></ul></ul><ul><ul><li>Trends and Developments: Revisiting iDefense Predictions for the 2010 Cyber Threat Landscape </li></ul></ul><ul><ul><li>Cyber Warfare: Russian Military Doctrine Includes Information Security </li></ul></ul><ul><ul><li>Response: Public Report Analysis—Lessons learned from Vol 7 of the Microsoft Security Intelligence Report </li></ul></ul><ul><ul><li>Cyber Crime: Identity Theft Statistics for 2009 </li></ul></ul><ul><ul><li>State of the Hack: VeriSign iDefense Explains ... </li></ul></ul>Depth and Frequency of VeriSign iDefense Intelligence
  38. 39. Security Incidents Dominate Headlines Monster.com Hit With Possible Monster-Sized Data Breach InformationWeek , January 2009 Cyber Attacks Jam Government and Commercial Web Sites in U.S. and South Korea New York Times , July 2009 Updated MyDoom Responsible for DDoS Attacks computerworld.com, July 2009 Electricity Grid in U.S. Penetrated By Spies Wall Street Journal, April 2009 Obama's Copter Plans Turn Up On The Web New York Post , March 2009 Vast Spy System Loots Computers in 103 Countries New York Times , March 2009 Former employee accused of stealing secrets from Goldman Sachs Group Chicago Tribune , July 2009 DOD seeks defense against denial-of-service attacks fcw.com, July 2009 Data breaches cost $6.6 million on average, survey finds CNET , February 2009
  39. 40. Growth of Threats and Exposure / Risk Your Business Network
  40. 41. Intelligence that Warns when a Threat Is Not <ul><li>What really occurred with CONFICKER… </li></ul><ul><li>Attracted significant attention as a critical issue </li></ul><ul><li>Other intelligence groups and 60 Minutes reports of April 1 meltdown </li></ul><ul><li>But, ultimately was declared a non-emergency by VeriSign iDefense </li></ul><ul><li>The 7-month time lapse indicates why a threat lifecycle approach is both essential and cost-effective </li></ul>60 Minutes Reports 1 Apr Internet Meltdown 29 Mar 23 Oct Microsoft Announces Out of Band Patch; MS 08-067 24 Nov First Conficker in the Wild 01 Jan 10 Dec First in-depth Analysis on Conficker in MSR 2nd Conficker in the Wild 28 Jan Publishes Domain Generation Algorithm 29 Jan Publishes Downatool 09 Mar 3rd Conficker in the Wild 16 Mar 4th Conficker in the Wild Media Reports 1 Apr Internet Meltdown 23 Mar Nothing Happens 1 Apr Accurate Prediction Detection Tool VeriSign iDefense Threat Report: Explaining Why The Internet Would Not Melt Accurate Intelligence Allows You to Focus on What Matters Most
  41. 42. What Customers Tell Us <ul><li>This translates into a security strategy that consistently delivers: </li></ul><ul><li>Substantial cost savings with proactive insights on true threats, the intelligence to avoid false alarms </li></ul><ul><li>Revenue protection through improved system and application availability </li></ul><ul><li>Reputation protection through fraud mitigation and response support </li></ul><ul><li>Improved in-house security operations through analyst access, knowledge transfer and tactics/technique sharing </li></ul>“ With VeriSign iDefense, they have the world’s most experienced multinational network of security experts acting as an extension of their teams, with exclusive access to the most in-depth cyber threat intelligence available.”
  42. 43. VeriSign iDefense Research Methodology <ul><li>Vulnerability Aggregation Team </li></ul><ul><li>Vulnerability Advanced Research Labs </li></ul><ul><li>Malicious Code Intelligence and Operations </li></ul><ul><li>Rapid-Response Team </li></ul><ul><li>International Cyber Intelligence Team </li></ul><ul><li>FS-ISAC (SOC) </li></ul><ul><li>VeriSign iDefense Fusion Cell </li></ul><ul><li>Editorial Team </li></ul>Vulnerability Aggregation International Cyber Intelligence Malcode Operations Lab FS-ISAC SOC FS Info Sharing & Analysis Center VeriSign iDefense Fusion Cell Rapid Response Team Vulnerability Advanced Research Labs VeriSign iDefense Intelligence Organization Editorial
  43. 44. Ways to Consume VeriSign iDefense Intelligence <ul><li>VeriSign iDefense Research / Report Packages </li></ul><ul><ul><li>Access to over 170,000 published research reports </li></ul></ul><ul><ul><li>Variety of secure delivery methods </li></ul></ul><ul><ul><ul><li>Secure and encrypted customer portal </li></ul></ul></ul><ul><ul><ul><li>Via email and RSS Feeds </li></ul></ul></ul><ul><ul><ul><li>XML Web services </li></ul></ul></ul><ul><li>Integrated Intelligence </li></ul><ul><ul><li>Integrating VeriSign iDefense analytical research in to security management tools and platforms </li></ul></ul><ul><li>Support for Security Operations </li></ul><ul><ul><li>Global Threat Intelligence Services: Increased Global and Regional Threat Awareness </li></ul></ul><ul><ul><li>Vulnerability Intelligence Services: Improved Vulnerability Management </li></ul></ul><ul><ul><li>Incident Response Services: Faster and Smarter Incident Response </li></ul></ul><ul><ul><li>Fraud Mitigation Services: Risk Management Around Online Fraud </li></ul></ul>
  44. 45. VeriSign iDefense Security Operational Support <ul><li>VeriSign iDefense ® Global Threat Intelligence Services </li></ul><ul><li>Increased Global & Regional Threat Awareness </li></ul><ul><ul><li>Strategic view of global and regional threats and emerging threat activity </li></ul></ul><ul><ul><li>In-depth country and regional reports </li></ul></ul><ul><ul><li>Real-time threat alert feed </li></ul></ul><ul><li>VeriSign iDefense ® Vulnerability Intelligence Services </li></ul><ul><li>Prioritized and Accurate Vulnerability Management Assistance </li></ul><ul><ul><li>Vulnerability prioritization </li></ul></ul><ul><ul><li>Drives efficient and accurate remediation </li></ul></ul><ul><ul><li>Combine asset data, vulnerability scan data with VeriSign iDefense vulnerability data </li></ul></ul><ul><li>VeriSign iDefense ® Incident Response Services </li></ul><ul><li>Incident Response Efficiency </li></ul><ul><ul><li>Acts as an embedded part of a company’s incident response program </li></ul></ul><ul><ul><li>Real-time auto analysis and in-depth human analysis of malicious code </li></ul></ul><ul><ul><li>Forensic capabilities and strategic malicious code research on the latest threats </li></ul></ul><ul><li>VeriSign iDefense ® Fraud Mitigation Services </li></ul><ul><li>Manage Risk Around Online Fraud </li></ul><ul><ul><li>Phishing and Malware Shutdown Services </li></ul></ul><ul><ul><li>Online fraud risk management services </li></ul></ul><ul><ul><li>Monitoring of known malicious IPs and the victims they target </li></ul></ul>
  45. 46. VeriSign iDefense in Summary <ul><li>Your IT security strategy needs timely, detailed and actionable cyber threat intelligence that applies to the unique needs of your business so you can protect your business from the onslaught of cyber attacks </li></ul><ul><li>With attacks increasingly targeted and potentially devastating, ‘managing’ security isn’t enough. You have to manage risk – and that means proactive intelligence </li></ul>

×