Ethical Hacking Customer Presentation

advertisement
BT Managed Security Solutions
Service Overview for Financials: The Most Beautiful Target
Measure, Monitor, Protect, Advise
James McCarthy
james.mccarthy@bt.com
La estructura organizativa de BT
• +100.000 employees
• Revenues 09/10: +31.200 M$
• The biggest R&D Center in ITC in Europe –
Grupo BT
Adastral Park
BT Global Services
BT Latam
Global Banking and
Financial Markets
• Gartner Leader Quadrant – Worldwide
Managed and Professional Network Service
Providers
• 37.000 professionals providing consultancy
services, managed services and supporting
our customers in +170 countries
• Revenues 09/10: +12.700 M$
• Dedicated
Solutions and
Managed Services
to the Finance and
Insurance Sector
• One of the most
profitable regions
and with the
highest growth
potential
Our Operations in the Region
Some of our customers in the region
pasió
por
clientes
nuestros
n
The Most Beautiful Target…Why?
1. Lots of Captive Users
2. A Trusted Partner / Brand For Those Users
3. Hundreds of Thousands of Transactions –
Typically in Small Monetary Increments
5
The Most Beautiful Target…and How BT Protects You…
…Panda Security’s anti-malware laboratory, has discovered that
hackers are creating 57,000 new websites each week that exploit
approximately 375 high-profile brand names worldwide…
Findings By Customer:
1. eBay – 23.21 percent 2. Western Union – 21.15
percent 3. Visa – 9.51 percent 4. United Services
Automobile Association – 6.85 percent 5. HSBC – 5.98
6. Amazon – 2.42 percent 7. Bank of America – 2.29
percent 8. PayPal – 1.77 percent 9. Internal Revenue
Service – 1.69 percent 10. Bendigo Bank – 1.38
percent
6
The Most Beautiful Target…Breach Numbers are
Growing…
From PrivacyRights.ORG
Limited Search Breaches currently displayed:
Breach Types: HACK
Organization Types: BSF
Years: 2010
235,373 Records in our database from.
10 Breaches made public fitting this criteria
(All US Financials)
7
Introducing BT’s Managed Security Solutions
For Financials
8
BT’s proposition areas
Secure
applications and
information
Secure network
and IT
infrastructure
Business objectives
Enhance
compliance and
governance
Board confidence in
Information
Reduce
downtime, costs
Information
assurance
Risk structures
& processes
Secure Networking
Secure
Communications
Management
Operational Risk
Management
Business Continuity
Identity
Management
Information
Management
Propositions
Common
methodology
Consulting
services
Design
Integration,
implementation
Managed
services
Enabling security and compliance
efficiently and
cost effectively across your enterprise
BT Knowledge, Experience, Thought Leadership
• BT has concentrated its resources
into one dedicated global practice,
one of the biggest security teams
in the world
– 400+ full time client facing
practitioners
– A further 800+ working on
security including R&D and
internal team
• Decades long heritage in designing,
building, managing secure global
networks
• Rigorous, mandatory internal
security evaluation process
• Global accreditations &
certifications
– Practitioners validated by
Cisco, ITIL and Juniper
Networks
– SAS70 and ISO 9001 certified
MSS provider
– Accredited to CERT & FIRST,
CLEF
– FIPS 140-2; one of only 8
globally
– Active participants in IETF,
ISO17799
• World leading R&D facility
Adestral Park in Suffolk, England
– 100 registered patents
– 160 security papers published
– 30% of people with second
degrees
BT’s Managed Security Solutions powered by
Counterpane and the EHCOE
• Authority on enterprise security
– Pioneered outsourced security monitoring – Established in 1999
– Founder and CTO, best-selling author: Bruce Schneier
• Leading visionary in Gartner’s Magic Quadrant for MSS and EH
• Global view: 650 customer networks; Sentries installed in 38 countries; monitored
data spanning 150 countries
• Seven fully redundant security operations centers
• Eleven year proven track record protecting major, high-value networks
Mission: Develop and implement fully-integrated
managed security services that assure customers’
business continuity, improved compliance, and
protection from financial loss.
11
BT Security Services Customers
Fortune 500 leaders in every major industry around the globe
12
Business Problems Solved
by Managed Security Services
• Streamline policy enforcement
– Detect early warning signs of inappropriate activity
– Protect against rogue employees and contractors
• Identify unauthorized activity
– Real time detection of botnet- and malware-infected hosts
– Regularly updated blacklists of known botnet controllers and malware distribution
sites
• Facilitate data collection for regular audits and compliance reporting
– Centralized access to all security-relevant and activity logs
– Easy access to archive and flexible data-mining options
• Leverage existing investments in expensive devices
– Ensure IDS/IPS/firewall devices have current signatures & patches
– Configure them in accordance with industry best practice
• Provide cost-effective access to senior security expertise
– On demand access to world-class security analysis & personnel
– Focus on strategic decision-making while tactical issues are handled
13
Managed Security
Solutions
People
We deliver crucial security
information about complex
threats with expert
assistance on how
to respond.
We do so using three
main elements:
Process
Technology
…of these, people are the most important!
14
Workload Reduction Enables Customers to
Focus on Core Business Objectives
“Typical” Services Company Example (Monthly CIO Report)
30 Million
186,000
1200
5
Messages Received
Alerts Processed
Tickets Analyzed
Customer Contacts
1 Phone Call
4 E-mails
One of the things I’ve gotten the most mileage out of is the monthly CIO report…
I use that [to show] my executives all the traffic that’s coming through… You start with millions of items and work your
way down into about 50 to 60 of [incidents] a month. It’s a great way to explain the value we’re getting out of the
managed security services.”
Tom Dunbar, CSO, XL Capital
15
View Across BT Counterpanes Financial
Services Companies
Across our Financial Services Clients their Security Posture Index is rated as
“Above Average” which indicates a high level of sensitivity towards information
that is provided to them by our BT SOCs.
16
Web Application Testing – the Most Beautiful Target
Client-side Application Testing Ethical Hacking Assessment
• Components can consist of:
– Java applets that operate within Web browser
– Standalone Java applets
– Standalone executable applications
• Testing determines:
–
–
–
–
How security is integrated into the client software components
How the client software interacts with the remote server application
If any unnecessary information is entrusted in the client software
If the client software can be manipulated to provide unauthorized access to server
application
• Testing includes:
– Attempt to collect as much information as possible about the client application and
server communication
– Attempt to manipulate the client software without inside knowledge
1717
Code Review – The Most Beautiful Path
Source Code Review Ethical Hacking Assessment
• Reviews application code for deficiencies in the areas of security, reliability and
operations.
• The review identifies strengths and weaknesses of the application software
modules.
• Detection of the following types of computer abuse are attempted:
– Trojan Horses - Salami techniques - Trapdoors
– Logic bombs
• The EHCOE requires the following documentation in order to perform the
source code review:
– Source code comments and documentation
– Method of invocation for each program
– Options and configuration file documentation
– Method of compilation for each program –
1818
What Sets BT Managed Security Solutions Apart?
• United States Patent: Patent No. US 7,159,237
B2, Method and System for Dynamic Network
Intrusion Monitoring, Detection and Response
(Jan. 2, 2007)
• Network visibility: More than one million event
rules for a broad range of network devices
• Advanced correlation technology: Multi-device,
vertical market, cross-customer base
• 24/7 vigilance by certified security engineers:
SANS Certification and DOJ Background
investigations required for employment
19
IDSs
Firewalls/VPNs
Routers
Authentication
Access Control
Databases
Web Servers
Network OS
Desktops
Others
What Sets BT Managed Security Solutions Apart?
• Consultative approach: Dedicated team assigned to the
account, Monthly touch points, Quarterly reviews, pre-sales
and post-sales support, ongoing available support
• Compliance audit reporting: VISA CISP/PCI, SOX,
FISMA, GLBA, CA 1386,
• Service Level Agreements: Swift activation and improved
compliance with 100% guaranteed access to activity data
.
20
Security Operations Centers
Physically hardened facilities
• Three-factor access control
• Multiple forms of surveillance
• Fully-redundant power and network
100% uptime since January 2000
• Full-redundancy in each center
• Continuous tagging and time stamping
• CPE has auto-rollover to SOCs
Geographically diverse
• Facilities in major technology centers
• Robust facilities built on Critical Infrastructure backbones
Audits and accreditations
• Including: SAS70, ISO27001, BS7799
• Analysts are GIAC certified
21
Benefits of a BT Managed Security Services for
the Financial Industry
• Trusted Partner of the Financial Services Space
– Current Testing Partner for the Majority of Very Large Financials
• Resilient architecture
- Hardened, active/active SOCs – no downtime
• Vendor neutrality
- Provides flexibility and avoids unnecessary capital outlays
• Defense in depth
- Support for more types of systems, including applications,
databases AS/400, RACf, etc.
• Comprehensive and integrated solution
- Reduces risk and cost
- Simplifies management and monitoring of diverse technology
- Advanced correlation technology (Multiple tools and flexible configuration)
Consultative Approach
• Longevity and commitment
- More than 10 years of continuous growth
22
BT
23 Professional Services
23
Download