E N D
CYBER DEFENSE Alexandar Alexandrov
Cyber security “Our technological advantage is a key …. But our defense and military networks are under constant attack. .... Indeed, in today's world, acts of terror could come not only from a few extremists …but from a few key strokes on the computer -- a weapon of mass disruption. ... it's now clear that this cyber threat is one of the most serious economic and national security challenges we face as a nation.” President Barack Obama, May 29, 2009
Public Value national security PUBLIC VALUE IN NATIONAL SECURITY: CYBERSECURITY ULTIMATE BUSINESS GOAL EXECUTIVE KPI(Direction) CORE FINANCIAL KPI(Direction) TRUST OUTCOMES --------- INFORMATION ASSURANCE EFFICIENCY --------------- • Citizen’s Trust: • Privacy • Civil Liberties • Protection / Security • Gov’t Transparency • Strengthen Security and Resilience at Home • Secure Cyberspace • Critical Infrastructure Protection • Services delivered quickly • Agencies operate within budgets • Leverage Technology • Incidents / Attacks Prevented • Infrastructure Protection • Access to Services • Coordinate with Emergency Mgt., Public Safety / Justice Agencies Capital Investment Management Budget, Labor, Operating Cost Management BUSINESSINITIATIVES(Strategy/Priority Language) Develop Intelligence Capabilities Increase IT Efficiency and Effectiveness Reduce Network Intrusions/ Internet Crime Improve Incident Response OPERATING KPIs--------------------------------PROCESS/FUNCTION Reduce Network Attacks / Internet Crime Rates Risk Assessments / Awareness _______________ Forensics / Law Enforcement Improve Incident Response ______________ Detection, Response, Recovery Prevent Critical System Intrusions __________ Cyber Security Intelligence Reduce IT Operating Costs ______________ Budget, Capital, HR, Procurement, Training HP SOLUTION: Cybersecurity Business Continuity / Recovery Security Operations Network / Datacenter Security Identity / Access Management Risk Management / Compliance Application / Data Security
The Threat Stakeholders The Source of the Threat What’s at Risk Military, Intelligence, Homeland Security Federal, state, local and tribal governments Businesses & Consumers Nation states Ideological Movements Organized Criminal Elements Fame Seekers Industry Competitors Insiders Merely Curious Economic security National security Competitive Advantage Public safety Personal Information, intellectual property, privacy Critical infrastructure (e.g. power grids, transportation)
Delivering on your mission with confidence HP Security Services Cyber Dominance Mission Integration Situational Awareness Cyber Control to Achieve Mission Cyber/Network Analytics & Prediction Informed Decision Making
Identify & Access Management Research & Development Comprehensive Cyber Security services portfolio Data & Content Security Proven integrated building blocks Application Security Business Continuity & Recovery Security Operations Risk Mgmt& Compliance Datacenter Security Network Security Endpoint Security Research & Development
HP Security Services Portfolio End Point Threat Mgmt (AV, AS, HIDS, Personal F/W) End Point Application & Device Control Host Intrusion Detection & Prevention Services Mobile Device Security Application Penetration Testing Application and Code Testing/Scanning Web Application Security Assessments Web Application Penetration Testing Web Application Firewalls SOA Security SAP Security Middleware & Mainframe Security Midrange/Server Security Application Security Content Security Data Security Endpoint Security Network Security Data Center Security Network Intrusion Detection & Prevention Services Adaptive Network Architecture Managed Firewall VPN, UTM Network Access Control Wireless Security Managed Proxy / Cache / Filtering Web Content Filtering Email Security Disk/File Encryption Database Security Data Loss Prevention Enterprise Rights Management PKI Key Management Server Threat Management Storage Security Virtualization Security Cloud Computing Security Fusion Center
HP Security Services Portfolio IT Governance, Risk & Compliance (GRC) eDiscovery & Archiving Customer Specific Training and Awareness Operational Risk and Exceptions to Policy Account Delivery Continuity ISO 27001 Certification Information Risk Advisory Service PCI Compliance Scanning PCI Managed Compliance C & A: NIST SP 800-37 C & A: DIACAP SCADA/Process Control System Security Assessment NERC CIP Design, Audit and Implementation IV&V Test and Evaluation Compliance Assessments Threat & Risk Assessments MCSS Capabilities PKI Management Token Management Managed Remote Access Directory Services Meta & Virtual Directory Active Directory User administration IDAM - Current State Assessment IDAM - Architecture Blueprint IDAM Design & Implement Web SSO Federation Provisioning E-SSO Risk Based Authentication PAM Management Risk Mgmt & Compliance Identity & Access Mgmt
HP Security Services Portfolio Research, Development, Test & Evaluation services DARPA, IARPA and Military Department research agency opportunity DOE National Labs support NMCI Research & Analysis capabilities and support Large comprehensive cyber security pursuits Enterprise Security Information & Event Management Log Management Compliance Management Security Dashboard System Hardening Services Security Incident Response Forensics Threat Monitoring & Alerting Live Network Service Vulnerability Scanning Vulnerability Detection & Management Services Security Configuration Management Global Security Operations Centers (GSOC) Mainframe Platform/OS Security Midrange/Server Platform/OS Security Security Operations Research & Development
Vulnerability Assessment Services • Network Assessments (Internet & Intranet) • Network Vulnerability Scanning (State of Art Tools) • Network Penetration Testing • System and Host Vulnerability Testing (White Box & Black Box) • Wireless Network Surveys and Penetration Testing Network Security Application Security • Application Assessments (COTS and Custom) • Application Development Life Cycle Security Gap Analysis • Application Development/Design Training • Application Code Analysis (From C to Cobol) • Application Cyber Red Team • Application Automated Vulnerability Scanning (Web & Database) • Application Regression Testing • Independent Validation and Verification (IV&V)
HP’s industry-leading highly efficient and effective security quality assessment. This service is designed to greatly reduce the problem of latent security defects reducing TCO. HP Comprehensive Applications Threat Analysis Application Security • Fast Facts: • 40,000 vulnerabilities in National Vulnerabilities Database • Estimate 800,000 vulnerabilities not yet exploited • Vulnerabilities patched late cost some 30X more that those patched early • “70%+ of all successful attacks have exploited application vulnerabilities” (Gartner, Microsoft) • Typical security audits find ~20 issues, uncovering dozens or hundreds of vulnerabilities • One action which avoids a single data breach pays for itself 100 fold • Services & Solutions: • Security Requirements Gap Analysis • Architectural Threat Analysis Building security in, not merely testing it
HP Assured IdentityTMPlus Services End-to-end Security Solutions Run Business Readiness Workshop Strategy & Roadmap Detailed Design & Architecture Implementation Identity & Access Management Assured Identity ManagementTM Assessment Service Fed SecureTM Services Offered Audit Compliance & Validation Assured Identity TM Gate SecureTM Strategic & Technology Partnerships Industry Frameworks
HP Assured IdentityTMPlus Identity & Access Management • Assured Identity™ • Credential Enrollment • Credential Issuance • FIPS 201 Compliance • PIV.XX Support • Assured Identity Management™ • Life Cycle Management • User Provisioning • Workflow • Delegated Admin • Self-Service • Fed Secure™ • Federation in a Box • Cross Credentialing • Federation Broker • Access Management Services • Gate Secure™ • Physical Security • Automated PACS provisioning system • New, single use, common credentials across multiple agencies Consulting Services Managed Security Services
Cross Industry Experience • Deep HP Security experience in all industries • Industry focused security consultants Consumer Industries and Retail Energy Financial Services Communications, Media & Entertainment Manufacturing Transportation Government Healthcare We serve/manage critical cyber infrastructures across all US Critical Infrastructure/Key Resource sectors
HP Personnel Dedicated to Cyber Security • Over 2,500 cyber security professionals worldwide • Includes specialists for advisory and consulting engagements • Certified security staff with CISSP, CISM, CAP, CIS, CSSLP or GSEC
Spanning all Tiers of Government in 83 countries with >3,500 government accounts Global Reach and Support US Dept. of Defense US Government Comptroller of the Currency Defense Logistics Agency US Dept. of Agriculture US Dept of Justice US Dept. of Education US Dept. of Energy US Dept. of Health & Human Services US Dept. of Homeland Security US Dept. of Housing & Urban Development NHIC/ Medicare US Dept. of Treasury Dept. of the Army Dept. of the Navy Dept . Of Veterans Affairs DFAS DISA US Postal Food & Drug Administration Social Security Administration US Dept. of State Top 50 Accounts Alberta Sustainable Resource Div. BC Ministry of Labour BC Ministry of Provincial Revenue & Citizen Services Edmonton Delivery PWGSC – Pension Modernization Government of Manitoba Sweden Post Ministry of the Flemish Gov’t. INAIL IPZS Minesterio di Grazia e Guist Ministro Pubblica Intruzione State of California City of Anaheim State of Michigan State of Ohio Commonwealth of Pennsylvania European Space Agency Federal Reserve World Bank IDA of Singapore Consulting ATP UK Ministry of Defence UK Dept. For Work & Pensions UK Justice & Offender Management Tax Administration Service of Mexico (SAT) Israel Ministry of Justice South Australian Government