NC4 Cyber Threat Exchange

NC4 Cyber Threat Exchange
Trusted Communities as a Defense against Cyber Threats
An Abbreviated Evolution of Cyber Defense
1) Attacks against individual companies and agencies
Cyber attacks
Cyber attacks
Cyber attacks
Corporate and
Government IT
Systems
An Abbreviated Evolution of Cyber Defense
2) Individual Organizations and vendors try to build a Fortress to protect public
and private sector IT systems
Software
security
Cyber attacks
Cyber attacks
Consulting &
Implementation
Corporate and
Government IT
Systems
Hardware
Security
IT Security
Vendors
Cyber attacks
Managed
Services
Threat
Services
IT Systems
Protected by Internal
IT Security staff
An Abbreviated Evolution of Cyber Defense
3) Attacks against groups of companies and industries
Finance, Defense, Retail, etc.
Corporate and
Government IT
Systems
Cyber attacks
Corporate and
Government IT
Systems
Corporate and
Government IT
Systems
White House and Congress
Cyber attacks
Cyber attacks
2015 Federal Focus
Corporate and
Government IT
Systems
Corporate and
Government IT
Systems
-
Corporate and
Government IT
Systems
State of the Union
Cyber Summit
Legislation
An Abbreviated Evolution of Cyber Defense
4) Cyber Threat Information Sharing among members of “Trusted Communities”
IT
Systems
Cyber attacks
IT
Systems
IT
Systems
IT
Systems
Rise of trusted
community sharing
Cyber attacks
Cyber attacks
IT
Systems
Cyber
Information
Sharing
IT
Systems
DHS: US-CERT
Industry: ISAC’s, then ISAOs
What is the NC4 Cyber Threat Exchange?
Company
C
Cyber attacks
Company
D
Company
B
Company
E
Cyber attacks
Cyber attacks
Company
A
NC4
CTX
Company
F
NC4’s Cyber Threat
Exchanges are secure
information sharing and
collaboration networks.
They are used by both
public and private
organizations to share
cyber threats with
members of a trusted
community.
NC4 Cyber Threat Exchange for US-CERT
Organization
C
Cyber attacks
US-CERT – United States
Computer Emergency
Readiness Team
Company
D
Company
B
Organization
E
Cyber attacks
Cyber attacks
Company
A
NC4
CTX
Company
F
US-CERT leads efforts to
strengthen US defense
posture.
Aggregates Protected
Critical Infrastructure
Information (PCII) from the
private sector
NC4 Cyber Threat Exchange for Financial Services
Company
C
Cyber attacks
FS-ISAC – Financial
Services Information
Sharing and Analysis
Center
Company
D
Company
B
Company
E
Cyber attacks
Cyber attacks
Company
A
NC4
CTX
Company
F
Thousands of Financial
Services members sharing
Cyber threat information
NC4 Cyber Threat Exchange for the Defense Industry
DSIE – Defense Security
Information Exchange
Company
C
Cyber attacks
Company
D
Company
B
Functions as the DIB-ISAO
Company
E
Cyber attacks
Cyber attacks
Company
A
NC4
CTX
Company
F
Pioneered threat sharing
methods and techniques
Highly effective cyber
defenders protecting critical
interests
NC4 Cyber Threat Exchange for the Retail Industry
Company
C
Cyber attacks
R-CISC – Retail Cyber
Intelligence Sharing
Center
Company
D
Company
B
Company
E
Cyber attacks
Cyber attacks
Company
A
NC4
CTX
Helping retailers establish
trusted sharing relationships
Preventing data breaches
Company
F
Protecting millions of
American customers and
saving millions of dollars
NC4 Operates Cyber Threat Exchanges for the Key
Communities in the United States
CTX
CTX
CTX
Defense Security
Information
Exchange
CTX
NC4 Cyber Threat Exchange
NC4 Operates over 30 Cyber Threat Exchanges
Serving over 3,000 Companies
and 16,000 Security Professionals
Cyber attacks
Cyber attacks
Cyber attacks
NC4 Cyber Threat Exchange
Why do 30 communities and 3,000 companies use Cyber Threat Exchanges?
Bottom Line – High Costs of Cyber Attacks
• $70B+ companies Sony and Target affected at board level
Intellectual Property
• Remediation and investigation cost Sony over $15M
• Anthem data breach could cost anywhere from $4B to over
Customers Private Data (PII)
$15.6B
• Chipotle Twitter account hack spewed racists tweets to over
Confidential Data
600,000-plus followers, potentially damaging reputation
• Average cyber attack costs $12M with 31 days to remediate
•
Loss of sensitive business information and potential stock
market manipulation
Brand Reputation
Missed Revenue
The NC4 Cyber Threat Exchange Solutions
Features and Benefits
NC4 Cyber Threat Exchange
Cross-Company Organizational Benefits
Protocols that promote circles of trust in an
environment that accelerates a culture of sharing
Collaboration tools that lead to crowdsourced
generation of trusted intelligence
Tools that enable essential human decision-making on
top of shared threat data
An ecosystem for sharing best practices, maturing
cyber defenses, and increasing effectiveness
Technically enables development of an effective
community collaboration process
Company
C
Company
D
Company
B
Company
A
Company
E
NC4
CTX
Company
F
TRUSTED SHARING COMMUNITY
NC4 Cyber Threat Exchange
A Trusted Operating Environment for
Communities of Trust
Company
C
Redundant SCIF-level data centers built to
strictest security requirements
Company
D
Company
B
Meets or exceeds NIST 800-53 requirements for
federal certification and accreditation processes
Audits available on-demand to
customers/communities
Physical separation of community data and other
infrastructure decisions made to mitigate risk
Company
A
Company
E
NC4
CTX
Company
F
TRUSTED SHARING COMMUNITY
NC4 Cyber Threat Exchange
Cyber Threat Exchange Features
Centralized management of trust circles and
custom compartmentalization
Secure social collaboration to transform
information into intelligence
Document management and knowledge
management tools along with author-controlled
permissioning and essential handling protocols
like Traffic Light Protocol (TLP)
Anonymous and user-attributed submission of
IOCs, TTPs, RFIs and other information
Analyst workflow support with automated input
and output
Alert profiling to manage volume and ensure
relevancy
Highly flexible system of custom roles to
realize any organizational structure and
sharing needs
On-the-fly configuration to support
collaboration in real time
Robust auditing framework
NC4 Cyber Threat Exchange
Summary – Cyber Threat Exchange
•
•
•
•
•
•
A proven and trusted operational infrastructure that optimizes the human interaction
component, allowing cyber professionals to exchange risk information in real-time with their
trusted communities
A turnkey operational service which provides immediate availability, requiring no
development
Removes obstacles to collaboration, reducing the friction in sharing information with the right
people and making it “hard to make a mistake”
Unlike other threat sharing environments, you control your data and decide how and with
whom to share through circles of trust that you control
Out-of-band communication in a separate security domain from your environment supports
you in the event your infrastructure is breached
Deep audit tracking to support your insight into who has touched your data and when