Continuous Monitoring
and Real Time Risk
Scoring

Erich Baumgartner, VP Federal
Q1 Labs – An IBM Company


J.R. Cunningham, Director of
Federal Strategy
Accuvant
Meeting the Information Requirements of
Federal Agencies




 Two-phased compliance and security timeline




                                               2
Security Intelligence for Continuous
            Monitoring

 Monitors network changes to detect vulnerabilities in the
  network
    Changes may be potential threats and policy/compliance
      violations, resulting in security gaps

 Compares configuration data from network security devices
  with layer 7 network activity analysis
    Continuously checks rule policy effectiveness and raises alerts
 Provides single console view of risk exposure needed to
  meet continuous monitoring requirements (risk management,
  log management, SIEM, network behavior analysis)


                                                                       3
Continuously Manage Risk with
              Security Intelligence

     Move beyond traditionally reactive security management


  Multi-vendor network       Automated compliance   Predictive threat
configuration monitoring &    and risk assessment     modeling &
                                                       simulation
           audit


                              Risk Indicators
                              Configuration/    
                              Topology
                              Network           
                              Activity
                              Vulnerability     
                              Management
                              Network &         
                              vulnerability
                              context


                                                                        4
Accuvant & Q1 Labs




                Traditional SVARs
                Technology Driven




Traditional Consulting
Audit/Compliance Driven




                                        5
J.R. Cunningham
    Accuvant




                  6
What is Continuous Monitoring?


“…determine if the
complete set of
planned, required,
and deployed
security controls
within
an information
system or
inherited by the
system continue
to be effective
over time…” NIST
SP 800-37
                                            7
Why is Continuous Monitoring Critical?
           (Beyond the Obvious Answer – “It’s Required”)




Intelligent Cyber Security- Applying
countermeasures to only systems needing those
controls
Threat Intelligence – Understanding as much
about the enemy and threat vectors as possible
Acquisition excellence – find the “big ROI”
Situational Awareness – decision superiority
delivered with “speed of need”
“If an agency has $1 to spend today, where
should they spend it and why?”




                                                           8
Continuous Monitoring and Situational
           Awareness
                                           Endpoint Protection
                                           Network Defenses
                                           Encryption
                                           DLP
                                           SIEM




                                                      Countermeasure
                                           RBAC


                             Situational
Threat




                             Awareness


         Malware
         Insider Threat
         Device/Data Theft
         Leakage
         DDoS
         Espionage

                                                                       9
Choosing Meaningful Metrics


Organizational
    Data                 • Accurate
Vulnerability & Patch    • Repeatable
                         • Potential for Risk Relevance
    Management



Software & Data Asset
                           (either alone or with other
    Management
                           data)
    Network &
   Configuration
                         • Should be known in industry
   Management
                         • Not Necessarily Actionable
 Compliance & Audit      • Can sometimes validate or
   Management
                           invalidate other data
Security Information &
 Event Management




                                                          10
Industry Standard Metrics
(measurablesecurity.mitre.org)




                                 11
Finding the Risk Relevant Data


Organizational
    Data

Vulnerability & Patch
    Management



Software & Data Asset                    •   Some level of aggregation
    Management                           •   Also a repeatable process
                         Risk Relevant   •   Begins to inform SA
    Network &                Data        •   Not necessarily actionable
   Configuration
   Management                            •   Centrally managed

 Compliance & Audit
   Management


Security Information &
 Event Management




                                                                      12
Security Intelligence Across the
Infrastructure – Anomaly Detection




                                     13
Squelching the Noise




                       14
Informative and Actionable Output




Q1 Report Screen Here




                                        15
Pre-built NIST reporting




                           16
Risk Based Decisions




         * NIST SP 800-39


                            17
What to do next?


 Watch our recent webcasts http://q1labs.com/resource-
  center/media-center.aspx
 Download the “Gartner SIEM Critical Capabilities” report
  http://q1labs.com/resource-center/analyst-
  reports/details.aspx?id=17
 Download the “Continuous Monitoring for Government
  Agencies” paper http://q1labs.com/resource-center/white-
  papers/details.aspx?id=137
 Read our blog http://blog.q1labs.com/
 Follow us on Twitter: @q1labs @ibmsecurity

                                                             18
Thank You!




More info: info@Q1Labs.com
Twitter: @q1labs @accuvant
Blog: blog.q1labs.com

                             19

More Related Content

PDF
Cylance_Protect_Datasheet
PPT
002.itsecurity bcp v1
PPTX
Information security principles
PDF
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
PDF
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
PDF
2012-12-12 Seminar McAfee ESM
PPTX
Core security utcpresentation962012
PDF
From SIEM to SA: The Path Forward
 
Cylance_Protect_Datasheet
002.itsecurity bcp v1
Information security principles
Five Essential Enterprise Architecture Practices to Create the Security-Aware...
Extended Detection and Response (XDR) An Overhyped Product Category With Ulti...
2012-12-12 Seminar McAfee ESM
Core security utcpresentation962012
From SIEM to SA: The Path Forward
 

What's hot (20)

PDF
Vulnerability Management
PPT
Layered Approach - Information Security Recommendations
PDF
Redefining siem to real time security intelligence
PDF
kaspersky presentation for palette business solution June 2016 v1.0.
PPTX
Security Information Event Management - nullhyd
PPTX
Gainful Information Security 2012 services
PDF
Cylance Protect-Next-Generation Antivirus-Overview
PPTX
Challenges of Vulnerability Management
PDF
Cylance Information Security: Compromise Assessment Datasheet
PPTX
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
PPTX
Security Analytics for Data Discovery - Closing the SIEM Gap
PDF
Qradar ibm partner_enablement_220212_final
PDF
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
PDF
Defense In Depth Using NIST 800-30
PPTX
Računalna forenzika i automatizirani odgovor na mrežne incidente
PPTX
Identity intelligence: Threat-aware Identity and Access Management
PPTX
Actionable Threat Intelligence
PPTX
Vulnerability Assessment Presentation
PPTX
Cyber threat detection by siem tools
PDF
Top Cybersecurity Threats and How SIEM Protects Against Them
Vulnerability Management
Layered Approach - Information Security Recommendations
Redefining siem to real time security intelligence
kaspersky presentation for palette business solution June 2016 v1.0.
Security Information Event Management - nullhyd
Gainful Information Security 2012 services
Cylance Protect-Next-Generation Antivirus-Overview
Challenges of Vulnerability Management
Cylance Information Security: Compromise Assessment Datasheet
Security Incident and Event Management (SIEM) - Managed and Hosted Solutions ...
Security Analytics for Data Discovery - Closing the SIEM Gap
Qradar ibm partner_enablement_220212_final
Lessons Learned Fighting Modern Cyberthreats in Critical ICS Networks
Defense In Depth Using NIST 800-30
Računalna forenzika i automatizirani odgovor na mrežne incidente
Identity intelligence: Threat-aware Identity and Access Management
Actionable Threat Intelligence
Vulnerability Assessment Presentation
Cyber threat detection by siem tools
Top Cybersecurity Threats and How SIEM Protects Against Them
Ad

Similar to Continuous Monitoring and Real Time Risk Scoring (20)

PDF
2012 Data Center Security
PPTX
Sw keynote
PDF
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
PDF
Data security in cloud
PDF
PROFILE - NETMONASTERY
PDF
SuprTEK Continuous Monitoring
PPTX
Information Security Cost Effective Managed Services
PDF
Better security through IT operations
PDF
Security Awareness Training
PPTX
Fs isac fico and core presentation10222012
PPTX
Ulf mattsson webinar jun 7 2012 slideshare version
PDF
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
PDF
Day 3 p2 - security
PDF
Day 3 p2 - security
PDF
Security Intelligence
PDF
Building an Intelligence-Driven Security Operations Center
 
PDF
Cloud Auditing
PDF
Data Security Metricsa Value Based Approach
PPT
Cio ciso security_strategyv1.1
PPT
PCTY 2012, IBM Security and Strategy v. Fabio Panada
2012 Data Center Security
Sw keynote
[cb22] Keynote: Underwhelmed: Making Sense of the Overwhelming Challenge of C...
Data security in cloud
PROFILE - NETMONASTERY
SuprTEK Continuous Monitoring
Information Security Cost Effective Managed Services
Better security through IT operations
Security Awareness Training
Fs isac fico and core presentation10222012
Ulf mattsson webinar jun 7 2012 slideshare version
DSS ITSEC CONFERENCE - Lumension Security - Intelligent application whiteli...
Day 3 p2 - security
Day 3 p2 - security
Security Intelligence
Building an Intelligence-Driven Security Operations Center
 
Cloud Auditing
Data Security Metricsa Value Based Approach
Cio ciso security_strategyv1.1
PCTY 2012, IBM Security and Strategy v. Fabio Panada
Ad

Recently uploaded (20)

PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
sbt 2.0: go big (Scala Days 2025 edition)
PPTX
Microsoft Excel 365/2024 Beginner's training
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
Architecture types and enterprise applications.pdf
PDF
Convolutional neural network based encoder-decoder for efficient real-time ob...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Chapter 5: Probability Theory and Statistics
PDF
OpenACC and Open Hackathons Monthly Highlights July 2025
PPTX
The various Industrial Revolutions .pptx
PPTX
Benefits of Physical activity for teenagers.pptx
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Credit Without Borders: AI and Financial Inclusion in Bangladesh
Flame analysis and combustion estimation using large language and vision assi...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
The influence of sentiment analysis in enhancing early warning system model f...
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
sbt 2.0: go big (Scala Days 2025 edition)
Microsoft Excel 365/2024 Beginner's training
UiPath Agentic Automation session 1: RPA to Agents
Custom Battery Pack Design Considerations for Performance and Safety
A contest of sentiment analysis: k-nearest neighbor versus neural network
Architecture types and enterprise applications.pdf
Convolutional neural network based encoder-decoder for efficient real-time ob...
Enhancing emotion recognition model for a student engagement use case through...
Zenith AI: Advanced Artificial Intelligence
Chapter 5: Probability Theory and Statistics
OpenACC and Open Hackathons Monthly Highlights July 2025
The various Industrial Revolutions .pptx
Benefits of Physical activity for teenagers.pptx
Final SEM Unit 1 for mit wpu at pune .pptx
Credit Without Borders: AI and Financial Inclusion in Bangladesh

Continuous Monitoring and Real Time Risk Scoring

  • 1. Continuous Monitoring and Real Time Risk Scoring Erich Baumgartner, VP Federal Q1 Labs – An IBM Company J.R. Cunningham, Director of Federal Strategy Accuvant
  • 2. Meeting the Information Requirements of Federal Agencies Two-phased compliance and security timeline 2
  • 3. Security Intelligence for Continuous Monitoring  Monitors network changes to detect vulnerabilities in the network  Changes may be potential threats and policy/compliance violations, resulting in security gaps  Compares configuration data from network security devices with layer 7 network activity analysis  Continuously checks rule policy effectiveness and raises alerts  Provides single console view of risk exposure needed to meet continuous monitoring requirements (risk management, log management, SIEM, network behavior analysis) 3
  • 4. Continuously Manage Risk with Security Intelligence Move beyond traditionally reactive security management Multi-vendor network Automated compliance Predictive threat configuration monitoring & and risk assessment modeling & simulation audit Risk Indicators Configuration/  Topology Network  Activity Vulnerability  Management Network &  vulnerability context 4
  • 5. Accuvant & Q1 Labs Traditional SVARs Technology Driven Traditional Consulting Audit/Compliance Driven 5
  • 6. J.R. Cunningham Accuvant 6
  • 7. What is Continuous Monitoring? “…determine if the complete set of planned, required, and deployed security controls within an information system or inherited by the system continue to be effective over time…” NIST SP 800-37 7
  • 8. Why is Continuous Monitoring Critical? (Beyond the Obvious Answer – “It’s Required”) Intelligent Cyber Security- Applying countermeasures to only systems needing those controls Threat Intelligence – Understanding as much about the enemy and threat vectors as possible Acquisition excellence – find the “big ROI” Situational Awareness – decision superiority delivered with “speed of need” “If an agency has $1 to spend today, where should they spend it and why?” 8
  • 9. Continuous Monitoring and Situational Awareness Endpoint Protection Network Defenses Encryption DLP SIEM Countermeasure RBAC Situational Threat Awareness Malware Insider Threat Device/Data Theft Leakage DDoS Espionage 9
  • 10. Choosing Meaningful Metrics Organizational Data • Accurate Vulnerability & Patch • Repeatable • Potential for Risk Relevance Management Software & Data Asset (either alone or with other Management data) Network & Configuration • Should be known in industry Management • Not Necessarily Actionable Compliance & Audit • Can sometimes validate or Management invalidate other data Security Information & Event Management 10
  • 12. Finding the Risk Relevant Data Organizational Data Vulnerability & Patch Management Software & Data Asset • Some level of aggregation Management • Also a repeatable process Risk Relevant • Begins to inform SA Network & Data • Not necessarily actionable Configuration Management • Centrally managed Compliance & Audit Management Security Information & Event Management 12
  • 13. Security Intelligence Across the Infrastructure – Anomaly Detection 13
  • 15. Informative and Actionable Output Q1 Report Screen Here 15
  • 17. Risk Based Decisions * NIST SP 800-39 17
  • 18. What to do next?  Watch our recent webcasts http://q1labs.com/resource- center/media-center.aspx  Download the “Gartner SIEM Critical Capabilities” report http://q1labs.com/resource-center/analyst- reports/details.aspx?id=17  Download the “Continuous Monitoring for Government Agencies” paper http://q1labs.com/resource-center/white- papers/details.aspx?id=137  Read our blog http://blog.q1labs.com/  Follow us on Twitter: @q1labs @ibmsecurity 18
  • 19. Thank You! More info: [email protected] Twitter: @q1labs @accuvant Blog: blog.q1labs.com 19