SUPERCHARGE YOUR SECURITY
Water Information Sharing and Analysis Center
DHS Hunt and Incident Response Team September 12, 2018
and Analysis Center DHS Hunt and Incident Response Team September - - PowerPoint PPT Presentation
SUPERCHARGE YOUR SECURITY Water Information Sharing and Analysis Center DHS Hunt and Incident Response Team September 12, 2018 SUPERCHARGE YOUR SECURITY Presenter Brian Draper, DHS NCCIC HIRT Slides and recording will be posted by
SUPERCHARGE YOUR SECURITY
DHS Hunt and Incident Response Team September 12, 2018
SUPERCHARGE YOUR SECURITY
Brian Draper
NCCIC Hunt and Incident Response Team (HIRT)
UNCLASSIFIED
5
UNCLASSIFIED
HIRT Overview w HIRT Service ce Offerings gs Proacti tive Hunt vs. Incide ident nt Respons nse Incide ident nt Respons nse Life ifecycl cle Prio ioritizi zing ng Incide idents nts Enga gagement nt Types Enga gagement nt Workflo low How
act t HIRT
UNCLASSIFIED
7
The National Cybersecurity Communications and Integration Center (NCCIC) Hunt and Incident Response Team (HIRT) provides expert intrusion analysis and mitigation guidance to clients who lack the in-house capability or require additional assistance with responding to a cyber incident.
HIRT’s clients include: Uniquely positioned to provide comprehensive analysis
Federal departments and agencies State, Local, Tribal and Territorial (SLTT) governments Private Sector (Industry & Critical Infrastructure) Academia International Organizations Classified and unclassified tactics, techniques and procedures (tips) Public and private sector partners Established relationships with Law Enforcement, Intelligence Community and International Partners
UNCLASSIFIED
Incide dent t Triage ge Hunt Analysis Network
y Re Review Mitigati tion
Infras astr truc ucture ure Configurat guration
Re Review Malwar ware Analys ysis Log Analysis Digital Media Analys ysis Incide dent t Specific Risk Overview w Control rol Syste tem m Incide dent t Analys ysis
UNCLASSIFIED
A search for malicious activity through the examination of a network environment for exploitation tools, tactics, procedures, and associated artifacts An asset owner-driven request Uses a risk review to scope the breadth
If malicious activity is observed during a hunt, move to Incident Response HIRT takes action to respond to a reported incident and to address the increased risks generated by the incident Asset owners and trusted third parties report information to NCCIC.
Trusted reporters include FBI, Information Sharing and Analysis Centers (ISACs), and
Uses a risk review to scope the breadth
UNCLASSIFIED
UNCLASSIFIED
Based ed on NIST T 800-61 Rev Revision 2
NCCIC Cyber Incident nt Scori
ng System em (NCISS)
Uses a weighted average (math) of the above criteria for a repeatable process
UNCLASSIFIED
Re Remot
nce Providing assistance without being physically
Advisory y Deploym yment nt Advising for mitigation onsite but technical analysis capabilities not deployed Re Remot
yment nt Deploying Equipment, remotely conducting analysis Onsite te Deploym yment nt Deployment of equipment and personal onsite to conduct technical analysis
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
UNCLASSIFIED
SUPERCHARGE YOUR SECURITY
SUPERCHARGE YOUR SECURITY