BT Security
1
cyber defence capability: A practitioners perspective Luke Beeson, - - PowerPoint PPT Presentation
Building an effective and dynamic cyber defence capability: A practitioners perspective Luke Beeson, Vice President Security UK and GB&FM BT Security 1 BT Security 2 Our History Rethinking the Risk as a Trusted Security Partner BT
BT Security
1
BT Security
2
BT Assure. Security that matters
3
BT privatised in 1984
1940s 1980s 2004 2006 2007 2008 2013 2011
Colossus created by Tommy Flowers BT Infonet 35 years of experience globally BT Counterpane services across 150 countries BT INS security protection, including ethical hacking BT iNet strong security track record to Italian blue chips BT Frontline security throughout AsiaPac MoD Watch Tower Goes LIve (IOC) NET2S technology and security consultancy specialised in capital markets BT Security Enterprise established 1,300 security people from across BT
2012
BT Security Delivers London 2012 Olympics Protect BT Cyber Defense Operations Established
2014
BT Security joins BTGS: team of +2000 security professionals
2015
Market Penetration Increasing
IN CONFIDENCE
BT Assure. Security that matters
5
We built BT’s Cyber Defence Operations from scratch, using our experience in Security Operations as our basis for continued improvement. Assure Cyber was conceived to provide the tooling required to execute the operating model created for ‘Protect BT’ and address a lack of single solution within the vendor market place.
IN CONFIDENCE
BT Assure. Security that matters
6
BT Assure. Security that matters
7
Critical Security Control 1 – Where and how are my critical business applications deployed Critical Security Control 4 – Continuous Vulnerability Assessment and Remediation Tailored solution templates in the form of capability packs that realise client specific service operating models. Capability can be introduced as tailored analytics within the big data construct and via integrated partner capability as required.
IN CONFIDENCE
BT Assure. Security that matters
8
are, the super correlator sets out to address this risk: –
Assume there is always a threat and break down barriers between internal and external.
Based on complex, probabilistic mathematics, Behavioural Cyber Defence is a new category
build dynamic models of the normal behaviour of each user and machine, and the enterprise as a whole.
Transcends the need for rule and signature based detection by:
Building a picture of what is normal for a network
Identifying anomalies from what it perceives as normal
Real time functionality
BT Assure. Security that matters
9
less important
business risk appetite if you are to protect them
into intelligence
allow focused defences
adversaries
teams with Network Operations teams will be necessary
to further improve situational awareness to allow faster more effective mitigation of blended threats at lower layers of the network stack
IN CONFIDENCE
IN CONFIDENCE