Cyber Security & Privacy Foundation (CSPF)
Vajra Cyber Threat Mitigation Service (Vajra CTMS)
A Military Grade Cyber Threat Mitigation Service for Businesses and Governments
Cyber Security & Privacy Foundation Pte. Ltd., Singapore
Vajra Cyber Threat Mitigation Service (Vajra CTMS) A Military Grade - - PowerPoint PPT Presentation
Vajra Cyber Threat Mitigation Service (Vajra CTMS) A Military Grade Cyber Threat Mitigation Service for Businesses and Governments Cyber Security & Privacy Foundation Pte. Ltd., Singapore Cyber Security & Privacy Foundation (CSPF)
A Military Grade Cyber Threat Mitigation Service for Businesses and Governments
Cyber Security & Privacy Foundation Pte. Ltd., Singapore
“ I’m no expert, but I think it’s some kind of cyber attack! ”
2
3
Cyber attacks present financial, operational, reputational, regulatory, geopolitical and M&A risks Attacks are an assault on a institution’s strategic imperatives
highly resourceful, Black Hat hackers are an overwhelming problem for conventionally resourced IT setups
No longer just the IT team’s migraine
Cyber attacks are somewhat like a heart attack
CYBER THREATS NOW A MAINSTREAM BUSINESS RISK THAT DEMAND CEO AND BOARD LEVEL ATTENTION
4
Financial Impact Non Financial Impact
Revenue losses Disruption of business systems Regulatory penalties Erosion of customers Reputational damage Pirating of products Stolen product designs or prototypes Theft of business and manufacturing processes Diversion of R&D data Impact on innovation, loss of trade secrets Loss of sensitive information such as M&A plans and corporate strategy
5
Distributed Denial of Service
trading/clearing platforms go unavailable for few hours/longer
health insurers are disabled
internet access failure
information vacuum internally and with clients, customers, suppliers, regulators
Hacking
servers, SCADA systems, App Stores, Routers
Firmware
records
trading, payment & clearing systems, Tax Information Networks
0 Day & APT Attacks
nature
Interconnected Business Ecosystem Attacks
targets to get a foothold into the system
6
Establishments Say We Have
gives up
Hackers Say
7
8
Security Technologies – WAF/Firewall/IDS/SIEM is present.
MOST ORGANIZATION ASSUME THEY ARE SECURE. ISO 270001
Standards are implemented around data center, VAPT is regularly done to satisfy compliance/regulatory requirement/certification requirement.
Analysis of SIEM logs
SOC monitors and analyses logs and takes corrective action with logs from WAF/firewall/IPS. The traffics are blocked which are then
9
Hacking Incidents
Global hacking incidents include US Gov & Fortune 100 have happened. BFSI
Point of infiltration(APT):
10
APMS Corporate
Anti-Fraud module extending to Anti – Phishing, Anti- Malware and Anti – Spam (APMS). Protect against Reputation, Financial & IP loss. Secure against Trojan Horses, Ransom Demands
Web Reputation & Security Scan (WRSS)
Web Security scanner scans for vulnerabilities on webportal/web services.
Automated Vulnerability Assessment
Advanced intrusive model including external VA of network for protective and compliance requirements
DF24
Defacement monitor for customer facing web portals. Includes Android mobile app/windows soc desktop app (for quick alerts)
11
Non-intrusive monitoring to protect against Reputation, Financial & IP loss Sandbox application to browse customers’ site/s and check if iframe, malware, java drive by can be downloaded to infect the machines of the end users of a bank’s website or a e- commerce portal Exhaustive scan of global phishing and spamming databases to cross-check potential compromises of customer’s domain/s
12
Automated daily scan and report generation Phishing complaints reporting system Similar Domain Name - Electronic Eye (EE) Anti-viruses check for web portal infections by crawling through all known paths DNS hijack check Ap24 phish tank, CTL - Feed processing(EE)
13
Anti-Phishing, Malware and Spam (APMS) scrutiny + scan of web portals and web services – Human Critical Index(HCI) Checks for specific CMS vulnerabilities Heuristic Shell detector – identifies hackers web-shells in web portals/web app. Manual entry point adding for security analyst
14
Machine learning assisted Hacker Entry Point Mapper(HEP) – Maps entry points normally discovered by hackers Root cause analysis of Sensitive Information Leakages on Internet False positive marker – handled by security analyst Accepted Risk/Ignore – Export for auditors
15
Manual APT bug-track for customer. Automatic report generation template for the customer (used by security analyst)
16
Identification, quantification, and prioritization of vulnerabilities Advanced intrusive model including external and internal vulnerability assessment (VA) of network for protection and compliance requirements
Scans multiple IP for open ports, enumerates and identifies vulnerability. We mark human critical index of the device(CISO of
17
AVA IP has facility to mark false positive when scanner identify it wrongly/when not applicable. The security analyst dedicated to your organization marks it.
18
Exporting accepted risk for auditing purpose. Security Analyst can mark Ignore/Accepted risk. Manual APT bug-track for customer. Automatic report generation template for the customer (used by security analyst)
19
Prioritize vulnerability and work with SOC/Vendor(network/ application level) to fix them. Strive to ensure no exploitable vulnerability is there. Daily APMS report to customer Weekly AVA/WRSS report with Bugtrack report. All critical /high vulnerabilities from automated WRSS/AVA and manual apt testing to be addressed are exported into bug track in the portal.
20
A not-for-profit foundation, Cyber Security & Privacy Foundation, formed as a vehicle to create hands on technical competency, initiate R&D and provide training in cyber security for individuals and
This non-profit foundation benefits from the wisdom of former senior practitioners from the Government and CISOs from Industry and Banks who are Trustees and Advisors of/to the Foundation. We have agreement with international pre emptive threat intel organization. E Hacking News (EHN), a leading Information Security news portal with more than 1,00,000 readers. EHN delivers the latest news updates related to security breaches, cyber crime, vulnerability, cyber security and penetration testing tools and more EHN provided media support to several International Security Conferences including NullCon, ClubHack, OWASP Asia and Hack in Paris, among others
CSPF’s cyber security initiatives are supported by its larger ecosystem including:
We can be reached at the following email id:
21