Insider Threat and Data Leakege Considerations and Solutions

Slides:



Advertisements
Similar presentations
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES.
Advertisements

Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
COPYRIGHT © 2010 TECTIA CORPORATION. ALL RIGHTS RESERVED. Proactive Measures to Prevent Data Theft Securing, Auditing and Controlling remote.
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Enterprise Computing Community June , 2010February 27, Information Security Industry View Linda Betz IBM Director IT Policy and Information.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Dell Connected Security Solutions Simplify & unify.
Perimeters and Unicorns: Two Things That Only Exist in IT Fairyland Gary Paluch, CISSP, Sr. Sales Engineer.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The Changing World of Endpoint Protection
Copyright 2009 Trend Micro Inc. Beyond AV security, now with DLP and web protection. Trend Micro PortalProtect SharePoint Security.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
BEN ROBINSON, ACCOUNT EXECUTIVE, PALO ALTO NETWORKS SAFELY ENABLE YOUR SAAS APPLICATIONS.
© 2009 WatchGuard Technologies WatchGuard XCS Data Loss Prevention Ensuring Privacy & Security of Outbound Content.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
MANAGED SECURITY TESTING PROACTIVELY MANAGING VULNERABILITIES.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
What’s New Data Loss Prevention 14. Information is Everywhere Brings Productivity, Agility, Convenience ……and Problems Copyright © 2015 Symantec Corporation.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
Why SIEM – Why Security Intelligence??
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Neil Thacker, Information Security & Strategy Officer, EMEA EU DATA PROTECTION -
Complete Cloud Security Anyone, anywhere, any app, any device.
Taking on Tomorrow's Challenges Today Taking on Tomorrow's Challenges Today Almost every organisation has been attacked …. But most don’t know about it!
FORCEPOINT Protecting the Human Point
Defining your requirements for a successful security (and compliance
Protect your Digital Enterprise
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Deployment Planning Services
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
Understanding DATA LOSS PREVENTION
Cybersecurity - What’s Next? June 2017
[Internal Use] for Check Point employees​
Comprehensive Security and Compliance at an Affordable Price.
FORCEPOINT Moving Your Business Forward Without Fear
Do you know who your employees are sharing their credentials with
Managing a Data Breach Prevention-Detection-Mitigation
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Business At the Speed of Cyber
Compliance with hardening standards
Introduction to a Security Intelligence Maturity Model
Active Cyber Security, OnDemand
Managing a Data Breach Prevention-Detection-Mitigation
Dissecting the Cyber Security Threat Landscape
Understanding best practices in classifying sensitive data
Company Overview & Strategy
Skyhigh Enables Enterprises to Use Productivity Tools of Microsoft Office 365 While Meeting Their Security, Compliance & Governance Requirements Partner.
Threat Landscape for Data Security
COMPREHENSIVE APPROACH TO INFORMATION SECURITY IN ADVANCED COMPANIES
Strong Security for Your Weak Link:
How to Operationalize Big Data Security Analytics
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Home Internet Vulnerabilities
Druva inSync: A 360° Endpoint and Cloud App Data Protection and Information Management Solution Powered by Azure for the Modern Mobile Workforce MICROSOFT.
Securing the Threats of Tomorrow, Today.
Protect Your Microsoft Azure Cloud Assets Against Inside and Outside Threats With Balabit’s Shell Control Box Privileged User Monitoring Solution Partner.
DATA LOSS PREVENTION Mr. Collins Oduor.
DATS International Portfolio.
4/9/ :42 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Strategic threat assessment
Managing IT Risk in a digital Transformation AGE
Microsoft Data Insights Summit
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Low Power Wide Area Network.
STEALTHbits Technologies, Inc.
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Cloud Computing for Wireless Networks
Presentation transcript:

Insider Threat and Data Leakege Considerations and Solutions OZGUR DANISMAN, MBA, CISSP, CISM Sales Engineering Manager, MENA

New Company, Uniquely Formed to Offer a New Approach to Security Commercial Leader with Content Security & DLP Cloud / On-Premise / Hybrid Pioneer on Cyber Frontlines with Financial Resources Deep Understanding of Threat Detection Networking Innovator with Advanced Evasion Prevention Security at Scale

Core Products Core Business Data & Insider Threat Protection Content Security Data & Insider Threat Protection AP-WEB SureView Insider Threat Core Business AP-EMAIL AP-DATA Threat Protection Cloud / Appliance Security for Cloud Network Security Threat Protection for Linux AP-DATA DISCOVER Stonesoft & Sidewinder RiskVision

Challenges and Pressures to Protecting Users & Data BUSINESS TRANSFORMATION BUSINESS TRANSFORMATION Increasingly Mobile Workforce Adoption of Cloud Infrastructure & expansion of supply chain Rapid IT delivery INDUSTRIALIZATION OF CYBERCRIME INDUSTRIALIZATION OF CYBERCRIME Compromises Users & Their Data Increasingly Sophisticated Campaigns DATA NETWORKS USERS WORKFORCE SKILLS & RESOURCING Shadow IT Security Awareness Lack of IT staff Static Budgets WORKFORCE SKILLS & RESOURCING INCREASING REGULTAOTRY SCOPE Breach Notification Consumer Rights Over Their Data Higher Penalties Infrastructure Scope INCREASING REGULTAOTRY SCOPE Enable Business Innovation and Agility Protect the Brand

How Industrial Hackers Monetize the Opportunity Exploits $1000-$300K Mobile Malware $150 Social Security $1 Credit Card Data $0.25-$60 Spam $50/500K emails Medical Record >$50 Global Cybercrime Market: $450B-$1T $ DDoS Facebook Account $1 for an account with 15 friends Malware Development $2500 (commercial malware) Bank Account Info >$1000 depending on account type and balance DDOS as a Service ~$7/hour WELCOME TO THE HACKERS’ ECONOMY Source: RSA/CNBC The question I’ve always had….and I get asked all the time is…..How do the Industrialized Hackers make money? There have been a number of articles published with the prices that the hackers are demanding for their stolen goods. Social Security & Pension data - $1 Go thru each ….emphasize exploit….up to $300,000. The overall market for CyberCriminals is estimated at anywhere from $450Billion to a Trillion, according to Congressional Testimony given by Ed Amoroso, Chief Security Officer from AT&T, and General Alexander, the former Director of the NSA. The bottom line is that Hacker Economy is Huge….and Growing. High School Group/mobile operator. Exploit kit 1k-300k, bank account 1000 USD-like drug dealing example/levels-country secure but it is international 5

Why to focus on Insider Threats? Source Verison DBIR 2016 Majority of breaches fall in 9 categories Insider threats has increased rapidly Crimeware is a big concern Source: Verison DBIR 2015

USER BEHAVIOR PERSONAS THAT POSE RISK TO AN ORGANIZATION COMPROMISED USER Victims of: cyber attacks social engineering bribery or blackmail INTENTIONAL INSIDER Ethical rationalization Abuses privileges & access Knowingly transfers protected data externally ACCIDENTAL INSIDER Works around broken business processes Mistakes made during data transfer Misinterpreted training

Cost of an Insider Breach https://dtexsystems.com/portfolio-items/infographic-findings-from-the-2016-costs-of-insider-threats-report/ COMPROMISED USER Victims of: cyber attacks social engineering bribery or blackmail INTENTIONAL INSIDER Ethical rationalization Abuses privileges & access Knowingly transfers protected data externally ACCIDENTAL INSIDER Works around broken business processes Mistakes made during data transfer Misinterpreted training Source Ponemon 2016

USER BEHAVIOR PERSONAS THAT POSE RISK TO AN ORGANIZATION COMPROMISED USER Victims of: cyber attacks social engineering bribery or blackmail INTENTIONAL INSIDER Ethical rationalization Abuses privileges & access Knowingly transfers protected data externally ACCIDENTAL INSIDER Works around broken business processes Mistakes made during data transfer Misinterpreted training

INTRODUCING ‘Dwell-Time’ OUTSIDE ATTACKS STOLEN STOLEN Get Back To Normal Protect as much as possible Average time to identify UNINTENTIONAL insider breaches 158 BREACH DETECT DEFEND DECIDE INITIAL COMPROMISE LATERAL MOVEMENT DEFEAT INSIDER THREATS Reduce “Dwell Time” (when threats are in your network) to minimize theft and damage BREACH FIXED TIMELINE The insider threat problem requires a new approach, focused on decreasing this dwell time rather than trying to craft a policy to match every possible scenario. [CLICK] An insider is someone who is already “in” the system and already has level of access and associated privileges. The same is true for an outside attacker who has stolen credentials and is acting like an insider. [CLICK] This approach requires a deep understanding of what behavior is normal for the organization and what sequences of activity are abnormal. As technology is able to help humans quickly find and verify these malicious events, the dwell time between the inception and defeat of a threat is minimized. INCIDENT

MODERN BUSINESS IS ALL ABOUT SAFELY CONNECTING USERS TO DATA Cloud Apps Mobile Corp Servers DATA USER BEHAVIOUR ANALYTICS (UBA) USERS Office DATA LOSS PREVENTION (DLP) NETWORKS + Websites Other Locations Partners & Supply Chain Email Endpoint Media Customers IN THE CLOUD, ON THE ROAD, IN THE OFFICE

Data LEAKAGE Prevention – architecture IM Active Sync IM Cloud Active Sync FTP FTP Email Printer Storage Database Web Email Web Email Media Network Storage Network Printer Laptop Drives ENDPOINT Data in Use NETWORK Data in Motion DISCOVER Data at Rest

Data LEAKAGE Prevention is a Tool for Risk Reduction 1000 800 600 400 200 Visibility Remediation Incidents Per Week Notification Prevention

DLP secures sensitive data In Use & In Motion Who What Where How Action Human Resources Source Code Evernote File Transfer Confirm Customer Service Credit Card Data Dropbox Web Block Marketing Personal Data Business Partner Instant Messaging Notify Finance M&A Plans Facebook Peer-to-Peer Remove Accounting Employee Salary OneDrive Email Encrypt Sales / Marketing Financial Report Malicious Server Print Quarantine Legal Patient Records Removable Media File Copy Confirm Technical Support Manufacturing Docs Competitor Print Screen Audit Engineering Research Customer Copy/Paste Notify

Insider Threat Mitigation Presentation Title February 11, 2018 DLP Evolution Compliance Insider Threat Mitigation IP Protection Data Theft Prevention 2003 2010 2017 Pre-defined Compliance Policies Data Fingerprints Endpoint fingerprints OCR and Cumulative (DRIP) DLP Cloud & Mobile DLP Data Theft Risk Indicators Incident Risk Ranking Behavioral Analytics Speaker Name

User Behaviour Analytics MACHINE LEARNING Policy Violations ORGANISATION Volume Anomaly INDIVIDUAL Volume Anomaly Policies 3rd Party Policies Scoring Engines

DLP Data Monitoring and Protection Insider threat + DLP DLP Data Monitoring and Protection Monitor and protect IP and PII everywhere Insider Threat Behavioural Audit Establish a baseline of typical user behavior Identify potentially anomalous behaviors Insider Threat Focused Investigation Comprehensive, chronicled data collection Learn from incidents However, it is important to keep in mind that UBA tools are just part of the actual ‘solution’. A full DLP program, including endpoint based DLP, should be an integral part of a complete “Insider Threat Data Protection” program. Here you can see how they compliment each other. TRITON AP-DATA (DLP) Protect “sensitive data” in external communications Identify and describe sensitive data Provide visibility into the movement of sensitive data Educate users to communicate data safely Protect the data everywhere SureView Insider Threat Correlate “user” behavior to identify “risky users” Correlate security events and other user contextual data Data models identify and score risky users and score Administrator validates the behavior with on-demand forensics DLP Data Monitoring and Protection Data classification Data exfiltration controls across IT infrastructure Incident-based behavioral model Monitor and protect IP and PII everywhere Insider Threat Behavioral Audit Establish a baseline of typical user behavior Identify potentially anomalous behaviors User-based behavioral models Insider Threat Focused Investigation Comprehensive, chronicled collection from multiple data sources including AP-DATA All the details, insight and complete context of user actions Video replay of user activity Detect and deter insider threats

THANK YOU! Ozgur Danisman ozgur.danisman@forcepoint.com