Internal Security Threats

Slides:



Advertisements
Similar presentations
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Advertisements

A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Framework for Improving Critical Infrastructure Cybersecurity NIST Feb 2014.
(Geneva, Switzerland, September 2014)
NIST framework vs TENACE Protect Function (Sestriere, Gennaio 2015)
Website Hardening HUIT IT Security | Sep
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
© 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker May 24, 2012 Page: 1 © 2012-Robert G Parker.
SEC835 Database and Web application security Information Security Architecture.
Dell Connected Security Solutions Simplify & unify.
 a crime committed on a computer network, esp. the Internet.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 CISCO SAFE: VALIDATED SECURITY REFERENCE ARCHITECTURE What It Is Business Transformation Top Questions To Ask To Initiate The Sale Where It Fits KEY.
ISO17799 Maturity. Confidentiality Confidentiality relates to the protection of sensitive data from unauthorized use and distribution. Examples include:
Network security Product Group 2 McAfee Network Security Platform.
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Keynote 9: Cyber Security in Emerging C4I Systems: Deployment and Implementation Perspectives By Eric J. Eifert, Sr. VP of DarkMatter’s Managed Security.
©2015 Check Point Software Technologies Ltd. 1 Website Watering Holes Endpoints are at risk in numerous ways, especially when social engineering is applied.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
No boundaries with Unified Web Security Solutions Steven Vlastra Sr. Systems Engineer - Benelux.
INSIDER THREATS BY: DENZEL GAY COSC 356. ROAD MAP What makes the insider threat important Types of Threats Logic bombs Ways to prevent.
Protect your Digital Enterprise
EAST AFRICAN DATA HANDLERS DATA SECURITY/MOBILITY
What is it ? …all via a single, proven Platform-as-a-Service.
The Cybersecurity Framework
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Automating Security Frameworks
“Introduction to Azure Security Center”
Citrix: Proactively Addressing Enterprise Wide Access Compliance with SAP® Access Violation Management Company Citrix Systems Inc. Headquarters Ft. Lauderdale,
Compliance with hardening standards
Integrated Cyber October 16-17, 2017
Active Cyber Security, OnDemand
Cybersecurity Policies & Procedures ICA
Advanced Threat Protection
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Joe, Larry, Josh, Susan, Mary, & Ken
Cybersecurity EXERCISE (CE) ATD Scenario intro
Forensics Week 11.
Cyber defense management
Transforming IT Management
Cybersecurity Awareness
2018 Real Cisco Dumps IT-Dumps
2018 Real Cisco Dumps IT-Dumps
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
CIS 333 RANK Education for Service-- cis333rank.com.
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Threat Landscape for Data Security
SAM GDPR Assessment <Insert partner logo here>
Strong Security for Your Weak Link:
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
AKAMAI INTELLIGENT PLATFORM™
Home Internet Vulnerabilities
The University of Adelaide, School of Computer Science
Shifting from “Incident” to “Continuous” Response
Securing the Threats of Tomorrow, Today.
INFORMATION SYSTEMS SECURITY and CONTROL
Symantec Web Isolation Secure Access to Uncategorized and Risky Sites Protect Your Most Privileged Users Prevent Phishing and Ransomware Attacks John Moore.
Building an Integrated Security System Microsoft Forefront code name “Stirling” Ravi Sankar Technology Evangelist | Microsoft
How to Mitigate the Consequences What are the Countermeasures?
Cyber security Policy development and implementation
Cybersecurity ATD technical
Introduction to Internet Worm
Data Security and Privacy Techniques for Modern Databases
IT Management Services Infrastructure Services
Presentation transcript:

Internal Security Threats Case Studies and Mitigation Methodologies Peter Romness Steve Caimi May 2017

Abstract Internal Security Threats People are our most valuable assets, so we entrust them with legitimate access to critical systems and sensitive information to carry out their duties. But people can also become major internal threats by the actions they take – whether unintentionally risky or intentionally malicious. This session explores real-world insider threat case studies and shows how a cybersecurity best-practices approach helps to mitigate the risk of insider threats.

Internal Security Threats

Effective Cybersecurity Coordination is essential People Policy Process   Technology

Cybersecurity Risks The duality of human beings People Policy Process People are our greatest assets, but they can also be our biggest risks.   Technology

About Insiders Attributes People 1 Current or former employee, contractor, or business partner 2 Has or had authorized access to the network, system, or data People 3 May have been vetted through background or credit checks 4 Can be influenced by personal, behavioral, or financial issues Individuals' behavior must be guided by policies, processes, and technologies

Malicious Insider Threats Unintentional Insider Threats Internal Security Threats Malicious vs. Unintentional Malicious Insider Threats Unintentional Insider Threats People Intentionally exceeds or purposefully uses authorized access to negatively affect the confidentiality, integrity, or availability of systems and data Accidentally exceeds or unintentionally uses authorized access to negatively affect the confidentiality, integrity, or availability of systems and data

Malicious Insider Threats Unintentional Insider Threats Internal Security Threats Some risky things people do Malicious Insider Threats Unintentional Insider Threats People Waste Quick to Click Duped Fraud Theft Share Credentials Leaks Sabotage Carelessness Abuse Errors

Case Studies: Can you detect these?

Case Study #1 Normal Activity: Detect an anomalous traffic pattern The database usually communicates with insiders using these two endpoints DB Wi-Fi

Case Study #1 Suspicious Activity: Detect an anomalous traffic pattern The database begins sending high volumes of data outside of the network 011010110000101110110011011000110110011001100110101110000101001100110011001010100010100010100010100010010000000000011100110101001100100100110011 DB 011010110000101110110011011000110110011001100110101110000101001100110011001010100010100010100010100010010000000 Wi-Fi 001101010100011001001001 011010110000101110110011011000110110011001100110101110000101100110101001100100100001110110110011

Case Study #2 Normal Activity: Detect evasive malicious code Insiders use web and email in daily activities Web Browsing Email Wi-Fi

Case Study #2 Suspicious Activity: Detect evasive malicious code Insider clicks a legitimate-looking email that actually contains advanced malware Web Browsing Spear-phishing Email Wi-Fi

Case Study #3 Normal Activity: Detect data leaks though cloud apps Insiders access sensitive data with authorized devices Wi-Fi

And then: Outsider accesses data from cloud app Case Study #3 Detect data leaks though cloud apps Suspicious Activity: Insider sends data to cloud app And then: Outsider accesses data from cloud app Wi-Fi

Mitigation Methodologies

effectively How can we efficiently manage our cyber risks? The Cyber Question Cybersecurity Risk Management How can we efficiently and effectively manage our cyber risks? Unacceptable Risk Level Acceptable Risk Level

The Cyber Answer Leverage Industry Best Practices 1 National Institute of Standards and Technology (NIST) NIST Cybersecurity Framework, NIST Risk Management Framework http://www.nist.gov/ Center for Internet Security (CIS) CIS Critical Security Controls http://www.cisecurity.org/ 2 3 International Organization for Standardization (ISO) ISO 27000-series publications http://www.iso.org/ 4 ISACA COBIT 5 Framework http://www.isaca.org/

NIST Cybersecurity Framework It’s gaining momentum 1 Common cybersecurity language 2 Risk-based investment decisions 3 Leverages existing best practices 4 Simple, flexible, and global 5 Freely available to everyone 6 Supply chain risk management

Identify Protect Detect Respond Recover NIST Cybersecurity Framework It’s for insider threats too Identify Protect Detect Respond Recover “The Framework provides a common language for understanding, managing, and expressing cybersecurity risk”

Detect NIST Cybersecurity Framework Insider threat detection Identify Protect Respond Recover “Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event.”

Detect NIST CSF “Detect” Function Insider threat detection Anomalies and Events “Anomalous activity is detected in a timely manner and the potential impact of events is understood.” Detect Security Continuous Monitoring “The information system and assets are monitored at discrete intervals to identify cybersecurity events and verify the effectiveness of protective measures.” Detection Processes “Detection processes and procedures are maintained and tested to ensure timely and adequate awareness of anomalous events.”

Detect Internal Security Threats Highlighting effective detection Suspicious Traffic Patterns Malware in Disguise Command and Control Activity Encrypted Traffic Detect Exploited Vulnerabilities Web Attack Vectors Browser Infections DNS Requests Individuals' behavior must be guided by policies, processes, and technologies

Network as the Enforcer Technology Highlight Network as the Sensor Network as the Enforcer Network as the Sensor Detect rich endpoint data Detect anomalous data flows Detect user access policy violations Network as the Enforcer Segment the network to contain attacks Enforce policy to mitigate insider threats Automate threat detection and respond faster So what is Cisco’s network as a sensor solution and how can it address the customer challenges of the new network and the new security challenges that the new network brings? Cisco Network as a Sensor leverages a customer’s existing Cisco network investment to perform the network analysis and visibility that is the key element of network security today. It enables customers to detect anomalous traffic flows and malware and see when malware gets in tries to propagate itself, gain granular visibility into applications and roles by user to see when they are violating access policy as well as detect rogue devices rapidly and quarantine them on the network. Network as a Sensor reduces the complexity and fragmentation of networks by enabling visibility across the expanded attack surface to gain better control and help better secure the network. So what is Cisco’s network as an enforcer solution and how can it address the customer challenges of the new network and the new security challenges that the new network brings? Cisco Network as an Enforcer works hand in hand with Network as a Sensor. Network as an Enforcer uses all the same elements in the Cisco Network as a Sensor solution but then augments that solution with CiscoTrustSec. Once you have used Network as a Sensor solution to gain that deeper visibility and insight into traffic flows, user policy violations and malware, you can then leverage the network as an enforcer to take action. Network as an Enforcer allows you to contain the scope of an attack in progress, quarantine threats and implement policy controls to secure your network resources. It allows you to not only quarantine threats but also reduces your time to remediation.

Technology Highlight What NaaS / NaaE Offers You Unmatched Visibility Global Intelligence With the Right Context Advanced Threat Reduction Detects and Stops Advanced Threats Consistent Control Consistent Policies Across the Network and Data Center Complexity Reduction Fits and Adapts to Changing Business Models So let’s review these solutions one more time to remind you what Network as a Sensor and Network as an Enforcer can bring to your customers before I get to some specific use cases in the next section of the presentation. First, unmatched visibility – the intelligence with the right context in your network applications, users and devices Second, consistent control – bringing your customers consistent policies across the entire network all the way from the edge to the data center Third, advanced threat protection – the ability to shrink the large attack surface that I mentioned at the beginning of this presentation as well as detecting and containing threats Lastly, reduced complexity – the ability to adapt, scale and meet all of the challenges I spoke about at the beginning of this presentation -

Insider Threat Mitigation Integrated threat defense strategy 1 Provides a richer network and security architecture 4 Leverages Open Application Programming Interfaces (APIs) 2 Recognizes that best-in-class technology alone isn’t enough 5 Requires less gear and software to install and manage 3 Offers visibility into encrypted malicious activities 6 Speeds detection through automation and coordination

Effective Cyber Risk Management Recommended Approach To summarize.... Simple Open Automated Effective Cyber Risk Management

Learn more Recommended reading The Cybersecurity Landscape http://www.talosintelligence.com NIST Cybersecurity Best Practices http://csrc.nist.gov Cisco Security Reports http://www.cisco.com/go/securityreport Common Sense Guide to Mitigating Insider Threats http://www.sei.cmu.edu www.cisco.com/go/security

Effective Security Made Simple