2012 Taking Complexity out of Information Security …allowing you to focus on your business.

Slides:



Advertisements
Similar presentations
1© Copyright 2011 EMC Corporation. All rights reserved. The Future of the Advance Soc 3rd Annual Privacy, Access and Security Congress, Ottawa, 2012 Mike.
Advertisements

Palo Alto Networks Jay Flanyak Channel Business Manager
Next Generation Endpoint Security Jason Brown Enterprise Solution Architect McAfee May 23, 2013.
By Hiranmayi Pai Neeraj Jain
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
ECE Prof. John A. Copeland Advanced Persistent Threat Material.
1© Copyright 2011 EMC Corporation. All rights reserved. Advanced Persistent Threat Sachin Deshmanya & Srinivas Matta.
Extrusion Testing …testing your controls “inside-out” against the threats that actually matter! Panos Dimitriou, MSc InfoSec, CISSP,CISM Director, Managed.
Computer Security Workshops Security Introduction, Central Principles and Concepts.
INDEX  Ethical Hacking Terminology.  What is Ethical hacking?  Who are Ethical hacker?  How many types of hackers?  White Hats (Ethical hackers)
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Intrusion Detection using Honeypots Patrick Brannan Honeyd with virtual machines.
© 2012 Solera Networks. Contains confidential, proprietary, and trade secret information of Solera Networks. Any use of this work without express written.
Ken Paiboon User Behavior Intelligence Fundamentals: Behaviors, Characteristics, and Facts Ken Paiboon
Introduction to Network Defense
Security Imperatives in a New Workplace Partnering to Protect Digital Information in the 21st Century Presented by Michael Ferris, Alaska Enterprise Solutions.
Information Security Issues at Casinos and eGaming
APT29 HAMMERTOSS Jayakrishnan M.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
1© Copyright 2012 EMC Corporation. All rights reserved. Getting Ahead of Advanced Threats Advanced Security Solutions for Trusted IT Chezki Gil – Territory.
Defense-in-Depth What Is It?
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
Dell Connected Security Solutions Simplify & unify.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Honeypot and Intrusion Detection System
Symantec Targeted Attack Protection 1 Stopping Tomorrow’s Targeted Attacks Today iPuzzlebiz
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The Changing World of Endpoint Protection
Directed SIP Peer-to-Peer Telephony Creating a New Carrier-Class Model Joel Maloff, Ph.D. – EVP and CTO Fusion Telecommunications International
Nexthink V5 Demo Security – Malicious Anomaly. Situation › Avoid damage resulting from the incident itself and the cost of the unplanned response › Protection.
Introduction: Information security services. We adhere to the strictest and most respected standards in the industry, including: -The National Institute.
Advanced Persistent Threats (APT) Sasha Browning.
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. State of Network Security.
Connected Security Your best defense against advanced threats Anne Aarness – Intel Security.
Role Of Network IDS in Network Perimeter Defense.
Rapid Detection & Incident Response What, Why and How March 2016 Ft Gordon.
©2016 Check Point Software Technologies Ltd. 1 Latest threats…. Rolando Panez | Security Engineer RANSOMWARE.
ARAMA TECH D A T A P R O T E C T I O N P R O F E S S I O N A L S VISION & STRATEGY.
Enterprise’ Ever-Evolving Challenge & Constraints Dealing with BYOD Challenges Enable Compliance to Regulations Stay Current with New Consumption Models.
©2012 Bit9. All Rights Reserved Peter Llorens, PERegional Sales Manager, FL, Caribbean & Latin America Julio GutierrezSales Engineer, FL, Caribbean & Latin.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
Enterprise Network Security Threats that are Overlooked.
FROM SECURITY DATA TO SECURITY INTELLIGENCE ZULFIKAR RAMZAN, CTO, RSA.
November 14, 2016 bit.ly/nercomp_defendingyourdata16
Proactive Incident Response
Your Partner for Superior Cybersecurity
Firmware threat Dhaval Chauhan MIS 534.
Team 1 – Incident Response
A lustrum of malware network communication: Evolution & insights
Real-time protection for web sites and web apps against ATTACKS
Cyber Security: State of the Nation
Defeat Tomorrow’s Threats Today
Intelligence Driven Defense, The Next Generation SOC
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Closing the Breach Detection Gap
Company Overview & Strategy
Secure Browsing Because malware usually doesn’t identify itself.
Explaining Bitcoins will be the easy part: Borne Attacks and How You Can Defend Against Them Matthew Gardiner Product Marketing.
Forensics Week 12.
Top Security Priorities 2018
Securing the Threats of Tomorrow, Today.
Panda Adaptive Defense Platform and Services
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Chapter 4: Protecting the Organization
Security intelligence: solving the puzzle for actionable insight
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Cybriant Partner Partner Program White Label Materials
IoT in Healthcare: Life or Death
Presentation transcript:

2012 Taking Complexity out of Information Security …allowing you to focus on your business

The Problem Landscape

Google RSA Juniper DuPont IMF Lockheed Martin … 762 companies were hit during the RSA attack

 Regardless of the definition, % they adhere to the following characteristics: ◦ Nature  Targeted attacks  Blended Threats (multiple attack vectors)  “Low and Slow” ◦ Tactics:  Social Engineering, Attacking the user (most of the times)  Establishing a foothold (e.g. Remote Access Trojans)  Attack Escalation & Metastasis – Access to critical data and services  Retaining persistence (different RATs, multiple footholds, etc.) ◦ Results:  Data leakage, Sabotage, Fraud…  In essence is the attack method of choice of Professional Attackers

Step 1 Reconnaissance Step 2 Initial Intrusion into the Network Step 3 Establish a Backdoor into the Network Step 4 Obtain User Credentials Install Various Utilities Step 5 Privilege Escalation Attack Escalation Metastasis Step 7 Maintain Persistence Data Exfiltration/Other objectives realization Internal Users Web Applications Data CenterAttacker

 ORGANIZATIONS MUST LEARN TO LIVE IN A STATE OF COMPROMISE  Companies including utilities, banks and phone carriers would have to spend almost nine times more on cybersecurity to prevent a digital Pearl Harbor…, a Bloomberg Government study found  APT Tops Security Risks to Corporate IP in 2012,  "I'm meeting more CSO's saying 'all I care about is APT…’” Bruce Schneier, CTO of BT Counterpane

 ENCODE Extrusion Testing™: ◦ Security Assessment via APT Simulation ◦ Running Extrusion Tests from 2003!...8 years of hands-on experience ◦ Proprietary tools and methodologies ◦ Attacking “outside-in and inside-out”  Digital Forensics ◦ Performed Forensics on APT cases on various organisations

Because Controls fail  “Medieval approach to IT Security” - Building “castles/perimeters” around the network and trying to be “Preventive”  Single “attack vector” controls  “Evolved versions” of ones designed for the 90’s  Reactive approach

 While Security Programs are focused in Compliance ◦ However: Compliant ≠Secure  And at the same time even Specialized Security Controls are not adequate on their own (or even combined)  “Traditional” Controls fail ◦ Firewalls, IPS, Secure Web Gateways, AV/Endpoint Security… ◦ They are totally blind, due to a misfit paradigm for APTs  But also “less traditional” ones ◦ Data Leak Prevention – Designed for human actions, not for leakages by a piece of advanced software (malware, Trojans) ◦ 24x7 Security Monitoring - “Garbage IN, Garbage OUT”, No Monitoring in context, Not having the right tools for the job

Addressing APTs

One quite clever guy once said that “if he had one hour to save the world he would spend fifty-five minutes defining the problem and only five minutes finding the solution”

 Is it a Malware problem  Is it an adversary problem  Is it a Forensics Problem  Is it a Visibility Problem  Is it a zero-day exploit Problem  Is it a Botnet detection and/or takedown problem  Is it a lack of Security skills problem  Is it a lack of Defense in Depth problem …… …the short answer is NO Each one of them is a piece of the problem, but not the problem!

We believe it is 2-fold problem: A “Name Problem” A “Complexity Problem”

ENCODE Extrusion Testing Facts: Infection vectors used - Total

Because  they are considered “Advanced” for “traditional” but also for “less traditional” security controls  they are also “Advanced” for “Single-vector” specialized security controls  they are not “advanced enough” for some specialized security controls trying to be “very advanced”, missing KISS APT  organizations (used to) underplay/underestimate the Threat saying “this is too advanced… it won’t happen to us”

 Complexity: ◦ Complex IT environments & Business process, supporting Business Agility ◦ Complex Threat Landscape ◦ Complexity of the Internet  Attackers are taking advantage of this Complexity to achieve their goals, along with the fact that Business must be agile to remain in business!  However to solve a “complexity problem” or a complex problem you have to: ◦ Take out complexity, where you can ◦ Focus on the parts of the problem that really mater and solve them

 You cannot reduce complexity, at least from every part of your business…period  As Complexity increases the good old “Preventive” controls get less and less effective or impair Business  Nonetheless you have to be “Proactive”  Proactive Security ≠ Preventive Controls alone ◦ Early Warning & Response is the “preventive” control of choice for Complex environments and Threats  You have to focus on APT

If Early Warning is what we need, let’s think “What cannot be evaded”  Behavior ◦ An IT environment under attack does not behaves as normal ◦ Each attack, APT included, has its own signs in behavior change  True Visibility – at all (relevant) Levels ◦ Network: Internet Access (incoming/outgoing) ◦ Endpoint: System state & Data Access/Use  Expertise – the human factor ◦ Encapsulated expertise ◦ Expert view and analysis

Conclusion

APTs are becoming the weapon of choice:  from Government and Defense  to companies with Intellectual Property or Critical Infrastructure  to other “high-value” targets ◦ Finance ◦ … “…if professional attackers didn’t use such techniques they should have been sued for negligence…”

 is not a matter of What  is not a matter of Who  is a matter of When! Attorney David Navetta: … but to me a lot of companies might be thinking that breach is not a matter of if, but a matter of when, and that if you are a high enough profile type of target and someone really wants to get after you, they might have a good chance of actually succeeding

_