Castles in the Air: Data Protection in the Consumer Age



Similar documents
Defending Against Data Beaches: Internal Controls for Cybersecurity

Intelligence Driven Security

Security and Privacy

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Advanced Threats: The New World Order

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Software that provides secure access to technology, everywhere.

Analyzing HTTP/HTTPS Traffic Logs

Concierge SIEM Reporting Overview

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

IBM QRadar Security Intelligence April 2013

Security Analytics for Smart Grid

TRITON APX. Websense TRITON APX

Office 365 Cloud App Security MARKO DJORDJEVIC CLOUD BUSINESS LEAD EE TREND MICRO EMEA LTD.

Enterprise Cybersecurity: Building an Effective Defense

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Cybersecurity: What CFO s Need to Know

Italy. EY s Global Information Security Survey 2013

Risk Analytics for Cyber Security

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Understanding the Security Vendor Landscape Using the Cyber Defense Matrix

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

McAfee Security Architectures for the Public Sector

Best Practices to Improve Breach Readiness

ISS X-Force. IBM Global Services. Angel NIKOLOV Country Manager BG, CZ, HU, RO and SK IBM Internet Security Systems

Practical Steps To Securing Process Control Networks

Cybersecurity The role of Internal Audit

SourceFireNext-Generation IPS

Critical Security Controls

Agenda , Palo Alto Networks. Confidential and Proprietary.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Security Services. 30 years of experience in IT business

RETHINKING CYBER SECURITY Changing the Business Conversation

After the Attack. The Transformation of EMC Security Operations

SANS Top 20 Critical Controls for Effective Cyber Defense

Cyber security Building confidence in your digital future

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Enterprise Cybersecurity: Building an Effective Defense

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Changing the Enterprise Security Landscape

Rashmi Knowles Chief Security Architect EMEA

External Supplier Control Requirements

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

CyberArk Privileged Threat Analytics. Solution Brief

PCI Solution for Retail: Addressing Compliance and Security Best Practices

Cybersecurity and internal audit. August 15, 2014

IBM Security Strategy

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Secure Cloud Computing

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Data- centric Security: A New Information Security Perimeter Date: March 2015 Author: Jon Oltsik, Senior Principal Analyst

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

Unified Threat Management, Managed Security, and the Cloud Services Model

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

The session is about to commence. Please switch your phone to silent!

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

Stay ahead of insiderthreats with predictive,intelligent security

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Modular Network Security. Tyler Carter, McAfee Network Security

Music Recording Studio Security Program Security Assessment Version 1.1

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

The Next Generation Security Operations Center

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Evolution Of Cyber Threats & Defense Approaches

Content Security: Protect Your Network with Five Must-Haves

Threat-Centric Security for Service Providers

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Protecting against cyber threats and security breaches

Cyber Security Risks for Banking Institutions.

Chapter 1 The Principles of Auditing 1

A Primer on Cyber Threat Intelligence

SECURITY CONSIDERATIONS FOR LAW FIRMS

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Cisco Security: Moving to Security Everywhere. #TIGcyberSec. Stefano Volpi

Defending Against Cyber Attacks with SessionLevel Network Security

Cybersecurity Enhancement Account. FY 2017 President s Budget

Transcription:

Castles in the Air: Data Protection in the Consumer Age SESSION ID: DSP-W03 Jason Clark Chief Strategy and Security Officer Accuvant @CSOinFL John Johnson Global Security Strategist John Deere @JohnDJohnson

Agenda Technology Trends: Making Security a Key Enabler The Changing Perimeter: Implications for Data Protection Risk-Based Security Solutions A Data-Centric Approach Aligning Strategy Capabilities and Maturity A Vision for the Future 2

Defending The Castle

The Castle Model of Defense What is the advantage of a castle? The castle is built on high ground The castle has visibility to see enemies approaching far away The castle has thick, impervious walls Guards watch everyone coming and going It is very difficult and expensive for enemies to breach a castle Why is our enterprise not a castle? The Internet has no high ground We don t have good visibility to threats We have lots of holes in our walls We don t inspect all the traffic coming and going The Asymmetric problem: It is expensive to defend, but the adversary only needs to find one hole to breach the enterprise

Let s Talk SMAC The SMAC Stack

Consumerization: Threats & Opportunities Security can be seen as a key enabler or a barrier to success It will happen: don t throw yourself in front of the train to stop it The solutions that worked in the past will not serve us in the future We need the right mix of people, processes and technology to secure these transformative technologies The perimeter is evolving away from castle model It is easier than ever to have important data leak; we inherently have less visibility and control over data that leaves our environment 6

Business Model Framework INFRASTRUCTURE CORE CAPABILITIES PARTNER NETWORK ACTIVITY CONFIGURATION OFFER VALUE PROPOSITION CUSTOMER RELATIONSHIPS DISTRIBUTION CHANNELS CUSTOMER CUSTOMER SEGMENTS COST STRUCTURE FINANCE REVENUE STREAMS a business model describes the value an organization offers to various customers and portrays the capabilities and partners required for creating, marketing, and delivering this value and relationship capital with the goal of generating profitable and sustainable revenue streams

Application HOW WE SECURE THE PERIMETER TODAY Device User Network Data

Application HOW WE SECURE THE PERIMETER TODAY Device User MAJORITY OF THE SECURITY SPEND HAS BEEN FOCUSED ON STOPPING OR DETECTING THE THREATS ON THE NETWORK OR DEVICE. Network Data

Application HOW WE SECURE THE PERIMETER TODAY Device User IN COMPARISON LITTLE SPEND HAS BEEN PUT TOWARDS USER ACTIVITY AND DATA PROTECTION. MOST ORGANIZATIONS ARE IMMATURE IN UNDERSTANDING USER AND DATA BEHAVIOR. Network Data

ACTORS AND MOTIVATIONS INDUSTRIAL INDIVIDUALS ORGANIZED CRIME INDUSTRIAL From Outside From Insiders From Outsiders via Insiders! HACKTIVISTS TERRORISTS NATION STATES Proprietary and Confidential. Do Not Distribute. 2013 Accuvant, Proprietary Inc. All and Rights Confidential. Reserved. Do Not Distribute. 2014 Accuvant, Inc. All Rights Reserved. Proprietary and Confidential. Do Not Distribute. 2013 Accuvant, Inc. All Rights Reserved.

WHAT IS THE DEFINITION OF INSANITY? 80% Continuing to Put of Our Spend on Firewalls, Antivirus and IPS and Not Changing Our Security Strategy/Tactics Proprietary and Confidential. Do Not Distribute. 2013 Accuvant, Inc. All Rights Reserved. Proprietary and Confidential. Do Not Distribute. 2014 Accuvant, Inc. All Rights Reserved.

The Security Journey Ultimate Goal is Risk Based/Data Centric with Threat Modeling AD HOC INFRASTRUCTURE BASED COMPLIANCE BASED Failure to Pass RISK BASED/DATA CENTRIC Proprietary and Confidential. Do Not Distribute. 2013 Accuvant, Inc. All Rights Reserved. THREAT BASED

A Risk-Based Approach Work with the business, don t operate in a vacuum Figure out who owns the risk and who the decision makers are Identify the data/assets that you most want to protect Assess threats in consistent way Develop meaningful risk metrics Start with most significant business risk and prioritize Identify new technical security controls and apply P/P/T to architect solutions that enable SMAC: Layered, Synergistic, Agile 16

CISO View of the World Risk and Security Make Our Business Better COMPLEX JOB COORDINATED APPROACH TO RISK Business Drivers and Initiatives Risks Frameworks Approach Risk & Security Coverage Oversight EXECUTIVE MANAGEMENT BUSINESS STRATEGY Asset and Capital Management Earnings and Operating Margins Revenue and Market Share Reputation and Brand Strategic Operations Financial Compliance COSO COBIT ITIL ISO 17799 Regulations Patriot Act GLBA SOX Other Regulations Assess Improve Monitor Processes and Operational Practices Business Drivers Governance, Policies & Standards Asset Profile Technical Security Architecture Technical Specifications Security Program Compliance, Monitoring and Reporting AVAILABILITY People and Organizational Management Executive Management Board Audit Committee Risk Committee Achieve Business Objectives ALIGNED TO BUSINESS DRIVERS 2013 Accuvant Keep Us Out of Trouble

Data Protection Stewards Security is responsible for recommending and overseeing the controls that ensure protection stewardship extends beyond IT into the enterprise and beyond the perimeter into the cloud. Support Organization Mission & Business Objectives Protect Organization Reputation Confidentiality of Information Integrity of Information Availability of Information Integration Theory, Information Security, July 2008, http://searchsecurity.techtarget.com/magazinefeature/0,296894,sid14_gci1321706,00.html

Data-Centric Security Identify the data that you most want to protect Sensitive IP, Regulated, High Value Mark the data; don t try to classify everything Perform threat modeling and scoring Identify security controls that can be applied at boundary layers When possible, automate (intelligent) decision-making If you can t block, log/alert and educate end user on appropriate use Evolve with threats: Reduce adversaries operating surface 19

Cyber Risk Analysis: Threat Modeling Requirements Level of knowledge required Ability, Expertise Proximity required Access required Resources required Time required Threat Vector Threat Source Insider Hacktivists Motivated Hobbyist Corporate Espionage Cybercriminals Nation State Motivations Money Ideology Coercion Ego Copy, Exfiltrate Modify, Corrupt Destroy, Denial of Service Target Data (DAR, DIM, DIU) Code/Software Services Databases Operating Systems Networks/Infrastructure Platforms/Hardware/Firmware Risk can be mitigated; threat landscape remains unchanged.

Risk Scoring Impact Magnitude Scope Likelihood Event Probability Risk Score Magnitude Cost Reputation Injury Scope Localized Widespread Mitigating Controls Sophistication of Attack Access Motivation of Attacker

Develop Prioritized Mitigation Strategy Based on Greatest Threat

Security Controls Policies, Awareness, Processes, SLA, Contracts Find enabling technologies: mature, interoperable, extensible, offering finegrained rules. - Device-Centric: EPP, Client DLP, Mobile Proxy, DRM, MDM, Advanced Threat Detection/Mitigation, VDI, Patch Mgmt, Group Policy, Software Inventory, - Network-Centric: Segmentation, Network Knowledge, Non-Compliant VLANs, Network/Cloud Content Mgmt (AV, DLP), FW, Proxies, APT Detection, IDS/IPS, SIEM, Threat Intelligence, Rogue Detection, Next Gen Network, Fraud Detection, Vuln Mgmt, Network Forensics, Authentication, Federation - Data-Centric: Classification Policy, Awareness, Discovery, DRM, DLP

Apply Security Rules Based on Risk Scoring Asset Role Location /Time/Cou ntry of Origin Access Method Data & Class Service -Copy -Modify -Transmit -Process/View -Support User Access Action Security controls are applied to mitigate risk, based on a number of factors. Develop solutions with technology that makes intelligent decisions at boundaries and automates actions (when possible), to ensure policy compliance.

This is an ineffective security control

Layered Security Controls

IP Data and Context Centric Security Use cases help identify risk and select security controls/rules to mitigate risk (DLP example)

Reduce the Noise to Detect Minimize Dwell Time Intelligence and Sharing Monitoring of Key Data Enhanced Monitoring Increase the Difficulty of Compromise Secure By Design Approach Internal Compliance Improved Access Controls Continuous Testing and Improvement

What should be our focus? STRATEGY Making the Move from Reactive Strategy to Fully Integrated Strategy Aligned with Your Business Strategy RISK Vulnerability X Threats X Assets ASSETS Data Protection Data Analytics Insider Threats Mergers and Acquisitions

Kill Chain Mapping and Threat Modeling RECON LURE REDIRECT EXPLOIT KIT DROPPER FILE CALL HOME DATA THEFT

Security Capability Maturity Model As the security program matures, more fundamental pieces will be in place to support advanced toolsets and capabilities necessary to protect against more advanced threats and respond faster to attacks Informal 1 Planned & Tracked 2 Well Defined 3 Quantitatively Controlled Improved ability to anticipate, execute & respond 4 Continuously Improving 5

Data Protection on Endpoint Email Threats (Defenses) Malware (Anti-Malware) Spam/Phishing (Adv Threat Protection) Data Loss (DLP, Encryption) Legal (ediscovery, Legal Hold) Application Threats (Defenses) Inappropriate Access (Access Controls) Attacks (Adv Threat Protection, Harden Server, Patch Mgmt, Pen Testing, EPP, Application Security Framework, Fraud Detection, WAF, Code Signing, PKI, Web Auth, ADFS) Data Loss (Data Classification, DRM, DLP, Storage Backups, Threats Encryption) (Defenses) Malware (AV) Inappropriate Access (Access Controls, DRM) Data Loss & Exposure (DRM, DLP, Ent File Sync, Secure File Transfer, Encryption, Backups) Web Threats (Defenses) Malware (Anti-Malware) Malicious Sites (Proxy Blocking) Data Loss (DLP) Adv Threats (Adv Threat Protection) Policy Abuse (Packet Inspection) Endpoint Threats (Defenses) Malware & Exploits (Software Inventory, EPP, Apex, Patch Mgmt) Data Loss (DRM, DLP, Encryption, Backups, Forensics) Attacks (HIPS, Adv Threat Protection, Software Firewall, Patch Mgmt) Network Threats (Defenses) Waterhole (GPO, VPN) Hacking (Firewall, Rogue Detection) Advanced Threats (Edge Devices, IDS, Anomaly Detection, DDoS Mitigation) Data Loss (Access Controls, NGN, Non-Compliant VLANs) General Remote Defenses Access (VDI, VPN, Citrix, OTP) Policies & Standards Monitor & IR (SIEM, logs) Audit & Assessments Training & Awareness

Data Protection on Mobile Device Email Threats (Defenses) Malware (Anti-Malware) Spam/Phishing (Adv Threat Protection) Data Loss (DLP, Encryption) Legal (ediscovery, Legal Hold) Application Threats (Defenses) Inappropriate Access (Access Controls) Attacks (Adv Threat Protection, Harden Server, Patch Mgmt, Pen Testing, EPP, Application Security Framework, Fraud Detection, WAF, Code Signing, PKI, Web Auth, ADFS, Sandbox Apps) Data Loss (Data Classification, DRM, DLP, Backups, Encryption) Storage Threats (Defenses) Malware (AV) Inappropriate Access (Access Controls, DRM) Data Loss & Exposure (DRM, DLP, Ent File Sync, Secure File Transfer, Encryption, Backups) Web Threats (Defenses) Malware (Anti-Malware) Malicious Sites (Proxy Blocking) Data Loss (DLP) Adv Threats (Adv Threat Protection) Endpoint Threats (Defenses) Policy Abuse (Packet Inspection) Malware & Exploits (Software Inventory, EPP, Patch Mgmt) Data Loss (DRM, DLP, Encryption, Backups, Forensics, MDM) Attacks (Adv Threat Protection, Patch Mgmt, Network Security Threats Policy) (Defenses) Waterhole (GPO, VPN, EODINET) Hacking (Firewall, Rogue Detection) Advanced Threats (Edge Devices, IDS, Anomaly Detection, DDoS Mitigation) Data Loss (Access Controls, NGN, Non-Compliant VLANs) General Remote Defenses Access (VDI, VPN, Citrix, OTP) Policies & Standards Monitor & IR (SIEM, logs) Audit & Assessments Training & Awareness

Data Protection for Suppliers Supplier Attributes Role? Location? Country? HR Classification? IP Classification? Asset? Email Threats (Defenses) Malware (Anti-Malware) Spam/Phishing (Adv Threat Protection) Data Loss (DLP, Encryption) Legal (ediscovery, Legal Hold) Web Threats (Defenses) Malware (Anti-Malware) Malicious Sites (Proxy Blocking) Data Loss (DLP) Adv Threats (Adv Threat Protection) Policy Abuse (Packet Inspection) Authentication (ADFS, Web Auth, OTP) Intellectual Property Threats (Defenses) Malware & Exploits (Apex) Data Loss (DRM, DLP, Encryption, User Monitoring, Logging, Deere Campus) Attacks (IDS, Firewall Rules, TPAM, Security Policy, NGN, Contractor Build) Remote Access (VDI, VPN, Citrix, OTP) Inappropriate Access (Access Controls, EDAC, Fraud Detection, OTP, IPP-SC) Contractual (BPT, SLA, MA) General Defenses Policies & Standards Monitor & IR (SIEM, logs) Audit & Assessments Training & Awareness

Behavior Analytics Risk Intelligence Next Generation Data Protection System 360 degree view of Data and Threats Threat Focused User Focused Data Focused IPS / Firewall Privileged Account Monitoring Email DLP Proxy Authentication Web DLP Anti Malware Access Endpoint DLP SIEM DRM

The Relative Value of Information

Take Aways The data-centric model is crucial, because the risk associated with cloud, mobile, social, data is much less when the data (information) is managed well, or kept out of those zones. In order to enable the business, you sometimes need to accept equivalent services (w/sla) from vendors. It is important to seek integration and synergy between products and across boundary layers Consumerization is a wave that we cannot stop, and we can surf it or drown. We need to partner with the business to develop reasonable solutions, focusing on the greatest risk/value, and that means architecting flexible solutions that draw upon security controls across all layers. 38

Questions?