Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Similar documents
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Advanced Threat Protection with Dell SecureWorks Security Services

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

2012 Bit9 Cyber Security Research Report

BlackRidge Technology Transport Access Control: Overview

Defending Against Cyber Attacks with SessionLevel Network Security

Combating a new generation of cybercriminal with in-depth security monitoring

CYBER SECURITY INFORMATION SHARING & COLLABORATION

Covert Operations: Kill Chain Actions using Security Analytics

SPEAR PHISHING AN ENTRY POINT FOR APTS

Content Security: Protect Your Network with Five Must-Haves

Defending Against Data Beaches: Internal Controls for Cybersecurity

Getting real about cyber threats: where are you headed?

Perspectives on Cybersecurity in Healthcare June 2015

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Advanced Threats: The New World Order

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Incident Response. Six Best Practices for Managing Cyber Breaches.

September 20, 2013 Senior IT Examiner Gene Lilienthal

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

The Next Generation Security Operations Center

CyberArk Privileged Threat Analytics. Solution Brief

Security Controls Implementation Plan

External Supplier Control Requirements

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

By John Pirc. THREAT DETECTION HAS moved beyond signature-based firewalls EDITOR S DESK SECURITY 7 AWARD WINNERS ENHANCED THREAT DETECTION

After the Attack. The Transformation of EMC Security Operations

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Cyber Information-Sharing Models: An Overview

Data Breach Lessons Learned. June 11, 2015

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Unknown threats in Sweden. Study publication August 27, 2014

Rich Baich Principal March 22, 2012

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

Marble & MobileIron Mobile App Risk Mitigation

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

Cyber Security. Moderator: Marla J. Kreindler, Partner, Morgan, Lewis & Bockius LLP

Fighting Advanced Threats

Security Intelligence. Information Sharing Strategies Using Trusted Collaboration

Cybersecurity: Mission integration to protect your assets

The Hillstone and Trend Micro Joint Solution

DoD Strategy for Defending Networks, Systems, and Data

MarketsandMarkets. Publisher Sample

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Cisco RSA Announcement Update

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Cyber Security Metrics Dashboards & Analytics

Reduce Your Network's Attack Surface

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

Endpoint Threat Detection without the Pain

The Mile High Denver Chapter of ARMA welcomes you to our virtual meeting!

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Security and Privacy

A New Approach to Assessing Advanced Threat Solutions

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Carbon Black and Palo Alto Networks

The Four-Step Guide to Understanding Cyber Risk

FireEye Advanced Threat Report 1H 2012

Modular Network Security. Tyler Carter, McAfee Network Security

How To Protect Yourself From A Dos/Ddos Attack

Big Data Analytics in Network Security: Computational Automation of Security Professionals

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

AB 1149 Compliance: Data Security Best Practices

Reinventing Network Security Vectra s cyber-security thinking machine delivers a new experience in network security

I N T E L L I G E N C E A S S E S S M E N T

Anti-exploit tools: The next wave of enterprise security

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Bio-inspired cyber security for your enterprise

Hunting for the Undefined Threat: Advanced Analytics & Visualization

Single-Vendor Security Ecosystems Offer Concrete Benefits Over Point Solutions

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

Protecting Your Organisation from Targeted Cyber Intrusion

Payment Card Industry Data Security Standard

PENETRATION TESTING GUIDE. 1

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

KEY STEPS FOLLOWING A DATA BREACH

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Agenda , Palo Alto Networks. Confidential and Proprietary.

Information Protection in Today s Changing Mobile and Cloud Environments

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

ITAR Compliance Best Practices Guide

Analyzing HTTP/HTTPS Traffic Logs

Angel Investing in Cybersecurity: Understanding the Technology

Cyber Situational Awareness for Enterprise Security

Incident Response. Proactive Incident Management. Sean Curran Director

Network Security Redefined Vectra s cybersecurity thinking machine detects and anticipates attacks in real time

Italy. EY s Global Information Security Survey 2013

Effective Threat Management. Building a complete lifecycle to manage enterprise threats.

REPORT FIREEYE ADVANCED THREAT REPORT 1H 2012 SECURITY REIMAGINED

Unified Security, ATP and more

Transcription:

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013

Today s Presentation 1) Overview of Cyber Threats 2) Current Approach to Cyber Risk Management 3) Challenges with the Current Approach 4) The Role of Threat Intelligence 5) Countering Advanced Adversaries 1

Cyber Threats Who is trying to take us down today? Where Is The Adversary? China (Asia Pacific)* Russia (Eastern Europe)* Middle East* What Do They Want? Specific Sectors Healthcare, Pharmaceuticals, Financial Services, & Defense Specific Information Personal Identifiable Information (PII), Account Numbers, Intellectual Property, & Financial Reports, Specific People Executives, Senior Leadership, Legal Departments, Human Resources, Researchers, & Executive Assistants High-Level Methodology Obtain Information From Public Facing Sites and Documents Leverage Social Engineering and Spear-Phishing Tactics Establish Strong Foothold Through Multiple Backdoors Slow Exfiltration Of Data From Your Network To Theirs Remain Persistent and Anonymous Throughout the Process Nation State Funded Highly Motivated Target Aware Sophisticated Adversaries Very Competent Highly Organized *Note: Not an exhaustive list of adversaries, but rather where most attacks originate from according to industry reports 2

The rise of compromise from insiders who conduct data breaches and create even greater liability for an enterprise The Insider Threat No. of Financial Institutions Reporting Repeated Occurrences of Internal Data Breaches in Last 12 Months 1 Accidental Malicious Software Malicious Insider Financial Fraud Internal Breach Non-Employee Third Party Vendor Mobile Case Study: Julian Assange s WikiLeaks is an enabler for insiders to anonymously expose your firm s most sensitive intellectual capital, trade secrets, and proprietary & confidential data Ex: Bank of America, US State Dept. (Diplomatic Cables) 33% of 900 data breaches in a six-year study were in the financial services industry; the industry also accounted for a staggering 94% of compromised records 2 Only 34% of survey respondents said they were very confident about being protected against internal attacks 1 3

The current approach to addressing advanced threats is failing over and over and over and over! Advanced Threats Information Leakage Social Media / Insider Attacks Social Engineering & Spear Phishing Software-based Advanced Persistent Threats (APTs) Advanced Hardware Attacks Common Countermeasures Network Restrictions; Security Policies; and Data Loss Prevention (DLP) E-Mail Filters; User Awareness Training Network and System Monitoring; Network Segregation Network Monitoring, Drive Encryption, and Physical Controls Challenges Insiders Seem to Always Find a Way! Well-Executed Attacks Yield a 90% Kill Ratio High Degree of Difficulty and Expensive; Users Go Rogue State-Sponsored Attacks can be Extremely Skilled 4

Heavy investments in traditional countermeasures have helped, but fail to address advanced threats Anti-Virus Intrusion Prevention / Detection Traditional / Common Defenses Information Data Repositories Boundary Defenses DLP & User Training Issues Anti-Virus: - Signatures Detect Only 25% of Advanced Malware - Adversary Uses Encryption and Obfuscation - Utilization of Unknown Vulnerabilities (Zero Day) Intrusion Prevention / Detection: - Skilled Attackers Evade Signature and Detection - Traffic and Tools Are Often Encrypted - Lateral Attacks Evade Detection Firewalls & Filters: - Destination IP Addresses Change - Use Common Ports Such As 80 and 443 - Content Appears to Be Legitimate - Source Addresses Changes Frequently DLP & User Training - Requires Strict Data Classification & Categorization - Rogue Users and Malicious Insiders 5

Case Study: Advanced Hardware Attack Background Multiple executives were travelling overseas in support of a key technology conference Ten brought along laptop computers for day to day use during the conference Laptops were secured in hotel room safes while not in use (according to the users) Full drive encryption was used to protect data at rest on all laptops VPN protected all communications to/from cooperate assets Challenge / Compromise Upon returning to the US and connecting the corporate networks anomalous network traffic was observed from 2 laptops Analysis revealed encrypted/encoded communications with servers overseas Suspected systems were quarantined and examined Network drivers had been modified 6 laptop computers have been physically tampered with and unknown ICs were installed Lessons Learned Laptop computers can be compromised even with full drive encryption enabled Do not permit laptops with sensitive data to be taken overseas Quarantine and examine laptops returning from overseas trips It is impossible to restrict/control all laptops controls must be targeted to high risk assets 6

Case Study: Imminent Insider Attacks Background Recent data breach and subsequent exposure led to recruitment drive of insiders at a Fortune 100 client Public statements indicated an imminent data leakage event Public statements indicated one or more well positioned insiders as sources for leaked data Challenge / Compromise Unknown attack vectors could be used for data exfiltration Serious challenges in identifying top executives and staff with data access Massive enterprise footprint to defend with hundreds of network ingress/egress points Large number of personnel and staff No operational knowledge of the adversary Lessons Learned It is imperative to know where you sensitive data is, and who can access it Highly enhanced security controls fail across an entire enterprise too expensive! A detailed understanding of the adversary enabled real-time security control enhancements Identifying the individual adversary allowed for targeted legal action 7

Case Study: Imminent DDoS Attacks Background A major client was under near term threat of a massive DDoS attack Unknown group of adversaries Unknown Tactics, Techniques and Procedures (TTPs) for attack Unknown attack history / understanding of previous events Challenge / Compromise Amorphous community of loosely-banded threat actors and hacktivists targeting network infrastructure Massive client organization offered wide-spread attack surface to would-be attackers Disruption of client systems would result in significant nation-level transportation interruptions Lessons Learned Identifying TTPs in advance of an attack makes responding much easier Early engagement with service providers and infrastructure staff enables a rapid response Advanced warning of attacks with details on likely TTPs enables proactive action Addressing the challenge proactively eliminated any significant impacts 8

What does Threat Intelligence really mean? A dedicated program focused on collecting data on current and emerging adversaries - Know your enemy! Often leverages data source both internal and external to the organization Enables a dynamic approach to cyber security risk management Limits heavy investments to the highest risk areas 9

The Case for Threat Intelligence & Understanding Your Enemy 10 Remediating the risks posed by advanced adversaries across a huge enterprise is cost prohibitive - Protecting ALL of your data = impossible - Monitoring ALL of your people = impossible Enhanced controls must be selectively applied based upon detailed knowledge of current/emerging threats Building a threat intelligence program is extremely challenging - Still viewed as a technology problem with the inevitable quest for a silver bullet solution - Requires a heavy mix of people skills Intel analysts are not easy to come by! - Mandates a different approach, one encompassing people, process, and technology all working together

Threat Intelligence Success Criteria A risk aligned program that is right-sized for your organization - No one-size-fits all solutions - Focuses on threats that are currently impacting your sector/organization or will in the near/mid future Compliments a mature risk management and security program Program produces actionable outputs and reports - An information/awareness based program is interesting, but of little practical value - Does your organization make positive changes based upon threat intel and reports? 11

Threat Intelligence Major Program Components Collection Mix of internal and external data feeds Data vetting and storage Production Wargaming & Exercises Define consumer requirements Aggregation Analysis Evaluate risk posture vs. threats Assess impacts with threat informed wargames / exercises Stakeholder Communications Disseminate intelligence reports Engage with customers to monitor requirements 12

Threat Intelligence A Suggested Approach Blueprint Your Program Roles & Requirements Training & Development Insourced vs. Outsourced Links to internal and external data People, Process and Technology People are the key to success Define appropriate roles and responsibilities Develop the right skills Attract the right staff Work more efficiently 13

Threat Intelligence How to Begin or Evolve? Evaluate your current program or your current needs - How do you compare to an industry leading threat intelligence program? - How actionable and relevant are your threat reports? - Is your data safer today because of your current program? Design a right-sized program - May be a mix of in/outsourced services - Consider developing a holistic program blueprint laying out the people, process, and technology layers to the solution Focus on people skills - The skill of your intelligence analysts will make or break your program - Focus on a mix of skills ranging from pure data analytics to cyber technical skills and all points between 14

Questions & Contact Information What did we NOT talk about? Questions? Comments? War Stories? Jeff Lunglhofer Principal Booz Allen Hamilton Booz Allen Hamilton, Inc. 13200 Woodland Park Rd Herndon, VA 20171 Tel (619) 721-3114 Lunglhofer_Jeff@bah.com 15