The Human Firewall How Security Awareness Impacts Your Control Environment



Similar documents
Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

INTRODUCTION TO NETWORK SECURITY. Nischit Vaidya, CISSP Instructor

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments

2011 Forrester Research, Inc. Reproduction Prohibited

Cyber Security Management

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

The Value of Automated Penetration Testing White Paper

SECURITY CONSIDERATIONS FOR LAW FIRMS

Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Technical Testing. Network Testing DATA SHEET

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Using Risk Modeling & Attack Simulation for Proactive Cyber Security Predictive Solutions for Effective Security Risk Management

13 Ways Through A Firewall What you don t know will hurt you

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Integrated Threat & Security Management.

Threat Intelligence Pty Ltd Specialist Security Training Catalogue

10 Smart Ideas for. Keeping Data Safe. From Hackers

Ernie Hayden CISSP CEH Executive Consultant

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Why The Security You Bought Yesterday, Won t Save You Today

Basic Security Considerations for and Web Browsing

OPC & Security Agenda

Is security awareness a waste of time?

Mohamed ElHarras CIIP Strategies and Policies Executive Director

developing your potential Cyber Security Training

September 20, 2013 Senior IT Examiner Gene Lilienthal

Office of Inspector General

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

FERPA: Data & Transport Security Best Practices

AppGuard. Defeats Malware

APT Advanced Persistent Threat Time to rethink?

FIVE PRACTICAL STEPS

FedVTE Training Catalog SPRING advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Your security is our priority

I ve been breached! Now what?

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

Cyber-Security Risk in the Global Organization:

Information Blue Valley Schools FEBRUARY 2015

CYBER SECURITY, A GROWING CIO PRIORITY

Evolution Of Cyber Threats & Defense Approaches

Cybersecurity: What CFO s Need to Know

CYBER SECURITY: A REPORT FROM THE TRENCHES 2015 AGC NATIONAL & CHAPTER LEADERSHIP CONFERENCE MIKE.ZUSMAN@CARVESYSTEMS.COM

THE HUMAN COMPONENT OF CYBER SECURITY

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Training Employees to Recognise & Avoid Advanced Threats

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Security on Embedded Systems

Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.

Presented by Frederick J. Santarsiere

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Defending Against Data Beaches: Internal Controls for Cybersecurity

Application Security in the Software Development Lifecycle

An Analysis of the Capabilities Of Cybersecurity Defense

13 Ways Through A Firewall

Spyware. Michael Glenn Technology Management 2004 Qwest Communications International Inc.

FedVTE Training Catalog SUMMER advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Best Practices for a BYOD World

Course Title: Penetration Testing: Network & Perimeter Testing

<Insert Picture Here> How to protect sensitive data, challenges & risks

Cybersecurity Awareness for Executives

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Thomas J. Schlagel Chief Information Officer, BNL

How to Spot and Combat a Phishing Attack Webinar

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Metasploit The Elixir of Network Security

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Making Database Security an IT Security Priority

Web Security School Final Exam

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

Jumpstarting Your Security Awareness Program

Is Penetration Testing recommended for Industrial Control Systems?

TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

They Did What?!? How Your End Users Are Putting You At Risk

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics

Cyber Self Assessment

Secure by design: taking a strategic approach to cybersecurity

Cyber Security R&D (NE-1) and (NEET-4)

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

Transcription:

The Human Firewall How Security Awareness Impacts Your Control Environment Dane Boyd, Security Awareness Training Principal Consultant John Andrew, IT Security Auditor Dell

Agenda Introduction In The News Red Team Stories Defining the Problem Winning Awareness Strategies Winning Awareness Tactics Q&A 2 Classification: //Dell /Confidential - Limited External Distribution:

Introduction Dane Boyd, Security Awareness Training Principal Consultant - Awareness Com Leader CISO - Led DSWx Awareness practice for 5 years - Fun facts: (From, Speak, Hobby) John Andrew, CISA, CISSP, GLEG - IT Security Auditor dotted line to CISO - Over 20 Years IT, IT Audit, and IT Security experience - Fun facts: (From, Speak, Hobby) 3 Classification: //Dell /Confidential - Limited External Distribution:

Disclaimer Rules of the Road This presentation is prepared solely for educational purposes. Our goal is to engage IT Auditors in Security Awareness efforts. Much of what we will share is based on our personal experience. Take what benefits you forget the rest. Questions are welcome! Please wait until transition points. 4 Classification: //Dell /Confidential - Limited External Distribution:

In The News Wired writer Andy Greenberg reports on Jeep Cherokee exploit All of this is possible only because Chrysler, like practically all carmakers, is doing its best to turn the modern automobile into a smartphone. Uconnect, an Internet-connected computer feature in hundreds of thousands of Fiat Chrysler cars, SUVs, and trucks, controls the vehicle s entertainment and navigation, enables phone calls, and even offers a Wi-Fi hot spot. 5 Classification: //Dell /Confidential - Limited External Distribution:

In The News Wall Street Journal Michael Hayden describing the OPM hack 21 MM Security Clearance Records compromised. 6 Classification: //Dell /Confidential - Limited External Distribution:

In The News 7 Classification: //Dell /Confidential - Limited External Distribution:

In The News Critical Infrastructure Survey Results 48% of IT Executives believe that it is likely that there will be an attack on critical infrastructure. When - in the next three years Impact resulting in loss of life 8 Classification: //Dell /Confidential - Limited External Distribution:

Red Team Stories Critical Infrastructure The ERIPP and SHODAN search engines can be easily used to find Internet facing ICS devices, thus identifying potential attack targets. These search engines are being actively used to identify and access control systems over the Internet. Combining these tools with easily obtainable exploitation tools, attackers can identify and access control systems with significantly less effort than ever before. 9 Classification: //Dell /Confidential - Limited External Distribution:

Red Team Stories Project Shine - Control Systems Found Include- Traffic light controls Traffic cameras Swimming Pool Acid Pump Hydroelectric plant Nuclear Power Plant Hotel Wine Cooler Hospital Heart Rate Monitor Home Security System Gondola Ride Car Wash 10 Source: http://money.cnn.com/2013/04/08/technology/security/shodan/index. html Classification: //Dell /Confidential - Limited External Distribution:

Red Team Stories DHS Public Private Partnership 2014 IC Analyst Private Sector Program Critical Manufacturing Findings Lack of Awareness and information sharing Interpretation of cyber threats and the cyber security posture differed significantly between management, engineering, audit, compliance, and IT security. Need for more training, education, and awareness across all Critical Sectors. 11 Classification: //Dell /Confidential - Limited External Distribution:

Information Security = Building a Castle 12 Classification: //Dell /Confidential - Limited External Distribution:

95% 95% of all attacks on enterprise networks are the result of successful spear phishing Source: Allan Paller, Director of Research - SANS Institute 13 Classification: //Dell /Confidential - Limited External Distribution:

Defense in Depth Firewall IDS/IPS Network Defense Layers Web Proxy Anti-Virus Endpoint Monitoring End-point Defenses User Key Terrain 14 Classification: //Dell /Confidential - Limited External Distribution:

Strategies for a Vigilant Employee Executive Support Vigilant Employee Inspect what you expect Proper Attention 15 Classification: //Dell /Confidential - Limited External Distribution:

Strategy: Inspect what you expect

Defense in Depth: A Closer Look Testing Only 60% User Key Terrain of organizations have a Security Awareness Program. 17 Source: PwC The Global State of Information Security Survey 2014 Classification: //Dell /Confidential - Limited External Distribution:

Testing Improves Learning The added effort required to recall the information makes learning stronger. Henry L. Roediger III, Washington University in St. Louis and a co-author of Make It Stick: The Science of Successful Learning. 18 Classification: //Dell /Confidential - Limited External Distribution:

Strategy: Executive Support 19 Classification: //Dell /Confidential - Limited External Distribution:

Reason #1: Employee Resentment This guy 20 Classification: //Dell /Confidential - Limited External Distribution:

Reason #2: Employees Understanding and her! 21 Classification: //Dell /Confidential - Limited External Distribution:

Reason #3: Executives are part of the problem 22 Classification: //Dell /Confidential - Limited External Distribution:

Whaling

The Whale Hunt Salary Previous jobs Donations 24 Classification: //Dell /Confidential - Limited External Distribution:

The Whale Hunt 25 Classification: //Dell /Confidential - Limited External Distribution:

The Whale Hunt Salary Previous jobs Donations Children s name Mother s death date 26 Classification: //Dell /Confidential - Limited External Distribution:

The Whale Hunt Salary Previous jobs Donations Children s name Mother s death date City & State 27 Classification: //Dell /Confidential - Limited External Distribution:

The Whale Hunt Salary Previous jobs Donations Children s name Mother s death date City & State Tax Record Home Address Aerial Photo of home 28 Classification: //Dell /Confidential - Limited External Distribution:

29 Classification: //Dell /Confidential - Limited External Distribution:

30 Classification: //Dell /Confidential - Limited External Distribution:

31 Classification: //Dell /Confidential - Limited External Distribution:

Strategy: Treat Awareness like a vulnerability 32 Classification: //Dell /Confidential - Limited External Distribution:

Proper Importance CVE-2014-7861 CVE-2014-6277 Employee ID 24355 In computer security, a vulnerability is a weakness which allows an attacker to reduce a system's information assurance. Vulnerability is the intersection of three elements: a system susceptibility or flaw, attacker access to the flaw, and attacker capability to exploit the flaw. Source: Wikipedia 33 Classification: //Dell /Confidential - Limited External Distribution:

Live Poll: How frequently are you patching the human firewall? New Employee Security Awareness Training? Annual Security Awareness Training? Periodic Security Awareness Newsletter? Phishing Assessments? Lunch & Learn? Other areas? 34 Classification: //Dell /Confidential - Limited External Distribution:

Tactics 35 Classification: //Dell /Confidential - Limited External Distribution:

Typical Security Awareness Program Tactics Once a year Too Long! Computer Expert Policy Acknowledgement Form? 36 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement Learn from Arnold Worked out twice a day Trained each muscle group 3x/week 26 61 sets per workout Tens of thousands of pounds SAT Tip: Frequency matters!!! 37 Classification: //Dell /Confidential - Limited External Distribution:

Pop quiz! Where am I from? 38 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement How often are you training your employees? 39 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement Who is this??? Edward Everett, 1794 1865 Spoke at Dedication of Soldier's National Cemetery Two hours long speech Who spoke after him? 40 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement Learn from Lincoln Gettysburg Address 272 words Two minutes SAT Tip: Shorter is better! Make it consumable! 41 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement How long are your training sessions? 42 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement SAT Tip: Understanding security is a skill. Communication is a separate skill! 43 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement Who here is a strong communicator? Who here is highly technical? 44 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement Learn from Coast Guard Continually adapted to smugglers methods: Cargo ships Fast Boats Submarines SAT Tip: Training must be specific to threats and adapt as threats change. Intel is key! 45 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement What threats do we see today? How do we adapt? 46 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement What threats do we see today? How do we adapt? 47 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement Learn from the US ARMY What is the number one principle in peacetime training? Replicate battlefield conditions SAT Tip: Include realistic simulations as tests 48 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement What are the battlefield conditions? How do you simulate these conditions? Phishing Vishing USB Drops Tail gating Bacon Confiscating sensitive info 49 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement Learn from Advertisers 1.2 billion media impressions Social Media Television Radio Signage 107% Increase in Sales SAT Tip: Consistent message & multiple mediums (Combined with frequency) to change behavior 50 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement What does reinforcement look like? Posters Newsletters Signage Reward Program Recognition Programs Secret Shopper Trivia 51 Classification: //Dell /Confidential - Limited External Distribution:

Frequency Duration Instructor Focus Testing Reinforcement Output 52 Case file: Arnold Classification: //Dell /Confidential - Limited External Distribution:

Results 53 Classification: //Dell /Confidential - Limited External Distribution:

Dell Managed Phishing Phishing Failure Rate 54 Classification: //Dell /Confidential - Limited External Distribution:

40% 55 Classification: //Dell /Confidential - Limited External Distribution:

Conclusion 56 Classification: //Dell /Confidential - Limited External Distribution:

Thank you!