Data Breaches, Data Leaks, Web Defacements: why secure coding is important.

Similar documents
Security issues in M2M envinronments when dealing with encrypted communication channels (such as SSH) Raoul Chiesa President, Security Brokers

Intro The Speaker. Raoul Chiesa

Managing Security of the Grid in the Cloud

Proactive Security: what I learned over the last 20 years

Information Security Services

Nine Cyber Security Trends for 2016

Cyber Terrorism: wrong assumptions & true facts + what I hope will never happen. Raoul «Nobody» Chiesa President, Security Brokers

/ BROCHURE / CHECKLIST: PCI/ISO COMPLIANCE. By Melbourne IT Enterprise Services

Unit 3 Cyber security

Overview TECHIS Carry out security testing activities

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

stéphane koch internet & information strategy advisor online reputation management

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

IT AUDIT WHO WE ARE. Current Trends and Top Risks of /9/2015. Eric Vyverberg. Randy Armknecht. David Kupinski

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Cybersecurity Strategic Consulting

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

RETHINKING CYBER SECURITY Changing the Business Conversation

PwC s Advanced Threat and Vulnerability Management Services

Bad Romance: Three Reasons Hackers <3 Your Web Apps & How to Break Them Up

Microsoft s cybersecurity commitment

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Cybersecurity in SMEs: Evaluating the Risks and Possible Solutions. BANCHE E SICUREZZA 2015 Rome, Italy 5 June 2015 Arthur Brocato, UNICRI

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

Cybersecurity: Protecting Your Business. March 11, 2015

September 20, 2013 Senior IT Examiner Gene Lilienthal

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Information Security Summit 2005

Cyber Security Trends Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK

Vulnerability Assessment and Penetration Testing Across the Enterprise:

Vulnerability Assessment & Compliance

THE WORLD IS MOVING FAST, SECURITY FASTER.

Corporate Security in 2016.

Legislative Council Panel on Information Technology and Broadcasting. Information Security

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

Cybercrime: risks, penalties and prevention

CYBER SECURITY SERVICES PWNED

Security in the Cloud an end to end Problem

CONNECTING WITH CONFIDENCE: OPTIMISING AUSTRALIA S DIGITAL FUTURE. AIIA Response

Building a Comprehensive Mobile Security Strategy

IBM Penetration Testing Services

Certified Cyber Security Analyst VS-1160

Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

NZI LIABILITY CYBER. Are you protected?

Research Topics in the National Cyber Security Research Agenda

Intothe Eyeof the Twister 19 Oct2012

ERM Symposium April Moderator Nancy Bennett

CYBER SECURITY TRAINING SAFE AND SECURE

Who s Doing the Hacking?

Penetration Testing //Vulnerability Assessment //Remedy

Advanced Persistent. From FUD to Facts. A Websense Brief By Patrick Murray, Senior Director of Product Management

MAXIMIZING THE VALUE OF YOUR NETWORK PENETRATION TESTS. Jay Ferron. CEHi, CISSP, CHFIi, C)PTEi, CRISC, CVEi, MCITP, MCSE, MCT, MVP, NSA-IAM

Into the cybersecurity breach

National Railroad Passenger Corp. (AMTRAK) Session 1 Threats and Constraints. Continuous. - Continuous Monitoring. - Continuous Assessment

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Security Services. 30 years of experience in IT business

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Man, Machine and DDoS Mitigation

Protecting your business interests through intelligent IT security services, consultancy and training

Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform

Qatar Computer Emergency Team

As global mobile internet penetration increases the cybercrime and cyberterrorism vector is extended

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

Statement of Qualifications Cybercrime & data breach

Service and anonymisation.

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

MOST FRAUD CASES INVOLVE SENIOR MANAGEMENT. HOW TO PREVENT THEM FROM MISUSING THEIR POWER?

MINIMIZING CYBER-SECURITY EXPOSURE BEFORE, DURING & AFTER AN EMERGENCY

Four Top Emagined Security Services

How Security Testing can ensure Your Mobile Application Security. Yohannes, CEHv8, ECSAv8, ISE, OSCP(PWK) Information Security Consultant

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

Cyber Security. A professional qualification awarded in association with University of Manchester Business School

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Managed Security Services

DOWNTIME BREACHES DATA LOSS. SYMANTEC TECHNICAL SERVICES HELP YOU AVOID THEM.

Securing Internet Payments across Europe. Guidelines for Detecting and Preventing Fraud

Security solutions White paper. Acquire a global view of your organization s security state: the importance of security assessments.

State of Security Monitoring of Public Cloud

IoT & SCADA Cyber Security Services

Cyber Security: Threat & The Maritime Environment Cyber Security: now byting the maritime industry

Impact of Cybersecurity Innovations in Key Sectors (Technical Insights)

Cyber Risk Management

Building Tomorrow s Sales Force

ESKISP Conduct security testing, under supervision

Teradata and Protegrity High-Value Protection for High-Value Data

Incident Response. Six Best Practices for Managing Cyber Breaches.

Ongoing N/A TBC. Baseline

Scott Lucas: I m Scott Lucas. I m the Director of Product Marketing for the Branch Solutions Business Unit.

Website Security: A good practice guide

3 Marketing Security Risks. How to combat the threats to the security of your Marketing Database

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Cybersecurity The role of Internal Audit

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

A REPORT ON WORKPLACE SECURITY

$194 per record lost* 3/15/2013. Global Economic Crime Survey. Data Breach Costs. David Childers, CEO Compli Vivek Krishnamurthy, Foley Hoag LLP

Audit Capabilities: Beyond the Checklist. Niall Haddow, Business Leader Philip Young, Sr. IT Auditor Professional Strategies - Session S32

AB 1149 Compliance: Data Security Best Practices

Transcription:

Data Breaches, Data Leaks, Web Defacements: why secure coding is important. Raoul «Nobody» Chiesa Founder, President, Security Brokers

The speaker President, Founder, The Security Brokers Principal, CyberDefcon Ltd. Independent Special Senior Advisor on Cybercrime @ UNICRI (United Nations Interregional Crime & Justice Research Institute) Former PSG Member, ENISA (Permanent Stakeholders Group @ European Union Network & Information Security Agency) Founder, @ CLUSIT (Italian Information Security Association) Steering Committee, AIP/OPSI, Privacy & Security Observatory Board of Directors, ISECOM Board of Directors, OWASP Italian Chapter Cultural Attachè. Scientific Committee, APWG European Chapter Supporter at various security communities

The company We deal with extremely interesting, niche topics, giving our strong know-hows gained from +20 years of field experience and from our +30 experts, very well known all over the world in the Information Security and Cyber Intelligence markets. Our Key Areas of services can be resumed as: Vertical Professional Security Trainings & Coaching Proactive Security With a deep specialization on TLC & Mobile, SCADA & IA, Space & Air, e-health, [ ] Post-Incident Cyber Security Strategic Consulting (Technical, Legal, Compliance, PR, Strategy) On-demand «Ninja Teams» Psychological, Social and Behavioural aspects (applied to cyber environments) Cybercrime Intelligence Botnet takeovers, takedowns, Cybercriminals bounting, Cyber Intelligence Reports, Technical & Operational support towards CERTs and LEAs/LEOs,[ ] Information Warfare & Cyber War (only for MoDs) 0-day and Exploits Digital Weapons

Abstract This presentation will provide a "big picture" towards those main threats linked with information theft and leaks, and web defacements, along with those consequent impacts on organizations. The second part of the talk will focus on the importance of the so-called "Secure Programming" and on those average mistakes that pop up when running security testings and advanced Penetration Testing activities towards web applications.

What Do They Have In Common?

They All Did Not Even Had a Clue What Hit Them

Despite Having Spent Millions on All The Best Security Products, Software & Consultants

Why Not?

Because They Didn t Know What They Didn t Know

Because a Hacker only needs to Detect a Single Weak Spot where to stick the needle in. Hackers Prefer Needling!! Where on The Other Hand, You Need to Be Aware of EVERY New Spot a Hacker May possibly Stick A Needle ANYWHERE in YOUR Organisation ANYTIME. And You Need that Knowledge 24x7, With as Much Time as Possible to Take Preventive Action. BEFORE you get hit!!

«Houston, we ve got a problem» The rest of the organization I.T. Department

Know Your Attack Surface and be Timely Alerted on Relevant Threats and Risks, Well Ahead of a Possible Attack

Data Breach

Ops it wasn t complete!

Ops it wasn t complete!

Ops it wasn t complete!

Our analysis The «world s biggest data breaches» have been that many, since 2004 till today, they can t even fit on a single page Further details here:: http://www.informationisbeautiful.net/visualizations/worlds-biggest-databreaches-hacks/ We re speaking about a endless escalation No one is excluded from this. Not anymore Also, we depend too much on M2M Information = Power. Which can be transformed in money, very quickly The damage caused by such breaches is often difficult to calculate Operative, Business, Image, Economical damages (money refundings to Customers, fines from Authorities).

M2M, Cloud and «automatic» connections 83% of Data Center traffic is M2M Cloud services bring more M2M automation

Our analysis /2 Along with my team we analyzied all of these data breaches. Key drivers to the success of the attackers can be resumed as Lack of professionally-run Security Testings (penetration test, ethical hacking, compliance check). Lack of segregation on internal networks. Missing for a correct, centralized management of SSH keys, both external and internal ones. Missing of tools for Data Leak Prevention (DLP) on encrypted connections (SSH tunnels). Missing of the right sources for Cyber Intelligence. Lack of internal awareness. Lack or total miss of tools, methodolgoies and trainings on Digital Forensics. POOR PROGRAMMING / Lack of Secure Coding

Mistakes when writing code

Mistakes when writing code

Mistakes when writing code

Mistakes when writing code

Mistakes when writing code

Conclusions This presentation focused on different mistakes which are made by organizations from all over the world, no matter their size and maturity into Information Security. While different approaches and the use of different solutions clearly depends on available resources (budgets, amount of IT staff, seniority and skills of system administrators and programmers), we think that everything should start from tasks which are very easy to deploy inside all of the organizations: internal awareness, and training towards your employees and colleagues. It is a process which helps out IT and InfoSec people raising the understanding of their everyday activities towards the management, and those colleagues from different departments, in order to pursue altogether a shared goal: the information security of your Organization. Last but not least, we have seen how much the lack of secure programming, and Secure SLDC, may dramatically impact on the overall security of our organizations, providing the right back entrance for attackers, and enemies.

References World s biggest data breach : http://www.informationisbeautiful.net/visualizations/worldsbiggest-data-breaches-hacks/ Australian Signals Directorate Strategies to Mitigate Targeted Cyber Intrusions : http://www.asd.gov.au/infosec/top-mitigations/mitigations- 2014-table.htm Open-source based Cyber Intelligence portal: https://brica.de/ Slow loris DoS: http://it.wikipedia.org/wiki/slowloris

Contacts, Q&A Need anything, got doubts, wanna ask me smth? rc [at] security-brokers [dot] com Pub key: http://www.security-brokers.com/keys/rc_pub.asc Thanks for your attention! QUESTIONS?