Security Leadership: Preven4ng and Responding to Future Cyber A<acks. Mark Seward, Sr. Director, Security and Compliance

Similar documents
Big Data and Security: At the Edge of Prediction

Splunk and Big Data for Insider Threats

Using Big Data to Align IT Security with Business Risk Mark Seward, Senior Director, Security and Compliance

A Love Affair: Cyber Security, Big-data and Risk

Splunk for Networking and SDN

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Computer Security Incident Handling Detec6on and Analysis

Intro Fun. S#ck- figure strip humor sourced and courtesy of h8p://xkcd.com and is provided for informa#ve use only.

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

Sophos Ltd. All rights reserved.

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

Incident Response Using Splunk for State and Local Governments

Main Research Gaps in Cyber Security

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

HIPAA Basics. Health Insurance Portability and Accountability Act of 1996

Rogue Programs. Rogue Programs - Topics. Security in Compu4ng - Chapter 3. l Rogue programs can be classified by the way they propagate

NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age

Software that provides secure access to technology, everywhere.

PALO ALTO SAFE APPLICATION ENABLEMENT

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme

FTC Data Security Standard

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps

ITDays Security issues

Phone Systems Buyer s Guide

VoIP Security How to prevent eavesdropping on VoIP conversa8ons. Dmitry Dessiatnikov

Contact Center Rou,ng Strategies for Improving Customer Experience

Remote Monitoring of Enterprise Systems

Protecting the Infrastructure: Symantec Web Gateway

SANS Top 20 Critical Controls for Effective Cyber Defense

Compu4ng Privacy Requirements

Metric Matters. Dain Perkins, CISSP

Computer Networks. Examples of network applica3ons. Applica3on Layer

This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started.

Security & Threat Detection: Go Beyond Monitoring

Symantec Advanced Threat Protection: Network

The Elusive U,lity Customer: How Big Data & Analy,cs Connects U,li,es & Their Customers

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training

Gyrus: A Framework for User- Intent Monitoring of Text- Based Networked ApplicaAons

The Seven Habits of State-of-the-Art Mobile App Security

DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna

This is a picture of a kiqen

Network Security Monitoring: Looking Beyond the Network

Cloud Security Prac0ces and Principles

NETWORK DEVICE SECURITY AUDITING

/Endpoint Security and More Rondi Jamison

Covert Operations: Kill Chain Actions using Security Analytics

Concierge SIEM Reporting Overview

Discovering Threats by Monitoring Behaviors on Endpoints

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Wireless Statistics Recommendations

B2B Offerings. Helping businesses op2mize. Infolob s amazing b2b offerings helps your company achieve maximum produc2vity

Splunk: Using Big Data for Cybersecurity

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT

Keeping Pace with Big Data

Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology

configurability compares with typical SIEM & Log Management systems Able to install collectors on remote sites rather than pull all data

DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario

Getting Real with Policies for Software Defined Infrastructure. Manish Dave Principal Engineer, Intel IT

Firewalls and Classical Network Security

EITC Lessons Learned: Building Our Internal Security Intelligence Capability

configurability compares with typical Asset Monitoring systems Able to install collectors on remote sites rather than pull all data

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015

University of Utah WAN Firewall Presenta6on

Splunk Enterprise Log Management Role Supporting the ISO Framework EXECUTIVE BRIEF

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Active Response: Automated Risk Reduction or Manual Action?

Comprehensive Advanced Threat Defense

How to Use Splunk To Detect and Defeat Fraud, TheK And Abuse

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

ThreatSpike Dome: A New Approach To Security Monitoring

The webinar will begin shortly

Introduc)on to the IoT- A methodology

Information Security Services

Next Generation IPS and Reputation Services

REST (Representa.onal State Transfer) Ingegneria del So-ware e Lab. Università di Modena e Reggio Emilia Do<. Marzio Franzini

Scalable DDoS mitigation using BGP Flowspec

DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN

Unified Security Management and Open Threat Exchange

PCI VERSION 2.0 AND RISK MANAGEMENT. Doug Landoll, CISSP, CISA, QSA, MBA Practice Director Risk and Compliance Management

Breach Found. Did It Hurt?

DYNAMIC DNS: DATA EXFILTRATION

Gregg Gerber. Strategic Engagement, Emerging Markets

Centre for the Protection of National Infrastructure Effective Log Management

Practical Threat Intelligence. with Bromium LAVA

IBM QRadar Security Intelligence April 2013

SPEAR PHISHING UNDERSTANDING THE THREAT

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

Firewalls, Tunnels, and Network Intrusion Detection

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Applying Machine Learning to Network Security Monitoring. Alex Pinto Chief Data Scien2st

Transcription:

Security Leadership: Preven4ng and Responding to Future Cyber A<acks Mark Seward, Sr. Director, Security and Compliance

Agenda Why are a<acks successful? How does big data help Changing our thinking The advanced threat playbook Thinking security talking business risk Ques4ons

Advanced threats are hard to detect 100% Valid creden4als were used 40 Average # of systems accessed Source: Mandiant M- Trends Report 2012 and 2013 243 Median # of days before detec4on 63% Of vic4ms were no4fied by external en4ty 3

A<acker think A<ackers don t want to work too hard to get what they want. What s the easiest way to target the right people who have access (creden7als) to the stuff I can steal? Source: Mandiant M- Trends 2013 4

Why are a<acks successful - - Silos " Defenders are isolated focused on narrow defensive zones " Opponents are organized, persistent and crea4ve 5

Why are a<acks successful People They are the weak point in our cyber defense Vulnerable to trust issues Only takes one 4me (click) to be right Employee ac4vi4es once creden4aled are usually trusted Need a real- 4me big data approach to security and sta4s4cal analysis of the data 6

Why are a<acks successful Your Partners Monitoring the partner and service provider access is about what s normal and what s not Understand your partner s cyber posture and policy 7

Why are a<acks successful Data reduc4on Typical SIEM Architecture Data Reduc1on Model Have to know what you need for inves4ga4on before you need it Useful data can come from anywhere not just what s supported by the vendor Lack of scalability restricts visibility Creates vendor dependency (people forget how to wade into their data) The cold case problem 8

How much and what kinds of data do we need? 9

Telling your data security story The 5 Ws of Journalism The 5 Ws of Informa4on Security 10

Unstructured industrial control data: Key piece of your security story Security teams not focused on machine generated data Machines deliver goods or services Machines monitor product quality Machine health affects product/ service quality Industrial Control Systems support JiT supply chains Environmental control data Machine Generated Data 11

A constantly growing universe of security data Security Relevant Data Security Relevant Data (IT infrastructure logs / Physical Security / Communica4on systems logs / Applica4on data / non- tradi4onal data sources) SIEM Expanded context (more data) required for who, what, when, where, and why Limited to security point products. An incomplete story will olen tell you something happened Without enough context to get to Why. 12

Detec4ng the malicious insider requires context Time (When) Email (How) Proxy data Browsing History (What) Loca4on (Where) IP Address DHCP / DNS (Who) Date (When) Badge (Who) Supervisor (Why)

The False Promise of SIEM and Data Reduc4on 14

Security posture homogenized Data reduc4on and normaliza4on at collec4on 4me gives analysts a Skim Milk view of security posture The data fat can be relevant to an inves4ga4on All data is relevant for security 15

Moving to a data inclusion model Specific behavior based pa<ern modeling for humans and machines Based on combina4ons of: Loca4on Role Data/Asset type Data/Asset cri4cality Time of day Ac4on type Ac4on length of 4me No up front normaliza1on Time- indexed Data Analy1cs and Sta1s1cs Commands Correla1on PaIern Analysis Data Inclusion Model 16

Crea4ng a single data layer IT Opera4ons Business Intelligence Compliance & Audit Security Web Analy4cs 17

What s the playbook for advanced persistent a<ackers? 18

What is the Kill Chain? " Represents the typical phases of an advanced a<ack " What are the characteris4cs of an advanced threat or a<ack Stealth Stay resident as long as possible Collec4on of high value data Can be na4on state driven Malware acts as a proxy for the malicious insider Hacking the human trust The Kill- chain is a game film of typical adack ac7vi7es a list of things that almost always happen but maybe not in order. 19

Kill- chain idea origin " In military parlance, a Kill Chain is a phase- based model to describe the stages of an a<ack, which also helps inform ways to prevent such a<acks. These stages are referred to as: Find Fix Track Target Engage Assess The further towards the beginning of the Kill Chain an a<ack can be stopped, the be<er. 20

Kill- chain for cyber security as outlined by Miter A successful strategy requires analysis of the game film called the advanced threat kill- chain 21

Kill- Chain ac4vi4es defined 22

Monitoring the Kill- chain Web Analy4cs Get an understanding of clicks to the management or board member por4on of your website from outside the country where your company is based. Google Analy4cs visitor flow report can help you understand where visitors come from how they troll and access the site. Social Media Monitor out- going data, especially file sharing that may help an a<acker with social engineering Monitor company sen4ment to understand whether a storm is gathering that may result in an a<ack Traffic origina4ng from data center (know IP address spaces) Web crawling and bots 23

Monitoring the Kill- chain Iden4fy Threat Characteris4cs Iden4fy the domain the email came from as a legi4mate business Use analy4cs to understand if the email is seen for the first 4me from the sender. Monitor the types of a<achments and perform packet level inspec4on to understand file a<achment content (what is the a<achment? Javascript,.exe, or does it contain a launch ac4on) 24

Monitoring the Kill- chain Malware Behavior Iden4fica4on and Detec4on Use Virus Total or GTRI s Apiary to iden4fy malware ac4ons and characteris4cs Import Data from services into Splunk to monitor for infec4on characteris4cs not detected by AV engines o Collect malware Hash o Communica4on IPs, ports and protocols used o File or registry key changes o Domain the email came from as a legi4mate business o Network connec4on(s) o DLL changes Correlate this data with host data collected Are changes made outside of change windows Monitor for unusual rare traffic between hosts for lateral movement Monitor changes to hosts processes 25

Monitoring the Kill- chain Malware Communica4on Analy4cs Monitor URL / and user agent strings for embedded command and control o Lengths above par4cular standard devia4on Monitor web traffic to known bad IPs and domains Monitor web traffic to domains registered in the last 24-72 hours Monitor web traffic w/o referrer Use Virus Total or GTRI s Apiary to iden4fy malware ac4ons and characteris4cs Outbound encrypted traffic (from DMZ, webservers, DBs, other hosts that should not be ini4a4ng connec4ons Iden4fy self- signed cer4ficates Falsified HTTP headers Beaconing hosts Non- standard encryp4on over allowed paths Use of Remote windows shell or remote desktop 26

Monitoring the Kill- chain DDoS from the inside CPU cycles eaten up Performance degrada4on Land and expand (what hosts are exhibi4ng same issues) Webserver content replaced Log files missing/erased New executable on host Host AV not upda4ng Elevated privileges Movement of encrypted.rar or.zip files Use of slp or lp to a controlled host Use of pwdump tool 27

A tall order for the average security team? " Take small measures/steps " Pick one phase and focus then pick the next one Stopping the a<acker at any one phase is good " The earlier in the chain you are able to focus the be<er " Know your environment you can bet the a<acker will try to know it " What informa4on does your web presence tell an a<acker? 28

Don t let vendors tell you what ques4ons you can ask their solu4on about your data. Ask the ques4ons your business cares about. 29

A Process for Using Big Data for Security: Iden4fy the Business Issue What does the business care about? What could cause loss of service or financial harm? Performance Degrada4on Unplanned outages (security related) Intellectual property access Data thel 30

A Process for Using Big Data for Security: Construct a Hypothesis How could someone gain access to data that should be kept private? What could cause a mass system outage does the business care about? What could cause performance degrada4on resul4ng in an increase in customers dissa4sfac4on? 31

A Process for Using Big Data for Security: It s about the Data Where might our problem be in evidence? For data thel start with unauthorized access issues Facility access data, VPN, AD, Wireless, Applica4ons, others Beg, Borrow, SME from system owners 32

A Process for Using Big Data for Security: Data Analysis For data thel start with what s normal and what s not (create a sta4s4cal model) How do we normally behave? What pa<erns would we see to iden4fy outliers? Pa<erns based on ToD, Length of 4me, who, organiza4onal role, IP geo- lookups, the order in which things happen, how olen a thing normally happens, etc.

A Process for Using Big Data for Security: Interpret and Identify What are the mi4ga4ng factors? Does the end of the quarter cause increased access to financial data? Does our sta4s4cal model need to change due to network architecture changes, employee growth, etc? Can we gather vaca4on informa4on to know when it is appropriate for HPA users to access data from foreign soil. What are the changes in a<ack pa<erns? 34

A<acks of the future Will require risk scenario thinking Will grow in sophis4ca4on Will be more individualized (business specific) Will be mo4vated by: Acquiring customer private data Stealing intellectual property Damaging reputa4on Holding companies ransom Will find vulnerabili4es wherever they are Will require risk measurement for priori4za4on 35

Big Data Plavorm: Insight for Business Risk App Monitoring Data Security Data IT Operations Data LDAP, AD Watch Lists Business Process Data Distribution System Data Business Risk and Security Security & Compliance IT Opera4ons Management Business Analy4cs 36 Web Intelligence Applica4on Monitoring

Thank You

Outside Live Threat Intelligence " Live data sampling from 38 interna4onal data centers " Presence in top 20 Internet Exchange (IX) points world wide " Core Long haul fiber access from 4er 1 operators with several 10 Gbps pipes " 1500 factors for crea4ng an IPQ risk score to asses poten4al a<acks 38