ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency



Similar documents
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

Global Security Report 2011

CYBER SECURITY, A GROWING CIO PRIORITY

Zak Khan Director, Advanced Cyber Defence

Protecting Your Organisation from Targeted Cyber Intrusion

September 20, 2013 Senior IT Examiner Gene Lilienthal

Cyber liability threats, trends and pointers for the future

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Cybersecurity Awareness. Part 1

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

developing your potential Cyber Security Training

Perspectives on Cybersecurity in Healthcare June 2015

Internet Safety and Security: Strategies for Building an Internet Safety Wall

Practical Steps To Securing Process Control Networks

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

Breaking the Cyber Attack Lifecycle

A COMPLETE APPROACH TO SECURITY

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Cybersecurity. Are you prepared?

COMMISSION OF THE EUROPEAN COMMUNITIES

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

PENETRATION TESTING GUIDE. 1

Security Analytics for Smart Grid

Digital Evidence and Threat Intelligence

應 用 SIEM 偵 測 與 預 防 APT 緩 攻 擊

Cyber Security and Critical Information Infrastructure

How To Integrate Intelligence Based Security Into Your Organisation

Things To Do After You ve Been Hacked

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

COMBATING CYBER THREATS: A HOW TO FOR THE CISO.

Unknown threats in Sweden. Study publication August 27, 2014

How To Write An Article On The European Cyberspace Policy And Security Strategy

Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions

10 Things Every Web Application Firewall Should Provide Share this ebook

Cisco SAFE: A Security Reference Architecture

WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products

Introduction to network penetration testing

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Software that provides secure access to technology, everywhere.

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Streamlining Web and Security

Beyond the Hype: Advanced Persistent Threats

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

Protecting against cyber threats and security breaches

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Microsoft s cybersecurity commitment

The Cyber Threat Profiler

Defending Against Data Beaches: Internal Controls for Cybersecurity

SecurityMetrics Vision whitepaper

Addressing the blind spots in your security strategy. BT, Venafi & Blue Coat

CYBER SECURITY AND CYBER DEFENCE IN THE EUROPEAN UNION OPPORTUNITIES, SYNERGIES AND CHALLENGES

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Supplier Vigilance: A Critical Layer of Defense

Presented by Evan Sylvester, CISSP

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Data Center security trends

QUARTERLY REPORT 2015 INFOBLOX DNS THREAT INDEX POWERED BY

Is it Time to Trust the Cloud? Unpacking the Notorious Nine

Speaker Info Tal Be ery

Covert Operations: Kill Chain Actions using Security Analytics

External Supplier Control Requirements

Report on Cyber Security Alerts Processed by CERT-RO in 2014

ISO27032 Guidelines for Cyber Security

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

EU Threat Landscape Threat Analysis in Research ENISA Workshop Brussels 24th February 2015

Advanced Threat Protection with Dell SecureWorks Security Services

Enterprise Cybersecurity: Building an Effective Defense

Incident Response. Proactive Incident Management. Sean Curran Director

Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Developing Secure Software in the Age of Advanced Persistent Threats

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Transcription:

ENISA s Study on the Evolving Threat Landscape European Network and Information Security Agency

Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 2

ENISA The European Network & Information Security Agency (ENISA) was formed in 2004. The Agency is a Centre of Expertise that supports the Commission and the EU Member States in the area of information security. We facilitate the exchange of information between EU institutions, the public sector and the private sector.

Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 4

Evolution of Threats The way in which threats related to information security evolve is extremely complex. There are many variables affecting the evolution of such threats, which make prediction extremely difficult even if we have data on current trends. It s a bit like the weather forecast we have a reasonable idea of the near future, but it gets more hazy as the timeframe increases. In cyberspace, our ability to predict major events is probably in the range of hours. Our predictive powers are poor in this area. 5

Economic Constraints Attackers have learnt how to exploit the weaknesses created by the new business model and are themselves becoming more efficient. The window between the publication of a vulnerability and the appearance of exploit code is continually decreasing. The real issue - As businesses strive for greater speed and efficiency, it becomes more difficult to maintain an effective system of internal controls. The solution to this problem lies in successfully combining people, process and technology.

Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 7

The Report The ENISA Threat Landscape provides an overview of threats and current and emerging trends. It is based on publicly available data and provides an independent view on observed threats, threat agents and threat trends. Over 120 recent reports from a variety of resources have been analysed.

Target Group The target group of this report includes: decision makers security professionals risk managers Other interested individuals who would like to obtain information about threats and find references to current available material on this topic. Know yourself, know the enemy. A thousand battles, a thousand victories. Sun Tzu. 9

Method The approach was to collect and aggregate existing, publicly available information and compile it into single report on the threat landscape. Over 120 individual reports have been taken into account for this work, most of those issued in 2012. Elements of the ENISA threat landscape included in this deliverable are: A Current Threat Landscape consisting of development of threats as they have been reported by international stakeholders such as CERTs, industry, professional associations and academia and An Emerging Threat Landscape consisting of threat trends identified. 10

The ENISA Threat Landscape Various Threat Libraries/Reports Networks of Excellence Standardisation bodies ENISA Threat Landscape Various Threat Reports Information collection/collat ion Top Threats Current Threat Landscape Threat Agents Threat Trends Emerging Threat Landscape

Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 12

Content The current top cyber threats have been identified. Trends have been derived from the comparison of current threat information with that of the last years. Finally, a number of threat trends for emerging areas of Information Technology have been formulated. Identified for the following areas: mobile computing social technology, critical infrastructures trust infrastructures cloud computing big data. 13

Top Threats by Frequency Drive-by exploits: Malicious code exploiting browser vulnerabilities. Worms/Trojans: Widely used by criminals for making money. Code injection: Open doors in web DBs and Services Exploit kits: Automated tools to deliver malware Botnets: Compromised computers under the control of an attacker. Denial of Service: Typically used to take down a server (high rates) Phishing: Social engineering techniques for gathering personal details. Compromising confidential Information: Data breaches. Rogueware/Scareware: Fake software, fake alerts Spam: e-mail abuse (decreasing!!)

Developed overview

Threat Agents

Threat Trends Per Area

Agenda Introduction to ENISA Preliminary remarks The ENISA report Major findings Conclusions 18

Some overall conclusions.. Attackers use simple and cheap weapons Weaknesses of systems stay too long undetected (ca. 1 year) We know little about attackers and their tactic attack vectors We are not united enough

Recommendations Collect and develop better evidence about attack vectors: It is important to develop a better understanding about the workflow of an attack, from its entry point down to the final asset targeted. This information is very rare in existing threat reports. Collect and develop better evidence about impact achieved by adversaries: This information would be very interesting in order to understand the final targets of attackers and prioritise protection measures. Collect and maintain more qualitative information about threat agents: Despite the fact that literature on threat agents does exist, we were not able to find evidence of a co-relation between incidents and threat agents.

Recommendations Use common terminology: It is important to develop a common vocabulary in threat management, e.g. to be used by standardisation bodies, international organisations, governments and NGOs. Include the user perspective: The perspective of enduser is still absent from available information. Eventually, the end-user perspective could contain the impact of threats to end-users, but also provide guidance for development of threat awareness. Develop use cases for threat landscapes: Use cases of threat landscapes should be used to generate good practices for inclusion in information security management activities/lifecycle.

Recommendations Collect security intelligence: With growing threat activity and increasing sophistication of attacks it seems inevitable to generate better conditions for the collection of intelligence on threats, risks and mitigation techniques by means of knowledge bases that can be commonly developed and shared among organisations. Perform a shift in security controls: It is important that a shift is performed from perimeter based, fragmented security controls towards data centered, holistic and coherent end-to-end security policies and protection mechanisms.