Leveraging Global Threat Intelligence: Raising the Cost of Cyber-Warfare



Similar documents
Information Security Threats and Strategies. Ted Ericson Product Marketing - ASI

Asia-Pacific Secure Content Management Market 2012 Stable Growth is Anticipated in the and Web Security Segments

Symantec Global Intelligence Network 2.0 Architecture: Staying Ahead of the Evolving Threat Landscape

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

Sophisticated Indicators for the Modern Threat Landscape: An Introduction to OpenIOC

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

FROM INBOX TO ACTION AND THREAT INTELLIGENCE:

I D C T E C H N O L O G Y S P O T L I G H T. S e r ve r S e c u rity: N o t W h a t It U s e d t o Be!

A Primer on Cyber Threat Intelligence

Top Ten Fraud Risks That Impact Your Financial Institution. Presented by Ann Davidson - VP Risk Consulting Allied Solutions LLC.

Combating a new generation of cybercriminal with in-depth security monitoring

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

Building Blocks of a Cyber Resilience Program. Monika Josi monika.josi@safis.ch

Kaspersky Fraud Prevention platform: a comprehensive solution for secure payment processing

CyberReady Solutions. Integrated Threat Intelligence and Cyber Operations MONTH DD, YYYY SEPTEMBER 8, 2014

Compliance Guide: ASD ISM OVERVIEW

Gregg Gerber. Strategic Engagement, Emerging Markets

CYBER SECURITY INFORMATION SHARING & COLLABORATION

White Paper. Emergency Incident Response: 10 Common Mistakes of Incident Responders

How To Manage Log Management

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Reducing Cyber Risk in Your Organization

The Future of the Advanced SOC

Top Fraud Trends Facing Financial Institutions

Symantec Cyber Security Services: DeepSight Intelligence

Addressing Big Data Security Challenges: The Right Tools for Smart Protection

Mobile Application Security. Helping Organizations Develop a Secure and Effective Mobile Application Security Program

The Next Generation Security Operations Center

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

ORGANIZADOR: APOIANTE PRINCIPAL:

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

Defending Against Cyber Attacks with SessionLevel Network Security

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

How To Protect Your Endpoints From Attack

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Zak Khan Director, Advanced Cyber Defence

Breaking the Cyber Attack Lifecycle

Cyber Information-Sharing Models: An Overview

How To Buy Nitro Security

State of Security Survey GLOBAL FINDINGS

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

Analytic and Predictive Modeling of Cyber Threat Entities J. Wesley Regian, Ph.D.

The Advanced Cyber Attack Landscape

Asia-Pacific Web Application Firewall Market Increasing Attacks on the Application Layer are Driving the Market

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Find the needle in the security haystack

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

Cyber Adversary Characterization. Know thy enemy!

The SIEM Evaluator s Guide

Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks

Rethinking Information Security for Advanced Threats. CEB Information Risk Leadership Council

Defending Against Cyber Security Threats to the Payment and Banking Systems

IBM Security X-Force Threat Intelligence

Using SIEM for Real- Time Threat Detection

Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC

Asia-Pacific Application Performance Management Market CY 2013 Rapidly Changing Application Architecture and Business Environment Drives the Market

WRITTEN TESTIMONY OF

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

One Minute in Cyber Security

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Developing a robust cyber security governance framework 16 April 2015

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Best Practices in File Integrity Monitoring. Ed Jowett, CISSP ITIL Practitioner Sr. Systems Engineer, Tripwire Inc.

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Getting real about cyber threats: where are you headed?

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.

Getting Ahead of Advanced Threats

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Asia Pacific. Tax Management Consulting Why and What?

5 Reasons Why Your Security Education Program isn t Working (and how to fix it)

Fostering Incident Response and Digital Forensics Research

White. Paper. Rethinking Endpoint Security. February 2015

Asia Pacific Security Information and Event Management (SIEM) Market CY P March 2011

Cyber-Security. FAS Annual Conference September 12, 2014

THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.

Accounts Payable Automation: Top 9 Reasons to Automate: The Essential Guide to Why Your Business Needs to Automate its Invoice Processing.

Transcription:

SESSION ID: ECO-T09 Leveraging Global Threat Intelligence: Raising the Cost of Cyber-Warfare Dean Thompson (Dean.Thompson@anz.com) Senior Manager, Global Threat Intelligence & Advanced Response Australia and New Zealand Banking Group Limited

Agenda Introductions Sophistication of Actors vs Tools over Time Modus Operandi Operational Environment Considerations for ANZ Problems faced within ANZ and Globally Harnessing the power of the community Benefits Limitations What needs to change / Your in the driver seat Parting thoughts 2

Introductions

Introductions Dean Thompson Senior Manager, Global Threat Intelligence & Advanced Response Manager, Global Security Operations Centre 24 x 7 Computer Security Incident Response Team Respond to all sorts of Computer Security Incidents Forensic / Boutique / Delicate Security Incidents Technical Subject Matter Experts (SME s) Assisted with the Cyberstorm II & Cyberstorm III scenarios for Australia PhD (Computer Science) -- Monash University, Australia Security / Network Engineering background Systems Administrator & Developer 4

Introductions ANZ Bank World headquarters located in Melbourne, where it first opened as an office of the Bank of Australasia in 1835 Assets of $772.10 (AUD) billion / Profit $7.27 (AUD) billion (Sep 2014) 1,220 worldwide points of representation 486,596 shareholders (Sep 2014) 50,824 employees worldwide Super regional bank with a specific focus on Asia 5

Sophistication of Actors vs Tools over Time

Sophistication of Actors vs Tools over Time Source: Booz Allen Hamilton. www.boozallen.com 7

Implications of Sophisticated Attack Tools and the lack of Sophistication to use them Imbalance exists with the Return On Investment (ROI) proposition for cyber-criminals vs. organisations Organisations spend large amounts on security infrastructure and threat intelligence (% of their overall budget) on trying to equalise the equation Regardless of these investments by numerous companies, there have still been breakdowns in security controls: JP Morgan Chase Sony Pictures Entertainment Home Depot Anthem 8

Modus Operandi

Modus Operandi / Threat Actor Groupings Criminals Hacktivists Information Gathering / Espionage War / Kinetic 10

Dealing with the Threat Landscape @ ANZ

Back to ANZ Bank Operate across 33 markets and have 28 regulators to appease Tightest Regulator we deal with: Monetary Authority of Singapore (MAS) Impose tight limits on banks reporting security incidents Definition of security incidents becomes interesting Timelines to report these incidents extends to hours with root cause having to be identified within days Banking Operations within: China Hong Kong Taiwan 12

What does this mean to ANZ? Operate in a challenging environment Geographically positioned in some interesting places across the world Consequently, our environment is large and prone to be subjected to various levels of badness from various sorts of actors 13

What does this mean to ANZ? (cont.) Operate within the confines of various regulations and regulators Some have preconceived ideas, outdated security models and theories Signature-based detection does not always work We observe threats before signatures are available to detect them Threats are polymorphic and obscured so straightforward detection doesn t work 14

Problems faced by ANZ and others We have a number of security tools and products Each of these tools provide a high level of intelligence output Issues we initially faced Data is present within the environment Data flows everywhere and is often duplicated Transmitted without any context Not being used effectively We need to respond quickly to threat intelligence Both internally and externally It needs to be actionable intelligence that we can use in our environment Source: ANZ Security Threat and Vulnerability Strategy (2014) Author: Steven Mond 15

Problems faced by ANZ and others (cont.) 16

Dealing with the Threat Landscape Globally

Problems faced more globally Return On Investment (ROI) for cyber-criminals is high Return On Investment (ROI) for organisations is low Organisations have to invest a considerable amount to defend themselves (and in some cases that still isn't enough) To balance the equation Need to work more closely with one another Share data and information with context within trust groups to further defend against these threats 18

Problems faced more globally (cont.) We need to work as a community Reverse the ROI equation Make it harder for cyber-criminals to attack organisations Tip the balance in our favour Adopt Knowledge Hierarchy Companies have data Valuable when pooled together with others data Data becomes information 19

Addressing Threat Landscape Issues @ ANZ

ANZ s approach to the problem Establishment of a Cyber-Threat Intelligence Repository We use Soltra's Edge platform for this repository (but there are others available) Expression of Cyber-Threat Intelligence in STIX notation Enforces a common standard for the representation of cyber-threats Use of known definitions and relationships allows consumers of the information to understand the meaning and intent of that being expressed 21

ANZ s approach to the problem (cont.) Establishment of a Cyber-Threat Intelligence Repository Assists with providing information and knowledge Most importantly it provides context to our Security Operations Centre Integration of Cyber-Threat Intelligence Repository Global Threat Intelligence & Advanced Response Group Security Operations Centre Streamline flow of information from tools within the environment 22

ANZ s approach to the problem (cont.) 23

ANZ s approach to the problem (cont.) 24

ANZ s approach to the problem (cont.) Source: ANZ Security Threat and Vulnerability Strategy (2014). Author: Steven Mond 25

Threat Landscape Power of the Community

Harnessing the power of the community Being in Australia, we do not see all attacks evolve during our business hours (they normally occur after hours) The power of "Community" allows us to gain visibility into: Threat indicators Observables & Indicators Cyber-Threat Intelligence Repository allows rules for our other security controls to be built automatically Provides context and access to time sensitive data fast 27

Benefits of adopting this approach Sharing of attack information ANZ saw attack information on threats like HeartBleed / Shellshock in 2014 Information collected was a subset of the overall knowledge base Sharing this attack information assisted those that had not been attacked by those particular hosts Those participating in the exchange would get additional information about other hostile hosts that could be used as a basis for filters within their environment 28

Benefits of adopting this approach (cont.) Sharing of attack information (cont.) Other examples include Dyre malware information Malware targeting financial institution Sharing of Dyre proxies Sharing technical information makes it possible to limit the effectiveness of this malware and realign ROI indicators back into our favour Sharing provides a deeper pool of data Data can be mined to develop signatures based on event-based information that you have received 29

Limitations of this approach Solution is not a panacea, it does not stop bad things from happening Issues exist around processing information received: Block vs. Alert ANZ monitors and alerts on intelligence it receives Does not resolve problems relating to: Confidence of data and the association of information Context of the data Threat Model 30

Limitations of this approach (cont.) How is the data being used Producer vs. Consumer of the information Integration issues Most vendors do not support data interchange formats such as STIX Custom development required for translations of data CSV to STIX JSON to STIX XML to STIX 31

Applying Cyber-Threat Intelligence within your Organisation

What needs to change you can help Share information about what you are seeing in your environments By sharing observations/indicators: You will be helping others defend In turn they will publish what they are seeing Encourage security tool vendors to consider STIX as a valid means of sharing data with the community Some have started but more a needed to join in so that the data can be used properly and shared accordingly 33

What needs to change you can help (cont.) Data / Information needs to be shared in a format that we can ingest into Threat Intelligence Platforms Working together we can actually lift the barrier that exists to protect ourselves from Cyber-Warfare As a security collective we can re-balance the ROI equation in our favour and in turn make the investment proposition too expensive for them to operate TOGETHER WE CAN MAKE AN IMPACT!! 34

Parting Thoughts If we all work together we can actually make a difference and result in making it to expensive for the various adversaries to perform Cyber-Warfare. 35

Parting Thoughts Let s Apply Next week you should: Explore a Cyber-Threat Intelligence Repository In the next three months you should: Consider what security data your organisation collects Understand how this data can be used to defend your sector Come up with a standard/guidelines on what you can share Within six months you should: Look at standing up a production Cyber-Threat Intelligence Repository Integrate some of your production data into it Set up peering relationships with others in your sector 36

Questions