FIA Webinar Cybersecurity Threats: Preparation & Response June 29, 2015



Similar documents
FS-ISAC CHARLES BRETZ

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

A Crisis Response, Information Sharing View of FFIEC Appendix J?

Working with the FBI

Cybersecurity Panel. ABA Mutual Community Bank Conference Marriott Marquis Hotel, Washington, D.C.

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Digital Evidence and Threat Intelligence

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cybersecurity Awareness. Part 2

Cybersecurity Awareness

Defending Against Data Beaches: Internal Controls for Cybersecurity

INFRAGARD.ORG. Portland FBI. Unclassified 1

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Testimony of. Mr. Anish Bhimani. On behalf of the. Financial Services Information Sharing and Analysis Center (FS-ISAC) before the

Eight Essential Elements for Effective Threat Intelligence Management May 2015

Into the cybersecurity breach

RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015

Perspectives on Cybersecurity in Healthcare June 2015

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Machine-to-Machine Exchange of Cyber Threat Information: a Key to Mature Cyber Defense

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015

CYBER SECURITY INFORMATION SHARING & COLLABORATION

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Protecting Your Organisation from Targeted Cyber Intrusion

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

I N T E L L I G E N C E A S S E S S M E N T

Innovations in Network Security

U. S. Attorney Office Northern District of Texas March 2013

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Cybersecurity Awareness

Practical Steps To Securing Process Control Networks

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Technical Testing. Network Testing DATA SHEET

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

Advanced Threat Protection with Dell SecureWorks Security Services

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

The Next Generation Security Operations Center

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

September 20, 2013 Senior IT Examiner Gene Lilienthal

Cisco Advanced Services for Network Security

Security Analytics for Smart Grid

Streamlining Web and Security

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

US-CERT Year in Review. United States Computer Emergency Readiness Team

Internet Safety and Security: Strategies for Building an Internet Safety Wall

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Advanced Threats: The New World Order

Advanced Persistent Threats

Software that provides secure access to technology, everywhere.

Enterprise Security Platform for Government

Cybersecurity: What CFO s Need to Know

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Italy. EY s Global Information Security Survey 2013

The Future of the Advanced SOC

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

Presented by Evan Sylvester, CISSP

University System of Maryland University of Maryland, College Park Division of Information Technology

Malicious cyber activity is on the increase at risk. This may involve the loss of critical data and consumer confidence, as well as profits

Can We Become Resilient to Cyber Attacks?

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

About Botnet, and the influence that Botnet gives to broadband ISP

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group

Top tips for improved network security

Incident Response. Proactive Incident Management. Sean Curran Director

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Threat Intelligence & Analytics Cyber Threat Intelligence and how to best understand the adversary s operations

F G F O A A N N U A L C O N F E R E N C E

Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

KEY STEPS FOLLOWING A DATA BREACH

Agenda , Palo Alto Networks. Confidential and Proprietary.

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C

Cyber Security. John Leek Chief Strategist

After the Attack. The Transformation of EMC Security Operations

Managing Cyber Attacks

Threats to Local Governments and What You Can Do to Mitigate the Risks

Internet threats: steps to security for your small business

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Clavister InSight TM. Protecting Values

Getting real about cyber threats: where are you headed?

Security and Privacy

How To Create Situational Awareness

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Cisco IPS Tuning Overview

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

IBM Security Strategy

Who s Doing the Hacking?

Using Network Forensics to Visualize Advanced Persistent Threats

FBI CHALLENGES IN A CYBER-BASED WORLD

Data Breach Response Planning: Laying the Right Foundation

The session is about to commence. Please switch your phone to silent!

Transcription:

FIA Webinar Cybersecurity Threats: Preparation & Response June 29, 2015 Moderator: Gregory Gist, Director, CBCP, Industry Relations, Office of Emergency Management, Citi Speakers: William Nelson, President & CEO, Financial Services Information Sharing and Analysis Center (FS-ISAC) Leo Taddeo, Special Agent in Charge, Cyber/Special Operations, FBI New York Field Office

Cybersecurity Webinar The webinar will be recorded and posted to the FIA website following the conclusion of the live webinar. A question and answer period will conclude the presentation. - Please use the chat function on your webinar control panel to ask a question to the moderator or speakers. Questions will be answered at the conclusion of the webinar. CYBERSECURITY THREATS: PREPARATION & RESPONSE JUNE 29, 2015 2

Cybersecurity Webinar Overview of Webinar Background on Cybersecurity Speaker: Gregory Gist, Director, CBCP, Industry Relations, Office of Emergency Management, Citi CYBERSECURITY THREATS: PREPARATION & RESPONSE JUNE 29, 2015 3

Who are the Adversaries? Sophistication Expertise Funding Patience Target Value Threat Level 1 Inexperienced Limited funding Opportunistic behavior Target known vulnerabilities Use viruses, worms, rudimentary trojans, bots In it for thrills, bragging rights Easily detected Threat Level 2 Higher order skills Well-financed Target known vulnerabilities Use viruses, worms, trojans, bots to introduce more sophisticated tools Target and exploit valuable data Detectable, but hard to attribute Threat Level 3 Very sophisticated tradecraft Foreign Intel Agencies Very well financed Target technology as well as info Use wide range of tradecraft Establish covert presence on sensitive networks Undetectable? SECRET//NOFORN

Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement & Government Infrastructure

GameOver Zeus

People s Liberation Army (PLA)

National Cybersecurity Framework DHS (Protection, Prevention, Mitigation, & Recovery) Coordinate the national protection, prevention, mitigation of, and recovery from cyber events Disseminate domestic cyber threat and vulnerability analysis Protect critical infrastructure Secure federal civilian systems Investigative cyber crimes under DHS jurisdiction FOREIGN DOMESTIC DOJ/FBI (Detection Investigation, Attribution, & Disruption) DOD/NSA (Defense, Prevention, & Overseas Intelligence) Investigate, attribute, disrupt, and prosecute cyber crimes Lead domestic national security operations Conduct domestic collection, analysis, and dissemination of cyber threat intelligence Support the national protection, prevention, mitigation of, and recovery from cyber incidents Coordinate cyber threat investigations

External Breaches Source: Verizon 2014 Data Breach Investigations Report

When to Call Law Enforcement Public Safety Potential impact to critical infrastructure National security matters Defense contractor Classified databases Origin of attack Criminal or nation-state Sophistication/Skill level of attacker Potential impact to other networks Potential financial loss to victim

FBI Cyber Incident Response Teams Network Traffic Analysis Capabilities/Skill Sets Analysis of network traffic (netflow and pcap) Router configuration files and other network related log files Host-Based Forensics Malware Legal Collect forensic host images and live memory capture Analyze images for indicators of compromise Analyze samples of malicious code Process legal documentation (consent/trespasser) Intelligence Research evidence in FBI/USIC databases and disseminate to partners

FBI Objectives in Responding to Cyber Incident Investigate and prosecute Cyber crimes Work with victim to Continue operations System owner retains control of systems System owner (not Special Agent) produces logs, memory images, etc. No crime scene tape around your networks Protect data Not advance team for regulators or plaintiffs lawyers Maintain confidentiality of PII and other protected data Maintain confidentiality of incident Assist in mitigation and recovery Provide signatures, TTPs Provide classified information as needed

Points of Contact Call your local FBI field office: New York Assistant Special Agent in Charge Richard Jacobs Richard.Jacobs@ic.fbi.gov 212-384-2949 Chicago Assistant Special Agent in Charge John Brown John.Brown@ic.fbi.gov 312-829-5187

Cybersecurity Threats, Preparation, and Response June 29, 2015 Financial Services Information Sharing & Analysis Center

Anatomy of an Attack Financial Services Information Sharing & Analysis Center 16

Attacker Mindset An adversary will attack the network s weakest point The User The Supply Chain Targeting has become very selective Executives & staff (access to data) System and network administrators (privileged credentials) Third Party vendors Open source information gathering allows the adversary to become very familiar with target prior to attack Organizational structure, technologies, research activities Attacker will utilize minimum complexity to be successful Simple techniques allow the adversary to leverage more attacks (less training and technology required) 17

Common Attack Scenario Adversary Gains Foothold Compromised Web Site Adversary Adversary determines that it has an interest in an Organization s protected information Tainted email sent to Organization s users User clicks on link to compromised web site, remote admin tool installed www.hackedsite.com Additional tools uploaded Using credentials gained, adversary works to establish additional footholds Host 1 Host 2 18

Adversary frequently will perform data mining through a host (Host 2) other than the initially compromised host (Host 1) Remote host may or may not be the same IP/Domain as initial attack Data mining typically occurs on file servers via share permissions Multiple files are typically extracted as an encrypted bundle Common Attack Scenario Data Mining Adversary Host 1 Host 2 File Server 19

Information Sharing Overview of FS-ISAC To be forewarned is to be fore-armed

FS-ISAC MISSION: Sharing Timely, Relevant, Actionable Cyber and Physical Security Information & Analysis A nonprofit private sector initiative formed in 1999 Designed/developed/owned by financial services industry Mitigate cybercrime, hactivist, nation state activity Process thousands of threat indicators per month 2004: 68 members; 2015: 5700+ members Sharing information globally 21

Information Sources FS-ISAC Operations Member Communications CERTs FS Regulators Law Enforcement Other Intel Agencies GOVERNMENT SOURCES FS-ISAC 24x7 Security Operations Center Information Security Physical Security Business Continuity/ Disaster Response isight Partners Info Sec Secunia Vulnerabilities Wapack Labs Malware Forensics NC4 Phy Sec Incidents MSA Phy Sec Analysis PRIVATE SOURCES Cross Sector (other ISACS) Open Sources (Hundreds) CROSS SECTOR SOURCES Alerts Fraud Investigations Payments/ Risk Member Submissions 22

Information Sharing & Analysis Tools Threat Data, Information Sharing Anonymous Submissions CyberIntel Listserver Relevant/Actionable Cyber & Physical Alerts (Portal) Special Interest Group Email Listservers (Broker-Dealer, Asset Managers) Document Repository Member Contact Directory Member Surveys Risk Mitigation Toolkit Threat Viewpoints Ongoing Engagement Bi-weekly Threat Calls Emergency Member Calls Semi-Annual Member Meetings and Conferences Regional Outreach Program Bi-Weekly Educational Webinars Readiness Exercises Government Sponsored Exercises Cyber Attack against Payment Processes (CAPP) Exercise Advanced Threat/DDoS Exercise Industry exercises-systemic Threat, Quantum Dawn Two, etc. Financial Services Information Sharing & Analysis Center 23

Information Sharing: Traffic Light Protocol Restricted to a defined group (e.g., only those present in a meeting.) Information labeled RED should not be shared with anyone outside of the group This information may be shared with FS-ISAC members. Information may be shared with FS-ISAC members and partners (e.g., vendors, MSSPs, customers). Information in this category is not to be shared in public forums This information may be shared freely and is subject to standard copyright rules 24

FS-ISAC Circles of Trust IRC Asset Mgr. CHEF PRC CYBER INTEL FS- ISAC PPISC TIC BRC CIC Broker Dealer CAC Clearing House and Exchange Forum (CHEF) Payments Risk Council (PRC) Payments Processor Information Sharing Council (PPISC) Business Resilience Committee (BRC) Threat Intelligence Committee (TIC) Community Institution Council (CIC) Insurance Risk Council (IRC) Compliance and Audit Council (CAC) Cyber Intelligence Listserv Asset Manager Council Broker-Dealer Council Member Reports Incident to Cyber Intel list, or via anonymous submission through portal Members respond in real time with initial analysis and recommendations SOC completes analysis, anonymizes the source, and generates alert to general membership

Types of Information Shared Cyber Threats, Vulnerabilities, Incidents Malicious Sites Threat Actors, Objectives Threat Indicators Tactics, Techniques, Procedures Courses of Action Exploit Targets Denial of Service Attacks Malicious Emails: Phishing/Spearphishing Software Vulnerabilities Malicious Software Analysis and risk mitigation Incident response Physical Threats, Incidents Terrorism Active Shooter Hurricanes Earthquakes Other meteorological events Geopolitical impacts Pandemic Type, location, severity Impact analysis and risk mitigation Business resilience preparation and incident response Financial Services Information Sharing & Analysis Center 26

Security Automation Overview of FS-ISAC Will Revolutionize Information Sharing

Soltra Edge www.soltra.com S O L T R A A N F S - I S A C D T C C C O M P A N Y

THREATS (& INTELLIGENCE) GROWING FAST 117,339 incoming attacks every day 42.8 million security incidents detected in 2014 48% over 2013 Cyber Intelligence related to this exponential threat activity is directly correlated Today, intelligence information is measured daily in Gigabytes Too much to manually share and process (emailing and cutting n pasting into tools) Findings from The Global State of Information Security Survey 2015 Graphic Source: PwC

THE NEED FOR SPEED Attackers Act 150x Faster Than Victims Respond Minutes vs. Weeks/ Months Attackers have honed their skills to come at you rapidly Defenders take a long time to feel the impact of an attack Initial Attack to Initial Compromise (Shorter Time Worse) Seconds Minutes Hours Days Weeks Months Initial Compromise to Data Exfiltration (Shorter Time Worse) 10% 75% 12% 2% 0% 1% Initial Compromise to Discovery (Longer Time Worse) 8% 38% 14% 25% 8% 8% 0% 0% 2% 13% 29% 54% TLP WHITE S O L T R A A N F S - I S A C D T C C C O M P A N Y

MACHINES CAN HELP, BUT FIRST Machines Need a Language to Talk about Threats STIX Structured Threat Intelligence expression Structured language used by machines to describe cyber threats TAXII Trusted Automated exchange of Indicator Information Transport mechanism for cyber threat information represented in STIX An Analogy Like HTML Like TCP/ IP Like HTML S O L T R A A N F S - I S A C D T C C C O M P A N Y

STIX CONSTRUCTS An open standard to categorize cyber threat intelligence information Atomic What threat activity are we seeing? Tactical What threats should I look for on my networks and systems and why? Operational Where has this threat been seen? What can I do about it? What weaknesses does this threat exploit? Strategic Who is responsible for this threat? Why do they do this? What do they do? S O L T R A A N F S - I S A C D T C C C O M P A N Y

OPEN INTELLIGENCE WORKFLOW HIGH-LEVEL OBJECTS CONSTRUCTS Observable Indicator Incident EXTERNAL SOURCES STIX Intelligence Intel Sharing Communities 1 2 3 Consume Analyze/ Action Share Back 3 World s Most Advanced STIX TAXII Intelligence Server COMMUNITY MEMBER ORGANIZATION 2 Security Tools High Level Analysis Course of Action Exploit Target Intelligence Providers 1 Workflow Orchestration TTP Campaign Threat Actor Government OSINT Native STIX Data Store Low Level Analysis Mitigation Controls Connections

INTELLIGENCE-DRIVEN COMMUNITY DEFENSE Maturing An Intelligence Ecosystem Standards-based Machine Speed Communication End-to-End (Sensor to Control) Community Defense Model Organization With Intelligence Cyber Threat Trusted Member Organizations Central Intelligence Repository

SECURITY AUTOMATION STATUS Soltra joint venture between FS-ISAC and DTCC Industry-owned utility to automate threat intelligence sharing DTCC IT & scalability; FS-ISAC community & best practices Funded by the industry, including SIFMA and some of its largest members At-cost model; open standards (STIX, TAXII) Provide platform that can be extended to all sizes of financial services firms, other ISACs and industries Integrate with vendor solutions (firewalls, intrusion detection, anti-virus, threat intelligence, etc.) Soltra Edge General availability 12/3/2014 FS-ISAC instance, January 2015 Over 900 downloads of Soltra Edge, less than half from financial services sector Adapter and Network capabilities-- 2015 Financial Services Information Sharing & Analysis Center 35

Information Sharing Overview of FS-ISAC One Firm s Incident becomes the Entire Community s Response

Trustwave s List of 7 Deadly Employee Sins 1) Pathetic Passwords: The most common corporate password is "Password1" because it meets the minimum complexity requirements. 15% of physical security tests, written passwords were found on and around user workstations. 2) Peeping ROM: 71% of workers sneak a peek at a co-workers or stranger's workstation. One in three workers leaves their computers logged on when they are away from their desk. 3) USB Stick Up: 60% of users who find random USB sticks in a parking lot will plug them into their computers; add those sticks that includes a company logo and the number increases to 90%. 4) Phish Biting: 69% of phishing messages past spam filters; 27% of IT organizations have users who have fallen for malicious e-mail attacks. 5) Reckless Abandon: 70% of users do not password-protect their smartphones, and 89% of people who find lost cell phones rummage through the digital contents. 6) Hooking up with Another Man's WiFi: By 2015, the number of WiFi hotspot deployments will increase 350%, but currently, only 18% of users use a VPN tool when accessing public WiFi 7) A Little Too Social: 67% of young workers think corporate social media policies are outdated, and 70% regularly ignore IT policies. Just over half (52%) of enterprises have seen an increase of malware infections due to employees' use of social media 37

Contact Information Bill Nelson, President & CEO Eric Guerrino, EVP Operations Peter Falco, Broker Dealer Services Robin Fantin, VP Marketing Beth Hubbard, Director of Member Services bnelson@fsisac.us eguerrino@fsisac.us pfalco@fsisac.us rfantin@fsisac.us bhubbard@fsisac.us www.fsisac.com Financial Services Information Sharing & Analysis Center 39

Thank You for Your Time Today Financial Services Information Sharing & Analysis Center

Cybersecurity Webinar Q&A Please use the chat function on your webinar control panel to ask a question to the moderator or speakers. If you have additional questions following the conclusion of the webinar, please contact: Barbara Wierzynski, FIA (bwierzynski@fia.org) All content related questions Mary Freeman, FIA (mfreeman@fia.org) All logistical questions pertaining to access of the webinar, webinar recording, and slide deck. The recorded webinar will be available on the FIA website within 24 hours following the conclusion of the webinar. CYBERSECURITY THREATS: PREPARATION & RESPONSE JUNE 29, 2015 41