Using Social Engineering Tactics For Big Data Espionage



Similar documents
BIG DATA CALLS FOR BIG SECURITY!

BIG DATA CALLS FOR BIG SECURITY!

Analytics Success. Top Factors for Business. Dan Vesset, Program VP, Business Analytics and Big Data Research, IDC September 2012

Using Predictive Analytics to Increase Profitability Part III

Security within a development lifecycle. Enhancing product security through development process improvement

CUSTOMERS & CRIMINALS: USE WEB SESSION INTELLIGENCE TO DETECT WHO IS WHO ONLINE

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

The Next Generation Security Operations Center

A Biologically Inspired Approach to Network Vulnerability Identification

A Primer on Cyber Threat Intelligence

The Future of the Advanced SOC

Reducing Cyber Risk in Your Organization

Unlock the business value of enterprise data with in-database analytics

CYBER SECURITY: A REPORT FROM THE TRENCHES 2015 AGC NATIONAL & CHAPTER LEADERSHIP CONFERENCE MIKE.ZUSMAN@CARVESYSTEMS.COM

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

Big Data and Security: At the Edge of Prediction

QRadar SIEM and FireEye MPS Integration

Solera Networks, A Blue Coat Company SOLERA NETWORKS BIG DATA SECURITY ANALYTICS

An Anatomy of a web hack: SQL injection explained

GOOD GUYS VS BAD GUYS: USING BIG DATA TO COUNTERACT ADVANCED THREATS. Joe Goldberg. Splunk. Session ID: SPO-W09 Session Classification: Intermediate

Data Catalogs for Hadoop Achieving Shared Knowledge and Re-usable Data Prep. Neil Raden Hired Brains Research, LLC

Solution Briefing. Integrating the LogLogic API with NSN s Remediation & Escalation Mgmt. System

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

BI/Analytics for NoSQL: Review of Architectures

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

Practical Considerations for Real-Time Business Intelligence. Donovan Schneider Yahoo! September 11, 2006

White Paper. Self-Service Business Intelligence and Analytics: The New Competitive Advantage for Midsize Businesses

White paper. Control room convergence: Merging industrial monitoring and control systems with data center operations

Network Intrusion Analysis (Hands-on)

Business Intelligence for Excel

Evolution Of Cyber Threats & Defense Approaches

Data Science with Hadoop at Opower

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

IT Security Quo Vadis?

Bringing Big Data into the Enterprise

Training Training Sessions Schedule Attempt for General Intelligence Presidency of Saudi Arabia Milan, February 2th 2011

Understanding the Value of In-Memory in the IT Landscape

UNDERSTANDING COMPUTER FORENSICS. Doug White, PhD, CISSP, CCE Security Assurance Studies Roger Williams University

Grand Challenges Making Drill Down Analysis of the Economy a Reality. John Haltiwanger

Penetration Testing. Types Black Box. Methods Automated Manual Hybrid. oless productive, more difficult White Box

ESG Brief. Overview by The Enterprise Strategy Group, Inc. All Rights Reserved.

IoT & INFOSEC: A REPORT FROM THE TRENCHES - AGC IT Conference- July 2015 MIKE.ZUSMAN@CARVESYSTEMS.COM

Automated quality assurance for contact centers

IBM SECURITY QRADAR INCIDENT FORENSICS

The Data Analytics Revolution: A Guide from the ASTIN Working Party on Big Data

SCADA/ICS Security in an.

Healthcare Big Data Exploration in Real-Time

Microsoft Services Exceed your business with Microsoft SharePoint Server 2010

Big Data Scenario mit Power BI vs. SAP HANA Gerhard Brückl

Advanced Persistent Threats

Big Data Big Security Problems? Ivan Damgård, Aarhus University

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

The Challenge of Digital Analytics & Intelligence. Giovanni Lorenzoni, CEO Seville, 22/09/2015

Master of Science Service Oriented Architecture for Enterprise. Courses description

How To Create An Insight Analysis For Cyber Security

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

Secure Because Math: Understanding ML- based Security Products (#SecureBecauseMath)

SANS Dshield Webhoneypot Project. OWASP November 13th, The OWASP Foundation Jason Lam

Metrics that Matter Security Risk Analytics

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

This Symposium brought to you by

How To Handle Big Data With A Data Scientist

Good Guys vs. the Bad Guys: Can Big Data Tools Counteract Advanced Threats?

Complex, true real-time analytics on massive, changing datasets.

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.


FERPA: Data & Transport Security Best Practices

RSA Security Anatomy of an Attack Lessons learned

Capacity Management PinkVERIFY

After the Attack. The Transformation of EMC Security Operations

Designing Business Intelligence Solutions with Microsoft SQL Server 2012 Course 20467A; 5 Days

TIBCO Cyber Security Platform. Atif Chaughtai

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Data Mining: Unlocking the Intelligence in Your Data. Marlon B. Williams, CPA, ACDA Partner, IT Advisory Services Weaver

ENISA s Study on the Evolving Threat Landscape. European Network and Information Security Agency

LEARNING SOLUTIONS website milner.com/learning phone

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Big Data Analytics Empowering SME s to think and act

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Workshop Designed & Powered by TCIL IT, Chandigarh

Transcription:

Using Social Engineering Tactics For Big Data Espionage Branden R. Williams Jason Rader RSA Session ID: DAS-301 Session Classification: General Interest

What Is This Session About? Big Data Analytics They are the future! How do we deal with them in the security world? Adopting techniques from Social Engineering How can we learn from other security issues? What snakes may be lurking in the grass? Application What to do?

Predictive Analytics The Future of BI Big Data Not LOTS of data But many disparate sources with mixed structure Industry trends driving Big Data & analytics Storage is cheap Anywhere computing Hardware over-engineering (or distributed computing) Math is pretty awesome

What are Predictive Analytics? Simply, deriving value from big data! Complexly (is that a word?) Organizing the unorganized Heavy math use The search for leading indicators How do we use it? Business strategy Public safety (CDC,NOAA) Predict the future 4

Who does this well today? Investors! Massive historical data Lots of math Sometimes bad math The search for trends Execute trades! The next step? Implications of social media See through the corporate veil Now we can focus on the individual! 5

DATA TYPE A Big Data Framework Non-Transactional Data Social Analytics Decision Science Transactional Data Performance Management Data Exploration Measurement Experimentation BUSINESS OBJECTIVE Parise, S., Iyer, B., & Vesset, D. (2012). Four strategies to capture and create value from big data. Ivey Business Journal, 76(4), 1-5.

Predictive Analytics The Why Businesses have data coming out of their ears SO DO THE BAD GUYS! Huge shift from the past Forensics example Unused data Can we find value? Business leaders must innovate 1 But focus on business model innovation PA can drive this! 1 Amit, R., & Zott, C. (2012). Creating value through business model innovation. MIT Sloan Management Review, 53(3), 41-49.

Derived Data & Analytics (more sensitive than original data!) Analytics automate data crunching Could become the new IP! Businesses act on output What about deriving sensitive info? PII Privacy issues! If I accurately guess your info, do I need to protect it?

Problem of derived sensitive data If I derive your PII, must I protect it? Law is WAY behind Compliance might be farther HUGE IMPACT TO BUSINESS In EU, no question How to apply EU Privacy Updates?

Practical Applications How Target knew a teenager was pregnant before her own father did: Pause for story time! Implications: Target can predict due dates/sex Aggregations of data can accurately predict the future Better placement (upside?) Not Singular pieces of data! It s the CORRELATION that matters

Payoff The Relevance of Data Mass Amount of data 11

The Compartmentalization problem Big data requires big flexibility But that impacts security Think about SQL features: Views Complex Queries (with aggregates) Column-level RBAC Classic approaches (where have we solved this problem before) DBAs still a risk (so is the Data Scientist) Operators may not know what they are looking at

Attack Scenarios for BI Hacking the Coca Cola formula Can you derive the formula? YES YOU CAN! Shipping/Receiving/Production data Think Crypto plaintext attack KFC would be harder, but possible! IP/Strategy Derivation Attackers can figure out your IP by looking at data sets you don t necessarily protect Macro trends repeat themselves over multiple sets of data, can I fill the gaps from missing data sets?

How Does This Fit Into Social Engineering? Social engineers rarely blatantly ask for all of the information Patchwork over time Desired outcomes are known Surprises happen to change outcome Given 20 sources of input data: If a criminal has access to say 15 Can he replicate analytics & results? Can he fill in the gaps? Eeek.

Side By Side Comparison Gather Intelligence Go after willing targets (sheeple) Gather innocuous information in bits Piece together bits Exploit Social Engineering Big Data Attacks Source Data Go after IP rich companies Go after underprotected information Find and fill gaps Exploit 15

How To Apply Content From This Session In the first three months: Understand the sausage factory operation How does your business use analytics/data to operate or make strategic decisions? What happens in real-time? Catalogue data sources and uses Where are those inputs and how are they protected? Within six months you should: Identify data where inference leads to espionage Unused business data or seemingly mundane data Build sourcing plans (in or out!) 16

That s all folks! 17

Q/A @BrandenWilliams @JRaderRSA 18

Thank you! 19