Dirty Dozen

Transcription

Dirty Dozen
Today’s Top Threats
to Your Data
June
2012
Luncheon Meeting
Gene Scriven
+
The Land of Information Security
+
Gene’s
Dirty Dozen
+
Threats to the Enterprise
June 14, 2011
+
What Will We Talk About?
• Nothing that’s Rocket Science
• Concepts will likely be the same for everyone
•
•
•
•
•
•
•
3
– Details will be different
Enterprise vs. small business vs. personal
A combination of “Soft Stuff” and Technology
Vendor Agnostic (and even Technology Agnostic)
Not a “How To Fix It” presentation
You’ll notice some redundancy – it’s intentional
My personal opinion – your mileage may vary
But First…
But First…
Something to
“Get the Blood Flowing”
4
Three Guys go fishing….
Where’s the EXTRA DOLLAR?
5
Who Is This Guy??
Chief Information Security Officer at Sabre almost 3 years
Prior to Sabre, CISO at The Home Depot
•
30+ years in Information Security
•
Commercial, military, federal government, government
contract
•
Big-Six (and similar) background
•
Coopers, Deloitte, PwC, Trident
Government and US Intelligence Community
•
Programmer, PM, Security Director, Development Director,
Missile Targeting, Electronic Wargames, Federal Agent,
Computer Crime Investigator
Commercial
•
Security Systems Development Director, QA Director, Process
Engineer, Chief Information Security Officer
Not Particularly Related (but far more FUN)
•
Lifeguard, Paramedic, College Professor, Comedian
Why The “Dirty Dozen?”
• Everybody has a list
–
–
–
–
Mitre has the Top 20
SANS Institute Top 10 Cyber Threats
FBI Survey
Open Web Application Security Project (OWASP) has the
Top 10
– “Cyber Security Veterans” Top 10 Security Menaces
– Top 10 Security Risks to University Communities
• A “Dozen” seemed like a great starting point
• Any list….is never enough!
• Contrast Gene’s 1998 Dirty Dozen with today’s
7
#12
Desensitized by Media Saturation
Government Laptop with SSNs
Stolen from Airport
Yet another retailer is
hacked and millions of
CC numbers are stolen
8
Keylogger
Compromises
25,000 Identities
#11
Social Engineering on the Rise Again
- More Sophisticated • People will ALWAYS be the weakest link
• Phishing messages more/most successful
• Embedded Links
• No real technology fix
• Old fashioned social engineering
• Targeting Help Desks
• Targeting those who are evaluated on being helpful
• Actual visits to physical sites
9
#10
Employees who think they know more than IT
•
•
•
“I can get it so much cheaper from Best Buy or eBay!”
“You guys are so slow…and I need it yesterday.”
“But my requirements are different than everyone else’s.”
Not understanding what’s involved in running IT to support a diverse enterprise, often
with thousands of users, causes some to ignore IT, work around it, or cheat the system
10
#9
Lack of understanding of Information Security (and Risk)
“How many incidents did
we have last year?”
Unable to Articulate Risk
~Certain
11
348
444
341
443
194
ce
r
C
on
aj
or
M
368
372
312
362
Possible
1169
81
387
61
114
84
137
196
375
261
397
459
485
229
404
402
356
388
358
266
431
317
39
Unlikely
269
Rare
rC
on
ce
rn
41
in
o
“Why aren’t you making
the company any money?”
Risk has to be
seen through
the eyes of the
Risk-Taker!
379
M
RISK
L
I
K
E
L
I
H
O
O
D
300
178
295
93
321
315
369
507
200
Likely
n
291
64
Insignificant
Department
Minor
Business Unit
Moderate
Major
IMPACT
Catostrophic
#8
Data Leakage
• We don’t know what we don’t know!
• What data is leaving, and how much?
• How is it leaving?
• Thumb drives, email, social media, etc.
• Implementing DLP takes enormous planning and
requires strong processes
• Drinking from the firehose!
• Are you protecting from Social Networks?
• Social Media can be great for business
• But it can also ruin your business
It’s Gonna Blow!!
12
#7
The Next Employee You Lay Off
• Job market is improving, but lay-offs and cuts are still happening
• HR errs on the side of “being nice” to employees during downsizing
• Statistics still indicate that internal threats are on the rise
Most employees/companies have…
• Excessive accesses
• Insufficient access reviews
• “Overlapping trust”
FBI reports, “Nearly 90
percent of such crimes (data
theft) are committed by
employees of the victims.”
13
• Too much emphasis on the perimeter
• False sense of security
• Not enough prosecution
• Confusion between Disgruntled vs.
“Under-Educated”
#6
Outsourced Partner Problems
• Third parties have become a large part of many infrastructures
•
•
•
•
•
• Costs
• Expertise
• Companies now rely heavily on them
Many are trusted with sensitive info
Are they properly evaluated for the right data protections?
Do your contracts hold them equally liable?
Are your SLAs adequate – especially on Incident Response?
What about “The Cloud?”
“Third party organizations accounted for 42% of all data breaches.”
– Ponemon Institute
14
#5
Sophistication of the Bad Guys
• 12-year old script-kiddies working from Mom’s basement are
a thing of the past!
• Attackers are organized, financed, and often state-sponsored
• Microeconomics in its purest form
• Well-run business networks
Attackers are now often
backed by formal
organizations and are
financially motivated
15
#4
Poor Patching
Poor Patching
• “OK…But we’ll have to slip our development
schedule.”
• “What do you mean by ‘Have the systems patched in 10
days?’”
• “But we have so many different platforms…”
• “It’s gonna take at least two months to test that patch.”
• “This is a lot of work….Why can’t you just block the
exploits?”
• “It’s not my job, I just load the base images.”
• “We should be OK…it’s not like we’re the NSA or
something.”
• Need an Iterative process, with Governance, and Required Compliance
• Application Patching as well as OS Patching
16
#3
Shift in attacker focus from OS Vulnerabilities to
Application/Middleware Vulnerabilities
• Most vendors will do the right thing with vulnerabilities and patches
• Many enterprises still focus primarily on OS vulnerabilities
• Attackers taking advantage of the proliferation of applications across the
typical enterprise
• Internally developed applications need attention as well
• Are you frequently scanning your web apps?
• Know what applications your users have
• Address the vulnerabilities that exist in them
Internal
Applications
17
#2
Malware and Spyware are far more sophisticated
(and dangerous)
“Don’t worry about that spyware thing….it’s just someone trying to see
where you’re going on the Internet – you know, for Marketing purposes.”
Interesting Malware Activities
1.
2.
3.
4.
5.
6.
7.
8.
18
Changing network settings
Disabling anti-virus and anti-spyware tools
Turning off Microsoft Security Center and/or other
updates
Installing rogue certificates
Cascading file droppers
Keystroke Logging
URL monitoring, form scraping, and screen
scraping
Turning on the microphone and/or camera
9.
10.
11.
12.
13.
14.
15.
Pretending to be an antispyware or
antivirus tool
Editing search results
Acting as a spam relay
Planting a rootkit - altering the system to
prevent removal
Installing a bot for attacker remote control
Intercepting sensitive documents … or
encrypting them for ransom
Planting a sniffer
Verizon Business Data Breach report (for 2010) indicates
that 38% of compromises were due to Malware
#1
Mobile Devices & BYOD
•
•
•
•
Everyone’s stats agree – Mobile Devices are on the rise in our enterprises
Have you seen your CEO’s iPad on the network? (Not yet??)
Sticking your head in the sand is not an option here
Be aware of the threats of unmanaged mobile devices
•
•
•
•
Non-compliant devices
Jail-broken devices
Zero-day exploits
User savvy at getting around your controls
• BYOD – See the train storming down the tracks!
• Partner with your users – and admit they may know more about this than you do
• Be prepared with a comprehensive Mobile Device Management strategy
19
What’s A CISO To Do?
• Know what you don’t know
• Focus on the Message
– Content is critical
– Delivery is just as important
• Be a Business Person first
– …and a Technician second
– …and a Politician third (build relationships)
• Organize your program based on RISK
• Defense-In-Depth
20
Dirty Dozen – Then vs. Now
1998
#12 - No Security Awareness Program
#11 - Blind Trust of Insiders
#10 - Reliance on Firewalls
#9 - No Business Continuity Plan
#8 - Chiefs Not Listening To “Indians”
#7 - Not Enough Attention To Physical
Security
#6 - Insufficient Security Policies
#5 - Uncontrolled Modems
#4 - Insecure Web Sites \ Pages
#3 - No Verification Of Security
#2 - No Security Monitoring
#1 - Poor Password Practices
21
2012
#12 – Desensitized by Media Saturation
#11 – Social Engineering on the Rise
#10 – Employees who know more than IT
#9 – Understanding of InfoSec & Risk
#8 – Data Leakage
#7 – The Next Employee you Lay Off
#6 – Outsourced Partner Problems
#5 – Sophistication of the Bad Guys
#4 – Poor Patching
#3 – Shift from OS to Application
Vulnerabilities
#2 – More Dangerous Malware & Spyware
#1 – Mobile Devices and BYOD
They only have to get lucky one time, but
we have to be good all the time.
- Mark Weatherford, Deputy Undersecretary for Cybersecurity, Department of Homeland Security
Discussing the advantages the bad guys have over those responsible for defending networks, systems, and data in
today’s Cyber environment
23
Questions?
24