PROTECTING THE CROWN JEWELS: A PERSPECTIVE FOR THE
Transcription
PROTECTING THE CROWN JEWELS: A PERSPECTIVE FOR THE
PROTECTING THE CROWN JEWELS: A PERSPECTIVE FOR THE C-‐SUITE GIRISH K. JINDIA, CHIEF EXECUTIVE OFFICER 9 DECEMBER 2013 Building for the future Copyright Aveshka, Inc. 2013 Agenda • IntroducSon • A Solid Game Plan • Then What Happens? • What DirecSon Is it Going? • How to Respond • The Right SoluSon Set • Achieving the Desired Outcomes • Close 2 AVESHKA INC. | © 2013 Aveshka Introduction 3 AVESHKA INC. | © 2013 Who We Are Aveshka is a consul3ng, services, and solu3ons firm focused on na3onal priori3es. “Aveshka” means innova3on and discovery A team of experienced na3onal security and informa3on technology professionals Technology-‐enabled We align the full spectrum from policy and strategy to implementa3on and opera3ons. 4 AVESHKA INC. | © 2013 Collabora3ve with client staff and vendors Employee-‐owned Our Clients • U.S. Intelligence Agencies • Department of Homeland Security • Global Banking & Finance • Healthcare & “Big Pharma” • Department of Justice • Department of Defense The biggest R&D labs in the world. 5 AVESHKA INC. | © 2013 The Dream Your Environment 6 AVESHKA INC. | © 2013 Protec3ng the “Crown Jewels” What threats are you prepared for? “Your Crown Jewels” Intellectual Property Private Client Data Personally Iden3fiable Info Financials Development Plans 7 AVESHKA INC. | © 2013 “Perfect” Architecture: The Dream Layout Internet/Cloud Services Secure Data Center Secure HQ Data Center Controlled Access Environment Access Control List (ACL) External Firewall BYOD/Remote access 8 AVESHKA INC. | © 2013 DMZ Opera3onal Changes Then reality takes over! 9 AVESHKA INC. | © 2013 Someone Drains the Moat! 10 AVESHKA INC. | © 2013 Insider Threats Insider 11 AVESHKA INC. | © 2013 Applica3on Access Tunnels Uninten3onal Tunnels Admin Development Inten3onal Tunnels Web Apps SOA VPN 12 AVESHKA INC. | © 2013 Your “perfect” architecture is now penetrable 13 AVESHKA INC. | © 2013 Real World Threats Top Threats in 2013* 1. 2. 3. 4. 5. 6. 7. 8. 9. Data Breaches Data Loss (25% of all threats reported) Account or Service Traffic Hijacking Insecure Interface and APIs (29% of all threats reported) Denial of Service Malicious Insider (WikiLeaks, Snowden, etc.) Abuse of Cloud Services Insufficient Due Diligence Shared Technology Vulnerabilities (10% of all threats reported) *Source: CLOUD SECURITY ALLIANCE - The Notorious Nine: Cloud Computing Top Threats in 2013 15 AVESHKA INC. | © 2013 Real-‐World Examples • Internal Audit Service (IAS) – International – IAS was put on alert after hackers gained access to and changed the government’s Citizens’ Service Centre database. It was reported that personal data was altered, allowing people to become eligible for free healthcare and welfare benefits. • Recent Cyber Attacks on U.S. Utility Companies Have Been Traced to Iran – Critical Infrastructure – Many U.S. utility companies have reported that their data was hacked. Hackers have targeted their attacks on oil, gas, and electricity companies. Security officials believe that the attack was mainly aimed at destroying all the data from these companies and controlling the machinery that is used for operating control systems. • China-based Hacking Group Behind Hundreds of Attacks on U.S. Companies – Commercial Infrastructure – Hidden Lynx hacking-for-hire group more sophisticated than others, including using malware targeting zero-day flaws. No one is immune! 16 AVESHKA INC. | © 2013 Real-‐World Examples • Global Bank Hacking Attack Gang Stole £1.3 Million – Global Finance – One of the gang posed as an IT engineer fixing the computer to gain access to the branch in order to fit a device that allowed the hackers to access its network remotely and transfer money into their own accounts. • Commercial Property Management Firm – Commercial Real Estate – Three days prior to the acquisition of another company, an employee clicked on a social network link that launched a virus. With an estimated monthly revenue of $24 million, the acquired firm could not access their data, suspending operations, and impeding the close. The damage in terms of time and money is indeterminable! 17 AVESHKA INC. | © 2013 Emerging and Future Threats for 2014 • Mobile Malware – The number of malicious and suspicious Android apps grew to 175,000 at the end of September 2012, up from 30,000 in June. • The Cloud – Huge repositories of data are very attractive targets for hackers. • Data Destruction – Hackers are using ransomware to encrypt data so its owner can no longer access it. A password will unlock the data, but a ransom must be paid to the hacker to get that code. • Social Networks – Employees are giving up information, or communicating with sketchy accounts. • Supply Chain Security – Inter-dependencies within the supply chains. • Bring Your Own Device (BYOD) – Users are increasingly using their devices as they would their PCs, and are opening themselves up to attacks the same as they would if they were operating a PC. Just when you thought it was safe to go back in the water! 18 AVESHKA INC. | © 2013 Reali3es • Attacks are proliferating at an accelerating rate • Critical infrastructure (i.e., finance, energy, health) is a primary target of state sponsored actors • Attacks are not limited to any market segment • The threats are asymmetric and ubiquitous • Defending it is not cheap, while consequences are significant 19 AVESHKA INC. | © 2013 Typical Situa3on • Most organizations rely on a reactive strategy with static defenses that identify known vulnerabilities and then fix them one-by-one. • An effective security posture requires anticipatory, predictive intelligence to enable an organization to get ahead of threats before an attack occurs. 20 AVESHKA INC. | © 2013 State of the Threat Environment 21 AVESHKA INC. | © 2013 Malware Growth 22 AVESHKA INC. | © 2013 Malware Sophis3ca3on 23 AVESHKA INC. | © 2013 Ransomware Growth 24 AVESHKA INC. | © 2013 Mobile Exposure 25 AVESHKA INC. | © 2013 Internet Vulnerabili3es 26 AVESHKA INC. | © 2013 How This Affects Your Business Impact on Selected Markets 27 AVESHKA INC. | © 2013 Banking 28 AVESHKA INC. | © 2013 Financial Services 29 AVESHKA INC. | © 2013 Healthcare 30 AVESHKA INC. | © 2013 2014 Security Predic3ons Info from Websense report, “2014 Security Predictions” The Response Closing the Vulnerability Gap 32 AVESHKA INC. | © 2013 No easy solu3ons • Demands a continuously evolving cyber strategy • The best talent is in high demand and limited supply • Technology or tools by themselves do not guarantee security Response Framework • Corporate Governance • Leverage Existing Resources • Employ Best Practices • Establish Priorities 34 AVESHKA INC. | © 2013 What Can Help Me Today? • Corporate Buy-In – Most importantly, implement from top-down – Don’t wait for a crisis – Dialogue with security advisors and current security staff • Adopt Common Security Protocols – NIST Cybersecurity Framework (Preliminary) • Education – Teach and encourage use of safe practices • Defense-in-Depth – Layered approach – Firewalls, anti-virus, etc. – Host/Network IDS/IPS • Encryption – At-Rest and In-Transit 35 AVESHKA INC. | © 2013 Leveraging What I Have In Place Today • People – Training – Understanding – Stakeholder ownership • Processes – Learn why yesterday’s methods didn’t succeed – Know your firewall, control your firewall – Discover modern security without comprising performance • Technologies – Real-time security updates – Network port monitoring – Robust reporting 36 AVESHKA INC. | © 2013 Best Prac3ces to Employ • Risk-based – assess risk by identifying threats, vulnerabilities, and consequences • Outcome-focused – focus on desired end-state versus prescribing the means to achieve it • Prioritized – adopt a graduated approach to criticality • Practicable – optimize for adoption by largest possible group of critical assets and implementation across broadest range of critical sectors 37 AVESHKA INC. | © 2013 Best Prac3ces to Employ (cont.) • Respectful of privacy and civil liberties – protections for privacy and civil liberties based upon Fair Information Practice Principles, etc. • Globally-relevant – integrate international standards, keeping the goal of harmonization in mind • Predictive intelligence and continuous monitoring – proactive defense versus reactive remediation 38 AVESHKA INC. | © 2013 Establishing Priori3es • Long-term corporate goals – Infrastructure or Virtualize – BYOD – Hybrid – Flexibility to adjust short-term • Draft a plan – Fail to plan = Plan to fail – Build security policy to match/complement – Defend the castle • Establish access privileges – Customers – Remote Employees – Partnerships • Appropriate balance between demarcations 39 AVESHKA INC. | © 2013 The Right Solu3on Set • Not the bleeding edge (unknown) • Not the leading edge (unproven) • Keep up with the “state of the shelf” (enterprise grade) 40 AVESHKA INC. | © 2013 The 4 R’s React Recover Remediate Reinforce 41 AVESHKA INC. | © 2013 A Holis3c, Enterprise Approach • Independent assessment • Planning support • Operational support • Long-term support • Right balance and mix of technology 42 AVESHKA INC. | © 2013 Candor™ A flexible, adaptable, and scalable management and analytic platform 43 AVESHKA INC. | © 2013 Candor™ -‐ Finding the Right “Needles” in the Haystack • Aveshka’s Candor™ is an offering consisting of a cloudbased analytics platform for solving complex business problems by integrating information and data analysis with adaptable methodologies. • Candor™ enables infinitely expandable customizable data sources to present information via multiple visualization tools. 44 AVESHKA INC. | © 2013 Candor™ -‐ Architecture ™ 45 AVESHKA INC. | © 2013 Candor™ -‐ Features • Intelligent disparate data linkages – “Finding needles in stacks of needles” – Hidden relaSonships revealed – Flexible and extensible • Customizable insight – High performance visualizaSon and intelligence display – Analysis and relaSonship mapping • Web-enabled and Cloud-based – Infrastructure independence/dynamic resource allocaSon and deallocaSon – Lower life cycle costs • Data type independent and open source access – Structured Data – Unstructured Data – Social Media • Open Architecture foundation 46 AVESHKA INC. | © 2013 Candor™ -‐ Applica3ons • Fraud Detection • Anti-Money Laundering • Intelligence Collection & Analysis • Competitive Intelligence • Transaction Monitoring • Risk Assessment • Due Diligence • Heath Care Record Management • Political Micro-Targeting • Brand/Reputation Management 47 AVESHKA INC. | © 2013 Summary 48 AVESHKA INC. | © 2013 Desired Outcomes • Low risk in a high risk environment • Agile adaptation to the evolving threats • Infrastructure resilience • Business continuity • Reduced risk of imposed regulatory oversight • Increased productivity • More efficient operations • Protection of the “brand” 49 AVESHKA INC. | © 2013 Closing “Failure to protect the crown jewels can cost you the family jewels!” 50 AVESHKA INC. | © 2013 Aveshka Appendix Delegate One-on-One Sessions 51 AVESHKA INC. | © 2013 Key Demographics • Headquarters: Arlington, VA • 20,000 sq. feet of high-finish office space and demonstration center • 10 field locations across U.S. • Experienced leadership team • Solutions-oriented, value-driven • Technology-enabled • National-priority market focused 52 AVESHKA INC. | © 2013 Aveshka Differen3a3on • Premise: Policy drives strategy, which determines the approach to implementation and ultimately, operations. • Value Proposition: We possess the experience, expertise, and discipline to align implementation and operations with the underlying strategy and policy. 53 AVESHKA INC. | © 2013 Policy & Strategy to Implementa3on & Opera3ons Guidance and principles to achieve the mission. Plan of action to achieve goals. Evaluate mandates, guidance, and naSonal prioriSes Assess operaSonal effecSveness Develop policy to drive mission outcomes Develop prioriSzed course of acSon Align resources and acSviSes Assess risks Policy Ongoing activities that realize value of goal attainment and inform policy making. Integrated Mission Focus Opera3ons Monitor and assess goal amainment and outcomes QA/process improvement Lessons learned 54 Strategy AVESHKA INC. | © 2013 Implementa3on Execution of plan to realize goals. Plan of acSon and milestones Cost, schedule, and performance measures and metrics Resource allocaSon Capabili3es • Policy, Planning and Preparedness – Policy and strategy development – Strategic, operational, and tactical planning – Stakeholder outreach and strategic communications – Exercise design, planning, conduct, and evaluation – Organizational performance and effectiveness • Cybersecurity and Security Engineering – Information and mission assurance – Secure information sharing – System engineering, design, development, and integration – Computer & network forensics – Independent verification and validation • Analytic Solutions – Fraud detection and analysis – Analytic methodology development – Data analytics support and implementation 55 AVESHKA INC. | © 2013 Aveshka Sample Offerings 56 AVESHKA INC. | © 2013 Management Consul3ng • Policy development and implementation • Strategic and operational planning • Organizational effectiveness • Performance management • Threat and vulnerability assessments • Training and exercises • Enterprise architecture • Security engineering 57 AVESHKA INC. | © 2013 Digital Forensics • Infrastructure – Forensic-friendly server/desktop systems • Improves LE/examiner ability to image RAM and drives • Virtual – Local host hardware – Cloud-based – vendor trust – Hybrid combination – Increased usage drives need for forensic access • Mobile (BYOD) – Corporate mobile device security policy – Wide range of mobile OSes • Memory – Lots of critical data not available elsewhere 58 AVESHKA INC. | © 2013 Penetra3on Tes3ng • Methodologies – White Hat – Black Hat – Grey Hat • Vulnerability scanning – Basic testing required by most regulations (often overlooked) – Various tools used for heuristic view • Infrastructure testing – External – Internal • Application testing – Web applications and supporting databases • User testing – Social engineering 59 AVESHKA INC. | © 2013 Applica3on Code Valida3on & Remedia3on Application source code is a major source of enterprise vulnerabilities, yet one of the hardest to discern. • Process – Factory Model with scalable production line – Based on Toyota Production System (TPS) leveraging KANBAN • Technologies – Proprietary Repository of Vulnerability Solutions – best pattern analysis, etc. – Proprietary Process Control & Documentation Systems – Remediate legacy & modern applications – desktop & mobile • People – Specialists experienced in application security remediation • Benefits – Lower cost – Frees up client technical resources for other priorities – Consistent solutions lower application lifecycle costs lowering TCO 60 AVESHKA INC. | © 2013 Cloud Engineering and Security • Architecture design • Security controls • Data protection • Identity management • Physical and personnel security • Application security • Privacy • Compliance logs and audit trails • Service Level Agreement design and implementation 61 AVESHKA INC. | © 2013 Predic3ve Intelligence • Continuous monitoring • Real-time data consolidation and analysis • Pattern-based access and traffic monitoring • Software and hardware agnostic • Monitor both internal and external threats • Automate decision support • Preemptive alerting and response • Situational awareness of potential corporate loss • Reduced risk to business and operational productivity 62 AVESHKA INC. | © 2013 “Know Your Customer” (KYC) Programs To really understand your business risks you need to “Know Your Customer” from a 360 degree view, as single source check no longer provides a reliable view of who your customers are. • Multi-national data • Open-Source Reporting • Social Media • Multiple data sources • Single system for reporting and data access • Data Agnostic • Connects to existing systems • Predictive Analytics • Dashboard view for enhanced decision-making 63 AVESHKA INC. | © 2013 Candor™ Technology-enabled 64 AVESHKA INC. | © 2013 Candor™ -‐ Finding the Right “Needles” in the Haystack • Aveshka’s Candor™ is an offering consisting of a cloudbased analytics platform for solving complex business problems by integrating information and data analysis with adaptable methodologies. • Candor™ enables infinitely expandable customizable data sources to present information via multiple visualization tools. 65 AVESHKA INC. | © 2013 Candor™ -‐ Architecture ™ 66 AVESHKA INC. | © 2013 Candor™ -‐ Features • Intelligent disparate data linkages – “Finding needles in stacks of needles” – Hidden relationships revealed – Flexible and extensible • Customizable insight – High performance visualization and intelligence display – Analysis and relationship mapping • Web-enabled and Cloud-based – Infrastructure independence/ dynamic resource allocation and deallocation – Lower life cycle costs • Data type independent and open source access – Structured Data – Unstructured Data – Social Media • Open Architecture foundation 67 AVESHKA INC. | © 2013 Candor™ -‐ Applica3ons • Fraud Detection • Anti-Money Laundering • Intelligence Collection & Analysis • Competitive Intelligence • Transaction Monitoring • Risk Assessment • Due Diligence • Healthcare Record Management • Political Micro-Targeting • Brand/Reputation Management 68 AVESHKA INC. | © 2013 Aveshka, Inc. visit learn discuss 4075 Wilson Boulevard Suite 800 Arlington, VA 22203 www.aveshka.com 571.814.5700 69 AVESHKA INC. | © 2013