in a crisis - SC Magazine
Transcription
in a crisis - SC Magazine
FEBRUARY 2015 • WWW.SCMAGAZINE.COM REVIEWED IN OUR GROUP TEST Centripetal P40 Merges cyber threat intelligence and stack management COOL IN A CRISIS FEATURES: How you communicate during an attack is as important as your response, says Ron Green, CISO, MasterCard. P20 Canada’s internet voting problem Many Canadian municipal officials are elected via the internet, even as agencies prohibit the practice. PC1 Unifying principle Is the time right for national data breach legislation? There are signs that this may be the year. P24 Norse P43 Cadillac of cyberthreat intelligence does everything Recorded Futures P45 Technically oriented, open source intelligence service VOLUME 26 NO. 2 • February 2015 • WEBSITE WWW.SCMAGAZINE.COM • EMAIL [email protected] We see the threats that others might miss. You might have missed the predator lying in wait, but AT&T wouldn’t. That’s because we built and manage a highly secure global network that serves every one of the Fortune 1000. This unparalleled visibility means we’re uniquely placed to help protect your entire enterprise, leaving you free to mobilize your business with confidence. AT&T Security Services. We see the full picture. att.com/security REGULARS PRODUCT REVIEWS 4 Editorial It’s going to take savvier 38 Product section preparation. We are increasing the number and the space of emerging products. 8 Threat report Russia was the top 39 Emerging products: producer of zombie IP addresses Threat intelligence Solid intelligence analysis can go a long way toward protecting against the ravages of a Sony-style compromise. 10 Threat stats There were 8,311,693 attacks in the U.S. 12 Update In Canada, Bill C-51 widens government surveillance powers. 13 Debate Mobile malware is mobile security’s biggest threat. 14 Two minutes on…Tidal waves of spoofed traffic: DDoS attacks. T:10.5” B:11.25” S:10” 15 Me and my job Kristi Carrier, quality auditor, Nuspire Networks. 16 From the CSO’s desk Breach response, by ViJay Viswanathan, CISO, HD Supply. 17 Opinion Are mobile apps risky business?, by Rich Boyer, NTT Com Security. 18 Letters From the online mailbag. 19 Analysis Usability as a protection feature, by Ian Hamilton, CTO, Signiant. 49 Calendar A guide to upcoming IT security shows, events and courses. 50 Last word The security model is broken, by Craig Shumard, principal, Shumard and Associates. Ron Green, EVP and CISO, MasterCard P20 FEATURES 20 COOL IN A CRISIS: Breach response How you communicate during an attack is as important as your response, says Ron Green, CISO, MasterCard. C1 Canada’s internet voting problem Many Canadian municipal officials are elected via the internet, even as agencies prohibit the practice. 24 Unifying principle: Data breach legislation Is the time right for national data breach legislation? 28 Defense from the top: FISMA 2.0 The DHS will gain more control when a FISMA update is passed. 30 On air: Case study A radio network made certain its cloud was defended. 33 Help wanted: Hiring crisis Recruiters say that corporations need to rethink their defenses to address critical talent shortages. 36 Making the grade: Case study Kristi Carrier P15 © 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual Property and/or AT&T affiliated companies. Craig Shumard P50 Recorded Futures P45 A Chicago-area high school found a solution to broaden its internet pipeline and maintain compliance. Cover photo by David Torrence Photography SurfWatch Labs P47 SC Magazine™ (ISSN No. 1096-7974) is published monthly, 10 times a year, with combined December/January and July/ August issues, by Haymarket Media Inc., 114 West 26th Street, 4th Floor, New York, NY 10001 U.S.A.; phone 646-638-6000; fax 646-638-6110. Periodicals postage paid at New York, NY 10001 and additional mailing offices. POSTMASTER: Send address changes to SC Magazine, P.O. Box 316, Congers, NY 10920-0316. © 2015 by Haymarket Media Inc. All rights reserved. Annual subscription rates: United States: $98; Canada and Mexico: $110; other foreign distribution: $208 (air service). Two-year subscription: United States: $175; Canada and Mexico: $195; other foreign distribution: $375 (air service). Single copy price: United States: $20; Canada, Mexico, other foreign: $30. Website: www.scmagazine.com. Haymarket Media uses only U.S. printing plants and U.S. paper mills in the production of its magazines, journals and digests which have earned Chain of Custody certification from FSC® (Forest Stewardship Council®), SFI (Sustainable Forestry Initiative) and from PEFC (Programme for the Endorsement of Forest Certification Schemes), all of which are third party certified forest sustainability standards. www.facebook.com/SCMag www.scmagazine.com/linkedin www.twitter.com/scmagazine Editorial It’s going to take savvier preparation P utting aside the continuous debate on attribution of the Sony breach and, now, the discourse on possible regulatory and legislative outcomes quickly glomming onto the massive media attention this incident garnered, I think it’s important to look at a few other practical takeaways from this headlinegrabbing attack. I’m not at all minimizing the importance of keeping a close watch on federal government and congressional leaders’ use of the Sony hack to push whatever specific agendas they may have – such as resurrecting a range of measures that could give government bodies the legal means to access private data about individuals without search warrants; exempt them from citizen-protecting oversight measures, like Freedom of Information Act requests; arm them with the ability to furnish any entity that shares desirable data with them immunity from prosecution; and more. Indeed, the political, philosophical, privacy-right, U.S./nation staterelation and other potential ramifications of this breach must be monitored closely. Putting all these concerns aside, though, a key realization for cybersecurity pros and their executive leaders alike should be to acknowledge the need for a well-practiced crisis management plan and an examination and investment in security analytics/threat intelligence gathering solutions and procedures. As we highlight in this edition’s cover story and our Emerging Products reviews, these areas are vital to helping organizations deal with the intensifying threat landscape that hallmarked last year and will continue to be the major characteristic of this one. It’s because of this fact that analyst firms like Gartner call out as a major technology trend for 2015 more thorough, well-planned data analytics and security initiatives that give organizations’ CISOs and their teams actionable security intelligence to battle known and unknown threats. This data, in turn, not only might help prevent attacks, but also aid them in mitigating the impacts of a breach when it does happen. Reducing the time it takes to detect a network infiltration should help security teams reduce the damage it may cause and more handily implement and adhere to that crisis/business continuity management plan we discuss in our feature pages. The complexities of cyberattacks likely will grow, impacting companies, private citizens, government agencies and the U.S.’s relations with other nations in ways we’ve yet to imagine. The imaginable, meantime, reveals that there are areas for most companies to improve upon, lessons to be had from the many organizations victimized so far, and steps and supporting technologies to implement that will enable all the preparations needed to best manage and endure the calamity of the now inescapable breach. WILL hurt you It’s time to better educate yourself on all the latest in cybersecurity. Visit our Whitepaper Library and learn more about what you WILL need to know. Illena Armstrong is VP, editorial of SC Magazine. ...a major technology trend for 2015: more thorough data analytics...” 4 SC • February 2015 • www.scmagazine.com What you don’t know whitepapers.scmagazineus.com SC CONGRESS 24/7 SC Magazine has created a free virtual environment that is open year-round. Each month we host online events focused on subjects that you – as an IT security professional – face on a regular basis. FEB. 12 SIEM Deploying and managing security information and event management systems can tax the brain and 12 budget. However, if done right, these solutions can be a huge benefit to the overall security stance of an organization, providing insight into what’s happening on the entire network and enabling security teams to focus on the most pressing priorities. We explore the many challenges organizations face when deploying SIEM and offer remedies that can optimize their use. UPCOMING WEB APPLICATION SECURITY We talk to experts about the trials of safeguarding web apps, finding out practical steps for protecting this entré into business networks. PCI COMPLIANCE The implementation of chip-and-PIN technologies should alleviate some threats presented by magnetic-strip technologies, but will it be enough to prevent further data breaches? FOR MORE INFO For information on SCWC 24/7 events, please contact Jourdan Davis: [email protected]. For sponsorship opportunities, email Mike Alessie at mike.alessie@ haymarketmedia.com or phone him at (646) 638-6002. Or visit scmagazine. com/sc-congress-247-whats-new/ section/1223/. SC MAGAZINE EDITORIAL ADVISORY BOARD 2015 Rich Baich, chief information security officer, Wells Fargo & Co. Greg Bell, global information protection and security lead partner, KPMG Christopher Burgess, CEO/president, Prevendra Jaime Chanaga, managing director, CSO Board Consulting Rufus Connell, research director, information technology, Frost & Sullivan Dave Cullinane, CEO, Security Starfish; former chief information security officer, eBay Mary Ann Davidson, chief security officer, Oracle Dennis Devlin, chief information security officer, chief privacy officer and senior vice president of privacy practice, SAVANTURE Gerhard Eschelbeck, chief technology officer and senior vice president, Sophos Gene Fredriksen, global information security officer, PSCU Maurice Hampton, director, field operations, Qualys Paul Kurtz, partner and chief operating officer, Good Harbor Consulting Kris Lovejoy, general manager, IBM Security Services Tim Mather, chief security officer, Apigee Stephen Northcutt, director, The SANS Institute Randy Sanovic, owner RNS Consulting; former general director, information security, General Motors * Howard Schmidt, partner, Ridge-Schmidt Cyber Ariel Silverstone, chief security officer adviser, GNN; former chief information security officer, Expedia Justin Somaini, chief trust officer, Box; former chief information security officer, Yahoo Craig Spiezle, executive director and president, Online Trust Alliance; former director, online safety technologies, Microsoft Amit Yoran, senior vice president, RSA, the security division of EMC * emeritus WHO’S WHO AT SC MAGAZINE EDITORIAL U.S. SALES VP, EDITORIAL Illena Armstrong [email protected] VP, SALES David Steifman (646) 638-6008 [email protected] ASSOCIATE EDITOR Teri Robinson [email protected] EAST COAST SALES DIRECTOR Mike Shemesh (646) 638-6016 [email protected] MANAGING EDITOR Greg Masters [email protected] WEST COAST SALES DIRECTOR Matthew Allington ONLINE EDITOR Marcos Colón [email protected] EVENT SALES DIRECTOR Mike Alessie (646) 638-6002 [email protected] SENIOR REPORTER Danielle Walker [email protected] ACCOUNT EXECUTIVE Ife Banner (646) 638-6021 [email protected] REPORTER Adam Greenberg [email protected] ACCOUNT EXECUTIVE Gabby Brown 646-638-6101 [email protected] ACCOUNT EXECUTIVE Jessica Andreozzi 646-638-6174 [email protected] SALES ASSISTANT Kelli Trapnell 646-638-6104 [email protected] MARKETING DIRECTOR Karen Koza [email protected] EDITORIAL ASSISTANT Ashley Carman (646) 638-6183 [email protected] SC LAB TECHNOLOGY EDITOR Peter Stephenson [email protected] SC LAB MANAGER John Aitken [email protected] LEAD REVIEWER Jim Hanlon [email protected] PROGRAM MANAGER Judy Traub [email protected] REGULAR CONTRIBUTORS James Hale, Karen Epper Hoffman, Stephen Lawton, Jim Romeo (415) 346-6460 [email protected] MARKETING MANAGER Rochelle Turner [email protected] LEAD GENERATION CAMPAIGN MANAGER Jennifer Brous [email protected] SC MAGAZINE LIST RENTAL REACH MARKETING VP, MARKETING SOLUTIONS Wayne Nagrowski (845) 201-5318 [email protected] DESIGN AND PRODUCTION CIRCULATION ART DIRECTOR Michael Strong [email protected] AUDIENCE DEVELOPMENT MANAGER Richard Scalise (646) 638-6190 [email protected] PRODUCTION MANAGER Krassi Varbanov [email protected] SC EVENTS PROGRAM DIRECTOR, SC CONGRESS Eric Green [email protected] EVENTS DIRECTOR Adele Durham [email protected] EVENTS MANAGER Maggie Keller [email protected] ASSOCIATE MANAGER, VIRTUAL EVENTS Jourdan Davis [email protected] 6 SC • February 2015 • www.scmagazine.com SENIOR MARKETING MANAGER Edelyn Sellitto (646) 638-6107 [email protected] SUBSCRIPTION INQUIRIES CUSTOMER SERVICE: (800) 558-1703 EMAIL: [email protected] WEB: www.scmagazine.com/subscribe MANAGEMENT CEO, HAYMARKET MEDIA Lee Maniscalco COO John Crewe You’ re invited! 2015 SC Awards Tuesday, April 21, 2015 InterContinental San Francisco Visit awards.scmagazine.com to view the finalists and book tickets. DataBank ThreatReport Cybercriminal activity across the globe, plus a roundup of security-related news ONTARIO, CANADA – It seemed ST. LOUIS – St. Louis Parking Company announced that customer credit and debit card information was compromised. Customers who used its public parking lot at Union Station between Oct. 6 and Oct. 31 may have been impacted. The affected server was identified and isolated to avoid any additional data from being compromised. MEXICO – Government and academic websites in Mexico were taken down or defaced, or were redirecting visitors to another webpage. The attacks were reportedly carried out by members of Anonymous protesting how the government handled the abduction of 43 students. that Ontario government websites were hacked, but in actuality the third-party domain routing service that routes traffic to the government’s site was compromised. No personal information or any government data was compromised. MASSACHUSETTS – TD Bank agreed to pay a $625,000 settlement in the aftermath of a March 2012 data breach that occurred when two unencrypted backup tapes went missing during a courier run between its offices in Haverhill and Springfield, Mass. The breach impacted more than a quarter of a million consumers across the country, including more than 90,000 in Massachusetts. Colored dots on the map show levels of spam delivered via compromised computers (spam zombies). Activity is based on the frequency with which spam messaging corresponding with IP addresses is received by Symantec’s network of two million probes with a statistical reach of more than 300 million mailboxes worldwide. HIGH-LEVEL ACTIVITIES MEDIUM-LEVEL ACTIVITIES LOW-LEVEL ACTIVITIES RUSSIA – Group-IB and Fox-IT jointly released a report on Anunak, a group of hackers targeting banks and ATMs, payment providers, retailers and news, media and PR companies. The average theft in Russia and Commonwealth of Independent States (CIS) for Anunak is $2 million per incident. IRAN – Security company Cylance identified a hacker group out of Iran that has been steadily amassing information from infrastructure-related companies, possibly in preparation for an attack. The group is believed to have infiltrated more than 50 organizations in 15 industries in 16 countries. SOUTH KOREA – Researchers with Trend Micro identified a wave of banking trojans targeting several banks in South Korea that use Pinterest as their command-and-control channel. Users in South Korea were observed becoming infected by visiting compromised websites leading to exploit kits. AUSTRALIA – New ransomware with China top producer of zombie IP addresses For the period reported, the EMEA region (Europe, Middle East, Africa) was the leading source of all zombie IP addresses. Of the countries making up the EMEA, Russia was the top-producing country. For the other regions the top producers were Argentina in South America, the U.S. in North America and China in the Asia-Pacific region. Source: Symantec 8 SC • February 2015 • www.scmagazine.com the name ‘CryptoLocker’ – with a low detection rate on VirusTotal – is being delivered via emails that purport to come from the State Debt and Recovery Office in Australia. The email claims that the recipient was caught driving in excess of the speed limit and must pay a fine. www.scmagazine.com • February 2015 • SC 9 DataBank ThreatStats Zombie IPs Global distribution 11/25/14 12/2/14 12/9/14 12/16/14 12/23/14 Source: Fortinet Iran Vietnam Top countries By attack volume Asia Pacific 4.2B 6.5 6.0 5.5 5.0 4.5 4.0 3.5 3.0 2.5 2.0 1.5 1.0 09/14 10/14 11/14 12/14 The index queries information security industry professionals monthly to gauge their perceived risk to the corporate, industrial and governmental information infrastructure from a spectrum of cyber security threats. A higher index value indicates a perception of increasing risk, while a lower index value indicates the opposite. Source: ICS, www.cybersecurityindex.com 10 SC • February 2015 • www.scmagazine.com United States 74% UK 9% Africa & Middle East 1.4B North America 08/14 5. Bugat/Cridex/Feodo trojan (goes by all three names) SMS spam Volume by month for each region South America 07/14 Argentina There were 8,311,693 attacks in the United States last month, primarily originating from New York; Atlanta; Ashburn, Va.; Dallas; Redmond, Wash. There were 22,577,795 foreign attacks last month, primarily originating from Amsterdam; Tokyo; Moscow; London; and Sao Paulo. Source: Dell SecureWorks Source: Privacy Rights Clearinghouse (data from a service provided by DataLossDB.org, hosted by the Open Security Foundation) 04/14 05/14 06/14 Taiwan Europe 2.9B Rate of change (continuously compounded) 03/14 Russia (as of Jan. 15) Index value 01/14 02/14 China Zombie IP addresses are recorded in CYREN’s database as having sent spam in the past 24 hours. These are infected computers (zombies) that are unknowingly sending spam. Based on the IP address, the company can determine the country of the spam-zombie and then sums up the spamzombies per country. Source: CYREN (formerly Commtouch Software Online Labs) Index of cyber security Perceived risk 2,550 2,450 2,350 2,250 2,150 2,050 1,950 1,850 1,750 1,650 1,550 1,450 3. Rerdom trojan 4. Allaple.A worm India 47 2. Butterfly bot 3.3% 11/18/14 Top 5 attacks used by foreign hackers 3.7% 11/11/14 5. Allaple.A worm 1. ZeroAccess trojan TOTAL number of records containing sensitive personal information involved in breaches in the U.S. since January 2005: 932,729,111 4. Asprox/Danmec trojan (trojan goes by both names) 3.8% WellCare Residents were notified by WellCare Health that some of their Health Plans personal information was exposed when their Medicare reMonroe County, N.Y. cords were “mishandled” by a sub-contractor for the insurer. 3. ZeroAccess trojan 3.9% 55,000 12.3% Highlands-Cashier hospital in North Carolina informed patients of a data breach to its servers that contained patient data. The disclosure of the data was due to an error by one of their third-party vendors, TruBridge, a subsidiary of Computer Programs and Systems, when they were contracted to complete some specialized computer services. 2. Rerdom trojan 12.6 HighlandsCashier Hospital Highlands, N.C. 10.6 Millions 1. Upatre Downloader trojan 7.5% A group calling itself “LizardSquad” hacked both gaming networks on Christmas Day. According to Krebs on Security, the attack prevented millions of users from playing the past holiday season. 8.1 Sony Play Station, Microsoft xBox Networks 8.0% 949,528 936,675 924,629 916,577 906,268 896,589 Type of breach 7.2% December average of daily Android samples 971,416 November average of daily Android samples 1,335 Number of records Name 6.4% mobile malware 10.7% Top breaches in December Data loss Monthly evolution of 1,328 10.1% Upatre Downloader trojan was the leading attack used by U.S. hackers Top 5 attacks used by U.S. hackers Nov. Dec. The U.S accounted for nearly 75% of attack volume in November 2014, followed by the U.K., Canada and South Africa. Canada 4% 892.9M South Africa 3% 852.2M 0 1B 2B 3B 4B 5B 6B 0% 20% 40% 60% Source: Cloudmark 80% Source: RSA Monthly Fraud Report Internet dangers Top 10 threats Name Movement First observed Type Last month Months on list p 12/03/10 virus 10 5 Same 09/17/14 downloader 2 2 1. RAMNIT.I 2. OGIMANT.GEN!C 3. ELKERN.B p 05/16/12 virus 6 12 4. PICSYS.C p 01/08/11 worm 1 14 5. TUGSPAY.A p 07/07/14 downloader 5 7 6. LMIR.AAV p 02/14/11 passwordstealer 0 0 7. SOLTERN.L 01/08/11 worm 12 1 8. RAMNIT.J p 12/07/10 virus 0 0 9. GUPBOOT.B p 01/31/13 bot 1 17 10. LORING p 02.06/11 downloader 9 19 Source: Motive Security Labs (formerly Alcatel-Lucent Kindsight Security Labs) www.scmagazine.com • February 2015 • SC 11 Update 2 minutes on... Tidal waves of spoofed traffic P14 Me and my job Reviewing the efforts of security engineers P15 NEWS BRIEFS Information security analyst in healthcare P15 Under attack » The Canadian government has introduced Bill C-51, an ‘antiterror’ bill that will broaden the surveillance powers of government agencies. The law, which is the largest revision of Canada’s security laws since it responded to the 9/11 attacks, revises several other pieces of legislation, including the CSIS Act that governs the country’s national intelligence service. Among the measures introduced are the right to force ISPs to remove information deemed to be promoting terrorism. The bill also enacts two new laws: the Security of Canada Information Sharing Act and the Secure Air Travel Act. The former empowers Canada’s government institutions to share information on Canadians. These agencies range from the domestic CSIS intelligence agency and the Communications Security Establishment (CSE) foreign-focused spy agency, through to the RCMP, the Canadian Border Services Agency and the Department of Foreign Affairs. Canada’s Privacy Commissioner Daniel Therrien responded negatively to the bill’s informationsharing provisions. “It is not clear that this would be a proportional measure that respects the privacy rights of Canadians,” he said. Therrien added that the privacy problems created by the information sharing measures could be exacerbated by gaps in the national security oversight regime. “Three national security agencies in Canada are subject to Skills in demand A third of security professionals polled believed that a loss of intellectual property had caused a lack of competitive advantage. dedicated independent oversight of all of their activities,” he said in a statement. “However, most of the organizations that would receive and use more personal information THE QUOTE ...the breach at Sony may have been led by former Sony employee(s)...” – Eric Chiu, president and cofounder, HyTrust 12 SC • February 2015 • www.scmagazine.com under the legislation introduced today are not.” »One of Canada’s intelligence agencies has been secretly monitoring file downloads across the world for years, it was revealed last month. The Communications Security Establishment (CSE) has been analyzing metadata on 10-15 million downloads from filesharing sites each day. The top secret initiative, called LEVITATION, targets 102 filesharing sites, in a bid to discover people linking documents to terrorist activity. Of the downloads discovered, it finds about 350 “interesting” downloads each month from around 2,200 URLs, said the report. CSE analysts would gather infor- Canada’s companies are ill-prepared to meet modern cybersecurity challenges, according to a survey by the Ponemon Institute. Only one in four believe that they are winning the cybersecurity war, said the survey of 623 IT and security practitioners commissioned by IT services firm Scalar Decisions. Almost half of all respondents experienced an attack in the last year that exposed sensitive information. mation including the downloader’s IP address and the browser and operating system that they were using. They would also correlate other data with the IP address to gain social media IDs. It would result in an ordered list of suspects that would then be delivered to a third party. Successes from the project included determining an Al-Qaeda group’s hostage strategy, said a leaked Powerpoint presentation, in addition to finding a hostage video from a previously unknown target. Details of the campaign came from The Intercept, an online publication designed as a platform to leak information from the Edward Snowden documents, edited by journalist Glenn Greenwald, one of his original contacts. Debate» Mobile malware is a real threat to mobile security. FOR Mobile devices are spreading at phenomenal rates, with more than 90 percent of people using a mobile phone and 2.3 billion accessing the web from mobile devices. However, they are very attractive targets for criminals Aaron Cockerill – mobile malware grew 20 perVP of enterprise product, Lookout cent last year. Mobile devices are the weakest point in the enterprise IT ecosystem, providing a means for app-, device- and network-based attacks. In fact, mobile devices are the least secured aspects of cloud-based APIs. Because the flood of smartphones and tablets employees are bringing to work are typically personal, IT does not get to manage them. Employees use the devices to access confidential documents one minute and untrustworthy social apps the next. Mobile devices are tied to the individual, making spear phishing and other targeted malware attacks particularly frightening: If attackers want to get data from a company’s Salesforce. com account, their easiest avenue of attack is to target the phone of the head of sales. Mobile is becoming the dominant platform for access to cloud-based computing and it requires specific protection that traditional security solutions simply don’t address. AGAINST Enterprises continue to produce more web applications in order to drive their businesses. Yet their inability to scale current application security programs means only business-critical applications are audited for Chris Wysopal security. This leaves a significant co-founder, CTO and CISO, Veracode number of web applications vulnerable, creating long-term security threats as cybercriminals attack the path of least resistance into an IT infrastructure, without regard to whether the application is business critical or a little-used website. While mobile devices can leak data, they don’t put bulk data and infrastructure at risk. Because of this, mobile isn’t the biggest threat to enterprise security – web applications are. Research shows that in 2015 enterprises will leave up to 70 percent of internally developed web and mobile applications unaudited for common vulnerabilities such as SQL injection. While enterprises will produce both mobile and web applications, it is unchecked or forgotten web applications that provide a breach path to sensitive data like corporate IP or customer information. Security testing of all web applications should be the number one security priority. THE SC MAGAZINE POLL No 62% Yes 38% To take our latest weekly poll, visit www.scmagazine.com Compromise, Exfil, Wipe, Repeat What is it? The recent Sony breach has shown us a new potential future for attacks on computer networks that results in an organization being compromised, massive data exfiltration and finally systems being disabled. How does it work? What is different is what attackers do once they get a foothold in your environment. For example making the goal to get Domain Admin credentials in a Windows environment for complete compromise vs. just hunting out the SQL server that stores sensitive data. Dec. 14 Should I be worried? You should be worried in the context that most existing compromises related to cybercrime result in a level of access that such exfil and wipe scenarios could also have happened. Dec. 22 How can I prevent it? Once attackers break in you must raise the bar to detect them earlier on vs. make their job easier by storing password after password in plaintext readable files. THE STATS Is it the media’s duty to inform the public of the contents of documents leaked by hackers? THREAT OF THE MONTH Sony litigator David Boies demands media delete stolen information provided by hackers Guardians of Peace. Thousands of emails are stolen from Sony Pictures CEO Michael Lynton and released by Guardians of Peace. — Marc Maiffret, chief technology officer, Beyond Trust www.scmagazine.com • February 2015 • SC 13 Update 2 MINUTES ON... Tidal waves of spoofed traffic W hile massive retail breaches dominated headlines in 2014, with hacks involving statesponsored threats coming in a strong second, distributed denial-of-service (DDoS) attacks continued to increase, both in the volume of malicious traffic generated and the size of the organizations falling victim. Recently, both the Sony PlayStation and Xbox Live gaming networks were taken down by Lizard Squad, a hacking group which is adding to the threat landscape by offering for sale a DDoS tool to launch attacks. The Sony and Xbox takedowns proved that no matter how large the entity and network, they can be knocked Briefs offline. Even organizations with the proper resources in place to combat these attacks can fall victim. But looking ahead, how large could these attacks become? According to the “Verisign Distributed Denial of Service Trends Report,” covering the third quarter of 2014, the media and entertainment industries were the most targeted during the quarter, and the average attack size was 40 percent larger than those in Q2. A majority of these insidious attacks target the application layer, something the industry should be prepared to see more of in 2015, says Matthew Prince, CEO of CloudFlare, a website performance firm that battled a massive DDoS attack on Spamhaus early last year. Of all the types of DDoS attacks, there’s only one Price describes as the “nastiest.” And, according to the “DNS Security Survey,” commissioned by security firm Cloudmark, more than 75 percent of companies in the U.S. and U.K. experienced at least one DNS attack. Which specific attack leads that category? You guessed it. “What is by 50% of all DDoS attacks targeted media and entertainment Source: Verisign far the most evil of the attacks we’ve seen…[are] the rise of massive-scale DNS reflection attacks,” Prince said. By using a DNS infrastructure to attack someone else, these cyber assaults put pressure on DNS resolver networks, which many websites depend on when it comes to their upstream internet service providers (ISP). Believing these attacks are assaults on their own network, many ISPs block sites in order to protect themselves, thus achieving the attacker’s goal, Prince said. By doing so “we effectively balkanize the internet.” As a result, more and more of the resolvers themselves will be provided by large organizations, like Google, OpenDNS or others, says Prince. That in itself could lead to an entirely different issue: Consolidating the internet. – Marcos Colón JOBS MARKET Me and my job Kristi Carrier quality auditor, Nuspire Networks How do you describe your job to average people? I’m a quality auditor at Nuspire Networks, a managed security service provider. In my role, I’m responsible for reviewing the performance of our security engineers to ensure network security events are being diagnosed and acted upon in a timely manner that supports best practice and adheres to established guidelines. What was one of your biggest challenges? Overcoming the general lack of education and concern regarding the need for network security. The aftermath of a security breach isn’t pretty and it’s paramount for organizations to not only understand network and security vulnerabilities, but also implement the necessary safeguards to mitigate such risks. What keeps you up at night? Knowing the threat landscape is radically progressing and attacks are becoming increasingly difficult to predict and anticipate. Why did you get into IT security? It’s a space where you must stay one step ahead of offenders who are constantly employing more sophisticated threats – meaning there’s always a new problem to solve. While challenging, I immensely enjoy developing solutions to address evolving threats. Not to mention, it’s very rewarding to be involved in the creation of an effective security solution. What makes you most proud? I’m most proud to work in a field that enables others to securely utilize the many advantages offered by technology. How would you use a magic IT security wand? I’d use it to enlighten others of the need for implementation of effective network security safeguards. Specifically, pairing security information and event management (SIEM) with an effective security operations center (SOC) can be the most effective line of defense for network security. Skills in demand An information security analyst in a healthcare environment is responsible for vulnerability assessments, developing and managing information systems security – including disaster recovery, network protection and identity access management. What it takes In-depth experience with healthcare systems and a strong knowledge of HIPAA regulations and overall IT system security, including infrastructure, software, apps, audit and compliance. It is also critical to communicate well with the highest levels. Compensation Base compensation will range from $90K-$120K, often with additional incentives. – Domini Clark, principal, executive and technical recruitment, Blackmere Company news » Rick Wescott has joined Redwood City, Calif.-based ThreatStream, a SaaS-based cybersecurity threat intelligence platform, as vice president of worldwide sales. W. Todd Helfrich also has joined the company as director of federal sales. Wescott will be responsible for making sure the sales organization meets its goals and also for sales enablement, sales forescasting and strengthening the sales purchasing process. Helfrich will build the federal business and help identify and Rick Wescott, vice president of worldwide sales, ThreatStream close new federal opportunities. Both men have extensive experience in the security field, with Wescott most recently working 14 SC • February 2015 • www.scmagazine.com at ArcSight and Helfrich most recently working at HP on the Department of Homeland Security account. work on its core threat exposure management portfolio. »Rapid7, a Boston-based based provider of website security and PCI compliance, has partnered with GlobalSign, the security division of GMO Internet Group. GlobalSign, a identity services provider, will bundle SiteLock’s website security products with solutions for customers who purchase specific SSL certificated in certain markets, including Latin America. security analytics software and services provider, has secured $30 million in additional funding from its investors, Bain Capital and Technology Crossover Ventures. The investment will help Rapid7 maximize on growth opportunities and build better enterprise security programs. The company will also continue to 12 patents, with 12 more pending, Curry comes to Arbor from MicroStrategy and RSA. He will lead Arbor’s product strategy and innovation roadmap. »SiteLock, a Scottsdale, Ariz- »Brandon Hoffman has Sam Curry, CTO and CSO, Arbor Networks »Arbor Networks has appointed Sam Curry as its new CTO and CSO. A well-regarded industry technologist holding joined Somerset, N.J.- based Lumeta, a network situational awareness platform provider, as CTO. Hoffman will focus on business development and strategic relationships with technology integration partners, consulting/advisory firms, cloud service providers, managed security providers and federal systems integrators and channel partners. He will report to CEO Pat Donnellan, Previous to joining Lumeta, Hoffman worked as the federal CTO at RedSeal, where he helped define solutions and strategies to serve top government priorities. »iSIGHT Partners, a Dallasbased provider of cyberthreat intelligence for global enterprises, has closed a $30 million Series C equity-financing round with Bessemer Venture Partners, which has helped finance eight other cybersecurity firms. The investment will allow iSIGHT to expand its advanced threat intelligence to fight against cyberattacks. The funding also will aid in developing new integration partnerships and buildup the company’s sales and marketing engine. Follow us on Facebook, LinkedIn and Twitter www.scmagazine.com • February 2015 • SC 15 Opinion From the CSO’s desk Breach response: Are you prepared? Jonathan Lewis director, product marketing, SSH Communications Security B ViJay Viswanathan I t’s not a question of if but rather when a breach will occur. The number of U.S. data breaches tracked in 2014 reached a record high of 783, according to a recent report released by the Identity Theft Resource Center. While the larger incidents received a lot of spotlight, the fact remains that exposure of a single record still constitutes a data breach. With a 27.5 percent increase in incidents since the year previous, it’s imperative for organizations of any size to develop a functional breach response plan (BRP). The best place to start: Your existing incident response plan. How do you manage and address a malware infection or how do you address unauthorized or elevated role privileges? Streamline your incident plan with clear IT security operational definitions, develop a detailed inventory of every asset within your network and establish network entry and exit points. All these should ideally exist, but you firm that not only has specific experience but also the necessary scale and operational dimension to support parameters of your organization. Most importantly, establish a retainer and leverage the retainer for a possible annual BRP exercise. A strong crisis management team will be a crucial differentiator during an active incident. This team would ideally include your internal and external communications team along with other stakeholders from the breach response team. Timely, precise and appropriate communication could alter the perception of a breach incident in any direction. Finally, cyber insurance coverage may be appropriate for your organization and will also provide additional benefits, such as pen tests and access to a breach coach based on your vendor and coverage. The only right thing about a breach is the fact that you are prepared for it. Practicing these exercises makes it perfect. also want to look at it from a different viewpoint: Indicators of compromise (IOC). As a start, establish IOCs for high value targets (HVT) and build your inventory and focus on keeping it up to date. Before you can actually draft your plan, you need to consider a breach response team. Develop a discussion platform to specifically talk about breach management with key constituents within the organization – legal, information security, IT, risk management, privacy and compliance and other relevant stakeholders. One of the key aspects of the BRP is to identify an external legal counsel who will partner with you effectively during an active incident. Consider a legal counsel with experience as breach coach with strong exposure to handling different types of security incidents and who can engage collaboratively with state attorneys general and federal regulators. Next, engage a forensics ig Data is arguably one of the killer apps to emerge over the past decade. The technology originated from a technique developed by Google called MapReduce, which uses parallel processing to generate analytics from massive amounts of data. An open source version of MapReduce, called Hadoop, has effectively “democratized” the availability of Big Data. With this easy-to-use platform, enterprises are finding new ways to solve problems and extract value from data. However, Big Data analytics often involve access to data that should be protected, such as medical records, tax information and personally identifiable information (PII). Security and compliance professionals need to ensure Big Data deployments do not violate access control policies with respect to this information. Within a Hadoop infrastructure there are several levels of authorization, including access to the Hadoop cluster, intercluster communications and access to the data sources. Many of these authorizations are based on Secure Shell (SSH) because the authentication protocol is considered secure and has good W Rich Boyer senior information security architect, NTT Com Security 30seconds on... »Breach plan The first step in creating a breach management strategy is to organize a breach management team before developing a plan, says ViJay Viswanathan. »Hire the right help The next step is to identify an external counsel and a breach coach, says Viswanathan. Following that, retain a forensic firm that can scale as needed, he says. 16 SC • February 2015 • www.scmagazine.com »The CISO runs with it Structure your crisis management team, he advises. And, he says that the company’s CISO should drive breach management exercises to optimize the plan regularly. »Get functioning As well, establish a time-boxed approach to create a functional breach response plan that can be exercised similar to a disaster recovery or business continuity plan, he says. support for automated machine-to-machine (M2M) communication. The access control issues are straightforward: First, who sets up the authorizations to run Big Data analytics? Next, we need to ask how are those authorizations and credentials managed and what happens when there are personnel changes? As well, we must determine whether authorizations are based on “need to know” security principles. To protect sensitive information accessed by Big Data analytics, the following best practices are recommended: • Discover: Take an inventory of the authorizations and identities within the Big Data environment. • Monitor: Track the use of those identities. Find out which identities are not needed and can be removed. • Manage: Establish centralized control over identity management in the Big Data environment. Big Data has opened up new access to business-critical data. Organizations need to keep pace with resulting security concerns and bring Big Data under a sound identity and access management umbrella. Are mobile apps risky business? Photo by Chris Volpe/zuma CISO, HD Supply Information privacy & Big Data ...businesses must stay one step ahead of hackers.” hile the enterprise software market is predicted to grow to $4.5 billion by 2016, the increasing prevalence of mobile applications is exposing new security holes for businesses. Having an app for everything brings many benefits, but also entices hackers to target apps as gateways to valuable data. Businesses must meet the associated security challenges head-on with structured approaches. Both mobile and enterprise technology are exciting, well-funded IT sectors. But it’s where mobile and enterprise meet that we find the most profitable sector of all: mobile apps. The rise of mobile has fuelled the trend towards BYOD (bring-your-own-device) as well as in-house developed applications. Apps help enterprises build identity and engage customers, as well as increase efficiency. But just as the web brought new IT security challenges, applications present fresh risks to business. Collaborative app development poses threats to unencrypted code which could unlock login details of cloud services – and ultimately corporate networks. Development risks must be managed in the context of commercial objectives, but businesses must stay one step ahead of hackers. Over a defined lifecycle, businesses must: review corporate architecture to address all vulnerabilities; understand compliance requirements and ensure security is built-in from the very start; use best practices and tested secure modules wherever possible; test and test again in-line with emerging threats; and perform configuration management to maintain consistent application performance. It’s inevitable that hackers will target intellectual property stored during app development. By addressing these complex risks, businesses will create secure applications with confidence. As a result, they’ll benefit from innovative ways to interact, without worries over unlocked back doors. www.scmagazine.com • February 2015 • SC 17 Analysis Letters Got something to say? Send your comments, praise or criticisms to [email protected]. We reserve the right to edit letters. From the online mailbag In response to a Nov. 24 Opinion: PCI 3.0: The good, the changes and why it’s not ugly, by Greg Rosenberg, security engineer, Trustwave The part I don’t understand: Do they [third-party service providers, online retailers and merchants] keep the credit cards numbers in clear text to start with? Even some simple encryption would help limiting the exposure. Even better, when the card system does the authorization for the repeated use (such as an automatic bill pay), it should be fairly easy to generate a hash that includes both the number of the credit card and the merchant ID and use it for any future transaction. It’s like issuing a one-time credit card that can be used only by this particular merchant. Sergey Babkin In response to a Nov. 14 news story, U.S. spy program targeting Americans’ mobile phones, report says: Professor Hayes is naïve in his comment: “Ultimately, the FBI and similar agencies have no inclination or even the resources to analyze the general public’s communications and are only interested in finding criminal suspects.” He has left specific groups and people who are not criminals that members of the U.S. government want to target, such as the abuses by the IRS reported over the last couple of years, as well as the more recent revelations that the White House was illegally receiving confidential tax return information from the IRS. Dirk Bell Ok...Tell me something I didn’t know. You would have to be naïve to think that the government is not tracking your cellular data, location and anything else they can glean from the electronic leash that most of us carry. And don’t get me started on the new driver’s license/ID card systems in place since 9/11. Everything about you has been declared “open season,” and your only choices are: a) get rid of everything and fall off the grid; or b) get used to it. Philip Scott In response to a Nov. 20 news story, USPS draws ire of Congress over data breach response: If Congressman Stephen Lynch [D.-Mass.] is so concerned about the U.S. Postal Service employees, then why doesn’t he get the “postal reform” bill passed? # just saying Chuck Roche 18 SC • February 2015 • www.scmagazine.com In response to the November Debate: Should you pay a cyber ransom?: Paying $500 is often less costly than losing business and serves as a reminder that security practices need to be kept up to date. Investing in prevention is different than paying for resolving the issue. Sergio Galindo Completely disregarding the option of paying ransom does not take into account that many organizations with ransomware infections are confronted with backup that turn out not to work, and lose weeks, months (or more) of work. Paying $500 to get your files back is a business decision that’s not hard to make in a situation like that. It also serves as a shot across the bow to get your best practices truly applied, which means step your users through effective security awareness training so that future ransomware infections are much less likely. Stu Sjouwerman In response to a Nov. 10 news story, Mobile fraud report notes reliance on OTPs as top concern: OTPs are generally run on tokens or phones, which are easily lost, stolen and abused. Then the password would be the last resort. It should be strongly emphasized that a truly reliable two-factor solution requires the use of the most reliable password. At the root of the password headache is the cognitive phenomena called “interfer- ence of memory,” by which we cannot, on average, firmly remember more than five text passwords. What worries us is not the password, but the textual password. The textual memory is only a small part of what we remember. We could think of making use of the larger part of our memory that is less subject to interference of memory. More attention could be paid to the efforts of expanding the password system to include images, particularly known images, as well as conventional texts. Hitoshi Anatomi In response to a Nov. 21 news story, ‘DoubleDirect’ MitM attack affects iOS, Android and OS X users: “...traffic from Google, Facebook, Twitter, Hotmail, Live. com, and Naver (a Korean internet company) was detected as being redirected using the technique.” All those domains implement HTTPS, rendering the attack useless. Antoun Beyrouthy In response to a Nov. 7 news story, Slew of black marketplaces, including Silk Road 2.0, go dark in Fed sweep: I love that [Homeland Security Investigations, an investigative arm of the U.S. Department of Homeland Security] used social engineering to gain access. Robert Emmons The opinions expressed in these letters are not necessarily those of SC Magazine. Usability as a protection feature Usability as well as security must be factored into the equation, says Signiant CTO Ian Hamilton. P sychological acceptability may not sound like a term that’ll hold much significance for the future of secure file sharing. But don’t sell it short. The term refers to the concept that a system should be as easy to use in a secure state as in an insecure state – or users will default to the insecure state. In this era of cloud services, where users have a plethora of ready-to-use SaaS options, the psychological acceptability principle can be extended to say that secure services must be as easy to use as insecure services or users will gravitate to the insecure alternative. What should IT do about this problem? It can resort to the “big stick” approach of enforcing which tools can and can’t be used. But this is becoming less and less effective as teams are increasingly distributed and empowered by SaaS options. Information security leaders are finding that they have more success substituting “carrots” for sticks to guide users to the right solutions by choosing those that are easy for their constituents to use. Another corollary of the psychological acceptability principle is that human interfaces for security features must be easy to use so users don’t make mistakes in applying security features. If the user has to map their mental image of their protection goals into a convoluted technical model, they likely will either forgo protection or make mistakes applying it. File system access control (ACLs) are a classic example of exposing a flexible technical model without any abstraction. As a result, users simply don’t use file system ACLs – and if they do, they often don’t apply them correctly. Privacy controls in social media have attempted to address this by translating technical ACLs into plain English options that capture the resource being protected and the access right being given to a trustee. For example, choosing an option like “my contacts can see my contacts” makes your “list of contacts” (resource) “readable” (access right) to everyone in “your contact list” (trustee), rather than presenting it in some underlying highly flexible but also highly technical-based ACL model. Role-based access control approaches attempt to simplify underlying fine grain access controls through abstraction, but they often don’t address the fundamental problem of mapping the user’s mental image of the protection goals onto available options. Another related secure design principle is “secure by default.” One approach to making systems more usable is to disable security features in the default configuration. ...secure services must be as easy to use as insecure services...” To make the system secure, users must then enable specific security features. Often this allows a vendor to claim that the system is both secure and usable without investing in making security functions intuitive and easy to use. As the name implies, the “secure by default” design principle states that a system should default to the most secure state possible. That said, the definition is complex and needs to take into account user behavior when interacting with features. When users are forced to create complex passwords on a regular basis for every system they use, they often resort to reusing passwords and writing passwords down. Offering web-based single sign-on using an external identity provider as the default authentication option can be a more effective method of addressing password fatigue issues in infrequently accessed systems. Carrots work better than sticks. The time has come to fully embrace usability as an important aspect of security. By doing so, we can advance the security agenda and also make users happier and more productive at the same time. Ian Hamilton is chief technology officer of Signiant, a provider of technology solutions with U.S. headquarters in Burlington, Mass. www.scmagazine.com • February 2015 • SC 19 COOL Breach response IN A CRISIS Ron Green, CISO, MasterCard How you communicate during an attack is as important as your response, says Ron Green, CISO, MasterCard. Larry Jaffee reports. D ata on 70 million customers stolen, 76 million accounts affected, 44 lawsuits filed, 1.1 million customers exposed, 7 million business accounts compromised. That’s just some of the alarming damage done by data breaches at Target, Home Depot, Nieman-Marcus and JPMorgan Chase in 2014. 20 SC • February 2015 • www.scmagazine.com derailed the company’s operations for a full week that eclipsed other major hacks, and served as a lesson to Corporate America on how not to handle crisis communications by bungling relations with key stakeholders (e.g., employees, former employees, creative talent, theater owners) and damaging reputation nearly every step of the way (see sidebar, page 23). “How to communicate publicly is as important or more important in crisis situations,” says Jim Haggerty, CEO of Crisis Response Pro, a web-based entity for crisis and litigation Photo by David Torrence Photography And the fallout didn’t stop at those numbers. The year that can be viewed as the one where IT security finally got taken much more seriously by upper management was also characterized by C-suite shake-ups, security department reorganizations, lawsuits, high-level pink slips, disappointing financials and plummeting customer confidence. In other words, data breaches caught the attention of, well, the world – as did the way they were (and were not) handled. But it was the revelation before Thanksgiving when Sony Pictures was crippled by a breach that OUR EXPERTS: Handling the situation Daniel Fetterman, partner, Kasowitz Benson Torres & Friedman Ron Green, executive vice president and CISO, MasterCard Steven Grimes, partner, Winston & Strawn Jim Haggerty, CEO, Crisis Response Pro Tom Kellerman, chief cybersecurity officer, Trend Micro John Otero, security consultant; former lead, New York City Police Department’s computer crime squad Eric Warbasse, senior director, financial services, LifeLock www.scmagazine.com • February 2015 • SC 21 Breach response ...we know we had a breach.” communications whose clients include several financial firms that have had breaches in the past year. “There’s – Davia Temin, CEO, Temin and Company a sense in crisis situations that communications is the icing on the cake, it’s what you do after everything else. My view is communication is the cake.” when something happens.” Warbasse, senior director, financial Ron Green, MasterCard’s executive Davia Temin, a marketing, media and services for LifeLock, a Tempe, vice president and CISO, agrees. reputation strategist, crisis manager Ariz.-based provider of identity theft “Communications is usually the and CEO of Temin and Company, a protection. last thing that you’ve boutique management consultancy Further, public thought of,” he says. “But focused on reputation and crisis statements should not it’s the first thing the management, says technology experts speculate as to the public – your customers, often urge delaying the initial announceresponsible party. Hacked your clients and your ment until the security folks have had companies with potential investors – are going to time to learn more and maybe try to regulatory enforcement see. You have to prepare trace the culprit. “But that’s at odds with exposure especially “need and engage not just the public wanting to know the minute to be extremely careful what you’re going to do that their information may have been about what they say and from the security side; compromised,” she says, adding that ensure what they issue you have to know what the public has an expectation to know publicly is accurate,” you’re going to do from as soon as possible so they can change points out attorney the communications Davia Temin, CEO, Temin and Company passwords, etc. Temin advises clients Daniel Fetterman, a New side, and have prepared to communicate that: “We don’t know York-based partner with messaging.” the total parameters yet, but we know Kasowitz Benson Torres & Friedman, Typically, an organization’s IT we had a breach. We’re a national law firm security staff will handle incident doing everything humanly primarily focusing on response, but the responsibility and possible to close it and complex commercial effort can’t just lie with that team, understand the magnitude litigation, and a former Green points out. “Security for a of it. And we’ll be in federal prosecutor and company is not just the security team, continual contact with trial lawyer. it’s the whole company,” he says. When you.” In this day of social “In the rush to publicly it comes to executing that crisis plan, media and immediacy, get out a positive, people must be sure what their role and if you wait, it looks like reassuring story to make their position is, and what they should you’re stonewalling the stakeholders feel better, be doing, he adds. “You should always truth, she says. companies should proceed prepare like [a breach is] inevitable.” MasterCard’s Green cautiously and be careful Security consultant John Otero, agrees. “If you’re not not to get it wrong,” says who formerly led the New York City Steven Grimes, partner, confident about the Fetterman. Police Department’s computer crime Winston & Strawn information you’re going The consensus of our squad, cites the reverberations felt by to present, you shouldn’t present it. Let experts it that it behooves organizatop management everywhere following tions to have top management, legal, the Target CEO losing his job after everyone know you’re aware of it and are IT security and PR work together on a mismanaging the retail chain’s breach working diligently on it,” he says. message that strikes the proper balance. and the “black eye” the retailer As far as the legal ramifications, “You need to reassure the public that suffered. there’s quite a difference of opinion you have control of the situation,” says In the wake of siphoned employee about whether a breached company Haggerty at Crisis Response Pro. “Data personally identifiable information must follow law enforcement’s lead on breaches are becoming so common that (PII) and customer credit card numbers when information can be released to the they resemble product recalls in the auto public. or passwords, companies need to be industry, whereby a system or structure prepared with credit monitoring or Tom Kellerman, chief cybersecurity comes into play for proper notification identity protection services, notes Eric officer of Trend Micro, a developer 22 SC • February 2015 • www.scmagazine.com of security solutions, advises breach victims to ask the FBI and Secret Service, based on the stage of their investigation, when to notify the public. Not all experts agree with that strategy. Jonathan L. Bernstein, president of Bernstein Crisis Management, says waiting for the FBI or Secret Service before saying anything publicly doesn’t make sense. “I’ve worked on a lot of these,” he explains. “The FBI will always make that request, but the FBI is not responsible for protecting the reputation of the organization. The FBI doesn’t particularly care about the reputation of the organization. So the FBI’s request is the same as a lawyer who says, ‘don’t say anything because you’re risking liability.’ You have to look where is the biggest liability: court of law or court of public opinion.” Attorney Steven Grimes, a partner with the Chicago law firm Winston & Strawn, says it’s a case by case determina- ...you have to think about what you’re going to provide.” – Ron Green, EVP and CISO, MasterCard tion whether a hacked company will wait to hear from the authorities before telling the public anything. Litigation, he adds, is a very likely outcome. Hacked companies need to keep in mind various legal ramifications, such as the Federal Trade Commission (FTC) and states’ attorneys general bringing lawsuits, respectively, for their failure to provide adequate security measures and failure to report in a timely fashion in violation of data breach notification laws, Grimes points out. Ideally, attacked companies are working with a proper crisis response plan. “That doesn’t always happen,” he admits, noting that many companies TROUBLE FOR SONY: New poster child for breach crisis I n a Nov. 25 statement, Sony Pictures Entertainment announced it was investigating “an IT matter.” Since then, the hack has proven that fact can be stranger than fiction – even in Hollywood. That Sony Pictures did not anticipate vulnerabilities after producing a movie – The Interview – antagonistic to a volatile government should cause all organizations to pause and reassess whether they’re prepared for such a worst-case scenario. Obviously, Sony’s biggest failure was not protecting its intellectual property (including unreleased movies) and personal data (including employee PII and health records), especially in face of don’t reach out for outside legal help experienced in this area until later in the game, while in-house counsel didn’t have the required level of coordination. MasterCard’s Green adds that listening to the authorities makes sense so as not to say anything that’s going to upset or derail their investigation. “When you make your notification, you have to think about what you’re going to provide,” he says. Temin knows a CEO of a retailer who, after a hack, considered his biggest mistake was not that he didn’t get better systems or pay attention to vulnerabilities more closely early on. It was that he didn’t come out quickly enough. n a 2011 hack of its PlayStation Network affecting consumer data of 77 million users. As class-action lawsuits pile up, a source familiar with Sony says its insurance would cover losses associated with “incidents like this.” Only time will tell whether the company will be able to defend itself given the assertion by Mandiant CEO Kevin Mandia, “This was an unparalleled and well-planned crime, carried out by an organized group, for which neither Sony Pictures Entertainment nor other companies could have been fully prepared.” That Sony was so unprepared is curious considering that Sony Corp. general counsel Nicole Seligman – in charge of the company’s information security – has sat on the advisory board of the Council on CyberSecurity since 2013. It wasn’t until Dec. 15 that Sony Pictures posted a message on its website for current and former employees and dependents that the company had learned on Dec. 1 that their health PII may have been compromised. “[Sony] was slow in communicating, and it didn’t reflect an adequate level of compassion for the people who were the victims,” says crisis manager Jonathan Bernstein. “This is Crisis Management 101.” Bernstein considers Sony to be the biggest example of corporate incompetence in terms of reputation management. “If they were being graded, I’d give them an F in the crisis prevention category. And crisis response was mediocre at best.” – Larry Jaffee www.scmagazine.com • February 2015 • SC 23 Electronic elections CANADA’S INTERNET VOTING PROBLEM Many municipal officials are elected using the internet, even as some agencies prohibit the practice as insecure, reports Danny Bradbury. I n Canada, over two million voters had the option of voting for their mayors and local councilors via the internet last October. Next October, none of them will be allowed to vote for their MPs that way. Elections Canada, the organization that oversees the electoral process there, had originally planned for an internet voting trial in a by-election sometime between 2008-13. In 2012, it changed track, citing budget cuts and security issues. “Current internet voting systems carry with them serious, valid concerns about system security, user authentication, adequate procedural transparency and preserving the secrecy of the vote,” the group said in an April 2013 report exploring new voting models. There have been no moves toward internet voting at the provincial level, either. “The provincial governments would have to decide to move forward,” says Nicole Goodman, assistant professor of political science in the University of Toronto’s Munk School of Global Affairs. Goodman predicts that if any provinces move forward with such an initiative, Ontario might be first. Currently, though, Ontario has misgivings. “In short, this is because we have not yet identified a viable method of network voting that meets our criteria and protects the integrity and security of the electoral process,” says Elections Ontario spokesperson Andrew Willis. Willis lists several issues that would prevent the province from adopting internet voting. Security breaches could jeopardize vote integrity, he says, as could the lack of secure digital authentication mechanisms. The absence of a paper trail is another issue with internet voting, he says, because it means that the vote isn’t transparent. Barbara Simons is a strong critic of internet voting. A former president of the Association of Computing C1 SC • February 2015 • www.scmagazine.com Machinery, she has spent over a decade exploring the validity of electronic and online voting systems. Co-author of the book Broken Ballots, she also participated in President Clinton’s National Workshop on Internet Voting in 2001, and conducted a security peer review that shut down the U.S. Department of Defense’s own voting system, called SERVE. Simons agrees with Willis on the paper trail issue. “There’s no way to do a recount,” she said, because there are no paper ballots to reference. “There’s no way to verify that the winners won and the losers lost. There’s no way to check that if I voted for candidate A on my computer, that this is what was sent out over the internet.” Other provinces are equally concerned about the security of internet voting. “At this time, and with the current state of technological development, there are simply too many vulnerabilities and threats that have been identified to such systems that could compromise the integrity of the electoral system as we know it,” says Tim Kidd, senior director of outreach, policy and communications, Elections Saskatchewan. The province of BC, too, recently issued a report on internet voting, in which it recommended that the technology not be used, arguing that the risk to the accuracy of the voting process remain substantial. This hasn’t stopped municipalities from giving internet voting a try, though. Ontario and Nova Scotia have both experimented with the technology, with Ontario being the larger adopter. In the most recent municipal elections in October, 97 of the province’s 414 municipalities used the technology. Goodman created the governmentfunded Internet Voting Project, which has produced a report exploring attitudes to internet voting among voters using these services, election officials, and candidates in Ontario. It explores attitudes to voting and experiences from users, rather than the technical aspects of voting security. Municipal authorities – who will likely express a high level of satisfaction with Goodman’s report – stand by the security of the internet voting process. “Extensive testing of [city of] Markham’s processes and technology is completed prior to every election,” said Kimberley Kitteringham, city clerk for that municipality in Ontario, via a spokesperson. She cited security and integrity measures – including a mock election designed to test the system, a third-party security audit, and a city invitation to all candidates to review the technology. The municipality also includes anti-malware protection on its own computers, she added. ACM’s Simons protests that ...there is a level of tradeoff against convenience.” —Dean Smith president, Intelivote protecting election officials’ computers is only part of the challenge. “There’s something that none of those systems can deal with, and that’s the computer of the voter,” she says. “There’s no way to protect that computer from malware that can change that person’s vote.” The security of voter clients was one of several issued raised by experts at Concordia and Western University, who reviewed the online voting system used by Markham along with several others in a separate evaluation for the city of Toronto. The reviewers recommended that Toronto not proceed with internet voting in municipal elections because none of the solutions provided adequate protection against the inherent risks. Dean Smith is president and founder of Nova Scotia-based Intelivote. “I’d be lying to everybody if I said that it was as secure, but there is a level of tradeoff against convenience,” he said. He admits that there are risks OUR EXPERTS: Internet voting Nicole Goodman, assistant professor of political science in the University of Toronto’s Munk School of Global Affairs Tim Kidd, senior director of outreach, policy and communications, Elections Saskatchewan Kimberley Kitteringham, city clerk, Markham, Ontario Barbara Simons, former president of the Association of Computing Machinery Dean Smith, president and founder, Intelivote Andrew Willis, spokesperson, Elections Ontario associated with internet voting, but urges voters to compare them with other methods, specifically the vote-bymail systems that many internet voting systems are designed to complement. “When vote-by-mail comes back, you never know whether your vote has come through,” he says, arguing that ballots returned by mail will often arrive late and won’t be counted. Regardless, Smith remains convinced that in spite of the risks associated with internet voting, it’s worthwhile as it increases the level of convenience for voters. “Electoral authorities are prepared to assume that level of risk,” he says. Who gets to supervise that decision? Municipal election guidelines are laid out in each province’s Municipal Elections Act, which must be worded to allow for alternative election procedures at the local level, says Goodman. Perhaps one of the most worrying aspects of the move to internet voting in Canada is the lack of standards governing how this technology is implemented. Canada has the highest number of internet voting-enabled municipal elections in the world, but there are no regulations explaining how to choose the systems that run them, or how they should be implemented. “One of the things that is important moving forward is to develop some standards, with respect to legal, operational and technical. And when I say technical, that would relate to the security component,” Goodman says. In the meantime, the stable door is open. With no regulations in play, and with some municipalities having run three sets of elections on the internet already, the horse may already have bolted. n www.scmagazine.com • February 2015 • SC C2 Breach law I would welcome comprehensive federal legislation...” UNIFYING PRINCIPLE Is the time right for national data breach legislation? There are signs that this may be the year, reports Steve Zurier. C ould a national data breach law be just around the corner? President Obama’s call for a Personal Data Notification and Protection Act during his State of the Union (SOTU) may be just the kick the 114th Congress needs to hammer out legislation by midyear. Addressing the Federal Trade Commission (FTC), the agency that has aggressively pursued companies that it feels have not properly safeguarded customer data, a week before delivering the SOTU, the President envisioned a national law that would clarify and 24 SC • February 2015 • www.scmagazine.com strengthen “the obligations companies have to notify customers when their personal information has been exposed.” A key part of that law would be “a 30-day notification requirement from the discovery of a breach.” National data breach legislation would set a federal standard for defining the parameters of a breach and the timeframe in which companies must report a breach to law enforcement – George Jepsen, attorney general, state of Connecticut authorities and consumers. The hope among many business groups is that Nyswander Thomas, vice president or financial account number, such as a a national law would also preempt an of government affairs for the Direct bank card or credit card. unmanageable patchwork of 47 state Marketing Association, one of the trade Unfortunately, that’s where the laws and instead replace them with a groups leading the charge for national agreement stops. While the Direct uniform set of statutes that companies legislation for the past decade. “With Marketing Association (DMA), National would have to follow. all the cases of new breaches in the Retail Federation (NRF) and various If the national law is enacted, news, it has become clear that both business groups are pushing hard for companies will benefit from “the consumers and businesses have become a clause that would preempt the 47 certainty of a single, national standard,” victims. Plus, companies are global let state statues on the books, attorneys the White House said. alone national.” She adds that the need general have expressed concern that a “We support a national data breach for a national standard national law could inhibit state efforts to bill so companies can would reduce some of the effectively respond to breaches. respond to breaches in complexity. “I’ve found that the state attorneys a consistent manner,” Dave Frymier, chief general are not crazy about a national says Tiffany Jones, senior information security officer law,” says Jonathan Spruill, managing vice president and chief at Unisys Corp., a global consultant, incident response - U.S., at revenue officer at iSIGHT information technology Trustwave, who adds that states can’t Partners, a Dallas-based company based in Blue just wait around for a national law to security firm. Bell, Penn., says the Sony pass, plus they are concerned that any Jones, who has testified hack may be a taste of national law would be watered down before Congress on the what’s ahead. Lost in the and ineffective. growing malware threat uproar over the release of George Jepsen, the state of Connectilandscape and the need Tiffany Jones, iSIGHT Partners the movie The Interview cut’s attorney general, for example, for national data breach were the hacks into Sony’s favors national legislation, but remains legislation, says companies corporate offices and intellectual concerned about preemption. “I would can spend millions of dollars complying property. welcome strong and comprehenwith all the state laws. Tack on the cost “In the past we’ve had to worry sive federal legislation in this area, of a breach, the cost for cleanup, lost about nation-states stealing intellectual particularly given the national scope revenue and lost market share, and property or organized crime groups that of some of the data breaches we have Jones says there’s very strong sentiment were in it for the money, but the Sony seen and, unfortunately, are likely to see in the business community to finally get hack was different,” he says. “This was again,” Jepsen says. “However, it would something done this year. a case of disruption of operations for be a critical mistake for federal law to Lobbyists from groups such as the political or ideological purposes.” supplant state enforcement authority. Direct Marketing Association and It would be counterproductive to National Retail Federation would love reduce the number and effectiveness to get a bill done this year, but they Some consensus of regulators who can combat data are realistic. Officials from these trade On the optimistic side, those who breaches.” groups readily acknowledge that they’ve argue for a national law point to general States are vital, experienced and been building coalitions to support agreement at both the state and national active participants in responding national breach legislation for nearly 10 level as to what constitutes a breach. to these breaches and other privacy years now, but some say following the Just about every state law and the many violations, he adds. “There is enough high-profile Target, Home Depot and competing national bills define a breach enforcement work to go around, and Sony hacks of the past year, this time as when a person’s name is compromised we can be most effective by working as could be different. electronically along with one or more partners among the states and between “It’s become very complicated for of the following pieces of personally the states and the federal government.” companies to comply with all the identifiable information: a Social One bill that many believe has different state laws,” says Rachel Security number, driver’s license number www.scmagazine.com • February 2015 • SC 25 Breach law What Sony really needed was better security.” some legs is the bipartisan legislation developed by Sen. Tom Carper (D-Del.) and Senator Roy Blunt (R-Mo.). Known as the Data Security Act, if enacted into law it would require companies to – Dave Frymier, CISO, Unisys Corp. notify federal agencies and consumers of a breach that affects more than 5,000 Which leads to another unresolved we wait to act, the greater the risk of consumers. issue: which branch of government damage to Americans and American Senator Carper says that while businesses. I hope that a new year brings should be notified? For example, should Congress waits, the frequency and companies first notify the FBI or the a new focus on this issue that will allow severity of the attacks grows. In a Department of Homeland Security? On us to move forward on statement prepared for the other hand, the Secret Service has smart legislation that will SC Magazine, Carper says been given a great deal of responsibility offer greater protection for that he and Sen. Blunt to investigate hacking attacks and it’s companies and consumers have proposed legislation still unclear what their role would be. alike.” during several consecutive The Carper-Blunt bill just says that the While many agree with Congresses that would regulating agency will determine which the general parameters update and streamline law enforcement agency needs to be of the bill, the proposed the nation’s standards for informed. Clearly, some of these issues Carper-Blunt law would protecting Americans from need to be sorted out. give the FTC rule-making fraud and identity theft. Obama’s proposal advocates a 30-day authority while the trade “As hackers and their reporting deadline but is otherwise and business groups want operations become short on details. Ken Westin, senior all specifications written more sophisticated, our Sen. Tom Carper (D-Del.) security analyst with Tripwire, hailed into the law. In some ways, security measures must the president’s efforts in comments that may make sense. evolve as well,” points out Sen. Carper. sent to SC Magazine, but cited trust and Some issues yet to be worked out “The approach Sen. Blunt and I take, privacy challenges of private industry include the timeframe companies which has bipartisan support, would collaborating with law enforcement. are required to report a breach. The ensure that businesses and government “When a breach has occurred Carper-Blunt bill does not specify agencies manage personal and financial companies may think twice before a timeframe and leaves it up to the information more securely and that contacting law enforcement when there specific regulator overseeing the they respond quickly and effectively if is a compromise, at least delaying their institution where the breach occurs. and when a breach occurs. The longer STATE BREACH LAWS: Are there too many? Law firm Baker and Hostetler, which has 14 offices nationally, keeps a running chart of all the state data breach statutes. While state laws vary on the need for a risk of harm analysis and requirements to notify the state attorney general, here’s a quick look at how a sampling of state laws are all over the map when it comes to notification. California: Under the state’s Medical Information Specific Breach Notification Statute, for the vast majority of licensed clinics, health facilities, home health agencies and hospices, the law requires licensees to notify both affected patients and the California Department of Health Services no later than 15 business days after the unauthorized access, use or disclosure has been detected by the licensed medical facility. 26 SC • February 2015 • www.scmagazine.com Connecticut: All entities licensed and registered with the Connecticut Insurance Department are required to notify the agency of any information security incident which affects any Connecticut residents as soon as the incident is identified, but no later than five calendar days after the incident is identified. Maine: If after the completion of an investigation notification is required, the notification may be delayed for no longer than seven business days after a law enforcement agency determines that the notification will not compromise a criminal investigation. Vermont: Notice of the security breach to a consumer shall be made in the most expedient time possible and without unreasonable delay, but not later than 45 days after discovery. Wisconsin: Notice shall be provided within a reasonable time, not to exceed 45 days after the entity learns of the acquisition of personal information. A determination as to reasonableness shall include consideration of the number of notices that an entitymust provide and the methods of communication available to the entity. response to law enforcement due to the new notification requirements,” he says. “If they reach out to law enforcement for assistance in investigating a breach, would the ‘30 day shot clock’ for breach notification kick in at that point? Would there be a line of communication with law enforcement where information can be exchanged in confidence?” Noting that companies may have good reason not to notify within 30 days, Westin says, “These are all items I believe that will need to be hashed out before this is rolled out.” Besides the point? Still, there are those who say that a national data breach law is besides the point. “The problem I have with a national data breach law is that the horse is out of the barn by the time a company does a breach notification,” says Frymier of Unisys. “The Sony hack is a good example of why breach legislation primarily oriented toward notification alone can’t be the answer,” Frymier says. “The goal of the Sony hack wasn’t monetary; it was to embarrass. No notification was needed because it was already out there. What Sony really needed was better security.” That’s why Mike Brown, VP and GM of the global public sector at security company RSA, says national data breach legislation is merely one piece of the puzzle. First, both the House and Senate passed – and President Obama signed into law – the Cybersecurity Enhancement Act of 2014, which authorizes the National Institute for Standards and Technology to develop voluntary guidelines for cybersecurity. The new law promotes cybersecurity research, private/public sector collaboration on cybersecurity, and education and awareness of technical standards. T Along with the Cybersecurity Enhancement Act, Congress also passed – and President Obama signed into law – an update to the Federal Information Security Management Act, better known as FISMA. The update gives the Department of Homeland Security a clear oversight role in federal cyber efforts, as well as authorizes federal agencies to deploy automated security tools to fight cyber attacks. “I know it’s easy to be cynical – and Congress certainly doesn’t have a strong recent track record – but our progress at the end of the year gave me some cause for optimism,” says Brown. He says he’s hopeful Mike Brown, RSA that the end-of-the-year success could lead to what he views as four important pieces of IT security legislation. The first two, the Cybersecurity Enhancement Act and FISMA are in place. Next up for 2015 is data breach and information-sharing legislation. Diane Feinstein (D-Cal.) was quoted in the press at the end of the year saying that she plans to re-introduce the Cybersecurity Information Sharing Act when the new session convenes, and Senators Lindsey Graham (R-S.C.) and John McCain (R-Ariz.) have expressed support for another law that would encourage companies and federal always possible that cybersecurity could become the political football that net neutrality deteriorated into last year. First things first. On national data breach legislation, the Direct Marketing Association’s Thomas says much has changed. Number one, people have the benefit and experience of having worked on this issue for 10 years. Number two, especially with all the news around the Sony hack, there’s finally a chance that business interests can align with privacy advocates on identity theft and get something done for the country. And finally, as RSA’s Brown points out, national data breach legislation is part of a comprehensive effort by lawmakers to pass a series of common sense laws around cybersecurity. Add to that Obama throwing in support to kickstart the legislative process and this Congress may be able to do what the 113th Congress and others before it could not: pass a reasonable, bipartisan national data breach law. While the consensus for action builds, many in the security industry, ... our progress...gave me some cause for optimism.” – Mike Brown, VP & GM of the global public sector, RSA agencies to share information about cyber attacks. So what’s going on here? Can it be that Republicans and Democrats will actually put their partisan differences aside and do what’s best for the country when it comes to cybersecurity? It’s possible that there’s enough consensus that the problem is severe enough that something has to be done. On the other hand, it’s government and private sector are hoping that leaders will stay proactive and cybersecurity remain bipartisan and not another opportunity to score talking points in the daily news cycle. If that happens, the Sony hack really will be the beginning of a dangerous new escalation of cyber attacks – and business and government still won’t have a uniform way to respond. n www.scmagazine.com • February 2015 • SC 27 Federal law E S N E F E THE TOP DFROM The DHS will gain more control – and federal cybersecurity likely will be improved – when a FISMA update is passed, reports Lee Sustar. A fter years of proposed changes, FISMA is finally morphing. What entered the legislative record in 2002 as the Federal Information Systems Management Act is almost certain to become the Federal Information Systems Modernization Act under the new Congress, following passage by its predecessor in December. The name change highlights a major shift, says Maria Horton, who was CIO for the National Naval Medical Center as FISMA made its way into law. “By modernization, Congress and the president are looking how to modernize in order to protect our security,” says Horton, currently founder and CEO of EmeSec, a Reston, Va.-based consultancy with federal government clients. Under FISMA 2.0, as it is commonly known, “agencies themselves must be prepared to report on a breach, how large it is, how many people are effected, and the circumstances surrounding it,” she says. FISMA 2.0 would replace what has typically been federal agencies’ triennial cybersecurity compliance assessment. More frequent reports, with a strict deadline to report data breaches, would supplant the older system. It further calls for “automated security tools to continuously diagnose and improve security.” The Department of Homeland Security, which played a coordinating role for compliance with little authority under the original legislation, would play a more formal and central role under the proposed legislation, with the department’s $6 billion “Continuous Diagnostics and Mitigation” contract providing federal departments and agencies with a range of choices for cybersecurity products and services. To appreciate the impact of the changes, it’s useful to step back and look at the history, says Juanita Koilpillai, CEO and president of Waverley Labs, a Waterford, Va.-based consultancy that often works 28 SC • February 2015 • www.scmagazine.com with clients in the federal government. “With the current FISMA evaluation, it is hard for implementations to be consistent across the board,” she says. “Systems that are in compliance are not secure and vice versa. Even checking for four of the 20 critical controls proposed by SANS Institute is an expensive exercise.” FISMA: The next generation Critics of the original FISMA implementation acknowledge that its complexity and shortcomings are the result of its rapid rollout amid a major political and bureaucratic transformation. At its outset, FISMA was essentially a post-9/11 mobilization of the feds’ IT teams to systematize and generalize cybersecurity practices and performance across disparate federal agencies. The armed forces and national intelligences agencies were carved out of the new law and given their presumed IT security proficiency and requirements for ultra-secrecy. But every other federal entity – from the sprawling array of agencies and bureaus to the massive Department of Veteran Affairs (VA) – had to get on board. Inspectors general were charged with issuing letter-grade reports to be filed with the Office of Management and Budget (OMB). The then-new Department of Homeland Security (DHS) was subsequently designated to oversee the process, but the department lacked administrative authority – and, initially, at least – the technical expertise to do so. In the decade-plus of FISMA’s existence, critics have complained that agencies had an interest in dumbing down their compliance reports, says Larry Ponemon chairman and founder of the Ponemon Institute, a North Traverse City, Mich.-based firm that conducts research on privacy, data protection and information security policy. “Historically, a lot of organizations would do poorly on this, with a letter grade of C- or D,” Ponemon says. “The lower the grade, the more money you would get from Congress. If you get an A, Congress would say, ‘we don’t have to fund you.’” But FISMA’s critics often lose sight of the fact that the act was originally under the umbrella of the General Services Administration before DHS was created, says information security veteran Karen Evans, who oversaw its initial implementation as administrator of the Office of Electronic Government and Information Technology at the Office of Management and Budget. Another problem: the requirement that compliance grades had to be completed at least every three years. The three-year reporting timeline may appear to some as evidence of bureaucratic inefficiencies. But, in fact, most agencies had a difficult time securing the IT and IT security talent and resources to perform a complex and time-consuming task, says Richard Schaeffer, who heads Riverbank Associates, a Severna Park, Md.-based cybersecurity consultancy and was a former senior executive with the National Security Agency (NSA). “I think actually the grading was incredibly uneven, not because of FISMA, but because of people implementing it,” he said. “Very few federal agencies had a good idea of what their infrastructure looked like, how it was configured and how access control and so forth was really done,” he says. DHS takes charge The need for a FISMA overhaul was voiced more frequently with every documented vulnerability and data breach involving federal agencies. But as the Bush era gave way to the Obama years, the effort was stalled. Some of the delay was due to general Washington gridlock, but there was an intense debate specific to FISMA over how to both boost DHS’s authority over implementation while preserving OMB’s ultimate authority, says Evans. FISMA 2.0 resolves the long-running dispute by giving DHS meaningful operational oversight while tasking OMB with charting progress in compliance, governance, risk and compliance at MetricStream, a Palo Alto, Calif.-based service provider. That, she adds, points toward the increasing use of analytics to help agencies move from basic FISMA compliance to risk assessment and reduced incident response times. Federal agencies should beware of FISMA 2.0 solutions that may constrict their ability to defend against evolving threats, says Suni Munshani, CEO at Protegrity, a Stamford, Conn.-based provider of data security solutions. “The first question is about transparency,” he says. “Is this something I can change without being beholden to some black box technology?” One of the biggest obstacles to data security improvements in civilian federal agencies is the reluctance to collaborate across bureaucratic lines, says David Monahan, research director, risk and security management at Enterprise Management Associates, a Boulder, Colo.-based industry analyst and consulting firm. “Security people are notoriously bad at sharing information, mainly out of fear or arrogance,” FISMA 2.0 wants to get to insights and agility.” —Yo Delmar, VP for GRC, MetricStream Evans says. “It allows [OMB], with variants, to measure incremental improvements from year to year. That is the key change.” To meet those more stringent FISMA 2.0 requirements – including reports to Congressional committees – federal agencies are expected to go shoppingfor technical hardware and software information security solutions.” Leading information security providers say they’re ready. “FISMA 2.0 wants to get to insights and agility,” says Yo Delmar, vice president for he says. “The government agencies have traditionally been well into the arrogance and fear part of the equation.” FISMA 2.0, with its rigorous monitoring and reporting requirements, just might change that. “With their collective resources and the right tools, they have the capability to share information to vastly improve their overall defense posture,” Monahan says. “Even if one falls victim to a particular attack, the others can use the shared information to prevent – or at least limit – the scope of their own compromises.” n www.scmagazine.com • February 2015 • SC 29 Case study W ith the assortment of today’s communication technologies, even major radio stations supplement their broadcasts over the air with tweets, posts to Facebook and other social media venues to help promote their programming and, thus, grab the attention of their audience – however they’re staying connected. ON AIR To avoid brand damage, a radio network made certain its cloud was defended against unauthorized access. Greg Masters reports. 30 SC • February 2015 • www.scmagazine.com While these new avenues are efficient in shooting out up-to-the-minute messages to increase awareness and help the audience become engaged, for security personnel the use of social media opens up a whole new can of worms. Rocklin, Calif.-based EMF Broadcasting owns and operates the K-LOVE and Air1 radio networks, which combined have more than 700 radio and broadcasting stations spread throughout 45 states across the United States. With the phenomenal growth of social media, EMF needed visibility and control over social networking applications used by its personnel. The challenge for Juan Walker, principal security strategist at EMF Broadcasting, and his 40-member IT team, was to manage the radio network’s approximately 500 employees by protecting cloud applications from unauthorized access and account takeover attacks. “For example, if a radio personality had their social media account compromised this could create a public PROTECTION: Covering the bases The goal when implementing a solution from Skyfence, says Juan Walker, principal security strategist at EMF Broadcasting, was to protect: High-profile employees, such as CEOs and official spokespeople, who will attract more attention than most. Their role requires extra guidance. Officially recognized channels, such as the company’s Twitter feed and “Skyfence is a proxy-based solution that provides cloud app discovery/risk scoring, analytics and protection,” says Frank Cabri, vice president of marketing for Skyfence. “It does not require any endpoint software.” The solution uncovers cloud apps by inspecting and aggregating data in user access logs from enterprise web-proxies and firewalls, Cabri explains. An app discovery report is generated using relations crisis for EMF,” Walker says. a locally executable tool that scans The prospect of a hacker hijacking a existing logs files (from firewalls or web staff member’s social media account and proxy systems) either manually or on an posting inappropriate content attributed automatic schedule. The process does to the organization could have disastrous not require any installation of agents or effects on the network’s reputation and changes to applications. relationship with its donors, he says. Skyfence automates the process of “Social media challenges EMF determining which cloud in many exciting and apps users are accessing unexpected ways,” Walker and details the number of says. “A small percentage users, activity level, traffic of companies have a volume and usage hours documented social media for each app. policy and EMF is one Further, it performs of them. We want added a risk assessment and protection when engaging categorizes each cloud app with listeners and donors as high, medium or low through social media risk. Risk metrics, such platforms.” as the status of service A search began for a Frank Cabri, VP of marketing, provider audits (e.g., technology solution to Skyfence SSAE-16), compliance assist. When he and his IT requirements (e.g., PCI attestation of team were introduced to SkyFence, they compliance) and many other critical thought its cloud-protection capabilities criteria are consolidated and measured would fit into their social media protection so organizations can use the risk strategy. “The cost per user really made score of each app to prioritize their the solution attractive,” he says. risk migration efforts. In addition, the advanced risk metrics feature lets Facebook page. These channels require organizations customize risk weightings more guidance, and should be used only by so app metrics can be adjusted to designated people. reflect the risk to their specific business Privileged information of any sort, inoperations, Cabri says. cluding customer or patient identification. Enterprise financials. High-profile topics, such as safety, product recalls, mergers and acquisitions, and compliance. Natural disasters or political events that can affect the company. Dramatic events that affect the organization’s brand, competitors or the industry as a whole. Seamless integration Skyfence, he adds, delivers a complete picture of cloud app risks and operational intelligence through detailed analytics of cloud app usage. “It aggregates the output of multiple app scans and app risk metrics with detailed monitoring and analytics of user, app and endpoint usage,” www.scmagazine.com • February 2015 • SC 31 Case study Hiring crisis The solution generates consistent user activity logs for IT staff...” Cabri says. The solution also generates consistent user activity logs for IT staff across the entire cloud environment – critical for effective risk management and for correlation with existing SIEM environments. Additionally, Skyfence – Frank Cabri, VP of marketing, Skyfence has built-in enterprise integrations that blind spot for us, Walker admits. “We cate users performing higher risk activity make it simple to integrate with enterprise lacked both the visibility into what cloud while automatically enforcing security directories and market leading SIEM applications our employees were using policies across all their cloud services.” solutions from Arcsight, Splunk and Q1 and the ability to monitor activity and Additionally, Skyfence provides a Labs, adds Cabri. unauthorized access.” But, the implemenvariety of deployment options – whether The implementation at EMF went tation of Skyfence provided the ability cloud, on-premise virtual or physical smoothly, says Walker. “We used the to automatically identify managed and appliance inline and non-inline). No Skyfence cloud deployment option so unmanaged mobile devices agents are required on endpoints and there was no on-premises accessing cloud apps and there is comprehensive support for any equipment required and to enforce specific access application. Further, it provides contextusupport was seamless.” policies based on whether a al user information from AD, and not just And, it’s very easy to device is managed by IT or IP addresses. Too, it fingerprints each manage, he says, since not, he explains. users’ unique identity and behavior to it does not have any profile how they access cloud applications API dependencies and in order to automatically look for atypical does not use any agents. A detailed profile behavior indicative of compromised “It provides seamless The solution includes credentials or a malicious employee. interoperability with dynamic user and device Skyfence Cloud Gateway is available single sign-on vendors fingerprinting technology as a cloud service, on-premise appliance for easy integration. Also, to quickly establish a Juan Walker, principal security or virtual appliance, and as a managed because it is application complete and detailed strategist, EMF Broadcasting service. When using the gateway agnostic, Skyfence can profile of behavior based on-premise, inline and offline configurasupport any current and future cloud on the normal patterns of use for each tions are supported. Updates (including applications that EMF implements.” user, department and device, says Cabri. new features and new risk information) An added value is that the offering “Any access that fails the fingerprint are made automatically via the internet. does not store payment card information test can be configured to immediately The cloud is no longer a future in the cloud, so there are no compliance alert, block or require two-factor identity technology, says Cabri. “For many requirements at this time. verification in real-time, giving IT staff organizations, the move from on-premise The Skyfence tool currently reaches at EMF the ability to strongly authentito software-as-a-service (SaaS) applications across EMF’s entire network supporting – such as Office365, Salesforce.com, all cloud applications and users at EMF. HANDS-ON: Google Apps, Dropbox, NetSuite and The radio network plans to enforce Insight others – can result in significant cost the same levels of security monitoring savings and increased flexibility.” But, he and protection across all cloud According to Frank Cabri, vice president points out, it also introduces business and applications so it will expand its use of marketing for Skyfence, the tool’s security risks as SaaS applications create of Skyfence to new users, apps and analytics provide critical insight and “blind spots” that cannot be addressed endpoint devices as they are introduced intelligence into: by traditional on-premise monitoring and into its environment. Data usage: Who performed actions, security solutions. “Our policies have changed to focus viewed or modified what, when, and “While cloud apps and services are on extending the same security measures how often; changing the computing environment, we use in the datacenter to cloud apps,” Privileged user monitoring: IT requirements for safe and productive says Walker. “Skyfence helps us ensure Including data access, configuration use of resources have not changed. With that the same security best practices and user permission modifications; Skyfence, users get the apps they want used in our on-premise datacenter are API activity: Cloud app and services and IT gets the visibility and control being applied to our cloud environment. data accessed via APIs. they need. n Cloud app usage had created a security 32 SC • February 2015 • www.scmagazine.com Recruiters say that corporations and government need to rethink their defenses to address critical talent shortages, reports Larry Jaffee. HELP WANTED T he continuing jobs crisis regarding the availability of quality IT security professionals can be summed up with an old adage: Penny wise, pound foolish. That’s because workers in the field are in greater demand than ever before, but companies often don’t invest in them until after a crisis strikes. www.scmagazine.com • February 2015 • SC 33 Hiring crisis Companies don’t understand the value of talent and the resource.” According to specialized recruiters, the talent dearth lies with a general failure to make security an utmost priority to develop and retain skilled experts charged to protect the family – Jeff Snyder, president, SecurityRecruiter.com jewels. Unfortunately, corporations information security. Besides revamping upper-and-lower usually wait until they’re hacked and In order to satiate the more immediate education, Adam Malanaphy, managing then overpay for outside consultants, need, Malanaphy advises making director of Montclair, N.J.-based IT rather than prepare proactively in-house available more certifications at U.S. recruitment firm Glenmont Group, for the real possibility – or more colleges and universities, with special believes solving the accurately, inevitability – emphasis on guidance departments shortage will take they might be a target for to understand the viability of the job a change in public a major breach. Experts market. “Internal recruiters should focus perception of the by and large concur their time on key universities offering information security job that better recruitment advanced degrees,” Malanaphy says. He market. “One way to at the university level admits that at his firm the focus is not bring this issue into the may improve the future on recent grads, but on candidates who limelight is to pressure situation, which these are currently working in these positions. politicians to highlight days increasingly includes Education and experience are not equal the demand for skills in going overseas for in the real world. information security,” qualified candidates. “When a society becomes too he says. Introducing Moreover, it behooves Adam Malanaphy, managing focused on passing a test, as opposed specialized courses at the industry to promote director, Glenmont Group to actually doing stuff, then you have STEM high schools is IT security as a hot, a real problem,” says Lee Kushner, an initial step that will pay off in the well-paying career to young computer/ president of LJ Kushner & Associates, future, says Malanaphy, whose firm is mobile enthusiasts before they even a Freehold, N.J.-based executive search actively working on around 125 open graduate high school and, ideally, firm specializing in the information positions, of which about instill that philosophy within education security industry. “Information 20 percent are in curricula as early as possible. security is more of a learned skill. Certified is not qualified. That is really the wrong way of VIEWPOINTS: looking at this problem.” Kushner Value of certs squarely places the blame on HR departments that historically have We talked to two security experts at Veriwhich is why I’m going not given information security the zon Enterprise Solutions and while each for a master’s in busi2 respect it deserves – and absolutely earned a CISSP certification from (ISC) , ness information technology at requires at this juncture. He’s seeing they both had a slightly different take on DePaul University in Chicago.” HR departments combining roles – the value of certifications. Maureen Kaplan, managing director and choosing from applications, security, “People in my area are working on very chief operating officer, global security at engineering, development and architecVerizon Enterprise Solutions, agrees for practical day-to-day security skills,” says ture – into one position. the most part with her colleage, but has Fawaz Rasheed, managing director, global “The people capable of doing all those a slightly different perspective. “What I security solutions engineering at Verizon things generally outstrip compensahave found is that taking a different course Enterprise Solutions. “So I would say if tion,” he says. “They’re in high demand. that may not be directly related to the job they are looking at adding on a certification Talented people have a lot of choices.” may give you an opportunity to uncover they pick just a couple of very targeted Instead, corporations should be emerging technologies and look at your certifications such as the hands-on trainpatient when recruiting talent in company’s security in a different light and ing from GIAC or the CISM or CISA from the same way corporate leadership then be able to relate to our customers in a ISACCA. Of course, as you get into the programs recruit MBAs from grad different way.” second level and move into management, schools, Kushner advises. Corporations – Steve Zurier the security certifications tend to level off, recruiting for information security need 34 SC • February 2015 • www.scmagazine.com salaries will never rise above the level of to put grads into a path that earn X, then that focus on a job candidate’s aptitude a security professional’s peers in IT.” 18 months later 20 percent more, and and talent rather than focusing on a Jeff Combs, principal of J. Combs in 36 months plus, another 20 percent. job candidate’s particular skills at the Search Advisors, which recruits “And they should be moment,” Snyder says. information security and IT risk telling the new hires ‘we’re “Education supports management pros, believes that higher going to train you in a experience. Education salaries may not be the overriding factor whole bunch of different without experience is not in finding and keeping talented security disciplines with security of great value.” Too, upper people. “Money is only part of the compliance and regulation management must be equation,” he says. “Companies need to and stuff like that, and alerted to – and address provide a security-supportive culture, an you’re going to become a the need – of compensatopportunity to do meaningful work and fabric of our company,’” ing security talent, which career growth opportunities.” he says. will ultimately help the The ramifications of such skills Such a pitch would organization’s bottom line. shortage can impact the nation’s critical be enticing to somebody “What needs to Jeff Snyder, president, infrastructure, Combs believes. “It seeing that kind of runway, SecurityRecruiter.com happen first is that means that U.S. companies will always says Kushner. But, he critical infrastructure be playing catch up when it comes to cautions, treating IT security professioncompanies need to step into the current the global technology arms race. Lack als the same way they do lawyers or century and recognize that they need of a supported, well-staffed security accountants could upset the internal HR to devote budget to information applecart. “Companies don’t understand the value of talent and the resource,” he says. “They put IT security into general HR buckets. That’s the problem. Companies don’t have the mechanism to – Lee Kushner, president, LJ Kushner & Associates get out of that kind of thinking.” Jeff Snyder, president of SecurityRecruiter.com, of Woodland Park, Colo., program, which includes recruiting security,” Snyder says. “Only after senior agrees with Kushner that companies efforts, will lead to more companies executives recognize the need to support are going to have to build talent from and their customers being affected by information security strategy, can talent within. “This means that they need more significant security breaches, brand risk be addressed. As long as information strategic talent acquisition programs and loss of intellectual property. n security is thought of as a piece of IT, Certified is not qualified.” GET THEM YOUNG: Filling IT positions Nearly all IT security recruiters agree that one way to tackle the lack of qualified professionals is to find and nurture talent at a young age. So we asked a recently retired high school teacher what he thought about the prospects of getting whiz kids to think about computer careers other than programming video games. Chuck Goodman, who taught computer science at the Manhattan Center for Science and Mathematics, believes it’s a great idea to offer a computer course focusing on security. His former East Harlem school, once beset by drugs and dropouts, within four years of its creation was considered one of the public school system’s best turnaround examples. Goodman would open the school’s four computer laboratories at 7 a.m. and it would remain packed into the evening. “We don’t allow games on the computers, games don’t get you into college,” Goodman told The New York Times in 1986. Today, the need for skilled computer technicians is even greater, he believes, because of the sophistication of hackers, who clearly have an understanding of the inner workings of computers. “That’s how these bad guys get in. They know where the holes are,” says Goodman, who wrote the NYC Board of Education’s first treatise on computer viruses 20 years ago. Recent high-profile hacks, such as those hitting Target and Home Depot, should be enough incentive for today’s bright high school students to realize that there are wellpaying IT security jobs ahead, he adds. www.scmagazine.com • February 2015 • SC 35 Case study MAKING THE GRADE A Chicago-area high school found a solution to broaden its internet pipeline and maintain compliance, reports Greg Masters. Y oung students are more sophisticated in their use of computers than we may be willing to admit. They have, after all, been plugged in since birth, perhaps more comfortable with remote controls and game consoles than their parents. So, it’s no surprise that they can easily find ways to circumvent restrictions put in place to prevent their accessing inappropriate material on their school computers. One high school in the Chicago area put a technology solution in place to both broaden its network capacity and restrict the dissemination of inapproprite material to savvy computer users. Minooka Community High School (MCHS), comprised of about 2,500 students, is situated southwest of Chicago. Its central campus is located in Minooka, a south campus is in Channahon and its administrative offices are in Shorewood. Les Kern, director of technology at OUR EXPERTS: Safe port Les Kern, director of technology, Minooka Community High School Bob Walters, president and CEO, Untangle solution and it recommended a network appliance called Internet Content (IC) Control from Untangle. “Sentinel recommended Untangle’s IC Control specifically because of its ability to do a full SSL decrypt and re-crypt,” says Kern. They informed him MCHS, had become frustrated with that the tool has a patented technology, the school’s legacy web filter because it called Anonymous Proxy Guard, that couldn’t stop web filter avoidance by his ensures all ports and protocols would students using SSL connections. be examined and handled Although with this appropriately based on the system in place he school’s filtering policies. hadn’t encountered any “IC Control helps serious issues, he began network administrators a search for a solution diagnose and resolve – as students were able internet traffic problems to access inappropriate – such as bottlenecks, content jeopardizing the over-saturation of school’s compliance to recreational traffic, The Children’s Internet application performance, Protection Act (CIPA) and optimization of hosted putting subsidy funding at and cloud services, and risk. Of course, the school Bob Walters, president and CEO, Untangle prioritization of critical had to be in compliance traffic – ensuring network with CIPA, which performance, reliability and stability,” addresses concerns about children’s says Bob Walters, president and CEO of access to inappropriate material over Sunnyvale, Calif.-based Untangle. the internet. The act levies a number of The tool, he says, is available to requirements on schools and libraries customers on network appliances and which, through an E-rate program, offers a single-interface, turnkey internet receive discounts for internet access or management solution that includes internal connections. network monitoring, internet traffic Kern was responsible for reviewing analytics, bandwidth management and and choosing a solution. He, along traffic shaping, application prioritization, with his five-person IT team – an IT cloud optimization and web filtering. “It specialist, two technology assistants and a technology aid – asked their IT services is a highly scalable solution appropriate for large organizations with bandwidth partner, Sentinel Technologies, for a 36 SC • February 2015 • www.scmagazine.com up to 10 Gbps,” he says. The solution is intended for medium to large organizations in all vertical markets that need a purpose-built, highly scalable appliance which can be run as a transparent bridge to provide granular, dynamic reporting, he says. “It gives immediate insight into where and how network problems occur – resulting in improved internet performance and lower bandwidth costs.” Deployment of the Untangle tool went smoothly, says Kern, and his team is pleased with the deployment. “It’s very easy and quick to diagnose and solve internet-related issues,” he says. “The appliance saves me time in managing the internet connection to handle the school’s bandwidth, and it definitely gives me peace of mind. Since filter avoidance is no longer a problem, the school’s network remains The appliance saves me time...” —Les Kern, Minooka Community High School CIPA compliant. Because of IC Control, our students can’t use SSL or other techniques to access restricted content.” Untangle IC Control reaches across the district’s network of 1,100 devices – including desktops, laptops and iPads – in its three locations. “IC Control’s real-time, rich data reporting gives network administrators an unprecedented view of layer 7 traffic,” says Untangle’s Walters. “This gives them insight into what data is flowing over their network at any given moment so they can set policies that make sense.” Customers of the offering can opt into software updates as they become available, he adds. All of the security databases (like virus definitions and URL categorization) are updated in real-time. One other reason Kern and his team chose the tool is that it can handle the school’s anticipated future growth, and the evolution of both the internet and the students’ technological sophistication, he says. “IC Control provides historical data for long-term diagnostics of traffic and bandwidth use for the district.” n www.scmagazine.com • February 2015 • SC 37 Product Section iSIGHT Partners Silobreaker Adds a lot of value to your stack P42 Solid open source intelligence gathering P46 Threat intelligence emerges W ith this issue we are starting a bit of a makeover for the emerging products. We listen to what you tell us and you tell us that for these products you want more depth. Done. We are reducing the number of emerging products groups to two per year and increasing the number of products. Most important, though, we are increasing the space we are giving the products. So now you get a full page. Our group this month is threat intelligence. This is a truly emerging market space. It’s looking for its wings and customers across all verticals are starting to realize the value of actionable intelligence and cybersituational awareness. There are lots of ways to skin this cat and we had the opportunity to see and play with most of them. A word about ratings. As a general rule we don’t give star ratings, Best Buy or Recommended designations for emerging products. That won’t change as we move forward. However, sometimes we run into a special product or service and we want it in our lab. For that we give the SC Lab Approved rating. We will move that into the emerging products issues because some products we see are pretty spectacular. It’s a new year and with the new year we have new projects. So here are some things to keep your eyes open for. There will be more content on our website, scmagazine.com, perhaps including my blog, Threat Hunter.Also, we’ll be leveraging the site to nimbly add small emerging product reviews throughout the year when we think a particular sector is appropriate to cover. This will allow us to stay current with the rapidly evolving marketspace and keep you better informed. Even though some emerging product types have, as yet, just a few players, if they are worth your time they’re worth our space. As well, I invite you to follow me on Twitter – @nuciso – where I am keeping followers up to date on current technical issues in the worlds of digital forensics, cyber threats and other rather geeky stuff – pointers to good, solid, useful technical articles, often in SC Magazine. So, welcome to a new year here in the products section of SC Magazine and to SC Labs. After well over 20 years writing for SC, I really am looking forward to some of the things we have on tap for you in 2015. – Peter Stephenson, technology editor 38 SC • February 2015 • www.scmagazine.com SurfWatch Labs Provides a view of cyber threat intelligence P47 Emerging products: Threat intelligence Having the right products to provide solid intelligence analysis can go a long way toward protecting you against the ravages of a Sony-style compromise, says Peter Stephenson. How we test and score the products SOMETHING NEW Our testing team includes SC Labs staff, as well as external experts who are respected industry-wide. In our Group Tests, we look at several products around a common theme based on a predetermined set of SC Labs standards (Performance, Ease of use, Features, Documentation, Support, and Value for money). There are roughly 50 individual criteria in the general test process. These criteria were developed by the lab in cooperation with the Center for Regional and National Security at Eastern Michigan University. We developed the second set of standards specifically for the group under test and use the Common Criteria (ISO 1548) as a basis for the test plan. Group Test reviews focus on operational characteristics and are considered at evaluation assurance level (EAL) 1 (functionally tested) or, in some cases, EAL 2 (structurally tested) in Common Criteria-speak. Our final conclusions and ratings are subject to the judgment and interpretation of the tester and are validated by the technology editor. All reviews are vetted for consistency, correctness and completeness by the technology editor prior to being submitted for publication. Prices quoted are in American dollars. Twice a year, Technology Editor Peter Stephenson and his team EMERGING at the SC Lab PRODUCTS address emerging technologies and markets. The purpose is to look at segments in the information assurance space that represent new technologies, needs and capabilities. In those emerging areas there always are new entries and old pros that want to expand into the space. We will be looking at both – and bringing you the companies, products and services that we believe will shape the future. What the stars mean Our star ratings, which may include fractions, indicate how well the product has performed against our test criteria. ★★★★★ Outstanding. An “A” on the product’s report card. ★★★★ Carries out all basic functions very well. A “B” on the product’s report card. ★★★ Carries out all basic functions to a satisfactory level. A “C” on the product’s report card. ★★ Fails to complete certain basic functions. A “D” on the product’s report card. ★ Seriously deficient. An “F” on the product’s report card. LAB APPROVED What the recognition means Best Buy goes to products the SC Lab rates as outstanding. Recommended means the product has shone in a specific area. Lab Approved is awarded to extraordinary standouts that fit into the SC Labs environment, and which will be used subsequently in our test bench for the coming year. R egardless of who or what you believe hacked Sony, it was a massive cybercrime. Was it an act of cyberwar? That’s not for us to determine, but regardless, laws were broken and the attacks came via cyberspace. So we have, at the least, a very serious and rather complex cybercrime. Why does this lack of distinction matter? First, it matters because there is an emerging pattern of attack: whether nation-state, substate, criminal enterprise or individual, criminal hackers are the executors. That pattern is characterized by Lockheed Martin as the cyber kill chain. The term gives us a clear way to visualize what really goes on in a cybercampaign. One of the things that we especially like about the kill chain is that it gives a concise, no-nonsense definition of advanced persistent threats, particularly “threat.” We tend to confuse threats with malware. So if we are hunting threats we are hunting malware. While it certainly is true that malware may be involved, Lockheed says – and we agree – that a threat is a person or persons with intent, opportunity and capability. That sounds a lot like the motive, method and oppor- tunity that defines the likely perpetrator of a crime. And that is exactly what it is. At the end of the day we must start to think of cyberattack campaigns as crimes carried out by people – not machines – with motive, method and opportunity. Understanding who these people are through their attacks is a sort of Holy Grail for cyberanalysts and investigators. Without that there is no attribution. And, as a challenge, attribution is about as difficult as it gets. Understanding the kill chain for a particular type of campaign is a huge step toward protecting and responding. And that is where cyberthreat intelligence comes in. Cyberthreat intelligence is the meat and potatoes of this month’s emerging products group. This likely is the newest product classification in our field and it certainly has become one of the most important in its short lifetime. Strangely, several of the companies we are looking at this month have been around a while doing something that relates to what they are doing now. The leadership in most of these companies comes from some sort of intelligence background. And, importantly, these intel folks have teamed up with – or are themselves – some pretty impressive software development talent. There is a concept called crime assessment that says look at the crime, understand it and from that understand the criminal who committed it. We look at the crime scene and we ask: Why would someone do this? Do we have a starting point for attribution? And so on. A lot of these questions can be addressed – if not always answered completely – through solid intelligence analysis. And if all goes well and you have the right products, knowing these answers in advance can go a long way toward protecting you against the ravages of a Sonystyle compromise. What is even more interesting is that organizations are finally coming around to the fact that without cybersituational awareness they are in very treacherous waters. Still, this is not a journey for the faint-hearted. Having data is not even close to having enough of the tools needed to break the kill chain. You have to understand the data in the context of the overall threatscape. That is a lot easier to say than it is to do, but this month’s offerings are a solid step in that direction. www.scmagazine.com • February 2015 • SC 39 EMERGING PRODUCTS Threat intelligence EMERGING PRODUCTS Threat intelligence EMERGING PRODUCTS DETAILS Product Network Protection System v2.1 Company Centripetal Networks http: www.centripetalnetworks.com/ Price Starts at $60,000. What it does Active network defense merging cyber threat intelligence and security stack management. OUR BOTTOM LINE This is an industrial-strength integration of cyber threat intelligence with system management. It plays well with other network security tools because it was designed from the ground up to do exactly that. As well, it consumes threat intelligence and converts that into actionable intelligence that can be applied to a SIEM or other tool. It is easy to configure and has a rich feature set at the executive, system operator and analyst levels. There is a lot to do and see here, and the complexity of the threatspace is reflected somewhat in the system and its tools. So, our bottom line here is this is a notable tool and certainly one of the best integrations of intelligence and security stack management we’ve seen. However, it is not for the fainthearted. But then, playing in today’s threatscape isn’t either. EMERGING PRODUCTS Centripetal Networks FireEye Network Protection System v2.1 Threat Intelligence T F his is an interesting product. It collects threat intelligence data from a variety of sources, including its own organization, and applies that intelligence to manage network protection at the enterprise. By partnering with a number of threat intelligence providers and several technology vendors, Centripetal’s Network Protection System (NPS) provides what the company refers to as Active Network Defense. NPS operates in such a way as to provide support for analysts, systems operators, CxOs and executive management. That means that it produces the sorts of outputs that are uniquely useful to each of these groups. Because the difference between actionable intelligence and the flow of threat data from internet sensors is noise, the object is to get rid of the noise so that the actionable data is exposed. That is an important layer of NPS functionality. In each of the cases above, NPS not only provides the unique kind of data needed by the particular audience, it focuses that data in the ways most useful at that level. So, for example, for the analyst, NPS focuses on the data, matching the analysis to the expected analyst workflow. For the system operator, the focus is on managing the security stack. And for the executive, NPS provides situational awareness and presents data in the form of effective use 40 SC • February 2015 • www.scmagazine.com of resources and budget. These varying perspectives result in a completely unique approach to actionable cyberthreat intelligence. The heart of the NPS is the RuleGate threat intelligence security layer. This is an appliance that manages five million threat indicators at wire speeds up to 10Gbps. It is policy driven and enforces its policies across the enterprise correlating internal hosts and external threats. It is not intended to be a standalone solution to the security challenges of the enterprise. Rather, NPS works with other network security components to improve its overall security posture. There are some intelligence feeds from external sources, including open source and Centripetal’s own, but you can purchase commercial feeds through the platform itself. Those feeds integrate into the system, which consumes, integrates and correlates the data as part of QuickThreat. Rule sets are easy to use and the user interface is comprehensive. The system looks at both inbound and outbound data flows and tracks TOR exit nodes. The UI is web technology, but it is a custom implementation that uses a wrapper for browser compatibility. This is a serious system built from the ground up – no customized offthe-shelf appliances here – by Centripetal in the United States ireEye Threat Intelligence is part of the overall FireEye suite of security products. It is, in fact, the primary intelligence component and is used to help drive other FireEye products providing active blocking at networks, endpoints and mobile devices. The service – available as a subscription – has three available levels: Dynamic Threat Intelligence (DTI), Advanced Threat Intelligence (ATI) and Advanced Threat Intelligence Plus (ATI+). The differences among these three services are largely based on the level of detail in the reports you receive and the number of included services. In addition to proactive notifications and alerts, there is a portal from which users can access significant threat intelligence and conduct their own research. The resources are prodigious. The system conducts more than 50 billion virtual machine analyses per day, including 400,000 unique malware samples and more than one billion non-malware events. This all is possible due to FireEye’s deep insertion into the global threatscape. We liked that it updates every hour. With the speed at which cybercrime is moving, that level of update frequency is not, by any means, overkill. The relationships of the three levels of service to each other is part of the strength of the threat intelligence suite. DTI largely DETAILS Product Threat Intelligence is a machine-to-machine connection that enables detection and response when connected to the FireEye products. By adding ATI, you add context. Users access the Threat Intelligence system through the FireEye Intel Center. This is a way to get direct intelligence from FireEye and gives users the ability to document, manage and share their own intelligence with other users. In the Intel Center users can look at current threats and drill down for more information. The primary focus of the FireEye system is malware and that is, in today’s threatscape, appropriate. However, the company does collect considerable data on non-malware-based attacks and exploits. By combining these two attack types users can get a comprehensive view of the threatscape as it applies to them. Tying the threatscape to the user’s enterprise infrastructure is a powerful step in proactively protecting the enterprise data. As users interact with the portal a lot of things go on under the covers. For example, as new threats, malwares and hostile addresses, URLs and domains are researched, the FireEye system creates encyclopedia entries. This adds to the knowledge base and gives the analyst more to work with. Malware that the user discovers can be submitted to the FireEye sandbox for analysis. Company FireEye https://www.fireeye.com/ Price Depends on services ordered. What it does Cyber threat intelligence and proactive threat-based management of FireEye network security tools. OUR BOTTOM LINE FireEye is a venerable player in the threat analysis and response space. With its acquisition of Mandiant they have added materially to their knowledge base, and users of the Threat Intelligence system benefit by that. We had the impression that the availability of ATI and ATI+ depended on having the rest of the FireEye network protection system in place since those modules include DTI. This is an extremely powerful system for gathering, analyzing and acting on cyberthreat intelligence. The wealth of available data is impressive and FireEye is an experienced player with a heavy recorded history of data going back 10 years or more. We do wish, however, that this wealth of analytical power was readily available as a standalone service for threat analysts who are not necessarily part of a network defense team. www.scmagazine.com • February 2015 • SC 41 EMERGING PRODUCTS Threat intelligence EMERGING PRODUCTS Threat intelligence EMERGING PRODUCTS DETAILS Product ThreatScape Company iSIGHT Partners http://www.isightpartners.com Price Varies depending on deployment. What it does Adds a lot of value to your security stack by applying threat intelligence. Provides a prodigious amount of extremely useful research, much of it from analysts around the globe. OUR BOTTOM LINE This is a really competent add-in for your existing security stack, as well as a very good analyst’s tool in itself. The reporting is rich and its ability to add value to the elements of your security stack are impressive. We liked the extensive reporting. We would like to have some sort of indexing or way that we could teach it to go for the explicit issues that interest us. Perhaps there is a way to do this but we did not see it. This is a tool that you absolutely need to look at. In the fast-moving world of cyberintelligence you never can have too many – or, perhaps, enough – good tools. This one adds real value to your analysis and to your security stack. EMERGING PRODUCTS iSIGHT Partners Norse ThreatScape DarkWatch T his is a company that, starting in 2007, decided that it could make the security stack better and more responsive to risks by integrating intelligence into the security management process. This is not to say that iSight has not addressed the cyber threat intelligence analyst. Simply, it has done that and more. There are two aspects to the iSight product: the portal and the API. The entire process – through the portal or via the API – originates in the ThreatScape Intelligence Platform (TIP). This platform feeds the cloud and provides the data that users access one way or another. iSight employs a large global research team so that intelligence comes from, among other places, boots on the ground in the various locales where cyberthreats are originating. To do that, the company has more than 200 experts in 16 countries working in 24 languages. These operatives follow cyber crime, cyber espionage, hacktivism, threats to the enterprise and critical infrastructure, and vulnerabilities and exploits. ThreatScape deliverables include reports, direct access to the cloud through the MySight Portal, and dedicated client support. If you deploy the API, you also get a good number of outof-the-box integrations with such tools as CheckPoint, ArcSight, Palantir and RSA 42 SC • February 2015 • www.scmagazine.com Archer eGRC. The MySight portal provides categorized information on the classifications above and allows drill-down for greater details. There are about 100 available reports per day so finding that which could impact your organization likely is a given. These more detailed classifications are viewed in the context of three basic types of intelligence: threats, malware and vulnerabilities. These classifications are what the company calls ThreatScapes. One ThreatScape particularly addresses such things as fraud and underground marketplaces – think Silk Road. For an organization such as a financial services company, the Cyber Crime ThreatScape is very important. The other ThreatScapes are equally detailed and focused. The API provides threat intelligence input into other threat analysis tools, as well as tools that in one way or another manage the security stack. For example, connecting to Splunk provides additional information about addresses and domains that are recognized by Splunk as it collects security information on the enterprise. That additional information appears directly on the Splunk desktop. For other tools, the API provides the ability to block or alert, help prioritize patch management and support incident analysis. T hese guys are really interesting. We first came across them some time ago when we needed an impressive way to open a talk on cybersecurity. We found their attack map and started digging into what they had. If you think the map is cool, consider data centers in 140 countries and tens of terabytes per day of data that they are analyzing. All of this is focused in the Norse DarkMatter Platform. DarkMatter collects data from sensors, geolocation, open source and a wide variety of other sources. It then uses advanced Big Data analytics to make sense of the massive amounts of data and then makes the analyses available to Norse customers in a variety of ways. The deeper we dug into the Norse DarkWatch product the more impressed we were. Of course we expected honeypots. And Norse does use low interaction honeypots, but they account for only about 20 percent of the total data gathered. Additionally, using a tool it calls Anon-Proxy, Norse is watching somewhere around 200,000 TOR exit nodes on a daily basis. If you need a lot of cyber threat intelligence, this is a good way to get it. Access to Norse data is through the firm’s API or through its portal. The Norse DarkWatch appliance is a pretty impressive tool itself. It updates from the same DarkMatter fire hose every five seconds DETAILS Product DarkWatch and can alert or block. The dashboard for DarkWatch is straightforward and typical of dashboards we all are used to seeing. It is pretty plain but clearly laid out, and drill-down can get you just about anything you need. Of course the key to ease of use is the drill-down capability. Drilling down from the main interface you can get to a lot of data, smartly arranged and nicely categorized. Finding malicious sites, crawling for new malware and developing analyses is an ongoing task and with the frequent updates to the device all of that is available to the user. An interesting example of this is capture of domains created using domain-generation algorithms sometimes thought of as polymorphic URL algorithms. DarkWatch is a policy-driven device. That means that users can develop or modify policies that are created and delivered by the policy engine. DarkWatch’s policy engine is easy to use and very flexible. Setting up a policy is a matter of a few mouse clicks to define what you want to do, to what you want to do it and when you want the policy to kick in. A single web page on the web interface has everything you need. Actions can be blocked, alerts can be sent or simple notification is available if that is all you want for a particular event. Company Norse http://norse-corp.com Price $50,000. What it does Threat intelligence appliance that ties the Norse DarkMatter infrastructure to your network. OUR BOTTOM LINE This is the Cadillac of cyberthreat assessment tools. It is big, complete and it does just about everything you could want. Its user interface is well-organized and its data sources are extensive. DarkWatch comes as an appliance or as a virtual appliance but beware: the virtual appliance is power-hungry. This is one you should take very seriously. Typically we look for warts. In this case, though, we found none. The Norse product suite is, as a whole, a sort of benchmark if there is such a thing in this product space – and it is well worth your attention. DarkWatch, DarkViking and DarkList all add to the benefits that Norse customers can take advantage of but they all have in common the DarkMatter Platform. That is the secret sauce and pretty tasty it is, at that. The IPViking attack map is pretty cool, too. www.scmagazine.com • February 2015 • SC 43 EMERGING PRODUCTS Threat intelligence EMERGING PRODUCTS Threat intelligence EMERGING PRODUCTS DETAILS Product Investigate Company OpenDNS http://www.opendns.com Price Starts at $150K per year based on use and volume. What it does Threat intelligence derived from more than one billion DNS requests per day through the OpenDNS system. OUR BOTTOM LINE Investigate is a must-have for your threat analysis toolkit. Our technique of pivoting off of the suspect domain to uncover a potentially malicious architecture is greatly enhanced by Investigate. It provides the context for a solid analysis of a potential threat. However, unless you really like playing with it, and we do, you are far better off to deploy the API. You need this tool but it really belongs in your data protection workflow where it can automate the process of hunting and can dig deeply through large suspicious networks of just about any ilk. So we recommend the API. Of course, it wouldn’t hurt to get a license or two of the manual version for the geeks who really like to dig into threat analysis. EMERGING PRODUCTS OpenDNS Recorded Future Investigate Cyber O penDNS is an interesting concept. It offers two choices for users: nocost for personal use and a paid version for commercial use. The idea behind OpenDNS is that the company provides an assured, independent, secure set of domain name servers. When top-level domain servers are compromised by attacks such as cache poisoning, OpenDNS servers can be relied on to provide safe domain name service. As a result, engineers at OpenDNS have developed LAB APPROVED tools they use to manage, monitor and investigate potential cyberthreats, especially those that impact name servers directly. One of those tools is Investigate. The purpose for Investigate is simple, although its use can become complicated and tedious depending on what you want to know and whether you are running the tool manually or from the API. But, we are getting a bit ahead of ourselves and giving, perhaps, the impression that this is an incomplete or poorly thought-out tool. In fact, nothing could be further from the truth. To apply Investigate in its manual mode, we start with a known address. Let’s be specific. Recently we received four IP addresses that had appeared at the gateway of one of our industry partners. Associated with those addresses was a persistent vulnerabil- 44 SC • February 2015 • www.scmagazine.com ity scanning effort. Rather than simply the expected knob-twisting we all experience daily, this appeared to be a concerted effort to find a weakness and it appeared to be automated. What to do? We took the first of the four addresses and fed it to Investigate. No threats reported. OK…on to the next. We went through three before we hit pay dirt. This showed that it was a fast flux network. Scrolling down a bit we found hundreds of IPs that were part of the network. DNS checks on several of these IPs gave back nothing. Traceroute gave back nothing. It looked like a fast flux botnet. Its URL suggested use of a domain-generating algorithm. Next we looked at the domains hosted under this IP. There were six. Each one was also a fast flux with huge numbers of unidentifiable addresses attached. Our conclusion was that this posed a potential problem and we told our partner not to bother blocking the IPs. Rather, block the domains. We gave them a domain list and that ended the problem. All of this took about two hours using Investigate only – and only in its manual mode. We manually mapped out a suspected botnet architecture. Deployed as an API we would have had the task finished in seconds. This is a threat analyst’s tool par excellence. We designate OpenDNS Investigate with an SC Lab Approved rating. T his is one of the open source intelligence services that really fits well into the cyberpicture. Open source intelligence takes several forms, from websites to blogs, research papers and other publically available sources. Recorded Future’s strength decidedly is its deep reach into the cyberworld. Recorded Future accesses more than 600,000 sources and the firm adds new ones regularly. One of the unique aspects of this company is that rather than LAB APPROVED depending on users to access and pull down data, they push it so that users are receiving what is needed when needed. The company has several mechanisms for this. One that we have been using here in the labs is its Cyber Daily report. Cyber Daily recognizes the 80/20 rule: 80 percent of what you need is in the top 20 percent of what you read. It gives me just three things: Top suspicious IP addresses, top exploited vulnerabilities (in CVE and other formats), and top vulnerabilities in CVE format. The top vulnerabilities, as reported across the internet, may not be the same as the top exploited vulnerabilities. Having both lets us prepare for the near future and respond to something that may hit us now. Tying these two categories back to suspicious IPs lets you apply intelligence where DETAILS Product Cyber you need it, only where you need it and right now. We collect the IPs, for example, and follow them for trending. As we see relationships between IPs and vulnerabilities in the form of specific exploits that we get elsewhere we can begin to build up a threat architecture. We start to know what we need to block. The Recorded Future threat dashboard is reminiscent of vulnerability and risk dashboards that we all are used to seeing. It contains excellent filters, good visualization and multiple ways of representing, parsing and displaying the threatscape. Drill-downs let you develop your own reports on such things as the technical indicators for a particular malware or attack campaign. You can develop graphical representations of the evolution of an exploit kit across the internet over time, watching the periodic spikes of activity. Recorded Future follows more than 100 specific event types and is available in seven languages, including Arabic and Chinese. This means that exploit discussions in these languages now are accessible to speakers of other languages. Recorded Future is a SaaS offering with more than 300 virtual machines in its cloud. The classification system is based on a sophisticated ontology and the emphasis on the technical aspects of cybercampaigns is clear and put to excellent use. Company Recorded Future https://www.recordedfuture.com/ Price Varies by configuration and number of seats. What it does Open source cyber intelligence focusing on the technical aspects of the cyberthreatscape over the web. OUR BOTTOM LINE This is a solid, technically oriented open source intelligence service. It has the advantage of pushing critical data to you and is easily configurable to get to where you need to be on a custom level. Given the types of technical information it collects, it is not too far a stretch to take that information and apply it directly to the infrastructure to assist in blocking rogue domains. This is a first-rate, technically focused open source intelligence tool that plucks the wheat from the chaff. However, we believe there is a huge opportunity here to take the first steps toward proactive automation of the security configuration as an intelligence management system (think patch management in the vulnerability space and translate that into the threatscape). We like this one enough to grant it SC Lab Approved. www.scmagazine.com • February 2015 • SC 45 EMERGING PRODUCTS Threat intelligence EMERGING PRODUCTS Threat intelligence EMERGING PRODUCTS DETAILS Product Silobreaker Company Silobreaker http://www.silobreaker.com Price Company subscriptions start at $25,000 per year. What it does Solid open source intelligence gathering and analysis tool that brings non-cyber context to cyber threat intelligence analysis. OUR BOTTOM LINE This is a general open source intelligence tool with a solid, though not extensive, focus on cyberintelligence. It is, however, extremely strong in providing context between cyber and non-cyber issues. It ties cyber intelligence to non-cyber intelligence. It has a lot of internet resources, the ability to build custom dashboards quickly and relatively easily, and it is a fine tool if you are a bit creative. We believe that increasing focus on cyberissues is an important next step, especially in this marketplace where the focus on cyberintelligence is important. Just as important in our view, though, is the ability to glean context from non-cyber issues that impact cyberattacks. These issues, such as politics and economics, play significantly but not always obviously in the cyberworld. EMERGING PRODUCTS Silobreaker SurfWatch Labs Silobreaker C-Suite T his is another open source intelligence tool with its own twist. We like the twist enough for us to designate them SC Labs Approved. The twist? Silobreaker started life looking at an open source intelligence landscape that had little or nothing to do with cyberthreats. A UK company, it built its focus on general open source intelligence gathering over the internet and became a solid service with significant reach and analytical capability. It is a real workhorse in our intelligence analysis tasks. LAB APPROVED The biggest benefit that Silobreaker gives us is that it is not cyberspecific. The biggest issue in applying open source intelligence is context. Silobreaker helps provide context. It is a cloud-based service and is accessed via a web interface. The interface is straightforward and configuration, while not exactly intuitive, isn’t all that difficult. The tool has a lot of resources that it uses to gather information. Its 400,000-plus sources include blogs, web pages, social media, research reports and quite a few other types. One unique feature of the tool is its ability to create custom dashboards extremely quickly. You can create dashboards that are the basis for ongoing monitoring or you can create dashboards on the fly to answer a particular question. 46 SC • February 2015 • www.scmagazine.com For example, we needed to get a quick understanding of a particular botnet from which we were beginning to see activity. Within less than 10 minutes we had a dashboard that gave both an historical and a current trending view of the important factors in the problem. Because Silobreaker explicitly follows well over 200 specific hacker groups, context is fairly simple to develop for any given problem that revolves around hacking, ops or other types of cyberattack campaigns. There are several widgets that you can use to create dashboards and you can develop your own core data sets as well. For example, you can create a list – for the project mentioned, we created a list of all of the prevalent exploit kits. We can play that against a list of malware that Silobreaker maintains. So if we are looking at exploit kits and malware, and a particular exploit kit uses a particular malware that connection will show up on the network. You can then drill down all the way to the indexed source documents. A big benefit of the tool is its ability to track trends. We can look at a list and see what elements of the list are trending hot or cold (increase or decrease in hits over the internet) in a sliding one-day or sevenday window. We also can see the specific number of hits in those two windows. T his is, perhaps, the most unusual of the products we looked at this month. While we certainly do characterize this tool as a threat intelligence tool – and a very good one at that – it has a special capability, as one might guess from the name: SurfWatch C-Suite. This tool was born and bred to provide the types of cyber threat intelligence that executives need in a format they can use. The C-Suite portal is the front-end for an impressive intelligence gathering and analysis framework. This orientation is obvious. Fom the moment you fire up the SurfWatch portal you are shown the types of questions that executive leadership needs to have answered: What is the cyber risk to my industry sector? What cyber risks are trending? Who’s being affected? How does my cyber defense strategy align with the leading risks to my industry? What is the full picture of cyber risk to my industry? And are there breaking events for my sector that I should pay attention to right now? This approach is not surprising since the founders came from the intelligence community and are focused on actionable intelligence at various levels within the organization. The upshot of the tool’s simplicity is that executive users need to consume all of the critical information and none of DETAILS Product C-Suite the chaff in a brief scan of resources. In short, they need to be equipped to ask the right questions of the right people in their organizations. C-Suite admirably provides that level of knowledge. One of the important keys in executive boardrooms is that one size does not fit all. Some leadership may be sufficiently technical and interested enough to dig a bit deeper than the surface. Some may prefer the 40,000-foot level. C-Suite offers both extremes and a lot in the middle. Drill-downs are the key element of a system that is sort of self-customizable. By that we mean that the user can set the level of detail deciding how deep a dive they want to take. It is not necessary to call the IT department just to slightly alter a dashboard. The process starts with the development of your profile. That means information about your business, what industry you are in, who your customers and end-users are, and the role of brand recognition. Once that is done the tool starts to gather information that is useful to you. One of those is the Cyberfact Timeline. This shows what is happening – relative to your profile – as events on a timeline. Besides showing clearly when activity is happening, this timeline allows you to drill down and see details, such as the top 10 related actors, targets or effects. Company SurfWatch Labs https://www.surfwatchlabs.com/ Price Starts at $10,000 for a single license based on annual subscriptions. What it does Provides a distilled view of cyber threat intelligence in a format useful to executive management. OUR BOTTOM LINE This is a very good threat intelligence tool where almost all of the threat sources and analytics are under the covers. It is particularly designed for executive management and contains only the types of information and risks that these folks need to make important decisions. Addressing such things as budgets relative to cyber risk is the core of what top executives need to be able to do. I If you need to communicate key indicators of cyber risk to management in a way that not only makes sense at the executive level but allows managers to tune what they get to suit their own needs, take a long look at C-Suite. We were tempted to look for a bit more technical depth until we realized that SurfWatch has done a good job of keeping all of that hidden – which, of course, does not mean it’s not there. www.scmagazine.com • February 2015 • SC 47 EMERGING PRODUCTS Threat intelligence Events Seminars FEBRUARY DFIRCON West 2015 Feb. 23-28 This Digital Forensics and Incident Response (DFIR) themed training event brings SANS’s forensic courses, instructors and bonus seminars together. Venue: Monterey, Calif. Contact: sans.org/info/167347 » MARCH APRIL Feb. 16-21 SANS is bringing its top IT security courses back to Arizona. Venue: Scottsdale, Ariz. Contact: sans.org/info/166122 EMERGING PRODUCTS DETAILS Product Optic Platform Company ThreatStream http://threatstream.com/platform Price Starts at $50,000. What it does Acts as the middle of the overall threat-managed security in an enterprise. It collects threat intelligence and uses it to manage security devices on the enterprise. OUR BOTTOM LINE This is a solid integration of lots of threat sources and enterprise security tools. It takes threat intelligence and uses it to configure, manage and alert. The founder of ThreatStream came from ArcSight so there is a solid history behind this two year-old company. This is a worthwhile system to explore. While it runs pretty much on its own steam, so to speak, keeping new threat streams feeding into it requires some dedication from analysts and security engineers. When the threatscape changes as rapidly as what we are used to seeing today, having ThreatStream is a first-rate proactive defense. However, in such a changing environment it would be a mistake to “set and forget.” ThreatStream Optic Platform T hreatStream’s Optic is a cyberthreat intelligence platform that manages the lifecycle of threat intelligence via integration across an enterprise’s security infrastructure. It’s a SaaS-based platform that users access via a web-based portal. Adding OpticLink, a software package that can be optionally installed on customers’ premises, automates the process to operationalize riskscored and actionable threat intelligence into the existing security infrastructure. ThreatStream has a lot of neat functionality beyond the obvious benefits of a direct intelligence-to-infrastructure connection. For example, partners can create connectors that are provided through ThreatStream’s Alliance Preferred Partner (APP) store. The organization pioneered the use of the modern honeynet network. OpticLink goes on devices on which users want to take advantage of intelligence feeds from ThreatStream. The architecture is interesting in that it constitutes a set of connectors that can consume intelligence data from a number of suppliers. Also, it can apply its analytics to devices, also from a number of suppliers. The intelligence platform tracks about four million indicators and it uses 50 factors to determine the applicability of an indicator to the user’s infrastructure. ThreatStream does not stop with IPs 48 SC • February 2015 • www.scmagazine.com or malware, either. There is a significant threat analysis capability that reaches past malware to such things as ops from organizations such as Anonymous. Sometimes, threats are of a sort that is particularly applicable to an organization because of who they are, what they do or the business or government sector in which they operate. In that case, it is convenient to track certain types of threat intelligence on an ongoing basis and, perhaps, share that with others in the organization. ThreatStream has a tool called TIP – Threat Intelligence Package – for that. You can create your own TIP and share it with trusted circles. For example, you might be part of an Information Sharing and Analysis Center (ISAC) and want to share your TIP with other members since it might apply to all of them. You can classify your TIP as public, private or trusted circles. Further, as in many similar products, ThreatStream has a powerful sandbox. We were impressed by the level of detail its sandbox produces. Finally, there are more than 100 threat streams available out of the box, but you can add your own feeds. ThreatStream will do the connection so you can be sure that everything matches your platform. Reporting is comprehensive and you have sole control over what is in the reports. » Boston SecureWorld March 4-5 This gathering offers two days of cybersecurity education. Earn 12-16 CPE credits, network with industry peers and partake in 60+ educational elements. There will be four keynote speakers – including William Evans, police commissioner of the Boston Police Department – industry expert panels, plus a variety of security vendors and solutions. Venue: Boston Contact: secureworldexpo.com/ boston/home »SANS Scottsdale 2015 »Cyber Guardian 2015 March 2-7 The fifth annual SANS Cyber Guardian event features two Cyber Guardian Baseline courses and a Blue Team course. Venue: Baltimore Contact: sans.org/info/167352 » SC Congress London March 3 SC Congress returns to London for another exciting one-day program. We’re bringing together leaders in the information security industry in both the public and private domains, particularly based in the U.K. and EU. You will have a chance to walk our expo floor exploring the latest trends and products best suited for your company, as well as sit in on keynote and breakout sessions. Don’t miss this opportunity to network with other information security professionals, and better equip yourself to stay ahead of the pack. Venue: London Contact: congress.scmagazine.com/page.cfm/link=94 » INTERPOL World 2015 April 14-16 INTERPOL World is a new international security event that will showcase innovation, potential and joint achievements among the public and private sectors in the security arena. It will address the rising demand for technology and capacity building to meet real global security challenges. It will focus on cybersecurity, border management, safe cities and supply chain security. Venue: Singapore Contact: cloudsecurityalliance. org/events/#_industry » RSA Conference April 20-24 This year’s gathering is dedicated to leading-edge information security topics, including data breaches, threats, compliance, social engineering, cloud, risk management, applications, mobile, governance, data, legislation, policy, law, cryptography and identity management. Venue: San Francisco Contact: rsaconference.com Start here for a calendar of events. To have your event included, contact [email protected] MAY »SANS Security West 2015 May 4-12, 2015 SANS Security West 2015 will focus on emerging trends and will feature related evening talks and a star-studded, interactive panel discussion on the future of cybersecurity. Attendees will have the opportunity to take courses from top SANS instructors and real-world practitioners who can ensure you not only learn the material, but that you can apply it immediately when you return to the office. Venue: San Diego Contact: sans.org/info/171472 JUNE » Infosecurity Europe 2015 June 2-4 Infosecurity Europe addresses the latest challenges in information security to provide attendees with business critical insight, best practice and practical case studies. Speakers include information security thought-leaders from public and private sector end-users, policy-makers and government, analysts, industry experts, service providers and vendors. More than 345 exhibitors will be on the expo floor and more than 100 hours of free education offered. Venue: London Contact: infosec.co.uk » SC Congress Toronto June 10-11 SC Congress Toronto returns for another exciting two-day program. We’re bringing together leaders in the information security industry in both the public and private domains, particularly based in Canada. You will have a chance to walk our expo floor exploring the latest trends and products best suited for your company, as well as sit in on keynote and breakout sessions. Don’t miss this opportunity to earn nine CPE credits, network with other information security professionals, and better equip yourself to stay ahead of the pack. Venue: Toronto Contact: congress.scmagazine.com/page.cfm/link=10 » Portland SecureWorld June 17 This gathering offers a full day of cybersecurity education. Attendees can earn six-to-eight CPE credits, network with industry peers, partake in any of 30+ educational elements. Also on offer, keynote speakers, industry expert panels, plus a variety of security vendors and solutions. Venue: Portland, Ore. Contact: secureworldexpo.com/ portland/home ADVERTISER INDEX Company AT&T Page URL Inside Front Cover att.com SC Awards 7 awards.scmagazine.com SC Congress 51 congress.scmagazine.com SC Magazine White Paper Library 5 whitepapers.scmagazineus.com SC Magazine Inside Back Cover scmagazine.com www.scmagazine.com • February 2015 • SC 49 LastWord The security model is broken Every enterprise is susceptible to a breach, unless..., by Craig Shumard. O ur security model is broken and needs to be revamped. If JP Morgan – with a budget of $250 million and 1,000 security professionals – cannot stop or detect a major security breach, there is little hope for the rest of us. Unless something changes. We need granular encryption of personal information at rest and in transit everywhere; second-factor authentication, including system administrators; better privilege-access controls; continuous vulnerability monitoring; and prescriptive security regulations. Now! There have been a slew of high-profile security breaches recently, including the JPMorgan Chase security breach. The financial institution has more than 1,000 security pros on staff. If JP Morgan can be breached, then what does that mean for the rest of the enterprises in the U.S.? It means that everyone is susceptible to major breaches, no one is safe. Why! Because our security model is broken. Too often, critical baseline security safeguards are not implemented. And, of course, risk-based regulations are not helping. We must change our business security model. Specifically, all known security breaches either exploit some vulnerability to install malware and/or obtain escalated user access privileges to gain access to sensitive data. A breach occurs and goes undetected because critical security safeguards are not in place to mitigate these breaches. Preventive security safeguards that should have been implemented yesterday need to be deployed today – without debate about risk since we know the results of that approach. Specifically, second-factor authentication, something you know and have or are, needs to be utilized both over external and internal networks for all staff, vendors and customers. We all know that password-based authentication was obsolete 50 SC • February 2015 • www.scmagazine.com 10 years ago. Sensitive data encryption at rest needs to be pervasively implement at a granular level so that all data access is limited, even for privileged users. Too often, encryption is implemented at the disc or database level, not at the field level. As well, privileged access monitoring and controls need to be in place to effectively limit usage to minimum and monitored or review usage of privilege accounts. And, continuous vulnerability monitoring should be occurring over the whole network, not at arbitrary intervals on some network segment. These critical controls should be in place wherever sensitive information is stored and processed. Safeguards that should have been implemented yesterday need to be deployed today.” We need better and prescriptive security regulations. Current regulations are interpretative, based on judgmental risk assessments by the enterprise, and many rely on self-compliance. Security risk assessments are often performed by unqualified individuals and often used to justify not doing anything because “it never happened before,” or “I will assume the risk,” etc. Too many enterprises do the minimum necessary to comply with regulations. We need security regulations that specifically prescribe necessary technical controls and remove ambiguities. Finally, compliance to security regulations should be enforced and have monetory consequences if not complied with, similar to consumer product protection safeguards regulated by state and federal agencies. If the dimensions and the frequency of security breaches, whether driven by cybercriminals or government-sponsored, is to subside, we need a new security model. We need to deploy technical security safeguards that address today’s threats and we need more prescriptive security regulations. Unprecedented Networking Opportunities * Innovative Content * Best in Class Exhibition Hall * CPE Credits Craig Shumard is principal of Shumard and Associates, a security consulting firm. Visit Congress.SCMagazine.com for more information Cyber security thought leaders will be there... Will you? March 3, 2015 June 17-18, 2015 Mark your calendars! BROADBRAND SC Magazine, the source for IT security pros, delivers the content you need in a myriad of ways. Receive the latest industry news, analysis, whitepapers, ebooks and product reviews on your phone, computer, tablet or via the print magazine. You get the picture… scmagazine.com