34
Nikos Mourtzinos, CCIE #9763 [email protected] April 2016 Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security

Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Nikos Mourtzinos, CCIE #9763

[email protected]

April 2016

Respond to Insider Threats and External Cyber Attacks

Ascending the Path to Better Security

Page 2: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Industry Revolution 4.0 – Digital Transformation - IoT

Page 3: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Security as a Business Enabler

Page 4: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

The Security Problem

Changing

Business Models

Dynamic

Threat Landscape

Complexity

and Fragmentation

Page 5: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Limited Visibility

Endpoint AV

UTM Services

IDS

Network

AVWeb

Security

Email

Security

Edge

Firewall

Lacks Correlation Manual Response

internet

Endpoint Alert

Email AlertWeb Alert

IDS Alert

AV Alert

Vendor

1

Vendor

2

Vendor

3

Vendor

4

Failure of Legacy Security Architectures

Complexity and Fragmentation

Page 6: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Today top threats still get through

FW

IPS

IDS

Despite massive security investments

Traditional defenses are no longer enough

Page 7: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Let’s take a deeper look into today’s TOP Threats

FW

IPS

IDS

External THREATs

lnsider THREATs

Page 8: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

External

FW

IDS

IPS

External Threats

Next Gen Firewall

Next Gen IPS

Email Security

Web Security

Network AntivirusEndpoint Antivirus

Page 9: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Enhanced Security & Simplifies Operations & Cost Savings

Superior Network

Visibility

Servers, hosts, Mobiles

Applications, OS, Vulnerabilities,

Impact Assessment &

Correlation

Threat correlation reduces

actionable events by up to 99%

Automated Tuning

Adjust IPS policies automatically

based on network changes

Continuous Analysis,

Trajectory

RemediationAdvanced Malware

Protection

Analyses files to block malware

Page 10: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Cisco Talos Threat Intelligence

Page 11: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Advanced Malware ProtectionAnalyses files to block malware

Advanced Malware

Protection

Analyses files to detect and block malware

• File Reputation

• Big data analytics

• Continuous analysis

• Dynamic Analysis with Sandboxing (outside-looking-in)

Page 12: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12

An unknown file is present on

IP: 10.4.10.183, having been

downloaded from Firefox

10:00 10:03 10:06 10:10 10:14 10:17

Page 13: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13

At 10:57, the unknown file is

from IP 10.4.10.183 to IP:

10.5.11.8

10:00 10:03 10:06 10:10 10:14 10:17

Page 14: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14

Seven hours later the file is

then transferred to a third

device (10.3.4.51) using an

SMB application

10:00 10:03 10:06 10:10 10:14 10:17

Page 15: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15

The file is copied yet again

onto a fourth device

(10.5.60.66) through the

same SMB application a

half hour later

10:00 10:03 10:06 10:10 10:14 10:17

Page 16: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16

The Cisco Collective Security

Intelligence Cloud has learned

this file is malicious and a

retrospective event is raised for

all four devices immediately.

10:00 10:03 10:06 10:10 10:14 10:17

Page 17: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17

At the same time, a device

with the AMP endpoint

connector reacts to the

retrospective event and

immediately stops and

quarantines the newly

detected malware

10:00 10:03 10:06 10:10 10:14 10:17

Page 18: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

© 2013 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18

8 hours after the first attack,

the Malware tries to re-enter

the system through the

original point of entry but is

recognized and blocked.

10:00 10:03 10:06 10:10 10:14 10:17

Page 19: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Insider THREATs

With lateral movement of advanced persistent threats,

even external attacks eventually become internal threats

One out of four

breaches are caused

by malicious insiders

Page 20: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Cisco Cyber Threat Defense

Firewall

IPS

Web Sec

Email Sec

Customized Threat Bypasses Security Gateways

Threat Spreads Inside Perimeter

Customized Cyber Threats Evade Existing Security Constructs

Fingerprints of Threat are Found Only in Network Fabric

AV

Page 21: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Network with Only Perimeter Visibility

192.168.19.3

10.85.232.4

10.4.51.5

192.168.132.99

10.43.223.221

10.200.21.110

10.51.51.0/24

10.51.52.0/24

10.51.53.0/24

Internet

Many devices in your network

without visibility

Visibility available for traffic

transiting through perimeter

Page 22: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Enabling Visibility Inside Your Network

192.168.19.3

10.85.232.4

10.4.51.5

192.168.132.99

10.43.223.221

10.200.21.110

10.51.51.0/24

10.51.52.0/24

10.51.53.0/24

Internet

Cryptic network addresses that

may change constantly

Difficult to manage policy

without any context

Cryptic network addresses that

may change constantly

Difficult to manage policy

without any contextEVERYTHING

on the network

KNOW

every host

RECORD

every conversation

Page 23: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

• NetFlow is like a phone bill

NetFlow provides detailed data such as:

• What is talking to what

• Direction of traffic

• over what protocols and ports

• for how long, at what speed

• for what duration

• Volume of traffic

• What nations traffic is going to

Internal Network &

Borders

Key Concept - NetFlow

Page 24: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Next Generation Cyber Threat Defense

Unified ViewThreat Analysis and Context in

Cisco StealthWatch

NetFlow TelemetrySwitches, Routers, and Firewalls

Internal Network and Borders

• Aggregating, analyzing NetFlow

• Network Behavior - Baseline

• Anomaly Detection

Page 25: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Unified ViewThreat Analysis and Context in

Cisco StealthWatch

NetFlow TelemetrySwitches, Routers, and Firewalls

Internal Network and Borders

• Aggregating, analyzing NetFlow

• Network Behavior - Baseline

• Anomaly Detection

Cisco Identity Services EngineIdentity, Device, Posture

Next Generation Cyber Threat Defense

Page 26: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Network Behavior– Baseline (Normal)

31

Alarm on changes in behavior

Page 27: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Anomaly DetectionModern Detection Algorithms

26

Behavioral Anomaly Research

Malware Analysis

Incident Investigations

Research Partnerships

Page 28: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Advanced Detection Methods

Signature

Anomaly Behavior

Signature IPS, Antivirus, Content Filter

Behavior

Anomaly

Signature Behavior Anomaly

Known Exploits BEST Good Limited

0-day Exploits LimIted BEST Good

Credential Abuse Limited Limited BEST

Page 29: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Breaking down the Boundaries

Perimeter Defense

Visibility

NGIPS

AMP - Sandboxing

IoC - Correlation

Consolidation,Integration,

Automation

Page 30: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Increases

visibility

Enhances

protection

Simplifies

operations

Next Generation Cyber Threat Defense

Page 31: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Cisco is Investing in Security

1995

• PIX Firewall which was foundation of current ASA-X • Top Leader of

contents security

2007 2009 2013 2014

• Leading Dynamic Malware Analysis (Sandbox)

• Currently Integrated to AMP

• Top Leader of Cloud-based Web Security

• Snort®, ClamAV®, Open source projects Founder

• VRT World-class research

• Top Leader of IPS

• Top Leaders of security advisory services

• Provides risk management and compliance to Fortune 500 customers

2015

• Leading securityanalytics platform to defend against advanced cyber threats

• Cloud based DNS security service

Page 32: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

Packet BrokeringNetwork Infrastructure &

Policy Management

Performance

Management &

VisualizationMobility

Packet

Capture &

ForensicsSIEM & Analytics

Remediation

& Incident

Response

Vulnerability

Management

Custom

Detection

Firewall/Access ControlIAM/SSO

Ecosystem and Integration

Combined API Framework

Page 33: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation

“Cisco Is Going on a Security Push”

Security Value Map Leader:

NGFW, NGIPS and Breach

Detection Systems (AMP)

BEST

SECURITY

COMPANYCisco’s Security Everywhere...

“that’s pretty brilliant”

Opportunity for Cisco

and BT together to be a

$100 million account

within 18 months

– CEOBT Security Group

Cisco…best traction

among security vendors

Cisco’s Network Security

Portfolio finally stands on its

own merit

Cisco is building the

foundation for the

Security industry for the

upcoming 20-50 years,

and making smart bets…

– Marcos OrtizSenior Product Manager, Big Data Apps

and Cybersecurity

RecognitionMarket

Page 34: Ascending the Path to Better Security · Respond to Insider Threats and External Cyber Attacks Ascending the Path to Better Security. Industry Revolution 4.0 –Digital Transformation