Upload
others
View
0
Download
0
Embed Size (px)
Citation preview
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Trust no file. Trust no device.
© 2002 – 2019 OPSWAT, Inc. All rights reserved. © 2002 – 2019 OPSWAT, Inc. All rights reserved.
How To Protect Critical Infrastructure From Ever-Increasing Cyber Threats? Tri Vu, Director of Software Engineering
VIO 2019 – Shaping The Future of Vietnam Fintech
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
What is Critical Infrastructure? Introduction
• Cyber systems and physical assets that are so vital to the nation
• Provides the essential services that underpin national society.
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Critical Infrastructure Protection (CIP) protects our way of life
Introduction
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Critical Networks
Lack data transfer processes Targeted & zero-day attacks
Growth in malware
Growth in vulnerabilities Loss of sensitive data
Compliance
Security Challenges THE CYBER SECURITY LANDSCAPE
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Total malware keeps growing THE CYBER SECURITY LANDSCAPE
47.05 65.26 99.71
182.9
326.04
470.01
597.49
719.15
856.62
940
0
100
200
300
400
500
600
700
800
900
1000
2010 2011 2012 2013 2014 2015 2016 2017 2018 2019
Source: Copywrite © AVTest
(Millions)
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Vulnerabilities keep growing THE CYBER SECURITY LANDSCAPE
0
2000
4000
6000
8000
10000
12000
14000
16000
18000
2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019
Source: Copywrite © AVTest
High
Medium
Low
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
More cyber security vendors every year
THE CYBER SECURITY LANDSCAPE
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Cyber security budgets on the increase
THE CYBER SECURITY LANDSCAPE
Spending on cybersecurity in the United States from 2015, projected to 2025 (in Billion US dollars)
0
10
20
30
40
50
60
70
80
2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025
Enterprise Security Endpoint Security Cloud Security Network Security Application Security Others
Source: GrandviewResearch.com
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Significant Cyber Incidents (Globally) THE CYBER SECURITY LANDSCAPE
0
20
40
60
80
100
120
2011 2012 2013 2014 2015 2016 2017 2018 2019
*
Source: Center for Strategic and International Studies * 2019 data extrapolate from first 7 months
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Infamous breaches of critical networks
THE CYBER SECURITY LANDSCAPE
2018 Shamoon (modified)
2018 Triton
2017 Dragonfly 2.0
2017 NotPetya
2017 INDUSTROYER
2016 PRYKARPATTYAOBLENERGO
2010 Stuxnet
For a more thorough list, see:
https://www.csis.org/programs/technology-policy-program/significant-cyber-incidents
Source: Center for Strategic and International Studies
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Prevention not only based on detection
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Malware bypasses existing defense systems
ASSESSMENT AND CONCLUSION
Malware is Passing Existing Prevention
• Malware sample detected by one antivirus (AV) engine on 2019-06-19
• Two weeks later, only half of the AV engines we host were detecting this malware
• Took 50 days to be detected by 27 AV engines
• Twelve AV engines still are not detecting this malware
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Evolutionary Malware ASSESSMENT AND CONCLUSION
Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018)
Percentage of malware that has at least one analysis
workaround Percentage of malware have 6 or more analysis workarounds
("hype-evasive" malware)
Percentage of malware that can avoid detection from a single sandbox
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
0.1% = 350
350,000
Malwares not detected / day
Number of new malware developed in 2017 * AV-TEST Security Report
New malwares / day
121,700,000
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Lack a Data Transfer Process ASSESSMENT AND CONCLUSION
Secure Networks
Air Gapped Networks
?
?
?
?
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Access control products not designed for the cloud
ASSESSMENT AND CONCLUSION
Access
Control
Perimeter moving to Cloud
Losing access controls from endpoints Device risks overlooked
Traditional NAC Challenges
BYOD Adoption
Productivity loss due to false b locking Not designed for cloud Lack of security professionals to manage
Shadow IT Not ab le to manage or control Many operating system variations
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Security tools integration challenge
ASSESSMENT AND CONCLUSION
IT SECURITY
DLP
NAC
Malware is Passing Existing Prevention
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Security Professional Shortage ASSESSMENT AND CONCLUSION
• Unfilled cybersecurity jobs has grown by more than 50% since
2015
• Over 50% of organizations now reporting a prob lematic shortage of
cybersecurity skills.
Enterprise Strategy Group annual survey on the percentage of organizations reporting a prob lematic shortage of cybersecurity skills
53%
51%
48%
42%
2019
2018
2017
2016
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
#1 CDR according to US government agency report 100M endpoints protected 2,000+ certified applications Protecting 98% of US nuclear facilities 11 patents
About OPSWAT
Founded in 2002 8 global offices 300+ employees 1,400+ customers 24/7 support
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
+1,400 enterprise customers worldwide
Protect 98% U.S nuclear facilities
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
ENERGY TECHNOLOGY FINANCE MANUFACTURING DEFENSE GOVERNMENT
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Trust no file. Trust no device. Zero trust philosophy
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Addressing Cyber Defense Limitations OPSWAT’s data and device security solutions
OUR APPROACH TO CYBER DEFENSE
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Data Security Solution OUR APPROACH TO CYBER DEFENSE
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
No.1 CDR in the world OUR APPROACH TO CYBER DEFENSE
Protect organizations from content based threats CDR (Content Disarm and Reconstruction)
Sanitize Use Identify & Scan
Built-in macros and scripts used in many targeted attacks Eliminate zero day threat
Prevent unknown threats Reconstruct file format while maintaining maximum usability
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Isolate your network Create a secure process to transfer files to and from your critical networks
OUR APPROACH TO CYBER DEFENSE
LOGIN
Secure Networks
Air Gapped Networks
?
?
?
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Isolate your network Create a secure process to transfer files to and from your critical networks
OUR APPROACH TO CYBER DEFENSE
LOGIN
Secure Networks
Air Gapped Networks
?
?
?
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Device Security Solution OUR APPROACH TO CYBER DEFENSE
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Create A Secure Data and Device Transfer Process
OUR APPROACH TO CYBER DEFENSE
© 2002 – 2019 OPSWAT, Inc. All rights reserved.
Thank You