86
Welcome To

Scot Secure 2015

Embed Size (px)

Citation preview

Page 1: Scot Secure 2015

Welcome To

Page 2: Scot Secure 2015

Mark StephenBBC Scotland #scotsecure

Page 3: Scot Secure 2015

Steve MulhearnFortinet

#scotsecure

Page 4: Scot Secure 2015

© Copyright Fortinet Inc. All rights reserved.

Security Challenges and Emerging Threats

Steve Mulhearn- Business Solutions DevelopmentApril 2015

Page 5: Scot Secure 2015

5

Challenges Today

COST

» Operational

» Capital

CONSOLIDATION

» Virtual

» Manpower

SECURITY

» Emerging Threat

» Advanced Threats

Page 6: Scot Secure 2015

6

What We Used To Think

Page 7: Scot Secure 2015

7

How We Think Today

Page 8: Scot Secure 2015

8

The Anatomy Of An Attack

“Generic Threat”

Bot

Zero Day Threat

Trojan

Virus

Worm

Devices

Email

Web sites

Physical media

Page 9: Scot Secure 2015

9

Advanced Targeted Attack Lifecycle

Day 1 2 Years +

“Social

Engineering”

“Bot net”

Activation

Zero Day

Exploit

Page 10: Scot Secure 2015

10

The Threat is Worse Than Ever

*Akylus July 2014

Page 11: Scot Secure 2015

11

With A Consistent Motivation

*Hackmageddon July 2014

Page 12: Scot Secure 2015

12

Q2 2014 (IDC):

301.3M Smart Phones Shipped

Android 84.7% Market

February:

Drive-By Mobile

(DriveGenie)

June:

Pletor Mobile Ransom

(Doc Encryption)

July:

Dorkbot/Ngrbot

Kamikaze

2014 Threat Landscape Developments

Feb 13

IoT:

The Moon Worm

Linksys Routers

Heartbleed

Vulnerable OpenSSL

Apr 07

Apple iCloud

Ransomware

$100 EUR

Oleg Pliss

May 26 Jun 23

Havex RAT

OPC Server Spy

Aug 05

Cybervor

1.2B User & Pass

500M emails

Aug 15

Supervalu Data Breach,

200 Stores Affected

Evernote Hack

164,644 Forum

Members

Jun 10Evernote Hack

50M Users

Mar

2013

Page 13: Scot Secure 2015

13

No One Is Immune

Have you changed your password yet?

Page 14: Scot Secure 2015

14

ebay – The Impact by the Numbers

262,800Number of Passwords changed in a year

(Average 2 minutes/password)

551 Man/years wasted changing passwords

145 M User accounts compromised

525,600 Minutes in a year

Page 15: Scot Secure 2015

15

Follow The Acronym Trail

Page 16: Scot Secure 2015

16

Is There A Silver Bullet For Defeating an ATA?

Page 17: Scot Secure 2015

17

Collaborative Approach to Addressing Advanced Threats

http://www.networkworld.com/news/2013/103013-gartner-defense-attacks-275438.html?page=2

Page 18: Scot Secure 2015

18

Focus on Three Key Actions

Step 1 - Mitigation

• Mitigate threats before they enter

your network

• Proactive is key

Step 2 - Detection

• Discover threats that have

or tried to enter the network

Step 3 - Remediation

• Respond to any threats that

have breached the network

Page 19: Scot Secure 2015

19

Mitigation

DetectionRemediation

A Structured Approach for Maximum Protection

Access Control• Reduce Attack

Surface

Threat Prevention• Inspect and block

threats

Threat Detection• Identify new

incidents

Continuous

Monitoring• Assess, audit,

improveIncident Response• Validate and contain

Page 20: Scot Secure 2015

20

Step 1 - Mitigation

Access Control

» Stateful Firewall

» 2 Factor Authentication

Threat Prevention

» Intrusion Prevention

» Application Control

» Web Filtering

» Email Filtering

» Anti-Virus

Page 21: Scot Secure 2015

21

A Cornerstone of Mitigation

The reports of my death

have been greatly

exaggerated.

Page 22: Scot Secure 2015

22

The Human Factor - Laziness

“Old Habits Die Hard”

Page 23: Scot Secure 2015

23

Operating Systems and Software Require Constant Updates

12%

52%

24%

3%9%

Installed PC Operating Systems*

Windows 8/8.1

Windows 7

Windows XP

Windows Vista

Other

*Net Applications September 2014

Page 24: Scot Secure 2015

24

Not All Anti-Virus Solutions are Equal

Detection

Technology

Network

Placement

Operational

Efficacy

Page 25: Scot Secure 2015

25

Step 2 - Detection

Access Control

» Stateful Firewall

» 2 Factor Authentication

Threat Prevention

» Intrusion Prevention

» Application Control

» Web Filtering

» Email Filtering

» Deep Flow Anti-malware

Threat Detection

» Botnet detection

» Client reputation

» Network behavior analysis

» Sandboxing

Page 26: Scot Secure 2015

26

Payload Analysis (aka “sandboxing”)

What is it?» Virtual container, reflecting an end user desktop, in which

untrusted programs can be safely examined

What happens in it?» Code is executed in an contained, virtual environment

» Activity is logged and is analyzed for suspect characteristics

» Rating is determined based on system, file, web and traffic activity

Why is it important?» Traditional security looks at static attributes (signature, heuristic,

pattern, reputation, etc.) rather than dynamic activity

» In many cases, a site or code is just the first, small stage

Unsafe action, escape attempt

Controlled communication

inspection

X

Page 27: Scot Secure 2015

27

A Deeper Level of Analysis

Network Behavior Analysis» Establish baselines of normal traffic patterns, look for anomalies

Network Forensics» Capture and replay network traffic for incident response

Payload Analysis» Execute code in a contained, “sandbox” environment

Endpoint Behavior Analysis» Monitor the production system configuration for anomalies

Endpoint Forensics» Collect data from endpoints to aid in incident response and forensics

Page 28: Scot Secure 2015

28

Technology Hype and Hysteria

VISIBILITY

TIME

Technology

Trigger

Peak of Inflated

Expectations

Trough of

Disillusionment

Slope of

Enlightenment

Plateau of Productivity

Page 29: Scot Secure 2015

29

A Word of Caution

http://www.darkreading.com/attacks-breaches/the-increasing-failure-of-malware-sandbo/240159977

Page 30: Scot Secure 2015

30

Step 3 - Remediation

Access Control

» Stateful Firewall

» 2 Factor Authentication

Threat Prevention

» Intrusion Prevention

» Application Control

» Web Filtering

» Email Filtering

» Deep Flow Anti-malware

Threat Detection

» Sandboxing

» Botnet detection

» Client reputation

» Network behavior analysis

• Incident Response

» Consolidated logs and reports

» Professional Services

» User or Device Quarantine

» Threat Prevention Updates

• Continuous Monitoring

» Real-time Activity Views

» Security Reporting

» Threat Intelligence

Page 31: Scot Secure 2015

31

Coordinated Defense Strategy

In-Network

Defenses

Continuous

Updates

Threat Research

and Discovery

Page 32: Scot Secure 2015

32

The Fortinet ATP Solution

FortiGuard Services

FortiGuard Lab

Page 33: Scot Secure 2015

33

Protecting Today’s Network

Evolution, evolution, evolution

Wherever there is value, the cyber criminal will follow

Page 34: Scot Secure 2015

34

Protecting Today’s Network

Evolution, evolution, evolution

Wherever there is value, the cyber criminal will follow

Anticipate, React, Respond

Page 35: Scot Secure 2015

35

Complexity

Page 36: Scot Secure 2015

Tony NeateGet Safe Online

#scotsecure

Page 37: Scot Secure 2015

Det Supt Stevie WilsonPolice Scotland

#scotsecure

Page 38: Scot Secure 2015

Brian GibsonScottish Business Resilience Centre

#scotsecure

Page 39: Scot Secure 2015

Brian GibsonChief Inspector

Deputy Director Scottish Business Resilience Centre

Page 40: Scot Secure 2015

• We are a unique organisation comprising of contributionsand secondments from the Police, Scottish Government,Fire Services, Scottish Clearing Banks, investors and ourmembership.

• Vision• Creating a secure & resilient Scotland for business to flourish in

• Stakeholders• Scottish Government, Police Scotland, Members

Page 41: Scot Secure 2015

Digital Security Support

Online Footprint Assessment

Page 42: Scot Secure 2015

Digital Security Support

Cyber Supply Chain Test

Page 43: Scot Secure 2015

Digital Security Support

Cyber Security Assessment

Page 44: Scot Secure 2015
Page 45: Scot Secure 2015

Insider Threat

• Case Study 1 - Pet Shop

• Case Study 2 – Call Centre

Page 46: Scot Secure 2015
Page 47: Scot Secure 2015

Developing a Cyber Security Strategy

• Mind-set

• E – Trader Accreditation

• Cyber Essentials (CE) Cyber Essentials Plus (CE+)

• Innovation Voucher Scheme

• Get Safe Online (getsafeonline.org)

• Cyber Streetwise – (cyberstreetwise.com)

Page 48: Scot Secure 2015

Thank YouQUESTIONS ?

Page 49: Scot Secure 2015

Questions & Discussion#scotsecure

Page 50: Scot Secure 2015

Exhibition & RefreshmentsCheck badge for Breakouts

#scotsecure

Page 51: Scot Secure 2015

18th June Dynamic Earth

Limited spaces remain

www.scot-cloud.com

Page 52: Scot Secure 2015

30th Sept Dynamic Earth

Registration open

www.iotscotland.com

Page 53: Scot Secure 2015

Welcome Back

Page 54: Scot Secure 2015

Prof. Bill BuchananEdinburgh Napier

University#scotsecure

Page 55: Scot Secure 2015

Glenn AttridgeRoyal Bank of Scotland

#scotsecure

Page 56: Scot Secure 2015

Jiveen LalRisksmith

#scotsecure

Page 57: Scot Secure 2015

Risk, responsibility and contractual obligation

Jiveen Lal, Director

+44(0)77 1402 3912

[email protected]

@risksmithUK

Page 58: Scot Secure 2015

AGENDA

Risk, responsibility and contractual obligation

Page 59: Scot Secure 2015

Agenda

Contract obligations and cyber attacks• Data loss• Cyber attack

Responsibilities beyond contract obligation

Cyber insurance• Identifying needs and testing your insurance• Market update

Page 60: Scot Secure 2015

DATA LOSS / CYBER ATTACK

Contract obligations

Page 61: Scot Secure 2015

1. Data loss

YouYour client

A client's customer

Page 62: Scot Secure 2015

2. Business interruptions

Supplier

You

Customer

Page 63: Scot Secure 2015

YOUR BUSINESS

Responsibility beyond contracts

Page 64: Scot Secure 2015

Responsibility beyond contracts

Intellectual property

Revenue

Bodily injury

Property damage

Shareholder/Due diligence

Regulations

Brand

Page 65: Scot Secure 2015

BUSINESS NEEDS

Cyber insurance

Page 66: Scot Secure 2015

Identifying business needs

People SystemsInternal

processesExternal events

Business model

Page 67: Scot Secure 2015

Quick test

1. Where is data?

2. Who has access?

3. What happens when a vendor suffers?

4. What are the ramifications of internally-sourced breach?

5. What do you plan to do when you have a data breach?

Page 68: Scot Secure 2015

Cyber insurance update

• Experienced an event

• Know someone

• Increased awareness

• Fines/penalties

• Contract obligations

• Technology companies

Page 69: Scot Secure 2015

Jamie GravesZoneFox

#scotsecure

Page 70: Scot Secure 2015

Innovation & Cyber Security

Jamie Graves, CEO

[email protected]

Page 71: Scot Secure 2015
Page 72: Scot Secure 2015
Page 73: Scot Secure 2015
Page 74: Scot Secure 2015
Page 75: Scot Secure 2015
Page 76: Scot Secure 2015
Page 77: Scot Secure 2015
Page 78: Scot Secure 2015
Page 79: Scot Secure 2015
Page 80: Scot Secure 2015

Thanks

[email protected]

• ZoneFox.com

• @ZoneFox

• @DrJamieGraves

Page 81: Scot Secure 2015

Questions & Discussion#scotsecure

Page 82: Scot Secure 2015

18th June Dynamic Earth

Limited spaces remain

www.scot-cloud.com

Page 83: Scot Secure 2015

30th Sept Dynamic Earth

Registration open

www.iotscotland.com

Page 84: Scot Secure 2015

Post Conference SurveyPlease complete

to get slides#scotsecure

Page 85: Scot Secure 2015

Drinks & NetworkingExhibition Area

#scotsecure

Page 86: Scot Secure 2015

Conference Close#scotsecure