SlideShare una empresa de Scribd logo
1 de 52
WELCOME
Raimund Genes
Chief Technology Officer, Trend Micro
Did these guys care about cloud security?
0
20,000,000
40,000,000
60,000,000
80,000,000
100,000,000
120,000,000
140,000,000
160,000,000
#RecordsLost
Anatomy of an attack
Ercan Findikoglu
and crew
GetsCCdata/PIN
RaisesLimit
Recruits
CopyDataoncards
Cashing crews
Hand to
Money, Money, Money!
ARE WE OVERSENSITIVE
REGARDING CLOUD
SECURITY?
Letter from Richard Stiennon to President Obama
8 years ago
https://www.linkedin.com/pulse/drastic-times-call-measures-cybersecurity-richard-stiennon
I. All access must be explicitly authorized.
II. All users must be identified and strongly authenticated.
III. All applications must be reviewed for security vulnerabilities.
IV. All network attached systems must be scanned for vulnerabilities on a schedule.
V. All network connections must be fire-walled.
VI. All firewalls must be configured to “deny all except that which is explicitly allowed”.
VII. All government networks must be mapped and understood.
VIII. All data needs to be encrypted at rest
IX. All communication links need to be encrypted
X. All intrusions need to be aggressively analyzed and appropriate responses executed.
QUESTION NO. 1 FOR CLOUD
COMPUTING (IN EUROPE)
Where is it stored?
Not a concern for Australia?
1. Secure data transfer
2. Secure software interfaces.
3. Secure stored data
4. User access control
5. Data separation
Source: http://blogs.cisco.com/smallbusiness/the-top-5-security-risks-of-cloud-computing
Cisco’s view:
Source:
https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top
_Threats_in_2013.pdf
CSA view:
1. Data Breaches
2. Data Loss
3. Account Hijacking
4. Insecure APIs
5. Denial of Service
6. Malicious Insiders
7. Abuse of Cloud Services
8. Insufficient Due Diligence
9. Shared technology Issues
Encryption anyone?
Encryption anyone?
Time to patch makes it easy for attackers
Remote Control System Price Scheme
Have you simply
“lifted-and-shifted”
your traditional security
to your virtualised data
center and cloud?
Trend micro’s view
Many organizations are experiencing the following…
• Minutes to deploy a server…weeks to secure it
• Virtually scale beyond physical limits… until you hit
your security limit
• Servers that share resources…security that consumes it
Attackers
Potential Risks
• Vulnerability in server exploited to
introduce malicious code
• Company must restrict access
to certain applications
• Admin makes changes to
known good configuration
• Hacker attempts a SQL
injection attack
• Brute force authentication
attack is executed
Security principles remain the same;
APPROACH to security must change
CONTEXT Workload and application-aware
SOFTWARE Security that evolves with the data center
PLATFORM Single platform for data center and cloudSiloed
Generic
Hardware
ADAPTIVE Intelligent, dynamic policy enforcement
Automated provisioning specific to platform
Static
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimise data center resources
Extend to cloud with confidence
Provisioning securely within a dynamic data center
How do you:
• Secure the VM the moment it is provisioned?
• Apply the right policies to that VM?
• Reduce the time to provision without
compromising on security?
• Securely bring up/down/move your VMs?
Provisioning
Infrastructure
vCenter, AD,
vCloud and
AWS
SAP
Exchange
Servers
Oracle
Web
Servers
Web
Server
Automate security as part of your operations
• Gain visibility into environment using
vCenter and vCloud Director integration
• Recommend and apply policies
automatically - specific to your
data center
• Automatically scale up and down as
required—with no security gaps
19
Rules
15
Rules
73
Rules
8
Rules
28
Rules
Simplify provisioning even further with
VMare NSX
• Automated deployment
using ESXi 5.5+
• Automatic activation of
policies
• No maintenance mode
or re-boot required
Security is an available
service among VMware
and other partner services
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimise data center resources
Extend to cloud with confidence
Management Challenge: Keeping up-to-date
How do you:
• Quickly and easily identify an issue?
• Keep up to date with patches?
• Manage multiple controls as you execute your
strategy for your data center and cloud?
Establish continuous monitoring to quickly
identify issues and respond
• Leverage a comprehensive
dashboard across controls
• Implement reporting and
alerting
• Manage via web console or
API
Protect even before you patch
• Protect against
vulnerability exploits
before patches
available
• Save money avoiding
costly emergency
patching
• Patch at your
convenience
Vulnerability Disclosed or
Exploit Available
Patch
Available
Complete
Deployment
Test
Soak
Exposure
Begin
Deployment
Patch
ed
Trend Micro Virtual Patching
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimise data center resources
Extend to cloud with confidence
Resource challenges: Address the bottlenecks
How do you reduce the
impact on resources
created by traditional
security capabilities?
Optimized for your virtual environments
Network Usage
Scan Speed
CPU/Memory Usage
IOPS
Storage
ESXi
SAN
New approach can improve data center operations
Provision security automatically within a data center
Manage security effectively and efficiently as you scale
Optimise data center resources
Extend to external or public cloud with confidence
Public Cloud: Affects every organisation
Public cloud extension of Private Cloud by I.T. (Bursting)
Business groups Bypass IT to use Public Cloud Private
Cloud forced to take on attributes of Public Cloud (ITaaS)
Cloud Deployment Dynamics
Instance Awareness
• Dynamic real-time security
visibility and response
Complexity
• Supporting multi-region
and global deployments
Scale & Automation
• Elastic services and
applications managed
with new tools Data Protection
• Protection of all data across
boot & data volumes
Purchasing
• Ability to purchase
security aligned to cloud
models
Security in the cloud is a Shared Responsibility
Partner Eco-System
• Operating Systems
• Application
• Security Groups
• OS Firewalls
• Anti-Virus
• Account Management
• Storage Encryption
• Facilities
• Physical Security
• Physical Infrastructure
• Virtualised Infrastructure
Customer
Domain
AWSDomain
Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure
Edge
Locations
Availability Zones
Regions
Enterprise Applications
Enterprise Operation Systems
Dr. Raymond Choo
Fulbright Scholar (Cyber Security/Crime and Digital
Forensics) and Inventor
What happens when your organisation is
COMPROMISED?
Have you NOT read about a high profile cyber
security incident, OR NOT heard of an
organisation in your sector or government
agency that has been breached (e.g. malware
infection and theft of corporate data, such as
customer information and intellectual property)
in the last 12-month or financial year?
Security sector, 2015
Security sector, 2015
Security sector, 2014
Challenges
• Attribution and identification: More likely to be able to infer or identify
the offender in a physical crime based on the physical location of
the crime and/or the types of weapons / technologies than their
cyber analogues
• Responding: Uncertainty about physical location complicates efforts
by governments to respond and investigate and to use retaliation as
a deterrent (simply on the basis of the cui bono logic or
circumstantial evidence)
Cyber attacks more sophisticated and going ‘under the radar’
What happens when your
organisation is COMPROMISED?
Incidentmanagement Incident handling
Preparation
Detection and
analysis
Incident response
Containment
Eradication
RecoveryPost-incident
Vulnerability
handling
Artefact handling
Event management
Announcement
Alerts
What about digital forensics, and
digital evidence?
Do they matter?
Digital forensics
“the process of identifying, preserving, analysing and presenting
digital evidence in a manner that is legally acceptable”
McKemmish’s Key
Elements
• Identification
• Preservation
• Analysis
• Presentation
NIST Key
Elements
• Collection
• Examination
• Analysis
• Reporting
McKemmish, R 1999, 'What is Forensic Computing?', Trends & Issues in Crime and Criminal Justice, vol. 118, pp. 1 - 6. p.1
Kent, K, Chevalier, S, Grance, T & Dang, H 2006, Guide to Integrating Forensic Techniques into Incident Response, U.S. Department of Commerce,
<http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf>.
• Reconstructing of the incident and establish facts such as
• Where did the attack come from?;
• What vulnerability (ies) was/were exploited?; and
• What data / which systems was/were compromised?
• Etc
• Inform risk mitigation strategy
• Evidence collected can be used in:
• the prosecution of the offender in a court of law; or
• a civil litigation (e.g. such services are increasingly offered
by consultancy companies such as Deloitte, E&Y, KPMG, and
PwC).
The importance of digital forensics (evidence
collection) in incident handling
Digital forensics: Challenges of cloud computing
“little guidance exists on how to acquire and conduct forensics in a cloud environment”
(National Institute of Standards and Technology 2011, p.64)
“[c]urrently, guidelines and best practice guides on gathering digital evidence are rare and
often outdated. There are no guidelines specific to evidence gathered in the cloud…”
(Birk and Wegener 2011, p.9)
“[m]ore research is required in the cyber domain, especially in cloud computing, to identify
and categorize the unique aspects of where and how digital evidence can be found. End
points such as mobile devices add complexity to this domain. Trace evidence can be found
on servers, switches, routers, cell phones, etc” by previous Director of US Department of
Defence Computer Forensics Laboratory and the previous Chief Scientist at US Air Force
Research Laboratory Information Directorate (Zatyko & Bay 2012, p.15)
Our cloud forensics framework
Iterative
1. Commence (Scope)
Determine the scope of the investigation, the requirements and limitations, prepare equipment and expertise.
2. Identification and Preservation
It is critical that preservation commences as soon as cloud computing use is discovered in a case, as such it is
combined with identification in this model.
3. Collection
The potential difficulties in collection of cloud computing data dictates the requirement for collection to be
represented as a separate step.
4. Examination and Analysis
Examination of the collected data allows the investigator to locate the evidence in the data, analysis transforms this
data into evidence.
5. Reporting and Presentation
This step relates to reporting and presenting evidence to court. As such this step will remain mostly unchanged.
6. Feedback and Complete
This step relates to a review of the findings and a decision to finalise the case or expand the analysis.
“Cloud Storage Forensics” http://store.elsevier.com/product.jsp?isbn=9780124199705.
• Forewords written by Australia’s Chief Defence Scientist (首席澳大利亚国防科学家及国防科技组织
(DSTO)领导人) and the Chair of Electronic Evidence Specialist Advisory Group, Senior Managers of
Australian and New Zealand Forensic Laboratories.
• Highly Commended Award in the 2014 “Best Chapter in a Book” Category by Australia New Zealand
Policing Advisory Agency (ANZPAA) National Institute of Forensic Science (NIFS)
Remote Evidential Data Collection System
(REDCoS)
• Limitations due to current forensic techniques making use of vendor
data communication facilities built into the client devices (e.g. iTunes
backup for iOS devices), inability to circumvent advanced security
features and anti-forensic features, etc
• Data (remote) collection / exfiltration techniques for forensic /
criminal intelligence (Australian Provisional Patent filed December
2014; PCT filed July 2015)
• Big forensic data reduction method (Australian Provisional Patent,
filed December 2014, and PCT to be filed in September 2015)
Remote Evidential Data Collection System
(REDCoS)
• Provides organisations with the capability to collect electronic
evidence, from a range of data sources, in a forensically sound
manner without the need for specially trained staff.
• Evidence sources need not be physically collocated with the
evidence collection staff.
• REDCoS only requires network access and, as such, is particularly
suitable for evidence collection from sources such as cloud
computing and remote unmanned equipment.
Remote Evidential Data Collection System
(REDCoS)
• Suitable for collection of local and remote evidence (e.g. evidential
data stored in the cloud and systems located offshore);
• Can be operated by IT personnel without forensic training;
• Cost effective, permits remote collection without requiring forensic
consultants or prohibitive travel expenses;
• Efficient, focuses only on collection of evidential data;
• Real time evidence collection and review.
Dr. Kim-Kwang Raymond Choo
Research Director, CSA Australia Chapter
Co-Chair, CSA Asia Pacific Education Council
Co-Founder, Cloud Forensics International
raymond.choo@fulbrightmail.org
Thank you

Más contenido relacionado

La actualidad más candente

NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
Sherry Jones
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
ISSA LA
 

La actualidad más candente (20)

Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!Vulnerability Management – Opportunities and Challenges!
Vulnerability Management – Opportunities and Challenges!
 
Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service Managed Security Operations Centre Alternative - Managed Security Service
Managed Security Operations Centre Alternative - Managed Security Service
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Security Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM GapSecurity Analytics for Data Discovery - Closing the SIEM Gap
Security Analytics for Data Discovery - Closing the SIEM Gap
 
Utilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare TechnologyUtilizing the Critical Security Controls to Secure Healthcare Technology
Utilizing the Critical Security Controls to Secure Healthcare Technology
 
Introduction to Cyber Resilience
Introduction to Cyber ResilienceIntroduction to Cyber Resilience
Introduction to Cyber Resilience
 
The State of Threat Detection 2019
The State of Threat Detection 2019The State of Threat Detection 2019
The State of Threat Detection 2019
 
Panda Security - Adaptive Defense
Panda Security - Adaptive DefensePanda Security - Adaptive Defense
Panda Security - Adaptive Defense
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJNIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
NIST Cyber Security Framework: 4 Steps for CIOs - Deloitte CIO - WSJ
 
Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?Is Cyber Resilience Really That Difficult?
Is Cyber Resilience Really That Difficult?
 
CSIRT_16_Jun
CSIRT_16_JunCSIRT_16_Jun
CSIRT_16_Jun
 
How to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVaultHow to Solve Your Top IT Security Reporting Challenges with AlienVault
How to Solve Your Top IT Security Reporting Challenges with AlienVault
 
Issa symc la 5min mr
Issa symc la 5min mrIssa symc la 5min mr
Issa symc la 5min mr
 
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...DSS   ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
DSS ITSEC CONFERENCE - Q1 Labs - Intelligent network security - next genera...
 
IBM Security QRadar
 IBM Security QRadar IBM Security QRadar
IBM Security QRadar
 
Using an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized DefenseUsing an Open Source Threat Model for Prioritized Defense
Using an Open Source Threat Model for Prioritized Defense
 
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
Data security solutions_Baltics_IBM_QRadar_SIEM_Use_Cases_28.01.2014
 
Security Transformation Services
Security Transformation ServicesSecurity Transformation Services
Security Transformation Services
 
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 ruleWalk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
Walk This Way: CIS CSC and NIST CSF is the 80 in the 80/20 rule
 

Similar a CSO CXO Series Breakfast

Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
Alert Logic
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
Qualys
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 

Similar a CSO CXO Series Breakfast (20)

Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud Next-Generation SIEM: Delivered from the Cloud
Next-Generation SIEM: Delivered from the Cloud
 
Modern vs. Traditional SIEM
Modern vs. Traditional SIEM Modern vs. Traditional SIEM
Modern vs. Traditional SIEM
 
Security Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdfSecurity Considerations When Using Cloud Infrastructure Services.pdf
Security Considerations When Using Cloud Infrastructure Services.pdf
 
Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015Journey to the Cloud: Securing Your AWS Applications - April 2015
Journey to the Cloud: Securing Your AWS Applications - April 2015
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?MYTHBUSTERS: Can You Secure Payments in the Cloud?
MYTHBUSTERS: Can You Secure Payments in the Cloud?
 
Automating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and ComplianceAutomating Critical Security Controls for Threat Remediation and Compliance
Automating Critical Security Controls for Threat Remediation and Compliance
 
Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015Scalar Security Roadshow April 2015
Scalar Security Roadshow April 2015
 
Improve Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USMImprove Situational Awareness for Federal Government with AlienVault USM
Improve Situational Awareness for Federal Government with AlienVault USM
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
2015 Year to Date Security Trends
2015 Year to Date Security Trends2015 Year to Date Security Trends
2015 Year to Date Security Trends
 
Cyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO DayCyber Security in the market place: HP CTO Day
Cyber Security in the market place: HP CTO Day
 
MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night? MBT Webinar: Does the security of your business data keep you up at night?
MBT Webinar: Does the security of your business data keep you up at night?
 
Datacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGeeDatacenter 2014: Trend Micro - Bill MCGee
Datacenter 2014: Trend Micro - Bill MCGee
 
Managing security threats in today’s enterprise
Managing security threats in today’s enterpriseManaging security threats in today’s enterprise
Managing security threats in today’s enterprise
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
Plataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação CibernéticaPlataforma de Operação e Simulação Cibernética
Plataforma de Operação e Simulação Cibernética
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 

Más de CSO_Presentations

Más de CSO_Presentations (9)

Graham Cluley - CSO Perspectives Roadshow 2016
Graham Cluley - CSO Perspectives Roadshow 2016Graham Cluley - CSO Perspectives Roadshow 2016
Graham Cluley - CSO Perspectives Roadshow 2016
 
Erica Hardinge - CSO Perspectives Roadshow 2016
Erica Hardinge - CSO Perspectives Roadshow 2016Erica Hardinge - CSO Perspectives Roadshow 2016
Erica Hardinge - CSO Perspectives Roadshow 2016
 
Robert Lentz - CSO Perspectives Roadshow 2016
Robert Lentz - CSO Perspectives Roadshow 2016Robert Lentz - CSO Perspectives Roadshow 2016
Robert Lentz - CSO Perspectives Roadshow 2016
 
CSO Breakfast in Partnership with ESET 1st Dec - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET 1st Dec - Juraj Malcho PresentationCSO Breakfast in Partnership with ESET 1st Dec - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET 1st Dec - Juraj Malcho Presentation
 
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho PresentationCSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
CSO Breakfast in Partnership with ESET - Juraj Malcho Presentation
 
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
CSO CXO Series Breakfast in partnership with Kaspersky Lab,, 11th Nov Sydney....
 
William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015William Cheswick Presentation - CSO Perspectives Roadshow 2015
William Cheswick Presentation - CSO Perspectives Roadshow 2015
 
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Peter Gutmann Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
 
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
Francis Kaitano Presentation - CSO Perspectives Roadshow Auckland 9th Mar 2015
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

CSO CXO Series Breakfast

  • 2. Raimund Genes Chief Technology Officer, Trend Micro
  • 3. Did these guys care about cloud security? 0 20,000,000 40,000,000 60,000,000 80,000,000 100,000,000 120,000,000 140,000,000 160,000,000 #RecordsLost
  • 4. Anatomy of an attack Ercan Findikoglu and crew GetsCCdata/PIN RaisesLimit Recruits CopyDataoncards Cashing crews Hand to Money, Money, Money!
  • 6. Letter from Richard Stiennon to President Obama 8 years ago https://www.linkedin.com/pulse/drastic-times-call-measures-cybersecurity-richard-stiennon I. All access must be explicitly authorized. II. All users must be identified and strongly authenticated. III. All applications must be reviewed for security vulnerabilities. IV. All network attached systems must be scanned for vulnerabilities on a schedule. V. All network connections must be fire-walled. VI. All firewalls must be configured to “deny all except that which is explicitly allowed”. VII. All government networks must be mapped and understood. VIII. All data needs to be encrypted at rest IX. All communication links need to be encrypted X. All intrusions need to be aggressively analyzed and appropriate responses executed.
  • 7. QUESTION NO. 1 FOR CLOUD COMPUTING (IN EUROPE) Where is it stored? Not a concern for Australia?
  • 8. 1. Secure data transfer 2. Secure software interfaces. 3. Secure stored data 4. User access control 5. Data separation Source: http://blogs.cisco.com/smallbusiness/the-top-5-security-risks-of-cloud-computing Cisco’s view:
  • 9. Source: https://downloads.cloudsecurityalliance.org/initiatives/top_threats/The_Notorious_Nine_Cloud_Computing_Top _Threats_in_2013.pdf CSA view: 1. Data Breaches 2. Data Loss 3. Account Hijacking 4. Insecure APIs 5. Denial of Service 6. Malicious Insiders 7. Abuse of Cloud Services 8. Insufficient Due Diligence 9. Shared technology Issues
  • 12. Time to patch makes it easy for attackers
  • 13.
  • 14. Remote Control System Price Scheme
  • 15. Have you simply “lifted-and-shifted” your traditional security to your virtualised data center and cloud? Trend micro’s view
  • 16. Many organizations are experiencing the following… • Minutes to deploy a server…weeks to secure it • Virtually scale beyond physical limits… until you hit your security limit • Servers that share resources…security that consumes it
  • 17. Attackers Potential Risks • Vulnerability in server exploited to introduce malicious code • Company must restrict access to certain applications • Admin makes changes to known good configuration • Hacker attempts a SQL injection attack • Brute force authentication attack is executed
  • 18. Security principles remain the same; APPROACH to security must change CONTEXT Workload and application-aware SOFTWARE Security that evolves with the data center PLATFORM Single platform for data center and cloudSiloed Generic Hardware ADAPTIVE Intelligent, dynamic policy enforcement Automated provisioning specific to platform Static
  • 19. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimise data center resources Extend to cloud with confidence
  • 20. Provisioning securely within a dynamic data center How do you: • Secure the VM the moment it is provisioned? • Apply the right policies to that VM? • Reduce the time to provision without compromising on security? • Securely bring up/down/move your VMs?
  • 21. Provisioning Infrastructure vCenter, AD, vCloud and AWS SAP Exchange Servers Oracle Web Servers Web Server Automate security as part of your operations • Gain visibility into environment using vCenter and vCloud Director integration • Recommend and apply policies automatically - specific to your data center • Automatically scale up and down as required—with no security gaps 19 Rules 15 Rules 73 Rules 8 Rules 28 Rules
  • 22. Simplify provisioning even further with VMare NSX • Automated deployment using ESXi 5.5+ • Automatic activation of policies • No maintenance mode or re-boot required Security is an available service among VMware and other partner services
  • 23. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimise data center resources Extend to cloud with confidence
  • 24. Management Challenge: Keeping up-to-date How do you: • Quickly and easily identify an issue? • Keep up to date with patches? • Manage multiple controls as you execute your strategy for your data center and cloud?
  • 25. Establish continuous monitoring to quickly identify issues and respond • Leverage a comprehensive dashboard across controls • Implement reporting and alerting • Manage via web console or API
  • 26. Protect even before you patch • Protect against vulnerability exploits before patches available • Save money avoiding costly emergency patching • Patch at your convenience Vulnerability Disclosed or Exploit Available Patch Available Complete Deployment Test Soak Exposure Begin Deployment Patch ed Trend Micro Virtual Patching
  • 27. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimise data center resources Extend to cloud with confidence
  • 28. Resource challenges: Address the bottlenecks How do you reduce the impact on resources created by traditional security capabilities?
  • 29. Optimized for your virtual environments Network Usage Scan Speed CPU/Memory Usage IOPS Storage ESXi SAN
  • 30. New approach can improve data center operations Provision security automatically within a data center Manage security effectively and efficiently as you scale Optimise data center resources Extend to external or public cloud with confidence
  • 31. Public Cloud: Affects every organisation Public cloud extension of Private Cloud by I.T. (Bursting) Business groups Bypass IT to use Public Cloud Private Cloud forced to take on attributes of Public Cloud (ITaaS)
  • 32. Cloud Deployment Dynamics Instance Awareness • Dynamic real-time security visibility and response Complexity • Supporting multi-region and global deployments Scale & Automation • Elastic services and applications managed with new tools Data Protection • Protection of all data across boot & data volumes Purchasing • Ability to purchase security aligned to cloud models
  • 33. Security in the cloud is a Shared Responsibility Partner Eco-System • Operating Systems • Application • Security Groups • OS Firewalls • Anti-Virus • Account Management • Storage Encryption • Facilities • Physical Security • Physical Infrastructure • Virtualised Infrastructure Customer Domain AWSDomain Foundation Services Compute Storage Database Networking AWS Global Infrastructure Edge Locations Availability Zones Regions Enterprise Applications Enterprise Operation Systems
  • 34. Dr. Raymond Choo Fulbright Scholar (Cyber Security/Crime and Digital Forensics) and Inventor What happens when your organisation is COMPROMISED?
  • 35. Have you NOT read about a high profile cyber security incident, OR NOT heard of an organisation in your sector or government agency that has been breached (e.g. malware infection and theft of corporate data, such as customer information and intellectual property) in the last 12-month or financial year?
  • 39. Challenges • Attribution and identification: More likely to be able to infer or identify the offender in a physical crime based on the physical location of the crime and/or the types of weapons / technologies than their cyber analogues • Responding: Uncertainty about physical location complicates efforts by governments to respond and investigate and to use retaliation as a deterrent (simply on the basis of the cui bono logic or circumstantial evidence) Cyber attacks more sophisticated and going ‘under the radar’
  • 40. What happens when your organisation is COMPROMISED?
  • 41. Incidentmanagement Incident handling Preparation Detection and analysis Incident response Containment Eradication RecoveryPost-incident Vulnerability handling Artefact handling Event management Announcement Alerts
  • 42. What about digital forensics, and digital evidence? Do they matter?
  • 43. Digital forensics “the process of identifying, preserving, analysing and presenting digital evidence in a manner that is legally acceptable” McKemmish’s Key Elements • Identification • Preservation • Analysis • Presentation NIST Key Elements • Collection • Examination • Analysis • Reporting McKemmish, R 1999, 'What is Forensic Computing?', Trends & Issues in Crime and Criminal Justice, vol. 118, pp. 1 - 6. p.1 Kent, K, Chevalier, S, Grance, T & Dang, H 2006, Guide to Integrating Forensic Techniques into Incident Response, U.S. Department of Commerce, <http://csrc.nist.gov/publications/nistpubs/800-86/SP800-86.pdf>.
  • 44. • Reconstructing of the incident and establish facts such as • Where did the attack come from?; • What vulnerability (ies) was/were exploited?; and • What data / which systems was/were compromised? • Etc • Inform risk mitigation strategy • Evidence collected can be used in: • the prosecution of the offender in a court of law; or • a civil litigation (e.g. such services are increasingly offered by consultancy companies such as Deloitte, E&Y, KPMG, and PwC). The importance of digital forensics (evidence collection) in incident handling
  • 45. Digital forensics: Challenges of cloud computing “little guidance exists on how to acquire and conduct forensics in a cloud environment” (National Institute of Standards and Technology 2011, p.64) “[c]urrently, guidelines and best practice guides on gathering digital evidence are rare and often outdated. There are no guidelines specific to evidence gathered in the cloud…” (Birk and Wegener 2011, p.9) “[m]ore research is required in the cyber domain, especially in cloud computing, to identify and categorize the unique aspects of where and how digital evidence can be found. End points such as mobile devices add complexity to this domain. Trace evidence can be found on servers, switches, routers, cell phones, etc” by previous Director of US Department of Defence Computer Forensics Laboratory and the previous Chief Scientist at US Air Force Research Laboratory Information Directorate (Zatyko & Bay 2012, p.15)
  • 46. Our cloud forensics framework Iterative 1. Commence (Scope) Determine the scope of the investigation, the requirements and limitations, prepare equipment and expertise. 2. Identification and Preservation It is critical that preservation commences as soon as cloud computing use is discovered in a case, as such it is combined with identification in this model. 3. Collection The potential difficulties in collection of cloud computing data dictates the requirement for collection to be represented as a separate step. 4. Examination and Analysis Examination of the collected data allows the investigator to locate the evidence in the data, analysis transforms this data into evidence. 5. Reporting and Presentation This step relates to reporting and presenting evidence to court. As such this step will remain mostly unchanged. 6. Feedback and Complete This step relates to a review of the findings and a decision to finalise the case or expand the analysis.
  • 47. “Cloud Storage Forensics” http://store.elsevier.com/product.jsp?isbn=9780124199705. • Forewords written by Australia’s Chief Defence Scientist (首席澳大利亚国防科学家及国防科技组织 (DSTO)领导人) and the Chair of Electronic Evidence Specialist Advisory Group, Senior Managers of Australian and New Zealand Forensic Laboratories. • Highly Commended Award in the 2014 “Best Chapter in a Book” Category by Australia New Zealand Policing Advisory Agency (ANZPAA) National Institute of Forensic Science (NIFS)
  • 48. Remote Evidential Data Collection System (REDCoS) • Limitations due to current forensic techniques making use of vendor data communication facilities built into the client devices (e.g. iTunes backup for iOS devices), inability to circumvent advanced security features and anti-forensic features, etc • Data (remote) collection / exfiltration techniques for forensic / criminal intelligence (Australian Provisional Patent filed December 2014; PCT filed July 2015) • Big forensic data reduction method (Australian Provisional Patent, filed December 2014, and PCT to be filed in September 2015)
  • 49. Remote Evidential Data Collection System (REDCoS) • Provides organisations with the capability to collect electronic evidence, from a range of data sources, in a forensically sound manner without the need for specially trained staff. • Evidence sources need not be physically collocated with the evidence collection staff. • REDCoS only requires network access and, as such, is particularly suitable for evidence collection from sources such as cloud computing and remote unmanned equipment.
  • 50. Remote Evidential Data Collection System (REDCoS) • Suitable for collection of local and remote evidence (e.g. evidential data stored in the cloud and systems located offshore); • Can be operated by IT personnel without forensic training; • Cost effective, permits remote collection without requiring forensic consultants or prohibitive travel expenses; • Efficient, focuses only on collection of evidential data; • Real time evidence collection and review.
  • 51. Dr. Kim-Kwang Raymond Choo Research Director, CSA Australia Chapter Co-Chair, CSA Asia Pacific Education Council Co-Founder, Cloud Forensics International raymond.choo@fulbrightmail.org