SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
“The East / West Problem” 
! 
Dwight Koop, 
COO at CohesiveFT 
! 
Tweet: @dwightkoop 
#cloudcamp 
Sponsored by 
Hosted by 
#cloudcamp 
@CloudCamp_CHI
The East / West 
Problem 
Chicago Cloud Camp 
Chalk Talk 
November 3, 2014 
Dwight Koop 
No CohesvieFT 
Logo Here!
Axiom Threat Group 
fbi TLP:GREEN 
f b i flash 
fbi liaison alert system 
#a-000042-mw 
The following information was obtained through FBI investigations and is provided in accordance with 
the FBI's mission and policies to prevent and protect against federal crimes and threats to the national 
security. 
This FLASH has been released TLP:GREEN: The information in this product is useful for the awareness of all 
participating organizations as well as with peers within the broader community or sector. Recipients may share 
this information with peers and partner organizations within their sector or community, but not via publicly 
accessible channels. 
There is no additional information available on this topic at this time. 
SUMMARY 
The FBI is providing the following information with HIGH confidence: 
The FBI obtained information regarding a group of Chinese Government affiliated cyber actors who routinely 
steal high value information from US commercial and government networks through cyber espionage. These 
state-sponsored hackers are exceedingly stealthy and agile by comparison with the People's Liberation Army Unit 
61398 ("APT1") whose activity was publicly disclosed and attributed by security researchers in February 2013. 
This Chinese Government affiliated group previously documented by private sector reports referencing 
Operation Deputy Dog, Operation Snowman, Operation Ephemeral Hydra, Hidden Lynx, and APT17, as well as 
Bit9 and Google security alerts has heavily targeted the high tech information technology industry including 
microchip, digital storage and networking equipment manufacturers, as well as defense contractors in multiple 
countries and multinational corporations. These actors have deployed at least four zero-day exploits in the 
attacks which compromised legitimate websites to deliver malicious payloads. Any activity related to this group 
detected on a network should be considered an indication of a compromise requiring extensive mitigation and 
contact with law enforcement. 
TECHINICAL DETAILS 
The FBI is providing the following information with HIGH confidence: 
This group uses some custom tools that should be immediately flagged if detected, reported to FBI CYWATCH, 
and given highest priority for enhanced mitigation. The presence of such tools is typically part of a 
comprehensive, multifaceted effort to maintain persistent network access and exfiltrate data. The custom tools 
used by this group are as follows: 
October 15, 2014 
Chinese Government 
Hackers 
Sophistication moving 
“LATERALLY’’ 
once inside … they go 
undetected
SEC OCIE Softball 
Office of Compliance Inspections and Examinations 
Cybersecurity Exam 
Question 10 - Networks 
Unauthorized Lateral 
Movement 
Business Function 
Isolation 
Separate Dev/Test/Prod/DR 
INcident Response Logs
Let’ Just Assume 
They’re Inside Already 
JPMC - 2 Monyhs 
Neiman Marcus - 5 Months 
Home Depot - 5 Months 
Goodwill - 18 Months 
Wall Street Secirity Gaps 
New York Times 10/21/2014 
SAAB - No Comment 
Mexico President’s Office - 2 years 
Source…
Walls vs. Windows 
VM VM VM VM 
Virtualization 
Hardware 
Network 
NIC NIC NIC NIC 
Network 
VMware’s View 
CISCO’s View
“VMs sure talk a Lot” 
NORTH 
WEST EAST 
SOUTH 
80% of 
DataCenter 
Traffic Is 
E-W, 
Martìn Casado, VMW 
80% of 
Security 
Spend Is 
N-S. 
Martìn Casado, VMW
Not just a bunch of VMs 
Currencies 
DB Tier 
APP Tier 
WEB Tier 
ETLs 
Mes. Q’s 
APIs 
BONDS 
DB Tier 
APP Tier 
WEB Tier 
ETLs 
Mes. Q’s 
APIs
Who Knows Each App Best?
Who Knows Each App Best? 
DevOps - Meet - DevSec

Más contenido relacionado

La actualidad más candente

Zero Day Response: Strategies for Cyber Security Defense
Zero Day Response: Strategies for Cyber Security DefenseZero Day Response: Strategies for Cyber Security Defense
Zero Day Response: Strategies for Cyber Security DefenseTripwire
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous HackersVinuammu
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareSecuricon
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsKristian Alisasis Pura
 
Cyber securityincidents 2016
Cyber securityincidents 2016Cyber securityincidents 2016
Cyber securityincidents 2016Raghavendra P.V
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorismbl26ehre
 
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhousechildlikeegg1000
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Abzetdin Adamov
 
Presentación3
Presentación3Presentación3
Presentación3Mikecdr
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidentsassanesignate
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introductionsunnysmith
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020Jayna Mistry
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceE Hacking
 

La actualidad más candente (20)

Zero Day Response: Strategies for Cyber Security Defense
Zero Day Response: Strategies for Cyber Security DefenseZero Day Response: Strategies for Cyber Security Defense
Zero Day Response: Strategies for Cyber Security Defense
 
Top 5 notorous Hackers
Top 5 notorous HackersTop 5 notorous Hackers
Top 5 notorous Hackers
 
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of CyberwarfareLooking Ahead Why 2019 Will Be The year of Cyberwarfare
Looking Ahead Why 2019 Will Be The year of Cyberwarfare
 
Cybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security ControlsCybersecurity: Connectivity, Collaboration and Security Controls
Cybersecurity: Connectivity, Collaboration and Security Controls
 
Cyber Warfare -
Cyber Warfare -Cyber Warfare -
Cyber Warfare -
 
Cyber Terrorism
Cyber TerrorismCyber Terrorism
Cyber Terrorism
 
Cyber securityincidents 2016
Cyber securityincidents 2016Cyber securityincidents 2016
Cyber securityincidents 2016
 
Cyberterrorism
CyberterrorismCyberterrorism
Cyberterrorism
 
FBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A PowerhouseFBI's New Data Warehouse A Powerhouse
FBI's New Data Warehouse A Powerhouse
 
Session 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj YunosSession 3.2 Zahri Hj Yunos
Session 3.2 Zahri Hj Yunos
 
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.Technical, Legal and Political Issues of Combating Terrorism on the Internet.
Technical, Legal and Political Issues of Combating Terrorism on the Internet.
 
Presentación3
Presentación3Presentación3
Presentación3
 
Prism
PrismPrism
Prism
 
Hacking
HackingHacking
Hacking
 
Computer security incidents
Computer security incidentsComputer security incidents
Computer security incidents
 
Cyber crime final
Cyber crime finalCyber crime final
Cyber crime final
 
C|EH Introduction
C|EH IntroductionC|EH Introduction
C|EH Introduction
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Social Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligenceSocial Media Monitoring tools as an OSINT platform for intelligence
Social Media Monitoring tools as an OSINT platform for intelligence
 

Similar a Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"

Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Alisha Deboer
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Black Duck by Synopsys
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...David Sweigert
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?Michael Soltys
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...Matthew Kurnava
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Vania_Chaker
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...- Mark - Fullbright
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattssonUlf Mattsson
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the UnexpectedCharles Mok
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMeg Weber
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015Robert Craig
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidPhil Agcaoili
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Jordan Peacock
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information AgeJordan Peacock
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust modelCristian Garcia G.
 

Similar a Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk" (20)

Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disr...
 
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
Open Source Insight: You Can’t Beat Hackers and the Pentagon Moves into Open...
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...On How the Darknet and its Access to SCADA is a Threat to National Critical I...
On How the Darknet and its Access to SCADA is a Threat to National Critical I...
 
Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...Warrantless governmental surveillance through the use of emerging technology ...
Warrantless governmental surveillance through the use of emerging technology ...
 
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
The Federal Government's Track Record on Cybersecurity and Critical Infrastru...
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
Mark Anderson on Cyber Security
Mark Anderson on Cyber SecurityMark Anderson on Cyber Security
Mark Anderson on Cyber Security
 
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
U session 9 cyber risk-insurance conf_marcus_evans_rj_craig_15jan2015
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and AfraidAECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
AECF: A Look into Cyber Crime - Doomsday Preppers for the Naked and Afraid
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
News bytes-July 2013
News bytes-July 2013News bytes-July 2013
News bytes-July 2013
 
Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]Privacy in the Information Age [Q3 2015 version]
Privacy in the Information Age [Q3 2015 version]
 
Privacy in the Information Age
Privacy in the Information AgePrivacy in the Information Age
Privacy in the Information Age
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
Forrester no more chewy centers- the zero trust model
Forrester   no more chewy centers- the zero trust modelForrester   no more chewy centers- the zero trust model
Forrester no more chewy centers- the zero trust model
 
220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 

Más de CloudCamp Chicago

CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...
CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...
CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...CloudCamp Chicago
 
CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare CloudCamp Chicago
 
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...CloudCamp Chicago
 
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...CloudCamp Chicago
 
CloudCamp Chicago - June 17, 2015 The Internet of Things
CloudCamp Chicago - June 17, 2015 The Internet of ThingsCloudCamp Chicago - June 17, 2015 The Internet of Things
CloudCamp Chicago - June 17, 2015 The Internet of ThingsCloudCamp Chicago
 
CloudCamp Chicago lightning talk "Building warehousing systems on Redshi...
CloudCamp Chicago lightning talk      "Building warehousing systems on Redshi...CloudCamp Chicago lightning talk      "Building warehousing systems on Redshi...
CloudCamp Chicago lightning talk "Building warehousing systems on Redshi...CloudCamp Chicago
 
CloudCamp Chicago lightning talk "Spark: A Quick Ignition" - Matthew Kem...
CloudCamp Chicago lightning talk      "Spark: A Quick Ignition" - Matthew Kem...CloudCamp Chicago lightning talk      "Spark: A Quick Ignition" - Matthew Kem...
CloudCamp Chicago lightning talk "Spark: A Quick Ignition" - Matthew Kem...CloudCamp Chicago
 
CloudCamp Chicago lightning talk "Big Data without Big Infrastructure" by ...
CloudCamp Chicago lightning talk    "Big Data without Big Infrastructure" by ...CloudCamp Chicago lightning talk    "Big Data without Big Infrastructure" by ...
CloudCamp Chicago lightning talk "Big Data without Big Infrastructure" by ...CloudCamp Chicago
 
CloudCamp Chicago - Big Data & Cloud May 2015 - All Slides
CloudCamp Chicago - Big Data & Cloud May 2015 - All SlidesCloudCamp Chicago - Big Data & Cloud May 2015 - All Slides
CloudCamp Chicago - Big Data & Cloud May 2015 - All SlidesCloudCamp Chicago
 
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...CloudCamp Chicago
 
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...CloudCamp Chicago
 
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...CloudCamp Chicago
 
CloudCamp Chicago April 2015 - "FinTech"
CloudCamp Chicago April 2015 - "FinTech"CloudCamp Chicago April 2015 - "FinTech"
CloudCamp Chicago April 2015 - "FinTech"CloudCamp Chicago
 
CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago
 
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx CloudCamp Chicago
 
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/O
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/OCloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/O
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/OCloudCamp Chicago
 
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)CloudCamp Chicago
 
Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...
 Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re... Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...
Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...CloudCamp Chicago
 
Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...
 Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ... Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...
Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...CloudCamp Chicago
 
Cloudcamp Chicago Nov 2104 Fintech - Aziz Lalljee
Cloudcamp Chicago Nov 2104 Fintech - Aziz LalljeeCloudcamp Chicago Nov 2104 Fintech - Aziz Lalljee
Cloudcamp Chicago Nov 2104 Fintech - Aziz LalljeeCloudCamp Chicago
 

Más de CloudCamp Chicago (20)

CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...
CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...
CloudCamp Chicago lightning talk "IoT Perspectives from the Trenches" - Steve...
 
CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare CloudCamp Chicago lightning talk IoT in Healthcare
CloudCamp Chicago lightning talk IoT in Healthcare
 
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...
CloudCamp Chicago lightning talk "Connecting Vehicles on Google Cloud Platfor...
 
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...
CloudCamp Chicago lightning talk "The Internet of (Insecure) Things" - Chandl...
 
CloudCamp Chicago - June 17, 2015 The Internet of Things
CloudCamp Chicago - June 17, 2015 The Internet of ThingsCloudCamp Chicago - June 17, 2015 The Internet of Things
CloudCamp Chicago - June 17, 2015 The Internet of Things
 
CloudCamp Chicago lightning talk "Building warehousing systems on Redshi...
CloudCamp Chicago lightning talk      "Building warehousing systems on Redshi...CloudCamp Chicago lightning talk      "Building warehousing systems on Redshi...
CloudCamp Chicago lightning talk "Building warehousing systems on Redshi...
 
CloudCamp Chicago lightning talk "Spark: A Quick Ignition" - Matthew Kem...
CloudCamp Chicago lightning talk      "Spark: A Quick Ignition" - Matthew Kem...CloudCamp Chicago lightning talk      "Spark: A Quick Ignition" - Matthew Kem...
CloudCamp Chicago lightning talk "Spark: A Quick Ignition" - Matthew Kem...
 
CloudCamp Chicago lightning talk "Big Data without Big Infrastructure" by ...
CloudCamp Chicago lightning talk    "Big Data without Big Infrastructure" by ...CloudCamp Chicago lightning talk    "Big Data without Big Infrastructure" by ...
CloudCamp Chicago lightning talk "Big Data without Big Infrastructure" by ...
 
CloudCamp Chicago - Big Data & Cloud May 2015 - All Slides
CloudCamp Chicago - Big Data & Cloud May 2015 - All SlidesCloudCamp Chicago - Big Data & Cloud May 2015 - All Slides
CloudCamp Chicago - Big Data & Cloud May 2015 - All Slides
 
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...
CloudCamp Chicago April 2015 - Patrick Kerpan's talk "What Financial Cloud Sh...
 
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...
CloudCamp Chicago April 2015 - Eero Pikat's talk "Micro-services and how they...
 
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...
CloudCamp Chicago April 2015 - John Downey's talk "Put away the credit card, ...
 
CloudCamp Chicago April 2015 - "FinTech"
CloudCamp Chicago April 2015 - "FinTech"CloudCamp Chicago April 2015 - "FinTech"
CloudCamp Chicago April 2015 - "FinTech"
 
CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security CloudCamp Chicago - March 2nd 2015 - Cloud Security
CloudCamp Chicago - March 2nd 2015 - Cloud Security
 
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx
CloudCamp Chicago March 2nd Lightning talk from Jim Tarantino at MarkITx
 
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/O
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/OCloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/O
CloudCamp Chicago March 2nd Lightning talk from Michael Roytman at Risk I/O
 
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)
CloudCamp Chicago Jan 2015 - The Guts of the Cloud (full slides)
 
Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...
 Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re... Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...
Cloudcamp Chicago Nov 2104 Fintech - Chris Hacker’s "Change is coming for re...
 
Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...
 Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ... Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...
Cloudcamp Chicago Nov 2104 Fintech - Justin Bouchard’s "Using Technology at ...
 
Cloudcamp Chicago Nov 2104 Fintech - Aziz Lalljee
Cloudcamp Chicago Nov 2104 Fintech - Aziz LalljeeCloudcamp Chicago Nov 2104 Fintech - Aziz Lalljee
Cloudcamp Chicago Nov 2104 Fintech - Aziz Lalljee
 

Último

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Último (20)

New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Cloudcamp Chicago Nov 2104 Fintech - Dwight Koop "East / West Chalkboard Talk"

  • 1. “The East / West Problem” ! Dwight Koop, COO at CohesiveFT ! Tweet: @dwightkoop #cloudcamp Sponsored by Hosted by #cloudcamp @CloudCamp_CHI
  • 2. The East / West Problem Chicago Cloud Camp Chalk Talk November 3, 2014 Dwight Koop No CohesvieFT Logo Here!
  • 3. Axiom Threat Group fbi TLP:GREEN f b i flash fbi liaison alert system #a-000042-mw The following information was obtained through FBI investigations and is provided in accordance with the FBI's mission and policies to prevent and protect against federal crimes and threats to the national security. This FLASH has been released TLP:GREEN: The information in this product is useful for the awareness of all participating organizations as well as with peers within the broader community or sector. Recipients may share this information with peers and partner organizations within their sector or community, but not via publicly accessible channels. There is no additional information available on this topic at this time. SUMMARY The FBI is providing the following information with HIGH confidence: The FBI obtained information regarding a group of Chinese Government affiliated cyber actors who routinely steal high value information from US commercial and government networks through cyber espionage. These state-sponsored hackers are exceedingly stealthy and agile by comparison with the People's Liberation Army Unit 61398 ("APT1") whose activity was publicly disclosed and attributed by security researchers in February 2013. This Chinese Government affiliated group previously documented by private sector reports referencing Operation Deputy Dog, Operation Snowman, Operation Ephemeral Hydra, Hidden Lynx, and APT17, as well as Bit9 and Google security alerts has heavily targeted the high tech information technology industry including microchip, digital storage and networking equipment manufacturers, as well as defense contractors in multiple countries and multinational corporations. These actors have deployed at least four zero-day exploits in the attacks which compromised legitimate websites to deliver malicious payloads. Any activity related to this group detected on a network should be considered an indication of a compromise requiring extensive mitigation and contact with law enforcement. TECHINICAL DETAILS The FBI is providing the following information with HIGH confidence: This group uses some custom tools that should be immediately flagged if detected, reported to FBI CYWATCH, and given highest priority for enhanced mitigation. The presence of such tools is typically part of a comprehensive, multifaceted effort to maintain persistent network access and exfiltrate data. The custom tools used by this group are as follows: October 15, 2014 Chinese Government Hackers Sophistication moving “LATERALLY’’ once inside … they go undetected
  • 4. SEC OCIE Softball Office of Compliance Inspections and Examinations Cybersecurity Exam Question 10 - Networks Unauthorized Lateral Movement Business Function Isolation Separate Dev/Test/Prod/DR INcident Response Logs
  • 5. Let’ Just Assume They’re Inside Already JPMC - 2 Monyhs Neiman Marcus - 5 Months Home Depot - 5 Months Goodwill - 18 Months Wall Street Secirity Gaps New York Times 10/21/2014 SAAB - No Comment Mexico President’s Office - 2 years Source…
  • 6. Walls vs. Windows VM VM VM VM Virtualization Hardware Network NIC NIC NIC NIC Network VMware’s View CISCO’s View
  • 7. “VMs sure talk a Lot” NORTH WEST EAST SOUTH 80% of DataCenter Traffic Is E-W, Martìn Casado, VMW 80% of Security Spend Is N-S. Martìn Casado, VMW
  • 8. Not just a bunch of VMs Currencies DB Tier APP Tier WEB Tier ETLs Mes. Q’s APIs BONDS DB Tier APP Tier WEB Tier ETLs Mes. Q’s APIs
  • 9. Who Knows Each App Best?
  • 10. Who Knows Each App Best? DevOps - Meet - DevSec