This document discusses effective strategies for managing cyber security risks from a cloud services perspective. It outlines the evolution of cyber threats from simplistic attacks in the past to modern sophisticated nation state and organized crime threats. It emphasizes the increased risks from mobility and use of public and private clouds. The document recommends strategies like engaging external security providers, establishing detection and response teams, elevating the CISO role, including mobility in security plans, and engaging vendor partners to help organizations prepare for and manage cloud security risks.
Jodhpur Park | Call Girls in Kolkata Phone No 8005736733 Elite Escort Service...
Cyber Event Prepers
1. Effective Strategies for Managing
Cyber Security Risks
06/17/15 1
NTE Business Services LLC
Owner
Independent Agent for IT
585-314-1824
My Digital Link LLC
Reseller CTO
Next Generation IT Specialty
585-314-1824
With credits to:
1- paloalto NETWORKS
2- Aruba Networks
3- DataGravity
2 - Nutanix
4. The Cyber-Kids of Yesterday
06/17/15 4
• Simplistic
• Competing for Street Cred
• Honing Skills
• Having Fun
• Signature Based Attacks
5. 1990s
Intrusion 2.0
2000s 2010>
x86
PP
• Hop from Port to Port
• Traffic Encryption
• Exploiting Open Ports
• Tunneling through
approved applications
State of the Art
(and Acceptable)
CLOUD
06/17/15 5
6. Modern Day Cyber Threat
Actors
06/17/15 6
• Nation States
• Organized Crime
• Well Financed
• Global Actors
• Cyber Warfare
• Internal & Experts
• Zero Day Malware
• Polymorphic
Protocols
• Embedded Malware
• Command & Control
Protocols
Sophisticated Weapons
AttacksAttacks
7. Mobility Factor
Virtualization Generation
x86 x86x86
PP
PUBLIC CLOUDPrivate Cloud
Payroll
HR Benefits
Traditional DATA CENTER
BYOD
Visitors
??
MS Exchange
Collab Site
??
??
06/17/15 7
9. Preparing for Cloud Security
06/17/15 9
• Engage External Providers
o Due Diligence / Cloud Provider
o Deep Analytics Services Provider
• Establish Detection / Response Team
• Create / Elevate CISO Function
• Include Mobility
• Engage / Select Vendor-Partners
o Strategic Relationship
o Roadmaps Reviews
• Time is of the essence
Call to Action
10. Effective Strategies for Managing
Cyber Security Risks
A Cloud Services Perspective
06/17/15 10
NTE Business Services LLC
Owner
Independent Agent for IT
My Digital Link LLC
Reseller CTO
Next Generation IT Specialty
Notas del editor
A 30,000 foot view………
To help you with a Call to Action
For Executive Sponsors
Interested in protecting the identity and assets of the company where you work.
Start with History
ignore history - doomed to repeat - So here’s the history
Individual department level computers - underutilized – wasteful and expensive
Evolution led to Server Sprawl
Server Sprawl gave rise to virtualization – Less Expensive and complex (jury out)?
Virtualization = Applications in bubbles floating about the IT infrastructure.
1999 Salesforce.com, CRM Software as a Service,
Browser based app – first SaaS.
Amazon Web Services Elastic Computing On Demand
Google Compute Engine, Rackspace and many others.
Now everywhere for B2B, B2C. Social Media and e-Commerce- SaaS, IaaS, PaaS.
The point APPLICATIONS Left home (the company desktop / the home PC) With Limited Protection
Limited protection meaning rudimentary by today’s standards. THEN….
Scanning files from floppy disk
Virus scans on HDD
On-line purchase and downloads – infancy
Free-ware was the dominant host for transmission of viruses deployed by hackers
Home firewall nearly non-existent
Network infrastructure un-sophisticated
Enterprise firewalls limited to
Monitoring PORTS, PROTOCOLS and IP ADDRESSES
There was No peeking in on applications
Monitoring of data objects or unstructured data did not exist
Nothing was “APPLICATION AWARE”
IP tunneling for VPNs was new and not addressed by firewalls of the day
Many remain in service today
Insufficient for a MOBILE community and CLOUD.
Firewalls may have been rudimentary but so were the threats
Out for a little fun
Show off - peers
Honing skills in competition
Early forms of Viruses, Worms and Trojan Horses
Exploiting firewall vulnerabilities and holes software code
Examples
Miami 16yr old – hacked NASA servers winning 6 mos. in jail
MafiaBoy, 14yrs old - DoS Attacks on Yahoo, CNN, eBay & Amazon
Downingtown PA 15yr old - 41,000 SSNs from residents
Consequences were serious but Smaller scale / less frequent then
No target rich Mobile User community to exploit
State of the art - Symantec, Norton and McAfee
Focused on Threat Prevention and Protection
Cloud upped the ante - Enabled Intrusion 2.0
Un-intended consequences
Enhanced Cloud Applications Accessibility and Mobility
Accepted State of the ART for Internet Based Applications
Hop from Port to Port
Encryption their Traffic
Exploiting Open Ports and
Tunneling through approved applications
Analogy
Cloud - information highway with on ramps and off ramps.
Vehicles = APPLICATIONS
Drivers both licensed or un-licensed
Visiting Grandmas
Transporting Contraband.
Mix of Applications per vehicle
What is on your device – Audience’s Mobile Apps
Pintrest, Amazon, Salesforce, Company Apps, etc.
Well financed and they have grown up to be experts
Enormous $$$ Gain to be had
Remember Target or Sony?
Defense Dept. (and others) Cyber Warfare initiatives
Machiavelli - “The best defense is a good offense”
Nation States and Organized crime dwarf the efforts of individual hackers
Great career for Grown up experts
Tools of the trade…
Zero Day Malware – unknown vulnerabilities – days to years to Detect
Polymorphic Protocols – ScambleSuit – defeat Deep Packet Inspection (DPI) originally to override Nation/State Censorship
Embedded Malware within Virtual Machines
Sophisticated Command and Control protocols embedded in Peer-to-peer, social and Cloud networks
Cyber Criminals leverage Google AppEngine - multi-server command and control centers
add the Mobility Factor
Workplace BYOD – Multiple Devices – Double Agents – Personal & Business
Tablet PC
Smart Phone
iWatch
Fit Bit.
Point out all of the pathways
Electronic Drafting
Right on your heels through security and on the Corporate database and Intellectual Property archives
Good News – Cyber Security is Good Business
Upstarts and Established are innovating backed by smart money.
Downside examples,
2014 Target breach - about $110 million
2007 TJX Companies - about $250 million
2011 Sony Playstation hack - about $170 million
For existing traditional IT
Ports – Protocols & IP Address based will remain
PREVENT & PROTECT MBOs will remain
BUT CLOUDS MEAN - YOU DON’T OWN IT ALL
Control is delegated in Cyber-Space
Cyber Security Investments = on DETECTION and RESPONSE to attacks ….
within Applications and Virtualized Environments
within the User’s (often personal) Devices and
Inside unstructured data or CONTENT in the form of video files, audio files and pdf documents
Call to Action.
Shift % traditional prevent and protect MBOs to Detect and Respond
Zero sum $$$
Hire a CISO - adjunct to CFO and CIO.
Due diligence - Cloud Provider Security Policies and Plans
Engage security solutions vendor/partner
Don’t forget Mobility.
Roadmap reviews with all of them
Know where they are going and provide input.
The ability to prowl around applications, VMs and unstructured data
Require resources capable of deploying deep analytics.
Find a capable services provider in that area (F100).
Start - Time is of the essence.
Remember Sony at $170M – AT&T at $2M – Fidelity Investments at $1M and Target at $141M – not to mention your Customers Data which is – Priceless!
The big take away is…….
Cyber Attacker will eventually hit the mark
The State of the Art for Security in the Cloud is now……
Don’t wait for more
How soon can you detect an attack?
How fast and how will you respond?
Thank you for listening