SlideShare una empresa de Scribd logo
1 de 29
@ M A T T H E W P A S C U C C I
W W W . F R O N T L I N E S E N T I N E L . C O M
The State of Cyber Security
2015
2015 - A Year in Review
 Agenda
 Year in Review
 The major risks of the year
 Where we’ve succeeded
 Emerging Trends
Notable Hacks of 2015
Politicians Are Waking Up
 CISA (Computer Information Sharing Bill)
 Prime Minister David Cameron looking to pass anti-
terror bill to allow GCHQ to decrypt communications
 Constant talks with China about espionage
 FBI fighting for an encrypted backdoor
 The OPM hack was the last straw
 The NSA in the news daily
 CyberWar? What is it?
Where Have All The Good Guys Gone?
 The lack of Cyber security talent is scary:
 451 Research stated: 34.5% of project delays due to lack of staff
 How can we get students educated in Cyber Security?
 NSA/DHS created “Centers of Excellence” with scholarships
 Why isn’t this drawing people in?
 How can we entice people to our industry:
 Stats that people would be interested, but know nothing about
 Colleges doing a better job?
 Remove the stigma of “hacker lifestyle”
Privacy in the New Security
 Privacy jobs are starting to explode
 CIPP certifications are in great demand
 Companies over the next couple years will see a wave
of new privacy law hit them
 The EU laws are slowly making their way across the Atlantic
 Safe Harbor laws
 Technology vendors are now using privacy as a
selling point
 Apple, Twitter, etc.
 Everyone from Grandma to CEO is concerned
 Eff.org (Electronic Frontier Foundation)
Edward Snowden gets a Twitter Account
Find a Happy Place
Phishing is Still Killing Us
 Educate, Educate, Educate
 Test your users with fake phishing
 Run competitions and make it fun
 What to look for?
 Review real phishing emails, etc.
 Keep metrics and show improvements
 Make sure executive admins are aware
 Invest in a strong mail filter
 Not just email anymore, SMS, social media, etc
 This is your biggest threat right now. Fix it.
Phishing Stats
 According to Verizon:
 95% of espionage attacks involve phishing.
 Nearly 80% of all malware attacks come from phishing
 Almost 50% of recipients open emails and click on phishing
links within the first hour.
 There’s a 71% chance that phishing links are clicked on a
Windows machine.
 Technical emails are the most common messages to be clicked
on with a 21.3% click rate.
 iOS devices have a 16% click through rate, highest amongst
mobile devices.
Don’t DDoS me, bro!
 This is still a problem. It’s not going away.
 Protonmail just got hit with a DDoS
 Needed upstream providers and DDoS equipment to defend
 Are you ready for a DDoS attack?
 How would you react to a DDoS randsom?
 DDoS comes in many different flavors.
 Volumetric
 Application
 Hybrid
 DDoS smoke screens. Beware!
Coding Standards Need To Change
 When will we follow the “OWASP Top 10”?
 Jim Manico, Manicode Security, says he needs $4
billion dollars to fix the state of application security.
 SDLC’s being followed? Are they even there?
 Are you using proper release management?
 Constant vulnerability scanning
 Static Analysis
 Dynamic Analysis
 Mobile apps are a threat. Let’s not let history repeat
itself.
Vulnerabilities on the Rise
 Vulnerabilities are everywhere!
 Critical infrastructure
 Homes
 Business
 Companies selling zero days and researches finding them
 Double edged sword
 SSL is dead: Heartbleed, POODLE, FREAK, BEAST, etc
 Remediation plan? How long? What’s your risk appetite?
 Legacy systems still can’t get updated
 Patches? We don’t need no stinking patches.
Mobile is Here to Stay
 Do you “BYOD”?
 How are corporate apps being developed? Used? Deployed?
 Steps to lock down a mobile device
 Encryption
 Container
 DLP
 Mobile OWASP Top 10
 We’re moving down the path of this being the biggest threat
How do you “Incident Response”?
 Red team drills
 Determine what your worst nightmare is and live it.
 Runbooks
 Recording the steps to remediate your worst nightmares.
 SWAT Teams
 Getting a team of talented people to run the incident.
 Relationships with law enforcement
 If you don’t have this already you’re wasting time.
Third Party Vendors = Weakest Link
 Huge risk, just ask Target
 Lower the risk by performing third party risk reviews
 Create policy and forms to have vendors fill out
 This is your data and environment. In order to do
business with them they need to be assessed
 Creation of legal contracts
 When are you notified of a breach?
 Indemnification
 Review of vendors internal workings
 How do they perform security
Do You Know Where Your Data Is?
 Sensitive Data
 Do you know where your sensitive data is?
 What is sensitive data?
 DLP
 Network
 Endpoint
 Honeyfiles
 Insider threats
 The Edward Snowden Effect (for better or worse)
 This is dangerous because you’re giving them access, they
don’t need to break in first
Privileged Attack Hacks On The Rise
 CyberArk recently put out a survey saying 88% of all
companies are susceptible to privileged attack hacks.
 Windows environments are at greater risk, but there
are Linux concerns too.
 Randomization of accounts, including local and
service accounts, is key to stopping abuse.
 Session management and jump boxes are needed.
 Once an internal account is taken, it’s a matter of
time before things go south.
What We Get Right
The Boardroom is Noticing
 Funding is growing (hopefully you see it too)
 There has been an increase all round in funding
 Exponential jump from 5 years ago
 Cyber threats have become topic of concern
 Management is asking questions that they didn’t 5 years ago
 This is no longer compliance related
 People are realizing this could effect their wallets
Security Mentality Is Growing
 The Media
 Media hype draws attention (for better or worse)
 It’s all around us and it’s soaking into our culture
 The education of the normal user is growing. It
might not seem like that, but it’s on everyone’s mind.
 We have to harness this curiosity and mold it. This is
the “Golden Age of Security Awareness”.
Up and Coming Trends
Managed Security Services Providers (MSSP)
 Why aren’t we doing this more?
 Who has a fully staffed team monitoring 24x7?
 Who doesn’t? Would you consider this?
 Trust is a risk, but so is not doing anything.
 Acquire additional services, or limit to in-house only?
 Create retainers for services on demand:
 Malware reverse engineer
 Digital Forensics
 Etc.
Deception in Depth
 Hackers don’t play fair. Neither should you!
 Start using deception as a defense technique
 Concerned with prevention only, not detection
 Sea change in managements thinking
 Honeypots
 Honeytokens
 Darknet alerting
 Sinkholes
 Many new vendors coming out with deception tools
 An area I hope grows in the future
Cloud Based Security on the Rise
 Cloud based security tools
 Two-factor authentication
 DDoS protection
 Identity management
 SIEM
 Endpoint protection
 Cloud Security Alliance
 Star Registry
 Secure Hosting
 Amazon has made considerable advances in security services
(WAF, Security Assessment, HSM, firewall, etc.)
Cyber Insurance
 This is on the rise and you need it.
 It’s used for homes, cars and businesses. Why not cyber
attacks?
 Target was given $90 million from insurance and paid $162 million
out of pocket
 Understand the legal nuisances of cyber insurance
 Timeframes
 Logs
 Etc.
 Run through a dry run of contacting insurance
 Who are you going to call?
 Who needs to be involved (insurance, law enforcement, etc.)
 Determine who you’ll be working with
 Know if you need to bring something to the table
“Threat Intel” or “Sharing is Caring”
 Threat intelligence has grown over the past year
 The use of STIX/TAXII as a framework
 Multiple vendors creating vendor related intel
 Trusted circles
 Situational awareness Companies
 ISAC’s (Information Sharing and Analysis Centers)
are being established:
 FS-ISAC (Financial Services ISAC)
 NH-ISAC (National Health ISAC)
 E-ISAC (Electricity ISAC)
Machine Learning and Behavioral Analysis
 Signatures have failed. Long live Behavioral Analysis.
 Next Generation anti-malware/virus
 Basing attacks off certain analysis, not signatures. Limited set
of instructions and less updating.
 Prevention with limited updating is key.
 Machine Learning network based systems
 Determines how attacks work and alerts on risk.
 Profiling of users normal activity.
 Review of what is considered out of the norm between east-
west traffic.
Questions?
I know you have some. Lets hear them.

Más contenido relacionado

La actualidad más candente

BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyCasey Fleming
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141sraina2
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of SecurityKarina Elise
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentationwhmillerjr
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the BoardroomMarko Suswanto
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsBlack Duck by Synopsys
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Andrew Manoske
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersMerry D'souza
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firmsJake Weaver
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network Mighty Guides, Inc.
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Bala Guntipalli ♦ MBA
 

La actualidad más candente (20)

BLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity LiteracyBLACKOPS_USCS CyberSecurity Literacy
BLACKOPS_USCS CyberSecurity Literacy
 
InformationSecurity_11141
InformationSecurity_11141InformationSecurity_11141
InformationSecurity_11141
 
The 10 Secret Codes of Security
The 10 Secret Codes of SecurityThe 10 Secret Codes of Security
The 10 Secret Codes of Security
 
December ISSA Meeting Executive Security Presentation
December ISSA Meeting   Executive Security PresentationDecember ISSA Meeting   Executive Security Presentation
December ISSA Meeting Executive Security Presentation
 
GITA March 2015 Newsletter
GITA March 2015 NewsletterGITA March 2015 Newsletter
GITA March 2015 Newsletter
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating NewsOpen Source Insight: Security Breaches and Cryptocurrency Dominating News
Open Source Insight: Security Breaches and Cryptocurrency Dominating News
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)Modern Adversaries (Amplify Partners)
Modern Adversaries (Amplify Partners)
 
Cybersecurity - Sam Maccherola
Cybersecurity - Sam MaccherolaCybersecurity - Sam Maccherola
Cybersecurity - Sam Maccherola
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Top 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providersTop 10 leading fraud detection and prevention solution providers
Top 10 leading fraud detection and prevention solution providers
 
idg_secops-solutions
idg_secops-solutionsidg_secops-solutions
idg_secops-solutions
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Protecting the Core of Your Network
Protecting the Core of Your Network Protecting the Core of Your Network
Protecting the Core of Your Network
 
Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...Internal or insider threats are far more dangerous than the external - bala g...
Internal or insider threats are far more dangerous than the external - bala g...
 
Risky Business
Risky BusinessRisky Business
Risky Business
 

Similar a 11 19-2015 - iasaca membership conference - the state of security

Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrimethinkwithniche
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperCMR WORLD TECH
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016Core Security
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018Panda Security
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks- Mark - Fullbright
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 aMark Henshaw
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014John Bambenek
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyMark Albala
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Securitylearntransformation0
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessGreg Wartes, MCP
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)Andris Soroka
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalPriyanka Aash
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 

Similar a 11 19-2015 - iasaca membership conference - the state of security (20)

Ways To Protect Your Company From Cybercrime
Ways To Protect Your Company From CybercrimeWays To Protect Your Company From Cybercrime
Ways To Protect Your Company From Cybercrime
 
Security - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaperSecurity - intelligence - maturity-model-ciso-whitepaper
Security - intelligence - maturity-model-ciso-whitepaper
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Cyber security
Cyber securityCyber security
Cyber security
 
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
PandaLabs Reveals its Predictions for Cybersecurity Trends in 2018
 
Before the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracksBefore the Breach: Using threat intelligence to stop attackers in their tracks
Before the Breach: Using threat intelligence to stop attackers in their tracks
 
Bright talk intrusion prevention are we joking - henshaw july 2010 a
Bright talk   intrusion prevention are we joking - henshaw july 2010 aBright talk   intrusion prevention are we joking - henshaw july 2010 a
Bright talk intrusion prevention are we joking - henshaw july 2010 a
 
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
Champaign EDC Cybersecurity Seminar by John Bambenek - March 25, 2014
 
Why is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economyWhy is cyber security a disruption in the digital economy
Why is cyber security a disruption in the digital economy
 
The significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information SecurityThe significance of the 7 Colors of Information Security
The significance of the 7 Colors of Information Security
 
Cybersecurity awareness.pdf
Cybersecurity awareness.pdfCybersecurity awareness.pdf
Cybersecurity awareness.pdf
 
Security Minded - Ransomware Awareness
Security Minded - Ransomware AwarenessSecurity Minded - Ransomware Awareness
Security Minded - Ransomware Awareness
 
Manifesto_final
Manifesto_finalManifesto_final
Manifesto_final
 
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
2015 Cyber security solutions vs cyber criminals @WOHIT2015 (EU eHealth week)
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
Data Safety And Security
Data Safety And SecurityData Safety And Security
Data Safety And Security
 
Adjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New NormalAdjusting Your Security Controls: It’s the New Normal
Adjusting Your Security Controls: It’s the New Normal
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 

Último

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusZilliz
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Zilliz
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 

Último (20)

ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
A Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source MilvusA Beginners Guide to Building a RAG App Using Open Source Milvus
A Beginners Guide to Building a RAG App Using Open Source Milvus
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 

11 19-2015 - iasaca membership conference - the state of security

  • 1. @ M A T T H E W P A S C U C C I W W W . F R O N T L I N E S E N T I N E L . C O M The State of Cyber Security 2015
  • 2. 2015 - A Year in Review  Agenda  Year in Review  The major risks of the year  Where we’ve succeeded  Emerging Trends
  • 4. Politicians Are Waking Up  CISA (Computer Information Sharing Bill)  Prime Minister David Cameron looking to pass anti- terror bill to allow GCHQ to decrypt communications  Constant talks with China about espionage  FBI fighting for an encrypted backdoor  The OPM hack was the last straw  The NSA in the news daily  CyberWar? What is it?
  • 5. Where Have All The Good Guys Gone?  The lack of Cyber security talent is scary:  451 Research stated: 34.5% of project delays due to lack of staff  How can we get students educated in Cyber Security?  NSA/DHS created “Centers of Excellence” with scholarships  Why isn’t this drawing people in?  How can we entice people to our industry:  Stats that people would be interested, but know nothing about  Colleges doing a better job?  Remove the stigma of “hacker lifestyle”
  • 6. Privacy in the New Security  Privacy jobs are starting to explode  CIPP certifications are in great demand  Companies over the next couple years will see a wave of new privacy law hit them  The EU laws are slowly making their way across the Atlantic  Safe Harbor laws  Technology vendors are now using privacy as a selling point  Apple, Twitter, etc.  Everyone from Grandma to CEO is concerned  Eff.org (Electronic Frontier Foundation)
  • 7. Edward Snowden gets a Twitter Account
  • 8. Find a Happy Place
  • 9. Phishing is Still Killing Us  Educate, Educate, Educate  Test your users with fake phishing  Run competitions and make it fun  What to look for?  Review real phishing emails, etc.  Keep metrics and show improvements  Make sure executive admins are aware  Invest in a strong mail filter  Not just email anymore, SMS, social media, etc  This is your biggest threat right now. Fix it.
  • 10. Phishing Stats  According to Verizon:  95% of espionage attacks involve phishing.  Nearly 80% of all malware attacks come from phishing  Almost 50% of recipients open emails and click on phishing links within the first hour.  There’s a 71% chance that phishing links are clicked on a Windows machine.  Technical emails are the most common messages to be clicked on with a 21.3% click rate.  iOS devices have a 16% click through rate, highest amongst mobile devices.
  • 11. Don’t DDoS me, bro!  This is still a problem. It’s not going away.  Protonmail just got hit with a DDoS  Needed upstream providers and DDoS equipment to defend  Are you ready for a DDoS attack?  How would you react to a DDoS randsom?  DDoS comes in many different flavors.  Volumetric  Application  Hybrid  DDoS smoke screens. Beware!
  • 12. Coding Standards Need To Change  When will we follow the “OWASP Top 10”?  Jim Manico, Manicode Security, says he needs $4 billion dollars to fix the state of application security.  SDLC’s being followed? Are they even there?  Are you using proper release management?  Constant vulnerability scanning  Static Analysis  Dynamic Analysis  Mobile apps are a threat. Let’s not let history repeat itself.
  • 13. Vulnerabilities on the Rise  Vulnerabilities are everywhere!  Critical infrastructure  Homes  Business  Companies selling zero days and researches finding them  Double edged sword  SSL is dead: Heartbleed, POODLE, FREAK, BEAST, etc  Remediation plan? How long? What’s your risk appetite?  Legacy systems still can’t get updated  Patches? We don’t need no stinking patches.
  • 14. Mobile is Here to Stay  Do you “BYOD”?  How are corporate apps being developed? Used? Deployed?  Steps to lock down a mobile device  Encryption  Container  DLP  Mobile OWASP Top 10  We’re moving down the path of this being the biggest threat
  • 15. How do you “Incident Response”?  Red team drills  Determine what your worst nightmare is and live it.  Runbooks  Recording the steps to remediate your worst nightmares.  SWAT Teams  Getting a team of talented people to run the incident.  Relationships with law enforcement  If you don’t have this already you’re wasting time.
  • 16. Third Party Vendors = Weakest Link  Huge risk, just ask Target  Lower the risk by performing third party risk reviews  Create policy and forms to have vendors fill out  This is your data and environment. In order to do business with them they need to be assessed  Creation of legal contracts  When are you notified of a breach?  Indemnification  Review of vendors internal workings  How do they perform security
  • 17. Do You Know Where Your Data Is?  Sensitive Data  Do you know where your sensitive data is?  What is sensitive data?  DLP  Network  Endpoint  Honeyfiles  Insider threats  The Edward Snowden Effect (for better or worse)  This is dangerous because you’re giving them access, they don’t need to break in first
  • 18. Privileged Attack Hacks On The Rise  CyberArk recently put out a survey saying 88% of all companies are susceptible to privileged attack hacks.  Windows environments are at greater risk, but there are Linux concerns too.  Randomization of accounts, including local and service accounts, is key to stopping abuse.  Session management and jump boxes are needed.  Once an internal account is taken, it’s a matter of time before things go south.
  • 19. What We Get Right
  • 20. The Boardroom is Noticing  Funding is growing (hopefully you see it too)  There has been an increase all round in funding  Exponential jump from 5 years ago  Cyber threats have become topic of concern  Management is asking questions that they didn’t 5 years ago  This is no longer compliance related  People are realizing this could effect their wallets
  • 21. Security Mentality Is Growing  The Media  Media hype draws attention (for better or worse)  It’s all around us and it’s soaking into our culture  The education of the normal user is growing. It might not seem like that, but it’s on everyone’s mind.  We have to harness this curiosity and mold it. This is the “Golden Age of Security Awareness”.
  • 22. Up and Coming Trends
  • 23. Managed Security Services Providers (MSSP)  Why aren’t we doing this more?  Who has a fully staffed team monitoring 24x7?  Who doesn’t? Would you consider this?  Trust is a risk, but so is not doing anything.  Acquire additional services, or limit to in-house only?  Create retainers for services on demand:  Malware reverse engineer  Digital Forensics  Etc.
  • 24. Deception in Depth  Hackers don’t play fair. Neither should you!  Start using deception as a defense technique  Concerned with prevention only, not detection  Sea change in managements thinking  Honeypots  Honeytokens  Darknet alerting  Sinkholes  Many new vendors coming out with deception tools  An area I hope grows in the future
  • 25. Cloud Based Security on the Rise  Cloud based security tools  Two-factor authentication  DDoS protection  Identity management  SIEM  Endpoint protection  Cloud Security Alliance  Star Registry  Secure Hosting  Amazon has made considerable advances in security services (WAF, Security Assessment, HSM, firewall, etc.)
  • 26. Cyber Insurance  This is on the rise and you need it.  It’s used for homes, cars and businesses. Why not cyber attacks?  Target was given $90 million from insurance and paid $162 million out of pocket  Understand the legal nuisances of cyber insurance  Timeframes  Logs  Etc.  Run through a dry run of contacting insurance  Who are you going to call?  Who needs to be involved (insurance, law enforcement, etc.)  Determine who you’ll be working with  Know if you need to bring something to the table
  • 27. “Threat Intel” or “Sharing is Caring”  Threat intelligence has grown over the past year  The use of STIX/TAXII as a framework  Multiple vendors creating vendor related intel  Trusted circles  Situational awareness Companies  ISAC’s (Information Sharing and Analysis Centers) are being established:  FS-ISAC (Financial Services ISAC)  NH-ISAC (National Health ISAC)  E-ISAC (Electricity ISAC)
  • 28. Machine Learning and Behavioral Analysis  Signatures have failed. Long live Behavioral Analysis.  Next Generation anti-malware/virus  Basing attacks off certain analysis, not signatures. Limited set of instructions and less updating.  Prevention with limited updating is key.  Machine Learning network based systems  Determines how attacks work and alerts on risk.  Profiling of users normal activity.  Review of what is considered out of the norm between east- west traffic.
  • 29. Questions? I know you have some. Lets hear them.