cyber security: a tale from the...

Post on 01-Aug-2020

1 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Cyber Security: A Tale from the Trenches

Dr. Dimitrios Patsos

Chief Technology Officer, ADACOM S.A.

Askjfgjgkketigldsewo5mc2bad things are happening

What’s really happening ?

By whom ?

Who’s affected ?

Where ?

In the US

“In this interconnected, digital world, there are going to be opportunities for hackers to engage in cyber assaults both in the private sector and the public sector...But even as we get better, the hackers are going to get better, too…

Because if we don’t put in place the kind of architecture that can prevent these attacks from taking place, this is not just going to be affecting movies, this is going to be affecting our entire economy in ways that are extraordinarily significant.”

President Obama, December 19, 2014.

In Europe

• The five biggest threats to the UK economy (Financial stability report –December 2014)

1. Tumbling oil prices2. Housing bubble 3. Geo-political risks 4. Renewed downturn in the euro area 5. Banking system and cyber threats

• Identified cyber attacks as a key risk to UK financial stability• Will carry out in 2015 “cyber stress test” on banks

GloballyWhat is the impact and likelihood of global risks?

Oh, well…

• What is different ?

• Why this is happening ?

• What have we done wrong ?

• What about technology ?

• What about processes ?

• What about people ?

• What about legislation ?

What is different ?

• Terminology: CIA is dead• Cyber: Prevent – Detect – Respond – Recover

• Types of Attack• Reincarnations of past attacks (APT vs. Virus)

• New, totally unseen attacks

• Extended Regulation• General Data Protection Regulation (EU), Directive 95/46/EC (EU), ENISA

(Article 13a of the Directive 2002/21/EC, amended by Directive 2009/140/EC),

• Motive & Financial Gain• Targeted attacks vs. class attacks

A “typical” Financial Malware

Proprietary and Confidential

Advance Evasion Techniques

Cash Out through Mules

Exfiltrate Data

Expand Access / Strengthen

Foothold

Outbound Connection

Targeted Deployment /

Initial Intrusion

Research Target

Infrastructure / Employees

Cash Out from ATM

Y Bank

Analyse Targetbanking

Applications

Perform Transactions

Send Commands to

ATMs

Cash Out through Mules

Security and trust problems continue to plague cyber-physical systems

How secure is your fridge ?

Information theft and espionage shows no signs of abating

Why this is happening ?

• Technology Perception• Fire and Forget

• Too much focus on Compliance• Compliance is a by-product (or…a side benefit)

• Over connectivity• Cloud, BYOD, IoT,

• Operations Prevail• Running is more important than running securely

• World Climate• “Times they are a’ changing”

• It was about time• More convenient than declaring war

What have we done wrong ?

• Preconditions not usually met (risk analysis…)

• Dr. NO

• Success = progress NOT effectiveness

• No solution transparency

• Link to business

• Insisted on cost

• Sourcing of qualitative, subjective, intangible

• Integration levels

• Terminology, hats, after-marketing

Reports anyone ?

Business Speaks Targets

What about technology ?

• New attack vectors result in new tools

• Advanced Persistent Threat (APT) Protection

• Security Analytics / Forensics

• Data Leakage Prevention (DLP)

• Privileged Account Monitoring / Password Vault

• Managed Security Services

• Secure Sharing

Sandboxing in 42 seconds

Security Analytics

• Meaningful Insights

• Timeline

• Discovery

• Forensics

How are my databeing used?

Where are my data?

How are my data protected ?

Data Leakage Prevention Basics

What are mydata?

guidelinespolicies procedures life cycle

integrity quality compliance

Managed Security Services

Processes: Incident Response Mind Set

• Prepare: for the…inevitable

• Identify: whether something’s happening

• Contain: minimize threat impact

• Eradicate: eliminate damage

• Recover: where possible

• Follow-up: document lessons learnt

Incident Response

People Stereotypes

Reality Check

Self Reported Behaviours Results

Age Range 14-61

Mean Age 25

Sex Male

Race Caucasian

Education Level High Education

Mean Annual Salary $ 56.000,00

Creativity Score 62%

Depression Rate 14%

Bipolar Disorder Indication 15%

Monogamous Heterosexual 79%

The shortfall in skilled security workers puts companies in peril

Putting it all together

revisit the basics

prepareWILL expert advise

educate users

Trust the Management

patiencebalance

enjoy - responsibly

ride beyond FUD

About ADACOM

• In business since 1999,

• Offices in the UK, Israel, Greece

• Over 80 seasoned experts in Cyber Security• Network and Infrastructure Security• Endpoint and Host Security• Data Governance• PKI & Authentication • GRC and Assurance• Security Analytics

• Active in 28 countries in the EMEA Region

Greece

Athens

25 Kreontos St.,

104 42 Athens

+30 210 5193740

Israel

Tel Aviv

58th Ha’amal St.,

4951358 Petach Tikva

+972 74 7019424

United Kingdom

London

16 Great Queen St.,

WC2B5AH Covent Garden

+44 203 126 4590

Thanks for Watching !

top related