breach discovery

19
Breach Discovery Nat Kausik CEO, Bitglass Rich Campagna VP, Products Bitglass

Upload: bitglass

Post on 15-Apr-2017

195 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Breach Discovery

Breach DiscoveryNat KausikCEO, BitglassRich CampagnaVP, Products Bitglass

Page 2: Breach Discovery

Polling Question #1Which of the following is currently your biggest

security concern?• Malware & Hacking• Lost Devices• Misuse/ShadowIT• User Errors• None of the above

Page 3: Breach Discovery

Breach Stats

*California AG Breach Report 2014

Page 4: Breach Discovery

Types of Breaches

Nuisance Breach - Opportunistic hack on vulnerable end-points

Untargeted Breach - Opportunistic hack on vulnerable enterprises

Targeted Breach - Custom hack on specific enterprise

Page 5: Breach Discovery

Nuisance Breach

Effectiveness of Defense: Good

Tools: Anti-malware

Target: Vulnerable endpoints

Weapon: Malware

Gain: Fun, botnets, passwords

Page 6: Breach Discovery

Effectiveness of Defense: Limited

Tools: Anti-X, NGFW, APT protection

Target: Vulnerable enterprises

Weapon: Malware

Gain: Credit card numbers, etc.

Untargeted Breach

Page 7: Breach Discovery

Untargeted Breach

1. 3rd party website “Company Fun

Run”

2. Employees Register with

company creds

4. Log into JPM

5. Exfiltrate data over months

6. 3rd party website hires security guru, notifies JPMorgan

3. Hack 3rd party site to steal creds

Page 8: Breach Discovery

Effectiveness of Defense: ???

Tools: ???

Target: Specific enterprises

Weapon: Many

Gain: Geo-political advantage?

Targeted Breach

Page 9: Breach Discovery

Targeted Breach

1. April 2014: Spoofed site myhr.we11point.com

3. Employees login with

Anthem creds

4. Anthem creds

5. Log into Anthem

5. Query & steal 80M identities

2. Spear phishing emails

Feb 2015: Anthem IT discovers breach

Page 10: Breach Discovery

Polling Question #2How long do you think it would take you to detect

a typical breach?• Less than 1 day• Less than 1 week• Less than 1 month• Less than 6 months• More than 6 months

Page 11: Breach Discovery

© 2014 Bitglass – Confidential: Do Not Distribute

The Reality - Breaches Happen

*Source: Mandiant/FireEye

229 67%Average # of days before detection

Victims notified by external sources

“Two kinds of companies, those that were hacked and those that don’t yet know it”

- John Chambers, CEO, Cisco

Page 12: Breach Discovery

Bitglass Breach Discovery Limit the Damage

Page 13: Breach Discovery

Problem: Corporate data moving outside the firewall

3. At Access: Data theft via hacked devices & accounts

2. In Cloud: Attack on SaaS vendor risks sensitive data

1. On Network: Data breaches - exfiltration & Shadow IT

4. On Device: Lost tablet containing financial records

Clou

d

MobileOn-premise

On-

prem

ise

Page 14: Breach Discovery

© 2014 Bitglass – Confidential: Do Not Distribute

Breach Discovery - How it Works

Upload Firewall or Proxy logs

Big Data Analysis of Outflows

Bitglass Breach Discovery

Ranked alerts on high-risk outflows

ShadowIT RisksDrill-down investigationNo software

Bitglass Risk Intelligence

Page 15: Breach Discovery

© 2014 Bitglass – Confidential: Do Not Distribute

Customer Example

Data exfiltration to ~200 TOR nodes 4 high-risk, high-volume Shadow IT apps

Case study at bitglass.com/resources

Transportation company

25,000 Employees

2M log lines per day

Findings

Page 16: Breach Discovery

© 2014 Bitglass – Confidential: Do Not Distribute

Customer Example

Ten machines infected with malwareCommand & control trafficNext-Gen Firewall ineffectiveCase study at bitglass.com/resources

Wall Street Tech Firm

300 Employees

25K log lines per day

Findings

Page 17: Breach Discovery

Polling Question #3Biggest challenge your existing breach detection

tools (i.e. SIEM)?• Too many alerts to be useful• Too difficult to manage and integrate threat

intelligence• We don’t have a SIEM• Other issues not listed• We don’t have any challenges

Page 18: Breach Discovery

Prevention-focused tools Bitglass Breach DiscoveryPrevention tools increasingly ineffective against targeted and persistent attacks

Outbound Data Flow Analysis catches breaches early

Existing and emerging anomaly detection technologies throw too many alerts to be useful

Prioritized alerts via cloud-powered big data analytics with proprietary ranking

SIEM requires curation of risk intelligence feeds and ongoing manual interpretation by SMEs

Rapid Deployment - Simply upload logs, nothing to install

Discovery vs Prevention“Determined attackers can get malware into organizations at

will.” Neil MacDonald/Peter Firstbrook, Gartner

Page 19: Breach Discovery

Total Data ProtectionOutside the Firewall