can technology save us from evolving cybersecurity … ·  · 2014-11-26can technology save us...

25
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Chris Richter Senior Vice President, Managed Security Services November 3, 2014 Can Technology Save Us From Evolving Cybersecurity Threats? © 2014 Level 3 Communications, LLC. All Rights Reserved. Level 3, Level 3 Communications, the Level 3 Communications Logo, the Level 3 logo and “Connecting and Protecting the Networked World” are either registered service marks or service marks of Level 3 Communications, LLC and/or one of its Affiliates in the United States and/or other countries. Level 3 services are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service names, product names, company names or logos included herein are the trademarks or service marks of their respective owners.

Upload: vuongdien

Post on 28-Apr-2018

216 views

Category:

Documents


1 download

TRANSCRIPT

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Chris RichterSenior Vice President, Managed Security Services

November 3, 2014

Can Technology Save Us From Evolving Cybersecurity Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Level 3, Level 3 Communications, the Level 3 Communications Logo, the Level  3  logo  and  “Connecting  and  Protecting  the  Networked  World”  are  either  registered  service  marks  or  service  marks  of  Level  3  Communications,  LLC  and/or  one  of  its  Affiliates in the United States and/or other countries. Level 3 services are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service names, product names, company names or logos included herein are the trademarks or service marks of their respective owners.

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Who Is Level 3?

2

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Our Global Technology

Network Systems Security

Process

4 petabytes of storage 3600 servers

Multiple data centers in 3 regions

Many applications

866 million IP addresses analyzed monthly

550 million detected events per day

85 terabytes of security event data a day

Global task level processes across 9 functional domains

260 petabytes of storage20,000 servers

200,000+ route miles25,000 locations

110,000 network elements

Products and ServicesData Voice Video Cloud and IT

ServicesManaged and

Professional Services Security

3

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Security Landscape Continues To Evolve

4

Attacks Are Changing In Form, Complexity, Volume and Timing

2.47M+ New mobile malware samples collected in 2013Source: McAfee Labs Threat Report Q4 2013

1,800 Number of new distinct families of viruses detected in the past yearSource: Fortinet Threat Landscape Report 2014

87% DDoS attacks resulting in enterprises experiencing service level issues, service degradation and outagesSource: Respondents to Radware’s Security Industry and Security Executive Surveys 2013

197% Increase in malware samples in 2013 from 2012Source: McAfee Labs Threat Report Q4 2013

$3.5M Global average cost to a company due to data breaches and 15% more than what it costs last yearSource: Ponemon 2014 Cost of Data Breach Study: Global Analysis

10K New strains of malware released everyday – distributed by 100k new domains everydaySource: Imperva

SOURCE: Data sourced from 9th Annual Worldwide Infrastructure Security Report and ATLAS data (Arbor Networks)

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 5

Internet Access in Developing Nations Growing At Double-Digit Rates

Source: International Telecommunications Union, 2014

By end 2014, the number of Internet users globally will have reached almost 3 billion.

Two-thirds of the  world’s  Internet  users  are  from the developing world.

More than 90 percent of the people who are not yet using the Internetare from the developing world.

90%

This corresponds to an Internet-user penetration of 40% globally

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Stir-In The Internet of Everything

6

http://www.youtube.com/watch?v=lX0AQxh4yaw

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Attacker Profile

7

Attacker

Soph

istic

atio

n

Motivation Targets

In May, the U.S. Justice Department indicted 5 Chinese military officers on charges of hacking into the computer networks of U.S. companies and stealing commercial secrets. It linked all of them to PLA Unit 61398 in Shanghai.

• Political Statement• Protest

• Military Actions• Industrial Advantage

• $$$$$$• Extortion• Commercial Ransom

• Sell Trade Secrets• Disgruntled Employee

In a manifesto announcing its DDoSoperation, Anonymous railed against Sony for going after coders who seek to modify hardware that they own.

Hackers found vulnerabilities in the company’s  network  through  remotely  controlled HVAC systems and were able to access payments system data of over 40 Million credit cards.

Matthew Keys used his access as a former employee of the Tribune Co. to help a hacker deface the website of the Los Angeles Times in 2010.

Low

Med

ium

High

High

Source: Analysis of the North American Managed Security Services Market, July 2014.

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Hacking Tools Are A Commercial Business

8

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Hacking Tools Are A Commercial Business

9

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Hacking Tools Are A Commercial Business

10

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Hacking Tools Are A Commercial Business

11

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

(Sourced from ITRC Breach Report 2012)(Sourced from ITRC Breach Report 2012)

40% of The Top 10 Breaches in 2014 (thus far) Were Due to Lapses in Non-Technical Controls

The Top 10 Data Breaches in 2014(As of October 21st)

Source: Identity Theft Resource Center(idtheftcenter.org) and the US Department of Health andHuman Services

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 13

Organization Records Compromised Attack Vector

Spec's 550,000 Assumed External Hacking

St. Joseph Health System 405,000 Assumed External Hacking

Aaron Brothers 400,000 Assumed External Hacking

Sutherland Healthcare Solutions 342,197 Physical theft of computers.

University of Maryland 309,079 Assumed External Hacking

Touchstone Medical Imaging, LLC 307,528 Folder with PII left accessible to the internet

North Dakota University System 291,465 Assumed External Hacking

Indian Health Service 214,000 Assumed External Hacking

Butler University 163,000 Stolen laptop.

Indiana University 146,000 Records stored in insecure location.

87.5% of All Medical Record Breaches in 2014 (thus far) Were Due to Lapses in Non-Technical Controls!

- Total Reported US Breaches in 2014 (as of October 21st): 621- Number of Records Compromised: 77,890,487

Source: Identity Theft Resource Center(idtheftcenter.org) and the US Department of Health and Human Services

Rounding Out The Top 20 Breaches(As of October 21st, 2014)

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Complexity, Fragmentation, and Correlation Issues

Organizations continue to built a patchwork of point solutions that are difficult to manage, create vulnerabilities, and reduce security

State of the Market Protection Model

Productionenvironment Email

DLP

Web

Operations

LogAlertsSEIM

Log sources

AVApp CntlFWEncryptionIPSFile Integrity

Endpoint Sec MGRs

Servers

DB

Syslogsource

WAFs

FW/IPS

FW/IPS

MGT

WAF Patch

DetectedvulnerabilitiesApplication

Vuln testing

Policy, Process and

Implementation Decisions

Integrated Threat Management

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

As a Result, Security Costs Have Escalated

Typical cost for a 1,000-person organization is $500k-$800K (Source:  451  Research’s  report  “The Real Cost of Security”,  2013)

Costs typically do not include:• Maintenance for vendor equipment• User training• Staff turnover• Technology refresh

15

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Average Cost of Cyber Crime In Seven Countries

Ponemon Institute© Research Report Page 2

Global at a glance This year’s annual study was conducted in the United States, United Kingdom, Germany, Australia, Japan, France and for the first time, the Russian Federation, with a total benchmark sample of 257 organizations. Country-specific results are presented in seven separate reports. Figure 1 presents the estimated average cost of cyber crime for seven country samples involving 257 separate companies, with comparison to last year’s country averages. Cost figures are converted into U.S. dollars for comparative purposes.2 As shown, there is significant variation in total cyber crime costs among participating companies in the benchmark samples. The US sample reports the highest total average cost at $12.7 million and the Russian sample reports the lowest total average cost at $3.3 million. It is also interesting to note that all six countries experienced a net increase in the cost of cyber crime cost over the past year – ranging from 2.7 percent for Japan to 22.7 percent for the United Kingdom. The percentage net change between FY 2014 and FY 2013 (excluding Russia) is 10.4 percent. Figure 1. Total cost of cyber crime in seven countries Cost expressed in US dollars (000,000), n = 257 separate companies

2The Wall Street Journal’s August 1, 2014 currency conversion rates.

$3.33

$3.99

$5.93

$6.38

$6.91

$8.13

$12.69

$3.67

$4.72

$5.19

$6.73

$7.56

$11.56

$- $2.00 $4.00 $6.00 $8.00 $10.00 $12.00 $14.00

Russia*

Australia

United Kingdom

France

Japan

Germany

United States

*FY 2013 results for Russia were not collected

FY 2013 (n=235) FY 2014 (n=257)

16

Ponemon Institute© Research Report Page 2

Global at a glance This year’s annual study was conducted in the United States, United Kingdom, Germany, Australia, Japan, France and for the first time, the Russian Federation, with a total benchmark sample of 257 organizations. Country-specific results are presented in seven separate reports. Figure 1 presents the estimated average cost of cyber crime for seven country samples involving 257 separate companies, with comparison to last year’s country averages. Cost figures are converted into U.S. dollars for comparative purposes.2 As shown, there is significant variation in total cyber crime costs among participating companies in the benchmark samples. The US sample reports the highest total average cost at $12.7 million and the Russian sample reports the lowest total average cost at $3.3 million. It is also interesting to note that all six countries experienced a net increase in the cost of cyber crime cost over the past year – ranging from 2.7 percent for Japan to 22.7 percent for the United Kingdom. The percentage net change between FY 2014 and FY 2013 (excluding Russia) is 10.4 percent. Figure 1. Total cost of cyber crime in seven countries Cost expressed in US dollars (000,000), n = 257 separate companies

2The Wall Street Journal’s August 1, 2014 currency conversion rates.

$3.33

$3.99

$5.93

$6.38

$6.91

$8.13

$12.69

$3.67

$4.72

$5.19

$6.73

$7.56

$11.56

$- $2.00 $4.00 $6.00 $8.00 $10.00 $12.00 $14.00

Russia*

Australia

United Kingdom

France

Japan

Germany

United States

*FY 2013 results for Russia were not collected

FY 2013 (n=235) FY 2014 (n=257)

Source: Ponemon Institute© Research Report (October 2014)

(US$ x 1,000,000)

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Marketing

Financial

Newsfeeds/Blogs

Legal documents

Cardholder data

Healthcare/PHI

Data Classification

Understand the value and location of your data assets1

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

e-Commerce

Test and Development

ERP

CRM

Payment processing

Evaluate Your Applications

Understand  your  applications’  security  and the data they control and access2

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Focus on simplicity• Complexity is a risk• Segmentation• APIs• Orchestration• Storage and Backup• Access Controls

IT Infrastructure

Audit your architecture3

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

• External• Internal

• Physical

Targeting• Provocative actions

Threats

• Public announcements, contracts, and other public data

• Nature  of  your  organization’s  business and culture

Accept  the  “New  Normal”  

Understand threats to your data andWhat makes You a target4

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

• Being compliant does not equal secure.

Look beyond standards and regulations.

Establish and adhere to a governance, risk, and compliance (GRC) framework. (Many to choose from!)

Develop a risk-based approach to managing threats and vulnerabilities.

Governance, Risk and Compliance

Fear the hacker, not the auditor5

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Collaboration

Collaborate with service providers and peers

• Some controls are better suited for delivery by service providers (network, cloud, MSSPs, risk assessments, etc.)

• Collaboration with peer organizations is vital.

• Take advantage of government resources: standards, programs, events, consortiums, services.

6

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

What We Face

• Zero Day and Half Day Attacks- The average zero day exploit will last 26 months before being detected- The average half day exploit will last 6 months before being patched

• Increase in targeted attacks- Significant research prior to attacks

• Growing regulatory and compliance requirements- Greater transparency- Reaching critical mass

• Significant increase in DDoS attack volume and bandwidth• Nation state  actors  beginning  to  beta  test  capabilities  “contract  out”  to  organized  crime• Black market trading sites increasing

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 24

Where Is Security Technology Heading?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Summary

• The threat landscape is evolving rapidly due to nation-state, organized crime, and cyber terrorism

• Organizations must assume the  “new  normal”  -- at least some parts of their networks have been compromised

• Your data is an asset -- understand its value, location, and movement

• Establishing and adhering to a governance framework is critical

• Perform regular security evaluations, risk assessments, and awareness training for employees

• Determine core competencies, perform functions that you do well, outsource others to trusted, skilled firms

• Some security functions must be done in partnership with your service provider(s)

• Information sharing partnerships are essential

• Technology-based controls are important, but are not a cybersecurity panacea