can technology save us from evolving security threats?

25
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Chris Richter Senior Vice President, Managed Security Services November 3, 2014 Can Technology Save Us From Evolving Cybersecurity Threats? © 2014 Level 3 Communications, LLC. All Rights Reserved. Level 3, Level 3 Communications, the Level 3 Communications Logo, the Level 3 logo and “Connecting and Protecting the Networked World” are either registered service marks or service marks of Level 3 Communications, LLC and/or one of its Affiliates in the United States and/or other countries. Level 3 services are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service names, product names, company names or logos included herein are the trademarks or service marks of their respective owners.

Upload: level-3-communications

Post on 08-Jul-2015

1.706 views

Category:

Technology


1 download

DESCRIPTION

Cyberattacks are changing in form, complexity, volume and timing. In this presentation, Chris Richter, Level 3's SVP of Managed Security Services, takes a critical look at the evolving security landscape and whether or not the current tech-first approach to mitigation can really make a meaningful, long-term impact toward keeping your online data safe.

TRANSCRIPT

Page 1: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Chris Richter

Senior Vice President, Managed Security Services

November 3, 2014

Can Technology Save Us From

Evolving Cybersecurity Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Level 3, Level 3 Communications, the Level 3 Communications Logo, the Level 3 logo and “Connecting and Protecting the

Networked World” are either registered service marks or service marks of Level 3 Communications, LLC and/or one of its Affiliates in the United States and/or other countries. Level 3 services

are provided by wholly owned subsidiaries of Level 3 Communications, Inc. Any other service names, product names, company names or logos included herein are the trademarks or service

marks of their respective owners.

Page 2: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Who Is Level 3?

2

Page 3: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Our Global Technology

Network Systems Security

Process

4 petabytes of storage

3600 servers

Multiple data centers in

3 regions

Many applications

866 million IP addresses

analyzed monthly

550 million detected

events per day

85 terabytes of

security event data

a day

Global task level processes across 9 functional domains

260 petabytes of storage

20,000 servers

200,000+ route miles

25,000 locations

110,000 network

elements

Products and Services

Data Voice VideoCloud and IT

Services

Managed and

Professional ServicesSecurity

3

Page 4: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Security Landscape Continues To Evolve

4

Attacks Are Changing In Form, Complexity, Volume and Timing

2.47M+ New mobile malware samples collected in 2013Source: McAfee Labs Threat Report Q4 2013

1,800 Number of new distinct families of viruses detected in the past yearSource: Fortinet Threat Landscape Report 2014

87% DDoS attacks resulting in enterprises experiencing service level

issues, service degradation and outagesSource: Respondents to Radware’s Security Industry and Security Executive Surveys 2013

197% Increase in malware samples in 2013 from 2012Source: McAfee Labs Threat Report Q4 2013

$3.5M Global average cost to a company due to data breaches and

15% more than what it costs last yearSource: Ponemon 2014 Cost of Data Breach Study: Global Analysis

10K New strains of malware released everyday – distributed by 100k

new domains everydaySource: Imperva

SOURCE: Data sourced from 9th Annual Worldwide Infrastructure

Security Report and ATLAS data (Arbor Networks)

Page 5: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 5

Internet Access in Developing Nations Growing

At Double-Digit Rates

Source: International Telecommunications Union, 2014

By end 2014, the number of Internet users globally will

have reached almost 3 billion.

Two-thirds of the world’s Internet users are

from the developing world.

More than 90 percent of the people who are

not yet using the Internet

are from the developing world.90%

This corresponds to an Internet-user penetration of

40% globally

Page 6: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Stir-In The Internet of Everything

6

http://www.youtube.com/watch?v=lX0AQxh4yaw

Page 7: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Attacker Profile

7

Attacker

So

ph

isti

cati

on

Motivation Targets

In May, the U.S. Justice Department indicted

5 Chinese military officers on charges of

hacking into the computer networks of U.S.

companies and stealing commercial secrets.

It linked all of them to PLA Unit 61398 in

Shanghai.

• Political Statement

• Protest

• Military Actions

• Industrial Advantage

• $$$$$$

• Extortion

• Commercial Ransom

• Sell Trade Secrets

• Disgruntled Employee

In a manifesto announcing its DDoS

operation, Anonymous railed against Sony

for going after coders who seek to modify

hardware that they own.

Hackers found vulnerabilities in the

company’s network through remotely

controlled HVAC systems and were able to

access payments system data of over 40

Million credit cards.

Matthew Keys used his access as a former

employee of the Tribune Co. to help a hacker

deface the website of the Los Angeles

Times in 2010.

Lo

wM

ediu

mH

igh

Hig

h

Source: Analysis of the North American Managed

Security Services Market, July 2014.

Page 8: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Hacking Tools Are A Commercial Business

8

Page 9: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Hacking Tools Are A Commercial Business

9

Page 10: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Hacking Tools Are A Commercial Business

10

Page 11: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Hacking Tools Are A Commercial Business

11

Page 12: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

(Sourced from ITRC Breach Report 2012)(Sourced from ITRC Breach Report 2012)

40% of The Top 10 Breaches in 2014 (thus far)

Were Due to Lapses in Non-Technical Controls

The Top 10 Data Breaches in 2014(As of October 21st)

Source: Identity Theft Resource Center

(idtheftcenter.org) and the US Department of Health and

Human Services

Page 13: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 13

Organization Records Compromised Attack Vector

Spec's 550,000 Assumed External Hacking

St. Joseph Health System 405,000 Assumed External Hacking

Aaron Brothers 400,000 Assumed External Hacking

Sutherland Healthcare Solutions 342,197 Physical theft of computers.

University of Maryland 309,079 Assumed External Hacking

Touchstone Medical Imaging, LLC 307,528 Folder with PII left accessible to the internet

North Dakota University System 291,465 Assumed External Hacking

Indian Health Service 214,000 Assumed External Hacking

Butler University 163,000 Stolen laptop.

Indiana University 146,000 Records stored in insecure location.

87.5% of All Medical Record Breaches in 2014 (thus far) Were

Due to Lapses in Non-Technical Controls!

- Total Reported US Breaches in 2014 (as of October 21st): 621

- Number of Records Compromised: 77,890,487

Source: Identity Theft Resource Center

(idtheftcenter.org) and the US Department of Health and Human Services

Rounding Out The Top 20 Breaches

(As of October 21st, 2014)

Page 14: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Complexity, Fragmentation, and Correlation Issues

Organizations continue

to built a patchwork of

point solutions that are

difficult to manage,

create vulnerabilities,

and reduce security

State of the Market Protection Model

Production

environmentEmail

DLP

Web

Operations

Log

Alerts

SEIM

Log sources

AV

App Cntl

FW

Encryption

IPS

File Integrity

Endpoint Sec

MGRs

Server

s

DB

Syslog

source

WAFs

FW/IP

S

FW/IP

S

MGT

WAF

Patch

Detected

vulnerabilitiesApplication

Vuln testing

Policy, Process

and

Implementation

Decisions

Integrated Threat Management

Page 15: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

As a Result, Security Costs Have Escalated

Typical cost for a 1,000-person organization is $500k-$800K

(Source: 451 Research’s report “The Real Cost of Security”, 2013)

Costs typically do not include:

• Maintenance for vendor equipment

• User training

• Staff turnover

• Technology refresh

15

Page 16: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Average Cost of Cyber Crime In Seven Countries

Ponemon Institute© Research Report Page 2

Global at a glance

This year’s annual study was conducted in the United States, United Kingdom, Germany,

Australia, Japan, France and for the first time, the Russian Federation, with a total benchmark sample of 257 organizations. Country-specific results are presented in seven separate reports.

Figure 1 presents the estimated average cost of cyber crime for seven country samples involving

257 separate companies, with comparison to last year’s country averages. Cost figures are converted into U.S. dollars for comparative purposes.

2

As shown, there is significant variation in total cyber crime costs among participating companies in the benchmark samples. The US sample reports the highest total average cost at $12.7 million

and the Russian sample reports the lowest total average cost at $3.3 million. It is also interesting to note that all six countries experienced a net increase in the cost of cyber crime cost over the

past year – ranging from 2.7 percent for Japan to 22.7 percent for the United Kingdom. The

percentage net change between FY 2014 and FY 2013 (excluding Russia) is 10.4 percent.

Figure 1. Total cost of cyber crime in seven countries Cost expressed in US dollars (000,000), n = 257 separate companies

2The Wall Street Journal’s August 1, 2014 currency conversion rates.

$3.33

$3.99

$5.93

$6.38

$6.91

$8.13

$12.69

$3.67

$4.72

$5.19

$6.73

$7.56

$11.56

$- $2.00 $4.00 $6.00 $8.00 $10.00 $12.00 $14.00

Russia*

Australia

United Kingdom

France

Japan

Germany

United States

*FY 2013 results for Russia were not collected

FY 2013 (n=235) FY 2014 (n=257)

16

Ponemon Institute© Research Report Page 2

Global at a glance

This year’s annual study was conducted in the United States, United Kingdom, Germany, Australia, Japan, France and for the first time, the Russian Federation, with a total benchmark

sample of 257 organizations. Country-specific results are presented in seven separate reports. Figure 1 presents the estimated average cost of cyber crime for seven country samples involving 257 separate companies, with comparison to last year’s country averages. Cost figures are

converted into U.S. dollars for comparative purposes.2

As shown, there is significant variation in total cyber crime costs among participating companies

in the benchmark samples. The US sample reports the highest total average cost at $12.7 million and the Russian sample reports the lowest total average cost at $3.3 million. It is also interesting

to note that all six countries experienced a net increase in the cost of cyber crime cost over the

past year – ranging from 2.7 percent for Japan to 22.7 percent for the United Kingdom. The percentage net change between FY 2014 and FY 2013 (excluding Russia) is 10.4 percent.

Figure 1. Total cost of cyber crime in seven countries Cost expressed in US dollars (000,000), n = 257 separate companies

2The Wall Street Journal’s August 1, 2014 currency conversion rates.

$3.33

$3.99

$5.93

$6.38

$6.91

$8.13

$12.69

$3.67

$4.72

$5.19

$6.73

$7.56

$11.56

$- $2.00 $4.00 $6.00 $8.00 $10.00 $12.00 $14.00

Russia*

Australia

United Kingdom

France

Japan

Germany

United States

*FY 2013 results for Russia were not collected

FY 2013 (n=235) FY 2014 (n=257)

Source: Ponemon Institute© Research Report (October 2014)

(US$ x 1,000,000)

Page 17: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Marketing

Financial

Newsfeeds/Blogs

Legal documents

Cardholder data

Healthcare/PHI

Data Classification

Understand the value and location of your data assets1

Page 18: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

e-Commerce

Test and Development

ERP

CRM

Payment processing

Evaluate Your Applications

Understand your applications’ security

and the data they control and access2

Page 19: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Focus on simplicity

• Complexity is a risk

• Segmentation

• APIs

• Orchestration

• Storage and Backup

• Access Controls

IT Infrastructure

Audit your architecture3

Page 20: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

• External

• Internal

• Physical

Targeting

• Provocative actions

Threats

• Public announcements,

contracts, and other

public data

• Nature of your organization’s

business and culture

Accept the “New Normal”

Understand threats to your data and

What makes You a target4

Page 21: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

• Being compliant does not equal

secure.

Look beyond standards and

regulations.

Establish and adhere to a

governance, risk, and compliance

(GRC) framework. (Many to choose

from!)

Develop a risk-based approach to

managing threats and vulnerabilities.

Governance, Risk and Compliance

Fear the hacker, not the auditor5

Page 22: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Collaboration

Collaborate with service providers and peers

• Some controls are better suited

for delivery by service providers

(network, cloud, MSSPs, risk

assessments, etc.)

• Collaboration with peer

organizations is vital.

• Take advantage of government

resources: standards, programs,

events, consortiums, services.

6

Page 23: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

What We Face

• Zero Day and Half Day Attacks

- The average zero day exploit will last 26 months before being detected

- The average half day exploit will last 6 months before being patched

• Increase in targeted attacks

- Significant research prior to attacks

• Growing regulatory and compliance requirements

- Greater transparency

- Reaching critical mass

• Significant increase in DDoS attack volume and bandwidth

• Nation state actors beginning to beta test capabilities “contract out” to organized crime

• Black market trading sites increasing

Page 24: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. 24

Where Is Security Technology Heading?

Page 25: Can Technology Save Us from Evolving Security Threats?

© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential.

Summary

• The threat landscape is evolving rapidly due to nation-state, organized crime, and cyber terrorism

• Organizations must assume the “new normal” -- at least some parts of their networks have been compromised

• Your data is an asset -- understand its value, location, and movement

• Establishing and adhering to a governance framework is critical

• Perform regular security evaluations, risk assessments, and awareness training for employees

• Determine core competencies, perform functions that you do well, outsource others to trusted, skilled firms

• Some security functions must be done in partnership with your service provider(s)

• Information sharing partnerships are essential

• Technology-based controls are important, but are not a cybersecurity panacea