cyber security: a tale from the...
TRANSCRIPT
![Page 1: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/1.jpg)
Cyber Security: A Tale from the Trenches
Dr. Dimitrios Patsos
Chief Technology Officer, ADACOM S.A.
![Page 2: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/2.jpg)
![Page 3: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/3.jpg)
Askjfgjgkketigldsewo5mc2bad things are happening
![Page 4: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/4.jpg)
What’s really happening ?
![Page 5: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/5.jpg)
By whom ?
![Page 6: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/6.jpg)
Who’s affected ?
![Page 7: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/7.jpg)
Where ?
![Page 8: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/8.jpg)
In the US
“In this interconnected, digital world, there are going to be opportunities for hackers to engage in cyber assaults both in the private sector and the public sector...But even as we get better, the hackers are going to get better, too…
Because if we don’t put in place the kind of architecture that can prevent these attacks from taking place, this is not just going to be affecting movies, this is going to be affecting our entire economy in ways that are extraordinarily significant.”
President Obama, December 19, 2014.
![Page 9: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/9.jpg)
In Europe
• The five biggest threats to the UK economy (Financial stability report –December 2014)
1. Tumbling oil prices2. Housing bubble 3. Geo-political risks 4. Renewed downturn in the euro area 5. Banking system and cyber threats
• Identified cyber attacks as a key risk to UK financial stability• Will carry out in 2015 “cyber stress test” on banks
![Page 10: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/10.jpg)
GloballyWhat is the impact and likelihood of global risks?
![Page 11: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/11.jpg)
Oh, well…
• What is different ?
• Why this is happening ?
• What have we done wrong ?
• What about technology ?
• What about processes ?
• What about people ?
• What about legislation ?
![Page 12: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/12.jpg)
What is different ?
• Terminology: CIA is dead• Cyber: Prevent – Detect – Respond – Recover
• Types of Attack• Reincarnations of past attacks (APT vs. Virus)
• New, totally unseen attacks
• Extended Regulation• General Data Protection Regulation (EU), Directive 95/46/EC (EU), ENISA
(Article 13a of the Directive 2002/21/EC, amended by Directive 2009/140/EC),
• Motive & Financial Gain• Targeted attacks vs. class attacks
![Page 13: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/13.jpg)
A “typical” Financial Malware
Proprietary and Confidential
Advance Evasion Techniques
Cash Out through Mules
Exfiltrate Data
Expand Access / Strengthen
Foothold
Outbound Connection
Targeted Deployment /
Initial Intrusion
Research Target
Infrastructure / Employees
Cash Out from ATM
Y Bank
Analyse Targetbanking
Applications
Perform Transactions
Send Commands to
ATMs
Cash Out through Mules
![Page 14: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/14.jpg)
Security and trust problems continue to plague cyber-physical systems
![Page 15: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/15.jpg)
How secure is your fridge ?
![Page 16: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/16.jpg)
Information theft and espionage shows no signs of abating
![Page 17: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/17.jpg)
Why this is happening ?
• Technology Perception• Fire and Forget
• Too much focus on Compliance• Compliance is a by-product (or…a side benefit)
• Over connectivity• Cloud, BYOD, IoT,
• Operations Prevail• Running is more important than running securely
• World Climate• “Times they are a’ changing”
• It was about time• More convenient than declaring war
![Page 18: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/18.jpg)
What have we done wrong ?
• Preconditions not usually met (risk analysis…)
• Dr. NO
• Success = progress NOT effectiveness
• No solution transparency
• Link to business
• Insisted on cost
• Sourcing of qualitative, subjective, intangible
• Integration levels
• Terminology, hats, after-marketing
![Page 19: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/19.jpg)
Reports anyone ?
![Page 20: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/20.jpg)
Business Speaks Targets
![Page 21: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/21.jpg)
What about technology ?
• New attack vectors result in new tools
• Advanced Persistent Threat (APT) Protection
• Security Analytics / Forensics
• Data Leakage Prevention (DLP)
• Privileged Account Monitoring / Password Vault
• Managed Security Services
• Secure Sharing
![Page 22: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/22.jpg)
Sandboxing in 42 seconds
![Page 23: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/23.jpg)
Security Analytics
• Meaningful Insights
• Timeline
• Discovery
• Forensics
![Page 24: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/24.jpg)
How are my databeing used?
Where are my data?
How are my data protected ?
Data Leakage Prevention Basics
What are mydata?
guidelinespolicies procedures life cycle
integrity quality compliance
![Page 25: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/25.jpg)
Managed Security Services
![Page 26: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/26.jpg)
Processes: Incident Response Mind Set
• Prepare: for the…inevitable
• Identify: whether something’s happening
• Contain: minimize threat impact
• Eradicate: eliminate damage
• Recover: where possible
• Follow-up: document lessons learnt
![Page 27: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/27.jpg)
Incident Response
![Page 28: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/28.jpg)
People Stereotypes
![Page 29: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/29.jpg)
Reality Check
Self Reported Behaviours Results
Age Range 14-61
Mean Age 25
Sex Male
Race Caucasian
Education Level High Education
Mean Annual Salary $ 56.000,00
Creativity Score 62%
Depression Rate 14%
Bipolar Disorder Indication 15%
Monogamous Heterosexual 79%
![Page 30: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/30.jpg)
The shortfall in skilled security workers puts companies in peril
![Page 31: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/31.jpg)
Putting it all together
![Page 32: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/32.jpg)
revisit the basics
prepareWILL expert advise
educate users
Trust the Management
patiencebalance
enjoy - responsibly
ride beyond FUD
![Page 33: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/33.jpg)
About ADACOM
• In business since 1999,
• Offices in the UK, Israel, Greece
• Over 80 seasoned experts in Cyber Security• Network and Infrastructure Security• Endpoint and Host Security• Data Governance• PKI & Authentication • GRC and Assurance• Security Analytics
• Active in 28 countries in the EMEA Region
![Page 34: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to](https://reader033.vdocuments.mx/reader033/viewer/2022043003/5f84ba4fb7f30a608c3e77cb/html5/thumbnails/34.jpg)
Greece
Athens
25 Kreontos St.,
104 42 Athens
+30 210 5193740
Israel
Tel Aviv
58th Ha’amal St.,
4951358 Petach Tikva
+972 74 7019424
United Kingdom
London
16 Great Queen St.,
WC2B5AH Covent Garden
+44 203 126 4590
Thanks for Watching !