cyber security trends · detection system (ids) secure demilitarized zo nes (dm z) me ssage...

11
Cyber Security Trends Eddie Galang Chief Information Security Officer Port of Long Beach October 29, 2019 PORTCON 2019 LA Long Beach - Annual Update Conference of the Certified Port Executive Program

Upload: others

Post on 06-Oct-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center

Cyber Security TrendsEddie Galang

Chief Information Security Officer

Port of Long Beach

October 29, 2019

PORTCON 2019 LA Long Beach - Annual Update Conference of the Certified Port Executive Program

Page 2: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center
Page 3: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center

Restricted 3

Agenda

• Layered Defense

• Threat Landscape

• Threat Actors and Motives

• Anatomy of an Attack

• What You Are Trying to Protect

• Partnering with Law Enforcement

• Future Trends

• Micro Segmentation and Zero Trust

Page 4: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center

Layered Defense

Layered defense refers to security systems/capabilities that use multiple components to protect operations on multiple levels,

or layers against multiple threats including malware, theft, unauthorized access, insider attacks and other security considerations.

Data

Perimeter

Firewall

Perimeter Intrusion

Detection System (IDS)

Secure

Demilitarized

Zones (DMZ)

Message Security

(anti-virus, anti-malware)

Data Center

Firewall

Enterprise

IDS/IPS

Web Proxy

Content Filtering

Enterprise Message

Security

Enterprise Wireless

Security

Enterprise Remote

AccessHost IDS/IPS

Content Security

(anti-virus, anti-malware)

Endpoint Security

Enforcement

Patch Management

Dynamic App

Testing

Database

Secure

Gateway

Database

Encryption

Data

Wiping

Identity & Access

Management

Enterprise Rights

Management

Policies, Standards, Procedures, GuidelinesSecurity Architecture & Design

Cyber Threat Intelligence

Awareness, Training & Outreach

Penetration Testing

Threat

Modeling Digital Forensics

Privacy Management

Perimeter Intrusion

Prevention System

(IPS)

Security Operations Center (SOC) Monitoring

Desktop Firewall

Network Access Controls

(NAC)

Data Loss

Prevention (DLP)

VoIP Protection

Data Loss

Prevention (DLP)

Data Loss

Prevention (DLP)

Static App

Testing/Code

Review

Web Application

Firewall (WAF)

Database Monitoring/

Scanning

Data Loss

Prevention

(DLP) Public Key

Infra. (PKI)

Data At-Rest, In-Use,

& In-Motion ProtectionInfoSec Governance

Continuous Certification & Accreditation (C&A)

Risk Management

SIEM

PII Inventory Mgmt.

Continuous Monitoring & Assessment

Metrics & Reporting

Framework, Policy & Regulatory Compliance

Vulnerability Management

Data Flow Analysis

Inline Patching

Records Mgmt.

Data

Encryption

Data Classification

Data / Drive

Encryption

3rd Party Security & Privacy

Software as a

Service

(SaaS)

Cloud Access Security Broker (CASB)Managed Security

Services (MSS)

Cloud Data Storage

and Sharing)

Hosting Services

Page 5: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center

Sources: 2019 Internet Security Threat Report

Far-reaching vulnerabilities, faster attacks, files held for ransom and more malicious code than ever

• Landscape continues to

evolve.

• 1 in 302– Rate of Malicious

email delivered.

• 48% of Malicious email

attachments are office

files…up from 5% in 2017

• Small/Med sized orgs more

likely to be targeted

SCAMS &

SOCIAL

MEDIA

• Overall activity drops 20%,

but remains a challenge for

organizations

• Mobile ransomware climbs to

33%

RANSOMWARE

• 1 in 36 mobile devices are

classed as high risk.

• The U.S. is most affected by

Mobile Ransomware at 33%.

MOBILE

DEVICES

Overall attacks have dropped.

• 65% used spear phishing as

the primary infection vector.

• 96% primary motivation is

intelligence gathering

TARGETED

ATTACKS• 1 in 10 URL’s analyzed were

identified as malicious

• 4,800 Formjacking

compromises via websites

per month

WEB

ATTACKS

5

Threat Landscape

Page 6: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center

TH

RE

AT

S• Hacktivists use computer network exploitation to

advance their political or social causes.

HACKTIVISM

• Individuals and sophisticated criminal enterprises

steal personal information and extort victims for

financial gain.

CRIME

• Trusted insiders steal proprietary information for

personal, financial, and ideological reasons.

INSIDER

• Nation-state actors conduct computer intrusions to

steal sensitive state secrets and proprietary

information from private companies.

ESPIONAGE

• Terrorist groups sabotage the computer systems

that operate our critical infrastructure, such as the

electric grid.

TERRORISM

• Nation-state actors sabotage military and critical

infrastructure systems to gain an advantage in the

even of conflict.

WARFARE

Who would target you and why?

6

Threat Actors and Motives

Page 7: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center

Maintain Presence

Establish Foothold

Move Laterally

Recon

Initial Compromise

Escalate Privileges

Internal Recon

Expand Presence

Exfiltrate Data

Common Attack Vectors

• Known Vulnerabilities

• SQL Injection

• Phishing, Spear-phishing, Whaling

• Weak Authentication

• Viruses/Malware attacks

• Social engineering

Targeted Information Types

• Corporate finances

• Internal corporate information

• Customer/Employee PII

• Proprietary technology

• IT infrastructure

• Bandwidth (DDoS)

7

Anatomy of an Attack

Page 8: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center

Sources: 1. AllClear ID

2. ID Experts, LifeLock

3. FTC, Consumer Sentinel Network Data Book

4. Underground Hacker Markets by Dell SecureWorks

5. “What your information is worth on the black market” by Bankrate

Driver’s License4

$100 - $150

• First / last name

• ID #

• Address, DOB

Social Security Card4

$250 - $400

• First / last name

• SSN

• DOB

Health Insurance Info1

$250

• First / last name

• Login credentials

• Plan provider

• ID #

Bank Info4

$300 - $4200

• First / last name, bank, acct #

• Login credentials

*Based on account balance

Identity Profile5

$1200 - $1300

• Name, SSN, DOB

• Address, phone #

• Email credentials

• Credit card # or bank info

Identity Theft

• 7% report harm post breach1

• 0.3% suffer actual harm2

• 2nd highest complaint at the FTC3

Credit Card with PIN4

$17 - $35

• First / last name

• Card #

• PIN

• Expiration date

Credit Card (CC)4

$1 - $8

• First and last name

• Card #o Active Users: 601

o Credit Range $1K – $25K

Intellectual Property (IP) Proprietary Information (PI) Personally Identifiable Information (PII)

8

What You Are Trying to Protect

Other Online Accts:

• Gift Cards: 15 - 50% value

• Cloud service: $5 - $10

• Retail Shopping: $.50 - $99

• Online Payment: $1 - $100

Page 9: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center

Domestically, the FBI has Field Offices throughout the U.S., with Special

Agents dedicated to work Cyber investigations

Internationally, the FBI has Special Agents, called Legal Attachés, who work

in U.S. Embassies, around the globe. They work with the local countries law

enforcement agencies

Call the FBI as soon as possible

• Delays can result in loss of digital evidence

• Determine how your internal investigation and the criminal investigation will work together

What does the FBI do?

• Focuses on criminal prosecution

• Forensically collects and analyzes evidence

• Can, with consent, monitor victim’s network for activity related to the attack

• Testifies in court

Federal Prosecutor

• Federal prosecutors can also speak to victim’s legal team

Engaging Law Enforcement

9

Partnering with Law Enforcement

Page 10: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center

Expected in 2020 and Beyond

• Begin shifting from a compliance-based approach to a security-based

approach for managing information security risk

• Lack of preparedness will continue allowing attackers to hide

undetected

1. Current and Future Challenges

• Resurgence of email as favored attack channel

• Increase in Spam, Malware, & Phishing tempting users to take action

• Customer & Financial data are highest priority

2. Endpoint Protection

• Increase in web attacks (e.g., Tech, Business)

• Browser vulnerabilities to increase (e.g., Chrome, Firefox)

• New cryptojacking exploit toolkits to surface

3. Web Attacks, Toolkits & Exploiting Vulnerabilities

• IoT devices (Routers, Cameras) will continue to be favored ($26B

devices in 2020)

• 2x increase in attacks against IoT devices (5,200+ per month)

• Cloud attacks will increase until companies protect these assets

• Growing reliance on cloud services present security blind spots

4. Internet of Things (IoT)

10

Future Trends

Page 11: Cyber Security Trends · Detection System (IDS) Secure Demilitarized Zo nes (DM Z) Me ssage Security (anti-virus, anti-malware) ... Prevention System (IPS) Security Operations Center

Micro Segmentation and Zero Trust

Security technique that enables fine-grained security policies to be assigned to data center applications, down to the workload

level and enables security models to be deployed deep inside a data center, using a virtualized, software-only approach.

Why consider the Zero Trust model?

• Perimeter security approach is not effective (many data breaches happened because hackers, once they got past the corporate firewalls, were able to move through

internal systems without much resistance).

• Perimeter itself is no longer clearly defined, because applications and data stores are on-premises and in the cloud, with users accessing them from multiple devices and

locations.