eldon sprickerhoff chief security strategist founder sprickerhoff chief security strategist...

31
David Bailey Group Head of Markeng and Communicaons Eldon Sprickerhoff Chief Security Strategist Founder

Upload: dinhhuong

Post on 13-Mar-2018

221 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

David Bailey Group Head of Marketing and Communications

Eldon SprickerhoffChief Security StrategistFounder

Page 2: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

WEDETECTTHECYBERTHREATSTHATOTHERTECHNOLOGIESMISS

Cybercrime:Awake-upcallforPrivateEquity&RealEstatefirms.

Date 27th September,2017

Presenter EldonSprickerhoffChiefSecurityStrategist,[email protected]@TheEldon

Page 3: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

C AMBR I DG E | N EW YOR K | LONDON | C O R K

293EMPLOYEES

2001FOUNDED

525+CUSTOMERS

65%YOY GROWTH

97%CUSTOMERRETENTION

$5.3TFIAUMPROTECTED

PROVEN

CYBERSECURITYFORMID-SIZEDENTERPRISE

Page 4: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

CYBERCRIMEISBIGBUSINESS

$70Bspentoncybersecurity

THREATACTORS

HACTIVIST NATIONSTATEACTORINSIDERORGANIZEDCRIMECRIMINAL TERRORIST

$375-575Binestimatedlosses

MEANS|MOTIVE|OPPORTUNITY

EasyAccesstoCyberWeaponry

NoNegativeRepercussions

MotivationisHigh

MinimalCyberSkillsRequired

Page 5: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

CAMPAIGNSPHISHING

SPOOFINGBOSSTHE

B U S I N E S S E M A I L C O M P R O M I S E ( B E C )

WATERINGHOLES

SYSTEMICVULNERABILITIES

EXPLOITATION

ENGINEERINGSOCIAL

RANSOMWARE

TARGETEDATTACKS

SOPHISTICATEDCYBERATTACKS

Page 6: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

WHYAREVCANDPEFIRMSINTERESTINGTOHACKERS?

HIGH VALUE ASSETS PUBLICLY VISIBLE

CONFIDENTIAL & VALUABLE INFORMATION

WELL KNOWN INVESTMENTS

Page 7: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

TheAn

atom

yofaTyp

icalAttack

ESTABLISHBEACHHEAD

ESTABLISHC2CHANNEL

Escalation/Extension/Expansion/Penetration

SPEARPHISHING

EXTERNALSCANSVulnerabilities|WeakCredentials|SQLi

PHYSICALUSBDrive|CDR|Laptop|Mobile|WIFI

OPPORTUNISTICDrive-byDownload

EmailAttachment|MaliciousURL

INFILTRATION

ATTACKER

Updates&Instructions

TIME

DATAEXFILTRATION

LateralAnalysisTo‘LearnAboutYou’

LateralAccessTo‘SecretSauce’

ONGOINGEDUCATION

KeyLogging

DOC/Mailbox/TextSearch

PasswordCracking/SAM

User/GroupAccounts

PoorlyProtectedShares

ARPHijack/MITM

PoorlyPatchedSystems

BroadScanning

LOCALMETHODS

NETWORKMETHODS

©2017eSentire,Inc.

SLIDE6

Page 8: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

TARGETEDATTACKTARGET

SENT EMAIL WITH INFECTED ATTACHMENT

INFILTRATEFAKE LOG IN

CAPTURED CREDS

EXPANDINFECTED EMAIL SENT FROM

COMPROMISED ACCOUNT

BLOCKEDESENTIRE DETECTED

AND REPORTED ATTACK

©2017eSentire,Inc.

Page 9: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

COLD CASESOC ANALYST

DISCOVERED CNC TRAFFIC

FORENSICSTRACKED HACKER

THROUGH CELLPHONE

EVIDENCECOLLECTED

STOLEN DATA

LAWTURNED OVER EVIDENCETO LAW ENFORCEMENTCSI

CYBER

DISCOVEREDCRIMERING

Page 10: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

RegulatoryandDueDiligenceCybersecurity FocusQuestions

ASSETSDo you know what data you have?

REGULATORSDo you know what legislationgoverns the data you have?

THREAT ACTORSDo you know what cyber threats are targeting your firm?

PROTECTIONHow are you defending yourfirm from cyber threats?

RISKSDo you know what accessrisks exist?

REPORTINGCan you demonstrate your cybersecurity claims?

Page 11: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

MostFrequently-SeenCybersecurity Gaps

» DataMapping/Classification/Ownership(DLP/PII)» Evidence/AuditTrails

» Employeeuserid add/delete/change» Throughoutbusinessprocesses/systems

©2017eSentire,Inc.

SLIDE10

Page 12: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

eSentireSecurityFramework:CommunityEdition

©2017eSentire,Inc.

SLIDE11

Page 13: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

MaturityAssessment&GapAnalysis

©2017eSentire,Inc.

SLIDE12

Page 14: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

MostFrequently-SeenCybersecurity Gaps

» DataMapping/Classification/Ownership(DLP/PII)» Evidence/AuditTrails

» Employeeuserid add/delete/change» Throughoutbusinessprocesses/systems

» IncidentResponsePlanning

©2017eSentire,Inc.

SLIDE13

Page 15: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

InformationSecurityEventScenarios(aka“TheDirtyDozen”)

» MalwareCompromise» Ransomware Attack

» SocialEngineering» BusinessEmailCompromise

» InfrastructureOutage(Internal)» LocalAccessWithoutAuthorization(Non-

Malware)» RemoteAccessWithoutAuthorization» Lost/StolenDevices» InappropriateBehavior(Internal)» CloudServiceAccessWithoutAuthorization» DataLoss/Extrusion(Internal)» DirectFinancialLoss» DenialofService(External)» PhysicalBreach» Third-PartyBreach

©2017eSentire,Inc.

SLIDE14

Page 16: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up
Page 17: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up
Page 18: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

“THEMOREYOUSWEATINPEACE,THELESSYOUBLEEDINWAR.”- GeneralGeorgeS.Patton

Page 19: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

INCIDENTRESPONSE

PLAN

Legal

LawEnforcement

PRBoard

Regulator

Compliance

IR

SimulationRuns

Page 20: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

©2016eSentire,Inc.

SLIDE19

Ransomware

Page 21: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

©2016eSentire,Inc.

SLIDE20

Ransomware FailureVectors:Technical,Process/Policy,Training• Thefirm’supstreamemail(SMTP)providerdidnotscanattachmentsformaliciouscontent.• Thefirm’snext-generationfirewalldidnotidentifytheattachmentasmalicious(orquestionable)content.• Thefirm’slocalemailsystem(e.g.MicrosoftExchange)didnotscanattachmentsformaliciouscontent.• Theenduserwasnotsufficientlytrainedtoidentifyaphishingemail(withmaliciouscontent).• Theuser’sworkstation(ormobiledevice)didnotflagthemaliciouscontent(throughanti-virusorother

endpointprotectionmethodology).• IfthedeliveryvectorwasamacrohiddenwithinanOfficedocument(themostcommondelivery

method),macroswereenabledwithinOffice(ortheuserwasenticedtoenablethemmanually).• Theuser’sworkstationdidnothaverestrictionsplacedontheexecutionofdownloadedcontent.• Thefirm’snext-generationfirewalland/orIntrusionPreventionsystemdidnotrecognizeand/orblockthe

command-and-controltraffic(includingkeygeneration)ofthemaliciouscode(particularlyimportantiftheremoteIPaddresseswerepreviouslyknowntobebad).

• Thefirmdidnotdetect(throughfilesystem analysis)thataspecificuserwasmodifyingalargenumberoffilesrapidly.

• Dependingonhowmanyfileswereaffectedbytheinfectedendpoint,itisapossibilitythattheenduserhadmoreaccessthantheynecessarilyneededtoexecutetheirjob.

• Duringtherestoreprocess,somenewerfilesmighthavebeennotbackedupduetoagapinbackuprigor.

Page 22: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

MostFrequently-SeenCybersecurity Gaps

» DataMapping/Classification/Ownership(DLP/PII)» Evidence/AuditTrails

» Employeeuserid add/delete/change» Throughoutbusinessprocesses/systems

» IncidentResponsePlanning» RiskAssessment(Maturity/Gap)vs.VulnerabilityAssessmentvs.

PenetrationTesting

©2017eSentire,Inc.

SLIDE21

Page 23: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

3

2

1

0 0

1

3

2

PENETRATIONTESTING VULNERABILITYSCANNING

ExternalVulnerabilityAnalysis(nocreds) withattemptstoexploit0

ExternalVulnerabilityAnalysis(nocreds) withattemptstoexploitPhishing/OSINT/Physical

1

PhishingwithActivecontent (notdamaging,butpersistentaccess)

2

“OceansEleven”ActiveexploitationDefinedObjectiveWebAppExploits

3

0

1

2

3

ExternalVulnerabilityAnalysis(withcreds) withoutattemptstoexploit

InternalVulnerabilityAnalysis(withcreds) withoutattemptstoexploit

WirelessVulnerabilityScanning

WebApplicationAnalysis

©2017eSentire,Inc.

Page 24: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

ResourcesAvailable

» GuidetoSoundPracticesforCyberSecurity(AIMA)» IllustrativeQuestionnaireforDueDiligenceofVendorCyberSecurity(AITEC)» SEC-OCIE2015Cybersecurity ExaminationInitiative(RiskAlert)» eSentireWrittenInformationSecurityPolicy/IncidentResponseTemplate» eSentireSecurityFramework(CommunityEdition)» eSentireComplianceReadinessWorkbook» eSentireDataFlowSecurityTemplate» eSentire“DirtyDozen”ScenarioListing» eSentireUpdatedRegulatoryCybersecurity Recommendations(v7)» eSentireRansomware DefenseRecommendations

©2017eSentire,Inc.

SLIDE23

Page 25: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

“Howcanonedecidewhat’sreasonable?”

©2017eSentire,Inc.

SLIDE24

Page 26: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

TheBest(12or13)Cybersecurity QuestionsToAsk

» The6“TopLevel”Questionsfromthebeginningofthispres.» Whoisresponsibleforcybersecurity withinyourfirm?» Howwelldoyouvetyourvendors(AITEC)?» Whatisyourincidentresponseplan(esp.foraransomware attack)?» Whatisyourprotocoltofulfillwiretransferrequests?» Howdoyoueducatethefirm’semployees(esp.seniormanagement)?» Describeyourvulnerabilityassessmentandpenetrationtest

methodologies.» EU-specificDomicileQuestion:HowareyoupreparingforGDPR?

©2017eSentire,Inc.

SLIDE25

Page 27: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

CYBERSECURITYMUST-HAVES(e.g.PortfolioFirms)

1 IDENTIFYCOMMONATTACKS1

PATCHSYSTEMSREGULARLY5

ENFORCERIGOROUSPASSWORDPOLICY3MINIMIZEADMINPRIVILEGES4

VALIDATESECURITYSYSTEMSFUNCTIONING6

1 PERFORMREGULARBACKUPS7

VALIDATEPHYSICALSECURITY11

PERFORMVULNERABILITYASSESSMENTS9MONITORNETWORKTRAFFIC10

LOGSYSTEMACCESS8ACCEPTABLEUSEPOLICY(AUP)2

PREPAREFORTHEEVENTUALINCIDENT12

©2017eSentire,Inc.

SLIDE26

Page 28: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

24X7 Human Monitoring and

Hunting

Intervention & Response

Detection and Prevention Technology

• Real-time detection and prevention of known attacks

• Signal suspicious network behavior to detect unknown attacks

• Real-time forensics via 24X7 Global SOCs

• Add insights to raw signals• Quickly determine if weird

normal or weird bad

• Contain Threat• Escalate to customer• Remediate

eSentireManagedDetectionandResponse™(eMDR)Service

Page 29: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

MANAGEDDETECTION&RESPONSEFocusonthreatdetectionusecases,advancedortargetedattacksthathavebypassedexistingperimetercontrols

©2016eSentire,Inc.

SLIDE28

MDRsupportsorganisations seekingtoimprovetheirthreatdetectionandincidentresponsecapabilities:

• Organisations struggletodeploy,manageanduseaneffectivecombinationofexpertiseandtoolstodetectthreats,especiallytargetedadvancedthreatsandinsiderthreats.

• Agrowingnumberofprovidersareofferingoutcome-basedservicesthatdifferfromtraditionalmanagedsecurityservices(MSSs)offerings,becausetheyarefocusedondetectingpreviouslyundetectedthreatsthathavebreachedanorganization'sperimeterandaremovinglaterallythroughtheITenvironment.

• MDRservicesarenotdeliveredbythemajorityofMSSPstoday,butthisischanging.

• MDRservicesarestillfocusedattheenterpriseandupper-midmarketcustomer,butnewentrantsaretargetingsmallermidsizeorganisations.

Page 30: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

+1866.579.2200 [email protected] www.esentire.com Followus@esentire

THANKYOU

QUESTIONS NEXTSTEPS

Page 31: Eldon Sprickerhoff Chief Security Strategist Founder Sprickerhoff Chief Security Strategist Founder WE DETECT THE CYBER THREATS THAT OTHER TECHNOLOGIES MISS Cybercrime: A wake-up

David Bailey Group Head of Marketing and Communications

Eldon SprickerhoffChief Security StrategistFounder