tripwire university boot camp – economy of bad

23
Economy of Bad Know your Enemy Christopher Beier Sr. Product Marketing Manager SCM Products Tripwire

Upload: tripwire

Post on 12-Apr-2017

434 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Tripwire University Boot Camp – Economy of Bad

Economy of BadKnow your Enemy

Christopher BeierSr. Product Marketing ManagerSCM ProductsTripwire

Page 2: Tripwire University Boot Camp – Economy of Bad

2

Agenda

Economy of bad How does this economy manifest

Breaches continue to grow

Soaring cost of lost records

Attacker Motivations Three general types of Hackers

Motivations

Attacker Methods Most common attack types

Page 3: Tripwire University Boot Camp – Economy of Bad

3

Economy of Bad: defined

1. Participants (buyers

/sellers/resources)

2. Product

3. Currency

4. Marketplace

5. Competition

1. Yes

2. Tools, education, fruits of their efforts

3. Bitcoin, egold, and many other under the radar

4. Yes5. Yes

Page 4: Tripwire University Boot Camp – Economy of Bad

Value of this market

The CostAs attacks become increasingly sophisticated, security breaches have a growing financial impact on victims.

$7.7 million 2% from 2014

THE AVERAGE ANNUAL COST OF A CYBER CRIME INCIDENT IN 2015

THE ESTIMATED COST OF CYBER CRIME TO THE GLOBAL ECONOMY

$400 billion

Sources: Ponemon Institute. “2015 Cost of Cyber Crime Study: Global.”McAfee/CSIS, “Net Losses: Estimating The Global Cost Of Cyber Crime”

Page 5: Tripwire University Boot Camp – Economy of Bad

5

Breaches continue to grow…

IBM X-Force Threat Intelligence Report 2016

Page 6: Tripwire University Boot Camp – Economy of Bad

6

Healthcare records are the most valued commodity

2015 Ponemon Cost of a Breach Study

Page 7: Tripwire University Boot Camp – Economy of Bad

Attacker Motivations

Page 8: Tripwire University Boot Camp – Economy of Bad

8

All the world’s a chess board…and all the security pros, merely pieces

http://www.tripwire.com/state-of-security/off-topic/all-the-worlds-a-chess-board-and-all-the-security-pros-merely-pieces/

Page 9: Tripwire University Boot Camp – Economy of Bad

9

Page 10: Tripwire University Boot Camp – Economy of Bad

10

CYBERWAR & HACKTIVISM

THEFT OF SENSITIVE INFORMATION

CYBERCRIME & FRAUD

Page 11: Tripwire University Boot Camp – Economy of Bad

11

Anonymous VS. ISIS

Page 12: Tripwire University Boot Camp – Economy of Bad

12

300+

®

Home Profile Connections Jobs Interests Search…

connectionsConnect Send InMail

Cyber Threats Analyst at the Naval Network Warfare Command

Robin Sage – Would Someone in Your Company Connect?

Robin Sage

Massachusetts Institute of Technology

Naval Network Warfare Command 

Norfolk, CT │ Cyber Threats Analyst

25 years oldEducation

CurrentAge

Page 13: Tripwire University Boot Camp – Economy of Bad

13

®

Home Profile Connections Jobs Interests Search…

Connect Send InMail

Robin Sage

Massachusetts Institute of Technology

Naval Network Warfare Command 

Norfolk, CT │ Cyber Threats Analyst

Cyber Threats Analyst at the Naval Network Warfare Command

25 years oldEducation

CurrentAge

300+connections

Robin Sage – A Passive Social Engineering Attack

300+ connections (Intelligence, Bank Accountsmilitary & security agencies)

Offered work at Lockheed Martin, Google Secret base locations

Dinner invitations Interpersonal Relationships

Emails

RESULTS?

Page 14: Tripwire University Boot Camp – Economy of Bad

14 Flipping the Economics of Attacks, Palo Alto Networks & Ponemon Jan 2016

Page 15: Tripwire University Boot Camp – Economy of Bad

15Hackmageddon.com

Page 16: Tripwire University Boot Camp – Economy of Bad

16 Flipping the Economics of Attacks, Palo Alto Networks & Ponemon Jan 2016

Page 17: Tripwire University Boot Camp – Economy of Bad

Attacker Methods

Page 18: Tripwire University Boot Camp – Economy of Bad

18

COMMODITYATTACKS (80%)

TARGETED THREAT (19.99%)

ADVANCED THREAT (.01%)

Microsoft Targeted Attack series 2012 -2015

Page 19: Tripwire University Boot Camp – Economy of Bad

19

50%

NEARLY 50% OPEN E-MAILS AND CLICK ONPHISHING LINKS WITHINTHE FIRST HOUR.

99.9%

OF THE EXPLOITED VULNERABILITIESWERE COMPROMISED MORE THAN A YEAR AFTER THE CVE WAS PUBLISHED.

95%

OF MALWARE TYPES SHOWED UP FOR LESSTHAN A MONTH, AND FOUR OUT OF FIVEDIDN’T LAST BEYOND A WEEK.

SOURCE: Verizon DBIR 2015

SOURCE: Verizon DBIR 2015

SOURCE: Verizon DBIR 2015

Page 20: Tripwire University Boot Camp – Economy of Bad

20 IBM X-Force Threat Intelligence Report 2016

Page 22: Tripwire University Boot Camp – Economy of Bad

What Battlefield are you fighting on?

Page 23: Tripwire University Boot Camp – Economy of Bad

tripwire.com | @TripwireInc