Cyber Security Threats Overview

Slides:



Advertisements
Similar presentations
Manage your technology for optimal return on investment (ROI) The Tivoli ® Configuration & Operations management solution from IBM.
Advertisements

Life Science Services and Solutions
1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
© 2013 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Information Security Jim Cusson, CISSP. Largest Breaches 110, NorthgateArinso, Verity Trustees 6, Aurora St. Luke's Medical.
David A. Brown Chief Information Security Officer State of Ohio
Unified Logs and Reporting for Hybrid Centralized Management
Rethinking Security to Enable Business LJ Johnson Nike’s Global Information Security Officer August 16, 2005.
© 2014 Level 3 Communications, LLC. All Rights Reserved. Proprietary and Confidential. Polycom event Security Briefing 12/03/14 Level 3 Managed Security.
Mel Pless, Sr. Director, Solutions Consulting Guidance Software, Inc. Let’s Get Right To The Endpoint Leveraging Endpoint Data to Expose,
© 2012 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
Website Hardening HUIT IT Security | Sep
IT-Partners Limited © 2011 IT Partners Limited Y OUR IT SOLUTION P ARTNERS Managing Director Confidential Data Loss Prevention Sunny Ho 1.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
© 2009 IBM Corporation Delivering Quality Service with IBM Service Management April 13 th, 2009.
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
[Name / Title] [Date] Effective Threat Protection Strategies.
InformationWeek 2014 Strategic Security Survey Research Findings © 2014 Property of UBM Tech; All Rights Reserved.
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Staying Ahead of the Curve in Cyber Security Bill Chang CEO, SingTel Group Enterprise.
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Dell Connected Security Solutions Simplify & unify.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Data Center Firewall. 2 Common IT Security Challenges Does my network security protect my IT environment and sensitive data and meet the regulatory compliances?
©2015 EarthLink. All rights reserved. EarthLink overview.
1 The New Security Blueprint : Challenges & Opportunities Ajay Goel, Managing Director, Symantec India & SAARC Sept 1, 2011.
Cyber Security Nevada Businesses Overview June, 2014.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
The Changing World of Endpoint Protection
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Ali Alhamdan, PhD National Information Center Ministry of Interior
CIO Perspectives on Security Fabrício Brasileiro Regional Sales Manager.
1© Copyright 2014 EMC Corporation. All rights reserved. Applying the Power of Data Analytics to Cyber Security Dr. Robert W. Griffin Chief Security Architect.
Microsoft and Symantec
Chapter © 2012 Pearson Education, Inc. Publishing as Prentice Hall.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
2© Copyright 2013 EMC Corporation. All rights reserved. Cyber Intelligence Fighting Cyber Crime Insert Event Date LEADERS EDGE.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
© 2011 IBM Corporation IBM Security Services Smarter Security Enabling Growth and Innovation Obbe Knoop – Security Services Leader Pacific.
CLOSE THE SECURITY GAP WITH IT SOLUTIONS FROM COMPUTACENTER AND CISCO AUGUST 2014.
1© Copyright 2012 EMC Corporation. All rights reserved. Next Generation Authentication Bring Your Own security impact Tim Dumas – Technology Consultant.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
SYMANTEC ENDPOINT SECURITY SERVICE PROVIDERS | ALLIANCE PRO IT HYDERABAD (CORPORATE OFFICE) ALLIANCE PRO IT PRIVATE LIMITED, 3A, HYNDAVA TECHNO PARK, TECHNO.
Protect your Digital Enterprise
Cybersecurity as a Business Differentiator
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Information Security Program
Segmap Solutions Mapping segments.
Cybersecurity - What’s Next? June 2017
Comprehensive Security and Compliance at an Affordable Price.
Juniper Software-Defined Secure Network
Cloud Firewall.
Data Center Firewall.
Hybrid Management and Security
Real-time protection for web sites and web apps against ATTACKS
Making Information Security Manageable with GRC
Company Overview & Strategy
Securing Your Digital Transformation
National Cyber Security
Securing the Threats of Tomorrow, Today.
Strategic threat assessment
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Microsoft Data Insights Summit
Presentation transcript:

Cyber Security Threats Overview Carl Hill, President carl.hill@gtscloud.com www.gtscloud.com

The foundation of our value creation model. Executive Summary – Presentation Objective Golden Technology Services, Inc. (GTS) is engaged in providing innovative and affordable cyber security, cloud, and resilience and recovery services offerings to large enterprises, small and midsize businesses, and public sector organizations. The objective of this presentation is to: Increase visibility of the cyber threat landscape Increase awareness regarding the risk to Intellectual Property, assets, revenue, and brand/reputation Establish an understanding of the foundation for proper cyber security In summary, GTS understands the cyber security threats landscape, and works our clients to implement complete, hardened security solutions that can evolve to keep pace with the evolving threats landscape. The Golden Edge Deep industry expertise, globally applied. The foundation of our value creation model. Deep industry expertise. Global scale and presence. Extensive network of Operating Executives. And a wealth of industry portfolio data; we call it The Golden Edge. These are the four pillars of Golden Technology Services (GTS) value creation model. By leveraging these core capabilities and resources—Golden has established an overall track record of bringing industry leading technologies, that matter, to our clients. 2

The threat landscape is continually evolving….. External threats. With the continual breakdown of the traditional perimeter, external threats now exist within the corporate premises as enterprises have opened themselves to Internet-based commerce and remote users. Internal threats. Once the domain of human error, malicious intent and various forms of propagating malware, internal threats now include advanced persistent threats and the coordinated actions of well funded and determined adversaries. Compliance. Enterprises today are under growing pressure to comply with mandates such as Sarbanes-Oxley, GPG-13, FSA, Garante, HIPAA, FISMA, GLBA, PCI and NERCO—including regulators that can impose financial penalties for nonconformance. As organizations continue to embrace mobility and innovative new technologies, compliance regulations will in turn embrace more sophisticated controls. April 13, 2017

Cyber Security attacks must be analyzed to determine the threat level April 13, 2017 Source: “IBM Security Services Cyber Security Intelligence Index,” IBM Corp., July, 2013

Virtually all industries experience cyber attacks, but some are “serious targets” April 13, 2017 Source: “IBM Security Services Cyber Security Intelligence Index,” IBM Corp., July, 2013

Malicious code and sustained scans are the most common cyber attacks April 13, 2017 Source: “IBM Security Services Cyber Security Intelligence Index,” IBM Corp., July, 2013

“Opportunistic Attacks” are the most frequent type of cyber attack April 13, 2017 Source: “IBM Security Services Cyber Security Intelligence Index,” IBM Corp., July, 2013

Most security breaches occur as the result of human intent or error April 13, 2017 Source: “IBM Security Services Cyber Security Intelligence Index,” IBM Corp., July, 2013

The most important security practices include building a risk-aware culture, and managing and responding to incidents as quickly as possible April 13, 2017 Source: “IBM Security Services Cyber Security Intelligence Index,” IBM Corp., July, 2013

Cyber Security breach examples abound… Target Data Breach (SMB HVAC Vendor - 60 employees)? Nationwide retail giant Target is investigating a data breach potentially involving millions of customer credit and debit card records, multiple reliable sources tell KrebsOnSecurity. The sources said the breach appears to have begun on or around Black Friday 2013 — by far the busiest shopping day the year. Phishing email fools university staff, compromises thousands October 25, 2013 Employees fell victim to a phishing email that resulted in them providing account information, subsequently putting thousands at risk. Data breach affects more than 6,000 December 17, 2013 More than 6,000 current and former employees, vendors and students are being notified that their personal information may have been compromised in a data breach. Insecure email puts more than a thousand patients at risk October 07, 2013 An employee sent out an insecure email containing personal information on more than 1,300 patients. April 13, 2017

half a billion records* Attackers optimize and refine target selection… more than half a billion records* of personally identifiable information (PII) were leaked in 2013 *X-Force Research - 2013 April 13, 2017

The sophistication of cyber threats, attackers and motives is rapidly escalating. 1995 – 2005 1st Decade of the Commercial Internet 2005 – 2015 2nd Decade of the Commercial Internet Motive National Security Nation-state Actors; Targeted Attacks / Advanced Persistent Threat Espionage, Political Activism Competitors, Hacktivists Monetary Gain Organized Crime, Hackers and Crackers using sophisticated tools Revenge Insiders, using inside information Script-kiddies or hackers using tools, web-based “how-to’s” Curiosity Adversary *X-Force Research - 2013 April 13, 2017

Common Threat to Online Channels & Internal Systems: Malware, Phishing Humans will always make mistakes System and application vulnerabilities continue to emerge Malware detection will always lag Three Losing Battles Widespread Fraud $3.4B est lost to online fraud in 20121 Advanced Threats and Breaches 85% of breaches go undetected2 $8.9M average cost of cyber-attacks3 Two Major Impacts Fraud Scheme Execution Money Loss Data Exfiltration Enterprise Breach Vulnerability Exploit Social Engineering (Phishing) Malware Infection To understand the threat, let’s understand the thought process of the cybercriminals. While your backend systems are well protected, end users and even employees’ endpoints don’t enjoy the same level of protection. If you can attack the endpoint you can use malware or phishing to social engineer the user and capture personal information and credentials. You can use these to take over the user’s financial account or computer. You can also take advantage of the authenticated session and drive fraudulent transactions or exfiltrate data through it. That’s why financial fraud and advanced threats are very endpoint-centric, because it is easiest path to users and their money or data. How does the attack unfold? First the user is targeted, individually or as part of a mass campaign. It can be with an email message or by visiting a hacked or malicious web site. Next, the user browser or operating system is exploited. This is often due to a vulnerability that was not patched properly. The vulnerability allows malware code to install onto the computer. In the mobile world, this is typically done when a user unknowingly installs an infected / malicious app from the appstore. Once the malware is installed, the browser itself is compromised. The malware is now in position to control the user interaction with the bank or enterprise: In the case of a fraud scheme – malware can block the user from logging in or let the user log in and inject a transaction into the authenticated session. Ultimately the money is transferred to a mule account – a person recruited by the fraudsters to unknowingly serve as the receiving end of the transaction. In the case of an enterprise breach – malware can capture credentials, PII and other sensitive information - sending it to remote attackers in real–time The challenge in fighting these attacks is threefold: 1) people do not know they are under attack and do not know how to protect themselves; 2) applications and systems are not perfect and are ever-changing, yielding constant sources of new vulnerabilities to be exploited; 3) standard malware detection is updated too late to stop the attackers This is costing organizations a lot of money and poses a major threat to brand reputation April 13, 2017 1JPMorgan: 2012 Online Fraud Report , 2Gartner: 2290415, 3Ponemon Institute: 2012 Cost of Cybercrime Report: US

Build a risk-aware culture Protect the network & end-points Where should you start? These three controls can help you address the top vulnerabilities and begin to reduce risk. Build a risk-aware culture Automate security hygiene & manage incidents with intelligence Protect the network & end-points April 13, 2017

The top 5 reasons why attacks are possible are all related to system hygiene or user knowledge. 1 End user didn’t think before clicking 2 Weak password/default password in use 3 Insecure configuration 4 Use of legacy or un-patched hardware or software 5 Lack of basic network security protection/segmentation April 13, 2017

Proper IT Security requires a wide range of focus and capabilities Understanding of Security drivers – threats, standards, regulations, business objectives Security Policy Security Processes Security Metrics – collection and management Security architecture and infrastructure – people, hardware, software, communications, analytics Define Capture Analyze Monitor & Measure Act April 13, 2017

The organization drives the Security Model April 13, 2017

Each organization’s security model is supported by infrastructure… The Security Products marketplace is a broad and growing one, according to IDC Security Products IAM Network Endpoint Messaging Web SVM Other AA Firewall Antimalware URL Filtering SIEM W-SSO UTM Server Security Antispam PERM E-SSO IDP Suites Content Filtering FII LA VPN Access & Information Protection Web Application Firewall Policy & Compliance UP SDSM Vulnerability Management Acronyms: IAM Identity & Access Management AA Advanced Authentication W-SSO Web Single Sign-on E-SSO Enterprise Single Sign-on LA Legacy Authorization UP User Provisioning UTM Unified Threat Management IDP Intrusion Detection & Prevention VPN Virtual Private Network SVM Security & Vulnerability Management SIEM Security Intelligence & Event Management PERM Proactive Endpoint Risk Management FII Forensics & Incident Investigation SDSM Security Device & Systems Management Source: IDC Web Site: http://www.idc.com/getdoc.jsp?containerId=IDC_P261, July 2014 April 13, 2017

Security Products Vendors The Security Products vendor landscape is fragmented, and continually changing due to the evolution of threats and the technology advances to address them Security Products Vendors Absolute Software F5 Kaspersky Sophos Alcatel-Lucent FireEye LSI Sourcefire Axway Fortinet Microsoft Symantec Barracuda Networks F-Secure NetForensics Trend Micro Blue Coat Gemalto NetIQ Trustwave CA Technologies Google Oracle Vericept Check Point HP Palo Alto Networks Vmware Cisco IBM PassLogix WatchGuard Damballa Invincea Proofpoint Webroot Dell Secureworks Intel/McAfee Qualys Websense Entrust InteproIQ SafeNet Zscalar ESET Juniper SonicWALL Wombat Leaders in this market segment include, but are not limited to: Symantec, Intel/McAfee, Cisco, IBM, Check Point, Trend Micro, Juniper Networks, Microsoft, EMC, and Kaspersky Lab. Source: IDC Web Site: http://www.idc.com/getdoc.jsp?containerId=IDC_P261, GTS Analysis, July 2014 April 13, 2017

The IT Services marketplace also offers “Managed Security Services” IDC defines managed security services as "the around-the-clock remote management or monitoring of IT security functions delivered via remote security operations centers (SOCs), not through personnel onsite." The rise in frequency and complexity of attacks and the need for increasingly sophisticated security solutions have led to a new echelon of MSS that IDC is calling MSS 2.0. A MSSP 2.0 is further "up the stack" than traditional MSSPs which are offering MSS 1.0 services such as basic managed and monitored services (firewalls, intrusion detection services [IDS]/intrusion prevention services [IPS], unified threat management [UTM], IAM, log monitoring, vulnerability scanning, etc.). Traditional MSSPs may also offer advanced services such as DDoS, Web application security, managed SIEM, and managed SOC. MSSPs that are focused on MSS 2.0 deliver basic and advanced traditional MSS plus professional/complementary services. And, they are investing in mobile/BYOD, cloud, threat intelligence/big data, and incident response/forensics. Cloud, mobile/BYOD, and big data are three of four pillars that IDC has identified as top trends in 2014. The fourth pillar, which doesn't factor into this IDC MarketScape, is social media. Social media, however, does impact security, and advanced MSSP capabilities, in our analysis, can help detect, analyze, and protect against threats in the social media arena. Source: “IDC MarketScape: Worldwide Managed Security Services 2014 Vendor Assessment,” IDC Corp., June 2014 April 13, 2017

Security Technology Stack GRC Identity, Entitlement, Access Information & Event Mgmt. Cryptography Data Security Application Security Host Security Network Security Physical Security April 13, 2017

Let’s look at network security, and its relationships to the stack Data Security Host Security Monitor and control data flows on network Interconnected hosts on network Establish secure channel Control hosts on network Network Security Use identity Retrieve access control Send security logs Detect security incidents Identity and Access Security Info & Event Management Monitor and control applications running on network Key management Crypto offload Application Security Cryptography April 13, 2017

Security Intelligence has differentiated levels of capabilities Basic : Organizations employ perimeter protection, which regulates access and feeds manual reporting Proficient: Security is layered into the IT fabric and business operations Optimized: Organizations use predictive and automated security analytics to drive toward security intelligence April 13, 2017

Getting to “intelligent security” An example of comprehensive cyber security capabilities: IBM Managed Security Services Getting to “intelligent security” April 13, 2017

Checklist for Compromised Accounts - What should a firm do after it discovers that a customer’s account has been compromised? * This checklist is not exhaustive, and a firm may need to take other steps depending on the nature/cause of the intrusion, business model, customer base, the threats, and the law. Monitor, limit, or temporarily suspend activity in the account until the situation is resolved. Alert others in the firm (including the firm’s Legal and Compliance Department, if applicable) to be mindful of unusual activity in other customer accounts. Should consider designating in advance a specific individual or department to serve as a central contact for questions about the intrusion. Identify, if possible, the root cause of the intrusion (e.g., the firm’s system was compromised, the individual account was hacked, the customer was the victim of identity theft) and determine whether the intrusion is isolated to one account.    Contact the SEC and your FINRA Coordinator.  In the event of an account intrusion, have the following information readily available if possible: Date(s) and time(s) of activity IP addresses used to access the account Security or securities involved (name and symbol) Time and date of the activity Customer account affected by the activity, including name and account number Whether the customer has been or will be reimbursed and by whom   If appropriate, contact law enforcement agencies, such as the FBI or, if the U.S. mail is involved, the United States Postal Inspector.    Contact the firm’s relevant state regulatory authorities.   If the firm has not already done so, contact the customer and, if appropriate, change the password and/or account number.  For more information, view ways a firm can help a customer that has been the victim of identity theft.   Determine whether any unauthorized person has gained or potentially has gained access to an account holder’s personally identifiable information and, if so, whether the firm must provide a specific type of notification to the customer or others under state law regarding the loss of the customer’s information. Some states may require notice to the State Attorney General or other state law enforcement agencies in addition to customer notification.   Determine whether the firm should file a Suspicious Activity Report (SAR) under the federal anti-money laundering provisions April 13, 2017

Summary The number of “bad actors” and the sophistication of cyber security threats is continually increasing The effects of cyber security attacks on businesses and governments are increasing in impact and cost An understanding of threats to your enterprise, and of your current security capabilities and gaps that must be filled, is imperative Become familiar with security standards, regulations, available capabilities and infrastructure NOW to meet your enterprise objectives, and to protect your stakeholders’ interests April 13, 2017 26

Additional Information

How GTS Creates Client Value GOLDEN TECHNOLOGY SERVICES, Inc. (GTS) Our Mission is Simple – We are focused on Value Creation for our Clients. We are the Trusted Advisor to our Clients and Partners. GTS is a privately held business technology services company. GTS is a diverse, minority-owned company We have two principal goals: Helping clients to become more innovative, efficient, and competitive through the application of business insight and IT cloud solutions. To develop and leverage an ecosystem of Vendors, Alliance and Business Partners who bring best-in-class Information technologies and services to the markets and clients we serve. Our commitment: To be the Trusted Advisor to our and Clients and Partners. How GTS Creates Client Value The GTS Competitive Advantage is our global experience and accomplishment, our cloud knowledge and specialization, our multi-vendor certifications, our broker services, and most importantly, our network of people and partner ecosystem model. Our focus is on the client. Our focus is the client’s business challenges. GTS is missioned to help clients solve IT and business problems through consulting and the use of advanced information and cloud-delivered technologies. GTS offers a base portfolio of cloud services that enable clients to optimize their IT environments, thereby driving efficiency, flexibility, and productivity into their business operations, while reducing costs. April 13, 2017

GTS Executive Biographies Carl Hill is CEO for Golden Technology Services. With over three decades of marketing and sales experience in the IT industry, Mr. Hill brings a unique perspective to any project or engagement when it comes to developing and working with clients. His responsibilities have included new product launch, international marketing, sales development, creating marketing and business plans, strategic account management, sales development and responsibilities for C- level client relationship and satisfaction across multiple industries. Mr. Hill had a successful 25+ year career with IBM. Starting his career in sales with IBM, he had held multiple Executive Sales and Marketing Management responsibilities where he had revenue and people responsibility for IBM’s channel business in US and Global markets. Carl Hill graduated from Rhodes College in Memphis with a BA in Psychology and a minor in Economics. Justin Golden is COO and founder of Golden Technology Services. Mr. Golden has compiled over thirty years of sales, marketing and business development experience in the Information Technology industry both here and internationally. Beginning in sales he was early advocate of alternate channel sales utilizing Business Partners across multiple product lines. This was followed by a business development role in an emerging technology, Speech Recognition, where he was awarded several Invention Disclosures for this technology. He established the role of General Business Consultant in a sales assignment in the Czech Republic which led to record sales in revenue, new business and profitability. Mr. Golden also launched the first inside sales (Telesales) team in the US Sales Centers for applications hosting customers. In a most recent assignment, Mr. Golden integrated the offerings of an IBM acquisition, Arsenal Digital, into the company’s services portfolio. Mr. Golden is a graduate of University of Vermont in Burlington with a major in Political Science and a minor in History. After graduation, he spent one year abroad in Ireland and the United Kingdom employed in Solicitors offices, Cork and Southampton. Kevin Skelly is Managing Director and Vice President, Business and Technology Strategy, for Golden Technology Services. Mr. Skelly most recently worked for IBM Corporation, where he had a successful 37-year career. His most recent work in IBM was in directing the analysis and planning in IBM Corporate Strategy of IBM’s strategic initiatives, with a specific focus on advanced analytics and Cloud platforms. Mr. Skelly’s areas of expertise include market strategy, market management, competitive analysis, business plan development, product management, sales/consulting, software architecture and development, and IT technology planning. Mr. Skelly attended Pace University’s Lubin School of Business and majored in Management Information Systems, and is a member of the Society of Competitive Intelligence Professionals and the American Marketing Association. April 13, 2017

Network Security has a number of layers and capabilities, and is EVOLVING Network Firewalls VPN Gateways Network Intrusion Detection/Prevention DDoS WiFi security Network Access Control DNS Security Web, Email and IM filtering April 13, 2017