SlideShare a Scribd company logo
Global APT Defense Summit Los Angeles
Matthew Rosenquist | Intel Corp
Understanding APT Threat Agent
Characteristics is Key to Prioritizing Risks
February 25, 2015 – Los Angeles, California
Global APT Defense Summit New York #APTSummit2
Agenda
1. The problems with vulnerability based security strategies
2. Threat Agents are the genesis of risks
3. Intersecting the most likely attacks is key
4. APTs present a special case, directed attacks
5. APTs use of Open Source Intelligence (OSINT)
6. Inclusion of Threat Agent Aspects into the Risk Picture
7. Prioritizing your most important exposures
Global APT Defense Summit New York #APTSummit3
About the Speaker
Matthew Rosenquist
Cybersecurity Strategist, Intel Corp
Matthew Rosenquist is passionate about cybersecurity! Benefiting from 20 years of
experience, he thrives at establishing strategic organizations and capabilities which
deliver cost effective security capabilities. His role is to champion the meaningfulness
of security, advise on emerging opportunities and threats, and advocate an optimal
balance of cost, controls, and productivity throughout the industry.
Mr. Rosenquist built and managed Intel’s first global 24x7 SOC, overseen internal
platform security products and services, was the first Incident Commander for Intel’s
worldwide IT crisis team, and managed security for Intel’s multi-billion dollar worldwide
M&A activities. He has conducted investigations, defended corporate assets,
established policies, developed strategies to protect Intel’s global manufacturing, and
owned the security playbook for the PC strategic planning group. Most recently,
Matthew worked to identify the synergies of Intel and McAfee as part of the creation of
the Intel Security Group, one of the largest security product organizations in the world.
Global APT Defense Summit New York #APTSummit4
History is Enlightening
“He who defends everything, defends nothing”
– Fredrick the Great
Global APT Defense Summit New York #APTSummit5
Problems with vulnerability based strategies
Vulnerabilities Exist Everywhere
• Never ending battle, not sustainable
• ‘Vulnerability’ is relative to the threat
• Not efficient on resources
How can we improve defenses?
The Impossible Challenge:
• Identify ALL vulnerabilities
• Close them before they are exploited
• Do it continuously, forever
• For all technology and users
Global APT Defense Summit New York #APTSummit6
History is Enlightening
“Know your enemy and know yourself and you can fight
a thousand battles without disaster”
– Sun Tsu
Global APT Defense Summit New York #APTSummit7
Threat Agents are the Genesis of Risks
• Threat Agent archetypes are collective
descriptions of attackers, representing
similar risk profiles
• Intelligent attackers whose Motivations
drive their Objectives
• Attributes such as skills, access, and
resources define their most likely Methods
• Not all archetypes represent a significant
threat to every organization
• Knowing your opposition is very valuable
Organized Criminals
Motivation: Personal Financial Gain
Objectives: Theft of digital assets,
including money & valuables
Methods:
• Compromise payment systems
• Access to financial assets
• Copying IP or resalable data
• Digital ransom (data or access)
• Fraudulent use of digital assets
External Threat Tech Skilled
Indirect AttacksDirect Attacks
Nation-State Cyberwarrior
Motivation: Personal Financial Gain
Objectives: Theft of digital assets,
including money & valuables
Methods:
• Compromise payment systems
• Access to financial assets
• Copying IP or resalable data
• Digital ransom (data or access)
• Fraudulent use of digital assets
External Threat Tech Skilled
Indirect AttacksDirect Attacks
Digital Thief
Motivation: Personal Financial Gain
Objectives: Theft of digital assets,
including money & valuables
Methods:
• Compromise payment systems
• Access to financial assets
• Copying IP or resalable data
• Digital ransom (data or access)
• Fraudulent use of digital assets
External Threat Tech Skilled
Indirect AttacksDirect Attacks
Global APT Defense Summit New York #APTSummit8
Intersecting the Most Likely Attacks is Key
Attack
Methods
Attacker
Objectives
Threat
Agents
Attack Methods
Attack Methods
Vulnerabilities without
Controls for these attacks
are likely Exposures
Areas of
highest
Exposure
All possible Threats,
Objectives, and Methods
Highest risk Threats,
Objectives, and Methods
Objectiv
es
Threat
Agents
Attack
Method
s
Optimizing
security resources
Global APT Defense Summit New York #APTSummit9
Targeting Victims…
“Two types of victims exist...
Those with something of value, and those who are easy
targets.
…therefore, don't be an easy target, and protect your
valuables.”
Global APT Defense Summit New York #APTSummit10
APT’s Present a Special Case
• Indirect Attacks
– Seeks easy targets based upon vulnerability
– Uses methods for widespread attacks for any victim
– “Spray and pray” mentality
– Seeks to satisfy objectives through whichever is the easiest target
• Direct Attacks – APT’s
– Target is selected based upon motivation and objectives
– Easiest path for that target is determined
– “Stalk and Sniper” mentality
– Attacks against target continue until objectives are met
CO N G R AT U L AT I O N S , YO U A R E A W I N N E R
O F T H E I NT E RG A L AC T I C LOT T E RY !
C L I C K O N T H E L I N K T O R E C E I V E Y O U R $ 5
M I L L I O N D O L L A R P R I Z E …
M i ke ,
W h a t a g a m e l a s t n i g ht ! G l a d yo u r s o n
Ro g e r h i t t h a t h o m e r u n ! I t o o k t h i s
v i d e o of h i s g ra n d s l a m i n t h e 6 t h i n n i n g .
C l i c k t h i s l i n k a n d c h e c k i t o u t ! S e e yo u
a t w o r k t o m o r ro w .
- S a m
Global APT Defense Summit New York #APTSummit11
Phases of a Social Engineering Attack
Source: Hacking the Human Operating System
Global APT Defense Summit New York #APTSummit12
APT’s use of Open Source Intelligence (OSINT)
APT’s stalk their prey using OSINT
– OSINT is the legal gathering of data without touching the target
– Advanced attackers are seeking the path-of-least resistance
– Understanding their target helps determine the method of attack
– Reconnaissance of a target begins early
– Search engines, social media, job boards, news stories, investor data,
company profiles, suppliers, domain and network ownership
– A wealth of information can be found…in as little as 20 minutes
Recommendation: understand what the world can determine about you
Global APT Defense Summit New York #APTSummit13
Open Source Intelligence (OSINT)
What could be learned
• Names and details of employees
& corporate officers
• Projects & reporting structure
• Roles and relationships
• Physical and logical locations
• HW, OS and Apps in use
• Security controls
• Trusted Vendors
How it could be used
• Phishing, spear-phishing
• Confidence scams/schemes
• Network & system targeting
• Software vulnerabilities
• Targeting security gaps
• Vendor impersonation/compromise
• Targeted malware
• Custom extortion & manipulation
Global APT Defense Summit New York #APTSummit14
Inclusion of Threat Agent Aspects into the Risk Picture
• Tools and process
form a sustainable
security capability
• Prediction of threats
feeds intelligent
decisions
• Smart security is the
key to success
Strategic
Cybersecurity
Capability Process
Prevention
Prevent or deter attacks so
no loss is experienced
Prediction
Predict the most likely attacks,
targets, and methods
Response
Rapidly address incidents to
minimize losses and return
to a normal state
Proactive measures to
identify attackers,
their objectives and
methods prior to
materialization of viable
attacks.
Secure the computing
environment with current
tools, patches, updates,
and best-known methods in
a timely manner. Educating
and reinforcing good user
behaviors.
Detection
Identify attacks not
prevented to allow for
rapid and thorough
response
Efficient management of
efforts to contain, repair,
and recover as needed,
returning the environment to
normal operations
Monitor key areas and
activities for attacks which
evade prevention. Identifies
issues, breaches, and attacks
Global APT Defense Summit New York #APTSummit15
Prioritizing your Most Important Exposures
• Understand the capabilities, methods, & objectives of your APT threats
• Combine threat characteristics with vulnerability analysis to find the
weak areas in your organization most likely to be exploited
• Counter these threats with proper
allocation of resources
Threat prediction can improve Prevention, Detection, and Response

More Related Content

PDF
Cyber Threat Intelligence
PDF
Careers in Cyber Security
PPTX
Cyber Threat Intelligence | Information to Insight
PDF
Building an Effective Cyber Intelligence Program
PDF
Cyber Threat Intelligence
PPTX
EthicalHacking_AakashTakale
PPTX
Need for Threat Intelligence & How to Operationalize it for your Organisation.
PPTX
Cyber Threat Intelligence
Cyber Threat Intelligence
Careers in Cyber Security
Cyber Threat Intelligence | Information to Insight
Building an Effective Cyber Intelligence Program
Cyber Threat Intelligence
EthicalHacking_AakashTakale
Need for Threat Intelligence & How to Operationalize it for your Organisation.
Cyber Threat Intelligence

What's hot (19)

PDF
Threat Intelligence
PPTX
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...
PPTX
Cyber Threat Intelligence: Building and maturing an intelligence program that...
PDF
[Bucharest] Attack is easy, let's talk defence
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPTX
Cyber Threat Intelligence - La rilevanza del dato per il business
PDF
Cyber Threat Intelligence - It's not just about the feeds
PDF
Threat Intelligence - Routes to a Proactive Capability
PDF
PPTX
2016 ISSA Conference Threat Intelligence Keynote philA
PPTX
Introduction to ethical hacking
PDF
Ethical Hacking by Krutarth Vasavada
PPTX
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
PPTX
Threat Hunting 101: Intro to Threat Detection and Incident Response
PDF
DRC -- Cybersecurity concepts2015
PDF
Insa cyber intelligence 2011
PPTX
Bsides 2019 - Intelligent Threat Hunting
PDF
USSTRATCOM Cyber & Space 2011 Herbert Lin
Threat Intelligence
Think Like a Bad Guy "Hacker" - Change the game to proactively protect your ...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
[Bucharest] Attack is easy, let's talk defence
Effective Threat Hunting with Tactical Threat Intelligence
Cyber Threat Intelligence - La rilevanza del dato per il business
Cyber Threat Intelligence - It's not just about the feeds
Threat Intelligence - Routes to a Proactive Capability
2016 ISSA Conference Threat Intelligence Keynote philA
Introduction to ethical hacking
Ethical Hacking by Krutarth Vasavada
Utilizing cyber intelligence to combat cyber adversaries (OA Cyber Summit)
Threat Hunting 101: Intro to Threat Detection and Incident Response
DRC -- Cybersecurity concepts2015
Insa cyber intelligence 2011
Bsides 2019 - Intelligent Threat Hunting
USSTRATCOM Cyber & Space 2011 Herbert Lin
Ad

Similar to 2015 Global APT Summit - Understanding APT threat agent characteristics is key to prioritizing risks - Matthew Rosenquist (20)

PPTX
International Cooperative: APT Hunting
PPTX
APT in the Financial Sector
PPTX
Real World Defense Strategies for Targeted Endpoint Threats
PPTX
Taking the Attacker Eviction Red Pill [updated]
PPT
Mark Arena - Cyber Threat Intelligence #uisgcon9
PDF
Doten apt presentaiton (2)
PPTX
Cyber Crime Seminar Jan 2015
PPTX
RMS Security Breakfast
PPTX
Battlefield network
PDF
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
PDF
Cyber Defense - How to be prepared to APT
PDF
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
PDF
Big Bang Theory: The Evolution of Pentesting High Security Environments
PDF
Sexy defense
PDF
RSA: Security Analytics Architecture for APT
PDF
The Custom Defense Against Targeted Attacks
PPTX
Global threat landscape
PDF
2015 Global Threat Intelligence Report - an analysis of global security trends
PDF
2015 Global Threat Intelligence Report
PPTX
Big Bang Theory: The Evolution of Pentesting High Security Environments
International Cooperative: APT Hunting
APT in the Financial Sector
Real World Defense Strategies for Targeted Endpoint Threats
Taking the Attacker Eviction Red Pill [updated]
Mark Arena - Cyber Threat Intelligence #uisgcon9
Doten apt presentaiton (2)
Cyber Crime Seminar Jan 2015
RMS Security Breakfast
Battlefield network
Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
Cyber Defense - How to be prepared to APT
Rethinking Cyber-Security: 7 Key Strategies for the Challenges that Lie Ahead
Big Bang Theory: The Evolution of Pentesting High Security Environments
Sexy defense
RSA: Security Analytics Architecture for APT
The Custom Defense Against Targeted Attacks
Global threat landscape
2015 Global Threat Intelligence Report - an analysis of global security trends
2015 Global Threat Intelligence Report
Big Bang Theory: The Evolution of Pentesting High Security Environments
Ad

More from Matthew Rosenquist (20)

PDF
Improving Healthcare Risk Assessments to Maximize Security Budgets
PDF
Six Scenarios How Russia May Use Nukes.pdf
PDF
Top Cyber News Magazine - Oct 2022
PDF
2022 Cybersecurity Predictions
PDF
McAfee Labs 2017 Threats Predictions
PDF
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
PDF
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
PDF
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
PDF
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
PDF
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
PDF
2017 K12 Educators Security Briefing - Matthew Rosenquist
PDF
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
PDF
2017 InfraGard Atlanta Conference - Matthew Rosenquist
PDF
Securing the Cloud by Matthew Rosenquist 2016
PDF
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
PDF
CSE 2016 Future of Cyber Security by Matthew Rosenquist
PDF
True Cost of Data Breaches
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PDF
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
PDF
2015 August - Intel Security McAfee Labs Quarterly Threat Report
Improving Healthcare Risk Assessments to Maximize Security Budgets
Six Scenarios How Russia May Use Nukes.pdf
Top Cyber News Magazine - Oct 2022
2022 Cybersecurity Predictions
McAfee Labs 2017 Threats Predictions
Cybersecurity Curricula Guidelines for Post-Secondary Degree Programs
How Cyber Attacks are Changing Security - CSE ISCWest 2017 - Matthew Rosenqui...
Cybersecurity Risks and Recommendations - PSA TEC 2017 - Matthew Rosenquist
2019 Keynote at the Techno Security and Digital Forensics Conference - The Ve...
Preparing for the Next Evolutions of Ransomware - Matthew Rosenquist 2018
2017 K12 Educators Security Briefing - Matthew Rosenquist
Challenges for the Next Generation of Cybersecurity Professionals - Matthew R...
2017 InfraGard Atlanta Conference - Matthew Rosenquist
Securing the Cloud by Matthew Rosenquist 2016
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
True Cost of Data Breaches
Future of Cybersecurity 2016 - M.Rosenquist
Diversity in Cybersecurity Education - 2016 ICT keynote - M.Rosenquist
2015 August - Intel Security McAfee Labs Quarterly Threat Report

2015 Global APT Summit - Understanding APT threat agent characteristics is key to prioritizing risks - Matthew Rosenquist

  • 1. Global APT Defense Summit Los Angeles Matthew Rosenquist | Intel Corp Understanding APT Threat Agent Characteristics is Key to Prioritizing Risks February 25, 2015 – Los Angeles, California
  • 2. Global APT Defense Summit New York #APTSummit2 Agenda 1. The problems with vulnerability based security strategies 2. Threat Agents are the genesis of risks 3. Intersecting the most likely attacks is key 4. APTs present a special case, directed attacks 5. APTs use of Open Source Intelligence (OSINT) 6. Inclusion of Threat Agent Aspects into the Risk Picture 7. Prioritizing your most important exposures
  • 3. Global APT Defense Summit New York #APTSummit3 About the Speaker Matthew Rosenquist Cybersecurity Strategist, Intel Corp Matthew Rosenquist is passionate about cybersecurity! Benefiting from 20 years of experience, he thrives at establishing strategic organizations and capabilities which deliver cost effective security capabilities. His role is to champion the meaningfulness of security, advise on emerging opportunities and threats, and advocate an optimal balance of cost, controls, and productivity throughout the industry. Mr. Rosenquist built and managed Intel’s first global 24x7 SOC, overseen internal platform security products and services, was the first Incident Commander for Intel’s worldwide IT crisis team, and managed security for Intel’s multi-billion dollar worldwide M&A activities. He has conducted investigations, defended corporate assets, established policies, developed strategies to protect Intel’s global manufacturing, and owned the security playbook for the PC strategic planning group. Most recently, Matthew worked to identify the synergies of Intel and McAfee as part of the creation of the Intel Security Group, one of the largest security product organizations in the world.
  • 4. Global APT Defense Summit New York #APTSummit4 History is Enlightening “He who defends everything, defends nothing” – Fredrick the Great
  • 5. Global APT Defense Summit New York #APTSummit5 Problems with vulnerability based strategies Vulnerabilities Exist Everywhere • Never ending battle, not sustainable • ‘Vulnerability’ is relative to the threat • Not efficient on resources How can we improve defenses? The Impossible Challenge: • Identify ALL vulnerabilities • Close them before they are exploited • Do it continuously, forever • For all technology and users
  • 6. Global APT Defense Summit New York #APTSummit6 History is Enlightening “Know your enemy and know yourself and you can fight a thousand battles without disaster” – Sun Tsu
  • 7. Global APT Defense Summit New York #APTSummit7 Threat Agents are the Genesis of Risks • Threat Agent archetypes are collective descriptions of attackers, representing similar risk profiles • Intelligent attackers whose Motivations drive their Objectives • Attributes such as skills, access, and resources define their most likely Methods • Not all archetypes represent a significant threat to every organization • Knowing your opposition is very valuable Organized Criminals Motivation: Personal Financial Gain Objectives: Theft of digital assets, including money & valuables Methods: • Compromise payment systems • Access to financial assets • Copying IP or resalable data • Digital ransom (data or access) • Fraudulent use of digital assets External Threat Tech Skilled Indirect AttacksDirect Attacks Nation-State Cyberwarrior Motivation: Personal Financial Gain Objectives: Theft of digital assets, including money & valuables Methods: • Compromise payment systems • Access to financial assets • Copying IP or resalable data • Digital ransom (data or access) • Fraudulent use of digital assets External Threat Tech Skilled Indirect AttacksDirect Attacks Digital Thief Motivation: Personal Financial Gain Objectives: Theft of digital assets, including money & valuables Methods: • Compromise payment systems • Access to financial assets • Copying IP or resalable data • Digital ransom (data or access) • Fraudulent use of digital assets External Threat Tech Skilled Indirect AttacksDirect Attacks
  • 8. Global APT Defense Summit New York #APTSummit8 Intersecting the Most Likely Attacks is Key Attack Methods Attacker Objectives Threat Agents Attack Methods Attack Methods Vulnerabilities without Controls for these attacks are likely Exposures Areas of highest Exposure All possible Threats, Objectives, and Methods Highest risk Threats, Objectives, and Methods Objectiv es Threat Agents Attack Method s Optimizing security resources
  • 9. Global APT Defense Summit New York #APTSummit9 Targeting Victims… “Two types of victims exist... Those with something of value, and those who are easy targets. …therefore, don't be an easy target, and protect your valuables.”
  • 10. Global APT Defense Summit New York #APTSummit10 APT’s Present a Special Case • Indirect Attacks – Seeks easy targets based upon vulnerability – Uses methods for widespread attacks for any victim – “Spray and pray” mentality – Seeks to satisfy objectives through whichever is the easiest target • Direct Attacks – APT’s – Target is selected based upon motivation and objectives – Easiest path for that target is determined – “Stalk and Sniper” mentality – Attacks against target continue until objectives are met CO N G R AT U L AT I O N S , YO U A R E A W I N N E R O F T H E I NT E RG A L AC T I C LOT T E RY ! C L I C K O N T H E L I N K T O R E C E I V E Y O U R $ 5 M I L L I O N D O L L A R P R I Z E … M i ke , W h a t a g a m e l a s t n i g ht ! G l a d yo u r s o n Ro g e r h i t t h a t h o m e r u n ! I t o o k t h i s v i d e o of h i s g ra n d s l a m i n t h e 6 t h i n n i n g . C l i c k t h i s l i n k a n d c h e c k i t o u t ! S e e yo u a t w o r k t o m o r ro w . - S a m
  • 11. Global APT Defense Summit New York #APTSummit11 Phases of a Social Engineering Attack Source: Hacking the Human Operating System
  • 12. Global APT Defense Summit New York #APTSummit12 APT’s use of Open Source Intelligence (OSINT) APT’s stalk their prey using OSINT – OSINT is the legal gathering of data without touching the target – Advanced attackers are seeking the path-of-least resistance – Understanding their target helps determine the method of attack – Reconnaissance of a target begins early – Search engines, social media, job boards, news stories, investor data, company profiles, suppliers, domain and network ownership – A wealth of information can be found…in as little as 20 minutes Recommendation: understand what the world can determine about you
  • 13. Global APT Defense Summit New York #APTSummit13 Open Source Intelligence (OSINT) What could be learned • Names and details of employees & corporate officers • Projects & reporting structure • Roles and relationships • Physical and logical locations • HW, OS and Apps in use • Security controls • Trusted Vendors How it could be used • Phishing, spear-phishing • Confidence scams/schemes • Network & system targeting • Software vulnerabilities • Targeting security gaps • Vendor impersonation/compromise • Targeted malware • Custom extortion & manipulation
  • 14. Global APT Defense Summit New York #APTSummit14 Inclusion of Threat Agent Aspects into the Risk Picture • Tools and process form a sustainable security capability • Prediction of threats feeds intelligent decisions • Smart security is the key to success Strategic Cybersecurity Capability Process Prevention Prevent or deter attacks so no loss is experienced Prediction Predict the most likely attacks, targets, and methods Response Rapidly address incidents to minimize losses and return to a normal state Proactive measures to identify attackers, their objectives and methods prior to materialization of viable attacks. Secure the computing environment with current tools, patches, updates, and best-known methods in a timely manner. Educating and reinforcing good user behaviors. Detection Identify attacks not prevented to allow for rapid and thorough response Efficient management of efforts to contain, repair, and recover as needed, returning the environment to normal operations Monitor key areas and activities for attacks which evade prevention. Identifies issues, breaches, and attacks
  • 15. Global APT Defense Summit New York #APTSummit15 Prioritizing your Most Important Exposures • Understand the capabilities, methods, & objectives of your APT threats • Combine threat characteristics with vulnerability analysis to find the weak areas in your organization most likely to be exploited • Counter these threats with proper allocation of resources Threat prediction can improve Prevention, Detection, and Response