SlideShare a Scribd company logo
Kevin J. Murphy, CISSP, CISM, CGEIT
Cyber Security Defense Update
Director, Windows Security Architecture
Agenda
 Cyber Crime
 Vulnerabilities
 Cyber attacks
 Cross-industry discussion
Expectations
 Interactive dialogue
 Learn from other industries
 Think outside the box
 What are the attackers goals?
 What would you do if you were the attacker?
 What can you do that the attacker won’t be
expecting?
2/24/2015 2
Cyber Threats - Definitions
 Cyber Crime = $$$ Motivated
 Credit cards, bank accounts
 APT = Nation State Espionage
 Steal your Intellectual Property
 Cyber war = Destructive
 Geopolitical Conflict
 Economic Attack
 Element of modern warfare
 Iran, Syria, N Korea, Al Qaeda, Russia,
etc.
2/24/2015 3
2/24/2015 4
2014 Cyber Crime Attacks
 Retail Data Breaches
 Point of Sale (POS) system
vulnerabilities
 Reporting requirements under GLB Act
 Some of the victims
 Target, Home Depot, Michaels, Neiman
Marcus, Jimmy Johns, Staples, Dairy
Queen, PF Chang’s, etc. etc.
 Analysis?
 Look at your 3rd Party attack vectors
 Understand your POS vendors security
Plans2/24/2015 5
2014 Cyber Crime Attacks
Home Depot – a different nuance
 Credit card’s were offered for sale on a
website that traffics in stolen card data
 Cards presented as:
 "American Sanctions”
 "European Sanctions”
 Analysis?
 Cyber Crime is now Geopolitical
 Adapt the Chip and Pin technology
2/24/2015 6
2014 Cyber Crime Attacks
 Banking Data Breaches
 2014 Verizon Data Breach Investigations
Report analyzed 1,367 data-loss
incidents last year, they found that 465
were financial institutions
 Data Breach Losses Top More Than 78
Million Records to Date in 2014
 Analysis?
 Ideas?
2/24/2015 7
2014 Vulnerabilities
 3rd Party Vulnerabilities
2/24/2015 8
2014 Vulnerabilities
 Heartbleed (Open SSL)
 SSL 3.0
 How many of you thought you
had to monitor your 3rd party
appliances for vulnerabilities?
 And Patching!
 Analysis?
 Heartbleed’s lesson – “If you own
SSL you own the internet”
2/24/2015 9
3rd world Cyber attacks
 Syrian Electronic Army
2/24/2015 10
What did they learn by this reaction?
Cyber warfare is dangerous
 Potential for huge economic impact
 Geopolitically motivated
 No cold-war type “rules”
 No international agreement
 Anonymous attacks have no limits
and pose little risk to the attacker
2/24/2015 11
Geopolitical attacks
 Critical Infrastructure
2/24/2015 12
Cross-industry Discussion
 What have you observed in your
industry?
 Lessons learned?
 Preventions to share with the
room?
2/24/2015 13
2/24/2015 14
Prevention
 Defense in Depth
 Defend your identity systems
 Harden your AD
 Office hours for auth changes
 Get rid of passwords- use 2 factor auth
 Application level attack
 Delete forwarding rules after you reset our
password
 Make sure your account saves sent mail in
your sent file
2/24/2015 15
Prevention
 Defense in Depth
 Defend your perimeter - Next Gen
Firewalls
 Defend your network
 Segment your network
 Monitor, IDS, IPS
 Remove remote admin where possible
2/24/2015 16
Prevention
 Defend your data
 Encrypt, monitoring, HIDS, SIEM
 Stay current in patching, A/V scanning
 Offline back ups
 Train your security team
 Learn from other industries
 Stay current on the threats
 Stay current on the vendor response to the
threats
 Stay current on secure systems
configurations2/24/2015 17
Prevention
 Business Continuity Cyber war
Scenario
 Train it - Test it
 Cold back up systems
 Remember a cyber war attack can
infect any system connected to the
network
 Primary and fail-over sites could be
infected all at once
2/24/2015 18
Prevention
 Get ahead of the attacker by
anticipating the new vectors of attack
 Threat assessments and models for
your IT Infrastructure and apps.
2/24/2015 19
Prevention
 Constantly reevaluate AD for new threats
 Pen test
 Code sign your internal apps and applets
 Security scan 3rd party vendor apps.
2/24/2015 20
Prevention
 Your turn – What else do you
recommend?
 What can you do that is not in that the
attacker won’t expect?
2/24/2015 21
Resources
 Books
 Economics & Strategies of Data Security, Daniel Geer Jr.
http://www.amazon.com/Economics-Strategies-Data-Security-
DANIEL/dp/B001LZM1BY
 Papers
 2014 Data Breach Investigations Report
http://www.verizonenterprise.com/DBIR/2014/
 The Inevitability of Failure: The Flawed Assumption of Security in Modern
Computing Environments, Peter A. Loscocco, Stephen D. Smalley,
Patrick A. Muckelbauer, Ruth C. Taylor, S. Jeff Turner, John F. Farrell;
National Security Agency
http://www.windowsecurity.com/whitepapers/The_Inevitability_of_Failure
_The_Flawed_Assumption_of_Security_in_Modern_Computing_Environ
ments_.html
 Contact Me:
 http://www.linkedin.com/pub/kevin-murphy/5/256/863
2/24/2015 22

More Related Content

PPTX
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
PDF
Threat intelligence Primary Tradecraft and Research
PDF
Hunting for cyber threats targeting weapon systems
PPTX
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
PDF
Part 1: Identifying Insider Threats with Fidelis EDR Technology
PPTX
Vendor Landscape: Email Security Gateway
PPT
Ch1 cse
PDF
Chapter 15 incident handling
Outpost24 webinar: The state of ransomware in 2021 and how to limit your expo...
Threat intelligence Primary Tradecraft and Research
Hunting for cyber threats targeting weapon systems
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Vendor Landscape: Email Security Gateway
Ch1 cse
Chapter 15 incident handling

What's hot (20)

PPTX
Cyber risks in supply chains
PPTX
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
PDF
Cyber security series advanced persistent threats
PDF
Ch&Cie - Cyber Security - CIB - Teaser
PPTX
The day when 3rd party security providers disappear into cloud bright talk se...
PDF
PPTX
Cyber Threat Intelligence Solution Demonstration
PPTX
Information Security Overview
PDF
Vulnerability management - beyond scanning
PPTX
2016 ISSA Conference Threat Intelligence Keynote philA
PPTX
Symantec Portfolio - Sales Play
PDF
Enumerating your shadow it attack surface
PPTX
Vulnerability Intelligence - Standing Still in a world full of change
PPT
CompTIA Security+ Module1: Security fundamentals
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PDF
The State of Threat Detection 2019
PPTX
Moving to the Cloud: A Security and Hosting Introduction
PDF
Active security monitoring
PPT
6 e commerce security
PDF
10 Security issues facing NZ Enterprises
Cyber risks in supply chains
Insider Threats Part 2: Preventing Data Exfiltration with Fidelis Elevate
Cyber security series advanced persistent threats
Ch&Cie - Cyber Security - CIB - Teaser
The day when 3rd party security providers disappear into cloud bright talk se...
Cyber Threat Intelligence Solution Demonstration
Information Security Overview
Vulnerability management - beyond scanning
2016 ISSA Conference Threat Intelligence Keynote philA
Symantec Portfolio - Sales Play
Enumerating your shadow it attack surface
Vulnerability Intelligence - Standing Still in a world full of change
CompTIA Security+ Module1: Security fundamentals
Threat Intelligence 101 - Steve Lodin - Submitted
The State of Threat Detection 2019
Moving to the Cloud: A Security and Hosting Introduction
Active security monitoring
6 e commerce security
10 Security issues facing NZ Enterprises
Ad

Viewers also liked (10)

PPTX
Cyber warfare update 2016
PDF
AIR SHOW 2013, Poland, Europe
PDF
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
PPTX
Cyber Security Architecture - A Systems Approach December 05 2012
PDF
Librecon 2016 bilbao: kappa architecture IoT of the cars
PPTX
Cyber Security for the Connected Car
PPTX
What is next for IoT and IIoT
PDF
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
PPT
Introduction to Cyber Security
PPTX
Cyber Security Defense by vulnerability mgmt nov 11 2015
Cyber warfare update 2016
AIR SHOW 2013, Poland, Europe
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
Cyber Security Architecture - A Systems Approach December 05 2012
Librecon 2016 bilbao: kappa architecture IoT of the cars
Cyber Security for the Connected Car
What is next for IoT and IIoT
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
Introduction to Cyber Security
Cyber Security Defense by vulnerability mgmt nov 11 2015
Ad

Similar to Cyber Sec Update Secure World Seattle Nov 13, 2014 (20)

PDF
Key Findings from the 2015 IBM Cyber Security Intelligence Index
PPTX
Cyber Crime Seminar Jan 2015
PPTX
03_Emmanuel Ndiaye_Degroof Petercam.pptx
PDF
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
PDF
How to assess your Cybersecurity Vulnerability_.pdf
PPTX
How to assess your Cybersecurity Vulnerability_.pptx
PPTX
Cloud & Sécurité
PPTX
Using Threat Intelligence to Address Your Growing Digital Risk
PDF
Who is the next target proactive approaches to data security
PPTX
Data erasure's role in limiting cyber attacks
PDF
The challenges of Retail Security
PDF
Key note in nyc the next breach target and how oracle can help - nyoug
PPTX
War Games -Simulating cyber incidents for fun and profit
PPTX
Securing the Cloud
PDF
2016 HPESR Cyber Risk Report
PDF
HPE Cyber Risk Report 2016
PDF
Hpe security research cyber risk report 2016
PDF
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
PPTX
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...
Key Findings from the 2015 IBM Cyber Security Intelligence Index
Cyber Crime Seminar Jan 2015
03_Emmanuel Ndiaye_Degroof Petercam.pptx
secureit-cloudsecurity-151130141528-lva1-app6892.pdf
How to assess your Cybersecurity Vulnerability_.pdf
How to assess your Cybersecurity Vulnerability_.pptx
Cloud & Sécurité
Using Threat Intelligence to Address Your Growing Digital Risk
Who is the next target proactive approaches to data security
Data erasure's role in limiting cyber attacks
The challenges of Retail Security
Key note in nyc the next breach target and how oracle can help - nyoug
War Games -Simulating cyber incidents for fun and profit
Securing the Cloud
2016 HPESR Cyber Risk Report
HPE Cyber Risk Report 2016
Hpe security research cyber risk report 2016
Data-Driven Assessment of Cyber Risk: Challenges in Assessing and Migrating C...
7th ERM - S2 - Cyber security, Cyber Risk and Data Privacy - Kalpesh Doshi (1...

Cyber Sec Update Secure World Seattle Nov 13, 2014

  • 1. Kevin J. Murphy, CISSP, CISM, CGEIT Cyber Security Defense Update Director, Windows Security Architecture
  • 2. Agenda  Cyber Crime  Vulnerabilities  Cyber attacks  Cross-industry discussion Expectations  Interactive dialogue  Learn from other industries  Think outside the box  What are the attackers goals?  What would you do if you were the attacker?  What can you do that the attacker won’t be expecting? 2/24/2015 2
  • 3. Cyber Threats - Definitions  Cyber Crime = $$$ Motivated  Credit cards, bank accounts  APT = Nation State Espionage  Steal your Intellectual Property  Cyber war = Destructive  Geopolitical Conflict  Economic Attack  Element of modern warfare  Iran, Syria, N Korea, Al Qaeda, Russia, etc. 2/24/2015 3
  • 5. 2014 Cyber Crime Attacks  Retail Data Breaches  Point of Sale (POS) system vulnerabilities  Reporting requirements under GLB Act  Some of the victims  Target, Home Depot, Michaels, Neiman Marcus, Jimmy Johns, Staples, Dairy Queen, PF Chang’s, etc. etc.  Analysis?  Look at your 3rd Party attack vectors  Understand your POS vendors security Plans2/24/2015 5
  • 6. 2014 Cyber Crime Attacks Home Depot – a different nuance  Credit card’s were offered for sale on a website that traffics in stolen card data  Cards presented as:  "American Sanctions”  "European Sanctions”  Analysis?  Cyber Crime is now Geopolitical  Adapt the Chip and Pin technology 2/24/2015 6
  • 7. 2014 Cyber Crime Attacks  Banking Data Breaches  2014 Verizon Data Breach Investigations Report analyzed 1,367 data-loss incidents last year, they found that 465 were financial institutions  Data Breach Losses Top More Than 78 Million Records to Date in 2014  Analysis?  Ideas? 2/24/2015 7
  • 8. 2014 Vulnerabilities  3rd Party Vulnerabilities 2/24/2015 8
  • 9. 2014 Vulnerabilities  Heartbleed (Open SSL)  SSL 3.0  How many of you thought you had to monitor your 3rd party appliances for vulnerabilities?  And Patching!  Analysis?  Heartbleed’s lesson – “If you own SSL you own the internet” 2/24/2015 9
  • 10. 3rd world Cyber attacks  Syrian Electronic Army 2/24/2015 10 What did they learn by this reaction?
  • 11. Cyber warfare is dangerous  Potential for huge economic impact  Geopolitically motivated  No cold-war type “rules”  No international agreement  Anonymous attacks have no limits and pose little risk to the attacker 2/24/2015 11
  • 12. Geopolitical attacks  Critical Infrastructure 2/24/2015 12
  • 13. Cross-industry Discussion  What have you observed in your industry?  Lessons learned?  Preventions to share with the room? 2/24/2015 13
  • 15. Prevention  Defense in Depth  Defend your identity systems  Harden your AD  Office hours for auth changes  Get rid of passwords- use 2 factor auth  Application level attack  Delete forwarding rules after you reset our password  Make sure your account saves sent mail in your sent file 2/24/2015 15
  • 16. Prevention  Defense in Depth  Defend your perimeter - Next Gen Firewalls  Defend your network  Segment your network  Monitor, IDS, IPS  Remove remote admin where possible 2/24/2015 16
  • 17. Prevention  Defend your data  Encrypt, monitoring, HIDS, SIEM  Stay current in patching, A/V scanning  Offline back ups  Train your security team  Learn from other industries  Stay current on the threats  Stay current on the vendor response to the threats  Stay current on secure systems configurations2/24/2015 17
  • 18. Prevention  Business Continuity Cyber war Scenario  Train it - Test it  Cold back up systems  Remember a cyber war attack can infect any system connected to the network  Primary and fail-over sites could be infected all at once 2/24/2015 18
  • 19. Prevention  Get ahead of the attacker by anticipating the new vectors of attack  Threat assessments and models for your IT Infrastructure and apps. 2/24/2015 19
  • 20. Prevention  Constantly reevaluate AD for new threats  Pen test  Code sign your internal apps and applets  Security scan 3rd party vendor apps. 2/24/2015 20
  • 21. Prevention  Your turn – What else do you recommend?  What can you do that is not in that the attacker won’t expect? 2/24/2015 21
  • 22. Resources  Books  Economics & Strategies of Data Security, Daniel Geer Jr. http://www.amazon.com/Economics-Strategies-Data-Security- DANIEL/dp/B001LZM1BY  Papers  2014 Data Breach Investigations Report http://www.verizonenterprise.com/DBIR/2014/  The Inevitability of Failure: The Flawed Assumption of Security in Modern Computing Environments, Peter A. Loscocco, Stephen D. Smalley, Patrick A. Muckelbauer, Ruth C. Taylor, S. Jeff Turner, John F. Farrell; National Security Agency http://www.windowsecurity.com/whitepapers/The_Inevitability_of_Failure _The_Flawed_Assumption_of_Security_in_Modern_Computing_Environ ments_.html  Contact Me:  http://www.linkedin.com/pub/kevin-murphy/5/256/863 2/24/2015 22

Editor's Notes

  • #7: Russian Political Sympathizers? Cyber Crime is now Geopolitical
  • #10: Have a patching strategy for your 3rd party appliance and devices