“Cybersecurity by the Numbers”
Eoin Keary
CTO/Founder edgescan.com
OWASP Leader/Member/Ireland Founder
(ex)OWASP Global Board Member
@eoinkeary
eoin@bccriskadvisory.com
Why am I here??
“Doing” security for quite a while….
Before SAST, DAST, IAST, CI, CD were “things”;
Was a Software Developer & Moved to Software Breaking;
Was a Leader of Global Penetration Engagements Team for EY;
Wrote/Contributed to the OWASP Testing Guide, OWASP Code Review Guide, OWASP
CISO Guide, OWASP SAMM….
Responsible for some of the most impactful security breaches* against Irish financial
institutions in the last 10 years. *ethical security assessments
What we do….
Effective, Scalable #Fullstack Vulnerability Management 4
#fullstack vulnerability management
Web Applications, API and Host
Managed Service
Continuous Assessment
False-Positive free
Manages over 100,000 systems
globally.
Professional Services
Penetration Testing
Software Security
Red Teaming
DdoS
System Hardening
Security Architecture
Compliance
edgescan™…basis for measurement
• edgescan™ is a sophisticated,
enterprise-grade vulnerability assessment and
management solution that gives you the tools
you need to control and manage
IT security risk
• edgescan™ helps from small &
medium-sized to large enterprises identify and
remediate known vulnerabilities in any platform
or web application
• edgescan™ is a cloud based
SaaS which provides a unique combination of
technology and human expertise to assist you
with maintaining a strong
security posture
Effective, Scalable #Fullstack Vulnerability Management 5
2017 – so far
• Lloyds 48hr DDoS – 20,000,000
• Trump – administration details leaked
• Clash of Clans – 1,000,000
• Cellebrite – 900 GB of Data
• SWIFT – Fake Trade Documents - 3 banks – India
• CoPilot – GPS – 220,000 Records
• Sentara HealthCare – 5,000 Patient records
Globally, every second, 18 adults
become victims of cybercrime
- Symantec
“The loss of industrial information and intellectual property
through cyber espionage constitutes the greatest transfer of
wealth in history” - Gen. Keith Alexander
“One hundred
BILLION
dollars” -
Dr Evil
Eoin, I didn’t click it – My Mam
Attack Vectors & Threat Actors
Malware/Ransomware
Phishing
Hacking
CEO Fraud
Human Error / Insiders
DdoS
 Organised Crime – Dedicated. Motivated by profit
 Hacktivisim – political, social motivations
 “Script kiddies” - curious
 Automated scanners/worms – systems used to
identify “soft targets”
 Cyber Terrorism – Political motivations
 Nation States: Cyber Espionage/APT
 Insiders
Two weeks of ethical
hacking
Ten man-years of
development
Agile Risk Model
Fail Early – Fail Often
“Push Left”
Spread-Risk
Make this more difficult: Lets change the application code once a month.
Continuous Testing:
Keeping Pace with: Development
New Vulnerabilities
Continuous patching requirements
New Deployments (Services, Systems)
#FullStack Security
Measure “Attack Surface” & Improvement
Measure Attack Surface / Asset Classification
Continuous Asset Profiling and Alerting
Vulnerability Type & Stack Location
Time to Fix a vulnerability
Most Common Vuln
Areas of focus…
Doing things right != Doing the right things.
Context
GPDR EU directive:
The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679)
is a Regulation by which the European Commission intends to strengthen
and unify data protection for individuals within the European Union (EU).
• a fine up to 20,000,000 EUR or up to 4% of the annual worldwide
turnover of the preceding financial year in case of an enterprise,
whichever is greater (Article 83, Paragraph 5 & 6[16])
Box ticking
Article 32, Security of Processing:
“…the controller and the processor shall implement appropriate technical
and organisational measures to ensure a level of security appropriate to the
risk, …”
Recital (78)
“The protection of the rights and freedoms of natural persons with regard to the
processing of personal data require that appropriate technical and
organisational measures be taken to ensure that the requirements of this
regulation are met.”
”… to demonstrate compliance with this Regulation, the controller should adopt
internal policies and implement measures which meet in particular the principles
of data protection by design and data protection by default.....”
“…enabling the data subject to monitor the data processing, enabling the
controller to create and improve security features.”
Recital (49)
“The processing of personal data to the extent strictly necessary and
proportionate for the purposes of ensuring network and information
security, i.e. the ability of a network or an information system to resist,…. unlawful
or malicious actions…”
Recital (81)
“…the controller should use only processors providing sufficient
guarantees…including for the security of processing.”
#ProTip: Scope GDPR compliance from Data Classification upwards….
Playing Catchup
Legal is pushing cyber
Goal: GDPR compliant by May 25th 2018
GDPR = Legal + Privacy + IT + Cyber
#Fullstack Continuous Assessment is Important
Visibility, Metrics and continuous improvement
GDPR VendorsClients
So….
Lets Dig a Little Deeper……..
Deeper Look….
Based on 1000’s of continuous assessments using edgescan.com
Both Host, WebServer and Web application assessed - #fullstack
See: https://edgescan.com/resources.php
Vulnerability Breakdown - #fullstack
Most Common Vulnerability - WebApps
Majority of Vulnerabilities are
”Browser security” issues – Attack
the user!!
XSS is still very common and old.
First discovered in the mid 90’s
Most Common Vulnerability - Infrastructure
Configuration Vulnerabilities common
Majority are TLS/SSL Crypto
7 Systems in every 100– are
“unsupported”
Risk Dispersion
More Network Issues
discovered
- BUT –
Most Risk is on App Layer
(95% of Critical Risk)
(82% of High Risk)
Time-2-Fix
Average Time to Fix
Oldest Critical Vulnerabilities
Oldest “Known” vulnerability discovered in 2016 by edgescan;
CVE-2007-6420 - Cross-site request forgery (CSRF)
CVE-2007-3847 - Apache 2.3.0 DoS
CVE-2007-5000 - Apache HTTP Server XSS
CVE-2007-6388 - Apache HTTP Server XSS
9 year old vulnerabilities exist in the wild on live servers. Poor/Non existent patching is
the major root cause.
Good News is the frequency of occurrence is between 1.5% and 3%
What else happened in 2007?
First iPhone was launched…
Conclusion
Consider Infosec impact from GDPR
Constant assessment is important as everything changes
“Push Left” – Use SAST and Review before deployment
Measure Improvement and Weakness
Thank YOU!
eoin@bccriskadvisory.com
@edgescan
www.edgescan.com

More Related Content

PDF
Cyber Risk Management in 2017: Challenges & Recommendations
DOCX
Why security is the kidney not the tail of the dog v3
PDF
Microsoft john weigelt 2016
PDF
CSE 2016 Future of Cyber Security by Matthew Rosenquist
PPTX
Cybersecurity: How to Use What We Already Know
PPTX
The State Of Information and Cyber Security in 2016
PPTX
2016 - Cyber Security for the Public Sector
PPT
Breaking down the cyber security framework closing critical it security gaps
Cyber Risk Management in 2017: Challenges & Recommendations
Why security is the kidney not the tail of the dog v3
Microsoft john weigelt 2016
CSE 2016 Future of Cyber Security by Matthew Rosenquist
Cybersecurity: How to Use What We Already Know
The State Of Information and Cyber Security in 2016
2016 - Cyber Security for the Public Sector
Breaking down the cyber security framework closing critical it security gaps

What's hot (19)

PDF
Selex ES at Le Bourget 2013 Cyber Partnership
PPTX
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
PDF
Cyber Security 101: What Your Agency Needs to Know
PDF
Close the Security Gaps of a Remote Workforce
PDF
Cyber Security For Organization Proposal Powerpoint Presentation Slides
PPT
Challenges in implementating cyber security
PDF
Insights into cyber security and risk
 
PPTX
Cyber Risk Management in 2017 - Challenges & Recommendations
PDF
16 Things You Should be Doing to Secure Print and Documents
PDF
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PDF
ICION 2016 - Cyber Security Governance
PPTX
Summer internship - Cybersecurity
PPTX
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
PDF
Cybersecurity Skills in Industry 4.0
PPTX
The State of Ransomware 2020
PDF
A Strategy for Addressing Cyber Security Challenges
PPTX
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
PPT
The Security Director's Practical Guide to Cyber Security
Selex ES at Le Bourget 2013 Cyber Partnership
NUS-ISS Learning Day 2017 - Managing Cybersecurity Risk in the Digital Era fo...
Cyber Security 101: What Your Agency Needs to Know
Close the Security Gaps of a Remote Workforce
Cyber Security For Organization Proposal Powerpoint Presentation Slides
Challenges in implementating cyber security
Insights into cyber security and risk
 
Cyber Risk Management in 2017 - Challenges & Recommendations
16 Things You Should be Doing to Secure Print and Documents
Cyber Resilience – Strengthening Cybersecurity Posture & Preparedness by Phil...
Future of Cybersecurity 2016 - M.Rosenquist
ICION 2016 - Cyber Security Governance
Summer internship - Cybersecurity
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity Skills in Industry 4.0
The State of Ransomware 2020
A Strategy for Addressing Cyber Security Challenges
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
The Security Director's Practical Guide to Cyber Security
Ad

Similar to Cybersecurity by the numbers (20)

PPTX
Cyber Security and GDPR Made Easy
PDF
Cybersecurity and continuous intelligence
PDF
Cybersecurity solution-guide
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
cybersecurity-careers.pdf
PPTX
So You Want a Job in Cybersecurity
PDF
Scot Secure 2019 Edinburgh (Day 2)
PPTX
A practical data privacy and security approach to ffiec, gdpr and ccpa
PPTX
A guide to Sustainable Cyber Security
PPTX
Cybersecurity Training For Sales People.pptx
PDF
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
PDF
Cybersecurity op de bestuurstafel
PDF
Data security in the age of GDPR – most common data security problems
PDF
Today's Cyber Challenges: Methodology to Secure Your Business
PDF
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
PDF
Think You’re Covered? Think Again: Cybersecurity, Data Privacy, and Cyber Ins...
PDF
Living with the threat of Determined Attackers - RANT0214
PDF
Today's Breach Reality, The IR Imperative, And What You Can Do About It
PPTX
Web security – everything we know is wrong cloud version
PPTX
GDPR Part 5: Better Together Quest & Cyberquest
Cyber Security and GDPR Made Easy
Cybersecurity and continuous intelligence
Cybersecurity solution-guide
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
cybersecurity-careers.pdf
So You Want a Job in Cybersecurity
Scot Secure 2019 Edinburgh (Day 2)
A practical data privacy and security approach to ffiec, gdpr and ccpa
A guide to Sustainable Cyber Security
Cybersecurity Training For Sales People.pptx
Rick Borden, Chief Privacy Officer, White & Williams LLP - #InfoGov17 - Cyber...
Cybersecurity op de bestuurstafel
Data security in the age of GDPR – most common data security problems
Today's Cyber Challenges: Methodology to Secure Your Business
GDG Cloud Southlake #4 Biodun Awojobi and Wade Walters Security Programs and ...
Think You’re Covered? Think Again: Cybersecurity, Data Privacy, and Cyber Ins...
Living with the threat of Determined Attackers - RANT0214
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Web security – everything we know is wrong cloud version
GDPR Part 5: Better Together Quest & Cyberquest
Ad

More from Eoin Keary (20)

PPTX
IISF-March2023.pptx
PDF
Validation of vulnerabilities.pdf
PDF
Does a Hybrid model for vulnerability Management Make Sense.pdf
PDF
Edgescan 2022 Vulnerability Statistics Report
PPTX
Edgescan 2021 Vulnerability Stats Report
PPTX
One login enemy at the gates
PDF
Edgescan vulnerability stats report 2020
PDF
edgescan vulnerability stats report (2018)
PDF
edgescan vulnerability stats report (2019)
PPTX
Full stack vulnerability management at scale
PPTX
Vulnerability Intelligence - Standing Still in a world full of change
PPTX
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
PPTX
Hide and seek - Attack Surface Management and continuous assessment.
PPTX
Online Gaming Cyber security and Threat Model
PPTX
Keeping the wolf from 1000 doors.
PPTX
Security by the numbers
PPTX
Ebu class edgescan-2017
PPTX
Vulnerability management and threat detection by the numbers
PPTX
14. html 5 security considerations
PPTX
04. xss and encoding
IISF-March2023.pptx
Validation of vulnerabilities.pdf
Does a Hybrid model for vulnerability Management Make Sense.pdf
Edgescan 2022 Vulnerability Statistics Report
Edgescan 2021 Vulnerability Stats Report
One login enemy at the gates
Edgescan vulnerability stats report 2020
edgescan vulnerability stats report (2018)
edgescan vulnerability stats report (2019)
Full stack vulnerability management at scale
Vulnerability Intelligence - Standing Still in a world full of change
Edgescan vulnerability stats report 2019 - h-isac-2-2-2019
Hide and seek - Attack Surface Management and continuous assessment.
Online Gaming Cyber security and Threat Model
Keeping the wolf from 1000 doors.
Security by the numbers
Ebu class edgescan-2017
Vulnerability management and threat detection by the numbers
14. html 5 security considerations
04. xss and encoding

Recently uploaded (20)

PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
PPT
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
PDF
Exploring The Internet Of Things(IOT).ppt
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PPTX
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PPTX
Introduction to cybersecurity and digital nettiquette
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PPTX
Database Information System - Management Information System
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
t_and_OpenAI_Combined_two_pressentations
PDF
Uptota Investor Deck - Where Africa Meets Blockchain
PDF
The Evolution of Traditional to New Media .pdf
PDF
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf
Alethe Consulting Corporate Profile and Solution Aproach
simpleintnettestmetiaerl for the simple testint
module 1-Part 1.pptxdddddddddddddddddddddddddddddddddddd
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
1402_iCSC_-_RESTful_Web_APIs_--_Josef_Hammer.pptx
FIRE PREVENTION AND CONTROL PLAN- LUS.FM.MQ.OM.UTM.PLN.00014.ppt
Exploring The Internet Of Things(IOT).ppt
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
KSS ON CYBERSECURITY INCIDENT RESPONSE AND PLANNING MANAGEMENT.pptx
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Introduction to cybersecurity and digital nettiquette
The-Importance-of-School-Sanitation.pptx
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Alethe Consulting Corporate Profile and Solution Aproach
Database Information System - Management Information System
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
t_and_OpenAI_Combined_two_pressentations
Uptota Investor Deck - Where Africa Meets Blockchain
The Evolution of Traditional to New Media .pdf
The Ikigai Template _ Recalibrate How You Spend Your Time.pdf

Cybersecurity by the numbers

  • 2. Eoin Keary CTO/Founder edgescan.com OWASP Leader/Member/Ireland Founder (ex)OWASP Global Board Member @eoinkeary eoin@bccriskadvisory.com
  • 3. Why am I here?? “Doing” security for quite a while…. Before SAST, DAST, IAST, CI, CD were “things”; Was a Software Developer & Moved to Software Breaking; Was a Leader of Global Penetration Engagements Team for EY; Wrote/Contributed to the OWASP Testing Guide, OWASP Code Review Guide, OWASP CISO Guide, OWASP SAMM…. Responsible for some of the most impactful security breaches* against Irish financial institutions in the last 10 years. *ethical security assessments
  • 4. What we do…. Effective, Scalable #Fullstack Vulnerability Management 4 #fullstack vulnerability management Web Applications, API and Host Managed Service Continuous Assessment False-Positive free Manages over 100,000 systems globally. Professional Services Penetration Testing Software Security Red Teaming DdoS System Hardening Security Architecture Compliance
  • 5. edgescan™…basis for measurement • edgescan™ is a sophisticated, enterprise-grade vulnerability assessment and management solution that gives you the tools you need to control and manage IT security risk • edgescan™ helps from small & medium-sized to large enterprises identify and remediate known vulnerabilities in any platform or web application • edgescan™ is a cloud based SaaS which provides a unique combination of technology and human expertise to assist you with maintaining a strong security posture Effective, Scalable #Fullstack Vulnerability Management 5
  • 6. 2017 – so far • Lloyds 48hr DDoS – 20,000,000 • Trump – administration details leaked • Clash of Clans – 1,000,000 • Cellebrite – 900 GB of Data • SWIFT – Fake Trade Documents - 3 banks – India • CoPilot – GPS – 220,000 Records • Sentara HealthCare – 5,000 Patient records Globally, every second, 18 adults become victims of cybercrime - Symantec “The loss of industrial information and intellectual property through cyber espionage constitutes the greatest transfer of wealth in history” - Gen. Keith Alexander “One hundred BILLION dollars” - Dr Evil Eoin, I didn’t click it – My Mam
  • 7. Attack Vectors & Threat Actors Malware/Ransomware Phishing Hacking CEO Fraud Human Error / Insiders DdoS  Organised Crime – Dedicated. Motivated by profit  Hacktivisim – political, social motivations  “Script kiddies” - curious  Automated scanners/worms – systems used to identify “soft targets”  Cyber Terrorism – Political motivations  Nation States: Cyber Espionage/APT  Insiders
  • 8. Two weeks of ethical hacking Ten man-years of development
  • 9. Agile Risk Model Fail Early – Fail Often “Push Left” Spread-Risk
  • 10. Make this more difficult: Lets change the application code once a month. Continuous Testing: Keeping Pace with: Development New Vulnerabilities Continuous patching requirements New Deployments (Services, Systems)
  • 12. Measure “Attack Surface” & Improvement Measure Attack Surface / Asset Classification Continuous Asset Profiling and Alerting Vulnerability Type & Stack Location Time to Fix a vulnerability Most Common Vuln Areas of focus… Doing things right != Doing the right things.
  • 14. GPDR EU directive: The General Data Protection Regulation (GDPR) (Regulation (EU) 2016/679) is a Regulation by which the European Commission intends to strengthen and unify data protection for individuals within the European Union (EU). • a fine up to 20,000,000 EUR or up to 4% of the annual worldwide turnover of the preceding financial year in case of an enterprise, whichever is greater (Article 83, Paragraph 5 & 6[16]) Box ticking
  • 15. Article 32, Security of Processing: “…the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, …” Recital (78) “The protection of the rights and freedoms of natural persons with regard to the processing of personal data require that appropriate technical and organisational measures be taken to ensure that the requirements of this regulation are met.” ”… to demonstrate compliance with this Regulation, the controller should adopt internal policies and implement measures which meet in particular the principles of data protection by design and data protection by default.....” “…enabling the data subject to monitor the data processing, enabling the controller to create and improve security features.”
  • 16. Recital (49) “The processing of personal data to the extent strictly necessary and proportionate for the purposes of ensuring network and information security, i.e. the ability of a network or an information system to resist,…. unlawful or malicious actions…” Recital (81) “…the controller should use only processors providing sufficient guarantees…including for the security of processing.” #ProTip: Scope GDPR compliance from Data Classification upwards….
  • 17. Playing Catchup Legal is pushing cyber Goal: GDPR compliant by May 25th 2018 GDPR = Legal + Privacy + IT + Cyber #Fullstack Continuous Assessment is Important Visibility, Metrics and continuous improvement GDPR VendorsClients
  • 18. So…. Lets Dig a Little Deeper……..
  • 19. Deeper Look…. Based on 1000’s of continuous assessments using edgescan.com Both Host, WebServer and Web application assessed - #fullstack See: https://edgescan.com/resources.php
  • 21. Most Common Vulnerability - WebApps Majority of Vulnerabilities are ”Browser security” issues – Attack the user!! XSS is still very common and old. First discovered in the mid 90’s
  • 22. Most Common Vulnerability - Infrastructure Configuration Vulnerabilities common Majority are TLS/SSL Crypto 7 Systems in every 100– are “unsupported”
  • 23. Risk Dispersion More Network Issues discovered - BUT – Most Risk is on App Layer (95% of Critical Risk) (82% of High Risk)
  • 25. Oldest Critical Vulnerabilities Oldest “Known” vulnerability discovered in 2016 by edgescan; CVE-2007-6420 - Cross-site request forgery (CSRF) CVE-2007-3847 - Apache 2.3.0 DoS CVE-2007-5000 - Apache HTTP Server XSS CVE-2007-6388 - Apache HTTP Server XSS 9 year old vulnerabilities exist in the wild on live servers. Poor/Non existent patching is the major root cause. Good News is the frequency of occurrence is between 1.5% and 3% What else happened in 2007? First iPhone was launched…
  • 26. Conclusion Consider Infosec impact from GDPR Constant assessment is important as everything changes “Push Left” – Use SAST and Review before deployment Measure Improvement and Weakness

Editor's Notes

  • #14: -Problems with relying on automation alone…. - Automation (application security) doesn’t understand context – cant make risk judgments (sqli example) - Automation does not equal security - Automation alone should not be relied upon for security - Compliance - Automation is used a lot for compliance but compliance does not necessarily equal security
  • #24: More high risk in app layer, but higher numbers in the network layer.
  • #25: “Web Application vulnerabilities take longer to fix. They are also more likely to be of higher risk (95% of critical risk issues are in the web layer). Continuous assessment and preventative activities such as SDLC security can assist in reducing risk density and lower time-2-fix”