SlideShare a Scribd company logo
Safer Technology Through Threat
Awareness and Response
Stephen Cobb, CISSP
Senior Security Researcher
Threat awareness = know your enemy
We all know there are
threats, but do we have a
clear picture of them?
What are the main threats?
What can we do to defend
against them?
What is behind data security breaches?
1. Malware involved in 69% of breaches
2. Hacking* used in 81% of breaches
Verizon 2012 Data Breach Investigations Report
*80% of hacking is passwords:
default, missing, guessed, stolen,
cracked
3rd element: deception
Used in many types of
attack, like this recent
attempt to plant a Trojan
Clicking either link and you
will be infected
(Unless you are running a
good AV program)
What do cyber criminals want with our
digital devices and data?
36 ways to abuse a hacked device
• Spam zombie
• DDoS extortion zombie
• Click fraud zombie
• Anonymization proxy
• CAPTCHA solving zombie
• eBay/PayPal fake auctions
• Online gaming credentials
• Website FTP credentials
• Skype/VoIP credentials
• Encryption certificates
• Fake antivirus
• Ransomware
• Email account ransom
• Webcam image extortion
• Bank account data
• Credit card data
• Stock and 401K accounts
• Wire transfer data
• Phishing site
• Malware download site
• Warez piracy server
• Child porn server
• Spam site
• Harvest email contacts
• Harvest associated accounts
• Access to corporate email
• Webmail spam
• Stranded abroad scams
• Facebook
• Twitter
• LinkedIn
• Google+
• Online gaming characters
• Online gaming goods/$$$
• PC game license keys
• OS license key
Based on original work by Brian Krebs: krebsonsecurity.com
Web
server
Botnet
activity
Email
attacks
Virtual
goods
Reputation
hijacking
Financial
credentials
Hostage
attacks
Account
credentials
IMPACTADVANTAGEMONEY
CREDENTIALS
What’s their motivation?
The Office of Naval Research and the
rail gun
• Fires a projectile at 5,000 mph with a range of 100 miles
• Small businesses responsible for 86 individual sub-contracts
worth $20m
Verizon 2012 Data Breach Investigations Report
1 to 10
11 to 100
101 to 1,000
1,001 to 10,000
10,001 to 100,000
Over 100,000
0
100
200
300
400
500
600
720 breaches by size of organization (employees)
SMBs
The SMB sweet spot for the cyber-criminally
inclined
Assets
worth
looting
Level of protection
Big enterprise
SMB “sweet spot”
Consumers
Tools of the trade
To get into cyber crime you need:
A. To be a programmer? No
B. To buy equipment? No
C. To have you own servers? No
Crime kits are slick, easy-to-use,
and you can rent them.
Consider the Serenity exploit kit
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
Thriving markets for credentials
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
Safer Technology Through Threat Awareness and Response
All driven by proven business strategies
So how do you defend your devices?
Three main attacks …. and defenses
Scanning
Authentication
Malware
Hacking
AwarenessDeception
Scanning doesn’t work if you don’t use it
0% 10% 20% 30% 40%
Scan devices while connected
Scan devices prior to connection
Require AV on mobile devices
Measures in use at a sample of 82 healthcare facilities
98% experienced one or more breaches of PHI
Ponemon Institute Third Annual Benchmark Study on Patient Privacy & Data Security
Authentication beyond passwords
Passwords exposed in 2012: 75,000,000
Need to add a second factor to authentication
2FA raises the bar for attackers trying to get at
your corporate network
Awareness: a powerful weapon
• Think before you click/open
• If it sounds too good…
• Just because your friend said…
• Resources:
• Securing Our eCity
• We Live Security
• Podcasts and webinars
• ESET Smart Security
Security news and how-tos
Thank you!
• Visit www.WeLiveSecurity.com

More Related Content

PDF
Nonprofit Cybersecurity Incident Report
PDF
Trending it security threats in the public sector
PPTX
Mobile Strategy Partners Mobile Security
PPTX
Cyber security
PPTX
CYBERSECURITY | Why it is important?
PPTX
Malware
PPTX
Cyber Threat Management
Nonprofit Cybersecurity Incident Report
Trending it security threats in the public sector
Mobile Strategy Partners Mobile Security
Cyber security
CYBERSECURITY | Why it is important?
Malware
Cyber Threat Management

What's hot (20)

PDF
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
PDF
Enemy from Within: Managing and Controlling Access
PPTX
Cyber security
PPTX
Introduction to Cyber Security
PDF
Securign siem for small business
PPTX
Cyber Vulnerabilities & How companies can test them
PPTX
Types of Malware (CEH v11)
PPTX
CYBER SECURITY THREATS - Polytechnic Ungku Omar
PPTX
Cyber security and Cyber Crime
PPTX
Cyber security threats and its solutions
PDF
How to analyze cyber threats
PPTX
Cyber Security - All Over World
PPTX
Cyber security
PDF
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
PDF
Nat'l Cyber Security Awareness Month (NCSAM) Posters
PPT
PPTX
Cyber security
PDF
NormShield 2018 Cyber Security Risk Brief
PPTX
Cyber Security
PPTX
cyber security
How Federal Agencies Can Build a Layered Defense for Privileged Accounts
Enemy from Within: Managing and Controlling Access
Cyber security
Introduction to Cyber Security
Securign siem for small business
Cyber Vulnerabilities & How companies can test them
Types of Malware (CEH v11)
CYBER SECURITY THREATS - Polytechnic Ungku Omar
Cyber security and Cyber Crime
Cyber security threats and its solutions
How to analyze cyber threats
Cyber Security - All Over World
Cyber security
Security Attacks in Stand-Alone Computer and Cloud Computing: An Analysis
Nat'l Cyber Security Awareness Month (NCSAM) Posters
Cyber security
NormShield 2018 Cyber Security Risk Brief
Cyber Security
cyber security
Ad

Viewers also liked (12)

PDF
Technologies of today
PPT
Technologies of today
PPT
Harnessing Science and Technology: Reviving the Philippine Manufacturing Sector
 
PDF
Technology Trends in Situation Awareness
PPTX
Digital leaders
PPTX
Lesson 1 Empowerment Technology
PDF
The 2016 CES Report: The Trend Behind the Trend
 
PPTX
Digital globalization: The new era of global flows
PDF
The Future Of Work & The Work Of The Future
PDF
SXSW 2016: The Need To Knows
PPTX
IT in Healthcare
 
PDF
[Infographic] How will Internet of Things (IoT) change the world as we know it?
Technologies of today
Technologies of today
Harnessing Science and Technology: Reviving the Philippine Manufacturing Sector
 
Technology Trends in Situation Awareness
Digital leaders
Lesson 1 Empowerment Technology
The 2016 CES Report: The Trend Behind the Trend
 
Digital globalization: The new era of global flows
The Future Of Work & The Work Of The Future
SXSW 2016: The Need To Knows
IT in Healthcare
 
[Infographic] How will Internet of Things (IoT) change the world as we know it?
Ad

Similar to Safer Technology Through Threat Awareness and Response (20)

PPTX
Enjoy Safer Technology and Defeat Cyber Criminals
PPTX
Why do THEY want your digital devices?
 
PDF
Guarding the Digital Fortress.pdf
PDF
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
PPTX
It security the condensed version
PDF
Cyber Security.pdf
PPTX
How secure are you?
PPTX
Cyber security awareness for end users
PDF
Cybersecurity - Webinar Session
PDF
The Evolving Landscape on Information Security
PDF
Information Security
PPTX
Cyber Security for Financial Planners
PPTX
The Evolution of Cybercrime
PPTX
Cyber Security Briefing
PPTX
Lec 1- Intro to cyber security and recommendations
PPTX
Cyber Security Awareness Program
PDF
E security and payment 2013-1
PDF
Forthright Security Lunch and Learn - Ransomware Focus 2
PPTX
Top 5 Cybersecurity Threats in Retail Industry
PDF
Making Sense Of Cybersecurity 1 Converted Thomas Kranz
Enjoy Safer Technology and Defeat Cyber Criminals
Why do THEY want your digital devices?
 
Guarding the Digital Fortress.pdf
Guarding the Digital Fortress Unmasking 10 Common Types of Cybersecurity Thre...
It security the condensed version
Cyber Security.pdf
How secure are you?
Cyber security awareness for end users
Cybersecurity - Webinar Session
The Evolving Landscape on Information Security
Information Security
Cyber Security for Financial Planners
The Evolution of Cybercrime
Cyber Security Briefing
Lec 1- Intro to cyber security and recommendations
Cyber Security Awareness Program
E security and payment 2013-1
Forthright Security Lunch and Learn - Ransomware Focus 2
Top 5 Cybersecurity Threats in Retail Industry
Making Sense Of Cybersecurity 1 Converted Thomas Kranz

More from Stephen Cobb (20)

PPTX
Cybercrime-as-health-crisis-shared.pptx
PPTX
Cybersecurity Risk Perception and Communication
PPTX
What Makes a Good CISO
PDF
Sizing the Cyber Skills Gap
PPTX
Security and Wearables: Success starts with security
PDF
The Hacking Team Hack: Lessons Learned for Enterprise Security
PPTX
How to assess and manage cyber risk
PPTX
Cybercrime and the Hidden Perils of Patient Data
PPTX
Cybersecurity for the non-technical
PPTX
The mobile health IT security challenge: way bigger than HIPAA?
PPTX
2015: The year-ahead-in-cyber-security
PPTX
NCSAM = Cyber Security Awareness Month: Trends and Resources
PPTX
Using Technology and People to Improve your Threat Resistance and Cyber Security
PPT
HIPAA, Privacy, Security, and Good Business
PPTX
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
PPTX
Malware and the risks of weaponizing code
PPTX
The Year Ahead in Cyber Security: 2014 edition
PPTX
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
PPTX
Endpoint and Server: The belt and braces anti-malware strategy
PPTX
Cyberskills shortage: Where is the cyber workforce of tomorrow
Cybercrime-as-health-crisis-shared.pptx
Cybersecurity Risk Perception and Communication
What Makes a Good CISO
Sizing the Cyber Skills Gap
Security and Wearables: Success starts with security
The Hacking Team Hack: Lessons Learned for Enterprise Security
How to assess and manage cyber risk
Cybercrime and the Hidden Perils of Patient Data
Cybersecurity for the non-technical
The mobile health IT security challenge: way bigger than HIPAA?
2015: The year-ahead-in-cyber-security
NCSAM = Cyber Security Awareness Month: Trends and Resources
Using Technology and People to Improve your Threat Resistance and Cyber Security
HIPAA, Privacy, Security, and Good Business
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Malware and the risks of weaponizing code
The Year Ahead in Cyber Security: 2014 edition
Using Technology and Techno-People to Improve your Threat Resistance and Cybe...
Endpoint and Server: The belt and braces anti-malware strategy
Cyberskills shortage: Where is the cyber workforce of tomorrow

Recently uploaded (20)

PPT
Lecture notes on Business Research Methods
PDF
Tata consultancy services case study shri Sharda college, basrur
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
PDF
Solaris Resources Presentation - Corporate August 2025.pdf
PDF
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
PPTX
Slide gioi thieu VietinBank Quy 2 - 2025
PDF
Charisse Litchman: A Maverick Making Neurological Care More Accessible
PDF
Keppel_Proposed Divestment of M1 Limited
PPTX
basic introduction to research chapter 1.pptx
PPTX
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
PDF
How to Get Business Funding for Small Business Fast
PDF
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
PDF
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
PDF
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
PPTX
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
PDF
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
PDF
Cours de Système d'information about ERP.pdf
PDF
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
PPTX
2025 Product Deck V1.0.pptxCATALOGTCLCIA
Lecture notes on Business Research Methods
Tata consultancy services case study shri Sharda college, basrur
Slide gioi thieu VietinBank Quy 2 - 2025
Susan Semmelmann: Enriching the Lives of others through her Talents and Bless...
Solaris Resources Presentation - Corporate August 2025.pdf
ANALYZING THE OPPORTUNITIES OF DIGITAL MARKETING IN BANGLADESH TO PROVIDE AN ...
Slide gioi thieu VietinBank Quy 2 - 2025
Charisse Litchman: A Maverick Making Neurological Care More Accessible
Keppel_Proposed Divestment of M1 Limited
basic introduction to research chapter 1.pptx
Negotiation and Persuasion Skills: A Shrewd Person's Perspective
How to Get Business Funding for Small Business Fast
Robin Fischer: A Visionary Leader Making a Difference in Healthcare, One Day ...
Family Law: The Role of Communication in Mediation (www.kiu.ac.ug)
Module 3 - Functions of the Supervisor - Part 1 - Student Resource (1).pdf
TRAINNING, DEVELOPMENT AND APPRAISAL.pptx
NewBase 12 August 2025 Energy News issue - 1812 by Khaled Al Awadi_compresse...
Cours de Système d'information about ERP.pdf
Nante Industrial Plug Factory: Engineering Quality for Modern Power Applications
2025 Product Deck V1.0.pptxCATALOGTCLCIA

Safer Technology Through Threat Awareness and Response

  • 1. Safer Technology Through Threat Awareness and Response Stephen Cobb, CISSP Senior Security Researcher
  • 2. Threat awareness = know your enemy We all know there are threats, but do we have a clear picture of them? What are the main threats? What can we do to defend against them?
  • 3. What is behind data security breaches? 1. Malware involved in 69% of breaches 2. Hacking* used in 81% of breaches Verizon 2012 Data Breach Investigations Report *80% of hacking is passwords: default, missing, guessed, stolen, cracked
  • 4. 3rd element: deception Used in many types of attack, like this recent attempt to plant a Trojan Clicking either link and you will be infected (Unless you are running a good AV program)
  • 5. What do cyber criminals want with our digital devices and data?
  • 6. 36 ways to abuse a hacked device • Spam zombie • DDoS extortion zombie • Click fraud zombie • Anonymization proxy • CAPTCHA solving zombie • eBay/PayPal fake auctions • Online gaming credentials • Website FTP credentials • Skype/VoIP credentials • Encryption certificates • Fake antivirus • Ransomware • Email account ransom • Webcam image extortion • Bank account data • Credit card data • Stock and 401K accounts • Wire transfer data • Phishing site • Malware download site • Warez piracy server • Child porn server • Spam site • Harvest email contacts • Harvest associated accounts • Access to corporate email • Webmail spam • Stranded abroad scams • Facebook • Twitter • LinkedIn • Google+ • Online gaming characters • Online gaming goods/$$$ • PC game license keys • OS license key Based on original work by Brian Krebs: krebsonsecurity.com Web server Botnet activity Email attacks Virtual goods Reputation hijacking Financial credentials Hostage attacks Account credentials
  • 8. The Office of Naval Research and the rail gun • Fires a projectile at 5,000 mph with a range of 100 miles • Small businesses responsible for 86 individual sub-contracts worth $20m
  • 9. Verizon 2012 Data Breach Investigations Report 1 to 10 11 to 100 101 to 1,000 1,001 to 10,000 10,001 to 100,000 Over 100,000 0 100 200 300 400 500 600 720 breaches by size of organization (employees) SMBs
  • 10. The SMB sweet spot for the cyber-criminally inclined Assets worth looting Level of protection Big enterprise SMB “sweet spot” Consumers
  • 11. Tools of the trade To get into cyber crime you need: A. To be a programmer? No B. To buy equipment? No C. To have you own servers? No Crime kits are slick, easy-to-use, and you can rent them. Consider the Serenity exploit kit
  • 15. Thriving markets for credentials
  • 20. All driven by proven business strategies
  • 21. So how do you defend your devices? Three main attacks …. and defenses Scanning Authentication Malware Hacking AwarenessDeception
  • 22. Scanning doesn’t work if you don’t use it 0% 10% 20% 30% 40% Scan devices while connected Scan devices prior to connection Require AV on mobile devices Measures in use at a sample of 82 healthcare facilities 98% experienced one or more breaches of PHI Ponemon Institute Third Annual Benchmark Study on Patient Privacy & Data Security
  • 23. Authentication beyond passwords Passwords exposed in 2012: 75,000,000 Need to add a second factor to authentication 2FA raises the bar for attackers trying to get at your corporate network
  • 24. Awareness: a powerful weapon • Think before you click/open • If it sounds too good… • Just because your friend said… • Resources: • Securing Our eCity • We Live Security • Podcasts and webinars • ESET Smart Security
  • 25. Security news and how-tos
  • 26. Thank you! • Visit www.WeLiveSecurity.com