SlideShare a Scribd company logo
The Most Common 
Failure With 
Today's Defences 
Mark Nunnikhoven 
Vice President, Cloud & Emerging Technologies 
@marknca 
Just like you probably can’t see this, I can’t see the backchannel 
Tweet me now @marknca, I’ll reply after the talk…
Recent attacks 
The problem 
What you can do?
Recently…
The Most Common Failure With Today's Defences
450 000 000 
“Client record” is typically at least [username+password]
27-Nov-2013—15-Dec-2013 
First real CEO “resignation” due primarily to information security incident
Early May-2014—Late Aug-2014 
a/k/a “Target 2” …but worse
Late Feb-2014—Mid May-2014 
Nominated for “Worst Communications During An Incident”
17-Jun-2013—17-Oct-2014 
Real reputation risk & impact on ability to conduct business
17-Sep-2013—Early Oct-2013 
Should have received more attention 
More on this one later…
Amazing visualization from Information Is Beautiful 
“World’s Biggest Data Breaches & Hacks”
The Most Common Failure With Today's Defences
Breaches: more frequent, lasting longer, bigger impact on businesses
The Problem
Data 
Restrict inbound 
Restrict outbound 
Heavily monitor access 
Data space: servers, applications, infrastructure, etc.
User 
Restrict inbound 
Allow outbound 
Little to no monitoring 
User space: Where the users are ;-) 
Endpoints like laptops, desktops, tablets, etc.
The Most Common Failure With Today's Defences
Authentication 
Authorization 
Yes, we typically only use 2 controls here
152 million records 
40 GB of source code 
~44 GB of data exfiltrated
What can you do?
Authentication 
Authorization
Authentication 
Authorization 
Behaviour analysis 
3 is more than 2. That’s an immediate win when reporting up to your boss(es)
What to look at 
All traffic leaving user space 
Most organizations have some controls between the user and the world 
Need to start to address internal data flow & expand existing controls
What to look for 
Malicious patterns 
A service or appliance can help here
What to look for 
Odd access patterns 
Most breaches are access data through authorized channels 
BUT using odd behavioural patterns
What to do about it 
Vary the level of trust in the user 
* Dynamically vary the level depending on specific 
criteria and indicators of trust
You may trust me to deliver a talk on security…
But would you trust me to look after your kids?
Trust is a spectrum
Varying trust 
A quick example
Normal access
Have a confirmed finding (or high enough confidence)
Not sure what we’ve found
Not sure what we’ve found
Take a deeper look
Not sure what we’ve found? 
Increase monitoring, block high value access temporarily
Add behavioural analysis 
Look for odd/malicious patterns 
Vary the level of trust
The Most Common Failure With Today's Defences

More Related Content

PDF
GBS - Prevent network security fires
PDF
3 Perspectives Around Data Breaches
PPT
Anton Chuvakin on What is NOT Working in Security 2004
PDF
Ransomware attacks
PPTX
Balance Risk With Better Threat Detection
PPTX
"We Have Met the Enemy and He Is Us": The Role of the Human Factor in Protect...
PPTX
5 Signs Your End-Users Need a Security Boost
DOCX
The internet and safety
GBS - Prevent network security fires
3 Perspectives Around Data Breaches
Anton Chuvakin on What is NOT Working in Security 2004
Ransomware attacks
Balance Risk With Better Threat Detection
"We Have Met the Enemy and He Is Us": The Role of the Human Factor in Protect...
5 Signs Your End-Users Need a Security Boost
The internet and safety

What's hot (20)

PPT
Footprintig(Haching)
PDF
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
PPT
Security and trust. gabriel waller, nokia siemens networks.
PPTX
Mischievous Malware
PDF
Data exfiltration so many threats 2016
PDF
Data Analytics in Real World
PDF
Personam Solution - How it Works Brief
PPTX
Anomaly Detection and You
PDF
E-FILE_Proofpoint_Uberflip_120915_optimized
PDF
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
PPTX
Hacker Halted Miami , USA 2010
PDF
How to Catch a Wolf in Sheep's Clothing
PPTX
Threat Detection and Response Solutions
PDF
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
PPTX
Jim Wojno: Incident Response - No Pain, No Gain!
PPTX
Anatomy of a Ransomware Event
PPTX
Cognitive Analysis With SparkSecure
PDF
IT security in 2021: Why Ransomware Is Still The Biggest Threat
PDF
The New Normal - Rackspace Solve 2015
PPTX
BSidesTO 2016 - Incident Tracking
Footprintig(Haching)
Insight Brief: Security Analytics to Identify the 12 Indicators of Compromise
Security and trust. gabriel waller, nokia siemens networks.
Mischievous Malware
Data exfiltration so many threats 2016
Data Analytics in Real World
Personam Solution - How it Works Brief
Anomaly Detection and You
E-FILE_Proofpoint_Uberflip_120915_optimized
Lifecycle: Responding to a Ransomware Attack - A Professional Breach Guide's ...
Hacker Halted Miami , USA 2010
How to Catch a Wolf in Sheep's Clothing
Threat Detection and Response Solutions
How to Use Artificial Intelligence to Minimize your Cybersecurity Attack Surface
Jim Wojno: Incident Response - No Pain, No Gain!
Anatomy of a Ransomware Event
Cognitive Analysis With SparkSecure
IT security in 2021: Why Ransomware Is Still The Biggest Threat
The New Normal - Rackspace Solve 2015
BSidesTO 2016 - Incident Tracking
Ad

Similar to The Most Common Failure With Today's Defences (20)

PDF
Introduction to the Current Threat Landscape
PPTX
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
PDF
selected Pervasive Computing edited 05.pdf
DOCX
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
PDF
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
PPTX
Unintentional Insider Threat featuring Dr. Eric Cole
PPTX
Unintentional Insider Threat featuring Dr. Eric Cole
PPTX
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
PPTX
I’ve Been Hacked  The Essential Steps to Take Next
PPTX
Website security
PPT
DeltaV Security - Don’t Let Your Business Be Caught Without It
PPTX
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
PPT
Security
PDF
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
PDF
The Small Business Cyber Security Best Practice Guide
PPTX
2022 Rea & Associates' Cybersecurity Conference
 
PDF
01-introductiontosecurity-111122004432-phpapp02.pdf
PDF
Cyber Security Analytics – The Weapon to Fight Cyber Crime
PPT
Information Leakage - A knowledge Based Approach
PDF
Cybersecurity risk assessments help organizations identify.pdf
Introduction to the Current Threat Landscape
Insider Threat - How Do You Find a Wolf in Sheep's Clothing?
selected Pervasive Computing edited 05.pdf
Vulnerability Assessment and Penetration Testing Framework by Falgun Rathod
The Hacker Playbook: How to Think Like a Cybercriminal to Reduce Risk
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
ObserveIT - Unintentional Insider Threat featuring Dr. Eric Cole
I’ve Been Hacked  The Essential Steps to Take Next
Website security
DeltaV Security - Don’t Let Your Business Be Caught Without It
Mapping the Enterprise Threat, Risk, and Security Control Landscape with Splunk
Security
Forrester and Duo Security Webinar - 5 Signs You're Doing Authentication Wrong
The Small Business Cyber Security Best Practice Guide
2022 Rea & Associates' Cybersecurity Conference
 
01-introductiontosecurity-111122004432-phpapp02.pdf
Cyber Security Analytics – The Weapon to Fight Cyber Crime
Information Leakage - A knowledge Based Approach
Cybersecurity risk assessments help organizations identify.pdf
Ad

More from Mark Nunnikhoven (13)

PDF
Advanced Security Automation Made Simple
PDF
AWS re:Invent 2017 re:View
PDF
Security Teams & Tech In A Cloud World
PDF
Defending your workloads with aws waf and deep security
PDF
AWS re:Invent 2015 re:Cap
PDF
Whodunit, The Mechanics of Attack Attribution
PDF
Power Struggle: Balancing Relationships & Responsibility in the Cloud
PDF
Security OF The Cloud
PDF
Shared Responsibility In Action
PDF
Infrastructure as (Secure) Code
PDF
Updating Security Operations For The Cloud
PDF
Shared Responsibility In Action
PDF
Is That Normal? Behaviour Modelling On The Cheap
Advanced Security Automation Made Simple
AWS re:Invent 2017 re:View
Security Teams & Tech In A Cloud World
Defending your workloads with aws waf and deep security
AWS re:Invent 2015 re:Cap
Whodunit, The Mechanics of Attack Attribution
Power Struggle: Balancing Relationships & Responsibility in the Cloud
Security OF The Cloud
Shared Responsibility In Action
Infrastructure as (Secure) Code
Updating Security Operations For The Cloud
Shared Responsibility In Action
Is That Normal? Behaviour Modelling On The Cheap

Recently uploaded (20)

PPTX
Business Acumen Training GuidePresentation.pptx
PDF
Launch Your Data Science Career in Kochi – 2025
PDF
Introduction to Business Data Analytics.
PPTX
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
PPTX
Moving the Public Sector (Government) to a Digital Adoption
PPTX
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
PPTX
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
PDF
Galatica Smart Energy Infrastructure Startup Pitch Deck
PPTX
IBA_Chapter_11_Slides_Final_Accessible.pptx
PPTX
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
PDF
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
PPTX
Major-Components-ofNKJNNKNKNKNKronment.pptx
PPTX
Global journeys: estimating international migration
PPT
Reliability_Chapter_ presentation 1221.5784
PPTX
Business Ppt On Nestle.pptx huunnnhhgfvu
PDF
Foundation of Data Science unit number two notes
PPTX
climate analysis of Dhaka ,Banglades.pptx
PPTX
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
PPT
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm
Business Acumen Training GuidePresentation.pptx
Launch Your Data Science Career in Kochi – 2025
Introduction to Business Data Analytics.
MODULE 8 - DISASTER risk PREPAREDNESS.pptx
Moving the Public Sector (Government) to a Digital Adoption
ALIMENTARY AND BILIARY CONDITIONS 3-1.pptx
advance b rammar.pptxfdgdfgdfsgdfgsdgfdfgdfgsdfgdfgdfg
Galatica Smart Energy Infrastructure Startup Pitch Deck
IBA_Chapter_11_Slides_Final_Accessible.pptx
mbdjdhjjodule 5-1 rhfhhfjtjjhafbrhfnfbbfnb
“Getting Started with Data Analytics Using R – Concepts, Tools & Case Studies”
Major-Components-ofNKJNNKNKNKNKronment.pptx
Global journeys: estimating international migration
Reliability_Chapter_ presentation 1221.5784
Business Ppt On Nestle.pptx huunnnhhgfvu
Foundation of Data Science unit number two notes
climate analysis of Dhaka ,Banglades.pptx
CEE 2 REPORT G7.pptxbdbshjdgsgjgsjfiuhsd
Chapter 2 METAL FORMINGhhhhhhhjjjjmmmmmmmmm

The Most Common Failure With Today's Defences