SlideShare a Scribd company logo
The	
  Why
Keith	
  Graham
Chief	
  Technology	
  Officer
‘Prevent	
  the	
  misuse	
  
of	
  stolen	
  credentials’
SecureAuth’s Mission:
The Why - Keith Graham, CTO – SecureAuth+Core Security
81%	
  of	
  breaches	
  leverage	
  	
  
stolen	
  and/or	
  weak	
  credentials
Which	
  can’t	
  be	
  stopped	
  by	
  network	
  
or	
  endpoint	
  security	
  alone
Of the $80 billion spent, only $5 billion was in identity based security
ENDPOINT & NETWORK SECURITY IDENTITY SECURITY
• Credential	
  misuse	
  up	
  nearly	
  20%	
  from	
  2015	
  to	
  2016
• Breaches	
  are	
  on	
  the	
  rise,	
  up	
  40%	
  from	
  2015	
  to	
  2016
Rebasing	
  our	
  belief	
  system(s)…
• Its	
  happenedddiiing…
• We’re	
  now	
  measured	
  differently
• Prevention	
  will	
  always	
  fail
The Why - Keith Graham, CTO – SecureAuth+Core Security
The	
  need	
  for	
  a	
  new	
  approach
NETWORK
ENDPOINT
IDENTITY
PRESENCE	
  IOCs
PRESENCE	
  &	
  
EXECUTION	
  IOCs
INFILTRATION	
  IOCs
Applying	
  the	
  new	
  approach
ATTACKER COMPLETE
MISSION
Phishing	
  
malware/credentials	
  –
purchased	
  credentials
PENETRATE
Gain	
  credentials	
  and	
  
access	
  to	
  systems
ESTABLISH	
  
FOOTHOLD
No	
  longer	
  using	
  malware	
  –
create	
  new/valid	
  escalated	
  
privileged	
  credentials
ESCALATE	
  
PRIVILEGES
Often	
  maintain	
  presence	
  
in	
  the	
  network
MOVE	
  
LATERALLY
Focusing	
  on	
  identity	
  usage	
  throughout	
  the	
  attack	
  lifecycle
Vision	
  for	
  Adaptive	
  Access
1. Broad	
  coverage
2. Methods	
  and	
  techniques
The	
  Adaptive	
  Access	
  vision
Part	
  1:	
  broad	
  coverage
Endpoint Legacy	
  IAMVPN
VPN
PAM API
API
MobileSSO
The	
  Adaptive	
  Access	
  vision
Part	
  2:	
  methods	
  and	
  techniques
Location Identity	
  Store Device	
  Recognition
Unusual	
  Events Threat* Profile	
  Change	
  
Phone	
  Fraud
Unusual	
  Activity
Applications	
  and	
  Data
Exposure	
  of	
  enterprise	
  applications	
  and	
  data
• VPN
• Web	
  Applications
• Office	
  365
• On-­‐prem and	
  home	
  grown	
  applications
B2C	
  and	
  B2B	
  portals
Exposure	
  of	
  consumer	
  and	
  partner	
  data
• Significant	
  data	
  exposure	
  risk
• Consumer	
  revenue	
  impact
• Competitive	
  driven	
  influencers	
  
• Balancing	
  end	
  user	
  experience	
  and	
  security
Agree	
  to	
  use	
  
2FA
Use	
  the	
  same	
  
password
Had	
  online	
  
account	
  
compromised
46%
81%
36%
Where	
  is	
  the	
  proof?
Looking	
  back	
  over	
  the	
  last	
  12	
  months
We	
  processed	
  617.3	
  million	
  authentications
That’s	
  4.1	
  million unique	
  users	
  
548.2	
  million authentications were successful
69.1	
  million were denied or stepped up	
  
Where	
  is	
  the	
  proof?
What	
  were	
  the	
  reasons?	
  
• 60.3	
  million	
  times	
  a	
  bad	
  password	
  was	
  used
• Which	
  resulted	
  in	
  119,000 account	
  lockouts
• 524,000 times	
  a	
  bad	
  OTP was	
  entered
• 79,000 of	
  those	
  exceeded	
  the	
  bad	
  OTP	
  user	
  limit
Where	
  is	
  the	
  proof?
What	
  were	
  the	
  reasons?	
  
• 77,000 times the IP	
  address was malicious and denied
• 2.1	
  million	
  times	
  we	
  stepped	
  up	
  due	
  to	
  the	
  IP	
  address	
  being	
  suspicious	
  
• 252,000 were	
  stepped	
  up	
  and	
  subsequantly	
  passed
• 25,000 were	
  stepped	
  up	
  and	
  denied
• The	
  remaining	
  attempts	
  were	
  abandoned
Where	
  is	
  the	
  proof?
What	
  were	
  the	
  reasons?	
  
• 830,000 times	
  we	
  didn’t	
  recognize	
  the	
  device	
  
• 639,000 times	
  we	
  denied enrollment	
  of	
  an	
  OTP	
  method
• 200,000 times	
  we	
  denied changing	
  the	
  users	
  password
• The	
  remainder	
  were	
  due	
  to	
  incorrect	
  username	
  or	
  token	
  being	
  presented
Where	
  is	
  the	
  proof?
Looping	
  back	
  on	
  Office	
  365
• 71.4%	
  of	
  Office	
  365	
  customers	
  have	
  
had	
  an	
  account	
  compromised
• In	
  last	
  180	
  days	
  we’ve	
  stopped	
  85.2	
  
million	
  bad	
  things	
  for	
  our	
  Office	
  365	
  
customers
Don’t	
  forget	
  about	
  the	
  blended	
  approach…
• Identity	
  still only	
  solves	
  part	
  of	
  
todays	
  problem.
• Network	
  and	
  Endpoint	
  investments	
  
are	
  still	
  very important!
Back	
  to	
  the	
  Attack	
  Lifecycle
What	
  coverage,	
  where?
ATTACKER COMPLETE
MISSION
PENETRATE
ESTABLISH	
  
FOOTHOLD
ESCALATE	
  
PRIVILEGES
MOVE	
  
LATERALLY
Network-­‐based	
  security | Endpoint-­‐based	
  security | Identity-­‐based	
  security
A	
  real-­‐world	
  example
A	
  major	
  retail	
  store…
Foothold	
  
achieved
Password	
  stealing	
  
Malware	
  is	
  used
Phishing	
  
attack
Employees	
  at	
  a	
  
supplier	
  are	
  
targeted
Malware	
  in	
  
play
Credit	
  Card	
  details	
  
compiled	
  in	
  real-­‐time
Theft	
  occurs
Data	
  exits	
  via	
  FTP	
  
to	
  drop	
  locations
Another	
  
foothold	
  
achieved
Stolen	
  VPN	
  
credentials	
  used
Moving	
  
laterally
Credentials	
  and	
  
vulnerabilities	
  
exploited
A	
  real-­‐world	
  example
A	
  major	
  health	
  insurer…
Foothold	
  
achieved
RAT	
  (remote	
  access	
  
trojan	
  deployed)
Phishing	
  
attack
Employees	
  are	
  
targeted
Member	
  
Database	
  
exploited
Select	
  *	
  from	
  
everywhere
Theft	
  occurs
Member	
  data	
  
staged	
  and	
  
ultimately	
  stolen
Credentials	
  
are	
  stolen
Escalation	
  of	
  
privilege	
  up	
  to	
  
admin	
  and	
  DB	
  
admins
Moving	
  
laterally
Credentials	
  and	
  
other	
  hacking	
  tools	
  
used
Combination	
  of	
  SecureAuth +	
  Core	
  Security
Let’s	
  Recap
• Breaches	
  continue	
  to	
  rise
• We	
  need	
  to	
  think	
  differently	
  about	
  identity
• We	
  have	
  proof!
• A	
  blended	
  approach	
  is	
  key	
  
THANK	
  YOU

More Related Content

PPTX
API Security Survey
PDF
Top Five Security Must-Haves for Office 365
PPTX
Survey: Insider Threats and Cyber Security
PPTX
When a Certificate Authority Fails, How Quickly Can You Restore Trust?
PPTX
Basics of Security Testing
PDF
Avoid outages-from-misconfigured-devices-webinar-slides
PPTX
Simplifying Security Management in the Virtual Data Center
PPTX
Dos and Don’ts for Managing External Connectivity to/from Your Network
API Security Survey
Top Five Security Must-Haves for Office 365
Survey: Insider Threats and Cyber Security
When a Certificate Authority Fails, How Quickly Can You Restore Trust?
Basics of Security Testing
Avoid outages-from-misconfigured-devices-webinar-slides
Simplifying Security Management in the Virtual Data Center
Dos and Don’ts for Managing External Connectivity to/from Your Network

What's hot (20)

PDF
Database monitoring - First and Last Line of Defense
PPTX
Secure Your Web Applications and Achieve Compliance
PPTX
Rise of Ransomware
PDF
The Security Policy Management Maturity Model: How to Move Up the Curve
PDF
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
PDF
The Non-Advanced Persistent Threat
PPTX
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
PDF
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
PPTX
Check Point: Compliance Blade
PPTX
IBM QRadar BB & Rules
PDF
The Case for a Turnkey Approach to Fraud Operations
PDF
Issa symc la 5min mr
PPTX
Algo sec suite overview 2013 05
PPTX
AWS Security Fundamentals: Dos and Don’ts
PDF
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
PPTX
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
PPTX
IBM - Security Intelligence para PYMES
PDF
Managing risk and vulnerabilities in a business context
PDF
Emerging Trends in Application Security
PDF
Every cloud cloud risk assessment 2018
Database monitoring - First and Last Line of Defense
Secure Your Web Applications and Achieve Compliance
Rise of Ransomware
The Security Policy Management Maturity Model: How to Move Up the Curve
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
The Non-Advanced Persistent Threat
Top PCI Pitfalls and How to Avoid Them: The QSA’s Perspective
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
Check Point: Compliance Blade
IBM QRadar BB & Rules
The Case for a Turnkey Approach to Fraud Operations
Issa symc la 5min mr
Algo sec suite overview 2013 05
AWS Security Fundamentals: Dos and Don’ts
Sophisticated Incident Response Requires Sophisticated Activity Monitoring
Safeguard Healthcare Identities and Data with Identity Governance and Intelli...
IBM - Security Intelligence para PYMES
Managing risk and vulnerabilities in a business context
Emerging Trends in Application Security
Every cloud cloud risk assessment 2018
Ad

Similar to The Why - Keith Graham, CTO – SecureAuth+Core Security (20)

PPTX
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
PPTX
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
PPT
Strong Authentication - Open Source
PPT
Oath appsec sf 2015 dem rev. 2
PPTX
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
PDF
Taking Control of the Digital and Mobile User Authentication Challenge
 
PDF
Strong Authentication: Securing Identities and Enabling Business
PPTX
ciso-workshop-3-identity-protection.pptx
PPTX
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
PDF
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
PPTX
Webinar: Goodbye RSA. Hello Modern Authentication.
PDF
Solving problems with authentication
PPTX
Identity and Security in the Cloud
PPT
Marcos de Pedro Neoris authenware_cybersecurity step1
PPTX
A CISO's Guide to Cyber Liability Insurance
PDF
Enhancing Authentication to Secure the Open Enterprise
PDF
Is your data safe Infographic by Symantec
PDF
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
PDF
Strong authentication implementation guide
 
PPTX
AY - Adaptive Access Control
Webinar: Beyond Two-Factor: Secure Access Control for Office 365
Unmask anonymous attackers with advanced threat intelligence webinar 6.29 fin...
Strong Authentication - Open Source
Oath appsec sf 2015 dem rev. 2
Stopping Breaches at the Perimeter: Strategies for Secure Access Control
Taking Control of the Digital and Mobile User Authentication Challenge
 
Strong Authentication: Securing Identities and Enabling Business
ciso-workshop-3-identity-protection.pptx
Working at the Margins: Change Agents in the Converged World (Gartner Report ...
"Evolving Cybersecurity Strategies" - Identity is the new security boundary
Webinar: Goodbye RSA. Hello Modern Authentication.
Solving problems with authentication
Identity and Security in the Cloud
Marcos de Pedro Neoris authenware_cybersecurity step1
A CISO's Guide to Cyber Liability Insurance
Enhancing Authentication to Secure the Open Enterprise
Is your data safe Infographic by Symantec
Eliminate Password Fatigue with Smart Authentication Solutions.pdf
Strong authentication implementation guide
 
AY - Adaptive Access Control
Ad

More from Core Security (20)

PDF
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
PPTX
Lazy Penetration Tester Tricks
PDF
Thanks for All the Phish: Introducing Core Impact 18.1
PDF
Identity + Security: Welcome to Your New Career
PDF
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
PDF
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
PDF
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
PDF
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
PDF
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
PDF
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
PDF
Understanding Network Insight Integrations to Automate Containment and Kick S...
PDF
Product Vision - Stephen Newman – SecureAuth+Core Security
PDF
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
PDF
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
PDF
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
PDF
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
PDF
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
PDF
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
PPTX
10 IT Security Trends to Watch for in 2016
PDF
Trending it security threats in the public sector
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
Lazy Penetration Tester Tricks
Thanks for All the Phish: Introducing Core Impact 18.1
Identity + Security: Welcome to Your New Career
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
Understanding Network Insight Integrations to Automate Containment and Kick S...
Product Vision - Stephen Newman – SecureAuth+Core Security
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Iden...
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
10 IT Security Trends to Watch for in 2016
Trending it security threats in the public sector

Recently uploaded (20)

PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PPTX
ai tools demonstartion for schools and inter college
PPTX
Odoo POS Development Services by CandidRoot Solutions
PDF
Nekopoi APK 2025 free lastest update
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Design an Analysis of Algorithms II-SECS-1021-03
PPTX
Introduction to Artificial Intelligence
PPTX
Operating system designcfffgfgggggggvggggggggg
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Transform Your Business with a Software ERP System
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
How Creative Agencies Leverage Project Management Software.pdf
Adobe Illustrator 28.6 Crack My Vision of Vector Design
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Upgrade and Innovation Strategies for SAP ERP Customers
EN-Survey-Report-SAP-LeanIX-EA-Insights-2025.pdf
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
ai tools demonstartion for schools and inter college
Odoo POS Development Services by CandidRoot Solutions
Nekopoi APK 2025 free lastest update
How to Migrate SBCGlobal Email to Yahoo Easily
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Design an Analysis of Algorithms II-SECS-1021-03
Introduction to Artificial Intelligence
Operating system designcfffgfgggggggvggggggggg
CHAPTER 2 - PM Management and IT Context
Transform Your Business with a Software ERP System
wealthsignaloriginal-com-DS-text-... (1).pdf
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf

The Why - Keith Graham, CTO – SecureAuth+Core Security

  • 1. The  Why Keith  Graham Chief  Technology  Officer
  • 2. ‘Prevent  the  misuse   of  stolen  credentials’ SecureAuth’s Mission:
  • 4. 81%  of  breaches  leverage     stolen  and/or  weak  credentials Which  can’t  be  stopped  by  network   or  endpoint  security  alone
  • 5. Of the $80 billion spent, only $5 billion was in identity based security ENDPOINT & NETWORK SECURITY IDENTITY SECURITY • Credential  misuse  up  nearly  20%  from  2015  to  2016 • Breaches  are  on  the  rise,  up  40%  from  2015  to  2016
  • 6. Rebasing  our  belief  system(s)… • Its  happenedddiiing… • We’re  now  measured  differently • Prevention  will  always  fail
  • 8. The  need  for  a  new  approach NETWORK ENDPOINT IDENTITY PRESENCE  IOCs PRESENCE  &   EXECUTION  IOCs INFILTRATION  IOCs
  • 9. Applying  the  new  approach ATTACKER COMPLETE MISSION Phishing   malware/credentials  – purchased  credentials PENETRATE Gain  credentials  and   access  to  systems ESTABLISH   FOOTHOLD No  longer  using  malware  – create  new/valid  escalated   privileged  credentials ESCALATE   PRIVILEGES Often  maintain  presence   in  the  network MOVE   LATERALLY Focusing  on  identity  usage  throughout  the  attack  lifecycle
  • 10. Vision  for  Adaptive  Access 1. Broad  coverage 2. Methods  and  techniques
  • 11. The  Adaptive  Access  vision Part  1:  broad  coverage Endpoint Legacy  IAMVPN VPN PAM API API MobileSSO
  • 12. The  Adaptive  Access  vision Part  2:  methods  and  techniques Location Identity  Store Device  Recognition Unusual  Events Threat* Profile  Change   Phone  Fraud Unusual  Activity
  • 13. Applications  and  Data Exposure  of  enterprise  applications  and  data • VPN • Web  Applications • Office  365 • On-­‐prem and  home  grown  applications
  • 14. B2C  and  B2B  portals Exposure  of  consumer  and  partner  data • Significant  data  exposure  risk • Consumer  revenue  impact • Competitive  driven  influencers   • Balancing  end  user  experience  and  security Agree  to  use   2FA Use  the  same   password Had  online   account   compromised 46% 81% 36%
  • 15. Where  is  the  proof? Looking  back  over  the  last  12  months We  processed  617.3  million  authentications That’s  4.1  million unique  users   548.2  million authentications were successful 69.1  million were denied or stepped up  
  • 16. Where  is  the  proof? What  were  the  reasons?   • 60.3  million  times  a  bad  password  was  used • Which  resulted  in  119,000 account  lockouts • 524,000 times  a  bad  OTP was  entered • 79,000 of  those  exceeded  the  bad  OTP  user  limit
  • 17. Where  is  the  proof? What  were  the  reasons?   • 77,000 times the IP  address was malicious and denied • 2.1  million  times  we  stepped  up  due  to  the  IP  address  being  suspicious   • 252,000 were  stepped  up  and  subsequantly  passed • 25,000 were  stepped  up  and  denied • The  remaining  attempts  were  abandoned
  • 18. Where  is  the  proof? What  were  the  reasons?   • 830,000 times  we  didn’t  recognize  the  device   • 639,000 times  we  denied enrollment  of  an  OTP  method • 200,000 times  we  denied changing  the  users  password • The  remainder  were  due  to  incorrect  username  or  token  being  presented
  • 19. Where  is  the  proof? Looping  back  on  Office  365 • 71.4%  of  Office  365  customers  have   had  an  account  compromised • In  last  180  days  we’ve  stopped  85.2   million  bad  things  for  our  Office  365   customers
  • 20. Don’t  forget  about  the  blended  approach… • Identity  still only  solves  part  of   todays  problem. • Network  and  Endpoint  investments   are  still  very important!
  • 21. Back  to  the  Attack  Lifecycle What  coverage,  where? ATTACKER COMPLETE MISSION PENETRATE ESTABLISH   FOOTHOLD ESCALATE   PRIVILEGES MOVE   LATERALLY Network-­‐based  security | Endpoint-­‐based  security | Identity-­‐based  security
  • 22. A  real-­‐world  example A  major  retail  store… Foothold   achieved Password  stealing   Malware  is  used Phishing   attack Employees  at  a   supplier  are   targeted Malware  in   play Credit  Card  details   compiled  in  real-­‐time Theft  occurs Data  exits  via  FTP   to  drop  locations Another   foothold   achieved Stolen  VPN   credentials  used Moving   laterally Credentials  and   vulnerabilities   exploited
  • 23. A  real-­‐world  example A  major  health  insurer… Foothold   achieved RAT  (remote  access   trojan  deployed) Phishing   attack Employees  are   targeted Member   Database   exploited Select  *  from   everywhere Theft  occurs Member  data   staged  and   ultimately  stolen Credentials   are  stolen Escalation  of   privilege  up  to   admin  and  DB   admins Moving   laterally Credentials  and   other  hacking  tools   used
  • 24. Combination  of  SecureAuth +  Core  Security
  • 25. Let’s  Recap • Breaches  continue  to  rise • We  need  to  think  differently  about  identity • We  have  proof! • A  blended  approach  is  key