SlideShare a Scribd company logo
Using Technology and Techno-People to
Improve your Threat Resistance and
Cyber Security
Stephen Cobb, CISSP
Senior Security Researcher, ESET NA
Protecting federal data systems
• Requires:
– technical and human elements
– properly synchronized
We have the technology
• Anti-malware
• Firewalls
• 2-factor authentication
• Encryption
• Network monitoring
• Filtering
And the technology is getting smarter
• Cloud-based reputation, signatures, big data
• But technology is undermined when your
workforce is not trained to play defense
Waiting for technology alone to solve the data
security problem? Dream on…
Techno-people
• Not everyone needs to be technical, but:
• We are all computer users
• Data security is everyone’s responsibility
• Everyone needs to understand the threats
• And the defensive strategies
Today’s agenda
• Scale of the problem
• Nature of our adversaries
• Information security’s 9 patterns
• Patterns applied to federal agencies
• How to improve the coordination of people and
technology to address those patterns
April 2014 GAO report
• Information Security
– Federal Agencies Need to Enhance
Responses to Data Breaches
• (GAO-14-487T)
• A lot of work still to be done,
across numerous agencies
– Improve security
– Improve breach response
29,999
41,776 42,854
48,562
61,214
2009 2010 2011 2012 2013
The scale of the problem
• Information security
incidents reported to
US-CERT by all agencies
• Number of incidents up
• More data to defend?
• Improved reporting?
Exposure of PII is growing
• More incidents involving
Personally Identifiable
Information (PII)
• Why?
– Thriving black market for PII
• Impact
– Seriously impacts individuals
– Growing public displeasure
– Heads may roll
10,481
13,028
15,584
22,156
25,566
2009 2010 2011 2012 2013
A federal PII breach example
• July 2013, hackers get PII of 104,000+ people
– From a DOE system
• Social Security numbers, birth dates and
locations, bank account numbers
– Plus security questions and answers
• DOE Inspector General: cost = $3.7 million
– Assisting affected individuals and lost productivity
What happens to the stolen data?
• Sold to criminal enterprises
– For identity theft, raiding bank accounts, buying luxury
goods, laundering money
• Lucrative scams like tax identity fraud
The market for stolen data has matured
Using Technology and Techno-People to Improve your Threat Resistance and Cyber Security
Using Technology and Techno-People to Improve your Threat Resistance and Cyber Security
All driven by proven business strategies
An overwhelming problem?
• Not if we analyze security incidents
• 2014 Verizon Data Breach Investigation Report
• 92% of incidents categorized into 9 patterns
– True for 100,000 incidents over 10 year period
– True for 95% of breaches in the last 3 years
The Big 9
• Point-of-sale intrusions
• Web app attacks
• Insider/privilege misuse
• Physical theft and loss
• Miscellaneous errors
• Crimeware
• Payment card skimmers
• Denial of service
• Cyber-espionage
• Everything else
Industry sectors not affected equally
34%
24%
21%
19%
2%
Miscellaneous
Insider Misuse
Crimeware
Theft/Loss
Everything Else
Just 4 main patterns where victim
industry = Public
2014 Verizon Data Breach Investigation Report
Let’s count down the top 4
• Miscellaneous
• Insider and privilege misuse
• Crimeware
• Physical theft/loss
• Everything else
Pattern #4: Physical theft and loss
• Cause of 19% of
public sector
security incidents
• It’s people!
• Screen, educate,
supervise
• Reduce impact by
using encryption
11
36
39
102
108
140
308
892
Database
Tapes
Other
Flash drive
Desktop
Documents
Laptop
Other
2014 Verizon Data Breach Investigation Report
Pattern #3: Crimeware
• Accounts for 21%
• It’s people abusing
technology
• Can be solved with
the right anti-
malware strategy
• Endpoint AND
server scanning
1%
1%
1%
2%
2%
4%
5%
6%
38%
43%
Removable media
Unknown
Remote injection
Other
Download by malware
Email link
Email attachment
Network propogation
Web download
Web drive-by
2014 Verizon Data Breach Investigation Report
Pattern #2: Insider and privilege misuse
• 24% of incidents
• Again it’s people!
• Can be fixed!
– Education
– Awareness
– Screening
1%
6%
6%
7%
7%
9%
13%
13%
17%
23%
Auditor
System admin
Developer
Other
Executive
Call center
Manager
Finance
End-user
Cashier
2014 Verizon Data Breach Investigation Report
Pattern #1: Miscellaneous Errors
• 34% of incidents
• Human error!
• Can be fixed!
– Training
– Awareness
– Oversight
0.5%
1%
1%
1%
3%
3%
6%
20%
22%
44%
Maintenance error
Other
Omission
Gaffe
Programming error
Malfunction
Misconfiguration
Disposal error
Publishing error
Misdelivery
2014 Verizon Data Breach Investigation Report
Strategy for doing better
• Technologies and people working together
• If they don’t you get: Target
– Malware was detected
– Exfiltration detected
– But nobody reacted
– Training and awareness?
– Clearly lacking
Security training and awareness
• You need both, but what’s the difference?
• Training
– Ensure people at different levels of IT engagement have
the knowledge they need
• Awareness
– Ensure all people at all levels know the threats and the
defensive measures they must use
Who gets trained?
• Everyone, but not in the same way:
– All-hands training
– IT staff training
– Security staff training
How to deliver training
• In person
• Online
• On paper
• In house
• Outside contractor
• Mix and match
• Be creative
Incentives?
• They work!
– Drive engagement
– Encourage compliance
• But need reinforcement
– Security in job descriptions
– Evaluations
– Rewards
Use your internal organs
• Of communication!
• Newsletter
• Internal social media
• Physical posters
• Add to meeting agendas
• Email blasts
How to do awareness
• Make it fun
• Make it relevant
• Leverage the news
• Remember:
– Everyone now has a vested
interested in staying current on
threats to their/your data
Awareness example: phish traps
• Train on phishing
• Send out a phishing
message
• Track responses
• Report card and re-
education
– No naming & shaming
Awareness example: flash phish
• Train on media scanning
• Sprinkle USB/flash drives
– Sample file/autorun
• Track results
– Inserted? Scanned? Reported?
• Rewards or re-education
– Again, avoid name+shame
Resources to tap
• CompTIA
• ISSA
• SANS
• (ISC)2
• Vendors
• Websites
Using Technology and Techno-People to Improve your Threat Resistance and Cyber Security
Thank you!
• Stephen Cobb
• Stephen.cobb@eset.com
• We Live Security
• www.welivesecurity.com
• Webinars
• www.brighttalk.com/channel/1718
• Booth Number 826

More Related Content

PPTX
How to assess and manage cyber risk
PDF
The Hacking Team Hack: Lessons Learned for Enterprise Security
PPT
Information Technology Security Basics
PPTX
Your cyber security webinar
PDF
Internal Threats: The New Sources of Attack
PPTX
IT & Network Security Awareness
PPT
The insider versus external threat
PPTX
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09
How to assess and manage cyber risk
The Hacking Team Hack: Lessons Learned for Enterprise Security
Information Technology Security Basics
Your cyber security webinar
Internal Threats: The New Sources of Attack
IT & Network Security Awareness
The insider versus external threat
The Cost Of Preventing Breaches Educause Nat Conf Denver Nov 09

What's hot (19)

PDF
The Accidental Insider Threat
PPTX
Cybersecurity for Emergency Managers
PPTX
The need for effective information security awareness practices.
 
PPTX
Cyber Risk: Exposures, prevention, and solutions
PDF
Identify and Stop Insider Threats
PDF
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
PPSX
Insider threats and countermeasures
PPTX
Mitigating Risk from Cyber Security Attacks
PDF
Best Practices for Security Awareness and Training
DOC
System Security Threats and Risks)
PDF
Information Security Awareness
PDF
Incident Response: How To Prepare
PPTX
Top Cybersecurity Challenges Facing Your Business
PPTX
IT Security and Risk Mitigation
PDF
Mayur Rele - How to become a Cyber Security Expert
PDF
Insider threats
PDF
2015 Cyber Security
PPTX
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
PDF
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
The Accidental Insider Threat
Cybersecurity for Emergency Managers
The need for effective information security awareness practices.
 
Cyber Risk: Exposures, prevention, and solutions
Identify and Stop Insider Threats
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Insider threats and countermeasures
Mitigating Risk from Cyber Security Attacks
Best Practices for Security Awareness and Training
System Security Threats and Risks)
Information Security Awareness
Incident Response: How To Prepare
Top Cybersecurity Challenges Facing Your Business
IT Security and Risk Mitigation
Mayur Rele - How to become a Cyber Security Expert
Insider threats
2015 Cyber Security
Corporate Data Secruity Best Practices and Legal Compliance (00969538xBF97D)
Phil Grimes - Penetrating the Perimeter: Tales from the Battlefield
Ad

Viewers also liked (20)

PPTX
Global threat landscape
PPTX
A Career in Cybersecurity
PPTX
The Year Ahead in Cyber Security: 2014 edition
PPTX
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
PPTX
Cybercrime and the Hidden Perils of Patient Data
PPT
HIPAA, Privacy, Security, and Good Business
PPTX
Cyber security
PPTX
The mobile health IT security challenge: way bigger than HIPAA?
PPTX
Getting Started with Business Continuity
PPTX
Malware and the risks of weaponizing code
PPTX
Using Technology and People to Improve your Threat Resistance and Cyber Security
PPTX
Enjoy Safer Technology and Defeat Cyber Criminals
PPTX
Cybersecurity for the non-technical
PPTX
2015: The year-ahead-in-cyber-security
PPTX
NCSAM = Cyber Security Awareness Month: Trends and Resources
PDF
Future of Cybersecurity 2016 - M.Rosenquist
PDF
Skills For Career In Security
PPTX
Cyber Security Career Advice
PDF
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
PDF
Operation Buhtrap - AVAR 2015
Global threat landscape
A Career in Cybersecurity
The Year Ahead in Cyber Security: 2014 edition
Malware is Called Malicious for a Reason: The Risks of Weaponizing Code
Cybercrime and the Hidden Perils of Patient Data
HIPAA, Privacy, Security, and Good Business
Cyber security
The mobile health IT security challenge: way bigger than HIPAA?
Getting Started with Business Continuity
Malware and the risks of weaponizing code
Using Technology and People to Improve your Threat Resistance and Cyber Security
Enjoy Safer Technology and Defeat Cyber Criminals
Cybersecurity for the non-technical
2015: The year-ahead-in-cyber-security
NCSAM = Cyber Security Awareness Month: Trends and Resources
Future of Cybersecurity 2016 - M.Rosenquist
Skills For Career In Security
Cyber Security Career Advice
Navigating Your Career in Cyber Security - Steve Santini & Drew Fearson
Operation Buhtrap - AVAR 2015
Ad

Similar to Using Technology and Techno-People to Improve your Threat Resistance and Cyber Security (20)

PPSX
November 2017: Part 6
PPT
Cyber-Security: A Shared Responsibility -- November 2013
PPTX
Hacking the Human - How Secure Is Your Organization?
DOCX
Final Project DescriptionThe goal of this assignment is again t
PPTX
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
PDF
BEA Presentation
PPTX
IAPP - Trust is Terrible Thing to Waste
PPTX
Top 12 Threats to Enterprise
PDF
The BIG ONE 2.0 - HouSecCon
PDF
CIA-Triad-Presentation.pdf
PDF
2011 SC Magazine Insider Threat Keynote
PDF
Verizon 2014 data breach investigation report and the target breach
PPTX
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
PDF
cybersecurity-careers.pdf
PPTX
So You Want a Job in Cybersecurity
PPT
Tips to Protect Your Organization from Data Breaches and Identity Theft
PPTX
I’ve Been Hacked  The Essential Steps to Take Next
PPTX
Mind the gap
PDF
Webinar - Reducing Your Cybersecurity Risk
PPTX
People are the biggest risk
November 2017: Part 6
Cyber-Security: A Shared Responsibility -- November 2013
Hacking the Human - How Secure Is Your Organization?
Final Project DescriptionThe goal of this assignment is again t
Cyber Risk Presentation to Murphy Chamber of Commerce (5.28.15)
BEA Presentation
IAPP - Trust is Terrible Thing to Waste
Top 12 Threats to Enterprise
The BIG ONE 2.0 - HouSecCon
CIA-Triad-Presentation.pdf
2011 SC Magazine Insider Threat Keynote
Verizon 2014 data breach investigation report and the target breach
Cyber Security Update: How to Train Your Employees to Prevent Data Breaches
cybersecurity-careers.pdf
So You Want a Job in Cybersecurity
Tips to Protect Your Organization from Data Breaches and Identity Theft
I’ve Been Hacked  The Essential Steps to Take Next
Mind the gap
Webinar - Reducing Your Cybersecurity Risk
People are the biggest risk

More from Stephen Cobb (10)

PPTX
Cybercrime-as-health-crisis-shared.pptx
PPTX
Cybersecurity Risk Perception and Communication
PPTX
What Makes a Good CISO
PDF
Sizing the Cyber Skills Gap
PPTX
Security and Wearables: Success starts with security
PPTX
The Evolution of Cybercrime
PPTX
Safer Technology Through Threat Awareness and Response
PPTX
Endpoint and Server: The belt and braces anti-malware strategy
PPTX
Cyberskills shortage: Where is the cyber workforce of tomorrow
PPTX
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cybercrime-as-health-crisis-shared.pptx
Cybersecurity Risk Perception and Communication
What Makes a Good CISO
Sizing the Cyber Skills Gap
Security and Wearables: Success starts with security
The Evolution of Cybercrime
Safer Technology Through Threat Awareness and Response
Endpoint and Server: The belt and braces anti-malware strategy
Cyberskills shortage: Where is the cyber workforce of tomorrow
Cyber Security 101: Training, awareness, strategies for small to medium sized...

Recently uploaded (20)

PDF
Item # 3 - 934 Patterson Final Review.pdf
PDF
Item # 5 - 5307 Broadway St final review
PPTX
AMO Pune Complete information and work profile
PDF
The Role of FPOs in Advancing Rural Agriculture in India
PPTX
SOMANJAN PRAMANIK_3500032 2042.pptx
PPTX
Introduction_to_the_Study_of_Globalization.pptx
PDF
The Detrimental Impacts of Hydraulic Fracturing for Oil and Gas_ A Researched...
PDF
Item # 2 - 934 Patterson Specific Use Permit (SUP)
PPTX
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
PPTX
Omnibus rules on leave administration.pptx
PPTX
26.1.2025 venugopal K Awarded with commendation certificate.pptx
PDF
Population Estimates 2025 Regional Snapshot 08.11.25
PDF
Courtesy Meeting NIPA and MBS Australia.
PDF
PPT Item #s 2&3 - 934 Patterson SUP & Final Review
PPTX
Social_Medias_Parents_Education_PPT.pptx
PDF
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
PDF
Item # 4 -- 328 Albany St. compt. review
PPT
generalgeologygroundwaterchapt11-181117073208.ppt
PDF
Creating Memorable Moments_ Personalized Plant Gifts.pdf
PDF
Storytelling youth indigenous from Bolivia 2025.pdf
Item # 3 - 934 Patterson Final Review.pdf
Item # 5 - 5307 Broadway St final review
AMO Pune Complete information and work profile
The Role of FPOs in Advancing Rural Agriculture in India
SOMANJAN PRAMANIK_3500032 2042.pptx
Introduction_to_the_Study_of_Globalization.pptx
The Detrimental Impacts of Hydraulic Fracturing for Oil and Gas_ A Researched...
Item # 2 - 934 Patterson Specific Use Permit (SUP)
sepsis.pptxMNGHGBDHSB KJHDGBSHVCJB KJDCGHBYUHFB SDJKFHDUJ
Omnibus rules on leave administration.pptx
26.1.2025 venugopal K Awarded with commendation certificate.pptx
Population Estimates 2025 Regional Snapshot 08.11.25
Courtesy Meeting NIPA and MBS Australia.
PPT Item #s 2&3 - 934 Patterson SUP & Final Review
Social_Medias_Parents_Education_PPT.pptx
2025 Shadow report on Ukraine's progression regarding Chapter 29 of the acquis
Item # 4 -- 328 Albany St. compt. review
generalgeologygroundwaterchapt11-181117073208.ppt
Creating Memorable Moments_ Personalized Plant Gifts.pdf
Storytelling youth indigenous from Bolivia 2025.pdf

Using Technology and Techno-People to Improve your Threat Resistance and Cyber Security

  • 1. Using Technology and Techno-People to Improve your Threat Resistance and Cyber Security Stephen Cobb, CISSP Senior Security Researcher, ESET NA
  • 2. Protecting federal data systems • Requires: – technical and human elements – properly synchronized
  • 3. We have the technology • Anti-malware • Firewalls • 2-factor authentication • Encryption • Network monitoring • Filtering
  • 4. And the technology is getting smarter • Cloud-based reputation, signatures, big data • But technology is undermined when your workforce is not trained to play defense
  • 5. Waiting for technology alone to solve the data security problem? Dream on…
  • 6. Techno-people • Not everyone needs to be technical, but: • We are all computer users • Data security is everyone’s responsibility • Everyone needs to understand the threats • And the defensive strategies
  • 7. Today’s agenda • Scale of the problem • Nature of our adversaries • Information security’s 9 patterns • Patterns applied to federal agencies • How to improve the coordination of people and technology to address those patterns
  • 8. April 2014 GAO report • Information Security – Federal Agencies Need to Enhance Responses to Data Breaches • (GAO-14-487T) • A lot of work still to be done, across numerous agencies – Improve security – Improve breach response
  • 9. 29,999 41,776 42,854 48,562 61,214 2009 2010 2011 2012 2013 The scale of the problem • Information security incidents reported to US-CERT by all agencies • Number of incidents up • More data to defend? • Improved reporting?
  • 10. Exposure of PII is growing • More incidents involving Personally Identifiable Information (PII) • Why? – Thriving black market for PII • Impact – Seriously impacts individuals – Growing public displeasure – Heads may roll 10,481 13,028 15,584 22,156 25,566 2009 2010 2011 2012 2013
  • 11. A federal PII breach example • July 2013, hackers get PII of 104,000+ people – From a DOE system • Social Security numbers, birth dates and locations, bank account numbers – Plus security questions and answers • DOE Inspector General: cost = $3.7 million – Assisting affected individuals and lost productivity
  • 12. What happens to the stolen data? • Sold to criminal enterprises – For identity theft, raiding bank accounts, buying luxury goods, laundering money • Lucrative scams like tax identity fraud
  • 13. The market for stolen data has matured
  • 16. All driven by proven business strategies
  • 17. An overwhelming problem? • Not if we analyze security incidents • 2014 Verizon Data Breach Investigation Report • 92% of incidents categorized into 9 patterns – True for 100,000 incidents over 10 year period – True for 95% of breaches in the last 3 years
  • 18. The Big 9 • Point-of-sale intrusions • Web app attacks • Insider/privilege misuse • Physical theft and loss • Miscellaneous errors • Crimeware • Payment card skimmers • Denial of service • Cyber-espionage • Everything else
  • 19. Industry sectors not affected equally 34% 24% 21% 19% 2% Miscellaneous Insider Misuse Crimeware Theft/Loss Everything Else Just 4 main patterns where victim industry = Public 2014 Verizon Data Breach Investigation Report
  • 20. Let’s count down the top 4 • Miscellaneous • Insider and privilege misuse • Crimeware • Physical theft/loss • Everything else
  • 21. Pattern #4: Physical theft and loss • Cause of 19% of public sector security incidents • It’s people! • Screen, educate, supervise • Reduce impact by using encryption 11 36 39 102 108 140 308 892 Database Tapes Other Flash drive Desktop Documents Laptop Other 2014 Verizon Data Breach Investigation Report
  • 22. Pattern #3: Crimeware • Accounts for 21% • It’s people abusing technology • Can be solved with the right anti- malware strategy • Endpoint AND server scanning 1% 1% 1% 2% 2% 4% 5% 6% 38% 43% Removable media Unknown Remote injection Other Download by malware Email link Email attachment Network propogation Web download Web drive-by 2014 Verizon Data Breach Investigation Report
  • 23. Pattern #2: Insider and privilege misuse • 24% of incidents • Again it’s people! • Can be fixed! – Education – Awareness – Screening 1% 6% 6% 7% 7% 9% 13% 13% 17% 23% Auditor System admin Developer Other Executive Call center Manager Finance End-user Cashier 2014 Verizon Data Breach Investigation Report
  • 24. Pattern #1: Miscellaneous Errors • 34% of incidents • Human error! • Can be fixed! – Training – Awareness – Oversight 0.5% 1% 1% 1% 3% 3% 6% 20% 22% 44% Maintenance error Other Omission Gaffe Programming error Malfunction Misconfiguration Disposal error Publishing error Misdelivery 2014 Verizon Data Breach Investigation Report
  • 25. Strategy for doing better • Technologies and people working together • If they don’t you get: Target – Malware was detected – Exfiltration detected – But nobody reacted – Training and awareness? – Clearly lacking
  • 26. Security training and awareness • You need both, but what’s the difference? • Training – Ensure people at different levels of IT engagement have the knowledge they need • Awareness – Ensure all people at all levels know the threats and the defensive measures they must use
  • 27. Who gets trained? • Everyone, but not in the same way: – All-hands training – IT staff training – Security staff training
  • 28. How to deliver training • In person • Online • On paper • In house • Outside contractor • Mix and match • Be creative
  • 29. Incentives? • They work! – Drive engagement – Encourage compliance • But need reinforcement – Security in job descriptions – Evaluations – Rewards
  • 30. Use your internal organs • Of communication! • Newsletter • Internal social media • Physical posters • Add to meeting agendas • Email blasts
  • 31. How to do awareness • Make it fun • Make it relevant • Leverage the news • Remember: – Everyone now has a vested interested in staying current on threats to their/your data
  • 32. Awareness example: phish traps • Train on phishing • Send out a phishing message • Track responses • Report card and re- education – No naming & shaming
  • 33. Awareness example: flash phish • Train on media scanning • Sprinkle USB/flash drives – Sample file/autorun • Track results – Inserted? Scanned? Reported? • Rewards or re-education – Again, avoid name+shame
  • 34. Resources to tap • CompTIA • ISSA • SANS • (ISC)2 • Vendors • Websites
  • 36. Thank you! • Stephen Cobb • Stephen.cobb@eset.com • We Live Security • www.welivesecurity.com • Webinars • www.brighttalk.com/channel/1718 • Booth Number 826