ciso s guide to shutting down attacks using the dark web
play

CISOs Guide To Shutting Down Attacks Using The Dark Web Agenda The - PowerPoint PPT Presentation

CISOs Guide To Shutting Down Attacks Using The Dark Web Agenda The Dark Web: Whats At Stake Gain Visibility, Take Control Leveraging Splunk & Phantom Key Recommendations Agenda The Dark Web: Whats At Stake Gain


  1. CISO’s Guide To Shutting Down Attacks Using The Dark Web

  2. Agenda – The Dark Web: What’s At Stake – Gain Visibility, Take Control – Leveraging Splunk & Phantom – Key Recommendations

  3. Agenda – The Dark Web: What’s At Stake Gain Visibility, Take Control – Leveraging Splunk & Phantom – Key Recommendations –

  4. What Do We Know About The Dark Web?

  5. The Clear, Deep, and Dark Web Clear Web – Search engines – Media, blogs, etc. Deep Web – Unindexed by search engines – Webmail, online banking, corporate intranets, walled gardens, etc. Dark Web – Anonymous, closed sources, Telegram groups, invite-only (sometimes) – Tor, P2P, hacker forums, criminal marketplaces, C2s, etc.

  6. How Tor Works Black market + + + 2 4 1 + Cyber- crime 3 forum User’s TOR client picks a random path to destination server. RED links are encrypted BLUE links are in the clear.

  7. Tor Usage Statistics Source: The Tor project – https://metrics.torproject.org/

  8. Tor Usage Statistics Source: The Tor project – https://metrics.torproject.org/

  9. Tor Usage Statistics

  10. The User Experience Can Match Legitimate Sites

  11. Even Farmers Turn To The Dark Web

  12. Threats are mounting 278% Products for sale on black markets 297% Phishing websites 171% Compromised employee credentials 149% Stolen credit cards for sale on dark web

  13. Agenda The Dark Web: What’s At Stake – – Gain Visibility, Take Control Leveraging Splunk & Phantom – Key Recommendations –

  14. Our attack surface keeps growing IT

  15. Our attack surface keeps growing Shadow IT

  16. Our attack surface keeps growing Mobile Shadow IT

  17. Our attack surface keeps growing Social Mobile Shadow IT

  18. Our attack surface keeps growing Web Social Mobile Shadow IT

  19. Our attack surface keeps growing IoT, ?? Web Social Mobile Shadow IT

  20. Our attack surface keeps growing 3 rd parties 3 rd parties IoT, ?? Web Social Mobile Shadow IT

  21. Our attack surface keeps growing 4 th parties 4 th parties 3 rd parties 3 rd parties IoT, ?? Web Social Mobile Shadow IT

  22. Lack Of Visibility , Lack Of Control

  23. Reduce The “Mean -time-to- Remediate” Unprepared Risk impact Risk Responsive threshold Preventive Potential Emerging Crisis Recovery Event stage

  24. Turning External Data Into External “Intelligence” Intelligence How does it impact my organization? Analysis Information What are the trends and how does it connect? Processing & Organization Data What activity is taking place?

  25. What you’ll uncover: Compromised Credentials Employee credentials Customer logins Bank accounts

  26. What you’ll uncover: Stolen credit & gift cards

  27. What You’ll Uncover: Insider Threats

  28. What External Exposures Are Threats To You? 1) Data leakage: strategic IP, 6) Compromised credentials, customer & employee data, etc. account takeover 2) Malware-as-a-service, software 7) Phishing attacks and domain exploits, phishing kits squatting 3) Stolen and counterfeit products, 8) Insider threats – hiring and gift cards, credit cards coordination 4) Brand attacks: rogue apps, social 9) Third-party and IT vendor risk media weaponization 5) Doxxing and digital extortion, Exec/VIP targeting

  29. Bullet text here – Second level o Third level • Fourth level  Fifth level

  30. Tailor threat intelligence to your business .

  31. Tailor Your Threat Intelligence In Three Phases Analysis Collection Response IOC blocking Social media Algorithms CLEAR App stores Account resets Human Machine DIGITAL analysts Paste sites learning DEEP FOOTPRINT Phishing prevention Leaked DB’s Chat channels DARK Takedowns Threat actor Dark web forums research Black markets Card deactivation

  32. Automate Your Response – Execute takedown processes Social networks – Mobile app stores – Registrars, domain hosting providers – – Streamline card deactivations, password resets, reprovisioning – Automate credential validation checks and protocols – Integrate endpoint, gateway, and perimeter defenses – Prepare digital extortion decision trees, run scenario analyses

  33. Agenda The Dark Web: What’s At Stake – Gain Visibility, Take Control – – Leveraging Splunk & Phantom Key Recommendations –

  34. The Emergence Of Phishing Kits 2) 1) 3) Credential-stealing Website cloned Credentials script run from login collected in bulk page 4) 5) Zip file uploaded New phishing and unpacked for campaign w/ spoofed reuse website

  35. Shutdown Phishing Early In Attack Chain, Pre-Exploit – Monitor suspicious domains before they’re activated. – Automate the takedown process. The Cyber Kill Chain Pre-Compromise Post-Compromise Recon Deliver Control Maintain Weaponize Exploit Execute

  36. Phantom Playbook: Phishing Detect & Respond

  37. Splunk + IntSights For 360 ° Visibility

  38. Agenda The Dark Web: What’s At Stake – Gain Visibility, Take Control – Leveraging Splunk & Phantom – – Key Recommendations

  39. Embedding ETI Into Your Security Program What immediate challenges do we want to solve? ‒ Where are our assets & exposures? What do attackers see? ‒ What can we integrate or automate to improve our ‒ remediation? Internally and externally? How can we leverage threat intelligence in the long-term? ‒ What are expected outcomes in 6 months, 1 year, 3 years? ‒

  40. Recommendations 1) External threat intel improves SecOps – but only if it’s actionable and contextualized to your organization. 2) Define use-cases upfront; start with one or two. 3) Neutralize threats on their territory; mitigate risk pre- exploit.

  41. Thank You! Nick Hayes Get a live demo at Booth #158!

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend