defending critical assets with deception
play

Defending Critical Assets with Deception Contact Us: - PowerPoint PPT Presentation

Defending Critical Assets with Deception Contact Us: https://www.illusivenetworks.com/contact sales@illusivenetworks.com Appearanes can be deceiving Confidential Confidential Who am I A Sr. Solutions Architect for Illusive Networks


  1. Defending Critical Assets with Deception Contact Us: https://www.illusivenetworks.com/contact sales@illusivenetworks.com Appearan¢es can be deceiving Confidential Confidential

  2. Who am I  A Sr. Solutions Architect for Illusive Networks based  Has over 22 years in the IT Industry  With over 17 years of cybersecurity experience with leading companies like CloudPassage, RSA Security, SilverTail Systems, HP ArcSight and Crossbeam Systems.  Assisted customers with Cloud Security, Incident Response, Penetration Testing, Anti-Fraud, Governance Risk and Compliance, and Security Architecture  Has developed and employed effective security strategies across several verticals including financial, healthcare, telecom, retail, industrial, as well as federal, state, and local government.  Chad is a proud husband and father to a 7 year old son a 5 year old daughter and a dog named Harper (don’t ask where the name came from) Chad J. Gasaway Illusive Networks | Sr. Systems Engineer Confidential Confidential chad@illusivenetworks.com

  3. Introduction “All warfare is based on deception. Hence, when we are able to attack, we must seem unable; when using our forces, we must appear inactive; when we are near, we must make the enemy believe we are far away; when far away, we must make him believe we are near.” ― Sun Tzu, The Art of War Confidential Confidential

  4. The Challenge Current environment • A Breach Will Occur - Assumed • Advanced Attacks are Top of Mind • Most of the security spend is on prevention • Attackers still make their way through all defenses Challenges • Security has become a big data problem • Budgets are tightening and resources are limited and tale nt is hard to find. • Actionable alerts are scarce - Alert Fatigue • Executive Management now have to answer to the Board Confidential Confidential

  5. 146 Confidential Confidential

  6. Only Need to be Right Once Enough to Get it Wrong Once Getting Easier Can’t Keep Pace Almost No Cost Cost of Defense is Skyrocketing Dynamic Predictable & Static No Rules Highly Regulated Confidential Confidential

  7. THE ASYMMETRIC ARENA VS VS 99/100 = LOSE the battle 1/100 = WIN the battle Organizations need to secure Attackers only need a single 360 degrees of their network to attack path to successfully protect their business infiltrate the network Confidential Confidential

  8. Attack Example: Ukrainian Power Grid Department of Homeland Security issued a formal report titled IR-ALERT-H-16-056-01. In the DHS report, three Ukrainian distribution companies experienced a coordinated cyber- attack that were executed within 30 minutes of each other. These attacks where directed primarily at the regional distribute level impacting over 225,000 customers. The motive and sophistication of the attacker was consistent with a highly organized and well-resourced adversary. The attacker varied tactics and techniques to “Match” the defenses and environment of the impacted target. Source: http://www.nerc.com/pa/CI/ESISAC/Documents/E-ISAC_SANS_Ukraine_DUC_18 Mar2016.pdf Confidential Confidential

  9. Attack Example: Ukrainian Power Outage Cont. • Access - Spear phishing to bypass automated controls or static policy and engage a “person”. • Recon/Exfiltrate - State sponsored modified variant of Black Energy Malware used for subversion of system resources, data collection and exfiltration and network monitoring. • Navigate - Leveraged stolen credentials from business networks to access VPN to Industrial Control System network (ICS). • Disrupt - Used modified killdisk freeware to erase master boot records and to delete logs. Scheduled service outages in UPS System. Denied telephone service by attacking the call center. Access Recon/Exfiltrate Navigate Disrupt Confidential Confidential

  10. Verizon 2016 DBIR – Attacker Trends Phishing continues to be the #1 way an attacker enters an environment Confidential Confidential

  11. Why does phishing work so well Phishing is Deception Phishing works off the same principles as social engineering. It removes static logic and pre-defined policy to engage the human and trigger a favorable emotional response. What is Phishing: Impersonation in an effort to fool people to respond to a call to action. Example: Click link, provide personal information, request access, provide credentials. Phishing Types: Deceptive Phishing: Impersonates a business Spear Phishing: Highly personalized with a specific target Whaling: Specifically targets CEO or high level employee Pharming: DNS Cache poisoning to redirect victim to a “Deceptive” website Confidential Confidential

  12. It’s all about the PEOPLE behind the attack Confidential Confidential

  13. FLIP THE ASYMMETRY THINK LIKE AN ATTACKER Confidential Confidential

  14. Just a matter of perspective Social Sciences Map Logical IT View Confidential Confidential

  15. 15 Confidential Confidential

  16. The keys are under the welcome matt ADMIN ACCOUN TS Confidential Confidential

  17. People and the Process • Originally developed for fighter pilots by military Observe strategist of the US Air Force Colonel John Boyd • A set of interacting loops that are kept in continuous operation during an engagement • Favors agility over raw power when dealing with The OODA human opponents in any endeavor Act Orient Loop • Works both ways! With current security models, how do we impact this process? Decide Confidential Confidential

  18. People and the Process Observe Deceptions What if we create a different reality for the attacker? What if we disorient the attacker? Automate Disorient What if we increase the probability that Forensic Attacker the attacker makes the wrong decision? Response What if we Act by automatically deploying forensics at the point where the decision was made? Decide Incorrectly Confidential Confidential

  19. Getting Answers To be successful the Attacker has to move After the attacker has entered the environment he must answer 3 questions for himself Establish Persistence Determine Credentials Endpoints Assets Context Identify user What is available Now that I am here How can I get there around me Confidential Confidential

  20. Turning the tables Deception techniques as a defensive strategy enables: • Create an environment where detection is nearly unavoidable • Reduce False positives • Actionable alerts enable automation. Confidential Confidential

  21. Thank You Contact Us: https://www.illusivenetworks.com/contact info@illusivenetworks.com Confidential Confidential

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend