Digital Guardian CISO Mentoring Webinar Series
Stories From the CISO Trenches
1
Mentoring Webinar Series Stories From the CISO Trenches 1 About - - PowerPoint PPT Presentation
Digital Guardian CISO Mentoring Webinar Series Stories From the CISO Trenches 1 About Larry Brock Principal at Brock Cyber Security Consulting LLC Former Global Chief Information Security Officer (CISO) at DuPont (11 years) Held
Digital Guardian CISO Mentoring Webinar Series
Stories From the CISO Trenches
1▪ Principal at Brock Cyber Security Consulting LLC ▪ Former Global Chief Information Security Officer (CISO) at DuPont (11 years) ▪ Held additional IT, Research and Marketing Positions at DuPont ▪ Information Security Officer within the U.S. Air Force. NSA ▪ Mr. Brock has BS and MS degrees in Electrical Engineering ▪ Certified Information Security Manager (CISM)
About Larry Brock
About Bill Bradley
3Bill Bradley
Director, Product Marketing
▪ Leads Product Marketing for DLP ▪ 20 Years of Marketing & Sales Experience
Product Marketing & Management
▪ Previously at Rapid7 and General Electric
Larry Brock Principal BCS Consulting
▪The Risks and Executive Repercussions ▪Practical Protection Elements ▪Illustrative Moments as a CISO
▪ Visibility into the Crown Jewels ▪ Changing the Tide ▪ The Importance of Prioritization
▪Final Thoughts
Agenda
▪Trade Secrets ▪Destructive Value ▪Competitive Position ▪Customer List ▪Purchasing Contracts ▪Credit Card Information ▪Health Information ▪Employee Information ▪Customer Information ▪Cash
Where is The Value Within Your Organization?
Who Are the Typical Actors?
Source: Corruption Perceptions Index
Internal External
Mistakes By Loyal Employees Or Contractors Careless Employees, Contractors, or Suppliers Disgruntled Current Employees Disgruntled Former Employees Competitors Hacktivists Foreign Governments
143 Million 57 Million 3 Billion 40 Million
Cyber Attacks and Senior Executive Accountability
Practical Protection Elements
7 Elements to manage risks, organize/manage objectives and reporting
(Source
+1. Regular Risk Assessments
Elements of a Holistic Protection Program
Leadership Must Be Engaged In Protection Program! Ideal Intellectual Property Governance Structure A. CEO Has Ownership With Board Routinely Engaged
▪ Actions: Data Protection Included In Routine Reviews With Businesses And Functions
B. Governance Team: Recommends Corporate Info Protection Policy
▪ Actions: Approve Program Plans, Eliminate Barriers, Influence Executive Peers…
C. Cross-Functional IP Risk Team
▪ Lead By Corporate Process Leader; Includes Leaders From Info Security , Corp Security, Compliance, Select Business Functions
D. Business & Functional IP Protection Leadership Team (Global)
▪ Leader For Every Business And Function (E.G. R&D, Engineering, Legal, HR, Ops). ▪ Actions: Education, Identification, Classification, Protection Initiatives, Business Process Changes
High-Level Responsibility
▪The Crown Jewels ▪Going Against the Tide ▪The Importance of Prioritization
Illustrative Moments
Visibility into the Crown Jewels
(and their value)
Salesforce, Dropbox)
Visibility into the Crown Jewels
▪Open and Collaborative Environment
▪ Drive Productivity, Efficiency, Innovation, and Growth
▪Visibility is Good for Security Teams; Also Good for Employees ▪Spotted an Incident In-Process ▪Swing the Pendulum The Other Way… Without Negative Impacts
Changing the Tide
Cannot focus on just keeping the bad guys out, must focus on keeping your valuables from leaving ▪ Consider authentication for outbound access to Internet ▪ Block/Restrict outbound protocols (FTP, SSH, Telnet) ▪ Restrict access to “uncategorized” web sites ▪ Block server access to Internet or white-list the few that need it ▪ Block HTTPS connections to sites with self-signed certificates ▪ Restrict use of file sharing sites (Dropbox), Skype and personal web-mail unless additional controls are in place ▪ Must control content when PCs or mobile devices leave corporate environment
Changing the Tide
▪IP Heavy Organization
▪ Granted 900+ patents in 2011 ▪ Over 50,000 active patents today
▪Employee Data
▪ PII, PCI, PHI
▪Internal and External Threats
The Importance of Prioritization
▪Monitor Inbound Files For Malware ▪Monitor, Alert, And Block (When Possible) Unusual Activities ▪Security Information & Event Management ▪Strong Analytical Capability To Detect Anomalous Activities (C&C)
Improve Your Ability To Detect Both Insider And Cyber-attacks
▪ All Companies Should Assume Both Insider And Cyber Attacks Are Occurring ▪ No “Silver Bullet” Solutions – Requires A Comprehensive Approach
▪ Process, People, And Technology ▪ Leverage Frameworks And Standards (ITIL, ISO 27K, …)
▪ Most Advanced Cyber Attacks Involve Compromising Privileged Credentials
▪ Implementing Strong Controls For All Privileged Accounts, Including End-point Devices, Is Necessary To Have Any Chance On Defending Against Today’s Threats
▪ Classical Security Controls (AV, FW, IPS, Etc) Are Still Necessary But Insufficient For Today’s Threats ▪ Collaborate To Learn About Attackers And Best Defenses – You Cannot Fight This Alone! ▪ This Is A Long-term Issue And Requires Continuous Improvements As Adversaries Change Approaches
Final Thoughts…
Digital Guardian CISO Mentoring Webinar Series
20
Agenda
▪ Week 1 - Digital Guardian to Up Your Game ▪ Week 2 - Digital Guardian and Strategic Data Protection ▪ Week 3 - Digital Guardian and Documented Improvement
Digital Guardian and Documented Improvement
Customer Success Stories
22Digital Guardian Success Stories
▪ Going Rogue ▪ Visibility ▪ Consolidated
23Identifying and Stopping Rogue a Employee
24Evolution of an Insider Attack
May
Hacker Tool Downloads
October
Compromised 5 Hosts
August
Installed Keyboard Logger on Personal PC
December
Compromised 3 Hosts
June
Employee Termination
May
EDR Installed EDR Detection
Business Wide Data Visibility and IP Protection
25Consolidated EDR and DLP
26First & Only Unified Internal & External Risk Visibility
27Endpoint Detection & Response Data Loss Prevention User & Entity Behavior Analytics
Single Console; Single Agent
Digital Guardian Sees All Risks to Your Data
28A Recognized Leader. Just ask Gartner and Forrester
Digital Guardian is the only Leader in both Enterprise Data Loss Prevention and Endpoint Detection & Response
Magic Quadrant Leader Wave Leader
Thank You.
Larry Brock Principal BCS Consulting
Digital Guardian’s Next Webinar:
Understand, Deploy, and Hunt with MITRE’s ATT&CK Framework
The blueprint for repeatable threat hunting success
▪ December 12 @ 1:00 PM ET
▪ Watch this webcast to learn:
your security knowledge
31Register: https://info.digitalguardian.com/webinar-understand-deploy-hunt-with-mitre-attck-framework.html