PR PROACTIVE CTIVE SE SECUR CURITY ITY: : DATA A BREA BREACH - - PowerPoint PPT Presentation

pr proactive ctive se secur curity ity data a
SMART_READER_LITE
LIVE PREVIEW

PR PROACTIVE CTIVE SE SECUR CURITY ITY: : DATA A BREA BREACH - - PowerPoint PPT Presentation

PR PROACTIVE CTIVE SE SECUR CURITY ITY: : DATA A BREA BREACH CH ASSE ASSESSM SSMENT ENT CyberSecurity Chicago September 2018 Security In The News Frequency and severity of cyber security news on the rise 2 PROPRIETARY AND


slide-1
SLIDE 1

PR PROACTIVE CTIVE SE SECUR CURITY ITY: : DATA A BREA BREACH CH ASSE ASSESSM SSMENT ENT

CyberSecurity Chicago September 2018

slide-2
SLIDE 2

PROPRIETARY AND CONFIDENTIAL 2

Security In The News

Frequency and severity of cyber security news on the rise

slide-3
SLIDE 3

PROPRIETARY AND CONFIDENTIAL 3

Understanding The Problem

Enterprise Strategy Group (ESG) – Project Overview

  • Cybersecurity Realities and Priorities for 2018 and Beyond

– 413 completed online surveys with cybersecurity and IT respondents with influence over cybersecurity decision-making/strategy at their organization – Enterprise (2,500 or more employees and $100 million or more in annual revenue in US and 1,000 or more employees and $50 million or more in annual revenue

  • utside of US) organizations in United States, United Kingdom and Australia
  • 61% United States, 20% United Kingdom, 20% Australia

– Multiple industry verticals including manufacturing, financial, retail/wholesale and health care, among others

(source: ESG – Cybersecurity Realities and Priorities for 2018 and Beyond)

slide-4
SLIDE 4

PROPRIETARY AND CONFIDENTIAL 4

Understanding The Problem

Most Significant Impact on Security Strategy

31% 36% 37% 37% 37% The need to support new business initiatives Need to balance application/network performance and security requirements The need to support new IT initiatives Proactively minimizing and mitigating risks Preventing/detecting malware threats

Which of the following factors have the most significant impact on shaping your organization’s security strategy? (Percent of respondents, N=413, three responses accepted)

(source: ESG – Cybersecurity Realities and Priorities for 2018 and Beyond)

slide-5
SLIDE 5

PROPRIETARY AND CONFIDENTIAL 5

Understanding The Problem

Why Cybersecurity Has Become More Difficult Over the Past Two Years

29% 32% 34% 38% 42% An increase in network traffic An increase in the number of devices connecting to the network An increase in the number of targeted attacks that may circumvent traditional network security controls An increase in the number of new IT initiatives has made it difficult to keep up with cybersecurity An increase in malware volume and sophistication

You indicated that cybersecurity has become more difficult over the last two years. In your opinion, which of the following factors have had the greatest impact on increasing cybersecurity difficulty? (Percent of respondents, N=326, three responses accep

(source: ESG – Cybersecurity Realities and Priorities for 2018 and Beyond)

slide-6
SLIDE 6

PROPRIETARY AND CONFIDENTIAL 6

Understanding The Problem

Areas of Cybersecurity Budget Change for 2018

(source: ESG – Cybersecurity Realities and Priorities for 2018 and Beyond)

22% 28% 31% 34% 36% 46% 46% 39% 43% 44% 50% 50% 41% 45% 37% 27% 23% 16% 12% 12% 7% 2% 2% 1% 1% 1% 1% 1% 1%

0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100%

Personnel Training Host-based security Security testing/validation Application/database security Cloud security Network security

You stated that your organization’s cybersecurity budget will go up in 2018. Please indicate how the cybersecurity budget will change in each of the following areas: (Percent of respondents, N=413)

Increase significantly from 2017 Increase somewhat from 2017 Remain about the same as 2017 Decrease somewhat from 2017 Decrease significantly from 2017

slide-7
SLIDE 7

PROPRIETARY AND CONFIDENTIAL 7

Understanding The Problem

Why Organizations Conduct More Security Testing

(source: ESG – Cybersecurity Realities and Priorities for 2018 and Beyond)

12% 20% 22% 28% 29% 29% 33% 33% 33% 34% Third-party customers have mandated that we do security testing more often My organization has purchased cyber insurance and we are obligated to do more security testing in support of this My organization suffered a security breach which led us to do more frequent security proactive testing Our security budget has increased recently, freeing up funds for more security testing Business managers are more involved with cybersecurity and they require us to do more security testing for risk assessment purposes We’ve implemented new types of production applications over the past two years We must perform security testing more often as part of regulatory compliance Our CISO (or similar senior position) has pushed the organization to do more proactive security testing Many of our application workloads now reside in the cloud so we felt it was important to increase security testing in support of using cloud infrastructure services We have come to believe that frequent security testing is a best practice

You indicated that your organization does more security testing today than it did two years ago. Which of the following factors most contributed to this increase? (Percent of respondents, N=372, three responses accepted)

slide-8
SLIDE 8

PROPRIETARY AND CONFIDENTIAL 8

Understanding The Problem

The Bigger Truth

  • Traditional cybersecurity strategies are not working

– Cybersecurity grows incrementally more difficult – Organizations are understaffed and lack the right skills

  • “An ounce of prevention is worth a pound of cure”

– Security is “moving to the left” – More comprehensive testing – Proactivity

  • Changes are happening

– CISO responsibilities – Transition to cloud computing – Budget increases – SaaS

(source: ESG – Cybersecurity Realities and Priorities for 2018 and Beyond)

slide-9
SLIDE 9

PROPRIETARY AND CONFIDENTIAL 9

Data Breach Assessment

Data Breach Statistics

  • There has been the consistent rise over the past

few years in the total number of data breaches

– Massive data breaches like Equifax, Yahoo, or Target expose or compromise sensitive information on the

  • rder of millions, or even billions of accounts

– 2017 was a record-breaking year with a total of 5,207 data breaches, exposing nearly 8 billion information records (source: Dark Reading)

slide-10
SLIDE 10

PROPRIETARY AND CONFIDENTIAL 10

“The art of war teaches us to rely not on the likelihood

  • f the enemy’s not coming,

but on our own readiness to receive him”

– Sun Tzu, The Art of War

slide-11
SLIDE 11

PROPRIETARY AND CONFIDENTIAL 11

Automated Purple Team Assessments

Continual validation of your network’s threat landscape

  • Define your topology including zone details

and begin to perform automated red vs. blue assessments

  • Data Breach Assessment can leverage

knowledge of zone to tailor its executed exploits and malware to your environment

  • Meet / prepare for regulatory compliance

requirements with continual assessments

Assess your threat landscape and find the holes before the bad guys do

slide-12
SLIDE 12

PROPRIETARY AND CONFIDENTIAL 12

Emulation over Simulation

When you look closely you can tell it isn’t real…

  • Emulation – reproduction of the exact scenario such that

it is a recreation or replicate and indistinguishable from the original

  • Simulation – fabrication of a scenario with the goal to

mimic or resemble said scenario that it could be passable if not evaluated closely

  • Solutions in the market today leverage pcap replay (i.e.,

simulation) which can lead to incorrect results and false sense of security

Only use emulated attacks and malware

slide-13
SLIDE 13

PROPRIETARY AND CONFIDENTIAL 13

Evasion Techniques

Evade detection by leveraging attacker techniques

  • Hide your attacks in plain sight by

using tried and true techniques used by attackers to evasion detection

  • Validate all techniques across all

attack vectors (including exploits and malware) to confirm your security solutions cannot be easily bypassed

Confirm security solutions cannot be easily fooled by evasion techniques

slide-14
SLIDE 14

PROPRIETARY AND CONFIDENTIAL 14

Active Monitoring

Know the impacts of security content inspection in real-time

  • Assess the impacts of security inspection by

generating legitimate, hyper-realistic emulated traffic for the same services you are protecting

  • Limit the impact to users by finding security

policies that degrade performance and do not provide additional security coverage

Fine tune your security policies with active monitoring

slide-15
SLIDE 15

PROPRIETARY AND CONFIDENTIAL 15

Secure communications without compromising them

  • Verify that security solutions don’t just block

all files of that filetype but actually inspect them to stop the malicious ones without impact to your user’s daily work

  • Validate that intellectual property and other

sensitive file content (e.g., SSNs, credit card numbers) does not leave your network Security Device

IP/DLP

Verify data loss policies across filetypes and network vectors

False Positive And Data Loss Prevention Verification

slide-16
SLIDE 16

PROPRIETARY AND CONFIDENTIAL 16

Internet Corporate LAN Secure Datacenter

Allowed Denied Firewall Policies

Evaluating Multi-Tier Security Protection

Emulating Scenarios That Look and Feel Like An Attacker

Multi-path Attack – Data Loss Prevention (DLP)

1. User browses to the Internet and accesses a website controlled by the attacker 2. User laptop is compromised and is under the control of the attacker 3. The attacker pivots and attacks a server within the secure datacenter 4. Once compromised, the attacker can control the internal server and send data

  • utbound to servers

controlled by the attacker

slide-17
SLIDE 17

PROPRIETARY AND CONFIDENTIAL 17

Data Breach Assessment

Example deployment for emulating data loss prevention

1. Corporate LAN agent attempts to download malware scenarios from Cloud agent 2. Corporate LAN agent successful in downloading a Petya variant 3. Corporate LAN begins to run attacks to Secure Datacenter agent 4. Corporate LAN is successful in executing Apache Struts exploit 5. Secure Datacenter agent attempts to exfiltrate data to Cloud agent 6. Secure Datacenter agent is successful in data exfiltration using DoublePulsar C&C communications channel

1 2 3 4 5 6

slide-18
SLIDE 18

PROPRIETARY AND CONFIDENTIAL 18

Data Breach Assessment

Example deployment for emulating data loss prevention

Attacks and malware that were detected by NGFW during assessment Attacks and malware that were blocked by NGFW during assessment

slide-19
SLIDE 19

Data Breach Assessment

Data Breach Assessment

A Data Brach Assessment strategy allows you to automate your purple team assessments leveraging hyper-realistic emulated attacks and malware applying evasion techniques to confirm your security effectiveness while actively monitoring for no impact to your user experience including zero false positives.

slide-20
SLIDE 20

PROPRIETARY AND CONFIDENTIAL 20

Security Assurance

Reduce risk

Spirent provides intelligence required to proactively elevate defenses & customer experience while radically reducing risk and maximizing operating expenses.

Accelerate time to market

Spirent reduces time and costs to develop and launch new products and networks.

Automated Testing Continuous Monitoring About Spirent

slide-21
SLIDE 21

PROPRIETARY AND CONFIDENTIAL 21

PenTesting and Vulnerability Scanning to Identify and Mitigate Risk Security and Performance Testing for App-Aware Solutions

About Spirent

Spirent Security Solutions mike.jack@spirent.com