SlideShare a Scribd company logo
1 of 42
Download to read offline
© 2015 Imperva, Inc. All rights reserved.
Top Cyber Security Trends
for 2016
Amichai Shulman, CTO, Imperva
December 16, 2015
© 2015 Imperva, Inc. All rights reserved.
Amichai Shulman – CTO, Imperva
•  Speaker at industry events
–  RSA, Appsec, Info Security UK, Black Hat
•  Lecturer on information security
–  Technion - Israel Institute of Technology
•  Former security consultant to banks and financial services firms
•  Leads the Imperva Application Defense Center (ADC)
–  Discovered over 20 commercial application vulnerabilities
–  Credited by Oracle, MSSQL, IBM and Others
2
Amichai Shulman one of InfoWorld’s “Top 25 CTOs”
© 2015 Imperva, Inc. All rights reserved.
Agenda
•  Introduction
•  2015 Forecast Score Card
•  2016 Cyber Security Trends
•  Summary and Conclusion
•  Q&A
3
© 2015 Imperva, Inc. All rights reserved.
2015 Score Card
4
Trend Score
1 Targeted attacks change their nature	
   A
2 Patching is going to become impossible A-
3 DDoS is growing at the Internet rate A
4 SSL is at a tipping point A-
© 2015 Imperva, Inc. All rights reserved.
2016 Cyber Security Trend #1:
IoT / BoT - Botnet of Things
1
5
© 2015 Imperva, Inc. All rights reserved.
BoT - Botnet of Things
6
© 2015 Imperva, Inc. All rights reserved.
Hacking the Fridge
7
© 2015 Imperva, Inc. All rights reserved.
Asking the Right Question
•  Can someone hack my toaster?
8
© 2015 Imperva, Inc. All rights reserved.
Asking the Right Question
•  Can someone hack my toaster? •  Can my network be attacked with a
shoe?
9
The Internet
of Things
A dramatic increase in
networked devices leads
to more opportunities for
ATTACK
The Internet
of Things
© 2015 Imperva, Inc. All rights reserved.
BoT - Botnet of Things
•  Connected IoT devices will never have “adequate” security
–  Device take over
–  Credential theft
•  Botnets can grow larger undetected
–  More opportunity – easier to form larger botnets
–  More DDoS as a Service opportunity
•  Possible increase in exposure from insiders
–  BYOD on steroids
–  Watch, wearables and others not as secure
–  More compromised devices in the vicinity of enterprise networks
11
© 2015 Imperva, Inc. All rights reserved.
Our Prediction
•  More people talking about the wrong problems
•  More “IoT” based botnets
•  More incidents to link personal credentials with IoT breaches
•  Highly sensitive companies starting to feel the pressure (not until the end of
the year)
12
© 2015 Imperva, Inc. All rights reserved.
2016 Cyber Security Trend #2:
Rise of Insider Threat
2
13
© 2015 Imperva, Inc. All rights reserved.
Rise of Insider Threat
14
Globally 89% of respondents felt that their organization was now more at
risk from an insider attack – Vormetric 2015
“55% of the Incidents from Internal Actors due to Privilege Abuse”
-Verizon DBIR 2015
MaliciousCarelessCompromised
© 2015 Imperva, Inc. All rights reserved.
Outside In
•  Personal attack surface is growing
–  Social, mobile, IoE
–  We are extremely exposed and extremely vulnerable
•  Engaged employees are a two way sword
–  Mix work and personal life
–  Most infections happen during office hours, 20% of infected machines attributed to
enterprise networks
•  End stations are increasingly vulnerable
–  Tracking the number of patched vulnerabilities in end point components suggests a
growing backlog with a constant fixing capacity
16
© 2015 Imperva, Inc. All rights reserved.
Inside Out
•  Shadow IT
–  Unmanaged Database servers
–  Partly commissioned SaaS applications
•  More employees and more collaboration
–  Barriers are taken down
•  Shared data repositories with trusted partners
•  Sensitive data is everywhere
–  Cloud applications provide direct access without IT control
–  Big data lakes
–  1000s of “traditional” databases
17
© 2015 Imperva, Inc. All rights reserved.
Our Predictions
•  Decrease in detection rates
–  Most solutions look for the tools and not the attack
–  Attackers have all the infrastructure in place to evade ANY solution that takes the
above approach
•  Increase in absolute number of attacks of internal nature
•  Large increase in total number and percentage of incidents of internal nature
18
© 2015 Imperva, Inc. All rights reserved.
2016 Cyber Security Trend #3:
Data Security for the Big and Small
3
19
© 2015 Imperva, Inc. All rights reserved.
Big Breaches = Big Price Tag
•  Cost of data breach is higher than anticipated
–  Target’s gross breach expenses totaled $252 million, insurance compensation brought that
down to $162 million
–  Home Depot expects $100 million in insurance payments toward $232 million in expenses
from its 2014 breach
–  Anthem breach expected to cost more than $100 millions
20
© 2015 Imperva, Inc. All rights reserved.
Big Breaches Start Small
•  Target breach started with a
compromised HVAC company
•  T-Mobile customer data breached
through Experian
•  JPMC customer data breached after
an affiliate was breached
•  Lockheed Martin breach through
RSA
21
© 2015 Imperva, Inc. All rights reserved.
Smaller Companies are Targets
•  While sophisticated, targeted attacks do exists they are a negligible minority
•  80% of infections stem from massive eMail campaigns
•  Smaller organizations are infected and compromised as much as larger ones
(or even more)
•  Attackers are aware of 3rd party relationships between large targets and
smaller service providers
•  Transfer of liabilities may prove to be devastating for a smaller 3rd party
22
© 2015 Imperva, Inc. All rights reserved.
Cyber Insurance is Not a Silver Bullet
•  Big breaches leave some of the costs uncovered
•  Insurance claims result in higher policy costs in the future
–  “Health insurers who suffered hacks are facing the most extreme increases, with some
premiums tripling at renewal time” - Bob Wice, a leader of Beazley Plc's cyber insurance
practice
•  Policy cost is detrimental for smaller business
–  Insurers are not proficient yet in assessing the risks
–  May consider making coverage conditional on a full and frequent assessment of
policyholder vulnerabilities (PwC Research)
–  Especially true for 3rd party liabilities
23
© 2015 Imperva, Inc. All rights reserved.
Our Predictions
•  Continuing on our previous prediction – smaller organizations are going to
continue falling prey in larger numbers
•  Expect more breaches to be attributed to 3rd party negligence
•  Big enterprises to start paying attention to security posture of 3rd parties
–  Set up standards / guidelines / requirements
–  Transfer liability in the event of a breach
•  Cyber insurance companies to attempt to set guidelines for data security
–  Penetrate the smaller business market
–  Must come up with a good actuary model based on standardized mitigation requirements
24
© 2015 Imperva, Inc. All rights reserved.
2016 Cyber Security Trend #4:
SSL More of a Problem than a Solution?
4
25
© 2015 Imperva, Inc. All rights reserved.
Subversion of Free SSL Certificates for Malware
26
© 2015 Imperva, Inc. All rights reserved.
Subversion of Free SSL Certificates for Malware
•  Easier to encrypt C&C communications
•  Fast flux DNS can now be used in conjunction with SSL
•  More certificates for more organizations = more opportunity for theft
–  More opportunity for impersonation and code signing
•  Free SSL certificates can significantly lower the cost of signed malware
–  Combined with automation will help them remain undetected
27
© 2015 Imperva, Inc. All rights reserved.
What (else) Could Possibly Go Wrong?
•  eDellRoot
•  Logjam
•  Schannel TLS Triple Handshake
Vulnerability - CVE-2015-6112
–  Add “Extended Master Secret”
•  Bar Mitzvah attack
–  RC4 under SSL is REALLY broken
•  SSL Pinning
–  Would invalidate NG Firewalls?
28
© 2015 Imperva, Inc. All rights reserved.
A Note on HTTP/2
•  Major complex revision of HTTP protocol
–  Keep semantics but replace everything under the hood
•  Intended for use over TLS
–  This part was not mandated by RFC but dictated by major browser vendors
•  Inconsistency between SPDY and HTTP/2 in the use of TLS extensions
•  New implementations that are not even based on the SPDY prototypes
•  Across all major servers and browsers
29
© 2015 Imperva, Inc. All rights reserved.
Our Predictions
•  Continuous growth in SSL implementation and design vulnerability flow
•  Increase in SSL usage and changes to CA infrastructure will benefit attackers
–  More attacks go undetected over network (SSL certificates)
–  More attacks go undetected inside end stations (code signing certificates)
•  New HTTP/2 vulnerability flow
–  We already have some in our lab
•  It’s going to be much worst before it becomes better
–  The foundation for secure traffic over the Internet must go through a drastic simplification
process
30
© 2015 Imperva, Inc. All rights reserved.
2016 Cyber Security Trend #5:
Ransomware/Blackmail – Flourishing
Business
5
31
© 2015 Imperva, Inc. All rights reserved.
Ransomware Business on Personal Devices
32
© 2015 Imperva, Inc. All rights reserved.
Ransomware Business on Personal Devices
33
•  CryptoWall 4.0 – enhanced and harder to detect
•  Once data is encrypted, unfortunately, not many options
–  Standard modern encryption used in the proper way (i.e. cannot be broken)
–  Reformat and restore from backup
•  Authorities set the right atmosphere
–  “To be honest, we often advise people just to pay the ransom.” – Assistant Special Agent
in Charge of the FBI’s CYBER and Counterintelligence Program
–  The success of the ransomware ends up benefitting victims (same as above)
–  Ransoms are low. And most ransomware scammers are good to their word (guess who…)
•  Criminals are netting an estimated $150 million a year through these scams
(FBI)
© 2015 Imperva, Inc. All rights reserved.
Ransom/Blackmail on Enterprises
34
© 2015 Imperva, Inc. All rights reserved.
DDoS as a Service
35
© 2015 Imperva, Inc. All rights reserved.
DDoS as a Service
•  Ransoms with threats of DDoS Attacks
•  Based on low end DDoS as a Service Providers
•  Simple execution
–  Go online
–  Purchase a monthly package
–  Launch short attacks
–  Send email
–  Collect money
36
© 2015 Imperva, Inc. All rights reserved.
Our Predictions
•  Unless authorities step in this is going to grow
•  May spill into the ICS / SCADA domain
•  Some gangs may choose to go after bigger prey
37
© 2015 Imperva, Inc. All rights reserved.
Summary
6
38
© 2015 Imperva, Inc. All rights reserved.
Our 2016 Predictions
•  IoT will start taking its toll on enterprises and individuals
–  Botnet of things
–  Credential theft through insecure devices
•  Rise of insider threat
–  Dramatic growth in successful attacks of insider nature
–  Due to increased attack rate and lower detection rates
•  Attackers go down the food chain
–  Increased attacks on smaller companies
–  Increased liability will drive data security needs
39
© 2015 Imperva, Inc. All rights reserved.
Our 2016 Predictions (cont.)
•  Continuous decay in security value of SSL
–  Coupled with new opportunities for attackers to abuse growing use of SSL
–  HTTP/2 vulnerability flow
•  Ransom/Blackmail as a business model
–  Fast growth business
–  May affect larger organizations and other domains (ICS / SCADA)
40
© 2015 Imperva, Inc. All rights reserved.
Recommendations
•  Cyber space is not going to become more secure this year
•  Enterprises must continue to invest in securing themselves, this goes down to
the smaller enterprises as well
•  Attackers are after data. This is where enterprises should invest their efforts of
protection
•  Once inside the organization attackers are not “attacking” but rather “abusing”.
Look for solutions that detect abuse rather than attack
•  Look for security as an overlay solution
–  Databases cannot defend themselves
–  Applications are not self defending
–  Networks cannot be defended against DDoS from inside the network
41
Top Cyber Security Trends for 2016

More Related Content

What's hot

ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
Charles Lim
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
EY
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
Nicolas Beyer
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 

What's hot (20)

ICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security GovernanceICION 2016 - Cyber Security Governance
ICION 2016 - Cyber Security Governance
 
Cyber Security Conference 2017
Cyber Security Conference 2017Cyber Security Conference 2017
Cyber Security Conference 2017
 
The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016The State Of Information and Cyber Security in 2016
The State Of Information and Cyber Security in 2016
 
Insights into cyber security and risk
Insights into cyber security and riskInsights into cyber security and risk
Insights into cyber security and risk
 
Enterprise Cyber Security 2016
Enterprise Cyber Security 2016Enterprise Cyber Security 2016
Enterprise Cyber Security 2016
 
2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting2015 Cybercrime Trends – Things are Going to Get Interesting
2015 Cybercrime Trends – Things are Going to Get Interesting
 
Securing the Cloud
Securing the CloudSecuring the Cloud
Securing the Cloud
 
Information & Cyber Security Risk
Information & Cyber Security RiskInformation & Cyber Security Risk
Information & Cyber Security Risk
 
Cyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & RecommendationsCyber Risk Management in 2017: Challenges & Recommendations
Cyber Risk Management in 2017: Challenges & Recommendations
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016 CYBER THREAT FORCAST 2016
CYBER THREAT FORCAST 2016
 
Making Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to NarrativesMaking Sense of Web Attacks: From Alerts to Narratives
Making Sense of Web Attacks: From Alerts to Narratives
 
CSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew RosenquistCSE 2016 Future of Cyber Security by Matthew Rosenquist
CSE 2016 Future of Cyber Security by Matthew Rosenquist
 
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA RegulationTop 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
Top 2020 Predictions: Cybersecurity Threats, Trends, and the CCPA Regulation
 
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
PAC Webinar - "Show me the money!" - evaluating market opportunities in cyber...
 
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew RosenquistTop 10 cybersecurity predictions for 2016 by Matthew Rosenquist
Top 10 cybersecurity predictions for 2016 by Matthew Rosenquist
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
Topic11
Topic11Topic11
Topic11
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 

Similar to Top Cyber Security Trends for 2016

SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
Norm Barber
 

Similar to Top Cyber Security Trends for 2016 (20)

Law Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your DataLaw Firm Cybersecurity: Practical Tips for Protecting Your Data
Law Firm Cybersecurity: Practical Tips for Protecting Your Data
 
SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)SAM05_Barber PW (7-9-15)
SAM05_Barber PW (7-9-15)
 
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob DavisLuncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
Luncheon 2015-11-19 - Lessons Learned from Avid Life Media by Rob Davis
 
Top Security Trends for 2014
Top Security Trends for 2014Top Security Trends for 2014
Top Security Trends for 2014
 
Cybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected AgeCybercrime - Stealing in the Connected Age
Cybercrime - Stealing in the Connected Age
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and FocusSecureSphere ThreatRadar: Improve Security Team Productivity and Focus
SecureSphere ThreatRadar: Improve Security Team Productivity and Focus
 
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS AttackAn Inside Look at a Sophisticated, Multi-vector DDoS Attack
An Inside Look at a Sophisticated, Multi-vector DDoS Attack
 
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONSIMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
IMPACT OF REMOTE WORK:NEW THREATS AND SOLUTIONS
 
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS AttackAn Inside Look at a Sophisticated Multi-Vector DDoS Attack
An Inside Look at a Sophisticated Multi-Vector DDoS Attack
 
Cerdant Security State of the Union
Cerdant Security State of the UnionCerdant Security State of the Union
Cerdant Security State of the Union
 
Cloud security
Cloud securityCloud security
Cloud security
 
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
Borderless Breaches and Migrating Malware: How Cybercrime is Breaking Down Ba...
 
Bordless Breaches and Migrating Malware
Bordless Breaches and Migrating MalwareBordless Breaches and Migrating Malware
Bordless Breaches and Migrating Malware
 
2016 trustwave global security report
2016 trustwave global security report2016 trustwave global security report
2016 trustwave global security report
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Using Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital RiskUsing Threat Intelligence to Address Your Growing Digital Risk
Using Threat Intelligence to Address Your Growing Digital Risk
 
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
C-Suite Snacks Webinar Series : Under Attack - Preparing Your Company in the ...
 

More from Imperva

More from Imperva (20)

Cybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 SurveyCybersecurity and Healthcare - HIMSS 2018 Survey
Cybersecurity and Healthcare - HIMSS 2018 Survey
 
API Security Survey
API Security SurveyAPI Security Survey
API Security Survey
 
Imperva ppt
Imperva pptImperva ppt
Imperva ppt
 
Beyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked accountBeyond takeover: stories from a hacked account
Beyond takeover: stories from a hacked account
 
Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds Research: From zero to phishing in 60 seconds
Research: From zero to phishing in 60 seconds
 
How We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over LunchHow We Blocked a 650Gb DDoS Attack Over Lunch
How We Blocked a 650Gb DDoS Attack Over Lunch
 
Survey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber SecuritySurvey: Insider Threats and Cyber Security
Survey: Insider Threats and Cyber Security
 
Companies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPRCompanies Aware, but Not Prepared for GDPR
Companies Aware, but Not Prepared for GDPR
 
Rise of Ransomware
Rise of Ransomware Rise of Ransomware
Rise of Ransomware
 
7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors7 Tips to Protect Your Data from Contractors and Privileged Vendors
7 Tips to Protect Your Data from Contractors and Privileged Vendors
 
SEO Botnet Sophistication
SEO Botnet SophisticationSEO Botnet Sophistication
SEO Botnet Sophistication
 
Phishing Made Easy
Phishing Made EasyPhishing Made Easy
Phishing Made Easy
 
Imperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense ReportImperva 2017 Cyber Threat Defense Report
Imperva 2017 Cyber Threat Defense Report
 
Combat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat IntelligenceCombat Payment Card Attacks with WAF and Threat Intelligence
Combat Payment Card Attacks with WAF and Threat Intelligence
 
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing ExponentiallyHTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
HTTP/2: Faster Doesn't Mean Safer, Attack Surface Growing Exponentially
 
Get Going With Your GDPR Plan
Get Going With Your GDPR PlanGet Going With Your GDPR Plan
Get Going With Your GDPR Plan
 
Cyber Criminal's Path To Your Data
Cyber Criminal's Path To Your DataCyber Criminal's Path To Your Data
Cyber Criminal's Path To Your Data
 
Combat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data SecurityCombat Today's Threats With A Single Platform For App and Data Security
Combat Today's Threats With A Single Platform For App and Data Security
 
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2: New attacks on the Internet’s Next Generation FoundationHacking HTTP/2: New attacks on the Internet’s Next Generation Foundation
Hacking HTTP/2 : New attacks on the Internet’s Next Generation Foundation
 
Gartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall WebinarGartner MQ for Web App Firewall Webinar
Gartner MQ for Web App Firewall Webinar
 

Recently uploaded

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 

Top Cyber Security Trends for 2016

  • 1. © 2015 Imperva, Inc. All rights reserved. Top Cyber Security Trends for 2016 Amichai Shulman, CTO, Imperva December 16, 2015
  • 2. © 2015 Imperva, Inc. All rights reserved. Amichai Shulman – CTO, Imperva •  Speaker at industry events –  RSA, Appsec, Info Security UK, Black Hat •  Lecturer on information security –  Technion - Israel Institute of Technology •  Former security consultant to banks and financial services firms •  Leads the Imperva Application Defense Center (ADC) –  Discovered over 20 commercial application vulnerabilities –  Credited by Oracle, MSSQL, IBM and Others 2 Amichai Shulman one of InfoWorld’s “Top 25 CTOs”
  • 3. © 2015 Imperva, Inc. All rights reserved. Agenda •  Introduction •  2015 Forecast Score Card •  2016 Cyber Security Trends •  Summary and Conclusion •  Q&A 3
  • 4. © 2015 Imperva, Inc. All rights reserved. 2015 Score Card 4 Trend Score 1 Targeted attacks change their nature   A 2 Patching is going to become impossible A- 3 DDoS is growing at the Internet rate A 4 SSL is at a tipping point A-
  • 5. © 2015 Imperva, Inc. All rights reserved. 2016 Cyber Security Trend #1: IoT / BoT - Botnet of Things 1 5
  • 6. © 2015 Imperva, Inc. All rights reserved. BoT - Botnet of Things 6
  • 7. © 2015 Imperva, Inc. All rights reserved. Hacking the Fridge 7
  • 8. © 2015 Imperva, Inc. All rights reserved. Asking the Right Question •  Can someone hack my toaster? 8
  • 9. © 2015 Imperva, Inc. All rights reserved. Asking the Right Question •  Can someone hack my toaster? •  Can my network be attacked with a shoe? 9
  • 10. The Internet of Things A dramatic increase in networked devices leads to more opportunities for ATTACK The Internet of Things
  • 11. © 2015 Imperva, Inc. All rights reserved. BoT - Botnet of Things •  Connected IoT devices will never have “adequate” security –  Device take over –  Credential theft •  Botnets can grow larger undetected –  More opportunity – easier to form larger botnets –  More DDoS as a Service opportunity •  Possible increase in exposure from insiders –  BYOD on steroids –  Watch, wearables and others not as secure –  More compromised devices in the vicinity of enterprise networks 11
  • 12. © 2015 Imperva, Inc. All rights reserved. Our Prediction •  More people talking about the wrong problems •  More “IoT” based botnets •  More incidents to link personal credentials with IoT breaches •  Highly sensitive companies starting to feel the pressure (not until the end of the year) 12
  • 13. © 2015 Imperva, Inc. All rights reserved. 2016 Cyber Security Trend #2: Rise of Insider Threat 2 13
  • 14. © 2015 Imperva, Inc. All rights reserved. Rise of Insider Threat 14 Globally 89% of respondents felt that their organization was now more at risk from an insider attack – Vormetric 2015 “55% of the Incidents from Internal Actors due to Privilege Abuse” -Verizon DBIR 2015
  • 16. © 2015 Imperva, Inc. All rights reserved. Outside In •  Personal attack surface is growing –  Social, mobile, IoE –  We are extremely exposed and extremely vulnerable •  Engaged employees are a two way sword –  Mix work and personal life –  Most infections happen during office hours, 20% of infected machines attributed to enterprise networks •  End stations are increasingly vulnerable –  Tracking the number of patched vulnerabilities in end point components suggests a growing backlog with a constant fixing capacity 16
  • 17. © 2015 Imperva, Inc. All rights reserved. Inside Out •  Shadow IT –  Unmanaged Database servers –  Partly commissioned SaaS applications •  More employees and more collaboration –  Barriers are taken down •  Shared data repositories with trusted partners •  Sensitive data is everywhere –  Cloud applications provide direct access without IT control –  Big data lakes –  1000s of “traditional” databases 17
  • 18. © 2015 Imperva, Inc. All rights reserved. Our Predictions •  Decrease in detection rates –  Most solutions look for the tools and not the attack –  Attackers have all the infrastructure in place to evade ANY solution that takes the above approach •  Increase in absolute number of attacks of internal nature •  Large increase in total number and percentage of incidents of internal nature 18
  • 19. © 2015 Imperva, Inc. All rights reserved. 2016 Cyber Security Trend #3: Data Security for the Big and Small 3 19
  • 20. © 2015 Imperva, Inc. All rights reserved. Big Breaches = Big Price Tag •  Cost of data breach is higher than anticipated –  Target’s gross breach expenses totaled $252 million, insurance compensation brought that down to $162 million –  Home Depot expects $100 million in insurance payments toward $232 million in expenses from its 2014 breach –  Anthem breach expected to cost more than $100 millions 20
  • 21. © 2015 Imperva, Inc. All rights reserved. Big Breaches Start Small •  Target breach started with a compromised HVAC company •  T-Mobile customer data breached through Experian •  JPMC customer data breached after an affiliate was breached •  Lockheed Martin breach through RSA 21
  • 22. © 2015 Imperva, Inc. All rights reserved. Smaller Companies are Targets •  While sophisticated, targeted attacks do exists they are a negligible minority •  80% of infections stem from massive eMail campaigns •  Smaller organizations are infected and compromised as much as larger ones (or even more) •  Attackers are aware of 3rd party relationships between large targets and smaller service providers •  Transfer of liabilities may prove to be devastating for a smaller 3rd party 22
  • 23. © 2015 Imperva, Inc. All rights reserved. Cyber Insurance is Not a Silver Bullet •  Big breaches leave some of the costs uncovered •  Insurance claims result in higher policy costs in the future –  “Health insurers who suffered hacks are facing the most extreme increases, with some premiums tripling at renewal time” - Bob Wice, a leader of Beazley Plc's cyber insurance practice •  Policy cost is detrimental for smaller business –  Insurers are not proficient yet in assessing the risks –  May consider making coverage conditional on a full and frequent assessment of policyholder vulnerabilities (PwC Research) –  Especially true for 3rd party liabilities 23
  • 24. © 2015 Imperva, Inc. All rights reserved. Our Predictions •  Continuing on our previous prediction – smaller organizations are going to continue falling prey in larger numbers •  Expect more breaches to be attributed to 3rd party negligence •  Big enterprises to start paying attention to security posture of 3rd parties –  Set up standards / guidelines / requirements –  Transfer liability in the event of a breach •  Cyber insurance companies to attempt to set guidelines for data security –  Penetrate the smaller business market –  Must come up with a good actuary model based on standardized mitigation requirements 24
  • 25. © 2015 Imperva, Inc. All rights reserved. 2016 Cyber Security Trend #4: SSL More of a Problem than a Solution? 4 25
  • 26. © 2015 Imperva, Inc. All rights reserved. Subversion of Free SSL Certificates for Malware 26
  • 27. © 2015 Imperva, Inc. All rights reserved. Subversion of Free SSL Certificates for Malware •  Easier to encrypt C&C communications •  Fast flux DNS can now be used in conjunction with SSL •  More certificates for more organizations = more opportunity for theft –  More opportunity for impersonation and code signing •  Free SSL certificates can significantly lower the cost of signed malware –  Combined with automation will help them remain undetected 27
  • 28. © 2015 Imperva, Inc. All rights reserved. What (else) Could Possibly Go Wrong? •  eDellRoot •  Logjam •  Schannel TLS Triple Handshake Vulnerability - CVE-2015-6112 –  Add “Extended Master Secret” •  Bar Mitzvah attack –  RC4 under SSL is REALLY broken •  SSL Pinning –  Would invalidate NG Firewalls? 28
  • 29. © 2015 Imperva, Inc. All rights reserved. A Note on HTTP/2 •  Major complex revision of HTTP protocol –  Keep semantics but replace everything under the hood •  Intended for use over TLS –  This part was not mandated by RFC but dictated by major browser vendors •  Inconsistency between SPDY and HTTP/2 in the use of TLS extensions •  New implementations that are not even based on the SPDY prototypes •  Across all major servers and browsers 29
  • 30. © 2015 Imperva, Inc. All rights reserved. Our Predictions •  Continuous growth in SSL implementation and design vulnerability flow •  Increase in SSL usage and changes to CA infrastructure will benefit attackers –  More attacks go undetected over network (SSL certificates) –  More attacks go undetected inside end stations (code signing certificates) •  New HTTP/2 vulnerability flow –  We already have some in our lab •  It’s going to be much worst before it becomes better –  The foundation for secure traffic over the Internet must go through a drastic simplification process 30
  • 31. © 2015 Imperva, Inc. All rights reserved. 2016 Cyber Security Trend #5: Ransomware/Blackmail – Flourishing Business 5 31
  • 32. © 2015 Imperva, Inc. All rights reserved. Ransomware Business on Personal Devices 32
  • 33. © 2015 Imperva, Inc. All rights reserved. Ransomware Business on Personal Devices 33 •  CryptoWall 4.0 – enhanced and harder to detect •  Once data is encrypted, unfortunately, not many options –  Standard modern encryption used in the proper way (i.e. cannot be broken) –  Reformat and restore from backup •  Authorities set the right atmosphere –  “To be honest, we often advise people just to pay the ransom.” – Assistant Special Agent in Charge of the FBI’s CYBER and Counterintelligence Program –  The success of the ransomware ends up benefitting victims (same as above) –  Ransoms are low. And most ransomware scammers are good to their word (guess who…) •  Criminals are netting an estimated $150 million a year through these scams (FBI)
  • 34. © 2015 Imperva, Inc. All rights reserved. Ransom/Blackmail on Enterprises 34
  • 35. © 2015 Imperva, Inc. All rights reserved. DDoS as a Service 35
  • 36. © 2015 Imperva, Inc. All rights reserved. DDoS as a Service •  Ransoms with threats of DDoS Attacks •  Based on low end DDoS as a Service Providers •  Simple execution –  Go online –  Purchase a monthly package –  Launch short attacks –  Send email –  Collect money 36
  • 37. © 2015 Imperva, Inc. All rights reserved. Our Predictions •  Unless authorities step in this is going to grow •  May spill into the ICS / SCADA domain •  Some gangs may choose to go after bigger prey 37
  • 38. © 2015 Imperva, Inc. All rights reserved. Summary 6 38
  • 39. © 2015 Imperva, Inc. All rights reserved. Our 2016 Predictions •  IoT will start taking its toll on enterprises and individuals –  Botnet of things –  Credential theft through insecure devices •  Rise of insider threat –  Dramatic growth in successful attacks of insider nature –  Due to increased attack rate and lower detection rates •  Attackers go down the food chain –  Increased attacks on smaller companies –  Increased liability will drive data security needs 39
  • 40. © 2015 Imperva, Inc. All rights reserved. Our 2016 Predictions (cont.) •  Continuous decay in security value of SSL –  Coupled with new opportunities for attackers to abuse growing use of SSL –  HTTP/2 vulnerability flow •  Ransom/Blackmail as a business model –  Fast growth business –  May affect larger organizations and other domains (ICS / SCADA) 40
  • 41. © 2015 Imperva, Inc. All rights reserved. Recommendations •  Cyber space is not going to become more secure this year •  Enterprises must continue to invest in securing themselves, this goes down to the smaller enterprises as well •  Attackers are after data. This is where enterprises should invest their efforts of protection •  Once inside the organization attackers are not “attacking” but rather “abusing”. Look for solutions that detect abuse rather than attack •  Look for security as an overlay solution –  Databases cannot defend themselves –  Applications are not self defending –  Networks cannot be defended against DDoS from inside the network 41