SlideShare a Scribd company logo
1 of 21
Download to read offline
Insider Threat
Matthew McKinley, Technical
Product Marketing
mmckinley@lancope.com
(770) 225-6500
Insider Threat
Matthew McKinley, Technical
Product Marketing
mmckinley@lancope.com
(770) 225-6500
• Why am I interested in Insider Threat?
– Motives
– Types
• Who commits insider computer crimes and why do they do it?
• An observation
• Using StealthWatch to combat different insider threats
– The Kill Chain
– How can we see Insider Threats?
– Use Cases
• Lancope Pro Tip
3
Overview
© 2012 Lancope, Inc. All rights reserved.
4
Why am I interested in Insider Threats?
© 2012 Lancope, Inc. All rights reserved.
AlgoSec Survey of 182 IT Security Professionals
• Verizon 2012 Data Breach Investigations Report
• 2012
– 98% stemmed from external agents
– 4% implicated internal employees
• 2011
– 92% stemmed from external agents
– 17% implicated insiders
• 2010
– 70% stemmed from external agents
– 48% were caused by insiders
• Hacking in 2012
– 3% involved SQL Injection
– 55% involved default credentials
– 40% involved stolen credentials
– 29% involved brute force or dictionary attacks
5
Why Insider Threats? – The Verizon Breach
Report
© 2012 Lancope, Inc. All rights reserved.
6
What are the motives?
© 2012 Lancope, Inc. All rights reserved.
• 12 years of history
• Over 700 insider
threat cases
• IT Sabotage
– Average: $1.7 million
– Mean: $50,000
• IP Theft
– Average: $13.5
million
– Mean: $337,000
7
Insider Threats
© 2012 Lancope, Inc. All rights reserved.
• Much of the practice of computer security has to do with
making sure the doors are locked. We spent little effort trying
to find out if the bad guys are in.
– We tend to assume that if the bad guys are in, its game over.
• Systems will stop working or money will be instantly stolen. (This isn’t
always true.)
– It is useful to disrupt ongoing attacks even if you can’t prevent them.
• StealthWatch can help
8
An Observation
© 2012 Lancope, Inc. All rights reserved.
• A sophisticated attack on a network involves a series of steps
• Traditional thinking views any system compromise as a successful breach
• Any successful action taken to stop an infection prior to data exfiltration can be
considered a win
• This is the Kill Chain concept introduced by Mike Cloppert at Lockheed
• StealthWatch provides visibility at each stage of the chain
9
Visibility through out the Kill Chain
© 2012 Lancope, Inc. All rights reserved.
Recon
Exploitation
(Social Engineering?)
Initial
Infection
Internal
Pivot
Data
Preparation
& Exfiltration
Command
and
Control
• Seeing user activity
– Who, what, when, where
• Detecting data exfiltration
– Filtering suspicious events from normal network “noise”
• Detecting bad actors on the network
• Detecting other behavioral anomalies
– When activity on the network deviates from established norms, this
can be a sign of attack
– When hosts on the network behave in ways that they normally
wouldn’t or shouldn’t
10
Seeing the Insider Threat
What’s in the
bag, Mr.?
• Knowing
– Who it was – what do you know about this user?
– What they were using – was it an approved device?
– When they logged on – was it late at night?
– Where they logged on from – Locally? VPN?
• …is critical to combating the insider threat
• Cisco ISE Integration and the StealthWatch IDentity solution
provide this visibility
11
Monitoring User Activity
Who? What?When? Where?
• Who, what, when, and where is nice, but…
– What were they doing?
– NetFlow provides transactional information related to network events
• StealthWatch correlates user information with flow records to
add deeper context such as
– Who they were communicating with
– What apps they were using
12
Monitoring User Activity
Data from NetFlowApplication data
• Activity at strange times and strange durations can be suspect
• Alarms and thresholds automate the discovery process
13
Detecting Data Exfiltration
5 hour SSH connection??
• Who was it?
• How have
they behaved
in the past?
• StealthWatch
answers these
questions
• Pivot from charts to detail – the benefits of users + flow
• You’re not alone – pre-configured and configurable alarms
14
Detecting Data Exfiltration
Who? How Long?
To whom?
How much?
• NetFlow allows you to see all transactions on the network,
without having to decide what’s to be ignored
• Automated tools such as the worm tracker identify the source
and path of spreading malware
• The Concern Index highlights hosts that are behaving “oddly”
15
Bad Actors on the Network
• Alarms and informative graphics combine to provide visibility
into problems without the hassle of digging them out
mountains of data
16
Bad Actors on the Network
Alarm info
Source and spread of a
worm
• StealthWatch can help you:
– Perform targeted monitoring of employees who are “on the HR radar”
– Unusual Access Times (Could be any account)
– Access after termination (!) (accounts or open sessions)
– Monitor access to specific parts of the network
• Host Groups
– Monitor behaviors that show malicious activity
• SYN Floods
• Scanning
17
Use Case: Detecting IT Sabotage
© 2012 Lancope, Inc. All rights reserved.
See access from here
To here
• StealthWatch can help you:
– Monitor access to sensitive areas of the network with
• Host Groups
– Logins coming from another user’s machine (different user logins to
different systems from the same address)
– Long flows from sensitive servers to outside hosts
• Used in data loss detection
18
Use Case: Detecting Fraud
© 2012 Lancope, Inc. All rights reserved.
• Key window – 30 days before and after
resignation/termination
• 54% of CERT’s exfiltration cases occurred over the network
(most email)
• StealthWatch can help you spot:
– Email with large attachments to third party destinations
– Large amounts of traffic to the printer
– Useful for data Infiltration and Exfiltration
19
Use Case: Detect Theft of Intellectual
Property
© 2012 Lancope, Inc. All rights reserved.
• IT cannot address insider threat by itself
– People have a tendency to think that IT is solely responsible for all computer security issues.
• Legal: Are policies in place? Are they realistic? Does legal support IT practices?
• HR: Who is coming and going? Who has workplace issues? Are there soft solutions?
• IT: Is the privacy of end users adequately protected?
• What impact on workplace harmony are policies, monitoring, and enforcement having?
• Are you applying policies consistently?
20
Lancope Pro Tip: Combating Insider Threat
is a multidisciplinary challenge
© 2012 Lancope, Inc. All rights reserved.
IT
LEGALHR
Thank You
Matthew McKinley, Technical
Product Marketing
mmckinley@lancope.com
+1 (770) 225-6500

More Related Content

What's hot

Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
Kashif Semple
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Resilient Systems
 

What's hot (19)

5 Signs you have an Insider Threat
5 Signs you have an Insider Threat5 Signs you have an Insider Threat
5 Signs you have an Insider Threat
 
Insider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat DetectionInsider Threat Summit - The Future of Insider Threat Detection
Insider Threat Summit - The Future of Insider Threat Detection
 
Why Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level PriorityWhy Insider Threat is a C-Level Priority
Why Insider Threat is a C-Level Priority
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
 
Internal Threats: The New Sources of Attack
Internal Threats: The New Sources of AttackInternal Threats: The New Sources of Attack
Internal Threats: The New Sources of Attack
 
Insider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint PreziInsider Threat Final Powerpoint Prezi
Insider Threat Final Powerpoint Prezi
 
Ht t17
Ht t17Ht t17
Ht t17
 
The insider versus external threat
The insider versus external threatThe insider versus external threat
The insider versus external threat
 
Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?Insider Threats: Out of Sight, Out of Mind?
Insider Threats: Out of Sight, Out of Mind?
 
Insider Threat Detection Recommendations
Insider Threat Detection RecommendationsInsider Threat Detection Recommendations
Insider Threat Detection Recommendations
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Insider Threat
Insider ThreatInsider Threat
Insider Threat
 
SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
ObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity ManagementObserveIT Webinar: Privileged Identity Management
ObserveIT Webinar: Privileged Identity Management
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Incident Response: How To Prepare
Incident Response: How To PrepareIncident Response: How To Prepare
Incident Response: How To Prepare
 
Unintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric ColeUnintentional Insider Threat featuring Dr. Eric Cole
Unintentional Insider Threat featuring Dr. Eric Cole
 
Database Threats - Information System Security
Database Threats - Information System SecurityDatabase Threats - Information System Security
Database Threats - Information System Security
 
Data Security in Healthcare
Data Security in HealthcareData Security in Healthcare
Data Security in Healthcare
 

Similar to Identify and Stop Insider Threats

Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
Damir Delija
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Lastline, Inc.
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
Raffa Learning Community
 

Similar to Identify and Stop Insider Threats (20)

Hunting Attackers with Network Audit Trails
Hunting Attackers with Network Audit TrailsHunting Attackers with Network Audit Trails
Hunting Attackers with Network Audit Trails
 
Protecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber CrimeProtecting Financial Networks from Cyber Crime
Protecting Financial Networks from Cyber Crime
 
Security Breakout Session
Security Breakout Session Security Breakout Session
Security Breakout Session
 
2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection2023 NCIT: Introduction to Intrusion Detection
2023 NCIT: Introduction to Intrusion Detection
 
Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1Introduction to Cyber Forensics Module 1
Introduction to Cyber Forensics Module 1
 
Incident Response Fails
Incident Response FailsIncident Response Fails
Incident Response Fails
 
Računalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidenteRačunalna forenzika i automatizirani odgovor na mrežne incidente
Računalna forenzika i automatizirani odgovor na mrežne incidente
 
Honeypots.ppt
Honeypots.pptHoneypots.ppt
Honeypots.ppt
 
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
UMS Cybersecurity Awareness Seminar: Cybersecurity - Lessons learned from sec...
 
Honeypot
HoneypotHoneypot
Honeypot
 
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with LastlineReacting to Advanced, Unknown Attacks in Real-Time with Lastline
Reacting to Advanced, Unknown Attacks in Real-Time with Lastline
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes2014-09-03 Cybersecurity and Computer Crimes
2014-09-03 Cybersecurity and Computer Crimes
 
Network Security
Network SecurityNetwork Security
Network Security
 
Chapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptxChapter 2 - Lesson 2.pptx
Chapter 2 - Lesson 2.pptx
 
Wc4
Wc4Wc4
Wc4
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Incident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and CountermeasuresIncident response, Hacker Techniques and Countermeasures
Incident response, Hacker Techniques and Countermeasures
 
The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.The Threat Is Real. Protect Yourself.
The Threat Is Real. Protect Yourself.
 

More from Lancope, Inc.

Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
Lancope, Inc.
 

More from Lancope, Inc. (20)

Solving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective SecuritySolving the Visibility Gap for Effective Security
Solving the Visibility Gap for Effective Security
 
Network Security and Visibility through NetFlow
Network Security and Visibility through NetFlowNetwork Security and Visibility through NetFlow
Network Security and Visibility through NetFlow
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is Here
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Combating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside OutCombating Insider Threats – Protecting Your Agency from the Inside Out
Combating Insider Threats – Protecting Your Agency from the Inside Out
 
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
Intelligent Segmentation: Protecting the Enterprise with StealthWatch, Cisco ...
 
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatchDetecting Threats: A Look at the Verizon DBIR and StealthWatch
Detecting Threats: A Look at the Verizon DBIR and StealthWatch
 
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)So You Want a Threat Intelligence Function (But Were Afraid to Ask)
So You Want a Threat Intelligence Function (But Were Afraid to Ask)
 
Extending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the EndpointExtending Network Visibility: Down to the Endpoint
Extending Network Visibility: Down to the Endpoint
 
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly BreachesSave Your Network – Protecting Manufacturing Data from Deadly Breaches
Save Your Network – Protecting Manufacturing Data from Deadly Breaches
 
The Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident ResponseThe Seven Deadly Sins of Incident Response
The Seven Deadly Sins of Incident Response
 
Save Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly BreachesSave Your Network – Protecting Healthcare Data from Deadly Breaches
Save Your Network – Protecting Healthcare Data from Deadly Breaches
 
Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security Using Your Network as a Sensor for Enhanced Visibility and Security
Using Your Network as a Sensor for Enhanced Visibility and Security
 
Insider threats webinar 01.28.15
Insider threats webinar 01.28.15Insider threats webinar 01.28.15
Insider threats webinar 01.28.15
 
Protecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data BreachesProtecting the Crown Jewels from Devastating Data Breaches
Protecting the Crown Jewels from Devastating Data Breaches
 
The Library of Sparta
The Library of SpartaThe Library of Sparta
The Library of Sparta
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 
Looking for the weird webinar 09.24.14
Looking for the weird   webinar 09.24.14Looking for the weird   webinar 09.24.14
Looking for the weird webinar 09.24.14
 
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlowCisco CSIRT Case Study: Forensic Investigations with NetFlow
Cisco CSIRT Case Study: Forensic Investigations with NetFlow
 
SCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber GriefSCADA Security: The Five Stages of Cyber Grief
SCADA Security: The Five Stages of Cyber Grief
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 

Identify and Stop Insider Threats

  • 1. Insider Threat Matthew McKinley, Technical Product Marketing mmckinley@lancope.com (770) 225-6500
  • 2. Insider Threat Matthew McKinley, Technical Product Marketing mmckinley@lancope.com (770) 225-6500
  • 3. • Why am I interested in Insider Threat? – Motives – Types • Who commits insider computer crimes and why do they do it? • An observation • Using StealthWatch to combat different insider threats – The Kill Chain – How can we see Insider Threats? – Use Cases • Lancope Pro Tip 3 Overview © 2012 Lancope, Inc. All rights reserved.
  • 4. 4 Why am I interested in Insider Threats? © 2012 Lancope, Inc. All rights reserved. AlgoSec Survey of 182 IT Security Professionals
  • 5. • Verizon 2012 Data Breach Investigations Report • 2012 – 98% stemmed from external agents – 4% implicated internal employees • 2011 – 92% stemmed from external agents – 17% implicated insiders • 2010 – 70% stemmed from external agents – 48% were caused by insiders • Hacking in 2012 – 3% involved SQL Injection – 55% involved default credentials – 40% involved stolen credentials – 29% involved brute force or dictionary attacks 5 Why Insider Threats? – The Verizon Breach Report © 2012 Lancope, Inc. All rights reserved.
  • 6. 6 What are the motives? © 2012 Lancope, Inc. All rights reserved.
  • 7. • 12 years of history • Over 700 insider threat cases • IT Sabotage – Average: $1.7 million – Mean: $50,000 • IP Theft – Average: $13.5 million – Mean: $337,000 7 Insider Threats © 2012 Lancope, Inc. All rights reserved.
  • 8. • Much of the practice of computer security has to do with making sure the doors are locked. We spent little effort trying to find out if the bad guys are in. – We tend to assume that if the bad guys are in, its game over. • Systems will stop working or money will be instantly stolen. (This isn’t always true.) – It is useful to disrupt ongoing attacks even if you can’t prevent them. • StealthWatch can help 8 An Observation © 2012 Lancope, Inc. All rights reserved.
  • 9. • A sophisticated attack on a network involves a series of steps • Traditional thinking views any system compromise as a successful breach • Any successful action taken to stop an infection prior to data exfiltration can be considered a win • This is the Kill Chain concept introduced by Mike Cloppert at Lockheed • StealthWatch provides visibility at each stage of the chain 9 Visibility through out the Kill Chain © 2012 Lancope, Inc. All rights reserved. Recon Exploitation (Social Engineering?) Initial Infection Internal Pivot Data Preparation & Exfiltration Command and Control
  • 10. • Seeing user activity – Who, what, when, where • Detecting data exfiltration – Filtering suspicious events from normal network “noise” • Detecting bad actors on the network • Detecting other behavioral anomalies – When activity on the network deviates from established norms, this can be a sign of attack – When hosts on the network behave in ways that they normally wouldn’t or shouldn’t 10 Seeing the Insider Threat What’s in the bag, Mr.?
  • 11. • Knowing – Who it was – what do you know about this user? – What they were using – was it an approved device? – When they logged on – was it late at night? – Where they logged on from – Locally? VPN? • …is critical to combating the insider threat • Cisco ISE Integration and the StealthWatch IDentity solution provide this visibility 11 Monitoring User Activity Who? What?When? Where?
  • 12. • Who, what, when, and where is nice, but… – What were they doing? – NetFlow provides transactional information related to network events • StealthWatch correlates user information with flow records to add deeper context such as – Who they were communicating with – What apps they were using 12 Monitoring User Activity Data from NetFlowApplication data
  • 13. • Activity at strange times and strange durations can be suspect • Alarms and thresholds automate the discovery process 13 Detecting Data Exfiltration 5 hour SSH connection?? • Who was it? • How have they behaved in the past? • StealthWatch answers these questions
  • 14. • Pivot from charts to detail – the benefits of users + flow • You’re not alone – pre-configured and configurable alarms 14 Detecting Data Exfiltration Who? How Long? To whom? How much?
  • 15. • NetFlow allows you to see all transactions on the network, without having to decide what’s to be ignored • Automated tools such as the worm tracker identify the source and path of spreading malware • The Concern Index highlights hosts that are behaving “oddly” 15 Bad Actors on the Network
  • 16. • Alarms and informative graphics combine to provide visibility into problems without the hassle of digging them out mountains of data 16 Bad Actors on the Network Alarm info Source and spread of a worm
  • 17. • StealthWatch can help you: – Perform targeted monitoring of employees who are “on the HR radar” – Unusual Access Times (Could be any account) – Access after termination (!) (accounts or open sessions) – Monitor access to specific parts of the network • Host Groups – Monitor behaviors that show malicious activity • SYN Floods • Scanning 17 Use Case: Detecting IT Sabotage © 2012 Lancope, Inc. All rights reserved. See access from here To here
  • 18. • StealthWatch can help you: – Monitor access to sensitive areas of the network with • Host Groups – Logins coming from another user’s machine (different user logins to different systems from the same address) – Long flows from sensitive servers to outside hosts • Used in data loss detection 18 Use Case: Detecting Fraud © 2012 Lancope, Inc. All rights reserved.
  • 19. • Key window – 30 days before and after resignation/termination • 54% of CERT’s exfiltration cases occurred over the network (most email) • StealthWatch can help you spot: – Email with large attachments to third party destinations – Large amounts of traffic to the printer – Useful for data Infiltration and Exfiltration 19 Use Case: Detect Theft of Intellectual Property © 2012 Lancope, Inc. All rights reserved.
  • 20. • IT cannot address insider threat by itself – People have a tendency to think that IT is solely responsible for all computer security issues. • Legal: Are policies in place? Are they realistic? Does legal support IT practices? • HR: Who is coming and going? Who has workplace issues? Are there soft solutions? • IT: Is the privacy of end users adequately protected? • What impact on workplace harmony are policies, monitoring, and enforcement having? • Are you applying policies consistently? 20 Lancope Pro Tip: Combating Insider Threat is a multidisciplinary challenge © 2012 Lancope, Inc. All rights reserved. IT LEGALHR
  • 21. Thank You Matthew McKinley, Technical Product Marketing mmckinley@lancope.com +1 (770) 225-6500