SlideShare a Scribd company logo
1 of 22
Download to read offline
ADDRESSING THE BREACH
Offloading Non-Essential and Vendor Applications to
Application-Specific, Parallel Networks Using 4G LTE
June 17, 2014
Lindsay Notwell
VP, Operator & International Business
CradlePoint
Contact:
lnotwell@cradlepoint.com
M200
Circa 2006
OUR COMPANY
The trusted global leader in enterprise-grade 4G-LTE
networking solutions for distributed enterprise
2CradlePoint Proprietary and Confidential • © 2014 CradlePoint, Inc. • All Rights Reserved. Information subject to change without notice.
INDUSTRY AWARDS
2014 Top 20
Retail IT Solutions
OPERATOR PARTNERS
Focus: Enterprise grade cloud
managed 3G/4G/LTE solutions
Advantages:
Performance
Protocols
Efficiency
DIFFERENTIATION
Security
WiFi
Flexibility
KiosksC-Stores
OUR CUSTOMERS
Distributed Enterprises with Hundreds and Thousands of Locations
3
RestaurantsRetail Stores Digital Signage TransportationBranch Offices
CradlePoint Proprietary and Confidential • © 2014 CradlePoint, Inc. All Rights Reserved. • Information subject to change without notice.
Key Challenges
No Local IT Support
PCI Compliance
WiFi & Mobility
Cloud-based Apps
Business Continuity
RETAIL
BRANCH OFFICE KIOSKS, SIGNAGE, ETC TRANSPORTATION
OUR RECORD OF SUCCESS
Over 1,000,000 deployments with leading distributed enterprises
4CradlePoint Proprietary and Confidential • © 2014 CradlePoint, Inc. All Rights Reserved. • Information subject to change without notice.
Internet /
Private Network
5CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
TYPICAL BRANCH OFFICE
Server
Employee
Tablet
Back
Office
Customer
Area
Equip
Room
Customer
Smartphone
Primary Network (WAN)
Typically T1, DSL or Cable
Internet /
Private Network
6CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
WITH 3G/4G RESILIENCY
Server
Employee
Tablet
Back
Office
Customer
Area
Equip
Room
Customer
Smartphone
Primary Network (WAN)
Typically T1, DSL or Cable
Failover Connection
4G-LTE as a backup WAN connection
4G-LTE
Internet /
Private Network
7CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
THE MONOLITHIC NETWORK
Server
Employee
Tablet
Back
Office
Customer
Area
Equip
Room
Customer
Smartphone
Primary Network (WAN)
Typically T1, DSL or Cable
Failover Connection
4G-LTE as a backup WAN connection
4G-LTE
 Penetration
– Launched email phishing campaign
– Successfully tricked many users to open the email
– Attackers researched victims and determined suppliers to Target
– Obtained vendor’s credentials, used to access Target’s network
 Execution
– Used “pivoting” technique to attack systems on other networks
– Infected POS terminals using customized memory scraping tool
– Established “unauthorized server” inside the Target network
– Exfiltrated credit card data through the compromised servers
Based on Currently-Available Information
THE ATTACK AT TARGET
 The Exposure
– Up to 110 million customers could have been affected
– 40 million debit and credit cards stolen
– Up to 70 million individuals had personal information stolen
 The Cost
– The breach will cost Target $500 million to $1.1 billion USD
some analysts estimate.
– Analysts have cut Target profit estimates for the fiscal years ending
Jan ’14 and Jan ‘15 by about 12.2% and 9.5%, respectively,
Thomson Reuters Starmine data showed.
– Target’s CIO resigned, CEO forced out
Based on Currently-Available Information
9CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
THE RESULT AND IMPACT
Source:
Source:
 The Industry Experts’ Analysis
– Target passed its PCI Compliance audit in September
– The company has since moved to isolate its different platforms and
networks to make it harder for a hacker to move between them
a Target executive said.
– So-called segmentation issues, where computer systems that
shouldn't be connected for security reasons are in fact linked, are a
problem at a number of retailers
a person familiar with retail breaches said.
– There shouldn't have been a route between a network for an outside
contractor and the one for payment data
people familiar with large corporate networks said.
Based on Currently-Available Information
10CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
THE RESULT AND IMPACT
Source:
 Legitimate looking emails
 Relevant, somewhat inside information
 Think of grifters, con men, etc.
 Click on the link or attachment
Phishing, Spear Phishing, Whaling
SOCIAL ENGINEERING ATTACKS
PHISHING EXAMPLE
Internet /
Private Network
13CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
THE MONOLITHIC NETWORK
Server
Employee
Tablet
Back
Office
Customer
Area
Equip
Room
Customer
Smartphone
Primary Network (WAN)
Typically T1, DSL or Cable
Failover Connection
4G-LTE as a backup WAN connection
4G-LTE
 The Industry Experts’ Analysis
–So-called segmentation issues, where
computer systems that shouldn't be
connected for security reasons are in
fact linked, are a problem at a number of
retailers
a person familiar with retail breaches said.
–There shouldn't have been a route
between a network for an outside
contractor and the one for payment data
people familiar with large corporate networks said.
Based on Currently-Available Information
14CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
THE RESULT AND IMPACT
Source:
15CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
SEGMENTATION ISSUES?
16CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
AND THEN…
17CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
AND THEN…
Internet /
Private Network
18CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
THE MONOLITHIC NETWORK
Server
Employee
Tablet
Back
Office
Customer
Area
Equip
Room
Customer
Smartphone
Primary Network (WAN)
Typically T1, DSL or Cable
Failover Connection
4G-LTE as a backup WAN connection
4G-LTE
Internet /
Private Network
19CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
4G-LTE
VoIP Phone Network
Separate 4G Network
Server
Employee
Tablet
Back
Office
Customer
Area
Equip
Room
Customer
Smartphone
Kiosks
Separate 4G Network
for 3rd-Party
4G-LTE4G-LTE
Digital Signage
Separate 4G Network
for 3rdParty
HVAC System
Separate 4G Network
for 3rd-party vendor
4G-LTE
Customer WiFi Network
Separate 4G Network for
non-secure customer access
4G-LTE
Store-in-a-Store
Separate 4G Network
for 3rd-Party
4G-LTE
Employee Network
Separate 4G Network for
secure enterprise access
4G-LTE 4G-LTE
Security System
Separate 4G Network
for 3rd-party vendor
4G-LTE
Energy Mgmt System
Separate 4G Network
for 3rd-party vendor
POS Device Network
Separate 4G Network
for security-sensitive devices
4G-LTE
PARALLEL NETWORKING
Primary Network (WAN)
Typically T1, DSL or Cable
Failover Connection
4G-LTE as a backup WAN connection
4G-LTE
Point-of-Sale Device Network
Separate 4G Network
for security-sensitive devices
4G-LTE
Internet /
Private Network
20CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice.
PARALLEL NETWORKING
4G-LTE
VoIP Phone Network
Separate 4G Network
Server
Employee
Tablet
Back
Office
Customer
Area
Equip
Room
Customer
Smartphone
Kiosks
Separate 4G Networks
for 3rd-Party
4G-LTE4G-LTE
Digital Signage
Separate 4G Network
for 3rdParty
HVAC System
Separate 4G Network
for 3rd-party service provider
(Heating, Ventilation & Air Conditioning)
4G-LTE
Customer WiFi Network
Separate 4G Network
for non-secure
customer access
4G-LTE
Store-in-a-Store
Separate 4G Network
for 3rd-Party
4G-LTE
Employee Network
Separate 4G Network
for secure enterprise access
4G-LTE 4G-LTE
Security System
Separate 4G Network for
3rd-party service provider
Failover Connection
4G-LTE as a backup
WAN connection
4G-LTE4G-LTE
Energy Mgmt System
Separate 4G Network for
3rd-party service provider
Primary Network (WAN)
Typically T1, DSL or Cable
21
See us at Interop Stand IW343
FREE WHITE PAPER
ADDRESSING THE BREACH
Offloading Non-Essential and Vendor Applications to
Application-Specific, Parallel Networks Using 4G LTE
QUESTIONS?
Contact : lnotwell@cradlepoint.com
Lindsay Notwell
VP, Operator & International Business
CradlePoint

More Related Content

More from Internet World

Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...Internet World
 
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...Internet World
 
What IT capacity planning can learn from manufacturing's just-in-time models ...
What IT capacity planning can learn from manufacturing's just-in-time models ...What IT capacity planning can learn from manufacturing's just-in-time models ...
What IT capacity planning can learn from manufacturing's just-in-time models ...Internet World
 
How personal data has changed and what this means for businesses looking forw...
How personal data has changed and what this means for businesses looking forw...How personal data has changed and what this means for businesses looking forw...
How personal data has changed and what this means for businesses looking forw...Internet World
 
The database of you - Andy Caddy, Virgin Active Health Clubs
The database of you - Andy Caddy, Virgin Active Health ClubsThe database of you - Andy Caddy, Virgin Active Health Clubs
The database of you - Andy Caddy, Virgin Active Health ClubsInternet World
 
Using big data to find out what women want - John Lervik, Cxense
Using big data to find out what women want - John Lervik, CxenseUsing big data to find out what women want - John Lervik, Cxense
Using big data to find out what women want - John Lervik, CxenseInternet World
 
Relevance = Revenue - PK Vaish, Copernica
Relevance = Revenue - PK Vaish, CopernicaRelevance = Revenue - PK Vaish, Copernica
Relevance = Revenue - PK Vaish, CopernicaInternet World
 
How to drive e-commerce sales with content marketing - David Bowen, EPiServer
How to drive e-commerce sales with content marketing - David Bowen, EPiServerHow to drive e-commerce sales with content marketing - David Bowen, EPiServer
How to drive e-commerce sales with content marketing - David Bowen, EPiServerInternet World
 
Innovation at Tesco - Angela Maurer, Tesco
Innovation at Tesco - Angela Maurer, TescoInnovation at Tesco - Angela Maurer, Tesco
Innovation at Tesco - Angela Maurer, TescoInternet World
 
Responsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
Responsive Web Design: Advantages & Best Practice - Darrin Adams, CantarusResponsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
Responsive Web Design: Advantages & Best Practice - Darrin Adams, CantarusInternet World
 
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, StannpOffline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, StannpInternet World
 
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...Internet World
 
When smart-phones sense how you feel: The era of intelligent mobile devices -...
When smart-phones sense how you feel: The era of intelligent mobile devices -...When smart-phones sense how you feel: The era of intelligent mobile devices -...
When smart-phones sense how you feel: The era of intelligent mobile devices -...Internet World
 
Dulux paints the town red (or any colour you like) with augmented reality - S...
Dulux paints the town red (or any colour you like) with augmented reality - S...Dulux paints the town red (or any colour you like) with augmented reality - S...
Dulux paints the town red (or any colour you like) with augmented reality - S...Internet World
 
Mobile Payments: Driving Global M-Commerce Adoption - Johan Lindstrom, Master...
Mobile Payments: Driving Global M-Commerce Adoption - Johan Lindstrom, Master...Mobile Payments: Driving Global M-Commerce Adoption - Johan Lindstrom, Master...
Mobile Payments: Driving Global M-Commerce Adoption - Johan Lindstrom, Master...Internet World
 
Super charge your content with super content - Stephen Morgan, Squiz/ Funnelback
Super charge your content with super content - Stephen Morgan, Squiz/ FunnelbackSuper charge your content with super content - Stephen Morgan, Squiz/ Funnelback
Super charge your content with super content - Stephen Morgan, Squiz/ FunnelbackInternet World
 
From insights to outcomes, and beyond - Nick Millman, Accenture
From insights to outcomes, and beyond - Nick Millman, AccentureFrom insights to outcomes, and beyond - Nick Millman, Accenture
From insights to outcomes, and beyond - Nick Millman, AccentureInternet World
 
Data: the competitive edge you've been looking for! - David White, import.io
Data: the competitive edge you've been looking for! - David White, import.ioData: the competitive edge you've been looking for! - David White, import.io
Data: the competitive edge you've been looking for! - David White, import.ioInternet World
 
The marriage of people and technology - Jon Winter, Worthers Media Solutions
The marriage of people and technology - Jon Winter, Worthers Media Solutions The marriage of people and technology - Jon Winter, Worthers Media Solutions
The marriage of people and technology - Jon Winter, Worthers Media Solutions Internet World
 
Big technology for small businesses, how to build your marketing toolkit - Ta...
Big technology for small businesses, how to build your marketing toolkit - Ta...Big technology for small businesses, how to build your marketing toolkit - Ta...
Big technology for small businesses, how to build your marketing toolkit - Ta...Internet World
 

More from Internet World (20)

Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...Have your cake and eat it too: adopting technologies without sacrificing - Pa...
Have your cake and eat it too: adopting technologies without sacrificing - Pa...
 
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
Business Networking Hacks in Today’s Connected World - Marian Gazdik, Startup...
 
What IT capacity planning can learn from manufacturing's just-in-time models ...
What IT capacity planning can learn from manufacturing's just-in-time models ...What IT capacity planning can learn from manufacturing's just-in-time models ...
What IT capacity planning can learn from manufacturing's just-in-time models ...
 
How personal data has changed and what this means for businesses looking forw...
How personal data has changed and what this means for businesses looking forw...How personal data has changed and what this means for businesses looking forw...
How personal data has changed and what this means for businesses looking forw...
 
The database of you - Andy Caddy, Virgin Active Health Clubs
The database of you - Andy Caddy, Virgin Active Health ClubsThe database of you - Andy Caddy, Virgin Active Health Clubs
The database of you - Andy Caddy, Virgin Active Health Clubs
 
Using big data to find out what women want - John Lervik, Cxense
Using big data to find out what women want - John Lervik, CxenseUsing big data to find out what women want - John Lervik, Cxense
Using big data to find out what women want - John Lervik, Cxense
 
Relevance = Revenue - PK Vaish, Copernica
Relevance = Revenue - PK Vaish, CopernicaRelevance = Revenue - PK Vaish, Copernica
Relevance = Revenue - PK Vaish, Copernica
 
How to drive e-commerce sales with content marketing - David Bowen, EPiServer
How to drive e-commerce sales with content marketing - David Bowen, EPiServerHow to drive e-commerce sales with content marketing - David Bowen, EPiServer
How to drive e-commerce sales with content marketing - David Bowen, EPiServer
 
Innovation at Tesco - Angela Maurer, Tesco
Innovation at Tesco - Angela Maurer, TescoInnovation at Tesco - Angela Maurer, Tesco
Innovation at Tesco - Angela Maurer, Tesco
 
Responsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
Responsive Web Design: Advantages & Best Practice - Darrin Adams, CantarusResponsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
Responsive Web Design: Advantages & Best Practice - Darrin Adams, Cantarus
 
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, StannpOffline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
Offline Direct Marketing for Mobile Marketeers - Sam Heaton, Stannp
 
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
How to drive mobile traffic to your local stores? - Bruno Berthezene, Solocal...
 
When smart-phones sense how you feel: The era of intelligent mobile devices -...
When smart-phones sense how you feel: The era of intelligent mobile devices -...When smart-phones sense how you feel: The era of intelligent mobile devices -...
When smart-phones sense how you feel: The era of intelligent mobile devices -...
 
Dulux paints the town red (or any colour you like) with augmented reality - S...
Dulux paints the town red (or any colour you like) with augmented reality - S...Dulux paints the town red (or any colour you like) with augmented reality - S...
Dulux paints the town red (or any colour you like) with augmented reality - S...
 
Mobile Payments: Driving Global M-Commerce Adoption - Johan Lindstrom, Master...
Mobile Payments: Driving Global M-Commerce Adoption - Johan Lindstrom, Master...Mobile Payments: Driving Global M-Commerce Adoption - Johan Lindstrom, Master...
Mobile Payments: Driving Global M-Commerce Adoption - Johan Lindstrom, Master...
 
Super charge your content with super content - Stephen Morgan, Squiz/ Funnelback
Super charge your content with super content - Stephen Morgan, Squiz/ FunnelbackSuper charge your content with super content - Stephen Morgan, Squiz/ Funnelback
Super charge your content with super content - Stephen Morgan, Squiz/ Funnelback
 
From insights to outcomes, and beyond - Nick Millman, Accenture
From insights to outcomes, and beyond - Nick Millman, AccentureFrom insights to outcomes, and beyond - Nick Millman, Accenture
From insights to outcomes, and beyond - Nick Millman, Accenture
 
Data: the competitive edge you've been looking for! - David White, import.io
Data: the competitive edge you've been looking for! - David White, import.ioData: the competitive edge you've been looking for! - David White, import.io
Data: the competitive edge you've been looking for! - David White, import.io
 
The marriage of people and technology - Jon Winter, Worthers Media Solutions
The marriage of people and technology - Jon Winter, Worthers Media Solutions The marriage of people and technology - Jon Winter, Worthers Media Solutions
The marriage of people and technology - Jon Winter, Worthers Media Solutions
 
Big technology for small businesses, how to build your marketing toolkit - Ta...
Big technology for small businesses, how to build your marketing toolkit - Ta...Big technology for small businesses, how to build your marketing toolkit - Ta...
Big technology for small businesses, how to build your marketing toolkit - Ta...
 

Recently uploaded

Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsrahman018755
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfOndejSur
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfappinfoedgeca
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideVarun Mithran
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...APNIC
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.Tortogel
 
AI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model GeneratorAI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model Generator3DailyAI1
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appscristianmanaila2
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresencePC Doctors NET
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfe-Market Hub
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirtrahman018755
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsrahman018755
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxChloeMeadows1
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsrahman018755
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebJie Liau
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkklolsDocherty
 

Recently uploaded (17)

Free scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirtsFree scottie t shirts Free scottie t shirts
Free scottie t shirts Free scottie t shirts
 
Statistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdfStatistical Analysis of DNS Latencies.pdf
Statistical Analysis of DNS Latencies.pdf
 
Premier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdfPremier Mobile App Development Agency in USA.pdf
Premier Mobile App Development Agency in USA.pdf
 
Bug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's GuideBug Bounty Blueprint : A Beginner's Guide
Bug Bounty Blueprint : A Beginner's Guide
 
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
Registry Data Accuracy Improvements, presented by Chimi Dorji at SANOG 41 / I...
 
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
TORTOGEL TELAH MENJADI SALAH SATU PLATFORM PERMAINAN PALING FAVORIT.
 
AI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model GeneratorAI Generated 3D Models | AI 3D Model Generator
AI Generated 3D Models | AI 3D Model Generator
 
Development Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of appsDevelopment Lifecycle.pptx for the secure development of apps
Development Lifecycle.pptx for the secure development of apps
 
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital PresenceCyber Security Services Unveiled: Strategies to Secure Your Digital Presence
Cyber Security Services Unveiled: Strategies to Secure Your Digital Presence
 
The Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdfThe Rise of Subscription-Based Digital Services.pdf
The Rise of Subscription-Based Digital Services.pdf
 
I’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 ShirtI’ll See Y’All Motherfuckers In Game 7 Shirt
I’ll See Y’All Motherfuckers In Game 7 Shirt
 
Thank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirtsThank You Luv I’ll Never Walk Alone Again T shirts
Thank You Luv I’ll Never Walk Alone Again T shirts
 
Production 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptxProduction 2024 sunderland culture final - Copy.pptx
Production 2024 sunderland culture final - Copy.pptx
 
Reggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirtsReggie miller choke t shirts
Reggie miller choke t shirtsReggie miller choke t shirts
 
GOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdfGOOGLE Io 2024 At takes center stage.pdf
GOOGLE Io 2024 At takes center stage.pdf
 
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWebiThome_CYBERSEC2024_Drive_Into_the_DarkWeb
iThome_CYBERSEC2024_Drive_Into_the_DarkWeb
 
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkkaudience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
audience research (emma) 1.pptxkkkkkkkkkkkkkkkkk
 

A wireless world: combatting security breaches through parallel networking - Lindsay Notwell, Cradlepoint

  • 1. ADDRESSING THE BREACH Offloading Non-Essential and Vendor Applications to Application-Specific, Parallel Networks Using 4G LTE June 17, 2014 Lindsay Notwell VP, Operator & International Business CradlePoint Contact: lnotwell@cradlepoint.com
  • 2. M200 Circa 2006 OUR COMPANY The trusted global leader in enterprise-grade 4G-LTE networking solutions for distributed enterprise 2CradlePoint Proprietary and Confidential • © 2014 CradlePoint, Inc. • All Rights Reserved. Information subject to change without notice. INDUSTRY AWARDS 2014 Top 20 Retail IT Solutions OPERATOR PARTNERS Focus: Enterprise grade cloud managed 3G/4G/LTE solutions Advantages: Performance Protocols Efficiency DIFFERENTIATION Security WiFi Flexibility
  • 3. KiosksC-Stores OUR CUSTOMERS Distributed Enterprises with Hundreds and Thousands of Locations 3 RestaurantsRetail Stores Digital Signage TransportationBranch Offices CradlePoint Proprietary and Confidential • © 2014 CradlePoint, Inc. All Rights Reserved. • Information subject to change without notice. Key Challenges No Local IT Support PCI Compliance WiFi & Mobility Cloud-based Apps Business Continuity
  • 4. RETAIL BRANCH OFFICE KIOSKS, SIGNAGE, ETC TRANSPORTATION OUR RECORD OF SUCCESS Over 1,000,000 deployments with leading distributed enterprises 4CradlePoint Proprietary and Confidential • © 2014 CradlePoint, Inc. All Rights Reserved. • Information subject to change without notice.
  • 5. Internet / Private Network 5CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. TYPICAL BRANCH OFFICE Server Employee Tablet Back Office Customer Area Equip Room Customer Smartphone Primary Network (WAN) Typically T1, DSL or Cable
  • 6. Internet / Private Network 6CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. WITH 3G/4G RESILIENCY Server Employee Tablet Back Office Customer Area Equip Room Customer Smartphone Primary Network (WAN) Typically T1, DSL or Cable Failover Connection 4G-LTE as a backup WAN connection 4G-LTE
  • 7. Internet / Private Network 7CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. THE MONOLITHIC NETWORK Server Employee Tablet Back Office Customer Area Equip Room Customer Smartphone Primary Network (WAN) Typically T1, DSL or Cable Failover Connection 4G-LTE as a backup WAN connection 4G-LTE
  • 8.  Penetration – Launched email phishing campaign – Successfully tricked many users to open the email – Attackers researched victims and determined suppliers to Target – Obtained vendor’s credentials, used to access Target’s network  Execution – Used “pivoting” technique to attack systems on other networks – Infected POS terminals using customized memory scraping tool – Established “unauthorized server” inside the Target network – Exfiltrated credit card data through the compromised servers Based on Currently-Available Information THE ATTACK AT TARGET
  • 9.  The Exposure – Up to 110 million customers could have been affected – 40 million debit and credit cards stolen – Up to 70 million individuals had personal information stolen  The Cost – The breach will cost Target $500 million to $1.1 billion USD some analysts estimate. – Analysts have cut Target profit estimates for the fiscal years ending Jan ’14 and Jan ‘15 by about 12.2% and 9.5%, respectively, Thomson Reuters Starmine data showed. – Target’s CIO resigned, CEO forced out Based on Currently-Available Information 9CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. THE RESULT AND IMPACT Source: Source:
  • 10.  The Industry Experts’ Analysis – Target passed its PCI Compliance audit in September – The company has since moved to isolate its different platforms and networks to make it harder for a hacker to move between them a Target executive said. – So-called segmentation issues, where computer systems that shouldn't be connected for security reasons are in fact linked, are a problem at a number of retailers a person familiar with retail breaches said. – There shouldn't have been a route between a network for an outside contractor and the one for payment data people familiar with large corporate networks said. Based on Currently-Available Information 10CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. THE RESULT AND IMPACT Source:
  • 11.  Legitimate looking emails  Relevant, somewhat inside information  Think of grifters, con men, etc.  Click on the link or attachment Phishing, Spear Phishing, Whaling SOCIAL ENGINEERING ATTACKS
  • 13. Internet / Private Network 13CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. THE MONOLITHIC NETWORK Server Employee Tablet Back Office Customer Area Equip Room Customer Smartphone Primary Network (WAN) Typically T1, DSL or Cable Failover Connection 4G-LTE as a backup WAN connection 4G-LTE
  • 14.  The Industry Experts’ Analysis –So-called segmentation issues, where computer systems that shouldn't be connected for security reasons are in fact linked, are a problem at a number of retailers a person familiar with retail breaches said. –There shouldn't have been a route between a network for an outside contractor and the one for payment data people familiar with large corporate networks said. Based on Currently-Available Information 14CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. THE RESULT AND IMPACT Source:
  • 15. 15CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. SEGMENTATION ISSUES?
  • 16. 16CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. AND THEN…
  • 17. 17CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. AND THEN…
  • 18. Internet / Private Network 18CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. THE MONOLITHIC NETWORK Server Employee Tablet Back Office Customer Area Equip Room Customer Smartphone Primary Network (WAN) Typically T1, DSL or Cable Failover Connection 4G-LTE as a backup WAN connection 4G-LTE
  • 19. Internet / Private Network 19CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. 4G-LTE VoIP Phone Network Separate 4G Network Server Employee Tablet Back Office Customer Area Equip Room Customer Smartphone Kiosks Separate 4G Network for 3rd-Party 4G-LTE4G-LTE Digital Signage Separate 4G Network for 3rdParty HVAC System Separate 4G Network for 3rd-party vendor 4G-LTE Customer WiFi Network Separate 4G Network for non-secure customer access 4G-LTE Store-in-a-Store Separate 4G Network for 3rd-Party 4G-LTE Employee Network Separate 4G Network for secure enterprise access 4G-LTE 4G-LTE Security System Separate 4G Network for 3rd-party vendor 4G-LTE Energy Mgmt System Separate 4G Network for 3rd-party vendor POS Device Network Separate 4G Network for security-sensitive devices 4G-LTE PARALLEL NETWORKING Primary Network (WAN) Typically T1, DSL or Cable Failover Connection 4G-LTE as a backup WAN connection 4G-LTE
  • 20. Point-of-Sale Device Network Separate 4G Network for security-sensitive devices 4G-LTE Internet / Private Network 20CradlePoint Proprietary and Confidential | © 2014 CradlePoint, Inc. | All Rights Reserved. | Information subject to change without notice. PARALLEL NETWORKING 4G-LTE VoIP Phone Network Separate 4G Network Server Employee Tablet Back Office Customer Area Equip Room Customer Smartphone Kiosks Separate 4G Networks for 3rd-Party 4G-LTE4G-LTE Digital Signage Separate 4G Network for 3rdParty HVAC System Separate 4G Network for 3rd-party service provider (Heating, Ventilation & Air Conditioning) 4G-LTE Customer WiFi Network Separate 4G Network for non-secure customer access 4G-LTE Store-in-a-Store Separate 4G Network for 3rd-Party 4G-LTE Employee Network Separate 4G Network for secure enterprise access 4G-LTE 4G-LTE Security System Separate 4G Network for 3rd-party service provider Failover Connection 4G-LTE as a backup WAN connection 4G-LTE4G-LTE Energy Mgmt System Separate 4G Network for 3rd-party service provider Primary Network (WAN) Typically T1, DSL or Cable
  • 21. 21 See us at Interop Stand IW343 FREE WHITE PAPER
  • 22. ADDRESSING THE BREACH Offloading Non-Essential and Vendor Applications to Application-Specific, Parallel Networks Using 4G LTE QUESTIONS? Contact : lnotwell@cradlepoint.com Lindsay Notwell VP, Operator & International Business CradlePoint