SlideShare a Scribd company logo
1 of 23
© Copyright 2016 Farsight Security, Inc.
All Right Reserved.
FARSIGHT SECURITY
M e r i k e K a e o , C T O
m e r i k e @ f s i . i o
Information Exchange Collaboration
Across Technical/Operational/Policy
Boundaries
DISCUSSION POINTS
•  Introduction and Background
•  Barriers to Sharing
•  Communities of Trust
•  Global Efforts To Bring About Action
•  Evolving Standards and Frameworks
•  Being Part of the Solution
BACKGROUND – MERIKE KÄO
•  Work History
–  National Institutes of Health (Network Engineer, 1988-1993)
–  Cisco Systems (Network Architect, 1993-2000)
–  Double Shot Security (Founder, 2000-2012)
–  IID (CISO, 2013-2014)
–  Farsight Security (CTO, 2014 – present)
•  Industry Recognition/Participation
–  Authored “Designing Network Security”
–  Active Contributor to IETF Standards
–  SSAC member (ICANN)
–  IP6 Forum fellow since 2007
–  Member of FCC CSRIC III (Botnet remediation)
–  Member of EU NIS WG2
BARRIERS TO SHARING
Technical
Creating the resilient infrastructure for data sharing that can support a
variety of data types and formats.
Policy
Creating the appropriate legal structure(s) to foster comprehensive data
sharing without cumbersome legal liabilities.
Governance
Business rules by which members of a network share, what they share,
and with whom they share.
A PERIOD OF RAPID CHANGE
•  Intelligent, interconnected devices are continuing
to be connected to the global Internet
•  Data is accumulating faster than it can be
organized or effectively protected
•  The complexity of the Internet ecosystem creates
a rich environment exploitable by activists,
criminals, and nation states
•  Data will continue be stolen or modified using
subtle, persistent, directed attacks
CRIMINALS HAVE NO BARRIERS
•  Websites advertise Botnets and malware for hire
•  Vulnerabilities and Exploits are traded on open market
•  There are no enforced rules for NOT sharing
•  Social media is making sharing more efficient
Choose Custom Botnet
-  Number of Hosts
-  Geographic Region
-  Bandwidth
-  Duration
-  etc
BREAKING THE BARRIERS OF SHARING
•  Legal
•  Technical
– Interoperability
– End to end automation
•  Procedural
•  Trust Issues
•  Insufficient Interest
COMMUNITIES OF TRUST
IETF
ISOI
BlackHat
SchmooCon
ENISA
APNIC
RIPEAfriNIC
LacNIC
Underground
Economy
DCC
Defcon
RSA
ICANN
ISOC
Secure
ARIN
NIST
ITU
Secret
Squirrel
APWG
MAAWG
StopBadware
ACDC
MACCSA
*-ISAC FIRST
Confluence
AND THERE’S MORE…
•  Industry Sectors
Aerospace, Automotive, Aviation, Chemical Industry, Construction,
Consumer Products, Education, Energy, Environment, Financial
(Banking, Exchanges, Insurance, Payments), Food, Health,
Heating&Ventilation, Machine Safety, Materials, Nanotechnology,
Oil&Gas, Pharmaceutical, Research Facilities, Services, Smart
Metering, Space,Transport (Road, Rail, Shipping), etc.
•  National Initiatives
UN, NATO, EU, Africa, National CERTs, etc.
GLOBAL EFFORTS FOR ACTION
•  DNS-OARC: DNS System Security
•  FIRST: Vulnerability management
•  ISACs: Specialized Interest Groups
•  M3AAWG / APWG: Anti SPAM, Phishing and
Crime
•  NSP-SEC: Big Backbone Providers and IP
Based Remediation
•  OPSEC-Trust: Situational Awareness
MODELS, METHODS AND MECHANISMS
•  Models of Exchange
–  Voluntary exchange vs Mandatory disclosure
•  Methods of Exchange
–  Trust-based
–  Formalized
–  Security clearance-based
–  Ad-hoc
•  Mechanisms of Exchange
–  Person to person
–  Machine to machine
THE UNKNOWN – HOW CAN IT HARM YOU?
•  Estonia Example (2007)
–  Creating trust
•  TC-FIRST
•  Global Operation Security Teams
–  Cross functional meetings
–  Known roles due to e-voting (2005)
–  Government facilitated
communication and tactics
–  Openness with information
sharing was critical
DO YOU HAVE A CIRT?
•  You Should Have a Computer Incident response Team
–  Who is part of this?
–  What are their responsibilities?
•  Important – Define a single individual to be in charge (also have a
backup for that individual)
•  Know who you need to contact
–  Legal / regulatory responsibility
–  Upstream ISPs who may help filter on DDoS attacks
–  Impacted individuals
CONTINUE TO INCREASE SHARING
•  Initial Step – Build Trust Thru Networking
•  Start by sharing for specific use cases that don’t impact privacy
and personally identifiable information (PII)
–  SSH Brute Force Attacks
–  DNS/SMTP/NTP Amplification Attacks
–  Passive DNS Information
•  Investigate how to share data that may impact privacy/PII and
what can be anonymized but still be useful
–  SPAM / Phishing details
THOUGHTS ON PASSIVE DNS
•  DNS is used by ALL electronic communications
•  pDNS still new to many people despite existing since 2004
•  PII issues depend on where you do your observations
•  Valuable data that is shared to get information on malware
campaigns
EVOLVING STANDARDS & FRAMEWORKS
•  FIRST Initiatives
–  Traffic Light Protocol (TLP) SIG
–  Information Exchange Policy (IEP) SIG
–  Information Sharing SIG
•  OASIS
–  Cybox/STIX/TAXII
•  Other Ongoing Work
–  NIST / ENISA
–  IETF
TLP – OLD VS EVOLVING
WHAT CREATES POLICY COMPLEXITY ?
•  Variations in global privacy laws and legal liability
–  Many sharing initiatives based on bi-lateral agreements
•  Variations in policy interpretations
– Who do you share with ?
– How do you protect data ?
– What are you allowed to do with the data?
INFORMATION EXCHANGE POLICY (IEP)
•  Work started over 2 years ago
•  FIRST was natural place to get global participation
•  Initial v1.0 Framework done
–  https://www.first.org/global/sigs/iep
–  Information Sharing SIG utilizing it
–  Unifying with OASIS STIX
•  Work ongoing
–  Other operational sharing groups asking for clarifications
IEP SPECIFICS
IEP and STIX
•  IEP Appendix A
–  STIX JSON representation of an IEP implementation
•  Close collaboration with OASIS
–  STIX 2.0 documentation has reference to IEP
–  IEP work ongoing to include IEP within STIX
BEING PART OF THE SOLUTION
•  Participate in policy work
•  Work with national CIRT teams
•  Help formulate privacy laws that
protect citizens personal
privacy but don’t hinder
protecting critical electronic
communications
•  Share what you can and help
cross-functional education
© Copyright 2016 Farsight Security, Inc.
All Right Reserved.
QUESTIONS ?
FARSIGHT SECURITY

More Related Content

What's hot

What's hot (20)

APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017APNIC Update - MMNOG 2017
APNIC Update - MMNOG 2017
 
Cybersecurity response in the Pacific
Cybersecurity response in the PacificCybersecurity response in the Pacific
Cybersecurity response in the Pacific
 
IGFA 2017: Introduction to APNIC and Regional Internet Registries
IGFA 2017: Introduction to APNIC and Regional Internet RegistriesIGFA 2017: Introduction to APNIC and Regional Internet Registries
IGFA 2017: Introduction to APNIC and Regional Internet Registries
 
Government Policy and IPv6 Adoption
Government Policy and IPv6 AdoptionGovernment Policy and IPv6 Adoption
Government Policy and IPv6 Adoption
 
APNIC Update: Infotel 2014
APNIC Update: Infotel 2014APNIC Update: Infotel 2014
APNIC Update: Infotel 2014
 
CNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia PacificCNCERT Conference 2017: Capacity development in the Asia Pacific
CNCERT Conference 2017: Capacity development in the Asia Pacific
 
Internet number resources - what's new?
Internet number resources - what's new?Internet number resources - what's new?
Internet number resources - what's new?
 
IP addressing policies, What does this mean? - APT Policy and Regulation Forum
IP addressing policies, What does this mean? - APT Policy and Regulation ForumIP addressing policies, What does this mean? - APT Policy and Regulation Forum
IP addressing policies, What does this mean? - APT Policy and Regulation Forum
 
IANA Stewardship Transition Consultation - APNIC 38
IANA Stewardship Transition Consultation - APNIC 38IANA Stewardship Transition Consultation - APNIC 38
IANA Stewardship Transition Consultation - APNIC 38
 
APNIC Update- PITA Member Meeting, Honolulu, 2015
APNIC Update- PITA Member Meeting, Honolulu, 2015APNIC Update- PITA Member Meeting, Honolulu, 2015
APNIC Update- PITA Member Meeting, Honolulu, 2015
 
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
NTT-CERT Activities by Yoshiki Sugiura [APRICOT 2015]
 
IANA Transition Update, August 2016
IANA Transition Update, August 2016IANA Transition Update, August 2016
IANA Transition Update, August 2016
 
Enhancing security incident response capabilities in the AP
Enhancing security incident response capabilities in the AP Enhancing security incident response capabilities in the AP
Enhancing security incident response capabilities in the AP
 
APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54APNIC Update, APEC TEL 54
APNIC Update, APEC TEL 54
 
An introduction to APNIC
An introduction to APNICAn introduction to APNIC
An introduction to APNIC
 
Apnic update-btnog1-sc
Apnic update-btnog1-scApnic update-btnog1-sc
Apnic update-btnog1-sc
 
EC proposal: Formation of a Cooperation SIG, by Akinori Maemura [APNIC 38 / B...
EC proposal: Formation of a Cooperation SIG, by Akinori Maemura [APNIC 38 / B...EC proposal: Formation of a Cooperation SIG, by Akinori Maemura [APNIC 38 / B...
EC proposal: Formation of a Cooperation SIG, by Akinori Maemura [APNIC 38 / B...
 
IOT, It's the Internet...only bigger
IOT, It's the Internet...only biggerIOT, It's the Internet...only bigger
IOT, It's the Internet...only bigger
 
AFRINIC 26/AIS 2017: APNIC Update
AFRINIC 26/AIS 2017: APNIC UpdateAFRINIC 26/AIS 2017: APNIC Update
AFRINIC 26/AIS 2017: APNIC Update
 
IPv6 in Vietnam + APNIC Update
IPv6 in Vietnam + APNIC UpdateIPv6 in Vietnam + APNIC Update
IPv6 in Vietnam + APNIC Update
 

Viewers also liked

Introduction to information systems and the role of information systems in bu...
Introduction to information systems and the role of information systems in bu...Introduction to information systems and the role of information systems in bu...
Introduction to information systems and the role of information systems in bu...
Ultraspectra
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
adpafit
 

Viewers also liked (10)

Information systems engineering
Information systems engineeringInformation systems engineering
Information systems engineering
 
Information and Knowledge Services: finding Structure in Complexity
Information and Knowledge Services: finding Structure in ComplexityInformation and Knowledge Services: finding Structure in Complexity
Information and Knowledge Services: finding Structure in Complexity
 
Information Technology & Its Role in the Modern Organization
Information Technology & Its Role in the  Modern OrganizationInformation Technology & Its Role in the  Modern Organization
Information Technology & Its Role in the Modern Organization
 
Information system a system view
Information system a system viewInformation system a system view
Information system a system view
 
Strategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset ManagementStrategies for Effective Hardware and Software Asset Management
Strategies for Effective Hardware and Software Asset Management
 
Introduction to information systems and the role of information systems in bu...
Introduction to information systems and the role of information systems in bu...Introduction to information systems and the role of information systems in bu...
Introduction to information systems and the role of information systems in bu...
 
Mis notes
Mis notesMis notes
Mis notes
 
Knowledge based systems
Knowledge based systemsKnowledge based systems
Knowledge based systems
 
Information System Concepts & Types of Information Systems
Information System Concepts & Types of Information SystemsInformation System Concepts & Types of Information Systems
Information System Concepts & Types of Information Systems
 
Introduction to information technology lecture 1
Introduction to information technology lecture 1Introduction to information technology lecture 1
Introduction to information technology lecture 1
 

Similar to Information Exchange Collaboration across Technical/Operational/Policy Boundaries

Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
元 黄
 

Similar to Information Exchange Collaboration across Technical/Operational/Policy Boundaries (20)

Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018 e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
e-SIDES workshop at EBDVF 2018, Vienna 14/11/2018
 
20161101 sdo support for cyber sa 3
20161101 sdo support for cyber sa 320161101 sdo support for cyber sa 3
20161101 sdo support for cyber sa 3
 
Ief information day 2017
Ief information day 2017Ief information day 2017
Ief information day 2017
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
 
IoT spending to surpass $800 billion in 2017, led by hardware
IoT spending to surpass $800 billion in 2017, led by hardwareIoT spending to surpass $800 billion in 2017, led by hardware
IoT spending to surpass $800 billion in 2017, led by hardware
 
IOT - internet of Things - August 2017
IOT - internet of Things - August 2017IOT - internet of Things - August 2017
IOT - internet of Things - August 2017
 
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud ProvidersDon’t Just Trust Cloud Providers - How To Audit Cloud Providers
Don’t Just Trust Cloud Providers - How To Audit Cloud Providers
 
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
2015 NENA - SECURING 9-1-1 INFRASTRUCTURE IN THE NG9-1-1 WORLD
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Cyber security general perspective a
Cyber security general perspective aCyber security general perspective a
Cyber security general perspective a
 
Introduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant KrishnaIntroduction to roof computing by Nishant Krishna
Introduction to roof computing by Nishant Krishna
 
IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!IoT—Let’s Code Like It’s 1999!
IoT—Let’s Code Like It’s 1999!
 
The public sector and integrated operations
The public sector and integrated operationsThe public sector and integrated operations
The public sector and integrated operations
 
201403xx ief reference architecture (gtf)
201403xx ief reference architecture (gtf)201403xx ief reference architecture (gtf)
201403xx ief reference architecture (gtf)
 
Network security
Network securityNetwork security
Network security
 
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v22-25-2014 Part 1 - NRECA Kickoff Meeting v2
2-25-2014 Part 1 - NRECA Kickoff Meeting v2
 
Nreca kickoff meeting
Nreca kickoff meetingNreca kickoff meeting
Nreca kickoff meeting
 
Indian perspective of cyber security
Indian perspective of cyber securityIndian perspective of cyber security
Indian perspective of cyber security
 
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
Overall System Architecture of Big Data of Wind Power Based on IoT_20161...
 

More from APNIC

More from APNIC (20)

APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 

Recently uploaded

valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
imonikaupta
 

Recently uploaded (20)

Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft DatingDubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
Dubai Call Girls Milky O525547819 Call Girls Dubai Soft Dating
 
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
Wagholi & High Class Call Girls Pune Neha 8005736733 | 100% Gennuine High Cla...
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Samalka Delhi >༒8448380779 Escort Service
 
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
valsad Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call Girls...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Pollachi 7001035870 Whatsapp Number, 24/07 Booking
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...Katraj ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For S...
Katraj ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For S...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Rani Bagh Escort Service Delhi N.C.R.
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Al Barsha Night Partner +0567686026 Call Girls Dubai
Al Barsha Night Partner +0567686026 Call Girls  DubaiAl Barsha Night Partner +0567686026 Call Girls  Dubai
Al Barsha Night Partner +0567686026 Call Girls Dubai
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort ServiceBusty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
Busty Desi⚡Call Girls in Vasundhara Ghaziabad >༒8448380779 Escort Service
 
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
Call Girls Sangvi Call Me 7737669865 Budget Friendly No Advance BookingCall G...
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 

Information Exchange Collaboration across Technical/Operational/Policy Boundaries

  • 1. © Copyright 2016 Farsight Security, Inc. All Right Reserved. FARSIGHT SECURITY M e r i k e K a e o , C T O m e r i k e @ f s i . i o Information Exchange Collaboration Across Technical/Operational/Policy Boundaries
  • 2. DISCUSSION POINTS •  Introduction and Background •  Barriers to Sharing •  Communities of Trust •  Global Efforts To Bring About Action •  Evolving Standards and Frameworks •  Being Part of the Solution
  • 3. BACKGROUND – MERIKE KÄO •  Work History –  National Institutes of Health (Network Engineer, 1988-1993) –  Cisco Systems (Network Architect, 1993-2000) –  Double Shot Security (Founder, 2000-2012) –  IID (CISO, 2013-2014) –  Farsight Security (CTO, 2014 – present) •  Industry Recognition/Participation –  Authored “Designing Network Security” –  Active Contributor to IETF Standards –  SSAC member (ICANN) –  IP6 Forum fellow since 2007 –  Member of FCC CSRIC III (Botnet remediation) –  Member of EU NIS WG2
  • 4. BARRIERS TO SHARING Technical Creating the resilient infrastructure for data sharing that can support a variety of data types and formats. Policy Creating the appropriate legal structure(s) to foster comprehensive data sharing without cumbersome legal liabilities. Governance Business rules by which members of a network share, what they share, and with whom they share.
  • 5. A PERIOD OF RAPID CHANGE •  Intelligent, interconnected devices are continuing to be connected to the global Internet •  Data is accumulating faster than it can be organized or effectively protected •  The complexity of the Internet ecosystem creates a rich environment exploitable by activists, criminals, and nation states •  Data will continue be stolen or modified using subtle, persistent, directed attacks
  • 6. CRIMINALS HAVE NO BARRIERS •  Websites advertise Botnets and malware for hire •  Vulnerabilities and Exploits are traded on open market •  There are no enforced rules for NOT sharing •  Social media is making sharing more efficient Choose Custom Botnet -  Number of Hosts -  Geographic Region -  Bandwidth -  Duration -  etc
  • 7. BREAKING THE BARRIERS OF SHARING •  Legal •  Technical – Interoperability – End to end automation •  Procedural •  Trust Issues •  Insufficient Interest
  • 9. AND THERE’S MORE… •  Industry Sectors Aerospace, Automotive, Aviation, Chemical Industry, Construction, Consumer Products, Education, Energy, Environment, Financial (Banking, Exchanges, Insurance, Payments), Food, Health, Heating&Ventilation, Machine Safety, Materials, Nanotechnology, Oil&Gas, Pharmaceutical, Research Facilities, Services, Smart Metering, Space,Transport (Road, Rail, Shipping), etc. •  National Initiatives UN, NATO, EU, Africa, National CERTs, etc.
  • 10. GLOBAL EFFORTS FOR ACTION •  DNS-OARC: DNS System Security •  FIRST: Vulnerability management •  ISACs: Specialized Interest Groups •  M3AAWG / APWG: Anti SPAM, Phishing and Crime •  NSP-SEC: Big Backbone Providers and IP Based Remediation •  OPSEC-Trust: Situational Awareness
  • 11. MODELS, METHODS AND MECHANISMS •  Models of Exchange –  Voluntary exchange vs Mandatory disclosure •  Methods of Exchange –  Trust-based –  Formalized –  Security clearance-based –  Ad-hoc •  Mechanisms of Exchange –  Person to person –  Machine to machine
  • 12. THE UNKNOWN – HOW CAN IT HARM YOU? •  Estonia Example (2007) –  Creating trust •  TC-FIRST •  Global Operation Security Teams –  Cross functional meetings –  Known roles due to e-voting (2005) –  Government facilitated communication and tactics –  Openness with information sharing was critical
  • 13. DO YOU HAVE A CIRT? •  You Should Have a Computer Incident response Team –  Who is part of this? –  What are their responsibilities? •  Important – Define a single individual to be in charge (also have a backup for that individual) •  Know who you need to contact –  Legal / regulatory responsibility –  Upstream ISPs who may help filter on DDoS attacks –  Impacted individuals
  • 14. CONTINUE TO INCREASE SHARING •  Initial Step – Build Trust Thru Networking •  Start by sharing for specific use cases that don’t impact privacy and personally identifiable information (PII) –  SSH Brute Force Attacks –  DNS/SMTP/NTP Amplification Attacks –  Passive DNS Information •  Investigate how to share data that may impact privacy/PII and what can be anonymized but still be useful –  SPAM / Phishing details
  • 15. THOUGHTS ON PASSIVE DNS •  DNS is used by ALL electronic communications •  pDNS still new to many people despite existing since 2004 •  PII issues depend on where you do your observations •  Valuable data that is shared to get information on malware campaigns
  • 16. EVOLVING STANDARDS & FRAMEWORKS •  FIRST Initiatives –  Traffic Light Protocol (TLP) SIG –  Information Exchange Policy (IEP) SIG –  Information Sharing SIG •  OASIS –  Cybox/STIX/TAXII •  Other Ongoing Work –  NIST / ENISA –  IETF
  • 17. TLP – OLD VS EVOLVING
  • 18. WHAT CREATES POLICY COMPLEXITY ? •  Variations in global privacy laws and legal liability –  Many sharing initiatives based on bi-lateral agreements •  Variations in policy interpretations – Who do you share with ? – How do you protect data ? – What are you allowed to do with the data?
  • 19. INFORMATION EXCHANGE POLICY (IEP) •  Work started over 2 years ago •  FIRST was natural place to get global participation •  Initial v1.0 Framework done –  https://www.first.org/global/sigs/iep –  Information Sharing SIG utilizing it –  Unifying with OASIS STIX •  Work ongoing –  Other operational sharing groups asking for clarifications
  • 21. IEP and STIX •  IEP Appendix A –  STIX JSON representation of an IEP implementation •  Close collaboration with OASIS –  STIX 2.0 documentation has reference to IEP –  IEP work ongoing to include IEP within STIX
  • 22. BEING PART OF THE SOLUTION •  Participate in policy work •  Work with national CIRT teams •  Help formulate privacy laws that protect citizens personal privacy but don’t hinder protecting critical electronic communications •  Share what you can and help cross-functional education
  • 23. © Copyright 2016 Farsight Security, Inc. All Right Reserved. QUESTIONS ? FARSIGHT SECURITY