SlideShare a Scribd company logo
1 of 28
Cyber Threats are now front and center
to the largest events in the world
Set The Stage
• 9 Days
• Ranked at #1 Technically advanced in N.
America
• 75,000 fans into 1 stadium + operations,
vendors and media
• 1 Million + new Visitors into San Fran
• 100+ Million watching
• 150+ countries
• 70 cameras filming
• 360 instant freeze and Replay cameras
• 36 Red Zone Cameras with 360 degree
visibility and virtual playback
• Superimposed yard lines
• Apps offering fans an interactive experience
• 400 miles of data cable/fiber
• 12,000 network interfaces
• Distributed antenna system (DAS) to boost
the cellular signals
Mobile enabled
• 1,300 Wi-Fi Access Points
• 1,200 Bluetooth Beacons
• 40 Gb/s of available bandwidth
• 10 Terabyte of Data
• 1 AP for 100 Seats
• Cellular Enhanced
Now Social Media
• Brand engagements
• 50% of the ads had a special
hashtag
• Enhanced User Experience Apps
• For directions
• To order Food
• NFL emoji keyboard
• Fantasy Football
• Interactive games that let fans
catch virtual passes
Various Agencies involved
Preparation
• Understand the Network
Topology
• Set layered Inspection
and what sensors
• Understand role and
placement of sensors
• Base Line Traffic
• Understand chain of
command
Monitor Other Uses
Of the Stadium
• Local Events
• WrestleMania
• Concerts
• Foster Farms College
Bowl
Concerns
Before game day
• 14 Fiber Cuts through 2015
• New traffic showing up
• Outbound Traffic to
Ireland and other
countries
Concerns
• Horizontal Movement
between Servers
• JumboTron
• IP Harvesting
• POS
• Fake Tickets
• Fake Emails and part of
campaigns to confirm
orders
• APT’s
• Electric Power going dark
• Network Redundant
Systems in place
• and checked
What were the Fans Doing?
• 19.8% Video
• 19.6% Web-browsing
• 17.6% Social Media sharing
• 15.9% Cloud
• 2.3% Music
• 1.4% Messaging
• 1.4 % Email
• 1% Navigation
• 21% other
• Ie Twitter feeds on Cell Carriers
Met Life SB 48
• 1.1 TB of Wi-Fi Data
Univ of Phoenix SB 49
• 6.2 TB of Wi-Fi Data
• 25,936 unique Wi-Fi Users
• 17,322 Peak Concurrent
users
• 7 TB approx. data via
wireless carrier
Levi Stadium SF 50
• 10.1 TB of Wi-Fi Data +63%
• 1st to transfer 10 TB of Data over
Wi-Fi
• Sunday 6 am to 11 pm fans use
9.3TB and the media used 453 GB
• 27,315 Unique Wi-Fi users
• 20,300 Peak Concurrent users3.0
Gbps Continuous Wi-Fi bandwidth
for 4+ hrs. on Sunday
• 15.9 TB of data via wireless carrier
• 15.1 – 23Mbps download
throughout the game (3 x SB 49)
• Live Streaming consumed 315
Million Total min. @ 1.4 M users
Comparison
• Aver 49s Game generates 2.0 TB
• Wrestle Mania last March 4.5 TB
• 76,976 Fans
• 4.5 TB
• Peak 14,800 Concurrent Fans
• 1.61 Gbps Continuous data
• 2.474 Gbps
• Taylor Swift 7.1 TB ( with ½ of the
stadium closed off)
What did we Learn?
Game Stats
• 24 Million Cyber Events
• 19.6 Million events from Wired Network
• 3.8 Million from Wireless Wi-Fi Network
• Barrier1 AARE Engine 568,502 or 2.3%
Cyber never before seen in the world.
No Signatures. Definitions or Knowledge
• Game Day 6 am – 11Pm
• fans used 9.3 TB
• Media used 453 Gb
Severity of the Cyber Events
• 1 336,035 1.4%
• 2 801,122 3.3%
• 3 23,364,179 95.4%
What did we uncovered
Cnc P2P Bitorrent
TOR Vuze BtWeb Client
EDonkey Edonkey emule
Gnutella Kaza ThunderNetwork
RAT Client Heartbleed C2
Viruses
• User Agents
• Window Executable in Text file
• Anubis PushDo
• Netwire DNS Poison
• Trojan DNS
• Overtoobar.net backdoor
Most Bizarre
• Clear Text Password
• Inappropriate Websites
• Sexting
What Did we Learn
• Speeds will be faster
• Greater Emphasis on
Fan Experience
• More Apps
• Cyber Attacks will be
more complex
• There will be more
attack surfaces
• More Automation
Thank You
Thank You
Worries
• Phishing Attacks
• Ransomware
• Soft Targets – before and during the game
• Web Site compromise
• IP Harvesting
• Fake Tickets
• Fake Emails and part of campaigns to confirm orders
What were they doing?
• 19.8% Video
• 19.62% Web Browsing
• 15.9 % Cloud
• 2.29% Music
• 1.44% Messaging
• 1.3% email
• .97% Navigation
• 20.8% the rest
• Planned for 2/Gbps
• Ordered Food
• Watched Replays
• Communicating with their friends
that were not at the game
• Fantasy Football
• Stadium Apps that show direction
and locations of vendors & services
• Selfies
• 6,000 hrs. of HD Video
What Got Through
• Network Capture
• Wired 19,609,972 (normal business, Web, Mail, printing)
• Wireless 3,719,231
• AARE Engine 56,442
• Types of traffic
Continued
• Main Viruses
• User-Agent
• Flow Point 220
• Window Executable in Test File
• Anubis
• PushDo
• Netwire RD
• Overtoolbar.net backdoor
• DNS Poison
• Trojan DNS
Continued What were they doing?
• Live Streams consumed 315 Million total minutes of Game
• Average audience was 1.4 million
• Event driven traffic
• Distributed antenna system (DAS) to boost the cellular signals
• Thousands of monitors in every section of the stadium, so no one will miss a beat
• One large master control room to power those monitors with game action, graphics and replays
• Interactive games that let fans catch virtual passes
• 20,000 square feet of solar panels and a LEED Gold Certification for its environmental friendliness
• An app designed specifically to enhance the in-game experience

More Related Content

Similar to Jim Libersky: Cyber Security - Super Bowl 50

Mobile devices 5
Mobile devices 5Mobile devices 5
Mobile devices 5lerichard
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...Felipe Prado
 
Netflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case StudyNetflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case StudyKetan Patil
 
Nokta techpresentation
Nokta techpresentationNokta techpresentation
Nokta techpresentationAnkaraCloud
 
Session810 ken huang
Session810 ken huangSession810 ken huang
Session810 ken huangKen Huang
 
ThingSpeak: apps for social things
ThingSpeak: apps for social thingsThingSpeak: apps for social things
ThingSpeak: apps for social thingsHans Scharler
 
Ted Morgan - Location is what makes mobile mobile
Ted Morgan - Location is what makes mobile mobileTed Morgan - Location is what makes mobile mobile
Ted Morgan - Location is what makes mobile mobileMobile Monday Amsterdam
 
End user-experience monitoring
End user-experience monitoring End user-experience monitoring
End user-experience monitoring Site24x7
 
Web & Apps Design for Mobile Devices
Web & Apps Design for Mobile DevicesWeb & Apps Design for Mobile Devices
Web & Apps Design for Mobile Deviceslerichard
 
GC_SP_full report
GC_SP_full reportGC_SP_full report
GC_SP_full reportDan Seidman
 
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...Nebraska Library Commission
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Nicholas Davis
 
Mmsys14 amphi - slideshare
Mmsys14 amphi - slideshareMmsys14 amphi - slideshare
Mmsys14 amphi - slideshareShannon Chen
 
PlayFab analytics gdc
PlayFab analytics gdcPlayFab analytics gdc
PlayFab analytics gdcCrystin Cox
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredTom Eston
 
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...Dave Amirault
 

Similar to Jim Libersky: Cyber Security - Super Bowl 50 (20)

Mobile devices 5
Mobile devices 5Mobile devices 5
Mobile devices 5
 
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
DEF CON 27 - MASARAH PAQUET CLOUSTON and OLIVER BILODEAU - the industry of so...
 
Colorado leadership v4
Colorado leadership v4Colorado leadership v4
Colorado leadership v4
 
Netflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case StudyNetflix Recommender System : Big Data Case Study
Netflix Recommender System : Big Data Case Study
 
Nokta techpresentation
Nokta techpresentationNokta techpresentation
Nokta techpresentation
 
ICT across curriculum 2
ICT across curriculum 2ICT across curriculum 2
ICT across curriculum 2
 
Session810 ken huang
Session810 ken huangSession810 ken huang
Session810 ken huang
 
ThingSpeak: apps for social things
ThingSpeak: apps for social thingsThingSpeak: apps for social things
ThingSpeak: apps for social things
 
Ted Morgan - Location is what makes mobile mobile
Ted Morgan - Location is what makes mobile mobileTed Morgan - Location is what makes mobile mobile
Ted Morgan - Location is what makes mobile mobile
 
End user-experience monitoring
End user-experience monitoring End user-experience monitoring
End user-experience monitoring
 
Web & Apps Design for Mobile Devices
Web & Apps Design for Mobile DevicesWeb & Apps Design for Mobile Devices
Web & Apps Design for Mobile Devices
 
GC_SP_full report
GC_SP_full reportGC_SP_full report
GC_SP_full report
 
Spotify: behind the scenes
Spotify: behind the scenesSpotify: behind the scenes
Spotify: behind the scenes
 
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
NCompass Live: Pretty Sweet Tech: Internet Filtering For E-Rate CIPA Complian...
 
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
Student Presentation Sample (Netflix) -- Information Security 365/765 -- UW-M...
 
Mmsys14 amphi - slideshare
Mmsys14 amphi - slideshareMmsys14 amphi - slideshare
Mmsys14 amphi - slideshare
 
Last.fm vs Xbox
Last.fm vs Xbox Last.fm vs Xbox
Last.fm vs Xbox
 
PlayFab analytics gdc
PlayFab analytics gdcPlayFab analytics gdc
PlayFab analytics gdc
 
Social Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and UncensoredSocial Zombies Gone Wild: Totally Exposed and Uncensored
Social Zombies Gone Wild: Totally Exposed and Uncensored
 
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
The Wireless Ski Area - How Technology and Connectivity are Impacting the Gue...
 

More from centralohioissa

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Programcentralohioissa
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...centralohioissa
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directorscentralohioissa
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecuritycentralohioissa
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systemscentralohioissa
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016centralohioissa
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?centralohioissa
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...centralohioissa
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?centralohioissa
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the Warcentralohioissa
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospitalcentralohioissa
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Designcentralohioissa
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...centralohioissa
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chaincentralohioissa
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNcentralohioissa
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metricscentralohioissa
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...centralohioissa
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiativescentralohioissa
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligencecentralohioissa
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Casescentralohioissa
 

More from centralohioissa (20)

Mike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security ProgramMike Spaulding - Building an Application Security Program
Mike Spaulding - Building an Application Security Program
 
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
Jake Williams - Navigating the FDA Recommendations on Medical Device Security...
 
Bob West - Educating the Board of Directors
Bob West - Educating the Board of DirectorsBob West - Educating the Board of Directors
Bob West - Educating the Board of Directors
 
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about CybersecurityMark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
Mark Villinski - Top 10 Tips for Educating Employees about Cybersecurity
 
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access SystemsValerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
Valerie Thomas - All Your Door Belong to Me - Attacking Physical Access Systems
 
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
Dino Tsibouris & Mehmet Munur - Legal Perspective on Data Security for 2016
 
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?Jeffrey Sweet - Third Party Risk Governance - Why? and How?
Jeffrey Sweet - Third Party Risk Governance - Why? and How?
 
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
Steven Keil - BYODAWSCYW (Bring Your Own Device And Whatever Security Control...
 
Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?Tre Smith - From Decision to Implementation: Who's On First?
Tre Smith - From Decision to Implementation: Who's On First?
 
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the WarGary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
Gary Sheehan - Winning a Battle Doesn't Mean We Are Winning the War
 
Sean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a HospitalSean Whalen - How to Hack a Hospital
Sean Whalen - How to Hack a Hospital
 
Robert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software DesignRobert Hurlbut - Threat Modeling for Secure Software Design
Robert Hurlbut - Threat Modeling for Secure Software Design
 
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
Harry Regan - Disaster Recovery and Business Continuity - "It's never so bad ...
 
Rafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack ChainRafeeq Rehman - Breaking the Phishing Attack Chain
Rafeeq Rehman - Breaking the Phishing Attack Chain
 
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDNOliver Schuermann - Integrated Software in Networking - the Mystery of SDN
Oliver Schuermann - Integrated Software in Networking - the Mystery of SDN
 
Jack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security MetricsJack Nichelson - Information Security Metrics - Practical Security Metrics
Jack Nichelson - Information Security Metrics - Practical Security Metrics
 
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
Michael Woolard - Gamify Awareness Training: Failure to engage is failure to ...
 
Ruben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security InitiativesRuben Melendez - Economically Justifying IT Security Initiatives
Ruben Melendez - Economically Justifying IT Security Initiatives
 
Ed McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat IntelligenceEd McCabe - Putting the Intelligence back in Threat Intelligence
Ed McCabe - Putting the Intelligence back in Threat Intelligence
 
Ofer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World CasesOfer Maor - Security Automation in the SDLC - Real World Cases
Ofer Maor - Security Automation in the SDLC - Real World Cases
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Jim Libersky: Cyber Security - Super Bowl 50

  • 1. Cyber Threats are now front and center to the largest events in the world
  • 2. Set The Stage • 9 Days • Ranked at #1 Technically advanced in N. America • 75,000 fans into 1 stadium + operations, vendors and media • 1 Million + new Visitors into San Fran • 100+ Million watching • 150+ countries • 70 cameras filming • 360 instant freeze and Replay cameras • 36 Red Zone Cameras with 360 degree visibility and virtual playback • Superimposed yard lines • Apps offering fans an interactive experience • 400 miles of data cable/fiber • 12,000 network interfaces • Distributed antenna system (DAS) to boost the cellular signals
  • 3. Mobile enabled • 1,300 Wi-Fi Access Points • 1,200 Bluetooth Beacons • 40 Gb/s of available bandwidth • 10 Terabyte of Data • 1 AP for 100 Seats • Cellular Enhanced
  • 4. Now Social Media • Brand engagements • 50% of the ads had a special hashtag • Enhanced User Experience Apps • For directions • To order Food • NFL emoji keyboard • Fantasy Football • Interactive games that let fans catch virtual passes
  • 6. Preparation • Understand the Network Topology • Set layered Inspection and what sensors • Understand role and placement of sensors • Base Line Traffic • Understand chain of command
  • 7. Monitor Other Uses Of the Stadium • Local Events • WrestleMania • Concerts • Foster Farms College Bowl
  • 8. Concerns Before game day • 14 Fiber Cuts through 2015 • New traffic showing up • Outbound Traffic to Ireland and other countries
  • 9.
  • 10. Concerns • Horizontal Movement between Servers • JumboTron • IP Harvesting • POS • Fake Tickets • Fake Emails and part of campaigns to confirm orders • APT’s • Electric Power going dark
  • 11. • Network Redundant Systems in place • and checked
  • 12.
  • 13.
  • 14. What were the Fans Doing? • 19.8% Video • 19.6% Web-browsing • 17.6% Social Media sharing • 15.9% Cloud • 2.3% Music • 1.4% Messaging • 1.4 % Email • 1% Navigation • 21% other • Ie Twitter feeds on Cell Carriers
  • 15. Met Life SB 48 • 1.1 TB of Wi-Fi Data Univ of Phoenix SB 49 • 6.2 TB of Wi-Fi Data • 25,936 unique Wi-Fi Users • 17,322 Peak Concurrent users • 7 TB approx. data via wireless carrier Levi Stadium SF 50 • 10.1 TB of Wi-Fi Data +63% • 1st to transfer 10 TB of Data over Wi-Fi • Sunday 6 am to 11 pm fans use 9.3TB and the media used 453 GB • 27,315 Unique Wi-Fi users • 20,300 Peak Concurrent users3.0 Gbps Continuous Wi-Fi bandwidth for 4+ hrs. on Sunday • 15.9 TB of data via wireless carrier • 15.1 – 23Mbps download throughout the game (3 x SB 49) • Live Streaming consumed 315 Million Total min. @ 1.4 M users
  • 16. Comparison • Aver 49s Game generates 2.0 TB • Wrestle Mania last March 4.5 TB • 76,976 Fans • 4.5 TB • Peak 14,800 Concurrent Fans • 1.61 Gbps Continuous data • 2.474 Gbps • Taylor Swift 7.1 TB ( with ½ of the stadium closed off)
  • 17. What did we Learn? Game Stats • 24 Million Cyber Events • 19.6 Million events from Wired Network • 3.8 Million from Wireless Wi-Fi Network • Barrier1 AARE Engine 568,502 or 2.3% Cyber never before seen in the world. No Signatures. Definitions or Knowledge • Game Day 6 am – 11Pm • fans used 9.3 TB • Media used 453 Gb Severity of the Cyber Events • 1 336,035 1.4% • 2 801,122 3.3% • 3 23,364,179 95.4%
  • 18. What did we uncovered Cnc P2P Bitorrent TOR Vuze BtWeb Client EDonkey Edonkey emule Gnutella Kaza ThunderNetwork RAT Client Heartbleed C2 Viruses • User Agents • Window Executable in Text file • Anubis PushDo • Netwire DNS Poison • Trojan DNS • Overtoobar.net backdoor Most Bizarre • Clear Text Password • Inappropriate Websites • Sexting
  • 19.
  • 20.
  • 21. What Did we Learn • Speeds will be faster • Greater Emphasis on Fan Experience • More Apps • Cyber Attacks will be more complex • There will be more attack surfaces • More Automation
  • 23. Worries • Phishing Attacks • Ransomware • Soft Targets – before and during the game • Web Site compromise • IP Harvesting • Fake Tickets • Fake Emails and part of campaigns to confirm orders
  • 24. What were they doing? • 19.8% Video • 19.62% Web Browsing • 15.9 % Cloud • 2.29% Music • 1.44% Messaging • 1.3% email • .97% Navigation • 20.8% the rest • Planned for 2/Gbps • Ordered Food • Watched Replays • Communicating with their friends that were not at the game • Fantasy Football • Stadium Apps that show direction and locations of vendors & services • Selfies • 6,000 hrs. of HD Video
  • 25. What Got Through • Network Capture • Wired 19,609,972 (normal business, Web, Mail, printing) • Wireless 3,719,231 • AARE Engine 56,442 • Types of traffic
  • 26. Continued • Main Viruses • User-Agent • Flow Point 220 • Window Executable in Test File • Anubis • PushDo • Netwire RD • Overtoolbar.net backdoor • DNS Poison • Trojan DNS
  • 27. Continued What were they doing? • Live Streams consumed 315 Million total minutes of Game • Average audience was 1.4 million • Event driven traffic
  • 28. • Distributed antenna system (DAS) to boost the cellular signals • Thousands of monitors in every section of the stadium, so no one will miss a beat • One large master control room to power those monitors with game action, graphics and replays • Interactive games that let fans catch virtual passes • 20,000 square feet of solar panels and a LEED Gold Certification for its environmental friendliness • An app designed specifically to enhance the in-game experience