Lessons Learned fromWikiLeaksJohn VecchiHead of Product Marketing                            ©2011 Check Point Software Te...
WikiLeaks: Lessons LearnedChanging ThreatLandscape         ©2011 Check Point Software Technologies Ltd.   [PROTECTED] — Al...
Today’s Threat Landscape              Crime and                                           Cyber-warfare             Profit...
On Top 2010/2011 Threats…              “…widely considered the most sophisticated computer threatStuxnet       created to ...
Top Methods Used…                    Spear phishing, whaling, USBs/mediaSocial              and „friendly fire‟—are one of...
On Attacks…              Number of attack attempts    80        occurring per second by the              end of 2010.*    ...
WikiLeaks: Lessons LearnedThe Rise of WikiLeaks         ©2011 Check Point Software Technologies Ltd.   [PROTECTED] — All r...
The WikiLeaks Mission  “       …Wikileaks is a not-for-profit media       organisation… and an intelligence service       ...
What They’ve Leaked…        Released over 1 Million confidential              documents since 2007      Covering governmen...
WikiLeaks Around The World                     2011: Assange                     threatens release of                     ...
On Bradley Manning—How Files Leaked                          A low-level employee has access to                          c...
WikiLeaks: Lessons Learned‘Hactivism’ Emerges         ©2011 Check Point Software Technologies Ltd.   [PROTECTED] — All rig...
A Re-emerging Attack Vector                Motivated by politics andHacktivism      idealism. Not motivated               ...
A Re-emerging Attack Vector                Are not necessarily criminallyHacktivism      minded, but people claiming      ...
A Re-emerging Attack Vector                Focus includes informationHacktivism      theft — disclosed to                d...
A Re-emerging Attack Vector                Primary activities includeHacktivism      DDoS attacks,                website ...
The Power of Hacktivism:  Anonymous         ©2011 Check Point Software Technologies Ltd.   [PROTECTED] — All rights reserv...
“    Anonymous is the first Internet-based    superconsciousness. A group — in the sense    that a flock of birds is a gro...
Anonymous’ Global Hacktivism 2010: Amazon, PayPal,           2010: Dutch                    2010: PostFinance             ...
WikiLeaks: Lessons LearnedLessons to Learn         ©2011 Check Point Software Technologies Ltd.   [PROTECTED] — All rights...
It Will Happen Again…  RSA Security      British Petro                  Sony                               Epsilon     40,...
What Can We Learn?                                                       Lack of Data Copying                             ...
What Can We Learn?                                                         Lack of Data Copying                           ...
What Can We Learn?                                                       Lack of data copying                             ...
What Can We Learn?                                                        Lack of data copying                            ...
What Can We Learn?                                                      Lack of data copying                              ...
WikiLeaks: Lessons LearnedHow to Avoid aWikiLeaks Incident         ©2011 Check Point Software Technologies Ltd.   [PROTECT...
What Can We Learn?                                                         Deploy preventative                            ...
What Can We Learn?                                                       Deploy preventative                              ...
What Can We Learn?                                                        Deploy preventative                             ...
What Can We Learn?                                                       Deploy preventative                              ...
What Can We Learn?                                                        Deploy preventative                             ...
WikiLeaks: Lessons LearnedHow 3D Security CanHelp         ©2011 Check Point Software Technologies Ltd.   [PROTECTED] — All...
Check Point 3D Security Can Help                                                Proven, Proactive Next-                   ...
Proactive 3D Next-Gen Firewall                                     Application         Identity              Antivirus &  ...
Unified Control of All Security Layers       IPS   Mobile                                                                 ...
Check Point Data Security      Media                                                                       Full Disk    En...
Today’s Typical User ‘Involvement’NO EXPLANATION                                            NO TRAINING                   ...
People Taking Part in Security                                    EXPLANATION                                  RESOLUTION ...
Check Point UserCheck Technology     Data Loss Prevention Alert                                                Application...
360º Visibility and Threat Analysis      View unified events for firewall, IPS, DLP,   Application Control and more in a s...
360º Visibility and Threat Analysis      View unified events for firewall, IPS, DLP,   Application Control and more in a s...
360º Visibility and Threat Analysis      View unified events for firewall, IPS, DLP,   Application Control and more in a s...
Summary   BECAUSE TODAY’S THREAT    LANDSCAPE REQUIRES A PROACTIVE, UNIFIED APPROACH            ©2011 Check Point Software...
Upcoming SlideShare
Loading in …5
×

Lecciones aprendidas de Wikileaks

917 views

Published on

La fuga de más de un cuarto millón de documentos clasificados y secretos por los "hacktivistas" en 2010 es un ejemplo perfecto de lo que podría suceder en el mundo corporativo. En este video se discutirá la necesidad de una política global de protección de datos corporativos, así como la necesidad de una infraestructura de seguridad que puede promover la política a través de sensibilización de los usuarios y la educación. Además, se tratará como la infraestructura de seguridad debe proporcionar los medios para controlar el movimiento de datos y ejecutar la política a través de su red.

Published in: Technology, Business
1 Comment
0 Likes
Statistics
Notes
  • hello dear
    Nice to meet you My name is miss Helen. am a young girl I was impressed when i saw your profile today and i will like to establish a long lasting relationship with you. In addition, i will like you to reply me through my e-mail address(jonathan_helen@ymail.com) so that i will give you my picture of you to know whom i am, please i will like to tell you how much interested i am in knowing more about you, i think we can start from here and share our feelings together as one. please contact me back with my mail address Thanks waiting to hear from you dear.yours new friend
    (jonathan_helen@ymail.com)
       Reply 
    Are you sure you want to  Yes  No
    Your message goes here
  • Be the first to like this

No Downloads
Views
Total views
917
On SlideShare
0
From Embeds
0
Number of Embeds
12
Actions
Shares
0
Downloads
12
Comments
1
Likes
0
Embeds 0
No embeds

No notes for slide

Lecciones aprendidas de Wikileaks

  1. 1. Lessons Learned fromWikiLeaksJohn VecchiHead of Product Marketing ©2011 Check Point Software Technologies Ltd. | [PROTECTE] – All rights reserved.
  2. 2. WikiLeaks: Lessons LearnedChanging ThreatLandscape ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 2
  3. 3. Today’s Threat Landscape Crime and Cyber-warfare Profit-driven and Hactivists  Increased Sophistication  Cyber-warfare  Financial theft  Iran and Stuxnet  Intellectual property  Cyber Hacktivists  Criminal networks  WikiLeaks ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 3
  4. 4. On Top 2010/2011 Threats… “…widely considered the most sophisticated computer threatStuxnet created to date…Stuxnet exploited four unknown vulnerabilities, at a time when exploiting a single one is a big deal.” SOFTPEDIA.com 2011“Hackers seeking source code from Google, Adobe and others Operation used nearly 12 pieces of malware and levels of encryption to burrow deeply into company networks…” WIRED 2010 AuroraZeus “Zeus…detected only 23 percent of the time…is the No. 1 financial Trojan—representing 44 percent of all financial malware infectionsZbot today.” Darkreading.com 2010 * Monthly Malware Statistics Report—www.securelist.com ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 4
  5. 5. Top Methods Used… Spear phishing, whaling, USBs/mediaSocial and „friendly fire‟—are one of the mostEngineering prominent methods for achieving a successful attack. With Hacktivism on the rise—and many who feel WikiLeaks serves the publics Inside interest—insiders leaking sensitive data are Threats a growing method for breaches. * Monthly Malware Statistics Report—www.securelist.com ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 5
  6. 6. On Attacks… Number of attack attempts 80 occurring per second by the end of 2010.* * Monthly Malware Statistics Report—www.securelist.com ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 6
  7. 7. WikiLeaks: Lessons LearnedThe Rise of WikiLeaks ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 7
  8. 8. The WikiLeaks Mission “ …Wikileaks is a not-for-profit media organisation… and an intelligence service of the people… …our mission is to be an uncensorable Wikipedia for untraceable mass document leaking and analysis… — Julian Assange ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 8
  9. 9. What They’ve Leaked… Released over 1 Million confidential documents since 2007 Covering governments, banks, churches, trade organizations, etc.. Affecting more than 13 different nations ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 9
  10. 10. WikiLeaks Around The World 2011: Assange threatens release of damaging B of A docs 2009: Internal Kaupthing Bank documents leaked, showing bank activities that led to 2008-2010 financial crisis in Iceland 2008: Details of illegal operations by the Swiss bank Julius Bär in the Cayman Islands released 2010: Over 250K classified US diplomatic and government documents April 2011: Over 500K sensitive files released related to Guantanamo Bay released 2009: 86 telephone recordings of Peruvian politicians and businessmen involved in Peru oil scandal. ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 10
  11. 11. On Bradley Manning—How Files Leaked A low-level employee has access to classified data at a level way above his pay grade Has access to a CD/RW drive on a system that can access that data Has permissions for unrestricted copying from the network to the CD/RW drive ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 11
  12. 12. WikiLeaks: Lessons Learned‘Hactivism’ Emerges ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 12
  13. 13. A Re-emerging Attack Vector Motivated by politics andHacktivism idealism. Not motivated by Money. ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 13
  14. 14. A Re-emerging Attack Vector Are not necessarily criminallyHacktivism minded, but people claiming to be independent of any government / organization. ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 14
  15. 15. A Re-emerging Attack Vector Focus includes informationHacktivism theft — disclosed to discredit and embarrass political opponents. ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 15
  16. 16. A Re-emerging Attack Vector Primary activities includeHacktivism DDoS attacks, website defacement and information theft. ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 16
  17. 17. The Power of Hacktivism: Anonymous ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 17
  18. 18. “ Anonymous is the first Internet-based superconsciousness. A group — in the sense that a flock of birds is a group. At any given moment, more birds could join, leave or peel off in another direction entirely. — Chris Landers, Baltimore City Paper ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 18
  19. 19. Anonymous’ Global Hacktivism 2010: Amazon, PayPal, 2010: Dutch 2010: PostFinance 2010: Tunisian Visa and MasterCard government sites bank site government sites 2010: Egyptian government sites 2011: Sony 2008: PlayStation & BMI Church of Scientology networks2011: HBGary attack and defacement 2010: Zimbabwe 2009 & 2010: Australian government sites government sites ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 19
  20. 20. WikiLeaks: Lessons LearnedLessons to Learn ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 20
  21. 21. It Will Happen Again… RSA Security British Petro Sony Epsilon 40,000 unencrypted Exposed Exposed SecurID laptop with personal data names/email of authentication personal data of over 77M millions of accounts of 13,000 PlayStation customers from stolen claimants users 50 companies March March April April Recent 2011 Data Loss Events ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 21
  22. 22. What Can We Learn? Lack of Data Copying Policy LESSONS LEARNED Lack of policy to control or restrict copying sensitive data based on classification level increase risk of loss ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 22
  23. 23. What Can We Learn? Lack of Data Copying Policy LESSONS LEARNED Classified data access Low-level employees above employee grade had classified data access at a level above their position responsibility or grade ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 23
  24. 24. What Can We Learn? Lack of data copying policy LESSONS LEARNED Classified data access Hacktivism creates above employee grade new threats within— one of the most New, hacktivist threats within exist and are real difficult things to protect against. ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 24
  25. 25. What Can We Learn? Lack of data copying policy LESSONS LEARNED Classified data access Sensitive data leaked above employee grade on the internet goes global in seconds, New, hacktivist threats within exist and are real with no option to delete it. Hactivist sources can be Hactivist data breaches will go global in seconds obfuscated easily. ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 25
  26. 26. What Can We Learn? Lack of data copying policy LESSONS LEARNED Classified data access WikiLeaks and above employee grade Anonymous are motivated by New, hacktivist threats within exist and are real politics, not money. DDoS and/or defacement attacks Hactivist data breaches will go global in seconds are objectives. DDoS/defacement attacks motivated by politics ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 26
  27. 27. WikiLeaks: Lessons LearnedHow to Avoid aWikiLeaks Incident ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 27
  28. 28. What Can We Learn? Deploy preventative network protection WHAT YOU CAN DO Identify & close network vulnerabilities with proactive security technologies:  Next-Gen FW  DDoS protection  Web security/& control  Proactive IPS ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 28
  29. 29. What Can We Learn? Deploy preventative network protection WHAT YOU CAN DO Enforce encryption and Deploy encryption data copying policy technology and enforce granular data copying policies on ALL workstations and laptops. Combine with strong endpoint protection. ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 29
  30. 30. What Can We Learn? Deploy preventative network protection WHAT YOU CAN DO Enforce encryption and Reduce the data copying policy opportunity for data leakage and breaches by leveraging and Deploy proactive DLP technology deploying proactive DLP technology to protect data in-use and in-motion. ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 30
  31. 31. What Can We Learn? Deploy preventative network protection WHAT YOU CAN DO Enforce encryption and Extend Risk data copying policy Management strategies to include Deploy proactive DLP ‘impact scenarios’ technology and effective threat analysis and response. Best practices for ‘impact scenarios’ & event analysis ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 31
  32. 32. What Can We Learn? Deploy preventative network protection WHAT YOU CAN DO Enforce encryption and Train users on data copying policy sensitive information handling policies, and on the presence of Deploy proactive DLP technology sensitive data in emails, documents and applications. Focus on best practices and ‘impact scenarios’ Train users on sensitive information handling ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 32
  33. 33. WikiLeaks: Lessons LearnedHow 3D Security CanHelp ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 33
  34. 34. Check Point 3D Security Can Help Proven, Proactive Next- Generation Firewall Comprehensive, Market- Leading Data Security Engage and Train Users with UserCheck Increase Visibility & Best Practices with SmartEvent ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 34
  35. 35. Proactive 3D Next-Gen Firewall Application Identity Antivirus & FW & VPN IPS Control Awareness Anti-Malware URL Filtering DLPSoftware Blades Software Blade Software Blade Software Blade Software Blade Software Blade Software Blade Power-1 SmartEvent Software Blade SmartWorkflow Software Blade Unified Event Analysis Policy Change Management Smart-1 Check Point Unified Security Management ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 35
  36. 36. Unified Control of All Security Layers IPS Mobile Granular Visibility Access DLP SmartEventApplication Control IdentityAwareness ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 36
  37. 37. Check Point Data Security Media Full Disk Encryption Encryption VPN and Access Data Loss Control Prevention Document Security ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 37
  38. 38. Today’s Typical User ‘Involvement’NO EXPLANATION NO TRAINING ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 38
  39. 39. People Taking Part in Security EXPLANATION RESOLUTION & TRAINING ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 39
  40. 40. Check Point UserCheck Technology Data Loss Prevention Alert Application Usage Alert An email that you have just sent has You are trying to use Skype. been identified as containing sensitive information. Corporate application use policy does not allow the use of Skype. If you require Skype access for business, An email that you have just sent has please click Explain below. been allowed based on DLP policy exception. Corporate Proper Use Policy For additional details, please refer to the Corporate Data Security Policy TRAIN & ENGAGE USERS IN REAL-TIME! ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 40
  41. 41. 360º Visibility and Threat Analysis View unified events for firewall, IPS, DLP, Application Control and more in a single console ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 41
  42. 42. 360º Visibility and Threat Analysis View unified events for firewall, IPS, DLP, Application Control and more in a single console ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 42
  43. 43. 360º Visibility and Threat Analysis View unified events for firewall, IPS, DLP, Application Control and more in a single console ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 43
  44. 44. Summary BECAUSE TODAY’S THREAT LANDSCAPE REQUIRES A PROACTIVE, UNIFIED APPROACH ©2011 Check Point Software Technologies Ltd. [PROTECTED] — All rights reserved. | 44

×