SlideShare a Scribd company logo
Adversary Playbook Tactical
Assessment of Protection
Techniques
Julian Cohen
Justin Berman
Julian Cohen | @HockeyInJune | http://hake.co/
● Product Security | Flatiron Health
● Founder | http://playbook.delivery/
Previously
● Application Security | Financial Services
● Vulnerability Researcher | Defense Contracting
● Penetration Tester | Boutique Consulting
● Educator | Universities
Justin Berman | @justinmberman
● Head of Security | Flatiron Health
Previously
● Head of Security Architecture | Financial Services
● Principal Consultant | Boutique Consulting
● Application Developer | Hi-Tech
https://thumbs.dreamstime.com/z/silhouettes-business-people-data-concepts-41633119.jpg
Concepts
https://www.nettitude.com/uk/eight-things-to-consider-before-deploying-cyber-threat-intelligence/
https://medium.com/@HockeyInJune/playbook-based-testing-5df4b656113a
Threat Intelligence
● Not hashes and IP address
● Actionable tactics and procedures
● Motivation, resourcing, strategies
● Expertise to distill and apply intelligence
Attacker Cost
● The cost of an attack is the minimum of
cost times the success rate
● Cost factors
○ Expertise
○ Time
○ Money
○ Resources
● Success factors
○ Target ubiquity
○ Probability
○ Access
https://trailofbits.files.wordpress.com/2011/08/attacker-math.pdf
Attacker Value
All attackers are resource constrained — @dinodaizovi
All attackers have a boss and a budget — @philvenables
Repeatability: The capability to change the target and have the attack still work
with the same success rate
Scalability: The capability to launch the attack against multiple targets with
minimal cost per additional target
https://medium.com/@HockeyInJune/playbook-based-testing-5df4b656113a
Attacker Efficiency
Attackers determine the least costly and most valuable attacks based on
Who are the targets
Required success rate
Speed of conversion
Common Attacks
Inexpensive, valuable, scalable, or repeatable:
Phishing
Credential reuse
Known vulnerabilities with public exploits
Office macros
Spyware
Vendor compromise
Costly, valueless, unscalable, or unrepeatable:
Web vulnerabilities
0-day exploits
Known vulnerabilities without public exploits
Embedded devices
Crypto weaknesses
Insider threat
Lockheed Martin’s Intrusion Kill Chain
● Eric M. Hutchins, Michael J. Cloppert,
Rohan M. Amin, Ph.D.
● 6th International Conference Information
Warfare and Security (ICIW 11)
https://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf
Offensive Experience
● Attacker constraints
○ Resourcing, expertise, time
● Political constraints
○ Management
● Motivations
○ Military, financial, political
● Research and development
○ Pipelines, iterations, constraints
http://www.cyberwar.news/wp-content/uploads/sites/32/2015/10/china_cyberwar.jpg
Integrating
Concepts
Into
Programs
The Cycle
The OODA Loop as Applied To A
Security Program
● Observe - Collect Intelligence
● Orient - Model Threats
● Decide - Prioritize
● Act - Design and Build
Observe and Orient - The Traditional Way
Building Intrusion Kill Chains
● Analyze existing intelligence
○ Reports, news, breaches
● Analyze whitehat research
○ Presentations, reports, tools
● Collect intelligence
○ Honeypots, scanners, logging
● Understand motivations and resourcing
○ Military, criminal, political
● Use expertise to build theories
○ From experience, breaches, and research
● Recon: E-mail harvesting
● Weapon: Office macros
● Delivery: Phishing
● Exploit: Target runs macro
● Install: Poison Ivy
● C2: Poison Ivy
● Actions: Pivots to active directory
Intrusion Kill Chain
https://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf
Intrusion Kill Chain
Phase Detect Deny Disrupt Degrade Deceive Destroy
E-mail harvesting Fake employee Policy Policy Fake employee
Office macros Kill whitehats Hack
Phishing Mail gateway Mail gateway Mail gateway Training
Target runs macro EPP EPP Macros off No local admin Sandbox
Poison Ivy EPP EPP EPP Sandbox Sandbox
Poison Ivy NIDS Firewall NIPS Web proxy Sandbox
Pivots to active
directory
Logging 2-factor auth SMB signing Segmentation Honeypot
Key:
EPP: Endpoint Protection Platform
NIDS: Network Intrusion Detection System
NIPS: Network Intrusion Prevention System
SMB: Server Message Block Protocol
Observe and Orient - Integrating Intelligence
Observe and Orient - Integrating Intelligence
Observe and Orient - Integrating Intelligence
Decide - Traditional
● SQL Injection Vulnerability
● Authenticated
● VPN
● Sensitive Data
● Yields: Full Database Access
● High Impact, Low Likelihood
CVSSv3: 7.7
Unlikely to occur
Likelihood Versus Impact
● PDF Memory Corruption Vulnerability
● Commercial Software
● Support Staff
● Customer Data
● Yields: Some Data and Foothold Machine
● Low Impact, Medium Likelihood
CVSSv3: 6.7
Likely to occur
● Conclusion: Treat everything as High Impact, most issues should be scored on Likelihood
https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
Attacker Cost
● Recon: E-mail harvesting
● Weapon: Office macros
● Delivery: Phishing
● Exploit: Target runs macro
● Install: Poison Ivy
● C2: Poison Ivy
● Actions: Pivots to active directory
● Recon: LinkedIn harvesting
● Weapon: Angler exploit kit
● Delivery: Phishing
● Exploit: Browser exploits runs
● Install: Custom malware
● C2: Custom encrypted channel
● Actions: Pivots to database servers
Financially-motivated, medium-resourced group
Resources focused towards what’s necessary
Strategy: Collect credit card numbers
State-sponsored, well-resourced group
Resources focused towards target set
Strategy: Attack everyone and wait
Attacker Cost
● Recon: E-mail harvesting
● Weapon: Office macros
● Delivery: Phishing
● Exploit: Target runs macro
● Install: Poison Ivy
● C2: Poison Ivy
● Actions: Pivots to active directory
● Recon: LinkedIn harvesting
● Weapon: Angler exploit kit
● Delivery: Phishing
● Exploit: Browser exploits runs
● Install: Custom malware
● C2: Custom encrypted channel
● Actions: Pivots to database servers
Common Tactics
Key:
White: Shared attacks
Attacker Cost
● Recon: E-mail harvesting
● Weapon: Office macros
● Delivery: Phishing
● Exploit: Target runs macro
● Install: Poison Ivy
● C2: Poison Ivy
● Actions: Pivots to active directory
● Recon: LinkedIn harvesting
● Weapon: Angler exploit kit
● Delivery: Phishing
● Exploit: Browser exploits runs
● Install: Custom malware
● C2: Custom encrypted channel
● Actions: Pivots to database servers
Attacker Cost (Likelihood)
Key:
Red: Low-cost to attacker, high likelihood of attack
Attacker Cost
● Recon: E-mail harvesting
● Weapon: Office macros
● Delivery: Phishing
● Exploit: Target runs macro
● Install: Poison Ivy
● C2: Poison Ivy
● Actions: Pivots to active directory
● Recon: LinkedIn harvesting
● Weapon: Angler exploit kit
● Delivery: Phishing
● Exploit: Browser exploits runs
● Install: Custom malware
● C2: Custom encrypted channel
● Actions: Pivots to database servers
Cost to Change (Future Likelihood)
Key:
Red: High-cost to change, high likelihood of attack
Attacker Cost
● Recon: E-mail harvesting
● Weapon: Office macros
● Delivery: Phishing
● Exploit: Target runs macro
● Install: Poison Ivy
● C2: Poison Ivy
● Actions: Pivots to active directory
● Recon: LinkedIn harvesting
● Weapon: Angler exploit kit
● Delivery: Phishing
● Exploit: Browser exploits runs
● Install: Custom malware
● C2: Custom encrypted channel
● Actions: Pivots to database servers
Key:
Green: Low-cost to defend
Defender Cost
Intrusion Kill Chain
Phase Detect Deny Disrupt Degrade Deceive Destroy
E-mail harvesting Fake employee Policy Policy Fake employee
Office macros Kill whitehats Hack
Phishing Mail gateway Mail gateway Mail gateway Training
Target runs macro EPP EPP Macros off No local admin Sandbox
Poison Ivy EPP EPP EPP Sandbox Sandbox
Poison Ivy NIDS Firewall NIPS Web proxy Sandbox
Pivots to active
directory
Logging 2-factor auth SMB signing Segmentation Honeypot
Key:
EPP: Endpoint Protection Platform
NIDS: Network Intrusion Detection System
NIPS: Network Intrusion Prevention System
SMB: Server Message Block Protocol
Key:
Green: Low-cost to defender
Red: High-cost to attacker
Decide - Integrating Intelligence
Act - Traditional
● Message authenticity, signatures, and intelligence feeds
○ Bottom 20% attackers use blacklisted domains, fingerprintable templates, known malware
● Sanity checks and heuristics
○ Next 30% of attackers use new domains, obvious templates, unknown malware
● Sandbox for attachments and links
○ Next 30% of attackers use techniques designed to bypass common protections
● Difficult to detect sandbox
○ Next 15% of attackers use sandbox evasion techniques
● Top 5% of attackers will bypass the mail gateway
Attacker Efficiency
Act - Integrating Intelligence
Financially-motivated, medium-resourced group
Resources focused towards what’s necessary
Strategy: Collect credit card numbers
State-sponsored, well-resourced group
Resources focused towards target set
Strategy: Attack everyone and wait
Demonstrate
Success
The Challenge
● Do we know the set of attackers that are relevant
for our organization?
○ Are these right attackers?
○ Have we enumerated their playbooks?
○ Are their playbooks accurate?
Key Question 1
Key Question 2
● Are we able to defend against the playbooks we
are focused on?
○ Have we tested that?
Key Question 3
● Have we effectively prioritized existing gaps
against the most likely attackers?
○ Are we making reasonable progress towards
reducing risk?
○ Do we have enough resources allocated to
these efforts?
Key Question 4
● Are we accurately and effectively predicting
future changes?
○ When and who will become new attackers in
the future?
○ Which and when will attacker playbooks
change?
Combat
Common
Issues
Objective and Easy To Analyze Data Is Hard To Get
Diverges From Management Comfort Zones
What about Regulations?
Shortage of Talent Capable of Executing
We’re Hiring!
security@flatiron.com

More Related Content

What's hot

What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
Panda Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
Marlabs
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
OWASP Delhi
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
Deep Shankar Yadav
 
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
PROIDEA
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
Sirius
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Mark Arena
 
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Albert Hui
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
NTT Innovation Institute Inc.
 
The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...
Mark Arena
 
Battlefield network
Battlefield networkBattlefield network
Battlefield network
Tal Be'ery
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
Mark Arena
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
Infosec
 
The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...
Mark Arena
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
OWASP Delhi
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in security
Osama Ellahi
 
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE - ATT&CKcon
 
The Risks of YOLOing-2.pdf
The Risks of YOLOing-2.pdfThe Risks of YOLOing-2.pdf
The Risks of YOLOing-2.pdf
Hacken
 
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Chi En (Ashley) Shen
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
Spyglass Security
 

What's hot (20)

What is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda SecurityWhat is Threat Hunting? - Panda Security
What is Threat Hunting? - Panda Security
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep SinghCyber threat Intelligence and Incident Response by:-Sandeep Singh
Cyber threat Intelligence and Incident Response by:-Sandeep Singh
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
Inside Cybercrime Groups Harvesting Active Directory for Fun and Profit - Vit...
 
6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence6 Steps for Operationalizing Threat Intelligence
6 Steps for Operationalizing Threat Intelligence
 
Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...Cyber Threat Intelligence: Building and maturing an intelligence program that...
Cyber Threat Intelligence: Building and maturing an intelligence program that...
 
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
Cyber Threat Intelligence: What do we Want? The Incident Response and Technol...
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...
 
Battlefield network
Battlefield networkBattlefield network
Battlefield network
 
How to build a cyber threat intelligence program
How to build a cyber threat intelligence programHow to build a cyber threat intelligence program
How to build a cyber threat intelligence program
 
Cyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down IntrudersCyber Threat Hunting: Identify and Hunt Down Intruders
Cyber Threat Hunting: Identify and Hunt Down Intruders
 
The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...The Cybercriminal Underground: Understanding and categorising criminal market...
The Cybercriminal Underground: Understanding and categorising criminal market...
 
Actionable Threat Intelligence
Actionable Threat IntelligenceActionable Threat Intelligence
Actionable Threat Intelligence
 
Threat intelligence in security
Threat intelligence in securityThreat intelligence in security
Threat intelligence in security
 
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
MITRE ATT&CKcon 2.0: Prioritizing Data Sources for Minimum Viable Detection; ...
 
The Risks of YOLOing-2.pdf
The Risks of YOLOing-2.pdfThe Risks of YOLOing-2.pdf
The Risks of YOLOing-2.pdf
 
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
Catching the Golden Snitch- Leveraging Threat Intelligence Platforms to Defen...
 
Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2Hunting: Defense Against The Dark Arts v2
Hunting: Defense Against The Dark Arts v2
 

Similar to Adversary Playbook Tactical Assessment of Protection Techniques

CSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdfCSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdf
SaraJayneTerp
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
Iain Dickson
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
Tomppa Järvinen
 
Hunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark Arts
Spyglass Security
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
inLabFIB
 
Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdf
Abhi Jain
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
Priyanka Aash
 
CSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdfCSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdf
SaraJayneTerp
 
CanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfCanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdf
SaraJayneTerp
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
SecureDocs
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
ssuser4237d4
 
WHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & HandlingWHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & Handling
APNIC
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
Cloudflare
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
JoAnna Cheshire
 
Evolution of Offensive Assessments - RootCon
Evolution of Offensive Assessments - RootConEvolution of Offensive Assessments - RootCon
Evolution of Offensive Assessments - RootCon
Jorge Orchilles
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Resilient Systems
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
APNIC
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
Digit Oktavianto
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
WSO2
 

Similar to Adversary Playbook Tactical Assessment of Protection Techniques (20)

CSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdfCSW2022_08_behaviours.pptx.pdf
CSW2022_08_behaviours.pptx.pdf
 
Cyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feedsCyber Threat Intelligence - It's not just about the feeds
Cyber Threat Intelligence - It's not just about the feeds
 
Information security - what is going on 2016
Information security - what is going on 2016Information security - what is going on 2016
Information security - what is going on 2016
 
Hunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark ArtsHunting: Defense Against The Dark Arts
Hunting: Defense Against The Dark Arts
 
Cyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutionsCyber Security - awareness, vulnerabilities and solutions
Cyber Security - awareness, vulnerabilities and solutions
 
Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdf
 
Threat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formalThreat Hunting - Moving from the ad hoc to the formal
Threat Hunting - Moving from the ad hoc to the formal
 
CSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdfCSW2022_01_introduction.pptx.pdf
CSW2022_01_introduction.pptx.pdf
 
CanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdfCanSecWest_cogsec_course_01_introduction.pdf
CanSecWest_cogsec_course_01_introduction.pdf
 
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From CyberthreatsCybersecurity: Malware & Protecting Your Business From Cyberthreats
Cybersecurity: Malware & Protecting Your Business From Cyberthreats
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
WHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & HandlingWHOIS Database for Incident Response & Handling
WHOIS Database for Incident Response & Handling
 
The 2019 Security Strategy
The 2019 Security StrategyThe 2019 Security Strategy
The 2019 Security Strategy
 
Today's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your BusinessToday's Cyber Challenges: Methodology to Secure Your Business
Today's Cyber Challenges: Methodology to Secure Your Business
 
Evolution of Offensive Assessments - RootCon
Evolution of Offensive Assessments - RootConEvolution of Offensive Assessments - RootCon
Evolution of Offensive Assessments - RootCon
 
Today's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About ItToday's Breach Reality, The IR Imperative, And What You Can Do About It
Today's Breach Reality, The IR Imperative, And What You Can Do About It
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
Application Security - Your Success Depends on it
Application Security - Your Success Depends on itApplication Security - Your Success Depends on it
Application Security - Your Success Depends on it
 

Recently uploaded

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Adversary Playbook Tactical Assessment of Protection Techniques

  • 1. Adversary Playbook Tactical Assessment of Protection Techniques Julian Cohen Justin Berman
  • 2. Julian Cohen | @HockeyInJune | http://hake.co/ ● Product Security | Flatiron Health ● Founder | http://playbook.delivery/ Previously ● Application Security | Financial Services ● Vulnerability Researcher | Defense Contracting ● Penetration Tester | Boutique Consulting ● Educator | Universities
  • 3. Justin Berman | @justinmberman ● Head of Security | Flatiron Health Previously ● Head of Security Architecture | Financial Services ● Principal Consultant | Boutique Consulting ● Application Developer | Hi-Tech
  • 5. https://www.nettitude.com/uk/eight-things-to-consider-before-deploying-cyber-threat-intelligence/ https://medium.com/@HockeyInJune/playbook-based-testing-5df4b656113a Threat Intelligence ● Not hashes and IP address ● Actionable tactics and procedures ● Motivation, resourcing, strategies ● Expertise to distill and apply intelligence
  • 6. Attacker Cost ● The cost of an attack is the minimum of cost times the success rate ● Cost factors ○ Expertise ○ Time ○ Money ○ Resources ● Success factors ○ Target ubiquity ○ Probability ○ Access https://trailofbits.files.wordpress.com/2011/08/attacker-math.pdf
  • 7. Attacker Value All attackers are resource constrained — @dinodaizovi All attackers have a boss and a budget — @philvenables Repeatability: The capability to change the target and have the attack still work with the same success rate Scalability: The capability to launch the attack against multiple targets with minimal cost per additional target https://medium.com/@HockeyInJune/playbook-based-testing-5df4b656113a
  • 8. Attacker Efficiency Attackers determine the least costly and most valuable attacks based on Who are the targets Required success rate Speed of conversion
  • 9. Common Attacks Inexpensive, valuable, scalable, or repeatable: Phishing Credential reuse Known vulnerabilities with public exploits Office macros Spyware Vendor compromise Costly, valueless, unscalable, or unrepeatable: Web vulnerabilities 0-day exploits Known vulnerabilities without public exploits Embedded devices Crypto weaknesses Insider threat
  • 10. Lockheed Martin’s Intrusion Kill Chain ● Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin, Ph.D. ● 6th International Conference Information Warfare and Security (ICIW 11) https://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf
  • 11. Offensive Experience ● Attacker constraints ○ Resourcing, expertise, time ● Political constraints ○ Management ● Motivations ○ Military, financial, political ● Research and development ○ Pipelines, iterations, constraints http://www.cyberwar.news/wp-content/uploads/sites/32/2015/10/china_cyberwar.jpg
  • 13. The Cycle The OODA Loop as Applied To A Security Program ● Observe - Collect Intelligence ● Orient - Model Threats ● Decide - Prioritize ● Act - Design and Build
  • 14. Observe and Orient - The Traditional Way
  • 15. Building Intrusion Kill Chains ● Analyze existing intelligence ○ Reports, news, breaches ● Analyze whitehat research ○ Presentations, reports, tools ● Collect intelligence ○ Honeypots, scanners, logging ● Understand motivations and resourcing ○ Military, criminal, political ● Use expertise to build theories ○ From experience, breaches, and research
  • 16. ● Recon: E-mail harvesting ● Weapon: Office macros ● Delivery: Phishing ● Exploit: Target runs macro ● Install: Poison Ivy ● C2: Poison Ivy ● Actions: Pivots to active directory Intrusion Kill Chain https://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/LM-White-Paper-Intel-Driven-Defense.pdf
  • 17. Intrusion Kill Chain Phase Detect Deny Disrupt Degrade Deceive Destroy E-mail harvesting Fake employee Policy Policy Fake employee Office macros Kill whitehats Hack Phishing Mail gateway Mail gateway Mail gateway Training Target runs macro EPP EPP Macros off No local admin Sandbox Poison Ivy EPP EPP EPP Sandbox Sandbox Poison Ivy NIDS Firewall NIPS Web proxy Sandbox Pivots to active directory Logging 2-factor auth SMB signing Segmentation Honeypot Key: EPP: Endpoint Protection Platform NIDS: Network Intrusion Detection System NIPS: Network Intrusion Prevention System SMB: Server Message Block Protocol
  • 18. Observe and Orient - Integrating Intelligence
  • 19. Observe and Orient - Integrating Intelligence
  • 20. Observe and Orient - Integrating Intelligence
  • 22. ● SQL Injection Vulnerability ● Authenticated ● VPN ● Sensitive Data ● Yields: Full Database Access ● High Impact, Low Likelihood CVSSv3: 7.7 Unlikely to occur Likelihood Versus Impact ● PDF Memory Corruption Vulnerability ● Commercial Software ● Support Staff ● Customer Data ● Yields: Some Data and Foothold Machine ● Low Impact, Medium Likelihood CVSSv3: 6.7 Likely to occur ● Conclusion: Treat everything as High Impact, most issues should be scored on Likelihood https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator
  • 23. Attacker Cost ● Recon: E-mail harvesting ● Weapon: Office macros ● Delivery: Phishing ● Exploit: Target runs macro ● Install: Poison Ivy ● C2: Poison Ivy ● Actions: Pivots to active directory ● Recon: LinkedIn harvesting ● Weapon: Angler exploit kit ● Delivery: Phishing ● Exploit: Browser exploits runs ● Install: Custom malware ● C2: Custom encrypted channel ● Actions: Pivots to database servers Financially-motivated, medium-resourced group Resources focused towards what’s necessary Strategy: Collect credit card numbers State-sponsored, well-resourced group Resources focused towards target set Strategy: Attack everyone and wait
  • 24. Attacker Cost ● Recon: E-mail harvesting ● Weapon: Office macros ● Delivery: Phishing ● Exploit: Target runs macro ● Install: Poison Ivy ● C2: Poison Ivy ● Actions: Pivots to active directory ● Recon: LinkedIn harvesting ● Weapon: Angler exploit kit ● Delivery: Phishing ● Exploit: Browser exploits runs ● Install: Custom malware ● C2: Custom encrypted channel ● Actions: Pivots to database servers Common Tactics Key: White: Shared attacks
  • 25. Attacker Cost ● Recon: E-mail harvesting ● Weapon: Office macros ● Delivery: Phishing ● Exploit: Target runs macro ● Install: Poison Ivy ● C2: Poison Ivy ● Actions: Pivots to active directory ● Recon: LinkedIn harvesting ● Weapon: Angler exploit kit ● Delivery: Phishing ● Exploit: Browser exploits runs ● Install: Custom malware ● C2: Custom encrypted channel ● Actions: Pivots to database servers Attacker Cost (Likelihood) Key: Red: Low-cost to attacker, high likelihood of attack
  • 26. Attacker Cost ● Recon: E-mail harvesting ● Weapon: Office macros ● Delivery: Phishing ● Exploit: Target runs macro ● Install: Poison Ivy ● C2: Poison Ivy ● Actions: Pivots to active directory ● Recon: LinkedIn harvesting ● Weapon: Angler exploit kit ● Delivery: Phishing ● Exploit: Browser exploits runs ● Install: Custom malware ● C2: Custom encrypted channel ● Actions: Pivots to database servers Cost to Change (Future Likelihood) Key: Red: High-cost to change, high likelihood of attack
  • 27. Attacker Cost ● Recon: E-mail harvesting ● Weapon: Office macros ● Delivery: Phishing ● Exploit: Target runs macro ● Install: Poison Ivy ● C2: Poison Ivy ● Actions: Pivots to active directory ● Recon: LinkedIn harvesting ● Weapon: Angler exploit kit ● Delivery: Phishing ● Exploit: Browser exploits runs ● Install: Custom malware ● C2: Custom encrypted channel ● Actions: Pivots to database servers Key: Green: Low-cost to defend Defender Cost
  • 28. Intrusion Kill Chain Phase Detect Deny Disrupt Degrade Deceive Destroy E-mail harvesting Fake employee Policy Policy Fake employee Office macros Kill whitehats Hack Phishing Mail gateway Mail gateway Mail gateway Training Target runs macro EPP EPP Macros off No local admin Sandbox Poison Ivy EPP EPP EPP Sandbox Sandbox Poison Ivy NIDS Firewall NIPS Web proxy Sandbox Pivots to active directory Logging 2-factor auth SMB signing Segmentation Honeypot Key: EPP: Endpoint Protection Platform NIDS: Network Intrusion Detection System NIPS: Network Intrusion Prevention System SMB: Server Message Block Protocol Key: Green: Low-cost to defender Red: High-cost to attacker
  • 29. Decide - Integrating Intelligence
  • 31. ● Message authenticity, signatures, and intelligence feeds ○ Bottom 20% attackers use blacklisted domains, fingerprintable templates, known malware ● Sanity checks and heuristics ○ Next 30% of attackers use new domains, obvious templates, unknown malware ● Sandbox for attachments and links ○ Next 30% of attackers use techniques designed to bypass common protections ● Difficult to detect sandbox ○ Next 15% of attackers use sandbox evasion techniques ● Top 5% of attackers will bypass the mail gateway Attacker Efficiency
  • 32. Act - Integrating Intelligence Financially-motivated, medium-resourced group Resources focused towards what’s necessary Strategy: Collect credit card numbers State-sponsored, well-resourced group Resources focused towards target set Strategy: Attack everyone and wait
  • 35. ● Do we know the set of attackers that are relevant for our organization? ○ Are these right attackers? ○ Have we enumerated their playbooks? ○ Are their playbooks accurate? Key Question 1
  • 36. Key Question 2 ● Are we able to defend against the playbooks we are focused on? ○ Have we tested that?
  • 37. Key Question 3 ● Have we effectively prioritized existing gaps against the most likely attackers? ○ Are we making reasonable progress towards reducing risk? ○ Do we have enough resources allocated to these efforts?
  • 38. Key Question 4 ● Are we accurately and effectively predicting future changes? ○ When and who will become new attackers in the future? ○ Which and when will attacker playbooks change?
  • 40. Objective and Easy To Analyze Data Is Hard To Get
  • 41. Diverges From Management Comfort Zones
  • 43. Shortage of Talent Capable of Executing