SlideShare a Scribd company logo
CenturyLink and Cyber Security
Dave Mahon, Chief Security Officer
Security Concerns: What Keeps You Up at Night?
IDC Worldwide Big Data & Analytics Report for 2015
Am I meeting the
latest regulatory
requirements?
Will I pass the audit?
Do I need cyber
insurance?
What sort of policy?
What’s the cost?
Am I personally
liable should
something happen
to the company?
Is my brand
at risk?
2
Am I going
to get
breached?
783 US. data breaches tracked in 2014, with a 261% increase in size over 2013!
70 M credit cards
compromised due
to vendor leak
56 M credit cards
leaked after security
turnover & software
issues.
Digital business
assets exploited,
damaging the brand,
and taking down
parts of the network
for months.
$200 Million+
$200 Million
$15 Million+
2014: The Year of the Data Breach
3
Five Primary Sources of Threats: Inside and Outside The Network
Employees
Malicious or not,
represent up to 40%
of data breaches
INSIDER THREATS
Where is the danger?
Top threats in 2014:
1. Malicious Code
2. Web-based attacks
3. Web application attacks
4. Botnets
5. DDos
6. Spam
7. Phishing
8. Exploit Kits
9. Data Breaches
10.Physical damage /
threat / loss
11. Insider threats
12. Information Leakage
13. Identity Theft / Fraud
14. Cyber espionage
15. Ransomare
Protesters with
an Axe to Grind
Promote political
ends by targeting
specific companies
HACKTIVISTS
Zealots with
Strong Views
Seek revenge,
damage, change
TERRORISTS
Well Funded
Criminals
Seek companies with
customers and
money to lose
CYBER CRIMINALS
Government
Funded
Espionage
Target governments
and private industry to
further political change
STATE SPONSORED
4
How the Underground Economy Works
Source: Michael Yip, The University of Southhampton, Oct 2012
ATTACK SERVICES
Zero-day
exploit finders
Malware
authors
Botnet
herders
Spammers Phishers
Intruders &
Crackers
Rogue
web admins
Rogue Hosting
Spoof website
designers
Bank data
stealers
Plastic vendors
& encoders
Cashiers Scammers
Identity theft
& fraud
Carders
DELIVERY
BLENDED
SERVICES
FINANCIAL CRIME/
INDENTITY THEFT
Game login/
Envelope
stealers
Virtual asset
traders
Blackmailers Gangs/Mafia
TRADITIONAL ORGANISED
CRIMINAL GROUPS
VIRTUAL ASSETS
TRADING
Virtual currency
sellers
Mules/Drops
Exchangers
MONEY LAUNDERING
Security Service
providers
Needed by all parties
Flow of demand
Potential influence
Attack Example: State-Sponsored Espionage
Send
Spearphishing
Email
May 2013
Gain Access to
network, steals
token data
Using stolen RSA
token data and
credentials, logs into
Lockheed’s VPN.
Attack detected
only after an
attempt to
steal data.
March 2012
Victims
Aerospace and defense organizations,
computer hardware and software, legal,
energy/gas, finance, telecommunications,
mainly in the US
Stolen
Intellectual property: technology blueprints
proprietary manufacturing processes, test
results, business plans, pricing documents,
partnership agreements, and executive email
address /contact lists.
The Chinese People’s Liberation Army (PLA) accessed hundreds of
terabytes of data from over 141 organizations from 2006 – 2011
Impact
Wanted by the FBI
6
Attack Example: Cyber-Criminals
“The biggest hack in U.S. retail history”
• $148M hard costs in 6 months
• Loss consumer confidence
• CEO/top execs forced to resign
• 90 lawsuits in 90 days
• USG investigations
• Total costs could reach billions
• 40 million Target customer credit card information
• 70 million customer personal information
Target’s Point of Sale (POS) systems were
infected with a “RAM scraping” attack.
Unencrypted credit card data was collected as it
passed through the infected machine’s memory
before being transferred to Target’s payment
processing provider. Target’s intrusion detection
and anti-virus systems alerted on the malware
but it was not acted upon.
September 2013
Rinat Shabayev
develops
BlackPOS
malware and
sells it online.
November 2013
In 2 days, Malware
had reached most
Target POS devices,
and intruders were
collecting live credit
card transactions.
Phishing email sent
to Target’s payment
processing
contractor Fazio
Mechanical.
Hackers steal
credentials and gain
remote access to
Target’s billing
system.
Stolen data is
FTP’d to external
servers and
appears for sale in
online black
markets.
Hackers move
laterally inside
Target’s network to
access POS
Systems and install
BlackPOS malware.
December 2013
Impact
7
8
• Spearphishing attack
• Similar malware, attack infrastructure, and tactics
previously used by North Korea.
• Stole large amounts of sensitive corporate and
personal data.
• Released destructive malware that deleted data and
rendered thousands of Sony computers inoperable.
• Released Sony’s sensitive data to the public.
• Sensitive data made public
including emails, scripts, salaries,
and 47,000 employee records.
• Corporate data deleted
• Thousands of employee computers
unusable
• Damage to company image with
public, employees and industry
talent.
• Financial cost of both remediating
the attack & limiting movie’s
release.Likely to prevent the release of Sony‘s movie, “The
Interview,” depicting a fictional plot to assassinate North
Korea’s leader.
What?
8
Attack Example: Terrorists
Why?
Impact
Attack Example: Hacktivists
9
Offshoot of Anonymous LulzSec & Sony Pictures
May - June 2011
UAT Students “Join”
LulzSec
Hack Sony Pictures
website, access
account info
Post stolen data
on Pastebin
Goal: To “have fun,” embarrass website
owners, ridicule security measures
Victim: Sony Pictures, protesting their action
against a hacker for “jailbreaking” PS3
Impact: 37,000 comprehensive customer
contact records including passwords
stolen
Cody Kretsinger, 23
(AKA “Recursion”)
Raynoldo Rivera, 18
(AKA “Neuron”)
April 2012
Downloads first
classified
documents as
Dell contractor in
Hawaii
Edward Snowden - “Whistleblower”
American cybersecurity expert, former CIA system admin and counter intelligence trainer at
Defense Intelligence Agency (DIA). Leaked millions of classified documents to journalists.
Charged with: violating the Espionage Act, theft of government property, unauthorized
communication of national defense information, and willful communication of classified
intelligence. Fled to Russia in 2013 where he remains today.
Dec-Jan 2013
Flies to Hong
Kong, reveals
numerous NSA
docs to
Greenwald &
Poitras
Snowden connects
with reporter/
filmmaker Glenn
Greenwald
New job gives
him greater access
to classified docs.
Download 1.7 M
files using spider
program
First article
published,
Snowden
goes public.
Leaks 1st
intelligence
reports, takes
leave of absence
after 4 weeks on
the job.
Attack Example: Insider Threats
March 2013 April 2013 May 2013 June 2013
10
Collaborating
On NIST
Cyber Security
Framework
CenturyLink
CEO on
committee
Active
contributor/
participant
Who We Work With: CenturyLink Works with Many Government and Private Entities for National
Security and Customer Protection
Permanent
seat on
NCCIC floor
Member of
Cyber Unified
Coordination
Group
DEFENSE HOMELAND SECURITY JUSTICE
FCC
WHITE HOUSE, STATE, COMMERCE,
AND STATE GOVERNMENTS PRIVATE SECTOR
Network Service Provider
(NSP) Security (NSP-SEC)
Network Information
Sharing Exchange (NSIE)
Defense Industrial Base
Information Sharing Exchange
(DSIE)
OPS-Trust
24/7
presence
within
DHS
CSRIC
Working
Groups
DIB Cyber
Security /
Information
Assurance
Botnet
Takedowns
APT Mitigations
Global Infrastructure
Alliance for Internet
Safety
11
12
INTEGRATING DATA FOR HOLISTIC THREAT PICTURE
1 Confidential
Enterprise Managed Security Portfolio
CENTURYLINK
DATACENTER
MANAGED
HOSTING
ENVIRONMENT
Branch
Office
CUSTOMER
PREMISES
Headquarters
Fully Managed Defense-In-Depth Security
Security
Services
CenturyLink SOC
 Comprehensive set of security products and services at the customer premise, in the network and at the
data center managed through the Security Operations Centers
 24/7 Monitoring , Management and Incident Response
 Security Services Web Portal
IAAS CLOUD COMPUTING CONTROLS
• Robust reporting and self management
portal
• Monitored and managed, with configuration
support
•Security functionality provided from the
network
NETWORK-BASED
SERVICES
Corporate Firewall
Internet
Corporate Network

More Related Content

What's hot

Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
Sreejith Nair
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
Baltimax
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
Charles Mok
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
Ulf Mattsson
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
United Security Providers AG
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Intellias
 
Hackers
HackersHackers
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Knowledge Group
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
Deepak Kumar (D3)
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh WebinarArrow ECS UK
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCMicrosoft Asia
 
Data Sources - Digital Shadows
Data Sources - Digital ShadowsData Sources - Digital Shadows
Data Sources - Digital Shadows
Digital Shadows
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
Seqrite
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
Roen Branham
 
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and TestHow to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
Red Gate Software
 

What's hot (20)

Target data breach presentation
Target data breach presentationTarget data breach presentation
Target data breach presentation
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Protect the Unexpected
Protect the UnexpectedProtect the Unexpected
Protect the Unexpected
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
What Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security ProvidersWhat Cybercriminals Want: Company Data – by United Security Providers
What Cybercriminals Want: Company Data – by United Security Providers
 
Insecure mag-33
Insecure mag-33Insecure mag-33
Insecure mag-33
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
Hackers
HackersHackers
Hackers
 
Hackers
HackersHackers
Hackers
 
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin SukardiAddressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
Addressing Cyber Threats in The Banking Sector - Lt Col (R) Sazali Bin Sukardi
 
Cybe Crime & Its Type
Cybe Crime & Its TypeCybe Crime & Its Type
Cybe Crime & Its Type
 
Symantec Security Refresh Webinar
Symantec Security Refresh WebinarSymantec Security Refresh Webinar
Symantec Security Refresh Webinar
 
A Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDCA Joint Study by National University of Singapore and IDC
A Joint Study by National University of Singapore and IDC
 
Hacking ppt
Hacking pptHacking ppt
Hacking ppt
 
Emerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business ReadyEmerging Threats to Digital Payments - Is Your Business Ready
Emerging Threats to Digital Payments - Is Your Business Ready
 
Data Sources - Digital Shadows
Data Sources - Digital ShadowsData Sources - Digital Shadows
Data Sources - Digital Shadows
 
[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention[Infographic] Data Loss Prevention
[Infographic] Data Loss Prevention
 
Security weekly september 28 october 4, 2021
Security weekly september 28   october 4, 2021 Security weekly september 28   october 4, 2021
Security weekly september 28 october 4, 2021
 
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and TestHow to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
How to ensure SOX, HIPAA, & GDPR Compliance in Dev and Test
 

Similar to Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disrupting Businesses Like Yours.

220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
Spire Research and Consulting
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
Association for Project Management
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
Felipe Prado
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
shreyas dani
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
fasttrackcomputersol
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
SensePost
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
Seqrite
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
Aviva Spectrum™
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
David Sweigert
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
Sohail Gohir
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Stanford GSB Corporate Governance Research Initiative
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
Mukesh Chinta
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataLindsey Landolfi
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptx
Olusegun Mosugu
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
Mark Gibson
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
Hadeel Sadiq Obaid
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
Michele Thomas
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
BakerTillyConsulting
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15haney888
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & careerAmit Kumar
 

Similar to Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disrupting Businesses Like Yours. (20)

220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?220715_Cybersecurity: What's at stake?
220715_Cybersecurity: What's at stake?
 
Cyber security lifting the veil of hacking webinar
Cyber security   lifting the veil of hacking webinarCyber security   lifting the veil of hacking webinar
Cyber security lifting the veil of hacking webinar
 
Hacking 04 2011
Hacking 04 2011Hacking 04 2011
Hacking 04 2011
 
Computer hacking
Computer hackingComputer hacking
Computer hacking
 
Perform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdfPerform a search on the Web for articles and stories about social en.pdf
Perform a search on the Web for articles and stories about social en.pdf
 
Security in e-commerce
Security in e-commerceSecurity in e-commerce
Security in e-commerce
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
2014 GRC Conference in West Palm Beach-Moderated by Sonia Luna
 
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
Worldwide Cyber Threats report to House Permanent Select Committee on Intelli...
 
Rise of cyber security v0.1
Rise of cyber security v0.1Rise of cyber security v0.1
Rise of cyber security v0.1
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1Cisco Cyber Security Essentials Chapter-1
Cisco Cyber Security Essentials Chapter-1
 
Insider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary DataInsider Attacks: Theft of Intellectual and Proprietary Data
Insider Attacks: Theft of Intellectual and Proprietary Data
 
Introduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptxIntroduction-to-Cybercrime Investigation.pptx
Introduction-to-Cybercrime Investigation.pptx
 
Centrify rethink security brochure
Centrify rethink security brochureCentrify rethink security brochure
Centrify rethink security brochure
 
Cyber security threats and trends
Cyber security threats and trendsCyber security threats and trends
Cyber security threats and trends
 
A Survey On Cyber Crime Information Security
A Survey On  Cyber Crime   Information SecurityA Survey On  Cyber Crime   Information Security
A Survey On Cyber Crime Information Security
 
Baker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in CybersecurityBaker Tilly Presents: Emerging Trends in Cybersecurity
Baker Tilly Presents: Emerging Trends in Cybersecurity
 
SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15SEC 573 Project 1 2.22.15
SEC 573 Project 1 2.22.15
 
Cyberfort syllabus & career
Cyberfort syllabus & careerCyberfort syllabus & career
Cyberfort syllabus & career
 

Recently uploaded

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
TristanJasperRamos
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
ShahulHameed54211
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
Himani415946
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 

Recently uploaded (16)

guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptxLiving-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
Living-in-IT-era-Module-7-Imaging-and-Design-for-Social-Impact.pptx
 
Output determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CCOutput determination SAP S4 HANA SAP SD CC
Output determination SAP S4 HANA SAP SD CC
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
ER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAEER(Entity Relationship) Diagram for online shopping - TAE
ER(Entity Relationship) Diagram for online shopping - TAE
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 

Dave Mahon - CenturyLink & Cyber Security - How Modern Cyber Attacks Are Disrupting Businesses Like Yours.

  • 1. CenturyLink and Cyber Security Dave Mahon, Chief Security Officer
  • 2. Security Concerns: What Keeps You Up at Night? IDC Worldwide Big Data & Analytics Report for 2015 Am I meeting the latest regulatory requirements? Will I pass the audit? Do I need cyber insurance? What sort of policy? What’s the cost? Am I personally liable should something happen to the company? Is my brand at risk? 2 Am I going to get breached?
  • 3. 783 US. data breaches tracked in 2014, with a 261% increase in size over 2013! 70 M credit cards compromised due to vendor leak 56 M credit cards leaked after security turnover & software issues. Digital business assets exploited, damaging the brand, and taking down parts of the network for months. $200 Million+ $200 Million $15 Million+ 2014: The Year of the Data Breach 3
  • 4. Five Primary Sources of Threats: Inside and Outside The Network Employees Malicious or not, represent up to 40% of data breaches INSIDER THREATS Where is the danger? Top threats in 2014: 1. Malicious Code 2. Web-based attacks 3. Web application attacks 4. Botnets 5. DDos 6. Spam 7. Phishing 8. Exploit Kits 9. Data Breaches 10.Physical damage / threat / loss 11. Insider threats 12. Information Leakage 13. Identity Theft / Fraud 14. Cyber espionage 15. Ransomare Protesters with an Axe to Grind Promote political ends by targeting specific companies HACKTIVISTS Zealots with Strong Views Seek revenge, damage, change TERRORISTS Well Funded Criminals Seek companies with customers and money to lose CYBER CRIMINALS Government Funded Espionage Target governments and private industry to further political change STATE SPONSORED 4
  • 5. How the Underground Economy Works Source: Michael Yip, The University of Southhampton, Oct 2012 ATTACK SERVICES Zero-day exploit finders Malware authors Botnet herders Spammers Phishers Intruders & Crackers Rogue web admins Rogue Hosting Spoof website designers Bank data stealers Plastic vendors & encoders Cashiers Scammers Identity theft & fraud Carders DELIVERY BLENDED SERVICES FINANCIAL CRIME/ INDENTITY THEFT Game login/ Envelope stealers Virtual asset traders Blackmailers Gangs/Mafia TRADITIONAL ORGANISED CRIMINAL GROUPS VIRTUAL ASSETS TRADING Virtual currency sellers Mules/Drops Exchangers MONEY LAUNDERING Security Service providers Needed by all parties Flow of demand Potential influence
  • 6. Attack Example: State-Sponsored Espionage Send Spearphishing Email May 2013 Gain Access to network, steals token data Using stolen RSA token data and credentials, logs into Lockheed’s VPN. Attack detected only after an attempt to steal data. March 2012 Victims Aerospace and defense organizations, computer hardware and software, legal, energy/gas, finance, telecommunications, mainly in the US Stolen Intellectual property: technology blueprints proprietary manufacturing processes, test results, business plans, pricing documents, partnership agreements, and executive email address /contact lists. The Chinese People’s Liberation Army (PLA) accessed hundreds of terabytes of data from over 141 organizations from 2006 – 2011 Impact Wanted by the FBI 6
  • 7. Attack Example: Cyber-Criminals “The biggest hack in U.S. retail history” • $148M hard costs in 6 months • Loss consumer confidence • CEO/top execs forced to resign • 90 lawsuits in 90 days • USG investigations • Total costs could reach billions • 40 million Target customer credit card information • 70 million customer personal information Target’s Point of Sale (POS) systems were infected with a “RAM scraping” attack. Unencrypted credit card data was collected as it passed through the infected machine’s memory before being transferred to Target’s payment processing provider. Target’s intrusion detection and anti-virus systems alerted on the malware but it was not acted upon. September 2013 Rinat Shabayev develops BlackPOS malware and sells it online. November 2013 In 2 days, Malware had reached most Target POS devices, and intruders were collecting live credit card transactions. Phishing email sent to Target’s payment processing contractor Fazio Mechanical. Hackers steal credentials and gain remote access to Target’s billing system. Stolen data is FTP’d to external servers and appears for sale in online black markets. Hackers move laterally inside Target’s network to access POS Systems and install BlackPOS malware. December 2013 Impact 7
  • 8. 8 • Spearphishing attack • Similar malware, attack infrastructure, and tactics previously used by North Korea. • Stole large amounts of sensitive corporate and personal data. • Released destructive malware that deleted data and rendered thousands of Sony computers inoperable. • Released Sony’s sensitive data to the public. • Sensitive data made public including emails, scripts, salaries, and 47,000 employee records. • Corporate data deleted • Thousands of employee computers unusable • Damage to company image with public, employees and industry talent. • Financial cost of both remediating the attack & limiting movie’s release.Likely to prevent the release of Sony‘s movie, “The Interview,” depicting a fictional plot to assassinate North Korea’s leader. What? 8 Attack Example: Terrorists Why? Impact
  • 9. Attack Example: Hacktivists 9 Offshoot of Anonymous LulzSec & Sony Pictures May - June 2011 UAT Students “Join” LulzSec Hack Sony Pictures website, access account info Post stolen data on Pastebin Goal: To “have fun,” embarrass website owners, ridicule security measures Victim: Sony Pictures, protesting their action against a hacker for “jailbreaking” PS3 Impact: 37,000 comprehensive customer contact records including passwords stolen Cody Kretsinger, 23 (AKA “Recursion”) Raynoldo Rivera, 18 (AKA “Neuron”)
  • 10. April 2012 Downloads first classified documents as Dell contractor in Hawaii Edward Snowden - “Whistleblower” American cybersecurity expert, former CIA system admin and counter intelligence trainer at Defense Intelligence Agency (DIA). Leaked millions of classified documents to journalists. Charged with: violating the Espionage Act, theft of government property, unauthorized communication of national defense information, and willful communication of classified intelligence. Fled to Russia in 2013 where he remains today. Dec-Jan 2013 Flies to Hong Kong, reveals numerous NSA docs to Greenwald & Poitras Snowden connects with reporter/ filmmaker Glenn Greenwald New job gives him greater access to classified docs. Download 1.7 M files using spider program First article published, Snowden goes public. Leaks 1st intelligence reports, takes leave of absence after 4 weeks on the job. Attack Example: Insider Threats March 2013 April 2013 May 2013 June 2013 10
  • 11. Collaborating On NIST Cyber Security Framework CenturyLink CEO on committee Active contributor/ participant Who We Work With: CenturyLink Works with Many Government and Private Entities for National Security and Customer Protection Permanent seat on NCCIC floor Member of Cyber Unified Coordination Group DEFENSE HOMELAND SECURITY JUSTICE FCC WHITE HOUSE, STATE, COMMERCE, AND STATE GOVERNMENTS PRIVATE SECTOR Network Service Provider (NSP) Security (NSP-SEC) Network Information Sharing Exchange (NSIE) Defense Industrial Base Information Sharing Exchange (DSIE) OPS-Trust 24/7 presence within DHS CSRIC Working Groups DIB Cyber Security / Information Assurance Botnet Takedowns APT Mitigations Global Infrastructure Alliance for Internet Safety 11
  • 12. 12 INTEGRATING DATA FOR HOLISTIC THREAT PICTURE 1 Confidential Enterprise Managed Security Portfolio CENTURYLINK DATACENTER MANAGED HOSTING ENVIRONMENT Branch Office CUSTOMER PREMISES Headquarters Fully Managed Defense-In-Depth Security Security Services CenturyLink SOC  Comprehensive set of security products and services at the customer premise, in the network and at the data center managed through the Security Operations Centers  24/7 Monitoring , Management and Incident Response  Security Services Web Portal IAAS CLOUD COMPUTING CONTROLS • Robust reporting and self management portal • Monitored and managed, with configuration support •Security functionality provided from the network NETWORK-BASED SERVICES Corporate Firewall Internet Corporate Network