SlideShare a Scribd company logo
Insider Threats:
Lessons from Snowden
Piers Wilson
Tier-3 Huntsman® - Head of Product Management
About Tier-3 / Huntsman
2
• Tier-3
– Australian/UK based
security software
company
– Established 1999
– Pioneer of Behavioural
Anomaly Detection
(BAD) technology within
SIEM products
• Huntsman
– Intelligent SIEM solution
– Full event correlation and behavioural
profiling, anomaly detection and alerting
– Automatic response capability
– Targeted at security-critical large
enterprises and government
– In-built compliance monitoring support
for PCI-DSS, ISO27001, GPG13, FISMA
– Multi-tenancy support
© 2013 Tier-3 Pty Limited. All rights reserved.
Protective security has a role
3
• A barrier between those who
have access and those who
don’t:
– Encryption means those that need access will
get it, and those that don’t do not
– Access controls limit what data users can access
and what they can do with it
– Firewalls constrain the types of network traffic
systems can exchange
• Often controls are several layers
deep:
– Network
– Server
– Application
– End point
© 2013 Tier-3 Pty Limited. All rights reserved.
The insider threat picture is complex
4© 2013 Tier-3 Pty Limited. All rights reserved.
"You're dealing
with authorized
users doing
authorized things
for malicious
purposes.”
Patrick Reidy, CISO
for the FBI
Insider
Threats
Physical
Electronic
Ethical
Deliberate
Accidental
Whistle
blowing
Insider
community
Motivation
Genuine
losses
Media
Fame
Breaching
data
Negligence
Revenge
Network
USB/Disk
Paper
Granting
access/tail gating
Verbal
Normal
users
System
admins
External parties
Relationship
Customers Contractors Staff
Journalists
Trojans/
APTs
Social media
Waterholes
Insider threats are
5© 2013 Tier-3 Pty Limited. All rights reserved.
• Multi-dimensional
• Can circumvent protective controls
• Wider than just “Insiders”
– Contractors, Journalists, Whistle-blowers
– Advanced Persistent Threats / Trojans - the “weaponising” of
insiders
– Social media risks, “over share”, leaked secrets, exposed plans /
locations / staff / details
• Insiders can cause, or be culpable in causing,
breaches
Insider threats are a common theme in
security surveys
6© 2013 Tier-3 Pty Limited. All rights reserved.
Threat actor
categories
across
47,000+
security
incidents
Sources:
PwC/BIS UK information security breaches survey 2013, Verizon data breach report 2013, Comptia Information
Security Trends 2012
What are the components of the solution
7© 2013 Tier-3 Pty Limited. All rights reserved.
Endpoint &
content-aware
controlsSystem activity,
network traffic
and
behavioural
analysis
Robust activity
monitoring &
correlation
Privileged &
admin accounts
Awareness,
education and
“publicity”
Context and
threat
intelligence
Control privileged & admin accounts
8© 2013 Tier-3 Pty Limited. All rights reserved.
Solutions do exist to control privileged accounts and the
process of granting/revoking access for changes and
incidents:
• Some systems are not under your “direct” control such as cloud
applications, managed networks or 3rd parties
• It is difficult to control what people do with the privileged access
they have
What works for the NSA might not be as workable in the
commercial sector
• Dual control can be expensive, with high overheads
Administrators have wide ranging power, access and
knowledge so oversight is still needed
End-point and content-aware controls
9© 2013 Tier-3 Pty Limited. All rights reserved.
These control data being extracted, exported or stolen
• There are several ways you can lose control of your data
– Beyond the access permissions, encryption, ISMS in your environment
– When exchanged on CD, USB, network, Dropbox, social media, email,
home PC’s, mobile devices, cloud or in unstructured storage
• Businesses need to enable people to transmit/exchange data
flexibly
Limitations
• End-point/DLP/Proxy solutions may not fully address the risk
– encryption can mask data flows / remote systems won’t be protected
• Encryption of laptops/USB media only protects from unauthorised
access
• Controls need to be part of the wider security and reporting
environment
• The business view of what is, and isn’t, acceptable or risky is not
Robust monitoring, correlation and analysis
10© 2013 Tier-3 Pty Limited. All rights reserved.
It is vital to:
• Generate logs
AND
• Include systems, networks, applications
• Incorporate central oversight of other security
controls
AND
• Collect them centrally, away from the source
AND
• Analyse and correlate the contents
AND
• Protect access to logs and audit trails
AND
• Separate duties between users, admins,
auditors
If any of these fail the detective/investigative options erode rapidly
Network traffic & behavioural analysis
11© 2013 Tier-3 Pty Limited. All rights reserved.
It is important to be able to monitor activity based, not on rules,
but on deviance from a normal profile:
• Monitor how people operate – what they do, where, how often
• Understand how systems work “contextually”
• Track variable (multiple) baselines of the different data dimensions
• Recognise anomalies (statistics, thresholds, deviations)
Early/proactive detection allows an analyst to investigate
and diagnose incidents
Predictive behaviour analysis (i.e. trying to predict when someone is going to misuse
systems or steal data) is no better than randomly predicting insider misuse
“ ... the FBI moved toward a behavioural detection methodology that has proved far more
effective” (source: FBI research)
“Even if all you can measure is the
telemetry to look at prints from a
print server, you can look at things
like what's the volume, how many
and how big are the files, and how
often do they do print”
Patrick Reidy, FBI
Awareness: What is the point?
12© 2013 Tier-3 Pty Limited. All rights reserved.
Simple Awareness alone won’t defend against:
• Deliberate attacks
• Targeted social-engineering or a spear-phishing
attack that has been made convincing enough
• The effects of normal human psychology and
behaviours:
• Whether people care about it
• Or remember three months on
• Or understand why it is important
• Or are tied to a habit or a group behaviour that is
different
• Misuse by people who have knowledge of control
weaknesses
Visible and publicised oversight mechanisms
will:
• Be more memorable than point-in-time eLearning
training messages
• Deter malicious thefts or attacks where control
and oversight is obvious
• Support deterrence, detection and resolution
• Forcing behaviours and actions which are more
evident
• Enable “accidents” to be used for future education
initiatives
• You can target awareness activities better
• You can create security “rumble strips”
Threat intelligence: the insider context
13© 2013 Tier-3 Pty Limited. All rights reserved.
Intelligent monitoring is important
14© 2013 Tier-3 Pty Limited. All rights reserved.
1
You need to monitor security controls and their operation
anyway, compliance with security standards demands it,
auditors will ask for it and good practice dictates it
• PCI-DSS, ISO27001, BIS “10 steps”, GPG13, FISMA
agree
4
An accidental breach could have several causes;
but will often be an unusual or significant series of
events which may be able to be codified in
advance, or following an incident
• Monitoring technology may help to diagnose and
prevent future occurrences
3The monitoring of activity and logs provides the evidence
businesses need to take action (civil, criminal, HR) even
if the process of detection comes from another source
2
The presence of “visible” or “publicised” monitoring
controls and an established track record of
detection, is a big deterrent to the malicious
insider
• Detecting and preventing or to otherwise taking
action against a culprit
5
Robust monitoring shows what is going on within an
organisation which means oversight processes can be
based on the audit records, rather than having to expose
the original data within investigative activity
Endpoint &
content-aware
controlsSystem activity,
network traffic
and
behavioural
analysis
Robust activity
monitoring &
correlation
Privileged &
admin accounts
Awareness,
education and
“publicity”
Context and
threat
intelligence
Solution coverage
15© 2013 Tier-3 Pty Limited. All rights reserved.
Copyright © Tier-3 Pty Ltd, 2013. All rights
16
Questions
Contact us at:
info@tier-3.com
+44 (0) 208 433 6790 +61 (0) 2 9419 3200
More information at:
Download our insider threat whitepaper
www.tier-3.com @tier3huntsman

More Related Content

What's hot

SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
Thomas Christopher Ty
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
Murray Security Services
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
Nigel Hanson
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Resilient Systems
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
Andrew Case
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
misecho
 
Mis
MisMis
Mis
misecho
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
everestsky66
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
Legal Services National Technology Assistance Project (LSNTAP)
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
HelpSystems
 
information security technology
information security technologyinformation security technology
information security technology
garimasagar
 
Mis
MisMis
Mis
misecho
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
KAMRAN KHALID
 
Computing safety
Computing safetyComputing safety
Computing safety
titoferrus
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
ObserveIT
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
Nada G.Youssef
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
SmartCompliance
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
Al Balqa Applied University
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
Napier University
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and Training
Priyank Hada
 

What's hot (20)

SEC440: Incident Response Plan
SEC440: Incident Response PlanSEC440: Incident Response Plan
SEC440: Incident Response Plan
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises10 Security issues facing NZ Enterprises
10 Security issues facing NZ Enterprises
 
Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)Craft Your Cyber Incident Response Plan (Before It's Too Late)
Craft Your Cyber Incident Response Plan (Before It's Too Late)
 
Proactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider ThreatProactive Measures to Defeat Insider Threat
Proactive Measures to Defeat Insider Threat
 
Chapter 10, part 1
Chapter 10, part 1Chapter 10, part 1
Chapter 10, part 1
 
Mis
MisMis
Mis
 
Computer Security Policy
Computer Security PolicyComputer Security Policy
Computer Security Policy
 
What every executive needs to know about information technology security
What every executive needs to know about information technology securityWhat every executive needs to know about information technology security
What every executive needs to know about information technology security
 
7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations7 Habits of Highly Secure Organizations
7 Habits of Highly Secure Organizations
 
information security technology
information security technologyinformation security technology
information security technology
 
Mis
MisMis
Mis
 
Insider threats and countermeasures
Insider threats and countermeasuresInsider threats and countermeasures
Insider threats and countermeasures
 
Computing safety
Computing safetyComputing safety
Computing safety
 
How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes How to Build an Insider Threat Program in 30 Minutes
How to Build an Insider Threat Program in 30 Minutes
 
Chapter 3: Information Security Framework
Chapter 3: Information Security FrameworkChapter 3: Information Security Framework
Chapter 3: Information Security Framework
 
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data SecurityLock it or Lose It: Why Every Company Should be Concerned About Data Security
Lock it or Lose It: Why Every Company Should be Concerned About Data Security
 
22 need-for-security
22  need-for-security22  need-for-security
22 need-for-security
 
Insider Threat Experiences
Insider Threat ExperiencesInsider Threat Experiences
Insider Threat Experiences
 
Security Awareness and Training
Security Awareness and TrainingSecurity Awareness and Training
Security Awareness and Training
 

Similar to Insider threats - Lessons from Snowden (ISF UK Chapter)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
John Ely Masculino
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
Huntsman Security
 
IDS Research
IDS ResearchIDS Research
IDS Research
Yehan Gunaratne
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf
RiyaSonawane
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
RECIPA
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
Huntsman Security
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
Zara Nawaz
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
Zara Nawaz
 
Window of Compromise
Window of CompromiseWindow of Compromise
Window of Compromise
SecurityMetrics
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
dotco
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
Technocracy2
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
Huntsman Security
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
Huntsman Security
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
Animesh Roy
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
Royalzig Luxury Furniture
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
cyberprosocial
 
Information security
Information securityInformation security
Information security
Sanjay Tiwari
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
Global Business Events - the Heart of your Network.
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
MTG IT Professionals
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
maqib8373
 

Similar to Insider threats - Lessons from Snowden (ISF UK Chapter) (20)

Introduction to Network Security
Introduction to Network SecurityIntroduction to Network Security
Introduction to Network Security
 
Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)Monitoring security in the externalised organisation (Auscert 2013)
Monitoring security in the externalised organisation (Auscert 2013)
 
IDS Research
IDS ResearchIDS Research
IDS Research
 
01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf01-introductiontosecurity-111122004432-phpapp02.pdf
01-introductiontosecurity-111122004432-phpapp02.pdf
 
17 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_201217 info sec_ma_imt_27_2_2012
17 info sec_ma_imt_27_2_2012
 
Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...Intelligence-based computer network defence: Understanding the cyber kill cha...
Intelligence-based computer network defence: Understanding the cyber kill cha...
 
information security (network security methods)
information security (network security methods)information security (network security methods)
information security (network security methods)
 
Information security ist lecture
Information security ist lectureInformation security ist lecture
Information security ist lecture
 
Window of Compromise
Window of CompromiseWindow of Compromise
Window of Compromise
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Security & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptxSecurity & Risk Mgmt_WK1.pptx
Security & Risk Mgmt_WK1.pptx
 
Internet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of thingsInternet of Things: Dealing with the enterprise network of things
Internet of Things: Dealing with the enterprise network of things
 
Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)Hidden security and privacy consequences around mobility (Infosec 2013)
Hidden security and privacy consequences around mobility (Infosec 2013)
 
1. introduction to cyber security
1. introduction to cyber security1. introduction to cyber security
1. introduction to cyber security
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
Safeguarding Your Business: Understanding, Preventing, and Responding to Data...
 
Information security
Information securityInformation security
Information security
 
Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back6 Biggest Cyber Security Risks and How You Can Fight Back
6 Biggest Cyber Security Risks and How You Can Fight Back
 
Lecture 01 Information Security BS computer Science
Lecture 01 Information Security  BS computer ScienceLecture 01 Information Security  BS computer Science
Lecture 01 Information Security BS computer Science
 

More from Huntsman Security

Infosecurity Europe 2016 - Low-friction Security
Infosecurity Europe 2016 - Low-friction SecurityInfosecurity Europe 2016 - Low-friction Security
Infosecurity Europe 2016 - Low-friction Security
Huntsman Security
 
Infosec 2015 - Using threat intelligence to improve security response
Infosec 2015 - Using threat intelligence to improve security responseInfosec 2015 - Using threat intelligence to improve security response
Infosec 2015 - Using threat intelligence to improve security response
Huntsman Security
 
Huntsman - Threat intelligence (for IAP2015)
Huntsman - Threat intelligence (for IAP2015)Huntsman - Threat intelligence (for IAP2015)
Huntsman - Threat intelligence (for IAP2015)
Huntsman Security
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
Huntsman Security
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
Huntsman Security
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
Huntsman Security
 

More from Huntsman Security (6)

Infosecurity Europe 2016 - Low-friction Security
Infosecurity Europe 2016 - Low-friction SecurityInfosecurity Europe 2016 - Low-friction Security
Infosecurity Europe 2016 - Low-friction Security
 
Infosec 2015 - Using threat intelligence to improve security response
Infosec 2015 - Using threat intelligence to improve security responseInfosec 2015 - Using threat intelligence to improve security response
Infosec 2015 - Using threat intelligence to improve security response
 
Huntsman - Threat intelligence (for IAP2015)
Huntsman - Threat intelligence (for IAP2015)Huntsman - Threat intelligence (for IAP2015)
Huntsman - Threat intelligence (for IAP2015)
 
Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)Huntsman - Internet of things (for IAP2015)
Huntsman - Internet of things (for IAP2015)
 
Infosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSPInfosec 2014 - Considerations when choosing an MSSP
Infosec 2014 - Considerations when choosing an MSSP
 
Using automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operationsUsing automation to improve the effectiveness of security operations
Using automation to improve the effectiveness of security operations
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 

Insider threats - Lessons from Snowden (ISF UK Chapter)

  • 1. Insider Threats: Lessons from Snowden Piers Wilson Tier-3 Huntsman® - Head of Product Management
  • 2. About Tier-3 / Huntsman 2 • Tier-3 – Australian/UK based security software company – Established 1999 – Pioneer of Behavioural Anomaly Detection (BAD) technology within SIEM products • Huntsman – Intelligent SIEM solution – Full event correlation and behavioural profiling, anomaly detection and alerting – Automatic response capability – Targeted at security-critical large enterprises and government – In-built compliance monitoring support for PCI-DSS, ISO27001, GPG13, FISMA – Multi-tenancy support © 2013 Tier-3 Pty Limited. All rights reserved.
  • 3. Protective security has a role 3 • A barrier between those who have access and those who don’t: – Encryption means those that need access will get it, and those that don’t do not – Access controls limit what data users can access and what they can do with it – Firewalls constrain the types of network traffic systems can exchange • Often controls are several layers deep: – Network – Server – Application – End point © 2013 Tier-3 Pty Limited. All rights reserved.
  • 4. The insider threat picture is complex 4© 2013 Tier-3 Pty Limited. All rights reserved. "You're dealing with authorized users doing authorized things for malicious purposes.” Patrick Reidy, CISO for the FBI Insider Threats Physical Electronic Ethical Deliberate Accidental Whistle blowing Insider community Motivation Genuine losses Media Fame Breaching data Negligence Revenge Network USB/Disk Paper Granting access/tail gating Verbal Normal users System admins External parties Relationship Customers Contractors Staff Journalists Trojans/ APTs Social media Waterholes
  • 5. Insider threats are 5© 2013 Tier-3 Pty Limited. All rights reserved. • Multi-dimensional • Can circumvent protective controls • Wider than just “Insiders” – Contractors, Journalists, Whistle-blowers – Advanced Persistent Threats / Trojans - the “weaponising” of insiders – Social media risks, “over share”, leaked secrets, exposed plans / locations / staff / details • Insiders can cause, or be culpable in causing, breaches
  • 6. Insider threats are a common theme in security surveys 6© 2013 Tier-3 Pty Limited. All rights reserved. Threat actor categories across 47,000+ security incidents Sources: PwC/BIS UK information security breaches survey 2013, Verizon data breach report 2013, Comptia Information Security Trends 2012
  • 7. What are the components of the solution 7© 2013 Tier-3 Pty Limited. All rights reserved. Endpoint & content-aware controlsSystem activity, network traffic and behavioural analysis Robust activity monitoring & correlation Privileged & admin accounts Awareness, education and “publicity” Context and threat intelligence
  • 8. Control privileged & admin accounts 8© 2013 Tier-3 Pty Limited. All rights reserved. Solutions do exist to control privileged accounts and the process of granting/revoking access for changes and incidents: • Some systems are not under your “direct” control such as cloud applications, managed networks or 3rd parties • It is difficult to control what people do with the privileged access they have What works for the NSA might not be as workable in the commercial sector • Dual control can be expensive, with high overheads Administrators have wide ranging power, access and knowledge so oversight is still needed
  • 9. End-point and content-aware controls 9© 2013 Tier-3 Pty Limited. All rights reserved. These control data being extracted, exported or stolen • There are several ways you can lose control of your data – Beyond the access permissions, encryption, ISMS in your environment – When exchanged on CD, USB, network, Dropbox, social media, email, home PC’s, mobile devices, cloud or in unstructured storage • Businesses need to enable people to transmit/exchange data flexibly Limitations • End-point/DLP/Proxy solutions may not fully address the risk – encryption can mask data flows / remote systems won’t be protected • Encryption of laptops/USB media only protects from unauthorised access • Controls need to be part of the wider security and reporting environment • The business view of what is, and isn’t, acceptable or risky is not
  • 10. Robust monitoring, correlation and analysis 10© 2013 Tier-3 Pty Limited. All rights reserved. It is vital to: • Generate logs AND • Include systems, networks, applications • Incorporate central oversight of other security controls AND • Collect them centrally, away from the source AND • Analyse and correlate the contents AND • Protect access to logs and audit trails AND • Separate duties between users, admins, auditors If any of these fail the detective/investigative options erode rapidly
  • 11. Network traffic & behavioural analysis 11© 2013 Tier-3 Pty Limited. All rights reserved. It is important to be able to monitor activity based, not on rules, but on deviance from a normal profile: • Monitor how people operate – what they do, where, how often • Understand how systems work “contextually” • Track variable (multiple) baselines of the different data dimensions • Recognise anomalies (statistics, thresholds, deviations) Early/proactive detection allows an analyst to investigate and diagnose incidents Predictive behaviour analysis (i.e. trying to predict when someone is going to misuse systems or steal data) is no better than randomly predicting insider misuse “ ... the FBI moved toward a behavioural detection methodology that has proved far more effective” (source: FBI research) “Even if all you can measure is the telemetry to look at prints from a print server, you can look at things like what's the volume, how many and how big are the files, and how often do they do print” Patrick Reidy, FBI
  • 12. Awareness: What is the point? 12© 2013 Tier-3 Pty Limited. All rights reserved. Simple Awareness alone won’t defend against: • Deliberate attacks • Targeted social-engineering or a spear-phishing attack that has been made convincing enough • The effects of normal human psychology and behaviours: • Whether people care about it • Or remember three months on • Or understand why it is important • Or are tied to a habit or a group behaviour that is different • Misuse by people who have knowledge of control weaknesses Visible and publicised oversight mechanisms will: • Be more memorable than point-in-time eLearning training messages • Deter malicious thefts or attacks where control and oversight is obvious • Support deterrence, detection and resolution • Forcing behaviours and actions which are more evident • Enable “accidents” to be used for future education initiatives • You can target awareness activities better • You can create security “rumble strips”
  • 13. Threat intelligence: the insider context 13© 2013 Tier-3 Pty Limited. All rights reserved.
  • 14. Intelligent monitoring is important 14© 2013 Tier-3 Pty Limited. All rights reserved. 1 You need to monitor security controls and their operation anyway, compliance with security standards demands it, auditors will ask for it and good practice dictates it • PCI-DSS, ISO27001, BIS “10 steps”, GPG13, FISMA agree 4 An accidental breach could have several causes; but will often be an unusual or significant series of events which may be able to be codified in advance, or following an incident • Monitoring technology may help to diagnose and prevent future occurrences 3The monitoring of activity and logs provides the evidence businesses need to take action (civil, criminal, HR) even if the process of detection comes from another source 2 The presence of “visible” or “publicised” monitoring controls and an established track record of detection, is a big deterrent to the malicious insider • Detecting and preventing or to otherwise taking action against a culprit 5 Robust monitoring shows what is going on within an organisation which means oversight processes can be based on the audit records, rather than having to expose the original data within investigative activity
  • 15. Endpoint & content-aware controlsSystem activity, network traffic and behavioural analysis Robust activity monitoring & correlation Privileged & admin accounts Awareness, education and “publicity” Context and threat intelligence Solution coverage 15© 2013 Tier-3 Pty Limited. All rights reserved.
  • 16. Copyright © Tier-3 Pty Ltd, 2013. All rights 16 Questions Contact us at: info@tier-3.com +44 (0) 208 433 6790 +61 (0) 2 9419 3200 More information at: Download our insider threat whitepaper www.tier-3.com @tier3huntsman

Editor's Notes

  1. Insider threats can be insidious... and there are several derivativesAccidental breaches/data lossesDeliberate extraction/theft/corruption of dataVictims of spear phishingWaterhole attacksTrojans running with user/administrator privilegePaper information etc...