SlideShare a Scribd company logo
SESSION ID:
#RSAC
Araceli Treu Gomes
Advanced Persistent Security
to Combat
Advanced Persistent Threat
EXP-R03
Subject Matter Expert –
Intelligence and Investigations
Dell SecureWorks
@sleepdeficit_
Ira Winkler, CISSP
President
Secure Mentem
@irawinkler
#RSAC
Why The Hype Matters to Us
2
It destroys our focus
It changes the story
It asks questions that shouldn’t be asked
It deflects blame
Bad security vs unstoppable enemy
“If the top organizations can be hit, there is no way anyone will
expect us to stop the attacks”
#RSAC
The Question That Should Be Asked
3
Was it really a “sophisticated” attack, or
just bad security?
#RSAC
The Proclaimed “Sophisticated Attacks”
4
Hacking Team
IRS
Ashley Madison
Anthem
Premera
You name it, it’s sophisticated according to someone
#RSAC
It Can Also Help You
5
It gets people talking about security
Use the narrative to help your cause
If management is concerned about the hype, use it
Highlighting the common vulnerabilities exploited during attacks
can get you funding to mitigate similar vulnerabilities
Stating how your security would have stopped the attacks would
give you kudos
#RSAC
Hacking Team
6
Notable in that they supposedly support law enforcement and
had zero day vulnerabilities
Embarrassing data to customers
Leak of vulnerabilities causing ripple effect
#RSAC
Sophisticated?
7
Password was passw0rd
Able to access and download data as engineer
Sophisticated: HELL NO!
Once inside there was apparently a flat network or easy data
access
#RSAC
IRS Breach
8
330,000 records compromised through Get Transcript function
400,000 attempted breaches
Compromised authentication scheme
Required “information on the taxpayer had”
Hmmmm….
Criminal downloaded records, filed false tax returns
Stole $50 Million
IRS Commissioner said it couldn’t be stopped citing
Smart criminals with lots of advanced computers, hiring smart people
OMG
#RSAC
Sophisticated?
9
All the criminals needed were credit reports
IRS used commercial system that asked questions with answers
available through credit reports
Went undetected for 400,000 relatively intensive attempts
#RSAC
Ashley Madison
10
Compromise of clients and client information
Led to suicides
Led to great embarrassment for others
Demonstrated that they did not delete accounts as
promised
Released sensitive internal documents
Revealed that there weren’t many real women on
site
#RSAC
Sophisticated?
11
SQL injection attacks likely
Criminals claimed that network poorly segmented
Pass1234 was root password on all servers
Poor password encryption used
Data not deleted
Arrogance
#RSAC
Anthem
12
80,000,000 health care records compromised
Largest breach of his type
This one was personal
Potentially perpetrated by China
Seemed to have signature of Deep Panda, and pandas are from
China
A large number of people have government access
#RSAC
Sophisticated?
13
Watering hole attack suspected
Compromised administrator credentials
Undetected for nine months
Massive querying of data
#RSAC
Premera
14
11,000,000 accounts compromised
Phishing attack suspected
Operated for 9 months
Deep Panda suspected again
277 data breaches in healthcare organizations in 2015
#RSAC
Commonalities
15
Improperly segmented networks
Detection Deficit Disorder
Ignoring or looking at incidents in wrong places
Failure to white list
Not monitoring critical systems
Poor awareness
No multi-factor authentication
Phishing messages
#RSAC
Preventing the IRS Attack
16
Frankly authentication might not be feasible to strengthen
Better detection
IP analysis
Rapid increase in requests
Focus on misuse detection
#RSAC
The Irari Rules of Sophisticated Attacks
17
Must not actualize because of a
Phishing message
Malware must have been undetectable
Passwords were not easily guessed
User awareness exploited with poor
awareness program in place
Known vulnerabilities cannot have been
exploited
Multifactor authentication in use on
critical systems
Passwords were not hardcoded into the
systems (or on TV)
Detection capability was in place and
not ignored
Proper network segmentation in place
User accounts had minimum privileges
#RSAC
Advanced Persistent Threat or
ADAPTIVE Persistent Threat?
18
They are Persistent
They are a Threat
But they are more adaptive than they are advanced
Advanced implies sophisticated
Sophisticated implies unstoppable
#RSAC
APT Assumes Failure
19
Actually, “successful” APT assumes failure
They assume there will be countermeasures in place
They assume there will be detection mechanisms
They know they need to be adaptive
They are proactive
“Be like water” – Bruce Lee
#RSAC
“Persistence and focus will get
you in”
Rob Joyce
Chief, NSA Tailored Access Office
#RSAC
Advanced Persistent Security
21
#RSAC
Advanced Persistent Security
22
Fight APT with APS
Adaptive Persistent Security, but Advanced Persistent Security is
a better buzz term
Security programs must be adaptive
Security programs must assume failure
Designed to presume failure
Extrusion prevention > Intrusion prevention
#RSAC
Risk Management Implies Failure is Acceptable
IRS hack demonstrates availability requires better detection, not
prevention
It can be more cost effective
Better detection = Better protection
Security is about Risk Management not perfect prevention
Detection and reaction mitigate loss that cannot be prevented
Adversary disruption is an acceptable “Security” strategy
Kill Chain Analysis
Goal is exit prevention
#RSAC
Optimizing Risk
24
Cost
Countermeasures
Vulnerabilities
Risk Optimization Point
#RSAC
Proaction
Design program always looking for failures
Determine where failure is likely to occur
Perform threat intelligence to determine likely attackers and
attack vectors
Implement security countermeasures as appropriate
Implement detection
Build the ability to modify protection into your program
#RSAC
Defensive Information Warfare
Protection Detection Reaction
#RSAC
Protection
27
Understand what you Value
Understand your Threats
What they target
What they value
Likely attack vectors
Determine your vulnerabilities
Prioritize countermeasures based on likely
threats and vulnerabilities
Address security culture
#RSAC
Detection
Understand your Kill Chain
Detection Deficit Disorder
Avoid it
Human sensors
Constantly examine the data
Assume critical assets are being stolen
Assume networks are compromised and look
for indications
#RSAC
Reaction
Reaction should be anticipated as being a common circumstance
Reaction built into security program and architecture
Determine who’s attacking you
What are their attack methods
Look for additional attacks
Be a hunter
Feedback into Protection
Remember, your goal is exit prevention
Extrusion prevention is more manageable intrusion prevention
#RSAC
The Role of Security Culture/Awareness
People have a role in Prevention, Detection, and Reaction
A strong security culture prevents incidents
People should behave appropriately
A strong security culture detects incidents in progress
Snowden’s coworkers should have noticed suspicious activity
Detecting incidents, phishing, etc.
Reaction
Reporting
Taking actions to mitigate incidents before they get too
damaging
#RSAC
Conclusions
31
Attackers are successful not because they are advanced or
sophisticated, but because they are adaptive and persistent
Be adaptive and persistent in response
Be proactive
Failure is expected
Failure can be good
Implement Advanced Persistent Security
#RSAC
“Apply” Slide
32
Next week you should:
Determine whether you have a “Security” program or a
“Prevention” program
Within 3 months you should:
Reevaluate your awareness program
Determine the protection of your critical data
Analyze your likely threats
Determine if you have Detection Deficit Disorder
Within 6 months you should:
Reevaluate the structure of your overall security program
#RSAC
For More Information
33
ira@securementem.com
@irawinkler
www.securementem.com
www.linkedin.com/in/irawinkler
Facebook.com/irawinkler
Ira Winkler, CISSP Irari Report
www.irarireport.com
@irarireport
Araceli Treu Gomes
agomes@secureworks.com
@sleepdeficit_
www.secureworks.com
www.linkedin.com/in/sleepdeficit
Facebook.com/sleepdeficit

More Related Content

What's hot

Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
penetration Tester
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data BreachKunal Sharma
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
Peter Wood
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackGavin Davey
 
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniLoay Elbasyouni
 
Intruders
IntrudersIntruders
Intruderstechn
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
Morane Decriem
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
wajug
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testingecmee
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkOkehie Collins
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
gaurav koriya
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
Network Intelligence India
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
Vishal Kumar
 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing
Rishabh Upadhyay
 
Intruders detection
Intruders detectionIntruders detection
Intruders detectionEhtisham Ali
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
rajakhurram
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
Mohammad Affan
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
Mohamed Jelidi
 

What's hot (19)

Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
Case Study of RSA Data Breach
Case Study of RSA Data BreachCase Study of RSA Data Breach
Case Study of RSA Data Breach
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Analysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin AttackAnalysis of RSA Lockheed Martin Attack
Analysis of RSA Lockheed Martin Attack
 
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
 
Intrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouniIntrusion_Detection_By_loay_elbasyouni
Intrusion_Detection_By_loay_elbasyouni
 
Intruders
IntrudersIntruders
Intruders
 
Threat Hunting Report
Threat Hunting Report Threat Hunting Report
Threat Hunting Report
 
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
Wajug: Cyber war, Cyber Attacks and Ethical Hacking - Frédéric de Pauw - Dece...
 
Ethical Hacking & Penetration Testing
Ethical Hacking & Penetration TestingEthical Hacking & Penetration Testing
Ethical Hacking & Penetration Testing
 
Intrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise NetworkIntrusion Detection and Prevention System in an Enterprise Network
Intrusion Detection and Prevention System in an Enterprise Network
 
Intrusion detection system
Intrusion detection system Intrusion detection system
Intrusion detection system
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Introduction ethical hacking
Introduction ethical hackingIntroduction ethical hacking
Introduction ethical hacking
 
Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing Ethical Hacking and Penetration Testing
Ethical Hacking and Penetration Testing
 
Intruders detection
Intruders detectionIntruders detection
Intruders detection
 
Lecture 10 intruders
Lecture 10 intrudersLecture 10 intruders
Lecture 10 intruders
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
A hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environmentsA hybrid intrusion detection system for cloud computing environments
A hybrid intrusion detection system for cloud computing environments
 

Similar to Sophisticated Attacks vs. Advanced Persistent Security

Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
Priyanka Aash
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Rahul Neel Mani
 
Intelligence-Led Security: Powering the Future of Cyber Defense
Intelligence-Led Security: Powering the  Future of Cyber DefenseIntelligence-Led Security: Powering the  Future of Cyber Defense
Intelligence-Led Security: Powering the Future of Cyber Defense
Priyanka Aash
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
Priyanka Aash
 
Make IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and ReportingMake IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and Reporting
Priyanka Aash
 
Introduction and a Look at Security Trends
Introduction and a Look at Security TrendsIntroduction and a Look at Security Trends
Introduction and a Look at Security Trends
Priyanka Aash
 
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
Aaron Rinehart
 
Securing the “Weakest Link”
Securing the “Weakest Link”Securing the “Weakest Link”
Securing the “Weakest Link”
Priyanka Aash
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
Priyanka Aash
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
Three Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramThree Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response Program
Morphick
 
Insights from-NSAs-cybersecurity-threat-operations-center
Insights from-NSAs-cybersecurity-threat-operations-centerInsights from-NSAs-cybersecurity-threat-operations-center
Insights from-NSAs-cybersecurity-threat-operations-center
Priyanka Aash
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AWard Pyles
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
Mighty Guides, Inc.
 
Learnings from the Cloud: What to Watch When Watching for Breach
Learnings from the Cloud:  What to Watch When Watching for BreachLearnings from the Cloud:  What to Watch When Watching for Breach
Learnings from the Cloud: What to Watch When Watching for Breach
Priyanka Aash
 
Opening the Door to DoD Perspectives on Cyber Threat Intelligence
Opening the Door to DoD Perspectives  on Cyber Threat IntelligenceOpening the Door to DoD Perspectives  on Cyber Threat Intelligence
Opening the Door to DoD Perspectives on Cyber Threat Intelligence
Priyanka Aash
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
Securelogy
 
Main Menu
Main MenuMain Menu
Main Menu
Securelogy
 
Security precognition chaos engineering in incident response
Security precognition  chaos engineering in incident responseSecurity precognition  chaos engineering in incident response
Security precognition chaos engineering in incident response
Priyanka Aash
 

Similar to Sophisticated Attacks vs. Advanced Persistent Security (20)

Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst Applied cognitive security complementing the security analyst
Applied cognitive security complementing the security analyst
 
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate ResponseDetect Unknown Threats, Reduce Dwell Time, Accelerate Response
Detect Unknown Threats, Reduce Dwell Time, Accelerate Response
 
Intelligence-Led Security: Powering the Future of Cyber Defense
Intelligence-Led Security: Powering the  Future of Cyber DefenseIntelligence-Led Security: Powering the  Future of Cyber Defense
Intelligence-Led Security: Powering the Future of Cyber Defense
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Bridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk ManagementBridging the Gap Between Threat Intelligence and Risk Management
Bridging the Gap Between Threat Intelligence and Risk Management
 
Make IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and ReportingMake IR Effective with Risk Evaluation and Reporting
Make IR Effective with Risk Evaluation and Reporting
 
Introduction and a Look at Security Trends
Introduction and a Look at Security TrendsIntroduction and a Look at Security Trends
Introduction and a Look at Security Trends
 
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
RSA 2021 Navigating the Unknowable: Resilience through Security Chaos Enginee...
 
Securing the “Weakest Link”
Securing the “Weakest Link”Securing the “Weakest Link”
Securing the “Weakest Link”
 
Briefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directorsBriefing the board lessons learned from cisos and directors
Briefing the board lessons learned from cisos and directors
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Three Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response ProgramThree Considerations To Amplify Your Detection and Response Program
Three Considerations To Amplify Your Detection and Response Program
 
Insights from-NSAs-cybersecurity-threat-operations-center
Insights from-NSAs-cybersecurity-threat-operations-centerInsights from-NSAs-cybersecurity-threat-operations-center
Insights from-NSAs-cybersecurity-threat-operations-center
 
InfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 AInfraGard Webinar March 2016 033016 A
InfraGard Webinar March 2016 033016 A
 
CounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat ManagementCounterTack: 10 Experts on Active Threat Management
CounterTack: 10 Experts on Active Threat Management
 
Learnings from the Cloud: What to Watch When Watching for Breach
Learnings from the Cloud:  What to Watch When Watching for BreachLearnings from the Cloud:  What to Watch When Watching for Breach
Learnings from the Cloud: What to Watch When Watching for Breach
 
Opening the Door to DoD Perspectives on Cyber Threat Intelligence
Opening the Door to DoD Perspectives  on Cyber Threat IntelligenceOpening the Door to DoD Perspectives  on Cyber Threat Intelligence
Opening the Door to DoD Perspectives on Cyber Threat Intelligence
 
Cobit 2
Cobit 2Cobit 2
Cobit 2
 
Main Menu
Main MenuMain Menu
Main Menu
 
Security precognition chaos engineering in incident response
Security precognition  chaos engineering in incident responseSecurity precognition  chaos engineering in incident response
Security precognition chaos engineering in incident response
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
Priyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
Priyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
Priyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
Priyanka Aash
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
Priyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Priyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
Priyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
Priyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
Priyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
Priyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
Priyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Priyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
Priyanka Aash
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
Priyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

Sophisticated Attacks vs. Advanced Persistent Security

  • 1. SESSION ID: #RSAC Araceli Treu Gomes Advanced Persistent Security to Combat Advanced Persistent Threat EXP-R03 Subject Matter Expert – Intelligence and Investigations Dell SecureWorks @sleepdeficit_ Ira Winkler, CISSP President Secure Mentem @irawinkler
  • 2. #RSAC Why The Hype Matters to Us 2 It destroys our focus It changes the story It asks questions that shouldn’t be asked It deflects blame Bad security vs unstoppable enemy “If the top organizations can be hit, there is no way anyone will expect us to stop the attacks”
  • 3. #RSAC The Question That Should Be Asked 3 Was it really a “sophisticated” attack, or just bad security?
  • 4. #RSAC The Proclaimed “Sophisticated Attacks” 4 Hacking Team IRS Ashley Madison Anthem Premera You name it, it’s sophisticated according to someone
  • 5. #RSAC It Can Also Help You 5 It gets people talking about security Use the narrative to help your cause If management is concerned about the hype, use it Highlighting the common vulnerabilities exploited during attacks can get you funding to mitigate similar vulnerabilities Stating how your security would have stopped the attacks would give you kudos
  • 6. #RSAC Hacking Team 6 Notable in that they supposedly support law enforcement and had zero day vulnerabilities Embarrassing data to customers Leak of vulnerabilities causing ripple effect
  • 7. #RSAC Sophisticated? 7 Password was passw0rd Able to access and download data as engineer Sophisticated: HELL NO! Once inside there was apparently a flat network or easy data access
  • 8. #RSAC IRS Breach 8 330,000 records compromised through Get Transcript function 400,000 attempted breaches Compromised authentication scheme Required “information on the taxpayer had” Hmmmm…. Criminal downloaded records, filed false tax returns Stole $50 Million IRS Commissioner said it couldn’t be stopped citing Smart criminals with lots of advanced computers, hiring smart people OMG
  • 9. #RSAC Sophisticated? 9 All the criminals needed were credit reports IRS used commercial system that asked questions with answers available through credit reports Went undetected for 400,000 relatively intensive attempts
  • 10. #RSAC Ashley Madison 10 Compromise of clients and client information Led to suicides Led to great embarrassment for others Demonstrated that they did not delete accounts as promised Released sensitive internal documents Revealed that there weren’t many real women on site
  • 11. #RSAC Sophisticated? 11 SQL injection attacks likely Criminals claimed that network poorly segmented Pass1234 was root password on all servers Poor password encryption used Data not deleted Arrogance
  • 12. #RSAC Anthem 12 80,000,000 health care records compromised Largest breach of his type This one was personal Potentially perpetrated by China Seemed to have signature of Deep Panda, and pandas are from China A large number of people have government access
  • 13. #RSAC Sophisticated? 13 Watering hole attack suspected Compromised administrator credentials Undetected for nine months Massive querying of data
  • 14. #RSAC Premera 14 11,000,000 accounts compromised Phishing attack suspected Operated for 9 months Deep Panda suspected again 277 data breaches in healthcare organizations in 2015
  • 15. #RSAC Commonalities 15 Improperly segmented networks Detection Deficit Disorder Ignoring or looking at incidents in wrong places Failure to white list Not monitoring critical systems Poor awareness No multi-factor authentication Phishing messages
  • 16. #RSAC Preventing the IRS Attack 16 Frankly authentication might not be feasible to strengthen Better detection IP analysis Rapid increase in requests Focus on misuse detection
  • 17. #RSAC The Irari Rules of Sophisticated Attacks 17 Must not actualize because of a Phishing message Malware must have been undetectable Passwords were not easily guessed User awareness exploited with poor awareness program in place Known vulnerabilities cannot have been exploited Multifactor authentication in use on critical systems Passwords were not hardcoded into the systems (or on TV) Detection capability was in place and not ignored Proper network segmentation in place User accounts had minimum privileges
  • 18. #RSAC Advanced Persistent Threat or ADAPTIVE Persistent Threat? 18 They are Persistent They are a Threat But they are more adaptive than they are advanced Advanced implies sophisticated Sophisticated implies unstoppable
  • 19. #RSAC APT Assumes Failure 19 Actually, “successful” APT assumes failure They assume there will be countermeasures in place They assume there will be detection mechanisms They know they need to be adaptive They are proactive “Be like water” – Bruce Lee
  • 20. #RSAC “Persistence and focus will get you in” Rob Joyce Chief, NSA Tailored Access Office
  • 22. #RSAC Advanced Persistent Security 22 Fight APT with APS Adaptive Persistent Security, but Advanced Persistent Security is a better buzz term Security programs must be adaptive Security programs must assume failure Designed to presume failure Extrusion prevention > Intrusion prevention
  • 23. #RSAC Risk Management Implies Failure is Acceptable IRS hack demonstrates availability requires better detection, not prevention It can be more cost effective Better detection = Better protection Security is about Risk Management not perfect prevention Detection and reaction mitigate loss that cannot be prevented Adversary disruption is an acceptable “Security” strategy Kill Chain Analysis Goal is exit prevention
  • 25. #RSAC Proaction Design program always looking for failures Determine where failure is likely to occur Perform threat intelligence to determine likely attackers and attack vectors Implement security countermeasures as appropriate Implement detection Build the ability to modify protection into your program
  • 27. #RSAC Protection 27 Understand what you Value Understand your Threats What they target What they value Likely attack vectors Determine your vulnerabilities Prioritize countermeasures based on likely threats and vulnerabilities Address security culture
  • 28. #RSAC Detection Understand your Kill Chain Detection Deficit Disorder Avoid it Human sensors Constantly examine the data Assume critical assets are being stolen Assume networks are compromised and look for indications
  • 29. #RSAC Reaction Reaction should be anticipated as being a common circumstance Reaction built into security program and architecture Determine who’s attacking you What are their attack methods Look for additional attacks Be a hunter Feedback into Protection Remember, your goal is exit prevention Extrusion prevention is more manageable intrusion prevention
  • 30. #RSAC The Role of Security Culture/Awareness People have a role in Prevention, Detection, and Reaction A strong security culture prevents incidents People should behave appropriately A strong security culture detects incidents in progress Snowden’s coworkers should have noticed suspicious activity Detecting incidents, phishing, etc. Reaction Reporting Taking actions to mitigate incidents before they get too damaging
  • 31. #RSAC Conclusions 31 Attackers are successful not because they are advanced or sophisticated, but because they are adaptive and persistent Be adaptive and persistent in response Be proactive Failure is expected Failure can be good Implement Advanced Persistent Security
  • 32. #RSAC “Apply” Slide 32 Next week you should: Determine whether you have a “Security” program or a “Prevention” program Within 3 months you should: Reevaluate your awareness program Determine the protection of your critical data Analyze your likely threats Determine if you have Detection Deficit Disorder Within 6 months you should: Reevaluate the structure of your overall security program
  • 33. #RSAC For More Information 33 ira@securementem.com @irawinkler www.securementem.com www.linkedin.com/in/irawinkler Facebook.com/irawinkler Ira Winkler, CISSP Irari Report www.irarireport.com @irarireport Araceli Treu Gomes agomes@secureworks.com @sleepdeficit_ www.secureworks.com www.linkedin.com/in/sleepdeficit Facebook.com/sleepdeficit