SlideShare a Scribd company logo
Conventional Defence to Unconventional Threats
[AKA‘ConvertingH20 to Bits& By[i]tes’]
WhiteHat– London– 06/03/15
ProfessorJohnWalker
The Majority have already been Hacked
The Minority are aware they have been Hacked
There are many suffering on-going Compromise of their Systems
Some know they are suffering Compromise
Some don’t
Accept the FACTS
Lets Talk - Proven Capabilities – [EUROPOL Q/1/15]
To date OSINT technology has achieved a 100% success rate with identification of Security Vulnerabilities and Exposures on
deployments which had been utilising the conventional methods of applying security by testing the known knowns, as
opposed to the new age methodologies of locating the unknown unknowns, which can, and do expose Corporate assets
to support an attack and/or compromise. The following are some examples of discoveries of what were unknown unknowns
which hosting threats, or which had already suffered compromise by external actors:
Compromised Bank Network: Identification of a major breach in which .com.cn Chinese Servers had attached to the core
switch of the Bank with remote login capabilities.
Exposed Government Agency: An International Sensitive Government Intelligence Agency who was suffering internal
Compromise at a Third Party site through a flawed and insecure DNS configuration.
PCI-DSS Exposed: The secure PCI-DSS Bank who were not aware of the deployment of an Insecure SAMBA Share, or an
insecure Cloud Service which exposed PCI-DSS Client and Account Data.
Local Authority: In this case a Local Authority were considered to be secure post multiple sessions of Penetration
Testing, yet were exposing 29 Servers to the Internet which were unknown and vulnerable.
MI5 Data Exposed: Government Agency who released information under FOI – without realising its implicated associations
with the Security Services [thus making other parties a potential Wet Target for Terrorists].
The Threat
We now accept that the Cyber Risk against companies is significant, the impact of which is evidenced by the attacks,
breaches, and security compromises against some of the biggest brands on the planet.
This is not scaremongering but fact!
Whilst conventional security delivers what is meant to be technological, and procedural security defences to safeguard
assets from attack, it falls short of underpinning the capabilities to discover the unknown unknowns which may [and do]
expose Deployments, Third Parties, Associates, or Assets to the potential of exploitation and compromise.
It is in this capacity where Pre Event, and Post Attack Cyber Intelligence can be of significant benefit to:
Identify the Unknown Unknowns of risks
Discover Data Leakage
Locate opportunities of exposure to Social Engineering
Find technical exposures at the unknown perimeter of the organisation
Brand Protection
Provision granular Alert & Reporting capabilities
Support Post Attack CSIRT Operations
Perform Social Media Brand Monitoring
Welcome to the Madcap World of off-the-wall ideas which
can [and do] sometimes work!
NLP [Neuro-Linguistic Programming] – Its time to change!
However – NLP can have both Positive & Negative outcomes
NLP may extend into what I call subliminal NVP [Neuro-Visual-Programming]
Converting H20 to Bits & By[i]tes – Turning Water into Data [Intelligence]
People Power – It’s the ONLY Way
Mind Manipulation – Its Everywhere
Unpatched People - Conversion of H20 into Bits & By[i]tes
The homosapien is made up of between 55-60% of water, and these represent the Wet Target which can be the
weakest link in the Security Lifecycle – I know, I have exploited them – and they can be easy targets!
Furthermore, whilst a lot of effort goes into patching applications, systems, and hardware, this landscape of vulnerable and
Intelligent targets are forgotten, and so are an ideal target-layer to support circumvention of any deployed security posture.
And the emergence of High Grade threats is continuous – e.g. ROVNIX & its updated Twin VAWTRAK
See SC Magazine News – 26/02/15:
http://www.scmagazineuk.com/banking-trojan-vawtrak-spotted-in-the-wild/article/400317/
And - See SC Magazine News – 5/03/15
Get it into Perspective
No matter the Firewalls, IPS, IDS, DLP, and the Security Infrastructure – which is proven to be failing – add to this Complexity,
Acquisitions, and High Technological Dependency, and you can start to appreciate the problem [or benefit] depending –
on your objective.
Big Data Credit Reference Agency based in Nottingham: Complex Firewalling made it impossible to identify all cable
Start, and Termination points!
Houses of Parliament: Comment on the BBC week commencing 23/02/14 – Can’t terminate cabling as it could be an MP
talking to the Kremlin!
Government Department: GSi link connected into a Hostile Region.
NHS Migration of Data Access: No comment!
Unconventional Hacker Thinking
Consider the element of H2O, and the tension at the Presentation Layer.
Robust Mitigation
One of the current challenges facing organisations today with engagement of the Cyber Threat is that they are applying the
conventional rules of yesterday to protect against the unconventional vectors of attack in 2015 and onward. In this area
multiples of successful Cyber Attacks and Incursions have been identified as a major component in the compromise.
To counter the threats we need to go beyond [and compliment] Penetration Testing and consider:
Identifying the unknown unknowns by applying multiple specialist applications, techniques, and streaming to support both
Proactive [before the event], and Reactive [where a Security Incident has occurred] to both defend and mitigate the exposure
of Corporate and Sensitive Assets.
Monitor for indications and threats through leverage of Cyber Intelligence to for purpose of Brand Protection – again by
applying a methodology of seeking out the unknown unknowns and turning them into Defensive Collateral.
Have an assured Computer Security Incident Response Team [CSIRT] First Responder Capability to engage Cyber Attacks, and
Security Breaches.
Assume you ARE Compromised/Hacked – You know it makes sense 
We Need ‘Minority Reporting’
Effective Cyber Intelligence capabilities which must
try to emulate a style of Minority Reporting
The Approach
DarkWeb applies the same rules as would a potential attacker and run multiples bespoke tools, applications, and Cyber
Intelligence Methodologies to identify what we refer to as OoII [Objects of Intelligence Interest].
Exploit the DarkWeb
The DarkWeb can be leveraged to for purpose of Cyber Monitoring Capabilities to enable users to understand the most
current threats before they go public.
25/03/15
Be Offensive – Have Bad Thoughts
The New Age of Unconventional Cyber Threats do dictate that we view security from an obtuse perspective of the Offensive:
SECURITY
Have Bad Thoughts – Think like Bad People – Apply Their Rules NOT Yours – Throw Convention to the WIND
i + e + v = c

More Related Content

What's hot

001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
Mohammad Ashfaqur Rahman
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
idsecconf
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Hamisi Kibonde
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
Peter Wood
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Sounil Yu
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
APNIC
 
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
Lessons Learned in Automated Decision Making / How to Delay Building SkynetLessons Learned in Automated Decision Making / How to Delay Building Skynet
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
Sounil Yu
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye, Inc.
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Fidelis Cybersecurity
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
Ivanti
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
Tonex
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Edureka!
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
North Texas Chapter of the ISSA
 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Puneet Kukreja
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
APNIC
 
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
EC-Council
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
SrajalTiwari1
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
Bloxx
 
Cybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal ProfessionalsCybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal Professionals
Shawn Tuma
 

What's hot (20)

001.itsecurity bcp v1
001.itsecurity bcp v1001.itsecurity bcp v1
001.itsecurity bcp v1
 
Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...Proactive cyber defence through adversary emulation for improving your securi...
Proactive cyber defence through adversary emulation for improving your securi...
 
Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)Noah Maina: Computer Emergency Response Team (CERT)
Noah Maina: Computer Emergency Response Team (CERT)
 
Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
 
Cert adli wahid_iisf2011
Cert adli wahid_iisf2011Cert adli wahid_iisf2011
Cert adli wahid_iisf2011
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
Lessons Learned in Automated Decision Making / How to Delay Building SkynetLessons Learned in Automated Decision Making / How to Delay Building Skynet
Lessons Learned in Automated Decision Making / How to Delay Building Skynet
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Part 1: Identifying Insider Threats with Fidelis EDR Technology
Part 1: Identifying  Insider Threats with Fidelis EDR Technology Part 1: Identifying  Insider Threats with Fidelis EDR Technology
Part 1: Identifying Insider Threats with Fidelis EDR Technology
 
Addressing Healthcare Challenges Today
Addressing Healthcare Challenges TodayAddressing Healthcare Challenges Today
Addressing Healthcare Challenges Today
 
Cybersecurity Hands-On Training
Cybersecurity Hands-On TrainingCybersecurity Hands-On Training
Cybersecurity Hands-On Training
 
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
Cybersecurity Interview Questions and Answers | CyberSecurity Interview Tips ...
 
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptxNtxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
Ntxissacsc5 purple 3-cyber insurance essentials-shawn_tuma.pptx
 
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
Session 7.3 Implementing threat intelligence systems - Moving from chaos to s...
 
Setting up CSIRT
Setting up CSIRTSetting up CSIRT
Setting up CSIRT
 
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
Thwarting the Insider Threat: Developing a Robust “Defense in Depth” Data Los...
 
Vulnerability in ai
 Vulnerability in ai Vulnerability in ai
Vulnerability in ai
 
Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges Cyber Security Landscape: Changes, Threats and Challenges
Cyber Security Landscape: Changes, Threats and Challenges
 
Cybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal ProfessionalsCybersecurity Fundamentals for Legal Professionals
Cybersecurity Fundamentals for Legal Professionals
 

Viewers also liked

White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
Exploring the State of Facilities 2014 [Part 5]: Strategies for Success
Exploring the State of Facilities 2014 [Part 5]: Strategies for SuccessExploring the State of Facilities 2014 [Part 5]: Strategies for Success
Exploring the State of Facilities 2014 [Part 5]: Strategies for Success
Sightlines
 
Bo e v1.0
Bo e v1.0Bo e v1.0
HBA Supervisor Meeting 17.8.14
HBA Supervisor Meeting 17.8.14HBA Supervisor Meeting 17.8.14
HBA Supervisor Meeting 17.8.14
Andrew Cavell
 
Bt tower v1.1
Bt tower v1.1Bt tower v1.1
Forensics Expo, London 2015
Forensics Expo, London  2015Forensics Expo, London  2015
Informe #SIE13: Redes sociales en empresas
Informe #SIE13: Redes sociales en empresasInforme #SIE13: Redes sociales en empresas
Informe #SIE13: Redes sociales en empresas
Prodigioso Volcán
 
What is an ancient civilization?
What is an ancient civilization?What is an ancient civilization?
What is an ancient civilization?
atacha
 
Foundation of Asian Civilization
Foundation of Asian CivilizationFoundation of Asian Civilization
Foundation of Asian Civilization
lycaatienza
 
Asia's First Civilizations
Asia's First CivilizationsAsia's First Civilizations
Asia's First Civilizationsalbano
 
Ancient civilizations of asia and africa
Ancient civilizations of asia and africaAncient civilizations of asia and africa
Ancient civilizations of asia and africaKyle Rainer Villas
 

Viewers also liked (12)

White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2White Hat 6 March 2015 v2.2
White Hat 6 March 2015 v2.2
 
Exploring the State of Facilities 2014 [Part 5]: Strategies for Success
Exploring the State of Facilities 2014 [Part 5]: Strategies for SuccessExploring the State of Facilities 2014 [Part 5]: Strategies for Success
Exploring the State of Facilities 2014 [Part 5]: Strategies for Success
 
Bo e v1.0
Bo e v1.0Bo e v1.0
Bo e v1.0
 
HBA Supervisor Meeting 17.8.14
HBA Supervisor Meeting 17.8.14HBA Supervisor Meeting 17.8.14
HBA Supervisor Meeting 17.8.14
 
Bt tower v1.1
Bt tower v1.1Bt tower v1.1
Bt tower v1.1
 
Forensics Expo, London 2015
Forensics Expo, London  2015Forensics Expo, London  2015
Forensics Expo, London 2015
 
Informe #SIE13: Redes sociales en empresas
Informe #SIE13: Redes sociales en empresasInforme #SIE13: Redes sociales en empresas
Informe #SIE13: Redes sociales en empresas
 
What is an ancient civilization?
What is an ancient civilization?What is an ancient civilization?
What is an ancient civilization?
 
Foundation of Asian Civilization
Foundation of Asian CivilizationFoundation of Asian Civilization
Foundation of Asian Civilization
 
Asia's First Civilizations
Asia's First CivilizationsAsia's First Civilizations
Asia's First Civilizations
 
Ancient civilizations of asia and africa
Ancient civilizations of asia and africaAncient civilizations of asia and africa
Ancient civilizations of asia and africa
 
Ancient civilization of india
Ancient civilization of indiaAncient civilization of india
Ancient civilization of india
 

Similar to White hat march15 v2.2

DarkWeb
DarkWebDarkWeb
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
Strategy&, a member of the PwC network
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
KalponikPrem
 
Threat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperThreat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperDuncan Hart
 
threat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperthreat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperRudy Piekarski
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
Cognizant
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
PavelVtek3
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
David Sweigert
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
online Marketing
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
Jazmine Brown
 
Cyber Security Company.pdf
Cyber Security Company.pdfCyber Security Company.pdf
Cyber Security Company.pdf
pdfcompressor1
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
Melbourne IT
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
Andreanne Clarke
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
Jake Weaver
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptx
CompanySeceon
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
SkyBlue659156
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
lochanrajdahal
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
Skippedltd
 

Similar to White hat march15 v2.2 (20)

DarkWeb
DarkWebDarkWeb
DarkWeb
 
Cybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future AttacksCybersecurity After WannaCry: How to Resist Future Attacks
Cybersecurity After WannaCry: How to Resist Future Attacks
 
Common Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptxCommon Types of Cyber Attacks & How to Prevent Them.pptx
Common Types of Cyber Attacks & How to Prevent Them.pptx
 
Threat Lifecycle Management_Whitepaper
Threat Lifecycle Management_WhitepaperThreat Lifecycle Management_Whitepaper
Threat Lifecycle Management_Whitepaper
 
threat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaperthreat-lifecycle-management-whitepaper
threat-lifecycle-management-whitepaper
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
Cybersecurity - Poland.pdf
Cybersecurity - Poland.pdfCybersecurity - Poland.pdf
Cybersecurity - Poland.pdf
 
Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]Overview of the Cyber Kill Chain [TM]
Overview of the Cyber Kill Chain [TM]
 
How to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdfHow to avoid cyber security attacks in 2024 - CyberHive.pdf
How to avoid cyber security attacks in 2024 - CyberHive.pdf
 
Cybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdfCybersecurity Interview Questions and Answers.pdf
Cybersecurity Interview Questions and Answers.pdf
 
Cyber Security Company.pdf
Cyber Security Company.pdfCyber Security Company.pdf
Cyber Security Company.pdf
 
CTI Report
CTI ReportCTI Report
CTI Report
 
Introduction to the Current Threat Landscape
Introduction to the Current Threat LandscapeIntroduction to the Current Threat Landscape
Introduction to the Current Threat Landscape
 
Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015Mark Lanterman - The Risk Report October 2015
Mark Lanterman - The Risk Report October 2015
 
IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015IBM X-Force Threat Intelligence Quarterly Q4 2015
IBM X-Force Threat Intelligence Quarterly Q4 2015
 
Managed security services for financial services firms
Managed security services for financial services firmsManaged security services for financial services firms
Managed security services for financial services firms
 
Threat Intelligen.pptx
Threat Intelligen.pptxThreat Intelligen.pptx
Threat Intelligen.pptx
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
 
Assess risks to IT security.pptx
Assess risks to IT security.pptxAssess risks to IT security.pptx
Assess risks to IT security.pptx
 
Module 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptxModule 1Introduction to cyber security.pptx
Module 1Introduction to cyber security.pptx
 

More from Prof John Walker FRSA Purveyor Dark Intelligence

Wax Switch
Wax SwitchWax Switch
Cyber Threats
Cyber ThreatsCyber Threats
APT Event - New York
APT Event - New YorkAPT Event - New York
Info sec 12 v1 2
Info sec 12 v1 2Info sec 12 v1 2
Info leakage 200510
Info leakage 200510Info leakage 200510

More from Prof John Walker FRSA Purveyor Dark Intelligence (8)

Wax Switch
Wax SwitchWax Switch
Wax Switch
 
Cyber Threats
Cyber ThreatsCyber Threats
Cyber Threats
 
APT Event - New York
APT Event - New YorkAPT Event - New York
APT Event - New York
 
Take Down
Take DownTake Down
Take Down
 
Lipstick on a pig
Lipstick on a pigLipstick on a pig
Lipstick on a pig
 
Info sec 12 v1 2
Info sec 12 v1 2Info sec 12 v1 2
Info sec 12 v1 2
 
Info leakage 200510
Info leakage 200510Info leakage 200510
Info leakage 200510
 
Ctf110213 public
Ctf110213 publicCtf110213 public
Ctf110213 public
 

Recently uploaded

International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
Sebastiano Panichella
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Orkestra
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
OWASP Beja
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Matjaž Lipuš
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
OECD Directorate for Financial and Enterprise Affairs
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Sebastiano Panichella
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
Access Innovations, Inc.
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
Faculty of Medicine And Health Sciences
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
khadija278284
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Sebastiano Panichella
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
Vladimir Samoylov
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
Howard Spence
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 

Recently uploaded (13)

International Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software TestingInternational Workshop on Artificial Intelligence in Software Testing
International Workshop on Artificial Intelligence in Software Testing
 
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
Sharpen existing tools or get a new toolbox? Contemporary cluster initiatives...
 
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
0x01 - Newton's Third Law:  Static vs. Dynamic Abusers0x01 - Newton's Third Law:  Static vs. Dynamic Abusers
0x01 - Newton's Third Law: Static vs. Dynamic Abusers
 
Bitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXOBitcoin Lightning wallet and tic-tac-toe game XOXO
Bitcoin Lightning wallet and tic-tac-toe game XOXO
 
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
Competition and Regulation in Professional Services – KLEINER – June 2024 OEC...
 
Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...Announcement of 18th IEEE International Conference on Software Testing, Verif...
Announcement of 18th IEEE International Conference on Software Testing, Verif...
 
Eureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 PresentationEureka, I found it! - Special Libraries Association 2021 Presentation
Eureka, I found it! - Special Libraries Association 2021 Presentation
 
Obesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditionsObesity causes and management and associated medical conditions
Obesity causes and management and associated medical conditions
 
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdfBonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
Bonzo subscription_hjjjjjjjj5hhhhhhh_2024.pdf
 
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...Doctoral Symposium at the 17th IEEE International Conference on Software Test...
Doctoral Symposium at the 17th IEEE International Conference on Software Test...
 
Getting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control TowerGetting started with Amazon Bedrock Studio and Control Tower
Getting started with Amazon Bedrock Studio and Control Tower
 
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptxsomanykidsbutsofewfathers-140705000023-phpapp02.pptx
somanykidsbutsofewfathers-140705000023-phpapp02.pptx
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 

White hat march15 v2.2

  • 1. Conventional Defence to Unconventional Threats [AKA‘ConvertingH20 to Bits& By[i]tes’] WhiteHat– London– 06/03/15 ProfessorJohnWalker
  • 2. The Majority have already been Hacked The Minority are aware they have been Hacked There are many suffering on-going Compromise of their Systems Some know they are suffering Compromise Some don’t Accept the FACTS
  • 3. Lets Talk - Proven Capabilities – [EUROPOL Q/1/15] To date OSINT technology has achieved a 100% success rate with identification of Security Vulnerabilities and Exposures on deployments which had been utilising the conventional methods of applying security by testing the known knowns, as opposed to the new age methodologies of locating the unknown unknowns, which can, and do expose Corporate assets to support an attack and/or compromise. The following are some examples of discoveries of what were unknown unknowns which hosting threats, or which had already suffered compromise by external actors: Compromised Bank Network: Identification of a major breach in which .com.cn Chinese Servers had attached to the core switch of the Bank with remote login capabilities. Exposed Government Agency: An International Sensitive Government Intelligence Agency who was suffering internal Compromise at a Third Party site through a flawed and insecure DNS configuration. PCI-DSS Exposed: The secure PCI-DSS Bank who were not aware of the deployment of an Insecure SAMBA Share, or an insecure Cloud Service which exposed PCI-DSS Client and Account Data. Local Authority: In this case a Local Authority were considered to be secure post multiple sessions of Penetration Testing, yet were exposing 29 Servers to the Internet which were unknown and vulnerable. MI5 Data Exposed: Government Agency who released information under FOI – without realising its implicated associations with the Security Services [thus making other parties a potential Wet Target for Terrorists].
  • 4. The Threat We now accept that the Cyber Risk against companies is significant, the impact of which is evidenced by the attacks, breaches, and security compromises against some of the biggest brands on the planet. This is not scaremongering but fact! Whilst conventional security delivers what is meant to be technological, and procedural security defences to safeguard assets from attack, it falls short of underpinning the capabilities to discover the unknown unknowns which may [and do] expose Deployments, Third Parties, Associates, or Assets to the potential of exploitation and compromise. It is in this capacity where Pre Event, and Post Attack Cyber Intelligence can be of significant benefit to: Identify the Unknown Unknowns of risks Discover Data Leakage Locate opportunities of exposure to Social Engineering Find technical exposures at the unknown perimeter of the organisation Brand Protection Provision granular Alert & Reporting capabilities Support Post Attack CSIRT Operations Perform Social Media Brand Monitoring
  • 5. Welcome to the Madcap World of off-the-wall ideas which can [and do] sometimes work! NLP [Neuro-Linguistic Programming] – Its time to change! However – NLP can have both Positive & Negative outcomes NLP may extend into what I call subliminal NVP [Neuro-Visual-Programming] Converting H20 to Bits & By[i]tes – Turning Water into Data [Intelligence] People Power – It’s the ONLY Way
  • 6. Mind Manipulation – Its Everywhere
  • 7. Unpatched People - Conversion of H20 into Bits & By[i]tes The homosapien is made up of between 55-60% of water, and these represent the Wet Target which can be the weakest link in the Security Lifecycle – I know, I have exploited them – and they can be easy targets! Furthermore, whilst a lot of effort goes into patching applications, systems, and hardware, this landscape of vulnerable and Intelligent targets are forgotten, and so are an ideal target-layer to support circumvention of any deployed security posture. And the emergence of High Grade threats is continuous – e.g. ROVNIX & its updated Twin VAWTRAK See SC Magazine News – 26/02/15: http://www.scmagazineuk.com/banking-trojan-vawtrak-spotted-in-the-wild/article/400317/ And - See SC Magazine News – 5/03/15
  • 8. Get it into Perspective No matter the Firewalls, IPS, IDS, DLP, and the Security Infrastructure – which is proven to be failing – add to this Complexity, Acquisitions, and High Technological Dependency, and you can start to appreciate the problem [or benefit] depending – on your objective. Big Data Credit Reference Agency based in Nottingham: Complex Firewalling made it impossible to identify all cable Start, and Termination points! Houses of Parliament: Comment on the BBC week commencing 23/02/14 – Can’t terminate cabling as it could be an MP talking to the Kremlin! Government Department: GSi link connected into a Hostile Region. NHS Migration of Data Access: No comment!
  • 9. Unconventional Hacker Thinking Consider the element of H2O, and the tension at the Presentation Layer.
  • 10. Robust Mitigation One of the current challenges facing organisations today with engagement of the Cyber Threat is that they are applying the conventional rules of yesterday to protect against the unconventional vectors of attack in 2015 and onward. In this area multiples of successful Cyber Attacks and Incursions have been identified as a major component in the compromise. To counter the threats we need to go beyond [and compliment] Penetration Testing and consider: Identifying the unknown unknowns by applying multiple specialist applications, techniques, and streaming to support both Proactive [before the event], and Reactive [where a Security Incident has occurred] to both defend and mitigate the exposure of Corporate and Sensitive Assets. Monitor for indications and threats through leverage of Cyber Intelligence to for purpose of Brand Protection – again by applying a methodology of seeking out the unknown unknowns and turning them into Defensive Collateral. Have an assured Computer Security Incident Response Team [CSIRT] First Responder Capability to engage Cyber Attacks, and Security Breaches. Assume you ARE Compromised/Hacked – You know it makes sense 
  • 11. We Need ‘Minority Reporting’ Effective Cyber Intelligence capabilities which must try to emulate a style of Minority Reporting
  • 12. The Approach DarkWeb applies the same rules as would a potential attacker and run multiples bespoke tools, applications, and Cyber Intelligence Methodologies to identify what we refer to as OoII [Objects of Intelligence Interest].
  • 13. Exploit the DarkWeb The DarkWeb can be leveraged to for purpose of Cyber Monitoring Capabilities to enable users to understand the most current threats before they go public. 25/03/15
  • 14. Be Offensive – Have Bad Thoughts The New Age of Unconventional Cyber Threats do dictate that we view security from an obtuse perspective of the Offensive: SECURITY Have Bad Thoughts – Think like Bad People – Apply Their Rules NOT Yours – Throw Convention to the WIND
  • 15. i + e + v = c