cyber security: a tale from the...

34
Cyber Security: A Tale from the Trenches Dr. Dimitrios Patsos Chief Technology Officer, ADACOM S.A.

Upload: others

Post on 01-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Cyber Security: A Tale from the Trenches

Dr. Dimitrios Patsos

Chief Technology Officer, ADACOM S.A.

Page 2: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to
Page 3: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Askjfgjgkketigldsewo5mc2bad things are happening

Page 4: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

What’s really happening ?

Page 5: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

By whom ?

Page 6: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Who’s affected ?

Page 7: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Where ?

Page 8: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

In the US

“In this interconnected, digital world, there are going to be opportunities for hackers to engage in cyber assaults both in the private sector and the public sector...But even as we get better, the hackers are going to get better, too…

Because if we don’t put in place the kind of architecture that can prevent these attacks from taking place, this is not just going to be affecting movies, this is going to be affecting our entire economy in ways that are extraordinarily significant.”

President Obama, December 19, 2014.

Page 9: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

In Europe

• The five biggest threats to the UK economy (Financial stability report –December 2014)

1. Tumbling oil prices2. Housing bubble 3. Geo-political risks 4. Renewed downturn in the euro area 5. Banking system and cyber threats

• Identified cyber attacks as a key risk to UK financial stability• Will carry out in 2015 “cyber stress test” on banks

Page 10: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

GloballyWhat is the impact and likelihood of global risks?

Page 11: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Oh, well…

• What is different ?

• Why this is happening ?

• What have we done wrong ?

• What about technology ?

• What about processes ?

• What about people ?

• What about legislation ?

Page 12: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

What is different ?

• Terminology: CIA is dead• Cyber: Prevent – Detect – Respond – Recover

• Types of Attack• Reincarnations of past attacks (APT vs. Virus)

• New, totally unseen attacks

• Extended Regulation• General Data Protection Regulation (EU), Directive 95/46/EC (EU), ENISA

(Article 13a of the Directive 2002/21/EC, amended by Directive 2009/140/EC),

• Motive & Financial Gain• Targeted attacks vs. class attacks

Page 13: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

A “typical” Financial Malware

Proprietary and Confidential

Advance Evasion Techniques

Cash Out through Mules

Exfiltrate Data

Expand Access / Strengthen

Foothold

Outbound Connection

Targeted Deployment /

Initial Intrusion

Research Target

Infrastructure / Employees

Cash Out from ATM

Y Bank

Analyse Targetbanking

Applications

Perform Transactions

Send Commands to

ATMs

Cash Out through Mules

Page 14: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Security and trust problems continue to plague cyber-physical systems

Page 15: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

How secure is your fridge ?

Page 16: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Information theft and espionage shows no signs of abating

Page 17: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Why this is happening ?

• Technology Perception• Fire and Forget

• Too much focus on Compliance• Compliance is a by-product (or…a side benefit)

• Over connectivity• Cloud, BYOD, IoT,

• Operations Prevail• Running is more important than running securely

• World Climate• “Times they are a’ changing”

• It was about time• More convenient than declaring war

Page 18: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

What have we done wrong ?

• Preconditions not usually met (risk analysis…)

• Dr. NO

• Success = progress NOT effectiveness

• No solution transparency

• Link to business

• Insisted on cost

• Sourcing of qualitative, subjective, intangible

• Integration levels

• Terminology, hats, after-marketing

Page 19: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Reports anyone ?

Page 20: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Business Speaks Targets

Page 21: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

What about technology ?

• New attack vectors result in new tools

• Advanced Persistent Threat (APT) Protection

• Security Analytics / Forensics

• Data Leakage Prevention (DLP)

• Privileged Account Monitoring / Password Vault

• Managed Security Services

• Secure Sharing

Page 22: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Sandboxing in 42 seconds

Page 23: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Security Analytics

• Meaningful Insights

• Timeline

• Discovery

• Forensics

Page 24: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

How are my databeing used?

Where are my data?

How are my data protected ?

Data Leakage Prevention Basics

What are mydata?

guidelinespolicies procedures life cycle

integrity quality compliance

Page 25: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Managed Security Services

Page 26: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Processes: Incident Response Mind Set

• Prepare: for the…inevitable

• Identify: whether something’s happening

• Contain: minimize threat impact

• Eradicate: eliminate damage

• Recover: where possible

• Follow-up: document lessons learnt

Page 27: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Incident Response

Page 28: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

People Stereotypes

Page 29: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Reality Check

Self Reported Behaviours Results

Age Range 14-61

Mean Age 25

Sex Male

Race Caucasian

Education Level High Education

Mean Annual Salary $ 56.000,00

Creativity Score 62%

Depression Rate 14%

Bipolar Disorder Indication 15%

Monogamous Heterosexual 79%

Page 30: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

The shortfall in skilled security workers puts companies in peril

Page 31: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Putting it all together

Page 32: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

revisit the basics

prepareWILL expert advise

educate users

Trust the Management

patiencebalance

enjoy - responsibly

ride beyond FUD

Page 33: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

About ADACOM

• In business since 1999,

• Offices in the UK, Israel, Greece

• Over 80 seasoned experts in Cyber Security• Network and Infrastructure Security• Endpoint and Host Security• Data Governance• PKI & Authentication • GRC and Assurance• Security Analytics

• Active in 28 countries in the EMEA Region

Page 34: Cyber Security: A Tale from the Trencheseimf.eu/wp-content/uploads/2016/04/ADACOM_DPatsos_CIBA_EIMF.co… · In the US “In this interconnected, digital world, there are going to

Greece

Athens

25 Kreontos St.,

104 42 Athens

+30 210 5193740

Israel

Tel Aviv

58th Ha’amal St.,

4951358 Petach Tikva

+972 74 7019424

United Kingdom

London

16 Great Queen St.,

WC2B5AH Covent Garden

+44 203 126 4590

Thanks for Watching !