cyber security: a tale from the...
TRANSCRIPT
Cyber Security: A Tale from the Trenches
Dr. Dimitrios Patsos
Chief Technology Officer, ADACOM S.A.
Askjfgjgkketigldsewo5mc2bad things are happening
What’s really happening ?
By whom ?
Who’s affected ?
Where ?
In the US
“In this interconnected, digital world, there are going to be opportunities for hackers to engage in cyber assaults both in the private sector and the public sector...But even as we get better, the hackers are going to get better, too…
Because if we don’t put in place the kind of architecture that can prevent these attacks from taking place, this is not just going to be affecting movies, this is going to be affecting our entire economy in ways that are extraordinarily significant.”
President Obama, December 19, 2014.
In Europe
• The five biggest threats to the UK economy (Financial stability report –December 2014)
1. Tumbling oil prices2. Housing bubble 3. Geo-political risks 4. Renewed downturn in the euro area 5. Banking system and cyber threats
• Identified cyber attacks as a key risk to UK financial stability• Will carry out in 2015 “cyber stress test” on banks
GloballyWhat is the impact and likelihood of global risks?
Oh, well…
• What is different ?
• Why this is happening ?
• What have we done wrong ?
• What about technology ?
• What about processes ?
• What about people ?
• What about legislation ?
What is different ?
• Terminology: CIA is dead• Cyber: Prevent – Detect – Respond – Recover
• Types of Attack• Reincarnations of past attacks (APT vs. Virus)
• New, totally unseen attacks
• Extended Regulation• General Data Protection Regulation (EU), Directive 95/46/EC (EU), ENISA
(Article 13a of the Directive 2002/21/EC, amended by Directive 2009/140/EC),
• Motive & Financial Gain• Targeted attacks vs. class attacks
A “typical” Financial Malware
Proprietary and Confidential
Advance Evasion Techniques
Cash Out through Mules
Exfiltrate Data
Expand Access / Strengthen
Foothold
Outbound Connection
Targeted Deployment /
Initial Intrusion
Research Target
Infrastructure / Employees
Cash Out from ATM
Y Bank
Analyse Targetbanking
Applications
Perform Transactions
Send Commands to
ATMs
Cash Out through Mules
Security and trust problems continue to plague cyber-physical systems
How secure is your fridge ?
Information theft and espionage shows no signs of abating
Why this is happening ?
• Technology Perception• Fire and Forget
• Too much focus on Compliance• Compliance is a by-product (or…a side benefit)
• Over connectivity• Cloud, BYOD, IoT,
• Operations Prevail• Running is more important than running securely
• World Climate• “Times they are a’ changing”
• It was about time• More convenient than declaring war
What have we done wrong ?
• Preconditions not usually met (risk analysis…)
• Dr. NO
• Success = progress NOT effectiveness
• No solution transparency
• Link to business
• Insisted on cost
• Sourcing of qualitative, subjective, intangible
• Integration levels
• Terminology, hats, after-marketing
Reports anyone ?
Business Speaks Targets
What about technology ?
• New attack vectors result in new tools
• Advanced Persistent Threat (APT) Protection
• Security Analytics / Forensics
• Data Leakage Prevention (DLP)
• Privileged Account Monitoring / Password Vault
• Managed Security Services
• Secure Sharing
Sandboxing in 42 seconds
Security Analytics
• Meaningful Insights
• Timeline
• Discovery
• Forensics
How are my databeing used?
Where are my data?
How are my data protected ?
Data Leakage Prevention Basics
What are mydata?
guidelinespolicies procedures life cycle
integrity quality compliance
Managed Security Services
Processes: Incident Response Mind Set
• Prepare: for the…inevitable
• Identify: whether something’s happening
• Contain: minimize threat impact
• Eradicate: eliminate damage
• Recover: where possible
• Follow-up: document lessons learnt
Incident Response
People Stereotypes
Reality Check
Self Reported Behaviours Results
Age Range 14-61
Mean Age 25
Sex Male
Race Caucasian
Education Level High Education
Mean Annual Salary $ 56.000,00
Creativity Score 62%
Depression Rate 14%
Bipolar Disorder Indication 15%
Monogamous Heterosexual 79%
The shortfall in skilled security workers puts companies in peril
Putting it all together
revisit the basics
prepareWILL expert advise
educate users
Trust the Management
patiencebalance
enjoy - responsibly
ride beyond FUD
About ADACOM
• In business since 1999,
• Offices in the UK, Israel, Greece
• Over 80 seasoned experts in Cyber Security• Network and Infrastructure Security• Endpoint and Host Security• Data Governance• PKI & Authentication • GRC and Assurance• Security Analytics
• Active in 28 countries in the EMEA Region
Greece
Athens
25 Kreontos St.,
104 42 Athens
+30 210 5193740
Israel
Tel Aviv
58th Ha’amal St.,
4951358 Petach Tikva
+972 74 7019424
United Kingdom
London
16 Great Queen St.,
WC2B5AH Covent Garden
+44 203 126 4590
Thanks for Watching !