jeff schilling/chief security officer · threat types, focus on the scale in numbers of actors ......

10
Out Sourcing Security Capabilities Businesses Worth Building Are Businesses Worth Protecting Jeff Schilling/Chief Security Officer

Upload: others

Post on 10-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Jeff Schilling/Chief Security Officer · THREAT TYPES, FOCUS ON THE SCALE IN NUMBERS OF ACTORS ... Threat detection • External Penetration testing/red team SECURITY OPERATIONS FUNCTIONS

Out Sourc ing Secur i ty Capabi l i t ies

Businesses Worth Building Are Businesses Worth Protecting

Jeff Schilling/Chief Security Officer

Page 2: Jeff Schilling/Chief Security Officer · THREAT TYPES, FOCUS ON THE SCALE IN NUMBERS OF ACTORS ... Threat detection • External Penetration testing/red team SECURITY OPERATIONS FUNCTIONS

TARGETEDTHREAT

COMMODITY THREAT

ADVANCED TARGETED THREAT

THREAT TYPES , FOCUS ON THE SCALE IN NUMBERS OF ACTORS

100,000’s of Actors Less than 8,000 Actors Less than 200 Actors

Drive skill level this way

Page 3: Jeff Schilling/Chief Security Officer · THREAT TYPES, FOCUS ON THE SCALE IN NUMBERS OF ACTORS ... Threat detection • External Penetration testing/red team SECURITY OPERATIONS FUNCTIONS

Infected Word Doc or PDF is opened

Java script exploited in browser

Command line SQL inject

EXPLOITATION RECONNAISSANCE

Open source research Social network research

Port scan, IP sweep Google research

WEAPONIZATION

Combine the exploit tool with

the method

DISTRIBUTION & STRATEGY

Phishing email Website drive by SQL inject script

ACTION ON TARGET

Search the target Destroy or disrupt

Package and prepare for and exfil data

Registry Key changed Privilege Escalation

Look for open connections

PERSIST/LATERAL MOVEMENT

1 2 3 4

5 6 7 COMMAND & CONTROL

Malware or compromised system

reaches out for instructions

THE KILL CHAIN

Page 4: Jeff Schilling/Chief Security Officer · THREAT TYPES, FOCUS ON THE SCALE IN NUMBERS OF ACTORS ... Threat detection • External Penetration testing/red team SECURITY OPERATIONS FUNCTIONS

THREAT VULERABILITY SECURITY OPS MITIGATION

P/D/R/R RISK + _ =

THREAT INTELLIGENCE

PROTECT

DETECT

RESPOND

RECOVER

THREAT INTELLIGENCE

CYBER/

PHYSICAL

SECURITY

THREAT INTELLIGENCE

THREAT INTELLIGENCE

SECUR ITY OPERAT IONS

Page 5: Jeff Schilling/Chief Security Officer · THREAT TYPES, FOCUS ON THE SCALE IN NUMBERS OF ACTORS ... Threat detection • External Penetration testing/red team SECURITY OPERATIONS FUNCTIONS

•   Threat Intelligence •   Alerts and Warnings •   Incident Management •   Problem Management •   Incident Response/Forensics •   Security Device Management •   Vulnerability Management •   Internal Penetration testing/Advanced

Threat detection •   External Penetration testing/red team

SECURITY OPERATIONS FUNCTIONS

Page 6: Jeff Schilling/Chief Security Officer · THREAT TYPES, FOCUS ON THE SCALE IN NUMBERS OF ACTORS ... Threat detection • External Penetration testing/red team SECURITY OPERATIONS FUNCTIONS

•   Fill gaps in security team? •   People •   Processes •   Technology

•   Save money? •   Be compliant? •   Provide better security operations?

WHAT DO YOU WANT TO ACCOMPLISH?

Page 7: Jeff Schilling/Chief Security Officer · THREAT TYPES, FOCUS ON THE SCALE IN NUMBERS OF ACTORS ... Threat detection • External Penetration testing/red team SECURITY OPERATIONS FUNCTIONS

Infected Word Doc or PDF is opened

Java script exploited in browser

Command line SQL inject

EXPLOITATION RECONNAISSANCE

Open source research Social network research

Port scan, IP sweep Google research

WEAPONIZATION

Combine the exploit tool with

the method

DISTRIBUTION & STRATEGY

Phishing email Website drive by SQL inject script

ACTION ON TARGET

Search the target Destroy or disrupt

Package and prepare for and exfil data

Registry Key changed Privilege Escalation

Look for open connections

PERSIST/LATERAL MOVEMENT

1 2 3 4

5 6 7 COMMAND & CONTROL

Malware or compromised system

reaches out for instructions

THE KILL CHAIN

Page 8: Jeff Schilling/Chief Security Officer · THREAT TYPES, FOCUS ON THE SCALE IN NUMBERS OF ACTORS ... Threat detection • External Penetration testing/red team SECURITY OPERATIONS FUNCTIONS

TARGETING METHODOLOGY – OODA LOOP

THE OODA LOOP CLOUD SECURITY FRAMEWORK

Military defense created by U.S. Air Force in Korean War

ORIENT

OBSERVE

DECIDE

ACT

Page 9: Jeff Schilling/Chief Security Officer · THREAT TYPES, FOCUS ON THE SCALE IN NUMBERS OF ACTORS ... Threat detection • External Penetration testing/red team SECURITY OPERATIONS FUNCTIONS

Threat Research

Vulnerability Threat Management

FNF Observations

Problem Management

Security Control availability

CISO Assessment Findings

OBSERVE DECIDE

Additions to Risk Register

FNF targeting

Changes to Security controls

Conduct Technology gap analysis

ACT

Apply Threat Intel to Security controls

Develop & Deploy Counter-measures,

Tune SIEM

VTM Scan tuning

Open FNF actions in JIRA

Incident Response Contain/Eradicate

Work projects in Risk Register

Inject new security tech requirements

TARGETING METHODOLOGY OODA LOOP

ORIENT

Analysis & Prioritization

Risk Assessment

Counter-measure & Control

Effectiveness

TARGETING METHODOLOGY – OODA LOOP

SIEM Alerts

Page 10: Jeff Schilling/Chief Security Officer · THREAT TYPES, FOCUS ON THE SCALE IN NUMBERS OF ACTORS ... Threat detection • External Penetration testing/red team SECURITY OPERATIONS FUNCTIONS

•   Threat Intelligence •   Alerts and Warnings •   Incident Management •   Problem Management •   Incident Response/Forensics •   Security Device Management •   Vulnerability Management •   Internal Penetration testing/Advance

threat detection •   ****External Penetration testing/red

team*****

SECURITY OPERATIONS FUNCTIONS