Commercial Practices for...

21
Commercial Practices for Cybersecurity Understanding Today’s Cyber Security Trends Presented by: Lyle Sudin, Manager, Security Consulting Services [email protected] May 15, 2018

Transcript of Commercial Practices for...

Page 1: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

Commercial Practices for Cybersecurity Understanding Today’s Cyber Security Trends

Presented by: Lyle Sudin, Manager, Security Consulting Services

[email protected]

May 15, 2018

Page 2: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Lyle Sudin

Manager of Security Consulting Services at Mandiant, a FireEye company

First security job for Akamai starting in 2000

12 years in government funded R&D at BBN Technologies, now part of Raytheon

– Developed cutting edge security technologies

– Roles included Principal Investigator, manager, software developer, architect, integration engineer, and systems administrator

2.5 years as Senior Manager at HERE Technologies

– Application security reviews, creation of a Security SDLC, and ISO 27001 certification

2+ years at Mandiant

– Consulting manager for the North Central region

– Focus is on strategic, proactive, and transformational activities

Page 3: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Mandiant Consulting, a FireEye company

3

Prevent, detect, & respond to advanced cyber-security events and protect your organization’s critical assets.

12017 Fortune list

Trusted by organizations

worldwide – Over 40% of

Fortune 100 companies1

14+ years responding to

and remediating

headline breaches

Mandiant DNA – Pioneers

in sophisticated incident

response

Portfolio of services to assess,

enhance and transform

security posture and upskill

internal security staff

Cutting-edge threat

intelligence informed by

frontline adversary exposure

Cyber security services

enabled by purpose-built

technology

Global workforce of over

300 consultants in 20+

countries

Page 4: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

So What? Who Cares?

You will be hacked, what are you going to do about it?

– Adversaries are professionals, organized, and well funded

– Mandiant can help prepare you to deal with the incident

Identify and reduce security risks at all levels of the organization

Best practice is to focus on detection and response

– Create an investigation ready environment

– Leverage threat intelligence

– Develop layers of controls proportional to the data

– People, processes, and technology are all required to mount an effective defense

4

Page 5: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

Questions?

Page 6: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

Thank You

Page 7: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

The FireEye Ecosystem

7

Page 8: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

Additional Material

8

Page 9: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

It’s a “who,” not a “what”

There is a human at a

keyboard

Performing highly tailored

and customized attacks

Targeted specifically at you

Professional, organized and well funded

Attackers escalate

sophistication of their

tactics as needed

They remain relentlessly

focused on their objective

If you kick them out they will return

They have specific objectives

Their goal can be long-term

occupation or short term

destruction

Their utilization of persistence

tools and tactics ensure

ongoing access

Evolving Threat Landscape

9

Page 10: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Strengthen Position within Target

Establish

Foothold

Package and Steal Target Data

Complete

Mission

Gain Initial Access Into Target

Initial

Compromise

Lateral

Movement

Maintain

Presence

Initial

Recon

Steal Valid User Credentials

Escalate

Privileges

Identify Target Data

Internal

Recon

Identify Exploitable Vulnerabilities

Attack

Lifecycle

Page 11: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Tac t ics , Techn iques and Procedures

V ic t imology

An Intelligence-Led Approach to Services

11

Page 12: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Security Needs Framework

12

Page 13: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

2 SPEED AND SCALE 1

INVESTIGATIVE EXPERTISE 3

WORLD CLASS THREAT INTELLIGENCE 4

CUSTOM TECHNOLOGY OPTIONS

5 GLOBAL FOOTPRINT 6 CRISIS MANAGEMENT

EXPERTISE 7 EXPERT STAFF AND INNOVATIVE RESEARCH

7 Reasons to Have Mandiant on Speed Dial

Page 14: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

M-Trends: Tracking our investigative experience

Informing the cyber security community since 2010

Annual publication sought after by security professionals and market analysts

Data based on 12 months of forensic investigative findings (10/01/16 – 09/30/17)

2 Ponemon Institute (2017). Cost of Data Breach Study.

14

Page 15: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Who’s a Target

9%

10%

8%

9%

15%

5%

Business and

Professional Services

16%

Energy

Other

20%

8%

Entertainment

and Media

Financial

Government

Retail and

Hospitality

Healthcare

High Tech

Industries Investigated Organizations Investigated By Mandiant in 2017, By Industry

Industry Americas APAC EMEA Global

Business and Professional

Services 18% 10% 12% 16%

Energy 5% 2% 7% 5%

Entertainment and Media 11% 7% 5% 10%

Financial 17% 39% 24% 20%

Government 6% 7% 18% 8%

Healthcare 12% 2% 2% 9%

High Tech 9% 10% 7% 8%

Retail and Hospitality 10% 2% 4% 8%

Other 12% 20% 22% 15%

15

Page 16: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Median Dwell Time Trending

Median Dwell Time, By Year

400

350

300

250

200

150

100

50

0

2011 2012 2013 2014 2015 2016 2017

101 99

Da

ys

Year

416

243

205

146

229

16

Page 17: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Notification by Source

36%

64%

AMERICAS

44%

56%

EMEA

43%

57%

APAC GLOBAL

38%

62%

Notification By Source

Internal

External

KEY

Notification By Source Notification By Source Notification By Source

17

Page 18: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Once a Target, Always a Target

56% victims subsequently

retargeted

Victims subsequently retargeted by region

100

90

80

70

60

50

40

30

20

10

0

AMERICAS EMEA APAC

44% 47%

91%

18

Page 19: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Ind

ust

ry t

yp

e

Non-Profit

Government

Business and Professional Services

Transportation and Logistics

Other

Financial

Energy

Biotechnology and Pharmaceuticals

Retail and Hospitality

Media and Entertainment

Healthcare

Manufacturing

Construction and Engineering

Education

Telecommunication

High Tech

Once a Target, Always a Target, by industry

Customer industries targeted by multiple threat groups Customer industries by number of significant attacks

0 2 4 6 8

Number of different threat groups

0 2 4 6 8 10 11 12 14 16

Ind

ust

ry t

yp

e

Non-Profit

Government

Business and Professional Services

Transportation and Logistics

Other

Financial

Energy

Biotechnology and Pharmaceuticals

Retail and Hospitality

Media and Entertainment

Healthcare

Manufacturing

Construction and Engineering

Education

Telecommunication

High Tech

Number of different threat groups

19

Page 20: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Enduring Trends in Security Fundamentals

Security Risk

Management

Identity and

Access Mgmt Data

Protection

Incident

Response

Network, Cloud

and DC Protection

Host and Endpoint

Protection

20

Page 21: Commercial Practices for Cybersecurityneu.edu/alert/assets/adsa/adsa18_presentations/15_Sudin.pdf©2018 FireEye | Private & Confidential Cyber Security Skills Gap – The Invisible

©2018 FireEye | Private & Confidential

Cyber Security Skills Gap – The Invisible Risk

Demand for specialized skills rapidly outpacing supply

Lack of visibility and detection

Lack of specialized skill-sets

Enhance current capabilities through process improvement and staff training

Automate overhead processes

Outsource niche functions to specialized service providers

21

Growing skills shortage Recommendations