Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom...

18
Cybersecurity & Disrupve Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018

Transcript of Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom...

Page 1: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

Cybersecurity & Disruptive TechnologiesNarudom Roongsiriwong, CISSP

NECTEC-ACE 2018, September 25, 2018

Page 2: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

About Me

● Information Security since 1995

● SVP, Head of IT Security, Kiatnakin Bank

● Committee Member, Thailand Banking Sector Computer Emergency Response Team(TB-CERT)

● Vice President, OWASP Thailand Association

● Committee Member, Cloud Security Alliance(CSA), Thailand Chapter

● Committee Member, National Digital ID Project, Technical Team

● Chief Information Security Officer (CISO) of the Year 2017, NetworkWorld Asia

Page 3: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

The Art of War

If you know the enemy and know yourself, you need

not fear the result of a hundred battles.

If you know yourself but not the enemy, for every

victory gained you will also suffer a defeat.

If you know neither the enemy nor yourself, you will

succumb in every battle.

Sun Tzu

Page 4: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security
Page 5: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security
Page 6: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

Opportunistic Targeted

ManyTry to attack as many users as they

can.Target

FewFocus on just one target with specific

goal.

OldUse tried tested methods to exploit

common vulnerability. Tricks

NewUse new, zero-day exploits on

computer systems attackers might familiar with.

Make MoneyThe prize is to make as much money

as possible.Intention

Do DamageThe purpose is to steal or damage

valuable data.

Don’t HideOften no point hiding the damage

doneCovert

Silent But DeadlyThe aim is to leave little to no trace of

entering the system.

Opportunistic vs Targeted Attacks

Page 7: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

How Attackers Do #1:Attacks Directly to Servers or Devices

Page 8: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

Why Do Hackers Hack?

● Just for fun

● Steal the valuable protected information such as credit card or personal medical record information

● Perform unauthorized transactions– Money transfer– Goods shipping without payment

● Deploy malware to client machines those view these sites

● Use the hacked server or device for other purposes– Hacking their real target servers with scapegoat servers– Cryptocurrency Mining

Page 9: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

Application Security

Page 10: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

Internal Network

Internet

Know Your Enemies #2:Attacks with Malware

Call back C&C

Page 11: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

Complexity of Attack Examples

RansomwareRansomware Business Email CompromiseBusiness Email Compromise

OT/ICS/SCADA AttacksOT/ICS/SCADA AttacksIoT AbusesIoT Abuses

Page 12: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security
Page 13: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

Compromise and Data Breach Statistics

Source: IBM Security

Page 14: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

Security Professionals Biggest Sources of Concern Related to Cyber Attacks

Source: Cisco 2017 Security Capabilities Benchmark Study

Page 15: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security

The 25 Most Common Passwords of 2017

Source: SplashData Annual Report

Page 16: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security
Page 17: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security
Page 18: Cybersecurity & Disruptive Technologies · Cybersecurity & Disruptive Technologies Narudom Roongsiriwong, CISSP NECTEC-ACE 2018, September 25, 2018 . About Me Information Security