Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest...

33
2019 Annual Retirement Conference Presented by: Scott Thompson, MBA CISM MERS IT, Cybersecurity & Facilities Director Cybersecurity Threat Landscape & MERS Countermeasures

Transcript of Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest...

Page 1: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

2019Annual

Retirement

Conference

Presented by: Scott Thompson, MBA CISM

MERS IT, Cybersecurity & Facilities Director

Cybersecurity Threat Landscape & MERS

Countermeasures

Page 2: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Get Your Badge Scanned for Credit!

This session has been approved for continuing education credits.

You must get your badge scanned to receive credit for attending!

Page 3: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Today’s Topics

Cybersecurity Threat

Landscape

• Common Threat Facts

• Real-Life Breach Examples

• Social Engineering

• Phishing

• Threat Severities

MERS

Countermeasures

• Daily Threats

• Cybersecurity Defenses

• Cybersecurity Framework

• Cybersecurity Collaboration

• Future Threat Landscape

Page 4: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Cybersecurity Threats

Page 5: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Common Threat Frequency & Protections

MERS of Michigan | 5

Unsecure Access(Login from personal device)

FACT:

20% of workers use

personal devices for

work without permission

PROTECTION MEASURE:

Data Encryption

Encrypt data on devices

Page 6: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Common Threat Frequency & Protections

MERS of Michigan | 6

Stolen / Lost

Devices(Laptop/Mobile Misplaced)

FACT:

A laptop is stolen every

53 seconds leaving data

vulnerable

PROTECTION MEASURE:

Ability to Remote

Wipe Data

Remotely wipe lost

devices

Unsecure Access(Login from personal device)

FACT:

20% of workers use

personal devices for

work without permission

PROTECTION MEASURE:

Data Encryption

Encrypt data on devices

Page 7: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Common Threat Frequency & Protections

MERS of Michigan | 7

Weak Credentials(Simple, reused passwords)

FACT:

81% of hacking breaches

use compromised

credentials

PROTECTION MEASURE:

Multi-Factor

Authentication

Verify user before access

Stolen / Lost

Devices(Laptop/Mobile Misplaced)

FACT:

A laptop is stolen every

53 seconds leaving data

vulnerable

PROTECTION MEASURE:

Ability to Remote

Wipe Data

Remotely wipe lost

devices

Unsecure Access(Login from personal device)

FACT:

20% of workers use

personal devices for

work without permission

PROTECTION MEASURE:

Data Encryption

Encrypt data on devices

Page 8: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Common Threat Frequency & Protections

MERS of Michigan | 8

Outdated

Antivirus(Old or dated virus protection)

FACT:

A new malware

specimen is released

every 4.2 seconds

PROTECTION MEASURE:

Intelligent Defense

Threat detection /

prevention

Page 9: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Common Threat Frequency & Protections

MERS of Michigan | 9

Ransomware /

Phishing(Email ransomware issues)

FACT:

91% of cyberattacks start

with a phishing email

PROTECTION MEASURE:

Safe Links

Search and strip links of

threats

Outdated

Antivirus(Old or dated virus protection)

FACT:

A new malware

specimen is released

every 4.2 seconds

PROTECTION MEASURE:

Intelligent Defense

Threat detection /

prevention

Page 10: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Common Threat Frequency & Protections

MERS of Michigan | 10

Leaked Data(Sharing confidential data)

FACT:

58% of users accidently

share sensitive

information

PROTECTION MEASURE:

Restrict Access to

Users

Only allow specific users

Ransomware /

Phishing(Email ransomware issues)

FACT:

91% of cyberattacks start

with a phishing email

PROTECTION MEASURE:

Safe Links

Search and strip links of

threats

Outdated

Antivirus(Old or dated virus protection)

FACT:

A new malware

specimen is released

every 4.2 seconds

PROTECTION MEASURE:

Intelligent Defense

Threat detection /

prevention

Page 11: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Common Threat Frequency & Protections

MERS of Michigan | 11

Leaked Data(Sharing confidential data)

FACT:

58% of users accidently

share sensitive

information

PROTECTION MEASURE:

Restrict Access to

Users

Only allow specific users

Ransomware /

Phishing(Email ransomware issues)

FACT:

91% of cyberattacks start

with a phishing email

PROTECTION MEASURE:

Safe Links

Search and strip links of

threats

Outdated

Antivirus(Old or dated virus protection)

FACT:

A new malware

specimen is released

every 4.2 seconds

PROTECTION MEASURE:

Intelligent Defense

Threat detection /

prevention

Greatest risks/threats are from staff

members due to accidental, intentional

or victim-related vulnerabilities

Page 12: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Capital One Breach on Amazon Web Services Cloud

• Stolen Information

o 106 million people affected

o 100 million credit applications

from 2005 – 2019

140K Social Security numbers

80K bank account numbers

• “Suspected” Hackero Former Amazon employee

o Openly discussed potential hack plans online with other hackers

prior to attack

• “Tip of the Iceberg”o Vodafone, Ford, MSU, Ohio DOT and other organizations also

hacked

MERS of Michigan | 12

Page 13: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Organization Size Does NOT Matter…

MERS of Michigan | 13

Very Small

BusinessSmall/Med

Business

Large

Business

Overall

Other

Exploits/loss through mobile

devices

Crytpo-malware/ransomware

Insert threats: Malicious actions

caused by internal staff

DDoS attack

Targeted attack

Hardware theft

Phishing/social engineering

Accidental loss of hardware

Careless/uniformed employees

Viruses/malware/Trojans

Most serious attack vectors

Source: Kaspersky

Page 14: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

No Victim Too Small

Source: www.npr.org

State and local governments

becoming more targeted with

ransomware attacks

• 169 successful attacks since

2013 (already 60 in 2019)

• Most from overseas sources

• About 17% pay the ransoms

MERS of Michigan | 14

Texas Towns Attack

• 1 threat actor/group

• Simultaneous attacks (new)

• Hacked IT support vendor

Page 15: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

To Pay or Not to Pay?Who paid ransom?• Lake City (FL) paid $460K

o Avoided recovery costs with

cyber insurance

Who refused to pay ransom?• Baltimore did not pay $76K

o Recovery cost over $5.3M at

the time of this article

• Atlanta refused to pay a $51K

o Hackers posted attack online

o Cost of recovery ~$17M at the

time of this article

MERS of Michigan | 15

Source: www.nytimes.com

Ransomware attacks doubled

over the past year…cyber

insurance and/or ransom

payments may be emboldening

the hackers.

Page 16: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Social Engineering

Use deception to manipulate individuals into divulging

confidential or personal information that may be used for

fraudulent purposes

MERS of Michigan | 16

Page 17: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Security Awareness Training

MERS of Michigan | 17

Page 18: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Phishing

Send broad emails that look like they are from reputable

sources in attempt to get individuals to reveal sensitive

personal information

• Common Types:– Spear Phishing – Target a group or individual

– Whaling – Target an executive group or individual

– SMShing – Use text message to manipulate

– Vishing – Use voice to manipulate

MERS of Michigan | 18

Page 19: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Vishing For Data

MERS of Michigan | 19

Page 20: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Phishing Scam Example

MERS of Michigan | 20

13

7

13

7

10

3

10

3

0

2

4

6

8

10

12

14

Industry MERS

Click Rate (Percentage)

Page 21: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Security Threat Meter

MERS target

security posture

Imminent

Threats

Advanced

Persistent

Threats

MERS of Michigan | 21

Advanced Persistent Threats (APTs)

typically go undetected for 9 months

Page 22: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Anatomy of an APT Attack

Remote

Desktop

Protocol

(RDP)

Log

monitoring

Active

Directory

Backup

Management

Low/General

Use Server

Tri

gg

er

messag

e

Pig

gyback m

essage

Corporate

Database

Antivirus/

Security

Monitoring

1 2

34

5

6

7

89

10

11

CEO

Email

MERS of Michigan | 22

Page 23: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

MERS Cybersecurity

Page 24: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

“A Day in the Life” of MERS CybersecurityNew Threats Every Day

• About 95% of incoming email is

spam or malicious

• 30K+ port scans per day from

China alone– (>100K per day overall)

MERS of Michigan | 24

Every change is a potential

new vulnerability

• Constantly patching and

upgrading application and

infrastructure systems against

latest threats

Page 25: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Real-Life MERS Cyber Security Incidents

MERS of Michigan | 25

Incident vs Breach

• Spoofed emails

• Googe.com false alarm

• Training company

purchase card incident

• Whaling Emails

• FBI Fraud Alert false

alarm

Page 26: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

…so we don’t

become the Denial

of Service we are

trying to prevent

Constant battle

to balance

Operations vs

Security…

MERS Cybercrime Defenses

Less Familiar Defenses• Intrusion Prevention Software (IPS)

• Data Loss Prevention Software (DLP)

• 2FA Access Control for Admin Levels

• Non-Persistent Virtual Desktops

• Media Access Control (MAC) Filtering

MERS of Michigan | 26

Familiar Defenses• Anti-Virus software (AV)

• Vulnerability scanning software

• Password Management Software

• Mobile Device Management Software

• Security Awareness Training

Page 27: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Cyber Incident Response

MERS of Michigan | 27

Page 28: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Cybersecurity Information Sharing

MERS of Michigan | 28

Michigan Cyber

Civilian Corps

• Public/private sector collaborations

• Confidential security information sharing

• Formed to combat “Black Hat” information sharing

• Dozens of emails/warnings per day (~7000/year)

• Requires FBI background check

• May require $$ or in-kind contribution in exchange for

training

Page 29: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Future Threat Landscape

Artificial Intelligence (AI)

MERS of Michigan | 29

Internet of Things (IoT)

Cloud Migrations / Solutions Bot Technology

Page 30: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

AI – Scary Possibilities…

MERS of Michigan | 30

Page 31: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

&MERS of Michigan | 31

Page 32: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Please Complete a Session Survey!

Step 3:Scroll down and click “Breakout Session Survey” to complete

the survey

Step 2:Select the session you just attended (look for correct date and time)

Step 1:Locate and access the

“Schedule” Icon

Page 33: Cybersecurity Threat Landscape & MERS Countermeasures...Threat detection / prevention Greatest risks/threats are from staff ... from 2005 –2019 140K Social Security numbers 80K bank

Contacting MERS of Michigan

MUNICIPAL EMPLOYEES’

RETIREMENT SYSTEM

1134 Municipal Way

Lansing, MI 48917

800.767.MERS (6377)

www.mersofmich.com

This presentation contains a summary description of MERS benefits, policies or procedures. MERS

has made every effort to ensure that the information provided is accurate and up to date. Where the

publication conflicts with the relevant Plan Document, the Plan Document controls.

MERS of Michigan | 33