DSS @ Digital ERA 2014 - Security in the digital world

72
Data protection in digital era Andris Soroka 7 th of April, 2014 Riga, Latvia

description

2012, 2013, 2014, IT security, ITSEC, infosec, Latvia, Lithuania, Estonia, Compliance, data, protection, network, governance, identity, cloud, virtualization, antivirus, firewall, device control, application control, SIEM, security event and information management, log, risk, encryption, IPS, IDS, DdoS, DOS, IBM, Forescout, Lumension, McAfee, Symantec, Sophos, Q1 Labs, Radware, WAF, vulnerability, hacker, Avecto, Balabit, Checkpoint, Varonis, Guardium, Appscan, DLP, data leak protection, Mobile, MDM, MAM, MobileIron, Centrify, Cyberoam, HP, PCI DSS, Cobit, ITIL, SOX, BASEL, anomaly detection, prevention, cert, enisa, observeIT, microsoft, oracle, samsung, accelliion, ipoque, DPA, ExtremeNetworks, Cadence, Opticom, Datakom, VARAM, The Baltic States, Baltics, IBM, Security intelligence, Qradar, Guardium, MioSoft, BeyondTrust, Retina, Critical infrastructure, ISACA

Transcript of DSS @ Digital ERA 2014 - Security in the digital world

Page 1: DSS @ Digital ERA 2014 - Security in the digital world

Data protection in digital era

Andris Soroka7th of April, 2014

Riga, Latvia

Page 2: DSS @ Digital ERA 2014 - Security in the digital world

The Saga Begins – Scared vs. Informed

Page 3: DSS @ Digital ERA 2014 - Security in the digital world

About speaker

Page 4: DSS @ Digital ERA 2014 - Security in the digital world

“Data Security Solutions” business card

Specialization – IT Security

IT Security services (consulting, audit, pen-testing, market analysis, system testing and integration, training and technical support)

Solutions and experience portfolio with more than 20 different technologies – cyber-security global market leaders from more than 10 countries

Trusted services provider for banks, insurance companies, government and private companies (critical infrastructure etc.)

Page 5: DSS @ Digital ERA 2014 - Security in the digital world

Role of DSS in Cyber-security Development in Baltics

Cyber-Security Awareness Raising

Technology and knowledge transfer

Most Innovative Portfolio

Trusted Advisor to its Customers

Page 6: DSS @ Digital ERA 2014 - Security in the digital world

Cybersecurity Awareness Raising

Own organized conference “DSS ITSEC”5th annual event this yearMore than 400 visitors + more than 250 online live streaming watchers from LV, EE, LT4 parallel sessions with more than 40 international speakers, including Microsoft, Oracle, Symantec, IBM, Samsung and many more – everything free of charge

Participation in other events & sponsorshipCERT & ISACA conferences & eventsRIGA COMM, HeadLight, IBM Pulse Las vegasRoadshows and events in Latvia / Lithuania / Estonia (f.i. Vilnius Innovation Forum, Devcon, ITSEC HeadLight, SFK, business associations)

Participation in cyber security discussions, strategy preparations, seminaries, publications etc.

Page 7: DSS @ Digital ERA 2014 - Security in the digital world

Innovations – technology & knowledge transfer

Innovative Technology Transfer Number of unique projects done with different technology global leadership vendorsKnowledge transfer (own employees, customers – both from private & public, other IT companies in LV, EE, LT) Specialization areas include:

Endpoint SecurityNetwork SecuritySecurity ManagementApplication SecurityMobile SecurityData SecurityCyber-securitySecurity Intelligence

Page 8: DSS @ Digital ERA 2014 - Security in the digital world

Some just basic ideas

Page 9: DSS @ Digital ERA 2014 - Security in the digital world
Page 10: DSS @ Digital ERA 2014 - Security in the digital world
Page 11: DSS @ Digital ERA 2014 - Security in the digital world

AGENDA – IT Security basics in ~ 40 mins

Introduction of DSS and speakerPrologue: Digital World 2014The Saga begins – Cyber Criminals

Introduction & business cardBusiness behindExamples

The Story Continues – Targets of Cyber Criminals

IndividualsBusiness OwnersGovernment

Value of Information Security for businessRisk managementTechnology

ConclusionQ&A (if time allows)

Page 12: DSS @ Digital ERA 2014 - Security in the digital world

Prologue: The Digital World 2014 & future

Page 13: DSS @ Digital ERA 2014 - Security in the digital world

Prologue: Some new technologies

3D PrintersGoogle Glasses (“glassh**es)Cloud ComputingBig Data & SupercomputersMobile Payment & Virtual MoneyRobotics and Intraday DeliveriesInternet of thingsAugmented RealityExtreme development of ApsDigital prototypingGadgets (devices) & MobilityTechnology replaced jobs (automation)

Geo-location powerBiometricsHealth bands and mHealthElectronic carsAvegant Glymph and much, much more

Page 14: DSS @ Digital ERA 2014 - Security in the digital world
Page 15: DSS @ Digital ERA 2014 - Security in the digital world
Page 16: DSS @ Digital ERA 2014 - Security in the digital world
Page 17: DSS @ Digital ERA 2014 - Security in the digital world

Prologue: Mobility & Gadgets

Multi-OS

Page 18: DSS @ Digital ERA 2014 - Security in the digital world

Millions of mobile applications

Page 19: DSS @ Digital ERA 2014 - Security in the digital world

Digital Agenda for European Union

Page 20: DSS @ Digital ERA 2014 - Security in the digital world

Personal data concerns of EU digital agenda

Page 21: DSS @ Digital ERA 2014 - Security in the digital world

The Sage Continues: Cybercriminals

Page 22: DSS @ Digital ERA 2014 - Security in the digital world

Weakest link is always the most important

Source: IBM X-Force annual report 2013

Page 23: DSS @ Digital ERA 2014 - Security in the digital world

True or fake? In fact this isn’t funny...

Page 24: DSS @ Digital ERA 2014 - Security in the digital world

Best «success story» describing hackers..

Page 25: DSS @ Digital ERA 2014 - Security in the digital world

No changes in that perspective

Page 26: DSS @ Digital ERA 2014 - Security in the digital world

Privacy is gone?

Page 27: DSS @ Digital ERA 2014 - Security in the digital world

Disaster in software world - NSA

Page 28: DSS @ Digital ERA 2014 - Security in the digital world

Disaster in technology world - NSA

Governments write malware and exploits (USA started, others follow..)

Cyber espionageSabotageCyber warsInfecting own citizensSurveillance

Known NSA “partners”Microsoft (incl. Skype)AppleAdobeFacebookGoogleMany, many others

Internet is changing!!!USA thinks that internet is their creation and foreign users should think of USA as their masters…

Page 29: DSS @ Digital ERA 2014 - Security in the digital world

Disaster in software world - NSA

Page 30: DSS @ Digital ERA 2014 - Security in the digital world

Privacy is gone?

Page 31: DSS @ Digital ERA 2014 - Security in the digital world

War on privacy is still on! At least in EU!

ICO fines Midlothian Council £140K for data breachesMonday 30 January 2012 09:58

Page 32: DSS @ Digital ERA 2014 - Security in the digital world

Advertisement break

Page 33: DSS @ Digital ERA 2014 - Security in the digital world

Bright future of the internet way ahead..

1995 – 20051st Decade of the

Commercial Internet

2005 – 20152nd Decade of the

Commercial InternetMotive

Script-kiddies or hackers

Insiders

Organized crime

Competitors, hacktivists

National Security Infrastructure Attack

EspionagePolitical Activism

Monetary Gain

Revenge

Curiosity

Page 34: DSS @ Digital ERA 2014 - Security in the digital world

Many countries are in the game now…

Page 35: DSS @ Digital ERA 2014 - Security in the digital world

Many countries are in the game now…

Page 36: DSS @ Digital ERA 2014 - Security in the digital world

Many countries are in the game now…

Page 37: DSS @ Digital ERA 2014 - Security in the digital world

Global statistics

Page 38: DSS @ Digital ERA 2014 - Security in the digital world

Examples: Hackers searching tool

Page 39: DSS @ Digital ERA 2014 - Security in the digital world

Mobility & Security...

Page 40: DSS @ Digital ERA 2014 - Security in the digital world

Mobility and Security (cont.)

McAfee 2013 Q1 Threats Report

Federal Reserve Survey March 2013

Mobile Malware Explodes

Mobile banking adoption rising

End users fall victimto mobile attacks

Page 41: DSS @ Digital ERA 2014 - Security in the digital world

Some examples of incidents (DDoS)

Page 42: DSS @ Digital ERA 2014 - Security in the digital world

Cyberwars going on!

Page 43: DSS @ Digital ERA 2014 - Security in the digital world

Examples: Hackers searching tool

Page 44: DSS @ Digital ERA 2014 - Security in the digital world

Examples: Hackers searching tool

Page 45: DSS @ Digital ERA 2014 - Security in the digital world

Examples (continued)

Page 46: DSS @ Digital ERA 2014 - Security in the digital world

Examples: Whistleblowers should be careful

Source: Juris Pūce, Analytica IT Security

Page 47: DSS @ Digital ERA 2014 - Security in the digital world

Examples (continued)

Page 48: DSS @ Digital ERA 2014 - Security in the digital world

Examples: Hacker is watching / listening

Page 49: DSS @ Digital ERA 2014 - Security in the digital world

Google maps helped hacked incercept calls..

Page 50: DSS @ Digital ERA 2014 - Security in the digital world

The Sage: Simplicity

Page 51: DSS @ Digital ERA 2014 - Security in the digital world

Some examples of incidents

Page 52: DSS @ Digital ERA 2014 - Security in the digital world

Hacking business services...

Current prices on the Russian underground market:Hacking corporate mailbox: $500Winlocker ransomware: $10-$20Unintelligent exploit bundle: $25Intelligent exploit bundle: $10-$3,000Basic crypter (for inserting rogue code into benign file): $10-$30SOCKS bot (to get around firewalls): $100Hiring a DDoS attack: $30-$70 / day, $1,200 / monthBotnet: $200 for 2,000 botsDDoS Botnet: $700ZeuS source code: $200-$250Windows rootkit (for installing malicious drivers): $292Hacking Facebook or Twitter account: $130Hacking Gmail account: $162Email spam: $10 per one million emailsEmail scam (using customer database): $50-$500 per one million emails

Page 53: DSS @ Digital ERA 2014 - Security in the digital world

Examples: Advanced Persistent Threat

Page 54: DSS @ Digital ERA 2014 - Security in the digital world

Lets summarize The Saga told

Page 55: DSS @ Digital ERA 2014 - Security in the digital world

The value of a hacked computer…

Source: Brian Crebs IT security blog

Page 56: DSS @ Digital ERA 2014 - Security in the digital world

Why hackers might want to “contact” You?

BusinessCommercial espionage (financial, business and personal data)An attack can stop the business, services (competition)You are spam targetYour home page could be damagedThey can control and monitor youThey can change data in systemsHome page cross-scripting

Private personYou have the infrastructure for tests of new viruses and robotsYou have server where to store illegal stuff (programs, files etc.)They can do criminal (or any) activities using your computerWiFi – they can just borrow the internetYou have the information which could be sold in black market

“The results” of damageFinancial loss (costs, data, market, value)Reputation (customer, partner, HR)Development and competitiveness loss

Page 57: DSS @ Digital ERA 2014 - Security in the digital world

Conclusion: The Saga will continue anyway

Page 58: DSS @ Digital ERA 2014 - Security in the digital world

Conclusion: The Saga will continue anyway

For many companies security is like salt, people just sprinkle it on top.

Page 59: DSS @ Digital ERA 2014 - Security in the digital world

Smart ones act smart way – risk mgmt.

Page 60: DSS @ Digital ERA 2014 - Security in the digital world

Think security first & Where are You here?

Organizations Need an Intelligent View of Their Security Posture

Security

Intelligence

Proficient

Proactive

Auto

mat

edM

anu

al

Reactive

Proficient

Basic

Optimized Optimized

Organizations use predictive and automated security analytics to drive toward security intelligence

ProficientSecurity is layered into the IT fabric and business operations

BasicOrganizations

employ perimeter protection, which

regulates access and feeds manual reporting

Page 61: DSS @ Digital ERA 2014 - Security in the digital world

New game, new rules..

Productivity

Security

Page 62: DSS @ Digital ERA 2014 - Security in the digital world

Challenge for business ahead..

DROŠĪBAS PASĀKUMI

Costs Security costs

Optimum? Remaining part of risk

Security actions

RisksNew optimum?

Source: Māris Gabaliņš, The Art Of The Systems

Page 63: DSS @ Digital ERA 2014 - Security in the digital world

Take-Away as conclusion

Security Maturity

Develop a Risk-aware Security Strategy

49% of C level executives have no measure of the effectiveness of their security efforts

31% of IT professionals have no risk strategy

2012 Forrester Research Study, 2013 Global Reputational Risk & IT Study, IBM

Page 64: DSS @ Digital ERA 2014 - Security in the digital world

Costs for business from cybercrime

Page 65: DSS @ Digital ERA 2014 - Security in the digital world

Return of Investment

Page 66: DSS @ Digital ERA 2014 - Security in the digital world

“DSS” is here for You! Just ask for…

Si vis pacem, para bellum. (Lat.)

Page 67: DSS @ Digital ERA 2014 - Security in the digital world

Remedy against the poison

Page 68: DSS @ Digital ERA 2014 - Security in the digital world

Some just basic ideas

Policy and real time controlOf devices and applicationsOf people and IT stuffOf data leak protectionOf internet usageOf any accessOf employees trainingOf….

Encryption of data..Mobile phonesVoice calls and text messageseMailsComputers and devicesData bases…

Page 69: DSS @ Digital ERA 2014 - Security in the digital world

Some just basic ideas

Multifaceted strategy is requiredLayers of controls (tech and non-tech)

Awareness / PreventionEducate workforce (social engineering+)

SegmentationWhat if intrusion happen? (modeling)

Critical assets definition & action planRoles, responsibilities, access rulesRisk analysisBusiness continuity

Continuous real time monitoring, identification and disruption

All data, all users, all systemsAnomaly detection and analysisIntelligence

Page 70: DSS @ Digital ERA 2014 - Security in the digital world

Prologue of prologue…

Page 71: DSS @ Digital ERA 2014 - Security in the digital world

Think security first

[email protected] +371 29162784

Page 72: DSS @ Digital ERA 2014 - Security in the digital world

Think security first