FBI Cisco Milford Presentationv 2

download FBI Cisco Milford Presentationv 2

of 73

Transcript of FBI Cisco Milford Presentationv 2

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    1/73

    DATA SECURITY CHALLENGES IN THE

    ALL TOO PUBLIC AND NOT SO PRIVATE

    SECTORS

    Patrick GrayPrincipal Security Strategist

    http://www.umb.edu/http://images.google.com/imgres?imgurl=http://diversity.haas.berkeley.edu/2009/images/logo_cisco.jpg&imgrefurl=http://diversity.haas.berkeley.edu/2009/sponsor2.html&usg=__1-gdXXSNhC9JGGcS4vRJUFUzKOI=&h=400&w=600&sz=17&hl=en&start=5&um=1&itbs=1&tbnid=o0Xnk9mJitUWiM:&tbnh=90&tbnw=135&prev=/images?q=cisco&um=1&hl=en&newwindow=1&safe=off&sa=N&rlz=1T4GGLL_enUS327US328&tbs=isch:1
  • 8/4/2019 FBI Cisco Milford Presentationv 2

    2/73

    I want you to take home four points

    Understand

    Educate

    Collaborate Prepare

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    3/73

    Its a great to be in Milford today, but uh, do you

    know where your data is right now?

    Its all about data, your data

    The confidentiality

    The integrity The availability

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    4/73

    Its hard to protect that which we have no

    idea as to its whereabouts So, where is your data today?

    On any device

    Any place Any time

    When arent we working anymore?

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    5/73

    When do we call it a day?

    We dont, do we?

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    6/73

    Today, its about mobility

    In the past few years we

    shifted our lives to the PC

    and the Internet

    Now, its all about beingmobile

    A PC in your pocket

    Our mobile work force is

    growing and expanding

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    7/73

    Where?

    Where does work happen?

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    8/73

    It happens wherever we are!

    No longer does business take place solely behind

    network walls

    The critical work is happening increasingly onsocial networks, on handheld devices, in the field,

    and at local cafes

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    9/73

    Diminishing Border

    The traditional corporate perimeter,

    with clearly identifiable boundaries,

    has diminished

    In its place, a network with limitless

    potential is rising

    One where agencies, companies,

    their customers, and their partnersdemand access to information

    whenever and wherever they need it

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    10/73

    New Considerations

    It is information technologys role to ensure that

    the appropriate people, using the correct

    devices, are accessing the proper resources while

    having a highly secure yet positive user

    experience within your networks

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    11/73

    A blurring of activities

    In addition, it is common for workers to blend

    business and personal communications on these

    social networks, further blurring the network

    perimeter

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    12/73

    The future aint what it used to be.

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    13/73

    Some bone-jarring statistics

    50% of Facebook active users log on to Facebook

    on any given day

    More than 60 million users update their status -daily

    People spend over 500 billion minutes per month

    on Facebook

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    14/73

    Billions

    More than 3 billion photos

    uploaded to the site each

    month

    More than 5 billion pieces

    of content (web links, news

    stories, blog posts, notes,

    photo albums, etc.) sharedeach week

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    15/73

    The involvement is viral

    Millions of local businesses have active Pages on

    Facebook

    More than 20 million people become fans ofPages each day

    Pages have created more than 5.9 billion fans

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    16/73

    Mobility

    There are more than 200 million active users

    currently accessing Facebook through their

    mobile devices

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    17/73

    I just have to check

    Just last month, 57 million Americans visited

    social networking sites from a work computer

    Checking your Facebook account has becomethe default Water Cooler

    It's the most commonly visited website at the

    workplace, twice as popular as Google and

    three times as popular as Yahoo

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    18/73

    Cisco on Facebook

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    19/73

    Cisco on Twitter

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    20/73

    Cisco on be

    http://www.google.com/imgres?imgurl=http://www.wrestlingroundtable.com/images/youtube.jpg&imgrefurl=http://www.wrestlingroundtable.com/&usg=__6z8IalRlty6hsXPnVjf3l0YyNF4=&h=302&w=591&sz=51&hl=en&start=24&um=1&itbs=1&tbnid=OmHiEjO-MN_aEM:&tbnh=69&tbnw=135&prev=/images?q=youtube&start=18&um=1&hl=en&newwindow=1&safe=off&sa=N&rlz=1T4GGLL_enUS327US328&ndsp=18&tbs=isch:1http://www.google.com/imgres?imgurl=http://www.wrestlingroundtable.com/images/youtube.jpg&imgrefurl=http://www.wrestlingroundtable.com/&usg=__6z8IalRlty6hsXPnVjf3l0YyNF4=&h=302&w=591&sz=51&hl=en&start=24&um=1&itbs=1&tbnid=OmHiEjO-MN_aEM:&tbnh=69&tbnw=135&prev=/images?q=youtube&start=18&um=1&hl=en&newwindow=1&safe=off&sa=N&rlz=1T4GGLL_enUS327US328&ndsp=18&tbs=isch:1
  • 8/4/2019 FBI Cisco Milford Presentationv 2

    21/73

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    22/73

    Connecticut Computer Services, Inc.

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    23/73

    Owl Computing

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    24/73

    Proton Energy Systems

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    25/73

    CT Post 14

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    26/73

    This is viral

    Overall, 43 percent of Americans said they keep

    in touch via social networking websites such as

    Facebook and LinkedIn

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    27/73

    Connecticut Facebook users

    There are almost two million Facebook users in

    The Nutmeg State

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    28/73

    There is a human element to all ofthis, an element that is more often

    than not, overlooked

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    29/73

    Its no longer just close relationships

    Our employees are going places theyve never

    gone before and are touching technology

    daily

    That which they are touching is touching our

    networks as well

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    30/73

    5 Reasons Cisco embraces Social Media

    Attracting and retaining the

    best employees

    Innovation and knowledgecreation

    Operational efficiency

    Talent development

    Employee engagement

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    31/73

    That being said

    There are things we really need to be aware of

    The bad guys know what were doing, where

    were going and want to make the trip a wee bitmore difficult

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    32/73

    With Web 2.0

    A new breed of malware is evolving

    Google Mashups, RSS feeds, search, all of these

    can be misused by hackers to distribute malware,

    attack Web surfers and communicate with botnets

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    33/73

    Risk it's everywhere

    And no one knows that better than IT security

    professionals

    Disgruntled employees, students, fired employees,

    clueless employees who succumb to socialengineering, passwords left on Post-it notes, wide-

    open instant messaging and increasingly powerful

    hacker tools in the hands of teenagers, Web Mobs

    and Organized Crime targeting Social Media sites

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    34/73

    Objective?

    The key objective, of course, is to recognize risk,

    safeguard your reputation and not reveal sensitive

    or confidential information that may prove quite

    harmful

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    35/73

    Malware

    Historically, malware has plagued e-mail, hidden inmalicious attachments

    While that's still happening, more malware writersare putting their efforts into malicious Web sites

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    36/73

    Constant Mutation

    The goal in developing malware is not to simply

    infect as many systems as possible but to

    specifically steal usage information and other

    data from compromised systems Use of polymorphic code that constantly mutates

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    37/73

    Bad Statistic

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    38/73

    Two biggest vectors for Malware

    Email

    Web-based

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    39/73

    The Human Firewall an invaluable tool

    A good human firewall employee is one who filters

    good security practices and rejects any others

    much like a network firewall only allows

    authorized traffic and rejects any other

    The only way to build a good human firewall is to

    raise peoples awareness; to teach them good

    habits, to make them recognize bad practices and

    change them into good practices

    Your cyber security is only as good as the people

    who manage it and those who use it

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    40/73

    So Patrick, why do we really need that Human

    Firewall?

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    41/73

    Because, Friend has become a verb

    Social media users believe there is protection inbeing part of a community of people they know

    Criminals are happy to prove this notion wrong

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    42/73

    Causation

    The threats and security issues that come with

    social media arent usually caused by

    vulnerabilities in software

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    43/73

    The herd mentality

    More commonly, these threats originate from

    individuals who place an unwarranted amount of

    transitive trust in the safety of these

    communities

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    44/73

    Remember

    On social sites

    Your privacy is history

    They don't have your best interests in mind Social engineering attacks are getting more

    targeted

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    45/73

    Trust?

    Users will trust something or someone because a

    user they know has also expressed trust in that

    person or subject

    We trust because we are curious and curiosity

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    46/73

    Curious? This is why! Out of date???

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    47/73

    They want to send us somewhere else

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    48/73

    The unknown DO NOT TOUCH THIS!!!

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    49/73

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    50/73

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    51/73

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    52/73

    Dont go there!

    Stay on the path that you know well!

    Okay to trust but please verify So, have fun! But monitor

    Be a bit more vigilant

    And manage appropriately

    This is what our users are up against

    Malware popping up out of nowhere !

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    53/73

    But what does all this mean?

    I am just a user and am not an engineer or a

    technician or a programmer or a geek!

    Im just sitting at my desk, talking to friends

    and all sorts of people

    How in the world am I threatening our

    network???

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    54/73

    2 Reasons

    You probably do not understand policies,

    procedures, best practices and standards

    If you do understand them, they are violated

    because there are no consequences the policies

    are not enforced

    Who, me?

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    55/73

    Education is Critical

    Few executives grasp the case for investing insafeguards against hackers, malware, and the like

    Education starts at the top and works its way down

    the food chain throughout the entire business Before any employee puts their fingers on the

    keyboard they must understand that it is not theircomputer

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    56/73

    The Seven Deadly Sins of Network Security

    1. Not measuring risk2. Thinking compliance equals security

    3. Overlooking the people

    4. Lax patching procedures5. Lax logging, monitoring

    6. Spurning the K.I.S.S.

    7. Too much access for too many

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    57/73

    Did I mention the Insider?

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    58/73

    The Opposing Team

    The Hackers

    Disgruntled Insiders

    Clueless employees

    Competitors

    Foreign Governments

    Terror organizations

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    59/73

    Biggest Players in the Global Black Market

    Russia

    China

    Brazil

    Israel

    U.S.

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    60/73

    North Korea in the fray

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    61/73

    Krews

    HangUp Team

    CNHonker

    Russian Business Network

    Rock Phish

    76Service

    MAAS

    Hoff is Thirsty

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    62/73

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    63/73

    Great Effort

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    64/73

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    65/73

    System Penetration

    It is an unfortunate reality that you will suffer abreach of security at some point

    To bypass security, an attacker only has to find

    one vulnerable system within the entirenetwork

    But to guarantee security, you have to makesure that 100 percent of your systems areinvulnerable -- 100 percent of the time

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    66/73

    Data Leakage:

    How many breaches in 2010?

    760 Breaches

    222,477,043

    records exposed

    How were you

    impacted?

    278 Breaches in2011

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    67/73

    Its inevitable, so be prepared

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    68/73

    Not good

    But Patrick! It wont happen to us!

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    69/73

    Whether you get hacked depends

    Do you assume the posture of, It cant happen here.

    Do you hear, We havent heard of any worm outbreaks

    and all seems quiet. Why upgrade those devices?

    We have no budget.

    Were just hanging out in Connecticut!

    Theyre only going after the Government and those

    really big banks.

    Then my question is, Can you really afford to give up

    data today?

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    70/73

    You cant afford to give up data,

    so be prepared and alert

    Every man has a plan until he gets hit!

    Have a robust Computer Security Incident

    Response Plan

    1. Test it

    2. Update it both in terms of technology and

    personnel

    3. Include Legal and HR in those plans

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    71/73

    So, what are they really after?

    Your data

    Your assets

    Your employees data

    Your personal data

    Your paycheck

    Your friends

    Your family

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    72/73

    You are the last line of Defense! Step up!

    Understand

    Educate

    Collaborate

    Prepare

  • 8/4/2019 FBI Cisco Milford Presentationv 2

    73/73

    Thank You!