Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against...

42
Security Today Comprehensive Security Approach with Kaseya Jason Dettbarn Senior Technology Analyst

description

System and data hacking has become a multi-billion dollar organized business across the globe. In this session recent high-profile attacks will be discussed and Senior Product Specialist, Jason Dettbarn will also project the direction of security vulnerabilities. Kaseya best-practices will be highlighted allowing you to guard against these attacks.

Transcript of Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against...

Page 1: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Security TodayComprehensive Security Approach with Kaseya

Jason DettbarnSenior Technology Analyst

Page 2: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Security Today - News - Agenda

Historical Security Breaches Los Alamos StuxNetSecurity Breaches Lockheed Martin NYTimes Apple Facebook

Page 3: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Security Today – Tech - Agenda

Core Kaseya management & monitoring Agent Check-in Threshold USB Blocking Failed Login Attempts / Locked Accounts App BlockingPatching Windows Patching 3rd Party Software PatchingAnti-Virus Profile Best Practices Managing Intrusive Scanning

Page 4: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

4

Richard Feynman – Los Alamos

Page 5: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

5

Richard Feynman – Safe Cracking

Page 6: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

6

Richard Feynman – Safe Cracking

Page 7: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

7

Richard Feynman – Safe Cracking

Play in the lock – 18, 19, 20, 21, 22

Page 8: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

8

Richard Feynman – Safe Cracking

(1) Total Combinations Now

Page 9: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

9

Richard Feynman – Safe Cracking

(2) A Typical Combination

Max Time = 12 min & Average = 6 min

Page 10: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

10

Richard Feynman – Safe Cracking

(3) Pre Worked Combination

Average = 1 - 2 min

Page 11: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

11

Richard Feynman – Safe Cracking

Page 12: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

12

The Inflection point – 06-08

• 2006 – 200k unique threat identified• 2007 – 15 Million unique threat

• Signature DB explodes• Cybercrime becomes a Business

Page 13: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

13

DisclosuresMaintain…

Page 14: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

14

Botnets

• Zombie War• Botherder• Conficker (Kido) was 6 million• TDL-4 botnet of 4 - 4.5 million• Accelerated Discovery of Multi year

threats

Page 15: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

15

Malware Dragnet Snags Millions of Infected PCs

• Botnet – 35 Million Strong?

Page 16: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

16

Kaseya Security Stack

Endpoint Monitoring

& HardeningAntivirus

Kaseya Antivirus

Kaseya Endpoint Security

AntiMalware

Kaseya AntiMalware

Remediation

Agent Procedures

Monitoring

Service Desk & PSA

Scheduling & Management

Monitoring

PasswordsUSB

Block Processes

Page 17: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

17

Manufacturing…

Page 18: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

18

Service…

Page 19: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

19

Healthcare…

Page 20: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

20

Financial…

Page 21: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

21

Average…

Page 22: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

22

Staggering Economics

• Cybercriminals earning > $100 Billion/Yr• Sophistication + Organization Increase

– Organized Crime– Infrastructure– Affiliate Programs– Botnets + Malware kits

• Who would do that?– Opportunist – Governments– Terror Organization– Hacktivists

Page 23: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

23

Online Bank Robberies

• Clampi Trojan– Targeting English speaking countries– Goal: steal log-in and PW– DB of of 4500 different financial sites

• Wake, capture, sleep, transfer, classify

– Years of observation– Learn user activities– Transfer money in lots of under 10K– Recruited money mules– Banks are not responsible for SMB $ Lost

Page 24: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

24

Distributed Computing

Folding@Home (Stanford Program)SETI @Home

Page 25: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

25

True power

Page 26: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

26

Botnet Virus

Millions of dormant blackhat botnets available for purchase

Page 27: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

27

Stuxnet Virus

Break Into Hardened Nuclear Facilities?

Page 28: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

28

How Did They Do It

USB Drives Dropped in Parking Lot

(leveraging autorun on the USB)

Page 29: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

29

How infections occur

• “But, if its not broken?…”• Un-Patched Software• Spammed Infections• Legit website that’s been infected• Phishing• Trojans• Bots, botnets, botherders

– Botherder Command and Control• TDL-4 4.5 million

• Mac via Flashfake (700K)

• Android botnet discovered 7/2012

• USB, MSD• File transfers and Replication systems

– Dropbox, LogMeIn

Page 30: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Security ‘Today’

What Changed? Moving to the Cloud, data is not within network walls Distributed workforce More web enabled client applications More public individual information on Social NetPatching Windows Patching 3rd Party Software PatchingAnti-Virus Profile Best Practices Managing Intrusive Scanning

Page 31: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Security ‘Today’

Spear Phishing- Leveraging Social Media to target Phishing Emails

Page 32: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Security & Vulnerability AgendaKaseya Specific

Core Kaseya management & monitoring Agent Check-in Threshold USB Blocking Failed Login Attempts / Locked Accounts App BlockingPatching Windows Patching 3rd Party Software PatchingAnti-Virus Profile Best Practices Managing Intrusive Scanning

Page 33: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

33

Security solutions on endpoints

Antivirus Antimalware URL Blocking Local Firewall

Device blocking

Application blocking

Logfile Monitoring

Regular System Audits

OS Patching Application Patching

Remote System Tracking

System Wiping

Page 34: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Agent Check-in ThresholdMonitoring -> Alerts -> Agent Check-inSet Max ‘off-the-reservation’ alert

Page 35: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Core Kaseya CapabilitiesUSB Blocking- Activate Agent Procedure for USB

Blocking

Page 36: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Failed Login / Locked AccountsEvent Log Monitoring- Set Event Sets (Failure Audit)

Page 37: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

App BlockingApplication Blocking- Agent -> Application Blocker

Page 38: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

PatchingWindows Patching- Auto Approve, Initial Update, Patch

Reports

Page 39: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

PatchingKaseya Software Deployment & Update- Auto Deploy & Approve/Update

Page 40: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Kaseya AntiVirusInstall, Profile Management, Scan

Scheduling- Active Dexter Malware- Leading Industry A/V- Kaspersky v6.0.4.1424

Page 41: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

41

Kaseya Security Stack

Endpoint Monitoring

& HardeningAntivirus

Kaseya Antivirus

Kaseya Endpoint Security

AntiMalware

Kaseya AntiMalware

Remediation

Agent Procedures

Monitoring

Service Desk & PSA

Scheduling & Management

Monitoring

PasswordsUSB

Block Processes

Page 42: Kaseya Connect 2013: Security Today – Comprehensive Implementation of Kaseya to Defend Against Threats

Questions?

Jason DettbarnSenior Security [email protected]