Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

44
Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Transcript of Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Page 1: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Know More About Threats, Risks and Regulations

Ken PappasCEO

True North Security

Prepared for:

Page 2: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Professional Career

Personal

Ken Pappas BIO

• Founder and CEO of True North Security• VP Marketing and Security Strategist at Top Layer Security • Security Strategist at TippingPoint • Director of Product Management at 3Com

• Acquired TippingPoint “IPS technology”

• General Manager Security Division Enterasys Networks• Acquired Security Wizards “Dragon IDS technology”• Acquired Indus River “Remote VPN technology”

• Security Clearance, Department Of Homeland Security• Computer Forensics• CISM• InfraGard, Boston Chapter sponsored by the FBI and DHS• Appearance in Wall Street Journal, Fortune, etc.• BLOG> http://secsystems.wordpress.com• Twitter> TruNorthSec

Page 3: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Agenda

Today’s Reality

Future Threats & Challenges

About Sourcefire

About True North Security

Page 4: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Today’s Reality

Page 5: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Security Highlights• Over 285 million records stolen in 2008 vs. 230 million between the years

2004 – 2007 with Education being the highest. • WHY?

• Who do you think will be #1 in the next two years?

• 31% more bot-infected computers per day in 2008 vs 2007

• 90% of breaches from organized crime targeting corporate information

• Cyber crime cost companies more than $650 million worldwide

• Majority of breaches caused by insider negligence

• Users blurring their social life, personal life and work life with regards to Internet Usage

www.idtheftcenter.org

Page 6: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Haiti Relief email

IRS Form W2 Spoof contains malware

Mortgage Fraud

Pop up Anti-Virus Advertisement contains virus

H1N1 email alert contains malware

FDIC email stating bank merger or that your bank is a failed bank. Click here? Get a surprise

2010 Census by emailSURPRISE the Census bureau does not use email

Recent Scams

Page 7: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Intruder Knowledge

High

Low

1980 1985 1990 1995 2000+

Attack Sophistication

Attack

Sophistication

Cross site scripting

password guessing

self-replicating code

password cracking

exploiting known vulnerabilities

disabling audits

back doors

hijacking

sessions

sweepers

sniffers

packet spoofing

GUIautomated probes/scans

denial of service

www attacks

“stealth” / advanced scanning techniques

burglaries

network mgmt. diagnostics

distributed

attack tools

Staged

Auto Coordinated

Source: Carnegie Mellon University

Motivation

Page 8: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Recession

Social Media Sites

Younger/Older generation using computers

Availability of Sophisticated tools

Trickery & Foolery

What’s Causing Rise In Cyber Crime

Page 9: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Increase in specialized threatsToolkits used to create virus attacks, making specialization of participants a lucrative shadow economy.

Sophistication of high end threats is evolving rapidly

Targeted threats attack specific companies, persons and systems.

Blended threats becoming more common

Carefully targeted attack may go unnoticed for an undetermined amount of time.

“Zero Hour” Threats Rising

Page 10: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Harnessing The Power of BotnetsSource: Symantec

Page 11: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Industrial Espionage Targeted Attacks

Source: MessageLabs Intelligence

60% of recipients were of a high or medium-level ranking

42%of recipients of targeted

attacks were sent to high ranking individuals

42%of recipients of targeted

attacks were sent to high ranking individuals

18%of recipients were of

medium-level seniority

18%of recipients were of

medium-level seniority

5%of recipients were of a lower-ranking security

5%of recipients were of a lower-ranking security

19%of targeted attacks were

directed at general mailboxes such as

“info@”

19%of targeted attacks were

directed at general mailboxes such as

“info@”

Individually Targeted Attacks

Blocked Per Day (Average)

Source: Symantec

Page 12: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Targeted Trojans

Targeted trojans are specialized pieces of

malware written to extract high value information from

known subjects.

Targeted trojans are specialized pieces of

malware written to extract high value information from

known subjects.Source:

http://www.nypost.com/p/news/business/

hackers_targeting_UquyMBhuVAyl6wAn413lGJ

Page 13: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Targeted Trojans

Source: MessageLabs Intelligence

22005

PER WEEK

12006

PER DAY AVG

102007

PER DAY AVG

502008

PER DAY AVG

602009

PER DAY AVG357

RecentPeaks

PER DAY

Frequency:

Payload:

Source: Symantec

Page 14: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Website Security Trends

Source: MessageLabs Intelligence

New sites with malware in 2009:

2,465/day

New sites with malware in 2009:

2,465/day

Unique domains hosting malware:

30,000

Unique domains hosting malware:

30,000

Source: Symantec

Page 15: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Web 2.0

Page 16: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Multitude of Threat Vectors

Social Media• Facebook, MySpace, Linkedin

Rogue 3rd Party Apps

Tiny URL’s

Translations

RogueWare

Page 17: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

No Industry Is Being Left Behind

• Financial

• Heartland• Retail

• Hannaford's• Education

• Harvard University• Oklahoma State University

• Medical

• Department of Veterans• Cedars-Sinai Medical Center

• Government

• North Korea Attacks American Networks• China hacking into NASA• Israel Attacking Iran

The cyber warfare HAS

begun!

Page 18: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Space Programs

USA RUSSIA

Page 19: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Easy Availability of Exploit Tools

Page 20: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Multitude of Regulations

• PCI (Payment Card Industry)

• GLBA (Gramm-Leach Bliley Act)

• HIPAA (Health Insurance Portability and Accountability Act)

• FISMA (Federal Information Security Management Act)

• HITECH

• MA 201 CMR 17

• NERC

Page 21: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Perimeter Protection Is Not Enough

Communications between machines inside the corporate LAN and between choke-points are not filtered or protected by a perimeter firewall in front of each machine.

Servers in the DMZ, Kiosks, workstations used by temporary employees, and other “hot spots”

• Mobile users are becoming the back door to the house• Telecommuters are becoming more popular, more risks being brought inside

Page 22: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

FTP-21

HTTP-80

Sub 7-6776

Quake-26000

SMTP-25

From: 66.121.11.7

To: 115.13.73.1

Historical Firewall Configuration

Page 23: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

HTTP-80

FTP-21

SMTP-25

BackOrifice-31337

Today’s Firewall Configurations

Page 24: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

The Complacency of Fools Will Destroy Us

Future Threats & Challenges

Page 25: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

IT resources and services that are abstracted from the underlying infrastructure and provided “On-Demand” and “At

Scale” in a multi-tenant environment

CLOUD COMPUTING

Next Inflection Point

Page 26: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Where does your data go when the cloud blows awayWhen data is breached, who will be at fault?

Waiting for first court battle

Looks like, feels like SNA?Make sure you have a solid SLA!

Clouds Blow Away

Page 27: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Next Generation Threats

Next Generation Threats Will Use Stealth Methods vs. Today’s Threats• User Error will be the way of malware• Information Leakage due to negligence and theft• Domestic and International Terrorist stealing company technology and secrets

New Methods Will Evolve to Adapt to User Behavior• Tempt-to-Click Email• Tempt-to-Click IM• False pop-ups

New Computing Environments and Applications will be targets• VoIP• Cloud Computing• SaaS (Software as a Service)• Social Media

Protection Will Require Education And Technology

Page 28: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Protect Dysfunctional Users Against Themselves

How Do We Best Protect Ourselves and Our Data

Page 29: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

What Companies Are Thinking About

Virtualizing

Security

Securing

Virtualization

Page 30: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

SANS Recommends - Deploy IPS

Page 31: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Strategies To Defeat Threats

Anti-Virus Updates

Deploy an IPS Today!• IPS Filters Turned on and Updated

Encrypt Hard Drive Data

Operating System Security Updates

Educate Users

Institute Company Wide Security Policy

Implement Defense In Depth• IPS, Anti-Virus, Encryption, Multiple Passwords, Other

There is no silver bullet

Page 32: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

About Sourcefire

Stop Threats and Start Partying!

Page 33: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

.

.

..

....

.. .

...

..

.

.. .

.

.

.

.

About Sourcefire

Founded in 2001 by Snort Creator, Martin Roesch, CTO

Headquarters: Columbia, MD

Fastest-growing IPS vendor

Global Security Alliance partner network

NASDAQ: FIRE

Open Source Community

+Sourcefire Development

Best of Both Worlds

Mission:

To deliver intelligent security infrastructure for the most efficient, effective risk management.

Page 34: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Powered by Snort

• 270,000 Users• 3.7 Million Downloads• 80% of Fortune 500• 40% of Global 2000• 100+ Snort Integrators• 9,000+ Snort Rules• World’s Largest Threat Response Community

Most Widely Used IPS Engine Worldwide

Page 35: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Problems With a Traditional IPS

Traditional IPS

ClosedArchitecture

ClosedArchitecture

Exploit-Based

Exploit-Based

None orLimitedNone orLimited

ManualOperation

ManualOperation

ArchitectureArchitecture

OperationOperation

IntelligenceIntelligence

AccuracyAccuracy

Page 36: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

A New Approach

Traditional IPS

ClosedArchitecture

ClosedArchitecture

Exploit-Based

Exploit-Based

None orLimitedNone orLimited

ManualOperation

ManualOperation

ArchitectureArchitecture

OperationOperation

IntelligenceIntelligence

AccuracyAccuracy

Open Rules& IPS EngineOpen Rules

& IPS Engine

Vulnerability-

Based

Vulnerability-

Based

Real-time,All-the-timeReal-time,

All-the-time

Highly Automated

Highly Automated

Sourcefire IPS

Page 37: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Backed by Sourcefire Vulnerability Research Team VRT

Comprehensive Protection

Private &PublicThreatFeeds

SnortCommunity

Insight

300 NewThreats

per Month

20,000MalwareSamplesper Day

VRT Research & Analysis

VRT LAB

>150 millionperformance &regression tests

1000s ofsoftwarepackages

100s ofhardwareplatforms

Advanced Microsoft Disclosure

Unrivalled Protection Against Advanced Persistent Threats

Page 38: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Best-in-Class Detection

Based on Snort—de facto IPS standardVulnerability-based, zero-day protectionOpen architectureFlexible custom rulesRanked #1 in detection by NSS Labs*

* “Network Intrusion Prevention Systems Comparative Test Results,” December 2009. Comparison using a tuned policy.

Page 39: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

NSS Labs Group IPS TestBlock Rate Comparison

Source: Graphic used with permission by NSS Labs. “Network Intrusion Prevention Systems Comparative Test Results,” December 2009.

Page 40: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Sourcefire Appliance Product Lines

Sourcefire Defense Center®

Sourcefire 3D®

Sensor

DC1000

DC3000

PERFORMANCE

DC500

3D5005 Mbps

3D100045 Mbps

3D2000 100 Mbps

3D2100 250 Mbps

3D2500 500 Mbps

3D35001 Gbps

3D65004 Gbps

3D45002 Gbps

3D9900 10 Gbps

VMware Virtual AppliancesVirtual Defense Center™Virtual 3D Sensor™

Page 41: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Why Sourcefire?

Powered by SnortDriven by IntelligenceBest-in-Class DetectionOpen ArchitectureHighly Automated

Stop Doing Things the “Old” Way!Leverage the Only “Intelligent” IPS.

Page 42: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

True North Security

Vulnerability Audits

Create / Enhance Security Policies

Network & Data Protection Solutions

Security Awareness Training

PCI Compliance

Video Monitoring and Surveillance Solutions

[email protected]

978.846.1175

Page 43: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Summary

Cyber security attacks are common and costlyAttackers are sophisticated, well-financed and highly motivatedYou have limited IT resourcesTraditional security products can’t keep up

“Not knowing what’s on your network is going to continue

to be the biggest problem for most security practitioners.”

Marcus RanumCSO Magazine

Page 44: Know More About Threats, Risks and Regulations Ken Pappas CEO True North Security Prepared for:

Thank You

Ken PappasCEO

True North Security

Prepared for:

[email protected]