Tier 3 Huntsman - Insider Threats

12
©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. INSIDER THREATS: Behaviour is key to early detection
  • date post

    19-Oct-2014
  • Category

    Technology

  • view

    158
  • download

    1

description

High level overview of the role of behavioural anomaly detection in tracing, identifying and mitigating Insider threats

Transcript of Tier 3 Huntsman - Insider Threats

Page 1: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

INSIDER THREATS:

Behaviour is key to

early detection

Page 2: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

Whistleblowers make the headlines

Careless Staff cause the most data loss

Page 3: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

The 2014 Global State of Information Security

Survey® Key Findings, PWC, September 2013

Careless Employees

Two-thirds of the respondents felt that careless employees posed a greater security risk to their organizations than did

cybercriminals. ‘They're more concerned with someone losing a cell phone in a cab than they are of cybercriminals

hacking into a mobile device.’

‘Every 3.5 seconds, someone in America loses a cell phone.’

Mobile security incident costs, regional threat differences revealed CSO, June 5, 2013

Lost Phones Cost Americans $30 Billion a Year MarketWatch, March 23, 2012

Page 4: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

The trouble with Insiders

They can compromise sensitive data without malicious

intent - through ignorance, negligence and just plain

carelessness.

What you can do

• Provide better education

• Build a stronger culture of security awareness

• Define policies, processes and controls that safeguard

your critical data and staff access to it.

Page 5: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

How Great is the Insider Threat?

‘… almost two thirds of information security and IT professionals rated Insiders as their greatest security risk.’ Insider Threats And BYOD Greatest Risks In State

of Network Security 2013 Survey, dark READING, April 17, 2013

Page 6: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

Most fraud is committed by non-technical contractors or affiliates. Theft of IP and IT sabotage are mostly the work of technical affiliates.

Trusted Affiliates & Business Partners

Source: Spotlight On: Insider Threat from Trusted Business Partners, CERT, SW Engineering Institute, Carnegie Mellon

Page 7: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

The 2014 Global State of Information Security

Survey® Key Findings, PWC, September 2013

‘Data loss prevention (DLP) systems, encryption, internet

monitoring tools and other restrictive controls are failing to

deliver total security,’ the Carnegie Melon CERT report says,

‘with a growing number of data breaches linked to insiders.’

Study Probes Insider Threat in Financial Services Sector, Software Engineering Institute, Carnegie Melon, July 31, 2012

Why are IT Security Defences failing?

Page 8: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

Will more technology succeed?

Predictive Analytics, Big Data …

‘The most effective way to prevent and detect

insider crimes is to make it an enterprise-wide

effort to master both the technical and

behavioural aspects of the problem.’

Study Probes Insider Threat in Financial Services Sector,

Software Engineering Institute, Carnegie Melon, July 31, 2012

When Technology Fails to Deliver

Page 9: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

Insider Threat - The FBI’s 5 Best Practices

1. Focus on deterrence not detection, so that malicious behaviour will

stand out from the ‘noise’ of normal business

2. Know your people - Know who your weak links are

3. Identify information that is most likely to be valuable to others,

and add more protection

4. Monitor ingress and egress points for information

5. Baseline normal activity and look for anomalies.

FBI 5 Best Practices For Combatting The Insider Threat In Your Business, Forbes, August 7, 2013

Page 10: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

SLIPPING AWAY FROM YOU?

More data and applications in the cloud

More smart mobile devices, more BYOD

More Mobile Workforce

More contractors and affiliates

More complex security challenges

Page 11: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

Access rights based on user roles

Close supervision of users

Monitoring of supervisors (QC)

Separation of functions

Fine-tuning of processes & policies

A BRAVE NEW WORLD NEEDS BETTER CONTROLS

Page 12: Tier 3 Huntsman - Insider Threats

©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd. ©2013. All rights reserved Tier-3 Pty Ltd. Huntsman is a registered Trademark of Tier-3 Pty Ltd.

Resources Insider Threats: Behaviour is Key to Early Detection – Short White paper How to Combat Insider Risk with Huntsman – Application Brief IT Security 2014 Threats & Trends – fully-referenced Hot Shot

Follow us

Contact us