1 1©2010 check point software technologies ltd. | [restricted] only for designated groups and...

60
1 1 ©2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |

Upload: margery-andrews

Post on 24-Dec-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

  • Slide 1
  • 1 12010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |
  • Slide 2
  • 2 2 The Check Point Security Report 2013 About the research Key findings Security strategy Summary
  • Slide 3
  • 3 32010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Constantly changing environment Just as water retains no constant shape, so in warfare there are no constant conditions - Sun Tzu, The Art of War
  • Slide 4
  • 4 42010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | There is a lot going on in 2012
  • Slide 5
  • 5 52010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Looking back and forward Main security threats & risks Security architecture Recommendations 2012 2013 and beyond
  • Slide 6
  • 6 62010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Multiple sources of data SensorNet 3D Reports Threat Cloud
  • Slide 7
  • 7 72010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | A comprehensive survey 888companies 1,494gateways 120,000Monitoring hours 112,000,000security events
  • Slide 8
  • 8 82010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | A comprehensive survey % of companies Americas EMEA APAC Industrial Finance Government Telco Consulting Other By geographyBy sector
  • Slide 9
  • 9 92010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The Check Point Security Report 2013 About the research Key findings Security strategy Summary
  • Slide 10
  • 10 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | What you dont know can hurt you! [Restricted] ONLY for designated groups and individuals There are known knowns. These are things we know that we know. There are known unknowns. That is to say, there are things that we know we don't know. But there are also unknown unknowns. There are things we don't know we don't know. Donald Rumsfeld
  • Slide 11
  • 11 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | We will talk about 3 issues Threats to the organization Risky enterprise applications Data loss incidents in the network
  • Slide 12
  • 12 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Another day, another major hack HACKED
  • Slide 13
  • 13 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | And then theres Anonymous
  • Slide 14
  • 14 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | 2012: the year of hacktivism Arab Spring Political freedom Foxcon Working conditions Justice Department Anti-corruption Vatican Unhealthy transmitters UN ITU Internet deep packet inspection
  • Slide 15
  • 15 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | This does not affect me, right?
  • Slide 16
  • 16 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The majority of companies are infected 63% 100% = 888 companies of the organizations in the research were infected with bots
  • Slide 17
  • 17 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Once in always on Communicating with command & control every 21 minutes
  • Slide 18
  • 18 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Top 2012 Bots
  • Slide 19
  • 19 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Exploit kits are easy to buy Rental costs One day 50$ Up to 1 month 500$ 3 month 700$ Rental costs One day 50$ Up to 1 month 500$ 3 month 700$ Available online
  • Slide 20
  • 20 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | But there is more than Bots, right? Malware INSIDE How does malware get to my network?
  • Slide 21
  • 21 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Going to the wrong places
  • Slide 22
  • 22 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Downloading malware all the time 53% of organizations saw malware downloads
  • Slide 23
  • 23 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Most attacks originate in the US Top malware locations, % US 71% Canada 8% Czech Rep 2% Slovakia 2% France 2% UK 2% Germany 2% Israel 3% Turkey 3% China 3%
  • Slide 24
  • 24 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Anatomy of an attack Recon Exploit Toolkit Backdoor Damage 4 3 2 1 BOT Virus RAT
  • Slide 25
  • 25 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Two major trends BOT Virus Damage Profit drivenA Ideological driven B 4 RAT
  • Slide 26
  • 26 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Case example Massive SQL injection attack Italian University
  • Slide 27
  • 27 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Case Study Hacker injected the following string In normal language: Please give me the usernames and passwords from the database In normal language: Please give me the usernames and passwords from the database
  • Slide 28
  • 28 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Blocked by Check Point IPS Software Blades From around the world Case study - the success
  • Slide 29
  • 29 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | We will talk about 3 issues Threats to the organization Risky enterprise applications Data loss incidents in the network
  • Slide 30
  • 30 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | No longer a game
  • Slide 31
  • 31 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | What are risky applications? Bypassing security or hiding identity Do harm without the user knowing it P2P file sharing Anonymizers File sharing / storage Social networks
  • Slide 32
  • 32 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Risky applications Anonymizers
  • Slide 33
  • 33 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | What is an anonymizer? UserProxySite
  • Slide 34
  • 34 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | History of Anonymizers Began as The Onion Router Officially sponsored by the US Navy 80% of 2012 budget from US Government Used widely during Arab Spring
  • Slide 35
  • 35 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The risk of anonymizers Bypasses security infrastructure Used by botnets to communicate Hide criminal, illegal activity
  • Slide 36
  • 36 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Anonymizers inside the corporation 47% of organizations had users of Anonymizers (80% were not aware that their employees use Anonymizers) 100% = 888 companies
  • Slide 37
  • 37 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Risky applications P2P file sharing
  • Slide 38
  • 38 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The Risk of P2P Applications Downloading the latest 24 episode right now Pirated content liability Malware downloads Back door network access
  • Slide 39
  • 39 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | P2P inside the corporation 61% of organizations had a P2P file sharing app in use 100% = 888 companies
  • Slide 40
  • 40 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Case example: P2P 3,800 personal details shared on P2P 95,000 personal details shared on P2P Fines for information disclosers
  • Slide 41
  • 41 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Main takeaways 61% 47% of organizations had users of anonymizers
  • Slide 42
  • 42 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | We will talk about 3 issues Threats to the organization Risky enterprise applications Data loss incidents in the network
  • Slide 43
  • 43 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | How common is it? 54% of organizations experienced data loss
  • Slide 44
  • 44 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Many types of data leaked 24% Source Code 7% Email marked as confidential 14% Password protected file 29% Credit card information 13% Salary compensation information 7% Bank accounts numbers 6% Business data record 21% Other
  • Slide 45
  • 45 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | PCI compliance can be improved36% Of financial organizations sent credit card data outside the organization
  • Slide 46
  • 46 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Case examples: oops, wrong address 11 emails for a lawyer to the wrong address Worker fired for sending sensitive information to the wrong people GPAs of all students leaked to hundreds of unintended recipients Accidentally leaked 4,000 student social security numbers Oct 2012 Oct 2012 Apr 2012 Apr 2012
  • Slide 47
  • 47 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | We have all had this problem Error 552: sorry, that message exceeds my maximum message size limit Dropbox? YouSendIt? Windows Live?
  • Slide 48
  • 48 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Storing and Sharing applications 80% of organizations use file storage and sharing applications 100% = 888 companies
  • Slide 49
  • 49 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Top sharing and storage apps % of organizations But sharing is not always caring
  • Slide 50
  • 50 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The Check Point Security Report 2013 About the research Key findings Security strategy Summary
  • Slide 51
  • 51 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | We talked about three issues Threats to the organization Risky enterprise applications Data loss incidents in the network
  • Slide 52
  • 52 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Anatomy of an attack Recon Exploit Toolkit Backdoor Damage 4 3 2 1 BOT Virus RAT
  • Slide 53
  • 53 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Addressing external threats FW AV IPS Anti Bot URLF Emulation
  • Slide 54
  • 54 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Enabling secure application use URLF Antivirus Application Control Endpoint
  • Slide 55
  • 55 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Preventing data loss Doc Sec DLP Data End Point Application Control User check
  • Slide 56
  • 56 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | Seeing attacks and protections SmartEvent SmartLog SmartDashboard
  • Slide 57
  • 57 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | http://www.checkpoint. com/campaigns/securit y-report/index.html
  • Slide 58
  • 58 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | The Check Point Security Report 2013 About the research Key findings Security strategy Summary
  • Slide 59
  • 59 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals | infected with bots Summary Threats to the organization Risky enterprise applications Data loss incidents in the network used Anonymizers had a data loss event 63%47%54%
  • Slide 60
  • 60 2010 Check Point Software Technologies Ltd. | [Restricted] ONLY for designated groups and individuals |