webinar€¦ · webinar cyber risk ... published 2016 ” “ the mission is ... • inbound...

59
Webinar Cyber Risk Management: Tools & Tactics Working Together to Solve Information Security Challenges Featuring: Lee Hovermale of Project Leadership Associates Justin Hectus of Keesal, Young & Logan Tom DeSot of Digital Defense, Inc. Presented by:

Upload: others

Post on 16-Aug-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

WebinarCyber Risk Management: Tools & TacticsWorking Together to Solve Information Security Challenges

Featuring:

Lee Hovermale of Project Leadership Associates

Justin Hectus of Keesal, Young & Logan

Tom DeSot of Digital Defense, Inc.

Presented by:

Page 2: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Housekeeping

• Webinar will be recorded

• Attendees are in “Listen Only” mode

• Submit questions via the Questions Panel

• Live Q&A at the end of the presentation

Page 3: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Today’s Presentation

State of the Legal Market Lee Hovermale, Chief Executive Officer Project Leadership Associates (PLA)

Gaining Executive Support Justin Hectus, Director Information Keesal, Young & Logan

Social engineering war stories and effective security awareness training

Tom DeSot, EVP/Chief Information OfficerDigital Defense

Page 4: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Cyber Risk Management: Tools & TacticsWorking Together to Solve Information Security Challenges

State of the Legal Market

Lee Hovermale

Chief Executive Officer Project Leadership Associates

Page 5: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

State of the Legal Market

Current governance demands place on law firms by clients • All industries

General insight of the current state of security and governance in Legal

• Recent experiences based on recent audits of AMLAW 250 firms

• Evaluated permission management

• Change Management Protocol

• Awareness/Training (Phishing, Malware, Ransomware)

Page 6: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

State of the Legal Market

Success Factors • How to Measure

• External and internal validation no longer an option

• Awareness

Page 7: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Cyber Risk Management: Tools & TacticsWorking Together to Solve Information Security Challenges

Gaining Executive Support

Justin Hectus

Director Information

Keesal, Young & Logan

Page 8: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

“Few breaches are unique. In fact, our VERIS research indicates that at any given point in time, a small number of breach scenarios comprise the vast majority of incidents we investigate. There is tremendous commonality in real-world cyber-attacks.- Verizon Data Breach Scenarios from the Field

Published 2016

Page 9: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 10: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

”“The mission is at risk, and every individual must understand their roles, responsibilities, and actions necessary to maintain a high, persistent state of cybersecurity readiness required to deliver mission assurance.- DoD Cybersecurity Discipline Implementation

Plan (made public March 2016)

Page 11: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

63%Stolen, weak, default, or

easily guessable passwords were involved in

of data breaches

Verizon Date Breach Scenarios from the Field 2016

Page 12: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 13: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 14: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Secure the Human Element

People and culture could be your greatest potential strength or your greatest potential liability. Create awareness, encourage vigilance, make security training a priority, and hold people accountable.

Page 15: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 16: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

”“Most successful cyberspace intrusions exploit preventable and generally well-known vulnerabilities.- DoD Cybersecurity Discipline Implementation

Plan (made public March 2016)

Page 17: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 18: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 19: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 20: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Secure the Human Element

People and culture could be your greatest potential strength or your greatest potential liability. Create awareness, encourage vigilance, make security training a priority, and hold people accountable.

Prevent Configuration Exploitation

The simple process of prompt patching can increase your defense posture significantly. Ensure that you have visibility to every network endpoint so that you can monitor and remediate any vulnerabilities.

Page 21: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

50% of confirmed

breaches feature malware somewhere

in the attack chain, usually in

conjunction with hacking or social

interaction.Verizon Date Breach Scenarios from the Field 2016

Page 22: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

146Attackers spent an average

of

days inside networks before

being detectedM-Trends Special Report February 2016

Page 23: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 24: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Secure the Human Element

People and culture could be your greatest potential strength or your greatest potential liability. Create awareness, encourage vigilance, make security training a priority, and hold people accountable.

Prevent Configuration Exploitation

The simple process of prompt patching can increase your defense posture significantly. Ensure that you have visibility to every network endpoint so that you can monitor and remediate any vulnerabilities.

Don’t Treat all Assets Equally

An all users are authorized for all assets with the same access is a recipe for disaster. Sensitive data should be encrypted and secured on a need to know basis using two factor authentication.

Page 25: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

CONFIDENTIALITY

INTEGRITY AVAILABILITY

Page 26: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 27: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Secure the Human Element

People and culture could be your greatest potential strength or your greatest potential liability. Create awareness, encourage vigilance, make security training a priority, and hold people accountable.

Prevent Configuration Exploitation

The simple process of prompt patching can increase your defense posture significantly. Ensure that you have visibility to every network endpoint so that you can monitor and remediate any vulnerabilities.

Don’t Treat all Assets Equally

An all users are authorized for all assets with the same access is a recipe for disaster. Sensitive data should be encrypted and secured on a need to know basis using two factor authentication.

Use Layered and Different Approaches

Anti-virus and anti-malware that use pattern-based recognition is no longer enough. An added approach of “white-listing” applications and comparing network function and behavior to baselines is also needed. A determined bad actor will get in. Monitor closely, detect early, respond quickly.

Page 28: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 29: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Instance Data Vulnerability Details Solution

Page 30: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

CONFIDENTIALITY

INTEGRITY AVAILABILITY

Integrated Defense Architecture

Page 31: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 32: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Cyber Risk Management: Tools & TacticsWorking Together to Solve Information Security Challenges

“Hi, I’m Tom from IT”

Social Engineering In the Real World

Tom DeSot

EVP, Chief Information Officer

Digital Defense

Page 33: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

What Is Social Engineering?

“…the art of manipulating people into performing actions or divulging confidential information.” (Wikipedia)

Page 34: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Real World Examples

• An individual called into Citibank’s customer service bureau claiming to be Paul Allen (Co-founder of Microsoft)

• Caller claimed he had misplaced his debit card (did not want to report it stolen)

• Caller was able to change the mailing address for the account to his residence in Pittsburgh over the phone

• Had a new card overnighted – Card was used to make a $658 payment

to a bank loan account – Attempted to make a $15,000 wire transfer

and a purchase at Game Stop, but transactions were denied

Source: “FBI Says Citibank Gave Paul Allen’s Debit Card to Thief”, http://www.wired.com/threatlevel/2012/03/paul-allen-debit-card-caper/

Page 35: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Real World Examples

A man dressed as an employee of Brinks walked into a Wachovia branch in downtown Washington D.C. and walked out with more than $350,000…

Wasn’t until the real Brink’s driver showed up did they realize they had been robbed.

Source: http://www.schneier.com/blog/archives/2008/01/socialengineeri.html

Page 36: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Real World Examples

Tareq and Michaele Salahi were able to crash a reception for President Obama

– “They looked like they belonged…”

Page 37: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Remote Social Engineering Tactics

The Patch

• Scenario

• Inbound telephone calls or emails to employees

• Direct user to fake website to download and execute the “patch”

• Executable actually sends username, IP address and hostname to Internet listener

Page 38: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Sample Site

Page 39: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Sample Dialog Box

Page 40: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Remote Social Engineering Tactics

BonusPlan2016.xls

• The analyst will drop USB fobs in areas where employees congregate

• The test focuses on determining if employees will insert unknown removable media into corporate computers

• When inserted, Excel spreadsheets are shown with file names like “BonusPlan2016.xls”

• Excel does not open; the program silently sends the IP address, hostname and username of the individual to a DDI server

Bonus Plan

Page 41: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

How Successful Are We?

95-98% Successful

Page 42: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

What Is Onsite Social Engineering?

Onsite Social Engineering uses several onsite testing methods, including…

• Attempting to gain physical access to the premises

• Attempting to obtain records, files, equipment, sensitive information, network access, etc.

• Attempting to garner information to permit unauthorized network access

Page 43: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Onsite Social Engineering Tactics

Scenario 1: New Employee

• The analyst pretends to be a new employee and enters through employee entrance

• Will typically have already “cased” the organization and will wear the appropriate attire

• Will already have a fake badge before they come onsite

Page 44: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Onsite Social Engineering Tactics

Scenario 2: Trusted Vendor

• The analyst pretends to be someone from a trusted vendor such as the local telephone company, A/C repair, etc.

• Will typically have already called in to see what firms the organization uses

• Shirts are easy to buy at local thrift stores or to have made

Page 45: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

How Successful Are We?

90-95% Successful

Page 46: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

What About My Badge System?

Page 47: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

What About My Door Locks?

Page 48: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

What About My Cameras?

Page 49: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

What To Do?

• As seen in prior slides, technology will not save you from someone conducting a social engineering attack.

• Most technologies can be circumvented, in some cases very quickly and easily.

• That leaves the question…What Can I Do?

Page 50: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Information Security Training!

Page 51: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Training Topics

• Social Engineering • Remote attacks

• Onsite attacks

• Password Development and Safety • How to develop a strong password or passphrase.

• Protecting your password once it is developed.

Page 52: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Training Topics

• Clean Desk • Make sure any physical content (reports, print outs, etc.)

with sensitive information is properly stored and protected while not in use.

• Mobile Security • Protecting smartphones and tablets that contain

sensitive information.

• Ensuring the proper policies and procedures are in place to limit the exposure of sensitive data on mobile devices.

Page 53: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Training Topics

• Phishing • Ensure employees know how to spot a phishing or

whaling attack.

• Ensure employees understand how to thwart phishing or whaling attacks.

• Acceptable Use of Computer Systems • What is and isn’t allowed on corporate computers.

Page 54: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Training Topics

• Social Media Dangers • What an employee can and cannot say about corporate

practices on social media.

• How employees should respond to direct inquires that come in via social media.

• Why employees should not click on links coming from someone on social media.

Page 55: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Training Topics

• Securing Protected Data • Ensure a document sensitivity marking is in place so that employees

know what data needs to be protected.

• Help employees understand what documents must be destroyed via shredding or other disposal means.

Page 56: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Training Topics

• Safe Web Browsing Habits • Help employees understand why the Internet can be a

very dangerous place and what they need to do to protect the company and themselves.

• Educate employees on what constitutes a malicious website.

• Show employees how to spot a fraudulent website.

Page 57: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and
Page 58: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

• Webinar recording will be available a few days after session

• Follow-up email will contain link to access or share

• Questions/Comments/Suggestions to:

[email protected]

• Follow us

• www.digitaldefense.com

• @Digital_Defense

Presenter email @TwitterHandle

Thank you for attending!

Page 59: Webinar€¦ · Webinar Cyber Risk ... Published 2016 ” “ The mission is ... • Inbound telephone calls or emails to employees • Direct user to fake website to download and

Digital Defense, Inc. 9000 Tesoro Drive, Suite 100

San Antonio, TX 78217

888.273.1412

www.digitaldefense.com

[email protected]