insider threat experiences

27
Insider Threat Experiences Jamie Graves, CEO [email protected]

Upload: napier-university

Post on 15-Apr-2017

473 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Insider Threat Experiences

Insider Threat Experiences

Jamie Graves, [email protected]

Page 2: Insider Threat Experiences

Robert Hanssen

Page 3: Insider Threat Experiences

$1 million

$40 millionDocuments worth

Bankruptcy

$100 million estimated damages

competitive advantageLoss of

$500 millionLoss of formula worth

lost in sales revenue

lost

in R&D

Impacts

Page 4: Insider Threat Experiences

Definition

• Current or former employee, or contractor

• Targets specific information1. Theft or modification of information for financial gain

(fraud)2. IT Sabotage3. Theft of information for Business Advantage4. National Security Espionage

Page 5: Insider Threat Experiences

IP - What’s at Risk?

Trade Secrets39%

Organisational Infor-mation

23%

Source Code16%

Proprietary Software

9%

Customer Infor-mation

8%

Business Plans5%

Page 6: Insider Threat Experiences
Page 7: Insider Threat Experiences

Motivation

Page 8: Insider Threat Experiences

Behaviours

Page 9: Insider Threat Experiences

Non-Technical Indicators

• Without need or authorisation, takes proprietary material or other materials home

• Interest in matter outside the scope of their duties• Unnecessarily copies material• Remotely accesses the computer network at odd times• Disregards company computer policies

Page 10: Insider Threat Experiences

How Information is Stolen

Email25%

Removable Media25%

Network Access

23%

Laptops16%

Printed Docs7%

File Xfer5%

Page 11: Insider Threat Experiences

Technical Indicators

• Attempts to circumvent auditing and logging functions• Copying, deleting, moving and printing sensitive files• Network interface or system hardware manipulation• Removable media or transferring using unauthorised channels• Attempts to anonymize network activities and web browsing• Complex, sophisticated search queries against internal databases• Downloading data to external removable drives• E-Mail, file, and system log deletion• Frequent and seemingly excessive use of encryption• High volume printing

Page 12: Insider Threat Experiences

Case Study

Page 13: Insider Threat Experiences

Company Profile

• Globally recognised Automotive brand• Number of departments

• R&D• Testing• Client/Consultancy Services

• Engineers• Deployed ZoneFox for 4 weeks to test and verify certain

policies and controls were in place

Page 14: Insider Threat Experiences

The Behaviour

• User had installed backup software • In violation of policy

• Subterfuge• Incremental backup (check for updates)• Files collated into easily handled ZIP• Would run out-of-hours• ‘Fire and forget’

Page 15: Insider Threat Experiences

The Data

• 182,000 Files:• Results of confidential product testing• CAD designs for prototypes and new products• Bills of Materials for new designs• Printed Circuit board designs• Contracts and agreements with research and

manufacturing partners

Page 16: Insider Threat Experiences

Exfiltration

• User disconnected end-point as they had a ‘hunch’ they were being monitored

• Plugged-in removable media• ~2,000 files copied

• Source code for new products

Page 17: Insider Threat Experiences

The Debrief

• When we presented the report to the CISO• Individual had handed-in their resignation to go to a

competitor• Issues

• Had the employee been backing up other information before the HR event?

• What if the employee had lied about joining a competitor?

Page 18: Insider Threat Experiences

Disrupting the Insider Threat Kill Chain

Recruitment / Tipping Point

Search and Reconnaissance Exploitation Acquisition Exfiltration

Page 19: Insider Threat Experiences

Lessons

Page 20: Insider Threat Experiences

The Insider Threat is not related to ‘Hackers’

• Know your assets

• Enforce separation of duties and least privilege

• Clearly Document and consistently enforce policies and controls

• Implement strict password and account management policies and practices

• Incorporate insider threat awareness into periodic security training

• Define explicit security agreements for any cloud services

• Institutionalise system change controls

Page 21: Insider Threat Experiences

The insider threat is not just a technical or cyber security issue

• Beginning with the hiring process, monitor and respond-to suspicious or disruptive behaviour

• Anticipate and manage negative issues in the work environment

• Develop a comprehensive employee termination procedure

• Be especially vigilant regarding social media

Page 22: Insider Threat Experiences

A good insider threat program should focus on deterrence, not detection

• Develop and implement a formalised insider threat program• Participation & Ownership

• Ensure that all managers, and employees, understand why it’s there, feel that they can contribute and participate in it.

Page 23: Insider Threat Experiences

Detection of insider threats should involve behavioural based techniques

• Establish a baseline of normal network device behaviour

• Monitor and control remote access from all end points, including mobile devices

• Use a log correlation engine and SIEM to log, monitor, and audit employee actions

• Strong integration between IT and HR

Page 24: Insider Threat Experiences

The science of insider threat detection is in its infancy

Page 25: Insider Threat Experiences

In Summary

1. Insider threats do not come from hackers2. The insider threat is not just a technical or cyber security issue3. A good insider threat program should focus on deterrence, not

detection4. Detection of insider threats has to use behavioural based

techniques5. The science of insider threat detection and deterrence is in its

infancy

Page 26: Insider Threat Experiences

Sources• FBI Insider Threat Lessons• CERT: Spotlight On: Insider Theft of Intellectual Property

inside the United States Involving Foreign Governments or Organisations 

• CERT Insider theft of intellectual property for business advantage: a preliminary model

• CERT common sense guide to mitigating insider threats; 4th edition

• PWC Data Breach Report• Verizon 2013 Data Breach Report• ZoneFox Customers

Page 27: Insider Threat Experiences

Thanks for listening,

Any Questions?

Jamie Graves, [email protected]