janus associates cyber warfare - meecmeec-edu.org/files/2015/10/janus-cyberwarfaremjl.pdfabout janus...

39
JANUS Associates Cyber Warfare The Reality Is We Are All Under Attack All Under Attack Presented to: Maryland Education Enterprise Consortium Presented by: Matthew J. Lane, CIO

Upload: others

Post on 17-Jun-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

JANUS Associates

Cyber WarfareThe Reality Is We Are

All Under AttackAll Under Attack

Presented to: Maryland Education Enterprise ConsortiumPresented by: Matthew J. Lane, CIO

Page 2: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

About JANUS Associates

Focused on Information Security and Business Continuity

About JANUS Associates

Focused on Information Security and Business Continuityconsulting since 1988

F d d 1988 th ld t IT S it lt i th tiFounded 1988, the oldest IT Security consultancy in the nationPrivately held, woman-owned small business25 Years serving government and businessg gLocations in Stamford, Boston, Baltimore, Hartford, Austin

Page 3: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

JANUS Areas Of Expertise

Risk Management

JANUS Areas Of Expertise

Risk ManagementInformation Security & PrivacyRisk/Vulnerability AssessmentsCloud Assessment and Security ServicesSmart Grid Assessment and Security ServicesInformation AssuranceBusiness Continuity and Disaster Recovery PlanningRegulatory ComplianceRegulatory ComplianceSecurity Awareness & Training3rd Party Vendor AssessmentsyPolicy and ProceduresComputer Forensics

Page 4: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

JANUS Clients (partial)JANUS Clients (partial)

ABC TelevisionAetna Life & Casualty

Exxon MobilFederal Deposit Ins Corp (FDIC)

State of MarylandState of Ne YorkAetna Life & Casualty

Altura Energy (Occidental Petroleum)Amnesty InternationalAnne Arundel Community CollegeAmoco

Federal Deposit Ins. Corp. (FDIC)Federal Reserve Board of GovGov’t Accountability Office (GAO)IBM

State of New YorkState of North CarolinaState of TexasState of Wisconsin

AmocoAT&TBath Iron WorksBlackRock FinancialBausch & Lomb

ITT HartfordIncyte GenomicsLockheed MartinMetropolitan Life

State of VirginiaState of WyomingUCAL – BerkeleyUniv. of MassachusettsBausch & Lomb

Boston UniversityCal State University at SacramentoCenters for Medicare/Medicaid

Services

Merrill LynchMicrosoftNew York Power AuthorityOppenheimer Funds

University of MarylandUniversity CollegeUniv. of TexasUniversity of Wisconsin

Charles Schwab & CoCitibankCity of New YorkComm. of Massachusetts

Oppenheimer FundsOregon State LotteryPacific Gas & ElectricPort Authority of NY & NJP i G ’ C it C ll

University of WisconsinTexas A&MUS CustomsUS Naval AcademyValley National Bank

Comm. College of Baltimore County Enoch Pratt Free Library - SailorNetESPN

Prince George’s Community CollegeSocial Security AdministrationState of Florida

Valley National BankVISA InternationalVW Credit Corp.Wal-Mart

Page 5: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Food For Thought

“When we look back at the higher education data breaches in 2012, we can

Food For Thought

see that the hackers are clearly getting smarter at stealing data. The reported breaches remain on the low side, yet the stolen data is over three times what we saw in 2011.” Campus Technology Magazine, March 2013

“In recent years, literally hundreds of universities and millions of data records have been compromised due to what security analysts say are poor security

i ”practices.” J. Vijayan – Computerworld, September 24, 2013

E li thi Ed fit it f IT f i l f dEarlier this year, Educause, a non-profit community for IT professionals focused on the higher education vertical warned that a data breach affecting its 1,800 college and 300 corporate members had occurred.

Page 6: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS
Page 7: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

DefinitionsDefinitions

HackerHacker– Made innovative modifications to electronics– Modified Software

Broke into Phone Systems– Broke into Phone Systems– Circumvents Computer Security

Page 8: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

DefinitionsDefinitions

HackerHackerHacktivist– Political Motivation

S i l M i i– Social Motivation– Non-violent– Independent

Page 9: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

DefinitionsDefinitions

HackerHackerHacktivistCyber Terrorist– Political Motivation– May be Violent– May be state sponsoredy p

Page 10: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

DefinitionsDefinitions

HackerHackerHacktivistCyber TerroristCyber Criminal– Financially Motivated– Ties to Organized Crime– Ties to Organized Crime– Majority in Eastern Europe

Page 11: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

DefinitionsDefinitions

HackerHackerHacktivistCyber TerroristCyber Criminal Cyber Warrior

St t S d– State Sponsored– Traditional war activities

Page 12: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

What is a Cyber War?What is a Cyber War?

A political mechanism to force another group of people toA political mechanism to force another group of people to change and act differently

Page 13: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

What is a Cyber War?What is a Cyber War?

A political mechanism to force another group of people toA political mechanism to force another group of people to change and act differentlyAn organized, prolonged, military conflict between

i titisovereign entities

Page 14: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

What is a Cyber War?What is a Cyber War?

A political mechanism to force another group of people toA political mechanism to force another group of people to change and act differentlyan organized, prolonged, military conflict between sovereign

titientitiesIt effects violence, aggression, and mortality

Page 15: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

What Are Cyber Warriors After?What Are Cyber Warriors After?

In the past the bad guys were after financial gain.

Today they are after everything

Log On Information (User ID’s & Passwords)Credit Card Information

Today they are after everything

Credit Card InformationIntellectual PropertyCorporate Confidential Information Documents Spreadsheets Email ImagesDocuments, Spreadsheets, Email, ImagesAccess to Manufacturing Process Control

Page 16: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

The Components of Cyber WarfareThe Components of Cyber Warfare

Reconnaissance

Page 17: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

The Components of Cyber WarfareThe Components of Cyber Warfare

ReconnaissanceEspionage

Page 18: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

The Components of Cyber WarfareThe Components of Cyber Warfare

ReconnaissanceEspionageArms ProliferationArms Proliferation

Page 19: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

The Components of Cyber WarfareThe Components of Cyber Warfare

ReconnaissanceEspionageArms ProliferationArms ProliferationAggression

Page 20: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Cyber Warfare Distribution of TargetsCyber Warfare Distribution of Targets

* Source: hackmageddon.com

Page 21: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Cyber Warfare Distribution ofyAttack Techniques

* Source: hackmageddon.com

Page 22: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

So Easy: A Six Year Old Can Do It!So Easy: A Six Year Old Can Do It!

Page 23: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Properly Responding To A Cyber AttackProperly Responding To A Cyber Attack

First Step – Plan in Advance– Update Your Plan on a Regular Basis– Do a Table Exercise and Test Your Plan

Notify the Proper AuthoritiesIsolate and Protect Compromised SystemD t E thiDocument EverythingDiscuss on a Need to Know Basis

Page 24: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

How NOT To Respond To A Cyber Attack

Hack-Back-Attack

Page 25: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

How NOT To Respond To A Cyber Attack

Hack-Back-Attack

Escalate to traditional warfareEscalate to traditional warfare

Page 26: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

How NOT To Respond To A Cyber Attack

Hack-Back-Attack

Escalate to traditional warfareEscalate to traditional warfare

Buy more bandwidthBuy more bandwidth

Page 27: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

How NOT To Respond To A Cyber Attack

Hack-Back-Attack

Escalate to traditional warfareEscalate to traditional warfare

Buy more bandwidthBuy more bandwidth

Move to the CloudMove to the Cloud

Page 28: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

How To Tell If Your SafeguardsHow To Tell If Your SafeguardsAre Effective

Internal Testingg

Page 29: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

How To Tell If Your SafeguardsHow To Tell If Your SafeguardsAre Effective

Internal Testingg3rd Party Testing

Page 30: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

How To Tell If Your SafeguardsHow To Tell If Your SafeguardsAre Effective

Internal Testingg3rd Party TestingCost BenefitsCost Benefits

Page 31: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

How To Tell If Your SafeguardsHow To Tell If Your SafeguardsAre Effective

Internal Testingg3rd Party TestingCost BenefitsCost BenefitsWhat Should be Tested?

Page 32: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Test Sample: Spear PhishingTest Sample: Spear Phishing

Purchase a similar looking domain

Page 33: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Test Sample: Spear PhishingTest Sample: Spear Phishing

Purchase a similar looking domainSet up an email for the domainp

Page 34: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Test Sample: Spear PhishingTest Sample: Spear Phishing

Purchase a similar looking domainSet up an email for the domainpIdentify suspect classes of users

Page 35: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Test Sample: Spear PhishingTest Sample: Spear Phishing

Purchase a similar looking domainSet up an email for the domainpIdentify suspect classes of usersCraft e-mail messages to each class of userCraft e mail messages to each class of user

Page 36: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Test Sample: Spear PhishingTest Sample: Spear Phishing

Purchase a similar looking domainSet up an email for the domainpIdentify suspect classes of usersCraft e-mail messages to each class of userCraft e mail messages to each class of userCreate Click Based attacks

Page 37: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Test Sample: Spear PhishingTest Sample: Spear Phishing

Purchase a similar looking domainSet up an email for the domainpIdentify suspect classes of usersCraft e-mail messages to each class of userCraft e mail messages to each class of userCreate Click Based attacksCreate attachment based attacksCreate attachment based attacks

Page 38: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Test Sample: Spear PhishingTest Sample: Spear Phishing

Purchase a similar looking domainSet up e-mail for the domainpIdentify suspect classes of usersCraft e-mail messages to each class of userCraft e mail messages to each class of userCreate Click Based attacksCreate attachment based attacksCreate attachment based attacksGenerate statistics to improve process

Page 39: JANUS Associates Cyber Warfare - MEECmeec-edu.org/files/2015/10/Janus-CyberWarfaremjl.pdfAbout JANUS Associates Focused on Information Security and Business Continuity About JANUS

Questions and Answers

Free Offer: 42 page data breach incident response template

JANUS Associates1055 Washington Blvd.St f d CT 06901Stamford, CT 06901www.janusassociates.com

Matthew J Lane CIOMatthew J. Lane, CIOOffice: [email protected]

Lyle A. Liberman, COOOffice: [email protected]