shift toward dynamic cyber resilience

28
Shi$ Toward Dynamic Cyber Resilience Security in the PostAV Era Darren Argyle CISSP CISM Senior Director, EMEA Security CTO @ Symantec Cyber Security in the PostAV Era 1

Upload: darren-argyle-cissp-cism

Post on 06-Apr-2017

59 views

Category:

Documents


4 download

TRANSCRIPT

Page 1: Shift Toward Dynamic Cyber Resilience

Shi$  Toward  Dynamic  Cyber  Resilience    Security  in  the  Post-­‐AV  Era  

Darren  Argyle  CISSP  CISM  Senior  Director,  EMEA  Security  CTO  @  Symantec  

Cyber  Security  in  the  Post-­‐AV  Era   1  

Page 2: Shift Toward Dynamic Cyber Resilience

So$ware  and  Data  powers  the  world  

Cyber  Security  in  the  Post-­‐AV  Era   2  

Page 3: Shift Toward Dynamic Cyber Resilience

2020  40ZB  

2015  7.9ZB  

2010  1.2ZB  

Informa?on  is  exploding  

Page 4: Shift Toward Dynamic Cyber Resilience

Cyber  Security  in  the  Post-­‐AV  Era   4  

Coffee  Shop   Office  Home  

Industrial    Devices  

Government  Data  

Web  Transac?ons  

From  a  security  perspecFve  there’s  more  and  more  to  protect  in  more  and  more  places  

Airport   …  

Corporate  Assets  

Page 5: Shift Toward Dynamic Cyber Resilience

Cyber  Security  in  the  Post-­‐AV  Era  

We’re  also  moving  toward  an  inherently    insecure  ecosystem  where…  

      OK     • • • • • •   OK  

•  Low  power,  mobile,  non-­‐sophis?cated    devices  are  common  

•  Everything  needs  authen?ca?on  –  and  passwords  are  a  really  poor  way  to  protect  your  iden?ty  

Ø  The  only  thing  between  an  aPacker  and  your  bank  account  is  a  weak  password  

5  

Page 6: Shift Toward Dynamic Cyber Resilience
Page 7: Shift Toward Dynamic Cyber Resilience

Cyber  Security  in  the  Post-­‐AV  Era   7  

We’re  not  succeeding  in  solving  this  today…  >500M  idenFFes  were  exposed  last  year  

Page 8: Shift Toward Dynamic Cyber Resilience

Cyber  Security  in  the  Post-­‐AV  Era   8  

Why?    There’s  an  asymmetry  between    aTackers  and  defenders  

ATTACKERS   DEFENDERS  Can  focus  on  one  target  

Only  need  to  be  right  once  

Hack  can  be  worth  millions  of  dollars  

Focus  only  on  geZng  in  

ATackers  can  buy    and  test  security  products  

Must  defend  everything  

Need  to  be  right  every  Fme  

Blocks  are  expected  &  maintain  status  quo  

Must  balance  defense  with  business  impact  

Defenders  can’t  pre-­‐test    targeted  malware  

 

Page 9: Shift Toward Dynamic Cyber Resilience

If  only  we  could  use  our  collecFve  

defense  technologies  to  watch  acFviFes,    determine  paTerns,  and  find  anomalies.  

Cyber  Security  in  the  Post-­‐AV  Era   9  

To  balance  this,  we  need  an  asymmetric  advantage  of  our  own  

Page 10: Shift Toward Dynamic Cyber Resilience

Cyber  Security  in  the  Post-­‐AV  Era   10  

To  balance  this,  we  need  an  asymmetric  advantage  of  our  own  

!   We  can  …  Big  Data    AnalyFcs  

Page 11: Shift Toward Dynamic Cyber Resilience

It’s  impossible  to  implement  an  aTack    without  leaving  a  trace  

Cyber  Security  in  the  Post-­‐AV  Era   11  

Big  Data  Approach  

Network   Server   Endpoint  

Page 12: Shift Toward Dynamic Cyber Resilience

C L O U D  

Cyber  Security  in  the  Post-­‐AV  Era   12  

What  if  …  

Apply    Context  

Correlate    &  Priori?ze  

• We  could  collect  info  from    every  endpoint,  network    device,  and  server  

• We  could  watch  this  data    at  the  enterprise  level  –  looking  for  paPerns  and  anomalies  

• We  could  apply  knowledge  and  learning  from  across  many  customers  

Indicators    of  

Breach  

Knowledge    about  URLs,    file  hashes  

APack    paPerns  &  actors  

Correla?on  across    

ecosystem  

E N T E R P R I S E  

D E V I C E S  

Page 13: Shift Toward Dynamic Cyber Resilience

Cyber  Security  in  the  Post-­‐AV  Era   13  

We  can  do  those  things  

•  Data  analysis  value  comes  from  ability  to  apply  intelligence  on  premise  &  in  cloud  

 

•  Data  value  comes  from  volume  &  variety  

13  

E N T E R P R I S E  

C L O U D  

D E V I C E S  

Page 14: Shift Toward Dynamic Cyber Resilience

Cyber  Security  in  the  Post-­‐AV  Era   14  

•  Trace  •  Correlate    &  Priori?ze  

•  Connect  to    ac?ons  at  other  Enterprises  

14  14  

E N T E R P R I S E  

C L O U D  

D E V I C E S  

Apply    Context  

Correlate    &  Priori?ze  

This  allows  us  to  …  

Unknown    source  email  received  by    

XXX  

IoCs  detected  on  device  

Connected  to  remote  server  

ConnecFon  aTempted  to  other  

higher  value  targets  on    enterprise  network  

Link  clicked,  connecFon  established  

Files  downloaded  

Page 15: Shift Toward Dynamic Cyber Resilience

Cyber  Security  in  the  Post-­‐AV  Era   15  

Result  

 We  can  apply  our  asymmetric  

advantage  against  theirs  We  ALSO  need  an  approach  to  

protec?ng  the  insecure  ecosystem:    Need  to  make  it  easier  to  be  secure  

 

Page 16: Shift Toward Dynamic Cyber Resilience

PROBLEM:    Devices  don’t  allow  visibility  &  control  

SOLUTION:  App-­‐Centric  Protec?on  

PROTECT  APPS/DATA  –  App:  Before  installing,  understand  what    

behaviors  the  app  will  perform  Manage  the  apps  in  the  device  with  containers  

–  Data:  Seal  apps  in  a  container  that  ensures  sensi?ve  data  is  managed  and  encrypted  

PROTECT  CONNECTIONS  –  Wifi  hotspot  reputa?on  (use  big  data  to  collect  data)  –  VPNs  

Cyber  Security  in  the  Post-­‐AV  Era   16  

Lock  down  the  insecure  system  and  connecFons  

Page 17: Shift Toward Dynamic Cyber Resilience

Cyber  Security  in  the  Post-­‐AV  Era   17  

Move  past  idenFty  through  passwords  

YESTERDAY’S    NEEDS  

TOMORROW’S  NEEDS  

STATIC    devices,  users  &  servers  

MOVING  AND  CHANGING    devices,  users  &  servers  

SEPARATE  PASSWORDS    for  everything  

SINGLE  BIOMETRIC  AUTHENTICATION    

BROKERED  TRUST  with  certs  &    

federated  roots  of  trust  

Page 18: Shift Toward Dynamic Cyber Resilience

Cyber  Security  in  the  Post-­‐AV  Era   18  

Self  Driving  Cars   Medical  Devices   “Internet  of  Things”  

We’re  reaching  a  criFcal  point  –  New  technologies  willl  require  people  to  feel  more  secure  

Photo  by:  Steve  Jurvetson/Wikipedia  Crea?ve  Commons  

Page 19: Shift Toward Dynamic Cyber Resilience

19  

SILVER  

Page 20: Shift Toward Dynamic Cyber Resilience

   Tradi&onal  Security  Approach  

–  80%  

External  Threat  

Intelligence  and  Trending  

Enhanced  Intelligence  Exchange  &  Sharing  

Incident  Response,  Malware  Analysis  &  Forensics  

Cyber  Risk  Assessment  

Business  Awareness  &  Involvement  

Informa?on  Governance  

Advanced  Threat  

Protec?on  

So  what  Do  I  Need  to  Do  Differently?  

20  

Page 21: Shift Toward Dynamic Cyber Resilience

A  definiFon…..    

Cyber-­‐resilience  is  the  organiza?on's  capability  to  withstand  nega?ve  impacts  due  to  known,  predictable,  unknown,  

unpredictable,  uncertain  and  unexpected  threats  from  ac?vi?es  in  cyberspace.    

(Informa>on  Security  Forum)  

21

……it’s  now  a  business  conversa>on?  

From  cyber-­‐security  to  cyber-­‐resilience  

Page 22: Shift Toward Dynamic Cyber Resilience

Welcome  to  a  new  era  of  Cyber-­‐Resilience      

     •  It’s  the  acknowledgement  that  something  bad  will  happen,  or  has  happened  alreday,  and  you  don’t  even  know  it  yet  

•  From  known  risks  to  unknown  threats  •  Requirement  to  extend  controls  beyond  just  your  enterprise    •  Look  beyond  your  own  back  yard,  collabora?on  more,  gather  and  share  Cyber-­‐intelligence  (internal  &  external)  

•  Different  audiences  will  now  care  that  didn’t  before.  New  language    =  more  engagement  from  the  business  

22

Page 23: Shift Toward Dynamic Cyber Resilience

23

TIMELINE  

Recognise  breach  is  inevitable  and  become  resilient  

OF  ORGANIZATIONS  HAVE  >25  INCIDENTS  EACH  MONTH1  

AVERAGE  NUMBER  OF  DAYS  TO  DISCOVER  A  BREACH    

60%  243  

PREPARE   PREVENT   DETECT  &  RESPOND   RECOVER  

Page 24: Shift Toward Dynamic Cyber Resilience

24

TIMELINE  

PROTECT  COMPANY  INFORMATION  FROM  MALICIOUS  ATTACK  

AND  MISUSE  

REDUCE  TIME  TO  RECOVERY  TO  

MAINTAIN  BUSINESS  CONTINUITY  

WHERE  IS  MY  SENSITIVE  DATA  -­‐  UNDERSTAND  MY  SECURITY  &  RISK  

POSTURE  

PROVIDE  RAPID  DETECTION  AND  RESPONSE  TO  

SECURITY  INCIDENTS  

RISK  MANAGEMENT  RESPONSE  P

LANNING  

TRANSFORM  

PREPARE   PREVENT   DETECT  &  RESPOND   RECOVER  

Page 25: Shift Toward Dynamic Cyber Resilience

Our  Vision  –  InformaFon  Governance  and  Cyber  Resilience  

Page 26: Shift Toward Dynamic Cyber Resilience

26

What’s  your  –  InformaFon  Governance  and  Cyber  Resilience  posture?  

Page 27: Shift Toward Dynamic Cyber Resilience

Resources  

27

www.emea.symantec.com/cyber-­‐resilience/  

FINTEL  

Page 28: Shift Toward Dynamic Cyber Resilience

Thank  you!  

Copyright  ©  2014  Symantec  CorporaFon.  All  rights  reserved.  Symantec  and  the  Symantec  Logo  are  trademarks  or  registered  trademarks  of  Symantec  Corpora?on  or  its  affiliates  in  the  U.S.  and  other  countries.    Other  names  may  be  trademarks  of  their  respec?ve  owners.    This  document  is  provided  for  informa?onal  purposes  only  and  is  not  intended  as  adver?sing.    All  warran?es  rela?ng  to  the  informa?on  in  this  document,  either  express  or  implied,  are  disclaimed  to  the  maximum  extent  allowed  by  law.    The  informa?on  in  this  document  is  subject  to  change  without  no?ce.  

28  

Thank  You  !    Darren  Argyle  CISM  CISSP  

[email protected]  0774  0830210  TwiPer  D_Argyle  

“Google  Car”  Photo  Credit:  

 "Jurvetson  Google  driverless  car  trimmed"  by  Flckr  user  jurvetson  (Steve  Jurvetson).  Trimmed  and  retouched  with  PS9  by  Mariordo  -­‐  hPp://commons.wikimedia.org/wiki/File:Jurvetson_Google_driverless_car.jpg.  Licensed  under  Crea?ve  Commons  APribu?on-­‐Share  Alike  2.0  via  Wikimedia  Commons  -­‐  hPp://commons.wikimedia.org/wiki/File:Jurvetson_Google_driverless_car_trimmed.jpg#mediaviewer/File:Jurvetson_Google_driverless_car_trimmed.jpg.