610 likes | 624 Views
Understanding the First Line of Defense in Cyber Security. Troy Wilkinson CEO – Axiom Cyber Solutions. Just being connected to the internet makes any company interesting to cyber criminals.
E N D
Understanding the First Line of Defense in Cyber Security Troy Wilkinson CEO – Axiom Cyber Solutions
Just being connected to the internet makes any company interesting to cyber criminals. Any company connected to the internet is a resource that can be exploited by criminals because of the data it holds. Phil Huggins, VP of Security Science - Stroz Friedberg
Emerging Threats • Ransomware • Internet of Medical Things (IoMT) • Phishing / Business Email Compromise • Distributed Denial of Service (DDoS) Attacks
Emerging Threats – Ransomware In 2016 there was a 6000% spike in Ransomware Attacks December 2016 - IBM Security
WannaCry • Leveraged a Microsoft Vulnerability • Patch was released in March but many organizations hadn’t updated yet. • 200,000 infected computers in 1 week • $4 Billion in damages so far.
Emerging Threats – Ransomware Hollywood Presbyterian Medical Center in Southern California acknowledged paying a $17,000 ransom in February 2016 to regain control of its systems after an attack after two-weeks of having critical systems offline. “You have just 7 days to send us the Bitcoin or we will remove your private keys and it’s impossible to recover your files.” Leaders of the L.A. Community College decided to pay the $28,000 ransom.
Ransomware code is getting more complex: • Most ransomware targets user files such as: • Text documents • Spreadsheets • Pictures • User files • Leaves system files intact.
Ransomware Prevention is a Layered Approach • Backup technology is crucial to protecting critical data. • On site, off site, and hybrid cloud solutions. • Endpoint protection. • Antivirus / Antimalware • Endpoint Detection and Response (white list / black list) • Network Monitoring and SIEM • The enterprise immune system. • Behavioral analytics and correlation. • Next Generation Firewall with layered integration. • Looking for ransomware communication protocols. • Behaviors, Heuristics, Signatures, Rules, Protocols, etc.
What is the IoT, and why should I care? • Smart, connected devices in homes, businesses and cars. • Everything from lightbulbs, access doors, printers, CCTV, RFID cards, scopes, infusion pumps, pacemakers and so on. • Present unique challenges to security and BC/DR. • Typically can’t protect with traditional means. (Agentless) • Can be the entry point for access to your organization. • Security was a second thought in the design phase. (go to market)
Devices Everywhere! • Frost and Sullivan estimate that the IoMT market will grow to $72 Billion by 2021. • IoMT is the new battlefield for cybersecurity. Hackers are racing to find zero days while security professionals are racing to patch against them. • There is no security standard for development.
IoMT Security Requires Multi-tiered Approach • Assume out of the box, the device is not secure. If there is a way to change default username and/or password, change it. (sometimes there isn’t) • Keep an accurate inventory of all devices on your network. Through software tools, constantly scan for new devices. • A constantly updated NGFW is required to prevent hackers leveraging IoT vulnerabilities to gain access to your network. • The enterprise immune system. Network monitoring and behavioral analysis to detect IoT compromises early.
Case Study: Abbot (St. Jude) Cardiac Devices • FDA confirmed vulnerability that would allow hackers access to pacemakers and defibrillators. • Once inside, hackers could deplete the battery, could administer incorrect pacing, or even shocks. • The hackers were able to gain access to the devices through a compromised transmitter.
71% Increase in DDoS attacks since Q3 2015 State of the Internet Security Report 2016 DDoS attacks greater than 100 Gbps increased 140% from Q4 2015. State of the Internet Security Report 2016 Longest DDoS attack of 2016 lasted 292 hours (12.2 days) Kaspersky 2016
DNS Amplification Attack EDNS0 and DNSSEC = 70:1 Amplification
DDoS Mitigation • Depends on business case. • e-Retail and web based (application) mitigation will require cloud based and carrier upstream mitigation. • If you have a 10Gb circuit and are hit with 11Gb attack, no on-premise solution can help. • Corporate enterprises are deploying a hybrid approach. Leveraging cloud based technologies along with on-premise appliances. • Appliances must be able to defend the attack for failover to work. Redundant circuits won’t work if primary can’t failover. • DDoS is a precursor to other attacks, or a smoke screen. • Ransomware, network mapping, payload injection, etc.
Case Study: Boston Children’s Hospital • Days long attack in 2014. • Was waged by a hacktivist group who opposed a patient that was being held at the hospital against her parent’s wishes. • Reached 30GB per second of attack traffic. • Interrupted the hospitals ability to use the internet, phone system and electronic health record system.
More targeted, more sophistication, more success. • Very few, if any spelling errors. • Highly targeted. Generally an assistant or administrator. • Sense of urgency. Repercussions if not handled quickly. • Looks and feels legitimate. • Hackers have canvassed the situation carefully to coincide with real world events.
Phishing prevention. • Educate employees, train them, test them. • Software and cloud services companies. • Use updated anti-spam filters for the company email. • Use blacklist technology to block URLs (links)
Case Study: Augusta University Medical Center Phishing Compromise • Multiple facility members were fooled by authentic looking email that delivered a malicious payload • 6100 patient records were affected • Notification protocols ensued • Costly forensic investigation launched. • They were not able to fully determine the scope of PII access.
Cyber Attack Response • Preparation • Monitor & Detect & Analyze • Containment/Eradication & Recovery • Post Incident Analysis/Documentation
Visible Impacts of Cyber Attacks • Attorney Fees • Breach Notification • Regulatory Fees • Technical Investigations
95% of the impacts of cyberattacks are “below the surface” or hidden Deloitte
Hidden Impacts of Cyber Attacks • Insurance Premium Increase • Operational Disruption • Recovery Effort • Post Incident Cybersecurity Investment • Loss of Customer Relationships • Loss of reputation • Loss of Intellectual Property
Impact Timeline • Immediate Impact • Customer Notification • Impact 1-2 years • Customer complaints & credit monitoring • Impact 3-5 years • Recovering lost customer relationships • Loss of investment and/or potential revenues
Cybersecurity Fundamentals • Endpoint Protection – Updated, Monitored, Managed • Edge Protection – Updated, Monitored, Managed • Network Monitoring • Backup, Backup, Backup • Redundancy – Eliminating Single Points of Failure
How are Cyber Security issues plaguing the healthcare industry? • Data breaches • Patient or employee information requiring disclosure and monitoring. • Intellectual property. Patents or trade secrets. • Rogue employees. Looking or revenge or monetization. • Operational impact • Shutdown of operations. • Loss of productivity and profits. • Ransomware • Holding your data hostage for money.
Cybersecurity protection is like insurance. • We must understand that prevention is the only way to protect against threats. • Most organizations don’t believe they are a target, when in fact nearly every business in the world has been scanned or targeted by hackers. (Online scanners map the world) • Some organizations do not see the value of assessments but we must understand the true cost of not being prepared.
The true cost of not being prepared • Code Spaces, Nirvanix, and MyBizHomePage are three $100M+ companies that went out of business after a major cyber attack. • Just like the Equifax hack, complacency cost these companies. • We can no longer have a head in the sand approach to cyber protections.
What can be done? • Most executives and stakeholders don’t know where to start. • Assessments, compliance, remediation and strategic planning is the cornerstone of a solid cybersecurity strategy. • We must start somewhere. Generally assessments are the first step. • Ensure we have the fundamentals covered. Antivirus, Firewall, Backups and Network Monitoring.
Why assessments first before hardware and software? • Most hackers make their way in undetected. • Average time inside the organization before detection is 6 months. (Dwell Time) • Without monitoring the right information, hackers can remain undetected. • There is generally no outward indication of intrusion.
IT is not Security. They are the biggest risk to your organization’s cybersecurity. • 9 times out of 10, our clients say “We have an IT department” as a means of conveying cyber protections. • IT staffers are generalists often with little or no cybersecurity knowledge or experience. • They are not trained on how to hunt threats within an organization nor how to actively monitor for intruders. • IT staff are presenting organizations with a false sense of security. • IT departments are the root cause of the global pandemic of cyber attacks, through willful ignorance & in order to protect their jobs. (WannaCry)
Independent, outside analysis. • Just like in financial auditing, you would not trust your on-staff accountants to audit your annual report. • IT teams work to cover up vulnerabilities, single points of failure, and incidents to protect their job. • Until now, they have worked unobserved and have been allowed to make policy and manage technology systems with no oversight. • Because executives are likely not technologically inclined, they trust the IT staff to honestly assess, implement, and review protections in place.
Assessments - Compliance • Compliance audits and assessments match criteria set by compliance body with results from your assessments. • Reports reflect degree to which the organization is compliant with compliance requirement. • Perpetual assessments are generally necessary to prove ongoing compliance. • Any deficiencies must be documented and remediation steps must progress towards compliance.
Assessments – Vulnerability and Penetration Testing • Generally used synonymously, but are very different. • Vulnerability assessments are used to start the path of understanding your infrastructure. (Network Mapping) • Vulnerability assessments show deficiencies and provide a road map to fix them. • Penetration testing is a real world hacking exercise to determine how susceptible the organization is to exploits. • Annual vulnerability testing and penetration testing is good cyber hygiene and can keep an organization on track with their cyber protections.
Assessments – Vulnerability • Vulnerability assessments begin with an accurate inventory of technology assets. • Most organizations are generally unaware of the number of assets currently on their network. • A topology map is designed showing the flow of information within the organization. This can be quite complex if the organization is multi-location, multi-national, etc. • Every item of technology will be assessed for vulnerabilities.
Assessments – Vulnerability • Every item of technology will be assessed for vulnerabilities. • Computers, workstations, laptops, tablets. • Servers, Linux / Windows / MAC / UNIX, etc. • WiFi controllers and access points. • Storage arrays. SAN, DAS, SAS, etc. • Switches and Routers. • Firewalls and Network Security Devices. • Cloud infrastructure and the connection to it. • IoT devices will be mapped and documented.