490 likes | 579 Views
Conventional Defenses + Unconventional Adversaries ???. Joshua Corman Director of Security Intelligence Akamai Technologies @ joshcorman. Joshua Corman. Director of Security Intelligence Akamai Technologies @ joshcorman. About Joshua Corman.
E N D
Conventional Defenses+Unconventional Adversaries??? Joshua Corman Director of Security Intelligence Akamai Technologies @joshcorman
Joshua Corman Director of Security Intelligence Akamai Technologies @joshcorman
About Joshua Corman • Director of Security Intelligence for Akamai Technologies • Former Research Director, Enterprise Security [The 451 Group] • Former Principal Security Strategist [IBM ISS] • Industry Experience: • Expert Faculty: The Institute for Applied Network Security (IANS) • 2009 NetworkWorldTop 10 Tech People to Know • Co-Founder of “Rugged Software” www.ruggedsoftware.org • Things I’ve been researching: • Compliance vs Security • Disruptive Security for Disruptive Innovations • Chaotic Actors • Espionage • Security Metrics
Relative Risk Replaceability IrreplaceableHighly Replaceable Human Life Intellectual PropertyPHI Credit Cards
2011 VZ DBIR Mission Accomplished (no, not really)
Key Points from 2011 VZ DBIR • All-Time High # of Incidents • All-Time Low # of Breached Records • Higher Value Records • All but one thing got worse • MOST cases SMB
2010 Unholy Trinity: • Google.cn and Operation Aurora • Stuxnet • Bradley Manning/WikiLeaks (and Operation Payback) • 2011: • Anonymous • EMC/RSA SecurID • Sony’s Punishment Campaign • LulzSec • Lockheed • IMF
20 Slides x 20 Seconds (6 min 40 sec) Joshua Corman @joshcorman Research Director Enterprise Security RSA 2011 PechaKuchaHappy Hour
Why Zombies Love PCI: or “No Zombie Left Behind Act” SPEAKER: Joshua Corman Research Director Enterprise Security The 451 Group PechaKucha Happy Hour
RSA Conference 2011 Zombies ++
Is PCI The No Child Left Behind Act for Information Security? • Early Adopters • Mainstream • Laggards
Disruptive Changes Evolving Threat Evolving Compliance Evolving Technology Cost Complexity Risk Evolving Economics Evolving Business
We broke the Information Security Market Evolving Threat HIPAA HITECH SOX GLB Evolving Compliance Evolving Technology Cost Complexity Risk Evolving Economics Evolving Business
94% 89% 0%
Survival Guide/Pyramid www.ruggedsoftware.org Defensible Infrastructure
Survival Guide/Pyramid Operational Discipline Defensible Infrastructure
Survival Guide/Pyramid Situational Awareness Operational Discipline Defensible Infrastructure
Survival Guide/Pyramid Countermeasures Situational Awareness Operational Discipline Defensible Infrastructure
Moore’s Law • Moore’s Law: • Compute power doubles every 18 months • HDMoore’sLaw: • Casual Attacker Strength grows at the rate of MetaSploit
Attacker Drop-Offs: Casual HDMoore’s Law
Does it matter? Was #18 in overall DBIR Top Threat Action Types used to steal INTELLECTUAL PROPERTY AND CLASSIFIED INFORMATION by number of breaches - (excludes breaches only involving payment card data, bank account information, personal information, etc)
Case Study: Zombie Killer of the Week? • Early Adopters • Mainstream • Laggards You Are Here
Case Study: Zombie Killer Countermeasures • LanCope • BigFix (IBM) • NetWitness (RSA) • Fidelis XPS • HBGary • FireEye • ArcSight (HP) Situational Awareness Operational Discipline Defensible Infrastructure A real use case of 'better security' in the face of adaptive adversarieshttp://www.the451group.com/report_view/report_view.php?entity_id=66991
Which classes of adversaries are we likely to face? • Which assets are most at risk as a consequence? • How tall do we need to be? • Table Top Exercises • An ounce of prevention? • Recovery may not be technical… • Failing Well
Q&A Joshua Corman Director of Security Intelligence, Akamai Technologies @joshcorman @RuggedSoftware jcorman@akamai.com