70 likes | 210 Views
Anatomy of an Attack. The “Community’ of Attackers. Organized, sophisticated supply chains (PII, financial services, retail). Criminals. Unsophisticated. Anti-establishment vigilantes. Terrorists. Nation state actors. PII, government, defense industrial base, IP rich organizations.
E N D
The “Community’ of Attackers Organized, sophisticated supply chains (PII, financial services, retail) Criminals Unsophisticated Anti-establishment vigilantes Terrorists Nation state actors PII, government, defense industrial base, IP rich organizations Organized crime Petty criminals Non-state actors “Hacktivists”Targets of opportunity PII, Government, critical infrastructure
Advanced Threats 1.0 Advanced Threats 2.0 Clear-text & custom protocol abc.com abc.com C2 Traffic C2 Traffic (port 80/443) SSL or other standards based encryption. Custom malware w/ no signature. Clear-text & normal protocol def.com def.com 1.2.3.4 1.2.3.4 3.7.9.1 8.2.3.3 Custom encryption def.com Content Inspection Protocol Anomalies Network Traffic Anomalies Known Bad Endpoints
Executive Checklist • Is your IT security organization functionally aligned with the greater IT infrastructure? • Outsourcer > Insourced Capabilities > SOC > etc. • Do you monitor the crown jewels of your organization and know where your most high value programs and assets are? • Does your organization have & practice a breach readiness plan, incident response, discovery & remediation process/procedures? • In addition to perimeter defenses (ingress), does there exist an egress defense strategy and approach to mitigate data exfiltration? • Is there a consistent 360 degree governance, risk and compliance practice in your organization? • Compliance, Regulatory, Legal, Corporate Policy, Communications & HR