Launch night presentation from Digital Shadows at London's Innovation Warehouse, August 3rd 2011.
Digital Shadows protects organisations from targeted attacks by reducing their exposure to hostile reconnaissance.
Developer Data Modeling Mistakes: From Postgres to NoSQL
How big is your shadow?
1. How big is your shadow? 03 August 2011 The Innovation Warehouse, London TM
2. Agenda Introductions What is a digital shadow? What are the implications? How do you regain control? Q&A
3. Q: What is a digital shadow? A: The trail left by an entity's interactions with the Internet For an organisation this may include: Technical information e.g. Server names Server locations Software versions Organisation information e.g. Locations Organisation structure Security practices Personal information e.g. Employee movements Friends Interests
4. A real example of a digital shadow This visualisation was produced by one of the visualisation tools we use Each node represents a data item discoverable from the Internet about an organisation
7. The evolving Internet is a real force for good We can collaborate and self-organise for the common good Haiti Earthquake Response – Open Streetmap critical in co-ordinating the relief effort Arab Spring use of social media has been a factor to the social revolution in the middle east We can share knowledge and experiences in ways hitherto impossible We are fully in favour of the social web!
8. Some interesting statistics Sources: Sophos, Max Planck Institute, Facebook Our own research indicates 72% of employees divulge information online that could be used in a targeted attack
9. Hostile reconnaissance 90% of the time a hacker spends is conducting reconnaissance. (CEH) 200% increase in targeted attacks (Cisco 2011) The risks are evolving with the Internet…
10. Risk area: hackers tools and techniques 1623 Google Search Terms used to Identify: sensitive documents, accidental leaks, misconfigured software and much much more… Enabled by tools Footprinting security research tools (example PatervaMaltego) APIs – attackers use for data mining the social web Specialist search engines now available for vulnerability scanning
11. Risk area: social engineering/coercion Hello IT.. Have you tried turning it off and on again? Certainly, I need you to answer a few security questions first. OK Mr Rhenholm, What’s your Telephone Extension Date of Birth? Name of line manager? Thank you Sir, your password is reset. It’s £Wednesday1970 I seem to have forgotten my password! I need to get to my files right now! OK, fire away! Sure, that’s 98-1234 Ahem, well that’s.. 1st April 1970 That would be RenholmSnr. Thank you! Good Bye!
12.
13.
14. Example: Tibetan human rights group attack Organisation information - Already obtained? Personal information - Already obtained? Technical information - Link would have collected the technical shadow: MS Office, Flash, Adobe Acrobat, browser etc. - Near-guarantees the success of a future attack Source: infowar-monitor.net
15. We need a solution... Aaah ! Aarrgh ! So what should be done to address these risks?
16. Five practical steps 1 Continue existing security programmes ✔ Continue existing security programmes Monitor your shadow 2 Set helpful guidelines 3 Clean up your shadow 4 Know your foe 5
17. Five practical steps 1 Continue existing security programmes ✔ Continue existing security programmes Monitor your shadow 2 Set helpful guidelines 3 Clean up your shadow 4 Know your foe 5
18. Our specialist services Risk Assessment Monitor your shadow Set helpful guidelines 1 2 3 Clean up your shadow 4 VIP Protect Organisation Monitoring Know your foe 5
20. Conclusion Your digital shadow is not benign We can help you regain control This is a job for specialists TM Protecting organisations from hostile reconnaissance and targeted cyber attacks
21. Digital Shadows Ltd 145 -157 St John Street London EC1V 4PY United Kingdom +44 (0)208 123 7894 enquiries@digitalshadows.com TM Digital Shadows Ltd is registered in England and Wales under No: 7637356. Registered office: 53 Gildredge Road, Eastbourne, East Sussex, BN21 4SF Copyright 2011 Digital Shadows Ltd. ALL RIGHTS RESERVED.
Editor's Notes
[Don TapscottWikiNomics quotes; The Wisdom of Crowds, Surowiecki; The Long tail]
Majority of security compromises are due to people not computers. As technical protection improves, we are seeing a shift to attacks masquerading as legitimate communications.Social engineering is critical, and relies on a good knowledge of the target, and tailoring the attack to suit.
"not for distribution" confidentialinurl:adminintitle:login
April 2011: A targeted cyber attack succeeded in breaching the security firm RSA to the cost of $66m in this quarter alone.Identified Adobe Flash vulnerabilityLocated email addresses and personal details of two HR workers and sent an attachment labeled “2011 Recruitment Plan”