Diese Präsentation wurde erfolgreich gemeldet.
Wir verwenden Ihre LinkedIn Profilangaben und Informationen zu Ihren Aktivitäten, um Anzeigen zu personalisieren und Ihnen relevantere Inhalte anzuzeigen. Sie können Ihre Anzeigeneinstellungen jederzeit ändern.

Data Security Dreams and Nightmares

82 Aufrufe

Veröffentlicht am

Video and slides synchronized, mp3 and slide download available at URL https://bit.ly/2SPDiez.

Alex Holden shares his lessons learned by observing and assisting with data breaches, and explains how to avoid them and what can be done to emerge successfully from a bad situation. It is a behind-the-scenes look into many major data breach dynamics. Filmed at qconnewyork.com.

Alex Holden is the founder and CISO of Hold Security. Under his leadership, Hold Security played a pivotal role in Information Security and Threat Intelligence, becoming one of the most recognizable names in its field. He is credited with the discovery of many high profile breaches including Adobe Systems and JPMorgan. In 2014, he discovered the largest breach of data to-date: Cybervor breach.

Veröffentlicht in: Technologie
  • Als Erste(r) kommentieren

  • Gehören Sie zu den Ersten, denen das gefällt!

Data Security Dreams and Nightmares

  1. 1. Alex Holden CISO - Hold Security, LLC www.holdsecurity.com SECURITY DREAMS AND NIGHTMARES
  2. 2. InfoQ.com: News & Community Site • 750,000 unique visitors/month • Published in 4 languages (English, Chinese, Japanese and Brazilian Portuguese) • Post content from our QCon conferences • News 15-20 / week • Articles 3-4 / week • Presentations (videos) 12-15 / week • Interviews 2-3 / week • Books 1 / month Watch the video with slide synchronization on InfoQ.com! https://www.infoq.com/presentations/ security-data-breach
  3. 3. Presented at QCon New York www.qconnewyork.com Purpose of QCon - to empower software development by facilitating the spread of knowledge and innovation Strategy - practitioner-driven conference designed for YOU: influencers of change and innovation in your teams - speakers and topics driving the evolution and innovation - connecting and catalyzing the influencers and innovators Highlights - attended by more than 12,000 delegates since 2007 - held in 9 cities worldwide
  4. 4. Who Am I? • IT Professional • Security Researcher • Hacker Hunter
  5. 5. Threat Intelligence • Staying ahead of hackers • 6,600,000,000 stolen credentials recovered • 4,000,000,000 botnet logs collected • 100,000,000 financial records recovered • 5,000,000 site compromises identified
  6. 6. My Resume
  7. 7. Terminology • Internet - Intended to be Public • Deep Web - Intended to be Private • Dark Web - Intended to be Hidden
  8. 8. Dark Web Components • Spam • Cash Out • Drugs • ID Theft • Ransomware • Injects • Cyber Warfare • Shop & Drop • Weapons • Verification • Denial of Service • Industrial Espionage • Defacement • Botnet • Hijacking • Impersonations • Viruses • 0days • Social scams (dating) • Hacktivism • Phishing • Crypting • Hacking
  9. 9. When You Do Security Right, Does Anyone Notice? • United Airlines • Changed authentication system to combat mass abuse • Bug bounty program • One of least preferred brands by hackers • JP Morgan Breach 2014 • Breach full impact never disclosed • $250,000,000 budget allocated toward security • No major incidents since
  10. 10. Practical Example • Medical Company X • Embraced Cloud • Embraced DevOps Culture • Serious Approach to Incidents • Hackathons and Blame-Free Bug Bounties • Security Liaisons Throughout the Business
  11. 11. • July 29, 2017 – Discovery • Struts2 exploit • 6 week delay • PANIC! What Happened?
  12. 12. What Went Wrong? • Single point of failure – struts 2? • No one watched on the inside? • Stealing tons of data goes unnoticed?
  13. 13. What Else is Wrong? • No consent data aggregation • Protection offered insufficient and self-serving • No recourse • Long term damage
  14. 14. How Secure is Equifax? admin admin
  15. 15. Yahoo! Breached – What Happened? 2013 Breach • Timing • 3 billion accounts breached • Secondary services • Actors • Data • Victims
  16. 16. 2014 Breach Recap • State-sponsored actors • 500 million records stolen • Who has the data? • Victims Yahoo! Breached – What Happened?
  17. 17. Late Disclosures • Breach disclosures in 2016 and what to expect in 2017? • Stale data can still be useful • Threat landscape change
  18. 18. Who Did This? •Hackers profile •Their intentions •Their next steps
  19. 19. What Did Russians Really Hack?
  20. 20. • Culture forced into hacking • Collaborative learning structure • Monetizing at any cost • Perceived enemies What Do We Know About the Russian Hackers?
  21. 21. Hackers View of Us “I’m fighting a holy war against the West… They drive their Rolls Royces and go home to their million-dollar houses, while people here are struggling. I will never harm my fellow Slavs; but America, Europe, and Australia deserve it.” • War of stereotypes - aqua (jabberzeus)
  22. 22. Russian State Sponsored Hacking • Covert Techniques • Targets • Information Exchange • Intelligence Use
  23. 23. Russian Activists • Motivation • Past Targets • Stake in US Elections • Group Goals
  24. 24. Security Human Intelligence + AI • Early stages of AI awareness • Fear of making mistakes • Not fully leveraged existing tools • AI advances in prediction and response • Learning curves
  25. 25. What Do We Do? • We will make mistakes! • Learning from your mistakes as an art form • Embrace Risk Management • *DLC – path of constant improvement
  26. 26. Please contact us at: aholden@HoldSecurity.com or www.holdsecurity.com THANK YOU!
  27. 27. Watch the video with slide synchronization on InfoQ.com! https://www.infoq.com/presentations/ security-data-breach

×