SlideShare ist ein Scribd-Unternehmen logo
1 von 299
Downloaden Sie, um offline zu lesen
Welcome to
Mark Stephen
Conference Chair
@bbcscotland
#scotsecure
Ray Bugg
DIGIT
@digitfyi
#scotsecure
www.digit.fyi
www.digitleaders.com
DI Eamonn Keane
Police Scotland
@policescotland
#scotsecure
What can we do to fight back?
Scot- Secure Conference
March 2017.
Agenda
Scottish, UK & Global Perspective!
The current threat landscape!
The challenges to LE & Policing!
The LE response - NCCU & Police Scotland!
Are we getting the message across?
What can we do to fight back?
Collaboration & Prevention.
Good News - Look Forward!
ORIGINAL HUB CONCEPT
SG/NCSC EUROPOL
POLICE / SENIOR TECH COMMUNITY /
INVESTIGATIONS .
TIER 4 – SCOTLAND’S TECH COMMUNITY
DEVELOPMENT
TIER 3 – ACADEMIA / R & D
TIER 2– SOC / TRUSTED PARTNERS
TIER 1– APPRENTICES / GRADUATES
Cyber Regional Organised Crime Units
Stalking
Bullying
Cyber Fraud
SOCG
Sexual Offenders
Indecent
images of
children
Cyber
dependent
crimes e.g.
hacking,
malware,
DDoS
Anti-socialbehaviour
CyberTerrorism
is impacting on the police response across
the full crime spectrum.
What we do know!!
• The cyber threat to UK business is significant
and growing.
• This threat is varied and adaptable.
• The rise of internet connected devices gives
attackers more opportunity!
• The past year has been punctuated by cyber
attacks on a scale and boldness not seen before!
• The UK & Scottish government is committed to making the UK a
secure and resilient digital nation
• Under-reporting.
Scenario 2 – Malware
Malware Phishing Ransom-
ware
Social
Engineer
Hacker
Some Brief Examples… The Usual Suspects
Key questions that all CEOs & CISO’s should
be asking this week?
• "Are we vulnerable to a cyber intrusion, SQL injection,
ransomware or DDoS based attacks?“
• "What assurance activity have we done to confirm that
we are not vulnerable?“
• "If we were compromised, would an attacker be able to
gain access to unencrypted sensitive data?“
• “Are we satisfied have we engaged sufficient 3rd party
security provision?"
• “What is our company ethos & posture on security?”
• “What and how vibrant is your overarching cyber security
policy?”
Cyber Attacks are on the rise
The Main Threats…
Hacktivism Organised Crime Espionage
• Hacking organisations they don’t
agree with
• Politically motivated
• Mainly defacement of websites
and public disclosure of
information
• Organised but disperse.
• Anonymous, New World Hacking,
Lizard Squad
• Well funded cyber crime groups
• Financially motivated
• Mainly ransomware, stealing of
personal info/credit card info, and
hacking.
• Highly organised and well funded
• Carbanak Cyber Gang, Janus Sec
etc.
• State sponsored
• Politically & Financially motivated
• Mainly covert hacking and custom
malware- targeting sensitive IP and
CNI.
• Extremely organised and well
funded
• TAO, APT 28, APT 17, Bureau 21
The Main Threats…
Bedroom Hackers
• Teenagers with a point to
prove
• Motivated by recognition and
quick cash
• Mainly defacement of
websites and public
disclosure of information
• Have been quite successful at
‘low hanging fruit.
• They have been individuals or
‘front people’ of a group
Growing Cadre of Hacking Groups
Anoymous!
LulzSec
Lizard Squad!
New World Hacking Team!
DD4BC!.
The Impact Team.
The Armada Collective!.
Syrian Electronic Army
16.66
PhantomSec
ORGANISED CRIME
The skillsets
• Feezan Hameed
• £60 - £113 million Frauds
• Vishing / Social engineering of
Banking customers
• Data acquired including account
details/passwords
• Money trasferred online – mule
account networks
• Uk wide investigation
• Numerous UK Law Enforcement
• Arrested in Paris on false passport
• Convicted and sentenced to 11 years
imprisonment
• Customer education?
Op Backbone
•UK Bank
•Frauds
•Exfiltration of bank customer data
•Bank employee
•Live customer data for sale on dark web
•Data used to commit further frauds
•Customer data recovered at home address
•Arrested / Convicted
•£23,000 seized POCA from account
•Print? Business Need/Auditable?
Operation Mouse - Police Scotland Website
Operation Vulcanalia
The NCCU/PSOS Operation Vulcanalia targeted
users of the Netspoof DDoS-for-hire tool.
Based on intelligence gathered by the West
Midlands Regional Cyber Crime Unit, a week of
action in December 2016 saw more than 60
individuals targeted, resulting in 12 arrests,
over 30 cease and desist notices served, two
cautions issued and one protective visit made.
The Avalanche network
was used as a delivery platform to launch and manage mass global
malware attacks and money mule recruiting campaigns. It has
caused an estimated EUR 6 million in damages in concentrated
cyberattacks on online banking systems in Germany alone. The
global effort to take down this network involved the crucial support
of prosecutors and investigators from 30 countries. As a result, 5
individuals were arrested, 37 premises were searched, and 39
servers were seized. Victims of malware infections were identified
in over 180 countries. Also, 221 servers were put offline through
abuse notifications sent to the hosting providers. The operation
marks the largest-ever use of sinkholing to combat botnet
infrastructures and is unprecedented in its scale, with over 800,000
domains seized, sinkholed or blocked.
Cyber Resilience is thorough Preparation
Overarching Cyber Security Strategy!
Pre-planned Exercise.
Incident Management & Response Plan.
Communications Strategy.
Investigative Strategy.
Incident Manager & Team
Gold, Silver, Bronze.
Mitigation & Recovery Strategy.
Logistics - Contingency
Scotland’s Future
• International Collaboration
• Government - L.E – Industry – Academia Collaboration
• Joint Working - Intelligence, Technical, Disruption
• Prevention/ Education
• Curriculum for 21st Century
• Upskill Children & Wider Population
• Target Harden Existing Business
• SBRC Role
• Cyber Security Grow as Industry Sector
Cyber Essentials &
Cyber Essential Plus
Cyber Essentials concentrates on five key controls.
These are:
1. Boundary firewalls and internet gateways
2. Secure configuration
3. Access control
4. Malware protection
5. Patch management
Fighting back: what can we do?
• Reporting means we can fight back!
• Cyber Policing Structure – NCCU - Regional Hubs- Prevention
• European & Global Co-operation EC3.
• Innovative Partnership’s.
• Organisational growth and transformation.
• Education, prevention & unprecedented collaboration.
– The Cyber Academy & Scottish Academia R & D.
– Inspire and enthuse - SQA National Progression Awards
– SBRC – Supporting vulnerable SMEs.
– Multi agency, multi disciplined teams protecting Scotland.
European Union General Data Protection
Regulation (GDPR)
Recap
• Cyber Essential
• Cyber Essentials plus
• Govt backed / Industry supported
• Basic Cyber security hygiene
• Report to Police / Certuk / Govcert
• Share - CiSP
• Intel / Europol – paints Cyber picture
• Human ! Staff education/awareness
• Staff privileges
• Nice v risk?
• Data breach test of scrutiny – did we REALLY do ALL we could?
Thank you for listening
Any Questions?
Eamonn.keane2@scotland.pnn.police.uk
Dr Keith Nicholson
Cyber Security Scotland
#scotsecure
SCOT-SECURE 2017
CYBER DEFENCE STRATEGY FOR
THREAT RISK REDUCTION
Dr Keith Nicholson
Cyber Security
Scotland
March 2017
Dr Keith Nicholson
Independent Cyber Security Advisor
• 25+ years’ experience in digital
technologies , IT audit and cyber
security
• Qualified in cyber security (CISM CISA)
• Scottish Government advisor in Cyber
Security
• Member Cross Public Sector Cyber
Group
• Member Cyber Leaders Board
• Advisor across Public Sector (e.g. SNH,
SEPA, SFC, Revenue Scotland)
Cyber Security
Scotland
Non-Profit Organisation
● established to provide
independent advice & services on
all aspects of cyber security to
public bodies to help create the
intelligent client.
● provides “honest-broker”
guidance on ICT, cyber security
strategy development, tender
specifications, procurement
exercises and project management
to deliver Best Value.
BUILDING A CYBER DEFENCE STRATEGY
Challenges: IT Team
 Management expectations on skills
 Winning investment & management buy-in
 Not just a technical issue
BUILDING A CYBER DEFENCE STRATEGY
Challenges: Board
 Lack of cyber understanding
 Failure to appreciate risk & ROI
 Belief technology is silver bullet
 Lack of integration of HR, Finance &
Procurement as well as IT in cyber
defence strategy
Cyber Defence:
BUILDING A RESILIENT ORGANISATION
 Secure technology
 Challenging suppliers - lifecycle & supply
chain
 Training and awareness in staff
 Policies & procedures in HR, Finance,
Procurement, IT
 Senior management responsibility
 Becoming an intelligent client: Know what
you don’t know
THREAT
RESEARCH
Threat Risk Areas
KEY CYBER THREAT
RISK AREAS
• Procurement
• Payroll
• Data Theft
• Disruption
THREAT VECTORS
• Culture &
Behaviours
(Poor and well-
intentioned)
• Technical
Goals
Credential theft; Financial gain; service disruption
Incident Patterns
NB: Classification can vary between sectors
Data Breach Patterns
Current Common Threats
• Malware – Ransomware
• Credential theft – webmail; keylogging
• Drive-by downloads from websites
• POS attacks
• DDoS – transactional servers / websites
• Web site defacement
• Dark web – malware / hackers for hire;
risk-reward model
TECHNICAL&PEOPLEBASED
Common attack vectors
BEHAVIOURAL
VULNERABILITIES
• Domestic technology use =
embedded behaviours
brought into workplace
• Changing attitudes to privacy
and sharing personal
information
TECHNICAL
• Phishing - Email – malware –
ransomware, key loggers
• Email attachments – e.g.
“invoices”
• Email – person pretext (e.g. I’m
xxx’s boss; CFO instructing invoice
approval)
• Vishing – elicitation of key
information in conversation
Threat Data
• Time to compromise – 82% in
minutes (phishing to steal
credentials)
• Time to exfiltration – 68% in days
(capture & export data)
• Detection deficit – only ca 20%
attacks detected within days1
• 68% attacks are malware, 32% by
pretext2
1 Verizon 2016 Data Breach Investigations Report
2 HMG, Ipsos MORI, University of Portsmouth,
Cyber Security Breaches Survey May 2016
• Oldies still goodies – top 10
vulnerabilities older than one year
• Software vulnerabilities – time
between publication and
exploitation:
– Adobe, Microsoft, Oracle fastest to be
compromised
– Apple and Mozilla slowest
• Helps focus patch management
CYBER DEFENCE
STRATEGY
5-Step Threat Reduction Strategy
1. Recognise the threat & take responsibility at
Board level – Exec & Non-Exec
2. Risk & Business Impact assessment of
technical & organisational vulnerabilities
3. Secure the technology
(resources prioritised via Risk & Business
Impact assessment)
4. Create a cyber-aware culture
5. Evolve to become an Intelligent Client
Becoming the Intelligent Client
 Recognise what you don’t know
(Known Unknowns) – Audit systems, policies &
procedures via “critical friend”
 Recognise you don’t know what you don’t know!
(Unknown Unknowns) – Get Directors and staff
training both technical and general awareness
 Challenge suppliers: service lifecycle and supply chain;
build security into procurement specifications
 Don’t rely only on supplier advice
(Audit Scotland)
 Seek “honest broker” independent advice where
needed
CYBER DEFENCE
ACTION PLAN
1. Assess and test Cyber Awareness Maturity level:
• At board level
• Amongst general staff
• Amongst technical teams
2. Undertake a Cyber Security audit with risk assessment to:
• Identify technical & cultural vulnerabilities and threats
• Prioritise resource allocations proportionate to risk
• Identify staff skills gaps
3. Create a staff development strategy for ongoing awareness
/ technical training
4. Develop a Proactive & Responsive Cyber Strategy, Policies
& Continuous Improvement Plan to address continuing and
changing threats
Cyber Defence Action Plan
Summary
• Needs Board & Senior Management commitment
– risk awareness, RoI and investment buy-in
• Cross-organisation responsibility:
– HR for OD, staff training and vetting; Finance, Procurement for fraud detection; IT for
technology
• Define your needs and challenges
– Technological as well as Staff and Suppliers via Gap Analysis
• Set realistic development plan & expectations
– Cultural change is not achieved overnight
• Keep your eye on the threat
– Staff development
– Continuous improvement plan
– Monitor, mentor, measure
THANK YOU
KEITH NICHOLSON
T: 01847 500 101
M: 07899 062 965
E: KNICHOLSON@CYBERSECURITY.SCOT
Jenny Radcliffe
Social Engineer & Negotiator
@Jenny_Radcliffe
#scotsecure
People Hacking
The Human Factor in Security
Jenny Radcliffe 2017©
Humans
Predictable?
Motivation
Motivation
Humans
Thank You!
@Jenny_ Radcliffe
www.jennyradcliffe.com
Rik Ferguson
Trend Micro
@rik_ferguson
#scotsecure
Ransomware, the scourge of 2016
Rik Ferguson
Vice President Security Research
Trend Micro
(Not so) Humble Beginnings
Ransomware Evolution
Ransomware Evolution
Image credit: www.botnets.fr
Ransomware Evolution - CryptoLocker
Ransomware in 2016
• 2016 Losses $1B
• 246 new families in 2016 alone
compared to 29 for 2015. 748%
increase.
• PhishMe Report: As of the end of
Q3’16, 97% of all phishing emails
contained crypto-ransomware
• InfoBlox Report: Ransomware
Domains Up By 35 fold In Q1’16
Ransomware Targeting Businesses
Ransomware Infection Vectors
UK Ransomware Survey
• Just over two thirds (69%) of UK ITDMs have heard about
ransomware and know how it works.
• Four fifths (82%) consider ransomware to be a threat to their
organization, while 18% do not.
• The average ransomware request received was £540, although for
20% of those infected, the request was more than £1,000.
• Nine in ten (89%) reported a time limit on paying the ransom, with
the time limit being 19 hours on average.
• Organizations affected by ransomware estimate they spent 33 man
hours on average fixing the issues caused by the ransomware
infection.
UK Ransomware Survey
• Two thirds (65%) ended up paying the ransom. However, only 45% of those
infected got their data back through this mean while 20% paid a ransom and did
not get their data back.
• The three most common reasons for paying the ransom:
– They were worried about being fined if the data was lost – 37%
– The data was highly confidential – 32%
– The ransom amount was low enough to count as cost to business – 29%
• Seven in ten (69%) think their organization will be targeted by ransomware in the
next 12 months.
• 77% have an incident response plan in case of infection with ransomware
– Only 44% have tested their incident response plan, while a third (33%) have a
plan in place without testing it.
Notable Ransomware Families
2016
A ROGUES GALLERY
2
Locky – Malicious Macros
Ransom_LOCKY is requesting
0.5 Bitcoin ransom ($209.27)
Crysis – A Hands-On Threat Actor
A sample infection flow of Crysis via an RDP brute force attack
Cerber A Ransomware Factory
It replaces the system's current wallpaper with the this image:
Stampado – Ransomware as a Service
Exploits and Exploit Kits in 2016
A DECLINING INDUSTRY?
2
The demise of the Exploit Kit?
Neutrino Price Increase
$3,500
$7,000
$0
$1,000
$2,000
$3,000
$4,000
$5,000
$6,000
$7,000
$8,000
Neutrino Price per Month
Before Angler Disappeared
After Angler Disappeared
Rate of Vulnerability Additions to Exploit Kits
Exploit Kit / Ransomware Relationship
Exploit Kit
Delivered Ransomware
(2015)
Delivered Ransomware
(2016)
Angler
CRYPWALL, CRYPTESLA,
CRILOCK
CRYPWALL, CRYPTESLA,
CRILOCK, WALTRIX,
CRYPMIC
Neutrino CRYPWALL, CRYPTESLA
CRYPWALL, CRYPTESLA,
CERBER, WALTRIX, LOCKY,
CRYPMIC
Magnitude CRYPWALL
CRYPWALL, CERBER,
LOCKY, MILICRY
Rig CRYPWALL, CRYPTESLA
GOOPIC, CERBER,
CRYPMIC, LOCKY,
CRYPHYDRA,
CRYPTOLUCK, MILICRY
Nuclear
CRYPWALL, CRYPTESLA,
CRYPCTB, CRYPSHED
CRYPTESLA, LOCKY
Sundown
CRYPTOSHOCKER, LOCKY,
PETYA, MILICRY
CVE-2013-2551
Affected software: Microsoft Internet Explorer® 6–10
Description: A use-after-free vulnerability that lets attackers remotely execute arbitrary code via a specially crafted site that triggers access to a
deleted object
CVE-2015-0311
Affected software: Adobe Flash Player 13.0.0.262, 14.x, 15.x, and 16.x–16.0.0.287 on Microsoft Windows® and 11.2.202.438 on Linux
Description: An Adobe Flash Player buffer overflow vulnerability that allows attackers to remotely execute arbitrary code via unknown vectors
CVE-2015-0359
Affected software: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before
11.2.202.457 on Linux
Description: An Adobe Flash Player memory corruption vulnerability that allows attackers to execute arbitrary code when the application is used;
failed exploitation attempts likely result in denial of service (DoS)
CVE-2014-0515
Affected software: Adobe Flash Player before 11.7.700.279 and 11.8.x–13.0.x before 13.0.0.206 on Microsoft Windows and Mac® OS X® and
before 11.2.202.356 on Linux
Description: An Adobe Flash Player buffer overflow vulnerability that occurs when parsing a compiled shader in a Flash object, which allows
attackers to run some processes and run arbitrary shellcode
CVE-2014-0569
Affected software: Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and before 11.2.202.411 on Linux
Description: An Adobe Flash Player remote integer overflow vulnerability that lets attackers execute arbitrary code via unspecified vectors
Top Vulnerabilities Within Exploit Kits
Ransomware Blocks in 2016
2016 Total:
~1B
Fundamental Best Practices
Employee Education
Awareness, best practices,
simulation testing
Keep Current with Patching
Minimize exploits of
vulnerabilities
Access Control
Limit access to business critical data
Back-up and Restore
Automated: 3 copies, 2 formats, 1
air-gapped from network
Smart Protection Network in 2016
… received 2.8T
reputation queries
from customers
… identified 130M
new unique threats
… Blocked 1B
ransomware threats
… blocked 81B
total threats
Thank You
Rik Ferguson
Trend Micro
@rik_ferguson
Questions
& Discussion
Refreshments
& Networking
How To Transform Technical
Security Data Into Business Ready
Metrics
Sean Lever
The Security Assurance Measurement Problem
Transforming Security Data into Business Metrics
How Tenable Helps Bridge the Gap
Agenda
The Security Assurance
Measurement Problem
“CISOs use existing security
metrics that are expressed in
technical security terms, and
are oriented toward technical
security decisions. They report
on what they can vs. what they
should.”
Gartner: Sharpen Your Security Metrics to Make
Them Relevant and Effective, July 10, 2015
BITS AND BYTES DON’T BELONG
IN THE BOARDROOM
“THANKS FOR THE 300 PAGE
SECURITY REPORT”
- Nobody, Ever, Said
51%Of CxOs believe there is a 1 in
4 chance that a data breach
will have a material impact on
their organisation
80%
Source: Securing the C-suite: - IBM Institute for Business Value, February 2016
Of CISO’s say their top risks
are increasing
Scale Venture Partners and Wisegate Survey, Assessing and Managing IT Security Risks, June 2014
COMPILINGMETRICS
CANBEDIFFICULT
Measured Quantity of
Malware Detected
According to the “State of
Metric Based Security” Survey
Transforming Security Data into
Business Ready Metrics
What is a Metric?
METRICSQUANTIFIABLE MEASURES
TRACK
TO
PERFORMANCE
ARE
METRICS
ROSETTA STONE
BUSINESS
O
F
COMMUNICATION
AR
ETHE
Aligning Metrics to the Business
Metric
Control
Policy
Objective
Monitoring
Control Activities
Risk Assessment
Control
Environment
Wisdom
Knowledge
Information
Data
Defining a Metric
Operations
Compliance
Reporting
Business
Objective
Security
Outcome
Policy
Statement
Control Metric
Examples
Operations
% Critical Systems Patched Within Target Days
% Critical Systems Without Updated Virus Definitions
Compliance
% Critical Systems Within Compliance
Reporting
<Metric> by Site/Location
<Metric> by Business Unit
Characteristics
1. Specific
2. Measurable
3. Actionable
4. Relevant
5. Timely
What is a SMART Metric?
How Do I Share Metrics?
Where Do I Start?
Security FrameworksBusiness Frameworks
National Cyber Security Centre (NCSC)
National Cyber Security Centre (NCSC)
National Cyber Security Centre (NCSC)
How Tenable Helps Bridge the
Gap
✓ Define security metrics that map to your unique
business objectives
✓ Collect comprehensive, reliable data to assess security
and compliance
✓ Use easy-to-read report card format to communicate
security posture to execs
✓ Validate that security program controls are in place and
delivering intended results to maximize your return on
investment
Measuring Security Assurance
INTEGRATED
PLATFORM
SCCV HOST
DATA
PASSIVE
LISTENING
INTELLIGENT
CONNECTORS
AGENT
SCANNING
ACTIVE
SCANNING
Cloud DevicesUsersEndpointNetworksWeb Virtual
Tenable Solution Components
Mobile
Assurance Report Cards
Operations
Compliance
Reporting
Business
Objective
Security
Objective
Policy
Statement
Control Metric
Tenable Critical Cyber Controls
ARCs for Specific Concerns
Geographic ARCs
Figuring out the “right” metrics and compiling them
can be challenging
Metrics provide clear insight into how successfully
well the IT security team is meeting security and
business objectives
Tenable’s sensors and ARCs help you turn technical
data into metrics executives can understand
Summary
• Read the eBook:
Using Security Metrics to Drive Action
• Download the Whitepaper:
Measuring Security Assurance – Turn Technical Data into Metrics
Executives Can Understand
Next Steps
Questions?
Social Engineering – A Career in Engineering whilst being on
the Social
The Art of Manipulating People
or
The Most Important Role for a Security
Practitioner is to Eradicate the Need to Pre-
Append words to the Term Security
The Greatest Risk we face as Risk Owners
are from those with whom we are sharing
the risk.
Person of Interest
Tatty Teddy Rick Steenfield
Practical Examples
Tatty Teddy
Twitter on Tatty Teddy
Over a number of years tweeted as fan.
On occasion principle retweeted.
Interaction Progressed to principle commenting.
Fan moves to interact in DM, principle replies
Fan tweets evolve becoming more personal
Tatty Teddy
Principle attempts to ignore and manage fan
Principle sensitively declines
Management Company running a competition
Winner of Meet & Greet announced.
Fan requests a meet & greet.
Fan interaction turns hostile
Fan makes direct threats and becomes hostile online
Tatty Teddy
> After being single all my life and approaching my 38th birthday, I've
> taken the plunge and signed up with POF. Have never had so much as a
> proper date in all my life, and it's been years since I was even
> remotely looked at by a woman, so I'm not expecting much.
>
> Having looked at who's available in my local area, there isn't much
> going. There are one or two women who are nice looking, but I look
> very young for my age, don't fancy women near to my own age (many
> 30-35s almost look old enough to be my mother), and I feel awkward at
> the thought of looking at women in their late 20s who I might actually
> find attractive. But I'd probably have nothing in common with them.
Tatty Teddy
Principle attempts to ignore and manage fan
Principle sensitively declines
Management Company running a competition
Winner of Meet & Greet announced.
Fan requests a meet & greet.
Fan interaction turns hostile
Fan makes direct threats and becomes hostile online
Tatty Teddy
Alexa Ray Joel
o Alexa, come away with me! I want to take you away! To a place where no-one
can ever hurt you! We can go anywhere. I know places. Places where we can be
alone~or in a big city.It doesn't matter. I want to live a "normal" life with you. I
want to watch you grow old with me, and maybe have a couple of children. You
can be anything you can imagine! A doctor, a factory worker, a scientist, a
photographer! Anything you want. I just have this dream of you and me in a
house and pets and you can be my wife, and I can be your loveslave. Anything
you want. It will be great! We can have a lot of fun together! So, get back to me!
Tell me to go to Hell, tell me that I'm crazy, just tell me how you feel. I love you
and I want you to be happy.
Alexa Ray Joel
Messages Start September 4rth
5th – Recounting a Nightmare.
7th – Message of Hate.
Last Message – 13th November.
Alexa Ray Joel
Alexa Ray Joel
Rick Steenfield – 20’s – Chicago – McDonalds .
Attended Gordon Central High School.
Legend going back to High School
Alexa Ray Joel
Alexa Ray Joel
Social Engineering - Profiling
What do you want~
Something about me being a lazy drink~I
waste~good
please!~Let me go!
Alexa Ray Joel
One of a handful reporting same geo location.
Similar Interests, Likes.
I envy you~the way you can sing
wrong~I just like them forever!
but here I go~up on the stage, anyway
Alexa Ray Joel
Alexa Ray Joel
Sheryl Finley [Billy Joel] hired a bodyguard to protect his
daughter and contacted [Paul] McCartney,
who recommended a Europe-based
private-security firm not bound by the
same legal restrictions as the police, [Post]
sources said.
McCartney's people found the stalker in
Austin, Minn.
Alexa Ray Joel
Securing People
Training, understanding, malice.
• Educate your colleagues.
• Educate your Stakeholders.
• You cant address this with technology.
Securing People
You do not know the people you are trusting.
• Recognise that as a Risk.
• Quantify the risk.
• Accept it or mitigate it.
Crime is on the increase
• Your stakeholders are being targeted.
• Sensitive Assets can take many forms.
• Its Risk introduced by cyber or just security
• Stop referring to cyber security.
Thank You
CYBER RESILIENCE…THINKING
BEYOND BUILDING THE
WALLS HIGHER
Rick Hemsley
March 23, 2017
SECURITY
ACCENTURE
Copyright © 2017 Accenture Security. All rights reserved. 175
BY THE NUMBERSDEFENDING AND EMPOWERING THE DIGITAL BUSINESS
STREAMLINE CLOUD MIGRATION ACTIVITIES BY 20%
YEARS OF EXPERIENCE
HELPING CLIENTS
SECURE THEIR
ORGANIZATIONS
20+
15,000+ SECURITY DEVICES
MANAGED
2 Security
Centers of
Excellence
Manila &
Buenos Aires
30
MILLION+
digital
identities
managed
>30x
FASTER
detection rates of
incidents for multiple
clients
5,000+ PEOPLE
330+clients spanning
67 countries
5,000+security risks mitigated / year
350+
pending and
issued patents related
to security
Cloud security, management and control for
20,000+ cloud computing instances
raw security
events
processed
daily5B+
Running some of
the largest
SIEM deployments
in the world
Cyber
Fusion
Centers4Bangalore
Prague
Washington, DC
Tel Aviv
Security analytics that handle
BILLIONS
of events
ONE
MILLION+
endpoints
managed
HOW OFTEN DO YOU HEAR ABOUT SECURITY IN DAY-
TO-DAY MEDIA STORIES?
A.
NEVER
B. C.
WEEKLY NEARLY DAILY
Copyright © 2017 Accenture Security. All rights reserved. 176
Thieves steal $101M; governor of
Bangladesh central bank resigns
FROM THE HEADLINES
© The Economist : The Dhaka Caper article, March 19, 2016.
www.identityforce.com/blog/oracle-data-breach
www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2016/6/
Yahoo hack: 1bn accounts
compromised by biggest data breach in
history
LinkedIn hack hits headlines again: Records
stolen to 117 million accounts
© The Guardian: Article by Sam Thielman, December 15, 2016.
Oracle Data Breach: MICROS System
Compromised by Hackers
Copyright © 2017 Accenture Security. All rights reserved. 177
WHAT HAVE WE TRADITIONALLY DONE?
Resistance
Copyright © 2017 Accenture Security. All rights reserved. 178
ATTACKERS MODIFY THEIR TACTICS
Copyright © 2017 Accenture Security. All rights reserved. 179
MODERN THREATS
CYBER CRIME OR CYBER ENABLED CRIME IS BIG BUSINESS AND COMPANIES ARE
TARGETED FOR THEIR DATA OR COMPANIES ARE TARGETED FOR THEIR MONETARY
BENEFITS (ONE AND SAME?)
Activist Groups
Corporate
Espionage
State Sponsored
Employees
or Partners
Organized Crime
Copyright © 2017 Accenture Security. All rights reserved. 180
SOPHISTICATED, WELL-FUNDED CYBERCRIMINALS ARE OUTPACING
DIGITAL BUSINESSES
ALTHOUGH THE RISE OF DIGITAL HAS REVOLUTIONIZED HOW BUSINESSES WORK
AND SERVE THEIR CUSTOMERS, IT HAS ALSO ADDED NEW DIMENSIONS OF RISK
23% increase in exposed
identities with nine mega-
breaches in 20151
Increase in Spear-Phishing
Campaigns Targeting Employees
20154
Increase in Ransomware moving beyond
PCs to smart phones, Mac, and Linux
systems2 OT systems next?
Costs to businesses per year
due to cyber attacks (initial
damage + ongoing disruption)5
Global corporate
spending on Cyber
Security by 20203
New unique pieces of
malware in 20151
References:
1 and 2. Symantec Internet Security Threat Report Apr 2016 [Mega-breach defined as >10 million records)
3. "Companies Lose $400 Billion to Hackers Each Year,” Inc., September 8, 2015.
4. Symantec Internet Security Threat Report Apr 2016
5. "Lloyd’s CEO: Cyber attacks cost companies $400 billion every year," Fortune, Jan 23, 2015
3
~.5
billion
35%
$ 170
billion
55%
430
million
$ 400
billion
Copyright © 2017 Accenture Security. All rights reserved. 181
THE VOLUME OF ATTACKS ATTAINS ITS OWN DARWINIAN
SOPHISTICATION
BEYOND CARBANAK AND SWIFT, CYBER RISK WILL CONTINUE TO MORPH AND BECOME
MORE SOPHISTICATED. AS THE CONTROLS IMPROVE, THE ATTACKS CHANGE.
Example
New
Cyber
Risks
People are the weakest link
• Social engineering / phishing
messages clever enough to fool
everyone
Greatest risks are cross silo
• Security vs
• Fraud vs
• Customer Risk vs
• Vendor Risk
Command and control:
• Clever mechanisms hide communication protocols once a
breach has happened, e.g. Amazon HTTP requests
Switch to Physical:
• USB drives, printers, computers or any other hardware that can
be compromised and then installed on the network
SMS:
• Weaknesses in the telecom infrastructure allow SMS based dual
factor authentication to be compromised
Ransomware attacks digital infrastructure:
• Exploiting Android and Apple iOS can wreak havoc on
applications, mobile devices and Internet of Things
Copyright © 2017 Accenture Security. All rights reserved. 182
NEW REGULATION = NEW REQUIREMENTS
WHAT IS THE GDPR?
THE GENERAL DATA PROTECTION REGULATION (GDPR) APPLIES TO ALL BUSINESSES WHO HAVE CUSTOMERS
AND/OR OPERATIONS WITHIN THE EUROPEAN UNION. BUSINESS HAVE NEW REQUIREMENTS TO MEET.
3X as many articles as the incumbent privacy
directive
18
months until new regulation is expected to
become fully enforceable
Member states have harmonised a
regulatory framework28
1
EU-level supervisory authority*
governing going forward
*however, there are many regulatory bodies (e.g.
FCA and PRA) that can take action against the Data
Controller or Data Processor
You need to report an incident
without undue delay to the
Supervisory Authority, no more
than 72 hours after finding it.
You’ll need to appoint a Data
Protection Officer if you monitor
on a large scale or process special
data.
Estimated DPO requirement: 28,000 in
EU, 75,000 globally
You’ll have tighter restrictions
around consent.
Get the consent balance right so
you don’t scare off customers.
You’ll need to cover more personal
data.
Now including physical,
physiological, economic, mental,
genetic, cultural & social identity.
You’ll need to be able to Erase all
of an individuals personal data
which is likely to be in many parts
of that organisation or with data
processors.
You’ll need to be able to give an
individual all of their personal
data. Where is it, what format, how
to extract it, how to port it, etc.
New Regulation
In reality, it means fines up to 4000X previous levels and personal liability for management and/or the
board.
New Requirements
Copyright © 2017 Accenture Security. All rights reserved. 183
WHAT IS CYBER RESILIENCE?
Cyber
Resilience
Overview:
It is the ability to operate the business processes in
normal and adverse scenarios without adverse
outcomes. Specifically, resiliency strengthens the
firm’s ability to identify, prevent, detect and respond
to process or technology failures and recover, while
reducing customer harm, reputational damage and
financial loss
External Sources
of Cyber Risk
• Hacktivism
• Hacker/Lone Wolf
• Nation State Attacks
• Insider Data Leakage
• Social Engineering
Internal Origins
of Cyber Risk
• Digital Banking Services
• Payments
• Electronic Trading
• Third Parties
• Technology Infrastructure
CYBER RISK CAN MANIFEST ITSELF ACROSS SEVERAL DIMENSIONS, MAKING IT
DIFFICULT TO DETECT, MEASURE, AND CONTROL
Common characteristics of resilient businesses:
• More secure processes and systems
• Strong controls with a strong control environment
• A solid risk culture
• Digitized and automated processes
Copyright © 2017 Accenture Security. All rights reserved. 184
PREPARE
Business strategy alignment
Assessment & architecture
Operating model governance
Risk & compliance
Culture change
Red-teaming
DETECT
Vulnerability management
Threat intelligence
Security monitoring
Cyber threat analytics
PREVENT
Digital identity
Application & data security
Platform &
infrastructure security
RESPOND
& RECOVER
Incident response
remediation
Business continuity
MOBILE ON PREMISES
CLOUD IoT
MORE SIMPILY?
Copyright © 2017 Accenture Security. All rights reserved.
Business-driven
Threat-centric
Digitally protected
Adaptive responses
Agile delivery
HOW DO WE ACHIEVE CYBER RESILIENCE?
Adopt a different mind set…
Understand our adversary, their objectives, strategies, tactics, and operating methods
Think about different threats …
Those inside the organisation often have the ‘keys to the kingdom’ yet can often be the cause, intentionally or
accidentally, of breaches
Organise ourselves …
Move beyond technical silos, think holistically about cyber across the organisation
Preparation is key …
Incident Response is critical and with GDPR it will only become more so
Copyright © 2017 Accenture Security. All rights reserved. 186
1. Not Measuring the right things  Move to business alignment
2. Assuming controls are sufficient  Stress test prove controls and people
3. Assume perimeter  Begin inside out
4. Static plans … doing the same thing over and over  Innovate
5. Limit security as a purely technical Issue  Everyone's mission H&S for 21st Century
6. Disengagement  All leadership aligned and communicating ‘singing from the same
hymn sheet’
WHAT ARE THE CHALLENGES WE NEED TO OVERCOME?
Copyright © 2017 Accenture Security. All rights reserved. 187
5 KEY PRIORITIES TO HELP MANAGE CYBER RISKS
EFFECTIVELY
Copyright © 2017 Accenture Security. All rights reserved. 188
1. Training and Risk Culture – Taking what is unique in your organization and infusing the right cyber risk
behaviors
2. Controls – Identify weak points – building a robust set of controls across operations, business and IT
3. Measurement with a Purpose – What is going on without your leadership’s knowledge – creating metrics
that expose the risks
4. Operating Model – How does your leadership work with the rest of the organization - assigning clear lines
of accountability and ownership
5. Resilience – At some point things will go wrong, be prepared (and have leadership prepared!)
PREPARE
Business strategy alignment
Assessment & architecture
Operating model governance
Risk & compliance
Culture change
Red-teaming
DETECT
Vulnerability management
Threat intelligence
Security monitoring
Cyber threat analytics
PREVENT
Digital identity
Application & data security
Platform &
infrastructure security
RESPOND
& RECOVER
Incident response
remediation
Business continuity
MOBILE ON PREMISES
CLOUD IoT
MORE SIMPILY AGAIN?
How do we
respond?
What is the
impact?
How do we
organize?
How do we
monitor?
Risk Identification – Aggregated set of typical risk
associated with Cyber Risk
Risk Events - Scenarios which can impact the
organization specific to cyber threats
Business and IT
Controls – Oversight of
the controls and their testing
programs and how to leverage
COBIT®, ISA, ISO/IEC, NIST controls
Operating Model –
Specifying the structure with people,
organization, roles, tools and processes
to govern
Detection and Identification – Tools and metrics to identify and log
aspects to mange operations
Operational Monitoring – Aligning the tools to identify and detect threats
along with their escalation and oversight
Event Response Plan – Structure to identify and
manage action plans
Crisis Management – Structure to manage
incidents and notify impacted parties
TO OPERATE AND GROW CONFIDENTLY IN A RAPIDLY EVOLVING
THREAT LANDSCAPE, ORGANIZATIONS NEED TO ADDRESS SECURITY
ON THREE DIMENSIONS
Copyright © 2017 Accenture Security. All rights reserved. 190
Empower business growth &
secure operations
Harden the organization to
make cyber attacks difficult
Detect and remediate
successful cyber attacks
Establish and maintain customer trust by meeting
expectations for the privacy and protection of
their data.
Maintain IT hygiene to eliminate exposure to
known vulnerabilities.
Use threat intelligence to anticipate cyber attacks
and take preemptive defense measures.
Enable capabilities that enhance customer and
employee experience.
Meet compliance and regulatory obligations.
Enable secure adoption of
new technologies.
Implement technology such as encryption and
two-factor authentication to increase the
difficulty of successful cyber attack.
Implement security discipline beyond the security
organization (e.g. secure coding, network
segmentation, training & awareness).
Detect in-flight cyber attacks.
Use red teams to test cyber
defense effectiveness.
Prepare and test incident
response plans.
Goal: Ensure that expectations for privacy and
compliance are met, and that the business is
protected from routine malicious behaviors.
Goal: Raise the cost of attack to adversaries,
reducing their incentive
to attack lower-value targets.
Goal: Detect & respond to successful cyber
attacks, minimize the impact of cyber attacks.
IF YOU TAKE NOTHING ELSE AWAY…
ADOPT A WHEN, NOT IF MINDSET …
PREPARE FOR BUSINESS DISRUPTION KNOW
WHAT YOU WILL DO …
& GDPR IS COMING!!!
Copyright © 2017 Accenture Security. All rights reserved. 191
THANK YOU
Man-in-the-Middle Application Security
Ian McGowan Bio
Ian is a Managing Consultant at Barrier Networks and has 18 years
experience working in network and application security.
He has worked as a web application security architect and application
security operations lead and understands the challenge organisations
face when trying to integrate security controls into the modern
software development life cycle.
Talk Overview
• Overview of Web Application Security challenges
• How Web Application Firewalling (WAF) can help
• Advances in WAF technology
• Anti-Fraud techniques
• Summary
Verizon DBIR 2016
Attack Surface
Data
Stolen User
Credentials/F
raud
Phishing Network
DDoS
Attacks
Application
Vuln Exploits
Recon.
Port scan
Attacks against
SSL Vul
Application attacksNetwork attacks Session attacks
DNS
Amplification/C
ache Poisioning Application
DDoS AttacksBotnet/SPAM
Man in the
Middle
Man In The
Browser
Clientside Attacks
DNS Attacks
Malware
Business Logic
Abuse
Data
Focus of Attacks
Stolen User
Credentials/F
raud
Phishing Network
DDoS
Attacks
Application
Vuln Exploits
Recon.
Port scan
Attacks against
SSL Vul
DNS
Amplification/C
ache Poisoning Application
DDoS AttacksBotnet/SPAM
Man in the
Middle
Man In The
Browser
DNS Attacks
Malware
Business Logic
Abuse
ATTACKS ARE DISPROPORTIONTELY TARGETING THESE AREAS
APPLICATION
PROTECTION
USER ACCESS AND
CREDENTIALS
DataApplication attacksNetwork attacks Session attacksClientside Attacks
DNS Attacks
Data
State of Application Delivery Report
Yearly report by F5 Networks
2200 responders
Understanding trends
Most popular application services deployed
Most important application services deployed
Application Services to be Deployed 2017
Top 3 Security Services Planned Globally
Most Important to Responders
WebApp Security Challenges
• Complexity of the application
• Complexity of the attacks
• User controls the Endpoint
SDLC Challenges
• Secure coding is difficult, expensive and slow.
• Developers are usually under time constraints
• The focus is on delivery and not security
• We need to change our approach to software
development
OWASP Top 10
Top 10 AppSec Risk
There are more than 10!
These aren’t going away
Time to adjust our approach?
Placement of Controls
Prevention is better
than a cure.
Closing the barn door…
Production vulnerability
Timelines to consider:
• Undetected period
• Time to mitigate
• Window of exposure
WAF is Effective
Firewall vs WAF
• Firewall is network focused
• NG Firewall is content focused
• WAF is application focused
Reverse Proxy Architecture
AppSec Policy Enforcement Point
WAF provides the ability to enforce policy
Positive vs Negative Policy
WAF Policy
WAF Benefits
• Mitigate SQLi
• Insecure Direct Object Reference
• Layer 7 DDoS Protection
• Session & Login Tracking
• Web Scraping Prevention
• Brute Force Attack Prevention
• XML Schema Validation
• JSON, AJAX and Web Services
DAST Integration
Dynamic Application Security Testing
• Early detection of vulnerabilities
• Continuous assessment
• Remediate code vulnerability in situ
• Automated virtual patches
Eurograbber Campaign
Financial Service Crimeware
Targeted Users
30,000 affected
Zeus Trojan & ZITMO
Stopped by Web Fraud Control
Eurograbber Campaign Overview
Step 2: Initial Compromise of the DOM
Step 2: DOM Injection
Step 3: Trojan Relays Mobile # to C2
Recap so far..
Step 4: SMS Sent by C2 / Dropzone
Step 5: Validation Request
Step: Exploitation Confirmation
Compromise Success / Failure Logic
Complexity of Attack
Next Steps
Laptop/PC & Mobile Device are now compromised.
What next?
Trojan Operation
Web Fraud Prevention Benefits
• Detection of DOM compromise
• Application level encryption
• Automated action detection
Web Fraud Control Efficacy
Major European Bank:
“…detected and blocked fraudulent transactions in the
sum of 500,000 Euro in two days.
…ROI on the pilot first two days – that’s a new thing in
the security field ...”
Take Aways
• AppSec controls have advanced significantly.
• We must adjust our approach before it’s too late.
• Layered defence.
Clientless solution,
enabling 100% coverage
Protect Online User
Desktop, tablets &
mobile devices
On All Devices
No software or user
involvement required
Full Transparency
Targeted malware, MITB,
zero-days, MITM,
phishing automated
transactions…
Prevent Fraud
Alerts and customizable
rules
In Real Time
Scot Secure 2017
Thank you!
Welcome Back
Dan Hunt
Lloyds Banking Group
#scotsecure
EVERYTHING YOU WANTED
TO KNOW ABOUT PHISHING
BUT WERE TOO AFRAID TO CLICK
Dan Hunt, Lloyds Banking Group
Brief Introduction
• Etymology: Phreaking (Phone Hacking) + Fishing
• Definition: “Phishing is the attempt to coerce
recipient action, often for malicious reasons, by
disguising oneself as a trustworthy entity in
electronic communications”
• Effectively a con trick, same as any other
• Concepts can be applied to other -ishings;
• Vishing: Voice-based
• Smishing: SMS-based
• Phishing emails can be used to harvest sensitive data
and deploy malware
• Unsuccessful phishing attempts can be used to infer how
well-protected an organisation is
• It is very, very easy and very, very effective
• Average engagement-rate is 20%
• ROI is high
Why?
Who?
Phishing
- Mass audience
- Low sophistication, generic (Delivery/HMRC scams)
Spear Phishing
- Targeted at SMEs / high risk colleagues
- Tailored content (Conferences, subscriptions)
Whaling
- Targeted at CEOs / Exec level
- Highly tailored content
- Long-game strategy (Waterholes etc)
How?
How?
Data harvested
Malware deployed
What? (Strategic)
• Reduce the engagement rate on phishing emails;
• Gateway filtering & blocking
• Employee Education & Testing:
• Studies find that the 20% click rate falls to 13%
percent if employees go through just three
simulation exercises, to 4% after
the fourth and 0.2% after the fifth.
• Have colleagues know what to do
and who to tell.
What? (Immediate)
• Awareness of Red Flags
• Mismatch of sender imagery
• Impersonal (Dear Customer)
• Misspellings
• False sense of urgency
• Email/web domains don’t match
What? (Final Thoughts)
When sent an email that you’re not expecting, even if
it appears to be from someone you know, consider the
following;
• WHY am I being sent this email?
• WHO is sending it to me?
• WHAT do they want me to do?
• WHERE could it lead me?
THINK BEFORE YOU CLICK
Stu Hirst
Skyscanner
@StuHirstInfoSec
#scotsecure
DevSecOps
A 2-year journey of success &
failure!
@StuHirstinfosec
Skyscanner
TIRED??!!!
@StuHirstinfosec
Skyscanner
@StuHirstinfosec
Skyscanner
@StuHirstinfosec
Skyscanner
@StuHirstinfosec
Skyscanner
@StuHirstinfosec
Who are we?
What do I do?
What am I presenting?
Skyscanner 2014
Skyscanner Security in 2014…
Skyscanner 2017
Skyscanner Security in 2017…
WE HAVE A LOGO
N’ EVERYTHING!
@StuHirstinfosec
Strategy…
@StuHirstinfosec
Skyscanner 2017
My most successful strategy?
ISO27001?
Cyber Essentials?
BSIMM?
A.N.Other?
Nope, it’s been speaking to people
and sharing learnings. @StuHirstinfosec
Skyscanner 2017
Longer term;
Split security into focused
areas; we now have SECOPS
and PRODUCT SECURITY
@StuHirstinfosec
AWS…
@StuHirstinfosec
Skyscanner 2017
@StuHirstinfosec
1. TEACH
2. CONTINUOUS AUDITING &
ALERTING
3. OPEN SOURCE TOOLING
(Scout2, SecurityMonkey etc)
4. AUTOMATION
Adventures in Bug
Bounties…
@StuHirstinfosec
Skyscanner 2017
Initial scheme – Qualys scans
2 week scheme – glut!
365 scheme – needs constant
researcher rotation, refuse to pay
for crap bugs, weed out the XSS
guys!
@StuHirstinfosec
Skyscanner 2017
Ideal outcomes;
• Weed out certain types of bug in
your code altogether
• Make researchers work harder
for their cash!
• Scale the scheme &
make it more valuable
over time
@StuHirstinfosec
DevOps & Security
NOT
DevOps & Security
2FA…
@StuHirstinfosec
Two-factor
Two-Factor All The
Things
• VPN
• Windows / MAC
Login
• Web portals
• Apps
• SSO
Data (especially PII)…
@StuHirstinfosec
User Data
User Data Implemented new MINIMUM STANDARDS for
user data
Privacy BY DESIGN!
Examples;
• Only stored in agreed places (e.g. AWS)
• Minimum encryptions levels when
transferring
• Same for data at rest (AES256)
• Bcrypt / Argon2 for hashing
• Only using TLS
• Get rid of old ciphers
• Segment the network
• Tighten up access controls to the data
@StuHirstinfosec
Passwords…
@StuHirstinfosec
Skyscanner 2017
@StuHirstinfosec
• Get rid of credentials in code;
GitHub/GitLab etc
• Credstash
• Git Secrets
• GitLeaks (have fun!)
Skyscanner 2017
Passwords in Plain Text?!
Dude, it’s 2017.
@StuHirstinfosec
Two-factor/Passwords
Password solutions
@StuHirstinfosec
SIEM…
@StuHirstinfosec
Skyscanner 2017
There are lots of SIEM solutions
BUT HOW ARE
YOU USING
THEM?!
@StuHirstinfosec
Skyscanner 2017
@StuHirstinfosec
Skyscanner 2017
@StuHirstinfosec
Skyscanner 2017
Endpoint Protection…
@StuHirstinfosec
Anti malware
Endpoint Protection
Awareness…
@StuHirstinfosec
What we do…
What we do: Security Champions
@StuHirstinfosec
What we do…
What we do: Crypto & Bug Challenges
@StuHirstinfosec
Hosted in AWS –
cheap, easy to
build!
What we do…
What we do: Crypto & Bug Challenges
@StuHirstinfosec
Security Swag -
everyone loves t-
shirts & stickers!
What we do…
What we do: Security Meet Up
@stuhirstinfosec
Employees
Employee behaviour….blog post
Take Humans out of the
equation…
@StuHirstinfosec
Phishing
Phishing – why not take humans
out of the equation?
• Sandbox links &
attachments
(Uber built this
themselves)
• Protect against
Impersonation
Learning (especially
from failure!) …
@StuHirstinfosec
Culture
Culture -No fear
“This is the moment of my failure and I am not scared”
What we do
Announcing failure…
Weekly PRODOPS
Review
NO BLAME! It’s a learning exercise
@StuHirstInfosec
What we do
Learning…
Cybrary, PluralSight, Twitter, Blogs
Some thoughts to leave
you with…
Stats
Not everything is critical!
• Simple and quick wins are GOOD wins!
• Try and increase the likelihood of an employee telling
you about an event or potential attack
• Run attack simulations. Break something before
someone else does!
FORGET ABOUT TRYING TO REDUCE MEANINGLESS STATS
IF YOU GO FROM 48% TO 32% ON FIRE, YOU’RE STILL ON FIRE!
(Zane Lackey, ex-Etsy)
Scaremongering
Security Scaremongering
Scaremongering
Security Scaremongering
Scaremongering
Security Scaremongering
“The greatest period of impact was from
February 13 and February 18 with around 1 in
every 3,300,000 HTTP requests through
Cloudflare potentially resulting in memory
leakage (that’s about 0.00003% of requests)”
Some thoughts to take away
Reward people…
For making you aware of
issues.
You feel good, they feel good
& they’re likely to tell others.
What next?
Shout about your successes!
• Security is as
important as any
other business unit
• So shout about
successes you have
• Positive PR across
the business
thank you
@stuhirstinfosec
Learn with Skyscanner
• Follow Skyscanner @CodeVoyagers
on Twitter
• Read a backlog of our learnings at
codevoyagers.com
• Sign up for our Skyscanner Code
Voyagers newsletter learnings from
our successes and failures or search
http://9nl.it/scotsecure_cvnewsletter
Prof Bill Buchanan
Edinburgh Napier Uni
@billatnapier
#scotsecure
Questions
& Discussion
Drinks
& Networking
www.digitleaders.com

Weitere ähnliche Inhalte

Was ist angesagt?

Digital marketing a quick run through
Digital marketing a quick run throughDigital marketing a quick run through
Digital marketing a quick run throughMark Hayward
 
ThinkDigital - Social Media at Work
ThinkDigital - Social Media at WorkThinkDigital - Social Media at Work
ThinkDigital - Social Media at Worktwintangibles
 
Digital Transformation in Governments
Digital Transformation in GovernmentsDigital Transformation in Governments
Digital Transformation in GovernmentsScopernia
 
Digital Transformation: a model to master disruption
Digital Transformation: a model to master disruptionDigital Transformation: a model to master disruption
Digital Transformation: a model to master disruptionScopernia
 
BIGITMY2015
BIGITMY2015BIGITMY2015
BIGITMY2015Bryan C.
 
BIGITUAE201
BIGITUAE201BIGITUAE201
BIGITUAE201Bryan C.
 
Intelligent Automation 2019
Intelligent Automation 2019Intelligent Automation 2019
Intelligent Automation 2019Ray Bugg
 
How to use digital and social media to improve your social enterprise brand s...
How to use digital and social media to improve your social enterprise brand s...How to use digital and social media to improve your social enterprise brand s...
How to use digital and social media to improve your social enterprise brand s...Dinis Guarda
 
CIO Focus Summit workshop - strategic building blocks for your digital trans...
CIO Focus Summit workshop  - strategic building blocks for your digital trans...CIO Focus Summit workshop  - strategic building blocks for your digital trans...
CIO Focus Summit workshop - strategic building blocks for your digital trans...David Terrar
 
Expert talk strategic building blocks for the digital transformation strategy
Expert talk   strategic building blocks for the digital transformation strategyExpert talk   strategic building blocks for the digital transformation strategy
Expert talk strategic building blocks for the digital transformation strategyDavid Terrar
 
Redefining the digital workplace
Redefining the digital workplaceRedefining the digital workplace
Redefining the digital workplaceDavid Terrar
 
The 7 Principles of Digital Business Strategy & Transformation
The 7 Principles of Digital Business Strategy & TransformationThe 7 Principles of Digital Business Strategy & Transformation
The 7 Principles of Digital Business Strategy & TransformationNiall McKeown
 
Building an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks BrisbaneBuilding an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks BrisbaneThoughtworks
 
Presentation at FPA Conf (Naperville, IL Sept 1, 2015)
Presentation at FPA Conf (Naperville, IL Sept 1, 2015)Presentation at FPA Conf (Naperville, IL Sept 1, 2015)
Presentation at FPA Conf (Naperville, IL Sept 1, 2015)Jeffrey R. Carter
 
Digital transformation: Managing the change
Digital transformation: Managing the changeDigital transformation: Managing the change
Digital transformation: Managing the changePatrizia Bertini
 
Transformation is not digital, it's constant
Transformation is not digital, it's constantTransformation is not digital, it's constant
Transformation is not digital, it's constantAyal Levin
 
#AIIM16 wrap up -- what did it all mean?
#AIIM16 wrap up -- what did it all mean?#AIIM16 wrap up -- what did it all mean?
#AIIM16 wrap up -- what did it all mean?John Mancini
 
Digital Transformation 2018 - Edinburgh
Digital Transformation 2018 - EdinburghDigital Transformation 2018 - Edinburgh
Digital Transformation 2018 - EdinburghRay Bugg
 
Business case for deploying online collaboration across organisational bounda...
Business case for deploying online collaboration across organisational bounda...Business case for deploying online collaboration across organisational bounda...
Business case for deploying online collaboration across organisational bounda...David Terrar
 

Was ist angesagt? (20)

Digital marketing a quick run through
Digital marketing a quick run throughDigital marketing a quick run through
Digital marketing a quick run through
 
ThinkDigital - Social Media at Work
ThinkDigital - Social Media at WorkThinkDigital - Social Media at Work
ThinkDigital - Social Media at Work
 
Digital Transformation in Governments
Digital Transformation in GovernmentsDigital Transformation in Governments
Digital Transformation in Governments
 
Digital Transformation: a model to master disruption
Digital Transformation: a model to master disruptionDigital Transformation: a model to master disruption
Digital Transformation: a model to master disruption
 
BIGITMY2015
BIGITMY2015BIGITMY2015
BIGITMY2015
 
BIGITUAE201
BIGITUAE201BIGITUAE201
BIGITUAE201
 
Intelligent Automation 2019
Intelligent Automation 2019Intelligent Automation 2019
Intelligent Automation 2019
 
How to use digital and social media to improve your social enterprise brand s...
How to use digital and social media to improve your social enterprise brand s...How to use digital and social media to improve your social enterprise brand s...
How to use digital and social media to improve your social enterprise brand s...
 
CIO Focus Summit workshop - strategic building blocks for your digital trans...
CIO Focus Summit workshop  - strategic building blocks for your digital trans...CIO Focus Summit workshop  - strategic building blocks for your digital trans...
CIO Focus Summit workshop - strategic building blocks for your digital trans...
 
Expert talk strategic building blocks for the digital transformation strategy
Expert talk   strategic building blocks for the digital transformation strategyExpert talk   strategic building blocks for the digital transformation strategy
Expert talk strategic building blocks for the digital transformation strategy
 
Redefining the digital workplace
Redefining the digital workplaceRedefining the digital workplace
Redefining the digital workplace
 
Harvey Nash Technology Survey 2016
Harvey Nash Technology Survey 2016Harvey Nash Technology Survey 2016
Harvey Nash Technology Survey 2016
 
The 7 Principles of Digital Business Strategy & Transformation
The 7 Principles of Digital Business Strategy & TransformationThe 7 Principles of Digital Business Strategy & Transformation
The 7 Principles of Digital Business Strategy & Transformation
 
Building an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks BrisbaneBuilding an Equitable Tech Future - By ThoughtWorks Brisbane
Building an Equitable Tech Future - By ThoughtWorks Brisbane
 
Presentation at FPA Conf (Naperville, IL Sept 1, 2015)
Presentation at FPA Conf (Naperville, IL Sept 1, 2015)Presentation at FPA Conf (Naperville, IL Sept 1, 2015)
Presentation at FPA Conf (Naperville, IL Sept 1, 2015)
 
Digital transformation: Managing the change
Digital transformation: Managing the changeDigital transformation: Managing the change
Digital transformation: Managing the change
 
Transformation is not digital, it's constant
Transformation is not digital, it's constantTransformation is not digital, it's constant
Transformation is not digital, it's constant
 
#AIIM16 wrap up -- what did it all mean?
#AIIM16 wrap up -- what did it all mean?#AIIM16 wrap up -- what did it all mean?
#AIIM16 wrap up -- what did it all mean?
 
Digital Transformation 2018 - Edinburgh
Digital Transformation 2018 - EdinburghDigital Transformation 2018 - Edinburgh
Digital Transformation 2018 - Edinburgh
 
Business case for deploying online collaboration across organisational bounda...
Business case for deploying online collaboration across organisational bounda...Business case for deploying online collaboration across organisational bounda...
Business case for deploying online collaboration across organisational bounda...
 

Andere mochten auch

Big Data Scotland 2016
Big Data Scotland 2016Big Data Scotland 2016
Big Data Scotland 2016Ray Bugg
 
Valley Elementary STEAM training
Valley Elementary STEAM trainingValley Elementary STEAM training
Valley Elementary STEAM trainingTina Coffey
 
Capital Secreta Do Mundo
Capital Secreta Do MundoCapital Secreta Do Mundo
Capital Secreta Do MundoMarizeCamara
 
La banca: De la Usura al Narcolavado
La banca: De la Usura al NarcolavadoLa banca: De la Usura al Narcolavado
La banca: De la Usura al NarcolavadoFa Zu
 
Introducción a los estándares hl7 v2
Introducción a los estándares hl7 v2Introducción a los estándares hl7 v2
Introducción a los estándares hl7 v2Mandirola, Humberto
 
7.14.6 Технический справочник Schneider Electric 2015
7.14.6 Технический справочник Schneider Electric 20157.14.6 Технический справочник Schneider Electric 2015
7.14.6 Технический справочник Schneider Electric 2015Igor Golovin
 
MINNEBAR Minnesota Food Influencer Campaign Launch 3-17
MINNEBAR  Minnesota Food Influencer Campaign Launch 3-17MINNEBAR  Minnesota Food Influencer Campaign Launch 3-17
MINNEBAR Minnesota Food Influencer Campaign Launch 3-17Wendy Meadley
 
No pierdas al cliente en el último clic
No pierdas al cliente en el último clic No pierdas al cliente en el último clic
No pierdas al cliente en el último clic Arsys
 
NECSTon - Project Presentation
NECSTon - Project PresentationNECSTon - Project Presentation
NECSTon - Project PresentationNECSTon
 
Italiaanse winkel Sophie Dutordoir heeft nieuwe uitbater
Italiaanse winkel Sophie Dutordoir heeft nieuwe uitbaterItaliaanse winkel Sophie Dutordoir heeft nieuwe uitbater
Italiaanse winkel Sophie Dutordoir heeft nieuwe uitbaterThierry Debels
 
Displaying server-side OData messages in ui5 (Ui5con 2017)
Displaying server-side OData messages in ui5 (Ui5con 2017)Displaying server-side OData messages in ui5 (Ui5con 2017)
Displaying server-side OData messages in ui5 (Ui5con 2017)Nabi Zamani
 
Cluster Electricity Savings
Cluster Electricity SavingsCluster Electricity Savings
Cluster Electricity SavingsDavid Lipschitz
 
Villa van Christoff De Bolle staat te koop
Villa van Christoff De Bolle staat te koopVilla van Christoff De Bolle staat te koop
Villa van Christoff De Bolle staat te koopThierry Debels
 
Apresentação do manuelmanero.pt
Apresentação do manuelmanero.ptApresentação do manuelmanero.pt
Apresentação do manuelmanero.ptManuel Manero
 
The Influence of Cultural Relativism
The Influence of Cultural RelativismThe Influence of Cultural Relativism
The Influence of Cultural RelativismRamya Mahalingam
 

Andere mochten auch (20)

Big Data Scotland 2016
Big Data Scotland 2016Big Data Scotland 2016
Big Data Scotland 2016
 
Valley Elementary STEAM training
Valley Elementary STEAM trainingValley Elementary STEAM training
Valley Elementary STEAM training
 
Capital Secreta Do Mundo
Capital Secreta Do MundoCapital Secreta Do Mundo
Capital Secreta Do Mundo
 
La banca: De la Usura al Narcolavado
La banca: De la Usura al NarcolavadoLa banca: De la Usura al Narcolavado
La banca: De la Usura al Narcolavado
 
Lomce boe a-2013-12886
Lomce boe a-2013-12886Lomce boe a-2013-12886
Lomce boe a-2013-12886
 
Introducción a los estándares hl7 v2
Introducción a los estándares hl7 v2Introducción a los estándares hl7 v2
Introducción a los estándares hl7 v2
 
7.14.6 Технический справочник Schneider Electric 2015
7.14.6 Технический справочник Schneider Electric 20157.14.6 Технический справочник Schneider Electric 2015
7.14.6 Технический справочник Schneider Electric 2015
 
MINNEBAR Minnesota Food Influencer Campaign Launch 3-17
MINNEBAR  Minnesota Food Influencer Campaign Launch 3-17MINNEBAR  Minnesota Food Influencer Campaign Launch 3-17
MINNEBAR Minnesota Food Influencer Campaign Launch 3-17
 
No pierdas al cliente en el último clic
No pierdas al cliente en el último clic No pierdas al cliente en el último clic
No pierdas al cliente en el último clic
 
Kesadaran dan mimpi
Kesadaran dan mimpiKesadaran dan mimpi
Kesadaran dan mimpi
 
NECSTon - Project Presentation
NECSTon - Project PresentationNECSTon - Project Presentation
NECSTon - Project Presentation
 
Italiaanse winkel Sophie Dutordoir heeft nieuwe uitbater
Italiaanse winkel Sophie Dutordoir heeft nieuwe uitbaterItaliaanse winkel Sophie Dutordoir heeft nieuwe uitbater
Italiaanse winkel Sophie Dutordoir heeft nieuwe uitbater
 
Google Container Engine を始めてみよう
Google Container Engine を始めてみようGoogle Container Engine を始めてみよう
Google Container Engine を始めてみよう
 
Displaying server-side OData messages in ui5 (Ui5con 2017)
Displaying server-side OData messages in ui5 (Ui5con 2017)Displaying server-side OData messages in ui5 (Ui5con 2017)
Displaying server-side OData messages in ui5 (Ui5con 2017)
 
Cluster Electricity Savings
Cluster Electricity SavingsCluster Electricity Savings
Cluster Electricity Savings
 
Intro to DevOps
Intro to DevOpsIntro to DevOps
Intro to DevOps
 
Back to pre Trump
Back to pre TrumpBack to pre Trump
Back to pre Trump
 
Villa van Christoff De Bolle staat te koop
Villa van Christoff De Bolle staat te koopVilla van Christoff De Bolle staat te koop
Villa van Christoff De Bolle staat te koop
 
Apresentação do manuelmanero.pt
Apresentação do manuelmanero.ptApresentação do manuelmanero.pt
Apresentação do manuelmanero.pt
 
The Influence of Cultural Relativism
The Influence of Cultural RelativismThe Influence of Cultural Relativism
The Influence of Cultural Relativism
 

Ähnlich wie Scot Secure 2017

Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UKNapier University
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumDavid Crozier
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119David Doughty
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]APNIC
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyShiva Bissessar
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?Thomas Malmberg
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Morakinyo Animasaun
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Ray Bugg
 
Scot Secure 2016
Scot Secure 2016Scot Secure 2016
Scot Secure 2016Ray Bugg
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterPeter Jones
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Joe Bartolo
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...XeniT Solutions nv
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin OCTF Industry Engagement
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Morakinyo Animasaun
 

Ähnlich wie Scot Secure 2017 (20)

Investigating Cybercrime in the UK
Investigating Cybercrime in the UKInvestigating Cybercrime in the UK
Investigating Cybercrime in the UK
 
Cybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity ForumCybersecurity Threats - NI Business Continuity Forum
Cybersecurity Threats - NI Business Continuity Forum
 
Showreel ICSA Technology Conference
Showreel ICSA Technology ConferenceShowreel ICSA Technology Conference
Showreel ICSA Technology Conference
 
David doughty presentation 181119
David doughty presentation 181119David doughty presentation 181119
David doughty presentation 181119
 
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
CERT Australia Update, by Scott Brown [APNIC 38 / Network Abuse BoF]
 
Achieving Caribbean Cybersecuirty
Achieving Caribbean CybersecuirtyAchieving Caribbean Cybersecuirty
Achieving Caribbean Cybersecuirty
 
APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?APT or not - does it make a difference if you are compromised?
APT or not - does it make a difference if you are compromised?
 
Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017Clear and present danger: Cyber Threats and Trends 2017
Clear and present danger: Cyber Threats and Trends 2017
 
Digital Energy 2018 Day 2
Digital Energy 2018 Day 2Digital Energy 2018 Day 2
Digital Energy 2018 Day 2
 
Scot Secure 2016
Scot Secure 2016Scot Secure 2016
Scot Secure 2016
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
2014 Conference Brochure - GRC 2.0 Breaking Down the Silos
 
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
WCIT 2014 Som Mittal - Managing risks in an interdependent economy risks rela...
 
Torbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security ClusterTorbay Business Forum with the South West Cyber Security Cluster
Torbay Business Forum with the South West Cyber Security Cluster
 
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
Aceds 2015 Cyberseucity and the Legal Profession - NYC - April 7, 2015
 
Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...Data Security in the Insurance Industry: what you need to know about data pro...
Data Security in the Insurance Industry: what you need to know about data pro...
 
CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin CRI "Lessons From The Front Lines" March 26th Dublin
CRI "Lessons From The Front Lines" March 26th Dublin
 
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
Be Prepared: Emerging Cyber Security Threats, Vulnerabilities and Risks on Ca...
 

Mehr von Ray Bugg

Digit Leaders 2023
Digit Leaders 2023 Digit Leaders 2023
Digit Leaders 2023 Ray Bugg
 
DIGIT North 2022
DIGIT North 2022DIGIT North 2022
DIGIT North 2022Ray Bugg
 
Digital Transformation Summit 2021
Digital Transformation Summit 2021Digital Transformation Summit 2021
Digital Transformation Summit 2021Ray Bugg
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020Ray Bugg
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Ray Bugg
 
DIGIT Expo 2019
DIGIT Expo 2019DIGIT Expo 2019
DIGIT Expo 2019Ray Bugg
 
DIGIT Expo 2019
DIGIT Expo 2019DIGIT Expo 2019
DIGIT Expo 2019Ray Bugg
 
DIGIT Leader 2019
DIGIT Leader 2019DIGIT Leader 2019
DIGIT Leader 2019Ray Bugg
 
DIgital Energy 2019
DIgital Energy 2019DIgital Energy 2019
DIgital Energy 2019Ray Bugg
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Ray Bugg
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Ray Bugg
 
Digital Transformation Scotland 2019
Digital Transformation Scotland 2019Digital Transformation Scotland 2019
Digital Transformation Scotland 2019Ray Bugg
 
GDPR Scotland 2018
GDPR Scotland 2018GDPR Scotland 2018
GDPR Scotland 2018Ray Bugg
 
Fintech 2018 Edinburgh
Fintech 2018 EdinburghFintech 2018 Edinburgh
Fintech 2018 EdinburghRay Bugg
 
DIGIT Leader Summit 2018 - Edinburgh
DIGIT Leader Summit 2018 - EdinburghDIGIT Leader Summit 2018 - Edinburgh
DIGIT Leader Summit 2018 - EdinburghRay Bugg
 
IoT Scotland 2018
IoT Scotland 2018IoT Scotland 2018
IoT Scotland 2018Ray Bugg
 
Digital Energy 2018 Day 1
Digital Energy 2018 Day 1Digital Energy 2018 Day 1
Digital Energy 2018 Day 1Ray Bugg
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018Ray Bugg
 
Big Data Scotland 2017
Big Data Scotland 2017Big Data Scotland 2017
Big Data Scotland 2017Ray Bugg
 
IT In The Park 2017
IT In The Park 2017IT In The Park 2017
IT In The Park 2017Ray Bugg
 

Mehr von Ray Bugg (20)

Digit Leaders 2023
Digit Leaders 2023 Digit Leaders 2023
Digit Leaders 2023
 
DIGIT North 2022
DIGIT North 2022DIGIT North 2022
DIGIT North 2022
 
Digital Transformation Summit 2021
Digital Transformation Summit 2021Digital Transformation Summit 2021
Digital Transformation Summit 2021
 
ScotSecure 2020
ScotSecure 2020ScotSecure 2020
ScotSecure 2020
 
Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019Data Protection Scotland Summit 2019
Data Protection Scotland Summit 2019
 
DIGIT Expo 2019
DIGIT Expo 2019DIGIT Expo 2019
DIGIT Expo 2019
 
DIGIT Expo 2019
DIGIT Expo 2019DIGIT Expo 2019
DIGIT Expo 2019
 
DIGIT Leader 2019
DIGIT Leader 2019DIGIT Leader 2019
DIGIT Leader 2019
 
DIgital Energy 2019
DIgital Energy 2019DIgital Energy 2019
DIgital Energy 2019
 
Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)Scot Secure 2019 Edinburgh (Day 2)
Scot Secure 2019 Edinburgh (Day 2)
 
Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)Scot Secure 2019 Edinburgh (Day 1)
Scot Secure 2019 Edinburgh (Day 1)
 
Digital Transformation Scotland 2019
Digital Transformation Scotland 2019Digital Transformation Scotland 2019
Digital Transformation Scotland 2019
 
GDPR Scotland 2018
GDPR Scotland 2018GDPR Scotland 2018
GDPR Scotland 2018
 
Fintech 2018 Edinburgh
Fintech 2018 EdinburghFintech 2018 Edinburgh
Fintech 2018 Edinburgh
 
DIGIT Leader Summit 2018 - Edinburgh
DIGIT Leader Summit 2018 - EdinburghDIGIT Leader Summit 2018 - Edinburgh
DIGIT Leader Summit 2018 - Edinburgh
 
IoT Scotland 2018
IoT Scotland 2018IoT Scotland 2018
IoT Scotland 2018
 
Digital Energy 2018 Day 1
Digital Energy 2018 Day 1Digital Energy 2018 Day 1
Digital Energy 2018 Day 1
 
Scot Secure 2018
Scot Secure 2018Scot Secure 2018
Scot Secure 2018
 
Big Data Scotland 2017
Big Data Scotland 2017Big Data Scotland 2017
Big Data Scotland 2017
 
IT In The Park 2017
IT In The Park 2017IT In The Park 2017
IT In The Park 2017
 

Kürzlich hochgeladen

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 

Kürzlich hochgeladen (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 

Scot Secure 2017

  • 6. DI Eamonn Keane Police Scotland @policescotland #scotsecure
  • 7. What can we do to fight back? Scot- Secure Conference March 2017.
  • 8. Agenda Scottish, UK & Global Perspective! The current threat landscape! The challenges to LE & Policing! The LE response - NCCU & Police Scotland! Are we getting the message across? What can we do to fight back? Collaboration & Prevention. Good News - Look Forward!
  • 9.
  • 10.
  • 11. ORIGINAL HUB CONCEPT SG/NCSC EUROPOL POLICE / SENIOR TECH COMMUNITY / INVESTIGATIONS . TIER 4 – SCOTLAND’S TECH COMMUNITY DEVELOPMENT TIER 3 – ACADEMIA / R & D TIER 2– SOC / TRUSTED PARTNERS TIER 1– APPRENTICES / GRADUATES
  • 13. Stalking Bullying Cyber Fraud SOCG Sexual Offenders Indecent images of children Cyber dependent crimes e.g. hacking, malware, DDoS Anti-socialbehaviour CyberTerrorism is impacting on the police response across the full crime spectrum.
  • 14. What we do know!! • The cyber threat to UK business is significant and growing. • This threat is varied and adaptable. • The rise of internet connected devices gives attackers more opportunity! • The past year has been punctuated by cyber attacks on a scale and boldness not seen before! • The UK & Scottish government is committed to making the UK a secure and resilient digital nation • Under-reporting.
  • 15. Scenario 2 – Malware Malware Phishing Ransom- ware Social Engineer Hacker Some Brief Examples… The Usual Suspects
  • 16. Key questions that all CEOs & CISO’s should be asking this week? • "Are we vulnerable to a cyber intrusion, SQL injection, ransomware or DDoS based attacks?“ • "What assurance activity have we done to confirm that we are not vulnerable?“ • "If we were compromised, would an attacker be able to gain access to unencrypted sensitive data?“ • “Are we satisfied have we engaged sufficient 3rd party security provision?" • “What is our company ethos & posture on security?” • “What and how vibrant is your overarching cyber security policy?”
  • 17. Cyber Attacks are on the rise
  • 18.
  • 19.
  • 20.
  • 21.
  • 22. The Main Threats… Hacktivism Organised Crime Espionage • Hacking organisations they don’t agree with • Politically motivated • Mainly defacement of websites and public disclosure of information • Organised but disperse. • Anonymous, New World Hacking, Lizard Squad • Well funded cyber crime groups • Financially motivated • Mainly ransomware, stealing of personal info/credit card info, and hacking. • Highly organised and well funded • Carbanak Cyber Gang, Janus Sec etc. • State sponsored • Politically & Financially motivated • Mainly covert hacking and custom malware- targeting sensitive IP and CNI. • Extremely organised and well funded • TAO, APT 28, APT 17, Bureau 21
  • 23. The Main Threats… Bedroom Hackers • Teenagers with a point to prove • Motivated by recognition and quick cash • Mainly defacement of websites and public disclosure of information • Have been quite successful at ‘low hanging fruit. • They have been individuals or ‘front people’ of a group
  • 24. Growing Cadre of Hacking Groups Anoymous! LulzSec Lizard Squad! New World Hacking Team! DD4BC!. The Impact Team. The Armada Collective!. Syrian Electronic Army 16.66 PhantomSec
  • 27.
  • 28. • Feezan Hameed • £60 - £113 million Frauds • Vishing / Social engineering of Banking customers • Data acquired including account details/passwords • Money trasferred online – mule account networks • Uk wide investigation • Numerous UK Law Enforcement • Arrested in Paris on false passport • Convicted and sentenced to 11 years imprisonment • Customer education?
  • 29. Op Backbone •UK Bank •Frauds •Exfiltration of bank customer data •Bank employee •Live customer data for sale on dark web •Data used to commit further frauds •Customer data recovered at home address •Arrested / Convicted •£23,000 seized POCA from account •Print? Business Need/Auditable?
  • 30. Operation Mouse - Police Scotland Website Operation Vulcanalia The NCCU/PSOS Operation Vulcanalia targeted users of the Netspoof DDoS-for-hire tool. Based on intelligence gathered by the West Midlands Regional Cyber Crime Unit, a week of action in December 2016 saw more than 60 individuals targeted, resulting in 12 arrests, over 30 cease and desist notices served, two cautions issued and one protective visit made. The Avalanche network was used as a delivery platform to launch and manage mass global malware attacks and money mule recruiting campaigns. It has caused an estimated EUR 6 million in damages in concentrated cyberattacks on online banking systems in Germany alone. The global effort to take down this network involved the crucial support of prosecutors and investigators from 30 countries. As a result, 5 individuals were arrested, 37 premises were searched, and 39 servers were seized. Victims of malware infections were identified in over 180 countries. Also, 221 servers were put offline through abuse notifications sent to the hosting providers. The operation marks the largest-ever use of sinkholing to combat botnet infrastructures and is unprecedented in its scale, with over 800,000 domains seized, sinkholed or blocked.
  • 31. Cyber Resilience is thorough Preparation Overarching Cyber Security Strategy! Pre-planned Exercise. Incident Management & Response Plan. Communications Strategy. Investigative Strategy. Incident Manager & Team Gold, Silver, Bronze. Mitigation & Recovery Strategy. Logistics - Contingency
  • 32.
  • 33. Scotland’s Future • International Collaboration • Government - L.E – Industry – Academia Collaboration • Joint Working - Intelligence, Technical, Disruption • Prevention/ Education • Curriculum for 21st Century • Upskill Children & Wider Population • Target Harden Existing Business • SBRC Role • Cyber Security Grow as Industry Sector
  • 34.
  • 35.
  • 36. Cyber Essentials & Cyber Essential Plus Cyber Essentials concentrates on five key controls. These are: 1. Boundary firewalls and internet gateways 2. Secure configuration 3. Access control 4. Malware protection 5. Patch management
  • 37. Fighting back: what can we do? • Reporting means we can fight back! • Cyber Policing Structure – NCCU - Regional Hubs- Prevention • European & Global Co-operation EC3. • Innovative Partnership’s. • Organisational growth and transformation. • Education, prevention & unprecedented collaboration. – The Cyber Academy & Scottish Academia R & D. – Inspire and enthuse - SQA National Progression Awards – SBRC – Supporting vulnerable SMEs. – Multi agency, multi disciplined teams protecting Scotland.
  • 38.
  • 39. European Union General Data Protection Regulation (GDPR)
  • 40. Recap • Cyber Essential • Cyber Essentials plus • Govt backed / Industry supported • Basic Cyber security hygiene • Report to Police / Certuk / Govcert • Share - CiSP • Intel / Europol – paints Cyber picture • Human ! Staff education/awareness • Staff privileges • Nice v risk? • Data breach test of scrutiny – did we REALLY do ALL we could?
  • 41. Thank you for listening Any Questions? Eamonn.keane2@scotland.pnn.police.uk
  • 42. Dr Keith Nicholson Cyber Security Scotland #scotsecure
  • 43. SCOT-SECURE 2017 CYBER DEFENCE STRATEGY FOR THREAT RISK REDUCTION Dr Keith Nicholson Cyber Security Scotland March 2017
  • 44. Dr Keith Nicholson Independent Cyber Security Advisor • 25+ years’ experience in digital technologies , IT audit and cyber security • Qualified in cyber security (CISM CISA) • Scottish Government advisor in Cyber Security • Member Cross Public Sector Cyber Group • Member Cyber Leaders Board • Advisor across Public Sector (e.g. SNH, SEPA, SFC, Revenue Scotland) Cyber Security Scotland Non-Profit Organisation ● established to provide independent advice & services on all aspects of cyber security to public bodies to help create the intelligent client. ● provides “honest-broker” guidance on ICT, cyber security strategy development, tender specifications, procurement exercises and project management to deliver Best Value.
  • 45. BUILDING A CYBER DEFENCE STRATEGY Challenges: IT Team  Management expectations on skills  Winning investment & management buy-in  Not just a technical issue
  • 46. BUILDING A CYBER DEFENCE STRATEGY Challenges: Board  Lack of cyber understanding  Failure to appreciate risk & ROI  Belief technology is silver bullet  Lack of integration of HR, Finance & Procurement as well as IT in cyber defence strategy
  • 47. Cyber Defence: BUILDING A RESILIENT ORGANISATION  Secure technology  Challenging suppliers - lifecycle & supply chain  Training and awareness in staff  Policies & procedures in HR, Finance, Procurement, IT  Senior management responsibility  Becoming an intelligent client: Know what you don’t know
  • 49. Threat Risk Areas KEY CYBER THREAT RISK AREAS • Procurement • Payroll • Data Theft • Disruption THREAT VECTORS • Culture & Behaviours (Poor and well- intentioned) • Technical Goals Credential theft; Financial gain; service disruption
  • 50. Incident Patterns NB: Classification can vary between sectors
  • 52. Current Common Threats • Malware – Ransomware • Credential theft – webmail; keylogging • Drive-by downloads from websites • POS attacks • DDoS – transactional servers / websites • Web site defacement • Dark web – malware / hackers for hire; risk-reward model TECHNICAL&PEOPLEBASED
  • 53. Common attack vectors BEHAVIOURAL VULNERABILITIES • Domestic technology use = embedded behaviours brought into workplace • Changing attitudes to privacy and sharing personal information TECHNICAL • Phishing - Email – malware – ransomware, key loggers • Email attachments – e.g. “invoices” • Email – person pretext (e.g. I’m xxx’s boss; CFO instructing invoice approval) • Vishing – elicitation of key information in conversation
  • 54. Threat Data • Time to compromise – 82% in minutes (phishing to steal credentials) • Time to exfiltration – 68% in days (capture & export data) • Detection deficit – only ca 20% attacks detected within days1 • 68% attacks are malware, 32% by pretext2 1 Verizon 2016 Data Breach Investigations Report 2 HMG, Ipsos MORI, University of Portsmouth, Cyber Security Breaches Survey May 2016 • Oldies still goodies – top 10 vulnerabilities older than one year • Software vulnerabilities – time between publication and exploitation: – Adobe, Microsoft, Oracle fastest to be compromised – Apple and Mozilla slowest • Helps focus patch management
  • 56. 5-Step Threat Reduction Strategy 1. Recognise the threat & take responsibility at Board level – Exec & Non-Exec 2. Risk & Business Impact assessment of technical & organisational vulnerabilities 3. Secure the technology (resources prioritised via Risk & Business Impact assessment) 4. Create a cyber-aware culture 5. Evolve to become an Intelligent Client
  • 57. Becoming the Intelligent Client  Recognise what you don’t know (Known Unknowns) – Audit systems, policies & procedures via “critical friend”  Recognise you don’t know what you don’t know! (Unknown Unknowns) – Get Directors and staff training both technical and general awareness  Challenge suppliers: service lifecycle and supply chain; build security into procurement specifications  Don’t rely only on supplier advice (Audit Scotland)  Seek “honest broker” independent advice where needed
  • 59. 1. Assess and test Cyber Awareness Maturity level: • At board level • Amongst general staff • Amongst technical teams 2. Undertake a Cyber Security audit with risk assessment to: • Identify technical & cultural vulnerabilities and threats • Prioritise resource allocations proportionate to risk • Identify staff skills gaps 3. Create a staff development strategy for ongoing awareness / technical training 4. Develop a Proactive & Responsive Cyber Strategy, Policies & Continuous Improvement Plan to address continuing and changing threats Cyber Defence Action Plan
  • 60. Summary • Needs Board & Senior Management commitment – risk awareness, RoI and investment buy-in • Cross-organisation responsibility: – HR for OD, staff training and vetting; Finance, Procurement for fraud detection; IT for technology • Define your needs and challenges – Technological as well as Staff and Suppliers via Gap Analysis • Set realistic development plan & expectations – Cultural change is not achieved overnight • Keep your eye on the threat – Staff development – Continuous improvement plan – Monitor, mentor, measure
  • 61. THANK YOU KEITH NICHOLSON T: 01847 500 101 M: 07899 062 965 E: KNICHOLSON@CYBERSECURITY.SCOT
  • 62. Jenny Radcliffe Social Engineer & Negotiator @Jenny_Radcliffe #scotsecure
  • 63. People Hacking The Human Factor in Security Jenny Radcliffe 2017©
  • 65.
  • 67.
  • 69.
  • 70.
  • 71.
  • 72.
  • 73.
  • 74.
  • 76.
  • 77.
  • 78.
  • 79.
  • 80.
  • 81.
  • 85. Ransomware, the scourge of 2016 Rik Ferguson Vice President Security Research Trend Micro
  • 86. (Not so) Humble Beginnings
  • 89. Ransomware Evolution - CryptoLocker
  • 90. Ransomware in 2016 • 2016 Losses $1B • 246 new families in 2016 alone compared to 29 for 2015. 748% increase. • PhishMe Report: As of the end of Q3’16, 97% of all phishing emails contained crypto-ransomware • InfoBlox Report: Ransomware Domains Up By 35 fold In Q1’16
  • 93. UK Ransomware Survey • Just over two thirds (69%) of UK ITDMs have heard about ransomware and know how it works. • Four fifths (82%) consider ransomware to be a threat to their organization, while 18% do not. • The average ransomware request received was £540, although for 20% of those infected, the request was more than £1,000. • Nine in ten (89%) reported a time limit on paying the ransom, with the time limit being 19 hours on average. • Organizations affected by ransomware estimate they spent 33 man hours on average fixing the issues caused by the ransomware infection.
  • 94. UK Ransomware Survey • Two thirds (65%) ended up paying the ransom. However, only 45% of those infected got their data back through this mean while 20% paid a ransom and did not get their data back. • The three most common reasons for paying the ransom: – They were worried about being fined if the data was lost – 37% – The data was highly confidential – 32% – The ransom amount was low enough to count as cost to business – 29% • Seven in ten (69%) think their organization will be targeted by ransomware in the next 12 months. • 77% have an incident response plan in case of infection with ransomware – Only 44% have tested their incident response plan, while a third (33%) have a plan in place without testing it.
  • 96. Locky – Malicious Macros Ransom_LOCKY is requesting 0.5 Bitcoin ransom ($209.27)
  • 97. Crysis – A Hands-On Threat Actor A sample infection flow of Crysis via an RDP brute force attack
  • 98. Cerber A Ransomware Factory It replaces the system's current wallpaper with the this image:
  • 99. Stampado – Ransomware as a Service
  • 100. Exploits and Exploit Kits in 2016 A DECLINING INDUSTRY? 2
  • 101. The demise of the Exploit Kit?
  • 102. Neutrino Price Increase $3,500 $7,000 $0 $1,000 $2,000 $3,000 $4,000 $5,000 $6,000 $7,000 $8,000 Neutrino Price per Month Before Angler Disappeared After Angler Disappeared
  • 103. Rate of Vulnerability Additions to Exploit Kits
  • 104. Exploit Kit / Ransomware Relationship Exploit Kit Delivered Ransomware (2015) Delivered Ransomware (2016) Angler CRYPWALL, CRYPTESLA, CRILOCK CRYPWALL, CRYPTESLA, CRILOCK, WALTRIX, CRYPMIC Neutrino CRYPWALL, CRYPTESLA CRYPWALL, CRYPTESLA, CERBER, WALTRIX, LOCKY, CRYPMIC Magnitude CRYPWALL CRYPWALL, CERBER, LOCKY, MILICRY Rig CRYPWALL, CRYPTESLA GOOPIC, CERBER, CRYPMIC, LOCKY, CRYPHYDRA, CRYPTOLUCK, MILICRY Nuclear CRYPWALL, CRYPTESLA, CRYPCTB, CRYPSHED CRYPTESLA, LOCKY Sundown CRYPTOSHOCKER, LOCKY, PETYA, MILICRY
  • 105. CVE-2013-2551 Affected software: Microsoft Internet Explorer® 6–10 Description: A use-after-free vulnerability that lets attackers remotely execute arbitrary code via a specially crafted site that triggers access to a deleted object CVE-2015-0311 Affected software: Adobe Flash Player 13.0.0.262, 14.x, 15.x, and 16.x–16.0.0.287 on Microsoft Windows® and 11.2.202.438 on Linux Description: An Adobe Flash Player buffer overflow vulnerability that allows attackers to remotely execute arbitrary code via unknown vectors CVE-2015-0359 Affected software: Adobe Flash Player before 13.0.0.281 and 14.x through 17.x before 17.0.0.169 on Windows and OS X and before 11.2.202.457 on Linux Description: An Adobe Flash Player memory corruption vulnerability that allows attackers to execute arbitrary code when the application is used; failed exploitation attempts likely result in denial of service (DoS) CVE-2014-0515 Affected software: Adobe Flash Player before 11.7.700.279 and 11.8.x–13.0.x before 13.0.0.206 on Microsoft Windows and Mac® OS X® and before 11.2.202.356 on Linux Description: An Adobe Flash Player buffer overflow vulnerability that occurs when parsing a compiled shader in a Flash object, which allows attackers to run some processes and run arbitrary shellcode CVE-2014-0569 Affected software: Adobe Flash Player before 13.0.0.250 and 14.x and 15.x before 15.0.0.189 on Windows and before 11.2.202.411 on Linux Description: An Adobe Flash Player remote integer overflow vulnerability that lets attackers execute arbitrary code via unspecified vectors Top Vulnerabilities Within Exploit Kits
  • 106. Ransomware Blocks in 2016 2016 Total: ~1B
  • 107. Fundamental Best Practices Employee Education Awareness, best practices, simulation testing Keep Current with Patching Minimize exploits of vulnerabilities Access Control Limit access to business critical data Back-up and Restore Automated: 3 copies, 2 formats, 1 air-gapped from network
  • 108. Smart Protection Network in 2016 … received 2.8T reputation queries from customers … identified 130M new unique threats … Blocked 1B ransomware threats … blocked 81B total threats
  • 109. Thank You Rik Ferguson Trend Micro @rik_ferguson
  • 112.
  • 113. How To Transform Technical Security Data Into Business Ready Metrics Sean Lever
  • 114. The Security Assurance Measurement Problem Transforming Security Data into Business Metrics How Tenable Helps Bridge the Gap Agenda
  • 116. “CISOs use existing security metrics that are expressed in technical security terms, and are oriented toward technical security decisions. They report on what they can vs. what they should.” Gartner: Sharpen Your Security Metrics to Make Them Relevant and Effective, July 10, 2015
  • 117. BITS AND BYTES DON’T BELONG IN THE BOARDROOM
  • 118. “THANKS FOR THE 300 PAGE SECURITY REPORT” - Nobody, Ever, Said
  • 119. 51%Of CxOs believe there is a 1 in 4 chance that a data breach will have a material impact on their organisation 80% Source: Securing the C-suite: - IBM Institute for Business Value, February 2016 Of CISO’s say their top risks are increasing Scale Venture Partners and Wisegate Survey, Assessing and Managing IT Security Risks, June 2014
  • 121. Measured Quantity of Malware Detected According to the “State of Metric Based Security” Survey
  • 122. Transforming Security Data into Business Ready Metrics
  • 123. What is a Metric? METRICSQUANTIFIABLE MEASURES TRACK TO PERFORMANCE ARE
  • 125. Aligning Metrics to the Business Metric Control Policy Objective Monitoring Control Activities Risk Assessment Control Environment Wisdom Knowledge Information Data
  • 127. Examples Operations % Critical Systems Patched Within Target Days % Critical Systems Without Updated Virus Definitions Compliance % Critical Systems Within Compliance Reporting <Metric> by Site/Location <Metric> by Business Unit Characteristics 1. Specific 2. Measurable 3. Actionable 4. Relevant 5. Timely What is a SMART Metric?
  • 128. How Do I Share Metrics?
  • 129. Where Do I Start? Security FrameworksBusiness Frameworks
  • 130. National Cyber Security Centre (NCSC)
  • 131. National Cyber Security Centre (NCSC)
  • 132. National Cyber Security Centre (NCSC)
  • 133. How Tenable Helps Bridge the Gap
  • 134. ✓ Define security metrics that map to your unique business objectives ✓ Collect comprehensive, reliable data to assess security and compliance ✓ Use easy-to-read report card format to communicate security posture to execs ✓ Validate that security program controls are in place and delivering intended results to maximize your return on investment Measuring Security Assurance
  • 138. ARCs for Specific Concerns
  • 140. Figuring out the “right” metrics and compiling them can be challenging Metrics provide clear insight into how successfully well the IT security team is meeting security and business objectives Tenable’s sensors and ARCs help you turn technical data into metrics executives can understand Summary
  • 141. • Read the eBook: Using Security Metrics to Drive Action • Download the Whitepaper: Measuring Security Assurance – Turn Technical Data into Metrics Executives Can Understand Next Steps
  • 143.
  • 144. Social Engineering – A Career in Engineering whilst being on the Social The Art of Manipulating People or
  • 145.
  • 146. The Most Important Role for a Security Practitioner is to Eradicate the Need to Pre- Append words to the Term Security
  • 147. The Greatest Risk we face as Risk Owners are from those with whom we are sharing the risk.
  • 149.
  • 150. Tatty Teddy Rick Steenfield Practical Examples
  • 151. Tatty Teddy Twitter on Tatty Teddy Over a number of years tweeted as fan. On occasion principle retweeted. Interaction Progressed to principle commenting. Fan moves to interact in DM, principle replies Fan tweets evolve becoming more personal
  • 152. Tatty Teddy Principle attempts to ignore and manage fan Principle sensitively declines Management Company running a competition Winner of Meet & Greet announced. Fan requests a meet & greet. Fan interaction turns hostile Fan makes direct threats and becomes hostile online
  • 153.
  • 154.
  • 155.
  • 156. Tatty Teddy > After being single all my life and approaching my 38th birthday, I've > taken the plunge and signed up with POF. Have never had so much as a > proper date in all my life, and it's been years since I was even > remotely looked at by a woman, so I'm not expecting much. > > Having looked at who's available in my local area, there isn't much > going. There are one or two women who are nice looking, but I look > very young for my age, don't fancy women near to my own age (many > 30-35s almost look old enough to be my mother), and I feel awkward at > the thought of looking at women in their late 20s who I might actually > find attractive. But I'd probably have nothing in common with them.
  • 157. Tatty Teddy Principle attempts to ignore and manage fan Principle sensitively declines Management Company running a competition Winner of Meet & Greet announced. Fan requests a meet & greet. Fan interaction turns hostile Fan makes direct threats and becomes hostile online
  • 160. o Alexa, come away with me! I want to take you away! To a place where no-one can ever hurt you! We can go anywhere. I know places. Places where we can be alone~or in a big city.It doesn't matter. I want to live a "normal" life with you. I want to watch you grow old with me, and maybe have a couple of children. You can be anything you can imagine! A doctor, a factory worker, a scientist, a photographer! Anything you want. I just have this dream of you and me in a house and pets and you can be my wife, and I can be your loveslave. Anything you want. It will be great! We can have a lot of fun together! So, get back to me! Tell me to go to Hell, tell me that I'm crazy, just tell me how you feel. I love you and I want you to be happy. Alexa Ray Joel
  • 161. Messages Start September 4rth 5th – Recounting a Nightmare. 7th – Message of Hate. Last Message – 13th November. Alexa Ray Joel
  • 163. Rick Steenfield – 20’s – Chicago – McDonalds . Attended Gordon Central High School. Legend going back to High School Alexa Ray Joel
  • 165. Social Engineering - Profiling What do you want~ Something about me being a lazy drink~I waste~good please!~Let me go! Alexa Ray Joel
  • 166. One of a handful reporting same geo location. Similar Interests, Likes. I envy you~the way you can sing wrong~I just like them forever! but here I go~up on the stage, anyway Alexa Ray Joel
  • 168. Sheryl Finley [Billy Joel] hired a bodyguard to protect his daughter and contacted [Paul] McCartney, who recommended a Europe-based private-security firm not bound by the same legal restrictions as the police, [Post] sources said. McCartney's people found the stalker in Austin, Minn. Alexa Ray Joel
  • 169. Securing People Training, understanding, malice. • Educate your colleagues. • Educate your Stakeholders. • You cant address this with technology.
  • 170. Securing People You do not know the people you are trusting. • Recognise that as a Risk. • Quantify the risk. • Accept it or mitigate it.
  • 171. Crime is on the increase • Your stakeholders are being targeted. • Sensitive Assets can take many forms. • Its Risk introduced by cyber or just security • Stop referring to cyber security.
  • 173. CYBER RESILIENCE…THINKING BEYOND BUILDING THE WALLS HIGHER Rick Hemsley March 23, 2017 SECURITY ACCENTURE
  • 174. Copyright © 2017 Accenture Security. All rights reserved. 175 BY THE NUMBERSDEFENDING AND EMPOWERING THE DIGITAL BUSINESS STREAMLINE CLOUD MIGRATION ACTIVITIES BY 20% YEARS OF EXPERIENCE HELPING CLIENTS SECURE THEIR ORGANIZATIONS 20+ 15,000+ SECURITY DEVICES MANAGED 2 Security Centers of Excellence Manila & Buenos Aires 30 MILLION+ digital identities managed >30x FASTER detection rates of incidents for multiple clients 5,000+ PEOPLE 330+clients spanning 67 countries 5,000+security risks mitigated / year 350+ pending and issued patents related to security Cloud security, management and control for 20,000+ cloud computing instances raw security events processed daily5B+ Running some of the largest SIEM deployments in the world Cyber Fusion Centers4Bangalore Prague Washington, DC Tel Aviv Security analytics that handle BILLIONS of events ONE MILLION+ endpoints managed
  • 175. HOW OFTEN DO YOU HEAR ABOUT SECURITY IN DAY- TO-DAY MEDIA STORIES? A. NEVER B. C. WEEKLY NEARLY DAILY Copyright © 2017 Accenture Security. All rights reserved. 176
  • 176. Thieves steal $101M; governor of Bangladesh central bank resigns FROM THE HEADLINES © The Economist : The Dhaka Caper article, March 19, 2016. www.identityforce.com/blog/oracle-data-breach www.zdnet.com/pictures/biggest-hacks-security-data-breaches-2016/6/ Yahoo hack: 1bn accounts compromised by biggest data breach in history LinkedIn hack hits headlines again: Records stolen to 117 million accounts © The Guardian: Article by Sam Thielman, December 15, 2016. Oracle Data Breach: MICROS System Compromised by Hackers Copyright © 2017 Accenture Security. All rights reserved. 177
  • 177. WHAT HAVE WE TRADITIONALLY DONE? Resistance Copyright © 2017 Accenture Security. All rights reserved. 178
  • 178. ATTACKERS MODIFY THEIR TACTICS Copyright © 2017 Accenture Security. All rights reserved. 179
  • 179. MODERN THREATS CYBER CRIME OR CYBER ENABLED CRIME IS BIG BUSINESS AND COMPANIES ARE TARGETED FOR THEIR DATA OR COMPANIES ARE TARGETED FOR THEIR MONETARY BENEFITS (ONE AND SAME?) Activist Groups Corporate Espionage State Sponsored Employees or Partners Organized Crime Copyright © 2017 Accenture Security. All rights reserved. 180
  • 180. SOPHISTICATED, WELL-FUNDED CYBERCRIMINALS ARE OUTPACING DIGITAL BUSINESSES ALTHOUGH THE RISE OF DIGITAL HAS REVOLUTIONIZED HOW BUSINESSES WORK AND SERVE THEIR CUSTOMERS, IT HAS ALSO ADDED NEW DIMENSIONS OF RISK 23% increase in exposed identities with nine mega- breaches in 20151 Increase in Spear-Phishing Campaigns Targeting Employees 20154 Increase in Ransomware moving beyond PCs to smart phones, Mac, and Linux systems2 OT systems next? Costs to businesses per year due to cyber attacks (initial damage + ongoing disruption)5 Global corporate spending on Cyber Security by 20203 New unique pieces of malware in 20151 References: 1 and 2. Symantec Internet Security Threat Report Apr 2016 [Mega-breach defined as >10 million records) 3. "Companies Lose $400 Billion to Hackers Each Year,” Inc., September 8, 2015. 4. Symantec Internet Security Threat Report Apr 2016 5. "Lloyd’s CEO: Cyber attacks cost companies $400 billion every year," Fortune, Jan 23, 2015 3 ~.5 billion 35% $ 170 billion 55% 430 million $ 400 billion Copyright © 2017 Accenture Security. All rights reserved. 181
  • 181. THE VOLUME OF ATTACKS ATTAINS ITS OWN DARWINIAN SOPHISTICATION BEYOND CARBANAK AND SWIFT, CYBER RISK WILL CONTINUE TO MORPH AND BECOME MORE SOPHISTICATED. AS THE CONTROLS IMPROVE, THE ATTACKS CHANGE. Example New Cyber Risks People are the weakest link • Social engineering / phishing messages clever enough to fool everyone Greatest risks are cross silo • Security vs • Fraud vs • Customer Risk vs • Vendor Risk Command and control: • Clever mechanisms hide communication protocols once a breach has happened, e.g. Amazon HTTP requests Switch to Physical: • USB drives, printers, computers or any other hardware that can be compromised and then installed on the network SMS: • Weaknesses in the telecom infrastructure allow SMS based dual factor authentication to be compromised Ransomware attacks digital infrastructure: • Exploiting Android and Apple iOS can wreak havoc on applications, mobile devices and Internet of Things Copyright © 2017 Accenture Security. All rights reserved. 182
  • 182. NEW REGULATION = NEW REQUIREMENTS WHAT IS THE GDPR? THE GENERAL DATA PROTECTION REGULATION (GDPR) APPLIES TO ALL BUSINESSES WHO HAVE CUSTOMERS AND/OR OPERATIONS WITHIN THE EUROPEAN UNION. BUSINESS HAVE NEW REQUIREMENTS TO MEET. 3X as many articles as the incumbent privacy directive 18 months until new regulation is expected to become fully enforceable Member states have harmonised a regulatory framework28 1 EU-level supervisory authority* governing going forward *however, there are many regulatory bodies (e.g. FCA and PRA) that can take action against the Data Controller or Data Processor You need to report an incident without undue delay to the Supervisory Authority, no more than 72 hours after finding it. You’ll need to appoint a Data Protection Officer if you monitor on a large scale or process special data. Estimated DPO requirement: 28,000 in EU, 75,000 globally You’ll have tighter restrictions around consent. Get the consent balance right so you don’t scare off customers. You’ll need to cover more personal data. Now including physical, physiological, economic, mental, genetic, cultural & social identity. You’ll need to be able to Erase all of an individuals personal data which is likely to be in many parts of that organisation or with data processors. You’ll need to be able to give an individual all of their personal data. Where is it, what format, how to extract it, how to port it, etc. New Regulation In reality, it means fines up to 4000X previous levels and personal liability for management and/or the board. New Requirements Copyright © 2017 Accenture Security. All rights reserved. 183
  • 183. WHAT IS CYBER RESILIENCE? Cyber Resilience Overview: It is the ability to operate the business processes in normal and adverse scenarios without adverse outcomes. Specifically, resiliency strengthens the firm’s ability to identify, prevent, detect and respond to process or technology failures and recover, while reducing customer harm, reputational damage and financial loss External Sources of Cyber Risk • Hacktivism • Hacker/Lone Wolf • Nation State Attacks • Insider Data Leakage • Social Engineering Internal Origins of Cyber Risk • Digital Banking Services • Payments • Electronic Trading • Third Parties • Technology Infrastructure CYBER RISK CAN MANIFEST ITSELF ACROSS SEVERAL DIMENSIONS, MAKING IT DIFFICULT TO DETECT, MEASURE, AND CONTROL Common characteristics of resilient businesses: • More secure processes and systems • Strong controls with a strong control environment • A solid risk culture • Digitized and automated processes Copyright © 2017 Accenture Security. All rights reserved. 184
  • 184. PREPARE Business strategy alignment Assessment & architecture Operating model governance Risk & compliance Culture change Red-teaming DETECT Vulnerability management Threat intelligence Security monitoring Cyber threat analytics PREVENT Digital identity Application & data security Platform & infrastructure security RESPOND & RECOVER Incident response remediation Business continuity MOBILE ON PREMISES CLOUD IoT MORE SIMPILY? Copyright © 2017 Accenture Security. All rights reserved. Business-driven Threat-centric Digitally protected Adaptive responses Agile delivery
  • 185. HOW DO WE ACHIEVE CYBER RESILIENCE? Adopt a different mind set… Understand our adversary, their objectives, strategies, tactics, and operating methods Think about different threats … Those inside the organisation often have the ‘keys to the kingdom’ yet can often be the cause, intentionally or accidentally, of breaches Organise ourselves … Move beyond technical silos, think holistically about cyber across the organisation Preparation is key … Incident Response is critical and with GDPR it will only become more so Copyright © 2017 Accenture Security. All rights reserved. 186
  • 186. 1. Not Measuring the right things  Move to business alignment 2. Assuming controls are sufficient  Stress test prove controls and people 3. Assume perimeter  Begin inside out 4. Static plans … doing the same thing over and over  Innovate 5. Limit security as a purely technical Issue  Everyone's mission H&S for 21st Century 6. Disengagement  All leadership aligned and communicating ‘singing from the same hymn sheet’ WHAT ARE THE CHALLENGES WE NEED TO OVERCOME? Copyright © 2017 Accenture Security. All rights reserved. 187
  • 187. 5 KEY PRIORITIES TO HELP MANAGE CYBER RISKS EFFECTIVELY Copyright © 2017 Accenture Security. All rights reserved. 188 1. Training and Risk Culture – Taking what is unique in your organization and infusing the right cyber risk behaviors 2. Controls – Identify weak points – building a robust set of controls across operations, business and IT 3. Measurement with a Purpose – What is going on without your leadership’s knowledge – creating metrics that expose the risks 4. Operating Model – How does your leadership work with the rest of the organization - assigning clear lines of accountability and ownership 5. Resilience – At some point things will go wrong, be prepared (and have leadership prepared!)
  • 188. PREPARE Business strategy alignment Assessment & architecture Operating model governance Risk & compliance Culture change Red-teaming DETECT Vulnerability management Threat intelligence Security monitoring Cyber threat analytics PREVENT Digital identity Application & data security Platform & infrastructure security RESPOND & RECOVER Incident response remediation Business continuity MOBILE ON PREMISES CLOUD IoT MORE SIMPILY AGAIN? How do we respond? What is the impact? How do we organize? How do we monitor? Risk Identification – Aggregated set of typical risk associated with Cyber Risk Risk Events - Scenarios which can impact the organization specific to cyber threats Business and IT Controls – Oversight of the controls and their testing programs and how to leverage COBIT®, ISA, ISO/IEC, NIST controls Operating Model – Specifying the structure with people, organization, roles, tools and processes to govern Detection and Identification – Tools and metrics to identify and log aspects to mange operations Operational Monitoring – Aligning the tools to identify and detect threats along with their escalation and oversight Event Response Plan – Structure to identify and manage action plans Crisis Management – Structure to manage incidents and notify impacted parties
  • 189. TO OPERATE AND GROW CONFIDENTLY IN A RAPIDLY EVOLVING THREAT LANDSCAPE, ORGANIZATIONS NEED TO ADDRESS SECURITY ON THREE DIMENSIONS Copyright © 2017 Accenture Security. All rights reserved. 190 Empower business growth & secure operations Harden the organization to make cyber attacks difficult Detect and remediate successful cyber attacks Establish and maintain customer trust by meeting expectations for the privacy and protection of their data. Maintain IT hygiene to eliminate exposure to known vulnerabilities. Use threat intelligence to anticipate cyber attacks and take preemptive defense measures. Enable capabilities that enhance customer and employee experience. Meet compliance and regulatory obligations. Enable secure adoption of new technologies. Implement technology such as encryption and two-factor authentication to increase the difficulty of successful cyber attack. Implement security discipline beyond the security organization (e.g. secure coding, network segmentation, training & awareness). Detect in-flight cyber attacks. Use red teams to test cyber defense effectiveness. Prepare and test incident response plans. Goal: Ensure that expectations for privacy and compliance are met, and that the business is protected from routine malicious behaviors. Goal: Raise the cost of attack to adversaries, reducing their incentive to attack lower-value targets. Goal: Detect & respond to successful cyber attacks, minimize the impact of cyber attacks.
  • 190. IF YOU TAKE NOTHING ELSE AWAY… ADOPT A WHEN, NOT IF MINDSET … PREPARE FOR BUSINESS DISRUPTION KNOW WHAT YOU WILL DO … & GDPR IS COMING!!! Copyright © 2017 Accenture Security. All rights reserved. 191
  • 193. Ian McGowan Bio Ian is a Managing Consultant at Barrier Networks and has 18 years experience working in network and application security. He has worked as a web application security architect and application security operations lead and understands the challenge organisations face when trying to integrate security controls into the modern software development life cycle.
  • 194. Talk Overview • Overview of Web Application Security challenges • How Web Application Firewalling (WAF) can help • Advances in WAF technology • Anti-Fraud techniques • Summary
  • 196. Attack Surface Data Stolen User Credentials/F raud Phishing Network DDoS Attacks Application Vuln Exploits Recon. Port scan Attacks against SSL Vul Application attacksNetwork attacks Session attacks DNS Amplification/C ache Poisioning Application DDoS AttacksBotnet/SPAM Man in the Middle Man In The Browser Clientside Attacks DNS Attacks Malware Business Logic Abuse Data
  • 197. Focus of Attacks Stolen User Credentials/F raud Phishing Network DDoS Attacks Application Vuln Exploits Recon. Port scan Attacks against SSL Vul DNS Amplification/C ache Poisoning Application DDoS AttacksBotnet/SPAM Man in the Middle Man In The Browser DNS Attacks Malware Business Logic Abuse ATTACKS ARE DISPROPORTIONTELY TARGETING THESE AREAS APPLICATION PROTECTION USER ACCESS AND CREDENTIALS DataApplication attacksNetwork attacks Session attacksClientside Attacks DNS Attacks Data
  • 198. State of Application Delivery Report Yearly report by F5 Networks 2200 responders Understanding trends Most popular application services deployed Most important application services deployed
  • 199. Application Services to be Deployed 2017
  • 200. Top 3 Security Services Planned Globally
  • 201. Most Important to Responders
  • 202. WebApp Security Challenges • Complexity of the application • Complexity of the attacks • User controls the Endpoint
  • 203. SDLC Challenges • Secure coding is difficult, expensive and slow. • Developers are usually under time constraints • The focus is on delivery and not security • We need to change our approach to software development
  • 204. OWASP Top 10 Top 10 AppSec Risk There are more than 10! These aren’t going away Time to adjust our approach?
  • 205. Placement of Controls Prevention is better than a cure.
  • 206. Closing the barn door… Production vulnerability Timelines to consider: • Undetected period • Time to mitigate • Window of exposure
  • 208. Firewall vs WAF • Firewall is network focused • NG Firewall is content focused • WAF is application focused
  • 210. AppSec Policy Enforcement Point WAF provides the ability to enforce policy Positive vs Negative Policy WAF Policy
  • 211. WAF Benefits • Mitigate SQLi • Insecure Direct Object Reference • Layer 7 DDoS Protection • Session & Login Tracking • Web Scraping Prevention • Brute Force Attack Prevention • XML Schema Validation • JSON, AJAX and Web Services
  • 212. DAST Integration Dynamic Application Security Testing • Early detection of vulnerabilities • Continuous assessment • Remediate code vulnerability in situ • Automated virtual patches
  • 213. Eurograbber Campaign Financial Service Crimeware Targeted Users 30,000 affected Zeus Trojan & ZITMO Stopped by Web Fraud Control
  • 215. Step 2: Initial Compromise of the DOM
  • 216. Step 2: DOM Injection
  • 217. Step 3: Trojan Relays Mobile # to C2
  • 219. Step 4: SMS Sent by C2 / Dropzone
  • 220. Step 5: Validation Request
  • 222. Compromise Success / Failure Logic
  • 224. Next Steps Laptop/PC & Mobile Device are now compromised. What next?
  • 226. Web Fraud Prevention Benefits • Detection of DOM compromise • Application level encryption • Automated action detection
  • 227. Web Fraud Control Efficacy Major European Bank: “…detected and blocked fraudulent transactions in the sum of 500,000 Euro in two days. …ROI on the pilot first two days – that’s a new thing in the security field ...”
  • 228. Take Aways • AppSec controls have advanced significantly. • We must adjust our approach before it’s too late. • Layered defence. Clientless solution, enabling 100% coverage Protect Online User Desktop, tablets & mobile devices On All Devices No software or user involvement required Full Transparency Targeted malware, MITB, zero-days, MITM, phishing automated transactions… Prevent Fraud Alerts and customizable rules In Real Time
  • 231. Dan Hunt Lloyds Banking Group #scotsecure
  • 232. EVERYTHING YOU WANTED TO KNOW ABOUT PHISHING BUT WERE TOO AFRAID TO CLICK Dan Hunt, Lloyds Banking Group
  • 233. Brief Introduction • Etymology: Phreaking (Phone Hacking) + Fishing • Definition: “Phishing is the attempt to coerce recipient action, often for malicious reasons, by disguising oneself as a trustworthy entity in electronic communications” • Effectively a con trick, same as any other • Concepts can be applied to other -ishings; • Vishing: Voice-based • Smishing: SMS-based
  • 234. • Phishing emails can be used to harvest sensitive data and deploy malware • Unsuccessful phishing attempts can be used to infer how well-protected an organisation is • It is very, very easy and very, very effective • Average engagement-rate is 20% • ROI is high Why?
  • 235. Who? Phishing - Mass audience - Low sophistication, generic (Delivery/HMRC scams) Spear Phishing - Targeted at SMEs / high risk colleagues - Tailored content (Conferences, subscriptions) Whaling - Targeted at CEOs / Exec level - Highly tailored content - Long-game strategy (Waterholes etc)
  • 236. How?
  • 238. What? (Strategic) • Reduce the engagement rate on phishing emails; • Gateway filtering & blocking • Employee Education & Testing: • Studies find that the 20% click rate falls to 13% percent if employees go through just three simulation exercises, to 4% after the fourth and 0.2% after the fifth. • Have colleagues know what to do and who to tell.
  • 239. What? (Immediate) • Awareness of Red Flags • Mismatch of sender imagery • Impersonal (Dear Customer) • Misspellings • False sense of urgency • Email/web domains don’t match
  • 240. What? (Final Thoughts) When sent an email that you’re not expecting, even if it appears to be from someone you know, consider the following; • WHY am I being sent this email? • WHO is sending it to me? • WHAT do they want me to do? • WHERE could it lead me? THINK BEFORE YOU CLICK
  • 242. DevSecOps A 2-year journey of success & failure! @StuHirstinfosec
  • 247. Skyscanner @StuHirstinfosec Who are we? What do I do? What am I presenting?
  • 249. Skyscanner 2017 Skyscanner Security in 2017… WE HAVE A LOGO N’ EVERYTHING! @StuHirstinfosec
  • 251. Skyscanner 2017 My most successful strategy? ISO27001? Cyber Essentials? BSIMM? A.N.Other? Nope, it’s been speaking to people and sharing learnings. @StuHirstinfosec
  • 252. Skyscanner 2017 Longer term; Split security into focused areas; we now have SECOPS and PRODUCT SECURITY @StuHirstinfosec
  • 254. Skyscanner 2017 @StuHirstinfosec 1. TEACH 2. CONTINUOUS AUDITING & ALERTING 3. OPEN SOURCE TOOLING (Scout2, SecurityMonkey etc) 4. AUTOMATION
  • 256. Skyscanner 2017 Initial scheme – Qualys scans 2 week scheme – glut! 365 scheme – needs constant researcher rotation, refuse to pay for crap bugs, weed out the XSS guys! @StuHirstinfosec
  • 257. Skyscanner 2017 Ideal outcomes; • Weed out certain types of bug in your code altogether • Make researchers work harder for their cash! • Scale the scheme & make it more valuable over time @StuHirstinfosec
  • 261. Two-factor Two-Factor All The Things • VPN • Windows / MAC Login • Web portals • Apps • SSO
  • 263. User Data User Data Implemented new MINIMUM STANDARDS for user data Privacy BY DESIGN! Examples; • Only stored in agreed places (e.g. AWS) • Minimum encryptions levels when transferring • Same for data at rest (AES256) • Bcrypt / Argon2 for hashing • Only using TLS • Get rid of old ciphers • Segment the network • Tighten up access controls to the data @StuHirstinfosec
  • 265. Skyscanner 2017 @StuHirstinfosec • Get rid of credentials in code; GitHub/GitLab etc • Credstash • Git Secrets • GitLeaks (have fun!)
  • 266. Skyscanner 2017 Passwords in Plain Text?! Dude, it’s 2017. @StuHirstinfosec
  • 269. Skyscanner 2017 There are lots of SIEM solutions BUT HOW ARE YOU USING THEM?! @StuHirstinfosec
  • 276. What we do… What we do: Security Champions @StuHirstinfosec
  • 277. What we do… What we do: Crypto & Bug Challenges @StuHirstinfosec Hosted in AWS – cheap, easy to build!
  • 278. What we do… What we do: Crypto & Bug Challenges @StuHirstinfosec Security Swag - everyone loves t- shirts & stickers!
  • 279. What we do… What we do: Security Meet Up @stuhirstinfosec
  • 281. Take Humans out of the equation… @StuHirstinfosec
  • 282. Phishing Phishing – why not take humans out of the equation? • Sandbox links & attachments (Uber built this themselves) • Protect against Impersonation
  • 283. Learning (especially from failure!) … @StuHirstinfosec
  • 284. Culture Culture -No fear “This is the moment of my failure and I am not scared”
  • 285. What we do Announcing failure… Weekly PRODOPS Review NO BLAME! It’s a learning exercise @StuHirstInfosec
  • 286. What we do Learning… Cybrary, PluralSight, Twitter, Blogs
  • 287. Some thoughts to leave you with…
  • 288. Stats Not everything is critical! • Simple and quick wins are GOOD wins! • Try and increase the likelihood of an employee telling you about an event or potential attack • Run attack simulations. Break something before someone else does! FORGET ABOUT TRYING TO REDUCE MEANINGLESS STATS IF YOU GO FROM 48% TO 32% ON FIRE, YOU’RE STILL ON FIRE! (Zane Lackey, ex-Etsy)
  • 291. Scaremongering Security Scaremongering “The greatest period of impact was from February 13 and February 18 with around 1 in every 3,300,000 HTTP requests through Cloudflare potentially resulting in memory leakage (that’s about 0.00003% of requests)”
  • 292. Some thoughts to take away Reward people… For making you aware of issues. You feel good, they feel good & they’re likely to tell others.
  • 293. What next? Shout about your successes! • Security is as important as any other business unit • So shout about successes you have • Positive PR across the business
  • 295. Learn with Skyscanner • Follow Skyscanner @CodeVoyagers on Twitter • Read a backlog of our learnings at codevoyagers.com • Sign up for our Skyscanner Code Voyagers newsletter learnings from our successes and failures or search http://9nl.it/scotsecure_cvnewsletter
  • 296. Prof Bill Buchanan Edinburgh Napier Uni @billatnapier #scotsecure