Anticipate and Prevent Cyber Attack Scenarios, Before They Occur

36
Presenter - Gidi Cohen – Content Copyright ©2012 Skybox Security, Inc. Anticipate and Prevent Cyber Attack Scenarios, Before They Occur Gidi Cohen CEO, Founder Skybox Security, Inc. 1

description

Presented at ISSA Cornerstones of Trust June 6, 2012. No one wants to be the next cyber casualty. Collectively, organizations spend an enormous amount of resources deploying and managing security solutions to block malware, protect data, and keep critical business services operating. Yet most organizations remain inadequately protected against evolving and dangerous cyber threats. In this session, we will learn to recognize common network attack scenarios and mitigate the combination of misconfigurations, vulnerabilities, access policy violations and other security gaps that can be exploited by sophisticated attackers. High-profile breaches at Epsilon, Sony, and other enterprise and government networks have dominated the news lately, raising awareness of the need to design effective security strategies against sophisticated attacks and advanced persistent threats (APTs). Many companies struggle with where to begin to develop an effective plan of cyber defense. During this session we will walk the audience through several attack scenarios using a visual attack explorer tool, highlighting the combination of security gaps that are often used and how to prevent them. Network modeling, vulnerability analysis, access path analysis, and attack simulation will all be introduced and we will show how these analytical tools can be used to quickly and automatically find exposed areas of a network.

Transcript of Anticipate and Prevent Cyber Attack Scenarios, Before They Occur

  • 1. Gidi CohenCEO, FounderSkybox Security, Inc.Presenter - Gidi Cohen Content Copyright 2012 Skybox Security, Inc. 1

2. Why cant we curb thethreat?Presenter - Gidi Cohen Content Copyright 2012 Skybox Security, Inc. 2 3. The Network Complexity ChallengeEnterprise network 55,000 nodes 300 firewalls 25,000 rules 65 networkchanges/day 10,000 daily reportedvulnerabilitiesPresenter - Gidi Cohen Content Copyright 2012 Skybox Security, Inc. 3 4. Heterogeneous Networks are the Norm Presenter - Gidi Cohen Content Copyright 2012 Skybox Security, Inc. 4 5. Vulnerabilities and Threats Abound buffer attack blocked rules Misconfigured firewall USBs Misconfigured firewall policy violationsocial networks social networksmissing IPS signature blocked rules asset vulnerabilitiesdefault password threat origins Misconfigured firewall access violation blocked rules threat origins blocked rulesaccess policy violations access policy violations buffer attack violationdefault passwordaccess default password Misconfigured firewall USBs USBs policy violationsocial networksblocked rules policy violationaccess violationmissing IPS signature social networksthreat originssocial networkspolicy violationaccess violation USBsmissing IPS signatureMisconfigured firewallthreat origins social networksbuffer attack buffer attack social networkssocial networksblocked rules missing IPS signature blocked rules access violationaccess violationPresenter - Gidi Cohen Content Copyright 2012 Skybox Security, Inc.5 6. Every Organization Feels the Pain 88% of organizations: experienced significant damage ordisruption due to attacks or data breaches in past six monthsDamage to brand Minor Web DoSNone, 10.0%Data breach of(e.g.attack, 1.7%customer orhactivism), 6.7% confidential Damage torecords, 20.0%information systems ordata, 18.3% Misuse orService unauthorized down, 60.0% access to information, 35.0% Presenter - Gidi Cohen Content Copyright 2012 Skybox Security, Inc. 7. Vulnerability Management ProgramKey for Risk Reduction Most respondents see their VM program as akey to reduce risk level and respond to threats To reduce our security risk levelTo proactively prevent threats beforethey happenTo respond to new threatsTo provide an accurate assessment of our security status To meet compliance requirementsTo prioritize and minimize patchingcosts 0.0 0.5 1.0 1.5 2.0 2.5 3.0 3.5 4.0 4.5 Presenter - Gidi Cohen Content Copyright 2012 Skybox Security, Inc. 8. Vulnerability Scans Too Little, too Late Frequency and Coverage 350Where you need to be 300 Daily updatesFrequency x/year 25090%+ hosts 200 150Critical systems, DMZ Partner/External networks Avg. scan: every 30 days 100 Avg. scan: every 60-90 days 50-75% of hosts 50