Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS...

50
Simon Puleo Security Global Enablement Manager 2018 Create a Culture of Cyber Security Leadership

Transcript of Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS...

Page 1: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Simon Puleo

Security Global Enablement Manager

2018

Create a Culture of

Cyber Security Leadership

Page 2: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Create a Culture of

Cyber Security Leadership

Page 3: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...
Page 4: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Without “Us”Security is:

Ecre

Page 5: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

ec reS u

Security needs “Us”

Page 6: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

“Us” in security…

Page 7: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

More specifically these are my colleagues.

Target

List Bill Cruss

Too Rutter

Jane Doey

John Buck

______________

Fullz =

Bill Cruss

1244 E Main

Clevaland, OH

[email protected]

506 650 6500

Facebook account:

B Cruss

Page 8: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Cyber Security 2017 Curve

*Saumil Shah NetSquare

Contributing Factors

Cultural Fabric

Security lacks a top down and

sideways business or

organizational priority.

People & Policy

Policy is one way and employees

are willing to bend security policy

to gain perceived efficiency!

Security is implied and people are

complacent.

Lack of “Talking about” Cyber

Risk Management

Cyber is not part of business

planning.

Page 9: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Future Cyber Security Workforce Enabling FactorsCultural FabricCyber security is integrated into

communications, projects, processes and

leadership top-down, bottom up and

sideways.

People & PolicyPolicy becomes a two-way dialogue as

employees contribute to security policy.

Cyber security is a source of pride and

importance to all!

“Talking about” Cyber Risk

Management

Cyber is a part of the business!

Page 10: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Human

Factor

ExploitsAdversary

Page 11: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

2017– Adversary Landscape

• WannaCry

• Kronos

• Yahoo! Hack

• Outsourcing by

Russia

“Unorganized Crime”

Services are exchanged for profit.

Philadelphia – Ransomware aaS

Zues – Malware aaS

Tor’s Hammer – DDoS aaS

Alexsey Belan Marcus Hutchins

"Someone who is in an insider threat, who's seeking to do damage, will do the

damage, once they've made a decision.“William Evanina, head of U.S. CIA counterintelligence

“..the insider is an unwitting accomplice who falls prey to social engineering and

clicks malware in a phishing email. Insiders put value at risk”Admiral Mike McConnell, Former NSA Director

Page 12: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

2017 – Hackers go for simplicity..

IoT and Cloud are new Frontier

- CIOs have 1000’s of Cloud Apps

- Shadows IT means even more

- Hackers take advantage of ‘legacy’

cloud apps

Ransomware

- 64% of Americans are willing to

pay $1000 or more*

- Ransomware aaS makes it easy

for more criminals to get in the

game

Email is the Attack Weapon of Choice

- Ease of Use

- PowerShell and Attachments used to

deliver payloads

DDoS

- Mirai Botnet used infected cameras

and poorly secured devices to

create a mass network of denial

* Symantec Security Report

Page 13: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

2017 – Human Factor

Verizon 2017 Breach Report

- 66% of Malware was installed via an email attack

- 81% of attacks leveraged stolen or weak passwords

- 1 in 14 users were tricked into following a links or opening an attachment

2017 Blackhat Survey Attendee Survey

- The number one threat is social engineering - phishing, social network

exploits, or other methods

- The weakest link is end users who violate security policy and are too

easily fooled by social engineering attacks.

- A lack of security awareness about phishing and other social engineering

attacks is the most significant threat to the average consumer.

Page 14: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

https://infogram.com/dbir-1-in-14-were-tricked-into-following-a-

link-1gqnmxd3q5lqplw

Page 15: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Grizzly Steppe – Perfect Storm

https://www.us-cert.gov/sites/default/files/publications/JAR_16-

20296A_GRIZZLY%20STEPPE-2016-1229.pdf

Page 16: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Human Factor

ExploitsAdversary

Nation StateSpear Phishing

Malware Installation

Data Exfiltration

Unsuspecting Users

Soft “Least Privilege” controls

Soft “Monitoring of Logs”

Page 17: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Cultural Fabric• Strategic: Top down and sideways messages on awareness

• Identifying and protecting IP.

• If in doubt – check it out!

People & Policy• Promote awareness on social engineering: Be suspicious of any request to reset

your password.

• Review polices on password reset and privileged accounts that can install

software.

Controls & Monitoring• Implement risk based authentication and Multi-Factor Authentication in access

management.

• Monitor privileged accounts and implement privileged access management on

accounts that can install software.

Advocating Like a Cyber Security Leader

Page 18: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

One in many

Page 19: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Imagine if 1 in 10 were cyber security leaders!

Page 20: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Enabling Cyber Security LeadersTo Change Culture

SDLC

Project ManagementTeam

Meetings

Planning

Discussions

Communications

Financial

Process

Organizational

Culture

Leadership

Principles

Page 21: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Identify Cyber Security Leaders

Page 22: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...
Page 23: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

• Project managers, respected SMEs, LoB, Risk Managers

• Natural influence on process and projects

• Comfortable speaking with others

• Motivated and interested in learning about cybersecurity

• Follow procedure and want to be involved in policy and

control

Identifying Cyber Security Leaders!

Page 24: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Communication Platform

- Right Messages

- Supported Content

- Train others

- Model behavior

- Know the way forward

Toolset/Mindset

- Identity Powers

Experience

- Identity

Governance

- Open-Source

Business Leadership

- Security Principles

- Organizational Policy

- Regulatory Policy

- Cyber Security

Processes

Tools for Cyber Security Leaders

Page 25: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Enabling Trust through Least Privilege

Page 26: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

AccessIdentity Insight

Users

Devices

Things

Services

The Micro Focus Platform - Identity Powers Experience

Cloud

On-Premise

Hybrid

Page 27: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

AccessIdentity Insight

• Governance

• Provisioning

• Privileged Identity

• Self Service

• Social Registration

• Unified Identity

• Roles

• Analytics

• Data Security

• Risk Based Access

• SSO

• Privileged Access

• Federation

• Multi-Factor

• Mobile

• Social Access

• Analytics

• Data Security

• SIEM

• File Integrity

• Privileged Monitoring

• Configuration Monitoring

• Change Monitoring

• Analytics

• Data Security

Users

Devices

Things

Services

The Micro Focus Platform - Identity Powers Experience

Cloud

On-Premise

Hybrid

Page 28: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Who is responsible for enforcing least privilege?

HR

CFOCEO

CISOCompli

anceSales

CTODev

Ops

Everyone is responsible for leading when it comes to cyber!

Page 29: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Help leaders identify with Identity and Access Review!

Manager Identify Tools Manage Privilege?

Sales Manager SFDC

Quoting Tool

Workforce

Yes

No

Yes

Product Management Requirements Tool

Sharepoint

Research

Yes

Yes

No

HR

Page 30: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Educate Leaders on Enforcing Least Privilege with

Access Review!

Page 31: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Don’t inflict Governance on your business users.

Engage them at the right time, for the right reasons, and with the right information.

Page 32: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

IGA Business Benefits Eliminate Unnecessary Access (Least Privilege)

- Reduce the risk and impact of security breaches

- Reduce the cost of unused licenses or services

Improve Efficiency

- Quick and efficient provisioning/de-provisioning (Movers, Joiners, Leavers)

- Conduct simpler less demanding access reviews and certifications

- Provide self service Identity capabilities including access request and password reset

Improve Agility

- More easily adapt to change.

- Regulation changes

- On-boarding new systems and applications

- Absorbing mergers and acquisitions

Page 33: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Access Certification Preview

Page 34: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Point In Time Identity Governance

Identity

Event

Certification

Review

Secure &

Compliant?

Triggers

Action

Access

Retained

Without a real-time identity store, you’re only checking rules vs. entitlements based on the latest import. Was that last week? Last month…?

?

Page 35: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Real-Time Risks Need Adaptive Identity Governance

Identity

Event

Certification

Review

Secure &

Compliant

Triggers

Action

Access

Revoked

Page 36: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Open Source for Cyber Leaders

Research carefully before using these tools

Phishing Simulators

• Phishing Frenzy (Ruby on Rails – Linux Based)

• Go Phish (Installable EXE)

Stop Think Connect Toolkit from DHS

https://www.dhs.gov/stopthinkconnect-toolkit

Page 37: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Communication Platform

- Right Messages

- Supported Content

- Train others

- Model behavior

- Know the way forward

Tools

- Govern Identity &

Access

- Proactively

manage with

Security Analytics

Business Leadership

- Security Principles

- Organizational Policy

- Regulatory Policy

- Cyber Security

Processes

Enabling Cyber SecurityBusiness Leadership

Page 38: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

• Customer Obsession

• Ownership

• Invent and Simplify

• Are Right, A Lot

• Learn and Be Curious

• Hire and Develop the Best

• Insist on the Highest Standards

• Be a Cyber Security Leader

Leadership Principles

• Think Big

• Bias for Action

• Frugality

• Earn Trust

• Dive Deep

• Have Backbone;

Disagree and Commit

• Deliver Results

Page 39: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Leaders start with the customer and work backwards.

They work vigorously to earn and keep customer trust.

Although leaders pay attention to competitors, they

obsess over customers.

Customer Obsession

Page 40: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Cyber Security Leader Principle (fill in the blank)

Leaders always ensure that _____________________

They work vigorously to educate _________________

Although leaders pay attention to_________________

Page 41: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Cyber Security Leadership Principle

Leaders always ensure that the right policies and

controls are in place to support proactive cyber security

in their day to day projects.

They work vigorously to educate their colleagues and

customers on the importance of cyber security to their

business.

Although leaders pay attention to the big picture of

security, they obsess over risk management.

Leaders always ensure that

They work vigorously to

Although leaders pay attention to

Page 42: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Communication Platform

- Right Messages

- Supported Content

- Train others

- Model behavior

- Know the way forward

Tools

- Govern Identity &

Access

- Proactively

manage with

Security Analytics

Business Leadership

- Security Principles

- Organizational Policy

- Regulatory Policy

- Cyber Security

Processes

Enabling Cyber SecurityCommunication Platform

Page 43: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Phishing – Don’t get hooked!

Page 44: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Which one of these emails is a Phish?

Page 45: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

1. Check spelling & grammar- Hacker’s their; bad spellars!?

2. Look for time constraints - fraudsters create a call to action by

using time constrains for example “your account will be closed

in 12 hours if you do not act”

3. False authority – hackers use false authority to lead you into

their web of deception. Examples include – “You are under

investigation by the FBI, click this link to learn more…” or “The

CEO is asking that you use your company credit card to

purchase supplies click this link…”

4. Too good to be true – hackers use your public profile to find

out about your interests, offering rewards in exchange for action

– example “Click here for Free yoga classes”

5. Compliance, hackers demand action based on compliance or

false policy for example, “IT policy requires you to change your

password every 90 days, click here.”

How to identify a Phish Tips.

Need to Know

Hackers can disguise the

sender name, URL links

and attachment

extensions to look real

with PunyCode.

Verify any request for

your credentials or

financial information.

Page 46: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Think Like an Ethical Hacker Activity

The following exercise if for ethical hackers.

Can you agree to the following?

1. You will not use what you learn against others.

2. You will share your knowledge to promote good security

practices.

3. While we are not partaking in hacking today, you

understand that computer hacking including identity theft

and digital property theft is against the law in the United

States and other countries.

Page 47: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

How an ethical hacker thinks.

"Know thy self, know thy enemy.”

Sun Tzu“Not fear a thousand battles.”

Page 48: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

1. Choose a partner at your table.

2. Ask them about their interests

3. Craft a short phishing email that would be directed at

your partner (3-5 minutes)

• Choose a call to action such as:

• Open a document

• Click on a link

• Use at least 2 elements from “how to identify a Phish Tips”

4. Send it to your partner, after they read it, ask them if it

seemed convincing. Share examples with the group.

DIY Phishing Simulation

Page 49: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Thank You!If you would like a copy of these slides

please email me at

[email protected]

Page 50: Create a Culture of Cyber Security Leadership · PDF filePhiladelphia –Ransomware aaS ... SDLC Team Project Management Meetings Planning Discussions Communications Financial ...

Simon Puleo

[email protected]

Thank you