threa eat vulner erabili lity m managem ement w wher ere
play

Threa eat & & Vulner erabili lity M Managem ement: W - PowerPoint PPT Presentation

Threa eat & & Vulner erabili lity M Managem ement: W Wher ere e do y o you r ou ran ank? Ryan Wakeham Sr. Director, Strategic Solutions AGENDA The Threat Landscape Case Study Top 5 Questions to Ask Yourself


  1. Threa eat & & Vulner erabili lity M Managem ement: W Wher ere e do y o you r ou ran ank? Ryan Wakeham Sr. Director, Strategic Solutions

  2. AGENDA  The Threat Landscape  Case Study  Top 5 Questions to Ask Yourself  Threat & Vulnerability Management (TVM) Program Approach  Get Started 2

  3. THE THREAT LANDSCAPE 4

  4. STUXNET – A CASE STUDY Malware, discovered in 2010, that specifically  targeted Programmable Logic Controllers (PLC) Smart cyberweapon targeting industrial  infrastructure Infect Windows OS using 4 0-day vulnerabilities  Seeks out Siemens Step 7 software in order to  propagate to Siemens PLCs Payload only targets very specific SCADA  configurations Periodically modifies attached variable frequency  drives resulting in changes in motor speed Contained a PLC rootkit that masked the changes  it made by falsifying status information 5

  5. STUXNET – A CASE STUDY  Probably developed by nation state actors (highly likely Israel & USA)  In-depth knowledge of industrial processes  Burning of four 0-days indicates a high desire for success  Development estimates up to 30k hours (30 people over 6 months) – largest malware effort in history  Self-destruct and other safeguards in code  Results  Appeared to target an air-gapped uranium enrichment facility in Iran  Physically damaged up to 1,000 centrifuges  Set Iran’s nuclear program back several years 6

  6. MORE RECENT ICS ATTACKS Havex Industroyer er •ICS malware designed to harvest data, likely for future attacks •ICS malware specifically designed to attack Ukrainian •Targeted companies in Europe and USA electric grid 201 2014 2016 201 201 2015 2017 201 BlackE ckEnergy TRITO TON •Malware used to attack Ukrainian power distribution •Malware framework targeting ICS / safety systems in order companies to disrupt, degrade, or destroy industrial processes 7

  7. WHAT IS AT RISK FROM ICS ATTACKS? Power grids  Conventional and nuclear  power plants Healthcare  Water, sewage, and other  utilities HVAC  Processing and refining  Oil and gas  Public transportation  Airports and seaports 

  8. HOW THIS IMPACTS YOU  ICS/SCADA targeted attacks are representative of other malicious activity  Regardless of your industry, the threats are real  Unlike state-sponsored cyberwarfare, cybercriminals are typically opportunistic  Cybercriminals are becoming more productive  Proliferation of known vulnerabilities & exploits  Improved hacking skills  Increased effectiveness of automated toolsets  Security is still often an afterthought in system development  How can your TVM program protect your organization? 9

  9. HOW PREPARED ARE YOU TO RE RESPOND T TO TH THESE TH THREATS?

  10. TOP 5 QUESTIONS TO ASK YOURSELF  Do you have methods defined for reviewing and determining actions needed for technical vulnerabilities when they become known? And do you have capabilities to ensure these processes are working as designed?  Do you have infrastructure and application vulnerability risk acceptance and tracking capabilities? And do you ensure the “right” people within the organization are handling risk decisions?  Do you have established Threat Intelligence and Incident Response capabilities? And are they aligned with a comprehensive Threat and Vulnerability Management Program?  Do you have an established SDLC process inclusive of security requirements, checkpoints, and testing?  Do you conduct Business Impact Analyses to evaluate the criticality of applications and infrastructure with well-defined ownership of and accountability for all information assets? 11

  11. MEASURE YOUR MATURITY × Lack of asset / configuration  Clear picture of the organizations most mgmt. processes critical assets × No Threat Intel integration with  Well-defined (repeatable) process to Vuln. / Patch mgmt. respond to threats × No defined processes for  Mature capabilities for evaluating # OF ORGANIZATIONS evaluating technical technology risks and plans for action vulnerabilities  Formal risk management processes in × Inability to effectively react to place – right stakeholders involved incidents Threat & Vulnerability Management Maturity Low High Maturity Level 12

  12. COMMON CHALLENGES TIM IME DISC ISCONNECTED SE SECURIT ITY PAR ARTNER NERSHIP SENIOR L OR LEVEL L RESOU RE OURCES TO TOOLS TOOLS & TO & AMONGST ST AWAR AREN ENESS MATURITY TEAM AMS 13

  13. WHERE RE D DO Y O YOU OU GO FR GO FROM H HERE RE? 14

  14. RECOMMENDED TVM PROGRAM COMPONENTS ASSET MGMT INCIDENT CONFIG RESPONSE MGMT PE PEOPL PLE THREAT SOFTWARE / INTELLIGENCE DEV SEC PROCES ESS TECHNOL NOLOG OGY TECHNICAL VULN / TESTING PATCH MGMT 15

  15. MEASURE THE RESULTS 16

  16. BONUS CASE STUDY: PANERA BREAD  First reported on Sunday (April 2) by Brian Krebs; story still developing  In August, 2017, security researcher Dylan Houlihan found vulnerability on panerabread.com Exposed millions of customer loyalty records (name, email & physical address, DOB, CC last 4)  Reported to Panera Bread’s director of information security  Panera claimed to be working on a fix   Eight months later, the records were still available and could be crawled and indexed Asked whether he saw any indication that Panera ever addressed the issue he reported in August 2017 until today, Houlihan said no. “No, the flaw never disappeared,” he said. “I checked on it every month or so because I was pissed.”  Further investigation showed that there may have been close to 40 million customer records exposed https://krebsonsecurity.com/2018/04/panerabread-com-leaks-millions-of-customer-records/ 17

  17. GET STARTED  Review your responses to our initial 5 questions  Compare your TVM program to the framework TVM CHECKLIST  Do you have these elements in place?  Resources  How well do you think they are working?  Plan  What are you missing?  Time allocated  Measurement  Based on the framework  Budget  Identify immediate needs / quick wins  Executive sponsorship  Assign responsibility for the overall TVM program  If your program is at a high level of maturity:  Conduct more thorough analysis using the framework  Determine how effectively components are really working 18

  18. Thank you! Ryan Wakeham Sr. Director, Strategic Solutions 612-455-6977 RYAN@NETSPI.COM WWW.NETSPI.COM 19

Recommend


More recommend