46
Data is Everywhere Jay Jacobs [email protected]

Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Data is EverywhereJay Jacobs

[email protected]

Page 2: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Whatcha Been Doing?

• (Mostly) Full-time with Cyentia Institute

• Conducting sponsored research

• Building Cyentia Library

Page 3: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Cyber Balance Sheet 2017

Important to the CISO

Important to the BoardWhat the Board gets

Assets and users

Awareness activities

Business enablement

Compliance / Maturity

Governance info

Incidents / Events

Peer benchmarks

Response metrics

Risk posture

System vulnerabilities

10% 20% 30% 40% 50% 60% 70% 80%

Page 4: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

RSAC: Topics and Trends35

%8.

6%

6.1%

4.6%

4.6%

2.4%

1.7%

1.8%

1.3%

2.2%

36.9

%11

%6.

5%5.

2%

2.7%

2%1.

7%

1.2%

1.1%

0.9%

31.4

%

13.2

%6.

5%

4.9%

7%

2.1%

1.8%

1.5%

1%

1%

27.2

%

8.1%

6.1%

4.3%

3.6%

2.1%

2%

1.9%

1.6%

1.1%

37.6

%

10.3

%13

.9%

5.4%

3.1%

2%2.

1%2%

1.2%

0.9%

23.6

%

12.8

%

6.7%

4.5%

3%2.

9%

1.8%

1.4%

1.2%

1.4%

18.2

%

8.7%

5.7%

4.8%

3.8%

1.9%

2.7%

1.5%

1.1%

0.6%

16.3

%

8.7%

6.9%

12.2

%

3.1%

2.6%

1.7%

1.3%

1.4%

0.6%

30.4

%

7.8%

5.4%

10.7

%

4.9%

1.9%

3%

2.3%

1.5%

0.5%

17.8

%

7.5%

6%

4.2%

3.1%

2.5%

1.3%

1.5%

1.1%

1.1%

13.8

%

8.3%

8.1%

4.5%

4.3%

2.2%

2.5%

5.3%

0.9%

0.6%

11.7

%

6.8%

5.5%

3.9%

2.4%

5.3%

1.8%

1.3%

0.8%

0.7%

14.4

%7.

8%

5.7%

6.7%

2.3%

2.1%

1.9%

1.3%

0.9%

0.7%

11.5

%

6.9%

5.3%

4%

2.5%

2.6%

1.6%

1.4%

0.9%

0.5%

14.9

%

6.6%

7.9%

4.2%

2.9%

1.7%

1.9%

1.3%

1.5%

0.7%

12.5

%

9.3%

4.9%

3.7%

2.3%

1.6%

2.1%

1%1%

0.5%

Machine learning ATM Attack campaign Point−of−sale Email and web Deep/Dark web Fuzz testing Mainframe Admin privileges Buffer overflow Policy violation Payment service 3rd party Hardware inventory Disciplinary action Weak authentication

Stolen creds Misconfiguration Embedded system Kill Chain Reporting Venture capital Audit logs Wireless access CSRF Peripherals Event frequency Terrorism Productivity loss Loss magnitude NIST Mobile payment

Medical data Productivity software Small business Larceny and loss Directory server SQL injection Smart card Spyware FISMA Backdoor GDPR Impact Brute force Networked storage Trojan Terrorist

Competitor State actor Human error Cybercrime market Removable media Outage Hacktivism Software inventory SOX Reverse engineering Cyber insurance Startup CVE ISO/IEC Hw&Sw configuration Worm

Accountability Biometrics File sharing Fines & judgements Spoofing Cross−site scripting Privilege abuse Identity theft Reconnaissance Benchmark GRC Ransomware Network configuration Cyber−physical Payment data Prioritization

Spam Incident response Financial gain Targeted attack DNS Spending ROI Business application HIPAA Zero−day Board of Directors C2 Man−in−the−middle Espionage Data recovery Cyberwar

Vuln management Botnet Staffing Pen testing DoS attack Intellectual property Supply chain Extortion BYOD Web browser Audit Security policy PCI−DSS Intel sharing Injection attack− Controlled access

Personal data Network intrusion Fraud Metrics Internet of Things 3rd party services Risk analysis Database Insider Web application Threat intel Governance Control systems Phishing Big data Security training

Emerging tech Security standard Virtualization Planning CISO APT Risk management Data protection Social engineering Credentials Malware defenses InfoSec market Application security Disruption Criminal group Mobile app

Security incident Endpoint Threat actor Malware Cloud Integrity Confidentiality Vulnerability Mobile device Senior management Privacy Operating system Boundary defense Data breach Social media Availability

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

Source: Cyentia Institute with data from RSA Conference

Page 5: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

RSAC: Topics and Trends35

%8.

6%

6.1%

4.6%

4.6%

2.4%

1.7%

1.8%

1.3%

2.2%

36.9

%11

%6.

5%5.

2%

2.7%

2%1.

7%

1.2%

1.1%

0.9%

31.4

%

13.2

%6.

5%

4.9%

7%

2.1%

1.8%

1.5%

1%

1%

27.2

%

8.1%

6.1%

4.3%

3.6%

2.1%

2%

1.9%

1.6%

1.1%

37.6

%

10.3

%13

.9%

5.4%

3.1%

2%2.

1%2%

1.2%

0.9%

23.6

%

12.8

%

6.7%

4.5%

3%2.

9%

1.8%

1.4%

1.2%

1.4%

18.2

%

8.7%

5.7%

4.8%

3.8%

1.9%

2.7%

1.5%

1.1%

0.6%

16.3

%

8.7%

6.9%

12.2

%

3.1%

2.6%

1.7%

1.3%

1.4%

0.6%

30.4

%

7.8%

5.4%

10.7

%

4.9%

1.9%

3%

2.3%

1.5%

0.5%

17.8

%

7.5%

6%

4.2%

3.1%

2.5%

1.3%

1.5%

1.1%

1.1%

13.8

%

8.3%

8.1%

4.5%

4.3%

2.2%

2.5%

5.3%

0.9%

0.6%

11.7

%

6.8%

5.5%

3.9%

2.4%

5.3%

1.8%

1.3%

0.8%

0.7%

14.4

%7.

8%

5.7%

6.7%

2.3%

2.1%

1.9%

1.3%

0.9%

0.7%

11.5

%

6.9%

5.3%

4%

2.5%

2.6%

1.6%

1.4%

0.9%

0.5%

14.9

%

6.6%

7.9%

4.2%

2.9%

1.7%

1.9%

1.3%

1.5%

0.7%

12.5

%

9.3%

4.9%

3.7%

2.3%

1.6%

2.1%

1%1%

0.5%

Machine learning ATM Attack campaign Point−of−sale Email and web Deep/Dark web Fuzz testing Mainframe Admin privileges Buffer overflow Policy violation Payment service 3rd party Hardware inventory Disciplinary action Weak authentication

Stolen creds Misconfiguration Embedded system Kill Chain Reporting Venture capital Audit logs Wireless access CSRF Peripherals Event frequency Terrorism Productivity loss Loss magnitude NIST Mobile payment

Medical data Productivity software Small business Larceny and loss Directory server SQL injection Smart card Spyware FISMA Backdoor GDPR Impact Brute force Networked storage Trojan Terrorist

Competitor State actor Human error Cybercrime market Removable media Outage Hacktivism Software inventory SOX Reverse engineering Cyber insurance Startup CVE ISO/IEC Hw&Sw configuration Worm

Accountability Biometrics File sharing Fines & judgements Spoofing Cross−site scripting Privilege abuse Identity theft Reconnaissance Benchmark GRC Ransomware Network configuration Cyber−physical Payment data Prioritization

Spam Incident response Financial gain Targeted attack DNS Spending ROI Business application HIPAA Zero−day Board of Directors C2 Man−in−the−middle Espionage Data recovery Cyberwar

Vuln management Botnet Staffing Pen testing DoS attack Intellectual property Supply chain Extortion BYOD Web browser Audit Security policy PCI−DSS Intel sharing Injection attack− Controlled access

Personal data Network intrusion Fraud Metrics Internet of Things 3rd party services Risk analysis Database Insider Web application Threat intel Governance Control systems Phishing Big data Security training

Emerging tech Security standard Virtualization Planning CISO APT Risk management Data protection Social engineering Credentials Malware defenses InfoSec market Application security Disruption Criminal group Mobile app

Security incident Endpoint Threat actor Malware Cloud Integrity Confidentiality Vulnerability Mobile device Senior management Privacy Operating system Boundary defense Data breach Social media Availability

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

2009

2011

2013

2015

2017

Source: Cyentia Institute with data from RSA Conference

Page 6: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

RSAC: Landscape of Topics

3rd party

3rd party services

Account monitoring

Accountability

Admin privileges

Adware

Antiforensics

Application security

APT

ATM

Attack campaign

AuditAudit logs

BackdoorBackup media

Bank data

Benchmark

Big data

Biometrics

Board of Directors

Botnet

Boundary defense

Brute force

Buffer overflow

Bug bounty

Business application

BYODC2

Card reader

CISO

Classified data

ClickJacking

Cloud

COBIT

CompetitorConsumer tech

Control strengthControl systemsControlled access

Copyrighted data

COSO

Credentials

Criminal group

Cross−site scripting

Cryptanalysis

CSRF

CVE

CVSS CWE

Cyber insurance

Cyber−physical

Cybercrime market

Cyberwar

Data breach

Data protection

Data recovery

Database

Dataloss amount

Deep/Dark web

DHCP

Directory server

Disciplinary action DisruptionDNS

DoS attack

Downloader

Email and web

Embedded system

Emerging tech

Endpoint

Espionage

Event frequency

Extortion

FERPA

FFIEC

File sharing

Financial gain

Fines & judgements

FISMA

Forced browsing

Former employee

Fraud

Fuzz testing

GDPR

GLB

Governance

Hacktivism

Hardware inventory

HIPAA

HITRUST

Human error

Hw&Sw configuration

Identity theft

Impact

Incident response

InfoSec market

Injection attack−Input handling

Insider

Intel sharing

Intellectual property

Internet of Things

ISO/IEC

Kill Chain

Larceny and loss

Loss eventLoss magnitude

Machine learning

Mainframe

Malware defenses

Man−in−the−middle

Medical data

Metrics

MisconfigurationMobile app

Mobile device Mobile paymentNatural hazard

NERC CIP

Network configuration

Network control

Network intrusion

Networked storage

NISD

NIST

Operating system

Opportunistic attack

Outage

Packet sniffer

Pass−the−hash

Password dumper

Path traversal

Payment data

Payment service

PCI−DSS

PDF Reader

Pen testing

Peripherals

Personal data

Pharming

Phishing

Planning

Point−of−sale

Policy violation

Poor patching

Printed media

Prioritization

Privilege abuse

Productivity loss

Productivity software

Ram scraper

Ransomware

Reconnaissance

Remote access

Removable media

Replacement cost

Reporting

Reputation loss

Response costReverse engineering

Risk analysisRisk management

Rogue hardware

Rogue software

ROI

Rootkit

Security policy

Security standard

Security training

Senior management

Session replay

Skimmers

Small business

Smart card

Social engineering

Social media

Software inventory

Software piracy

SOX

Spam

Spending

Spoofing

Spyware

SQL injection

Staffing Startup

State actor

Stolen creds

Supply chain

Targeted attack

Terrorism TerroristThreat actor

Threat capability

Threat intel

Trojan

Venture capital

Virtualization

Vuln management Vulnerability

Watering hole

Weak authentication

Web application

Web browser

Web defacementWireless access

Wiretapping

Worm

Zero−day

Actors and motivesCompliance

Controls

Data

Desktop softwareEvents and TTPs

External services

Governance

Impact and Loss

InfrastructureIntelligence

Market trendsOther

Risk

Vulnerability

Source: Cyentia Institute with data from RSA Conference

Page 7: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

RSA Conference

Traditional Industry Labels

Cybersecurity

5%

10%

15%

20%

2010 2012 2014 2016 2018

Perc

ent o

f Sub

mitt

ed A

bstra

cts

Source: Cyentia Institute with data from RSA Conference

To Cyber or Not to Cyber?

Page 8: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Where we are headed

“What we (the security metrics people) must now do is learn how to do meta-analysis in our domain…”

- Geer, Jacobs, 2014

www.usenix.org

J U N E 20 14 VO L . 3 9, N O. 3 47

COLUMNS

Think of [knowledge] as a house that magically expands with each door you open.

You begin in a room with four doors, each leading to a new room that you haven’t

visited yet.… But once you open one of those doors and stroll into that room, three

new doors appear, each leading to a brand-new room that you couldn’t have reached

from your original starting point. Keep opening doors and eventually you’ll have

built a palace.Steven Johnson, “The Genius of the Tinkerer” [1]

Learning pays compound interest; as a person studies a subject, the more capable they

become at learning even more about the subject. Just as a student cannot tackle the chal-

lenges of calculus without studying the prerequisites, we must have diligence in how we

discover and build the prerequisite knowledge within cybersecurity. Before we discuss where we are heading, let’s establish where we are. Until now, we (security

metricians, including the present authors) could exhort people to “Just measure something

for heaven’s sakes!” It’s safe to say that such measurement has largely begun. Therefore, we

have the better, if harder, problem of the meta-analysis (“research about research”) of many

observations, always remembering that the purpose of security metrics is decision support.Learning from All of UsTo understand how we are at processing our observations, we turn to published industry

reports. It’s clear that there are a lot more of them than even two years ago. Not all reports are

equal; parties have various motivations to publish, which creates divergent interpretations of

what represents research worth communicating.We suspect that most data included in industry reports are derived from convenience

samples—data gathered because it is available to the researcher, not necessarily data that

is representative enough to be generalizable. Not to make this a statistics tutorial, but for

generalizability you need to understand (and account for) your sampling fraction, or you need

to randomize your collection process. It is not that this or that industry report has a bias—all

data has bias; the question is whether you can correct for that bias. A single vendor’s data

supply will be drawn from that vendor’s customer base, and that’s something to correct for.

On the other hand, if you can find three or more vendors producing data of the same general

sort, combining them in order to compare them can wash out the vendor-to-customer bias at

least insofar as decision support is concerned.Do not mistake our comments for a reason to dismiss convenience samples; research with

a convenience sample is certainly better than “learning” from some mix of social media

and headlines. This challenge in data collection is not unique to cybersecurity; performing

research on automobile fatalities does not lend itself to selecting random volunteers. Study-

ing the effects of a disease requires a convenience study of patients with the disease. It’s too

Exploring with a PurposeD A N G E E R A N D J A Y J A C O B S

Dan Geer is the CISO for In-Q-Tel and a security researcher with a quantitative bent. He has a long history with the USENIX Association, including officer positions, program committees, etc. [email protected]

Jay Jacobs is the co-author of Data-Driven Security and a data analyst at Verizon where he contributes to their Data Breach Investigations Report. Jacobs is a cofounder of the Society of Information Risk Analysts. [email protected]

1. Meta-Analysis and standing on the shoulders of giants: Cochrane Library

2. Case study: Ransomware

3. The Cyentia Library: present and future

Page 9: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Cochrane Library

http://www.cochranelibrary.com/

Page 10: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Cochrane Library

http://www.cochranelibrary.com/

Page 11: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Systemic Reviews

Given a Research Question:

• Identify sources of evidence and information

• Appraise the quality of the evidence

• Synthesize and aggregate the evidence together (meta-analysis)

Research Question Identify Sources Appraise Quality Synthesize Evidence

Page 12: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Developing Research QuestionsA great research question:

• …is interesting

• …can be supported by observation/evidence

• …frames the object of measurement

Breakdown broad topics into a series of research questions

Poor Research Questions Better Research Questions

“How Secure is this web app?”

“What risks do we face?

“What is the probability this web app will have a vulnerability exploited in the next 12 months?”

“What is the probability of these events occurring this year?”

Research Question Identify Sources Appraise Quality Synthesize Evidence

Page 13: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Identify sourceshttps://www.cyentia.com/library/

Research Question Identify Sources Appraise Quality Synthesize Evidence

Page 14: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Identify sources

Research Question Identify Sources Appraise Quality Synthesize Evidence

Page 15: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Appraise the Quality

“Quality” is study-specific (survey vs collected data), but always contains:

1. Source of data, collection process (selection bias)

2. Sample size, sub-sample slices (sampling error)

3. Data Interpretation (e.g. statistics)

Appraising quality is subtle, complex and often subjective

Research Question Identify Sources Appraise Quality Synthesize Evidence

Page 16: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Synthesize Evidence

A meta-analysis uses a statistical approach to combine the results from multiple studies in an effort to increase power (over individual studies), improve estimates of the size of the effect and/or to resolve uncertainty when reports disagree.

Research Question Identify Sources Appraise Quality Synthesize Evidence

https://en.wikipedia.org/wiki/Meta-analysis

• Offset convenience samples

• Research in security is relatively simple: counts, proportions, means, etc.

Page 17: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Meta-Analysis: Combining ProportionsThink about picking marbles from an urn:

• First person picked 19 out of 50 red

• Second person picked 32 out of 75 red

• total: 51 out of 125 were red

…Assuming the studies are drawing from the same “urn” or are representative of the same urn

Can visualize and talk about confidence in proportions with the beta distribution

Page 18: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Beta Distribution

• “[The beta distribution] represents all the possible values of a probability when we don't know what that probability is.” - David Robinson, stats.stackexchange.com

• Basis for betaPERT, conjugate prior for bayesian inference

• Has two parameters: alpha (𝜶) and beta (β)

• 𝜶 are counts of class 1 (success/heads/red/breached/infected)

• β are counts of class 2

• 50 out of 250 machines infected with malware:

beta(𝜶=50, β=200)

Page 19: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Visualizing the Beta0.5 1 4 8 16

0.5

1

4

8

16

Beta

Alpha

Page 20: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

20% 25% 30% 35% 40% 45% 50% 55% 60%

Applying the beta

• Osterman does a ransomware study and surveys 540 people

• Claims the “average ransomware penetration rate” is 39 percent

• How confident should we be about that 39%?

540 * 0.39 = 211 (but could be 208 to 213) beta(211,329)

Page 21: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Measuring Ransomware

Page 22: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site
Page 23: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Measuring Ransomware: The Setup

Three broad research questions

• How many orgs are affected by ransomware (prevalence)?

• How many orgs are paying the ransom amount (payment rate)?

• How much does ransomware cost (ransom amount)?

BSI, Ergebnisse der Umfrage zur Betroffenheit durch Ransomware (2016) Fortinet, Q4 2016 Threat Landscape Report (2017) IBM, Ransomware: How Consumers and Businesses Value Their Data (2016) Kaspersky, Cost of Cryptomalware : SMBs at the Gunpoint (2016) Osterman Research / Malwarebytes, Understanding the Depth of the Global Ransomware Problem (2016) Ponemon Institute / Carbonite, The Rise of Ransomware (2017) Symantec report (2012) Dell Secureworks blog post (2013) University of Kent study (2015) BitDefender report (2016) Datto report (2016) Kaspersky - Consumer Security Risks (2016) TrustLook blog post (2017) Cisco Annual Security Report (2016) Cyber Extortion Risk Report, NYA International (2015)

Page 24: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Osterman/MalwarebytesIBM

Ponemon/CarboniteBSI

KasperskyFortinetOverall

15% 20% 25% 30% 35% 40% 45% 50% 55%Prevalence

Source: Cyentia Institute

Ransomware Prevalencewho pct x n

IBM 46% 276 600

Osterman/Malwarebytes 39% 211 540

Ponemon/Carbonite 36% 222 618

BSI 32% 189 592

ForFnet-Q4-2016 32% 1,280 4,000

Kaspersky 20% 600 3,000

Overall Estimate 30.6% +/- 0.7%

Page 25: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

How many orgs are paying?

Dell SecureworksSymantec

Univ of KentKasperksy

MalwareBytesTrustLook

DattoBitDefender

0% 10% 20% 30% 40% 50% 60%Percentage of Victims Paying Ransom

Surveys seperated from empirical dataRansomware Payment Rate

Source: Cyentia Institute

53/115

420/1000

8/2172/19546/127

49/14544/1500

8/2100<2.3%

40.4% 38% - 42.8%

Page 26: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

CIGI Study

©2017Ipsos.

Methodology• This survey was conducted by Ipsos on behalf of the Centre for International Governance Innovation

(“CIGI”) between December 23, 2016, and March 21, 2017. • The survey was conducted in 24 economies—Australia, Brazil, Canada, China, Egypt, France,

Germany, Great Britain, Hong Kong (China), India, Indonesia, Italy, Japan, Kenya, Mexico, Nigeria, Pakistan, Poland, South Africa, South Korea, Sweden, Tunisia, Turkey and the United States—and involved 24,225 Internet users.

• Twenty of the countries utilized the Ipsos Internet panel system while Tunisia was conducted via CATI, and Kenya, Nigeria and Pakistan utilized face-to-face interviewing, given online constraints in these countries and the length

• In the US and Canada respondents were aged 18-64, and 16-64 in all other countries. • Approximately 1000+ individuals were surveyed in each country and are weighted to match the

population in each country surveyed. The precision of Ipsos online polls is calculated using a credibility interval. In this case, a poll of 1,000 is accurate to +/- 3.5 percentage points. For those surveys conducted by CATI and face-to-face, the margin of error is +/-3.1, 19 times out of 20.

BIC = Brazil, India, ChinaAPAC = Asia Pacific

LATAM = Latin America

• Early 2017 study

• 24,225 Internet users

• Across 24 countries (individual surveys conducted)

• Weighted to match populated of country

Page 27: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Dell SecureworksSymantec

Univ of KentKasperksy

MalwareBytesTrustLook

DattoBitDefender

0% 10% 20% 30% 40% 50% 60%Percentage of Victims Paying Ransom

Surveys seperated from empirical dataRansomware Payment Rate

Source: Cyentia Institute

How many orgs are paying?

53/115

420/10008/21

72/19546/127

49/14544/1500

8/2100

40.4% 38% - 42.8%

<2.3%

“Among those who have been a victim, 41% say they paid the ransom…”

-CIGI/IPSOS Global Survey on Internet Security and Trust41%

Page 28: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Ransom Amounts

0%5%

10%15%20%25%30%35%40%45%

100-500 501-2k 2k-5k 5k-10k 10k-15k 15k-20k 20k+Ransom Amounts (in USD)Pr

opor

tion

of R

espo

ndan

tsAs reported by MSPsAverage Ransomware Amounts

Source: Cyentia Instutue, data from:Datto's State of the Channel Ransomware Report, 2016

U.S

.

U.K

.

Ger

man

y

Can

ada

Best overall estimate

95% confidence

0%

5%

10%

15%

20%

25%

30%

35%

0-500 501-1k 1k-5k 5k-10k 10k-50k 50k-150k 150+Ransom Amounts in USD

Prop

ortio

n of

Res

pond

ants

Ransomware Amounts by Country

Source: Cyentia Institute, data fromMalwareBytes/Osterman Research, "Understanding the Depth of the Global Ransomware Proble"

Page 29: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Exceeding Ransom Amount

Malwarebytes

Datto10%

20%

30%

40%

50%

60%

70%

80%

90%

100%

1,000 10,000 100,000Ransom Amounts (in USD)

Exce

edan

ce P

roba

bilit

yProbabily of Ransom Exceeding a Specific Amount

Source: Cyentia Instutue, data from:MalwareBytes/Osterman Research, "Understanding the Depth of the Global Ransomware Problem",

Datto's "State of the Channel Ransomware Report 2016"

Page 30: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Challenges: Lessons Learned• Experiment successful!

• While Library helped, identifying and narrowing down sources was a challenge **

• Quality of vendor reports was terrible, rejected 2 out 3 on average “Not all reports are equal; parties have various motivations to publish, which creates divergent interpretations of what represents research worth communicating.” - Geer, Jacobs 2014

• Very poor, circular or missing citations

• Terminology is loose and/or confusing

• Object of measurement and framing is muddled or misaligned

• …is Ponemon: 51% (perception), 36% (included), 1.2% (excluded on wording)

• Getting a simple sample size shouldn’t be this hard

• Synthesizing the evidence was relatively straight-forward.** …that we can improve

Page 31: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Cyentia Library: Present and Future

Page 32: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Cyentia Library TaggingM

arke

t tre

nds

GR

C M

anag

emen

t

Thre

ats

Info

rmat

ion

Asse

ts

Secu

rity

attri

bute

s

Impa

ct a

nd L

oss

Con

trols

Mis

cella

neou

s

Cyb

ercr

ime

mar

ket

Info

Sec

mar

ket

Vent

ure

capi

tal

Emer

ging

tech

Con

sum

er te

chSt

artu

pG

RC

Gov

erna

nce

Ris

k

Com

plia

nce

Acto

rs a

nd m

otive

s

Even

ts a

nd T

TPs

Infra

stru

ctur

e

Exte

rnal

ser

vice

s

Des

ktop

sof

twar

e

Dat

a

Vuln

erab

ility

Con

fiden

tialit

yIn

tegr

ityAv

aila

bilit

yIm

pact

Loss

eve

ntLo

ss m

agni

tude

Loss

form

sC

ontro

l stre

ngth

CIS

"Top

20" C

ontro

ls

Inte

lligen

ceBu

g bo

unty

Smal

l bus

ines

sM

achi

ne le

arni

ngD

eep/

Dar

k we

bKi

ll C

hain

Secu

rity

polic

yBo

ard

of D

irect

ors

Seni

or m

anag

emen

tC

ISO

Plan

ning

Prio

ritiz

atio

nR

epor

ting

Met

rics

Benc

hmar

kSp

endi

ngSt

affin

gD

isci

plin

ary

actio

nAc

coun

tabi

lity

ROI

Ris

k m

anag

emen

tR

isk

anal

ysis

Cyb

er in

sura

nce

Secu

rity

stan

dard

Audi

tN

IST

ISO

/IEC

HIP

AASO

XFI

SMA

NER

C C

IPH

ITRU

STG

LBPC

I−D

SSFE

RPA

FFIE

CC

OBI

TC

OSO

GD

PRN

ISD

Thre

at a

ctor

Hac

ktiv

ism

Crim

inal

gro

upSt

ate

acto

rC

ompe

titor

Terro

rist

Insi

der

Form

er e

mpl

oyee

3rd

party

APT

Cyb

erwa

rEs

pion

age

Terro

rism

Fina

ncia

l gai

nTh

reat

cap

abilit

yEv

ent f

requ

ency

Atta

ck c

ampa

ign

Secu

rity

inci

dent

Opp

ortu

nist

ic a

ttack

Targ

eted

atta

ckN

etwo

rk in

trusi

onD

ata

brea

chD

oS a

ttack

Priv

ilege

abu

seM

alwa

reW

eb d

efac

emen

tSo

cial

eng

inee

ring

Hum

an e

rror

Frau

dLa

rcen

y an

d lo

ssPh

ishi

ngSk

imm

ers

Dis

rupt

ion

Out

age

Spam

Botn

etW

ater

ing

hole

Cro

ss−s

ite s

crip

ting

Buffe

r ove

rflow

Man−i

n−th

e−m

iddl

ePa

th tr

aver

sal

Rec

onna

issa

nce

Cry

ptan

alys

isSQ

L in

ject

ion

Forc

ed b

row

sing

Rev

erse

eng

inee

ring

Brut

e fo

rce

Fuzz

test

ing

CSR

FPa

ss−t

he−h

ash

Stol

en c

reds

Sess

ion

repl

ayC

lickJ

acki

ngPa

cket

sni

ffer

Back

door

Pass

word

dum

per

Dow

nloa

der

Adwa

reC

2In

ject

ion

atta

ck−

Softw

are

pira

cyW

orm

Spyw

are

Ram

scr

aper

Ran

som

ware

Roo

tkit

Troj

anR

ogue

sof

twar

eR

ogue

har

dwar

ePo

licy

viol

atio

nW

ireta

ppin

gN

atur

al h

azar

dEx

torti

onSp

oofin

gAn

tifor

ensi

csId

entit

y th

eft

Phar

min

gBu

sine

ss a

pplic

atio

nW

eb a

pplic

atio

nIn

tern

et o

f Thi

ngs

Con

trol s

yste

ms

Embe

dded

sys

tem

Poin

t−of−s

ale

Virtu

aliz

atio

nEn

dpoi

ntM

obile

dev

ice

Mai

nfra

me

Back

up m

edia

Dat

abas

eD

irect

ory

serv

erC

yber−p

hysi

cal

Car

d re

ader

Rem

ote

acce

ssD

NS

DH

CP

Prin

ted

med

iaAT

MN

etwo

rked

sto

rage

Smar

t car

dPe

riphe

rals

Rem

ovab

le m

edia

Big

data

Cre

dent

ials

Biom

etric

sBY

OD

Supp

ly c

hain

3rd

party

ser

vice

sC

loud

Mob

ile p

aym

ent

Paym

ent s

ervi

ceW

eb b

row

ser

PDF

Rea

der

Mob

ile a

ppSo

cial

med

iaPr

oduc

tivity

sof

twar

eFi

le s

harin

gO

pera

ting

syst

emPa

ymen

t dat

aIn

telle

ctua

l pro

perty

Pers

onal

dat

aM

edic

al d

ata

Cla

ssifi

ed d

ata

Cop

yrig

hted

dat

aBa

nk d

ata

Zero−d

ayC

VEC

WE

CVS

SM

isco

nfig

urat

ion

Inpu

t han

dlin

gW

eak

auth

entic

atio

nPo

or p

atch

ing

Priva

cyN

onre

pudi

atio

nD

atal

oss

amou

ntPr

oduc

tivity

loss

Res

pons

e co

stR

epla

cem

ent c

ost

Com

petit

ive lo

ssFi

nes

& ju

dgem

ents

Rep

utat

ion

loss

Har

dwar

e in

vent

ory

Softw

are

inve

ntor

yH

w&S

w c

onfig

urat

ion

Vuln

man

agem

ent

Adm

in p

rivile

ges

Audi

t log

sEm

ail a

nd w

ebM

alwa

re d

efen

ses

Net

work

con

trol

Dat

a re

cove

ryN

etwo

rk c

onfig

urat

ion

Boun

dary

def

ense

Dat

a pr

otec

tion

Con

trolle

d ac

cess

Wire

less

acc

ess

Acco

unt m

onito

ring

Secu

rity

train

ing

Appl

icat

ion

secu

rity

Inci

dent

resp

onse

Pen

test

ing

Inte

l sha

ring

Thre

at in

tel

Page 33: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Cyentia Library TaggingM

arke

t tre

nds

GR

C M

anag

emen

t

Thre

ats

Info

rmat

ion

Asse

ts

Secu

rity

attri

bute

s

Impa

ct a

nd L

oss

Con

trols

Mis

cella

neou

s

Cyb

ercr

ime

mar

ket

Info

Sec

mar

ket

Vent

ure

capi

tal

Emer

ging

tech

Con

sum

er te

chSt

artu

pG

RC

Gov

erna

nce

Ris

k

Com

plia

nce

Acto

rs a

nd m

otive

s

Even

ts a

nd T

TPs

Infra

stru

ctur

e

Exte

rnal

ser

vice

s

Des

ktop

sof

twar

e

Dat

a

Vuln

erab

ility

Con

fiden

tialit

yIn

tegr

ityAv

aila

bilit

yIm

pact

Loss

eve

ntLo

ss m

agni

tude

Loss

form

sC

ontro

l stre

ngth

CIS

"Top

20" C

ontro

ls

Inte

lligen

ceBu

g bo

unty

Smal

l bus

ines

sM

achi

ne le

arni

ngD

eep/

Dar

k we

bKi

ll C

hain

Secu

rity

polic

yBo

ard

of D

irect

ors

Seni

or m

anag

emen

tC

ISO

Plan

ning

Prio

ritiz

atio

nR

epor

ting

Met

rics

Benc

hmar

kSp

endi

ngSt

affin

gD

isci

plin

ary

actio

nAc

coun

tabi

lity

ROI

Ris

k m

anag

emen

tR

isk

anal

ysis

Cyb

er in

sura

nce

Secu

rity

stan

dard

Audi

tN

IST

ISO

/IEC

HIP

AASO

XFI

SMA

NER

C C

IPH

ITRU

STG

LBPC

I−D

SSFE

RPA

FFIE

CC

OBI

TC

OSO

GD

PRN

ISD

Thre

at a

ctor

Hac

ktiv

ism

Crim

inal

gro

upSt

ate

acto

rC

ompe

titor

Terro

rist

Insi

der

Form

er e

mpl

oyee

3rd

party

APT

Cyb

erwa

rEs

pion

age

Terro

rism

Fina

ncia

l gai

nTh

reat

cap

abilit

yEv

ent f

requ

ency

Atta

ck c

ampa

ign

Secu

rity

inci

dent

Opp

ortu

nist

ic a

ttack

Targ

eted

atta

ckN

etwo

rk in

trusi

onD

ata

brea

chD

oS a

ttack

Priv

ilege

abu

seM

alwa

reW

eb d

efac

emen

tSo

cial

eng

inee

ring

Hum

an e

rror

Frau

dLa

rcen

y an

d lo

ssPh

ishi

ngSk

imm

ers

Dis

rupt

ion

Out

age

Spam

Botn

etW

ater

ing

hole

Cro

ss−s

ite s

crip

ting

Buffe

r ove

rflow

Man−i

n−th

e−m

iddl

ePa

th tr

aver

sal

Rec

onna

issa

nce

Cry

ptan

alys

isSQ

L in

ject

ion

Forc

ed b

row

sing

Rev

erse

eng

inee

ring

Brut

e fo

rce

Fuzz

test

ing

CSR

FPa

ss−t

he−h

ash

Stol

en c

reds

Sess

ion

repl

ayC

lickJ

acki

ngPa

cket

sni

ffer

Back

door

Pass

word

dum

per

Dow

nloa

der

Adwa

reC

2In

ject

ion

atta

ck−

Softw

are

pira

cyW

orm

Spyw

are

Ram

scr

aper

Ran

som

ware

Roo

tkit

Troj

anR

ogue

sof

twar

eR

ogue

har

dwar

ePo

licy

viol

atio

nW

ireta

ppin

gN

atur

al h

azar

dEx

torti

onSp

oofin

gAn

tifor

ensi

csId

entit

y th

eft

Phar

min

gBu

sine

ss a

pplic

atio

nW

eb a

pplic

atio

nIn

tern

et o

f Thi

ngs

Con

trol s

yste

ms

Embe

dded

sys

tem

Poin

t−of−s

ale

Virtu

aliz

atio

nEn

dpoi

ntM

obile

dev

ice

Mai

nfra

me

Back

up m

edia

Dat

abas

eD

irect

ory

serv

erC

yber−p

hysi

cal

Car

d re

ader

Rem

ote

acce

ssD

NS

DH

CP

Prin

ted

med

iaAT

MN

etwo

rked

sto

rage

Smar

t car

dPe

riphe

rals

Rem

ovab

le m

edia

Big

data

Cre

dent

ials

Biom

etric

sBY

OD

Supp

ly c

hain

3rd

party

ser

vice

sC

loud

Mob

ile p

aym

ent

Paym

ent s

ervi

ceW

eb b

row

ser

PDF

Rea

der

Mob

ile a

ppSo

cial

med

iaPr

oduc

tivity

sof

twar

eFi

le s

harin

gO

pera

ting

syst

emPa

ymen

t dat

aIn

telle

ctua

l pro

perty

Pers

onal

dat

aM

edic

al d

ata

Cla

ssifi

ed d

ata

Cop

yrig

hted

dat

aBa

nk d

ata

Zero−d

ayC

VEC

WE

CVS

SM

isco

nfig

urat

ion

Inpu

t han

dlin

gW

eak

auth

entic

atio

nPo

or p

atch

ing

Priva

cyN

onre

pudi

atio

nD

atal

oss

amou

ntPr

oduc

tivity

loss

Res

pons

e co

stR

epla

cem

ent c

ost

Com

petit

ive lo

ssFi

nes

& ju

dgem

ents

Rep

utat

ion

loss

Har

dwar

e in

vent

ory

Softw

are

inve

ntor

yH

w&S

w c

onfig

urat

ion

Vuln

man

agem

ent

Adm

in p

rivile

ges

Audi

t log

sEm

ail a

nd w

ebM

alwa

re d

efen

ses

Net

work

con

trol

Dat

a re

cove

ryN

etwo

rk c

onfig

urat

ion

Boun

dary

def

ense

Dat

a pr

otec

tion

Con

trolle

d ac

cess

Wire

less

acc

ess

Acco

unt m

onito

ring

Secu

rity

train

ing

Appl

icat

ion

secu

rity

Inci

dent

resp

onse

Pen

test

ing

Inte

l sha

ring

Thre

at in

tel

Page 34: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Report: Hacker One

AvailabilityBug bounty

Cross−site scriptingCSRF

Cyber−physicalData breach

ExtortionFinancial gain

Identity theftImpact

Intellectual propertyMalware

Mobile appOperating system

OutagePen testing

Personal dataSecurity incident

Senior managementSocial mediaSQL injection

StaffingThreat actor

Vuln managementVulnerability

Web browser

1 5 10 15 20 25PDF Page

Page 35: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Report: Cisco Mid-year Report 2017

1

Cisco 2017 Midyear Cybersecurity Report

Executive Summary

3rd party servicesAPT

AuditAudit logs

Board of DirectorsBotnet

Boundary defenseC2

CISOCloud

CompetitorControl systems

CredentialsCriminal group

Data breachDatabaseDisruption

DoS attackDownloader

Emerging techEndpoint

Event frequencyExtortion

FraudInfoSec market

IntegrityMalware

Malware defensesMobile device

Network intrusionOperating system

OutagePersonal data

PhishingPlanning

Productivity lossRansomware

Risk managementSecurity incident

Security policySecurity standard

Senior managementSocial media

SpamSpywareStaffing

Supply chainTargeted attack

Threat actorThreat intel

Vuln managementVulnerability

Web browserZero−day

1 10 20 30 40 50 60 70 80

PDF Page

Page 36: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Aite: Cyber Insurance

3rd party servicesAPT

BenchmarkBotnetCISOCloud

CompetitorCyber insurance

Cybercrime marketData breach

DatabaseDeep/Dark webEmerging tech

EndpointEvent frequency

ExtortionFines & judgements

FraudGDPR

Incident responseInfoSec market

Intellectual propertyMalware

Network intrusionPayment data

Pen testingPersonal data

PhishingPrivacy

Productivity lossResponse cost

Risk analysisRisk management

Security incidentSecurity standard

Senior managementSmall business

StaffingStartup

Threat actorThreat intel

Vuln managementVulnerability

1 10 20 30 40 50 60 70

PDF Page

© 2016 Aite Group LLC. All rights reserved. Reproduction of this report by any means is strictly prohibited. Photocopying or electronic distribution of this document or any of its contents without prior written consent of the publisher violates U.S. copyright law, and is punishable by statutory damages of up to US$150,000 per infringement, plus attorneys’ fees (17 USC 504 et seq.). Without advance permission, illegal copying includes regular photocopying, faxing, excerpting, forwarding electronically, and sharing of online access.

Cyber Insurance and Cybersecurity: The Convergence

June 2016

Gwenn Bézard

Page 37: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Verzion DBIR 2017

Application securityBackdoor

BotnetBoundary defense

Brute forceC2

ConfidentialityCredentials

Criminal groupData breach

Data protectionDatabaseDisruption

Emerging techEndpoint

EspionageEvent frequency

ExtortionFinancial gain

FraudHacktivism

Human errorIdentity theft

Incident responseInfoSec market

InsiderIntegrity

Intellectual propertyLarceny and loss

MalwareMalware defenses

Medical dataMisconfiguration

Mobile deviceNetwork intrusion

Opportunistic attackPersonal data

PhishingPrinted media

Privilege abuseRansomware

Security incidentSecurity training

SkimmersSmall business

Social engineeringSocial media

SpywareSQL injectionStolen credsThreat actor

Vuln managementVulnerability

Weak authenticationWeb application

Web browser

1 10 20 30 40 50 60 70

PDF Page

2017 Data BreachInvestigations Report10th Edition

OFX

PB

U2FsdGVkX19xySK0fJn+xJH2VKLfWI8u+gK2bIHpVeoudbc5Slk0HosGiUNH7oiq

CNjiSkfygVslq77WCIM0rqxOZoW/qGMN+eqKMBnhfkhWgtAtcnGc2xm9vxpx5quA

Page 38: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Topic/Tagging

Security attributes > ConfidentialitySecurity attributes > Integrity

GRC Management > GovernanceInformation Assets > Desktop software

Information Assets > VulnerabilityInformation Assets > Data

Controls > CIS "Top20" ControlsInformation Assets > Infrastructure

Threats > Actors and motivesThreats > Events and TTPs

Verizon DBIR 2017

Information Assets > External servicesInformation Assets > Data

Impact and Loss > Loss formsControls > CIS "Top20" Controls

Miscellaneous > NAGRC Management > Governance

Threats > Actors and motivesInformation Assets > Infrastructure

Threats > Events and TTPsGRC Management > Risk

Aite: Cyber Insurance

GRC Management > ComplianceInformation Assets > Data

Market trends > Emerging techInformation Assets > Desktop softwareInformation Assets > External services

GRC Management > GovernanceInformation Assets > VulnerabilityControls > CIS "Top20" Controls

Information Assets > InfrastructureThreats > Actors and motives

Threats > Events and TTPs

Cisco Midyear 2017

Impact and Loss > ImpactInformation Assets > Infrastructure

Security attributes > AvailabilityControls > CIS "Top20" Controls

Information Assets > DataGRC Management > Governance

Information Assets > Desktop softwareThreats > Events and TTPs

Miscellaneous > MiscInformation Assets > Vulnerability

Threats > Actors and motives

HackerOne: Bug Bounty

Page 39: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Parsing PDFs: Text Extraction

8

Figure 3: Data risks based on actual volumes of sensitive data stored in each location compared to the perception of risk

Corporate servers and databases pose the highest risk, yet spending remains stubbornly focused on endpoint and mobile

The top three locations by volume where company-sensitive data is stored and must be protected are: databases (49%), file servers (39%), and the rapid growth area for cloud service environments (36%). The position is fairly consistent across most major geographies and mainstream verticals including financial services, healthcare, and the retail sector.

Along with the ubiquitous use of databases and servers, cloud and more recently big data take-up levels now force a stronger protection case to be made. Growing data volumes, when put alongside worries about a lack of control over third-party access; the use of third-party admins; and data

locational issues when foreign intervention and legal sovereignty come into play, make the case for improving cloud-services data protection. Also, as more data needs to transition between on-premise systems and cloud and big data environments, organizations need to make use of more inclusive data protection facilities to control and protect their data as it moves between corporate systems.

Another discussion that should take place revolves around the perception of risk that mobile devices and user mobility bring to the table. By comparison only 20% of sensitive company data is held on mobile devices and, of that 20%, a large proportion is being held on company-owned laptops and other company-protected mobile devices. In our opinion the discussion isn’t really about the data volumes involved, and if it were, 20% is still significant enough to cause anxiety. But the real concern for the 70% of IT Decision Makers who were worried about mobile device protection is firmly about the lack of control over the mobile devices that are in use. It is also about not having enough information to know what data has been copied to those devices and not having the controls in place to stop copies of company-sensitive data being made.

Good quality monitoring and access control technology provide part of the answer. Irrespective of where the data is being held, it is important to know and be able to control who gets access and what they can do with that access. This provides the ability to highlight and report on misuse that could otherwise put company-sensitive data at risk.

TOP 3 LOCATIONS WHERE DATA IS AT RISK IN VOLUME:

Databases (49%)

File Servers (39%)

Cloud (36%)

Figure 4: Global spending on security solutions during the next 12 months

0

5

10

15

20

25

30

35

40

45

Much H

igher

Higher

SameLo

wer

Much L

ower

% S

pend

Fig

ures

0

5

10

15

20

25

30

35

40

45

50

Dbase

s

FileS

ervers

Cloud

Big Data

Backu

p Saa

S

PC&WS

Mobile

Hard C

opy

Dat

a Pe

rcen

tage

s

Actual risk Perception of risk

locational issues when foreign intervention and legalsovereignty come into play, make the case for improvingcloud-services data protection. Also, as more data needsto transition between on-premise systems and cloud andbig data environments, organizations need to make useof more inclusive data protection facilities to control andprotect their data as it moves between corporate systems.

TOP 3 LOCATIONS WHEREDATA IS AT RISK IN VOLUME:

� Databases (49%)⠢File Servers (39%)⠢Cloud (36%)

The top three locations by volume where company-sensitive data is stored and must be protected are:databases (49%), file servers (39%), and the rapidgrowth area for cloud service environments (36%).The position is fairly consistent across most majorgeographies and mainstream verticals includingfinancial services, healthcare, and the retail sector.

Another discussion that should take place revolvesaround the perception of risk that mobile devices anduser mobility bring to the table. By comparison only 20%of sensitive company data is held on mobile devicesand, of that 20%, a large proportion is being held oncompany-owned laptops and other company-protectedmobile devices. In our opinion the discussionisnâ treallyabout the data volumes involved, and if it were, 20% is stillsignificant enough to cause anxiety. But the real concernfor the 70% of IT Decision Makers who were worried aboutmobile device protection is firmly about the lack of controlover the mobile devices that are in use. It is also about nothaving enough information to know what data has beencopied to those devices and not having the controls inplace to stop copies of company-sensitivedata being made.

Along with the ubiquitous use of databases andservers, cloud and more recently big data take-uplevels now force a stronger protection case to bemade. Growing data volumes, when put alongsideworries about a lack of control over third-partyaccess; the use of third-party admins; and data

Good quality monitoring and access control technologyprovide part of the answer. Irrespective of where the datais being held, it is important to know and be able to controlwho gets access and what they can do with that access.This provides the ability to highlight and report on misusethat could otherwise put company-sensitive data at risk.

Corporate servers and databases pose thehighest risk, yet spending remains stubbornlyfocused on endpoint and mobile

Actualrisk Perceptionofrisk5045

4535 4030

%

Spend

Figures252015105

30252015105

tackup SaaPC

S &WMSoHa

bilerdCopyd

MuchHi

Bas 0

DaBig

ouClverSer

FileDbases

0

Figure 3:Datarisksbased on actualvolumesof sensitivedatastored in each locationcompared to the perception of risk

8

35

gh Hier gheSa

r m

MLe

ucowh

erLower

Data

Percentages

40

Figure 4:Global spending on securitysolutions during the next 12 months

Page 40: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Parsing PDFs: early attempt

8

Figure 3: Data risks based on actual volumes of sensitive data stored in each location compared to the perception of risk

Corporate servers and databases pose the highest risk, yet spending remains stubbornly focused on endpoint and mobile

The top three locations by volume where company-sensitive data is stored and must be protected are: databases (49%), file servers (39%), and the rapid growth area for cloud service environments (36%). The position is fairly consistent across most major geographies and mainstream verticals including financial services, healthcare, and the retail sector.

Along with the ubiquitous use of databases and servers, cloud and more recently big data take-up levels now force a stronger protection case to be made. Growing data volumes, when put alongside worries about a lack of control over third-party access; the use of third-party admins; and data

locational issues when foreign intervention and legal sovereignty come into play, make the case for improving cloud-services data protection. Also, as more data needs to transition between on-premise systems and cloud and big data environments, organizations need to make use of more inclusive data protection facilities to control and protect their data as it moves between corporate systems.

Another discussion that should take place revolves around the perception of risk that mobile devices and user mobility bring to the table. By comparison only 20% of sensitive company data is held on mobile devices and, of that 20%, a large proportion is being held on company-owned laptops and other company-protected mobile devices. In our opinion the discussion isn’t really about the data volumes involved, and if it were, 20% is still significant enough to cause anxiety. But the real concern for the 70% of IT Decision Makers who were worried about mobile device protection is firmly about the lack of control over the mobile devices that are in use. It is also about not having enough information to know what data has been copied to those devices and not having the controls in place to stop copies of company-sensitive data being made.

Good quality monitoring and access control technology provide part of the answer. Irrespective of where the data is being held, it is important to know and be able to control who gets access and what they can do with that access. This provides the ability to highlight and report on misuse that could otherwise put company-sensitive data at risk.

TOP 3 LOCATIONS WHERE DATA IS AT RISK IN VOLUME:

Databases (49%)

File Servers (39%)

Cloud (36%)

Figure 4: Global spending on security solutions during the next 12 months

0

5

10

15

20

25

30

35

40

45

Much H

igher

Higher

SameLo

wer

Much L

ower

% S

pend

Fig

ures

0

5

10

15

20

25

30

35

40

45

50

Dbase

s

FileS

ervers

Cloud

Big Data

Backu

p Saa

S

PC&WS

Mobile

Hard C

opy

Dat

a Pe

rcen

tage

s

Actual risk Perception of risk

locational issues when foreign intervention and legalsovereignty come into play, make the case for improvingcloud-services data protection. Also, as more data needsto transition between on-premise systems and cloud andbig data environments, organizations need to make useof more inclusive data protection facilities to control andprotect their data as it moves between corporate systems.

TOP 3 LOCATIONS WHEREDATA IS AT RISK IN VOLUME:

� Databases (49%)⠢File Servers (39%)⠢Cloud (36%)

The top three locations by volume where company-sensitive data is stored and must be protected are:databases (49%), file servers (39%), and the rapidgrowth area for cloud service environments (36%).The position is fairly consistent across most majorgeographies and mainstream verticals includingfinancial services, healthcare, and the retail sector.

Another discussion that should take place revolvesaround the perception of risk that mobile devices anduser mobility bring to the table. By comparison only 20%of sensitive company data is held on mobile devicesand, of that 20%, a large proportion is being held oncompany-owned laptops and other company-protectedmobile devices. In our opinion the discussionisnâ treallyabout the data volumes involved, and if it were, 20% is stillsignificant enough to cause anxiety. But the real concernfor the 70% of IT Decision Makers who were worried aboutmobile device protection is firmly about the lack of controlover the mobile devices that are in use. It is also about nothaving enough information to know what data has beencopied to those devices and not having the controls inplace to stop copies of company-sensitivedata being made.

Along with the ubiquitous use of databases andservers, cloud and more recently big data take-uplevels now force a stronger protection case to bemade. Growing data volumes, when put alongsideworries about a lack of control over third-partyaccess; the use of third-party admins; and data

Good quality monitoring and access control technologyprovide part of the answer. Irrespective of where the datais being held, it is important to know and be able to controlwho gets access and what they can do with that access.This provides the ability to highlight and report on misusethat could otherwise put company-sensitive data at risk.

Corporate servers and databases pose thehighest risk, yet spending remains stubbornlyfocused on endpoint and mobile

Actualrisk Perceptionofrisk5045

4535 4030

%

Spend

Figures252015105

30252015105

tackup SaaPC

S &WMSoHa

bilerdCopyd

MuchHi

Bas 0

DaBig

ouClverSer

FileDbases

0

Figure 3: Data risks based on actual volumes of sensitivedatastored in each location compared to the perception of risk

8

35

gh Hier gheSa

r m

MLe

ucowh

erLower

Data

Percentages

40

Figure 4: Global spending on securitysolutions during the next 12 months

Page 41: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Parsing PDFs Spatially

8

Figure 3: Data risks based on actual volumes of sensitive data stored in each location compared to the perception of risk

Corporate servers and databases pose the highest risk, yet spending remains stubbornly focused on endpoint and mobile

The top three locations by volume where company-sensitive data is stored and must be protected are: databases (49%), file servers (39%), and the rapid growth area for cloud service environments (36%). The position is fairly consistent across most major geographies and mainstream verticals including financial services, healthcare, and the retail sector.

Along with the ubiquitous use of databases and servers, cloud and more recently big data take-up levels now force a stronger protection case to be made. Growing data volumes, when put alongside worries about a lack of control over third-party access; the use of third-party admins; and data

locational issues when foreign intervention and legal sovereignty come into play, make the case for improving cloud-services data protection. Also, as more data needs to transition between on-premise systems and cloud and big data environments, organizations need to make use of more inclusive data protection facilities to control and protect their data as it moves between corporate systems.

Another discussion that should take place revolves around the perception of risk that mobile devices and user mobility bring to the table. By comparison only 20% of sensitive company data is held on mobile devices and, of that 20%, a large proportion is being held on company-owned laptops and other company-protected mobile devices. In our opinion the discussion isn’t really about the data volumes involved, and if it were, 20% is still significant enough to cause anxiety. But the real concern for the 70% of IT Decision Makers who were worried about mobile device protection is firmly about the lack of control over the mobile devices that are in use. It is also about not having enough information to know what data has been copied to those devices and not having the controls in place to stop copies of company-sensitive data being made.

Good quality monitoring and access control technology provide part of the answer. Irrespective of where the data is being held, it is important to know and be able to control who gets access and what they can do with that access. This provides the ability to highlight and report on misuse that could otherwise put company-sensitive data at risk.

TOP 3 LOCATIONS WHERE DATA IS AT RISK IN VOLUME:

Databases (49%)

File Servers (39%)

Cloud (36%)

Figure 4: Global spending on security solutions during the next 12 months

0

5

10

15

20

25

30

35

40

45

Much H

igher

Higher

SameLo

wer

Much L

ower

% S

pend

Fig

ures

0

5

10

15

20

25

30

35

40

45

50

Dbase

s

FileS

ervers

Cloud

Big Data

Backu

p Saa

S

PC&WS

Mobile

Hard C

opy

Dat

a Pe

rcen

tage

s

Actual risk Perception of risk

Page 42: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Parsing PDFs

8

Figure 3: Data risks based on actual volumes of sensitive data stored in each location compared to the perception of risk

Corporate servers and databases pose the highest risk, yet spending remains stubbornly focused on endpoint and mobile

The top three locations by volume where company-sensitive data is stored and must be protected are: databases (49%), file servers (39%), and the rapid growth area for cloud service environments (36%). The position is fairly consistent across most major geographies and mainstream verticals including financial services, healthcare, and the retail sector.

Along with the ubiquitous use of databases and servers, cloud and more recently big data take-up levels now force a stronger protection case to be made. Growing data volumes, when put alongside worries about a lack of control over third-party access; the use of third-party admins; and data

locational issues when foreign intervention and legal sovereignty come into play, make the case for improving cloud-services data protection. Also, as more data needs to transition between on-premise systems and cloud and big data environments, organizations need to make use of more inclusive data protection facilities to control and protect their data as it moves between corporate systems.

Another discussion that should take place revolves around the perception of risk that mobile devices and user mobility bring to the table. By comparison only 20% of sensitive company data is held on mobile devices and, of that 20%, a large proportion is being held on company-owned laptops and other company-protected mobile devices. In our opinion the discussion isn’t really about the data volumes involved, and if it were, 20% is still significant enough to cause anxiety. But the real concern for the 70% of IT Decision Makers who were worried about mobile device protection is firmly about the lack of control over the mobile devices that are in use. It is also about not having enough information to know what data has been copied to those devices and not having the controls in place to stop copies of company-sensitive data being made.

Good quality monitoring and access control technology provide part of the answer. Irrespective of where the data is being held, it is important to know and be able to control who gets access and what they can do with that access. This provides the ability to highlight and report on misuse that could otherwise put company-sensitive data at risk.

TOP 3 LOCATIONS WHERE DATA IS AT RISK IN VOLUME:

Databases (49%)

File Servers (39%)

Cloud (36%)

Figure 4: Global spending on security solutions during the next 12 months

0

5

10

15

20

25

30

35

40

45

Much H

igher

Higher

SameLo

wer

Much L

ower

% S

pend

Fig

ures

0

5

10

15

20

25

30

35

40

45

50

Dbase

s

FileS

ervers

Cloud

Big Data

Backu

p Saa

S

PC&WS

Mobile

Hard C

opy

Dat

a Pe

rcen

tage

s

Actual risk Perception of risk

Page 43: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Parsing PDFs

11

Figure 7: Protection solutions used by enterprise organizations against insider threats

The most effective data protection technologies and the ones most frequently deployed by enterprise organizations were database and file encryption products, data access monitoring solutions, and data loss prevention technologies. As shown below, these topped a long list of protection solutions and were considered by enterprise respondents to offer the most effective protection against insider threats. Surprisingly tokenization, which has compliance-related uses, came bottom of the list. This may be due to restricted knowledge about the specific benefits the technology has. For example, if organizations need to protect data for specific purposes such as fulfilling payment card industry data security standard (PCI DSS) compliance, tokenization has scoping advantages over other forms of encryption that ensure the scope of audit requirements is reduced, as well as enabling the data to be used by other systems without compromising security.

THE MOST EFFECTIVE DATA PROTECTION TECHNOLOGIES:

Database and file encryption

Data Access Monitoring

Percentage Using

0% 10% 20% 30% 40% 50% 60%

Tokenization

Federated Identity Management

Single Sign On

Data Masking

Account Controls Provided By Directory Services Software

Multi-factor Authentication

Siem and Other Log Analysis and Analytical Tools

Application Layer Encryption

Cloud Security Gateway Privileged User Access Management

Data Loss Prevention (DLP) Data Access Monitoring

Database/File Encryption

Security Protection Levels

Page 44: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Parsing PDFs

23

ANALYST PROFILE—ANDREW KELLETT, PRINCIPAL ANALYST SOFTWARE—IT SOLUTIONS, OVUM

Andrew enjoys the challenge of working with state-of-the-art technology. As lead analyst in the Ovum IT security team, he has the opportunity to evaluate, provide opinion, and drive the Ovum security agenda, including its focus on the latest security trends. He is responsible for research on the key technologies used to protect public and private sector organizations, their operational systems, and their users. The role provides a balanced opportunity to promote the need for good business protection and, at the same time, to research the latest threat approaches.

HARRIS POLL—SOURCE/METHODOLOGY

Vormetric’s 2015 Insider Threat Report was conducted online by Harris Poll on behalf of Vormetric from September 22-October 16, 2014, among 818 adults ages 18 and older, who work full-time as an IT professional in a company and have at least a major influence in decision making for IT. In the U.S., 408 ITDMs were surveyed among companies with at least $200 million in revenue with 102 from the health care industries, 102 from financial industries, 102 from retail industries and 102 from other industries. Roughly 100 ITDMs were interviewed in the UK (103), Germany (102), Japan (102), and ASEAN (103) from companies that have at least $100 million in revenue. ASEAN countries were defined as Singapore, Malaysia, Indonesia, Thailand, and the Philippines. This online survey is not based on a probability sample and therefore no estimate of theoretical sampling error can be calculated.

ABOUT VORMETRIC

Vormetric (@Vormetric) is the industry leader in data security solutions that protect data-at-rest across physical, big data and cloud environments. Vormetric helps over 1500 customers, including 17 of the Fortune 30, to meet compliance requirements and protect what matters—their sensitive data—from both internal and external threats. The company’s scalable Vormetric Data Security Platform protects any file, any database and any application’s data—anywhere it resides—with a high performance, market-leading solution set.

Andrew Kellett Principal Analyst Software IT Solutions, Ovum

ANALYST PROFILEâ€̃ANDREWKELLETT, PRINCIPALANALYST SOFTWAREâ€̃ IT SOLUTIONS, OVUM

Andrew enjoys the challenge of working with state−of−the−art technology.As lead analyst in the Ovum IT security team, he has the opportunity toevaluate, provide opinion, and drive the Ovum security agenda, including itsfocus on the latest security trends. He is responsible for research on the keytechnologies used to protect public and private sector organizations, theiroperational systems, and their users. The role provides a balanced opportunityto promote the need for good business protection and, at the same time, toresearch the latest threat approaches.

HARRIS POLLâ€̃SOURCE/METHODOLOGY

Vormetric†s2015 Insider Threat Report was conducted online by HarrisPoll on behalf of Vormetric from September 22−October 16, 2014, among818 adults ages 18 and older, who work full−time as an IT professional ina company and have at least a major influence in decision making for IT. Inthe U.S., 408 ITDMs were surveyed among companies with at least $200million in revenue with 102 from the health care industries, 102 from financialindustries, 102 from retail industries and 102 from other industries. Roughly100 ITDMs were interviewed in the UK (103), Germany (102), Japan (102),and ASEAN (103) from companies that have at least $100 million in revenue.ASEAN countries were defined as Singapore, Malaysia, Indonesia, Thailand,and the Philippines. This online survey is not based on a probability sampleand therefore no estimate of theoretical sampling error can be calculated.

Andrew KellettPrincipalAnalystSoftwareITSolutions,Ovum

ABOUT VORMETRIC

Vormetric (@Vormetric) is the industry leader in data security solutionsthat protect data−at−rest across physical, big data and cloud environments.Vormetric helps over 1500 customers, including 17 of the Fortune 30, tomeet compliance requirements and protect what mattersâ€̃ theirsensitive

dataâ€̃ fromboth internal and external threats. Thecompany†sscalableVormetric Data Security Platform protects any file, any database andany application†s dataâ€̃anywhereit residesâ€̃witha high performance,market−leading solution set.

23

Page 45: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Data is Everywhere

• Security Industry has hundreds if not thousands of research reports released each year.

• Meta-Analysis is a promising approach (ransomware)

• Research question > Identify Sources > Assess Quality > Synthesize Results

• Lots of opportunities to improve quality of research

• Discovery of publications is a challenge

• Lower effort with better text extraction and NLP

Page 46: Data is Everywhere 2018/slides/SIRAcon2018 - Jacobs...Risk posture System vulnerabilities 10% 20% 30% 40% 50% 60% 70% 80% ... File sharing Fines & judgements Spoofing Cross−site

Data is EverywhereJay Jacobs

[email protected]