24
1 Copyright © 2018 BAE Systems. All Rights Reserved. BAE SYSTEMS is a trade mark of BAE Systems plc. (See final slide for restrictions on use.) | The Evolution of Cyber Crime: A New Approach to Risk is Critical Dr Colin McKinty

The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

  • Upload
    others

  • View
    6

  • Download
    0

Embed Size (px)

Citation preview

Page 1: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

1 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

The Evolution of Cyber Crime: A New Approach to Risk is CriticalDr Colin McKinty

Page 2: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

2 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Agenda

The Challenge

The Right Places

Visibility and Transparency Matters

Page 3: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

3 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Land Sea Air Cyber

Page 4: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

4 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Our Cyber Security Expertise

PREPARE PROTECT

RESPOND MONITOR

Managed SecurityComplete Security Monitoring, Managed Detection

and Response, End-Point Detection, Vulnerability Management, Device Management

Actionable insight of attack group behaviours and techniques

Incident ResponseActive containment of live

targeted cyber attacks

Measure your true resilienceto internal and external threats

Security TestingCloud Security

Email Protection ServicesHosted Applications, Private Cloud

Cyber ConsultingStrategy and risk, Security assurance,

Improvement and SI

Threat Intelligence

Page 5: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

5 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Agenda

The Challenge

Page 6: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

6 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

The Evolving Cyber Threat

Time / Confidence / Sophistication

Cri

min

al

Gain

s

Opportunistic

Individuals

Phishing Credential leaks Web-attacks

Planned

Individuals

Small Groups

CEO impersonation Off-the-shelf RATs DDoS extortion

Organised

Teams

Skills for Hire

Banking Trojans Ransomware Exploit kits

Tailored

Professional Hackers

Funded Campaigns

Network intrusion Payment system

compromises

Page 7: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

7 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

7 |

What do Organisations Need?

Demonstrating business risk reduction in the face

of operational change and the evolvingthreat landscape

Ensuring ongoingaccess to skillsand experience

Enabling theorganisation tomaximise ROIfor securityinvestments

Page 8: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

8 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

˃ Strategy - Operations - Management - Reporting

CISO Day-to-Day Challenges

Determining how threat relates to business operations

Communicating with key stakeholders about threats

Assessing and reporting on ways to minimise threats

Page 9: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

9 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

˃ Strategy - Operations - Management - Reporting

CISO Day-to-Day Challenges

Tracking latest IT security innovations and keeping abreast of latest cyber security technologies

Defining strategy and implementing an effective process for the reporting investigation and response to security incidents

Creating and implementing a strategy for the deployment of information security technologies

Page 10: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

10 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

˃ Strategy - Operations - Management - Reporting

CISO Day-to-Day Challenges

Communicating with key stakeholders about security investments

Capturing KPIs to demonstrate ROI

Championing and educating the organisation about the latest security strategies and technologies to maximize ROI

Page 11: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

11 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Transparency& Visibility

Confidencein Detection

ReduceBusiness Risk

MaximiseRoI

Maximiseavailable expertise

11 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Page 12: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

12 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

˃ Building Confident in Detection

Threat Led Development Lifecycle

Page 13: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

13 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Agenda

The Right Places

Page 14: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

14 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

The RealityThe Reality

Page 15: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

15 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Choose the Security you Require

Start with the Threat

Identify the concerns you have

Threats and risks that need to mitigate

Lack of Visibility of Endpoint / User behaviour

Securing customer facing Web infrastructure

Network Intrusion

Malware

IP Theft and Data leakage

Get the detection you need

Think about data sources and detection content

Network User & Endpoint

Web

Context AUP Custom

Choose the response you require

Supplement your existing resource to improve speed and accuracy

1. Remediation Advice

2. Active Response

3. Onsite incident response

Page 16: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

16 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Considering Data and Detection

BAE SYSTEMS PROPRIETARY

Targeting Sources to Answer your Questions

Network

Vital detection of the early signs of

intrusion, compromise, control and exfiltration

User & Endpoint

Focused on Malware, Data

leakage, IP theft and unauthorised

behaviour

Web

Protection for business critical customer facing

web infrastructure

Context

Additional context to improve Triage investigation and

prioritise remediation

AUP

Testing adherence to policies and procedures and

security awareness

Page 17: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

17 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Integrated Threat Hunting

BAE SYSTEMS PROPRIETARY

Unmasking the Unknown

CreateHypotheses

InvestigateVia TTP’s

UncoverNew Patterns

and TTP’s

Inform & Enrich

Detection content

Threat Hunting

Loop

Proactive threat hunting is a key element

Intelligence-Driven: "Threat intelligence reports, threat intelligence feeds, malware analysis, vulnerability scans“

Analytics-Driven:"Machine-learning and UEBA, used to develop aggregated risk scores that can also serve as hunting hypotheses“

Situational-Awareness Driven: "Crown Jewel analysis, enterprise risk assessments, company or employee-level trends“

Page 18: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

18 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Agenda

Visibility and Transparency Matters

Page 19: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

19 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

More Than Just a Black Box

? ? ?

Page 20: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

20 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Business Relevant Reporting

20 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Page 21: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

21 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Business Relevant Feedback

Eliminate ‘so what’ reporting

Every report, performance indicator or alert needs to be contextual to your unique environment

Reports that enable clear decision making

Where to focus your resources for maximum risk reduction

Show value from existing security devices

Show gaps in defences

Page 22: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

22 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Visualise Current Threat Coverage

BAE SYSTEMS PROPRIETARY

Get the Detection you need

Map out your current coverage and ability to respond to threat. This helps highlight areas of improvement.

With this approach it is easy to see how your capabilitiesevolves as your business andthe threat landscape changes.

Page 23: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

23 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Conclusion˃ The Evolution of Cyber Crime

Ensure you understand the threatto your organization.

Recognize what generates value and what your critical assets are.

Challenge yourself: Are you able to map out your current Threat Coverage and relate it to Business Risk? Or is it a Black Box?

Do you have Confidence in your Detection?

Page 24: The Evolution of Cyber Crime · 2018-11-19 · ˃The Evolution of Cyber Crime Ensure you understand the threat to your organization. Recognize what generates value and what your critical

24 Copyright © 2018 BAE Systems. All Rights Reserved.BAE SYSTEMS is a trade mark of BAE Systems plc.(See final slide for restrictions on use.)

|

Thank You