20
Building Human Intelligence – Pun Intended Rohyt Belani Co-founder & CEO, PhishMe @rohytbelani @PhishMe

Building Human Intelligence – Pun Intended

Embed Size (px)

DESCRIPTION

Presented by: Rohyt Belani, Phishme Abstract: In the physical world, the human brain has evolved to avoid danger. The threat of physical pain triggers fear – and we have learned to avoid behavior that causes pain. In the electronic world of email, however, this concept doesn’t translate. Clicking on a malicious link or opening an attachment laced with malware doesn’t cause pain, and often a user won’t even notice anything is wrong after doing it. How then, can we teach fear perception in the electronic world? Is it even possible? In this presentation I’ll discuss how immersive training can key on psychological triggers to teach people to become skeptical email users who not only avoid undesired security behavior but can aid intrusion detection by reporting suspicious emails, helping to mitigate one of the most serious problems in security: slow incident detection times. According to reports from Mandiant and Verizon, average detection time for an incident is in the hundreds of days. A properly trained workforce is not only resilient to phishing attacks, but can improve detection times as well.

Citation preview

Page 1: Building Human Intelligence – Pun Intended

Building Human Intelligence – Pun Intended

Rohyt Belani

Co-founder & CEO, PhishMe

@rohytbelani @PhishMe

Page 2: Building Human Intelligence – Pun Intended

Nature of Advanced Cyber Attacks

Disruption

Cybercrime

Cyber-Espionage

and Cybercrime

Dam

ages

2005 2005 2009 2011 2013

Worms Viruse

s

Spyware/ Bots

Advanced Persistent Threats

Zero-Day Targeted Attacks Dynamic Trojans

Stealth Bots

Changing cyber

attacks

Evolving cyber

actors

Shrinking barriers to

entry

New Threat Landscape

Page 3: Building Human Intelligence – Pun Intended

Some Statistics

• Massive-scale phishing attacks loom as new threat, USA Today • Ponemon Institute: 2012 Cost of Cyber Crime Study • 2012 Verizon Data Breach Investigations Report • 'Spear phishing' the main email attachment threat, ComputerWorld UK

In a single campaign,

Page 4: Building Human Intelligence – Pun Intended

..and technical controls are failing

Did these companies

not have the best

defensive and

detective technologies

in place?

Page 5: Building Human Intelligence – Pun Intended

We need to change the way we defend

Page 6: Building Human Intelligence – Pun Intended

“But security awareness doesn’t work”

It didn’t, because we were:

• Boring

• De-focused

• Compliance oriented

• Passive

and..

We didn’t have metrics to prove

otherwise

Page 7: Building Human Intelligence – Pun Intended

Understanding the Hu Element

Memories associated with emotional events are stored here

Page 8: Building Human Intelligence – Pun Intended

Learning Theory

• For memories to last, we need long term potentiation (LTP)

• LTP – “ long-lasting enhancement in signal transmission between two neurons that results from stimulating them synchronously”

• Persistence or repetition of an activity tends to induce lasting cellular changes that add to stability in signal transmission between neurons

Page 9: Building Human Intelligence – Pun Intended

Human Psyche Hacked

• To change behavior, we need:

– Emotional triggers

– Repetition

– Feedback loops

– Focused information

– Develop intuition

Page 10: Building Human Intelligence – Pun Intended

Making It Work: It Needs to be Continuous

What happened here?

Page 11: Building Human Intelligence – Pun Intended

Making It Work: Focus on the Real Threats

Before you spend time and money on training ask yourself – can I fix this issue with a technical control? Example, Password complexity – do I really need my users to know what makes a strong password? USB sticks – can’t I just disable them?

Page 12: Building Human Intelligence – Pun Intended

Making It Work: Think “Marketing”

Page 13: Building Human Intelligence – Pun Intended

Making It Work: Immerse in the Experience

Page 14: Building Human Intelligence – Pun Intended

Knives At A Gunfight

2012 Verizon Data Breach Investigations Report: Time windows for financial and PCI breaches.

Time from compromise

to discovery:

Days - Months

Time from compromise

to exfiltration:

Minutes - Days

Effective threat protection demands discovery in minutes, not months

Time from discovery to

containment:

Days - Months

Page 15: Building Human Intelligence – Pun Intended

We Have a Detection Problem!

• Median number of days that attackers were present on a victim network before detection?

2431

• Percentage of breaches that went undetected for “months or more”?

66%2

1 www.mandiant.com/library/M-Trends_2013.pdf

2 http://www.verizonenterprise.com/DBIR/2013/

Page 16: Building Human Intelligence – Pun Intended

Can We Think Outside the Shiny Box?

Most people respond to emails within the first few hours of receiving them – if they are trained to report we get relevant, near time threat intelligence Users who learn to not fall for phishing attacks also learn to report them

Threat intelligence opportunity

Page 17: Building Human Intelligence – Pun Intended

Control cost by incident phase D

iffi

cult

y to

Det

ect

Cost to Control $5.5MM, Average cost to remediate a breach in 2012

Compromise Exfiltration Propagation Persistence

With a thriving user reporting ecosystem

Page 18: Building Human Intelligence – Pun Intended

Improve Incident Response

• Users provide new source of near-time threat data

• Early detection drives down key cost factors such as time from incident to response

• Response can start Day 1 – Redirect and capture C&C traffic

– Remove same/similar emails from other inboxes

– Block additional inbound/outbound

– Increase monitoring at targeted entities

– If a successful compromise containment may be limited

Page 19: Building Human Intelligence – Pun Intended

This is the end goal…

Page 20: Building Human Intelligence – Pun Intended

Thank You

[email protected] @rohytbelani @PhishMe #humansensors