34
May 13-14, 2014 Walter E. Washington Convention Center Washington, DC I’m my own worst enemy a first-person look at insider threats Ahmed Masud

I am my worst enemy — A first person look at Insider Threat

Embed Size (px)

Citation preview

Page 1: I am my worst enemy — A first person look at Insider Threat

May 13-14, 2014Walter E. Washington

Convention CenterWashington, DC

I’m my own worst enemy

a first-person look at insider threatsAhmed Masud

Page 2: I am my worst enemy — A first person look at Insider Threat

Question

• Who is more dangerous?– You or a Hacker

Page 3: I am my worst enemy — A first person look at Insider Threat

Agenda

• Are you the insider threat?• Why should you care?• Protecting yourself from yourself.

Page 4: I am my worst enemy — A first person look at Insider Threat

Who is the Insider Threat?

Page 5: I am my worst enemy — A first person look at Insider Threat

Do you know if you are?

Page 6: I am my worst enemy — A first person look at Insider Threat

Why you should care?

• Scenario 1: You are the fall-guy• Scenario 2: You are the target of

interest• Scenario 3: You are the casualty

Page 7: I am my worst enemy — A first person look at Insider Threat

Why should you care?

• Reason 1: Safety and Security• Reason 2: Choice• Reason 3: Freedom

Page 8: I am my worst enemy — A first person look at Insider Threat

An exercise

• Do you feel you have access to information that can be used against your organization?

Page 9: I am my worst enemy — A first person look at Insider Threat

An exercise

• Do you feel that the access you have pose a threat to your organization?

Page 10: I am my worst enemy — A first person look at Insider Threat

An exercise

• Do you feel that the information you have access to is a threat to yourself?

Page 11: I am my worst enemy — A first person look at Insider Threat

An exercise

• Would you give your user-name and password to the person next to you.

Page 12: I am my worst enemy — A first person look at Insider Threat

An exercise

• Changed your password in last 60 days?

• Given any of your passwords to anyone else?

• Used the same password at more than one location?

Page 13: I am my worst enemy — A first person look at Insider Threat

Password Statistics (2012)

• 61% reuse passwords among multiple websites.

• 54% have only five passwords or less.

• 44% change their password only once a year or less.

• 89% feel secure with their current password management and use habits.

• 21% have had an online account compromised.

Page 14: I am my worst enemy — A first person look at Insider Threat

Again the Question

• Who is more dangerous?– You or a Hacker

Page 15: I am my worst enemy — A first person look at Insider Threat

The 64,000 dollar Question

• How much damage can you cause?

Page 16: I am my worst enemy — A first person look at Insider Threat

Exercise #2

• Have you emailed a sensitive document?

Page 17: I am my worst enemy — A first person look at Insider Threat

Exercise #2

• Do you have copies of company data at home?

Page 18: I am my worst enemy — A first person look at Insider Threat

Exercise #2

• On a USB stick you have in your pocket right now?

Page 19: I am my worst enemy — A first person look at Insider Threat

Exercise #2

• Ever let someone borrow your USB?

Page 20: I am my worst enemy — A first person look at Insider Threat

Exercise #2

• Company data of your former employer?

Page 21: I am my worst enemy — A first person look at Insider Threat

Data-theft Statistics

• 60% incidents attributed to insiders

Page 22: I am my worst enemy — A first person look at Insider Threat

Outsider threat = Insider threat

• The goal of an outside attack is to obtain the credentials of an insider

Page 23: I am my worst enemy — A first person look at Insider Threat

Perimeters ⇒ Insider

• Someone is always inside the perimeter

• How many perimeters can we manage?

Page 24: I am my worst enemy — A first person look at Insider Threat

Dealing with complexity

• What about complexity of operations?

• Where is the line?

Page 25: I am my worst enemy — A first person look at Insider Threat

Current best practices

• Sans institute best practices 3 examples– Beginning with the hiring process,

monitor and respond to suspicious or disruptive behavior

– Use a log correlation engine or security information and event management (SIEM) system to log, monitor, and audit employee actions

– Close the doors to unauthorized data exfiltration.

Page 26: I am my worst enemy — A first person look at Insider Threat

Current best practices

• Beginning with the hiring process, monitor and respond to suspicious or disruptive behavior– General broad functional directive

Page 27: I am my worst enemy — A first person look at Insider Threat

Current best practices

• Use a log correlation engine or security information and event management (SIEM) system to log, monitor, and audit employee actions– Narrow technical directive

Page 28: I am my worst enemy — A first person look at Insider Threat

Current best practices

• Close the doors to unauthorized data exfiltration.– Requirement? Mission statement

directive?

Page 29: I am my worst enemy — A first person look at Insider Threat

Current best practices

• Too broad• Too vague• Too hard• Too bad?

Page 30: I am my worst enemy — A first person look at Insider Threat

Insider threat prevention

• Too broad• Too vague• Too hard• Too bad?

Page 31: I am my worst enemy — A first person look at Insider Threat

Science can be such a b1t¢h

• Generally, Halting Problem SAYS NO!• Special cases?

– Markov Property

Page 32: I am my worst enemy — A first person look at Insider Threat

Promising policies

• Understand and respect your own access

• Deny by default• There is no remediation for insider

threats

Page 33: I am my worst enemy — A first person look at Insider Threat

Promising technologies

• Fundamental principles based in computer science theory– Lang-Sec– Cyber-attack modeling

Page 34: I am my worst enemy — A first person look at Insider Threat

Questions

• Ask away