Top Banner
Best Practice Update for Data Security Bob Hansmann - Sr. PMM, Websense Security Labs Otb 2012 October 2012 © 2012 Websense, Inc. Proprietary and Confidential 1
20

Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

May 30, 2018

Download

Documents

lamduong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Best Practice Update for Data Securityp y

Bob Hansmann - Sr. PMM, Websense Security LabsO t b 2012October 2012

© 2012 Websense, Inc. Proprietary and Confidential 1

Page 2: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

New Defense Game

© 2012 Websense, Inc. Proprietary and Confidential 2

Page 3: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Seven Advanced Threat Stages

Lure Redirect ExploitKit

DropperFile

CallHome

DataTheft

Recon

© 2012 Websense, Inc. Proprietary and Confidential

Page 4: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Seven Advanced Threat Stages

AWARENESS• Web & Email• Facebook,

Blogs, TweetsSpear phishing• Spear-phishing

• Trusted entry• Targeted

LureReconTargeted

• Dynamic• Timed

© 2012 Websense, Inc. Proprietary and Confidential

Page 5: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Seven Advanced Threat Stages

REAL-TIME ANALYSIS• Browser code &

active scriptsLi k l i• Link analysis

• Exploit analysis• Composite

Redirect ExploitKit

• Composite scoring/ratings

• Predictive

© 2012 Websense, Inc. Proprietary and Confidential

Page 6: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Seven Advanced Threat Stages

INLINE DEFENSES• App analysis• Malicious PDFs

M lti l AV• Multiple AVs• File compress.• Dynamic DNS

DropperFile

CallHome

• Dynamic DNS• Botnet & CnC

comms

© 2012 Websense, Inc. Proprietary and Confidential

Page 7: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Seven Advanced Threat Stages

CONTAINMENT• Data theft

defenses• Embedded DLP

Data capture• Data capture• Geo-location• Forensic details

DataTheft

Forensic details & reporting

• Alerts/severity

© 2012 Websense, Inc. Proprietary and Confidential

Page 8: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Ad d Th t T h iAdvanced Threat Techniques

Evading Detection

© 2012 Websense, Inc. Proprietary and Confidential 8

Page 9: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Password File Data Theft

• Password files• Active Directory/SAM databasey• Expand reach/control within target• First priority once insidep y

Web

© 2012 Websense, Inc. Proprietary and Confidential 9

Web

Page 10: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Non-Document Data Theft

• Image files• Confidential information • Smart phone pictures• Blind spot for defensesp

Web

© 2012 Websense, Inc. Proprietary and Confidential 10

Web

Page 11: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Slow Data Leaks

• Remain below the radar• Low record count per request/incidentp q• Steal data in small chunks• Persistence and patiencep

O d t O d t

Web

One datarecord

One datarecord

© 2012 Websense, Inc. Proprietary and Confidential 11

Web

Page 12: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Custom Encrypted Uploads

• Proprietary encryption• Cloak comms & data theft• Crimeware toolkit enabled• Blind spot for defensesp

Web

© 2012 Websense, Inc. Proprietary and Confidential 12

Web

Page 13: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Email Security Evasion

• Spear-phishing technique• Embedded web link in email lure• Time malware infection after delivery• Email security sees a clean linky

Sunday Monday

TargetWeb Site

OK

Target SiteInfected 4am

© 2012 Websense, Inc. Proprietary and Confidential 13

WebEmailSecurity

OK Web

Page 14: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Recent Example – 6 July 2012

• Financial notification• Appears as payroll relatedpp p y• Debit to bank account• Online transaction reportp

© 2012 Websense, Inc. Proprietary and Confidential 14

Page 15: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

C t R i tCustomer Requirements

Top Security Requests

© 2012 Websense, Inc. Proprietary and Confidential 15

Page 16: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Protection & Containment

One datarecord

CriminalEncryptedUploads

PasswordFile Data

Theft

ImageOCR/TextAnalysis

Drip (Stateful)

DLP

Cloud Sandboxing

for Emailp y

Monday

Target SiteInfected 4am

Real-time web security

analysisRedirect

Monday

Wrapper

© 2012 Websense, Inc. Proprietary and Confidential 16

WebWrapper

Page 17: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Actionable Threat Dashboards

© 2012 Websense, Inc. Proprietary and Confidential 17

Page 18: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Security Sandbox Testing

© 2012 Websense, Inc. Proprietary and Confidential 18

Page 19: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Multi-channel Threat Monitoring

I d S iI d S iIntegrated SecurityIntegrated Security

© 2012 Websense, Inc. Proprietary and Confidential 19

Page 20: Best Practice Uppydate for Data Securityphoenix.issa.org/wp-content/uploads/2012/10/Websense-ISSA-PHX...Best Practice Uppydate for Data Security Bob Hansmann - Sr. PMM, Websense Security

Thank You.

© 2012 Websense, Inc. Proprietary and Confidential 20