Top Banner
CloudCamp Chicago “Cloud Security” #cloudcamp @CloudCamp_CHI Sponsored by Hosted by
47
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: CloudCamp Chicago - March 2nd 2015 - Cloud Security

CloudCamp Chicago

“Cloud Security”

#cloudcamp@CloudCamp_CHI

Sponsored by

Hosted by

Page 2: CloudCamp Chicago - March 2nd 2015 - Cloud Security

Emcee

Margaret WalkerCohesive Networks

Tweet: @CloudCamp_Chi #cloudcamp

#cloudcamp@CloudCamp_CHI

Sponsored by

Hosted by

Page 3: CloudCamp Chicago - March 2nd 2015 - Cloud Security

… sponsored by you!

Chacko Kurian - Complete Health Systems,LCJoshua Beckman - ThreadMeUpAlex Connor - Advisory Board CompanyLynn Diegel - USGJoshua Inglis - PropllrJoAnn Becker - ARCWilliam Knowles - Evident.ioTaylor Speaker - Nexum Inc.Ron Zirkin - XO CommunicationsWalter Torres - SearsPaul Flig - Heartland Technology GroupCorey Yates - Datalogics, Inc

Page 4: CloudCamp Chicago - March 2nd 2015 - Cloud Security

Mark your calendars - CloudCamp Chicago on April 8

Page 5: CloudCamp Chicago - March 2nd 2015 - Cloud Security

6:00 pm Introductions6:05 pm: Lightning Talks

"The Chicago Electronic Crimes Task Force" - Patrick Hogan, Assistant to the Special Agent in Charge at U.S. Secret Service "Information Security Breach Trends" - Michael Roytman, Data Scientist at Risk I/O @mroytman“Keeping hardware secure, even after its useful life” - Jim Tarantino, VP Global Sales at MarkITx @JimTarantino

7:00 pm: Unpanel 7:45 pm: Unconference / Networking, drinks and pizza

Agenda

#cloudcamp@CloudCamp_CHI

Sponsored by

Hosted by

Page 6: CloudCamp Chicago - March 2nd 2015 - Cloud Security

“The Chicago Electronic Crimes Task Force"

Patrick HoganAssistant to the Special Agent in Charge at U.S. Secret Service

Tweet: #cloudcamp

#cloudcamp@CloudCamp_CHI

Sponsored by

Hosted by

Page 7: CloudCamp Chicago - March 2nd 2015 - Cloud Security

United States Secret Service Chicago Electronic Crimes Task Force ATSAIC Patrick Hogan [email protected]

rev. 03/02/15

Page 8: CloudCamp Chicago - March 2nd 2015 - Cloud Security

History / Statutory Authority

1865 - Secret Service created to fight counterfeit currency 1901 - Assigned Presidential Protection duties 1948 - Title 18 USC § 470-474 (Counterfeiting & Forgery) 1984 - Title 18 USC § 1029-1030 (Access Device Fraud, Computer Hacking) 1986 - Title 18 USC § 1030 (Computer Hacking, Expanded) 1990 - Title 18 USC § 1344 (Bank Fraud) 1996 - Title 18 USC § 514 (Fictitious Obligations) 1998 - Title 18 USC § 1028 (Identity Theft, Expanded) 2001 - USA PATRIOT Act (Expanded Cyber Investigations & ECTFs) 2003 – Title 18 USC § 1037 (CAN-SPAM Act) 2004 - Title 18 USC § 1028A (Aggravated Identity Theft)

Page 9: CloudCamp Chicago - March 2nd 2015 - Cloud Security

USSS Cyber Organization Overview

Field Office Investigations – Field agents conduct investigations of cyber crimes with venue and impact within their local districts. Training available to field agents includes: • BICEP – Basic Investigation of Computers and Electronic Crimes Program: One week

instruction provided to all USSS Special Agents as part of their initial academy training program.

• BNITRO – Basic Network Intrusion Responder Program: Three week training course focused on the knowledge, skills, and tools necessary to conduct network intrusion investigations.

• ECSAP – Electronic Crimes Special Agent Program: Initial training comprised of five weeks instruction in computer forensics, with extensive continuing education to follow.

• Continuing Education and Other – Numerous courses are available to agents covering topics such as advanced network intrusion, electronic evidence, mobile wireless, and others.

Page 10: CloudCamp Chicago - March 2nd 2015 - Cloud Security

USSS Cyber Organization Overview

• Run by the USSS and the Alabama Office of Prosecution Services. • Attendees receive advanced tuition-free training in forensics and

network intrusion. • Graduates are eligible to participate in USSS ECTF program. • Other training program topics include mobile wireless, computer

evidence, judge and prosecutor training and others.

• National Computer Forensics Institute: The nation’s only federally funded training center dedicated to instructing state and local officials in digital evidence and cyber crime investigations.

NCFI, Hoover, Alabama. http://www.ncfi.usss.gov

• USSS Electronic Crimes Task Force (ECTF): 36 Regional ECTF locations throughout the United States; 2 International • ECTF members support federal, state, and local investigations.

Page 11: CloudCamp Chicago - March 2nd 2015 - Cloud Security

USSS Cyber Organization Overview

Page 12: CloudCamp Chicago - March 2nd 2015 - Cloud Security

USSS Cyber Organization Overview

Working Groups – Agents volunteer for temporary overseas assignments to work in concert with foreign counterparts. Typical duties include assisting with the execution of Mutual Legal Assistance Treaty (MLAT) requests. • Dutch – Partnership with the Dutch National High Tech Crime Unit

• 30 day assignment, increasing to 90 days in 2015 • Baltic – State Police of Latvia

• 3 week assignment, increasing to 30 days in 2015

• Europe – Wiesbaden, Germany. Partnership with the German Federal Criminal Police Office (BKA) • 90 day assignment

BKA Building, Wiesbaden, Germany http://www.bka.de

Page 13: CloudCamp Chicago - March 2nd 2015 - Cloud Security

USSS Cyber Organization Overview

Foreign Offices – Liaison and work with foreign counterparts worldwide

VANCOUVER

MEXICO CITY

LIMA

BOGOTA

OTTAWA

MONTREAL

BRASILIA

MADRID

LONDON

PARIS

MADRID

THE HAGUE

FRANKFURT

ROME

TALLINN

BUCHAREST

SOFIA

PRETORIA

AMMAN

MOSCOW

BANGKOK

HONG KONG

BEIJING

SYDNEY

Page 14: CloudCamp Chicago - March 2nd 2015 - Cloud Security

Cyber Intelligence Investigations Overview

Pro-active investigations • Historical tracking of known / identified suspects • Targeting of financially motivated cyber criminals with significant

impact or threat to the financial infrastructure of the United States

• Identification of offenders, gathering of evidence and intelligence

Investigative tactics • Cooperating sources • Undercover operations

Intelligence gathering • Open source • Historical data mining • Inter-agency cooperation

Charging, apprehension, extradition, prosecution

Page 15: CloudCamp Chicago - March 2nd 2015 - Cloud Security

Anatomy of a Hack

21

Page 16: CloudCamp Chicago - March 2nd 2015 - Cloud Security

Point of Sale

Port 5631

Port 3389

Ports 5800 & 5900

Page 17: CloudCamp Chicago - March 2nd 2015 - Cloud Security

U.S. Secret Service Cyber Crime Targets

Card Vending Sites

Automated websites for the sale of stolen credit cards • Advertised on forums • Administered by cyber

criminals • Sell stolen cards obtained

through skimming operations, online retailer breaches, large scale point of sale breaches, etc

• Customer support • Refund policies

Page 18: CloudCamp Chicago - March 2nd 2015 - Cloud Security

U.S. Secret Service Case Study: Maksik

As of 2006, “Maksik” has been identified as a prolific vendor of stolen credit card data. • Operates and advertises on several high-level forums • Operates a card vending site

Page 19: CloudCamp Chicago - March 2nd 2015 - Cloud Security

U.S. Secret Service Case Study: Maksik

Undercover operation leads to Maksik • Undercover USSS agent

conducts multiple purchases of stolen credit cards from an associate of Maksik

• The associate eventually introduces the UC agent to Maksik

• The UC agent conducts purchases from Maksik and establishes a rapport.

• Data analysis identifies Maksik as Maksym Yastremskiy, a Ukrainian

• Maksik discusses interest in vacationing in Thailand, agent offers to meet and serve as tour guide.

Page 20: CloudCamp Chicago - March 2nd 2015 - Cloud Security

U.S. Secret Service Case Study: Maksik

Undercover operation continues • UC agent travels with

Maksik for a second vacation in Dubai, UAE

• At the suggestion of the UC agent, they go on a 6 hour safari

• During this time, other agents and local law enforcement execute a search warrant and surreptitiously image Maksik’s computer

Page 21: CloudCamp Chicago - March 2nd 2015 - Cloud Security

U.S. Secret Service Case Study: Maksik

Apprehension in Turkey • Maksik agrees to meet the UC agent in Turkey for another vacation • MLAT submitted to Turkish authorities requesting arrest of Maksik • Upon Maksik’s arrest he is possession of a laptop computer containing extensive credit

card data • Based up the possession of that data, on January 8, 2008, Maksik is convicted in Turkey

and sentenced to 24 years in prison.

Page 22: CloudCamp Chicago - March 2nd 2015 - Cloud Security

U.S. Secret Service Case Study: Maksik

Johnny Hell • Known to have been active in the

carding underground since 2002. • Hacked dozens of U.S. companies

to obtain stolen credit cards. • Identified as Estonian national

Aleksandr Suvorov • Also involved with real estate –

built a restaurant and hotel in Tallinn, Estonia.

• Arrested in Frankfurt, Germany in 2008 at USSS request

• Extradited to the United States, convicted and currently serving 10 year sentence.

Page 23: CloudCamp Chicago - March 2nd 2015 - Cloud Security

U.S. Secret Service Case Study: Maksik

Page 24: CloudCamp Chicago - March 2nd 2015 - Cloud Security

U.S. Secret Service Case Study: Maksik

End of Story?...

Not Quite… • In 2012, Ukraine authorities arranged for a “prisoner swap.” • Maksik is extradited to the Ukraine in October 2012. • December 2012 – Ukraine court reviews the Turkish conviction, finds the sentence to be inappropriate

under Ukraine law, reduces the sentence to five years imprisonment and unspecified fines, allows for time served in Turkey and releases Maksik.

Now, End of Story?...

Not Yet It’s Not… • Maksik is still wanted on charges filed in the United States • Any travel outside of Ukraine to an extraditable country will result in likely apprehension

• We can be patient.

Page 25: CloudCamp Chicago - March 2nd 2015 - Cloud Security

United States Secret Service Chicago Electronic Crimes Task Force ATSAIC Patrick Hogan [email protected]

Page 26: CloudCamp Chicago - March 2nd 2015 - Cloud Security

"Information Security Breach Trends"

Michael Roytman Data Scientist at Risk I/O

Tweet: @mroytman #cloudcamp

#cloudcamp@CloudCamp_CHI

Sponsored by

Hosted by

Page 27: CloudCamp Chicago - March 2nd 2015 - Cloud Security

Attacker BehavioralAnalysis

Page 28: CloudCamp Chicago - March 2nd 2015 - Cloud Security

BREACHES by CVE 2014

Page 29: CloudCamp Chicago - March 2nd 2015 - Cloud Security

2014

Q1 Q2

Q3

Q4

Page 30: CloudCamp Chicago - March 2nd 2015 - Cloud Security
Page 31: CloudCamp Chicago - March 2nd 2015 - Cloud Security

CVEsover time

Page 32: CloudCamp Chicago - March 2nd 2015 - Cloud Security

CVEsover time(normalized)

Page 33: CloudCamp Chicago - March 2nd 2015 - Cloud Security

Thanks!@mroytman

Page 34: CloudCamp Chicago - March 2nd 2015 - Cloud Security

"Keeping hardware secure, even after its useful life"

Jim TarantinoVP Global Sales at MarkITx

Tweet: @JimTarantino #cloudcamp

#cloudcamp@CloudCamp_CHI

Sponsored by

Hosted by

Page 35: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

TM

Page 36: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

IT hardware is a commodity. It should trade like one.

Page 37: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

IT investments directly impact organization’s ability to innovate and compete.

Changes in software & cloud

Hardware commoditization & increased refresh rates

IT demands skyrocketing but budgets remain flat

Preventing organizations from innovating at faster rates

Directly impacting organizations ability to compete

0%!

5%!

10%!

15%!

20%!

IT Budget! IT Demand!

15%

1.8%

Page 38: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

Inefficient secondary markets are holding back enterprises from realizing the full return on their IT investments.

Page 39: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

No reliable fair market value

Poor resale value by selling to few vendors/brokers

Brokers get majority value; enterprises write-off assets quickly

Data security concerns remain

Unclear commitment to environment

Enterprises unaware of true market value and wary of risks

Page 40: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

What do buyers & sellers expect from the market?

Transparent, market driven pricing

Seamless trading

Guaranteed quality & security

Page 41: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

What to look for in your IT partner?

Transparent, market driven pricing

Seamless trading

Guaranteed quality & security

• Neutral, never taking a position on a trade • Maximize ROI by recouping up to 40% of initial investment • Numerous buyers and not just 1-2 actively bidding on products

Page 42: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

What to look for in your IT partner?

Transparent, market driven pricing

Seamless trading

Guaranteed quality & security • Guarantee end to end process in terms of quality and security • Works only with Tier 1 partners to deliver all aspects of after market

and reverse logistics services including audit, DOD certified data destruction, refurbishing & shipping • Environmentally friendly recycling with green certification • Source-certified refurb gear minimizing risk of counterfeits • Anonymous

Page 43: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

What to look for in your IT partner?

Transparent, market driven pricing

Seamless trading

Guaranteed quality & security

• Quick pickup of gear along with full tracking & transparency throughout process • Easy web and mobile tools to trade • Comprehensive product lifecycle management services

Page 44: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

Example: Equipment that retain over 30% of original value after 3 years or more Category Item New Price Current FMV % value retained Age of equipment

Storage Dell PowerVault MD3220i $14,356 $5,250 37% 4.5 years

Server Dell PowerEdge R620 $7,100 $2,924 41% 3 years

Router Cisco ASR1002 $9,500 $3,000 32% 4.5 years

Switch Juniper EX2200-48P-4G $2,100 $675 32% 4.5 years

Page 45: CloudCamp Chicago - March 2nd 2015 - Cloud Security

© MarkITx, Inc. 2014 All rights reserved. Confidential.

Thank you.

Page 46: CloudCamp Chicago - March 2nd 2015 - Cloud Security

Un-panel Discussion

volunteer to join the panel & ask questions from the floor!

#cloudcamp@CloudCamp_CHI

Sponsored by

Hosted by

Page 47: CloudCamp Chicago - March 2nd 2015 - Cloud Security

Unconference

Small groups & discussions, network

Pizza’s almost here!

#cloudcamp@CloudCamp_CHI

Sponsored by

Hosted by