Top Banner
Prevent Insider Threats With User Activity Monitoring Presented by Matt Zanderigo Product Marketing Manager, ObserveIT INSIDER THREATS: OUT OF SIGHT, OUT OF MIND?
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Insider Threats: Out of Sight, Out of Mind?

Prevent Insider Threats With User Activity Monitoring

Presented by Matt Zanderigo

Product Marketing Manager, ObserveIT

INSIDER THREATS: OUT OF SIGHT, OUT OF MIND?

Page 2: Insider Threats: Out of Sight, Out of Mind?

WHO IS OBSERVEIT?

HQ Boston, MA / R&D Tel Aviv, Israel Founded 2006 1,200+ Customers Worldwide $20M Invested by Bain Capital

The Leading Provider Of User Activity Monitoring To Prevent Insider Threats

Page 3: Insider Threats: Out of Sight, Out of Mind?

Employee exposes rich clients' information

online

Call-center workers sold customer data fined

$25M

Employee charged with stealing customer data

DBA account compromised

leaves 78.8M affected

Third-party credentials

stolen leaves 56M affected

Admin account compromised exposed 11M Medical records

RECENT BREACHES INVOLVING INSIDERS

Page 4: Insider Threats: Out of Sight, Out of Mind?

CHALLENGE WITH ADDRESSING INSIDER THREATS

“It’s Hard to Distinguish Abuse from Legitimate Use”

3 out of 4 InfoSec professionals say

260,000+ members

Page 5: Insider Threats: Out of Sight, Out of Mind?

IT’S NOT A INFRASTRUCTURE PROBLEM

“We realized that infrastructure monitoring alone was only giving

us half the picture.”

Snir Hoffman, InfoSec Architect

Page 6: Insider Threats: Out of Sight, Out of Mind?

Audit and Compliance

Employees__________________________________________

Data Extraction and Fraud

Application Access, Call Centers, and Watchlists

Third-parties__________________________________________

IP Theft and Service

Availability

Contractors, Remote Vendors, Outsourced IT

Privileged Users

__________________________________________

Access Abuse and Data leaks

Help Desk, DBAs, HPAs, SoD and Sys Admins

SCOPE OF INSIDER THREATS

Audit Controls for PCI / PII / PHI Data, Monitoring Privileged and 3rd Party Access, Alerting for Access to

Sensitive systems

Page 7: Insider Threats: Out of Sight, Out of Mind?

Call Centers

_____________________________________________________

Remote Users

_____________________________________________________

HR Platforms

_____________________________________________________

Data Extraction

_____________________________________________________

Snooping ______________________________________________

_______

Shadow IT_____________________________________________________

EMPLOYEE MONITORINGViewing Information They Shouldn’t Be, User Error, Unauthorized Apps

Page 8: Insider Threats: Out of Sight, Out of Mind?

PRIVILEGED USER MONITORING

UNIX / LINUX

_____________________________________________________

Windows ______________________________________________

_______

DBAs __________________________________________

___________

Network ______________________________________________

_______

Help Desk ______________________________________________

_______

Programmers

_____________________________________________________

WireShark PuTTY

Toad

RDPWinSCP

Reg EditorCMD PowerShell

DR JavaSSH

Unauthorized Changes / Access, Abusing Privileges, Local / Service Accounts

ADSQL PLUS

Page 9: Insider Threats: Out of Sight, Out of Mind?

3RD PARTY MONITORING

Contractors ______________________________________________

_______

Consultants ______________________________________________

_______

Vendors __________________________________________

___________

Outsourced IT

_____________________________________________________

Offshore Dev

_____________________________________________________

MSPs_____________________________________________________

Unauthorized Changes, Abnormal Remote Access, Unscheduled Tasks

Page 10: Insider Threats: Out of Sight, Out of Mind?

Findings related to Audit Controls for PCI / PII / PHI Data, Monitoring Privileged and 3rd Party Access, Alerting for Access

to Sensitive systems

AUDIT AND COMPLIANCE

Internal Audits / Security Controls

__________________________________________

Annual, Quarterly or

Monthly

Regulatory Compliance

__________________________________________

Security Frameworks

__________________________________________

Page 11: Insider Threats: Out of Sight, Out of Mind?

PREVENTING INSIDER THREATS WITH OBSERVEIT

Collect

DetectRespond

• User Behavior Analytics

• Activity Alerting

• Visual Recording• User Activity

Logs

• Live Session Replay

• Shutdown Sessions

CLEAR PICTURE OF THE RISK USERS PRESENT

DETECT INSIDER RISK BEFORE IT BECOMES A THREAT

STOP USERS FROM PUTTING YOUR BUSINESS AT RISK

USERS

Page 12: Insider Threats: Out of Sight, Out of Mind?

Insider Threat Intelligence Dashboard USERS

Page 13: Insider Threats: Out of Sight, Out of Mind?

Alert indication per screenshot on the timeline

Alert indication per activity

Collect Contextual Insider Threat Information

Page 14: Insider Threats: Out of Sight, Out of Mind?

Real-time Alerts: Who Did What? When? And Why?

Page 15: Insider Threats: Out of Sight, Out of Mind?

Live Response | User Interaction | Session Shutdown

Message suspicious users, and terminate sessions

Page 16: Insider Threats: Out of Sight, Out of Mind?

ADD INSIDER THREAT INTELLIGENCE TO SECURITY POSTURE

SIEM IAMITSM

USERS

INSIDER THREAT INTELLIGENCE

Page 17: Insider Threats: Out of Sight, Out of Mind?

CUSTOMER EXAMPLES

Monitoring Privileged Users for PCI/SOX

Monitoring privileged users with access to over 60 PCI/SOX applications

Real-time monitoring of unauthorized account creation and firewall changes

Integrated with Lieberman Password Vault

Remove Vendor Access to ERP

Audit third-party ERP solution provider Monitor internal IT administrators

activities Deter negligent third-party activities

Page 18: Insider Threats: Out of Sight, Out of Mind?

EHR System (EPIC) & PHI Servers

If an employee views the patient record of another hospital employee

If a doctor, nurse, pharmacist, etc. views the record of a patient not under their care

If a doctor, nurse, pharmacist, etc. views the record of a high profile patient (VIP)

Policy Quoting & Claims Handling

App data extraction (exporting reports, large copy operations)

Unnecessarily accessing sensitive files (view/open/save/export)

Business claims employees viewing personal claims information

CUSTOMER EXAMPLES

Page 19: Insider Threats: Out of Sight, Out of Mind?

1,200+ CUSTOMERS

Page 20: Insider Threats: Out of Sight, Out of Mind?

THANK YOU