Top Banner
How to Defend against Internal Threats Ken Tulegenov, Group Founder “Information Security Community. Kazakhstan” on LinkedIn [email protected] Almaty November 16 2016
38

Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Apr 13, 2017

Download

Data & Analytics

Ken Tulegenov
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

How to Defend

against

Internal ThreatsKen Tulegenov, Group Founder

“Information Security Community. Kazakhstan” on LinkedIn

[email protected]

AlmatyNovember 16

2016

Page 2: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Price of Economic Crime

Page 3: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Types of Economic Crime

Page 4: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Who is a Perpetrator?

Page 5: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Risk Map & Methods of Combating

Page 6: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Expected future

NOWADAY Situation FUTURE Situation (2 years)

Page 7: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Cybercrime Globally

Page 8: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Cybercrime in the USA & UK

Page 9: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Cybercrime in the USA & UK

Page 10: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Cyber Threat Vectors

Page 11: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

External Attacks aka “Unauthorized Access”

Page 12: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Victims

Page 13: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Who will be

the next victim?

Page 14: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

APT Attack Anatomy (Kill-chain)

Page 15: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Internal Attacks aka “Insider Threats”

Page 16: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Types of Insiders

Page 17: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Malicious Insiders

Page 18: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Malicious Insider Motivations

Page 19: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Insiders by Percentage

Page 20: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Cost of Incident (Average USA Stats)

Page 21: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Annual cost

Page 22: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Incident Timing & Cost

Page 23: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

What Data is the most convertible to money?

Page 24: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Sensitive Data

Page 25: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Employee Behaviors

Page 26: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Risky Users

Page 27: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

How to combat effectively?

Page 28: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Recommendations

Page 29: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Data Source For Monitoring

Page 30: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Clear Vision:

Page 31: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Attack Anatomy (Kill-chain)

Page 32: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Measures for Internal Threats (IMHO) :

Data Encryption (FDE, USB, Backup)

Application Control

Device Control

HIPS + AV

NGFW

Prevent (Basic)

DLP

Privilege Rights Management

Internal NGFW

802.1x

SIEM

Prevent (Gen)

Database Activity Monitoring

Users Activity Monitoring

Database Encryption

IRM (Information Rights Management)

User Behavior Analysis

Prevent

(Adv)

Page 33: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

How to manage this ZOO?

One Security Platform for 1 Security Layer or Products Family

Easy Administration via Console (User Interface / Configuration / Support)

Unified Real-time Monitoring for all products

Page 34: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

What can Intel Security (McAfee) offer?

SIEM (Security Information Event Management)

EPP (Endpoint Protection)

DLP (Data Loss Prevention)

MDP (Mobile Data Protection / Encryption)

Page 35: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Measures for Internal Threats (IMHO) :

Data Encryption (FDE, USB, Backup)

Application Control

Device Control

HIPS + AV

NGFW

Prevent (Basic)

DLP

Privilege Rights Management

Internal NGFW

802.1x

SIEM + Threat Exchange

Prevent (Gen)

Database Activity Monitoring

Users Activity Monitoring

Database Encryption

IRM (Information Rights Management)

User Behavior Analysis

Prevent (Adv)

Page 36: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Who uses McAfee (My experience):

Page 37: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Reasons for Using:

Market Presence (Gartner’s “Magic Quadrants”)

Unified Management (for Different Products)

Scalability (Branches around the country)

Integration (with Current / Future Solutions)

Transparency (for Users)

Easy to use (for Security Administrators)

Page 38: Internal Threats in Kazakhstan. Cyber crime. How to defend. Cyber Security

Thank you for your attention

Any

Questions?