Top Banner
68

Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mar 29, 2015

Download

Documents

Jude Bennison
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.
Page 2: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

The Inside Man:Surviving the Ultimate Cyber Threat!Andy Malone MVP, MCTQuality Training (UK) Senior Instructor / ConsultantAndrew.malone@quality-training.co.ukwww.divedeeperevents.com

ATC-B314

Page 3: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Microsoft MVP (Enterprise Security)Founder: Cybercrime Security Forum!Microsoft International Event SpeakerMCT (18 Years)Winner: Microsoft Speaker Idol 2006

Andy Malone

Follow me on Twitter @AndyMalone

Page 4: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

The Inside Man Threat? Understanding the

Psychological & Sociological impact of Espionage

Understanding Espionage Tactics, Threats & Techniques

Counter Espionage Techniques & Technologies

The Art of Social Engineering & Corporate Deception

Q&A Session Review

Agenda

Page 5: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

“Economic Espionage, Losses to the American Economy now Total more that $13 Billion Per Year…”

Assistant DirectorCounter Intelligence, FBI

Page 6: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

It could be Worse than you Think!

Page 7: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Malicious insider threat to an organization is a current or former employee, contractor, or other business partner who has or had authorized access to an organization's network, system, or data and intentionally exceeded or misused that access in a manner that negatively affected the confidentiality, integrity, or availability of the organization's information or information systems.

Firstly, What exactly is the Threat?

Page 8: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.
Page 9: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Common Espionage / Computer Crimes include.!

• Intellectual Property Theft• Damage of Company Computer

Network• Embezzlement• Copyright Piracy• Planting of Viruses, Worms on

Company Computers• Use of Stealth Listening Devices

/ Recording Equipment• Information Trafficking• Illegal Email Information Theft

Page 10: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

• All Employees are Trustworthy right?

• Often difficult to Identify Specific Employee

• Actions are Unpredictable…

• Difficult to Trace / Track• By the time discovery is

made the damage has already been done!

• Plausible Deniability• Poor security measures,

procedures & policies

The Inside Man: The Invisible Threat!

Page 11: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Understanding the Psychological & Sociological impact of Espionage

Page 12: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.
Page 13: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Why do they do it?• Evidence shows that principle

espionage threats do not come from clever and devious foreigners. It comes from "insiders“

• Of the 98 US Citizens arrested for espionage over the past 20 years, most were trustworthy and loyal at the time they were investigated and first approved for clearance

• Most surprising is that a majority of those who became spies volunteered their services to a foreign government

• They were not enticed, persuaded, manipulated, or coerced into betraying their Source: United States Central Intelligence Agency

Page 14: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Psychological & Sociological impact • Selling secrets is seldom a

sudden, uncontrolled impulse • It is usually the last act of a

long-simmering emotional crisis

• Treatable before the damage was done

• Spies are not "crazy," but they usually are emotionally disturbed or suffer from one or more personality disorders

• Of the personality disorders found in spies, the two most common are antisocial personality disorder and narcissism

Page 15: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Types of Malicious Incidents• "IT sabotage” Typically committed

by system administrators, programmers, technically sophisticated users, privileged users who become very disgruntled

• “Theft of intellectual property” or industrial espionage involving trade secrets like scientific information and source code is typically committed by scientists, engineers and programmers

• When insiders steal intellectual property, they usually act within a 30-day window, because of audit processes.

Page 16: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

“And to think I Trusted You!”

Page 17: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.
Page 18: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

I’ve Had Enough…

Page 19: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

I Have Dark Thoughts…

Page 21: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

I Want More Money…

Page 22: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

I Want to Believe…

Page 23: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

I Just Can’t Say No…

Page 24: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

I do it for the Excitement Factor…

Page 25: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.
Page 26: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

I’m So Gullible…

Page 27: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

I’m So Unbelievable…

Page 28: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Information Gathering!

Demo

Page 29: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

How they do it?

Page 30: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

How do they do it?• Use stealth recording

devices (Audio, video, software based bugs to record private conversations, meetings

• Plant Keyloggers, malicious Software onto company computers

• Illicitly obtain private files / information with intention to illegally share / sell.

Page 31: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Amazing Spy Gear!Buy Yours Today

• The UZI Tactical Defender Pen

• Allows users to break glass

• Can obtain DNA samples from attackers

• Get out of handcuffs ...

• And of course to write

• Only $24.99

Page 32: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Amazing Spy Gear!Buy Yours Today

• 1080p HD infrared spy camera fits your keychain • Rechargeable battery• USB interface for

transferring videos and battery recharging

• Takes regular and IR videos and pictures, as desired

• Motion-detecting record activation

• video recorded as AVI• Records audio

Page 33: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Why? The Threat Landscape has Changed!

Page 34: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.
Page 35: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Getting the Tools!

Demo

Page 36: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Spot the Warning Signs

Page 37: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Spot the Warning Signs!• Takes unauthorised material home via

documents, thumb drives, computer disks, or e-mail

• Obtains proprietary or classified information on subjects not related to their work duties

• Interest in matters outside scope of duties, particularly those of interest to foreign entities or business competitors

• Unnecessarily copies material, especially if it is proprietary or classified

• Remotely accesses the computer network while on vacation, sick leave, or at other odd times

Page 38: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Spot the Warning Signs!• Disregards company policies

on installing personal software • Access restricted websites• Conduct unauthorized

searches, or downloads confidential information

• Works odd hours without authorization; weekend work

• Has unreported foreign contacts

• Unexplained affluence; buys things that they cannot afford on their household income.

Page 39: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Spot the Warning Signs!• Engages in suspicious

contacts• Shows unusual interest in the

personal lives of co-workers• Concern that they are being

investigated, searches for listening devices or cameras.

• Many people experience or exhibit some or all of the above to varying degrees

Page 40: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Results of a Breach!• Company Defamation• Damaged Reputation• Loss of Customer

Confidence• Potential Financial Losses• Legal Liabilities• Loss of Assets• Breach of Trust• Potential Closure of

Business!

Page 41: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Selling your Secrets!

Demo

Page 42: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Discovery & Recovery

Page 43: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mitigate the Risk

• Must Place Trust Aside!

• Always Monitor Employee Actions

• Implement a Rigorous Termination Process

• Maintain Backup and Recovery

• Invest in Forensic Procedures

Page 44: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mitigation: Managing Risk!• Deliver a Pro Active Security

Policy by Management• Communicate Insider Threats

Through Security Awareness Programs

• Conduct Pre-Employment Screening (Facebook, Linked in, Twitter etc)

• Pay Attention to Performance Issue Handling

• Enforce Separation of Duties and Need-to-Know Access

Page 45: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

• Monitoring of Insider Email• Monitoring of Insider Keystrokes• Examination of Insider

Computer Files• Limit the Use of 3rd Party Apps

ob Phones / Computers• Monitoring Insider Internet

Traffic• Pay Increased Attention to

Privileged Accounts• Implement Strict Password and

Account Policies

Mitigation: Tech Ways to Mitigate the Risk!

Page 46: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mitigation: Counter Espionage!• Enforce a Safeguarding

proprietary information Programme (SPI)

• Hire an external CIO or information protection consultant

• Initiate Internal & External compliance auditing

• cover conference room walls with lead sheets to stop bugging by radio transmitters

• Consider Disabling Camera Phones

Page 47: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mitigation: Defence Against Social Engineering Attacks!

• Pretexting (The Impersonation Game)

• Phishing Attack (Click me please)• Diversion Theft (Look at that!)• Phone Phishing (Hi I’m Calling

from…)• Baiting (The USB Stick Attack)• Quid pro quo (Bogus Phone Calls)• Tailgating

Page 48: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mitigation: Use Employee Monitoring

Page 49: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mitigation: No Camera’s, Phones!

Page 50: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mitigation: Deploy Crypto Solutions

Page 51: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mitigation: Implement Network Segmentation

Page 52: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mitigation: Avoid Future Mistakes…

Page 53: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Mitigation: Deploy CCTV

Page 54: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Defensive Implications• The networks of critical

organizations will need to be run as a military defense at all times.• Constant alertness• Well staffed• Regular defensive drills• Standing arrangements for

reinforcement under attack• Extensive technological fortification• Excellent personnel and information

security

Page 55: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Hygiene

• Patches, AV, external firewalls etc• Failsafe design of critical machinery:• Not just idiot-proof but enemy-proof • All critical, but…• There will still be a way in• There will still be vulnerabilities• Current paradigm will be inadequate

Page 56: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Picking up the Pieces!

• Software damage • Integrity checkers• Backup/rollback systems

• Hardware damage• Supply of spares and spare parts• Distributed appropriately• Military logistics approach

Page 57: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Prevent Further Data Leakage• Foster a security-aware culture

in which protecting data is a normal and natural part of every employee's job

• Provide tools and education that employees need to keep data secure, starting with new-hire training and continuing with verbal updates instead of email that might be ignored or lost.

• Evaluate employee behaviour and the associated risks based on factors such as the locale and the threat landscape

Page 58: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Prevent Further Data Leakage• Continuously analyse the risks

of interaction between users and networks, endpoints, applications, data, and of course, other users, to maintain an awareness of the threat environment.

• Provide clear leadership through executive commitment and visibility, so employees understand that executives are engaged and accountable.

• Proactively set security expectations.

Page 59: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Do you have a leak!

Demo

Page 60: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Conclusions…

Page 61: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

What do you think?

Q&A

Page 62: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

The Inside Man Threat? Understanding the Psychological

& Sociological impact of Espionage

Understanding Espionage Tactics, Threats & Techniques

The Art of Social Engineering & Corporate Deception

Counter Espionage Techniques & Technologies

Q&A Session Review

Review

Page 63: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Related contentATC-B306 - Cybercrime: The 2013 Ultimate Survival GuideATC-B312 – Security Panel DiscussionATC-B202 – A Journey to the Dark Side of Social Networking!ATC-B314 - The Inside Man: Surviving the Ultimate Cyber Threat ATC-B201 - 1984: 21st Century Security Surveillance vs. the Erosion of Freedom!ATC-B213 - The Cloud: Making the Move to a Hybrid World

Find Me Later At...Trustworthy Computing / Cloud Security Table at the Ask the Experts Session.

Page 64: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Trustworthy Computing ResourcesTrustworthy Computing (TwC) is a long-term, collaborative effort to deliver more secure, private, and reliable computing experiences for everyone. Learn more at:http://microsoft.com/twc

Cloud Security Readiness ToolPass the Hash GuidanceData, Insights and Guidance (Security Intelligence Report, volume 14)

and more…

Page 65: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

msdn

Resources for Developers

http://microsoft.com/msdn

Learning

Microsoft Certification & Training Resources

www.microsoft.com/learning

TechNet

Resources

Sessions on Demand

http://channel9.msdn.com/Events/TechEd

Resources for IT Professionals

http://microsoft.com/technet

Page 66: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Complete an evaluation on CommNet and enter to win!

Page 67: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

Evaluate this session

Scan this QR code to evaluate this session and be automatically entered in a drawing to win a prize

Page 68: Microsoft MVP (Enterprise Security) Founder: Cybercrime Security Forum! Microsoft International Event Speaker MCT (18 Years) Winner: Microsoft Speaker.

© 2013 Microsoft Corporation. All rights reserved. Microsoft, Windows and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries.The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.