Top Banner
Nightingale Floors: Mitigating Cyber Attacks in 2015 Tom Kellermann, CISM Chief Cybersecurity Officer, Trend Micro Inc.
24

Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Aug 08, 2015

Download

Technology

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Nightingale Floors: Mitigating Cyber Attacks in 2015

Tom Kellermann, CISMChief Cybersecurity Officer, Trend Micro Inc.

Page 2: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

History Repeats Itself

Copyright 2015 Trend Micro Inc.

Page 3: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Advanced Malware Targeted Attacks

Advanced Malware

Targeted Attacks

Employee Data Leaks

Traditional Malware

Vulnerability Exploits

300K new malware programs daily!

Page 4: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Arms Bazaar of Attack Code

Page 5: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Thriving Underground Market

Malware offered for $249 with a service level agreement (SLA) and replacement warranty if the creation is detected by any antivirus within 9 months

Copyright 2014 Trend Micro Inc.

Page 6: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Malware checking

Botnet Framework

Bulletproof hosting

Exploit Kit

DDOS Attack for 24 hours

Dropper file and crypt

Modules

$30

$125

monthly onetime

$50

$40

$0$52

$38 $120

$0 $20

$205$70

$80$8

Total:$238 $600

Menu for Full Service Hacking

Page 7: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Stratagems of Elite Hackers

Page 8: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Stages-of-Attack.pptx

Page 9: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Destroy the ForensicsCopyright 2015 Trend Micro Inc.

Page 10: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Noteworthy Attack Vectors

Page 11: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Watering Hole Attacks: 28% in the USA

Source: Trend Micro Q3’14 Treat Roundup Report

Page 12: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Island Hopping and Secondary Infections

Page 13: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

The Evolution of Mobile Attacks

Page 14: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Proximity Attacks Realized

Page 15: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Geopolitics as Harbingers for Attack

Page 16: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Operation Pawn Storm

Copyright 2015 Trend Micro Inc.

Page 17: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

What are the Impacts of Targeted Attacks?

Strategic Costs Career Risks

Page 18: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Offense Must Inform Defense: Spin the Chess Board

Page 19: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Trends of Attack 2015

• IOS will become the bull's-eye of malware.

• Zero Day’s for Web applications explode.

• Cloud App Attacks.

• Secondary infections are leveraged to facilitate long-term campaigns against the fortune 100.  

• Ransomware

• The use of destructive payloads as part of counter incident response.

04/15/2023

Page 20: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Advanced Persistent Response

Page 21: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Advanced Malware

Detection

Attacker Activity Detection

Threat Impact Assessment

Contextual Threat Analysis

Page 22: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Detect malware, C&C, and attacker activity invisible to standard defenses

Analyze the risk, context, timeline and full extent of the attack

Respond with automatic security updates & the insight to shut down the attack

Custom Defense is the Foundation

Custom Defense

Advanced MalwareDetection

ContextualThreat Analysis

AutomatedSecurity Updates

Command & ControlDetection

AttackerActivity Detection

Threat Impact Assessment

Page 23: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Risk Management 1. Conduct Pen test of all third parties.2. Use Two-factor authentication.3. Utilize a host based intrusion prevention system.4. Deploy file integrity monitoring.5. Implement virtual shielding for zero day exploits.6. Deploy both an MDM and Mobile Application Reputation

software.7. Sandbox your cloud apps.8. Implement whitelisting.9. Manage the crypto keys for your cloud data.10. Web Application Security (OWASP).11. Deploy context aware Threat Intelligence.12. Utilize a Breach Detection System.

Page 24: Trend Micro Keynote: Nightingale Floors: Mitigating Cyber Attacks in 2015

Securing your journey to the cloud