Top Banner
What Lurks in the Shadow Addressing the Growing Security Risk of Shadow IT & Shadow Data By @3ncr1pt3d
69

What Lurks in the Shadow

Apr 14, 2017

Download

Technology

Cheryl Biswas
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: What Lurks in the Shadow

What Lurks in the Shadow

Addressing the Growing Security Risk of Shadow IT & Shadow Data

By @3ncr1pt3d

Page 2: What Lurks in the Shadow

Cheryl Biswas

• Works for: JIG Technologies

• Does what exactly: security researcher, analyst, writer of things

• Trekkie, techie, maker, baker

• Bridging the gap between tech and non-tech

Necessary Disclaimer: All content is my own and does not reflect the opinions of my employer

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d2

Page 3: What Lurks in the Shadow

Security Lords09/11/2015

BSidesTO: What Lurks In The Shadow by @3ncr1pt3d

3

Page 4: What Lurks in the Shadow

Faster. Better. More. Tech. 09/11/2015

BSidesTO: What Lurks In The Shadow by @3ncr1pt3d

4

Page 5: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d5

Page 6: What Lurks in the Shadow

#GenMobile

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d6

#GenMobile “For the security of company data and IT systems, there may be cause for concern”.(http://www.arubanetworks.com/mobileriskindex/)

Page 7: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d7

BYoD

Page 8: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d8

Internet of So. Many. Things

Page 9: What Lurks in the Shadow

The Human Factor

Fear of the Unknown

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d9

Page 10: What Lurks in the Shadow

The Dark World

Shadow IT/Shadow Data

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d10

Page 11: What Lurks in the Shadow

In the Land of Mordor

Where the Shadows Lie

Keep it secret, keep IT safe

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d11

Page 12: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d12

Page 13: What Lurks in the Shadow

“Employees in every cubicle are using Box, Workday and Salesforce, and they’re not waiting for IT’s permission to do so. They’re using their own apps on their own devices. Many are spinning up servers in the cloud for infrastructure in the cloud, a practice dubbed bring your own server. So privilege is now being consumerized like apps and devices.”

- Forbes

Page 14: What Lurks in the Shadow

- ZDNET

“When you agree to BYOD policies, you put employees within the security chain”.

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d14

Page 15: What Lurks in the Shadow

Bad Apples09/11/2015

BSidesTO: What Lurks In The Shadow by @3ncr1pt3d

15

Page 16: What Lurks in the Shadow

Pass on the Passwords• 51% Single password/numerical PIN

• 58% NO policies of software to enforce better passwords

• 56% Shared passwords

• 17% Used company-provided password mgr

• 60% Accessed confidential corporate data

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d16

Page 17: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d17

Page 18: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d18

Page 19: What Lurks in the Shadow

Unprotected and Connected

• questionable WiFi networks via the local coffee shop hotspot

• unapproved cloud storage

• really, really bad USB

Page 20: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d20

Page 21: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d21

Page 22: What Lurks in the Shadow

Securitymeans never having to say you’re sorry

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d22

Page 23: What Lurks in the Shadow

Cyber Insurance

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d23

Page 24: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d24

Page 25: What Lurks in the Shadow

A culture of indifference. Sharing as the norm – devices, data, passwords

Indifference towards security – the assumption that security is somebody else’s problem; not worried about their own responsibility

Self-empowerment succeeds over existing rules (Aruba Networks)

Page 26: What Lurks in the Shadow

“Businesses are ill-prepared for the attitude of next generation employees who own mobile devices, and may be placed at risk as the BYOD trend causes fractures in security enforcement.”

- ZDNet

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d26

Page 27: What Lurks in the Shadow

Alien Vault Insider Risk Matrix

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d27

Page 28: What Lurks in the Shadow

“All identities are not created equal”

With great power comes great responsibility

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d28

Page 29: What Lurks in the Shadow

Great Power, Great Responsibility

• 92% orgs have user monitoring

• 56% handle privileged identity mgmt.

• 58% corps do regular password updates

• 60% IT decision makers share creds

• 52% share creds with contractors

>20% analyze or audit privileged access

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d29

Page 30: What Lurks in the Shadow

“IT departments often give non-technical executives (e.g. VP of Sales, CEOs, CFOs, etc.) broad privilege inside corporate applications, figuring it is better to give too much freedom to upper management than get yelled at when someone can’t create a report.”

- Forbes

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d30

Page 31: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d31

“It is scary to think that this many people consider it normal for employees to have access to data that they shouldn’t have and for companies to not know where their missing data has gone.”

- David Gibson, VP at Varonis.

Page 32: What Lurks in the Shadow

The Loss of Privilege

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d32

Page 33: What Lurks in the Shadow

The hearts of men are easily corrupted. And the ring of power has a will of its own...

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d33

Page 34: What Lurks in the Shadow

Time for

a little talk about

B I GData

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d34

Page 35: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d35

Page 36: What Lurks in the Shadow

Who Touched the Data?

“It’s not good enough to merely resist the rise of BYOD, if people can still access corporate e-mail

when they get home…”John McAfee

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d36

Page 37: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d37

Page 38: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d38

Page 39: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d39

Page 40: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d40

Page 41: What Lurks in the Shadow

What’s Mine is Mine & What’s Yours is Mine Too

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d41

Page 42: What Lurks in the Shadow

Sh*tpostsfrom the

Trenches

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d42

Page 43: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d43

Page 44: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d44

Page 45: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d45

Page 46: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d46

Page 47: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d47

Page 48: What Lurks in the Shadow

Let’s do a little Demo

https://www.shodan.io/

Page 49: What Lurks in the Shadow

Country. Company. Device. Password

Default09/11/2015

BSidesTO: What Lurks In The Shadow by @3ncr1pt3d

49

Page 50: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d50

Page 51: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d51

Page 52: What Lurks in the Shadow

So Where Do We Go From Here?

“Just Say No.”

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d52

Page 53: What Lurks in the Shadow

Current rules can’t apply when the game itself

has changed.What was working isn’t working now

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d53

Page 54: What Lurks in the Shadow

Least Privilege: “Every program and every user of the system should operate using the least set of privileges necessary to complete the job. Primarily this principle limits the damage that can result from an accident or error.”

- SALTZER, J.H. and SCHROEDER, M.D.

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d54

Page 55: What Lurks in the Shadow

We’ve taken the lid off Pandora’s box. I don’t think it ever goes back on.

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d55

Page 56: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d56

Page 57: What Lurks in the Shadow

What Are We Missing

• Training and Awareness

• Inventory and Monitoring

• Secure Hi-Value Assets

• ????

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d57

Page 58: What Lurks in the Shadow

The Cloud

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d58

Page 59: What Lurks in the Shadow

No Idea What They’re Using,No Idea What They’re Losing

• 15x more cloud services used to store critical data than CIOs authorized

• IT says 51 active cloud services. Survey says 730

• Use growing exponentially.

• 1000 external services per company by 2016

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d59

Page 60: What Lurks in the Shadow

30% of business critical info is in the cloud.

Most cloud apps are third party apps.

- Ponemon Institute

Page 61: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d61

Shadow ITisn’t

going anywhere …

Gartner says so

Page 62: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d62

Page 63: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d63

Page 64: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d64

Page 65: What Lurks in the Shadow

To Build a Better Mousetrap,Draw A Bigger Circle

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d65

Page 66: What Lurks in the Shadow

The Way Forward

• Ask what users really need and want

• Show the CSuites why we are their strategic partner

• Shift gears and adapt

• Projections based on Cloud, Big Data, Everything as a Service

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d66

Page 67: What Lurks in the Shadow

As for that one ring that rules them all …

The World has changed. And so must

we.

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d67

Page 68: What Lurks in the Shadow

Thank You So Much!

BSidesTO

Contact Deets: @3ncr1pt3dca.linkedin.com/in/cherylbiswashttps://whitehatcheryl.wordpress.com/

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d68

Page 69: What Lurks in the Shadow

09/11/2015BSidesTO: What Lurks In The Shadow by

@3ncr1pt3d69