27
Turning Hedge Fund Security Inside-Out: Why Your Firm May Already Be Compromised…And What to Do About It

09 2012securityss-120926095559-phpapp01

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: 09 2012securityss-120926095559-phpapp01

Turning Hedge Fund Security Inside-Out: Why Your Firm May Already Be Compromised…And What to Do About It

Page 2: 09 2012securityss-120926095559-phpapp01

AgendaExternal Threat Management

Exploitation Methodology

Why You’re Already Compromised

Operational Management

Mobile Devices & BYOD

#ECIsecurity

Page 3: 09 2012securityss-120926095559-phpapp01

eSentire™ Hedge FundCybersecurity Review

Page 4: 09 2012securityss-120926095559-phpapp01

Hedge Fund Cybersecurity

• External Threats• External Vulnerability Assessment• Penetration Test• Disconnection from reality• Small External Footprint

Copyright © eSentire, Inc.#ECIsecurity

Page 5: 09 2012securityss-120926095559-phpapp01

Reality: Most Successful Attack Vectors

Copyright © eSentire, Inc.

Malware Via Email

#ECIsecurity

Page 6: 09 2012securityss-120926095559-phpapp01

Reality: Most Successful Attack Vectors

Copyright © eSentire, Inc.

Malware Via Drive-By-Download

#ECIsecurity

Page 7: 09 2012securityss-120926095559-phpapp01

Reality: Most Successful Attack Vectors

Copyright © eSentire, Inc.

Malware Transferred Via USB

#ECIsecurity

Page 8: 09 2012securityss-120926095559-phpapp01

Exploitation Methodology

Copyright © eSentire, Inc.

INFILTRATE

EXFILTRATE

PROFIT!

#ECIsecurity

Page 9: 09 2012securityss-120926095559-phpapp01

Cyber Kill Chain

RECONNAISANCE

WEAPONIZATION

DELIVERY

EXPLOIT

INSTALLATION

COMMAND AND CONTROL (CIC)

ACTIONS or OBJECTIONSUsually Exfiltration

#ECIsecurity

Page 10: 09 2012securityss-120926095559-phpapp01

Cyber Kill Chain (Mitigation And Detect)

RECONNAISANCE

WEAPONIZATION

DELIVERY

EXPLOIT

INSTALLATION

COMMAND AND CONTROL (CIC)

ACTIONS or OBJECTIONSUsually Exfiltration

MITIGATEDETECT

MITIGATEDETECT

MITIGATEDETECT

MITIGATEDETECT

MITIGATE

DETECT

MITIGATE

DETECT

MITIGATE

DETECT

#ECIsecurity

Page 11: 09 2012securityss-120926095559-phpapp01

Defense and Mitigation Activities

DETECT

DENY

DISRUPT

DEGRADE

DECEIVE

DESTROY

#ECIsecurity

Page 12: 09 2012securityss-120926095559-phpapp01

Course of Action Matrix

PHASE DETECT DENY DISRUPT DEGRADE DECEIVE DESTROY

RECON Web Analytics

FirewallACL

LinkedInHoneytoken

WEAPONIZE NIDS NIPS

DELIVERY VigilantUser

SMTPProxy

In-line AV

Executable Whitelisting

Queuing

EXPLOIT HIDS PatchingData

ExecutionProtection

INSTALL HIDS ‘chroot’ Jail AV

C&C NIDS FirewallACL NIPS Tarpit DNS

Redirect

ACTION/OBJAudit Log

Network TrafficForensics

Quality of Service Honeypot

Copyright © eSentire, Inc.#ECIsecurity

Page 13: 09 2012securityss-120926095559-phpapp01

Multi-Dimensional Vulnerability AssessmentWe Assume Your Network Is Already Compromised

CONFIDENTIAL - Copyright © eSentire, Inc.

• External AND Internal VA• Technical AUP Rigor• Network Traffic Analysis• Patch Analysis• Active Directory Analysis• MS Domain Event Analysis• Defensibility Analysis

#ECIsecurity

Page 14: 09 2012securityss-120926095559-phpapp01

eSentire™ Cybersecurity Analysis

• Every MDVA performed in the last two years has shown evidence of malicious activity on the inside

• The client usually does not know about it (e.g. silent drive-by download)

• In practically all cases, vector has nothing to do with a direct external attack perspective

• Demonstrates current problems and how to resolve moving forward

Copyright © eSentire, Inc.#ECIsecurity

Page 15: 09 2012securityss-120926095559-phpapp01

Cybersecurity ‘Low-Hanging Fruit’

CONFIDENTIAL - Copyright © eSentire, Inc.

• Enforce strong passwords and 2FA

• Lockdown External Space• Remove Local Admin• Patch! MS, Adobe, JRE,

Browsers• Restrict EXE download and

install • Logging with NTP enabled

#ECIsecurity

Page 16: 09 2012securityss-120926095559-phpapp01

CONFIDENTIAL - Copyright © eSentire, Inc.

Forget the Barbarians at the Gate

It’s the Ones Inside

Your Network You

Should Worry About

#ECIsecurity

Page 17: 09 2012securityss-120926095559-phpapp01

Thank you

+1 866.579.2200

[email protected]

http://www.eSentire.com

https://twitter.com/#!/eSentire

Page 18: 09 2012securityss-120926095559-phpapp01

Turning Hedge Fund Security Inside-Out

Page 19: 09 2012securityss-120926095559-phpapp01

Operations to Support Your Technology Policies & Procedures:– Such as:

• Access Control• Acceptable Use• Information Security Management

Mobile Device Management– Bring Your Own Device

#ECIsecurity

Page 20: 09 2012securityss-120926095559-phpapp01

Policies & ProceduresAccess Control Policy– Who has access to what?– Principle of Least Privilege: Not everyone needs access

to everything.– Keep an authentication/access log, e.g. AuthAnvil

#ECIsecurity

Page 21: 09 2012securityss-120926095559-phpapp01

Policies & ProceduresAcceptable Use Policy– What is acceptable for employees to view/access at

work?• Network and system access• Personal email and communications• Blogs, wikis, chat rooms• Social media

#ECIsecurity

Page 22: 09 2012securityss-120926095559-phpapp01

Information Security Incident Management Policy– Process for dealing with a security incident– Who is responsible for handling incidents? What does

the reporting & investigation process entail?

#ECIsecurity

Policies & Procedures

Page 23: 09 2012securityss-120926095559-phpapp01

Securities/Insider Trading Policy– Make sure employees understand the repercussions

of insider trading!

#ECIsecurity

Policies & Procedures

Page 24: 09 2012securityss-120926095559-phpapp01

Visitor/Contractor Premise Access Policy– Need to monitor access/activity of both internal and

external people– Use physical security checkpoints/surveillance

Personal Communications Device Policy– What is acceptable behavior for mobile devices?– Include information on data usage, texting, personal

usage and loss/theft procedures

#ECIsecurity

Policies & Procedures

Page 25: 09 2012securityss-120926095559-phpapp01

Mobile Device ManagementBring Your Own Device (BYOD)– Be sure to:

• Educate employees about mobile device security.• Remind users to utilize caution when opening email and

attachments.• Implement security measures such as the use of passwords

and remote wipe capabilities.• Employ encryption tools.• Only connect to secure Wi-Fi networks.• Be careful with downloads.

#ECIsecurity

Page 26: 09 2012securityss-120926095559-phpapp01

Eze Castle Integration OverviewFounded 1995

Headquarters

Additional Offices

260 Franklin Street, 12th Floor, Boston, Massachusetts, 02110

Chicago, Dallas, Geneva, Hong Kong, London, Los Angeles, Minneapolis, New York City, San Francisco, Singapore and Stamford

Core Services

• Strategic IT Consulting• Outsourced IT Solutions• Professional Services• Project & Technology Management• Communications Solutions• Network Design & Management• Internet Service

• Private Cloud Services• Business Continuity Planning• Disaster Recovery• Compliance Solutions• Storage Solutions• Colocation Services• E-Mail & IM Archiving

Awards Received

Learn more at www.eci.com.

Page 27: 09 2012securityss-120926095559-phpapp01

260 Franklin Street, 12th floor Boston, MA 02110 617-217-3000 www.eci.com