13
1 © Copyright 2015 EMC Corporation. All rights reserved. Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

Embed Size (px)

Citation preview

Page 1: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

Understanding and Dealing with Modern ThreatsTrent Greenwood, Manager Security Practioners TOLA

Page 2: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

2© Copyright 2015 EMC Corporation. All rights reserved.

The State of the Problem

EMC CONFIDENTIAL – FOR INTERNAL USE ONLY

Page 3: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

3© Copyright 2015 EMC Corporation. All rights reserved.

Agenda

Page 4: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

4© Copyright 2015 EMC Corporation. All rights reserved.

Page 5: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

5© Copyright 2015 EMC Corporation. All rights reserved.

Why is everyone picking on me?

Page 6: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

6© Copyright 2015 EMC Corporation. All rights reserved.

What would anyone want from me?

Page 7: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

7© Copyright 2015 EMC Corporation. All rights reserved.

Do you know how much it can cost?

• 2,644 Breaches*

• 267 Million Records*

• $5.5M cost per Breach*

• $194 cost per Record*

• 99% records lost due to external hacking*

• 97% of data breach incidents were avoidable*

• Target cost $162 million – AFTER INSURANCE

– * numbers from the Online Trust Alliance Guide to Data Protection and Breach Readiness (2013)

Page 8: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

8© Copyright 2015 EMC Corporation. All rights reserved.

The Adversary – who is after you

CRIMINALS Unsophisticated, but noisy

Organized, sophisticated supply chains (PII, PCI, financial services, retail)

Organized crimePetty criminals

NON-STATE ACTORS Various reasons,

including collaboration with the enemy

Political targets of opportunity, mass disruption, mercenary

Cyber-terrorists / Hacktivists

Insiders

NATION STATE

ACTORSGovernment, defense contractors, IP rich organizations, waterholes

Nation states

Page 9: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

9© Copyright 2015 EMC Corporation. All rights reserved.

• Type of Attack Classification– Proxy Interception– SQL Attack Tools– Web Scanner/Services Attack Tools– Username Harvesting

• Tools are cheap – – Spear Phishing toolkits $2 - $10– Malware Kits – Carbanak over $1 b– Skimming Devices– RAM Scraping on PoS terminals– Hackers for Hire websites

The Adversary – Tools they use

Page 10: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

10© Copyright 2015 EMC Corporation. All rights reserved.

“Everyone has a plan until you get punched in the face.”

A wise man once said:

Page 11: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

11© Copyright 2015 EMC Corporation. All rights reserved.

What is your plan?

Page 12: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

12© Copyright 2015 EMC Corporation. All rights reserved.

Can you Execute?People, Process and Technology

Page 13: Understanding and Dealing with Modern Threats Trent Greenwood, Manager Security Practioners TOLA

EMC, RSA, the EMC logo and the RSA logo are trademarks of EMC Corporation in the U.S. and other countries.