14
GRC 2.0 - Breaking Down The Silos ISACA Ireland Conference 3 rd October 2014 Presentation Title Presented By Dealing with the insider threat. Matt Lemon Global Head of Information Security

Dealing with the insider threat

Embed Size (px)

Citation preview

Page 1: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Presentation Title

Presented By

Dealing with the insider threat.

Matt LemonGlobal Head of Information Security

Page 2: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Introduction:

• Definition of an insider threat.

• Motivations.

• A few statistics.

• Identifying the threat.

• Combatting the threat.

• Preventing the threat.

Page 3: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Quick poll

Which is the bigger risk?

• External attacker• Organisations own staff

Threat

Internal External

Forrester 2013 - “Understand the State of Data Security and Privacy”

Page 4: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Definition

1. The trusted unwitting insider.2. The trusted witting insider.3. The untrusted insider.

A lot is mentioned in the media about the threats of cyberspace, where

outside entities use software flaws, hijacked computers and social engineering

to strike at company networks. For many, insiders are the greater cause for

concern.

Page 5: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Motivation

• Financial Gain

• Career Advancement

• Revenge

• Thrill

• Accidental error

• Being helpful

• Political

Page 6: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Risky areas

• Theft

• Deletion or Corruption of data

• Physical damage

• Data leakage

Page 7: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

How Insiders are handled

Source: 2011 CyberSecuirty Watch Survey, CSO Magazine, U.S. Secret Service, Software Engineering Institute CERT Program at Carnegie Mellon

University and Deloitte, January 2011.

Page 8: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Identifying threats.

FBI Research

Spotting behaviour is difficult

because there is so little and

unhelpful data to work with. Finding

the red flags that predict an insider

threat also gives rise to a lot of false

positives.

Former FBI Chief Information Security Officer Patrick Reidy

Page 9: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Identifying threats

The Insider Threat Cyber “Kill Chain”.

Page 10: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Identifying the threats

• Often first in and last out of the office.

• Lots of unused holiday.

• Changes in lifestyle – Spending, Socializing, Marital Status.

• Resigned.

• Working out redundancy.

• Passed over for promotion or pay review.

• Pending HR disciplinary.

Page 11: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Combatting the threats

Positive Social Engineering.

Page 12: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Combat & Prevention

• Document and enforce policies and controls.

• Include insider threat awareness into security training.

• Monitor and respond to suspicious or disruptive behaviour.

• Anticipate and manage negative issues.

• Know your assets.

• Use strict password and account management policies.

• Enforce separation of duties and least privilege.

• Use access control and monitoring policies on privileged

users.

• Use Security Event and Information Management (SIEM) to

monitor and audit staff.

• Implement secure backup and recovery processes.

• Establish a baseline of normal network behaviour.

• Monitor for potential Data Leakage.

Page 13: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Tools & Techniques

NOT AN ENDORSEMENT – NO AFFILIATION.

• SpectorSoft – Spector 360 (Employee Monitoring Software)

• Tripwire – IP360

• Security Onion - Open Source IDS

Page 14: Dealing with the insider threat

GRC 2.0 - Breaking Down The Silos

ISACA Ireland Conference – 3rd

October 2014

Thank you…..

plus.google.com/+matthewlemon/

@mattlemon