2011 SC Magazine Insider Threat Keynote

13

Click here to load reader

description

Jan 2011 SC Magazine Insider Threat Keynote by Dr. John D. Johnson, CISSP.

Transcript of 2011 SC Magazine Insider Threat Keynote

Page 1: 2011 SC Magazine Insider Threat Keynote

Managing Data Against Insider Threats

Dr. John D. Johnson, CISSP

Page 2: 2011 SC Magazine Insider Threat Keynote

Insider Threat

§  The insider is anyone who has been authorized to access internal systems. They originate on internal systems or are permitted special access across the perimeter (i.e. remote access)

§  The insider threat is not new, however technology can allow greater access, at a distance, to sensitive data, with potentially less effort and less accountability

§  The threat exists for insiders to exploit their authorized access, attack or misuse information systems

Page 3: 2011 SC Magazine Insider Threat Keynote

Defining The Problem

§  Intentional: Economic or Malicious motivations §  Hacking and Malware

§  Security Avoidance: Rules not aligned with business objectives

§  Mistakes: Insiders try to follow rules §  Ignorance: Insiders don’t know rules

Page 4: 2011 SC Magazine Insider Threat Keynote

Economic Factors

§  Economic factors may motivate individuals to do things they otherwise wouldn’t do

§  The economy is just one example of external factors that may drive up incidents

§  The economy may reduce security budgets, which may lead to weakened security controls and measures

§  Companies that empower their employees and keep them informed may have fewer data breaches

Page 5: 2011 SC Magazine Insider Threat Keynote

Global, Legal & Cultural Factors

§  Many gaps in security practices are exposed when a company expands into new markets/countries

§  Data must be managed according to laws in the country in which it resides

§  Not all cultures have the same standards when dealing with intellectual property

§  The reality of how data is treated in different countries and by different cultures may necessitate new controls and measures

Page 6: 2011 SC Magazine Insider Threat Keynote

Data Breaches

§  According to the Verizon 2009 Data Breach Investigations Report, 285 million records were compromised in 2008.

§  All industries suffer from data breaches, although threat vectors may vary significantly

§  The growth of financial services companies, and advances in technology put larger sets of personal data at risk

§  Historical data shows external hacking, malware or theft (i.e. data tape or laptop) accounts for approximately 80% of data breaches, while the insider threat remains around 20%

§  In 2008, nearly all records were compromised from online sources

§  Approximately 30% of data breaches implicated business partners

Source: Verizon 2009 Data Breach Investigations Report, http://www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.pdf

Page 7: 2011 SC Magazine Insider Threat Keynote

Protecting The Data

§  Proactive vs. Reactive Responses §  Learn from Past Incidents §  Encryption §  Access Controls & Monitoring §  Segmentation §  Education

Page 8: 2011 SC Magazine Insider Threat Keynote

Process Improvements

§  People §  Pay attention to employee morale, work closely with HR §  Provide security awareness & education that is targeted and

measured

§  Processes §  Implement processes for managing employee privileges as

their role changes §  Review rights quarterly or annually §  Keep concise security policies updated and published for

easy access

Page 9: 2011 SC Magazine Insider Threat Keynote

Technology

§  You can’t eliminate all risk, so you need to identify tools that will best address the insider threat based on past incidents at your company

§  Risk management helps identify where security dollars are best spent

§  Protecting data at rest and in motion is important, and this works best if you can identify the data you want to protect up front

§  Most tools exist to keep honest people honest

Page 10: 2011 SC Magazine Insider Threat Keynote

Survey of Tools

§  Data Loss Prevention §  Identity Management §  Centralized Security Logging/Reporting §  Security Event Management §  Web Authentication §  Intrusion Detection/Prevention Systems §  Network Access Controls §  Encryption

Page 11: 2011 SC Magazine Insider Threat Keynote

The Security Budget

§  As the economy and other factors drive up the threat, the security budget needs to be maintained

§  Security dollars should be spent where they can have the greatest impact

§  Significant results can be had by starting with simple, low cost solutions that target “low-hanging fruit”

§  Remember the principle of security in-depth

Page 12: 2011 SC Magazine Insider Threat Keynote

Measuring Success

§  Develop consistent and meaningful metrics for measuring the efficacy of your security controls

§  Develop executive dashboards and favor tools that provide real-time access to data and reporting

§  Review security processes periodically to ensure they are achieving stated goals, as they legal, cultural and corporate requirements may change

Page 13: 2011 SC Magazine Insider Threat Keynote

Conclusion

§  While the insider threat has always existed, technology magnifies the problem

§  It is too late to react when a data breach makes your company front page news, be proactive

§  Detecting insider attacks requires layered solutions that leverage people, processes and tools

§  Don’t undervalue the impact of user education §  The most expensive solution is not always the best

solution!