Cyber Defense eMagazine November 2019
Cyber Defense eMagazine November Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Cyber Defense eMagazine November Edition for 2019 #CDM #CYBERDEFENSEMAG @CyberDefenseMag by @Miliefsky a world-renowned cyber security expert and the Publisher of Cyber Defense Magazine as part of the Cyber Defense Media Group
Transform your PDFs into Flipbooks and boost your revenue!
Leverage SEO-optimized Flipbooks, powerful backlinks, and multimedia content to professionally showcase your products and significantly increase your reach.
Detrimental Ransomware Effects<br />
3 Must-Do Tasks to Make Vulnerability<br />
Management Useful in Today’s<br />
Environments<br />
How to Address the Top 5 Human Threats<br />
to Your Data<br />
Here’s How You Can Secure Your App from<br />
<strong>Cyber</strong> Attacks<br />
How to Stop <strong>Cyber</strong>security Attacks before<br />
They Start<br />
What Does A <strong>Cyber</strong> Security Consultant<br />
Do?<br />
…and much more…<br />
1
CONTENTS<br />
Detrimental Ransomware Effects ................................................................................................................. 18<br />
Achieving <strong>Cyber</strong>security Readiness with AI-Powered, Gamified Training ....................................................... 21<br />
Talk About a Disaster ................................................................................................................................... 25<br />
3 Must-Do Tasks to Make Vulnerability Management Useful in Today’s Environments .................................. 29<br />
The Intersection of Artificial Intelligence and <strong>Cyber</strong>security .......................................................................... 32<br />
From Guards to Detectives: Evolving the Junior Security Analyst Role ........................................................... 37<br />
Where Property Insurance Ends and <strong>Cyber</strong> Insurance Begins ......................................................................... 41<br />
How to Build an Effective Insider Threat Program: Part I ............................................................................... 44<br />
How to Build an Effective Insider Threat Program: Part II, Technology ........................................................... 49<br />
Modernize the Mission: Implementing TIC 3.0 and Zero Trust Networking .................................................... 55<br />
<strong>Cyber</strong> Resilience: Best Practices from Leading Industry Experts ..................................................................... 58<br />
Are Financial Services the Golden Goose for <strong>Cyber</strong>criminals? ........................................................................ 66<br />
The Social Engineering Methods and Countermeasures ................................................................................ 69<br />
How to Address the Top 5 Human Threats to Your Data ................................................................................ 73<br />
How to Suggest Your Manager to Invest into <strong>Cyber</strong> <strong>Defense</strong>? ........................................................................ 77<br />
So, Ya Wanna Be A Pen Tester, Huh? ............................................................................................................ 81<br />
Simple Ways SMBs Can Protect Themselves against <strong>Cyber</strong>-Threats ............................................................... 86<br />
In A World of External Threats, How Are Business Putting Themselves In Jeopardy? ...................................... 90<br />
Avoiding Misinformation for Content Moderators ........................................................................................ 94<br />
2
How to Keep Your Customer’s Credit Card Information Safe ......................................................................... 98<br />
10 Best Tips for Using Metasploit to Harden Your Network ......................................................................... 102<br />
How Organizations Can Best Avoid GDPR Fines through Continuous Compliance ......................................... 109<br />
Here’s How You Can Secure Your App from <strong>Cyber</strong> Attacks ........................................................................... 113<br />
Sovereign <strong>Cyber</strong> Effects Provided Voluntarily by Allies (SCEPVA) ................................................................. 116<br />
How <strong>Cyber</strong>security Became a Major Issue for Your Business’ SEO ................................................................ 120<br />
How to Erase Data from Mobile Devices: Four Common Misconceptions ..................................................... 123<br />
Secure Data Is Gold: U.S. Immigration Options for <strong>Cyber</strong>security Experts .................................................... 126<br />
<strong>Cyber</strong>security Essentials for Small and Medium Businesses ......................................................................... 131<br />
New <strong>Cyber</strong>security Trend: Hackers Impersonating Other Hackers ................................................................ 135<br />
Software Defined Perimeter Deep Dive & Required Implementation Readiness........................................... 138<br />
Sprint Beta Testing 5G Smart City in Georgia ............................................................................................... 142<br />
Stressing Security Teams ............................................................................................................................ 145<br />
The Importance of <strong>Cyber</strong>security When Dealing With Online Customers ..................................................... 149<br />
How to Stop <strong>Cyber</strong>security Attacks before They Start ................................................................................. 152<br />
What Does A <strong>Cyber</strong> Security Consultant Do? ............................................................................................... 156<br />
A10 Networks Cloud Access Proxy Provides Secure Access and Visibility for SaaS Apps ................................ 159<br />
3 <strong>Cyber</strong>security Trends & Predictions for 2020 (from Illumio) ...................................................................... 162<br />
Applying Security Across Heterogeneous IT Systems ................................................................................... 164<br />
The Security Challenges of Robotic Process Automation—A Primer ............................................................. 168<br />
5 Simple Ways to Protect Your Smartphone from <strong>Cyber</strong> Attacks .................................................................. 172<br />
3
@MILIEFSKY<br />
From the<br />
Publisher…<br />
New <strong>Cyber</strong><strong>Defense</strong>Magazine.com website, plus updates at <strong>Cyber</strong><strong>Defense</strong>TV.com & <strong>Cyber</strong><strong>Defense</strong>Radio.com<br />
Dear Friends,<br />
Can you believe it’s <strong>November</strong> <strong>2019</strong>, already? We’re almost into 2020 but we still have so much to<br />
accomplish this year – we have a new platform going live by December so stay tuned. Don’t miss us at<br />
the InfoSecurity North America show in New York City <strong>November</strong> 20-21, <strong>2019</strong><br />
https://www.infosecuritynorthamerica.com/ before we turn the<br />
corner into an early RSA Conference 2020 in late February, in<br />
San Francisco, CA, USA.<br />
Our 8 th annual InfoSec Awards for 2020 are now open and we<br />
hope to find more winners this year who are market leaders,<br />
innovators and those offering some of the best solutions for<br />
cyber security in the global marketplace. For those women who<br />
did not make our Top 25 Women in <strong>Cyber</strong>security for <strong>2019</strong> or<br />
missed out on the deadline, we have added Women in<br />
<strong>Cyber</strong>security as a new category this year. If you’re an infosec<br />
innovator, please consider applying at:<br />
https://www.cyberdefenseawards.com/<br />
We offer our own statistics that you are free to reuse anytime, from this page:<br />
http://www.cyberdefensemagazine.com/quotables/. We have many new interviews going live on<br />
https://www.cyberdefensetv.com and https://www.cyberdefenseradio.com this month, so please check<br />
them out and share links to them with your friends and co-workers. Let’s all keep on innovating and<br />
finding ways to get one step ahead of the next threat!<br />
Warmest regards,<br />
Gary S. Miliefsky<br />
Gary S.Miliefsky, CISSP®, fmDHS<br />
CEO, <strong>Cyber</strong> <strong>Defense</strong> Media Group<br />
Publisher, <strong>Cyber</strong> <strong>Defense</strong> Magazine<br />
P.S. When you share a story or an article or information about CDM, please use #CDM and @<strong>Cyber</strong><strong>Defense</strong>Mag<br />
and @Miliefsky – it helps spread the word about our free resources even more quickly.<br />
4
@CYBERDEFENSEMAG<br />
CYBER DEFENSE eMAGAZINE<br />
Published monthly by the team at <strong>Cyber</strong> <strong>Defense</strong> Media Group and<br />
distributed electronically via opt-in Email, HTML, PDF and Online<br />
Flipbook formats.<br />
InfoSec Knowledge is Power. We will<br />
always strive to provide the latest, most<br />
up to date FREE InfoSec information.<br />
From the Editor’s Desk…<br />
Turning a corner as leaves turn colors, changes<br />
are coming. Some of the biggest attack vectors<br />
we’re predicting for 2020 include:<br />
• Nation State <strong>Cyber</strong>espionage and<br />
<strong>Cyber</strong>warfare<br />
• Supply Chain Management Exploitation<br />
• Cloud-based Identity Attacks<br />
• New Deep Fake Spear Phishing Attacks<br />
• Mobile Devices Become the Ultimate<br />
Backdoor<br />
• IoT Devices Become New Critical Targets<br />
• Ransomware will continue to escalate<br />
….and we expect much more…so please keep reading,<br />
keep sharing and watch for the latest exploits as well as<br />
the best defenses to get one step ahead of the next<br />
threat, only here, at <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />
Thank you so much!<br />
To our faithful readers,<br />
Pierluigi Paganini<br />
Editor-in-Chief<br />
PRESIDENT & CO-FOUNDER<br />
Stevin Miliefsky<br />
stevinv@cyberdefensemagazine.com<br />
EDITOR-IN-CHIEF & CO-FOUNDER<br />
Pierluigi Paganini, CEH<br />
Pierluigi.paganini@cyberdefensemagazine.com<br />
EDITOR-AT-LARGE & CYBERSECURITY JOURNALIST<br />
Yan Ross, JD<br />
Yan.Ross@cyberdefensemediagroup.com<br />
ADVERTISING<br />
Marketing Team<br />
marketing@cyberdefensemagazine.com<br />
CONTACT US:<br />
<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />
Toll Free: 1-833-844-9468<br />
International: +1-603-280-4451<br />
SKYPE: cyber.defense<br />
http://www.cyberdefensemagazine.com<br />
Copyright © <strong>2019</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of<br />
CYBER DEFENSE MEDIA GROUP (a Steven G. Samuels LLC d/b/a)<br />
276 Fifth Avenue, Suite 704, New York, NY 10001<br />
EIN: 454-18-8465, DUNS# 078358935.<br />
All rights reserved worldwide.<br />
PUBLISHER<br />
Gary S. Miliefsky, CISSP®<br />
Learn more about our founder & publisher at:<br />
http://www.cyberdefensemagazine.com/about-our-founder/<br />
WE’RE TURNING A CORNER INTO<br />
8 YEARS OF EXCELLENCE!<br />
Providing free information, best practices, tips and<br />
techniques on cybersecurity since 2012, <strong>Cyber</strong> <strong>Defense</strong><br />
magazine is your go-to-source for Information Security.<br />
We’re a proud division of <strong>Cyber</strong> <strong>Defense</strong> Media Group:<br />
CYBERDEFENSEMEDIAGROUP.COM<br />
MAGAZINE TV RADIO AWARDS<br />
5
6
7
8
9
10
Your website could be vulnerable to outside attacks. Wouldn’t you like to know where those<br />
vulnerabilities lie? Sign up today for your free trial of WhiteHat Sentinel Dynamic and gain a deep<br />
understanding of your web application vulnerabilities, how to prioritize them, and what to do about<br />
them. With this trial you will get:<br />
An evaluation of the security of one of your organization’s websites<br />
Application security guidance from security engineers in WhiteHat’s Threat Research Center<br />
Full access to Sentinel’s web-based interface, offering the ability to review and generate reports as well<br />
as share findings with internal developers and security management<br />
A customized review and complimentary final executive and technical report<br />
Click here to sign up at this URL: https://www.whitehatsec.com/info/security-check/<br />
PLEASE NOTE: Trial participation is subject to qualification.<br />
11
12
13
14
15
16
17
Detrimental Ransomware Effects<br />
Lost coursework and headaches<br />
By Charles Parker, II<br />
Sir John Colfox Academy is a secondary school in Bridport, Dorset in the UK. The school has 828<br />
students, aged between 11 and 18.<br />
Attack<br />
On a fateful work day, much like any other, a staff member received an email. This was one of the<br />
hundreds of emails received on a weekly basis. This however claimed to be a colleague at another Dorset<br />
school. Not thinking a malicious person would have sent this, the staff member opened the email and<br />
clicked on the content on February 28, <strong>2019</strong>. While this may have seem innocent enough, the email<br />
actually appears to have been sent from China and forwarded from a server in Germany.<br />
18
The click opened the door for the systems infection. The network had an issue. The malware was reported<br />
as ransomware and, as expected, immediately began to encrypt the files. The attackers, as with the next<br />
step of the ransomware playbook, demanded money to be paid to them for the decrypt key. The school<br />
consulted with a police expert regarding the substantial issue. After a review, it was noted the attack did<br />
not likely exfiltrate any school data, and staff, student and parent data was not on the system that was<br />
breached. The research into this indicated the attack may have been part of a much larger international<br />
operation.<br />
Data<br />
In particular for this case, Year 11 students submitted their coursework. This coursework was save on<br />
the school’s network. Due to the issue, the coursework in subject was lost. While the description is short,<br />
the devastation is significant. The hope is the student’s had this backed-up somewhere.<br />
Mitigation<br />
The school is working with the particular exam board to resolve the issue. They are also working with the<br />
Dorset Police cyber crime unit. Although there was the demand for funds, no payment was made. This<br />
is generally the policy to take due to the secondary potential issues with just making the payment. The<br />
school had to notify the parents and sent a letter explaining the issue.<br />
Discussion<br />
Targets are generally attacked to compromise their systems to gain access to data for exfiltration or to<br />
extort funds from them. In the early days, these may have been more of an exercise, however, the<br />
attackers have operationalized the model. Ransomware has proven itself to be a completely popular,<br />
viable, and successful attack tool. Over the last four years, this has been very profitable for the attackers.<br />
Lessons Learned<br />
Ransomware is used so often, it is becoming redundant. The frequency is mostly due to the simplicity of<br />
the attack, the financial awards, and this tends to shut down operations until the fee is paid (not advised)<br />
or the issue is remediated through installing back-ups, and a thorough review to ensure nothing was left<br />
behind by the attackers they could use later for re-entry.<br />
There needs to be continued training for the staff. This removed a significant portion of opportunity for an<br />
issue. If the staff know what the usual forms of the attack are, these are less likely to be clicked on, and<br />
fewer systems would be infected. There also needs to be back-ups, which are regularly checked to<br />
ensure they are viable.<br />
19
Resources<br />
Hussain, D. (<strong>2019</strong>, March 14). Secondary school is being held to ransom after a ‘chinese cyber attack’<br />
caused the loss of year 11 student’s GCSE coursework Retrieved from<br />
https://www.dailymail.co.uk/news/article-6808845/Secondary-school-held-ransom-cyber-attack-causedloss-students-GCSE-coursework.html<br />
Sjouwerman, S. (<strong>2019</strong>, March 14). GSCE coursework lost in ransomware attack on UK bridport school.<br />
Retrieved from https://blog.knowbe4.com/gcse-coursework-lost-in-cyber-attack-on-uk-bridport-school<br />
Speck, D. (<strong>2019</strong>, March 15). GCSE coursework lost in ransomware attack. Retrieved from<br />
https://www.tes.com/news/gcse-coursework-lost-ransomware-attack<br />
Wakefield, J. (<strong>2019</strong>, March 13). GCSE coursework lost in cyber attack in bridport school. Retrieved from<br />
https://www.bbc.com/news/uk-england-dorset-47551331<br />
About The Author<br />
Charles Parker, II has been in the computer science/InfoSec industry for over a<br />
decade in working with medical, sales, labor, OEM and Tier 1 manufacturers, and<br />
other industries. Presently, he is a <strong>Cyber</strong>security Lab Engineer at a Tier 1<br />
manufacturer and professor. To further the knowledge base for others in various<br />
roles in other industries, he published in blogs and peer reviewed journals. He<br />
has completed several graduate degrees (MBA, MSA, JD, LLM, and PhD),<br />
completed certificate programs in AI from MIT, other coursework from Harvard,<br />
and researches AI’s application to InfoSec, FinTech, and other areas, and is<br />
highly caffeinated. Charles Parker, II may be reached at<br />
charlesparkerii@protonmail.com.<br />
20
Achieving <strong>Cyber</strong>security Readiness with AI-Powered, Gamified<br />
Training<br />
By Keenan Skelly, Vice President of Global Partnerships and Security Evangelist at Circadence<br />
“THE CYBERSECURITY SKILLS GAP” It is written about so much in the cyber industry that it seems<br />
predetermined, not to mention full of doom and gloom about never-ending, ubiquitous breaches. Yes,<br />
predictors says that there will be 3.5 million unfilled cybersecurity jobs by 2021, which is up from 1 million<br />
openings last year. But that’s not the whole story. It does NOT mean that cyber readiness is unattainable<br />
or that the bad guys have won.<br />
At Circadence, we see that stat as a headlight – providing illumination for rich career opportunity and<br />
stimulation for new approaches to cyber preparedness. There’s unlikely to be a dull moment in a cyber<br />
career as defenders work every day to keep pace with technology advancements and organization digital<br />
transformation, as well as keeping an eagle eye out for how threat actors create new exploitive<br />
circumstances. So, it is continuously critical for cyber warriors to test, train, simulate, emulate and keep<br />
learning. And while we can’t train our way out of the skills gap problem one class or video at a time, we<br />
can use technological advances, in Artificial Intelligence and Machine Learning for example, to automate<br />
and augment the security toolsets, the tasks and processes, and the training platforms. With focus on<br />
the human element that is at the heart of the adversarial relationship, we can redesign the playing field<br />
and hopefully give defenders the home field advantage going forward.<br />
21
Why do we need a new approach to cyber training?<br />
Today’s organizations ARE seeking more cyber staff, but they equally need an inventive and accelerated<br />
training approach that engages cyber professionals to build and retain skills and competencies to keep<br />
positions “filled”. That’s where new advances in artificial intelligence and gamified learning come into play<br />
and create new types of hands-on learning environments. For example, in our Project Ares learning<br />
environment, AI generates adversaries, which require critical thinking and collaborative problem solving<br />
to deter. We put the simulation into a gamified context where badges, scores and friendly competition<br />
motivate progress through learning exercises and cyber challenges.<br />
News headlines remind CISOs and business leaders of the impact of breaches, from financial to<br />
reputational damage and loss of trust. The cybersecurity industry needs a new approach to help adapt<br />
to the speed of cyber threats today through better enablement for incoming and seasoned cyber<br />
professionals. The importance of strengthening organizational security posture often starts with a<br />
company’s digital vanguard defending corporate assets. These team members are juggling a lot of dayto-day<br />
priorities as they proactively protect company assets while trying to stay up-to-date with evolving<br />
risks. The end result of this juggling act is a cyber workforce that is strained, stressed, and often depleted.<br />
In fact, a whopping 93% of respondents to a May <strong>2019</strong> survey agreed they need to keep up with their<br />
skills or their organization will be at risk, yet 66% of respondents in the same study also said it’s hard to<br />
keep up with cybersecurity skills given the demands of their job. The difference between the business<br />
security requirement and the actuality of cyber readiness is indeed a wide gap.<br />
Typically, a professional’s cyber learning journey begins with traditional lecture-style learning, maybe<br />
sitting in a classroom absorbing outdated videos and slideshows, and often at a location that is away<br />
from the office requiring travel budget to attend. However, research shows that when the traditional<br />
classroom approach is paired with a gamified environment that provides hands-on practice in cyber range<br />
environments, student learning retention improves by up to 75%. Add to that research showing that<br />
employees say gamification makes them feel more 89% more productive and 88% happier at work.<br />
Gamified learning can boost motivation and retention, generating upwards of a 60% increase in learner<br />
engagement and 43% enhancement in employee productivity. This applies not only to new cyber<br />
professionals learning basic concepts and skills but also cyber professionals currently in the workforce<br />
looking to mature their cyber skills and learn more advanced cyber tactics. In addition, cyber security<br />
leaders can partner with HR and use gamified platforms to test and assess their current staff to identify<br />
gaps in security knowledge and application, establish improved recruitment goals, and even test new<br />
recruits.<br />
Using AI and gamified training to augment the cyber workforce<br />
Inside a gamified leaning platform, artificial intelligence (AI) is being employed more often to improve the<br />
delivery of education exercises. AI is used to emulate human cognition (e.g. learning based on<br />
experiences and patterns rather than inference) and deep machine learning advancements enable<br />
solutions to ‘teach themselves’ how to build models for pattern recognition. This becomes particularly<br />
22
valuable in cyber skills development where Natural Language Processing (NLP), a sub-category of AI,<br />
can communicate with a human during cyber exercises and aid in their progression through activities. An<br />
example of how NLP works within a gamified learning environment is through cybersecurity learning<br />
platform Project Ares®. The in-game advisor, Athena, uses NLP to communicate with players in a “chatbot”<br />
format providing guidance to players so they can complete cyber asks and meet learning objectives for<br />
certain work roles. Athena generates a response from its learning corpus, using machine learning to<br />
aggregate and correlate all the player conversations it has plus integrating knowledge about how users<br />
progress through exercises. The pattern recognition helps Athena recommend the most efficient path to<br />
solving a problem or scenario. Similar to the “two heads are better than one” motto, but machine learning<br />
needs lots of “heads” (aka: data) to generate the best solution for the problem at hand.<br />
AI is also used to create the adversary in Project Ares missions. These missions are developed from<br />
real-world cyber threats using either a defensive or offensive approach. The player is challenged to solve<br />
problems through critical thinking and actions and as they begin to think like the unauthorized user, their<br />
understanding of defensive behavior also improves. This capability provides greater learning potential<br />
for users who are not only using defensive techniques with AI but also using offensive techniques with<br />
data AI provides. <strong>Cyber</strong> professionals can engage in a learning platform that offers relevant cyber<br />
exercises to build skill and competency with the support of artificial intelligence, NLP and hands-on<br />
machine learning all within a gamified range environment.<br />
A new era of cyber training<br />
For organizations that are stymied by the skills gap and struggle to hire the right skills in cyber<br />
organizations, take a look at the challenge from a different angle. Through the benefits of AI in gamified<br />
training, cyber professionals can learn advanced ways to offensively and defensively protect their<br />
companies, build new skills, and develop problem solving tactics in real-world scenarios. This advanced<br />
method of training takes cyber learning to new heights by improving retention with hands-on learning that<br />
can take place anywhere versus at off-site cyber training courses. With new training options such as<br />
gamified training now available to companies, seasoned and prospective cyber professionals have all<br />
the critical tools needed to prepare themselves for future cyber threats—and companies have the<br />
resources necessary to persistently harden their cyber readiness posture. For more information on<br />
gamified training, visit www.circadence.com.<br />
About Circadence<br />
Circadence Corporation is a market leader in next-generation cybersecurity readiness. Powered by a<br />
culture of innovation and the demands of an evolving cyber landscape, Circadence offers award-winning<br />
cyber range solutions and cybersecurity learning platforms, running on Microsoft Azure, that leverage<br />
artificial intelligence and custom content to address critical security challenges for enterprise, government<br />
and academic institutions. Circadence's solutions deliver persistent, immersive and true-to-life<br />
experiences that match and adapt to contemporary threat environments. For more information,<br />
visit www.circadence.com.<br />
23
Author the Author<br />
Keenan Skelly, Vice President of Global<br />
Partnerships and Security Evangelist at<br />
Circadence<br />
Keenan Skelly has more than 20 years<br />
of experience providing security and management<br />
solutions across a wide array of platforms to<br />
include personnel, physical, and cybersecurity.<br />
She brings over ten years of government service<br />
with a focus on National Security. Skelly served in<br />
the U.S. Army as an Explosive Ordnance Disposal<br />
Technician and went on to work for the<br />
Department of Homeland Security where she<br />
served as Chief for Comprehensive Reviews in the<br />
Office for Infrastructure Protection.<br />
Cites:<br />
• https://www.talentlms.com/blog/gamification-survey-results/<br />
• https://www.pulselearning.com/blog/gamification-infographic/<br />
• https://www.csoonline.com/article/3200024/cybersecurity-labor-crunch-to-hit-35-million-unfilledjobs-by-2021.html<br />
• https://searchsecurity.techtarget.com/news/252463186/Effects-of-cybersecurity-skills-shortage-<br />
worsening-new-study-says?track=NL-<br />
1820&ad=927520&src=927520&asrc=EM_NLN_112933934&utm_medium=EM&utm_source=N<br />
LN&utm_campaign=<strong>2019</strong>0515_Shortage%20of%20cybersecurity%20skills%20puts%20busines<br />
s%20at%20risk<br />
24
Talk About a Disaster<br />
Fema Exposes Disaster Survivor’s Personal Data<br />
By Charles Parker, II; MBA/MSA/JD/LLM/PhD<br />
FEMA’s mission involves assisting citizens as they face natural disasters (hurricanes, wildfires, etc.).<br />
Over the years, FEMA has had its ups and downs, mostly published in the media outlets. These have<br />
mostly involved missteps with the supplies, mobile homes, and various other issues.<br />
When the citizens have been a victim of one of the natural disasters, they have too much on their mind<br />
with family, pets, home, and other assets. Feelings and emotions tend to run high during these times.<br />
The last thing they need to be concerned with is to work through identity theft or who have purchased<br />
their personal information.<br />
Issue<br />
Unfortunately, FEMA inadvertently allowed the unauthorized access to over 2M person’s private and<br />
confidential data. The issue was reported in the March 14, <strong>2019</strong> audit by the Department of Homeland<br />
Security’s Office of Inspector General report.<br />
25
Data<br />
In the case of a disaster when the person applies for assistance from FEMA, the person is required to<br />
use the Transitional Sheltering Assistance Program. This program has assisted persons from the 2017<br />
California wildfire, Hurricanes Howey, Irma, and Maria, and many other disasters. The exposed data was<br />
for the applicants of these natural disasters, numbering 2.3M to 2.5M. This included the home addresses<br />
and banking information (bank name and account number; with the bank’s name securing the routing<br />
number is easy). Of the affected persons, 1.8M had both types of data available to unauthorized parties,<br />
and 725 had only their address involved.<br />
Normally this type of data may not be simply housed in a government database. This, however, was<br />
required from the applicant as this would be used for the payments for the assistance and to record data.<br />
There was a legitimate reason to have this.<br />
Oops<br />
The exposure presented another notable problem for FEMA. As a course of business, FEMA contracts<br />
with third parties for specific functions. Having all of the services that would be needed across the US<br />
within FEMA would be problematic, as the agency is not constantly assisting others. There is not a<br />
hurricane or massive wildfire every month. As part of this contractual agreement, certain information on<br />
the assistance recipients is necessary. FEMA has unintentionally given more information on the affected<br />
persons than what was required to a contractor. In this case, the contractor was involved with providing<br />
temporary housing.<br />
The data shared with the had an additional 20 fields in the database, which should have not been sent,<br />
as this was not germane to their function and scope of work. In the Inspector General report, the<br />
contractor’s name had been redacted. FEMA effectively has the potential to put the affected persons at<br />
risk for identity theft and/ or fraud based on the error for the over 2.3M persons already stressed by the<br />
circumstances. This is also a violation of the Privacy Act of 1974 and the DHS Management Directive<br />
11042.1.<br />
Remediation<br />
The issue is rather notable. Once detected, this has led to changes in how FEMA manages its client’s<br />
personally identifiable information (PII). FEMA was working with the contractor to remove the<br />
unnecessary data from their system. DHS had two recommendations to FEMA for correcting the issue.<br />
First, FEMA implements controls to ensure only the authorized data is sent to the contractor. Second,<br />
FEMA ensures the data previously issued to the contractor is destroyed. Although this resolves one<br />
aspect of the issue, this does not directly or indirectly address the impact on the persons involved. They<br />
are still at risk and would have to pay for any identity monitoring services themselves.<br />
26
Discussion<br />
When you demand and require from a person, especially with no bargaining power or leverage, data in<br />
exchange for services they require to live, you become a steward of the information. You are responsible<br />
for the safekeeping and acting as a reasonably prudent organization with this. The release of the data or<br />
unauthorized access has detrimental short- and long-term effects for the affected parties.<br />
For an epic error of this magnitude to still be occurring is not acceptable at any level. The persons have<br />
to deal with having their lives uprooted with their respective natural disasters. In addition to this, the 2.3-<br />
2.5M persons now also have to deal with watching for their funds to evaporate into the ether, or possible<br />
identity theft if the purchaser is a crafty social engineer. This could, of course, been much worse for the<br />
affected parties. The issue brings up two points. What would make FEMA staff members think a<br />
contractor focused on providing the temporary housing would need with the affected person’s banking<br />
information? Also, once they received the additional unauthorized data, why didn’t they notify FEMA?<br />
When the file was downloaded, seemingly the contractor’s staff would wonder why that was present.<br />
Resources<br />
Achenbach, J., Wan, W., & Romm, T. (<strong>2019</strong>, March 22). FEMA ‘major privacy-incident’ reveals data from<br />
2.5 million disaster survivors. Retrieved from https://www.washingtonpost.com/national/healthscience/fema-data-breach-hits-25-million-disaster-survivors/<strong>2019</strong>/03/22/<br />
and<br />
https://www.chicagotribune.com/news/nationworld/ct-fema-privacy-data-breach-<strong>2019</strong>0322-story.html<br />
Associated Press. (<strong>2019</strong>, March 22). FEMA wrongfully released personal data of 2.3 million disaster<br />
victims: Watchdog. Retrieved from https://cnbc.com/<strong>2019</strong>/03/22/fema-exposed-personal-data-of-<br />
2point3-million-disaster-victims-watchdog.html<br />
Brufke, J. (<strong>2019</strong>, March 22). FEMA exposed personal information of 2.3 million disaster survivors.<br />
Retrieved from https://thehill.com/policy/cybersecurity/435386-fema-exposed-personal-information-of-<br />
23-million-disaster-survivors<br />
Kelly, J.V. (<strong>2019</strong>, March 15). Management alert-FEMA did not safeguard disaster survivor’s sensitive<br />
personally identifiable information (REDACTED). Retrieved from<br />
https://www.oig.dhs.gov/sites/default/files/assets/<strong>2019</strong>-03/OIG-19-32-Mar19.pdf<br />
Keck, C. (<strong>2019</strong>, March). FEMA breach exposes personal data and banking information of 2.3 million<br />
disaster survivors. Retrieved from https://gizmodo.com/fema-breach-exposes-personal-data-andbanking-informati-183350871<br />
Linton, C. (<strong>2019</strong>, March 22). FEMA exposed personal information of 2.3 million disaster victims. Retrieved<br />
from https://www.cbsnews.com/news/fema-data-breach-exposed-personal-information-of-2-3-milliondisaster-victims/<br />
27
Lyngaas, S. (<strong>2019</strong>, March 22). FEMA exposed personal data on 2.3 million disaster survivors, violated<br />
privacy law, IG finds. Retrieved from https://www.cyberscooop.com/fema-exposed-personal0data-2-3-<br />
million-disaster-survivors-violated-privacy-law-ig-finds/<br />
Matt, N. (<strong>2019</strong>, March 23). FEMA privacy disaster reveals information of 2.5 million americans. Retrieved<br />
from<br />
https://www.tomshardware.com/news/fema-reveals-information-2-5-million-disastersurvivors.38903.html<br />
Sukin, G. (<strong>2019</strong>, March 22). FEMA exposes personal, banking details of 2.5 million disaster survivors.<br />
Retrieved from https://www.axos.com/fema-data-breach-leaks-personal-banking-information-25-milliondisaster-survivors-33912b1c-03b6-458f-a5cd-d791fb2bdb2.html<br />
About the Author<br />
Charles Parker, II has been in the computer science/InfoSec industry for over<br />
a decade in working with medical, sales, labor, OEM and Tier 1<br />
manufacturers, and other industries. Presently, he is a <strong>Cyber</strong>security Lab<br />
Engineer at a Tier 1 manufacturer and professor. To further the knowledge<br />
base for others in various roles in other industries, he published in blogs and<br />
peer reviewed journals. He has completed several graduate degrees (MBA,<br />
MSA, JD, LLM, and PhD), completed certificate programs in AI from MIT,<br />
other coursework from Harvard, and researches AI’s application to InfoSec,<br />
FinTech, and other areas, and is highly caffeinated. Charles Parker, II may<br />
be reached at charlesparkerii@protonmail.com.<br />
28
3 Must-Do Tasks to Make Vulnerability Management Useful in<br />
Today’s Environments<br />
By Jim Souders, Chief Executive Officer, Adaptiva<br />
I recently heard an executive describe how his team essentially threw its vulnerability report in the trash<br />
every time they received one. This seemed a bit extreme, but he informed a group of conference<br />
attendees that it wasn’t because the vulnerability reports didn’t contain important information—it was<br />
because they have become so overwhelming.<br />
Vulnerability management vendors today are routinely scanning for more than 100,000 vulnerabilities.<br />
Imagine the strain that places on an organization if even only a fraction of these vulnerabilities are found<br />
within their network. Then consider the feeling associated with the knowledge that there is no possible<br />
way to address them all in an effective time frame that will ensure that you are not at risk.<br />
The excessive number of vulnerabilities only will continue to increase, opening up space for<br />
cyberattackers to take advantage. Because of this, vulnerability management was listed as one of the<br />
top projects for organizations to get a handle on at Gartner’s <strong>2019</strong> Security and Risk Summit. The<br />
problem is IT teams don’t know where to start. Vendors need to step up to help them.<br />
Here are three things that must be done across the board in the vulnerability management space to assist<br />
teams in getting the basics covered.<br />
29
Give the User Control<br />
With millions of vulnerabilities being presented to IT administrators and security operations, there needs<br />
to be effective and easy ways to quickly read and interpret the data. If vulnerability management software<br />
spits out a bunch of data without providing different ways to sort and highlight it, it becomes incredibly<br />
difficult for IT to work with or act on. Yet, this is how vulnerability management has been conducted for<br />
years—to the point where it is now considered simply voluminous and unactionable.<br />
To elevate vulnerability management and allow it to have a positive impact, reporting mechanisms need<br />
to provide the IT and SecOps users with more control over how they want to consume and evaluate<br />
vulnerability data. Every company has different priorities that define where they want to focus energy and<br />
resources. As such, they require tools that let them customize the analysis and resulting reports to meet<br />
their needs. Evolving the user interface to accommodate the user is the first step to making a vulnerability<br />
report meaningful and actionable to IT operations.<br />
Determine What Matters and Why<br />
Out of all of the thousands of vulnerabilities found, then which ones do teams address? Which ones are<br />
open? There needs to be a simple way to determine very quickly what requires attention and in what<br />
priority. To help IT operations teams get to the starting line, vulnerability management tools must do more<br />
to assess the risk specific vulnerabilities pose.<br />
Most of the vulnerabilities exploited last year were not considered high-severity vulnerabilities. This is<br />
largely because cyberattackers have learned that companies are conditioned to fix the critical or highrank<br />
vulnerabilities first; therefore, they go after medium level threats to gain entry. Because these issues<br />
have traditionally been considered lower priority, chances are good that understaffed and overworked<br />
teams have yet to address many of these vulnerabilities. Bad actors can then infiltrate systems and wreak<br />
havoc because of an issue that likely could have been fixed relatively easily. As this practice becomes<br />
more common, it is evident that a CVSS score alone is not enough. For vulnerability management to be<br />
effective, vendors need to come up with intelligent ways not only to rank severity and impact but also the<br />
likelihood that a particular vulnerability will be exploited.<br />
Execute a Rapid Response<br />
Once software fetches vulnerability data, teams filter it according to their needs and assess and prioritize<br />
which vulnerabilities to attack first—there has to be a mechanism for immediate action. Modern solutions<br />
should provide simple ways for staff to respond quickly to what they see and learn. Organizations that<br />
are left to their own devices to develop and execute fixes through manual processes or custom scripts<br />
are at a distinct disadvantage. IT and SecOps are often unable to work together in a rapid, cohesive, and<br />
collaborative process to deploy a patch enterprise-wide. SecOps teams are frequently overwhelmed with<br />
their own issues. As a result, system updates and patches can take a long time to execute, contributing<br />
to the backlog and extending the window a company is susceptible to attack.<br />
30
Intelligent automated solutions are being developed to take this burden off of teams so that vulnerabilities<br />
can be identified, assessed, and addressed near instantaneously. Platforms that integrate these solutions<br />
with endpoint management tools, software distribution tools, or patching tools enable their users to<br />
immediately send out system updates, patches, or configuration changes. By doing so, this increases<br />
the value of the fetch and reporting capabilities. It essentially creates a command station for managing<br />
vulnerabilities, which is the ideal that everyone is trying to reach.<br />
If all of these features can be incorporated into a single pane of glass that the IT and SecOps user goes<br />
to everyday, it would be an incredibly powerful tool for reducing threats. This may sound basic, but it has<br />
been very difficult to do. As the industry moves closer, however, and a new emphasis is placed on<br />
vulnerability management, teams will soon get the relief they are searching for while fortifying their<br />
defenses against cyberattacks.<br />
As first published in BetaNews.<br />
About the Author<br />
Jim Souders is CEO of Adaptiva, a leading, global provider of endpoint<br />
management and security solutions for enterprise customers. A global<br />
business executive with more than 20 years’ experience, Jim excels at<br />
leading teams in creating differentiated software solutions, penetrating<br />
markets, achieving revenue goals, and P/L management. Prior to<br />
Adaptiva, Jim led high-growth organizations from start up to public offering<br />
and acquisition in a variety of advanced technologies, including IT<br />
infrastructure management, cross-platform mobile application<br />
development, WAN/LAN optimization, and wireless supply chain<br />
automation systems. For more information, please visit<br />
https://adaptiva.com/, and follow the company on LinkedIn, Facebook, and Twitter.<br />
31
The Intersection of Artificial Intelligence and <strong>Cyber</strong>security<br />
By John Harrison, Director, <strong>Cyber</strong>security Center of Excellence, Criterion Systems<br />
It is easy to be skeptical about Artificial Intelligence (AI). It has been promised (threatened?) for years,<br />
and while it is already showing up in our everyday lives – essentially through companies like Amazon<br />
and Facebook that use it to customize user experience and make doing things on their platforms more<br />
convenient – it has also been hijacked as a marketing buzz word, and frequently misused. However, as<br />
a cybersecurity professional, I believe it will help solve some of our greatest challenges, today and into<br />
the future.<br />
Given the confusion surrounding AI, I think it would be prudent to quickly define what it is. AI is a general<br />
practice and concept, including capabilities such as natural language processing, image recognition of<br />
objects, and pattern recognition through neural network models attempting to mimic cognitive functions<br />
of the brain. The term Machine Learning (ML) is frequently used interchangeably with AI, although there<br />
are distinct differences. ML algorithms use machines to learn about given data. A subset of ML includes<br />
deep learning, which has shown a lot of promise in the cybersecurity realm. Major differences of ML<br />
compared to AI include:<br />
• ML aims to increase accuracy described by confidence intervals whereas AI aims to achieve a<br />
successful goal and is less focused on accuracy.<br />
• ML learns from data obtained based on tasks and actions whereas AI uses computer programs<br />
to make decisions or apply logic, possibly using ML outputs as inputs to an AI program.<br />
32
• ML focuses on acquiring knowledge or skills by learning from many observations over time and<br />
optimizing its own model to improve accuracy whereas AI’s goal is to mimic a human response<br />
and decision-making process.<br />
Which brings me to the question: What are we cybersecurity professionals and organizations looking to<br />
get out of AI and ML? That question is predicated on what you are attempting to accomplish.<br />
Augmentation/Automation of <strong>Cyber</strong>security Processes<br />
To date, the most successful use of AI and ML in cybersecurity has been to help detect malware. By<br />
supplying machines with samples of good and bad pieces of executable code, they have been able to<br />
help identify what are normal and abnormal operations. This is how many of the next generation antivirus<br />
tools work: they are constantly learning and building unique graphs of how applications interact with<br />
systems, how users interact with applications, and how applications and users interact with data and<br />
other users and computers on the network.<br />
What we need now is for a system to learn to enable augmentation and/or automation of a variety<br />
cybersecurity processes to achieve a better outcome, such as saving time and money by using algorithms<br />
and models to perform a great deal of the initial trigate activities that analysts have to do manually today.<br />
Additionally, many low and informational alerts in Security Operations Centers (SOCs) currently go<br />
unattended due to a shortage of time and personnel. Using AI and ML to apply initial triage to see if any<br />
of the alerts are possibly related to one another represent low-hanging fruit and a great step forward.<br />
Consider this: Many attackers today are attempting to evade our defensive systems and if they can exploit<br />
networks and systems by staying under the radar by generating thousands of low-level alerts its less<br />
likely they will get caught and the organization might not even know they were compromised. As with the<br />
example of malware above, the first use that comes to mind for most of us is enhancing our detection<br />
and prevention abilities. But have you considered using AI and ML to augment response actions such as<br />
containment actions, ticket creation, and user engagement to triage and/or validate a suspicious action?<br />
Many of these activities are in the realm of possibilities today for the application of AI and ML, and offer<br />
true benefits, such as improving Service Level Agreements, reducing the time spent on each alert, and<br />
improving the Meant Time To Recovery (MTTR).<br />
Though AI and ML remains in the early stages of adoption and expansion, there are many business<br />
challenges and use cases that the cybersecurity community is eager to deploy in the very near future to<br />
address the challenges Security Operation Centers (SOCs) are facing today, including a massive digital<br />
transformation and the never-ending alerts coming in for triage.<br />
Implications of a Continuous Exponential Growth in Data<br />
According to the International Data Corporation, data will grow by 61% to 175 zettabytes (ZBs) by 2025,<br />
which is equivalent to the data stored on 250 billion DVDs, according to University of California –<br />
Berkeley. The majority of this data will reside in cloud and data center environments. Other interesting<br />
33
insights from the same reports includes the fact that 90ZBs will be created on Internet of Things (IoT)<br />
devices, nearly 30% of all data will be consumed in real-time, and almost half (49%) of data will be stored<br />
in public clouds – all by 2025. Furthermore, the increase in data, especially real-time data, is correlating<br />
to the number of devices that are connected to private and public networks, which does not show<br />
indications of slowing down anytime soon. Next-generation cyber warriors will be dealing with volumes<br />
of data never seen before occurring in real time making it difficult to spot, assess, and act on future cyber<br />
attackers. Attackers will likely attempt to disguise and blend into the noise using AI and ML techniques<br />
to mask their malicious intent. The challenge for cybersecurity professionals and organizations is how to<br />
harness automation and build next-generation SOCs using AI and ML, which will be crucial for keeping<br />
up with the volume and velocity of cyber-related data, created by more users and more machines.<br />
The Alerting Nightmare Many SOCs Face<br />
Millions of daily alerts: This is a normal day as a SOC manager, and it raises several challenges:<br />
• Eliminating false positives to focus effort on prioritizing “real” alerts based on severity and<br />
probability.<br />
• Reviewing all alerts may be impossible.<br />
• Many SOCs will avoid some alerts because they are considered low-level or have fired off too<br />
many false positives. Remember, however, 10-15 low-level alerts that, when combined and based<br />
on the sequence or the nature of those alerts, could equal a high alert translating into a full<br />
compromise.<br />
• It is common for many SOCs to fall into the alert fatigue trap and not consider how adversaries<br />
operate. Just as military operatives, they always attempt to fly below the radar. Therefore, they<br />
focus on exploiting weaknesses to which that they feel SOCs are less likely to be giving careful<br />
attention.<br />
What are some of the solutions to these challenges? Writing correlation/behavioral rules can help, but<br />
this has its own limitations and they can be easy to evade if not written correctly. Writing behavioral rules<br />
is also complex and requires unique skills – which are in great shortage within the cyber community right<br />
now. A better approach is to save profiles for users, workstations, servers, networking devices, etc., and<br />
use ML to generate anomalies and determine behavioral patterns in the form of classifications. This<br />
approach is better because it more easily scales and can solve two major problems: The cybersecurity<br />
talent shortage and attacks that attempt to evade detection systems by hiding in the noise as we<br />
previously explained above.<br />
Using AI and ML together, anomalies can be generated that are then passed through a series of AI<br />
models to determine their probability and severity as well as to determine if any specific example crosses<br />
a threshold which should trigger an event/alarm. For example, an anomaly is triggered off a user<br />
behavioral pattern that has drifted from its normal operation. It is then analyzed by machines to determine<br />
if that anomaly occurred before, at what frequency, and if it can be predicted with a reasonable level of<br />
probability that the event is actually abnormal. If so, it may be passed to an AI-bot that triggers an alert<br />
to the user text or an alternative email address to ask if the action was prompted by them or not. If not,<br />
then an alarm is triggered by the AI intrusion system and the incident response process begins. This is<br />
34
just one of many examples of how AI and ML can help with alert fatigue and scaling limited talented<br />
resources while also having the ability to respond in seconds versus minutes and hours.<br />
How Organizations Should Start Using AI and ML for <strong>Cyber</strong>security<br />
First, organizations should define what they want to teach a system to help augment and/or automate<br />
response actions. In my opinion, I think AI and ML is at a point where it can be of more help in augmenting<br />
than it can in automating. (The day where machines will be able to fully think like humans may come, but<br />
operationally, that is many years away.) Having worked in several SOCs and managed my own Managed<br />
Security Service Provider, I have seen analysts and incident responders performing repeated tasks day<br />
in and day out that could be augmented by AI. The AI-bot example provided above is one way this could<br />
work. In another example, Thomas Caldwell from Webroot provided a great demo of his AI bot using<br />
Amazon’s Alexa device at an RSA Conference session named the “Evolution of AI Bots for Real-time<br />
Adaptive Security.”<br />
Here’s one note of caution: Using AI/ML for response actions is complicated. It requires the right skills<br />
and data to be analyzed in order to create the feature sets that are viable candidates for AI and ML<br />
modeling and are specific for how your organization operates. If a vendor offers you a solution that allows<br />
you to run ML algorithms from your data and calls that AI or behavioral detection, turn and run as fast as<br />
you can! The great news is that today, a good portion of data created by machines and users are using<br />
standardized formatting and language, making it easier for the cyber community to share and build off of<br />
others’ AI and ML feature data sets. Keep in mind, however, that just as defenders are using AI and ML,<br />
adversaries are as well. To get started I recommend following some best practices that include, but are<br />
not limited to:<br />
1. Spend the time to create well-defined outcomes and measurable targets for challenges you<br />
need to solve in security. What tasks/problems do you want a machine to learn and what tolerance<br />
do you have for false positives?<br />
2. Consider if more simplified tools could achieve a more efficient and effective outcome than an<br />
AI and ML model. For example, running models to determine behaviors of where applications are<br />
executed from can help detect abnormal operations. However, it might be easier to standardize<br />
and baseline where all applications are allowed to run from and trigger an alert if one executes<br />
from a different file path outside of the baseline. Application whitelisting is an easier solution to<br />
this problem as well.<br />
3. Brainstorm and pair data scientists with cybersecurity expertise to create features derived from<br />
your existing cybersecurity data to solve a relevant problem/outcome. The data that is being<br />
generated on the network is not necessarily what gets fed into the model. For instance, financial<br />
traders using algorithms to hedge stock portfolios tend to use ratios as an input set of data that is<br />
computed based lower level data sets such as fluctuations of price, volume of trades, etc.<br />
4. Experiment with various combinations of features, algorithms, and classifiers to find the best fit<br />
model for the desired outcome and achieving the measurable target you had established<br />
beforehand. If the model doesn’t predict an event at the same rate or better than a human, what<br />
value does the model provide? Trial and error is the best approach and interestingly, machines<br />
35
can learn from these trial experiments as well to help automate the selection of features, though<br />
that is still a bit early in its maturity.<br />
I’m excited, just as many cybersecurity professionals are, at how far AI and ML has come and where the<br />
capability is heading. It’s a great way to augment operations today, allowing resources to be diverted to<br />
solving greater challenges and helping mature SOCs around the world. AI and ML will not likely solve all<br />
of our problems in the near future, but if it could help solve even one or two major challenges, I think<br />
many SOC managers and leaders would find that immensely valuable in the important mission of<br />
protecting critical assets from all types of malicious cyber actors.<br />
About the Author<br />
John Harrison is the Director of Criterion Systems’ <strong>Cyber</strong>security<br />
Center of Excellence. With more than 15 years of experience in the<br />
security industry, he helps design cybersecurity programs to protect<br />
government customers. He is a combat service-disabled veteran who<br />
served eight years in the US Marine Corps as an intelligence operator<br />
and foreign military combat trainer. Following his military career, he<br />
spent several years in the Intelligence Community. He has a bachelor’s<br />
degree in criminal law, an MBA from Georgetown, and is a certified<br />
ethical hacker and incident handler from EC-Council and SANS GIAC,<br />
respectively.<br />
36
From Guards to Detectives: Evolving the Junior Security<br />
Analyst Role<br />
By Mike Armistead, CEO and Co-Founder, Respond Software<br />
Across all industries, we’re coming to accept and, in some cases, look forward to augmenting human<br />
roles with the support of intelligent automation. There is a growing shift from fear of change, to welcoming<br />
it with open arms.<br />
Garry Kasparov, one of the greatest chess players of all time who expressed skepticism when a computer<br />
beat him, is a perfect example of how perceptions of Artificially Intelligence (A.I.) are changing. In a recent<br />
interview, he admitted he changed his view after witnessing some of the world’s greatest game players<br />
lose to machines, including when Google’s AlphaGo defeated the world’s best player of Go, a complex<br />
ancient strategy game.<br />
37
An interesting takeaway for these so-called “defeated” human champions? By playing the computer, they<br />
all learned new methods and strategies that were unexplored before. Today, Kasparov says, “A.I. will<br />
help us to release human creativity. Humans won’t be redundant or replaced, they’ll be promoted.”<br />
That is exactly what the cyber security industry needs to achieve for Junior Security Analysts by arming<br />
them with intelligent automation. In doing so, we can help to accelerate the career progression of a<br />
security analyst starting from their first day through to the day they retire.<br />
Attracting AND Retaining New Security Talent<br />
The security industry is laser-focused on closing the skills gap; however, we continue to allow emerging<br />
professionals to experience disillusionment in the earliest (arguably, most critical) stages of their careers.<br />
Not only is the industry struggling to attract new talent, many promising junior employees are leaving the<br />
field of cybersecurity entirely. They’re doing so out of frustration, stress, or boredom with the monotony<br />
of the tasks assigned to them.<br />
In a recent study by the Cyentia Institute, 45 percent of surveyed security analysts said the reality in the<br />
Security Operations Center (SOC) does not meet expectations. One in four expressed dissatisfaction<br />
with their current job.<br />
This is especially true of entry-level analysts, whose analysis duties typically consist primarily of<br />
monitoring raw alerts, looking for ways to enrich them with additional contextual information and—if they<br />
are lucky to be given additional responsibility—deciding which events to escalate. Despite knowing the<br />
vast majority of alerts are false positives, they worry they will miss that “needle in the haystack” event<br />
linked to a real attack and it will cost them their career.<br />
Reducing attrition and recruiting the best and the brightest into the cybersecurity field will require<br />
collaboration across organizations and the industry as a whole.<br />
Security Automation = Analyst Elevation<br />
Humans alone simply don’t have the capacity to keep pace with today’s volume of data and threats.<br />
Trying to keep pace can both discourage and exhaust budding security analysts early on in their<br />
cybersecurity careers.<br />
For any security analyst, detecting intrusions is rewarding and makes them feel like they’re making a real<br />
difference. With the continued emergence of security automation, Junior Security Analysts experience<br />
more success on a day-to-day basis. Intelligent automation has the potential to shift the way Junior<br />
Security Analysts work significantly by:<br />
• Refocusing from the mundane to the imaginative: Security analysts would rather act like<br />
detectives than mall cops, spending their time hunting threats and gathering intelligence than<br />
following routines or performing rote functions. Automated security workflow solutions, such as<br />
SOAR and SIEM) can take on many mundane aspects of the job, enabling human security<br />
38
analysts to focus on its more interesting, complex, and “advanced” aspects—spending more time<br />
on higher value tasks that are more varied and exciting.<br />
• Sifting through fewer false positives: Intelligent security automation tools such as the emerging<br />
Robotic Decision Automation (RDA) solutions can better categorize and decrease false positives.<br />
Not only does this reduce the level of frustration amongst security analysts but it provides them<br />
with more contextual information to determine what’s really going on in the environment.<br />
• Capturing the full security story: Security analysis software can give frontline analysts a fuller<br />
view of what’s going on across the whole IT environment. It enables them to see each alert—not<br />
as a discrete event—or a piece of data streaming across a console—but instead as part of the<br />
story that’s taking place. Armed with greater context, analysts can make better decisions, faster<br />
that put them on the right path to resolving threats before they spread.<br />
With the support of intelligent solutions, we can elevate frontline security analysts into more advanced<br />
roles—enabling them to focus on threat hunting and endeavors that need their invaluable and<br />
unparalleled human ingenuity.<br />
A Promise to Budding Security Pros<br />
We’ve attracted young professionals into the cybersecurity field by promising them the job of a seasoned<br />
detective, and yet, many of them end up serving as the equivalent of a security guard—relegated to<br />
watching hundreds of alerts scroll by to ensure they don’t miss something.<br />
With Ponemon Institute estimating the average organization deals with over 200,000 security events<br />
each day, we’re putting early career analysts in front of nation-states and criminal syndicates and setting<br />
them up to fail.<br />
Security analysts at all levels need more support to succeed and enjoy their work as this widespread job<br />
dissatisfaction has the potential to deepen the skills gap. Intelligent, automated security software can<br />
empower Junior Security Analysts to be more successful and enable the industry to deliver on the<br />
promise of a stimulating and rewarding career in cybersecurity.<br />
39
About the Author<br />
Mike Armistead is the co-founder and CEO at Respond<br />
Software. He is an industry veteran with three decades of<br />
leadership experience in the security, application development<br />
and consumer internet arenas. Mike co-founded Fortify<br />
Software in 2003 and acted as VP & general manager for both<br />
Fortify and ArcSight business groups after the companies were<br />
acquired by HP in 2011. Prior to Fortify, he held executive and<br />
key product positions at companies that include Pure Atria (IBM<br />
Rational) and Lycos. Over his career, Mike has led groups in all<br />
aspects of the organization, including marketing, development,<br />
operations and sales. His experience has spanned from<br />
managing large enterprises (+$350M revenues) to multiple<br />
start-ups in numerous industries.Mike Armistead can be<br />
reached online at mike@respond-software.com and at our<br />
company website http://www.respond-software.com<br />
40
Where Property Insurance Ends and <strong>Cyber</strong> Insurance Begins—<br />
the Industry’s Biggest Issue More People Should Be Talking<br />
About<br />
By Matt Prevost, Senior Vice President, <strong>Cyber</strong> Product Manager at Chubb<br />
<strong>Cyber</strong>-attacks are expected to cost companies more than $2 trillion in <strong>2019</strong>, according to Juniper<br />
Research. Consequently, many companies—especially the larger ones—have already realized that<br />
cyber threats top the list of corporate risks and have incorporated cyber provisions into their existing<br />
insurance policies.<br />
However, as recent media coverage—and high-profile lawsuits—have proven, the increasingly complex<br />
and ever-evolving nature of cyber threats has led to misunderstandings in the marketplace, which are<br />
particularly prevalent when it comes to the lines of distinction between the provisions of traditional<br />
property insurance policies versus those of cyber insurance policies. While this distinction may sound<br />
simple, it’s not, and the nuance could impact billions of dollars in losses in the event of a large cyberattack.<br />
Physical vs Digital <strong>Cyber</strong> Threats<br />
To better contextualize these situations, it is first important to understand that as cyber attacks have<br />
grown, evolved, and changed, and today’s cyber threats are blurring the lines between the strictly ‘digital’<br />
attacks and the ‘physical’ impacts of an event.<br />
41
As an illustration, consider the following scenario: the elevator control panel in a high-rise commercial<br />
building is hacked, causing the elevator to malfunction and fall 30 stories. While this is a cyber-attack that<br />
results in damage to physical property, several different insurance policies could respond to the<br />
consequences of the attack.<br />
For example, typical general liability policies would respond to claims for bodily injury made by individuals<br />
who were hurt as the result of the elevator collision, against potentially responsible parties. Similarly,<br />
typical property policies would respond to the direct physical damage and resulting business interruption<br />
loss because the cyber-attack caused the elevator to collide with other property, and elevator collision is<br />
normally a covered caused of loss. Conversely, if outcomes from the hack did not result in direct physical<br />
loss or damage or bodily injury, but rather rendered the elevator unusable, then the result would be limited<br />
to a business interruption (BI) loss. In this scenario, most property policies would not respond to the BI<br />
loss because there was no direct physical loss or damage. However, a cyber policy would generally<br />
respond to this type of digital disruption loss.<br />
Put simply, a variety of different insurance policies could respond to the consequences of a cyber event<br />
depending on the circumstances. As a result, now more than ever, it is important to work with an<br />
insurance carrier, along with an agent or broker, to find enterprise-wide insurance solutions that fit your<br />
business’ specific needs and entire risk profile.<br />
What to Look for In the <strong>Cyber</strong> Insurance Process<br />
As cyber events have changed over time, so too have the associated risks. While cyber-specific policies<br />
are key to protecting against cyber risks, a comprehensive analysis of the entire scope of a company’s<br />
risks is critical to preparing for all potential exposures.<br />
When exploring your options, executives should focus on two key characteristics—the first being a<br />
diligent underwriting process and an agent or broker willing to engage fully in the entirety of the insurance<br />
portfolio. This process should contemplate complex situations and focus on obtaining a portfolio of<br />
insurance solutions comprised of multiple insurance policies that seamlessly address your company’s<br />
exposures enterprise-wide. Secondly, this portfolio of solutions should include access to inclusive risk<br />
mitigation tools, such as integrated loss control services, continuous threat analysis, comprehensive<br />
claims management, and post-breach services.<br />
While most traditional cyber insurance policies offer robust standalone insurance protection, some<br />
insurers have created additional umbrella policies—that use the above characteristics to go beyond<br />
standard risk transfer by incorporating a holistic risk management solution into a single policy purchase,<br />
and thereby closing unanticipated gaps in the scope of your insurance protection. Although it is important<br />
for companies to find a robust standalone cyber policy, it is equally critical for executives to work with<br />
producers and insurers to find additional umbrella provisions that provide critical additional limits for large<br />
unforeseen events and contemplate the broad array of cyber exposures affecting companies.<br />
The Importance of Education & Communication<br />
Now more than ever, it is important to find an insurance policy that offers your business protection against<br />
the dynamic and ever evolving risks of cyber-attacks and resulting loss. In order to do so, it is important<br />
42
to have in-depth conversations with your insurance agent, broker, and/or risk manager about the<br />
protections and policies that will work best for your business.<br />
Every business and insurance policy is different, but by working with an experienced carrier to evaluate<br />
your company’s complete risk profile, you can better ensure your business will be prepared and protected<br />
in the event of a loss. As the number of cyber incidents continues to rise—The Chubb<strong>Cyber</strong> Index SM of<br />
proprietary claims data shows that cyber claims have increased 67% since 2016—this threat is more<br />
imminent than ever.<br />
About the Author<br />
Matt Prevost is <strong>Cyber</strong> Product Manager at Chubb. He can be reached at:<br />
matt.prevost@chubb.com. Our company website is www.chubb.com<br />
43
How to Build an Effective Insider Threat Program: Part I<br />
By Shareth Ben, Insider Threat SME at Securonix<br />
On the heels of insider threat awareness month, it’s clear that although we are more aware of the attacks<br />
and threats from within an organization, we still have a long way to go. This first article in a two-part series<br />
provides practical tips on what and who to consider when building a program to combat insider threats.<br />
It has been six years since the Snowden incident took place, sending a wakeup call to large enterprises<br />
that they needed to start looking internally for risks posed by employees and contractors. Two years later<br />
Galen Marsh, who was a financial advisor at a prominent Wall Street bank, damaged the bank’s<br />
reputation by stealing sensitive client data from corporate systems and uploading it to a personal server<br />
hosted at his home. While these high-profile cases caught the attention of security professionals, there<br />
are many insider-caused incidents happening every day that put organizations at financial and<br />
reputational risk.<br />
Guarding the perimeter of an organization’s network alone is not enough. The adoption of the cloud for<br />
infrastructure, middleware, and applications is growing at a phenomenal pace. The benefits of moving to<br />
the cloud are obvious, but along with that comes an increased need for security. The enterprise perimeter<br />
is becoming more porous as the applications that drive business rest outside the secure perimeter of the<br />
enterprise, requiring that the enterprise network be open to external networks while still being secure.<br />
44
There is no doubt that insider threat risks continue to matter, and organizations need to take detective<br />
and preventive measures before it’s too late.<br />
Multiple surveys indicate that insider threats are a key source of concern for enterprises. According to<br />
<strong>Cyber</strong>security Insiders’ 2018 Insider Threat Report, 90 percent of organizations feel vulnerable to insider<br />
threats – with 53 percent confirming insider attacks against their organization.<br />
According to the Verizon <strong>2019</strong> Data Breach Investigations Report, 34 percent of breaches involved<br />
internal actors, and 29 percent involved the use of stolen credentials.<br />
What do these numbers mean?<br />
The bottom line is that these numbers can have an impact on your business which can be benign or<br />
severe depending on the outcomes caused by the insider’s actions. The Verizon report cited above also<br />
notes that 25 percent of breaches were motivated by the gain of strategic advantage (espionage). For<br />
example, if a research scientist at a pharmaceutical company sells the formula for a new drug to the<br />
competition, that pharmaceutical company can incur millions in revenue loss due to low-cost competition.<br />
This type of corporate espionage has happened in the past. In less severe cases employees or<br />
contractors have attempted to take proprietary data, which resulted in termination of employment or a<br />
harsh warning.<br />
The key takeaway is for organizations to decide how much effort they are willing to invest in terms of<br />
cost, resources and time depending on their industry vertical, nature of the business and risk exposure.<br />
How to build an effective insider threat program.<br />
Most medium and large organizations have limited insider monitoring in place using data loss prevention<br />
(DLP) or privileged access management (PAM) system solutions. However, they still struggle to<br />
effectively mitigate insider threat risks. This is because, as much as it may sound cliché, security cannot<br />
be solved using technology alone. It is a combination of people, process, and the nature of your business.<br />
We say the nature of your business here because what you do as a company determines what matters<br />
to you the most, and therefore what you want to protect.<br />
The key is to find synergies between people, process, and technology which are suitable for your<br />
organization, based on various factors such as organization size, culture, and most importantly risk<br />
appetite.<br />
Risk appetite can be defined as how much risk exposure an organization is willing to tolerate when it<br />
comes to insider threats. Most insider threat programs fail because the organization’s risk appetite is not<br />
clearly defined at the beginning. This lack of clarity creates a lack of focus during operations, preventing<br />
the program from seeing success in the investments made across people, process, and technology.<br />
45
Where to begin?<br />
The first step is to assess your organization’s appetite for risk and what the organization values the most.<br />
For example, some organizations value their brand reputation the most while others worry more about<br />
theft of intellectual property.<br />
The next step is to build a strong understanding and consensus across the key business units such as<br />
HR, legal, compliance, and key business units. This is essential for an effective program outcome. In<br />
order to accomplish this consensus, organizations should form an Insider Threat Working Group (ITWG).<br />
The ITWG’s mission is to educate the business units on the importance of protecting the organization<br />
from such threats.<br />
Lastly, the ITWG forms a partnership with key stakeholders to define policies and procedures. Laying<br />
down this foundation will pave the way for the future of the program.<br />
What type of risks to mitigate?<br />
According to the Carnegie Mellon CERT model the three types of insider risks that are caused due to<br />
insider threats are: confidential data leakage, IT sabotage, and fraud.<br />
Most organizations who have embarked on the insider threat monitoring journey focus on data leakage<br />
prevention and IT sabotage related monitoring as they can cause the most harm. The former is more<br />
common than the latter, but both can create havoc for organizations if not managed properly.<br />
The three primary types of insider risks can be mitigated as follows:<br />
46
IT sabotage<br />
• Monitor high privilege access to critical databases, servers, and applications that affect the<br />
integrity of the systems.<br />
• Server monitoring should include Windows security events, Windows authentication events, Unix<br />
auditd logs, <strong>Cyber</strong>ark logs, and others.<br />
• Database monitoring should include Guardium logs or similar for database activity monitoring.<br />
• Application monitoring should include business applications and third-party applications.<br />
Confidential data leakage<br />
• Monitor for the exfiltration of data by employees and contractors that leads to confidentiality issues<br />
and intellectual property theft.<br />
• Monitor egress vectors such as email, removable media, print, web uploads, CD, and DVD.<br />
• Leverage technologies such as DLP tools to monitor email gateway logs, print logs, SharePoint<br />
logs, and others.<br />
Fraud<br />
• Monitor for fraudulent activities that result in financial loss to an organization.<br />
• Categories of fraud include online banking fraud, expenses fraud, AP fraud, AML fraud, trade<br />
surveillance, and more.<br />
• Monitor log sources such as OLTP transactions, ATM transactions, wire transactions, and others.<br />
What type of insiders should you monitor for?<br />
Insiders can be categorized into three main types:<br />
• Negligent Insider: An employee or contractor unknowingly or accidently compromises data due<br />
to bad security hygiene.<br />
• Complacent Insider: An employee or contractor intentionally ignores policies and procedures or<br />
bypasses them because they think it’s not needed.<br />
• Malicious Insider: An employee who intentionally compromises data and misuses privileges in<br />
order to cause damage to the organization.<br />
In all three cases the employee or contractor is putting the organization at risk, but the malicious insider<br />
can result in the largest risk because of their intentionally malicious actions. This type of insider is also<br />
harder to detect because they are highly motivated and will typically actively work to circumvent existing<br />
controls and take other precautions to remain undetected.<br />
Securonix’s observation in the field is that organizations deal with complacent and negligent insiders 90<br />
percent of the time. The disciplinary actions taken against these insiders vary from warnings to<br />
47
termination of employment. The outcomes for a malicious insider can involve more serious<br />
consequences. The FBI has been involved in extreme cases including nation state attacks to steal<br />
valuable data such as intellectual property that is core to a business’s competency in the market.<br />
Summary<br />
Insider threats can have a significant negative effect on businesses today, but their impact can be<br />
mitigated by a well-thought out insider threat program that includes people, processes, and technology.<br />
Part two of this series on insider threat will address the technologies required to combat insider threat,<br />
how to evaluate them, and where to begin.<br />
About the Author<br />
Shareth Ben, Insider Threat SME at Securonix.Shareth is an information security<br />
professional with over a decade of program management experience, serving<br />
the security needs of Fortune 500 clients. Currently he is focused on<br />
providing insider threat and cyber threat solutions by bringing synergies<br />
between people, process, and technology to mitigate risks to enterprises. He is<br />
passionate about improving the security posture of organizations by providing<br />
thought leadership and best practices based on lessons learned in the<br />
field. Shareth has a Master’s degree in Information Systems and a Bachelor's<br />
degree in Computer science.<br />
48
How to Build an Effective Insider Threat Program: Part II,<br />
Technology<br />
By Shareth Ben, Insider Threat SME at Securonix<br />
In the first part of this series we discussed how insider threats can be mitigated by a well-thought out<br />
insider threat program that includes people, processes, and technology. This article dives deeper into the<br />
technology part of that equation. We’ll discuss what to look for in technology tools to best combat insider<br />
threats, where to start once you have those tools, and how to put the people and processes together with<br />
technology in order to achieve the best outcome.<br />
What type of technology is required?<br />
The ideal technology platform for insider threat combines technical and non-technical indicators of insider<br />
risk in order to compute a risk score that can be used to prioritize alerts for escalation and triage.<br />
The following functionalities are critical factors to look for in an insider threat detection and management<br />
technology.<br />
49
Centralized Logs<br />
The tool should have the ability to ingest a variety of technical and non-technical indicators of use activity.<br />
This is typically done using connector and collectors of various types depending on the target system.<br />
Normalize, Aggregate, and Correlate<br />
The tool should have the ability to normalize, aggregate, and summarize the user activity in preparation<br />
for data analysis and machine learning.<br />
Insider Threat Specific Content<br />
The tool should come with the necessary out-of-the-box content to meet your basic insider threat<br />
monitoring needs. It should also provide the ability to create custom content for industry-specific use case<br />
requirements. The detection mechanism should consist of standard rule-based violation triggers and user<br />
behavior-based anomaly detection. It is this combination that proves to be most effective against insider<br />
threats.<br />
Threat Chains<br />
Once the nefarious behavior is detected, the tool should facilitate stitching or chaining individual events<br />
into one holistic threat. For example: a user who has been identified as a flight risk is identified as<br />
accessing and downloading an abnormal amount or type of data, followed by an attempt to exfiltrate that<br />
data.<br />
Risk Scoring<br />
Once the insider threat behavior has been detected using threat chains, these alerts need to be risk<br />
scored in order to prioritize the threats from the noise.<br />
Investigation Tools<br />
When it comes to insider threats, the situation is seldom black and white. The security analyst requires a<br />
tool that can provide the necessary context in order to be able to complete their investigation of the<br />
prioritized threats.<br />
50
Incident Response Workflows<br />
When a prioritized threat is deeded escalation worthy, the tool should facilitate the necessary escalation<br />
and triage workflow amongst the concerned parties.<br />
Where to Start<br />
While organizations can decide their own pace for onboarding data based on their insider threat<br />
monitoring goals, an iterative approach is highly recommended. We have seen several successful insider<br />
threat projects begin with a foundational layer and build incrementally over time to reach a better maturity<br />
state.<br />
The following table proposes the types of data that organizations should consider ingesting based on<br />
their maturity.<br />
Maturity Data Exfiltration Detection IT Sabotage<br />
Level 1<br />
(Foundational)<br />
Email activity<br />
USB activity<br />
Proxy activity<br />
Windows authentication logs and<br />
security events<br />
Unix authentication logs (if<br />
applicable)<br />
Single sign-on (SSO) logs<br />
Critical database activity logs<br />
Level 2<br />
(Intermediate)<br />
DLP monitoring<br />
Endpoint monitoring<br />
Content sharing logs (Box, Dropbox,<br />
etc.)<br />
SharePoint logs or similar<br />
Unix audit logs if applicable<br />
PAM logs<br />
Endpoint detection and response<br />
(EDR) logs<br />
AWS CloudTrail logs<br />
SSO logs<br />
51
Level 3<br />
(Advanced)<br />
File integrity monitoring<br />
Business specific applications<br />
Business specific application<br />
authentication and activity logs<br />
Data sources that are identified as<br />
business critical<br />
What does an ideal program look like in terms of people, process, and technology?<br />
Going back to the initial formula, let’s put the pieces together for an effective and practical insider threat<br />
program.<br />
People<br />
An insider threat working group (ITWG): Defines the risk appetite specific to the organization and drives<br />
consensus across key business units including HR, legal, compliance, IT security and lines of business.<br />
An insider threat program (ITP): A core team who are ideally a mix of technical and non-technical staff<br />
members. These staff members are well versed with the data they are dealing with, understand the<br />
organization’s culture, and know how to observe and differentiate between the different types of risks.<br />
Having someone with prior investigation experience is ideal but not a requirement.<br />
Training and enablement: The ITP team should obtain adequate training and enablement to use the<br />
technology for insider threat detection.<br />
Process<br />
Based on the risk appetite of the organization, and after identifying what they need to protect, the ITWG<br />
should create the policies and procedures required to manage the identified risks.<br />
Clearly articulate and establish the escalation and triage processes. There are different levels of<br />
escalation from level 1 to level n depending on the size of the organization and staff capabilities. The key<br />
is to have a standard and repeatable process which allows for scalability.<br />
Standard operating procedures are essential to make sure there is consistency in dealing with insider<br />
threats.<br />
52
Technology<br />
The technology should support both user behavior threat detection and rule-based threat detection.<br />
It should be able to stitch together multiple alerts using threat chains, and rank alerts according to risk.<br />
It should support automated playbooks and response in order to reduce manual work which would be<br />
otherwise required. This can only be attained when a program reaches a state of maturity. Organizations<br />
should not attempt to do this until the foundational components are in place.<br />
Beyond the ITP: Putting the right tools in place<br />
Having a strong ITP is an essential step towards combating insider threats; but a strong team requires a<br />
strong tool to use for insider threat detection. The section above outlines the capabilities that an effective<br />
insider threat prevention technology should possess, but finding a tool with all of these capabilities may<br />
not be as straightforward.<br />
Threat chains can be enabled both manually and in an automated manner. However, manual threat<br />
chaining is a tedious, cumbersome process and requires the manual correlation of massive amounts of<br />
data, which would require a significant effort and a large team. Automated threat chaining, coupled with<br />
an accurate risk scoring capability, is an essential requirement in order to more easily minimize insider<br />
threats.<br />
If the technology can also respond to identified threats in an automated fashion, the value to the ITP is<br />
significantly increased, as an analyst can only handle a limited number of events. According to research,<br />
the typical security analyst suffers burnout within 1-3 years!<br />
A capable SIEM tool, with automated threat identification, threat chaining, and remediation capabilities is<br />
essential for a successful ITP.<br />
Conclusion<br />
Insider threats are increasingly relevant for organizations today as attacks grow more sophisticated.<br />
Establishing an insider threat program (ITP) is an important step towards building an insider threatresistant<br />
organization.<br />
The key is to start small and grow the program footprint over time. Organizations should start with an<br />
assessment of what exactly they want to protect and identify the types of risks they want to mitigate<br />
before embarking on the implementation of the program itself. Then select the technology that flows best<br />
around the risk-tolerance and data priorities for your organization, with the ideal technology minimizing<br />
the manual work for analysts, so they can focus on dealing with identified incidents.<br />
53
About the Author<br />
Shareth Ben, Insider Threat SME at Securonix. Shareth is an information<br />
security professional with over a decade of program management experience,<br />
serving the security needs of Fortune 500 clients. Currently he is focused on<br />
providing insider threat and cyber threat solutions by bringing synergies<br />
between people, process and technology to mitigate risks to enterprises. He is<br />
passionate about improving the security posture of organizations by providing<br />
thought leadership and best practices based on lessons learned in the<br />
field. Shareth has a Master’s degree in Information Systems and a Bachelor's<br />
degree in Computer science.<br />
54
Modernize the Mission: Implementing TIC 3.0 and Zero Trust<br />
Networking<br />
By Stephen Kovac, Vice President, Global Government<br />
Head of Corporate Compliance, Zscaler, Inc.<br />
Today’s workplace functions on the expectation of mobility – work from any device at any location. While<br />
legacy data center infrastructures and strict security requirements made it difficult for Federal agencies<br />
to meet these expectations in the past, the Office of Management and Budget’s newly released Trusted<br />
Internet Connections (TIC) 3.0 policy paves a path to the modern workplace.<br />
The TIC policy’s original goal was to standardize network security across agencies by requiring all federal<br />
internet traffic to run through a TIC. It was not designed for the bandwidth-intensive requirements of a<br />
Cloud First, Mobile First government.<br />
TIC 3.0 guidance provides the necessary flexibility to secure modern cloud environments and mitigate<br />
evolving cyber threats. TIC 3.0 moves beyond a “one-TIC-fits-all” approach to allow agencies to create<br />
alternative TIC solutions that meet the spirit and intent of the original TIC guidelines. Agencies can<br />
develop new network security approaches outside of the traditional perimeter-based TICAP and MTIPS.<br />
55
In addition, the new guidance provides a catalogue of use cases for agencies to reference as they<br />
develop TIC solutions with more comprehensive security for their hybrid environment.<br />
This is a tremendous opportunity to modernize cybersecurity and improve user experiences. What<br />
should agencies consider as they develop new TIC solutions?<br />
Adopt a “TIC-in-the-Cloud”<br />
With the new policy’s outlined cloud solutions – including as-a-service models, we can expect to see<br />
agencies accelerate cloud deployments.<br />
Following the guidance of the Federal Cloud Computing Strategy, agencies will need to consider TIC<br />
cloud solutions that enhance security postures, meet mission needs, and consider intended outcomes<br />
and capabilities.<br />
Industry will come forward with many different solutions, but agencies should be wary of lift-and-shift<br />
approaches or fancy marketing solution names. An agency that simply moves a physical TIC to cloud<br />
will only move challenges in current data center environments to the cloud.<br />
Solutions should move TIC functions away from the perimeter, to a globally-balanced multi-tenant cloud<br />
security software-as-a-service model that can scale up and down on demand – a “TIC-in-the-Cloud”. By<br />
moving the TIC security stack from data centers to cloud, agencies can route federal employee traffic<br />
directly to internally and externally managed applications and internet destinations, while maintaining<br />
security and access controls.<br />
Agencies need to take advantage of the important benefits cloud service providers can offer through this<br />
‘cloud effect’. Don’t miss the opportunity to deploy a cloud solution that will improve security and user<br />
experience. With the right TIC cloud solution specified to each agency’s needs, and collaboration with<br />
these providers, agencies will be able to globally implement hundreds of patches a day with security<br />
updates and protections.<br />
Modernize Access/Security Controls with Zero Trust Networking<br />
Agencies also have the opportunity to modernize security and access controls as they develop new TIC<br />
solutions.<br />
While TIC helps to ensure the security of external connections to government networks, zero trust<br />
networking can provide more security, improved usability, and reduced costs.<br />
This connectivity approach provides granular, context-based access to applications, regardless of<br />
whether they are in agencies’ data centers or in a destination cloud, creating better user experience,<br />
while maintaining full security and visibility into the environment.<br />
56
With the massive influx of data from emerging technologies and the sensitive nature of government data,<br />
a FedRAMP-authorized zero trust solution can provide the right level of access and security controls to<br />
protect mission-critical data, while meeting TIC requirements.<br />
Customize a Solution to Drive Mission Goals<br />
TIC 3.0 identifies three new use cases beyond the traditional TIC – cloud, agency branch offices, and<br />
remote user solutions. Agencies should review and test these proven options for environments with<br />
security requirements similar to their own.<br />
Think of the TIC use case solution development as a similar process to FedRAMP’s “certify once and<br />
use many” approach. Agencies should learn from and build off each other’s pilots (successful and<br />
otherwise).<br />
While there will be many different options for TIC 3.0 solutions, the next step for each agency will be to<br />
have a clear understanding of short and long-term goals.<br />
By working with the Department of Homeland Security and General Services Administration to approve<br />
new TIC use cases, and collaborating with industry service providers, agencies can develop new TIC<br />
solutions that strengthen cybersecurity, improve user experience and productivity, and ultimately,<br />
accelerate their mission.<br />
About the Author<br />
Stephen R. Kovac, Vice President of Global Government and Head of Corporate<br />
Compliance, Zscaler. Stephen has responsibility for overall strategy,<br />
productizing, and certification of the Zscaler platform across all global<br />
governments. He also runs the global compliance efforts for all of Zscaler. His<br />
primary focus over the last years is FedRAMP, TIC/MTIP Policies, and ZTN for<br />
Federal. Under Stephen’s leadership, Zscaler became the first FedRAMP<br />
certified ZTN Platform and Secure Web Gateway. He is a 27-year veteran of the<br />
information technology and security industry with extensive experience in public<br />
sector and compliance. Prior to Zscaler, Stephen served as EVP of Strategy<br />
and Public Sector for VAZATA, a FedRAMP certified cloud provider. He also served as VP/CSO for BT<br />
Security, Vice President at Terremark Federal, a Verizon Company, and as Vice President of Verizon<br />
Public Sector. Mr. Kovac is a frequent speaker on the federal circuit, blogger, and highly quoted author<br />
on federal security and certifications. Stephen can be reached online at skovac@zscaler.com and at our<br />
company website www.zscaler.com<br />
57
<strong>Cyber</strong> Resilience: Best Practices from Leading Industry Experts<br />
this National <strong>Cyber</strong> Security Awareness Month<br />
In recent memory, the US has seen a staggering number of critical cyberattacks, and the trend does not<br />
show signs of stopping. This year alone we have seen local governments in Baltimore, Albany, Laredo,<br />
Lake City, Wilmer and the 21 other Texas towns held hostage by sophisticated ransomware attackers. A<br />
few of these attacks even proved successful, with local leaders succumbing to the pressures of ransom<br />
demands.<br />
Moreover, 60 percent of business leaders believe that the sophistication and frequency of cyber attacks<br />
will increase faster than organizations can work to prevent them. History seems to support this concern.<br />
Since 2003, the tech industry and US government have collaborated to raise awareness and offer<br />
solutions via National <strong>Cyber</strong>security Awareness each October. This October, leading industry experts<br />
have come together to provide insights on industry best practices to help organizations--and the nation-<br />
-withstand the cyberattacks<br />
58
“<strong>Cyber</strong> threats such as ransomware can be a huge threat to businesses, and even just a single employee<br />
clicking a malicious link in their emails will mean a ransom must be paid for all business data encrypted.<br />
<strong>Cyber</strong>-criminals often exploit vulnerabilities in employee emails, so it is crucial to have the right cyberdefences<br />
in place to avoid a disaster where customer data, and a lot of money, could be at risk.<br />
“Having an extensive tiered security model and instilling a strong cyber-security-aware culture across all<br />
employees will help minimise risk. But, the attack itself is only half of the problem because, without<br />
sufficient recovery tools, the resulting outage will cause loss of data and money, as well as reputational<br />
harm.<br />
“In the event of any disaster, businesses should utilise tools that allow them to roll back and recover all<br />
of their systems to a point in time just before an attack. This level of disaster recovery is paramount, as<br />
employee emails continue to exist at the core of most businesses, they remain a standing target for eversophisticated<br />
cybercriminals," said Avi Raichel, CIO, Zerto.<br />
“This National <strong>Cyber</strong> Security Awareness Month, it’s important for individuals to Own IT. Secure IT.<br />
Protect IT. in both their personal lives and at work.<br />
Only purchase online from well-known stores. Stores like Amazon, eBay, Walmart and Nordstrom spend<br />
a lot of money and resources to make sure your data is safe. Just because a store uses encryption does<br />
not mean that once they have your data that it is kept secure. Avoid smaller unknown sites that may or<br />
may not have the proper level of security for your data. Larger established companies also usually have<br />
a well-defined process for disputing purchases that may be fraud. Keep an eye on your credit card<br />
statements for unauthorized charges, even at stores you normally shop at.<br />
Use multi-factor authentication when possible. If a website or app allows for multi-factor authentication,<br />
the hassle is worth the extra level of security. This is usually in the form of a code that comes to your<br />
registered phone or email address.<br />
Keep social media content private. Unless you are a movie star, or these days a YouTube star, you<br />
should be careful about what personal data you post on social media. This is a common way that<br />
celebrities get hacked as passwords are often derived from pet’s names, favorite foods, or other personal<br />
information. Public personal data also increases your risk for identity theft.<br />
59
These are key considerations we all need to make this month--and every day--to keep our data, and in<br />
turn, our employers’ data, safe,” said Harold Sasaki, Senior Director, IT and TechOps, WhiteHat Security.<br />
“Securing Internet of Things (IoT) devices and data for business use cases is one of the hottest topics<br />
during <strong>Cyber</strong> Security Awareness Month this year. At its core, IoT represents a huge expansion of the<br />
network edge, with each deployment potentially covering wired broadband, public and private LTE, WiFi,<br />
and LoRA WAN connectivity. In the not too distant future, we’ll see IoT deployments take advantage of<br />
5G connectivity as well. The good thing is the industry and governments have started efforts to better<br />
define the inherent security controls and best practices that will help, over time, improve the overall<br />
security of IoT deployments. But that will take some time to gain mass adoption in the market.<br />
IoT devices and routers are a major source of attacks for cybercriminals and nation state<br />
attackers. According to Symantec, in 2018, 75% of botnets were router focused. IoT security can be<br />
daunting for many businesses, and there are a number of important areas that everyone who has<br />
deployed or is considering deploying IoT applications should consider. Devices typically do not have<br />
layered security features or secure software development and patching models integrated with their<br />
solutions. On top of that, many IoT devices cannot be accessed, managed, or monitored like<br />
conventional IT devices. Depending on the use case and vendor, there can be numerous OS,<br />
management and API-level interfaces and capabilities to manage.<br />
With the expanding diversity of business IoT use cases along with their associated IoT devices,<br />
architectures, vendors, management platforms and disparate security capabilities, customers should look<br />
to invest in enterprise IoT platforms to simplify the number of tools, devices and architectures needed to<br />
meet the business benefits for IoT use cases in the enterprise while reducing cyber risk.<br />
Using existing network-based security solutions may not be sufficient. Instead, organizations should look<br />
at using expert cloud-based management platforms and software-defined perimeter technologies, which<br />
effectively address the security risks inherent in IoT deployments and provide network-wide policies and<br />
visibility. IoT security will remain one of the most important enterprise security issues for many years to<br />
come. But while businesses should always be mindful of potential threats, by addressing these early and<br />
with the right technology, they can be confident in their IoT deployments now and into the future,” said<br />
Todd Kelly, CSO,Cradlepoint.<br />
“Recent cyberattacks on major companies like Sprint, Capital One and Experian continue to show how<br />
the threat landscape is complex and sophisticated. In fact, the US Signal <strong>2019</strong> State of Web and DDoS<br />
Attacks survey revealed that 83 percent of organizations have experienced a cyberattack within the last<br />
two years and 30 percent said that it caused around 20 hours of downtime.<br />
60
On the 16th anniversary of National <strong>Cyber</strong> Security Awareness Month, it’s important to think about how<br />
your organization can work to prevent and mitigate cyberattacks. Many organizations are turning to<br />
managed service providers to help implement, monitor and maintain a mixture of cybersecurity<br />
technologies, including cloud-based firewalls, DDoS protection and email security. In addition, 97 percent<br />
of participating organizations scan and test for vulnerabilities within their web applications.<br />
The recent number of organizations that are experiencing cyberattacks is jarring. The survey brings to<br />
light that there is always room for improvement in keeping up with modern cyberthreats. National <strong>Cyber</strong><br />
Security Awareness Month is a great opportunity to remind companies of the need for more robust<br />
security tools and managed services to help resource-strapped technical teams year round,” said Trevor<br />
Bidle, vice president of Information Security and Compliance Officer at US Signal.<br />
“Ransomware has become an increasingly concerning issue for individuals and businesses alike,<br />
especially in the last few years. And, as the volume of data increases, so will the frequency and intensity<br />
of attacks. In fact, ransomware attacks increased by 118 percent across all industries in the first quarter<br />
of <strong>2019</strong>, according to a recent McAfee report. These kinds of brazen, disruptive attacks on IT<br />
infrastructure shows why events, such as the upcoming National <strong>Cyber</strong>security Awareness Month, are<br />
vital to promote better protecting mission-critical data against ransomware.<br />
There are simple steps and actions you can take to protect your business, personal information and<br />
assets from attacks. For example, implement a data protection, disaster recovery and business continuity<br />
strategy, utilizing a fully integrated anti-ransomware defense powered by machine learning models,<br />
proactively detecting and preventing ransomware attacks before they occur. It is also important to invest<br />
in IT infrastructure that delivers enhanced data protection, with archiving and threat mitigation to provide<br />
a robust disaster recovery plan. While National <strong>Cyber</strong>security Awareness Month is only a month-long,<br />
cybersecurity vigilance and strategies such as these should be implemented all year-round,” said Alan<br />
Conboy, Office of the CTO, Scale Computing.<br />
“Almost all of the huge breaches we read about in the news involve attackers leveraging stolen user<br />
credentials to gain access to sensitive corporate data. This presents a significant problem for security<br />
teams. After all, an attacker with valid credentials looks just like a regular user. Identifying changes in<br />
the behaviour of these credentials is the key to successfully uncovering an attack. But in an age of alert<br />
overload, security teams are often overwhelmed and can struggle to make sense of the data in front of<br />
them.<br />
Applying User and Entity Behaviour Analytics (UEBA) to the data already collected within most<br />
organisations can help security teams connect the dots and provide a useful profile of network user<br />
61
activity. By connecting the dots and creating a map of a user’s activities, even when the identity<br />
components are not explicitly linked, security teams can create baselines of normal behaviour for every<br />
user on the network. This makes it easier to identify when a user’s activity requires further<br />
investigation. It may not stop you being breached, but it will tell you about it before the damage is done.”<br />
said Steve Gailey, Head of Solutions Architecture,Exabeam.<br />
"The simplest thing SMBs can do to protect themselves from cyber-threats is to enable multifactor<br />
authentication. Essentially, that means having more than just a password. Most people use it all the time<br />
and never even think about it. For instance, when logging into your bank account from something other<br />
than your primary computer, and the bank sends a text message to your phone with a code. You enter<br />
the code and you’re in. That’s all multifactor authentication is. In cybersecurity, we call it “something you<br />
have and something you know.<br />
While there are all kinds of complex products and technologies companies use to protect themselves –<br />
many of them excellent – the fact is, most ransomware attacks can be prevented by this easy-to-deploy<br />
process. Yet, multifactor authentication has only recently become widely adopted, despite having been<br />
around close to 20 years." said John Ford, CISO at ConnectWise.<br />
“The perils of the internet continue to increase year after year, with cyberattacks becoming more frequent<br />
and more sophisticated. Large organizations, and even the federal government, have recently felt the<br />
sting of numerous attacks - illustrating the evolving and increasingly complex landscape we are living in.<br />
<strong>Cyber</strong>security Awareness Month is a great opportunity to raise awareness around the importance of<br />
taking cybersecurity measures to protect your business.<br />
From a hosting perspective, it is important to ensure that you identify the correct service or services for<br />
your security needs. It could be a web application firewall, which mitigates complex attacks on an<br />
application level, a managed cybersecurity solution, which offers a team of cyber security experts at your<br />
finger-tips, or a DDoS IP protection, which is a hardware-based service that uses scrubbing centers<br />
worldwide to recognize incoming DDoS attacks and reroute malicious traffic. And, the right partner will<br />
tailor the best solution(s) to combat the threats your organization is most likely to face.<br />
While cybersecurity awareness month is only a month long, it is important to remember that cybersecurity<br />
awareness is an everyday job,” said Lex Boost, CEO, Leaseweb USA.<br />
62
The significance of cyberattacks cannot be overstated, nor can their potential detrimental impacts on the<br />
ability of a business to survive and thrive in this new climate. However, the best practices from leading<br />
experts above can provide guidance to companies who wish to increase their cyber resilience.<br />
About the Author<br />
Trevor Bidle, vice president of Information Security and Compliance<br />
Officer, US Signal.As VP of technical strategy at US Signal in Grand<br />
Rapids, Trevor Bidle directs the strategic and tactical goals for the<br />
company, providing foresight into product offerings. Bidle has 18 years<br />
of telecommunications experience and has held technical and<br />
management positions with SBC Communications, including<br />
responsibility for outside plant engineering, Choice One<br />
Communications and US Xchange, where he was responsible for<br />
escalations and network engineering.<br />
Lex Boost, CEO, Leaseweb USA.Lex Boost, Chief Executive<br />
Officer (CEO) of Leaseweb USA. He is responsible for the<br />
development and execution of Leaseweb’s core vision and<br />
strategy across the United States. With over 20 years’ experience<br />
in the digital industry, he has gained leadership experience from a<br />
broad range of organizations and cultures, including both B2B and<br />
B2C markets, in startups, as well as large corporations.<br />
63
Avi Raichel joined Zerto as CIO in 2017. Avi leads the company’s IT team<br />
tasked with ensuring that internal processes & systems continue to thrive<br />
alongside Zerto’s strong business growth. Before joining Zerto, Raichel spent<br />
17 years at Amdocs where he rose from MIS team leader to vice president of<br />
information systems. He led a group of 350 IT professionals and brings<br />
expertise and a proven track record of initiating, planning and executing large<br />
scale technology led transformations that meet measurable business goals.<br />
Avi holds a B.S in Economics & Accounting from the Tel-Aviv University, and<br />
a CPA certificate from the State of Israel.<br />
Todd Kelly, CSO, Cradlepoint.Todd Kelly is the Chief Security Officer<br />
at Cradlepoint, where he works with customers, executive<br />
management, and cross-functional teams to optimize customer<br />
success. Todd is an experienced go-to market leader whose<br />
experience spans from startups through IPO and Fortune 500<br />
companies.<br />
Alan Conboy, Office of the CTO, Scale Computing.Alan Conboy is part<br />
of the office of the CTO at Scale Computing since 2009. With more than<br />
20 years of experience, Conboy is an industry veteran and technology<br />
evangelist specializing in designing, prototyping, selling and<br />
implementing disruptive storage and virtualization technologies. Prior to<br />
Scale Computing, Conboy held positions at Lefthand Networks, ADIC,<br />
CreekPath Systems and Spectra Logic. Conboy is notably one of the<br />
first movers in the X86/X64 hyperconvergence space, and one of the<br />
first 30 people ever certified by SNIA.<br />
64
John Ford, Chief Information Security Officer, ConnectWise.John Ford<br />
is chief information security officer for ConnectWise. His responsibilities<br />
include ensuring security education, products and services enable<br />
ConnectWise partners to own and deliver secure solutions to their<br />
customers. John, who has more than 22 years of security and<br />
technology experience, joined the ConnectWise team in 2018. Prior to<br />
that, he served for six years as founder and CEO of Sienna Group, a<br />
leading data-centric managed security services provider that was<br />
acquired by ConnectWise. John also has held CISO and CCO roles at<br />
several large healthcare, technology and government organizations,<br />
including MCS and WellCare Health Plans. He is a board member of<br />
the Tampa Bay Cloud Security Alliance Chapter. John, who earned a bachelor’s degree in information<br />
systems from the University of South Florida, lives in Tampa Bay and plays golf whenever he has time<br />
to get on the links.<br />
Stephen Gailey, Exabeam.Stephen Gailey currently serves as the<br />
head of solutions architecture at Exabeam. Stephen Gailey is an<br />
experienced Information Security Manager used to working in highly<br />
regulated environments, dealing with compliance and legislative<br />
challenges from multiple jurisdictions. Much of Stephen’s career has<br />
been spent in financial services; primarily investment banking but also<br />
in retail banking, telecoms, utilities and insurance business<br />
environments. Stephen joined Exabeam from Splunk, where he ran<br />
the Financial Services practice and the EMEA Security Practice.<br />
Harold Sasaki, WhiteHat Security.Harold Sasaki is currently senior<br />
director of IT and TechOps at WhiteHat Security. Harold has several years<br />
of experience with start-ups, public companies and mergers and<br />
acquisitions.<br />
65
Are Financial Services the Golden Goose for <strong>Cyber</strong>criminals?<br />
By Yair Green, CTO, GlobalDots<br />
The financial services industry has been a long time favourite target for cybercriminals. They are always<br />
looking to steal information related to payment cards, online accounts and ATM machines. The<br />
cybersecurity landscape is constantly shifting and changing and the threatscape is no different - threats<br />
such as ransomware or cryptomining are continuously evolving and other, new forms of malware are<br />
constantly presenting themselves. As the financial services sector joins other industries in a journey of<br />
digital transformation, they face the challenges of blending new technologies with legacy systems, whilst<br />
also having to meet ever-changing compliance standards.<br />
This digital transformation is seeing the financial services industry increasingly turning to online portals,<br />
social media and mobile apps in order to satisfy an ever more demanding customer base - people now<br />
expect everything to be done here and now with a minimum of fuss. Paradoxically, these new digital<br />
platforms, along with a more competitive landscape where we are seeing lower costs and a lower barrier<br />
to entry, are making it even easier for cybercriminals to exploit customers. Indeed, with more and more<br />
people turning to online banking and using 3rd party apps, cybercriminals are now able to target an even<br />
larger pool of victims.<br />
66
Open Banking is a great illustration of all of this. Essentially Open Banking is a series of reforms that deal<br />
with how banks deal with consumer financial information. What it will effectively do is break the monopoly<br />
that banks once had over their customer’s account information. By doing so it will allow a new ‘generation’<br />
of 3rd party businesses to compete with financial services organisations to be able to access customer<br />
data. All well and good you might think but there are new security challenges to face with these new<br />
organisations suddenly being able to access all of this consumer financial data. Where you now have<br />
sensitive data passing via an open interface, it becomes extremely vulnerable to cyberattack. We have<br />
already seen here in the UK, customers banking with the likes of Barclays, HSBC and Lloyds Bank to<br />
name but a few, being targeted by criminals via the malicious use of banking trojans. Such activity targets<br />
customers by spamming them with emails containing a type of virus essentially - clicking on a link within<br />
the email effectively allows the hackers in and then they are free to do what they want.<br />
So what do the statistics on financial services cybercrime tell us? Well for example, a very recent report<br />
by ZeroFOX suggested a 56% year-over-year increase in digital threats targeting the financial space. As<br />
part of the report, researchers scanned 2.9 billion pieces of content and found more than 8.9 million<br />
security events in a 12-month period. Interestingly, the report showed that Financial services firms are<br />
more prone to corporate social media account takeover. Unsurprisingly, fraud made up 40% of all<br />
cyberattack activity against financial services including money-flipping schemes, customer giveaway<br />
scams and scams related to cryptocurrency; fake mobile apps also made an appearance.<br />
Another report by Fortinet, illustrates the impact that cyber threats have had on several industries,<br />
including financial services. It highlighted the massive growth in one particular threat, Coinhive which<br />
focuses on Monero cryptocurrency - cyber criminals were able to install JavaScript files onto<br />
compromised websites and make illicit gains. And even though the cybercriminals were eventually<br />
thwarted by the dismantling of Coinhive, those behind the attacks will be developing new ways of<br />
launching successful attacks.<br />
And let us not forget that financial services firms are also under the regulatory microscope; here in the<br />
UK, the FCA is able to levy fines on those organisations that are found to be wanting if their customers<br />
suffer due to a cyber attack. There are practices that organisations can put into action, especially those<br />
that promote governance and put cyber risk on the board agenda. How many big fines need to be paid<br />
before the C-suite understand the importance of proper investment in solutions and training that can help<br />
to defend from attack? Organisations need to be identifying and protecting information assets, they need<br />
to be alert for emerging threats and they need to be ready to respond. Also, keep testing and refining<br />
defences - cybercrime techniques advance at a rapid pace.<br />
Ultimately, there is no silver bullet to defend against all of these growing and ever-more sophisticated<br />
attacks. The potential rewards for cybercriminals targeting financial institutions can be potentially<br />
staggering and so those organisations in this industry must rely on threat intelligence in order to identify<br />
67
threats and understand the impact that a cyberattack could have on network security and customer<br />
confidence. Such threat intelligence highlights those threats that are perhaps no longer active but where<br />
there is still a cycle of risk development; just like a medusa, when one threat is vanquished another<br />
quickly fills the void.<br />
About the Author<br />
Yair Green is the CTO of GlobalDots, and a Cloud, Security and Web<br />
Performance Evangelist.<br />
www.globaldots.com<br />
68
The Social Engineering Methods and Countermeasures<br />
By Milica D. Djekic<br />
During the time, the people would always try to get what some individuals being the part of some group<br />
would assume as so confidential to them. Such a group of the persons could be some organization,<br />
enterprise or any business coping with so vitally important data. From today’s perspective, we would not<br />
talk about the social engineering as a common activity to obtain some valuable information from the<br />
public and private sector, but rather mention how it works if you want to make a touch and take advantage<br />
over the details belonging to some threat’s asset. Nowadays the people would get fed up from so<br />
annoying phone calls, correspondences and in person approaches that would give you the chance to<br />
skillfully gather some intelligence and assure the access to some institution mainly in a cyber fashion.<br />
Let’s try to change our perspective and imagine that we are not the victims of the carefully planned social<br />
engineering attacks, but rather someone who would go for hunting for so significant information.<br />
Maybe these sorts of tactics would get so well-known in the state-sponsored attacks, but let’s try to<br />
imagine how it would function if we would apply the similar approach to so threatening transnational crime<br />
and terrorist groups. The good question here would how those bad guys would react on so innocent<br />
phone calls or so naive e-mail communications. Knowing the psychology of the criminals – we could<br />
guess that those folks could get somehow embarrassed with such an approach, but let’s say if we talk<br />
about the cybercrime gangs – they would probably take such a challenge. In addition, it’s quite interesting<br />
to suggest that the huge advantage of the modern security sector is a technology that would give us an<br />
69
opportunity to smoothly investigate what it is happening somewhere. In other words, let’s make our story<br />
a bit reverse and let’s attempt to take the hunter’s role and chase our threat in so proactive way.<br />
What is the social engineering?<br />
The first word we would get in mind when we say the social engineering is the skill to obtain some<br />
sensitive information relying on communications, empathy and interpersonal abilities. The good trick with<br />
such a skill is that the victim would not get at that moment that he was under the attack and so many<br />
social engineers would use the vulnerabilities of the ordinary people who would always try to deal in so<br />
nice, supportive and friendly manner in order to help someone getting satisfied with their service and<br />
positive attitude. In so many cases, the people being that helpful could feel the personal joy for assisting<br />
to someone to get his problem being resolved. So, if you resolve someone’s concern you would<br />
undoubtedly demonstrate your skill and effectiveness and you would possibly get pleased how greatly<br />
you are professional and deeply inside you would believe that the other people would see you as the<br />
quite bright person. From our point of view, such ego bait could be the ultimate engine to many people<br />
to get so helpful and supportive for a reason they would leave the good impression to their surroundings.<br />
So, your personal weaknesses would make you talk in front of predatory dangerous attackers and the<br />
good point here is if we could notice those vulnerabilities with the bad guys who would also be so sensitive<br />
to their egocentric needs. Indeed, the social engineering could be the quite useful deception technique<br />
and tactic, so if we confirm that the malicious actors could also get targeted with such a strategy – we<br />
could talk about the quite new game between the cat and the mouse. Well, the good hackers are<br />
commonly the brilliant social engineers and once they make someone shares something getting so<br />
confidential – they would try to gain the access to his IT system or the entire organization. The experience<br />
would indicate that so many bad guys’ groups would deal as an enterprise and so frequently they would<br />
get registered as some firm or company that would cope with the websites, social media channels and<br />
the other ways of the communications. On the other hand, it would appear that the era of the smart guys<br />
sitting in some dark room and literally spending all their time in front of the screen got behind us and the<br />
cyber criminals of today could get active anywhere and anytime. Apparently, the cybercrime syndicates<br />
could believe they could get less visible to the authorities if they register as some business that would<br />
not surprisingly pay the tax to the state.<br />
The techniques and approaches of attack<br />
In the practice, there could be the wide spectrum of attacks to the public and private infrastructure as well<br />
as the opponent countries that should get seriously affected by those operations. As it’s pretty wellknown,<br />
the majority of e-mail addresses could get tracked online and once we confirm some e-mail<br />
location exists – we could try to prepare so skillful campaign in order to take advantage over our target.<br />
So obvious weakness in anyone’s e-mail correspondence got his signature that could include the both<br />
landline and cell phone numbers making such a detail getting traced using the emerging technological<br />
solutions. The people of today would get the habit to live in so free and open environment that would<br />
encourage them to share all they have with the rest of the community.<br />
The adequate question here could be whom we could trust. The point is if you send your e-mail to<br />
someone you do not know well enough – you should get aware that the details as your postal address,<br />
phone numbers, position in the hierarchy and social media accounts could get so annoying to you sooner<br />
or later. In other words, all these information could get used to cause the disadvantage and even the<br />
harm to you or anyone being so close to you. Everything could start as the lovely phone call that would<br />
70
equest kindly from you to give your e-mail address in order to receive some so nice promotional material<br />
and once you take such a hook – you would certainly get in trouble. Even worse – the real nightmare<br />
would appear once you begin responding to such correspondence and leaving so many details about<br />
yourself and your organization, so far.<br />
How to protect yourself from those offenses?<br />
Once you receive the phone call from someone you are not confident in – you should think twice before<br />
you make a decision to show the brilliance of your mind. The call center operator could get so nice,<br />
friendly and approachable even if he conducts some security quizzing before he makes the decision to<br />
provide the certain information on. For instance, you can always say that you must follow some security<br />
procedure and so kindly ask the caller for his contact details which could serve for sending some kind of<br />
response on his account. It can take several minutes to confirm all the claims you got from your friendly<br />
caller and once you get confident that person is not a threat to anyone – you could reply to his request.<br />
Otherwise, just ignore such a call and try to prepare the skillful report to someone being the authority in<br />
such a case.<br />
Your opponents are getting more and more innovative<br />
The fact is the social engineering is the area that would cope with a lot of innovations and even you are<br />
confident you know everything about such a field – think twice. In case you need to collect some<br />
information on the criminal group being under the investigation using such a skill – you should know that<br />
the only stuff you need in that sense is the skill by itself. If there is the certain need for the social engineers<br />
in the investigative process – you should count on the staffs who are well-trained and who got some real<br />
experience through the intelligent exercises. Does not matter how many attempts you would make – you<br />
should always know that your technique could get always improved. A series of the improvements would<br />
support you in getting more innovative and only with such a weapon in your hands – you would get<br />
capable to go a step ahead of your opponent. Do not believe that your enemies would just sit and wait<br />
for things to happen. Far from that, they would create the options to themselves and so intelligently follow<br />
the tendencies in the field.<br />
Some future perspectives<br />
The point is the social engineering is the area that should get deeply researched and once we better<br />
understand the psychological mechanisms of the people being vulnerable to those kinds of attacks – we<br />
could further proceed with our investigation. Maybe some of the ongoing suggestions in such a field could<br />
seem as so brilliant, but tomorrow they would appear as the matter of the past. The fact is you should<br />
always keep moving on if you want to stay on the surface and even if you are recognized as someone<br />
knowing a lot in such a branch – you should say to yourself that there are the heaps of people in this<br />
world who would also get so helpful ideas, so stay open to listen to so, maybe learn a bit and finally apply<br />
everything being so useful to your practical tasks.<br />
71
About The Author<br />
Milica D. Djekic is an Independent Researcher from Subotica,<br />
Republic of Serbia. She received her engineering background<br />
from the Faculty of Mechanical Engineering, University of<br />
Belgrade. She writes for some domestic and overseas presses<br />
and she is also the author of the book “The Internet of Things:<br />
Concept, Applications and Security” being published in 2017<br />
with the Lambert Academic Publishing. Milica is also a speaker<br />
with the BrightTALK expert’s channel and <strong>Cyber</strong> Security<br />
Summit Europe being held in 2016 as well as <strong>Cyber</strong>Central<br />
Summit <strong>2019</strong> being one of the most exclusive cyber defense<br />
events in Europe. She is the member of an ASIS International<br />
since 2017 and contributor to the Australian <strong>Cyber</strong> Security<br />
Magazine since 2018. Milica's research efforts are recognized<br />
with Computer Emergency Response Team for the European<br />
Union (CERT-EU). Her fields of interests are cyber defense,<br />
technology and business. Milica is a person with disability.<br />
72
How to Address the Top 5 Human Threats to Your Data<br />
By Dave Sikora<br />
The first step in developing a resilient cybersecurity posture is identifying what it is you are trying to<br />
protect. For most businesses today, that most valuable asset is data. Customer data, partner data,<br />
internal data – it’s the information you rely on to operate and grow.<br />
Whether through intentional malicious acts or simple negligence, the “insiders” with access to data are<br />
the biggest threat to security and privacy. More than 90 percent of organizations, according to a report<br />
by CA, believe they are vulnerable and nearly two-thirds also report a shift in focus toward insider-threat<br />
detection.<br />
Addressing the top 5 threats to your data is crucial in building a layered, data-centric approach to security<br />
and privacy in a world where data is currency in the bank and it seems everyone has a key to the vault.<br />
73
Guessed and stolen credentials<br />
Obtaining user passwords is one of the most common ways cyber criminals breach security defenses.<br />
Using brute force or dictionary attacks, hackers essentially “guess” user passwords based poor security<br />
hygiene and open-source intelligence.<br />
They also hoard information exposed in breaches and engage in credential stuffing, testing the<br />
combinations on unrelated sites. Many individuals use the same password on multiple platforms, and<br />
cybercriminals are also adept at manipulating credentialed users into giving away passwords through<br />
phishing and spear-phishing campaigns. Even security “strength” indicators are also weak tools for<br />
measuring password strength.<br />
For these reasons, firms turn to technology that recognizes unusual behavior around data consumption.<br />
This is a key aspect of the data governance approach, for instance, deployed by ALTR lets developers<br />
embed data security directly into applications when they are built. The idea is to prevent breaches in realtime<br />
by slowing down or blocking the flow of data when consumption exceeds set thresholds.<br />
Private data exposure<br />
Businesses today rely on their relationships with contractors, vendors, and partners to ensure every facet<br />
of their organization is optimized, yet even trustworthy partners can pose a risk. One example is thirdparty<br />
application developers. In an effort to use realistic datasets to build and maintain applications, they<br />
often end up inadvertently accessing private data.<br />
Unfortunately, the most common method for protecting private data is to control application access.<br />
However, this creates gaps in data governance since the protective tools are primarily about people and<br />
not the data itself. Newer methods use data classification groupings, such as data that is regulated by<br />
GDPR or HIPAA, to enable data-centric controls associated with these groupings.<br />
Responding to the increasingly, the programmable data security model employed by ALTR embeds data<br />
governance directly into applications into the critical path of every data query. This enables real-time<br />
policy checks that determines whether data should be dynamically masked, slowed down, or blocked<br />
entirely for certain user groups.<br />
Theft using privileged access<br />
Database administrators (DBAs) or IT leadership typically have access to database servers, encryption<br />
keys, and tokenization maps. These users are able to easily bypass governance. Unlike excessive<br />
privileges given to regular employees or vendors, privileged access compromise refers to the abuse of<br />
administrative rights. In this case, users with administrative credentials may access confidential<br />
information, privileged account details, sensitive personal information, or intellectual property. It is<br />
important to note that privileged credentials are also subject to theft.<br />
74
How do most organizations attempt to ensure the security of this data? They encrypt it, however, enacts<br />
a heavy performance toll on transactional data and is vulnerable because of keys. Keys often have to be<br />
stored conveniently, and once someone has the key, they are able to decrypt data. The strongest<br />
encryption methods still use a key to decrypt stored data, and even where stronger internal user controls<br />
are in place the theft of privileged credentials, or the elevation of low-access privileges, is an unmitigated<br />
threat.<br />
To address privileged access, ALTR leverages smart tokenization and fragmentation via private<br />
blockchain to obfuscate data-at-rest. Instead of encrypting and storing the data in a “secure” database<br />
with keys nearby, sensitive data is replaced at the column level with a reference hash, and then<br />
disassembled and stored in self-describing fragments. When needed, it can be reassembled at<br />
application speed with very low latency.<br />
Software or hardware misconfiguration<br />
As organizations install new hardware or transfer to a new software application, simple missteps can<br />
wreak havoc on security architecture. Insecure default configurations, incomplete configurations,<br />
unsecured cloud storage, misconfigured HTTP headers, and missed patches and upgrades are all<br />
examples of misconfigurations. In these cases, a single unchecked box might lead to devastating security<br />
holes.<br />
Most organizations today do not have structures or tools in place to solve for these security gaps.<br />
Thresholding data, which establishes limits on data consumption at the application level, is a way to<br />
approach a potential insider threat to “smash and grab” data. Insiders often need access to sensitive data<br />
to do their jobs, but the amount of access, and what they do with that access, can vary tremendously.<br />
Thresholding data enables the business to slow down and stop data exfiltration as it is happening,<br />
allowing operations to continue while validating use.<br />
In addition, a key defense in this scenario is to protect the data when it is at rest. Even if an attacker<br />
enters the network, they cannot access the data. Improving on less secure encryption keys, businesses<br />
today are also moving towards a keyless data obfuscation model such as the fragmentation technique<br />
previously mentioned.<br />
Modified database access logs<br />
Typically, a database is continuously monitored, and access logs are kept regardless of an incident.<br />
These logs identify who accessed the database, when, from what device, and include other pertinent<br />
details that are valuable in a security investigation.<br />
<strong>Cyber</strong>criminals have proven adept at modifying database access logs. Depending on their intent, they<br />
may alter them to show another user accessing the database or simply delete any evidence they were<br />
ever there.<br />
75
To identify these changes, organization must continually review the log files, a process that is prone to<br />
human error where subtle changes take place. And while the tools used to analyze them may reveal<br />
something suspicious or even an obvious breach, they are far from reliable.<br />
A technical view to removing the ability of users to modify records is gaining recognition as an alternative.<br />
This prevents users from modifying records by saving every data access event to an immutable<br />
blockchain, for example, where it cannot be altered and there is no need for complex predictive analytics<br />
and behavior monitoring.<br />
Data is everything to the enterprise<br />
Data is the raw material that fuels business, driving growth and building the future. That is why it is<br />
essential to take steps that ensure the data on which they rely is secure. Unfortunately, most<br />
organizations are reactive, operating without visibility into data flow.<br />
While humans remain the largest threat to data security, many are working tirelessly to develop new<br />
technologies to better manage our faults. Understanding the top threats to data is indispensable for<br />
identifying the right solutions.<br />
About the Author<br />
Dave Sikora is the CEO of ALTR. Dave Sikora is a technology industry veteran<br />
with more than 20 years of experience that spans enterprise software, data<br />
intelligence, private equity, mobile applications and supply chain solutions. As<br />
CEO at ALTR, he is focused on expanding the ways enterprise companies can<br />
reduce threats to data security and privacy. Sikora holds an MBA from Harvard<br />
Business School. ALTR is the first provider of programmable data security,<br />
which embeds data monitoring, governance, and at-rest protection natively into<br />
application code to provide a dramatically more effective, more portable,<br />
simpler data-security model. Using a smart database driver or API that serves<br />
as a single integration point, ALTR makes it possible for development teams to<br />
place security into the critical path of data and hand off management of<br />
governance and protection policy to security and compliance teams. Further<br />
supported by private blockchain to provide integrity to data access auditing and protected data itself, it is<br />
a completely portable approach that neutralizes data access risks from even the most privileged users<br />
while accelerating innovation and reducing the cost and complexity of data security. ALTR, which holds<br />
21 issued and allowed patents and has more than 30 patents pending, is based in Austin. Dave Sikora<br />
can be reached online at (@altrsoftware, 1-888-757-2587) and at our company website<br />
http://www.altr.com/<br />
76
How to Suggest Your Manager to Invest into <strong>Cyber</strong> <strong>Defense</strong>?<br />
By Milica D. Djekic<br />
The first personal computers would appear in the early 80s of the 20 th century. Since then the entire<br />
technological posture has changed and evolved so rapidly, so today we cannot imagine the home or<br />
business without the computing unites and the internet connection, so far. The early beginnings of the<br />
web era would go several decades to the past and with the first computer’s networks we would get the<br />
first legal regulations and frameworks regarding the cybercrime as well as cyber security. So, the cyber<br />
defense is not that young branch of the human activity and with the very first digital networks – we would<br />
get aware of the need for some cyber security procedures, tactics and strategies. Right now, the cyber<br />
defense is witnessing its boom and it’s quite obvious such an area would get publicly engaging more than<br />
even before. The reason for that could be that the machines with the internet connectivity would become<br />
the part of our everyday routine and even the most rural landscapes in so developing economies would<br />
get that privilege to rely on the web and so commonly to the entire mobile technologies service.<br />
In other words, the cyber infrastructure across the globe got so well-developed and accessible nearly<br />
anywhere worldwide, so it’s not that strange that the people would see the cyber security as so engaging<br />
area of their lives and works. Anyone who would want to know anything about the cyber defense could<br />
get such a piece of the information simply surfing on the internet or searching his social media accounts.<br />
In our experience, even the folks from the low safety and security level societies could demonstrate the<br />
77
impressive familiarity with the cyber security for a reason they would spend the hours and hours in front<br />
of their screens working so hard on their self-education in the field of the high-tech security. Indeed, those<br />
guys would so promptly develop the skill in such an arena and probably if they remain the long enough<br />
in such a business they could deal with the great expertise that could contribute to poor and unsafe<br />
countries to change for better and gain the better quality of life and work to everyone living there.<br />
<strong>Cyber</strong> defense is about a risk management<br />
So, the cyber defense would get the huge public attention through the past years and so many people<br />
over the world would wonder what such a field could offer to us. This question could offer so deep<br />
discussion as well as explanation instead of the only brief answer on. Why? The digital networks of today<br />
would serve to so many purposes and sooner or later the end users and consumers could suffer some<br />
kind of disadvantage dealing with their assets. Those drawbacks could cost them more or less in the<br />
financial connotation and everyone being rational would try to avoid paying more if he can pay less or<br />
nothing for something. Also, there are some security concerns getting correlated with the poor cyber<br />
defense, so that’s why we must pay the strong attention to those requirements. The fact is the entire IT<br />
industry would offer the information goods and services that could be the sources for the long-term<br />
exploitation needs.<br />
Apparently, the cyberspace could be so risky environment and if we do not know how to handle that risk<br />
– we would defiantly pay much, much more. Well, the role of the cyber defense is to manage the risk in<br />
the cyber domain and if we put such a threat at the reasonable scale – we would consequently pay less.<br />
It’s so complicated to mitigate the risk completely, but if you cope with the enough skill your private or<br />
business networks would be somehow secure. From this perspective, it could seem that the entire global<br />
marketplace is suffering the certain lack of the IT security professionals, but – in our opinion – such a<br />
shortage could get overcome through so intelligently created training and courses that could teach the<br />
people with the quite basic IT skills to get the cyber defense workforce. Also, never underestimate the<br />
power of the positive and constructive self-education, because the guys from the developing countries<br />
would not get the funds to pay for the expensive training and they would rather choose to sit at home and<br />
exercise on their computers on their own developing the skills that would make them getting so capable<br />
defense shield to their communities and maybe internationally if they really select to put such a big effort<br />
on, so far.<br />
Your manager is a decision maker to your effort<br />
On the other hand, if we talk about the objective needs of some organization to the cyber defense<br />
products and services, so many employees working for such an enterprise would direct you to their<br />
bosses to discuss with them anything you want to offer to such a business. Even if there is some IT<br />
security department within some firm or company – the cyber security manager would talk to his decision<br />
maker before he takes any concrete actions on. So many IT security professionals would use the welldeveloped<br />
assessment forms in order to estimate what they really need for their everyday activities and<br />
they would also need the great reporting, communications and negotiation skills in order to stress on with<br />
their managers if the entire enterprise could choose the certain way in terms of their cyber security<br />
progress, so far.<br />
78
The purpose, the impacts and the budgeting<br />
The convenient skills are needed in the business world even if you want to convince your decision makers<br />
to approve the funds and the other resources in order make the cyber security concerns getting so<br />
understandable to the rest of the team and more importantly – the workforce must know the purpose and<br />
impacts of those decisions as well as the reasons why such a budget is so necessary to that. The practice<br />
would suggest that the people would look for a remedy once they get unwell and only the very few of<br />
them would choose to prevent the conditions that got fully treatable once it got diagnosed. No one would<br />
die from the cold, but the old person which would not get treated from that condition could develop the<br />
pneumonia and certainly suffer so fatal consequences. In other words, your computer would not show<br />
any serious symptoms if it catches some virus in the cyberspace, but if you do not treat that incident in<br />
sense of cleaning your IT network from the malware using some anti-malware solution – you would<br />
sooner or later get the collapse of the entire operating system because such a malicious software would<br />
not get recognized and removed at the appropriate time.<br />
The difference between business risk and cyber risk<br />
Above all, let’s talk about the differences between the business and cyber risks and why those two terms<br />
differ from each other as well as why they could get so similar to each other. The business risk is more<br />
about investing your resources either being human or financial by their characteristics into some activity<br />
or useful work that could support you in obtaining some kind of the advantage on the marketplace. If you<br />
choose to make several risky, but profitable steps in your business – you can expect that you would<br />
expand your marketplace to much more consumers and clients. On the other hand, the cyber risk is more<br />
about how you can protect what you already have as well as prevent your organization and staffs from<br />
so serious financial and security concerns. Maybe investing into cyber defense would not impact your<br />
business advantages and new horizons on the marketplace, but you would definitely deal with the more<br />
profit at the end of the year because you would need to pay less for the occurrences being the<br />
consequence of the cyber insecurity, so far.<br />
The further thoughts<br />
The cybercrime would cost the global economy the trillions of dollars per an annum and that’s quite<br />
appealing fact. If we put such a finding into our calculation, we can notice that the real business can lose<br />
the few percents of their annual profit once they get the target of the hackers and cyber criminals. That’s<br />
the quite big waste and no one would want to throw such money through the window and give it for<br />
nothing. So, if you are the rational decision maker and if your IT security staffs deal with the adequate<br />
skills – you should defiantly get open to their suggestions as well as consult your financial risk team in<br />
order to collect the numerous helpful information and advices at the same glance before you make any<br />
move on.<br />
79
About The Author<br />
Milica D. Djekic is an Independent Researcher from Subotica,<br />
Republic of Serbia. She received her engineering background<br />
from the Faculty of Mechanical Engineering, University of<br />
Belgrade. She writes for some domestic and overseas presses<br />
and she is also the author of the book “The Internet of Things:<br />
Concept, Applications and Security” being published in 2017<br />
with the Lambert Academic Publishing. Milica is also a speaker<br />
with the BrightTALK expert’s channel and <strong>Cyber</strong> Security<br />
Summit Europe being held in 2016 as well as <strong>Cyber</strong>Central<br />
Summit <strong>2019</strong> being one of the most exclusive cyber defense<br />
events in Europe. She is the member of an ASIS International<br />
since 2017 and contributor to the Australian <strong>Cyber</strong> Security<br />
Magazine since 2018. Milica's research efforts are recognized<br />
with Computer Emergency Response Team for the European<br />
Union (CERT-EU). Her fields of interests are cyber defense,<br />
technology and business. Milica is a person with disability.<br />
80
So, Ya Wanna Be A Pen Tester, Huh?<br />
Here are some things to consider<br />
By D. Greg Scott, Author of Bullseye Breach and Virus Bomb<br />
Do you like tearing software apart and putting it back together again, stronger and better?<br />
When you watch a dramatic live TV news story from a war zone, does the news report get your attention,<br />
or do you wonder about all the ways to hack the video transmission?<br />
If you’re a Star Trek fan, when they beam aliens onto the Starship Enterprise, do weak access controls<br />
on the ship make you crazy?<br />
Do you laugh at the Hollywood hacker scenes in books and movies and want to grab the producers’ shirt<br />
collars and show them how the technology really works?<br />
If you answer yes to questions like that, you might be a natural penetration tester.<br />
Penetration testing (pen testing) means probing for weaknesses in IT networks and finding ways to exploit<br />
them before real attackers do it. Like all testing, the exercise is part science and part art-form.<br />
81
Most organizations declare a successful test when the system being tested demonstrates its capability.<br />
Testers know this is backwards. To a tester, a successful test means the test found a problem. Which<br />
means a successful pen test means the test uncovered a vulnerability. This is cause to celebrate.<br />
The best pen testers drive developers, system admins, and corporate managers nuts because they’re so<br />
good at finding problems. Which also makes them worth more than their weight in computer chip precious<br />
metals.<br />
Your Challenge<br />
But pen testers need to overcome a challenge.<br />
I surveyed a sample of pen tester job postings recently. They all want people who know a bunch of<br />
systems and languages. Some want people who know how to use the organization’s favorite tools and<br />
perform system admin functions. Excellent diagnosis and analytical skills is a common requirement.<br />
Certifications are often in the mix. And they all want somebody with strong communication skills who can<br />
work in a team.<br />
Those skills are all important, but the job postings all miss that intangible quality, that ability to sniff out<br />
weaknesses and break things. It’s a shame today’s automated resume scanners don’t have a way to<br />
capture it. It’s hard to package in a resume.<br />
So, how does a pen tester job candidate get past the automation? Fair or not, today’s resume scanners<br />
look for keywords. So, make the scanners happy and put the appropriate keywords on your resume. This<br />
should not be a problem for any experienced tester. Pass the automation gate and score an interview.<br />
The interview is where you shine. Instead of regurgitating all your experience from your resume, apply it.<br />
Ask every interviewer a zillion questions about how their departments function. For the HR rep, ask about<br />
how the HR process works. Who has permission to look at your resume? What happens if somebody<br />
unauthorized looks at it? Who protects it from tampering? For a technical hiring manager, ask about<br />
network topology, audit rules, how they store information, who has access to what, and anything else<br />
that might seem relevant. How do the right people know the network traffic coming out of here is all<br />
legitimate? How do they maintain the encryption keys for sensitive databases? What if somebody gets<br />
inside a public-facing web server and starts querying the customer database? How would they find out?<br />
Use your creativity.<br />
Their goal is to find out about you. Your goal is to learn about how stuff works around here, or how it<br />
works with a typical customer if you’re interviewing with a company that does external pen testing. The<br />
more you find out about how things work, the more you can demonstrate your knack for finding<br />
vulnerabilities.<br />
During the whole interview process, you’re running your own verbal penetration test. Smart interviewers<br />
should recognize and appreciate it. Especially if you uncover a vulnerability. And the not-so-smart<br />
interviewers—if your questions turn them off, better to find out now they’re not serious about finding<br />
problems, rather than later.<br />
82
Does the world need you?<br />
The short answer is, yes.<br />
Here are a few statistics from fall <strong>2019</strong>.<br />
• The IT Governance blog reported more than ten billion records lost to cyberattacks in the first nine<br />
months of <strong>2019</strong>. Source: https://www.itgovernance.co.uk/blog/list-of-data-breaches-and-cyberattacks-in-september-<strong>2019</strong>-531-million-records-leaked<br />
• A 2017 Clark School study at the University of Maryland found that somebody attacked computers<br />
they exposed to the internet every 39 seconds on average. Source:<br />
https://eng.umd.edu/news/story/study-hackers-attack-every-39-seconds<br />
• My own anecdotal experience over more than fifteen years of setting up custom firewalls suggests<br />
automated probes come in from around the world at least every five seconds.<br />
• The SafeAtLast blog says ransomware attacks generated at least $1 billion in revenue for<br />
attackers and cost victim organizations more than $8 billion in 2018. Source:<br />
https://safeatlast.co/blog/ransomware-statistics/<br />
The statistics are easy to find. They tell an ugly story.<br />
But forget statistics. Just listen to Warren Buffet, when he said, “I don't know that much about cyber, but<br />
I do think that's the number one problem with mankind.” (Source:<br />
https://www.businessinsider.com/warren-buffett-cybersecurity-berkshire-hathaway-meeting-2017-5)<br />
More recently, he said, “Well, I think cyber poses real risks to humanity.” (Source:<br />
https://finance.yahoo.com/news/warren-buffett-cyber-attacks-131445079.html).<br />
Typical Pen test Engagement<br />
Great, you landed the job and now you’re leading a pen test engagement. This is when it gets real. Before<br />
going any farther, make sure everyone agrees on the scope of the project.<br />
Scoping is critical. Let’s say you’ve been asked to probe, say, the HR system, and you find something<br />
that leads to, say, Manufacturing, and you follow the lead. And then something bad happens in<br />
Manufacturing. The acronym, RGE, for “resume generating event,” comes to mind. Without proper<br />
scoping, this could be one of those events. Or worse. You’re in a position of trust, and your stated mission<br />
is to find out how to make systems break. So, make sure everyone agrees on the scope of the project,<br />
and then stay in scope. If something leads beyond the scope, protect yourself by obtaining permission<br />
before following it.<br />
The best engagements, and the ones you’ll remember forever, are the ones where you find a vulnerability<br />
so big, they have to stop the whole company to fix it. Everyone will be mad at you at first, but if you do<br />
your job right, you’ll end up a hero.<br />
83
Probe wide first, and then probe deep. Deliver your report and do it all over again.<br />
A few useful tactics<br />
No pen test would be complete without a simulated social engineering attack. Start an email campaign<br />
offering free coupons and screensavers. Email people in Accounting about bogus invoices. Email people<br />
in shipping about messed up deliveries, with a click-here-for-more link. Tell people their password is<br />
compromised and click here to update it. Spear phish a few people. Use your imagination—and then run<br />
a seminar about phishing after you catch a few.<br />
Most managers’ eyes glaze over when I talk about port scans. But it’s critical that people understand<br />
what they are, and so I try to explain it using physical metaphors. I also use the Gibson Research “Shields<br />
Up” test at https://www.grc.com/x/ne.dll?bh0bkyd2.<br />
This is how I describe it.<br />
“Don’t let the word, port, freak you out. Port might be one of the most overused words in the English<br />
language. In this context, think of a port as kind of like a topic of conversation. Maybe Alice approaches<br />
Bob and says, ‘Hey Bob, let’s talk about websites.’ Except with computers, we give topics of conversation<br />
a number. If we want to talk about websites, that’s topic number 80. Secure websites are topic number<br />
443. But we don’t use the word, topic, we call it a port, and we have room for 65,535 of them. The first<br />
1024 are well known, and no, I don’t have them all memorized. I only know a few.<br />
“Anyway, now let’s put Bob in his house and Alice knocks on the front door. That’s’ kind of what happens<br />
in computer conversations. So Alice knocks on Bob’s door and says, ‘Hey Bob, let’s talk about websites.’<br />
“If you’re Bob, you have 3 choices on what to do with that request.<br />
You can acknowledge it. ‘Sure, Alice, let’s talk about websites.’<br />
You can say no; or actively deny it. ‘No Alice, not interested.’<br />
Or you can ignore it.<br />
“What do you think is the worst of those choices? It’s actively denying it, because Bob just told Alice he’s<br />
home and doesn’t want to talk. Gibson presents those with purple ‘Closed’ buttons. You don’t want that.<br />
If you don’t have whatever Alice wants to talk about, you want to ignore it. Don’t give your adversary any<br />
feedback because they’ll use it against you.”<br />
When you’re onsite selling your service and you run this test and find those “closed” boxes, use those as<br />
a teaching tool. The customer probably has a misconfigured firewall somewhere, which means the odds<br />
are reasonable your proposed pen test will also find other problems.<br />
To run a proper port scan, every pen tester should become familiar with nmap. It’s one of the most<br />
versatile weapons in the arsenal. Here’s a tactical tip. Some firewalls “hide” after a few probes and don’t<br />
respond to anything when they detect an intrusion attempt. Work around this by using the “-T0” switch,<br />
84
which nmap calls paranoid slow. Port scans will take a long time, but will be most accurate. See the nmap<br />
documentation pages for more.<br />
After probing wide with a port scan, probe deep into anything interesting the port scan finds. There are<br />
scanning tools for pretty much every application, complete with databases of the latest vulnerabilities.<br />
When probing into systems hosted at a cloud service—and this will get more and more common—also<br />
dig into the cloud service itself. You care about the thing you’re probing, but you also care about the<br />
environment in which it lives. Maybe the cloud service around the app you’re probing will have some juicy<br />
vulnerabilities. If somebody had done that with AWS and Capital One, that would have stopped a major<br />
data breach incident before it started. But make sure you stay in scope.<br />
Whatever it is you’re probing, whether it’s in a cloud or on-premise, first find out how it works, recon it,<br />
and then poke at it to make it break. Find problems, so organizations can fix them before the rest of the<br />
world finds them. That’s what pen testers do. The world needs more of you.<br />
About the Author<br />
Greg Scott is a veteran of the tumultuous IT industry. After surviving round<br />
after round of layoffs at Digital Equipment Corporation, a large computer<br />
company in its day, he branched out on his own in 1994 and started Scott<br />
Consulting. A larger firm bought Scott Consulting in 1999, just as the dot<br />
com bust devastated the IT Service industry. A glutton for punishment, he<br />
went out on his own again in late 1999 and started Infrasupport Corporation,<br />
this time with a laser focus on infrastructure and security. In late summer,<br />
2015, he accepted a job offer with an enterprise open source software<br />
company. He is author of two novels. Bullseye Breach: Anatomy of an<br />
Electronic Break-in shows how independent IT contractor, Jerry Barkley,<br />
fought back after Russian mobsters penetrated fictional retailer, Bullseye<br />
Stores, over a busy Christmas shopping season and stole forty million<br />
customer credit card numbers. In Virus Bomb, Jerry Barkley discovers a<br />
hostile country attacking the United States over the internet as a prelude to<br />
a biological attack, and finds himself again in a position to act. Real superheroes are ordinary people who<br />
step up. Even when they don’t to. Find more information at https://www.dgregscott.com/books/. Both<br />
novels are available everywhere books are sold. He lives in the Minneapolis/St. Paul metro area with his<br />
wife, daughter, and two grandchildren. He holds several IT industry certifications, including CISSP<br />
number 358671. Greg can be reached via email at gregscott@infrasupport.com, or dregscott on Twitter.<br />
Also check out his Youtube channel, “Greg Scott Public Videos.” His author website is<br />
https://www.dgregscott.com.<br />
85
Simple Ways SMBs Can Protect Themselves against <strong>Cyber</strong>-<br />
Threats<br />
By John Ford, Chief Information Security Officer, ConnectWise<br />
It seems as if every couple of weeks or so, a major news story flashes across our screens detailing a<br />
massive data breach where thousands, sometimes millions, of users’ personal information has been<br />
stolen or exposed. What each of these have in common is that they all involve large companies. Apple,<br />
Target, Marriott, British Airways – these are just a few of the more high-profile cases over the past couple<br />
of years. Just last month, Capital One was hacked and had 100 million records stolen by a former<br />
employee.<br />
But what about the ones that don’t make the news? I’m talking about small- and medium-sized<br />
businesses (SMBs), which have increasingly come under attack in recent years. While they may not<br />
dominate the headlines, 43% of cyber-attacks target small businesses, according to the Verizon <strong>2019</strong><br />
Data Breach Investigations Report.<br />
When you think about it, this shouldn’t be all that surprising. Fortune 500 companies spend tens or even<br />
hundreds of millions of dollars every year on cybersecurity. And yet, they still have security incidents to<br />
86
eport. What chance then do SMBs, many of which do the bare minimum in terms of protection, have?<br />
Small wonder they find themselves targets.<br />
However, there are some relatively simple steps SMBs can take to protect themselves without breaking<br />
the bank.<br />
The Importance of Risk Assessments<br />
Perhaps because of the intense media attention given to massive data breaches, many SMBs operate<br />
under the impression that cyber-attacks only happen to large corporations. Believing they are in no real<br />
danger, most SMBs are completely unprepared to deal with cyber-threats. Results of more than a<br />
thousand risk assessments performed by ConnectWise’s managed service provider (MSP) partners<br />
show that 69% of SMBs – and in some cases, the MSPs themselves – have not identified and<br />
documented cybersecurity threats. Two-thirds (66%) have not identified and documented cybersecurity<br />
vulnerabilities.<br />
Similarly, SMBs are ill-prepared to deal with a cyber-attack if impacted by one. Among those thousandplus<br />
assessments cited above, almost half (48%) did not have a response plan for a cybersecurity<br />
incident, while 43% lacked a recovery plan. But SMBs need to consider the risks associated if an attack<br />
were to take place. The damage to their business can be financially and reputationally devastating, and<br />
in the worst cases could even shut them down completely.<br />
Performing a cybersecurity risk assessment – or working with an MSP to perform one – is an absolutely<br />
crucial first step any SMB should take when it comes to threat protection. The old adage, “you don’t know<br />
what you don’t know” is apt here. How can you protect yourself if you don’t know what your risks are,<br />
where your vulnerabilities lie, and how to mitigate them?<br />
If working with an MSP on a risk assessment, SMBs should make sure the MSP is aligning the<br />
assessment with a well-known framework, such as the <strong>Cyber</strong>security Framework written by the National<br />
Institute of Standards and Technology (NIST). The <strong>Cyber</strong>security Framework provides a way for<br />
organizations, including SMBs, to assess security risks and provide guidelines for identifying, protecting,<br />
detecting, responding to and recovering from cyber-threats.<br />
There’s No Substitute for Good Training<br />
Something I continue to be surprised by (and not in a good way) is the lack of adequate cybersecurity<br />
training among so many organizations. The results of our MSP partners’ risk assessments show that an<br />
alarming 57% of SMBs have not informed and trained all of their users on cybersecurity. That means<br />
either they are not doing the training themselves, or their MSPs are not performing the training for them.<br />
In some cases, the MSPs themselves may not be adequately trained.<br />
Needless to say, this is not a good trend. When companies train their employees, or their customers, on<br />
cybersecurity, they are doing them a service, and hopefully that knowledge will be passed on. In that<br />
way, effective cybersecurity training can almost be considered a social good.<br />
87
When I speak to organizations about cybersecurity, I often ask, “Were you breached yesterday?”<br />
Inevitably, I get the response, “no.” But that’s not the right answer. Unless you actually were breached,<br />
the smartest answer is “To the best of my knowledge, no.”<br />
This is more of a societal problem than anything. We have become too trusting of technology to protect<br />
us, or we let our own perceived technical knowledge get in the way of common sense. It’s why phishing<br />
attacks remain a common problem. The only way to get past it is to continually educate ourselves, our<br />
employees, our customers, on the latest cybersecurity threats. And it’s not like learning algebra in high<br />
school, resting assured that knowledge will always remain the same. Being proficient in cybersecurity<br />
means regular, remedial training to keep up with the latest threats, because they are ever evolving.<br />
Using Multifactor Authentication for Good ‘Security Hygiene’<br />
There’s an analogy I like to use when talking to customers about cybersecurity. In the eighteenth century,<br />
doctors began to discover something we all take for granted these days. They learned that washing their<br />
hands before performing surgeries and other medical procedures prevented infection and saved lives. It<br />
seems so simple, right? You don’t have to be a physician to understand that washing your hands is an<br />
easy way to prevent infection and disease. And yet, not everyone does a very good job of it.<br />
So it goes with cybersecurity. We don’t always practice good “security hygiene.”<br />
The simplest thing SMBs can do to protect themselves from cyber-threats is to enable multifactor<br />
authentication. Essentially, that means having more than just a password. Most people use it all the time<br />
and never even think about it. For instance, when logging into your bank account from something other<br />
than your primary computer, and the bank sends a text message to your phone with a code. You enter<br />
the code and you’re in. That’s all multifactor authentication is. In cybersecurity, we call it “something you<br />
have and something you know.”<br />
While there are all kinds of complex products and technologies companies use to protect themselves –<br />
many of them excellent – the fact is, most ransomware attacks can be prevented by this easy-to-deploy<br />
process. Yet, multifactor authentication has only recently become widely adopted, despite having been<br />
around close to 20 years.<br />
Closing Open Ports like Remote Desktop Protocol<br />
Many SMBs are supported by MSPs via remote desktop protocol (RDP), which is a TCP connection<br />
allowing remote execution on a machine accepting credentials from the remote user. This is a good thing<br />
from a support perspective and allows MSPs to fully manage their SMB clients proactively and<br />
rapidly. But like many good things there are some risks. Unfortunately, the bad actors in the world have<br />
tools that scan for open TCP ports, and when using an unencrypted channel, they can see when an MSP<br />
is connecting to a client via RDP.<br />
It does not take much from there for bad actors to obtain the credentials that the MSP is using to access<br />
the client. At that point, they can completely take over the client machine and disable any endpoint<br />
88
protection that was in place. They can then install ransomware or other malicious code to execute their<br />
bad intentions. What can be done to prevent this? For certain, MSPs should have multi-factor<br />
authentication enabled. But they should also be using a secure connection to the client environment to<br />
ensure that all communication between the MSP and client is encrypted.<br />
In fact, if an SMB were to do only two things to improve their security posture, multifactor authentication<br />
and closing open ports like RDP are what I would recommend. These steps are easy yet effective – just<br />
like washing your hands and locking your doors.<br />
About the Author<br />
John Ford is chief information security officer for ConnectWise. His<br />
responsibilities include ensuring security education, products and services<br />
enable ConnectWise partners to own and deliver secure solutions to their<br />
customers. John, who has more than 22 years of security and technology<br />
experience, joined the ConnectWise team in 2018. Prior to that, he served<br />
for six years as founder and CEO of Sienna Group, a leading data-centric<br />
managed security services provider that was acquired by ConnectWise.<br />
John also has held CISO and CCO roles at several large healthcare,<br />
technology and government organizations, including MCS and WellCare<br />
Health Plans. He is a board member of the Tampa Bay Cloud Security<br />
Alliance Chapter. John earned a bachelor’s degree in information systems<br />
from the University of South Florida.<br />
John can be reached online at LinkedIn and at our company website http://www.connectwise.com/<br />
89
In A World of External Threats, How Are Business Putting<br />
Themselves In Jeopardy?<br />
By Stephanie Douglas, Senior Managing Director, Guidepost Solutions<br />
Just about every possible facet of your personal information can be subject to compromise: credit card<br />
or social security numbers, social media profiles, even your actual computer or mobile device. And while<br />
those breaches can seemingly turn your life upside-down, they only affect you and the people close to<br />
you. <strong>Cyber</strong>attacks focused on large organizations, on the other hand, can affect hundreds or thousands<br />
of people’s personal information and have long-lasting effects on the company’s shareholders,<br />
customers, and reputation.<br />
Recent conversations in the media and political spheres have concentrated on threats posed by foreign<br />
countries hacking and interfering in elections. The bulk of this focus has been on the Russian government<br />
but both foreign and domestic attackers can pose a serious danger to businesses. Think back to the<br />
reputational harm that Sony Pictures suffered after a hack by North Korea in October 2014 or the 2017<br />
90
WannaCry hacking that shut down hundreds of businesses and is estimated to have cost the British<br />
1, 2, 3<br />
healthcare service more than $100 million and businesses around the globe as much as $4 billion.<br />
A cyberattack doesn’t need to make headlines in order to be devastating. The theft, resale and<br />
manipulation of both private and public information can potentially have lasting impacts to every part of<br />
our business and personal lives and the number of attacks – and the corresponding impact – continues<br />
to rise. Every day, it seems, we read about another significant breach of personal data, often from<br />
companies that we implicitly trust.<br />
Perhaps most troubling is that the methods of attack keep evolving, thwarting business leaders’ attempts<br />
to keep them at bay. It seems like there are never-ending ways for hackers to expose critical information,<br />
even when organizations have undertaken significant investments in protecting that information. As the<br />
risks evolve and become more widely known, regulators, shareholders and the general public are<br />
increasingly holding executives accountable. Aside from the obvious political concerns for the U.S.,<br />
organizations should be taking these risks seriously and be thinking through efforts to protect data and<br />
their reputations from bad actors, both foreign and domestic. While many organizations are ahead of the<br />
curve when it comes to bolstering their cyber defenses, here’s how many needlessly also put themselves<br />
at risk.<br />
Providing equal-opportunity access to sensitive information. While many developed organizations<br />
practice sound data security practices by instituting role-based access for specific parts of the<br />
organization’s network and information, some early-stage and quick-growing companies do not. For<br />
these organizations, data security protocols can be slow to take hold. An expectation that everyone other<br />
than Human Resources and Finance should have access to every part of a product code or development<br />
provides wide access to sensitive company intellectual property. Having so many or even a few<br />
individuals with access to everything is an understated risk that many companies are willing to take for<br />
the sake of collaboration or product development agility. Some of the hesitancy to make the switch to<br />
role-based access can be attributed to organizational culture, but it is often an unsustainable culture in<br />
the face of a system compromise.<br />
Self-exposing too much information. As more and more executives and companies turn to social<br />
media and professional networking sites such as LinkedIn, individuals and organizations alike can<br />
potentially further their risk exposure simply by providing access to too much employee and personal<br />
information. On company websites and social profiles, organizations often highlight personal biographies<br />
and CVs of staff, investors and board members, complete with photos and cell phone numbers. While<br />
these can be a great way to celebrate employees and emphasize expertise, this information is also<br />
commonly used in the successful social engineering and targeting of individuals.<br />
1<br />
Kang, Cecila. “Sony Pictures hack cost the movie studio at least $15 million.” Washington Post. 4 February 2015.<br />
https://www.washingtonpost.com/news/business/wp/2015/02/04/sony-pictures-hack-cost-the-movie-studio-at-least-15-<br />
million/?utm_term=.d6b8ca62782a<br />
2<br />
Field, Matthew. “WannaCry cyber attack cost the NHS £92m as 19,000 appointments cancelled.” The Telegraph. 11<br />
October 2018. https://www.telegraph.co.uk/technology/2018/10/11/wannacry-cyber-attack-cost-nhs-92m-19000-<br />
appointments-cancelled/<br />
3<br />
Berr, Jonathan. “’WannaCry’ ransomware attack losses could reach $4 billion.” CBS News. 16 May 2017.<br />
https://www.cbsnews.com/news/wannacry-ransomware-attacks-wannacry-virus-losses/<br />
91
Cell phones are also becoming a more common target for hackers. Text messages with links containing<br />
malware can be easily sent to compromise personal or business devices. While many companies find<br />
that making this information publicly available is a necessity, it’s vital that employees are aware of the<br />
risks and are trained to spot potential hacking efforts.<br />
Undisciplined social media presence and response. In today’s digital world, companies are driven to<br />
use social media to engage with customers and the general public. Social media can be vital in<br />
communicating updates and highlighting the good work done by many. But organizations often forget<br />
that competitors can also collect intelligence on them through their own social media. Businesses often<br />
take advantage of competitor information wherever they can, from insights into valuable intellectual<br />
property to information about key customers or even internal personnel or corporate financial information.<br />
New information, such the announcement of a product launch, can seem exciting to a company and to<br />
its investors; but to a competitor, it may be helpful in planning its own announcements and competing<br />
product launch.<br />
While organizations generally use social media to push out positive information, it has to be prepared to<br />
respond to negative information as well. Picture a scenario where a CEO is speaking to key stakeholders,<br />
while a disgruntled shareholder simultaneously is tweeting a long list of complaints about the CEO. An<br />
organization has to be disciplined and cautious about when and if it should respond to negative<br />
comments, even though such events can occur in a matter of minutes. Having a solid communications<br />
plan and a bit of thick skin is important to ensure the organization does not overreact and make matters<br />
worse.<br />
Employee personal social media use. Security leaders see careless or unaware employees as the<br />
number one threat to digital security, according to a 2017 survey of key security executives from 1,200<br />
companies by consultancy EY. 4 There is a fine line between free speech and irresponsible<br />
representations. Publicly available social media profiles are helpful to hackers looking to build a social<br />
engineering profile for the purpose of compromising key employees. Individual use of social media in an<br />
irresponsible manner can also subject the organization to public scrutiny and reputational impact. Having<br />
a responsible social media policy and training around its data protection and appropriate communications<br />
is helpful in navigating this sometimes-complicated issue.<br />
Today’s organizations bear a heavy burden to protect sensitive information and are spending billions in<br />
cybersecurity tools and mitigations. Specific regulatory requirements including GDPR and CCPA attempt<br />
to mandate specific efforts to protect sensitive personal information. Even if an organization is compliant<br />
with the most stringent regulations, it can still put itself at risk by its own business decisions, and that is<br />
something that should keep management up at night.<br />
4<br />
20 th Global Information Security Survey 2017-18. EY. 21 <strong>November</strong> 2017. https://consulting.ey.com/cybersecurityregained/<br />
92
About the Author<br />
Stephanie Douglas is Senior Managing Director at Guidepost<br />
Solutions. She focuses on sensitive internal investigations,<br />
white collar crime investigations, building corporate<br />
compliance programs, holistic corporate security programs,<br />
and proactively educating executives about crisis<br />
management and insider threats. She is sought after for her<br />
invaluable insight and judgment and is sensitive to the needs<br />
of business, working with corporations to identify risks, think<br />
through sensible and cost-efficient mitigations, and engage<br />
leadership with making long-term and productive corporate<br />
changes. Stephanie can be reached online at<br />
sdouglas@guidepostsolutions.com and at<br />
https://www.guidepostsolutions.com/<br />
93
Avoiding Misinformation for Content Moderators<br />
By Sarah Katz, <strong>Cyber</strong> Security Specialist<br />
Provided the controversy surrounding foreign fake news that allegedly influenced the 2016 presidential<br />
elections in countries such as France and the United States, concern over the ubiquity of this<br />
misinformation has skyrocketed in the past two years. In particular, many social media platforms, such<br />
as Facebook and Twitter, have received major backlash for failing to effectively protect their users by not<br />
monitoring fake news more closely.<br />
94
Global Information Sharing<br />
CBS News<br />
Over the past two years, social media giants have placed particular emphasis on protecting users from<br />
fake news as well as graphic violence and pornography.<br />
However, the well-known social media platforms, such as Facebook, Instagram and Twitter, sport billions<br />
of users worldwide. Therefore, the practices employed toward fake news mitigation must account for the<br />
emergence of said news in a multitude of different languages. The trouble is, there are hardly enough<br />
content moderators to spot all of this unsavory material.<br />
Unfortunately for the 2016 election era and potentially its upcoming 2020 counterpart, social media<br />
content moderation’s prioritization of extreme violence and sex leaves ample opportunity for<br />
misinformation to slip through the cracks – especially when said information appears within seemingly<br />
legitimate news stories and oftentimes in languages that the majority of moderators do not read.<br />
For Content Reviewers<br />
After verifying sources for any known blacklisted websites, a content moderator should take the next step<br />
of ensuring they can read the language in which the material appears. Even in regard to reviewing content<br />
in a language unknown to moderators, content moderation policy should implement the practice of<br />
checking for buzzwords in article titles using Google Translate.<br />
Due to the clickbait nature of the following buzzwords, content moderators should search the text in<br />
95
question for such terms in a variety of languages – namely, Chinese and Russian - so that a foreignlanguage<br />
article will not pose such a moderation barrier. 5 For languages written in different character<br />
systems, it is recommended that reviewers take note of how they appear and use their notes as a<br />
reference point when perusing news story headlines in shared articles.<br />
How to spot Misinformation<br />
As with determining the legitimacy of any webpage, moderators are encouraged to check the news<br />
source websites with the following precautionary checklist in mind:<br />
1) Pop-ups: Do multiple pop-ups and ad banners appear when trying to navigate the webpage?<br />
2) HTTP vs. HTTPS: In the address bar at the top of the webpage, does the far left read http or https?<br />
Tip: While not set in stone, https websites tend to be more secure, as their data is encrypted.<br />
3) URL Redirect: Does the article link seem to redirect to multiple different URLs before the actual<br />
destination page loads? Two optimal free tools for verifying the safety of URLs are VirusTotal and<br />
Urlquery.<br />
4) Hyperlink Match: Does the link in the address bar match the name of the website you are trying to<br />
reach?<br />
5) Typosquat: Examine the link for a typosquatted domain or URL. For example, consider facbook.com,<br />
rather than the proper facebook.com.<br />
When links become quite dangerous is when they lead to a login portal that prompts you to enter your<br />
email or social media login credentials, after which point the hacker will have access to your actual email<br />
or social media account. Once again, VirusTotal and Urlquery are invaluable free resources to safely test<br />
suspect domains and URLs before opening them on one’s machine.<br />
5<br />
Christopher, Nilesh. “Facebook's Fake News Clean-up Hits Language Barrier.” The Economic<br />
Times, 13 Apr.<br />
2018, economictimes.indiatimes.com/tech/internet/facebooks-fake-news-clean-up-hits-language<br />
barrier/articleshow/63741507.cms.<br />
96
Finally, when presented with a foreign-language news article while browsing either social media or the<br />
Internet in general, Google Translate must be used with a grain of salt.<br />
Once more, content reviewers should always cross-reference any search terms with articles from reliable<br />
news sources in their native language to ensure as best as possible that nothing is taken out of context.<br />
As certain idioms and slang can be easily lost in translation, one should never rely on Internet translation<br />
for more than one search term at a time.<br />
Conclusion: Head above Water in <strong>Cyber</strong>space<br />
The good news is, thwarting these risks does not always require a technical pedigree – simply close<br />
attention to detail and, most importantly, understanding what one is looking at and for.<br />
<strong>Cyber</strong>space is a tricky terrain. New breeds of hackers and threats are constantly evolving and many flock<br />
to social media platforms to spread fake news and malicious links. The aforementioned tips remain just<br />
a few pointers in a vast array of ever-changing techniques needed to ensure that both users and content<br />
moderators alike stay safe and properly informed.<br />
About the Author<br />
Sarah Katz is a UC Berkeley alumna, cyber security specialist and awardwinning<br />
fiction author. She earned a nomination for the 2018 Women in IT<br />
Security Champion of the Year Award for being one of a select few former<br />
Facebook content moderators willing to speak on the issue of user privacy on<br />
social media. Updates on Katz’s work in security and writing can be found at<br />
www.facebook.com/authorsarahkatz on Facebook and @authorsarahkatz on<br />
Twitter.<br />
97
How to Keep Your Customer’s Credit Card Information Safe<br />
Strong cybersecurity goes without question<br />
By John Shin, Managing Direction, RSI Security<br />
Protecting customer data is closely related to delivering a satisfying customer experience.<br />
An enjoyable meal in a beautiful restaurant actually isn’t very enjoyable at all if you catch the waiter writing<br />
down your credit card number. Customers spending money on a product usually don’t think about what<br />
might or might not happen to the data they emit about themselves online. From our physical<br />
demographics to our geographic location, whether broadcast implicitly or explicitly, social media and<br />
other app functionality gathers and stores useful data points about our lives.<br />
Small details gathered in the present can coalesce down the road to form a much fuller picture of who<br />
we are. That’s why the most effective businesses take cybersecurity seriously, especially when it comes<br />
to keeping customer data under proper lock and key. Data breaches of an e-commerce store’s credit and<br />
debit transaction information can not only be expensive for the exposed victims, but the breached<br />
business often finds itself on the line to pay for potential damages. These incidents aren’t only hard on<br />
the pocket book, but hard on a company’s public perception at the same time.<br />
While every internet-using adult in <strong>2019</strong> should have some solid cybersecurity fundamentals (not using<br />
the same password everywhere, for example), it’s rather easy for business organizations that consist of<br />
many smart people to miss the boat on cybersecurity. They might make the mistake of not considering<br />
98
cybersecurity threats seriously enough (“We don’t need to worry about that!”), or the organization may<br />
be of sufficient size that everyone thinks cybersecurity is someone else’s job.<br />
This ignorance or shortsightedness means that companies regardless of size or expertise alike have had<br />
to deal with the expensive, embarrassing ramifications, from the smallest startups to the largest global<br />
corporations, companies at every stage in the game have had to deal with the expensive, embarrassing<br />
ramifications of losing customer data like credit card numbers. But pairing education with action can right<br />
the ship.<br />
Companies implementing compliant hardware and practices will enjoy significantly increased confidence<br />
and certainty operating on an internet with bad guys on it. Discerning customers asking these companies<br />
about their data processing standards will learn that they’ve taken care and consideration to handle<br />
customer data mindfully.<br />
Use a private network or cloud-based system.<br />
This is where the rubber meets the road on taking certain base-level steps that many cybersecurity<br />
newbies simply don’t know to implement. How is data handled on your network? What kind of network is<br />
it exactly? Does everyone connect to share workspace using a virtual private network? Do you depend<br />
on a cloud-based system’s off-the-shelf solution?<br />
Encrypt the data so it’s unreadable to cybercriminals.<br />
Just like you might install a strong lock on the front door in a tough neighborhood, you should take steps<br />
to obscure the state of your network data as it pertains to your business. Encryption makes it easy for<br />
you to read and access your own data, but prohibitively difficult for other people to do the same.<br />
Breaking encryption is a much more complex matter than simply gaining illegal access to a private<br />
computer system. You can probably use a feature in a product you already depend on to enable a high<br />
degree of encryption that renders stolen information unreadable.<br />
Ensure Payment Card Industry (PCI) security compliance across your network and card payment<br />
devices.<br />
With major credit card companies processing thousands of transactions per second, you don’t actually<br />
want to be a credit card cybersecurity trailblazer. There are reliable, well-documented guidelines already<br />
99
out there on how to establish certain cybersecurity thresholds. If your business handles credit card<br />
transactions, for example, then you need to chase PCI compliance.<br />
It is probably easier to achieve PCI compliance than you think. A PCI audit, whether a casual selfassessment<br />
or formal, paid audit conducted by a third-party assessor, will provide you the actionable<br />
feedback you need to become compliant.<br />
In many instances, you may lean on the PCI compliance already afforded by certain products on the<br />
market. It’s just a matter of combining approved hardware and approved software to work together.<br />
Educate the staff on cybersecurity and compliance.<br />
Companies become what they focus on. Make niche topics about data management and security<br />
practices part of the everyday work conversation if you want it to be part of your employees’ thought<br />
process. As newer workers learn what colleagues focus on several rungs up the ladder, this eventually<br />
becomes their focus as well.<br />
Make it a point of culture that your company talks openly about cybersecurity issues, especially as they<br />
pertain to the company’s successful continued operation. This kind of rubbing people’s minds in it in the<br />
long term will build an awareness and working knowledge of the subject matter that will surely serve them<br />
whether or not their jobs are connected to handling data.<br />
There’s no better pushback against fraud than an educated staff. Make sure your people know their stuff.<br />
If you process cards in person, go for EMV readers instead of Magstripe.<br />
EMV payments are those that process a computer chip stored to one end of a credit card in order to<br />
execute, and they are a far more secure and valid way to pay than by conventional swipe of a magnetic<br />
strip. (Such casual swiping is exactly what scammers depend on in order to get a successful “skim.”)<br />
EMV payment technology makes it much harder for bad guys to steal cardholder information. These “chip<br />
cards” contain an embedded microchip and are automatically authenticated with a personal identification<br />
number entered during a transaction. This category of card payment may add time to the total transaction<br />
process, but they operate on a paradigm significantly secure than magstripe.<br />
100
There are other tactics available for companies specifically seeking to improve their credit card<br />
cybersecurity. They might truncate card data in their records to the point that transactions could be<br />
sufficiently identifiable for customer service purposes without retaining enough information to be a liability<br />
(like complete credit card numbers instead of portions).<br />
While the road to bulletproof cybersecurity is long and can be especially complex, depending on the<br />
industry an organization operates within, but it’s always a good idea to be invested in and up-to-date on<br />
the state of your cybersecurity. Moving information around online already enables wonderful things for<br />
today’s consumers, but the underlying cybersecurity involved in doing so should be a point of pride, not<br />
something for a cost-cutting company to overlook.<br />
If the ideal customer experience is the question here, then strong cybersecurity goes without question.<br />
How can a company hope to serve a customer if it can’t even keep its payment processing operations<br />
PCI compliant?<br />
About the Author<br />
My Name is John Shin and I am the managing director at RSI Security. He<br />
has 18 years of leadership, management and Information Technology<br />
experience. He is a Certified Information Systems Security Professional, CISM,<br />
and Project Management Professional (PMP). He is the principal author on<br />
multiple Internet privacy and security technology papers such as the Dominant<br />
<strong>Cyber</strong> Offensive Engagement and Supporting Technology and<br />
Reconnaissance & Data Exfiltration for U.S. Air Force Research Laboratory.<br />
Mr. Shin has 18 years of leadership, management and Information Technology<br />
experience. His area of expertise is IT security and technology management. He was responsible for<br />
external customer information systems as well as the global infrastructure operations at Abraxas<br />
Corporation, a risk mitigation technology company solely focused on the National Security Community.<br />
Mr. Shin also worked in several management positions for Genoptix Inc. (Nasdaq: GXDX) in<br />
IT/Bioinformatic division. During his tenure at SunGard, Mr. Shin operated as an operations engineer<br />
responsible for mission-critical Infrastructure and ISO-compliance system processes.<br />
John can be reached online at https://www.linkedin.com/in/john-s-504a02140/ and at our company<br />
website https://rsisecurity.com/.<br />
101
10 Best Tips for Using Metasploit to Harden Your Network<br />
By Tim Keary, Copywriter, Comparitech<br />
How do you know if your network is safe? <strong>Cyber</strong>crime is an everyday threat to companies. There is one<br />
hacking attack every 39 seconds. Some have turned to antivirus solutions or vulnerability scanners to<br />
stay protected, but these tools aren't enough. Now, you need penetration testing, as well.<br />
Penetration testing enables you to step into the shoes of an attacker and test your network for<br />
vulnerabilities. By getting there first, you can fix the issue before an attacker exploits it. Metasploit is one<br />
of the top penetration testing tools for simulating attacks. Here are 10 top tips for using Metasploit to<br />
harden your network:<br />
1. Run a discovery scan<br />
Many hackers will go on a reconnaissance effort to gather information on the target before launching an<br />
attack. They collect on the devices you're using, including the type of operating system. The information<br />
gathered is then used later on to find vulnerabilities to break into the network.<br />
Metasploit can be used to run a discovery scan, a combination of a ping scan, port scan, OS/version<br />
detection, and a data import. After completing a scan, you will have a list of IPs with information on the<br />
services running on the machine.<br />
102
You can run a Discovery Scan in Metasploit through the command prompt (which uses NMAP<br />
commands!). In this example, we're going to scan a metasploitable machine. A metasploitable device is<br />
a virtual machine with lots of vulnerabilities.<br />
To run a Discovery Scan, follow the instructions below:<br />
To begin, start the metasploitable machine you want to attack and a Windows Server 2003 machine in<br />
metasploitable. Enter the following command (with the machine IP): net addr: IP 192.168.1.101<br />
Next, start Metasploit. Enter the following command to scan in the specific IP range (in this example we’re<br />
using Kali Linux): msf > nmap -sn 192.168.1.0/24<br />
To find the OS of one of the systems listed enter the following command with the IP address you want to<br />
attack: Nmap -sV-O -T4 192.168.1.101<br />
At the bottom of the output, you will be able to see the OS the machine is running.<br />
2. Use the Help command to find a list of commands<br />
Knowing what commands you have at your disposal is advantageous when using Metasploit. While you<br />
can look online for tutorials to learn new commands, you can also use the Help command to view a list<br />
in the Terminal. To view a list of commands, enter the following command:<br />
msf > help<br />
The screen will then show a list of commands with a description. Basic commands like search, use, back<br />
help, info, and exit will help you to make your way around. Once you become more familiar with<br />
Metasploit, you can start experimenting with more advanced commands and running payloads!<br />
3. Run a vulnerability scan<br />
When trying to break into a network, an attacker is looking for a specific vulnerability to exploit. A<br />
vulnerability is an entire point that enables an attacker to gain access to a network without authorization.<br />
Running a vulnerability scan will highlight these vulnerabilities before an attacker finds them so you can<br />
remedy the issue.<br />
You can run vulnerability scans with Metasploit. The commercial version of Metasploit uses Nexpose to<br />
run a scan.<br />
First, you need to add then Nexpose console to the Metasploit user interface. You can do this by going<br />
to Administration > Global Settings > Expose Consoles > Configure a Nexpose Console<br />
103
Next, enter the IP of the server, port number, user name, and password. Press Enable.<br />
Click Nexpose and add the IP address of the network or host you want to scan.<br />
Select a Scan template to start the scan<br />
Go to Analysis > Host to view the scan results.<br />
4. Import data from a vulnerability scanner<br />
If you’re using Metasploit, then the chances are you will be using other cybersecurity tools like<br />
vulnerability scanners. Metasploit allows you to import scan data from other vulnerability scanning tools<br />
for you to examine entry points.<br />
You can import scan data from third-party vulnerability scanners like Nessus, Core, and Impact. These<br />
tools show you the weaknesses in your defenses that attackers will try to exploit.<br />
To import data:<br />
Complete a scan in NMAP<br />
Save the scan results in XML format on your desktop<br />
Open Metasploit and enter the following command: msf > db_import “path of xml file”<br />
After completing the import, the prompt will generate a Successfully imported message<br />
5. Use task chains to schedule scans!<br />
In Metasploit Pro (the paid version of Metasploit), there is a feature called Task Chains that allows you<br />
to schedule tasks and complete them automatically. You can use this feature to automatically run scans<br />
so that you don’t have to do it manually.<br />
Available tasks include; SCAN, IMPORT, MEXPOSE, BRUTEFORCE, EXPLOIT, MODULE RUN,<br />
COLLECT EVIDENCE, CLEANUP, REPORT, and WEB SCAN. To schedule a scan, do the following:<br />
Go to Tasks > Chains > New Task Chain.<br />
Enter a Task Chain Name for the task<br />
Click the + icon under Task Chain Name<br />
Select SCAN from the list of task types<br />
104
When the task configuration bullet points come up, click on the Schedule Now button<br />
When the schedule table comes up select how often you want to run the task (Once, Hourly, Daily,<br />
Weekly, Monthly)<br />
Click the Save button to save the task<br />
6. Validate vulnerabilities<br />
Whenever you complete a vulnerability scan, you will have discovered the entry points an attacker could<br />
exploit. If there are a lot of vulnerabilities, it can be difficult and time-consuming to go through the list and<br />
solve each problem one-by-one. To help make things easier, Metasploit provides a feature called<br />
Vulnerability Validation Wizard.<br />
The Vulnerability Validation Wizard ranks vulnerabilities in a list based on their risk to your network. Here<br />
you can prioritize your response and deal with the greatest risks first.<br />
To use the Vulnerability Validation Wizard follow the instructions:<br />
Open Metasploit Pro Web Console > Project > Vulnerability Validation<br />
When the vulnerability validation page comes up, enter a Project Name and a Description of the project.<br />
Press Start<br />
Click on Pull from Nexpose and check the Import existing Nexpose vulnerability data option<br />
Click the Tag tab and check the Automatically Tag by OS option<br />
Click the Exploit tab, check the Clean up sessions when done option under Sessions<br />
Click on the Generate Report tab, select the format you want to use for your report, and the sections<br />
you want to use.<br />
Press Start<br />
Once the Validation Wizard comes up, press the Push Validations button at the top right of the page<br />
You can view the results of the tested vulnerabilities by going clicking on Home > Project Name ><br />
Vulnerabilities. Exploited vulnerabilities will be marked Exploited.<br />
105
7. Use exploits to break into a device<br />
After scoping out vulnerabilities and validating them, you are ready to break into a device. To gain access<br />
to a device, you can use an exploit, a script designed for compromising a machine. In this example, we're<br />
going to try and exploit FTP:<br />
To begin, enter the following command: msf > use “exploit path”<br />
Enter the show options command to display the parameters you need to configure to run the exploit: msf<br />
> show options. RHOST and RPORT will be listed as required. RHOST is the target IP, and RPORT is<br />
the target port.<br />
To run the exploit, you will have to set a target IP address and port. Enter the following command:<br />
msf > set RHOST 192.168.1.101<br />
msf > set RPORT 21<br />
Use the run command: msf > run<br />
If a new session starts, then you will have gained access to the system.<br />
8. Use payloads to interact with the compromised system<br />
Payload is another word for a script that an attacker uses to interact with a compromised system.<br />
Attackers will use a payload to upload and execute malicious files onto the victim's system. There are<br />
many different kinds of payloads, and the kind you use depends on the type of vulnerability you intend to<br />
exploit.<br />
Attackers will use a payload that matches an exploit they found during an earlier vulnerability can. For<br />
example, if an attacker detects that you’re running a Windows Server 2003 machine, then they could use<br />
the DCOM MS03-026 vulnerability to attack you.<br />
To use a payload, follow the instructions below:<br />
Run a search command to look for an exploit or module that is effective at exploiting this vulnerability (in<br />
this example, we search for the DCOM vulnerability). Use the exploit with the best rank: msf > search<br />
dcom<br />
Now search for a list of available payloads with the following command: msf exploit (ms03_026_dcom)<br />
> show payloads<br />
106
You will see a list of Compatible Payloads ranked. You want to choose on that allows you to Upload /<br />
Execute files or one marked VNC Server (the latter lets you inject a VNC server remotely). Set the<br />
payload you want to use: set PAYLOAD payloads /path<br />
Now Set the LHOST (attacker IP), LPORT (attackers port), RPORT (victim IP), and RHOST (victim port).<br />
It should look something like this:<br />
msf exploit (ms03_026_dcom) > set LHOST 192.168.1.101<br />
msf exploit (ms03_026_dcom) > set LPORT 23524<br />
msf exploit (ms03_026_dcom)>set RPORT 135<br />
msf exploit (ms03_026_dcom)>set RHOAST 192.168.1.102<br />
Enter the following command to start a new session: msf exploit (ms03_026_dcom) > exploit You<br />
can now interact with the machine through the payload’s settings.<br />
9. Launch a brute force attack<br />
If an attacker has time to hack into your network, then they might try a brute force attack. In a brute force<br />
attack, a hacker tries all possible combinations of characters to gain access to a system and its login<br />
credentials. You can use Metasploit to simulate a brute force attack.<br />
With Metasploit, you can launch brute force attacks against the metasploitable device in a range of ways,<br />
including through FTP, Telnet, and SSH. The medium you use depends on the type of service the system<br />
is running. In this section, we're going to use FTP to attack the metasploitable device.<br />
Create an auxiliary (small script) dictionary list at the root of your Kali machine to break into the<br />
metasploitable device.<br />
In this example we will use the auxiliary/scanner/ftp/ftp_login auxiliary to launch the attack: msf > use<br />
auxiliary/scanner/ftp/ftp_login<br />
Now set the path of the file that includes the dictionary by entering the following command: msf<br />
auxiliary(ftp_login) > set PASS_FILE /root/pass.txt<br />
Then select the target IP : msf auxiliary(ftp_login) > set RHOST 192.168.1.101<br />
Now enter the run command: msf auxiliary(ftp_login) > run. If the attack has been successful, a session<br />
will launch. If it isn't, you will have failed to access the login credentials.<br />
107
10. How to Obtain Email Account Information<br />
Another risk factor that companies have to mitigate is the theft of account data. <strong>Cyber</strong>criminals are always<br />
on the lookout for email accounts to target and gain access to a network before launching an attack. You<br />
can use Metasploit to obtain email account information just like an attacker would.<br />
We can collect emails with the search_email collector module:<br />
Load the module by entering the following command: msf > use auxiliary/gather/search_email_collector<br />
Now use the show options command to view the module options: msf > show options<br />
Set a domain to collect data on: msd > set DOMAIN (Note that Google, Bing, and Yahoo<br />
email accounts will be searched for by default). You will then see a list of email addresses that have been<br />
“located.”<br />
Test Your <strong>Defense</strong>s Before <strong>Cyber</strong> Criminals Do!<br />
Putting your network under pressure with a penetration testing tool like Metasploit enables you to discover<br />
new ways to improve your defenses. Periodically addressing vulnerabilities will help to minimize your<br />
exposure and keep your network available.<br />
Don’t be afraid to hack into the Metasploitable machine to develop your skills. Just remember that once<br />
you’re ready to try live devices, you need to obtain written permission from the owner first!<br />
About the Author<br />
Tim Keary. Since 2017 Tim has been a full-time tech copywriter. Tim writes<br />
extensively on net admin topics helping businesses and entrepreneurs to keep<br />
their data protected.<br />
Our company website https://www.comparitech.com/<br />
108
How Organizations Can Best Avoid GDPR Fines through<br />
Continuous Compliance<br />
By Fouad Khalil, VP of Compliance at SecurityScorecard<br />
Since it came into force in May 2018, the EU’s GDPR has made many businesses nervous. This is hardly<br />
surprising given the recent high-profile cases that has seen the likes of British Airways and Marriott<br />
International being fined millions of pounds for non-compliance with the regulation.<br />
There is also the perception that implementing the necessary changes to comply with the GDPR will be<br />
expensive and disruptive to the running of the business. But this does not have to be the case. In fact,<br />
complying with the GDPR can improve business processes and customer engagement, as well as<br />
making the organisation’s IT network more secure. But to achieve this, organisations cannot simply install<br />
the required infrastructure and then forget about it, they need continuous compliance to ensure that they<br />
are always meeting the requirements of the GDPR.<br />
What is the GDPR?<br />
The General Data Protection Regulation protects the personal data and privacy of all citizens and<br />
residents of EU member states. This applies to any country that handles the data of users from the EU.<br />
Under the GDPR, personally identifiable information (PII) is defined as any data relating to any living<br />
person that can be used to directly or indirectly identify them. This could be name, location data, online<br />
identifiers, bank account numbers, tax numbers and so on. If an organisation is in doubt about whether<br />
the data it holds is personal or not, the failsafe position is to protect it.<br />
109
Despite the view of some that the GDPR presents a minefield of regulatory requirements that could at<br />
any minute blow up in their face, it has actually greatly improved organisations’ chances of complying<br />
with data protection laws across Europe. Before the GDPR, there were different data protection rules for<br />
each member state of the EU, meaning that businesses working across borders often had a complicated<br />
task ensuring they complied with local laws. The GDPR has helped clear this up, so that not only do EU<br />
citizens know their rights, but it is also easier for businesses to collect and use data from other EU states.<br />
A key principle of the GDPR is data security, confidentiality and integrity, part of which is that<br />
organisations must only keep the minimum amount of data necessary to their business needs.<br />
Dangers of not complying<br />
Organisations that do not comply with the GDPR risk a large fine of either four percent of their global<br />
annual turnover or 20 million euros, whichever is the greater. Regardless of these fines, just to have your<br />
name associated with a breach is bad for business and the losses are likely to be much worse.<br />
Other impacts could involve the costs of defending lawsuits, updating infrastructure and security<br />
measures, along with having to potentially pay contractors or staff overtime to get these issues resolved.<br />
Undoubtedly, the most difficult task facing any company in breach of the GDPR would be to repair its<br />
reputation as they have to try to persuade customers, investors and regulators that the situation has<br />
improved and the organisation can be trusted with data.<br />
There is also the reality that much of the compliance with GDPR is rooted in having high quality security<br />
and privacy processes in place. If these are absent, then an organisation has a higher probability of<br />
becoming victim of a cyber attack, with data necessary to the survival of the business at risk of being<br />
compromised.<br />
Therefore, achieving and maintaining compliance with the GDPR is essential for any business wishing to<br />
avoid these risks.<br />
Knowing what to address<br />
When it comes to complying with GDPR, knowledge is king. For instance, to effectively protect the<br />
personal data it holds, an organisation must know what and where this is. Therefore, identifying and<br />
classifying all personal data through enterprise wide-data mapping is essential.<br />
An organisation needs to know what risks there are to the security of its data in order to mitigate them<br />
and show it is proactively addressing any identified concerns. As such, organisations need to use tools<br />
that can scan for vulnerabilities and record remediation efforts. Aside from the obvious benefits of<br />
knowing when and where to update security and having confirmation that it has been done, having this<br />
information will satisfy auditors. If an audit discovers a potential weakness and risk to data being<br />
compromised due to a network security flaw, it will require verification that it is being remediated and<br />
there are adequate controls in place. Tangible evidence such as log files is important here.<br />
110
Alongside this, an organisation must conduct regular Data Protection Impact Assessments (DPIA), ideally<br />
at least once a year. The assessments look at all the data connected to a particular project and makes<br />
sure that all the risks are assessed. If an organisation is meeting its security obligations these risks should<br />
be minimal as there should be the necessary processes and procedures in place to minimise potential<br />
threats. Conducting data mapping before starting a DPIA is highly recommended as it will allow for the<br />
identification of all the data assets in question, including their location and how they are being used.<br />
To make sure that an organisation remains compliant it should consider automating continuous control<br />
monitoring. For example, take the task of the continuous addition of assets to the system, which all need<br />
to be checked and monitored in order to ensure compliance. By automating these typically time and<br />
labour-intensive tasks, it helps to reduce the amount of human error associated with manual processes.<br />
Securing the network<br />
Having a regular patching schedule is one of the most basic cyber security elements an organisation can<br />
implement. Many hackers exploit vulnerabilities that have not already been addressed by released<br />
patches. The patching of operating systems, software and hardware, indicates the ongoing monitoring<br />
and remediation necessary for compliance with the GDPR.<br />
Firms must apply common controls such as web application, endpoint and network security. Network<br />
security controls are critical for preventing the risk of data being stolen. Before these controls are<br />
implemented or drastically changed, the first course of action is to understand the security set up and<br />
scope of the weaknesses.<br />
When an organisation builds applications or implements changes, it must follow a security by design<br />
approach, where risk mitigation is a major consideration from the beginning of the process. Continuous<br />
compliance means ensuring security controls are implemented in the organisation’s day-to-day work.<br />
This minimises the risk of application security flaws that could let a threat actor into a network.<br />
Not only should thought be given to internal security, but also to that of third-party businesses with which<br />
the organisation is connected. An organisation can and will be held responsible for any breach of data it<br />
holds, even if they come via a weakness in the cyber defences of a third party, such as a supplier,<br />
contractor or partner. Knowing what these risks are and making the third party address them, for instance<br />
as part of a contractual agreement, can mitigate the danger of being hacked via “the backdoor”.<br />
Organisational changes<br />
Adhering to the GDPR is more than just about implementing robust security solutions. A well thought out<br />
GDPR program should be considered as an enterprise-wide process improvement initiative, introducing<br />
a new way of doing business and handling data.<br />
A mature compliance programme requires policies and procedures that create formal organisational<br />
controls that are mapped to the GDPR’s articles. Organisations need to establish governance about who<br />
111
is responsible for what processes, data and so on. In the event of a breach there must be a clear reporting<br />
process in place so that the appropriate authority can be notified without delay.<br />
Also, the creation of awareness programmes will inform staff of their responsibilities in regard to data<br />
protection and how to keep the organisation’s network and assets secure.<br />
A good starting point for organisations needing to implement a privacy compliance framework to ensure<br />
their data processing adheres to the GDPR, is to work towards achieving ISO/IEC 27001:2013<br />
accreditation.<br />
Embracing GDPR<br />
Rather than seeing GDPR as a threat, businesses should see it as an opportunity. Continuous<br />
compliance will not only help ensure the organisation stays on the right side of the regulators but could<br />
also have the benefit of improving business processes, reducing costs, and preventing costly cyberattacks.<br />
However, to achieve this, organisations need the right policies and procedures in place, combined with<br />
technology that is able to automate the mitigation, detection and recording of risks.<br />
About the Author<br />
https://securityscorecard.com/<br />
Fouad Khalil is the VP of Compliance at SecurityScorecard.He is<br />
responsible for compliance programs, auditor education and alignment<br />
with best practices. With experience in the technology space, SDLC, IT,<br />
program management and most recently IT Security and Compliance<br />
management, Khalil’s career path has provided him with keen insights<br />
in the areas of network, system and database administration, software<br />
programming and much more.For two decades, Khalil has focused on<br />
data security and compliance—an industry expert in IT, NIST, Internal<br />
Controls, GDPR, SOX, PCI DSS, HIPAA and HITECH. Khalil holds a<br />
BS in EECE from Marquette University and CISA and ITIL. Fouad can<br />
be reached online at @fkhalil65 and at our company website<br />
112
Here’s How You Can Secure Your App from <strong>Cyber</strong> Attacks<br />
By Twinkle<br />
Do you know how many people own a smartphone?<br />
Well, you'll be shocked to know that as per the research estimate the total number of mobile device users<br />
is likely to cross the mark of 5 billion by the end of <strong>2019</strong>. Yes, that's a huge number that can't be ignored<br />
under any circumstances and that includes cybersecurity too!<br />
There are a significant number of app developers and app owners who don't consider security to be a<br />
vital factor while building a mobile application. According to a research report by Gartner, it was revealed<br />
that around 75 percent of the mobile apps are not able to make it through the basic security tests.<br />
Today, we as users are addicted to our smartphones and rely on mobile applications to get our day-today<br />
activities done such as ordering food online, instant shopping, online banking and much more. Due<br />
to this, the risk of falling victim to one of the cyber-attacks is quite high.<br />
113
Effective Ways to Protect Your Mobile Apps<br />
That’s why in this article on mobile app security, we will be sharing some of the most essential<br />
cybersecurity tips on how you can secure your mobile apps from cyber attacks.<br />
1. App Wrapping<br />
The term app wrapping can be defined as a methodology that basically segments a mobile application<br />
from the rest of the mobile device by capturing it in a secure environment.<br />
Here, the app developers will automatically get the option of app wrapping if they are using the MDM<br />
provider. All you need to do is set a couple of parameters and once that is done, your application won't<br />
be requiring any additional coding for the process of segmentation.<br />
2. Enhanced Authorization<br />
Without having strong user authentication, your mobile app won't be able to stay secure for long. App<br />
developers need to strengthen the authorization for users in their applications if they want their app to<br />
not only survive but also thrive in the market.<br />
A basic 'Who are you?' can help app developers in securing their applications against online malware<br />
and viruses. For an advanced level, user authentication must include various aspects such as session<br />
management, the privacy of a user, the online identity and the security features of a device.<br />
For this purpose, there are many technologies available in the market, some of the best being the OAuth<br />
2.0 authorization framework and the OpenID Connect protocol.<br />
3. Securing the APIs<br />
Another way to secure your mobile app is by applying security to the APIs that are being used in their<br />
app development process. As an API is an extremely beneficial tool, it plays an important role in<br />
managing all the data of the app along with the business logic.<br />
For APIs, app developers should include an app-level authentication like SSL with 256-bit encryption,<br />
this will ensure that user validation is done every time a service is used by someone.<br />
4. Implementing the ATS<br />
ATS also known as App Transport Security, can come in handy for securing mobile apps if implemented<br />
correctly by app developers. In other words, app developers can apply ATS to prevent the app from a<br />
114
potential cyber-attack. The purpose of the ATS here is to ensure a secure connection between the app<br />
and the back-end server.<br />
Final Thoughts<br />
Nowadays, mobile app security is one of the most vital aspects of developing an application that app<br />
developers need to consider during every step of the development process.<br />
Mobile apps that are insecure can fall prey to online hackers that can misuse the sensitive information of<br />
a user, such as financial information. The above-mentioned practices that prove to be of great help in<br />
securing your mobile apps and users' crucial data as well.<br />
About the Author<br />
Twinkle is the product head of MobileAppDaily and keeps a close eye on the<br />
latest and trending tech releases. With her wise taste of the tech industry, she<br />
has single-handedly created recognizable brand image.<br />
115
Sovereign <strong>Cyber</strong> Effects Provided Voluntarily by Allies<br />
(SCEPVA)<br />
The Devil is in the Kilobyte<br />
By Wiesław Goździewicz, Expert, Kościuszko Institute<br />
NATO has gone a long way in development of its<br />
policy on cyber operations. The three most<br />
recent Summits in Wales (2014) Warsaw (2016)<br />
and Brussels represent true milestones in this<br />
regard. In Wales,. Allies confirmed (a year ahead<br />
of the 2015 UN GGE Consensus report) full<br />
applicability of International Law to cyberspace.<br />
This would also include International<br />
Humanitarian Law (IHL) or the Law of Armed<br />
Conflict (LOAC). Inclusion of IHL/LOAC in this<br />
declaration is particularly important, as during<br />
the Wales Summit NATO has also declared that<br />
cyber incident of certain gravity may be<br />
considered as an armed attack and trigger an<br />
Article 5 (collective defence) response by the<br />
Alliance. Thus, NATO confirmed hat cyber<br />
defence is part of NATO's core task of collective<br />
defence.<br />
Another breakthrough happened during Warsaw<br />
Summit two years later. <strong>Cyber</strong>space has been<br />
considered as an operational domain, equivalent<br />
to air, land and sea. Member Nations have been<br />
called upon to build their cyber defence<br />
capabilities as efficient as those for the “physical”<br />
domains. This was reflected in the <strong>Cyber</strong><br />
Defence Pledge adopted during Warsaw<br />
Summit. The Pledge reaffirmed that obligations<br />
under Article 3 of the Washington treaty (building<br />
defence capabilities both individually and in<br />
116
cooperation with other Allies) also apply to cyber<br />
defence capabilities. The Allies also pledged to<br />
strengthen and enhance the cyber defences of<br />
national networks and infrastructures as a matter<br />
of priority, as well as to improve its resilience and<br />
ability to respond quickly and effectively to cyberattacks.<br />
As a follow-up from the decisions made in<br />
Warsaw, the North Atlantic Council adopted a<br />
10-point “<strong>Cyber</strong> as a Domain Implementation<br />
Roadmap”, which addresses the requirements to<br />
adopt e.g. doctrine and policy, trainings and<br />
exercises, operations planning and strategic<br />
communications (also as part of cyber<br />
deterrence). It also called for the revision of<br />
NATO Rules of Engagement for these to<br />
address the specificities of cyberspace<br />
operations. Delivery of the Roadmap is very<br />
advanced, with certain requirements already<br />
met. However, from an operational perspective,<br />
the most important aspects of the Roadmap are<br />
the integration of cyber effects and the cyber<br />
doctrine development as they are closely related<br />
to each other.<br />
<strong>November</strong> 2017 Defence Ministerial brought the<br />
decision to integrate Allies’ national cyber<br />
capabilities into NATO missions and operations.<br />
While nations maintain full ownership of those<br />
capabilities, just as Allies own the tanks, the<br />
ships and aircraft in NATO missions, cyber<br />
capabilities offered by them in support of Allied<br />
Operations and missions are to remain under<br />
strict political oversight and within the remits of<br />
compliance with International Law.<br />
Most recent Brussels Summit brought significant<br />
momentum into the process of NATO’s<br />
adaptation to contemporary security challenges,<br />
including cyber. Adopted and reinforced NATO<br />
Command Structure now includes the<br />
<strong>Cyber</strong>space Operations Centre (CyOC). Being<br />
‘eyes and ears’ of the respective commanders in<br />
cyberspace, the CyOC is supposed to enhance<br />
situational awareness in cyberspace and help<br />
integrate cyber into NATO’s planning and<br />
operations at all levels. It will not be a cyber<br />
command centre as there will not be any<br />
supranational command. While the CyOC is to<br />
operate within the existing NATO frameworks, its<br />
main aim is to equip the Supreme Allied<br />
Commander Europe (SACEUR) with all the<br />
necessary tools to operate in cyberspace. As will<br />
be discussed below, CyOC is responsible for<br />
coordinating Sovereign <strong>Cyber</strong> Effects Provided<br />
Voluntarily by Allies (SCEPVA). Second main<br />
task of the CyOC is to provide situational<br />
awareness and coordination of NATO<br />
operational activity within cyberspace.<br />
The SCEPVA mechanism can be considered as<br />
cutting the Gordian knot of dilemmas related to<br />
the use of offensive cyber capabilities by NATO.<br />
Dilemmas, NATO has struggled with since the<br />
adoption of the first cyber defence policy in 2008:<br />
how to address cyber threats, including those of<br />
military character, without resolve to offensive<br />
cyber means and capabilities, which for many<br />
years have been considered<br />
as a kind of taboo. The Alliance, in its efforts to<br />
keep the moral high grounds, has been<br />
condemning state and non-state actors for the<br />
use of broad range cyber capabilities against<br />
NATO and its member states, from purely<br />
criminal, through terrorist and in support of<br />
hybrid activities, to offensive use of military cyber<br />
capabilities such as the ones Russia exercised<br />
against Georgia in 2008.<br />
At the same time, officially the Alliance has<br />
interpreted its defensive mandate and purpose<br />
in an overly restrictive manner by claiming that in<br />
cyberspace, NATO shall only exercise defensive<br />
operations, thus even preventing active cyber<br />
defence under NATO “umbrella”. This seemed to<br />
be a significant shortfall and disadvantage<br />
compared to both the “physical” domains and<br />
potentially adversarial actors. At the same time,<br />
certain NATO Member States have openly<br />
117
declared that they would develop offensive cyber<br />
capabilities (of note: the U.S. declared<br />
cyberspace as an operational domain already in<br />
2008).<br />
Such an approach to cyber capabilities had no<br />
logical rationale behind it. NATO has never<br />
funded<br />
a common armament programme meant at<br />
development of offensive capabilities. All such<br />
programmes have been of a non-offensive<br />
nature: Intelligence, Surveillance and<br />
Reconnaissance (ISR), strategic airlift, Airborne<br />
Early Warning and Control (AWACs), etc. Yet<br />
again, nobody had doubts that defensive<br />
mandate does not preclude, should not preclude,<br />
the development of offensive capabilities by<br />
individual Member Nations or collectively by<br />
them. Defence capabilities must include<br />
offensive means: howitzers, tanks, attack<br />
aircraft, cruise missiles etc. And NATO on<br />
numerous occasions has reached to its<br />
members for such capabilities to be provided<br />
(the best example is the 1999 operation “Allied<br />
Force”, which was not defensive, but purely a<br />
peace enforcement operation).<br />
Thus, the decisions to prevent active cyber<br />
defence or the possibility to use offensive cyber<br />
capabilities, have been a significant limiting<br />
factor for those, who had been tasked to plan<br />
certain Allied operations and missions.<br />
Moreover, given the fact that after Wales Summit<br />
in 2014 NATO mad it clear that a grave cyber<br />
incident might be considered as an armed attack<br />
and trigger an Article 5 response, theoretically<br />
NATO would only be able to respond<br />
“conventionally”, “kinetically”. While a responsein-kind<br />
is not required under International Law in<br />
case of an armed attack, one has to remember<br />
that national self-defence has to be imminent,<br />
proportionate and necessary.<br />
There is no doubt that cyber means or methods<br />
of warfare, or more broadly – cyber capabilities<br />
– are not by nature illegal. Moreover, they can be<br />
used in a manner that fully complies with the<br />
requirements of International Law. One could<br />
argue, that in terms of LOAC compliance, if used<br />
properly, cyber means can be the most<br />
discriminate, the most humane and the most<br />
proportionate means and methods of warfare.<br />
Response with cyber means to a cyber attack<br />
might also (in certain circumstances) be<br />
considered as those who best fulfil the<br />
requirements of proportionality and necessity of<br />
acts in self-defence.<br />
Since NATO des not develop offensive cyber<br />
capabilities (but neither does it for “conventional”<br />
domains) and for any offensive capabilities the<br />
Alliance has to reach out to its Member States,<br />
given the long-standing practice of “NATO does<br />
not go offensive in cyberspace”, the SCEPVA<br />
mechanism seems to be the only solution to the<br />
theoretically unsolvable problem: how to<br />
efficiently defend the Allies in all domains (incl.<br />
cyberspace) without “going offensive in<br />
cyberspace”. <strong>Cyber</strong>-capable Nations may be<br />
requested to deliver offensive cyber effects on a<br />
target designated by an operational-level<br />
commander. And it will be the CyOC who is<br />
going to be responsible for matching the<br />
expectations of the commanders with the<br />
willingness and capabilities of the nations<br />
potentially able to deliver such effects.<br />
Officially, NATO will not be “going offensive in<br />
cyberspace”, while being able to apply all<br />
instruments of military power, all spectrum of<br />
effects. Such a solution does not come without a<br />
price, though.<br />
Firstly, the operational-level commanders who<br />
normally “own” the targeting process and decide<br />
which effects to deliver on a given target and<br />
how to deliver the effect, will not be able to task<br />
any nation to provide such effect. As opposed to<br />
“conventional” means and capabilities, cyber<br />
effects will not be handed over to the<br />
118
operational-level commander, as opposed to<br />
other means and capabilities, which upon<br />
appropriate transfer of authority will fall under the<br />
NATO commander’s command and control. And<br />
even if the effect is delivered upon operationallevel<br />
commander’s request, nation delivering it<br />
will do it on a “I will tell you what I can do, but not<br />
how”. That’s the meaning of the word<br />
“Sovereign” in the SCEPVA construct.<br />
Secondly, there might be no nation willing to fulfil<br />
the request, even if there were Allied Nations<br />
able to or capable of fulfilling it. For several<br />
reasons, including the desire to retain certain<br />
capabilities for own use, strategic purposes, etc.<br />
That’s the meaning of the word “voluntarily” in<br />
the SCEPVA construct.<br />
Last, but not least, it still has to be determined,<br />
where responsibility would lie for potential<br />
internationally wrongful use of such cyber<br />
effects. For example, if as a result of the use of<br />
SCEPVA, excessive incidental losses occur,<br />
thus constituting the breach of the LOAC<br />
principle of proportionality, which nation would<br />
bear the responsibility? Nation voluntarily<br />
delivering the cyber effect? Or the Sending<br />
Nation of the operational-level commander<br />
requesting such an effect to be delivered? Or<br />
perhaps the Sending Nation of the Staff Officer<br />
proposing the employment of SCEPVA on this<br />
particular target in the course of the target<br />
nomination/approval process?<br />
Indeed, the devil is in the detail. When it comes<br />
to SCEPVA, the details can be broken down to<br />
kilobytes. How many devils would fit into a<br />
kilobyte?<br />
About the Author<br />
wieslaw.gozdziewicz@gmail.com; https://ik.org.pl<br />
Wiesław Goździewicz is a retired Polish Navy officer, a lawyer<br />
specialised in Public International Law, in particular legal<br />
aspects of military operation. Expert of the Kościuszko<br />
Institute in the field of cybersecurity, dealing mainly with legal<br />
aspects thereof. Former Legal Advisor of the NATO Joint<br />
Force Training Centre in Bydgoszcz, Poland. Speaker among<br />
others at the European <strong>Cyber</strong>security Forum and Warsaw<br />
Security Forum, guest lecturer of the Polish Naval Academy,<br />
War Studies Academy in Warsaw, Nicolaus Copernicus<br />
University in Torun and NATO School Oberammergau.<br />
119
How <strong>Cyber</strong>security Became a Major Issue for Your Business’<br />
SEO<br />
By Chester<br />
<strong>Cyber</strong>security is no longer a niche issue that you can afford to ignore. Every year, half of all businesses<br />
report being hacked, and this can cause huge problems with the smooth running of organisations. But<br />
you might not realise that one of the big issues that cyber breaches effect is search engine optimisation<br />
(SEO).<br />
In the past you might not have thought about the link between cyber security and SEO, but it has now<br />
become a very large problem. In this article we take a look at how your business’ SEO efforts could be<br />
put at risk by cyber breaches, as well as looking at what you can do to mitigate risk.<br />
The problem of downtime<br />
One of the major issues that a cyber breach can cause for your site is downtime. Not only can a cyberattack<br />
take your website offline, you may also need to have further time without your website live in order<br />
to fix the issue. But lengthy periods of downtime can be a nightmare from an SEO perspective.<br />
120
When Google sees that your site is down, it recognises that you are having problems. If this is only for a<br />
short period of time, it is unlikely to have a negative effect. But Google’s sophisticated algorithm<br />
understands that if a site is down for an extended period, there are more serious problems.<br />
Google hacked site warning<br />
When Google notices that a website has been compromised, it will often display warning text in its listings.<br />
This warning text reads: “This site may be hacked”. If you see this text against your site, then Google<br />
believes that you are having a cyber security problem.<br />
Once again, in terms of SEO this is bad news, as user behaviour is taken into account by Google’s<br />
RankBrain algorithm. When users see a hacked site warning, they are less likely to click on your listing.<br />
Site reviews<br />
Did you know that reviews about becoming important as a ranking factor under Google’s algorithm?<br />
Google likes to see sites getting positive reviews, and is concerned when a site gets a lot of negative<br />
ratings. This is where a cyber attack can impact your SEO.<br />
If your site is hacked then users are more likely to give a bad review due to the issue. As these negative<br />
ratings build up, they can see your site fall in the rankings.<br />
Common cyber-attacks that could damage your SEO<br />
There are many ways that cyber criminals might attempt to compromise your site, all of which can have<br />
the kind of impact on SEO that has been mentioned above. Here we will take a look at some of the most<br />
common cyber attacks that can damage SEO – as well as what you can do to defend your business<br />
against them.<br />
• WordPress plugins and extensions – one of the first things to consider when a site has been<br />
hacked is whether this is due to outdated software. As WordPress is so popular, it is a very<br />
common choice for cyber criminals who can take advantage of plugins that have not been updated<br />
to their latest version. Of course, this is one cyber security issue that can dealt with easily – allot<br />
time for plugins and extensions to be updated on a regular basis<br />
• Phishing – unfortunately it is still the case that your members of staff are often the unwitting<br />
reason that your site is hacked. Staff can fall for phishing attacks such as emails that direct them<br />
to spoofed sites – these are then used to steal their details. The key here is the need to provide<br />
your staff with adequate training.<br />
• Bots – another very common form of cyber attack is trough malicious bots that are designed to<br />
bypass your perimeter defences. A bot attack can take your website down entirely, or you might<br />
face performance issues. Malicious bots can be difficult to defend against, and will require<br />
specialist assistance from cyber security professionals.<br />
121
Ultimately, cyber security has now become an issue that highly relevant to your SEO efforts, and this<br />
needs to reflect in the amount of time and budget you put into your security work. This is the only way to<br />
minimise the risk that you could be hacked, and that this hack could burden your optimisation.<br />
About the Author<br />
Chester is an independent cybersecurity specialist. Chester Avey has<br />
over a decade of experience in business growth management. He<br />
enjoys sharing his knowledge with other like-minded professionals<br />
through his writing. Find out what else Chester has been up to on<br />
Twitter:<br />
Chester Avey can be reached online at chesteravey@outlook.com &<br />
@Chester15611376.<br />
122
How to Erase Data from Mobile Devices: Four Common<br />
Misconceptions<br />
By Mark Dobson, ITAD Specialist,NextUse<br />
When you’re about to retire dozens or hundreds of your employees’ mobile devices, you don’t want the<br />
company data stored on them to end up in the hands of your competitors or criminals.<br />
“Companies tend to overlook IT asset disposition as their mobile devices reach end-of-life,” according to<br />
Jeff Londres, founder and CEO of NextUse, a certified ITAD company. “This misstep not only puts them<br />
at risk of a data breach, but it also means their assets lose residual value from resale. Cell phone values<br />
drop the older a model gets, but they may still be worth decent money even going back several versions.”<br />
Here are four commonly misused steps that will NOT wipe the data off those devices:<br />
1. Reset the phone to factory settings<br />
123
• This doesn’t actually erase any data, it simply removes your ability to see and access it,<br />
just like the way reformatting a hard drive on a desktop or laptop computer clears the File<br />
Allocation Table (FAT)<br />
• The data can be retrieved by recovery software<br />
• Data on SD cards and SIM is not affected<br />
• Numerous studies have shown the ineffectualness of this method<br />
2. Pull the Subscriber Identification Module (SIM card)<br />
• The SIM stores subscriber information to enable communication between the phone and<br />
its carrier<br />
• It only contains up to 128 KB of memory to store things like contacts, phone numbers, text<br />
messages, data usage and billing information<br />
3. Pull the Secure Digital micro (SD) card expansion memory<br />
• This only eliminates the data stored on that removable media<br />
• It leaves all the data stored on the device’s internal flash memory storage, which can range<br />
from eight to 256 gigabytes<br />
4. Select the cheapest IT asset disposition vendor for resale or recycling<br />
• Recyclers and resellers may incorrectly assume that one or more of the above methods<br />
is adequate before selling your phone and all its data on the secondary market<br />
• A vendor without the proper data security/destruction certifications and oversight can be<br />
doing anything with your company’s valuable data<br />
One Easy Way to Erase Data from Your Company’s Retired Mobile Devices<br />
To keep your company’s data from falling into the wrong hands, choose a specialized ITAD vendor that<br />
is certified specifically in data security and destruction of all data-bearing IT assets, and has oversight<br />
from a certifying body including random audits both at their facilities and onsite with clients.<br />
To keep your company’s data from falling into the wrong hands, choose a specialized ITAD vendor that<br />
is certified specifically in data security and destruction of all data-bearing IT assets, and has oversight<br />
from a certifying body including random audits both at their facilities and onsite with clients. Look for a<br />
company with multiple digital data destruction certifications from the National Association for Information<br />
Destruction (NAID), the recognized gold standard in the industry. Although there are around a thousand<br />
NAID AAA-certified vendors globally, only a handful have certification for all destruction methods of all<br />
drive types both at a company’s site and at the vendor’s facilities.<br />
Remember, using a slightly cheaper R2 or e-Stewards certified recycler instead of a NAID AAA-certified<br />
data destruction partner can put you at risk of an expensive data breach, the average of which is now<br />
almost $4 million.<br />
124
About the Author<br />
Mark Dobson is an ITAD Specialist at NextUse. Mark is an<br />
accomplished subject matter expert with over two decades of<br />
experience and expertise in the sales and marketing of information<br />
technology hardware, software, and services, copywriting, and<br />
copyediting. As an “IT savant,” he understands the business benefits<br />
and positioning of current, new, and cutting-edge technologies in order<br />
to enable businesses to increase market share and revenue. Mark<br />
specializes in highly sophisticated and new technology concepts such<br />
as the Internet of Things, artificial intelligence, machine learning, natural<br />
language processing, software-defined networking, data centers, and<br />
infrastructure, gamification, etc.<br />
Mark can be reached online at mark.dobson@nextuse.us and at our company website<br />
https://www.nextuse.us<br />
125
Secure Data Is Gold: U.S. Immigration Options for<br />
<strong>Cyber</strong>security Experts<br />
By Lin Rose Walker, Esq. and Scott R. Malyk, Esq.<br />
A decade ago, very few people outside of the Information Technology (IT) industry knew what<br />
cybersecurity was or even considered it something worth worrying about. Many of us naively believed<br />
that with the right passwords, encryption software and firewalls, our data and information would be<br />
secure.<br />
In recent years, however, our world has become far more technologically advanced and, as a<br />
consequence, technologically dependent. Nearly every occupation and industry has developed uses for<br />
data, whether it be used for artificial intelligence, machine learning, CRM or other applications, whether<br />
it is banking, retail, pharmaceutical, medical, oil &gas, agricultural or elsewhere.<br />
Because the collection, processing and use of data has become such a valuable asset for so many<br />
companies and industries, we are experiencing a generational shift in computing, with nearly every<br />
company, small and large, seeking to move networks, servers, data warehouses and virtualization<br />
software functions and components to a cloud-based infrastructure. Indeed, a company’s adoption of<br />
cloud-based technology, with appropriate safeguards, has become first priority for most Chief Information<br />
Officers (CIOs), thus, skyrocketing the use for cloud technology.<br />
126
With this major shift to cloud-based computing, it’s no surprise that cyber vulnerabilities within cloud<br />
technology are also on the rise. So, in addition to migrating to the cloud in order to provide innovative<br />
services that enhance business and drive transformations, CIOs must also be cognizant of the evergrowing<br />
cybersecurity threats to such cloud-based technologies.<br />
While these advances in data and technology have made our lives easier in many respects, they have<br />
also created significant opportunities for individuals and organizations to use the same technology to<br />
commit cybercrimes. Although cybersecurity is neither a new or emerging field, there has been something<br />
of a collective epiphany in the United States regarding the essential and significant role it plays in our<br />
everyday lives, particularly since 2016. Since that time, there have been daily reports of cybersecurity<br />
crimes, ranging from denials of service, to hacks and breaches of personal, financial and confidential<br />
information, to election meddling. Some of the most noteworthy examples of these damaging crimes<br />
include:<br />
• September 2017 – Equifax announced a data breach that exposed the personal information of<br />
147 million people in the United States;<br />
• March <strong>2019</strong> – Capital One Bank experienced a data breach that exposed the personal information<br />
of nearly 106 million of the bank’s customers and credit card applicants;<br />
• April <strong>2019</strong> – Facebook experienced a data breach that exposed 540 million user records on<br />
Amazon’s cloud computing service; and<br />
• June <strong>2019</strong> – American Medical Collection Agency, a third-party billing collections firm which<br />
provides services for LabCorp and Quest Diagnostics experienced a data breach in which the<br />
personal, financial and medical data of 7.7 million LabCorp patients and 12 million Quest<br />
Diagnostics patients were disclosed.<br />
• August <strong>2019</strong> – Twitter CEO Jack Dorsey’s Twitter account was hacked on August 30 by a group<br />
that calls itself the Chuckle Squad. The hackers tweeted racial slurs, antisemitic messages and<br />
at least one Holocaust denial from Dorsey’s account.<br />
In addition to these hacks and breaches, the use of ransomware has dramatically increased as well.<br />
Ransomware is a type of cyberattack that encrypts a computer’s files (and makes unavailable to the<br />
owner/user of such data), in which the owner/user of the data must pay the attacker a “ransom” often in<br />
bitcoin or some other untraceable cryptocurrency to release the files. Since 2013, more than 170 U.S.<br />
county-, city- and state-government systems have been attacked using ransomware, including at least<br />
45 law enforcement offices. (https://www.cnn.com/<strong>2019</strong>/05/10/politics/ransomware-attacks-uscities/index.html)<br />
Most recently, on August 20 th , the State of Texas reported that twenty-three (23) towns<br />
127
were struck by a coordinated ransomware attack. (https://www.cnbc.com/<strong>2019</strong>/08/19/alarm-in-texas-as-<br />
23-towns-hit-by-coordinated-ransomware-attack.html)<br />
The prevalence of cybersecurity crimes, and their significant impact, became abundantly clear in the<br />
wake of the 2016 Presidential election, which experienced malicious hackings and massive breaches of<br />
campaign voter data, including hacking of election systems. (https://cdt.org/issue/internetarchitecture/election-cybersecurity/)<br />
As our election and voting systems become more data-driven and<br />
electronic, our nation becomes more susceptible to such cyberattacks, which have and will continue to<br />
impact our voting practices and democratic norms.<br />
(https://www.washingtonpost.com/news/powerpost/paloma/the-cybersecurity-202/<strong>2019</strong>/07/15/thecybersecurity-202-here-s-an-overlooked-election-cybersecurity-danger-outdatedsoftware/5d2bc0321ad2e552a21d53d4/)<br />
In an effort to protect our financial, personal, medical, and otherwise confidential or personal data, as<br />
well as our election systems, we need to continue to attract and employ the services of the most qualified<br />
cybersecurity experts from around the world. However, at present, there is a dire shortage of such<br />
qualified experts in the United States. On January 10, <strong>2019</strong>, Jon Oltsik, Chief Security Officer of<br />
Enterprise Strategy Group (ESG) and a world renowned cybersecurity expert wrote:<br />
At the end of each year, ESG conducts a wide-ranging global survey of IT professionals, asking<br />
them about challenges, purchasing plans, strategies, etc. As part of this survey, respondents were<br />
asked to identify areas where their organization has a problematic shortage of skills.<br />
In 2018-<strong>2019</strong>, cybersecurity skills topped the list — 53 percent of survey respondents reported a<br />
problematic shortage of cybersecurity skills at their organization. IT architecture/planning skills<br />
came in second at 38 percent.<br />
The cybersecurity skills shortage is nothing new. Alarmingly, the cybersecurity skills deficit has<br />
held the top position in ESG’s annual survey every year... Furthermore, the percentage of<br />
organizations reporting a problematic shortage of cybersecurity skills continues to increase.<br />
****<br />
Now, people like me have been talking about the cybersecurity skills shortage for years, and there<br />
are a lot of worthwhile industry and academic programs in place to address this issue. Despite<br />
these efforts, however, research from ESG and others indicates that the cybersecurity skills<br />
shortage is getting incrementally worse each year. (Emphasis added.)<br />
128
(https://www.csoonline.com/article/3331983/the-cybersecurity-skills-shortage-is-gettingworse.html)<br />
Our technology and data infrastructure need significant work to keep them safe from hacks, breaches<br />
and ransomware attacks, but there are simply not enough qualified professionals in the U.S. to fill this<br />
need. In this regard, our business leaders and corporations must be open to recruiting and retaining<br />
qualified foreign nationals who possess the requisite skills, education and expertise to perform these<br />
duties.<br />
In addition to the standard-issue H-1B and L-1B visa classifications, there are a variety of immigration<br />
options available to U.S. employers who seek to hire foreign nationals with cybersecurity expertise. One<br />
of these options is the O-1A nonimmigrant classification for individuals of extraordinary ability in the<br />
sciences or business. This often overlooked nonimmigrant visa classification is available to a foreign<br />
national who can demonstrate a level of expertise among a small percentage who have risen to the top<br />
of the field. Individuals who have made original, documented contributions to the field, as evidenced by<br />
patents and/or publications, and have served as the judge of the work of others (journal reviewers/editors)<br />
or in essential/critical capacities can readily qualify for the O-1A visa classification.<br />
Another option available, which leads to permanent resident status in the United States, is the National<br />
Interest Waiver (NIW) petition. NIW petitions are typically granted to those who have exceptional ability<br />
and whose employment in the United States would greatly benefit our nation. <strong>Cyber</strong>security has proven<br />
to be an endeavor that is in the national interest of the United States. Thus, individuals seeking a NIW<br />
can establish exceptional ability through documented evidence confirming that they possess at least a<br />
Master’s degree in a specialized field of study related to cybersecurity; possess at least ten (10) years of<br />
full-time employment experience in the field of cybersecurity; are recognized for their achievements in<br />
cybersecurity; and have publications in the field.<br />
It is clear from the daily reports of cybersecurity crimes, that our nation is in dire need of cybersecurity<br />
experts who possess the resources and advanced knowledge, skills and experience required to combat<br />
these crimes. In this regard, as there is currently a shortage of U.S. workers who possess these qualities,<br />
U.S. corporations and governmental agencies should consider thinking “outside the box” as it relates to<br />
these immigration options in order to attract and recruit foreign nationals with this expertise.<br />
While there are many immigration options available for both temporary and permanent employment of<br />
cybersecurity experts, it is best to plan ahead and consult with an attorney in advance to identify which<br />
options best meet the goals of U.S. employer, the foreign national and most importantly, the national<br />
interests of our country.<br />
129
About the Authors<br />
Lin R. Walker and Scott R. Malyk are attorneys with<br />
Meyner and Landis LLP’s Immigration Law Group,<br />
specializing in all aspects of corporate and businessrelated<br />
US immigration law. Walker and Malyk<br />
represent a diverse group of corporate and individual<br />
clients in a variety of industries, with a special emphasis<br />
on researchers, developers, architects, engineers, data<br />
scientists and business people in the high tech industry<br />
nationwide, which includes individuals whose work is in<br />
the national interest of the United States.<br />
130
<strong>Cyber</strong>security Essentials for Small and Medium Businesses<br />
Protect your business from hackers by knowing some of the top cybersecurity essentials you should<br />
adapt within your organization.<br />
By Alex Hunter, Business Development Representative, ImageWare Systems<br />
Both government agencies and big companies like Target have been known to fail when it comes to<br />
maintaining cybersecurity. This makes small-to-medium-sized enterprises (SMEs) even more vulnerable<br />
when it comes to data breaches.<br />
<strong>Cyber</strong>criminals commonly attack SMEs because of their laxer cybersecurity measures. New business<br />
owners from various industries often have little to no knowledge of cybersecurity solutions and tend to<br />
make it the least of their priorities when starting. This is why many hackers and other types of<br />
cybercriminals target them.<br />
In fact, research from the US Congressional Small Business Committee indicates that 71% of<br />
cyberattacks occurred at companies with less than 100 in the workforce. To add, Verizon’s <strong>2019</strong> Data<br />
Breach Investigations Report found that over 43% of system breaches have affected small businesses.<br />
This is a cause for alarm, after considering the report published by the US National <strong>Cyber</strong> Security<br />
Alliance suggesting that approximately 60% of all small businesses fold up within six months following a<br />
major cybersecurity attack.<br />
131
Fortify your cybersecurity by looking out for the most common types of attacks<br />
<strong>Cyber</strong>criminals often tend to go for accessing sensitive business data like your clients’ identifying private<br />
information (names, birthdays, employment details, etc.), credit card data, and other info they can use to<br />
exploit your cyber vulnerability. Know some of the most common potential cyberattacks that can occur in<br />
today’s connected world.<br />
• Malware<br />
Shorthand for "malicious software,” malware refers to any software or program including worms, Trojans,<br />
spyware, and ransomware. When an attacker encounters vulnerable networks, they often enable<br />
unauthorized access to unknowing victims’ devices.<br />
• Phishing<br />
Hackers collect sensitive information such as credit card specifics and login credentials via fraudulent<br />
websites packaged to look authentic. Users are sent emails with links to these fake websites.<br />
• Password attacks<br />
Hackers can infiltrate accounts and networks, then modify settings in three ways. The first one is through<br />
a brute-force attack or guessing passwords to gain access. The second is through is a dictionary attack,<br />
which involves the use of software or program made to try various password combinations of known<br />
dictionary words. Lastly, keyloggers pilfer data by recording a user’s keystrokes on sites and apps.<br />
• Inside attack<br />
Rootkits are commonly used by perpetrators who have administrator-level access to specific devices to<br />
manipulate and collect user activity and sensitive data or change various settings.<br />
• Unsecured networks are vulnerable to Man in the Middle (MitM) cyberattacks<br />
When clients and companies exchange data to transact, hackers who use the MitM method facilitate the<br />
attack by installing malware that intrudes the flow of information to steal sensitive information. Unsecured<br />
public Wi-Fi networks are often vulnerable to this kind of approach, as this is where cybercriminals have<br />
installed malware that can analyze data.<br />
• Malicious mobile apps<br />
As workplaces continue to approve the use of private devices in the office, companies are becoming at<br />
risk of being infected by malicious apps that could easily be downloaded on Apple Store or Google Play.<br />
These apps have the power to monitor user info or spam the victim with digital advertisements.<br />
• Zero-day cyberattack<br />
Zero-day cyberattacks are major, system-wide problems that can go undetected by developers or<br />
cybersecurity teams for long periods of time. Attackers get a hold of your company’s cybersecurity flaws<br />
and use them against you in many ways unless detected and repaired.<br />
132
<strong>Cyber</strong>security essentials to remember<br />
Here are some vital strategies to prevent cyberattacks and data breaches on your small or medium<br />
business.<br />
1. Evaluate your cybersecurity system with available tools<br />
Some planning and assessment tools that can help SMEs evaluate cybersecurity threats in their system<br />
include the Federal Communications Commission’s <strong>Cyber</strong>planner.<br />
Two other platforms developed by the Department of Homeland Security (DHS) called <strong>Cyber</strong> Resilience<br />
Review (a non-technical assessment which can be self-service or done on-site by DHS experts) and<br />
cyber hygiene vulnerability scanning for SMBs can also help spot vulnerabilities within internet-facing<br />
ecosystems.<br />
2. Formalize and continue reviewing your cybersecurity policies and needs<br />
A 2017 Research by Ipsos suggests that an alarming rate of over 39% of SMBs have defined<br />
cybersecurity policies despite its importance. Having formal policies for cybersecurity is highly essential<br />
for businesses of any size. It serves as a document that enumerates rules regarding digital security,<br />
controls, and security policies when it comes to the use of gadgets or mobile devices.<br />
This can also include topics from onboarding new hires, access to sensitive company data, protocols on<br />
revoking access to business information upon employee termination, and many more. Since digital<br />
technologies and rules may change swiftly without warning, you should also regularly visit your policies<br />
to make sure that you are up to speed with the latest or emerging cybersecurity trends.<br />
3. Train employees on relevant cybersecurity policies<br />
All personnel and employees within an organization are required to undergo some level of training when<br />
it comes to cybersecurity guidelines and best practices unique to your organization.<br />
Some simple policies you could implement from the get-go include the encouragement to use strong,<br />
unique passwords for all their work-relevant accounts or files, training them on identifying the signs of a<br />
malware attack or phishing, and making them aware of cyberattack risks that can pose security threats<br />
like public Wi-Fi networks outside the workplace.<br />
4. Utilize authentic and updated antivirus, anti-malware, or antispyware software, and<br />
hardware- or software-based firewall system<br />
Anti-malware software for small businesses is one of your first wall of defenses against viruses and many<br />
types of attacks. Such software can be found online with a simple search. Online software vendors<br />
regularly update these downloadable products with patches and various upgrades to improve numerous<br />
functionalities, so you should always be on the lookout for those.<br />
Aside from upfront or maintenance costs, take factors such as privacy policies, customer support<br />
services, configurability, and overall system impact into account when looking for antivirus software.<br />
133
5. Employ additional data security measures<br />
Protecting your business from cybersecurity threats should be one of your top priorities. Depending on<br />
the extent of protection you need after your assessment, you may continue improving your security<br />
measures with additional access-restricting features.<br />
Some additional security measures you can employ to protect your business and client information further<br />
include the use of multifactor identification for accessing sensitive information, data backup solutions like<br />
online cloud backups and network-attached storage, encryption software, and password security<br />
software.<br />
Conclusion<br />
Digital threats abound for SMEs that do not place importance on data security. You do not necessarily<br />
have to splurge on the latest hardware, software, or dedicated IT service, whether offshore or within the<br />
organization.<br />
Adapting the essential tips covered, such as accurately evaluating your cybersecurity risks and needs,<br />
establishing clear-cut rules and policies, training employees, using proven antivirus or antispyware<br />
software, and adopting additional data security measures for multi-layered protection as needed will work<br />
for increasing your defenses against ill-intentioned hackers.<br />
About the Author<br />
Alex Hunter is a Business Development Representative from ImageWare<br />
Systems. She has spent the past 8 years working to develop market<br />
awareness of, what is now recognized to be, one of the world’s leading<br />
2FA/Multi-Factor Biometric Authentication solutions available today. Alex<br />
can be reached online at https://www.linkedin.com/in/alex-hunter-<br />
724297179 and at our company website https://iwsinc.com.<br />
134
New <strong>Cyber</strong>security Trend: Hackers Impersonating Other<br />
Hackers<br />
By Jonathan Drake, Senior Intelligence Analyst at Optiv Security<br />
<strong>Cyber</strong> threat intelligence usually categorizes threat actors in fixed classes. While these classes may vary<br />
from organization to organization, typical threat actor groups will include: 1) Nation-State Threat Actors,<br />
focusing on government interests and espionage-based activities; 2) <strong>Cyber</strong>-Crime, individuals/groups<br />
highlighting ‘criminal intent’ with vast majority being financially motivated; 3) Hacktivism, ideological in<br />
nature and extremely resilient; and 4) Commercial Entities, private legal entities that create marketplaces<br />
for the commercialization of offensive/defensive hacking and surveilance capabilities.<br />
While categorizing threat actors into classes such as these has been helpful for information security<br />
professionals during identification and remediation processes, new research from Optiv Security reports<br />
automated threat categorization to be a double-edged sword. According to Optiv’s <strong>2019</strong> <strong>Cyber</strong> Threat<br />
Intelligence Estimate (CTIE) report, it’s a mistake to assume that these categories are rigid or to assume<br />
that a threat actor’s classification is distinct and static, because a growing trend in cybersecurity is on the<br />
rise: threat actors impersonating each other to hide true intentions. Called “hybrid threat actors,” this<br />
135
emerging class of cyber-criminals masquerades as a different classification to hide their true agenda.<br />
And, some using more than two, switching between classes as priorities change.<br />
Hybrid threat actors introduce tremendous security risk, because security orchestration and automation<br />
tools are not looking for the curve ball. Let me explain.<br />
Automated security technology is designed to reduce the work load on resource-constrained IT teams.<br />
An example of automated security technology can be found in the detection and response functionality<br />
of a SIEM. Automated alert investigation and response is based on pre-determined rules and/or<br />
behaviors. Variable thresholds allow organizations to customize their detections in response to changing<br />
threats, such as financially motivated attacks. Automation can also be used as an effective tool to set<br />
default responses to alerts.<br />
The problem, though, is that threat actors have figured out how to impersonate other categories of<br />
adversaries to divert attention away from their true target. For example, there may be a state sponsored<br />
threat actor posing as a garden-variety cyber-criminal targeting the customer database. While security<br />
systems are triggering an automated response, attackers shift their tactics to executing on their true<br />
intention – installing malware to siphon off intellectual property (IP). The security team thinks it has<br />
thwarted an attack on the customer database because of a kill chain trigger, but, in reality, it may have<br />
missed the ongoing theft of IP. Think of it this way: Someone breaks into an office and steals a couple of<br />
printers to make the police think it’s a petty theft, but what they’ve actually done is put listening devices<br />
in the CEO’s office and the boardroom so they can manipulate the stock market.<br />
What can be done?<br />
CTIE research shows that activities by hybrid threat actors are on the rise, and they’ve mastered the art<br />
of deceiving security tools to reach their intended target. Information security professionals have been<br />
doing it for years, so why would we assume that these hybrid threats wouldn’t? The question for IT<br />
security teams is: What can be done to stop them? Here are three best practices that will help defend<br />
against this new class of threat actors – and mitigate enterprise risk in the process.<br />
1) Implement a risk-centric approach to security – If there’s one thing that we urge organizations<br />
to do, it’s to tie cybersecurity functions to enterprise risk. This means ensuring business-specific<br />
risk and business objectives dictate the security model, rather than the latest cybersecurity threat<br />
or compliance mandate. With a risk-centric approach to security, IT security teams can accurately<br />
identify what data and assets are most likely to be targeted, who is most likely to target them, and<br />
how it will likely happen – and then they can customize their security strategy accordingly.<br />
Because the focus is on business risk and not one particular class of threat, the attack method<br />
and cyber-criminal motive are no longer the basis for cybersecurity strategy. Rather, prioritizing<br />
and protecting high-risk targets is the basis for strategy. In the example cited earlier, the<br />
organization would already have understood that state sponsored threat actors were a likely<br />
136
adversary due to intellectual property importance, so there would be no possibility of leaving that<br />
kind of hybrid attack “undefined.”<br />
2) Master security “basics” – Optiv’s recent “State of the CISO” research report found that<br />
organizations are not prioritizing security basics like patch management and vulnerability<br />
scanning – even though unpatched vulnerabilities are often cited as the most common source of<br />
data breaches (57% of all breaches, according to a study by the Ponemon Institute). Failing to<br />
execute on security basics leaves holes that cyber-criminals are increasingly adept at exploiting.<br />
Not to mention, if a company isn’t operating well when it comes to cyber-security fundamentals,<br />
then it won’t be able to successfully implement more advanced security processes, technologies<br />
and initiatives.<br />
3) Maintain the human element – Automated security tools can help us cut down on the noise and<br />
make cyber-security more manageable for information security teams, but it’s not the “fix all”<br />
solution. Flipping the automation switch doesn’t surround the organization with an impenetrable<br />
shield. Organizations must continue to include the human element in security processes, so, when<br />
hybrid threat actors do throw a curve ball, information security professionals are there to switch<br />
up the grip and grab the home run. It’s also important for information security teams to periodically<br />
reevaluate defined threat actor groups and associated security policies to ensure they align with<br />
the latest industry developments. Hybrid threat actors require a hybrid solution.<br />
While hybrid threat actors are a component that many organizations haven’t yet encountered, there’s no<br />
reason to panic. By implementing a risk-centric security model and following best practices such as those<br />
above, information security teams can build and maintain a solid security foundation. And with this<br />
strategy in place, organizations can put themselves in a strong position against the cybersecurity battle,<br />
every time.<br />
About the Author<br />
Jonathan Drake is a professional Intelligence analyst accumulating<br />
nine plus years of civilian and military experience. Drake is currently<br />
employed as a Senior <strong>Cyber</strong> Intelligence Analyst with Optiv and is a<br />
critical member of Optiv’s Global Threat Intelligence Center Team<br />
(gTIC). As a member of the gTIC, he assists staff and clients<br />
with cyber-based intelligence research and products. As a<br />
processional intelligence analyst, Drake seeks to deploy his refined<br />
analytical skills and technical knowledge to assist leaders with<br />
obtaining goals and objectives set by stakeholders. Jonathan can be<br />
reached online at https://www.linkedin.com/in/jonathandrake83/ and at<br />
our company website https://www.optiv.com/<br />
137
Software Defined Perimeter Deep Dive & Required<br />
Implementation Readiness<br />
By Parthasarathi Chakraborty<br />
SDN, SDWAN & SDP are frequently encountered terminologies to the technology professionals these<br />
days. It is necessary to understand each of these terms before making any technology purchase decision.<br />
As a security executive, I was confused when first encountered these concepts. I thought it will be a good<br />
idea to pen down some of the differences and utilities of these technologies for with a focus on SDP and<br />
prework needed by the organizations for a successful adoption.<br />
What is SDN or SDWAN?<br />
SDN or software defined networking is a concept that isolates control plane or brain of the networking<br />
gear from the data plane resulting in faster, better and cheaper ways of corporate internetworking. Branch<br />
to headquarter connectivity used to require expensive T1 circuits, private MPLS cloud with classic<br />
networking. In todays world with the advent of IaaS, PaaS and SaaS services, branches require to have<br />
138
a multi-dimensional connectivity with corporate headquarter and cloud service providers. It requires an<br />
intelligent and faster transport with lower total cost of ownership. SDWAN or software defined wide area<br />
networking came into picture which is a realization of SDN concepts. Regular routers are offloaded from<br />
routing, quality of service or intelligent intent based networking decisions and focus purely on faster<br />
packets processing. SDWAN decouples networking control plane from data plane with a new and<br />
intelligent overlay network. Corporations no longer need expensive MPLS or T1 only circuits, can have a<br />
variety of transport including cable, LTE, 4G/5G connections over internet for connectivity. SDWAN<br />
overlays decide routing, QoS and other intelligence where the underlaying transport focuses on data<br />
delivery. SDWAN is faster, transport agnostic (MPLS/4G/LTE/Cable) and cheaper wide area connectivity<br />
for organizations and SDP is needed to secure SDWAN connectivity.<br />
What is SDP and how does it work?<br />
SDP or software defined perimeter is based on the concepts of SDN but focuses on eliminating the<br />
inherent security weakness of network level connectivity by adhering to the concepts of ZTS or zero trust<br />
security model. Classing network connectivity is based on a trust boundary, usually established by<br />
placing a firewall. Inside the firewall resources are “trusted” and allowed to talk to each other in a more<br />
lenient fashion compared to entities from “outside” the firewall trying to connect to the resources “inside”<br />
the corporate network. This model used to work just fine but has becomes flawed today because the<br />
demarcation between inside and outside network is getting blurred. Cloud, bigdata, mobility is the driver<br />
for extending the organization’s boundary beyond corporate data centers into public space making it just<br />
impossible to have a demarcation. Without a defined boundary, the onus is on cyber folks to protect the<br />
resources regardless of the origin of the connection – be it “inside” or “outside” the corporate network.<br />
Zero trust security (ZTS) got prominence because of the new context where organizations can’t have a<br />
defined boundary. The core concept of ZTS is allowing communication on “need to know” basis with<br />
overly restrictive access permissions. Only allow the application or services needed to run the application<br />
supporting a business process and take away unnecessary permissions. SDP accomplishes zero trust<br />
security with an architecture that requires three components- SDP client, SDP controller and SDP<br />
gateway. SDP controllers act as a brain and the central decision-making authority for allowing SDP clients<br />
on the remote branch or third-party networks to talk to the protected resources behind the SDP gateways<br />
in the corporate data centers. Remote computers running SDP clients can only connect to allowed and<br />
published applications on the corporate data center brokered through the controllers after the user is<br />
authenticated and authorized at the controller level and the device integrity along with other granular<br />
posture details like geolocation is validated. The flow of events will be the following;<br />
• SDP gateway established a connection with the SDP controller through which it exchanges<br />
information about published applications in the corporate data centers and receives information<br />
about “screened” SDP clients before allowing the inbound connection<br />
• SDP clients authenticate, authorize using PKI with the SDP controller, part of the process the<br />
device integrity is also validated with posture scan and footprint hash. Only when the user behind<br />
the SDP client is authenticated, authorized and the device carrying the SDP client is validated to<br />
have the right level of integrity, SDP controller provides SDP gateway IP address to establish a<br />
connectivity.<br />
139
• SDP client opens the tunnel with remote SDP gateway and gets the access to allowed<br />
applications published for the client<br />
Is SDP a buzzword or it comes with great benefits?<br />
Now we understand the SDP architecture, but the question becomes why do we need it in the beginning?<br />
It is a buzzword or a shiny-toy syndrome or it truly brings benefit to the organization? The short answer<br />
is SDP brings security benefits with a huge cost saving and reduces operational complexities by lowering<br />
the number of devices needed to manage for allowing a remote connection to the corporate hosted<br />
application. But what’s wrong with classic remote access VPN or site to site VPN connectivity model?<br />
Basically, the classic connectivity requires a ton of appliances called VPN concentrators on the corporate<br />
headquarter to validate incoming requests from remote users or branches. After authentication and<br />
authorization, the remote user or branch lands on the “inside” network with a free pass to conduct<br />
reconnaissance since it gets an IP address of the inside “trusted” network. Any hacking attempt starts<br />
with discovery of services or reconnaissance, if we can stop the discovery by only allowing access to the<br />
applications as opposed to assigning an IP that is routable inside the VPN concentrator then we can<br />
reduce the security risk to a greater extent. Applying the concepts of zero trust security also allows us to<br />
validate the identity of the user or integrity of the computer of the connectivity request. Aside form security<br />
benefits, SDP is also a cost saver by eliminating the needs of keeping the stacks of VPN concentrators.<br />
The brain behind zero trust connection stays with the SDP controllers which are cloud based services in<br />
most of the cases that can be scaled up or down at a fraction of the cost and the organizations need a<br />
few service provider owned SDP gateways in the corporate data centers resulting in a huge cost saving.<br />
What considerations should be given before starting any SDP implementation?<br />
First and foremost, SDP implementation requires certain level or organizational maturity. On the surface<br />
it sounds like a hassle-free switchover, more secure and cost saver remote connectivity solution but you<br />
may end up opening security holes unless you have a strong segmentation practice implemented in the<br />
corporate network. Implementing and upkeeping a micro segmentation is a fair amount of work<br />
depending on the size of the organization. But why do we need a micro segmentation solution for a<br />
secure adoption of SDP? Isn’t SDP supposed to bring more security to the environment? The answer is<br />
in the SDP architecture. The gateway is a piece of software provided, managed and maintained by the<br />
SDP vendor that is in the corporate datacenter. As explained in the previous section, SDP gateways<br />
initiate and always keep a connection open with the SDP controller. Even though the remote clients can<br />
only access applications allowed for remote consumption, the SDP agent can move horizontally in the<br />
corporate network and conduct reconnaissance or connect to any other server by exploiting loopholes<br />
and privilege escalation techniques. Unarguably it can only happen when the SDP service and the<br />
gateway is compromised. Since the gateway software is managed, operated and upgraded by the service<br />
provider where organizations don’t have any control or ability to implement standard software<br />
development life cycle process with security checks and balances – it is always advisable to not<br />
completely trust the SDP gateway and build a perimeter around it’s mobility. It is required to have a<br />
microsegmentation implementation to ensure the SDP gateway can not move horizontally in case it is<br />
compromised and infect other system with a wider blast radius.<br />
140
To conclude, we can say that SDP certainly makes sense to adopt as a VPN replacement solution to<br />
reduce cost and improve security, but organizations should have a microsegmentation implementation<br />
in place before deploying SDP.<br />
About the Author<br />
Parthasarathi Chakraborty<br />
CISSP, CCSP, CEH, CHFA, MS (Infosec -WGU), MS (Technology<br />
Management -Columbia University)<br />
Director – Infrastructure & Cloud Security Architecture<br />
Currently at Bank of Montreal, previously with Guardian Life, JP Morgan, Bank<br />
of America & Merrill Lynch in <strong>Cyber</strong> Executive Leadership Roles<br />
Member: Forbes Technology Council, Rutgers University <strong>Cyber</strong> Security Advisory Board, New Jersey<br />
Institute of Technology CSLA Advisory Board<br />
141
Sprint Beta Testing 5G Smart City in Georgia<br />
By Kayla Matthews, Freelance Writer, Productivity Bytes<br />
Sprint has started beta testing some of its new 5G technology in Peachtree Corners, Georgia. Though<br />
the test doesn't encompass the whole city, it will determine what conditions would be like on a larger<br />
scale than the previous rollout.<br />
Sprint is using the Curiosity Lab, which contains a 1.5-mile track inside a 500-acre technology park. It's<br />
made only for autonomous vehicles, meaning Sprint is starting to look closer at self-driving cars.<br />
At least seven companies participated in the unveiling on the first day, each one bringing along a little<br />
something different.<br />
Kia tested out autonomous vehicles but was the only major car company there. Local Motors brought<br />
autonomous passenger shuttles, though, which made up the difference. Drones were brought in from<br />
Autodyne, and Softbank Robotics arrived with floor cleaners.<br />
Going in a different path was Georgia Power with smart light poles, Reef Kitchen with delivery-only<br />
kitchen solutions and CloudMinds for AI testing in the cloud.<br />
Here's what Sprint has been doing in Peachtree Corners, and what it means for the future of 5G and<br />
autonomous technology.<br />
142
The Launch of Curiosity IoT<br />
The cloud has a lot to do with the Peachtree Corners testing. In <strong>November</strong> 2018, Sprint launched its<br />
Curiosity IoT (Internet of Things.) The Curiosity IoT is software that directs traffic within the IoT. This<br />
entire directive is to build better smart cities for the future by starting with IoT and making it more efficient.<br />
As technology advances and time goes on, we accumulate massive amounts of data at any given<br />
instance. Part of 5G on the Curiosity IoT is to help build more space for all this information while still being<br />
able to collect more. The Curiosity IoT will allow any device to connect to the IoT no matter what<br />
technology is used, so we'll have more efficiency and better access.<br />
Sprint Leads the Charge<br />
Peachtree Corners isn't the first place to see 5G technology from Sprint. In fact, Sprint launched mobile<br />
5G in Atlanta in May <strong>2019</strong>. This network covered 150 square miles and over 560,000 people, allowing<br />
them to be the first members of the public to use 5G whenever they wanted.<br />
The testing is a little different in Peachtree Corners, as residents can use the network but they are not<br />
part of the experiment.<br />
Sprint is certainly not the only carrier to start testing 5G's limits. Verizon is working on its own initiative at<br />
the University of Michigan with its connected city plan called Mcity. It works with a 32-acre site that<br />
includes over 16 acres of traffic infrastructure and a test track, much like Sprint.<br />
The approach is to create better 5G solutions for autonomous vehicles with pedestrian safety in mind.<br />
The 5G Turning Point<br />
Jan Geldmacher, president of Sprint Business, gave a statement when the Peachtree Corners testing<br />
facility was announced.<br />
She explained their 5G plan as follows: "From enabling the most accurate real-world navigation possible<br />
to delivering immediate intelligence from IoT connections, companies can now better test, and ultimately<br />
scale, new solutions for the smart city landscapes of tomorrow."<br />
Though the testing facility at Peachtree Corners has thus far focused on businesses and their innovation<br />
needs, Sprint is still looking at the public's point of view through Atlanta.<br />
At this rate, perhaps 5G will become the new normal before we know it. Until then, there's a lot of testing<br />
to be done, especially when handling, organizing and storing the immense amount of data we've collected<br />
and continue to find.<br />
Sprint is already conducting the testing required to lead this technology well into the future.<br />
143
About the Author<br />
Kayla Matthews, a cybersecurity journalist, has written for sites like<br />
Security Boulevard, the National <strong>Cyber</strong> Security Alliance, Information<br />
Age and more.<br />
Matthews can be reached via Twitter @KayleEMatthews or on<br />
ProductivityBytes.com.<br />
144
Stressing Security Teams<br />
By Jody Caldwell<br />
Workplaces create stress – it’s an unfortunate fact of life – work is stressful. Stress isn’t even terribly<br />
complicated. People stress out when they believe that demands outstrip their resources or know-how.<br />
There’s a difference between feeling pressure and feeling anxiety. Sometimes being “under pressure” is<br />
positive, because it’s a challenge that ultimately provides an employee a sense of accomplishment.<br />
Sometimes it even yields an iconic collaboration between David Bowie and Freddie Mercury.<br />
While employees may be willing to accept pressure, they shouldn’t be forced to accept anxiety. Too much<br />
or too-difficult work can lead to long-term worry, which rarely leads to higher productivity. Whether feeling<br />
stressed due to lack of personal efficiency, proper training, collegial appreciation or even systemic<br />
dysfunctions, too much pressure can quickly escalate to manifest harmful physical and emotional<br />
reactions.<br />
145
Despite coffee mugs regularly shouting from the shelf that “the grind never stops”, habitual stress puts<br />
the human body in an endless fight-or-flight response mode, elevating blood pressure, increasing the<br />
heart rate and straining the body and mind. Just ask Dr. Bruce Banner. While security analysts won’t gain<br />
super-strength from super-stress, they may turn a shade of green: workers who are under constant<br />
pressure get sick more easily, are more irritable, and have a harder time concentrating.<br />
For security pros, such stress and anxiety has become a daily fixture, leading to an alarmingly high<br />
degree of burnout. Talent attrition is an enormous problem within the industry. Even more worrisome,<br />
ESG has found that 68% of cybersecurity professionals believe that a cybersecurity career can be taxing<br />
on the balance between one’s personal and professional life.<br />
Given the rise of mental health awareness, companies are now alarmed about the consequences of their<br />
security experts taking the pressure of their jobs home with them. Many places of business are searching<br />
for solutions to mitigate the effects of stress like substance abuse and major depression. But companies<br />
need go beyond providing employees with massage chairs, napping rooms and fur-ternity leave, and<br />
equip them with the necessary tools to manage the demands of their roles.<br />
Security analysts are inundated with more data than ever. Ostensibly, this is a good thing as it means<br />
access to a larger collection of threat indicators. At some point, though, more data starts to become too<br />
much data. Teams have to manage feeds and data inflow from multiple intelligence providers and open<br />
source providers. Tickets and events come up tens or hundreds of times a day, raising frequent and false<br />
alarm bells that unnecessarily spike the heartrate of analysts, or worse, inure them to threat. SIEMs have<br />
been helpful in monitoring the network by collecting and correlating the data, but they still require an<br />
analyst to follow up by researching the event, determining the relevant action to be taken, and ultimately<br />
submitting the ticket.<br />
There’s no question this is a real but silent suffering in security. Providing triage to so many alerts is a<br />
tedious and mind-numbing task with little reward and a lot of risk. When the demands are greater than<br />
the supply of attention an analyst can provide, things begin to fall between the cracks. An overload of<br />
expectations in combination with inefficient solutions may prevent employees from being productive. In<br />
some cases, people faced with this strain avoid dealing with a problem entirely, which may worsen the<br />
situation and increase tension for them and others around them. Drawing upon a useful axiom, even<br />
information is best in moderation.<br />
Organizations can help prevent their IT and cybersecurity professionals from becoming either anxious<br />
from or desensitized to alerts, warnings and notifications by shedding manual processes and using<br />
platforms that have been invented from the start with the cyber team in mind. In doing so, they can solve<br />
an immediate business problem and prevent a future one – employee retention issues.<br />
Put Some Things on Auto-Pilot<br />
When a job becomes overly tedious and manual, it frustrates valued talent. Security teams are driven by<br />
highly intelligent individuals who are rarely happy performing monotonous tasks like North Pole elves in<br />
a holiday movie. Companies can save their talent from spending the majority of their days copying and<br />
pasting between spreadsheets and tools through tailored automations that are often called playbooks.<br />
146
Playbooks are most widely known in the world of sports as a collection of strategies and plays that a<br />
team has practiced and could potentially run during a game. There are parallels to this in the world of IT,<br />
tasked that are common across organizations and can be managed through automation that efficiently<br />
processes data, creates intelligence and pushes it out to security teams or defensive tools. In short, when<br />
it comes to security teams, we’re telling you to put them in, coach.<br />
The resulting time savings frees up analysts to focus on more complex work that requires their intellects.<br />
Instead of worrying about submitting tickets to a firewall team or stressing out with each and every alert<br />
that comes up, they can spend more time on higher level threats and solutions – things that can’t be<br />
automated.<br />
Teach Self-<strong>Defense</strong><br />
Some security analysts endure the mental strain that comes with working on tasks without adequate<br />
training. 62% of cybersecurity professionals believe that their organization is not providing an adequate<br />
level of training for them to keep up with IT risks. That’s like giving half of Hogwarts a pool noodle to fight<br />
Voldemort.<br />
While companies trust cybersecurity teams with the entirety of their data, analysts’ current roles don’t<br />
allow time for more sophisticated cybersecurity education—setting both parties up for disappointment<br />
when a lack of education slows the response time for the inevitable breach. Businesses keep security<br />
analysts busy with boring and redundant tasks yet expect them to save the day when issues of higher<br />
complexity come knocking.<br />
Frustration can easily occur when being forced to make decisions without being properly informed, just<br />
ask anyone with only a selfie to go off of when deciding whether to go on a date with their Tinder match.<br />
An integrated cybersecurity platform is like getting a friend’s opinion of all of your dating-app matches, it<br />
can reduce guessing and provide context for threat data, resulting in better outcomes. One of the many<br />
benefits of a SOAR (Security Orchestration, Automation and Response) platform is that it automatically<br />
ingests all of the internal data and external threats. It then normalizes the information to be easily<br />
understood by each user role.<br />
The Well-Being Supply Chain<br />
Security analysts are among the most highly educated employees in many companies, endowed with<br />
unique skill sets not found elsewhere within most organizations. Forcing these individuals to spend their<br />
time completing repetitive tasks while trying to prepare for the unknown is difficult enough- Mr. Miyagi’s<br />
method of preparing a child to fight by having them tediously wax his car is a training technique that only<br />
works in The Karate Kid. Outside the cinematic universe, adding the requirement to prove one’s worth<br />
without tools to do so can truly weigh heavily on one’s mental health. It also turns them into less effective<br />
collaborators with their supervisors.<br />
147
SOAR platforms can help to alleviate stress further up the chain of command as well. Being able to show<br />
ROI is crucial for those feeling the constant anxiety of demonstrating their worth. Supervisors in the IT<br />
field have long been plagued by accountability and attribution problems with respect to proving their value<br />
– it’s difficult to attach a dollar value to the downtime that never happened.<br />
By nature, security teams are not revenue-generating, but they’re designed to protect the business<br />
services that do. When a cyber security team is successful in achieving zero downtime, nobody notices,<br />
so for those looking in from the outside, it can be difficult to measure the value a security analyst brings<br />
to a company. When security analysts are able to easily demonstrate return on an investment, they no<br />
longer struggle to procure future resources that could be critical for the continued success of security<br />
operations, and even for the company as a whole.<br />
From the perspective of those tasked with overseeing the structure of a company and the use of its<br />
resources, empowering the cybersecurity team to better orchestrate and automate its routine and highstress<br />
tasks only makes sense. It’s also simply the more ethical approach – with better tools available<br />
thanks to SOAR platforms, there’s simply no reason to continue subjecting our colleagues and team<br />
members to unnecessary stress.<br />
About the Author<br />
Jody Caldwell is the Sr. Director of Customer Success for ThreatConnect.<br />
Previously, he spent time in both the DoD and the Intelligence Community working<br />
with Network Security Operations Centers (NSOC) and Computer Emergency<br />
Response Teams (CERTS) in a variety of positions that include cyber threat<br />
analysis and leading cyber threat hunt teams. Jody's passionate about working with<br />
customers to strengthen security programs and leverage cyber threat intelligence<br />
to enhance their awareness while mitigating risks. Jody lives in Charleston, SC and<br />
enjoys boating and golfing.<br />
148
The Importance of <strong>Cyber</strong>security When Dealing With Online<br />
Customers<br />
By Riya<br />
The internet has become one of the most populated places ever known. With more businesses deciding<br />
to integrate, it is good to note that the level of insecurity when it comes to transactions is still not<br />
impressive. From records, millions of dollars are lost online, thanks to hackers. As an e-commerce<br />
entrepreneur, you should know that keeping your website safe from such threats is the first thing you<br />
need to do. It's also important to understand that other than hackers, there are other more threats that<br />
can severely affect your business. Other reasons why you need to keep your site security on high alert<br />
is because;<br />
You want to protect your customers’ details<br />
One of the things that hackers are always looking for is the personal details of people. That is why anyone<br />
running an e-commerce website that requires the customers to share sensitive information needs to<br />
ensure that the data is safe. What happens is, a hacker needs this information to impersonate the original<br />
owner. This can give them easy access to many online platforms used by the owner, including the bank<br />
account. That is why most e-commerce websites are required to use SSL certificates. That is because<br />
they encrypt data shared between two computers. If you have an e-commerce website that runs multiple<br />
149
subdomains, you can opt for a wildcard SSL certificate. You will although want to take your time to find<br />
the most excellent that is easy to use.<br />
You don’t want bad reviews<br />
With a poor service on your ecommerce website, you are most likely to get bad reviews on your social<br />
media pages and other discussion forums. This should be the worst that to ever happen to your business,<br />
especially if they are more than the positive reviews. When customers who shop from your website keep<br />
ending up with a cybersecurity breach, they will not want the same thing to happen to someone else. Bad<br />
reviews can mean danger to your enterprise, and in worst scenarios, you will have to shut down.<br />
You want to keep viruses and malware out<br />
Other than hackers, some programs can cause damage to your computer. As the admin, know that you<br />
have a lot of data to protect. Some customers use machines that have been invaded by these programs,<br />
and through sharing data, they can quickly transfer them to your servers. To avoid all this risk, you need<br />
to make sure that your guard is always up. Some customers don’t know so much about cybersecurity<br />
and as part of boosting your security, you should enlighten them.<br />
There are several ways through which malware or virus can attach a smart device or computer. Some<br />
include;<br />
• Using a public Wi-Fi that is shared<br />
• Downloading files that you are not sure about<br />
• Clicking on ads and some links<br />
• Using a USB storage that contains affected files<br />
• Accessing unsafe websites<br />
You don’t want to lose money<br />
Some hackers are too smart and realizing that you have not adequately secured your e-commerce<br />
website, they can clone it and divert customers. What happens is, they come up with a website looking<br />
exactly like yours and put it right in front of your site. That means, when someone tries to access your<br />
website, they will find the one belonging to the hackers first. Not only will they share some sensitive<br />
information, but they will also end up making payments to the wrong account without knowing it.<br />
You want to safeguard your reputation<br />
Reputation is vital in any ecommerce company, and that is why names like eBay and Amazon remain<br />
giants in this industry. Some customers can only shop from these two platforms because of the name<br />
they have. One of their main strengths is that they are true meaning that customers have less to complain<br />
about. It is, however, important to mention that sometimes, they too experience problems. A good<br />
reputation ensures the future of your company because an impressed customer is more likely to drag<br />
two or one new customers every once in a while.<br />
150
You don’t want problems with the authorities<br />
Without a secured e-commerce website, you already know that your customers are not safe. If a hacker<br />
manages to access the bank account of your customer and clear the money, you remain accused. This<br />
can land you in court, especially if you are guilty of not adhering to the rules of running an online shop.<br />
The law understands that as the business owner, customer protection is your responsibility because you<br />
are responsible for the payment gateway settings. If anything, a customer willing to buy your products<br />
doesn’t have a problem of physically finding your store if it is within their reach.<br />
You may want to expand<br />
In most cases, online businesses tend to snowball. Some end up getting more orders from other countries<br />
than their local area. Hackers are attracted to online companies that perform well because they promise<br />
a bigger reward if they manage to breach. If you have been keen on cybersecurity options like SSL<br />
certificates, you will find that they are sold in categories depending on the level of security needed. That<br />
is because they understand that the more an online company is expending, the higher the risks. You will,<br />
therefore, need to upgrade your security concerning the size of your market.<br />
Conclusion<br />
Online companies invest lots of money to ensure that they keep their customers and data safe. There<br />
are many ways of doing this but most importantly, know that one technique alone may not be enough to<br />
keep the hackers away. Combine some methods and for better results, get a cybersecurity expert on the<br />
job. One mistake that much new e-commerce entrepreneur do is that they use videos and articles from<br />
the internet to set up security. It is not a bad thing; however, know that for the safety of your company,<br />
you will need more advanced skills. Besides, hackers have already watched the same videos and are<br />
already scheming for alternatives.<br />
About the Author<br />
Riya is working as content marketer at ClickSSL.net. She has inspired writer<br />
writing in several areas of expertise. With spending her years working marketing<br />
communication, Riya is delighted to work with aspiring small business owners.<br />
Apart from her marketing expertise, Riya always enjoys reading pocketbook,<br />
cooking, and traveling.<br />
151
How to Stop <strong>Cyber</strong>security Attacks before They Start<br />
By Dr. Johannes Bauer, principal security advisor, identity management & security, UL<br />
<strong>Cyber</strong>security breaches are part of the nasty<br />
reality of today's IT infrastructure and even<br />
though they are not commonly talked about,<br />
many individuals and businesses are the targets<br />
of attacks. Sometimes the victims are none the<br />
wiser that a breach even occurred or data was<br />
stolen. When looking toward the Internet of<br />
Things (IoT), it becomes even messier. With<br />
over an estimated 30 billion connected devices,<br />
IoT cybersecurity has a greatly increased attack<br />
surface compared to enterprise infrastructure.<br />
This also provides an attack surface that is<br />
decentralized and distributed among millions of<br />
different networks all over the world.<br />
Everything would be so much easier if only, after<br />
discovery of an attack, we could push a button,<br />
go back in time, and do things over. With no<br />
DeLorean with a flux capacitor on the horizon,<br />
that option falls flat.<br />
The first important thing to realize is that security<br />
is not a feature or property of a product. Instead,<br />
it is a process, i.e., constantly evolving and<br />
changing. The rules of the game are changing,<br />
and they're changing fast. The reason for this is<br />
152
fairly simple – software in our connected<br />
products today is complex and consists of many<br />
thousands, sometimes many millions, of lines of<br />
source code. It is guaranteed that somewhere<br />
within this code, there's a vulnerability lurking –<br />
a length field that has not been validated<br />
properly, an SQL statement that does not<br />
properly escape its input, or a webpage that<br />
includes untrusted data. At the time of<br />
manufacture, such issues might be completely<br />
unknown to the vendor of a product and, unless<br />
anyone specifically looks for these problems,<br />
they're not going to pop up. Even worse, we’re<br />
still discovering new types of vulnerabilities,<br />
which once known can affect software previously<br />
considered secure.<br />
Once they're found, these vulnerabilities or<br />
weaknesses can often become public<br />
knowledge, either through responsible<br />
disclosure by a security researcher, through<br />
direct exploitation in the field, or by reverse<br />
engineering patches which show where areas of<br />
code have been updated. Anyone can then<br />
easily pinpoint and target a specific vulnerability<br />
in order to exploit it.<br />
Therefore, in order to remain ahead of the curve,<br />
it is crucial to know what software is contained<br />
within a product. This not only means all<br />
proprietary software components but,<br />
sometimes even more importantly, all third-party<br />
code installed and used by the proprietary code<br />
as well. For each component, it’s vital to know<br />
that this is part of the overall Software Bill of<br />
Materials, but it must also list the exact version<br />
included within the package. Everything on the<br />
list then can be continuously monitored in order<br />
to be notified of any potential vulnerabilities. A<br />
good place to start is looking at MITRE's<br />
Common Vulnerabilities and Exposures (CVEs)<br />
list, where over 130,000 vulnerabilities are<br />
recorded and continuously tracked. Those CVE<br />
identifiers are used to uniquely itemize<br />
vulnerabilities. Databases like the National<br />
Institute of Standards and Technology (NIST)<br />
National Vulnerability Database (NVD) refers to<br />
the MITRE list and gives not only a rough<br />
quantification of their severity, but also enriches<br />
them by cross-referencing original sources, fixes<br />
or test code.<br />
But what happens if such a dreaded notification<br />
comes in? First, citing the advice of Douglas<br />
Adams – don't panic! Not all vulnerabilities, even<br />
those that are marked as critical, affect every<br />
product in every configuration. This is why the<br />
triage of security issues is a crucial step in the<br />
evaluation of a weakness – somebody in the<br />
organization needs to determine if the<br />
vulnerability is even effective in the way the<br />
product has been built. Many bugs only affect<br />
certain architectures under which the<br />
dependency has been built or build-time<br />
configuration variables such as linked libraries.<br />
Others only affect protocols that are configured<br />
in a certain fashion – something that might not<br />
even be used in the product itself. Examples of<br />
either would be a library that is only vulnerable if<br />
it includes XML parsing support or a TLS library<br />
that only has an issue when used with a specific<br />
cipher suite.<br />
Unfortunately, this triage process can be quite<br />
complex and detailed, and often requires skilled<br />
resources to assist or perform the process.<br />
These resources responsible for triaging the<br />
vulnerability need to decide if the product is<br />
affected by the vulnerability, and they also have<br />
to estimate the worst-case impact. For this,<br />
many things need to be taken into consideration.<br />
How large is the attack surface? How many<br />
products are in the field? Are there security<br />
controls or countermeasures already in place?<br />
After deliberating on all of these aspects, an<br />
action plan needs to be formed. Usually,<br />
patching the vulnerability is the<br />
clearest path forward, but it's<br />
not the only one. In fact, some<br />
153
circumstances even make it impossible to<br />
update a specific software component, so<br />
alternatives and workarounds are often<br />
necessary.<br />
For example, rather than patching or removing a<br />
vulnerable component, remediating<br />
countermeasures can be implemented. If a<br />
vulnerability is discovered where oversized data<br />
for a particular protocol can trigger an exploit,<br />
then a simple remedy could be to implement a<br />
firewall rule that discards such large packets<br />
before they even get to the vulnerable piece of<br />
software. For example, limiting the size of DNS<br />
packets to prevent a buffer overflow.<br />
Of course, such a change can have adverse<br />
effects on the product itself and needs to be<br />
thoroughly tested before putting in effect.<br />
Lastly, if neither patching nor a workaround is<br />
possible, a last resort can be to accept the<br />
residual risk and mitigate only the impact of a<br />
vulnerability. An example of this would be a<br />
piece of software that has a weakness which<br />
allows attackers to crash it remotely. At a<br />
minimum, the software could be configured to<br />
automatically restart in case such an event<br />
happens, and perhaps to send a notification that<br />
something has happened, so that potential<br />
exploitation of the vulnerability can be monitored.<br />
Needless to say, from a security engineering<br />
standpoint this isn't the most desired outcome,<br />
but the harsh reality is that we often don't get to<br />
cherry pick the prettiest solution. While it might<br />
seem unorthodox, such "software duct tape" can<br />
get the job done long enough to bridge the gap<br />
until the root cause of the issue can be properly<br />
fixed.<br />
All of these actions are process measures that<br />
every manufacturer can undertake as part of<br />
their development efforts. With effective<br />
monitoring of known vulnerabilities, fast<br />
response time, competent triaging, and rollout of<br />
mitigation, many cybersecurity attacks can be<br />
stopped before they ever can develop. If all of<br />
the above advice is followed, however, how can<br />
one measure the performance or effectiveness<br />
of such a process?<br />
Similar to functional testing, security can also be<br />
proactively tested. In particular, when we are<br />
looking at products, penetration tests can often<br />
achieve this goal. Pentesting is when ethical<br />
hackers – people who are paid to find<br />
vulnerabilities in products – try to hack the<br />
product so the unethical hackers don't get to.<br />
These pentesters will report any findings to the<br />
vendor and the issues can be fixed as part of the<br />
regular development cycle, with some<br />
weaknesses patched before they are ever<br />
deployed in the field.<br />
Still, it is a possibility that despite all those best<br />
efforts, a product or company gets hacked in the<br />
wild, with no prior warning or heads-up at all. Of<br />
course, this can be a very difficult and stressful<br />
event to manage, but when this happens it’s<br />
crucial to again remain calm and be deliberate<br />
about the responding steps. It could make a<br />
situation much worse by falling into panic.<br />
Ideally, the person who is designated as<br />
responsible for security already has an incident<br />
response plan worked out. Of course, this plan<br />
cannot know of any attack details – but it<br />
considers the infrastructure and components<br />
within it and can estimate different rough<br />
scenarios. In a well-prepared environment,<br />
many of these scenarios will have been played<br />
through as part of the threat and risk analysis –<br />
the correct vendor responses are already<br />
roughly laid out.<br />
In the aftermath of an incident, finding the root<br />
cause and performing a forensic analysis of the<br />
attack is almost as crucial as mitigating it in the<br />
first place. You would want to find out all the<br />
details, including (but not limited to) when the<br />
attack started, what the attack vector or process<br />
154
used to exploit the system was, what data was<br />
compromised, modified or deleted, and how you<br />
can effectively guarantee going forward that this<br />
vector cannot be used again to compromise your<br />
infrastructure or product.<br />
Rolling out good security is much like playing a<br />
game of chess – you do not get to pick the move<br />
your opponent will make, but you can plan well<br />
ahead and you alone get to choose the<br />
appropriate response. Well-defined<br />
responsibilities, and proper issue and<br />
vulnerability tracking go a long way, and are as<br />
close as they will get, to preventing security<br />
attacks before they even start. However, just like<br />
in chess you can expect to have some setbacks.<br />
Careful planning to help ensure timely response<br />
to events is therefore vital. NIST has a great<br />
summary for this approach in their <strong>Cyber</strong>security<br />
Framework – Identify. Protect. Detect. Respond.<br />
Recover.<br />
In today’s world, security is everyone’s business.<br />
What are you doing to help secure your<br />
systems?<br />
To learn more, visit IMS.UL.com.<br />
About the Author<br />
Dr. Johannes Bauer is the principal security advisor, identity management<br />
& security, for UL in Frankfurt, Germany. Dr. Bauer has a Ph.D. in<br />
Computer Science and has over ten years of experience in the field of IT<br />
security. In particular, he has worked in the fields of electromobility and<br />
smart home systems. Dr. Bauer has expert knowledge of physical threats<br />
to embedded systems, both invasive and non-invasive, and he has<br />
published multiple papers on mitigation strategies to thwart such attacks.<br />
He has frequently led workshops on topics of applied cryptography and<br />
worked as a security consultant, guiding secure software design and<br />
development as well as practical threat and risk assessment.<br />
UL is a global safety science company. To learn more, visit:<br />
https://www.ul.com/<br />
155
What Does A <strong>Cyber</strong> Security Consultant Do?<br />
By Stuart Cooke, Digital Marketing Manager at Evalian<br />
Are you considering becoming a cyber security consultant? Or perhaps you’ve recently become<br />
aware of the importance of this type of security and youre looking to hire a professional to<br />
support your business? Either way, cyber security roles are on the rise thanks to the<br />
technological world we now live in.<br />
But if youre not completely familiar with cyber security or the roles these individuals play in<br />
keeping us safe from cybercrime, we’re here to help. In this guide we’ll look at the importance of<br />
cyber security and what these individuals actually do. So, whether youre doing research for your<br />
next career move or you’re trying to decide whether it’s worth hiring a cyber security professional,<br />
check out the guide below for more information.<br />
Why is cyber security so important?<br />
It might surprise you to know that data is now the most valuable resource in the world, even<br />
overtaking the oil industry. But with so much of our lives now online our personal data has<br />
become very vulnerable. In fact, this is why the new General Data Protection Regulation (GDPR)<br />
has been put in place to give EU citizens more rights over their own data.<br />
156
As you can imagine, as technology grows the internet becomes more integral to our lives and<br />
as people increasingly find new ways to collect and share our data, there is also a higher risk of<br />
this data becoming misused. As technology has developed, so has the threat of cybercrime.<br />
What was once just a fictional villainous ‘hacker’ in a movie, has now become a very real-life<br />
problem and something we all need to be aware of.<br />
These criminals are always finding new ways to hack information or scam money from innocent<br />
victims. This is why individuals and businesses alike need to have at least a basic understanding<br />
of cyber security. Many businesses will look to trained professionals to help ensure they meet<br />
all GDPR regulations and that they are protecting themselves and their customers from<br />
cybercrime. And that’s where cyber security consultants come in.<br />
What is a cyber security consultant?<br />
In a nutshell, a cyber security consultant is hired by a business or individual to help them prevent<br />
a security threat. They do this by assessing the company’s technologies and systems to see<br />
where their vulnerabilities lie. Essentially, they must play the role of a hacker by thinking ‘what<br />
could I do to access this information’ and then play the role of the victim and think about the<br />
impact this could have on their personal life. This helps them to spot any holes or potential<br />
threats. In fact, some cyber security consultants used to be hackers themselves and understand<br />
how vulnerable some companies can really be to cybercrime.<br />
What does a cyber security consultant do?<br />
Above we’ve briefly touched on what a consultant is and how they work with businesses, but<br />
now let’s get down to the nitty gritty of the role. By trawling through each system, software and<br />
computer acting as both the hacker and victim, the consultant is able to make an exhaustive<br />
review of the companys security (or lack thereof). This is why most businesses e mployer IT<br />
professionals of this nature, even if this is on a contract basis. The government even use these<br />
consultants to help protect they huge amount of data they possess.<br />
Once the consultant has highlighted all the potential threats they then move on to the next phase,<br />
they help the company to design and then implement a security strategy for the business. They<br />
will usually recommend the best software, hardware, firewalls and other security measures to<br />
ensure the daily running of the business goes smoothly and that their data and important<br />
information stays safe - particularly when sharing documents online.<br />
So what do they do on a daily basis?<br />
Hiring a cyber security consultant isnt a one -time gig. Once they’ve got a strong system in place<br />
their daily responsibilities are all about monitoring the systems and updating security measures<br />
where possible. They may also have to get involved if there is a breach of security and help to<br />
teach other members of staff best practices for cyber security. Below are a few of the daily tasks<br />
a cyber security consultant can be expected to perform:<br />
157
• Speak with staff about any security problems or issued they’ve noticed in the past<br />
• Educate other employees about security best practice and how they can spot a potential<br />
threat before it happens<br />
• Determine the best way to protect the company’s computers, software, data and information<br />
from potential cyber attacks<br />
• Keep up to date with the latest technologies and software to ensure the business is using the<br />
most effective systems<br />
• Test security solutions<br />
• Create and deliver reports on these security tests to report back to the senior team<br />
• Deal with any breaches or security related issues immediately and provide a detailed report<br />
of what happened<br />
• Continue to update and upgrade security systems<br />
• Create detailed reports and estimates about the cost of new security systems<br />
• Interview potential new team members if planning to expand the cyber security or IT team<br />
What does it mean to be a cyber security consultant?<br />
As you can see, being a cyber security consultant is a very important job! With new technologies<br />
always emerging, the threat of cybercrime is always on the rise. Businesses (and even<br />
individuals) that want to protect themselves from potentials hackers or scammers need to be<br />
aware of any problems with their current security system, and that is why hiring a cyber security<br />
consultant is so important.<br />
Not only are they able to analyse any potential risks, they are knowledgeable about the latest<br />
software and systems to ensure the business has the best security measures in place. They also<br />
continue to update these systems as new threats and technologies emerge. The digital world is<br />
moving fast, which means cyber criminals are always finding new ways to get into these systems.<br />
That’s why consultants need to be proactive and always developing their knowledge of the<br />
industry and latest technologies.<br />
About the Author<br />
Stuart Cooke, Digital Marketing Manager at Evalian, experts and consultants in all<br />
things cyber security.<br />
158
A10 Networks Cloud Access Proxy Provides Secure Access and<br />
Visibility for SaaS Apps<br />
By Yasir Liaqatullah, vice president of product management at A10 Networks<br />
A10 Networks today announced a new Cloud Access Proxy (CAP) solution that provides secure access<br />
to software as a service (SaaS) applications, such as Microsoft Office 365, optimizing branch offices with<br />
better performance, stronger security and an enhanced user experience. Additionally, the solution<br />
provides full visibility into SaaS applications for improved security. The CAP solution is comprised of three<br />
components: the new A10 Networks Thunder® 840 CAP appliance for the branch office, higherperformance<br />
Thunder® Convergent Firewall (CFW) platforms for the headquarters, and the new<br />
centralized CAP Visibility and Analytics solution, which provides centralized insights into outbound<br />
application traffic and SaaS application usage. Together, the CAP solution ensures that access to SaaS<br />
applications and data is accelerated and secured while maintaining full, centralized visibility across<br />
sanctioned and unsanctioned applications.<br />
SaaS and Multi-cloud Environments Increase Security Challenges<br />
Traditionally, enterprise networks were designed to provide users with access to applications and<br />
services hosted locally within their data centers. To secure user access to the internet and to protect<br />
them from cyber threats, a large central security stack was typically hosted to inspect traffic going in and<br />
159
out of the network. As organizations grew and expanded into multiple branch offices, they were forced<br />
into a hub-and-spoke deployment model where all branch office traffic was routed back to the central<br />
security stack for policy enforcement and inspection.<br />
With the increased adoption of SaaS applications, as well as the rapid move towards multi-cloud<br />
deployments, enterprise networks are changing with the consolidation of WAN edge infrastructure and<br />
migration from MPLS. Maintaining the security and user experience is increasingly challenging in this<br />
environment.<br />
A10 Networks CAP solves these problems by consolidating different features of multiple point products,<br />
like software-defined-WAN, cloud access security brokers and secure web gateways, providing a unified<br />
solution for SaaS optimization, security and visibility. These features include:<br />
• Local breakout – For branch office traffic optimization using intelligent classification and bypassing<br />
of SaaS traffic from other application traffic.<br />
• Next hop load distribution (NHLD) – For dynamic traffic distribution across multiple WAN<br />
connections.<br />
• Tenant access control – For data theft prevention between sanctioned and unsanctioned SaaS<br />
tenant accounts.<br />
• URL filtering – For traffic categorization and protection from web threats.<br />
• Application visibility and control – For dynamic recognition and categorization, as well as filtering<br />
of application traffic.<br />
• IPsec VPN – For securing internet traffic, backhauled from branches to the central security stack.<br />
• AppCentric templates (ACT) – For simplified, one-step deployments at new branch offices.<br />
• CAP visibility and analytics solution – For visibility across sanctioned and unsanctioned<br />
application traffic at the branch office and in the cloud.<br />
Traditional enterprise networks are not optimized for SaaS application traffic and the security provided<br />
by the SaaS vendor is not adequate in addressing today’s cyber threats and increasing use of shadow<br />
IT. A10 Networks’ Cloud Access Proxy is designed specifically to help organizations optimize the<br />
performance and security of their SaaS application traffic.<br />
The rapid increase in SaaS usage makes the Cloud Access Proxy solution perfect for deployment in<br />
small to medium enterprises (SME) and verticals like education, legal, finance and manufacturing.<br />
Availability<br />
The complete Cloud Access Proxy solution, including Thunder 840 Cloud Access Proxy, Thunder CFW,<br />
and the centralized Cloud Access Proxy Visibility and Analytics solution, is available now.<br />
The centralized Cloud Access Proxy Visibility and Analytics solution will also be available as an add-on<br />
app on the A10 Harmony Controller® in early 2020.<br />
160
About the Author<br />
As VP of Product Management, Yasir drives A10’s portfolio of 5G Service<br />
Provider Solutions and Security portfolio. Yasir can be reached online at<br />
(EMAIL: YLiaqatullah@A10networks.com) and at our company website<br />
https://www.a10networks.com/<br />
161
3 <strong>Cyber</strong>security Trends & Predictions for 2020 (from Illumio)<br />
PJ Kirner, CTO & Founder of Illumio<br />
1) “We’ll start to hear more about the convergence of physical infiltration with cyberattacks,<br />
challenging security across the board.”<br />
“<strong>Cyber</strong>attacks on an enterprise or a government can be carried out remotely but, in <strong>2019</strong>, we started<br />
hearing more about the physical element added to the mix. Just look at the woman who had a thumb<br />
drive loaded with malware that got into Mar-a-Lago. Although she wasn’t able to successfully tap into the<br />
network, she still had a convincing enough story to get past physical checkpoints manned by the Secret<br />
Service.<br />
And it doesn’t take sophisticated software or intelligence operations to execute these attacks – a wellplanned,<br />
staged scenario is all it takes. For instance, someone could pose as an electrician to gain<br />
physical access to a hospital being built, walking around unimpeded until they find an unprotected device<br />
to access the network. I believe we’ll see more of these high-profile, hybrid cyber-physical attacks<br />
162
in 2020.”<br />
2) “AI and speech technology will be exploited, making voice a new weapon of choice.”<br />
“If there’s one thing that malicious actors are good at, it’s creativity. We’ll see business email compromise<br />
(BEC) extend further over into voice next year. Even though many organizations have educated<br />
employees on how to spot potential phishing emails, many aren’t ready for voice to do the same<br />
as they’re very believable and there really aren’t many effective, mainstream ways of detecting them.<br />
And while these types of “voishing” attacks aren’t new, we’ll see more malicious actors<br />
leveraging influential voices to execute attacks next year.<br />
And it’s not as hard as it sounds - it’s easier than ever to get an audio clip of an executive, CEO, or world<br />
leader giving a speech and then altering it for nefarious purposes. Imagine receiving an urgent call or<br />
voicemail from your “boss”, asking to share credentials for a secure platform or system. Without any<br />
packaged-up, off-the-shelf solutions to help detect these threats, we’re going to see a lot more voicerelated<br />
attacks in 2020 that will be harder to identify and even harder to protect against.”<br />
3) “Our sons and daughters will quickly become a new threat vector to enterprise security.”<br />
“Almost everyone has a smart, connected device these days and kids are no exception. If they don’t have<br />
their own, they’ll probably just grab their parents’ phone or tablet to play games or watch TV - often<br />
unsupervised. As digital natives, technology is second nature to them but they’re not thinking about<br />
cybersecurity at all, which is why they’ll become prime targets.<br />
Unfortunately, no one is off limits when it comes to cybersecurity threats and our kids will be squarely in<br />
the crosshairs next year. Whether it’s the child of an executive, an executive assistant, or even someone<br />
with administrative privileges, it only takes one wrong click for them to implant malware on their parent’s<br />
phone, opening up the back door for a bad actor to get into the company network. This will become much<br />
more prevalent in 2020.”<br />
About the Author<br />
As Chief Technology Officer and founder, PJ is responsible for Illumio’s<br />
technology vision and platform architecture. PJ has 20 years of<br />
experience in engineering, with a focus on addressing the complexities<br />
of data centers. Prior to Illumio, PJ was CTO at Cymtec. He also held<br />
several roles at Juniper Networks, including distinguished engineer<br />
focused on advancing Juniper’s network security and layer 4-7 services<br />
plane. PJ graduated with honors from Cornell University.<br />
163
Applying Security Across Heterogeneous IT Systems<br />
Proactive Threat Interference ® provides protection not offered<br />
by other cybersecurity approaches<br />
By Steve Ryan, CEO & Co-Founder, Trinity <strong>Cyber</strong>, Inc.<br />
Do I patch my system in the name of security, or do I leave it unpatched to enable critical operations and<br />
business functions?<br />
Heeding CIO or CISO advice to patch systems and update information technology (IT) as soon as an<br />
update is available is a best practice that will help secure systems against most known threats and<br />
vulnerabilities before they can be exploited. However, there are times when you simply cannot avoid<br />
maintaining legacy IT. How does one choose between security and operations? Incident response will<br />
only get you so far. Adopting an adversary disruption strategy becomes a critical element of any security<br />
posture for heterogeneous IT systems. Getting in the adversary’s way means that you don’t always have<br />
to choose – you can have both.<br />
The legacy dilemma<br />
IT ecosystems change and evolve over time, but their functions usually remain constant. Critical<br />
functionality often centers on connectivity between IT and more expensive assets. Take the example of<br />
a weapons system built to communicate with an early version of Microsoft Windows. While the outdated<br />
164
operating system is vulnerable to exploitation, updating the IT would require an expensive interface<br />
retrofit or even replacement of the entire weapons system at a huge cost.<br />
This legacy dilemma affects large-scale, expensive functionality most acutely. Machines in manufacturing<br />
operations or critical systems for municipalities tied to obsolete software can prove too costly to replace.<br />
Even more common is payroll software running on old operating systems or obsolete and unsupported<br />
software.<br />
Other compatibility challenges<br />
Many endpoint security products only operate on the most recent Windows operating systems and are<br />
not designed to protect systems that use other operating systems. Nor can they defend other IT<br />
infrastructure, like modems or routers. In these circumstances, the network’s firewall assumes even<br />
greater responsibility for blocking attackers before they can reach individually unprotected computers or<br />
devices. Unfortunately, firewall access control lists can wreak havoc on legitimate communications paths<br />
used by legacy systems. In addition, firewalls can be susceptible to control by the adversary, completely<br />
compromising unprotected endpoints.<br />
Often, larger corporations inherit distinct IT infrastructures from each firm incorporated into the whole<br />
through mergers and acquisitions. This creates a patchwork system incompatible with a common<br />
endpoint defense. Those companies embracing Internet of Things (IoT) substantially increase the<br />
number of network endpoints and also introduce riskier technology. Current IoT devices simply lack the<br />
processing power to perform even basic security measures and rely entirely on extra-device measures.<br />
Endpoint security and the use of firewalls are critical and should remain staples in any cybersecurity<br />
protocol. The problem, however, is that these measures treat the cyber threat like an inevitable force of<br />
nature against which victims are powerless. Incident response and recovery is as passive as preparing<br />
for and enduring a storm – yet the cyber threat bears no resemblance to weather. Instead, it is created<br />
by an adversary who has an objective, a set of tools, and a level of knowledge. If a malicious hacker has<br />
you in his sights, you can passively hunker down, or you can proactively get in his way.<br />
Understanding the adversary’s playbook<br />
Adversaries routinely capitalize on unevenly defended networks and known vulnerabilities of common<br />
applications and operating systems. A month after Microsoft released an unprecedented patch for<br />
Windows XP, The Shadow Brokers published a set of tools that exploited the weaknesses in how<br />
Windows XP uses the Server Message Block protocol. Shortly after, the WannaCry ransomware attack<br />
and devastating NotPetya attack affected hundreds of thousands of Windows XP systems that had not<br />
upgraded, at an estimated worldwide cost of between $14 billion and $18 billion. 6 Some systems remain<br />
exposed to this threat today.<br />
6<br />
https://www.wired.com/story/notpetya-cyberattack-ukraine-russia-code-crashed-the-world/<br />
165
This is a classic example of why relying on patch management alone is a failing and costly strategy.<br />
Heterogeneous or legacy-bound systems require a strategy for actively disrupting cyberattacks when installing a<br />
patch will take time and could hinder important functionality. Likewise, homogeneous networks require<br />
the same strategy for defense before a patch can be installed.<br />
One example of this adversary-focused approach is a strategy my team and I developed for protecting<br />
the Department of <strong>Defense</strong> networks against the Heartbleed vulnerability. After a researcher published<br />
a method of getting target systems to spew data from memory, teams across the cybersecurity space<br />
acted quickly to spread word of the vulnerability. By contrast, my team used the attempt at exploiting<br />
these vulnerable systems to identify those systems and neutralize the incoming threats to vulnerable<br />
devices until an upgrade could take place. In short, we interfered with the adversary’s attacks and used<br />
their methods to benefit us.<br />
Exploiting adversary methodology offers a critical strategy for protecting uneven defenses and networks<br />
in need of an upgrade. Every adversary must complete a series of actions in sequence to attempt an<br />
attack. Rather than simply blocking an adversary based on simple indicators of compromise (IOCs) or<br />
even next generation firewall rules, why not disrupt the adversary’s methodology? And if you can, use<br />
the adversary’s methodology to your favor? <strong>Cyber</strong>security professionals can not only increase adversary<br />
work factor but can also decrease their operational expenses by reducing the number of incidents to<br />
respond to.<br />
<strong>Cyber</strong>security strategy for incompatible networks<br />
Any network, including heterogeneous networks and those running outdated software, can add a valuable<br />
layer of defense by operationalizing knowledge about the adversary and adopting a strategy of adversary<br />
disruption rather than passive response and recovery.<br />
Proactive Threat Interference® from Trinity <strong>Cyber</strong> aids this strategy by invisibly monitoring threats outside<br />
a network’s perimeter and adapting to intercept and neutralize cyberattacks based on the adversary’s<br />
tactical toolbox. Ultimately, an integrated security posture – with threat interference, an impermeable<br />
firewall, and endpoint security – represents the strongest safeguard against infiltration and costly<br />
remediation.<br />
166
About the Author<br />
Mr. Ryan is Co-founder and Chief Executive Officer of Trinity <strong>Cyber</strong>, Inc., a<br />
disruptive technology company fundamentally redefining commercial<br />
cybersecurity.A recognized leader in cybersecurity, Steve left the National<br />
Security Agency in 2016 as the Deputy Director of its Threat Operations<br />
Center after a distinguished 32-year career as a custom chip designer and<br />
cybersecurity operator. Steve excels in leading special projects and<br />
challenging the status quo to develop unique solutions to the world’s most<br />
complex problems. He has applied his unique skills and vision to develop a<br />
fundamentally new approach to cybersecurity. The solution he developed<br />
propelled Steve to found Trinity <strong>Cyber</strong> and create its Proactive Threat Interference® capabilities. Only<br />
through approaching the problem in a singularly different way, Steve has developed a methodology and<br />
technology that finally addresses the cyber threat at its core – the adversary.Steve holds a Bachelor of<br />
Science degree in Electrical Engineering from the University of Rhode Island. He was a primary architect<br />
of the NSA’s NTOC, bringing together intelligence and defensive missions to identify and stop cyber<br />
threats at very large scale. Steve is a recipient of the Presidential Rank Award, the Exceptional Civilian<br />
Service award, and a first-place winner of the Department of <strong>Defense</strong> CIO Award.<br />
167
The Security Challenges of Robotic Process Automation—A<br />
Primer<br />
By Kevin Ross, Global Solutions Engineer, <strong>Cyber</strong>Ark<br />
Robotic process automation (RPA) is one of the hottest technologies in the IT market today. These<br />
systems enable software robots to replicate the actions of human workers for tasks such as data entry,<br />
and they can bring greater efficiencies and accuracy to many key business processes.<br />
The technology has the potential to deliver huge benefits to companies. These include increased<br />
efficiency of workflows, improved accuracy of transactions, and significant cost savings through the<br />
reduction of labor by automating the execution of repetitive, time-consuming manual tasks.<br />
RPA can also be a significant IT security risk, particularly around the credentials used to manage RPA<br />
implementations. Because of that, organizations need to be vigilant about how they secure their RPA<br />
deployments.<br />
The Benefits of RPA<br />
Companies that include manufacturers, financial services firms, engineering firms, and insurance<br />
companies use RPA to automate all kinds of routine tasks. The software “bots” that are key components<br />
of the software follow a set of programmed rules to carry out activities people would ordinarily perform.<br />
168
In some cases, the RPA bots work together with humans for functions such as moving or copying data<br />
between applications.<br />
Companies that rely on a large human workforce for process work, in which people perform high-volume,<br />
transactional functions, stand to gain from using RPA, according to the Institute for Robotic Process<br />
Automation and Artificial Intelligence (IRPA AI).<br />
RPA software can deliver efficiencies to enterprise applications such as enterprise resource management<br />
(ERP), customer relationship management (CRM), supply chain management, and applications that<br />
support functions in human resources and finance.<br />
Clearly the emerging technology is having a huge impact on the way enterprises perform day-to-day<br />
business processes.<br />
According to Deloitte, 53 percent of organizations have started to leverage RPA to robotize and<br />
automate repetitive tasks to allow the human workforce to focus on higher value work. Overall, RPA<br />
adoption is expected to increase to 72 percent in the next two years and, if adoption continues at its<br />
current level, RPA will achieve near-universal adoption within the next five years.<br />
While RPA software is being deployed in all industries, the biggest adopters include banks, insurance<br />
companies, telecommunications providers and utility companies.<br />
These companies traditionally have lots of legacy systems, and implement RPA tools to enhance<br />
integration among these systems and quickly accelerate their digital transformation efforts while<br />
leveraging their IT investments.<br />
This is creating new security risks that organizations need to be aware of.<br />
Addressing the Security Risks<br />
Considering the scale and speed at which bots work and the number of systems and applications they<br />
can access, security should be a primary consideration when deploying the technology.<br />
As with any other newer technology, RPA can easily become a new attack vector for bad actors if security<br />
isn’t factored into the platforms.<br />
RPA software interacts directly with critical business systems and applications, which can introduce<br />
significant risks when bots automate and perform routine tasks. Bots don’t need administrative rights to<br />
perform their tasks.<br />
But they do need privileged access to log in to ERP, CRM and other enterprise business systems to<br />
access data, copy or paste information, or move data through a process from one step to the next.<br />
Privileged access without security is a recipe for disaster.<br />
According to a recent study, 84 percent of organizations believe that IT infrastructure and critical data is<br />
not secured unless privileged accounts are fully protected.<br />
The typical approach in providing privileged access credentials to bots is to hard-code privileged access<br />
credentials into the script or rules-based process a bot follows. With another method, the script might<br />
169
include a step to retrieve credentials from an insecure location such as an off-the-shelf application<br />
configuration file or database.<br />
As demand for RPA increases among lines of business, the number of privileged account credentials<br />
hard-coded into scripts or stored insecurely grows. That significantly increases the associated risks.<br />
With these approaches, the credentials end up being shared and reused repeatedly. Unlike the<br />
credentials used by humans, which typically must be changed regularly, those used by bots remain<br />
changed and unmanaged.<br />
As a result, they’re at risk from cyber criminals and other bad actors who are able to read or search scripts<br />
to gain access to the hard-coded credentials. They are also at risk from users who have administrator<br />
privileges, who can retrieve credentials stored in insecure locations<br />
As RPA deployments expand to include larger numbers of bots, the risks become exponentially greater<br />
for organizations. If privileged account credentials used within an RPA platform are left unmanaged and<br />
unprotected, that can transform RPA processes into a backdoor through which attackers can gain access<br />
to corporate systems and do damage.<br />
Organizations can take three critical steps to start mitigating the risk of the RPA pipeline becoming<br />
compromised, building security directly into their RPA workflows and processes.<br />
1. Store and manage privileged credentials securely<br />
To keep privileged account credentials from falling into the wrong hands, they can remove credentials<br />
from bot scripts and other insecure locations.<br />
Instead, they can be stored in a system that encrypts the credentials; holds them in a secure location;<br />
hands them securely to authenticated bots on-demand; automatically rotates credentials at regular<br />
intervals or on-demand; removes human intervention from the process; and scales to meet rapid growth<br />
in RPA use.<br />
2. Limit the bots’ application access<br />
If an attacker acquires privileged account credentials, companies can minimize the impact by limiting the<br />
number of applications to which the credentials allow access.<br />
That means granting bots privileged access only to the specific applications they need, preventing other<br />
applications from executing. This prevents bad actors from using multiple applications on a client machine<br />
and gaining the local administrator rights allowing them to install spyware and other malware.<br />
3. Protect administrator credentials or else<br />
Companies should deploy a secure infrastructure that protects and manages administrator credentials in<br />
the same way as bot credentials, using encryption and secure storage and automatic rotation; and allows<br />
isolation and monitoring of administrator activity.<br />
By taking the necessary steps, organizations can benefit from RPA and minimize the risks.<br />
170
About the Author<br />
Kevin Ross is a Sr. System Engineer at <strong>Cyber</strong>Ark (NASDAQ: CYBR). He is<br />
an experienced system engineer with a demonstrated history of working in<br />
the computer software industry. Previous to <strong>Cyber</strong>Ark, he was a support<br />
engineer and project manager at Barracuda (NYSE: CUDA). He’s skilled in<br />
Session Initiation Protocol (SIP), Domain Name System (DNS), Mac,<br />
Transmission Control Protocol (TCP), and more. He has a B.S. in Computer<br />
Information Services from Southern Adventist University. Kevin can be<br />
reached online at LinkedIn. For more information<br />
at: https://www.cyberark.com/<br />
171
5 Simple Ways to Protect Your Smartphone from <strong>Cyber</strong><br />
Attacks<br />
By Jamshaid Chaudhary, Kamil Web Solutions<br />
Where the onset of the internet has been a blessing for almost everyone, it has also proved to be a curse<br />
for many of us. Hackers are improvising new ways to burst the privacy bubble of people. Security experts<br />
warn us that most cyber-attacks initiate from our smartphones. And despite the alarming number of<br />
hacking incidents in the last decade, an average person doesn’t know how to protect his smartphones<br />
from these attacks.<br />
In addition to getting personal information of people, these hackers target company employees to hack<br />
into a business smartphone to obtain vital information. Therefore, taking appropriate precautions to<br />
protect your phone is more important than it has ever been.<br />
Here are 5 simple ways to keep your smartphone’s data secured.<br />
Use Trusted Wi-Fi and Bluetooth<br />
Most people connect to public Wi-Fi without giving it a second thought. What they don’t know is that these<br />
public Wi-Fi’s can be used to obtain sensitive information from the connected devices. Most hotels and<br />
event venues have their security protocols in place, but free public Wi-Fis in areas like shopping centers,<br />
cafes, airports and parks and far less secure and should be used wisely.<br />
172
Whenever you are in a public place, it is best to keep your Wi-Fi turned off or use it through a VPN which<br />
re-routes your network traffic through an encrypted connection.<br />
Use Two-Factor Authentication<br />
You should take benefit of every possible security procedure available to make your device as secure as<br />
it can be. A two-factor authentication (2FA) is a solid barrier which prevents unwarranted access of your<br />
personal data and information.<br />
Most people don’t use this feature because it requires an extra step for verification but imagine all your<br />
information that is put on stake if you skip 2FA. Nowadays, due to fingerprint technology and savepassword<br />
options, this feature is much easier to use.<br />
Use Trusted Apps<br />
It is imperative that you should only download apps from sources that are trustable, especially the ones<br />
that use your GPS location. While iPhone has some trustable apps for tracking like iphone location<br />
tracking, the standards are not that high in an Android. An android phone allows installation from various<br />
sources and people fall prey to cyber-attacks due to fishy apps.<br />
Best way to avoid this is by sticking to apps that are allowed by App Store on the iPhone and Play Store<br />
on Android and make sure they can be trusted before giving them any permissions.<br />
Ignore Spam and Phishing Emails<br />
The most common way a hacker uses to crawl his way through the company’s security protocol is by<br />
breaking into an employee’s inbox. You should educate yourself on how to avoid these emails and identify<br />
phishing emails from original ones.<br />
Make sure that you don’t give your personal information to anyone online and cross-check the sender’s<br />
identity before engaging in a conversation with him.<br />
Keep your Apps Updated<br />
Most people delay the updates of their operating system and apps. But delaying it for a very long time<br />
compromises the security features of an app. Developers are trying to keep up with the hackers by rolling<br />
regular security updates for apps and operating system, and you should download these update as soon<br />
as possible to keep your data secure.<br />
173
Author the Author<br />
Jamshaid Chaudhary.I began writing as a professional on my<br />
personal blog and then discovered my true calling, which is writing<br />
about technology, News and gadgets in general. I am a technical writer,<br />
author, and blogger since 2010. An industry watcher that stays on top<br />
of the latest features, extremely passionate about juicy tech news and<br />
everything related to gadgets. For tech tips, visit<br />
http://crazytechpoint.org/ my email address is<br />
jamsheed1480[at]gmail[dot]com. Company Name: Kamil Web<br />
Solutions Site: https://www.kamilwebsolutions.ae/<br />
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
Meet Our Publisher: Gary S. Miliefsky, CISSP, fmDHS<br />
“Amazing Keynote”<br />
“Best Speaker on the Hacking Stage”<br />
“Most Entertaining and Engaging”<br />
Gary has been keynoting cyber security events throughout the year. He’s also been a<br />
moderator, a panelist and has numerous upcoming events throughout the year.<br />
If you are looking for a cybersecurity expert who can make the difference from a nice event to<br />
a stellar conference, look no further email marketing@cyberdefensemagazine.com<br />
194
You asked, and it’s finally here…we’ve launched <strong>Cyber</strong><strong>Defense</strong>.TV<br />
At least a dozen exceptional interviews rolling out each month starting this summer…<br />
Market leaders, innovators, CEO hot seat interviews and much more.<br />
A new division of <strong>Cyber</strong> <strong>Defense</strong> Media Group and sister to <strong>Cyber</strong> <strong>Defense</strong> Magazine.<br />
195
Free Monthly <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> Via Email<br />
Enjoy our monthly electronic editions of our Magazines for FREE.<br />
This magazine is by and for ethical information security professionals with a twist on innovative consumer<br />
products and privacy issues on top of best practices for IT security and Regulatory Compliance. Our<br />
mission is to share cutting edge knowledge, real world stories and independent lab reviews on the best<br />
ideas, products and services in the information technology industry. Our monthly <strong>Cyber</strong> <strong>Defense</strong> e-<br />
Magazines will also keep you up to speed on what’s happening in the cyber-crime and cyber warfare<br />
arena plus we’ll inform you as next generation and innovative technology vendors have news worthy of<br />
sharing with you – so enjoy. You get all of this for FREE, always, for our electronic editions. Click here<br />
to sign up today and within moments, you’ll receive your first email from us with an archive of our<br />
newsletters along with this month’s newsletter.<br />
By signing up, you’ll always be in the loop with CDM.<br />
Copyright (C) <strong>2019</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine, a division of CYBER DEFENSE MEDIA GROUP (STEVEN G.<br />
SAMUELS LLC. d/b/a) 276 Fifth Avenue, Suite 704, New York, NY 10001, Toll Free (USA): 1-833-844-9468 d/b/a<br />
<strong>Cyber</strong><strong>Defense</strong>Awards.com, <strong>Cyber</strong><strong>Defense</strong>Magazine.com, <strong>Cyber</strong><strong>Defense</strong>Newswire.com,<br />
<strong>Cyber</strong><strong>Defense</strong>Professionals.com, <strong>Cyber</strong><strong>Defense</strong>Radio.com and <strong>Cyber</strong><strong>Defense</strong>TV.com, is a Limited Liability<br />
Corporation (LLC) originally incorporated in the United States of America. Our Tax ID (EIN) is: 45-4188465,<br />
<strong>Cyber</strong> <strong>Defense</strong> Magazine® is a registered trademark of <strong>Cyber</strong> <strong>Defense</strong> Media Group. EIN: 454-18-8465, DUNS#<br />
078358935. All rights reserved worldwide. marketing@cyberdefensemagazine.com<br />
All rights reserved worldwide. Copyright © <strong>2019</strong>, <strong>Cyber</strong> <strong>Defense</strong> Magazine. All rights reserved. No part of this<br />
newsletter may be used or reproduced by any means, graphic, electronic, or mechanical, including photocopying,<br />
recording, taping or by any information storage retrieval system without the written permission of the publisher<br />
except in the case of brief quotations embodied in critical articles and reviews. Because of the dynamic nature of<br />
the Internet, any Web addresses or links contained in this newsletter may have changed since publication and may<br />
no longer be valid. The views expressed in this work are solely those of the author and do not necessarily reflect<br />
the views of the publisher, and the publisher hereby disclaims any responsibility for them. Send us great content<br />
and we’ll post it in the magazine for free, subject to editorial approval and layout. Email us at<br />
marketing@cyberdefensemagazine.com<br />
<strong>Cyber</strong> <strong>Defense</strong> Magazine<br />
276 Fifth Avenue, Suite 704, New York, NY 1000<br />
EIN: 454-18-8465, DUNS# 078358935.<br />
All rights reserved worldwide.<br />
marketing@cyberdefensemagazine.com<br />
www.cyberdefensemagazine.com<br />
NEW YORK (US HQ), LONDON (UK/EU), HONG KONG (ASIA)<br />
<strong>Cyber</strong> <strong>Defense</strong> Magazine - <strong>Cyber</strong> <strong>Defense</strong> <strong>eMagazine</strong> rev. date: 11/01/<strong>2019</strong><br />
196
TRILLIONS ARE AT STAKE<br />
No 1 INTERNATIONAL BESTSELLER IN FOUR CATEGORIES<br />
Released:<br />
https://www.amazon.com/Cryptoconomy-Bitcoins-Blockchains-Bad-Guys-ebook/dp/B07KPNS9NH<br />
In Development:<br />
197
198
199
200
201
Nearly 8 Years in The Making…<br />
Thank You to our Loyal Subscribers!<br />
We've Completely Rebuilt <strong>Cyber</strong><strong>Defense</strong>Magazine.com - Please Let Us Know<br />
What You Think. It's mobile and tablet friendly and superfast. We hope you<br />
like it. In addition, we're shooting for 7x24x365 uptime as we continue to<br />
scale with improved Web App Firewalls, Content Deliver Networks (CDNs)<br />
around the Globe, Faster and More Secure DNS<br />
and <strong>Cyber</strong><strong>Defense</strong>MagazineBackup.com up and running as an array of live<br />
mirror sites.<br />
4m+ DNS queries monthly, 2m+ annual readers and new platforms coming…<br />
202
203
204
205