SlideShare une entreprise Scribd logo
1  sur  69
Télécharger pour lire hors ligne
What Lurks in the
Shadow
Addressing the Growing Security
Risk of Shadow IT & Shadow Data
By @3ncr1pt3d
Cheryl Biswas
•
• Works for: JIG Technologies
• Does what exactly: security researcher,
analyst, writer of things
• Trekkie, techie, maker, baker
• Bridging the gap between tech and non-tech
Necessary Disclaimer: All content is my own and does not reflect the opinions
of my employer
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
2
Security Lords
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
3
Faster. Better. More. Tech.
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
4
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
5
#GenMobile
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
6
#GenMobile “For the security of company data and IT
systems, there may be cause for concern”.
(http://www.arubanetworks.com/mobileriskindex/)
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
7
BYoD
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
8
Internet of So. Many.
Things
The Human Factor
Fear of the Unknown
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
9
The Dark World
Shadow IT/Shadow Data
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
10
In the Land of Mordor
Where the Shadows Lie
Keep it secret, keep IT safe
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
11
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
12
“Employees in every cubicle are using Box,
Workday and Salesforce, and they’re not
waiting for IT’s permission to do so.
They’re using their own apps on their own
devices. Many are spinning up servers in
the cloud for infrastructure in the cloud, a
practice dubbed bring your own server. So
privilege is now being consumerized like
apps and devices.”
- Forbes
- ZDNET
“When you agree to BYOD
policies, you put employees
within the security chain”.
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
14
Bad Apples
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
15
Pass on the Passwords
• 51% Single password/numerical PIN
• 58% NO policies of software to enforce
better passwords
• 56% Shared passwords
• 17% Used company-provided password mgr
• 60% Accessed confidential corporate data
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
16
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
17
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
18
Unprotected and Connected
• questionable WiFi networks via
the local coffee shop hotspot
• unapproved cloud storage
• really, really bad USB
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
20
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
21
Security
means never
having to say
you’re sorry
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
22
Cyber Insurance
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
23
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
24
A culture of indifference.
Sharing as the norm – devices, data,
passwords
Indifference towards security – the
assumption that security is somebody
else’s problem; not worried about their
own responsibility
Self-empowerment succeeds over
existing rules (Aruba Networks)
“Businesses are ill-prepared for the
attitude of next generation
employees who own mobile devices,
and may be placed at risk as the
BYOD trend causes fractures in
security enforcement.”
- ZDNet
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
26
Alien Vault Insider Risk Matrix
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
27
“All identities are
not created equal”
With great power comes
great responsibility
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
28
Great Power, Great Responsibility
• 92% orgs have user monitoring
• 56% handle privileged identity mgmt.
• 58% corps do regular password updates
• 60% IT decision makers share creds
• 52% share creds with contractors
>20% analyze or audit privileged access
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
29
“IT departments often give non-
technical executives (e.g. VP of Sales,
CEOs, CFOs, etc.) broad privilege inside
corporate applications, figuring it is
better to give too much freedom to
upper management than get yelled at
when someone can’t create a report.”
- Forbes
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
30
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
31
“It is scary to think that this many
people consider it normal for
employees to have access to data
that they shouldn’t have and for
companies to not know where
their missing data has gone.”
- David Gibson, VP at Varonis.
The Loss of Privilege
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
32
The hearts of men are easily corrupted. And
the ring of power has a will of its own...
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
33
Time
for
a little talk
about
B I G
Data
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
34
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
35
Who Touched the Data?
“It’s not good enough to merely
resist the rise of BYOD, if people
can still access corporate e-mail
when they get home…”
John McAfee
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
36
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
37
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
38
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
39
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
40
What’s Mine is Mine &
What’s Yours is Mine Too
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
41
Sh*tposts
from
the
Trenches
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
42
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
43
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
44
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
45
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
46
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
47
Let’s do a little Demo
https://www.shodan.io/
Country. Company. Device. Password
Default
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
49
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
50
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
51
So Where Do We Go From Here?
“Just Say No.”
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
52
Current rules can’t apply
when the game itself
has changed.
What was working
isn’t working now
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
53
Least Privilege:
“Every program and every user of the
system should operate using the least
set of privileges necessary to complete
the job. Primarily this principle limits the
damage that can result from an accident
or error.”
- SALTZER, J.H. and SCHROEDER, M.D.
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
54
We’ve taken the lid off Pandora’s box.
I don’t think it ever goes back on.
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
55
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
56
What Are We Missing
• Training and Awareness
• Inventory and Monitoring
• Secure Hi-Value Assets
• ????
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
57
The Cloud
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
58
No Idea What They’re Using,
No Idea What They’re Losing
• 15x more cloud services used to store
critical data than CIOs authorized
• IT says 51 active cloud services. Survey
says 730
• Use growing exponentially.
• 1000 external services per company by
2016
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
59
30% of business critical info is in
the cloud.
Most cloud apps are third party
apps.
- Ponemon Institute
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
61
Shadow IT
isn’t
going
anywhere …
Gartner says so
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
62
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
63
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
64
To Build a Better Mousetrap,
Draw A Bigger Circle
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
65
The Way Forward
• Ask what users really need and
want
• Show the CSuites why we are their
strategic partner
• Shift gears and adapt
• Projections based on Cloud, Big
Data, Everything as a Service
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
66
As for that one ring
that rules them all …
The World has
changed. And so must
we.
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
67
Thank You So Much!
BSidesTO
Contact Deets: @3ncr1pt3d
ca.linkedin.com/in/cherylbiswas
https://whitehatcheryl.wordpress.com/
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
68
09/11/2015
BSidesTO: What Lurks In The Shadow by
@3ncr1pt3d
69

Contenu connexe

Tendances

CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike
 

Tendances (11)

Bear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence OperationsBear Hunting: History and Attribution of Russian Intelligence Operations
Bear Hunting: History and Attribution of Russian Intelligence Operations
 
A Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber MomentsA Look Back at 2016: The Most Memorable Cyber Moments
A Look Back at 2016: The Most Memorable Cyber Moments
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
CrowdStrike CrowdCast: Is Ransomware Morphing Beyond The Ability Of Standard ...
 
Blockchain usability report / research
Blockchain usability report / researchBlockchain usability report / research
Blockchain usability report / research
 
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose CustomersPonemon Report: When Trust Online Breaks, Businesses Lose Customers
Ponemon Report: When Trust Online Breaks, Businesses Lose Customers
 
NTXISSA September 2016 Meeting - How to Get More from Your Security Investmen...
NTXISSA September 2016 Meeting - How to Get More from Your Security Investmen...NTXISSA September 2016 Meeting - How to Get More from Your Security Investmen...
NTXISSA September 2016 Meeting - How to Get More from Your Security Investmen...
 
Trust Online is at the Breaking Point
Trust Online is at the Breaking PointTrust Online is at the Breaking Point
Trust Online is at the Breaking Point
 
You Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And DetectionYou Can't Stop The Breach Without Prevention And Detection
You Can't Stop The Breach Without Prevention And Detection
 
Data-driven postmortems - SVC206-S - Atlanta AWS Summit
Data-driven postmortems - SVC206-S - Atlanta AWS SummitData-driven postmortems - SVC206-S - Atlanta AWS Summit
Data-driven postmortems - SVC206-S - Atlanta AWS Summit
 
Building a Mobile Location Aware System with Beacons
Building a Mobile Location Aware System with BeaconsBuilding a Mobile Location Aware System with Beacons
Building a Mobile Location Aware System with Beacons
 

En vedette

Online trust and perceived utility for consumers of web privacy statements
Online trust and perceived utility for consumers of web privacy statementsOnline trust and perceived utility for consumers of web privacy statements
Online trust and perceived utility for consumers of web privacy statements
Remove Search Results .com
 

En vedette (6)

Understanding CIPs, Builder’s Risk, and Inland Marine Insurance Policies
Understanding CIPs, Builder’s Risk, and Inland Marine Insurance PoliciesUnderstanding CIPs, Builder’s Risk, and Inland Marine Insurance Policies
Understanding CIPs, Builder’s Risk, and Inland Marine Insurance Policies
 
The ABC's of Digital Literacy
The ABC's of Digital LiteracyThe ABC's of Digital Literacy
The ABC's of Digital Literacy
 
Kindermusik program 2016-2017
Kindermusik program 2016-2017Kindermusik program 2016-2017
Kindermusik program 2016-2017
 
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 1
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 1Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 1
Prairie DevCon-What's New in Hyper-V in Windows Server "8" Beta - Part 1
 
Online trust and perceived utility for consumers of web privacy statements
Online trust and perceived utility for consumers of web privacy statementsOnline trust and perceived utility for consumers of web privacy statements
Online trust and perceived utility for consumers of web privacy statements
 
Grade 8 PE module(Q4)
Grade 8 PE module(Q4)Grade 8 PE module(Q4)
Grade 8 PE module(Q4)
 

Similaire à What Lurks in the Shadow

FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
Melissa Krasnow
 

Similaire à What Lurks in the Shadow (20)

ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
ITCamp 2018 - Tudor Damian - The cybersecurity landscape is changing. Are you...
 
Progscon cybercrime and the developer
Progscon cybercrime and the developerProgscon cybercrime and the developer
Progscon cybercrime and the developer
 
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
Eward Driehuis - What we learned from 20.000 attacks - Codemotion Amsterdam 2019
 
Office 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainOffice 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool Again
 
Digit Leaders 2023
Digit Leaders 2023 Digit Leaders 2023
Digit Leaders 2023
 
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
Staying Ahead of Internet Background Exploitation - Microsoft BlueHat Israel ...
 
Design Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoTDesign Patterns for Ontologies in IoT
Design Patterns for Ontologies in IoT
 
Internet of Energy Things IERC 2015
Internet of Energy Things IERC 2015Internet of Energy Things IERC 2015
Internet of Energy Things IERC 2015
 
Paul Malone of TSSG spoke at the IERC debate entitled “The Internet of Energy...
Paul Malone of TSSG spoke at the IERC debate entitled “The Internet of Energy...Paul Malone of TSSG spoke at the IERC debate entitled “The Internet of Energy...
Paul Malone of TSSG spoke at the IERC debate entitled “The Internet of Energy...
 
Effective Cybersecurity Communication Skills
Effective Cybersecurity Communication SkillsEffective Cybersecurity Communication Skills
Effective Cybersecurity Communication Skills
 
Is it safe
Is it safeIs it safe
Is it safe
 
Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013Security Awareness Presentation Fall 2013
Security Awareness Presentation Fall 2013
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
Devnexus 2017 Cybercrime and the Developer: How do you make a difference?
 
Art Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat PreventionArt Hathaway - Artificial Intelligence - Real Threat Prevention
Art Hathaway - Artificial Intelligence - Real Threat Prevention
 
An Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and LibrariesAn Introduction To IT Security And Privacy for Librarians and Libraries
An Introduction To IT Security And Privacy for Librarians and Libraries
 
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 Cybercrime and the Developer: How to Start Defending Against the Darker Side... Cybercrime and the Developer: How to Start Defending Against the Darker Side...
Cybercrime and the Developer: How to Start Defending Against the Darker Side...
 
The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020The ClearScore Darkpaper: The danger of the dark web 2020
The ClearScore Darkpaper: The danger of the dark web 2020
 
How to run a social media listening program, presented by Keith McArthur
How to run a social media listening program, presented by Keith McArthurHow to run a social media listening program, presented by Keith McArthur
How to run a social media listening program, presented by Keith McArthur
 
FINAL presentationMay2016
FINAL presentationMay2016FINAL presentationMay2016
FINAL presentationMay2016
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

What Lurks in the Shadow

  • 1. What Lurks in the Shadow Addressing the Growing Security Risk of Shadow IT & Shadow Data By @3ncr1pt3d
  • 2. Cheryl Biswas • • Works for: JIG Technologies • Does what exactly: security researcher, analyst, writer of things • Trekkie, techie, maker, baker • Bridging the gap between tech and non-tech Necessary Disclaimer: All content is my own and does not reflect the opinions of my employer 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 2
  • 3. Security Lords 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 3
  • 4. Faster. Better. More. Tech. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 4
  • 5. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 5
  • 6. #GenMobile 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 6 #GenMobile “For the security of company data and IT systems, there may be cause for concern”. (http://www.arubanetworks.com/mobileriskindex/)
  • 7. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 7 BYoD
  • 8. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 8 Internet of So. Many. Things
  • 9. The Human Factor Fear of the Unknown 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 9
  • 10. The Dark World Shadow IT/Shadow Data 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 10
  • 11. In the Land of Mordor Where the Shadows Lie Keep it secret, keep IT safe 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 11
  • 12. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 12
  • 13. “Employees in every cubicle are using Box, Workday and Salesforce, and they’re not waiting for IT’s permission to do so. They’re using their own apps on their own devices. Many are spinning up servers in the cloud for infrastructure in the cloud, a practice dubbed bring your own server. So privilege is now being consumerized like apps and devices.” - Forbes
  • 14. - ZDNET “When you agree to BYOD policies, you put employees within the security chain”. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 14
  • 15. Bad Apples 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 15
  • 16. Pass on the Passwords • 51% Single password/numerical PIN • 58% NO policies of software to enforce better passwords • 56% Shared passwords • 17% Used company-provided password mgr • 60% Accessed confidential corporate data 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 16
  • 17. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 17
  • 18. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 18
  • 19. Unprotected and Connected • questionable WiFi networks via the local coffee shop hotspot • unapproved cloud storage • really, really bad USB
  • 20. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 20
  • 21. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 21
  • 22. Security means never having to say you’re sorry 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 22
  • 23. Cyber Insurance 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 23
  • 24. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 24
  • 25. A culture of indifference. Sharing as the norm – devices, data, passwords Indifference towards security – the assumption that security is somebody else’s problem; not worried about their own responsibility Self-empowerment succeeds over existing rules (Aruba Networks)
  • 26. “Businesses are ill-prepared for the attitude of next generation employees who own mobile devices, and may be placed at risk as the BYOD trend causes fractures in security enforcement.” - ZDNet 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 26
  • 27. Alien Vault Insider Risk Matrix 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 27
  • 28. “All identities are not created equal” With great power comes great responsibility 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 28
  • 29. Great Power, Great Responsibility • 92% orgs have user monitoring • 56% handle privileged identity mgmt. • 58% corps do regular password updates • 60% IT decision makers share creds • 52% share creds with contractors >20% analyze or audit privileged access 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 29
  • 30. “IT departments often give non- technical executives (e.g. VP of Sales, CEOs, CFOs, etc.) broad privilege inside corporate applications, figuring it is better to give too much freedom to upper management than get yelled at when someone can’t create a report.” - Forbes 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 30
  • 31. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 31 “It is scary to think that this many people consider it normal for employees to have access to data that they shouldn’t have and for companies to not know where their missing data has gone.” - David Gibson, VP at Varonis.
  • 32. The Loss of Privilege 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 32
  • 33. The hearts of men are easily corrupted. And the ring of power has a will of its own... 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 33
  • 34. Time for a little talk about B I G Data 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 34
  • 35. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 35
  • 36. Who Touched the Data? “It’s not good enough to merely resist the rise of BYOD, if people can still access corporate e-mail when they get home…” John McAfee 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 36
  • 37. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 37
  • 38. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 38
  • 39. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 39
  • 40. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 40
  • 41. What’s Mine is Mine & What’s Yours is Mine Too 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 41
  • 43. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 43
  • 44. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 44
  • 45. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 45
  • 46. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 46
  • 47. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 47
  • 48. Let’s do a little Demo https://www.shodan.io/
  • 49. Country. Company. Device. Password Default 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 49
  • 50. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 50
  • 51. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 51
  • 52. So Where Do We Go From Here? “Just Say No.” 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 52
  • 53. Current rules can’t apply when the game itself has changed. What was working isn’t working now 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 53
  • 54. Least Privilege: “Every program and every user of the system should operate using the least set of privileges necessary to complete the job. Primarily this principle limits the damage that can result from an accident or error.” - SALTZER, J.H. and SCHROEDER, M.D. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 54
  • 55. We’ve taken the lid off Pandora’s box. I don’t think it ever goes back on. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 55
  • 56. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 56
  • 57. What Are We Missing • Training and Awareness • Inventory and Monitoring • Secure Hi-Value Assets • ???? 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 57
  • 58. The Cloud 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 58
  • 59. No Idea What They’re Using, No Idea What They’re Losing • 15x more cloud services used to store critical data than CIOs authorized • IT says 51 active cloud services. Survey says 730 • Use growing exponentially. • 1000 external services per company by 2016 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 59
  • 60. 30% of business critical info is in the cloud. Most cloud apps are third party apps. - Ponemon Institute
  • 61. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 61 Shadow IT isn’t going anywhere … Gartner says so
  • 62. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 62
  • 63. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 63
  • 64. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 64
  • 65. To Build a Better Mousetrap, Draw A Bigger Circle 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 65
  • 66. The Way Forward • Ask what users really need and want • Show the CSuites why we are their strategic partner • Shift gears and adapt • Projections based on Cloud, Big Data, Everything as a Service 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 66
  • 67. As for that one ring that rules them all … The World has changed. And so must we. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 67
  • 68. Thank You So Much! BSidesTO Contact Deets: @3ncr1pt3d ca.linkedin.com/in/cherylbiswas https://whitehatcheryl.wordpress.com/ 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 68
  • 69. 09/11/2015 BSidesTO: What Lurks In The Shadow by @3ncr1pt3d 69