SlideShare une entreprise Scribd logo
1  sur  45
Télécharger pour lire hors ligne
Protect Yourself from Cyber Attacks Through
Proper Third-Party Risk Management
Today’s Speakers
Tony Howlett is a published author and speaker on various security, compliance, and
technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory
Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the
CISSP, GNSA certifications, and a B.B.A in Management Information Systems. Tony is
currently the CISO at SecureLink.
Justin Strackany is the Chief Customer Officer at SecureLink. He has been with the
company since it was founded in 2003, serving in many customer-focused capacities,
including sales engineering, implementation, customer success, account management,
and onboarding new clients. Over the years, he has developed deep partnerships with
some of the largest, most complex enterprise organizations and technology vendors in
industries such as healthcare, gaming, legal, finance, and retail.
Cyberterrorism and why Third Party Risk Management
Cyberterrorism: Why 3rd Party Risk Management Matters
The State of Cyber-Terrorism
Actors, Methods and Attack Vectors
Best Practices for Managing Third-Party Risk
Demo of SecureLink VPAM
The Current State of Cyber-Terrorism
The Age of Cyber-Terrorism
In the modern era of increasingly connected countries through the
Internet and the importance of those services, nation state actors and
affiliated groups are increasingly turning to cyber-attacks and cyber-
terrorism to carry out their national and political goals.
● Fast: Attacks take be carried out from ANYWHERE to
ANYWHERE at the speed of light and easily cross national
boundaries
● Low Cost: Capable technicians with computers
● Hard to attribute: The perpetrator can be concealed, hidden or
otherwise obfuscated.
● Less chance of embarrassing failure. If a cyber attack fails, it is
rarely publicized vs. the very public loss of troops and hardware
(i.e. Bay of Pigs, Somalia)
● Can be highly effective at causing chaos, confusion, loss of
productivity and GDP. And possibly.. LIVES.
The Threat Is Real
VICTIM EVENT ACTOR DAMAGE
Sony Corporate servers hacked and
upcoming movies and emails
leaked on Internet
North Korea Loss of IP and revenues;
embarrassment from top level
exec’s emails
Bushehr Nuclear
Facility
Stuxnet virus attacked nuclear
material centrifuges and altered
operations
US/Israel? Over 1000 centrifuges destroyed
plus collateral worldwide
damage
Powerplant in Ukraine Malware shut down power plant
for an hour
Russia? Area-wide power outage;
possible long term damage to
plant equipment
City of Las Vegas Large DDOS attack Iran and proxies None; attack was repulsed
Major city attacked in cyber-response
Advanced Persistent Threat (APT) Actors
COUNTRY DESCRIPTION IDEAL TARGETS PRIMARY OBJECTIVES
China Many separate groups
(APT1,2,3,10,19,20,30,40,41)
made up of PLA official units
and irregular or proxy groups.
100K+ total cyber-soldiers
Military-industrial
complex and
technology companies
Theft of IP and intelligence,
long term persistence
Russia Four main groups (Cozy Bear,
Fancy Bear Venomous Bear
and Voodoo Bear)
Political, financial and
Infrastructure
Political
disruption/interference,
some generic cybercrime
Iran Elfin, Helix Kitten, Charming
Kitten, APT39. Many related
proxy groups
US/Israel related
groups, companies
and sites
Propaganda posting,
destruction of infrastructure
and services
North Korea Lazarus Group, Ricochet
Chollima
Financial and general
industry/business
Monetary gain through fraud
and ransom
APT2 - People Liberation Army Cyber Division
Who is being targeted?
• Government entities:
– Military: Regular probes and attacks on all
branches, testing of field units, hacking of
drones
– Federal, state and local agencies - critical
services, gather data on citizens and
government workers, voting, disruption of
services
– Quasi-governmental - school districts, MUDs,
etc. to disrupt services, ransom hacked systems
But not limited to government entities
US Companies are targeted because the US relies on more
private enterprise for its critical services than other countries:
– Government contractors, esp. military to steal IP
– Financial to cause financial chaos, steal money
– Healthcare to disrupt services, sell or ransom data
– Manufacturing to insert backdoors, flaws, cause
accidents
– Utilities to cause service disruption and equipment
destruction
– Energy producers to upset supply and cause
accidents
This is not a Test! Actual Warning from DHS
Cyber-Terrorism can also threaten lives
Cyber-Terrorist Methods
and Attack Vectors
Cyber-Terrorist Methods
Increasing specialization and sophistication by
major APT threat actors and cyber-gangs have
them separating their “workforces” into:
• Malware code writing
• Network penetrators
• Social engineers
• PR and marketing - esp. for those seeking propaganda value
Some are delegating certain tasks to contractors and outside firms (Internet
Research Agency and Guccifer 2.0)
Use of custom code
A serious APT will write it’s own custom exploits in order
to evade standard signature based virus detection and to
adapt to specific elements in a target environment.
Example: Stuxnet was written to only activate when it
found a specific number of Siemens microcontrollers in a
specific array configuration that matched the internal
architecture of the Natanz nuclear facility centrifuges
Use of Zero Day Exploits
A Zero Day Exploit AKA 0-Day is an exploit that has never
been identified “in the wild” by security researchers. They
are particularly powerful as cyber-defences will not be
aware of them and software vendors will not have patches
available. Many APTs have contracts or offer bounties for
zero day exploits Once used extensively, the 0-Day’s
value goes down as they get publicized and remediated.
Targeting of vendors and MSPs
APTs are increasingly targeting vendors, Managed
Service Providers (MSPs) and other third party
providers as a “Force Multiplier” to increase the
scale and damage of attacks:
• APT10 (China) hacked into 45 MSPs and other
technology companies between 2006-2018
• 22 Texas cities were taken down simultaneously by
hacking a MSP they all used
DHS/CISA Warns MSPs of Danger
3rd Party Danger is Fueled by Outsourcing
Relationships between organizations and third party vendors
have become more complicated as more and more critical
business functions are outsourced and those third parties
are increasingly given access to internal networks and
resources
Hardware Software Cloud
• Average enterprise
has 67 vendors with
privileged access
The Third-Party Access Tsunami
• Average tech vendor has
238 customers
This Results In...
vendor reps log into the systems of the typical
enterprise each week.
Privileged Accounts
VPNs
Credentials
Critical Systems
Sensitive Data
Barriers to a Robust, Efficient Third-Party Remote
Access Solution
Security
Efficiency
Enterprise
Requirements VendorRequirements
Lack of resources or budget
Wrong tools
Too many tools / no standard
Decentralized vendor managers
Vendor buy-in
Best Practices for Managing 3rd Party Risk:
Keep your company from becoming “Collateral Damage” in the Age of
Cyber-terrorism
Third Party Security Best Practices
Identify and Authenticate
Control Access
Record and Audit
Identifying Your Vendors
Best Practice: Identify
GDPR
Of enterprises unsure of total
number of vendors accessing
networks
Company Names
Service/Function
Access Needs
Comprehensive list of
vendors
Best Practice: Identify
Don’t manage external
users with internal
Active Directory
Best Practice: Identify
Don’t allow generic
accounts
Identify every individual
Created efficiently
Given Least Privilege
Disabled when terminated
Best Practice: Identify
Enforce Multi-Factor
Authentication (MFA)
You may need multiple
options for multiple vendors.
Time-Based One-Time Password (TOTP)
Vendor Enforced
Best Practice: Identify
Employment verification
on login
Just because you identified the person, doesn’t mean
they are still authorized.
Verification before enabling Frequent reporting from vendor
Tool to verify on login
Controlling Your Vendors
Best Practice: Control
Secure Remote Access
Make sure the method
vendors are using to
remote access is actually
secure.
AV Protection
TLS 2.0/SSL/IPSec
FIPS-140 Certified Cryptography
Best Practice: Control
Least Privileged Access
Don’t put vendors on the network. Give them
access to directly what they need.
Hosts, Devices, Apps
Ports/Services
No Scanning
No Leapfrogging
Best Practice: Control
Decentralize Access
Approvals
Make sure the right resource is
enabling access as needed for better
security and efficiency.
App Owners own the relationship
with their vendor.
Access for a vendor is usually being
requested by the App Owner.
IT determines
WHAT a vendor
has access to.
App Owner
determines
WHEN a vendor
has access.
Best Practice: Control
Vendors should not know
network credentials
One set of keys to get the vendor
into the “lobby” where they can see
the hosts they need to connect to.
One set of keys the vendor does not
have to authenticate to the hosts on
the network.
Credential Vault
Single Sign On
Federated Authentication
Auditing Your Vendors
Best Practice: Audit
Tie contextual info to audit
Who connected
Host/IP of system connected to
Origin source IP
Session start/end time
Authorizer
Reason for connecting
Associated ticket number
Minimum Logs:
Granular Logs:
Best Practice: Audit
Centralize Vendor Audit
You need a single source of truth (SSOT) for third-
party remote access that allows for quick and
easy auditing and reporting of all user activity so
you can consolidate the required reports to
demonstrate compliance and conduct necessary
investigations efficiently.
Ponemon 2017 Cost of a Data Breach Study shows, the
longer it takes to detect a breach, the more expensive
it will be.
Firewall Audit
Disable Unapproved Methods
Redirect to Approved Methods
Best Practice: Audit
Make sure audit is viewed
Breaches discovered by an
external source.
Setup notifications with real-
time basic audit
● Notifications on login/logout
● Alerts on suspicious activity
Vendor Privileged Access Management (VPAM)
Introducing VPAM - Vendor Privileged
Access Management
Purpose-Built
for Vendor
Management
Supports HIPAA
Compliance &
Security Standards
Fast Time-to-Value
with All-in-One
Healthcare Offering
What Makes SecureLink Different
Supports
Enterprise-Grade
Remote Access
Your Partner for Vendor Privileged Access
Focused solely on secure
vendor privileged access for
highly regulated industries
Support more than 30,000
organizations worldwide
www.securelink.com
contact@securelink.com
888.897.4498
www.securelink.com
contact@securelink.com
888.897.4498

Contenu connexe

Tendances

Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesCorporater
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.Unified11
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementCharles Steve
 
bsi-cyber-resilience-presentation
bsi-cyber-resilience-presentationbsi-cyber-resilience-presentation
bsi-cyber-resilience-presentationAjai Srivastava
 
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best PracticeThird Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best PracticeDVV Solutions Third Party Risk Management
 
The challenges for the internal auditor
The challenges for the internal auditorThe challenges for the internal auditor
The challenges for the internal auditorRodoljub Kajganić
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performanceAbhishek Sood
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresSamuel Loomis
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksHernan Huwyler, MBA CPA
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsVisionet Systems, Inc.
 
Third-Party Risk Management
Third-Party Risk ManagementThird-Party Risk Management
Third-Party Risk ManagementMark Scales
 
Key Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management ProgramsKey Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management ProgramsColleen Beck-Domanico
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentBradley Susser
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & GovernanceEDR
 
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPARiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPAHernan Huwyler, MBA CPA
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk ManagementNikhil Soni
 

Tendances (20)

Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment QuestionnairesThird-Party Risk Management (TPRM) | Risk Assessment Questionnaires
Third-Party Risk Management (TPRM) | Risk Assessment Questionnaires
 
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
CYBERSECURITY, RISK & COMPLIANCE | AMPCUS INC.
 
Tackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-managementTackling the-challenges-of-third-party-risk-management
Tackling the-challenges-of-third-party-risk-management
 
bsi-cyber-resilience-presentation
bsi-cyber-resilience-presentationbsi-cyber-resilience-presentation
bsi-cyber-resilience-presentation
 
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best PracticeThird Party Risk Assessment Due Diligence - Managed Service as Best Practice
Third Party Risk Assessment Due Diligence - Managed Service as Best Practice
 
FSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoVFSI_Third Party Risk Management_Deloitte PoV
FSI_Third Party Risk Management_Deloitte PoV
 
The challenges for the internal auditor
The challenges for the internal auditorThe challenges for the internal auditor
The challenges for the internal auditor
 
How to measure your cybersecurity performance
How to measure your cybersecurity performanceHow to measure your cybersecurity performance
How to measure your cybersecurity performance
 
Generic_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_ProceduresGeneric_Sample_INFOSECPolicy_and_Procedures
Generic_Sample_INFOSECPolicy_and_Procedures
 
Information Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT RisksInformation Risk Management - Cyber Risk Management - IT Risks
Information Risk Management - Cyber Risk Management - IT Risks
 
IT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet SystemsIT Security and Risk Management - Visionet Systems
IT Security and Risk Management - Visionet Systems
 
Third-Party Risk Management
Third-Party Risk ManagementThird-Party Risk Management
Third-Party Risk Management
 
Key Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management ProgramsKey Challenges Facing Vendor Risk Management Programs
Key Challenges Facing Vendor Risk Management Programs
 
The Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk AssessmentThe Significance of IT Security Management & Risk Assessment
The Significance of IT Security Management & Risk Assessment
 
TI Managing Third Party Risk
TI Managing Third Party RiskTI Managing Third Party Risk
TI Managing Third Party Risk
 
Third-Party Oversight & Governance
Third-Party Oversight & GovernanceThird-Party Oversight & Governance
Third-Party Oversight & Governance
 
Integrated GRC
Integrated GRCIntegrated GRC
Integrated GRC
 
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPARiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
RiskAllay - Digital Compliance - Prof- Hernan Huwyler MBA CPA
 
Risk Technology Strategy, Selection and Implementation
Risk Technology Strategy, Selection and ImplementationRisk Technology Strategy, Selection and Implementation
Risk Technology Strategy, Selection and Implementation
 
Information Security Risk Management
Information Security Risk ManagementInformation Security Risk Management
Information Security Risk Management
 

Similaire à Protect Your Networks from Cyber Attacks with 3rd Party Risk Management

Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsCognizant
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent ThreatsBooz Allen Hamilton
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationTriCorps Technologies
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfssuser6c59cb
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxAbimbolaFisher1
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessFibonalabs
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxtumainjoseph
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxtumainjoseph
 
T CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxT CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxtumainjoseph
 
Chatter's cyber security position analysis
Chatter's cyber security position analysisChatter's cyber security position analysis
Chatter's cyber security position analysisprathibhapalagiri
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityIllumeo
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing Netpluz Asia Pte Ltd
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUUniversity of Essex
 

Similaire à Protect Your Networks from Cyber Attacks with 3rd Party Risk Management (20)

CYBER51-FYLER
CYBER51-FYLERCYBER51-FYLER
CYBER51-FYLER
 
Application Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting ReputationsApplication Security: Safeguarding Data, Protecting Reputations
Application Security: Safeguarding Data, Protecting Reputations
 
ENSA_Module_3.pptx
ENSA_Module_3.pptxENSA_Module_3.pptx
ENSA_Module_3.pptx
 
Countering Advanced Persistent Threats
Countering Advanced Persistent ThreatsCountering Advanced Persistent Threats
Countering Advanced Persistent Threats
 
Cybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your OrganizationCybersecurity Attack Vectors: How to Protect Your Organization
Cybersecurity Attack Vectors: How to Protect Your Organization
 
securityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdfsecurityattackvectorsslidesharefinal-160405191759.pdf
securityattackvectorsslidesharefinal-160405191759.pdf
 
Zero Trust.pptx
Zero Trust.pptxZero Trust.pptx
Zero Trust.pptx
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
Cyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptxCyber Threat Intelligence.pptx
Cyber Threat Intelligence.pptx
 
M1_Introduction_IPS.pptx
M1_Introduction_IPS.pptxM1_Introduction_IPS.pptx
M1_Introduction_IPS.pptx
 
Cyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful BusinessCyber Security: Most Important Aspect of a Successful Business
Cyber Security: Most Important Aspect of a Successful Business
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptx
 
ASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptxASSIGNMENT CYBER SECURITY ppt.pptx
ASSIGNMENT CYBER SECURITY ppt.pptx
 
T CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptxT CYBER SECURITY ppt.pptx
T CYBER SECURITY ppt.pptx
 
Chatter's cyber security position analysis
Chatter's cyber security position analysisChatter's cyber security position analysis
Chatter's cyber security position analysis
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing VAPT - Vulnerability Assessment & Penetration Testing
VAPT - Vulnerability Assessment & Penetration Testing
 
Module 1.pdf
Module 1.pdfModule 1.pdf
Module 1.pdf
 
module 1 Cyber Security Concepts
module 1 Cyber Security Conceptsmodule 1 Cyber Security Concepts
module 1 Cyber Security Concepts
 
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EUAnatomy of a breach - an e-book by Microsoft in collaboration with the EU
Anatomy of a breach - an e-book by Microsoft in collaboration with the EU
 

Plus de DevOps.com

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareDevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...DevOps.com
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykDevOps.com
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudDevOps.com
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and PredictionsDevOps.com
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionDevOps.com
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)DevOps.com
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDevOps.com
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureDevOps.com
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportDevOps.com
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogDevOps.com
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDevOps.com
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid finalDevOps.com
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureDevOps.com
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021DevOps.com
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?DevOps.com
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsDevOps.com
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...DevOps.com
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...DevOps.com
 

Plus de DevOps.com (20)

Modernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source SoftwareModernizing on IBM Z Made Easier With Open Source Software
Modernizing on IBM Z Made Easier With Open Source Software
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
Comparing Microsoft SQL Server 2019 Performance Across Various Kubernetes Pla...
 
Next Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and SnykNext Generation Vulnerability Assessment Using Datadog and Snyk
Next Generation Vulnerability Assessment Using Datadog and Snyk
 
Vulnerability Discovery in the Cloud
Vulnerability Discovery in the CloudVulnerability Discovery in the Cloud
Vulnerability Discovery in the Cloud
 
2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions2021 Open Source Governance: Top Ten Trends and Predictions
2021 Open Source Governance: Top Ten Trends and Predictions
 
A New Year’s Ransomware Resolution
A New Year’s Ransomware ResolutionA New Year’s Ransomware Resolution
A New Year’s Ransomware Resolution
 
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
Getting Started with Runtime Security on Azure Kubernetes Service (AKS)
 
Don't Panic! Effective Incident Response
Don't Panic! Effective Incident ResponseDon't Panic! Effective Incident Response
Don't Panic! Effective Incident Response
 
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's CultureCreating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
Creating a Culture of Chaos: Chaos Engineering Is Not Just Tools, It's Culture
 
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with TeleportRole Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport
 
Monitoring Serverless Applications with Datadog
Monitoring Serverless Applications with DatadogMonitoring Serverless Applications with Datadog
Monitoring Serverless Applications with Datadog
 
Deliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or PrivatelyDeliver your App Anywhere … Publicly or Privately
Deliver your App Anywhere … Publicly or Privately
 
Securing medical apps in the age of covid final
Securing medical apps in the age of covid finalSecuring medical apps in the age of covid final
Securing medical apps in the age of covid final
 
How to Build a Healthy On-Call Culture
How to Build a Healthy On-Call CultureHow to Build a Healthy On-Call Culture
How to Build a Healthy On-Call Culture
 
The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021The Evolving Role of the Developer in 2021
The Evolving Role of the Developer in 2021
 
Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?Service Mesh: Two Big Words But Do You Need It?
Service Mesh: Two Big Words But Do You Need It?
 
Secure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift EnvironmentsSecure Data Sharing in OpenShift Environments
Secure Data Sharing in OpenShift Environments
 
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
How to Govern Identities and Access in Cloud Infrastructure: AppsFlyer Case S...
 
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
Elevate Your Enterprise Python and R AI, ML Software Strategy with Anaconda T...
 

Dernier

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsYoss Cohen
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...Karmanjay Verma
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Karmanjay Verma
 

Dernier (20)

MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Infrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platformsInfrared simulation and processing on Nvidia platforms
Infrared simulation and processing on Nvidia platforms
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...React JS; all concepts. Contains React Features, JSX, functional & Class comp...
React JS; all concepts. Contains React Features, JSX, functional & Class comp...
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#Microservices, Docker deploy and Microservices source code in C#
Microservices, Docker deploy and Microservices source code in C#
 

Protect Your Networks from Cyber Attacks with 3rd Party Risk Management

  • 1. Protect Yourself from Cyber Attacks Through Proper Third-Party Risk Management
  • 2. Today’s Speakers Tony Howlett is a published author and speaker on various security, compliance, and technology topics. He serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. He is a certified AWS Solutions Architect and holds the CISSP, GNSA certifications, and a B.B.A in Management Information Systems. Tony is currently the CISO at SecureLink. Justin Strackany is the Chief Customer Officer at SecureLink. He has been with the company since it was founded in 2003, serving in many customer-focused capacities, including sales engineering, implementation, customer success, account management, and onboarding new clients. Over the years, he has developed deep partnerships with some of the largest, most complex enterprise organizations and technology vendors in industries such as healthcare, gaming, legal, finance, and retail.
  • 3. Cyberterrorism and why Third Party Risk Management Cyberterrorism: Why 3rd Party Risk Management Matters The State of Cyber-Terrorism Actors, Methods and Attack Vectors Best Practices for Managing Third-Party Risk Demo of SecureLink VPAM
  • 4. The Current State of Cyber-Terrorism
  • 5. The Age of Cyber-Terrorism In the modern era of increasingly connected countries through the Internet and the importance of those services, nation state actors and affiliated groups are increasingly turning to cyber-attacks and cyber- terrorism to carry out their national and political goals. ● Fast: Attacks take be carried out from ANYWHERE to ANYWHERE at the speed of light and easily cross national boundaries ● Low Cost: Capable technicians with computers ● Hard to attribute: The perpetrator can be concealed, hidden or otherwise obfuscated. ● Less chance of embarrassing failure. If a cyber attack fails, it is rarely publicized vs. the very public loss of troops and hardware (i.e. Bay of Pigs, Somalia) ● Can be highly effective at causing chaos, confusion, loss of productivity and GDP. And possibly.. LIVES.
  • 6. The Threat Is Real VICTIM EVENT ACTOR DAMAGE Sony Corporate servers hacked and upcoming movies and emails leaked on Internet North Korea Loss of IP and revenues; embarrassment from top level exec’s emails Bushehr Nuclear Facility Stuxnet virus attacked nuclear material centrifuges and altered operations US/Israel? Over 1000 centrifuges destroyed plus collateral worldwide damage Powerplant in Ukraine Malware shut down power plant for an hour Russia? Area-wide power outage; possible long term damage to plant equipment City of Las Vegas Large DDOS attack Iran and proxies None; attack was repulsed
  • 7. Major city attacked in cyber-response
  • 8. Advanced Persistent Threat (APT) Actors COUNTRY DESCRIPTION IDEAL TARGETS PRIMARY OBJECTIVES China Many separate groups (APT1,2,3,10,19,20,30,40,41) made up of PLA official units and irregular or proxy groups. 100K+ total cyber-soldiers Military-industrial complex and technology companies Theft of IP and intelligence, long term persistence Russia Four main groups (Cozy Bear, Fancy Bear Venomous Bear and Voodoo Bear) Political, financial and Infrastructure Political disruption/interference, some generic cybercrime Iran Elfin, Helix Kitten, Charming Kitten, APT39. Many related proxy groups US/Israel related groups, companies and sites Propaganda posting, destruction of infrastructure and services North Korea Lazarus Group, Ricochet Chollima Financial and general industry/business Monetary gain through fraud and ransom
  • 9. APT2 - People Liberation Army Cyber Division
  • 10. Who is being targeted? • Government entities: – Military: Regular probes and attacks on all branches, testing of field units, hacking of drones – Federal, state and local agencies - critical services, gather data on citizens and government workers, voting, disruption of services – Quasi-governmental - school districts, MUDs, etc. to disrupt services, ransom hacked systems
  • 11. But not limited to government entities US Companies are targeted because the US relies on more private enterprise for its critical services than other countries: – Government contractors, esp. military to steal IP – Financial to cause financial chaos, steal money – Healthcare to disrupt services, sell or ransom data – Manufacturing to insert backdoors, flaws, cause accidents – Utilities to cause service disruption and equipment destruction – Energy producers to upset supply and cause accidents
  • 12. This is not a Test! Actual Warning from DHS
  • 13. Cyber-Terrorism can also threaten lives
  • 15. Cyber-Terrorist Methods Increasing specialization and sophistication by major APT threat actors and cyber-gangs have them separating their “workforces” into: • Malware code writing • Network penetrators • Social engineers • PR and marketing - esp. for those seeking propaganda value Some are delegating certain tasks to contractors and outside firms (Internet Research Agency and Guccifer 2.0)
  • 16. Use of custom code A serious APT will write it’s own custom exploits in order to evade standard signature based virus detection and to adapt to specific elements in a target environment. Example: Stuxnet was written to only activate when it found a specific number of Siemens microcontrollers in a specific array configuration that matched the internal architecture of the Natanz nuclear facility centrifuges
  • 17. Use of Zero Day Exploits A Zero Day Exploit AKA 0-Day is an exploit that has never been identified “in the wild” by security researchers. They are particularly powerful as cyber-defences will not be aware of them and software vendors will not have patches available. Many APTs have contracts or offer bounties for zero day exploits Once used extensively, the 0-Day’s value goes down as they get publicized and remediated.
  • 18. Targeting of vendors and MSPs APTs are increasingly targeting vendors, Managed Service Providers (MSPs) and other third party providers as a “Force Multiplier” to increase the scale and damage of attacks: • APT10 (China) hacked into 45 MSPs and other technology companies between 2006-2018 • 22 Texas cities were taken down simultaneously by hacking a MSP they all used
  • 19. DHS/CISA Warns MSPs of Danger
  • 20. 3rd Party Danger is Fueled by Outsourcing Relationships between organizations and third party vendors have become more complicated as more and more critical business functions are outsourced and those third parties are increasingly given access to internal networks and resources Hardware Software Cloud
  • 21. • Average enterprise has 67 vendors with privileged access The Third-Party Access Tsunami • Average tech vendor has 238 customers
  • 22. This Results In... vendor reps log into the systems of the typical enterprise each week. Privileged Accounts VPNs Credentials Critical Systems Sensitive Data
  • 23. Barriers to a Robust, Efficient Third-Party Remote Access Solution Security Efficiency Enterprise Requirements VendorRequirements Lack of resources or budget Wrong tools Too many tools / no standard Decentralized vendor managers Vendor buy-in
  • 24. Best Practices for Managing 3rd Party Risk: Keep your company from becoming “Collateral Damage” in the Age of Cyber-terrorism
  • 25. Third Party Security Best Practices Identify and Authenticate Control Access Record and Audit
  • 27. Best Practice: Identify GDPR Of enterprises unsure of total number of vendors accessing networks Company Names Service/Function Access Needs Comprehensive list of vendors
  • 28. Best Practice: Identify Don’t manage external users with internal Active Directory
  • 29. Best Practice: Identify Don’t allow generic accounts Identify every individual Created efficiently Given Least Privilege Disabled when terminated
  • 30. Best Practice: Identify Enforce Multi-Factor Authentication (MFA) You may need multiple options for multiple vendors. Time-Based One-Time Password (TOTP) Vendor Enforced
  • 31. Best Practice: Identify Employment verification on login Just because you identified the person, doesn’t mean they are still authorized. Verification before enabling Frequent reporting from vendor Tool to verify on login
  • 33. Best Practice: Control Secure Remote Access Make sure the method vendors are using to remote access is actually secure. AV Protection TLS 2.0/SSL/IPSec FIPS-140 Certified Cryptography
  • 34. Best Practice: Control Least Privileged Access Don’t put vendors on the network. Give them access to directly what they need. Hosts, Devices, Apps Ports/Services No Scanning No Leapfrogging
  • 35. Best Practice: Control Decentralize Access Approvals Make sure the right resource is enabling access as needed for better security and efficiency. App Owners own the relationship with their vendor. Access for a vendor is usually being requested by the App Owner. IT determines WHAT a vendor has access to. App Owner determines WHEN a vendor has access.
  • 36. Best Practice: Control Vendors should not know network credentials One set of keys to get the vendor into the “lobby” where they can see the hosts they need to connect to. One set of keys the vendor does not have to authenticate to the hosts on the network. Credential Vault Single Sign On Federated Authentication
  • 38. Best Practice: Audit Tie contextual info to audit Who connected Host/IP of system connected to Origin source IP Session start/end time Authorizer Reason for connecting Associated ticket number Minimum Logs: Granular Logs:
  • 39. Best Practice: Audit Centralize Vendor Audit You need a single source of truth (SSOT) for third- party remote access that allows for quick and easy auditing and reporting of all user activity so you can consolidate the required reports to demonstrate compliance and conduct necessary investigations efficiently. Ponemon 2017 Cost of a Data Breach Study shows, the longer it takes to detect a breach, the more expensive it will be. Firewall Audit Disable Unapproved Methods Redirect to Approved Methods
  • 40. Best Practice: Audit Make sure audit is viewed Breaches discovered by an external source. Setup notifications with real- time basic audit ● Notifications on login/logout ● Alerts on suspicious activity
  • 41. Vendor Privileged Access Management (VPAM)
  • 42. Introducing VPAM - Vendor Privileged Access Management
  • 43. Purpose-Built for Vendor Management Supports HIPAA Compliance & Security Standards Fast Time-to-Value with All-in-One Healthcare Offering What Makes SecureLink Different Supports Enterprise-Grade Remote Access
  • 44. Your Partner for Vendor Privileged Access Focused solely on secure vendor privileged access for highly regulated industries Support more than 30,000 organizations worldwide www.securelink.com contact@securelink.com 888.897.4498