practical defensive security discussionspractical holistic, move the needle security investments...

18
Practical Defensive Security Discussions Jeff Fawcett Cisco Director Cybersecurity [email protected]

Upload: others

Post on 14-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Practical Defensive Security Discussions

Jeff Fawcett

Cisco Director Cybersecurity

[email protected]

Page 2: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Agenda

What Makes You a Target?

You Need a Security Framework:• NIST 800-53 and 800-171 (old reliable?)

• Forrester's Zero Trust (everyone is looking at)

Common Use Cases

Practical Suggestions

Q&A

Page 3: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Cisco Confidential 3© 2015 Cisco and/or its affiliates. All rights reserved.

What Do You Have That Makes You a Target

Specific Encryption, 2FA, Inventory,

PCI

Segmentation, DLP, Multifactor Authentication

PII and HIPAA

NIST 800- 171 Continuity

Grants, Testing

ResearchWho is your threat?Zero Trust Network Model

Page 4: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Think: “My network infrastructure sits on the Internet.”

https://www.cbsnews.com/news/wannacry-ransomware-attacks-wannacry-virus-losses/

Are existing security standards failing to Protect You?

Has the perimeter been eroded?Defense in depth is common approach, but may be too simplistic for today’s digital-enabled business.

Page 5: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Best Practices within NIST Framework

Page 6: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

1. Identify and Catalog your Sensitive Data

2. Map the data flows of your sensitive data

3. Architect your Zero Trust network

4. Create your automated rule base

5. Continuously monitor your trusted ecosystem

5 Guiding Principles for Zero Trust (assume your network is on the internet )(Strategy – outside scope of todays presentation)

Page 7: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Ask Questions Please

Common Use Cases to Address:

• Ransomware bricked my servers or workstations – backup/block coming in, block going out

• Federal Grants are requiring a cybersecurity program explanation

• Healthcare Compliance HIPAA

• Compliance Issues - PII/PCI/NIST

• Infrastructure (Healthcare, Power, Water, Roads, Digital Signage, Buildings, IoT)

• Insider…. East-West

• Need to control who get on my network - NAC

• Protect my mobile users – lockdown your MDM Console

Page 8: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Common Use Cases to Address:

• Protecting the State’s brand name (affecting what businesses want to move to NY or stay)

• Moving to the Cloud securely (do you know your flows? Dependencies? Top 2 for failure)

• Encrypted traffic moving through and out of your network

• Moving to the Cloud securely (do you know your flows? Dependencies? Top 2 for failure)

• Application security; WordPress sites; Flash; Java Script; etc. Targets

• Protecting your email system and end users from Phishing, Ransomware, Miners

• Been Breached – IR; IR Prep; APT Hunting

Page 9: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Where and What is Your Risk at Your Agency? That Should Drive Your Priorities.

• Long term impact of stolen Research like loss of grants

• Infrastructure (Healthcare, Power, Water, Roads, Digital Signage, Buildings, IoT)

• Insider…. East-West

• Election Security

Page 10: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Practical Holistic, Move the Needle Security Investments

• Attack probability (see upside down pyramid) . Understand who is coming after just you. What are their capabilities? Potential loss. What do you need to address that

• Use DNS protection, large majority of breaches (90%) involve DNS (ingress, egress)

• What Are The Best 5 Things You Can Do With The Time and $$$ You Have ?? Maybe

oA Cybersecurity framework, leveraging Cybersecurity Analytics, fast to detect, block, and mitigate

o Incident Response Preparation, Basic Logical Segmentation

oRemove Admin rights (least privilege)

oMFA (Multi Factor Authentication) as all your credentials are stolen, way to block them from using the Admin’s

Page 11: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Some Best Practices Suggestions

• Logically Segment your network (by App, Data, Users) using visibility, Isolation, policy enforcement, and Identity

• Patch management done right will harden your security

• Monitor your DNS and use Netflow to improve security.

• Watch your outflow and inflows for unusual events, traffic, quantity.

• Multi-factor your Admins when they login, track their logs

• Lock down your MDM tool/dashboard

• CMMI baseline

Page 12: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Some Best Practices Suggestions

• Everything (firewalls, IDP/S, applications, security solutions, etc) must tie to your intelligence. Start with state focus, then national, then world. Can not emphasis using the best intelligence is key if integrated to your solutions.

• Analytics is the new security approach. Pair with automation and integration

• Cyber Range Training, Education

• Pen Testing, Red Teaming

• Look for grey market hardware

• Streamline regulatory compliance with segmentation

Page 13: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Some Best Practices Suggestions

• Whitelisting to control a few key applications and sensitive data (not AD)

• Quick Meantime to Detection by using Intel, integration and Analytics

• IoT needs to be on its own network

• Privilege escalation management

• Limit Partner, vendor, contractor access

• Use NAC to inventory and spot new devices on the network

• Site to site VPN

• Reverse Proxy via Browser

Page 14: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Some of Jeff’s List – Practical Suggestions

• Integrity of data, configurations

• Baseline your security strategy program

• Use risk, threat and consequences to prioritize

• DNSSEC

• DMARC

• Lock down the MDM Console

• Educations Awareness Training

• Know what your top 50 IP or sensitive data is and where it sits

• NAC to stop jailbroken devices

Page 15: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Some of Jeff’s List – Practical Suggestions

• NAC Detect and inventory new devices coming onto your network

• DLP to stop accidental leakage

• Remove XP

• Block TOR and I2P protocols

• Reduce use of Java and Java Script

• Use encrypted gateway to handle PCI and sensitive data

• It is all about securing the data, not your network

• In certain cases use default deny all – white list

• Turn off every port and service not needed

Page 16: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

In Review

Discussed What is Important to You

You Need a Security Framework:• NIST 800-53 and 800-171• Forrester's Zero Trust

Common Use Cases

Practical Suggestions

Q&A Lets talk?

Page 17: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just

Q & A

Page 18: Practical Defensive Security DiscussionsPractical Holistic, Move the Needle Security Investments •Attack probability (see upside down pyramid) . Understand who is coming after just