trust no file. trust no device. - hcahca.org.vn/userfiles/files/tham luan vio 2019/panel...

32
© 2002 – 2019 OPSWAT, Inc. All rights reserved. Trust no file. Trust no device.

Upload: others

Post on 10-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Trust no file. Trust no device.

Page 2: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved. © 2002 – 2019 OPSWAT, Inc. All rights reserved.

How To Protect Critical Infrastructure From Ever-Increasing Cyber Threats? Tri Vu, Director of Software Engineering

VIO 2019 – Shaping The Future of Vietnam Fintech

Page 3: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

What is Critical Infrastructure? Introduction

• Cyber systems and physical assets that are so vital to the nation

• Provides the essential services that underpin national society.

Page 4: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Critical Infrastructure Protection (CIP) protects our way of life

Introduction

Page 5: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Critical Networks

Lack data transfer processes Targeted & zero-day attacks

Growth in malware

Growth in vulnerabilities Loss of sensitive data

Compliance

Security Challenges THE CYBER SECURITY LANDSCAPE

Page 6: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Total malware keeps growing THE CYBER SECURITY LANDSCAPE

47.05 65.26 99.71

182.9

326.04

470.01

597.49

719.15

856.62

940

0

100

200

300

400

500

600

700

800

900

1000

2010 2011 2012 2013 2014 2015 2016 2017 2018 2019

Source: Copywrite © AVTest

(Millions)

Page 7: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Vulnerabilities keep growing THE CYBER SECURITY LANDSCAPE

0

2000

4000

6000

8000

10000

12000

14000

16000

18000

2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019

Source: Copywrite © AVTest

High

Medium

Low

Page 8: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

More cyber security vendors every year

THE CYBER SECURITY LANDSCAPE

Page 9: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Cyber security budgets on the increase

THE CYBER SECURITY LANDSCAPE

Spending on cybersecurity in the United States from 2015, projected to 2025 (in Billion US dollars)

0

10

20

30

40

50

60

70

80

2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025

Enterprise Security Endpoint Security Cloud Security Network Security Application Security Others

Source: GrandviewResearch.com

Page 10: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Significant Cyber Incidents (Globally) THE CYBER SECURITY LANDSCAPE

0

20

40

60

80

100

120

2011 2012 2013 2014 2015 2016 2017 2018 2019

*

Source: Center for Strategic and International Studies * 2019 data extrapolate from first 7 months

Page 12: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Page 13: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Prevention not only based on detection

Page 14: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Malware bypasses existing defense systems

ASSESSMENT AND CONCLUSION

Malware is Passing Existing Prevention

• Malware sample detected by one antivirus (AV) engine on 2019-06-19

• Two weeks later, only half of the AV engines we host were detecting this malware

• Took 50 days to be detected by 27 AV engines

• Twelve AV engines still are not detecting this malware

Page 15: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Evolutionary Malware ASSESSMENT AND CONCLUSION

Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018)

Percentage of malware that has at least one analysis

workaround Percentage of malware have 6 or more analysis workarounds

("hype-evasive" malware)

Percentage of malware that can avoid detection from a single sandbox

Page 16: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

0.1% = 350

350,000

Malwares not detected / day

Number of new malware developed in 2017 * AV-TEST Security Report

New malwares / day

121,700,000

Page 17: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Lack a Data Transfer Process ASSESSMENT AND CONCLUSION

Secure Networks

Air Gapped Networks

?

?

?

?

Page 18: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Access control products not designed for the cloud

ASSESSMENT AND CONCLUSION

Access

Control

Perimeter moving to Cloud

Losing access controls from endpoints Device risks overlooked

Traditional NAC Challenges

BYOD Adoption

Productivity loss due to false b locking Not designed for cloud Lack of security professionals to manage

Shadow IT Not ab le to manage or control Many operating system variations

Page 19: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Security tools integration challenge

ASSESSMENT AND CONCLUSION

IT SECURITY

DLP

NAC

Malware is Passing Existing Prevention

Page 20: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Security Professional Shortage ASSESSMENT AND CONCLUSION

• Unfilled cybersecurity jobs has grown by more than 50% since

2015

• Over 50% of organizations now reporting a prob lematic shortage of

cybersecurity skills.

Enterprise Strategy Group annual survey on the percentage of organizations reporting a prob lematic shortage of cybersecurity skills

53%

51%

48%

42%

2019

2018

2017

2016

Page 21: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

#1 CDR according to US government agency report 100M endpoints protected 2,000+ certified applications Protecting 98% of US nuclear facilities 11 patents

About OPSWAT

Founded in 2002 8 global offices 300+ employees 1,400+ customers 24/7 support

Page 22: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

+1,400 enterprise customers worldwide

Protect 98% U.S nuclear facilities

Page 23: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

ENERGY TECHNOLOGY FINANCE MANUFACTURING DEFENSE GOVERNMENT

Page 24: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Trust no file. Trust no device. Zero trust philosophy

Page 25: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Addressing Cyber Defense Limitations OPSWAT’s data and device security solutions

OUR APPROACH TO CYBER DEFENSE

Page 26: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Data Security Solution OUR APPROACH TO CYBER DEFENSE

Page 27: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

No.1 CDR in the world OUR APPROACH TO CYBER DEFENSE

Protect organizations from content based threats CDR (Content Disarm and Reconstruction)

Sanitize Use Identify & Scan

Built-in macros and scripts used in many targeted attacks Eliminate zero day threat

Prevent unknown threats Reconstruct file format while maintaining maximum usability

Page 28: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Isolate your network Create a secure process to transfer files to and from your critical networks

OUR APPROACH TO CYBER DEFENSE

LOGIN

Secure Networks

Air Gapped Networks

?

?

?

Page 29: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Isolate your network Create a secure process to transfer files to and from your critical networks

OUR APPROACH TO CYBER DEFENSE

LOGIN

Secure Networks

Air Gapped Networks

?

?

?

Page 30: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Device Security Solution OUR APPROACH TO CYBER DEFENSE

Page 31: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Create A Secure Data and Device Transfer Process

OUR APPROACH TO CYBER DEFENSE

Page 32: Trust no file. Trust no device. - HCAhca.org.vn/userfiles/files/Tham luan VIO 2019/PANEL 05/3...Source: Evasive Malware Now a Commodity: Security Week, Siggi Stefnisson (2018) Percentage

© 2002 – 2019 OPSWAT, Inc. All rights reserved.

Thank You