130 likes | 253 Vues
This presentation by Phoram Mehta, a Senior Manager of Information Security Management at PayPal, explores the significant challenge of insider attacks posed by employees and third parties utilizing legitimate access to networks and sensitive data. It highlights the prevalence of this threat, the impact of notable incidents such as the Snowden leaks, and emphasizes the importance of robust prevention strategies. The discussion includes innovative approaches, risk management, and the need for data classification and effective detection mechanisms to safeguard organizations.
E N D
Leveraging Information to Detect and Prevent Insider Attacks • Phoram Mehta • Senior Manager, Information Security Management, PayPal
Problem Definition Solution Challenges Current approaches A (New*) Proposal Q&A AGENDA
DEFINITION Threats posed by employees, third parties, or malicious software that use legitimate access rights to networks, applications, and sensitive data
Is this really a problem? Regular or Rare? T Childs San Francisco Network Administrator Changed admin passwords $900,000, and 60 percent of city services were affected Snowden CIA/NSA/Dell/BAH Leaked top-secret US gov surveillance details National security, and Privacy Phishing RSA SecurID Twitter May 2014?
Why should I care? Impact Minority but more Damage 40% of data breaches and 1/3 of all malicious attacks 50% more vulnerable – ESG survey
Scale Cloud Volume APT/New attacks Privacy/Trust Challenges to Solution
A (New*) Approach ALARM AuthN and AuthZ Leakage Detection/Prevention Analytics Risk Management • Pre-requisites: • Data classification • BIA • Segmentation like the 80’s
They are different In the right places Strong – 2FA, Biometric or SMS Review Don’t forget Physical Authentication and Authorization
Each workstation/BYOD Outbound traffic IM/Email/SM Consequences Prevention is very hard Leakage Detection and Prevention
End-to-End event correlation Priv User Pattern recognition Data Visualization Threat models/rules for known incidents Advanced heuristics and prediction Analytics
Current State • Business Drivers • IP vs Customer data • Critical systems • Physical Security • Vendor Management Cost of Mitigation Company Culture External Obligations Roadmap for Growth Risk Management
Some Sources for Additional Information ESG Insider Threat research - http://www.vormetric.com/sites/default/files/ap_Vormetric-Insider_Threat_ESG_Research_Brief.pdf SANS Reading Room - http://www.sans.org/reading-room/whitepapers/incident/protecting-insider-attacks-33168 CINDER (US Mil Insider Threat program) - http://www.darpa.mil/Our_Work/I2O/Programs/Cyber-Insider_Threat_(CINDER).aspx
Q & A Thank You