Connect Securely in an Unsecure World Jon Clay Director: Global Threat Communications @jonlclay www.cloudsec.com
More devices More data More risks
Global Risks Landscape 2018 Source: http://www3.weforum.org/docs/wef_grr18_report.pdf
Threat Landscape in Review In the second quarter of 2018 the Trend Micro Smart Protection Network security infrastructure blocked over 11 billion threats a 1.6 billion increase from last quarter.
Number of email threats blocked Email threats made up 84% of the overall threats blocked in Q2.
Malware detections 1H 18
Home Router Data
202 SCADA HMI vulnerabilities this midyear, versus 144 for the entire previous year.
Connect Securely www.cloudsec.com
Security Vendor Support Industry Consumers Business Government Healthcare Law Enforcement Responsible disclosure Alerts, blogs, news, reports, guidance Threat Intelligence Sharing Free tools Public/Private Partnerships Threat Research Cyber Threats Vulnerabilities & Exploits Targeted Attacks AI & Machine Learning IoT OT / IIoT Cybercriminal Undergrounds Future Threat Landscape Insights to improve technology and products
Data The Foundation of AI / Machine Learning Malware and benign samples Behavior logs Statistics of File, IP, Domain Histogram, Prevalence, Distribution, etc. Honey pot emails Hosted Email Service Web URL Web page contents Exploit kits Device info & identification CVE database NetFlow logs Process behavior logs Correlated Data + In-depth Knowledge
Vulnerability Lifecycle Pre-disclosure Virtual Patch Post-disclosure Patch Vulnerability Discovered Vulnerability Privately Disclosed Vulnerability Publicly Disclosed Vulnerability Introduced Patch Available Patch Installed Patch Installed Patch Installed
Best Practices User Security Passwords Email Safety Online Safety Outside of the office Use a different password for EVERY account Use a password manager Trend Micro Password Manager LastPass 1Password Use long and complex passwords No Post-it notes under your keyboard Don t tell anyone your password(s)
Best Practices User Security Passwords Email Safety Online Safety Outside of the office Phishing awareness training Trend Micro Phish Insight Cofense KnowBe4 Use encryption
Best Practices User Security Passwords Email Safety Online Safety Outside of the office Use Two Factor Authentication Trust but verify links Minimize use of cloud file-sharing Dropbox Box Google Drive Don t overshare online
Best Practices User Security Passwords Email Safety Online Safety Outside of the office Be cautious with public Wi-Fi Keep private work conversations private Restrict remote access Close RDP ports Enforce VPN use Only necessary users
Best Practices Device Security Computers/Servers Mobile Devices Wi-fi Routers Other Devices (Printers, Copiers, Switches, Routers) Centrally managed, business grade security software Isolate payment systems Restrict access to servers Use two-factor authentication Update software/firmware regularly
Best Practices Device Security Computers/Servers Mobile Devices Wi-fi Routers Other Devices (Printers, Copiers, Switches, Routers) Enforce passwords/passcodes Install security software Use two-factor authentication Update software/firmware regularly
Best Practices Device Security Computers/Servers Mobile Devices Wi-fi Routers Other Devices (Printers, Copiers, Switches, Routers) Change default username/password Disable remote management Restrict access to specific MAC addresses Use a separate SSID for Guests Enable encryption (WPA2) Use two-factor authentication Update software/firmware regularly
Best Practices Device Security Computers/Servers Mobile Devices Wi-fi Routers Other Devices (Printers, Copiers, Switches, Routers) Change default username/password Disable remote management Restrict access to specific MAC addresses Use two-factor authentication Update software/firmware regularly
THANK YOU Jon Clay Director: Global Threat Communications @jonlclay www.cloudsec.com