CISOs Guide To Shutting Down Attacks Using The Dark Web Agenda The - - PowerPoint PPT Presentation

ciso s guide to shutting down attacks using the dark web
SMART_READER_LITE
LIVE PREVIEW

CISOs Guide To Shutting Down Attacks Using The Dark Web Agenda The - - PowerPoint PPT Presentation

CISOs Guide To Shutting Down Attacks Using The Dark Web Agenda The Dark Web: Whats At Stake Gain Visibility, Take Control Leveraging Splunk & Phantom Key Recommendations Agenda The Dark Web: Whats At Stake Gain


slide-1
SLIDE 1

CISO’s Guide To Shutting Down Attacks Using The Dark Web

slide-2
SLIDE 2

– The Dark Web: What’s At Stake

– Gain Visibility, Take Control – Leveraging Splunk & Phantom – Key Recommendations

Agenda

slide-3
SLIDE 3

– The Dark Web: What’s At Stake

– Gain Visibility, Take Control – Leveraging Splunk & Phantom

– Key Recommendations

Agenda

slide-4
SLIDE 4

What Do We Know About The Dark Web?

slide-5
SLIDE 5

Clear Web Deep Web

– Search engines – Media, blogs, etc. – Unindexed by search engines – Webmail, online banking, corporate intranets, walled gardens, etc. – Anonymous, closed sources, Telegram groups, invite-only (sometimes) – Tor, P2P, hacker forums, criminal marketplaces, C2s, etc.

Dark Web

The Clear, Deep, and Dark Web

slide-6
SLIDE 6

How Tor Works

User’s TOR client picks a random path to destination server.

Black market Cyber- crime forum

+ + + +

1 2 3 4

RED links are encrypted BLUE links are in the clear.

slide-7
SLIDE 7

Tor Usage Statistics

Source: The Tor project – https://metrics.torproject.org/

slide-8
SLIDE 8

Tor Usage Statistics

Source: The Tor project – https://metrics.torproject.org/

slide-9
SLIDE 9

Tor Usage Statistics

slide-10
SLIDE 10

The User Experience Can Match Legitimate Sites

slide-11
SLIDE 11

Even Farmers Turn To The Dark Web

slide-12
SLIDE 12

278% 297% 149% 171%

Phishing websites Products for sale on black markets Stolen credit cards for sale

  • n dark web

Compromised employee credentials

Threats are mounting

slide-13
SLIDE 13

– The Dark Web: What’s At Stake

– Gain Visibility, Take Control

– Leveraging Splunk & Phantom

– Key Recommendations

Agenda

slide-14
SLIDE 14

IT

Our attack surface keeps growing

slide-15
SLIDE 15

IT Shadow

Our attack surface keeps growing

slide-16
SLIDE 16

IT Shadow Mobile

Our attack surface keeps growing

slide-17
SLIDE 17

IT Shadow Mobile Social

Our attack surface keeps growing

slide-18
SLIDE 18

IT Shadow Mobile Social Web

Our attack surface keeps growing

slide-19
SLIDE 19

IT Shadow Mobile Social Web IoT, ??

Our attack surface keeps growing

slide-20
SLIDE 20

IT Shadow Mobile Social Web IoT, ??

Our attack surface keeps growing

3rd parties 3rd parties

slide-21
SLIDE 21

IT Shadow Mobile Social Web

4th parties 4th parties

IoT, ??

3rd parties 3rd parties

Our attack surface keeps growing

slide-22
SLIDE 22

Lack Of Visibility, Lack Of Control

slide-23
SLIDE 23

Potential Emerging Crisis

Preventive Responsive Unprepared

Event stage Risk impact

Risk threshold

Recovery

Reduce The “Mean-time-to-Remediate”

slide-24
SLIDE 24

Turning External Data Into External “Intelligence”

What activity is taking place? What are the trends and how does it connect? How does it impact my organization?

Intelligence Information Data

Analysis Processing & Organization

slide-25
SLIDE 25

Customer logins Bank accounts

What you’ll uncover: Compromised Credentials

Employee credentials

slide-26
SLIDE 26

What you’ll uncover: Stolen credit & gift cards

slide-27
SLIDE 27

What You’ll Uncover: Insider Threats

slide-28
SLIDE 28

1) Data leakage: strategic IP,

customer & employee data, etc.

2) Malware-as-a-service, software

exploits, phishing kits

3) Stolen and counterfeit products,

gift cards, credit cards

4) Brand attacks: rogue apps, social

media weaponization

5) Doxxing and digital extortion,

Exec/VIP targeting

What External Exposures Are Threats To You?

6) Compromised credentials,

account takeover

7) Phishing attacks and domain

squatting

8) Insider threats – hiring and

coordination

9) Third-party and IT vendor risk

slide-29
SLIDE 29

Bullet text here

– Second level

  • Third level
  • Fourth level

 Fifth level

slide-30
SLIDE 30

Tailor threat intelligence to your business.

slide-31
SLIDE 31

CLEAR DEEP DARK

Collection Analysis Response

Social media App stores Paste sites Leaked DB’s Chat channels Dark web forums Black markets

DIGITAL FOOTPRINT

Algorithms Machine learning Human analysts Threat actor research

IOC blocking Account resets Phishing prevention Takedowns Card deactivation

Tailor Your Threat Intelligence In Three Phases

slide-32
SLIDE 32

– Execute takedown processes

– Social networks – Mobile app stores – Registrars, domain hosting providers

– Streamline card deactivations, password resets, reprovisioning – Automate credential validation checks and protocols – Integrate endpoint, gateway, and perimeter defenses – Prepare digital extortion decision trees, run scenario analyses

Automate Your Response

slide-33
SLIDE 33

– The Dark Web: What’s At Stake – Gain Visibility, Take Control

– Leveraging Splunk & Phantom

– Key Recommendations

Agenda

slide-34
SLIDE 34

Website cloned Credential-stealing script run from login page Credentials collected in bulk Zip file uploaded and unpacked for reuse New phishing campaign w/ spoofed website

1) 2) 3) 4) 5)

The Emergence Of Phishing Kits

slide-35
SLIDE 35

Shutdown Phishing Early In Attack Chain, Pre-Exploit

– Monitor suspicious domains before they’re activated. – Automate the takedown process.

Recon Weaponize Deliver Exploit Control Execute Maintain

Pre-Compromise Post-Compromise

The Cyber Kill Chain

slide-36
SLIDE 36

Phantom Playbook: Phishing Detect & Respond

slide-37
SLIDE 37

Splunk + IntSights For 360° Visibility

slide-38
SLIDE 38

– The Dark Web: What’s At Stake – Gain Visibility, Take Control – Leveraging Splunk & Phantom

– Key Recommendations

Agenda

slide-39
SLIDE 39

‒ What immediate challenges do we want to solve? ‒ Where are our assets & exposures? What do attackers see? ‒ What can we integrate or automate to improve our remediation? Internally and externally? ‒ How can we leverage threat intelligence in the long-term? ‒ What are expected outcomes in 6 months, 1 year, 3 years?

Embedding ETI Into Your Security Program

slide-40
SLIDE 40

1) External threat intel improves SecOps – but only if it’s

actionable and contextualized to your organization.

2) Define use-cases upfront; start with one or two. 3) Neutralize threats on their territory; mitigate risk pre-

exploit.

Recommendations

slide-41
SLIDE 41

Thank You!

Nick Hayes

Get a live demo at Booth #158!