“THINK DIFFERENT” ABOUT SECURITY STRATEGY

Jason Clark, VP Chief Strategy & Security Officer
We need a New Strategy




                         2
The targets…past, present and future
Evolution of the bad guys modus operandi




EASY TO PROTECT                        HARD TO PROTECT
                      © 2012 Websense, Inc.
The Attackers…past, present and future




                                         5
Information Security Budget




    Your Companies Revenue    IT Budget   Infosec Budget

                                                           6
Spend & security effectiveness mismatch

   Other
    20%
                                                    80% OF THE SPEND
                                                    IS 30% EFFECTIVE AT
                80%                                 SECURING THE
                                                    BUSINESS.
                       Firewalls
                         , IDS,
                       Endpoint
                       Security




   Redirect our investments to be: Data Centric & Risk Based              7
PLEASE STOP SPEAR PHISING




                                    Have you tested your employees to
                                    Spear Phishing? Average results will
                                    show 71% of your users will click the link


                            © 2012 Websense, Inc.                                8
Step 1: Evaluation



Do you know
your breakdown?
Do you know
your return on
investment?




      How do we increase
      “Security Personnel”
      with Zero Investment?
                              Evaluate commodity spending   9
Step 2: Buy in

   Communicate evaluation results
   with Everyone outside of IT
   • Get involved with Legal
   • Chief Privacy Officer/Head of HR
   • Audit, Engineering, Marketing, etc.

                                              REMEMBER
                                           As Tom August, author of the CISO
                                                  Handbook, puts it…
                                                  WE SELL IDEAS!

© 2013 Websense, Inc.
Step 3: Execute

         People, Process, Technology applied to Security
           People           Process         Technology        Outcome
                      +                +                 =   Success
                      +                +                 =   Poor Adoption
                      +                +                 =   Inconsistent Operation
                      +                +                 =   Burden to Scale
                      +                +                 =   Shelf-ware
                      +                +                 =   Wasted Effort
                      +                +                 =   No ability to execute
                      +                +                 =   No Defenses

 Most of the time current Technology's lead back to infrastructure centric models.
Step 4: Moving to Intelligence

      From Security Operations To Security Intelligence



              Wisdom
                                            Value
             Knowledge

             Information         =
                Data

         The Relative Value of Information
Step 5: Who is your enemy?




© 2013 Websense, Inc.
The Enemy is in
  your Blind Spots
•   SSL
•   Spear Phishing
•   AD, SAM, Password extraction
•   Custom Encryption
•   Malware
•   Application
•   Complex Technical Stack (limited visibility)
•   Insider Threat
•   Obfuscation
Who Can We Trust?




60 %   of phishing attacks
       are hosted in the
       United States




    50 %          of malware
                  redirects to the
                  United States
                                             36 %            of malware is
                                                             hosted in the
                                     © 2012 Websense, Inc.   United States   15
Next Generation Approach To Security Policy and Protection:
Context Aware, Data Centric, Security


         Who               What                       Where                      How         Action
 Human Resources     Source Code               Benefits Provider         File Transfer         Audit

 Customer Service    Business Plans            Personal Web Storage      Web                   Block

 Marketing           Patient Information       Business Partner          Instant Messaging     Notify

 Finance             M&A Plans                 Blog                      Peer-to-Peer         Remove

 Accounting          Employee Salary           Customer                  Email                Encrypt

 Sales               Financial Statements      Malware Site              Print               Quarantine

 Legal               Customer Records          USB                       Removable Media      Confirm

 Technical Support   Technical Documentation   Competitor                Print Screen

 Engineering         Competitive Information   Analyst                   Copy/Paste


                                                 © 2012 Websense, Inc.                                    16
Threat Modeling & Attack Trees




                                 17
Seven Stages of Advanced Threats




Recon     Lure   Redirect Exploit      Dropper      Call   Data
                            Kit          File      Home    Theft
                                                           CONTAIN-
   AWARENESS      REAL-TIME ANALYSIS     INLINE DEFENSES
                                                            MENT
© 2012 Websense, Inc.   19
© 2012 Websense, Inc.   20
IT Insider Behavior Model




                            21

"Thinking diffrent" about your information security strategy

  • 1.
    “THINK DIFFERENT” ABOUTSECURITY STRATEGY Jason Clark, VP Chief Strategy & Security Officer
  • 2.
    We need aNew Strategy 2
  • 3.
  • 4.
    Evolution of thebad guys modus operandi EASY TO PROTECT HARD TO PROTECT © 2012 Websense, Inc.
  • 5.
  • 6.
    Information Security Budget Your Companies Revenue IT Budget Infosec Budget 6
  • 7.
    Spend & securityeffectiveness mismatch Other 20% 80% OF THE SPEND IS 30% EFFECTIVE AT 80% SECURING THE BUSINESS. Firewalls , IDS, Endpoint Security Redirect our investments to be: Data Centric & Risk Based 7
  • 8.
    PLEASE STOP SPEARPHISING Have you tested your employees to Spear Phishing? Average results will show 71% of your users will click the link © 2012 Websense, Inc. 8
  • 9.
    Step 1: Evaluation Doyou know your breakdown? Do you know your return on investment? How do we increase “Security Personnel” with Zero Investment? Evaluate commodity spending 9
  • 10.
    Step 2: Buyin Communicate evaluation results with Everyone outside of IT • Get involved with Legal • Chief Privacy Officer/Head of HR • Audit, Engineering, Marketing, etc. REMEMBER As Tom August, author of the CISO Handbook, puts it… WE SELL IDEAS! © 2013 Websense, Inc.
  • 11.
    Step 3: Execute People, Process, Technology applied to Security People Process Technology Outcome + + = Success + + = Poor Adoption + + = Inconsistent Operation + + = Burden to Scale + + = Shelf-ware + + = Wasted Effort + + = No ability to execute + + = No Defenses Most of the time current Technology's lead back to infrastructure centric models.
  • 12.
    Step 4: Movingto Intelligence From Security Operations To Security Intelligence Wisdom Value Knowledge Information = Data The Relative Value of Information
  • 13.
    Step 5: Whois your enemy? © 2013 Websense, Inc.
  • 14.
    The Enemy isin your Blind Spots • SSL • Spear Phishing • AD, SAM, Password extraction • Custom Encryption • Malware • Application • Complex Technical Stack (limited visibility) • Insider Threat • Obfuscation
  • 15.
    Who Can WeTrust? 60 % of phishing attacks are hosted in the United States 50 % of malware redirects to the United States 36 % of malware is hosted in the © 2012 Websense, Inc. United States 15
  • 16.
    Next Generation ApproachTo Security Policy and Protection: Context Aware, Data Centric, Security Who What Where How Action Human Resources Source Code Benefits Provider File Transfer Audit Customer Service Business Plans Personal Web Storage Web Block Marketing Patient Information Business Partner Instant Messaging Notify Finance M&A Plans Blog Peer-to-Peer Remove Accounting Employee Salary Customer Email Encrypt Sales Financial Statements Malware Site Print Quarantine Legal Customer Records USB Removable Media Confirm Technical Support Technical Documentation Competitor Print Screen Engineering Competitive Information Analyst Copy/Paste © 2012 Websense, Inc. 16
  • 17.
    Threat Modeling &Attack Trees 17
  • 18.
    Seven Stages ofAdvanced Threats Recon Lure Redirect Exploit Dropper Call Data Kit File Home Theft CONTAIN- AWARENESS REAL-TIME ANALYSIS INLINE DEFENSES MENT
  • 19.
  • 20.
  • 21.