+ All Categories
Home > Documents > BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to...

BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to...

Date post: 04-Aug-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
51
BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, OVERLAPPING MULTIDIMENSIONAL COUNTERMEASURES BRUCE WIMMER, CPP; BILL SCHENKELBERG; ART LESSER
Transcript
Page 1: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

1

B U S I N E S S E S P I O N A G E T H R EAT S A N D C O M P R E H E N S I V E , OV E R L A P P I N G M U LT I D I M E N S I O N A L C O U N T E R M EA S U R E S

B R U C E W I M M E R , C P P ; B I L L S C H E N K E L B E R G ; A R T L E S S E R

Page 2: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

2W H O …

Bruce Wimmer, CPP, G4S CRS = Human Threats/Countermeasures

Bill Schenkelberg, Wapack Labs = Cyber Threats (IT)/Countermeasures

Art Lesser, Merit Security = Technical Threats/Countermeasures

Page 3: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

3

HUMAN AND TRADITIONAL THREATS

Page 4: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

4HUMAN THREATS – Modus Operandi:

HUMAN THREATS – Modus Operandi :

• Hiring away or recruiting selected employees (in place) who take info with them[cyber]

• Some employees leave to form new business [technical devices left behind or cyber]

• Planting spies as employees or contractors inside the target business (insider ‘plants’)

• Breaking into business areas to steal information/items (sometimes misunderstood as theft of items for resale value)

• In-person or telephonic social engineering to gain access to facilities (and hence information) or to obtain information even if only to use it to better socially engineer later

• Trash cover and document theft

Page 5: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

5

HUMAN THREATS – Modus Operandi (continued):

• Stealing/removing things (including samples, prototypes, laptops, removable drives, printer/copier drives) [cyber and technical]

• Social Engineering or Piggy-Backing into company to place listening devices/transmitters [technical]

• Insiders (employees, contractors [cleaners, security, etc]) exploiting and/or expanding access to sensitive business related information or planting devices in offices or meeting rooms or using existing electronic equipment [technical]

• Breaking into/manipulating locks to allow access to server rooms, telephone closets, etc. to make monitoring possible [technical and cyber]

• Social Engineering or Insiders getting into server rooms, telephone closets and manipulating printer/copiers [cyber and technical]

Page 6: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

6

HUMAN THREATS – Modus Operandi (continued):

• Travel to high threat countries (hotel rooms, client or partner/local offices) [technical and cyber] = My “DIRTY DOZEN” list of countries (PR China, Russia, Japan, South Korea, Cuba, France, Israel, Taiwan, Vietnam, India, Venezuela and Brazil)

• Eavesdropping by human ear in a room, lounge, restaurant aircraft or vehicle [technical too]

• Going on facility tours or attending functions at a facility and observing or “wandering” around

• Using overt or covert cameras and photographing equipment, processes, notes, presentations, etc. [technical]

Page 7: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

7

CYBER/IT THREATS

Page 8: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

8T O P C Y B E R

T H R E AT S

Phishing Attacks

Page 9: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

9

9https://pentagontours.osd.mil/Tours/

Page 10: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

10

10

Insider Threat

Page 11: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

11

11

Denial of Service (DDoS)

Page 12: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

12

12

Malware

Page 13: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

13

13

Weak Credentials

BetaNews.com

Page 14: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

14

TECHNICAL THREATS

Page 15: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

15

TSCM?

Electronic Countermeasures

Bug Sweeps

What Is

What you don’t know You don’t know

And it can hurt you

Page 16: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

16

Threats (Vulnerabilities)

RF Analysis

Telecommunications Devices and Wiring

Non-RF (Tape Recorder)

Sensitive Documentation (CDP)

Wireless Analysis

IoT

Page 17: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

17

Privacy &

Confidentiality

Safeguarding

Who is vulnerable?

Why are they vulnerable?

What can be compromised?

Page 18: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

18

Aspects of TSCM

Radio Frequency (RF) Devices

Telecommunication

Non-RF Devices

Documents/Clean Desk Policy (CDP)

Wireless Analysis

Internet of Things (IoT)

Page 19: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

19

Specific Threats

Page 20: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

20

R.F. DEVICES

Page 21: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

21

R.F. DEVICES

Page 22: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

22

Non R.F. Devices

Bugs or Planted Recording Devices(Do not emit R.F.)

Page 23: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

23

Telecommunications

Eavesdropping using telephone lines/devices

CAT Cables - 8 - Wire

Phones have 2 microphones and 2 speakers

Page 24: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

24

How do we protect ourselves from all these Threats?

COUNTERMEASURES

Page 25: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

25

HUMAN COUNTERMEASURES

Page 26: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

26

HUMAN THREAT COUNTERMEASURES

• Background screening (pre-employment and on-going/updated); thorough due diligence for all suppliers, partners and contractors (know who you are dealing with and who they deal with or who really owns them) – Do NOT hire or partner with problems!

• Legal agreements for staff and contractors (non-compete, non-disclosure, etc.)

• Termination/resignation protocols including review of legal agreements when someone leaves

• Employee education and awareness training; including specialized training for reception area staff, sales, staff who organize/arrange and attend meetings, travelers and senior management

• Employee reporting methods/requirements (hotlines, etc.); encourage reporting!

Page 27: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

27

HUMAN THREAT COUNTERMEASURES (continued)

• Challenging/reporting of individuals who are in controlled areas without displaying a badge; leadership sets the example and standard

•Document destruction that includes cross-cut pulverizing; destruction by a third-party should be on-site, witnessed/monitored

• Spot checks of open trash

• Tiger/Red Team testing; hold people accountable

• Limiting tours or unescorted time in a facility or office

Page 28: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

28

HUMAN THREAT COUNTERMEASURES (continued)

• Need-to-know information controls and determination of “highest consequence” information and equipment

• Identified and clearly marked/identified sensitive information ; clearly delineated, marked and labeled with levels of “classification”

•Access controls/locks (including offices) and openly displayed identification badges; internal area Intrusion Detection Systems

• Escort and “no lone” zone programs

• Clean desk program; no documents left on common printer or copier; locked offices, desks and storage

• Travel security program that includes business espionage Threats and Countermeasures education and awareness

Page 29: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

29

CYBER COUNTERMEASURES

Page 30: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

30W H AT T O D O - P H I S H I N G

•Understand that Phishing remains a top threat to networks. Senior management or privileged account owners are often the target of spear-phishing attacks.Look for spoofed email addresses and suspicious links. Know your supply chain.

Understand

Set continuing threat/vulnerability training and education. Once is not enough. If applicable and reasonable, use advanced anti-phishing software

Set

Make sure all IT personnel are watching for phishing attacks and how employees respond to the attacks. Vet the use of cell phone integration with the company network.

Vet

Perform Red Team tests; not to embarrass, but for awareness.Perform

Robotics in supply chain

Page 31: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

31W H AT T O D O – I N S I D E R T H R E AT S

•Understand that “insider threats” are real and one of the most difficult to detect.

Understand

Set strict parameters for network access. Based on the “need to know” principal.

Set

HR must work with C-Suite and HR to mitigate potential insider threats.Vet

Perform HR audits to spot potential insider threats. i.e.: Routine Background checks.

Perform

Robotics in supply chain

Page 32: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

32W H AT T O D O – D D O S

•DDoS attacks - non-standard use of old vulnerabilities, new botnets, cryptocurrencies madness, high-profile DDoS attack (or not) with a political subtext, & activism/hacktivism.

Understand

Set dedicated IT personnel to monitor the network for signs of intrusion and infection. Keep networks separated to avoid lateral movement.

Set

Develop strict prevention and mitigation strategies (NIST standards)Vet

Perform monitoring or outsource to a security company SOC.Perform

Robotics in supply chain

Page 33: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

33W H AT T O D O – M A LWA R E

•Understand that malware infection is on the rise and getting worse. Understand

Set solid anti-virus programs and daily updates. Set

Vet the anti-virus apps before and during use. Take heed to the warnings.Vet

Perform updates and develop a Blacklist inclusion program.Perform

Robotics in supply chain

Page 34: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

34W H A T T O D O – W E A K P A S S W O R D S

•People are creatures of habit and seek simple processes (and solutions). Understand

Set programs to force proper password usage. Deny easy passwords. Make employees change passwords often. 2 party authentication.

Set

Vet habitual users who have password issues (unintended insider threat).Vet

Perform monitoring to detect password altercations.Perform

Robotics in supply chain

Page 35: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

35

TECHNICAL COUNTERMEASURES

Page 36: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

36

Counter Measures and

Detection MethodsR.F. Devices

Non R.F. Devices

Telecommunications Devices and Wiring

CDP

© 2018 Private and Confidential, Merit Security

Page 37: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

37

Audit

© 2018 Private and Confidential, Merit Security

Page 38: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

38

R.F. DETECTOR

DEVICES

Page 39: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

39

NonR.F. DetectionHidden or Dormant Devices

Non Linear Junction Detectors

Page 40: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

40Telecommunications

Detection

Telephone Line Detector and Analyzer

Low Voltage Wiring

Page 41: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

41

Electronic Inspection

Page 42: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

42

© 2018 Private and Confidential, Merit Security

Clean Desk

Policy

Sensitive documents, CDP

Passwords under keyboard

Tape recorder under desk

Thumb drives

Peripheral storage devices

Page 43: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

43

© 2018 Private and Confidential, Merit Security

Physical

InspectionMiscellaneous devices not found by electronic means

Page 44: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

44

SUMMARYRadio Frequency Devices

Very Low Frequency Devices

Telecommunications and Wiring

CDP

Physical

Page 45: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

45

THREATS/COUNTERMEASURES

• Real-World Case Example - where it all came together!

• Global Company

• Guarding and physical security -- Insider

• Cyber Security

• Technical

• Value of a Risk Assessment and Education/AwarnessTraining

Page 46: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

46

THREATS/COUNTERMEASURES

• There are, in fact, numerous Threats and, hence,

Countermeasures that overlap and do not fit exclusively into a single Human, Cyber or Technical silo.

• The best way to counter Business Espionage is a comprehensive and multidimensional program that includes Human, Technical and Cyber Countermeasures.

Page 47: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

47THREATS/COUNTERMEASURES

Ancient African Proverb:

“If you want to go fast, go alone. If you want to go far, slow down and go together."

Page 48: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

48

Thank you!QUESTIONS??

Page 49: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

49

BRUCE WIMMER, CPP

Senior Director

G4S Corporate Risk Services

Email: [email protected]

Mobile: 352 238-0392

Page 50: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

50

BILL SCHENKELBERG

Wapack Labs LLC

Email: [email protected]

Mobile: 603 275-0743

Page 51: BUSINESS ESPIONAGE THREATS AND COMPREHENSIVE, …•Understand that Phishing remains a top threat to networks. ... software Set Make sure all IT personnel are watching for phishing

51

ART LESSER

Merit Security

Email: [email protected]

Telephone: 650 366-0100 or 1-800-4-SECURITY


Recommended