Page 28 - gs180802_flipbook
P. 28

Views




        The conference's keynote speaker was Brett Johnson, the   Over time, we will transition from a "root of trust" concept
        original Internet Godfather, and the most compelling    to a "web of trust" to ensure integrity and validation at
        speaker I have heard in a long time (see www.anglerphish.  every level of the supply chain. One speaker predicted that
        com to learn more about him). As he explained, crime    in five years, we will have standards-based compliance,
        begins with ID theft. About 92 percent of every breach   cyber insurance for real risk transfer, and blockchain
        starts with a phishing attack.                          implementation, which will create a change in business
                                                                models. In 10 years, it will be "all cloud all the time," and
        Criminals are focused on ID theft, account takeover,    large enterprises will have gotten out of the data center
        friendly fraud and synthetic fraud. They are looking for a   business.
        failure of multiple systems chained together, not just one
        system. Criminals are good at one or two things, not three   Purpose-built devices such as Chromebook and iOS
        things, and they are going for the easy target, so they can   devices will dominate; we will move away from the thick-
        gather data, commit a crime and cash out, typically using   client  laptop  model  and  the  network-centric  approach.
        bitcoin.                                                We will pivot away from passwords to presence-based
                                                                authentication, which will include a physical (biometric)
        Preventive measures                                     property and a token.
        Brett  had  some  important  suggestions,  including  the   Evolving fraudster sophistication
        following:
            •  Freeze the credit of everyone in your household  A presentation from Javelin Strategy & Research indicated
                                                                there has been an evolution in fraudster sophistication, and
            •  Get credit reporting and monitor all accounts regu-  now it's hard to distinguish between a true consumer and
               larly                                            a villain. Fraudsters are using data differently. They have
            •  Have a strong computer policy, apply all updates   honed the capability to validate credentials. With account
               and back up regularly                            takeover, the criminal can change a password or contact
            •  Control physical access to all computers         information, and separate your financial institution from
                                                                you.
            •  Use a physical firewall, and no BYOD
            •  Use strong password protocols and a password     With this information, the criminal can apply for a credit
               manager                                          card and a line of credit, change your phone number and
            •  Implement existing security patches              address, open a new account, and move money. Banks
                                                                need to tie authorization more closely to the customer's
            •  Implement training and awareness for employees   device, and transition from ID verification to ID proofing.
               because this has your highest ROI
                                                                To detect threats, you need some form of network traffic
        Further protections                                     analysis that detects such things as host, traffic and
                                                                protocol anomalies, and automates data collection and
        Another presentation was by Sam Elliott director of     analysis to detect and categorize complex threat behavior.
        security product management at Bomgar. He said a
        breach is a matter of when, not if, and all you can do is   The applicability of blockchain
        to try to contain breaches to an acceptable level. You
        should automate privileged ID and access management to   One presentation focused on the healthcare space,
        mitigate the threat of hacking, because 81 percent of this   which has its own set of problems, including fraudsters
        involves stolen or weak credentials. Remote access is the   altering or deleting information in the accounting system,
        number one method of compromise, because everything     changing electronic documents, and creating fraudulent
        is connected these days.                                electronic files.
        You can protect yourself by rotating and randomizing    This was the first presentation to discuss the applicability
        credentials, protecting Internet service accounts and   of blockchain, which can provide immutable traceability
        middleware, and securing insider and vendor access. Do   in a shared decentralized ledger, where invalid changes
        not connect a virtual private network to a vendor with   get rejected upfront. Blockchain would provide a highly
        remote desktop protocol access. Use an HTML 5 interface.  trusted, permissioned and validated access control on an
                                                                organizational level, with secure data sharing to facilitate
        Focus on two key areas. First is identity management:   smart contracts.  Another topic was insider threats, one of
        authenticate customers using two-factor authorization,   the most pernicious and hard to detect. About 28 percent
        and eliminate passwords in favor of hardware-based      of breaches originate here. Insiders can delete information,
        tokens. The second is data integrity maintenance: the   bring down systems, deface websites, steal intellectual
        supply chain is soft and unprotected, and hardware can   property, hijack confidential data and modify critical
        come with malware installed.                            data. Fraudsters can be disgruntled former employees or
                                                                employees on the verge of leaving. Typically, they have
                                                                been in the job at least five years and, amazingly, it takes
        28
   23   24   25   26   27   28   29   30   31   32   33