Page 28 - gs180802_flipbook
P. 28
Views
The conference's keynote speaker was Brett Johnson, the Over time, we will transition from a "root of trust" concept
original Internet Godfather, and the most compelling to a "web of trust" to ensure integrity and validation at
speaker I have heard in a long time (see www.anglerphish. every level of the supply chain. One speaker predicted that
com to learn more about him). As he explained, crime in five years, we will have standards-based compliance,
begins with ID theft. About 92 percent of every breach cyber insurance for real risk transfer, and blockchain
starts with a phishing attack. implementation, which will create a change in business
models. In 10 years, it will be "all cloud all the time," and
Criminals are focused on ID theft, account takeover, large enterprises will have gotten out of the data center
friendly fraud and synthetic fraud. They are looking for a business.
failure of multiple systems chained together, not just one
system. Criminals are good at one or two things, not three Purpose-built devices such as Chromebook and iOS
things, and they are going for the easy target, so they can devices will dominate; we will move away from the thick-
gather data, commit a crime and cash out, typically using client laptop model and the network-centric approach.
bitcoin. We will pivot away from passwords to presence-based
authentication, which will include a physical (biometric)
Preventive measures property and a token.
Brett had some important suggestions, including the Evolving fraudster sophistication
following:
• Freeze the credit of everyone in your household A presentation from Javelin Strategy & Research indicated
there has been an evolution in fraudster sophistication, and
• Get credit reporting and monitor all accounts regu- now it's hard to distinguish between a true consumer and
larly a villain. Fraudsters are using data differently. They have
• Have a strong computer policy, apply all updates honed the capability to validate credentials. With account
and back up regularly takeover, the criminal can change a password or contact
• Control physical access to all computers information, and separate your financial institution from
you.
• Use a physical firewall, and no BYOD
• Use strong password protocols and a password With this information, the criminal can apply for a credit
manager card and a line of credit, change your phone number and
• Implement existing security patches address, open a new account, and move money. Banks
need to tie authorization more closely to the customer's
• Implement training and awareness for employees device, and transition from ID verification to ID proofing.
because this has your highest ROI
To detect threats, you need some form of network traffic
Further protections analysis that detects such things as host, traffic and
protocol anomalies, and automates data collection and
Another presentation was by Sam Elliott director of analysis to detect and categorize complex threat behavior.
security product management at Bomgar. He said a
breach is a matter of when, not if, and all you can do is The applicability of blockchain
to try to contain breaches to an acceptable level. You
should automate privileged ID and access management to One presentation focused on the healthcare space,
mitigate the threat of hacking, because 81 percent of this which has its own set of problems, including fraudsters
involves stolen or weak credentials. Remote access is the altering or deleting information in the accounting system,
number one method of compromise, because everything changing electronic documents, and creating fraudulent
is connected these days. electronic files.
You can protect yourself by rotating and randomizing This was the first presentation to discuss the applicability
credentials, protecting Internet service accounts and of blockchain, which can provide immutable traceability
middleware, and securing insider and vendor access. Do in a shared decentralized ledger, where invalid changes
not connect a virtual private network to a vendor with get rejected upfront. Blockchain would provide a highly
remote desktop protocol access. Use an HTML 5 interface. trusted, permissioned and validated access control on an
organizational level, with secure data sharing to facilitate
Focus on two key areas. First is identity management: smart contracts. Another topic was insider threats, one of
authenticate customers using two-factor authorization, the most pernicious and hard to detect. About 28 percent
and eliminate passwords in favor of hardware-based of breaches originate here. Insiders can delete information,
tokens. The second is data integrity maintenance: the bring down systems, deface websites, steal intellectual
supply chain is soft and unprotected, and hardware can property, hijack confidential data and modify critical
come with malware installed. data. Fraudsters can be disgruntled former employees or
employees on the verge of leaving. Typically, they have
been in the job at least five years and, amazingly, it takes
28