Vous êtes sur la page 1sur 39

The rise of active

cyber defense

1
WITHIN 24 HOURS

Briefing recording will be distributed

The presentation will also be sent to you.


Feel free to share with colleagues. The
resolution of some slides may be suboptimal
due to the webinar software. Those slides will
look fine in the presentation that we send you.

http://support.citrixonline.com/en_US/Webinar 2
JOIN THE CONVERSATION ON TWITTER

@cbinsights
@Altmanw
#CBICyberSecurity

3
WHO WE ARE

The technology market


intelligence platform.
CB Insights software lets you predict, discuss,
and communicate emerging technology trends
using data in ways that are beyond human
cognition. We are a leader in the Expert Automation
& Augmentation Software (EAAS) space.

4
TRUSTED BY THE WORLD’S LEADING COMPANIES

“We use CB Insights to find emerging trends


and interesting companies that might signal a shift in
technology or require us to reallocate resources.”
Beti Cung, Corporate Strategy, Microsoft

5
Let our executive peer network
help inform solutions to your
company’s most complex growth
challenges.
If you are a C-level, EVP or SVP level executive at a
company doing $1B+ in revenue, request an invite
by emailing community@cbinsights.com.

Experience-based Insights
from Peer Executives
LEARN MORE
ABOUT THE ANALYST

William Altman

Intelligence Analyst, CB Insights


@AltmanW | waltman@cbinsights.com

William is part of the intelligence unit at CB Insights, where he produces data-


driven research on emerging technology with a focus on cybersecurity and
identity technologies.

William's published industry research has been featured in The Wall Street
Journal, Bloomberg, and The New York Times. Before CB Insights, William
worked in the Middle East and North Africa where he conducted research on
entrepreneurship in the Wamda Research Lab.

William has a degree from Denison University, and a Master's Degree from the
Middlebury Institute of International Studies at Monterrey.
7
Contents
9 Passive vs. active vs. offensive cybersecurity

13 The rise of active cyber defense in financial services

25 The future of active defense in financial services

8
We are witnessing the early-signs of a
paradigm shift in enterprise cybersecurity

Passive Active Offensive

9
Passive cyber defense strategies are critical but
do not involve direct action to counter threats

Passive Active Offensive


Examples:
- Encryption
- Application whitelisting
- Identity & access management
- UEBA systems
- Cyber education and training

10
Active cyber defense does not violate U.S. law
but still takes direct action to counter threats

Passive Active Offensive


Examples:
- Attack attribution
- Disruption of ongoing attacks
- Monitoring threat intelligence

11
Offensive cybersecurity tactics involve going
outside of your network to counter threats

Passive Active Offensive


Examples:
- Stealing-back data
- Reverse DDoS
- “Good guy” malware (Stuxnet)

12
FINTECH IS UNDER ATTACK

Financial firms saw the highest volume of


cybersecurity incidents in 2017
27%
18%
13%
9%
1%

Financial services ICT Manufacturing Retail Professional services


Source: IBM X-Force Threat Intelligence Index 2018 13
THE WIDENING THREAT LANDSCAPE

Cyber attacks on financial firms are


increasingly sophisticated and diverse

Website attacks (DDoS) Fake $$ transfers ATM hacks Crypto theft

14
THIS IS WAR

“Our traditional defenses are no longer adequate to


protect ourselves as shared industry systems, companies
or individuals. This is war, and needs wartime, not
peacetime, urgency.”

John McFarlane
Chairman, Barclays

15
FROM HUNTED TO HUNTER

Organizations are shifting from passive cyber


defense, to active cyber defense

16
Financial firms are looking to military and
intelligence agencies for active cyber defense

17
Some firms are launching ‘cyber war rooms’ to
coordinate threat intelligence and response

Image credit: Dr. Strangelove 18


Investment banks are mirroring military
‘war games’ to train for cyber attacks

Goldman Sachs enlists staff for


cyber security war games
- June 6, 2018

“The Wall Street giant, which famously describes itself as a ‘technology company’, is
offering its 8,000-strong technology workforce access to the platform, where they can
test their skills against colleagues and compete on a company-wide league table.”

19
Financial firms are embracing white-hat
hackers to battle test cybersecurity systems

20
Banks are tracking stolen financial data on
dark web markets to catch identity thieves
SURFACE WEB

DEEP WEB

~40% of the dark web is


DARK WEB financial fraud & leaked data…
Source: Intelliagg 21
SYNTHETIC IDENTITIES

“Accounts being taken over is becoming a less


challenging threat than fraudulent accounts and
synthetic identity frauds, where stolen data is
attached to fabricated accounts and identities.”

Brian Krebs
Journalist and investigative reporter

22
Financial firms are investing in AI armies that
uncover criminal behavior and hunt fraudsters

23
Banks are investing in deception-based security
tools that trap hackers

24
WHAT’S NEXT?

Game changing fintech-security


and cyber-regulations

25
Consumers will
become active
defenders

#AhaCBI
Firms that champion proactive security will
put active defense in the hands of consumers

Polymorphic credit cards Self-destructing credit cards

27
Active defense
could become
‘hacking-back’

#AhaCBI
Proposals to legalize ‘hacking-back’ allow
financial firms to retaliate against bad actors

(Introduced 10/12/2017)

“It is a defense to a prosecution under this section that the conduct


constituting the offense was an active cyber defense measure.”

29
However, ‘hacking-back’ could open the
floodgates for endless tit-for-tat cyber attacks

GIF credit: Attassa Cabrera 30


Organizations
will need
quantum
strategies to
stay cyber-
secure

#AhaCBI
THE QUANTUM GAME CHANGER

Quantum computers are ultra-fast and use


principles of quantum mechanics

32
THE QUANTUM GAME CHANGER

Some of the world’s biggest companies know


the future is quantum

33
THE QUANTUM GAME CHANGER

Investment banks are already getting into the


quantum game to ‘perform fast computations’

34
THE QUANTUM GAME CHANGER

Quantum computers threaten all modern forms


of protecting sensitive data

35
THE QUANTUM GAME CHANGER

However, quantum computing is also the key


to actively defending the future of fintech

Connecting to web services Authenticating payments Authenticating wire transfers Title transfers Identity management

36
Questions?
Twitter: @AltmanW
Waltman@cbinsights.com

37
WHERE IS ALL THIS DATA FROM?

The CB Insights platform has the details


on all the data included in this report

CLICK HERE TO SIGN UP FOR FREE

38
cbinsights.com
@cbinsights

39

Vous aimerez peut-être aussi