pritha's Posts (581)

Sort by

Our editorial team has handpicked the best talks at Discussion Summit - a small community summit where we aim to find out the problems and solutions currently faced in the cyber security industry. This talks is on 'Iranian Nationwide Terror And Intelligence Operations In Israeli Cyberspace' By Omri Segev Moyal

In this talk we will learn about the cyber information operation conducted by Iranian threat actors against Israeli in the past two years. Malware Researcher and Threat Intelligence expert with global experience in military, industrial, intelligence, communication and financial organisations. Expertise as a testing provider of advanced malware solutions in both laboratory and enterprise production environments. The talk tells about the cyber information operation conducted by Iranian threat actors against Israelis in the past two years.

(From The Editorial Team): Download Complete Guide To Top Talks @CISO Discussion Summit 2021

 

Omri%20SM%20banner.png

 

 

About Speaker

Omri Segev Moyal (Co-Founder & CEO, Profero). Forbes 30 under 30.
Moyal is the CEO and co-founder of Israeli cybersecurity company Profero that specializes in incident response, meaning it helps companies address and manage the aftermath of a security breach or cyberattack. Moyal founded Profero with CTO Guy Barnhart-Magen in 2019 and the company has grown significantly since, although Moyal refuses to reveal exactly by how much in order not to play into the hands of those aiming to harm it and its clients. Moyal, who is also the co-founder of Minerva Labs and the former CTO of ClearSky Cyber Security, was willing to say that Profero employs experts from across the world, aiming to provide an around the clock service to companies in their time of need. He likened the company to Israel's National Counter Terrorism Unit due to the way in which it attracts top talent from the mlitary's elite combat units.. (reference link)

 

 

(Watch Now) Keynote Session : 

>> Download Complete Guide To Top Talks @CISO Discussion Summit 2021

 

 

Highlights From Presentation

1. Pay2 Key

  • First hits in Israel and the world mid october 2020 (Inter industries and some more)
  • Mostly using exposed SAP and very common vulnerabilities as PO
  • Shared infrastructure which entities in Africa was used against cargo companies in Israel (Oct-Nov 2020)
  • Possibly targeting the vaccine shipments
  • Onion website released

 

2. Blackshadow (Shirbit)

  • Nov - Dec 2020
  • Multiple webshells, payloads and harvesting
  • Simple wipers (reversable to some extent)
  • Custom Trojan (ipsecheckhelper)
  • Stunnels
  • Telegram leak channels

 

3. IOCs match previous Iranian destructive attack

O1.png

O2.png>> Download Complete Guide To Top Talks @CISO Discussion Summit 2021

 

 

 

4. Bitcoin Tracking

O3.png

 

O4.png

 

 

5. CVE- 2018 -13379
O5.png

 

6. Winter is coming / Pay2key

  • Post Fortinet explotation
  • Dec 2020, multiple Ransomware hits
  • Onion website updated
  • Media attention intensify (post Shirbit)
  • Reverse tunneling RDP sessions
  • Custom Payloads

>> Download Complete Guide To Top Talks @CISO Discussion Summit 2021

 

 

7. Blackshadow March 2021

  • Post Fortinet explotation (Nov 2020)
  • Zerologon (Dec 2020)
  • Dotnet wiper
  • Custom trojan (ipscheckhelper)
  • Stunnels
  • Telegram leak channels

 

8. Employee at Minister Of Defence home arrested

  • November 2021
  • Communicated with blackshadow group
  • Leaked photos from the home of minister
  • Arrested by ShinBet
  • Government did not attribute officially the communication was with Iran

 

 

Guide%20banner.png?profile=RESIZE_930x

 

Download Complete Guide To Top Talks @CISO Discussion Summit 2021

Get your FREE Guide on Top Talks @ CISO Discussion Summit. Our editorial team has gone through all the talks and handpicked the best of the best talks at Discussion Summit into a single guide. Get your Free copy today.

>>Click Here To Get Your FREE Guide

Read more…

As we continue to move forward in the Industry 4.0 era of greater connectivity between the physical and digital, the promise and development of smart cities become a more likely vision. Keeping a smart city secure is a challenge as the urban safety ecosystem of citizens can involve a variety of scenarios and threats, including terrorism, crime, weather incidents, and natural disasters. Thus, from a security perspective, a smart city design needs to include processes and technologies that protect and secure citizens.

 

 

About Speaker

 Chuck Brooks (Professor, Georgetown University)

 

 

Keynote (Recorded)

Read more…

Anton Chuvakin On How To Actually Grow Your SOC?

Topic Brief

We already talked about developing a modern security operations center or a SOC and some of you were left with questions how do you actually journey ? how do you travel to this modern SOC ? It's easy to discuss what the modern SOC should be but how do we get there ? In my writing and speaking some of the links i mentioned on the slide here i've covered this topic but I wanted to present a condensed version of some highlights of how to actually grow your SOC to achieve that type of a modern framework

 

About Speaker

Dr. Anton Chuvakin is presently the Security Advisor at Office of the CISO, Google Cloud. He is a computer security specialist, and until recently was a Research Director at Gartner for Technical Professionals (GTP) Security and Risk Management Strategies (SRMS) team. Formerly he was also a principal at Security Warrior Consulting. Previous positions included roles of a Director of PCI Compliance Solutions at Qualys. , a Chief Logging Evangelist with LogLogic, a U.S. Log Management and Intelligence company and a Security Strategist with netForensics, a U.S. Security information management company. He is an author of many publications and invited talks on computer and network security and a co-author of "Security Warrior", "PCI Compliance", "Logging and Log Management: The Authoritative Guide to Understanding the Concepts Surrounding Logging and Log Management.

 

About CISO Platform

CISO Platform is an exclusive community for senior security leaders with 40,000+ professionals globally
It's been 10 years since we started ciso platform community with the vision of collaboration and learning among senior security executives. We thank all our members for promoting knowledge and making the online world safer together. The community today has grown over forty thousand plus subscribers globally. Our primary goal has been to create tangible community goods and as a community we have created more than 1000 checklists frameworks and security training material that are available absolutely free for all. We have also conducted 50 plus training sessions for school kids as part of the kids cyber safety initiative. We would encourage you to write blogs and articles and also establish yourself as a thought leader in our community at www cisoplatform.com

We invite all security heads to the community. Help us reach out to more security peers like you. If you know a peer or friend who might be a security professional, do invite him to sign up at www cisoplatform.com Memberships are free for security professionals

 

 

Keynote (Recorded)

 

 

Session Summary : 

Motivators for improving SOC is more business change, not just threat change. Threats keep changing but businesses become more digital, agile. The challenge is to deal with ransomware on cloud, mainframe, PC, server. So the stack of IT changing and business change is very competitive. This is a great reason to dramatically changing SOC rather than a gradual improvement.

Digital Transformation = Attack Surface Expansion ?
• Users work from everywhere using different types of apps and devices
• Users are of many kinds : employees, partners, contractors….
• Users have higher expectations, and attacks are becoming more targeted and sophisticated

 

SOC is a team. You can buy the technology but you can always get the right people. The mission of SOC is to detect incidents and properly dealt with.

Why are we changing the SOC ? Forces that push SOC – 1.Expanding attack surface. 2.Security talent shortage. 3.Too many alerts from too many tools. Prevention has limits. So, we end up focusing on detection and response.

 

Improve SOC 10% or 10X ?
The 10X philosophy. The notion of “10x thinking” is at the heart of how we innovate at Google. To put the idea simply: true innovation happens when you try to improve something by 10 times rather than by 10%.
It’s often easier to make something 10 times better than it is to make it 10 percent better. You’re working to make things 10 percent better, you inevitably focus on the existing tools and assumptions, and on building on top of an existing solution that many people have already spent a lot of time thinking about. Such incremental progress is driven by extra effort, extra money, and extra resources. But when you aim for a 10x gain, you lean instead on bravery and creativity. Humans can let go of resource constraints and achieve great results with the 10X challenge

We need to transform SOC 10X not just improve.
Traditional SOC :
• Inspired by IT helpdesk philosophy
• Treats incidents as rare and abnormal
• Focuses on alert pipeline, and pairs alerts to analysts
• Centered on SIEM (SOC = SIEM Analyst Team)
• Has walls between alert handles and alert tuners
• Threat intelligence is sometimes consumed
• Shallow metrics on handling time

Modern SOC :
• Teams are organized by skills not rigid level
• Process structures around threats not alerts
• Threat hunting covers cases where alerts never appear
• Multiple visibility approaches not just logs
• Automation via SOAR works as a force multiplier
• Deeper testing and coverage analysis
• Threat intelligence is consumed and created
• SOC elegantly uses third-party services


Possible ways to create 10X SOC ?
1.SOC Transformation Framework
This is inspired by how modern companies operate like Google, Netflix. This is how future SOC needs to work to keep up

A1.png?profile=RESIZE_710x

 

 

Bucket 1 : People Transformationa2.png?profile=RESIZE_710x

 

Tactical• Grow the analysts to develop detection
• Hire partners to augment your team
• Offer learning paths and certification opportunities to your workforce
• Define a clear boundary to manager healthy work life balance for your team


Strategic
• Transformational
• Rotate analysts and engineers
• Provide comprehensive on boarding and skills development programs
• Offered stretch opportunities, career alignment and leadership training
• Revamp your hiding program to see the talent potential and skills based personnel


Transformational
• Federated workforce that operates synergistically across org-wide risks
• Analysts are engineers and develop scalable solutions to security issues
• Continual growth and development of talent and a consistent promotion pipeline
• Engage your personnel to represent your team in the industry – talks, speaking opportunities, conferences, etc.

 

5 Key Steps To Take
• Remove walls in a SOC that separates analysts and engineers
• Identify skills needed in yourself, start to hire skills, not levels
• Boost productivity with automating routine tasks (via SOAR)
• Take advantage of partners and third parties
• Create a culture of empowerment and innovation

 

a3.png?profile=RESIZE_710x

 

 

 

Bucket 2 : Process Transformation

a4.png?profile=RESIZE_710x

Tactical
• Improve alert triage
• Consume threat intelligence
• Basics of detecting engineering

Strategic
• Triage and periodic hunts
• Improve threat intelligence
• Detection engineering is multi-faceted and can leverage many contexts for detectors
• Automate the alert triage process

Transformational
• A fusion of hunting, detection and detection engineering
• Create threat intelligence
• Adapt an SRF-like approach to automating workflows in SOC

 

5 Steps To Take
• Solidify the basics; don’t hunt before you can detect well
• Focus on threat intelligence to boost other SOC work
• Drive an “SRE” approach – 50% time towards automation
• Add hunting, testing and analytics afterwards
• More transparency will allow more creative problem solving

 

a4-1.png?profile=RESIZE_710x

 

Bucket 3 : Technology Transformation

a5.png?profile=RESIZE_710x

 

Tactical
• Improve usage of SIEM
• Include cloud visibility into your D&R use cases
• Enrich your product signals with context from assets

Strategic
• Add NDR, EDR to SIEM
• Experiment with SOAR
• Cover cloud environments
• Align technology signals & detection content to MITRE

Transformational
• Heavily automated fusion of many sensors
• Build data science & AI/ML capabilities for detection
• Leverage a cloud-native stack
• Co-develop technology features with your vendors and partners
• Optimize technology TCO to spare budget for people and process improvements


5 Key Steps To Take
• Don’t discuss a SIEM / UEBA
• Expand visibility : NDR, EDR (XDR?), cloud etc.
• Be aware that SaaS tools will win in the end
• Use SOAR to automate
• Use ML but don’t assume magic

a6.png?profile=RESIZE_710x

 

 

 

 

 

 

a7.png?profile=RESIZE_710x

Without THIS you won’t be SECURE.

Prevent
• Migration to the cloud with best practices on security architecture & patterns
• DevOps / Automated / Deployment / Config-as-code. Effective vulnerability management
• All changes fully controlled, reviewed and implemented. Highly effective vulnerability management

Detect
• Ingestion and centralization of all critical data sources, likely outsourcing key SOC roles
• Integrated tooling, SOAR Implementation, IOC – matching & strong TI
• Predictive analytics, detection engineering & automation, threat hunting, behavioural analytics

Respond
Ad-hoc investigative capabilities, outsourcing all response activities
Dedicated IR team & clearly defined roles, playbooks, and use case coverage
Adversarial deception, response automation, chaos engineering, full use case coverage

Secure
• Struggle to react to evolving threats
• Ability to react to new and existing threats + hunt but still resource constrained
• Fully protective. Minimal MTTD, MTTR and RTO

 

 

Recommendations
• If SOC = detection team, then SOC leaves on in the modern world
• Modernize your SOC but preserve the mission : detection and response
• Evolve SOC to more automation to catch up with modern IT
• “DevOps” or SRE your detection engineering (Dev = content creator, Ops = analyst). An idea with 10X SOC potential
• Learn new detection context for cloud and cloud-native tools
• Mercilessly discard tools that don’t fit the cloud practices or fail to support cloud technology

a8.png?profile=RESIZE_710x

 

 

Resources
• Modernizing SOC .. Introducing automatic security operations
• New paper : Automatic Security Operations – 10X Transformation of the Security Operations Center
• SOC in a large, complex and evolving organization (ep26)
• The mysteries of detection engineering : Revealed (ep27)
• Kill SOC Toil, Do SOC Eng
• A SOC Tried to detect threats in the cloud .. you won’t believe what happened next
• Role of context in threat detection

 

 

 

Read more…

What To Expect at CISO Discussion Summit 10-11 December ?

Discussion%20Summit-Facebook%20Ad.png?profile=RESIZE_1200x

 

 

Keynotes From World-Renowned Industry Experts (Best Of The World) :  

  • "The state of security markets and changing buying priorities" by Maria Kussmaul - Head Security, Investment Banking | Wharton School 
  • "Q3 2021 Changes To The Entire IT Security Industry" by Richard Stiennon - Research, IT Harvest | University Of Michigan
  • "How To Actually Grow Your SOC?" by Anton Chuvakin - Head Security Strategy, Google | SANS GIAC
  • "Continuous Security Validation and Practical Strategies" by Brad LaPorte - Ex-Gartner | Partner, High Tide Advisor
  • "The Security Challenges Of Protecting Smart Cities" by Chuck Brooks - Forbes | Professor, Georgetown University
  • "How to Present Cyber Security Risk to Senior Leadership" by Allan Alford - CISO, CTO, TrustMapp | Cyber Ranch Podcast
  • "Iranian Nationwide Terror and Intelligence Operations in Israeli Cyberspace" by Omri Segev - CEO Profero | Forbes 30 Under 30

 

 

CISO Panels With Top 100 & Next Winners and Industry Leaders : 

  • (Panel) Infrastructure Security - Latest Technology Trends To Mitigate The Risks
    Babitha B P (CISO, CSB Bank Ltd.); Dr.NareshKumar Harale (Head - Information Security, Cybersecurity IDBI Intech ltd.); Nabankur Sen (External Consultant (Cyber security), HSBC (AMIN)); Manoj Kumar Shrivastava (CISO, Future Generali India Insurance Company); Shankar Jadhav (Head – Strategy, BSE Limited); Vijaykumar Radhakrishnan (CISO,Mahindra & Mahindra Financial Services); Sanjay Pugaonkar (CISO, SBI Mutual Fund)

  • (Panel) CISO Privacy Framework
    Parag Kulkarni (CISO,Bajaj Finance); Dr. Durga Prasad Dube (Global CISO, Senior Information Risk Management Professional, Reliance Industries); Balram Choudhary (VP Head (IT&ISO), Bob financial Solution); Charanjit Singh Bhatia (AGM Cyber Security CoE, Bata); Dilip Panjwani (CISO & IT Controller, Larsen & Toubro Infotech)

  • (Panel) CISO Guide : Rising Cyber Crime Trends in Banks and Mitigation Framework
    Mohd Imran (Group Head Information Security, L&T Financial Services); Shalabh Garg (Vice President , Religare); Shailaja (CISO, Edelweiss); Pawan Chawla (CISO, Future Generali India Life Insurance); Rupesh Pawar (CISO, Universal Sompo General Insurance); Dr. Lopa Mudraa Basuu (Advisor APAC Research Advisory Council For Cloud Security Alliance); Mr. Sovon Lal Mukherjee (CISO & VP-Information Risk, Fincare Small Finance Bank)

  • (Panel) CISOs Ransomware Guide
    Vijay Kumar Verma (SVP & Head Cyber Security Engineering, Jio Platforms); Debojit Maitra (CISO, ABFRL); Rajiv Nandwani (IT Security & physical security continuity senior manager BCG); Vikas kapoor (Vice President, Cyber Security VOIS); Anuj Tewari (DGM, Airtel International); Umesh Sharma (DGM- Cloud Operations, Jio Platforms); Sibayan Das Information Security Manager (IFB Industries)

  • (Panel) How To Setup A Security Team, Skill Gap, Hiring Tactics & Automation
    Navaneethan M (CISO & Head-IT, Groww); Vikas singh yadav (CISO, Nykaa); Satish Kumar Dwibhashi (SVP & CISO, Inmobi); Samrat Bhatt (CISO, Matchmove)

  • (Panel) CISO SOC Framework
    Meetali Sharma (Head - Risk, Compliance & Information Security, SDG Corporation); Pravin Saiya (Associate Director, Larsen & Toubro Infotech); Jitendra Singh (CIO, JK Cement); R Nantha Ram (Chief Information Security Manager - Cyber Security, TVS Motor); Lalit Kumar Jha (GM IT, GATI-KWE)

  • (Panel) CISO Third-Party Cyber Risk Framework
    Kumar Ravi (CISO, Teleperformance India); Balaram N (Director IT, Algonomy Software); Anoop Paudwal (Information Security Manager, Gulf News); Mohit Gupta (CISO, Motherson Group); Ambuj Bhalla (Director IT Security, CISO, Interglobe Aviation INDIGO); Indranil Chatterjee (Assistant Vice President, Security & Compliance, Jio Platforms); Yogesh Kumar (Head IT and CISO, Tata Advanced Systems)

  • (Panel) CISO DevSecOps Guide
    Gokulavan Jayaraman (Information Security Manager, Lumina Datamatics); Anwaya Bilas Sen Gupta (Chief Manager & CISO, Power System Operation Corporation); Subodh Jha (Deputy General Manager IT WheelsEMI); Anil Chiplunkar (Associate Director - Information Security, Covance Scientific Services and Solutions)

  • (Panel) CISO Breach Response Framework
    Venkata Satish Guttala (Director - Security Rediff.com); Prithwijit Dinda (VP IT, Central Depository Services (India)); Hema Gupta (Senior Manager - Security Governance, NCR Corporation); Lalit Trivedi (Head IT & CISO, ITI Asset Management); Vandana Verma (Security Advocate OWASP & InfosecGirls)

  • (Panel) CISO DDOS RFP Framework
    Ajay Kumar Ajmera (Head IT, Birla Century); Muzammil Shaikh (Senior Manager | Cyber Security, Capgemini Technologies); S Seethalakshmi (Assistant Manager - Information Security, TVS Motor Company); S. Maharajan (CISO, Navitas Life Sciences); Prashant Mohan (Security Architect, NCR Corporation); Rohit Baweja (Senior Manager, Infoedge India); Sachin Shetty (AVP - Consultant Specialist Cyber Security HSBC Software Development Center)

  • (Panel) CISO Shadow IT Guide
    Ramkumar Mohan (CIO, Air Works India Engineering); Nitin Parashar (Senior Manager, Security Operations, Jio Platforms); Shitanshu Kumar (Director IT, Iqor); Vasudevan Nair (Head IT and CISO, Writer Corporation); Shitij Bhatia (Cyber Security Specialist, Sanofi); Vikram Dua (Head of Global IT Risk & Asset Management, Philips India); Vishwas Pitre (CISO & DPO, Zensar Technologies)

  • (Panel) CISO Threat Hunting Framework
    Gowdhaman Jothilingam (Senior Manager IT/CISO, LatentView Analytics); Prabhakar Ramakrishnan (CISO, TNQ Technologies); Palanikumar Arumugam (Head Of Technology, Shiksha Financial Services); Kavitha Srinivasulu (Head Cyber Security & Data Privacy, GAVS Technology); Tejas Shah (Deputy Director IT, SVKM); Subroto Panda (CIO, Anand and Anand)

 

 

Award Felicitation For Top 100 & Next winners (partial)

 

 

>> Claim Free Passes For Community Members (+agenda) : https://www.cisoplatform.com/rtseries

 

 

 

Read more…