
foreign [Music] all right how's everybody out there we just need the volume yeah can you hear me yeah you're not yep all right all right well first of all how about we give a big round of applause where everybody just did that technical troubleshooting thank you so much thank you so much all right okay so Marilyn uh give me a thumbs up I'm on live you can see my screen good okay let me go ahead and disconnect here from WebEx and then we're going to Showtime okay well first of all greetings to all of you besides Calgary uh from New York City I'm Carlos Diaz uh otherwise known in the industry as difference and um I am excited to be your last presentation please give me your your energy and your attention I'm privileged to represent Cisco secure which is my employer that I'm working with and then essentially I'm here to bring you not product I'm not going to walk you through product I'm here to give mind share in the spirit of b-sides for practitioners by practitioners okay so essentially I'm going to provide you our philosophy on what we are preparing the defensive Innovation for tomorrow okay a little bit about me my name is Carlos I'm originally from Brooklyn New York uh formerly I'm from the United States Navy worked at places like Google and McAfee my specialty is really to implement uh the productization of defensive products so we can contend or neutralize threats at global scale okay that's my Twitter handle if you like code go to my GitHub or feel free to chat with me we can create tools open source and help each other out and also be on the lookout for a lot of my posts on LinkedIn where I talk about defense tactics and how to neutralize adversaries okay so I'm bringing you this conversation today it's about mind share it's about you the defender and how we definitely need to achieve defensive outcomes okay so first of all you're probably wondering what outcomes are we talking about when it relates to defense we're going to State the context first with the meaning the purpose want to introduce to you in 2019 uh an authoritative company out there that is very good at what they do known as McKinsey introduced in the industry a new way of approaching cyber defense it's called the risk-based approach okay and the difference of the risk-based approach is that it's founded on being able to do three things really well the first thing it is fixing the fragmentation between the business alignment and the Defenders down in the front line being able to fix that misalignment that tends to be present in some organizations and the reason why that's important is if the business doesn't align with us the technical Defenders then we can never meet in the middle and purposely apply the Investments that the company has providing that's the first thing the second thing that risk-based cyber security does is it changes the way we approach defending and designing controls in our Enterprise in other words typically we tend to want to deploy controls all over our Enterprise and we feel that we're not reaching that mature state of Defense because the controls aren't making it across the entire Enterprise risk-based security changes that but allowing us to actually find what is the meaningful focus of specific controls in specific critical assets of the business so we can actually deal with the threats that Target the most vulnerable areas of the Enterprise that's the difference between a maturity model versus a risk-based approach right and the third part is that this actually gives us a practical way to optimize defensive costs okay and we're going to see what that means a little bit further down the line so I want you to really take this in and after this presentation go read this McKenzie article on risk-based cyber security which is transformational this is pretty much the premise that I want you to walk away with as a Defender your fellow Defender this is the value that this does for me in the Enterprise because it allows me to rigorously prioritize and maximize the efforts as well as the Investments that the company has afforded Me by establishing an appetite for risk in other words our prioritization is improved because we don't have infinite resources I'm sure you can relate to that and then by establishing an appetite me as a technical person I help my organization establish what is intolerable for their appetite an example here would be it is intolerable to lose productivity in the business yes it is so that being the focus of the high risk then what is the actual threats that I need to be focused on primarily should it be pups potentially unwanted software should it be crypto miners or should it be ransomware and privilege escalation I want you to think about that you've got limited resources risk-based allows me to prioritize ransomware impact because that's where my appetite is in other words that's intolerable to lose productivity due to a ransomware attack and if we continue to actually approach it that way prioritize and rigorously focusing on the meaningful threats that create impact and the controls that counteract it then we're definitely in a position to spend our resources efficiently and effectively so that's the biggest takeaway I want you to have here today what does risk-based mean it's not a compliance spreadsheet it is a method of thinking of how to optimize the defensive layers each and every one of us has to design our security systems for okay so that's risk-based um cyber security so initially you possibly wait um thinking it's like is there a practical approach in order to achieve that risk-based uh cyber security approach yes and I'd like to introduce you to something called TBS time-based security okay so this would be the Practical philosophy of how we can achieve effective risk-based cyber security TBS was actually published in the 1990s by Mr Wynn schwartow okay and essentially he and his team and some other luminaries intruded the department of defense's systems thousands of times even though the Department of Defense is uh Investments was massive they had millions of dollars of IDs as firewalls Etc but Mr schwartzow actually tested the defenses of all of those Investments how well the Department of Defense had prevention enabled how well they could detect and how would they respond after detecting that's known as the pdnr aspect of time-based security now I want you to understand the cliff notes of time-based security time-based security is not about Computing the amount of time an adversary takes to achieve their sequence no time-based security is about how much time does an effective security system give you to respond and remove the threat and time-based security is in our world everywhere and this is an example of time-based security in the physical world of house um buildings are designed when you look at a door or a wall and the chemical composition of those particular elements they are resistant against fires which is the meaningful risk where loss of life could be established so the time-based security metric that you're seeing there in those blue and green columns is letting anyone know if they position the walls in the door frames in a particular architectural pattern how much time do those particular Elements by the people in such rooms until the fire spreads and there's loss of life this is real world value that's how buildings are built our homes are built so TBS is not a theoretical aspect it is a meaningful framework that tells us how to design an effective security system and the formula that you see in there with the green smiley face that's what every Defender like you and me is aiming to design with our firewalls our proxies our endpoint security Investments and it tells us that when protection is greater than D plus r combined then we have an effective security system notice what I was saying there prevention must be greater than the detection response in our example with the graphic it means that the firewall that the wall composition can sustain that fire enough time for people to know that there's a fire going on and they can walk out the building in contrast TBS tells us that an ineffective system is one whose prevention is less than detection and response combined this is why it's important to know that if we're pursuing meaningful defensible outcomes first we need to know what the final outcomes mean as the system that we're designing and I'm going to give you one last example here of profiles of the systems that we're all building and it's very natural and I'm demonstrating to you three types of systems three profiles on the left hand side you're seeing system a that is a TBS design uh system one where prevention is greater than b plus r that's an effective security system in system B you're possibly CNS it's a system that is designed to detect most of the time but there isn't much preventing much response and the outcome there shows us again with TBS it's an ineffective security system but why is it ineffective it's because it's not giving you enough time to respond effectively you're reacting too much now if you have this type of system in your Enterprise then the only thing we need to understand is that if you have system B and C you require a lot of humans to constantly respond effectively and so we go back to the risk-baser process telling us optimizing the defensive layers we don't have infinite resources we want to be able to have enough prevention walls that give us enough time to respond efficiently with whatever resources we have in the Enterprise so TBS effectively gives us a way to understand that the defensive outcomes we design have to be manifested in the system that we're showing here in the green circle excellent so time-based security is done so if now we know how to design a system then we need to ask ourselves well who actually does this kind of work okay we're going to spend a little bit of time now enabling ourselves the defender because in order to get those outcomes done the person that leads these outcomes is the defender and they're on a journey to defend in that Journey they have to be able to put together portfolios that have prevention controls detection controls and responsive controls and essentially if they can harmonize that orchestrated in a balanced approach then they'll be able to prevent things to anticipate the adversary they will be able to detect and identify the presence of the adversary confidently and if and when they identify it they'll be able to respond by confronting the adversary with the effective actions that are needed and we're going to see an example here I'm not just bringing you text I'm going to get down to code and show you an example okay so this effectively shows us that the outcomes of pdnr are driven by the defender in order to successfully defend but let's talk about how does the defender actually achieve this what is the essential things that they need how are they approaching it mentally and this slide would represent to you that no Defender can successfully defend by using prevention technology or detection technology or response technology without having an understanding of the threat it is impossible if they don't have an understanding of the threat all they see is isolated symptoms but they need to have understanding in order to comprehend the systematic impact from the threats they have this understanding then they can coordinate the technical interventions across their Enterprise with I.T that are required to defend if they know how to coordinate after having an understanding they can communicate and express the urgency and the severity by which the incident response needs to be conducted during the attack they have the understanding they can validate the threat intelligence and corroborated to establish The credibility of the particular risk being manifested this is the intimate relationship between the defender contacts and we're about to see the technology the main thing for you to take away from this slide is Defenders need to be provided concrete understanding so they can actually defend and there's only one thing that improves understanding context and that's how outcomes are pursued with context I'd like to outline here why context is so important because context allows the Defenders to actually make the first move evaluate and understand where they're going to put their defenses against the adversary to the greater impact they take the right actions ahead of time they're reacting less and they're actually neutralizing High severity situations without those actually causing a lot of impact but these actions that Defenders take what are they well here's an example you can have many products that are giving you the ability to create responsive actions you can block things you can restrict permissions you can restore credentials you can disable having a product that gives you these actions as capabilities is not enough to effectively defend because the most important thing to know is the capabilities that are afforded to you by a product you must know when to use those things before the attack during the attack or after the attack and an example here would be if you restrict privileges if you restrict privileges before the attack then you are effectively reducing the attack surface but if you're restricting privileges during the attack then you're no longer proactive you're actually reacting and conducting containment that's the key here of this intimate relationship between context technology and expressiveness how do we express an effective defensive plan let's get right into it now here's context in what it needs to be context has to be something that formulates the scenario but it must introduce terms that allow Defenders to understand the scenario and evaluate this scenario and here's a day in the life of all of us we're seeing here in the scenario these circles with question marks that represents the discrete indicators that you're processing every day hashes IPS register Keys Etc you receive these on a daily basis you don't always have context you need a scenario in order to understand how those particular data points are actually intertwined now with the scenario that we're seeing here with Visual Basic script macros let's actually begin to explore terms that are needed from the scenario and this is what you're most comfortably uh recognizing today in the industry such as kill chains miter attack Etc we organize the same discrete data points with terms like initial access execution and persistence but what did those things offer in us they're giving us understanding that there is a sequence in an attack an attacker has to progress through particular objectives and if we further look at the arrows of Direction the letters know what is the actual attack path that these data points are involved in this effectively shows us that without context it is nearly impossible to take effective actions with discrete data points so what is the key takeaway now from Context that has given us when it's telling us one thing Defenders when they have a good understanding they can characterize the threat and if they can characterize it they can express the actions to be taken against it and then they can express those actions then they will be logically able to conduct the actions to neutralize it and that brings us into how do they evaluate those actions that they need to take here's the same progression but this time we're going to add the security defenses that a Defender has actually purchased in this particular area okay and these green Shields represent products that have preventive capabilities they can disrupt they can block they can neutralize things and the Blue Shield represents passive Technologies or capabilities they just observe they just attack they're not capable of blocking so with this very same attack sequence the attack the attacker could continue to come through but the defender can now begin to evaluate how to take the first action perhaps with an application change control program as we're seeing there a Defender can restrict which applications execute a particular types of files in some organizations maybe you don't have this ability to actually you know enact such an action well perhaps you have an antivirus or an Epp and hopefully if you have threat intelligence then that particular product can disrupt item number two okay in some of the areas you may not be able to implement highly restrictive policies your organization might be more aggressive in blocking at the network layer with firewalls or proxies then in that situation the proxy can interrupt this doesn't represent the eradication of the threat but it demonstrates that you're capable of disrupting the objective of the threat now once you receive this you kick it into your response mode and go back to the endpoints to neutralize items number one and two at a bare minimum you must always as a Defender have situational awareness and that's what edrs are really fantastic at they can't block but they can actually record it's the equivalent of your surveillance camera being turned on monitoring your house and its entry points and then if we understand all these aspects we can mix and match and combine flexibly the types of actions that it takes once we have the context about the scenario and we understand the terms or the characteristics of the threat okay so I just saved all of you a lot of time study and defense in one slide and I hope you appreciate this but let's go a step further it's one thing to have context and being able to understand threats the defender has to again communicate and express their knowledge of these threats so that they can coordinate across the Enterprise and it's challenging to do that with stakeholders at the executive level or stakeholders at the Tactical level or even peers who you're supposed to be working with in I.T it's a tough job well I'm going to show you a way of how you can actually Express these situations and it always starts with a scenario hypothesis right and this is going to be exciting now for all of you that like code so here's a hypothesis right a compiler executable achieves credential theft within memory you're doing this with memory so you might hear industry terms like filest attacks right so credential theft within memory from a process in Windows called lsas.exe and that results in unauthorized privileged use in other words the credentials that are stored in that process can be used across the Enterprise because they're stolen right so this represents back to mckinsey's risk-based cyber security it is intolerable should you actually have attackers going throughout your environment in an unauthorized manner impersonating your privileged users okay so we're tying those two together here's an example of a real world threat yes it's mini cats but the importance is that the scenario counts for any type of program that looks to achieve this by abusing lsas so here's the source code letting you know there's a Windows API system called open process and this is a source code so you actually can go use this awesome tool called code search so you can see source code at scale from millions of repositories but essentially this is the code that is called a system call open process and then on the top we're seeing SE debug that is a very special privilege that allows programs to actually read the remote memory of another process okay as you walk the memory you cannot achieve that without having that privilege and using this system call great so this is a real world weapon let's actually see how to understand and characterize this weapon and express the defensive actions that are needed against this hypothesis so we're going to introduce you to a structured thinking model which is called the expressive threat capabilities model I am an endpoint engineer here at Cisco and in other places wh