Your network is under attack, but you don't care. That was the message from Immunity researcher Lurene Grenier, who on Sunday kicked off the Cisco Talos Threat Research Summit, in Orlando, Fla.
"You are either not aware of what's going on or aren't taking all this seriously," she said.
At the heart of Grenier's view of attackers is a set of three tiers:
She told the audience that dealing with tier 3 involves the kind of activity they're used to — pen testing, updating, and then continuing to pen test and update.
Tier 2 becomes more complex because many of the organized crime groups are either working on behalf of nation-states or reusing nation-state code. To have a chance of defending against tier 2 threats, Grenier said, your organization must do two things, one expensive and one difficult.
The expensive task is finding and hiring good security people. From there, give them time to understand your network, she said. "They need to know your network better than the attackers, and that's a tall order," Grenier explained.
Then comes the hard task: "Give them the clout to change what needs to be changed, and give them the resources to make the changes," Grenier said, noting that both involves a cultural shift for many organizations.
But that's easy compared with the shift required for coping with tier 1 attackers. Grenier hammered home the point that every organization must be prepared to deal with these most advanced threat actors.
"How can I convince you to care about this? This isn't a responsibility thing anymore — they won't tell you when they've owned you," Grenier said. "It's just that your IP will end up in another country."
Defending against this kind of attacker requires investment; Grenier offered a metric for how much a company should be prepared to invest. "How much do you pay your lawyers? You should be paying your security team at least as much," she said.
Then she recommended draconian segmentation. Most corporate computers, she said, have no business being on the Internet and should only be connected to an internal network without an internet gateway. What about the employees who need to update social media and check March Madness scores? "Give your employees an iPad," Grenier recommended.
One of the reasons Grenier's warnings seem so dire is that she has seen the layers of attacks that threat actors have at their disposal. "There are unpatchable bugs in everything you own and use. Every nation-state has multiple zero days on everything you own — probably three deep," she said.
Those vulnerabilities and exploits extend to mobile devices. The iPhone, Grenier said, is probably the most secure mobile device widely sold, and yet "there are probably 10 full iPhone [exploit] chains at any given time. And that's the most secure calling platform."
The real risk isn't in an attacker devastating your infrastructure, Grenier said, but in a nation-state-sponsored competitor beating you economically.
"What could you do, as someone negotiating a contract, if you had perfect knowledge of your competitor's plans, information, and projections?" she asked. "That's the situation everyone finds themselves in when they deal with a state capitalist."
Top industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Click for more informationCurtis Franklin Jr. is Senior Editor at Dark Reading. In this role he focuses on product and technology coverage for the publication. In addition he works on audio and video programming for Dark Reading and contributes to activities at Interop ITX, Black Hat, INsecurity, and ... View Full Bio