Elisa Constante, OT Technology Innovation at Forescout talks with Jeff Frick at RSA 2019 from the Forescout booth in Moscone North in San Francisco, CA.
#RSAC #Forescout #theCUBE
https://siliconangle.com/2019/03/11/it-and-ot-plus-iot-equals-big-challenge-for-security-against-nimble-attackers-rsac-guestoftheweek/
IT and OT plus IoT equals big challenge for security against nimble attackers
Some of the best software coders in the world are criminals, and industry security experts know they are getting even smarter.
One of the most potent ransomware programs seen to date is GandCrab, not just because it has been remarkably effective in targeting Windows-based systems with popular infection vectors, but its malicious programmers have shown great agility in fixing code bugs and responding to blocking attempts.
At the RSA Conference in San Francisco this month, McAfee Chief Scientist Raj Samani described how he was traveling by car to a meeting one morning in February when a client called him seeking the latest GandCrab protection kit, which had been released earlier that day. By the time he got back in his car, the criminals had already issued a bypass of the new protections, according to Samani.
This example highlights the arms race that security professionals are engaged in as they must deal with a world where the bad actors are as nimble and advanced as they are. It is an increasingly greater challenge, because software coding is just one of the many threats confronting the tech community today. Of perhaps even greater concern is the rapid growth of internet-connected devices, which are designed to communicate with networks, despite having little or no security.
“All of these systems that were conceived to be standalone are now starting to communicate,” said Elisa Costante (pictured), senior director of industrial and operational technology innovation at Forescout Technologies Inc. “We’re looking at threats this can bring and what we can do to defend the customer.”
Costante spoke with Jeff Frick (@JeffFrick), host of theCUBE, SiliconANGLE Media’s mobile livestreaming studio, during the RSA Conference in San Francisco. They discussed how Forescout manages security vulnerabilities across a wide range of technologies, the challenges of protecting legacy systems, and the importance of having visibility throughout the connected enterprise. (* Disclosure below.)
This week, theCUBE features Elisa Costante as its Guest of the Week.
Threats move to the edge
Forescout is focused on device visibility and control, an increasingly important area as the cybersecurity threat “perimeter” has moved to data in edge internet of things devices. The company’s technology addresses the marriage of information technology with operational technology while guarding the connected services that support both.
An example of this can be found in the application of IP camera security solutions. For several years, the Insecam project has provided a directory of 73,000 unsecured IP cameras in 256 countries. Reolink Digital Technology Co. Ltd. has published a breakdown of the cameras available in the directory by country and manufacturer, including a list of usernames and default passwords. (Hint: “admin” and “1234” are very popular.)
With this kind of unsecured vulnerability for only one device, it’s no wonder that companies need technology for access management whenever an IP camera is connected to a network. When a camera is attached, Forescout creates rules to manage the camera’s internet access and ensures that the customer’s operations team is properly alerted.
“IP cameras should do one thing — record stuff,” Costante said. “There could be leverage to turn the camera against the owner. We enter into a network and give full visibility of all the IP devices that are there.”
Vulnerable legacy systems
The many layers of IT and OT infrastructure can get messy, especially in large organizations. This is particularly true in the presence of legacy systems, where outdated technologies that have not been correctly patched with the latest software could result in significant security vulnerability down the line.
...
Watch the complete video interview below, and be sure to check out more of SiliconANGLE’s and theCUBE’s coverage of the RSA Conference. (* Disclosure: Forescout Technologies Inc. sponsors theCUBE’s coverage of the RSA Conference. Neither Forescout nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
RSA Conference USA 2019 | San Francisco. If you don’t think you received an email check your
spam folder.
Sign in to RSA Conference USA 2019 | San Francisco.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For RSA Conference USA 2019 | San Francisco
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for RSA Conference USA 2019 | San Francisco.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
RSA Conference USA 2019 | San Francisco. If you don’t think you received an email check your
spam folder.
Sign in to RSA Conference USA 2019 | San Francisco.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to RSA Conference USA 2019 | San Francisco
Please sign in with LinkedIn to continue to RSA Conference USA 2019 | San Francisco. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Elisa Costante, Forescout | RSA 2019
Elisa Constante, OT Technology Innovation at Forescout talks with Jeff Frick at RSA 2019 from the Forescout booth in Moscone North in San Francisco, CA.
#RSAC #Forescout #theCUBE
https://siliconangle.com/2019/03/11/it-and-ot-plus-iot-equals-big-challenge-for-security-against-nimble-attackers-rsac-guestoftheweek/
IT and OT plus IoT equals big challenge for security against nimble attackers
Some of the best software coders in the world are criminals, and industry security experts know they are getting even smarter.
One of the most potent ransomware programs seen to date is GandCrab, not just because it has been remarkably effective in targeting Windows-based systems with popular infection vectors, but its malicious programmers have shown great agility in fixing code bugs and responding to blocking attempts.
At the RSA Conference in San Francisco this month, McAfee Chief Scientist Raj Samani described how he was traveling by car to a meeting one morning in February when a client called him seeking the latest GandCrab protection kit, which had been released earlier that day. By the time he got back in his car, the criminals had already issued a bypass of the new protections, according to Samani.
This example highlights the arms race that security professionals are engaged in as they must deal with a world where the bad actors are as nimble and advanced as they are. It is an increasingly greater challenge, because software coding is just one of the many threats confronting the tech community today. Of perhaps even greater concern is the rapid growth of internet-connected devices, which are designed to communicate with networks, despite having little or no security.
“All of these systems that were conceived to be standalone are now starting to communicate,” said Elisa Costante (pictured), senior director of industrial and operational technology innovation at Forescout Technologies Inc. “We’re looking at threats this can bring and what we can do to defend the customer.”
Costante spoke with Jeff Frick (@JeffFrick), host of theCUBE, SiliconANGLE Media’s mobile livestreaming studio, during the RSA Conference in San Francisco. They discussed how Forescout manages security vulnerabilities across a wide range of technologies, the challenges of protecting legacy systems, and the importance of having visibility throughout the connected enterprise. (* Disclosure below.)
This week, theCUBE features Elisa Costante as its Guest of the Week.
Threats move to the edge
Forescout is focused on device visibility and control, an increasingly important area as the cybersecurity threat “perimeter” has moved to data in edge internet of things devices. The company’s technology addresses the marriage of information technology with operational technology while guarding the connected services that support both.
An example of this can be found in the application of IP camera security solutions. For several years, the Insecam project has provided a directory of 73,000 unsecured IP cameras in 256 countries. Reolink Digital Technology Co. Ltd. has published a breakdown of the cameras available in the directory by country and manufacturer, including a list of usernames and default passwords. (Hint: “admin” and “1234” are very popular.)
With this kind of unsecured vulnerability for only one device, it’s no wonder that companies need technology for access management whenever an IP camera is connected to a network. When a camera is attached, Forescout creates rules to manage the camera’s internet access and ensures that the customer’s operations team is properly alerted.
“IP cameras should do one thing — record stuff,” Costante said. “There could be leverage to turn the camera against the owner. We enter into a network and give full visibility of all the IP devices that are there.”
Vulnerable legacy systems
The many layers of IT and OT infrastructure can get messy, especially in large organizations. This is particularly true in the presence of legacy systems, where outdated technologies that have not been correctly patched with the latest software could result in significant security vulnerability down the line.
...
Watch the complete video interview below, and be sure to check out more of SiliconANGLE’s and theCUBE’s coverage of the RSA Conference. (* Disclosure: Forescout Technologies Inc. sponsors theCUBE’s coverage of the RSA Conference. Neither Forescout nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)