Conf42 DevSecOps 2024 - Online

- premiere 5PM GMT

Introducing the power of Rating in Cybersecurity

Video size:

Abstract

Never presented before at the time of writing. The idea is original, and the talk is about applying the power of rating to cybersecurity and its benefits, such as enhancing the security perimeter, getting closer to malicious attackers, and all the implications of embracing this approach. Really a disruptive talk.

Summary

Transcript

This transcript was autogenerated. To make changes, submit a PR.
Hello and welcome to this conference. Thank you very much for attending this presentation. Today we are going to introduce you to a very innovative Solution for cyber security. We are going to, start with the first slide and introduce some of the concepts and I will deliberately, go slow so all these concepts can be well digested because some of them may be relatively new or relatively not very common in the world of cyber security. So first thing first. Internet2. ai, so number two is because This is the evolution of internet in a more secure internet and AI because we do use AI in most or all of our processes. And in particular, we use that in a very key process in this solution that we will explain later. We are, as long as we are aware, The first company in the world for doing ISP reputation. So basically ISP reputation is to put a rating to the ISP. Originating the traffic. So when we receive traffic from internet, from a specific network that belongs to an ISP, we know how good or bad this specific ISP and network has behaved in internet. And for this purpose, we use multiple ways. We will go in detail in the other slides, but. It is good that you start understanding that this solution or this approach is different from what you are used to see, in the cybersecurity space. This time, we are going to start the controls in the ISP originating the traffic, not on the destination of the traffic where your company is. We are going to take one step forward and enhance the security perimeter. Basically, this is all about. If you understand this concept, the enhancement of the security perimeter, this is what it is all about. Based on a specific technology related to the rating, to the reputation of the ISP. But the concept is this enhancement of the security perimeter, which by the way, is a concept that in other areas of defense, like the military, it is a very well understood, technique or strategy to use. When we say AI being used in our processes, there is one key process, which is the, the rating. So what rating we apply to different scenarios of the ISPs, networks delivering traffic. this policy is dictated by AI with very minimal human oversight. So let's go slide by slide, introducing the concept in more depth. So the security challenge, the current landscape. is terrible. The threats are evolving, we get more threats, defending an organization is really difficult these days because they attack from multiple places, they are dedicated, dedicated, targeting, there are different types of attackers, so it's really difficult. And unfortunately, I have to say that if that was a race, we are not winning. At least, what we hear from the media is that large organizations with many resources, they are also victims of attacks. Which make us think that there is something that needs to change, but something at the base, something different. We need to do something different if we want to change the direction of the race. So basically, the speed this is going, we do need to take action on it. As soon as possible. Okay, so at the moment, in cyber security, the main idea, different colors, good, but the idea is to do the defense at destination. You put firewalls, you put all type of defenses when you receive the traffic from internet, the offending traffic. And this is basically what you are doing, for your defense. This is good. It's really very good, but it has some issues. Or maybe to say that in a different way, it is not enough. There is something missing here. Otherwise, we wouldn't be in the situation we are. So we are getting millions of attacks every day from different angles. It's if we were to make an analogy with the real world, it's like having millions of people hitting your doors And your windows in your house, which is something that obviously is not something you want to have. And probably because some of them may be also to get into your house at some point, because there are millions. And they are doing that every day in every second. Even when you are at home, when you are not, in the morning, in the afternoon, in the evening, and when you're sleeping. So basically the breach is warranted. We all in cybersecurity say that is not the question of when, but sorry, not but if, but when it's going to happen, we all know it's going to happen. I have an anecdote related to this is one CIO of a very large organization. One of the statements, last statement I read a few weeks ago was, We have the enemy already inside, so we need to make our defenses based on the idea that they are already inside. what they were saying here is that we don't have this perimeter anyway, so we need to start defending ourselves inside the house. Which really sounds a little bit Too much. And legal complexities. Due to the nature of Internet, which is, international, you can be attacked from many multiple different countries and the legal enforcement there is very difficult because by the time you raise a complaint really it is very difficult that you hit the attackers in, in, in the final country, in the country where they are originating these attacks. It's almost impossible. That's why we sometimes do see in the news that the FBI has captured, some, malicious attackers somewhere and they have deactivated, thousands of boats and stuff like that for ransomware, for phishing, for all these attacks. But the thing is still continues. it's Something really is not working because this is not. Only continuing, this is growing. So we are in a worse situation than we were yesterday. So the trend is not good. We need something else to stop this trend. So our suggestion is that we change something at the strategic level. A big change in cyber security. So this big change is related to the issues related to the root cause. We think it is the cyber impunity. We think that the lack of, there is no deterrent at the moment for attackers. They basically can attack at zero cost. they are anonymous. They can attack pretty much from anywhere and they don't have any consequences. So it is for free. For example, it is a term that is not being used that often these days, but in the past we had, we had this script kiddies. And how is that possible that large organizations with multiple millions or miles of employees, millions of revenue, there are script kiddies that These large organizations and sometimes they even penetrate these companies and they commit fraud. So why is this happening? Because really these attackers are very difficult to catch. So it is basically, in summary, attacking is for free. So the return of the investment is very high. So as we say, the solution, we think that we need a change. We need to think out of the box. The change requires A different type of change, not only making your doors and windows stronger, which is very good. It's something you need to do, but we need something else, and we suggest Taking a strategic approach and make our doors strong, make our windows strong, but also enhance the perimeter and put some distance between the attackers and our house. So then we can control them from far away from where they are and not from where we are. some of them probably, obviously, will penetrate this first perimeter, but many of them may be filtered because you are already, by default, you're doubling the control. So you have two controls instead of one, and one of the controls is not anymore at your doors. It's at their doors. It's where they are. You get close to them, you are moving the defenses, or doubling the defenses, next to them. And then the things change, because I'm sure that all these script kiddies we have mentioned before, they will think it twice before attacking a large organization. If they know that the ISP to where they are connecting and which is where the attack is going to be originated is controlling them and may raise a complaint and they could be prosecuted because the ISP is in the same country they are and then can do the prosecution of the malicious attacker, which is something that at the moment is not happening because of the complexity in the international law. So we have two defenses, and one of the questions that sometimes arises when I do this presentation is that, yeah, okay, but We all know that the attackers are, chaining through multiple, country servers, before launching the attacks. That's true. But the same way that they chain, we can chain it back as well. And I'm going to explain that in the next slide. Once that we have introduced what the specific technique we suggest to enhance this perimeter. So the tech we suggest is the rating. The rating is very, extremely powerful tool. Large organizations like Amazon, eBay is an excellent example. it wouldn't exist if that wasn't for the rating. Who of us would buy something in internet without knowing who is selling that? Thanks to the rating, we can buy goods, that, and we are safe that these goods, will, we will receive them and they will be in relative good conditions. So the rating is, is an powerful, very useful technique to use. So then the question is why we are not using the rating of the ISPs, that are launching or sending this traffic of the malicious attackers to internet. Because if we had. A rating of these ISP networks, we could say, okay, the traffic coming from this network is usually malicious and the traffic coming from this network is usually is good. So this would strongly support and help the security analyst in our organizations. And yeah, the rating is something that is an extremely good candidate to be introduced in the cyber security because the power it has may help us, doing the things better in our particular case. We do have, some intelligence of the malicious traffic because we do have some probes worldwide, distributed through geographically around the world. And we do also take some reports from third parties on the IP addresses, and then we assign this, this rating to the ISP to which. this IP address to the ISP to which this IP address belongs. And we also do have proprietary algorithms. This collection of data is done in real time and the good thing here is, many people, also another key question is that, okay, yeah, but we already do have IP rating. Yeah, but the IP rating, the problem is that there are billions of IP addresses and they don't have a history. ones that, for example, a server with malicious, I don't know, phishing or whatever, or some malware, Once that this has been clear, this IP address is disappears. we remove that from our filter list and it is again a good IP address. It doesn't keep a history, while in the ISP rating we do keep this history. We know that today this ISP network was behaving well. But we also know that yesterday, this ISP network was launching an attack to our, and that was detected by our probes or by any other means. And so we know how many times we have rated this network and what the ratings were for the different, times. So we keep a history of that. And this history is like when you go to the restaurant, there are like, it is not the same to have a rating of, of five or four to five for a restaurant. if there are two people that are doing the rating for this restaurant, when you see a restaurant that has 1, 542 ratings and this one has a fault of three, it's probably a very good rating and patent pending application. Yeah. We are about to make this application in the next few days. we have this coverage geographically, through worldwide. And we get this rating is continuously updated. One of the key things again that I want to mention here is that this policy of the rating is dictated by the AI. We do have a little bit human oversight, but the policy of the rating is dictated by the AI. And you will be surprised, with the evolution of the AIs these days, rational data statements look when asking for a specific, scenarios. So they really, really logical and really, explained why this, rating should be applied based on the scenarios we have, suggested to the AI. That is awesome. Some use cases, very typical is that you use the sim here to ingest this cyber intelligence, into the sim, which at the moment, we have a straightforward integration with Microsoft Sentinel for which you don't need to change your ingestion layer. so this is the most typical scenario, monitoring the traffic, but there are some other customers that they do, have, more sophisticated or they do have, a different, sorry, a different risk appetite. And they do, for example, financial entities, they can do, limit the operations. For example, they may only allow you to see the balance of your account if you are connecting from an ISP with a poor rating, or they may just limit the transfer of the money, if that is, this connection is coming from one of those, ISP networks. and the risk assessment, for example, when you get, Customers or employees connecting to your network, you can make a profile and look at, how many of them are connecting from, from ISPs with a good rating or a poor rating, and then you can make a profile on them. Yeah. What risk is your organization having based on allowing some poor ISPs and make decisions based on that. So this is what basically the intelligence obviously allows you, the intelligence we provide to you. One of the things also to maybe mention here before going to the next slide is that we do rate the origin ISPs, we are in touch with them, we have a strong relationship with them, contact and a community with the ISPs. So we do not only do the rating in a cold way. We do support the ISPs and try to all these ISPs that don't have, very good or these networks that they don't have very good rating, we support them improving the rating. And this is very important because we are here to, our mission is to make Internet more secure, make this second Internet, the evolution of Internet, where we can be safe. And the reason, and again, sorry for extending a little bit, but the reason is that sometimes we are not Aware of how far internet is getting into our lives and I have a little bit of a dramatic anecdote regarding to this. I'm living in the UK and a few months ago, I am a blood donor and receive, An email from NHS asking for blood, additional blood, because they were running out of stock due to a kind of a perfect storm. And one of the, one of the key components of this perfect storm was that the NHS was under attack. They were being cyber attacked. So what I'm saying is that this is not anymore about computers, about electrons, about circuits, about electricity, about all these things that we do love. it is going much deeper is, the impact in our lives of cyber attacks is getting bigger. And the way the digital, obviously the world is going to the digital direction, it's gonna get worse if we don't take strategic measures. As soon as possible, that's why we are in our mission. We are presenting this strategic approach here, some real world analogies. Okay. I have mentioned already the restaurant one, which is the one that I do the most, because I think it's very easy to understand. We all go to restaurants and we buy goods or we go dining. we look at the rating and I'm a big fan of looking at the restaurant and which one has the best rating and the comments of the people and all this stuff. the football defense is another one. we all like, many of us do like football, not necessarily and not a super big fan, but I do like to see my team playing and doing a good defense. And I couldn't imagine my team, like with all the 11 players, like in the goal. Score, they all waiting for the attackers to just, to wait until they score. It doesn't make sense. So we all will be asking, that, for example, we use a 4 4 2 strategy or something, some layered security, in place, not all the players in the score. So basically that's what we are doing in our organizations at the moment. We are allowing, ISP networks to send traffic to us. and with a very poor rating and that is the same as football or it is in the restaurant and the home security. I have already mentioned that. all the solutions which are very good. Don't get me wrong. They are very good. These old tactical security cyber security solutions. But we need to go one step further. We need to do a strategic change. We need to think out of the box for cybersecurity solutions, or this race, we are not going to win it at the trend, at the speed direction is taking. Okay. So let's make our windows and doors strong, but also let's put some space between the attackers and ourselves and let's get us into their territory. to be next to them and protect ourselves better before they hit our house. I know that you cannot make any questions here, so this slide probably doesn't make much sense. but just to let you know that if, even if you cannot do the questions now, we are happy to answer you any questions. So for that, you just need to contact us in internet2. ai, easy to find in the website. you have the contact details. we are in Twitter, in, in email, obviously, and we have the website as well. And we do have a tool that you can check in our website to, to look at the rating of the different networks. And it is for free. We also do have free plans and blah, blah. We haven't discussed the commercials here. But if you're interested, we are happy to. Here is what was more the introduction of a new strategic approach in order to make internet more secure for the best of all of us. So thank you very much for attending the presentation. That was for me a pleasure. Thank you very much also conference 42 for letting me presenting this innovation here. And yeah, have a good day. Thank you.
...

Ramon Izaguirre Bilbao

Founder & CEO @ Internet2.ai

Ramon Izaguirre Bilbao's LinkedIn account Ramon Izaguirre Bilbao's twitter account



Join the community!

Learn for free, join the best tech learning community for a price of a pumpkin latte.

Annual
Monthly
Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Delayed access to all content

Immediate access to Keynotes & Panels

Community
$ 8.34 /mo

Immediate access to all content

Courses, quizes & certificates

Community chats

Join the community (7 day free trial)