CyberWire Daily - Black Hat - Cyber Security Trends and Investment [Special Edition]

Episode Date: August 4, 2016

The 2016 Black Hat conference is underway in Las Vegas this week, and in this special report from the show floor we’ll hear from industry leaders about industry trends, and from venture capital fund...ers about what they need to see before saying yes, and why it’s harder to get startup funding than it used to be. Learn more about your ad choices. Visit megaphone.fm/adchoices

Transcript
Discussion (0)
Starting point is 00:00:00 You're listening to the Cyber Wire Network, powered by N2K. stay home with her young son. But her maternal instincts take a wild and surreal turn as she discovers the best yet fiercest part of herself. Based on the acclaimed novel, Night Bitch is a thought-provoking and wickedly humorous film from Searchlight Pictures. Stream Night Bitch January 24 only on Disney+. The 2016 Black Hat Conference is underway in Las Vegas this week, and in this special report from the show floor, we'll hear from industry leaders about industry trends and from venture capital funders about what they need to see before saying yes, and why it's harder to get funding than it used to be. Stay with us.
Starting point is 00:01:04 I'm Dave Bittner. We begin this Black Hat special edition with a look at trends and hear from some industry leaders and experts about what they're seeing and where they think cybersecurity is headed. Vitaly Kremez works in cybercrime intelligence for Flashpoint, a company that monitors the deep and dark webs. So one of the most emerging trends was the recent DNC, Democratic National Committee, hack that was allegedly perpetrated by Russian government.
Starting point is 00:01:32 In light of that attack, we saw some certain response from Russians. They opened up a new story about hacks from the FSB. And we've seen new trends of, for instance, government trying to use disinformation tactics or attacks to shift the blames or responsibilities for attacks to hacktivists like Guccifer, the creation of identities as a way for them to obfuscate their intelligence operations. And how we would respond to that would be very interesting response from the government sector and how the private industry with the government will combat that. Number two, I would say healthcare
Starting point is 00:02:13 institutions being compromised and the ransomware attacks on healthcare institutions. Those attacks bring physical damage to specific devices running in emergency rooms. So they can actually paralyze the hospital operations connected to the ICU units. So they can be a really physical threat to patients. And another trend, the attacks against SWIFT, the bank attacks targeting the specific payment system as opposed to credit card data. So once the Russian actors that we think like Eastern European actors were connected to allegedly the SWIFT attack in the Ukraine, responsible for more than $10 million worth
Starting point is 00:03:03 of loss, that type of attack was damaging to the whole country infrastructure that could lead to destabilization of the economy and people losing jobs and more even like real-life frustration, especially in light of the Crimea annexation and the difficult situation between Russia and Ukraine, politically speaking. And also one last trend I want to highlight in cybersecurity perspective, the emergence of ISIS as being the users of encryption methods and technology. As we know, they are learning and they're not too capable at this moment but they are learning and
Starting point is 00:03:40 if they would apply the same kind of methods of encryption that the InfoSec world uses now and they would apply the same motivation as physical threat to human lives and in the name of jihad, that would be damaging. And if they would transmit that to the cyberspace, as they're doing now with the United Cyber Caliphate, which was alleged to be a faction of ISIS, that would be a concern to the old InfoSec and how we'd respond to that. Lance Cottrell is chief scientist at Entrepid,
Starting point is 00:04:10 developers of secure virtual browser technology. It seems like a lot of the problems are taking place in the basic blocking and tackling. When we look at companies and they're bringing us in to solve this problem with the browser, but they're also having huge trouble just keeping track of what are their systems, where's the perimeter, and having that dissolve on them. And that's one of the things they like about having the software actually on the endpoint is the endpoint isn't staying inside their perimeter. If you've got some sort of a gateway device that works until the laptop goes to Starbucks, at which
Starting point is 00:04:46 point suddenly that stops working. Well, how do you maintain that protection? We're thinking a lot about that extension of the perimeter, extension of responsibility. I think governments and corporations need to start thinking about how can they protect their employees even when they're using their own devices at home. And it can't be in a monitoring-heavy way because no one's going to put up with that. But anything they can do to make the person safer when they're using their own computer at home and accessing corporate email, which they do, is going to be critical.
Starting point is 00:05:21 And that email is the huge failure. If I can get your endpoint and get in and get access to your email client, I get huge amounts of data and everything I need to launch the perfect spear phishing attack against everyone else in the company. I can impersonate you perfectly. We're seeing a unique signature on almost every endpoint target. These virus and malware are morphing continuously. So we, and many others in other parts of the security space, are now starting to look at how do you build the tool so that it automatically is secure. Even if it gets infected, it cleans up. You don't necessarily need to be trying to remediate. You're re-imaging your servers automatically every couple of
Starting point is 00:06:05 minutes because by the time you send a guy out and chase it down it's usually labor intensive and they've had a chance to move on. So I think that's going to be over the next couple of years one of the big trends is more of a sort of self-healing proactive kind of security rather than trying to clean up after you detect things. Leon Ward is Senior Director of Product Management at ThreatQuotient, developers of threat intelligence platforms. It's so hard to predict the future, right?
Starting point is 00:06:31 It feels like that time of year is blackout or it's the end of the year and everyone's looking for predictions, what's going to happen next year? But ultimately, the only predictions you can make is it's going to be more of the same. The things that are being successful now will continue to be successful until they change. And the only reason an approach or methodology ever changes is because the defenders become more sophisticated at preventing that method from being successful. So what is the new method, the next method? Well, we don't know what it is until the attacker is actually going to be forced
Starting point is 00:07:08 to change their methods because their current methods aren't being successful. Brian Glancy is chief technology officer at Optio Labs, developers of mobile security architectures. People are now starting to understand a lot more about phones and their powers and kind of the problems, everything from chipset fundamental problems to, you know, encryption issues like came up with Apple, you know, last year. They are starting to understand the implications of, you know, the packages and things that are going into a device and how, you know, it's a complex problem and there is no one simple solution usually. So we're starting to see, you know, more people choose to do, you know, the migrate back from potentially BYOD. Think about for things that are actually regulated or have audit audit fines or compliance fines think about corporate owned devices and issuing their own devices
Starting point is 00:08:12 for those things we're seeing you know you're seeing a rise of things like the seer and phone very high-end secure phones with you know high level of evaluation and compliance to new international standards. International standards on this side have actually been changing quite a bit too. There's now a new international standard for security that validates the security of phones, different phones, to a known given standard. One of the things that's fundamentally changing is the diversity, right? It used to be years ago there were three or four or five on the outside phone manufacturers that were the big manufacturers
Starting point is 00:08:56 of phones, right? We've seen that cycle several times. Those older members of us have seen Palm come in and go out and other devices come and go right throughout the years. But now that turnout is becoming even worse because it used to be that Samsung was the major provider and Apple was the major provider. But now we're even seeing players like Huawei crack the top five for most devices made. And when you look at just the number of sheer providers that are building phones now, mainline phones, it used to be a dozen. Now it's a thousand, right?
Starting point is 00:09:36 So this is fundamentally changing the market and kind of how the number of devices, the types of things that you see on the market, and also that fundamental kind of insecurity problem becomes bigger. I think that we're going to continue to see many, many more vulnerabilities. There's a lot of companies out there that are making devices that are going to have our personal information, are going to have our banking information, are going to have our email.
Starting point is 00:10:04 our personal information, are going to have our banking information, are going to have our email. And, you know, they don't have the expertise usually to do the security implementation. And it's not usually something that they can just get off the shelf. So I think we're going to see many more vulnerabilities coming in the next year, two years, particularly out of the same library used again, over and over again, in an IoT device, in a cell phone, and all over the place, just because there's not that expertise usually in the marketplace. So I think we're going to see a lot more. Hamilton Turner is the Senior Director of Research and Engineering at Optio Labs.
Starting point is 00:10:42 We used to always laugh about the fear and uncertainty in the media, but in the context of mobile phones, it's not as fake as we would like to believe. There is a really long tail of vulnerabilities, and most devices are vulnerable. The device you have in your pocket probably has at least four or five CVEs that are unpatched on it, and it's an interesting world. It really used to be that you'd get all this crazy headlines about things are scary, your phone will blow up any minute, but maybe the vulnerability vector didn't really keep up with the marketing vector. All of a sudden, they really are starting to keep up. So we're going to keep seeing demand for these devices to rise, and so we're going to get more and more and more of them, and we're going to keep seeing the security vulnerabilities go up more and more. Vikram Fatak is CEO of NSS Labs, an IT security product testing lab. Well, so obviously you've heard about the ransomware, right?
Starting point is 00:11:31 We started seeing that about a year ago in our systems where the attacks started shifting from the type of malware being, you know, looking for credentials, which you're still looking for, like login password stuff or credit card data, to ransomware, CryptoLotter, and things like that. I think we're going to see a lot more of that, and the reason is this. So if you put yourself in the bad guy's shoes, and I'll get into the detection in a minute, if you compromised 100,000 systems five years ago, you probably had 90,000 new credit card data, 90,000 new personal identifiable information, so your social security information, and so on. A lot of new stuff. Now in 2016, they pretty much have everybody's data, okay? So you
Starting point is 00:12:21 get 100,000 people, maybe you have, what, 5,000 new. So your return on your investment is much, much lower. Okay. And so they need to find different ways to monetize their capabilities. So the first way was to sell your data to other people who are going to, you know, use your credit card. Okay. That's sort of, that line of business is now peaking out. There's diminishing returns. So what are you going to go after? Ransomware is a natural thing. The thing about ransomware, though, is it's not going to be you'll have some for you and me. But the big things are going to be, you know, you've heard about the hospital network and so on that got hit.
Starting point is 00:13:02 Those are the types of attacks that are going to be happening moving forward because that's where the money is. It's a hard problem for somebody if you're a hospital administrator or an executive. What's your choice going to be? I mean, what are you going to do, right? In the short run, there's probably a lot of folks who are going to end up paying because, you know, the equation doesn't make sense. You don't want it to get out that you were hit because there's reputational risk. There's all kinds of other issues, right? So that's a big one. And I do think that, you know, Internet of Things is going to be tied to ransomware. Now, not my garage door opener, right? Not my pool or anything like that or my thermostat. Okay, they could make me miserable by making it really hot, but they're not going to make any money off of it, right? But when you start talking about supply chain, so let's just say fast forward five
Starting point is 00:13:42 years, everybody has their refrigerator that has internet of things. You can tell when your milk is low. If they could mess with the setting that makes it look like the milk is empty for everybody at once, you could cause a huge surge in supply to go to the grocery stores. What happens then? Nobody wants the milk. You're going to have a lot of spoiled milk, right? Similarly, you know, what happens if you say, you know, going to have a lot of spoiled milk, right? Similarly, you know, what happens if you say, you know, it's all full, you could cause shortages, right? So then it becomes a question to the supply chain. How much is it worth to supply chain? It's kind of like the old protection money talking about from gangsters, you know, it would be a shame if that window got broken. It'd be a
Starting point is 00:14:19 shame if your supply chain got messed up. That's where internet of things really gets tricky, right? So, and that's not to mention water treatment facilities and other things that are more obvious, high-profile SCADA type of environments. Alberto Yepes is co-founder and managing director at Trident Capital Cybersecurity, a venture capital firm. Everybody always wants to talk about feature functions. I have the better endpoint. I have the better trap that gives you the inside threat. The two biggest issues that we see in this industry
Starting point is 00:14:48 is number one, there's not enough qualified cybersecurity professionals to deal with the problem. Okay? The threat is real. The criminals, they're well-funded.
Starting point is 00:14:58 They stay sponsored. They're sophisticated. They have access to a lot of things. So in our industry that is trying to safeguard information for business, for individuals and governments, they're not qualified professionals. The second trend that is very important and is very latent even in these conferences, there's so many solutions that don't work with each other.
Starting point is 00:15:19 Everybody is the best endpoint. I'm the best in intrusion detection. I'm the best vulnerability assessment. So the customer ends up having to pay for integrating all that. The cost of integration is very high. And what happens is the large companies can't afford it. The middle market and the smaller businesses, healthcare or mid-market companies cannot afford to do this. So big picture, big issues is not enough professionals to solve the problem. Second is the cost of integration.
Starting point is 00:15:46 So what makes a really good company is a company that creates an integrated solution, a unified solution that brings a number of tools together that can be easily deployed, easily consumed, easily gained value in a matter of minutes, not days, not months, not years to get the value out of that. Bob Ackerman is founder and managing director of Allegis Capital, a seed and early stage venture capital firm. Well, I think you have to be, pragmatically, you have to realize that cyber threats are here. They're a clear and present danger. There's no way to run. There's no place to hide.
Starting point is 00:16:25 So I think companies have to embrace the challenge of how do they secure their business operations, whatever that means. There's a couple things that come to mind for me. You know, number one, the growing importance of encryption. There's been a lot of public discussion about encryption and is encryption a good thing or a bad thing? I will say emphatically it is one of the most effective tools available to industry to reduce the value of data to a adversary who would secure that data. And the thought that we should not have encryption, we should have limitations on encryption, when in fact it's the most effective tool we have for protecting the target of many breaches. The data is totally absurd on the surface.
Starting point is 00:17:09 So once you get past how do you secure the data and the encryption, I think you need to look at how do you gain situational awareness of your infrastructure, and that may be your enterprise, it may be your enterprise and your supply chain. of your infrastructure and that may be your enterprise, it may be your enterprise and your supply chain. Target clearly demonstrated the vulnerability of a large enterprise with state-of-the-art investment in cybersecurity when one of its small supply chain partners was compromised in the HVAC supplier.
Starting point is 00:17:37 So I think one of the things we see a lot of talk about today are organizations grappling with how do they come to understand their situational awareness, their exposure and their risk? So I think that's an area where we're going to see a lot of discussion and a lot of activity in cybersecurity, particularly as cybersecurity moves up to become a board-level conversation, which post-Target it clearly has become. Number three, I guess, would be how do you make the necessary investments in cyber defense technologies, whether that's situational awareness or active defense, with limited budgets and limited
Starting point is 00:18:12 technical resource. So, you know, there's a tremendous amount of thinking that's going into, you know, number one, how do small and medium-sized businesses defend themselves. I think we're going to see a lot of activity around security as a managed service for small and medium-sized businesses. And at enterprises, where they may have the technical expertise and they have the financial resources, they don't have enough bandwidth. And so we're going to see a lot of discussion around what people today, what the conference will be talking about around automation and orchestration, the fact that we need to increase the productivity of our threat intelligence engineers to be able to respond to ever-increasing levels of threat intelligence, accelerated velocity of attacks,
Starting point is 00:18:55 and breadth of attacks. And automation is going to have to play a critical role in how do we respond to those attacks. So what about funding? We asked our two venture capital executives what they look for when investing in cybersecurity companies. Here's Trident Capital's Alberto Yepes. So having been an entrepreneur and on the other side before I came into venture capital, I always say there's a very defined criteria of getting funded. There's five fundamental items that we look at. Number one, we look at the market. Number two, we look at the technology. Number three, we look at the go-to-market strategy. Number four, we look at
Starting point is 00:19:31 the team. And number five, we look at the investor syndicate. So market has to be a growing market. It has to be a large market that is growing. For instance, Symantec is in a large market, but it's not growing, it's shrinking. Therefore, we go after a large market, which may be companies doing mobile security that is expanding, is large and doing. So we look for markets that are large in the opportunity and then growing. Secondly, we talk about the offering, how hard it is to replicate what you do. So intellectual property, at the end of the day, is very key. And the solutions have to be differentiated.
Starting point is 00:20:14 Differentiation is not just comes in the way you create the solution, how you deploy the solution, what problem you're trying to solve, patents that you can defend. And oftentimes, the smaller companies are targets of established companies that they sue them and sometimes takes them out of the market just because anybody can sue anybody in the U.S. But therefore, it has to be highly differentiated and a very high barrier of entry. Number three, go-to-market is perhaps the most critical component of being a successful company because how are you going to deploy the solution?
Starting point is 00:20:43 Are you going to do it by yourself by adding salespeople and creating the customers by themselves? Or do you create an ecosystem of complementary partners that will help you get to a global market? Because the opportunity is not the U.S. market, it's a global market. And so you look for relationships like co-marketing, co-selling, reselling, OEMing, Y-label, where you create and create partners
Starting point is 00:21:08 that instead of you putting a lot of money in your sales or marketing, where you do create a strategic relationship that's going to let you grow. Therefore, but that's the strategy, not only how you price it, how you sell it, but what is the ecosystem you're acquiring for success. The fourth item is the team.
Starting point is 00:21:23 The team, sometimes we expect entrepreneurs not necessarily to know everything and sometimes they're first-time CEOs or first-time entrepreneurs. What we look is the DNA, where they started, the problem set. We were talking earlier in one of the companies we invested. When you understand a problem, set, differentiate it, then the way you solve the problem, like when you give an architect, I'm trying to build something and they build something amazing, what we look for is that DNA of the entrepreneur. They're trying to have complementary skills to create something of value that can be easily consumed in the market.
Starting point is 00:21:56 So it's very important to get the team, not only the CEO, the CTO, the VPO market and VPO. So it's a whole team. But as a good investor, once we invest, we help influence the go-to-market in the team. And the co-investors are important just from, even if they are angel investors or even they are seed investors, they are also people that have domain expertise in the market that validate that and help you make the right decision. So we always determine that the only companies we invest are the companies that have a large market opportunity with a differentiated solution, with a good go-to-market strategy, with the right team and the right ecosystem. So we always look at those
Starting point is 00:22:32 five items. If you cannot align the five, we don't invest. Here's Allegis Capital's Bob Ackerman. We're looking for new paradigms of thinking in terms of how to either secure critical infrastructure or defend against attacks. I think one of the challenges that we face is there's a lot of very interesting, innovative point solutions, particularly in the cybersecurity industry, that while they are important and while they add value, they're not fundable as a standalone company. They fall into the category of being a feature and maybe being a product, but in fact not providing the foundation to build a company. So we're looking for visions of solution that have long-term scalability,
Starting point is 00:23:19 that have the ability to evolve as cyber threats evolve. Those types of ideas turn out to be very, very difficult to find. But if you're looking for venture capital, you know, venture capital needs those size of opportunities to be able to generate the returns that we expect to balance off against the risk. The other thing, quite frankly, we look for are proven teams. And what I mean by that is cybersecurity is an area where the market moves so quick and it's so complex that you can't begin learning about cybersecurity
Starting point is 00:23:52 the day you take in capital. You already have to understand the domain. You understand the dynamics in the marketplace, the threat vectors in the marketplace. So our own investment thesis is heavily focused on former operating executives, you know, proven operators, whether they come out of the intelligence community, whether they come out of industry, who have stood on the wall and have gone toe-to-toe successfully with the bad guys for a number of years. And that's really the starting point that we have when we find a platform that we think is compelling. There's been much talk lately that VC funding for cybersecurity is harder to come by. Bob Ackerman explains.
Starting point is 00:24:29 The broader market for venture capital today has cooled materially over the last nine months. It's not just cybersecurity, but cybersecurity is not excluded from that cooling phenomenon either. Translating that to an entrepreneur, it means it's going to be harder to raise capital, you're going to need more validation or proof points to raise that capital, and it will take longer to raise that capital. And frankly, companies that don't have a clear point of differentiation, you know, with that long-term vision to be able to build value over an extended period of time are going to struggle. So what I would advise entrepreneurs to do is understand how valuable capital is today,
Starting point is 00:25:12 how long it's going to take to raise additional capital, that they're really going to have to prove the value proposition in the marketplace in order to attract outside capital. And, you know, if you're an early stage cybersecurity company, you know, maybe a year ago if you had three customers that would validate the use of your technology, today you better have 10. And it's just a reflection of sort of the broader concerns in the marketplace about where the investment community is in the overall cycle.
Starting point is 00:25:44 And with that concern, people have a natural bias towards being more risk-averse, which means the hurdles that you need to get over in order to secure capital have gone up materially. The threat is real. It's here to stay. As a cybersecurity professional, it's a career that you have a niece, a son, or somebody recommending to go here. It's not just the engineer. It's the analyst. It's a career that if you have a niece, a son, or somebody recommending to go here, it's not just the engineer, it's the analyst, it's the operator, and more importantly, the most successful chief information security officer, chief information risk officer are the ones that can really translate very complex technology problems into business issues.
Starting point is 00:26:18 Borough directors are starving for people that understand the complexities and how to defend, how to invest into this area and the amount of jobs that will exist at a high premium in terms of, you know, I would say because of the scarcity of resources, the salaries in cybersecurity are going up to the roof. So, you know, either take it upon yourself, be more broad, try to understand business
Starting point is 00:26:47 and drive your decisions from the business perspective. Don't get enamored with that technology. Make sure that, you know, you could actually, this is an industry that you can grow in many areas. At the end of the day, it's human factors to make sure that the end of what you build, what you do as a human being is trying to protect that information, trying to keep their privacy, trying to keep their company's information or their government's secrets safe. That's Alberto Yepes from Trident Capital Cybersecurity. Our thanks to all of our experts for taking time from their busy schedules at Black Hat to talk with the Cyber Wire, to our sponsors for making this show possible, and to you
Starting point is 00:27:21 for listening. If you enjoy our show, we hope you'll help spread the word and leave a review or rating on iTunes. It's the easiest way you can help us grow our audience. To subscribe to our daily podcast or news brief, visit thecyberwire.com. The Cyber Wire is produced by Pratt Street Media. Our editor is John Petrick. Social media editor is Jennifer Iben. Technical editor is Chris Russell. Senior editor and Junior Interviewer is Peter Kilby. And I'm Dave Bittner. Thanks for listening. Cyber threats are evolving every second, and staying ahead is more than just a challenge. It's a necessity. That's why we're thrilled to partner with ThreatLocker, a cybersecurity solution trusted by businesses
Starting point is 00:28:10 worldwide. ThreatLocker is a full suite of solutions designed to give you total control, stopping unauthorized applications, securing sensitive data, and ensuring your organization runs smoothly and securely. Visit ThreatLocker.com today to see how a default-deny approach can keep your company safe and compliant.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.