Q1. What do enterprise organizations need to understand about the threat posed by nation-state adversaries? What were the main takeaways for them from CrowdStrike's Global Threat Report earlier this year?
Nation-state adversaries were continuously active throughout 2018. Their activities were directed at a wide range of different target groups, including dissidents, regional adversaries and foreign powers, as well as private enterprises, with the intent to collect intelligence for decision-makers. Key examples from CrowdStrike's 2019 Global Threat Report include:
- North Korea remained active in both intelligence collection and currency-generation schemes, despite participating in diplomatic outreach with the U.S. and other countries.
- Iran maintained focus on operations against other Middle Eastern and North African (MENA) countries, particularly regional foes across the Gulf Cooperation Council (GCC). Additionally, it is suspected that Iranian adversaries are developing new mobile malware capabilities to target dissidents and minority ethnic groups.
- As for China, CrowdStrike observed a significant rise in U.S. targeting likely tied to increased tensions between the two countries.
- Russian adversaries were active across the globe in a variety of intelligence collection and information operations.
While most private sector organizations expect not to be targeted by a nation-state adversary, we see it happen with increasing regularity. There was a time when, as long as you weren't a bank or a defense contractor, you could probably consider yourself off the radar of nation-state adversaries. Today we see nation states targeting a wider range of industries, including a focus on telecom and hospitality in 2018. These are industries that hold a wealth of information and control over people and their activities in both the physical and cyber world, and this has a great deal of value to certain nation-state adversaries. Based on our broad, global view of the threat landscape, we see no signs that the risk associated with nation-state actors will abate any time soon.
Q2. Can there ever be such a thing as effective cyber deterrence at the national level? Is there even a use case for such a plan?
We have seen some real attempts to curb nation-state cyber attacks in recent years, both through bilateral agreements between countries (such as the 2015 agreement between the U.S. and China) as well as high-profile indictments against individuals linked to named, state-sponsored adversaries. Neither of these have had a lasting impact. In diplomatic channels and the media, several nation-states gave lip service to curbing their clandestine cyber activities, but behind the scenes, they doubled down on their cyberespionage operations — combining those efforts with further forays into destructive attacks and financially motivated fraud.
In the case of the U.S.-China agreement, attacks on U.S. industry for the purposes of intellectual property theft decreased significantly for a time, but have increased again in 2018, likely due to increased political tensions between the two countries. In the case of indictments, these public disclosures and stepped-up law enforcement activity drove ongoing tool development and changes in tactics, techniques and procedures, making 2018 a transition year for many adversaries. One thing was clear: Law enforcement efforts have not yet halted or deterred nation-state sponsored activities.
While we naturally hope for peace, we live in the here and now. Defenders need to remain vigilant in our defense against these increasingly bold and sophisticated threats.
Q3. What do you want those attending Black Hat USA 2019 to know about cloud delivered endpoint security? What have some of the significant developments been in this space over the last year?
The emergence of the cloud completely changes the game for endpoint security, and for the first time shows the promise of tilting the scales back in the favor of the defender, by delivering better protection, better performance, and better value.
The cloud delivers access to essentially unlimited resources for compute and storage, which means we can index, contextualize, and analyze data at a scale that was previously unthinkable. This unlocks the true potential of protection techniques such as machine learning, behavioral analytics and integrated threat intelligence. It is also fundamentally changes how you work with and what you should expect from your security vendor and the broader community. The cloud provides a common, consolidated platform where your endpoint protection provider becomes more than just a technology vendor; done properly, they become an extension of your team.
At the same time, offering a single lightweight agent and a single cloud-native platform offloads significant work from the endpoint and simultaneously eliminates the need for on-premise infrastructure. This greatly reduces the footprint of endpoint security in organizations of all sizes. It drives massive performance improvements at the endpoint when compared to legacy solutions and it allows organizations to deploy instantly and scale rapidly. It helps keep end users more productive, and saves enormous costs in the data center.
Once you have established a robust and scalable security cloud, you have a solid foundation that can be refined and extended to cover an infinite range of security use cases. At CrowdStrike we are focused on ensuring our customers have the broadest possible protection (including traditional endpoints as well as mobile devices) and the most efficient security workflows. We also recognize the importance of openness and extensibility of a platform, which lead to the recent introduction of the CrowdStrike Store.
The CrowdStrike Store provides a marketplace for a broad range of third-party solutions, which customers are free to explore without sacrificing endpoint performance and operational simplicity of our cloud-native platform.
Our industry is only now beginning to tap the value of cloud-native endpoint security. A scalable and extensible cloud platform, delivered in combination with world-class security expertise and threat intelligence, enables defenders to take control back from our adversaries and, ultimately, is the key to stopping breaches.