Q1. Steve, McAfee has recently talked about the need for more 'human-machine teaming'. What exactly is that and how is it transforming security operations?
In cybersecurity, as long as we have a shortage of human talent, we must rely on technologies such as artificial intelligence, machine learning and deep learning to amplify the capabilities of the humans we have. Furthermore, as long as there are human adversaries behind cybercrime and cyber warfare, there will always be a critical need for human intellect teamed with technology.
"Human-machine teaming" recognizes that humans are good at doing certain things and machines are good at doing certain things. Machines are good at processing massive quantities of data and performing operations that inherently require scale. Humans have strategic intellect, so they can understand the theory about how an attack might play out even if it has never been seen before. The best outcomes will come from combining them.
Cybersecurity is very different from other fields that utilize big data, analytics, and machine learning, because there is an adversary trying to reverse-engineer your models and evade your capabilities. Security technologies such as spam filters, virus scans and sandboxing are still part of protection platforms, but their industry buzz has cooled since criminals began working to evade their technology. Human IT security staff on the front lines of an attack can anticipate new evasion techniques, exploits and other tactics in ways detection models based on the past cannot.
A major area where we see human-machine teaming playing out is attack reconstruction, where technology assesses what has happened inside your environment, then engages a human to work on the scenario.
Efforts to orchestrate security incident responses can benefit tremendously when a complex set of actions is required to remediate a cyber incident. Some of those actions might have very severe consequences to networks. Having a human in the loop not only helps guide the orchestration steps, but also assesses whether the required actions are appropriate for the level of risk involved.
In threat intelligence analysis, attack reconstruction and incident response orchestration, human-machine teaming can take the machine assessment of new information and layers upon it the human intellect that only a human can bring. Doing so can take us to better outcomes in all aspects of cybersecurity. Now more than ever, better outcomes are everything in cybersecurity.
Q2. Raj, what emerging cyber threats scare you the most and why? How is McAfee evolving its strategy to deal with these threats?
Scare me? I don't know if I would use those specific words, there are a number of threats that I find particularly challenging.
One in particular was seen in the attack on the Winter Olympics when the malicious actors used steganography as a means to hide malicious content. What was remarkable is that the tool used had only been released eight days earlier and demonstrated innovation by modifying the campaign in flight. Another example we published about was the use of DDE when the issue was only identified 2 weeks earlier.
It shows that threat actors are getting better, faster and simply put successful as a result of this rapid innovation.
Does it scare me? Nope, bring it on.
Q3. Steve, what do you see as some of the most critical gaps in enterprise security operations centers these days? What are some approaches for addressing them?
I see two major gaps we should focus quite a bit of attention on. The first is a bit broader and it is the comprehension of new security risks brought about by how companies operate in the cloud. People assume that the cloud is safe, and by moving to the cloud and offloading a bulk of the work that their job—as a security professional—is done. As we've already seen in some of these major attacks on misconfigured S3 buckets, this is clearly not the case. Just because you are off loading a bulk of the work doesn't mean you don't have a responsibility as a security professional. The cloud protections are out there, CASBs are a great starting point for security. I would advise SOCs to continue to take a data first approach, and truly understand where their companies' critical data is residing – whether in cloud, on premise, or a combination of the two.
The second area of concern to me is this concept of adversarial machine learning—essentially bad actors using machine learning and artificial intelligence against us. Bad actors have access to technology just as easily as we do. If you use a simple example like phishing, you can use machine learning to really amplify an attack. Think about the differences in generic phishing and spear phishing. In the prior, you send thousands of messages that all look the same hoping to get a few people to click along the way. Little effort on the bad actors' end, but typically the return is very low. In spear phishing the bad actor spends quite a bit more time focused on a well-crafted and targeted campaign, but it doesn't scale. You can only have a handful of targets. Your conversion rate is much higher, but the targeted population you can go after is much smaller. When you apply a technology like machine learning to this, bad actors can now hit a higher scale with targeted messages. For great technologies like ML and AI, we need to also be weary of how bad actors will use and also circumvent these tools. ML evasion is happening now.
Q4. Raj, What are McAfee's plans at Black Hat USA 2018? What do you want attendees to take away from McAfee's presence at the event?
McAfee's Advanced Threat Research team will be showcasing our latest discoveries and revelations across the threat landscape, including the many clues groups such as Lazarus and Hidden Dragon have left behind through campaigns such as Ghost Secret, Gold Dragon, HaoBao and others. These "puzzle pieces" can be put together to illustrate the connections between the many attacks attributed to nation-states and categorize different tools used by specific teams of their cyber armies. We're prepared to show what we have learned, and how to turn these insights into tools for pro-active threat detection and protection versus these and other groups.