CYBER ATTACKS CASHING IN ON RETAILERS: A WEBINAR ON CYBERSECURITY
|
|
|
- Silas Little
- 10 years ago
- Views:
Transcription
1 CYBER ATTACKS CASHING IN ON RETAILERS: A WEBINAR ON CYBERSECURITY May 21, 2015
2 WELCOME Jim Ambrosini CISSP, CFE, CISA, CRISC, CRMA is a Managing Director with CohnReznick Advisory Group who leads its cybersecurity and IT risk solutions. His team specializes in analyzing technology infrastructure, evaluating processes/applications, developing strategic plans, and deploying secure solutions. Jim has nearly 20 years of diversified experience in IT systems, technology risk management and information security. May 21,
3 CPE INFORMATION Learning Objectives: 1. Understand the evolving cyber risk landscape and its implications to retailers 2. Learn how to get the basics right when building a cyber program 3. Dispel common myths of cyber security and how cyber has become an enterprise-wide issue Questions may be asked by webinar participants through the chat feature. In order to receive CPE credit for this session, participants must answer 75% of polling; however these questions do not need to be answered correctly. Please [email protected] with any questions. May 21,
4 AGENDA Cyber Trends and Landscape Cyber Threats to Retail Hacker Tactics and Approaches Top 5 Cyber Myths Protecting Your Organization May 21,
5 CYBER TRENDS AND LANDSCAPE
6 CHANGING SECURITY THREATS Sophistication of Attack System Tampering Malicious Employee Lone Hacker exploiting system weaknesses Internet Viruses & Malware Government Sponsored Cyber - warfare, Cyber - terrorism & Organized Crime 1970s 1980s 1990s 2000s Present Source of Attack May 21,
7 RECENT CYBERATTACKS BY YEAR May 21,
8 2015 BY THE NUMBERS Source: 2015 Verizon Data Breach Report May 21,
9 TIME TO CONTAIN MALICIOUS ACTIVITY DETECTION TO CONTAINMENT IS 94 DAYS Source: 2014 Trustwave Global Security Report May 21,
10 TODAY S REALITIES 1 in 5 of all organizations have experienced a cyber attack 3 Months is the time an advanced threat goes unnoticed on a victim s network 2.5 Billion exposed records as a result of data breaches in the last 5 years 62% increase in breaches in 2013 From January 2012 to June 2014, 75% of reported data breaches have occurred at small and mid-sized organizations Up to 98% of Fortune 500 companies have been breached Sources: Forbes, Business Insider, ISACA Global Security Analysis & 2014 Verizon Data Breach Report May 21,
11 SECURITY NOT A KEY CONCERN I don t think we re a real target for hackers May 21,
12 WHAT S ALLOWING SECURITY ISSUES TO PERSIST Generally weak security standards Up until recently security was often an afterthought Focus on Perimeter Security Relatively little monitoring detection and prevention at endpoints Ignoring where sensitive data actually resides Security Awareness People are the weakest link of all May 21,
13 PERCEPTION OF RISKS OF CYBER ATTACKS Highest Enterprise Risk of a Cyber Attack Reputation Damage Tangible Financial Loss Contractual Breach Loss of Employee / Company Info. Loss of Intellectual Property Loss of Availability Source: 2014 Global Survey of 1,220 individuals 0% 10% 20% 30% May 21,
14 YOU AIN T SEEN NOTHING YET BREACHES IN 2020 The average cost of a breach will increase to: Source: Juniper Research The Future of Cybercrime & Security: Financial and Corporate Threats and Mitigation A single lost or stolen data record costs, on average: May 21,
15 EVOLVING RETAIL CYBER THREATS
16 HIGH PROFILE RETAIL BREACHES August 2014: Payment data system was breached. Malware installed on cash register system across 2,200 stores syphoned credit card details of up to 56 million customers. Could be largest breach ever recorded affecting all 2,200 stores. Profits down $50M over last quarter and breach will cost them $62M. November 2014: Hackers gain access to Sony network after Wide-ranging hack of potentially every piece of data held by the company, including: unreleased films & scripts, employee social security numbers, salaries and health check results, as well as sensitive internal business documents relating to lay-offs, restructures and executive salaries. The estimated breach cost to Sony is $100M. February 2014: Hackers who raided the credit-card payment system of Neiman Marcus set off alerts on the company s security systems about 60,000 times as they slunk through the network. The hackers moved unnoticed for more than eight months, sometimes tripping hundreds of alerts daily because their card-stealing software was deleted automatically each day from the payment registers. 1.1 Million customers were affected and cost the retailer $4.1 Million in legal fees, investigations, customer communications and credit monitoring subscriptions December 2013: Hackers installed software installed on credit card machines that customers use to swipe magnetic strips on their cards when paying for merchandise at Target stores. As a result 40 million credit cards and 70 million records of personally identifiable information stolen. The current estimate of breach cost to Target is $148M. "Cyber attacks are growing every day in strength and velocity across the globe. It is going to be a continual and likely never-ending battle to stay ahead of it. CEO of a major financial firm May 21,
17 RETAIL CYBER ATTACKS CURRENT STATE May 21,
18 May 21,
19 May 21,
20 May 21,
21 RETAIL SECURITY PERFORMANCE Source: 2014 BitSight Retail Study (300 company security survey) May 21,
22 HACKING TACTICS AND METHODS
23 TACTIC #1 SOCIAL ENGINEERING Hi This is Joe from your Help Desk department, please give me your PC id and password, so I can evaluate the issue in your system. There s no patch for human nature May 21,
24 SIMPLE HACKS TO PERSONAL ACCOUNTS 1. Called Amazon and added a fake CC# to someone s account 2. Called back and claimed to be locked out used CC# they just added to verify account. Amazon issued verbal temporary password. Hackers logged in to get last 4 digits of real CC# 3. Called Apple claiming to have forgotten Apple I-Cloud Password. Apple asked for last 4 digits of CC# as a security check. 4. Locked out user 5. Used accounts for shopping and on-line vandalism Total time span = 45 Minutes May 21,
25 HOW WE HACKED A COMPANY WITH NO TECHICAL SKILLS May 21,
26 TACTIC #2 SMASH & GRAB Goal: Compromise as many systems as possible # HOSTS COMPROMISED Detection Threshold Signature becomes available TIME May 21,
27 HACKING TARGET WITH MALWARE May 21,
28 WHAT HAPPENS WITH STOLEN CREDIT CARDS? Hacker Carder Website Carder Gift Cards / Prepaid Buys Goods Goods delivered to Mule and Shipped Carder resells goods May 21,
29 WHAT IS YOUR HACKED DATA WORTH? CVV 3- digit Bank a/c details Bank a/c details PayPal/eBay account $ Full package of identifying info (name, DOB, etc.) Credit card (old) Health credentials Used to buy drugs or make fake insurance claims lowest Credit Card (fresh) Average Highest Source: informationisbeatutiful.net May 21,
30 TACTIC #3 UNDER THE RADAR Goal: Compromise fewer, highvalue targets avoid detection # HOSTS COMPROMISED Detection Threshold TIME May 21,
31 HOME DEPOT A DIFFERENT TYPE OF HACK Exposed a decade-old Windows XP vulnerability (used at most POS systems). Malware allowed for an exploit known as RAM Scraping. Attack siphoned off CC data and s for 5 Months (April September 2014). 56 Million cards leaked Why didn t Home Depot upgrade POS? Cost of upgrading 2,200 stores is expensive and would have taken months. May 21,
32 TACTIC #4 ADVANCED PERSISTENT THREAT An advanced persistent threat (APT) is a set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specific entity. APT is the new black May 21,
33 HACKING RSA HOW THE WORLD S TOP SECURITY COMPANY WAS BREACHED Part 1: Homework Part 2: Targeted Phishing Scam titled Recruitment Plan 2011 Classified as Spam and ended in Junk folder At least one user found it interesting enough to retrieve it May 21,
34 HACKING RSA HOW THE WORLD S TOP SECURITY COMPANY WAS BREACHED ( C O N T I N U E D ) Part 3: Breaking In Excel spreadsheet with embedded Flash object Exploited Adobe Flash vulnerability (CVE ) access to kernel and installed Poison IVY Remote Access Tool ( RAT ) Poison Ivy set in Reverse Connect mode ( PC reaches out to external machine over Port 80 rather than the other way around.) outbound traffic over dedicated ports are harder to control Part 4: Privilege Escalation: Data is acquired from target servers and exfiltrated Hackers use stolen RSA information to hack Lockheed Martin May 21,
35 TOP 5 CYBERSECURITY MYTHS
36 CYBER MYTH #1 CYBERSECURITY RISK IS OWNED BY THE IT DEPARTMENT CYBER is a board-level/ C-level issue. Questions Boards Should Be Asking: What digital assets do we maintain? What are our main cyber-related risks? Third parties Hackers / espionage Inside threats Etc. What have we done to assess our cyber risks and vulnerabilities? What mechanisms are in place to protect, detect, respond and recover from cyber incidents? Are these methods in line with our risk tolerance? May 21,
37 CYBER MYTH #2 CYBERSECURITY IS A TECHNICAL ISSUE Cybersecurity requires governance Drivers of Security MONITOR Business Environment Threats Compliance Requirements Cybersecurity Processes & Controls DIRECT Security Protocols Infrastructure Computer Settings May 21,
38 CYBER MYTH #3 I NEED A PEN TEST Cybersecurity Hierarchy 04 Security Information & Event Management, Risk Assessments, Identity Management Holistic 03 Log management, Intrusion protection, Monitoring solutions, Pen Test, Wireless, Storage security, DLP Enhancing 02 Anti-spam, security, Remote access/vpn, Encryption Vulnerability Management, Recovery Important 01 Anti-malware / Anti-virus Network Firewalls Patch Management Access Controls Focus on fundamentals first Fundamental May 21,
39 CYBER MYTH #4 CYBER THEFT IS ONLY ABOUT CREDIT CARDS Other data is considered high-value 33% increase of non payment card data from Source 1: 2014 Trustwave Global Security Report May 21,
40 CYBER MYTH #5 THERE IS NO ROI ON SECURITY Security is an enabler Security is an expectation for your customers and employees Security needs to be scaled to the cyber threats affecting your business If you decrease the number and extent of security incidents you will save money May 21,
41 PROTECTING YOUR DATA
42 WHAT WE HAVE SEEN TOP WAYS HACKERS OBTAIN DATA Sensitive data on company intranet / Internet Admin rights on servers Open folders Weak Credentials Insecure Password Storage Unpatched / legacy firewalls and operating systems May 21,
43 HOW TO AVOID BEING THE NEXT TARGET (PUN INTENDED ) Know your information assets Don t boil the ocean with security controls do the basics and do them well: Patch management Good authentication Perimeter security Malware and anti-virus Security awareness and training!!! Don t forget these blocking & tackling IT controls: Backups Periodic vulnerability / security assessments Monitoring Response plan is critical May 21,
44 CLOSING THOUGHT Generals spend too much time preparing for the last war rather than the next one Georges Clemenceau, French Statesman who lead the nation in WWI Don t fight last year s cyber war May 21,
45 VISUAL OF HACKS OVER A TWO HOUR PERIOD Source: Map.norsecorp.com May 21,
46 THANK YOU Jim Ambrosini, CFE, CRMA, CRISC, CISSP, CISA Managing Director and Service Leader, Infrastructure Management and Technology Risk CohnReznick Advisory Group Tel: May 21,
47 CLOSING THOUGHT Generals spend too much time preparing for the last war rather than the next one Georges Clemenceau, French Statesman who lead the nation in WWI Real-time cyber attacks Source: May 21,
APT Advanced Persistent Threat Time to rethink?
APT Advanced Persistent Threat Time to rethink? 23 November 2012 Gergely Tóth Senior Manager, Security & Privacy Agenda APT examples How to get inside? Remote control Once we are inside Conclusion 2 APT
Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited
Practice Good Enterprise Security Management Presented by Laurence CHAN, MTR Corporation Limited About Me Manager Information Security o o o o Policy formulation and governance Incident response Incident
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
CYBERSECURITY: ISSUES AND ISACA S RESPONSE
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures Mobile devices Social media Cloud services
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.
WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There
KEY TRENDS AND DRIVERS OF SECURITY
CYBERSECURITY: ISSUES AND ISACA S RESPONSE Speaker: Renato Burazer, CISA,CISM,CRISC,CGEIT,CISSP KEY TRENDS AND DRIVERS OF SECURITY Consumerization Emerging Trends Continual Regulatory and Compliance Pressures
CKAHU Symposium Cyber-Security
CKAHU Symposium Cyber-Security Scott Logan Technical Director of Security Position: Technical Director of Security Employment: NetGain Technologies (6+ years) NetGain is a Regional partner with 7 locations
Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist
Cyber- Attacks: The New Frontier for Fraudsters Daniel Wanjohi, Technology Security Specialist What is it All about The Cyber Security Agenda ; Protecting computers, networks, programs and data from unintended
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix
Cybercrime myths, challenges and how to protect our business Vladimir Kantchev Managing Partner Service Centrix Agenda Cybercrime today Sources and destinations of the attacks Breach techniques How to
After the Attack. The Transformation of EMC Security Operations
After the Attack The Transformation of EMC Security Operations Thomas Wood Senior Systems Engineer, GSNA CISSP RSA, The Security Division of EMC [email protected] 1 Agenda Review 2011 Attack on RSA
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Incident Response. Proactive Incident Management. Sean Curran Director
Incident Response Proactive Incident Management Sean Curran Director Agenda Incident Response Overview 3 Drivers for Incident Response 5 Incident Response Approach 11 Proactive Incident Response 17 2 2013
Presented by: Mike Morris and Jim Rumph
Presented by: Mike Morris and Jim Rumph Introduction MICHAEL MORRIS, CISA Systems Partner JIM RUMPH, CISA Systems Manager Objectives To understand how layered security assists in securing your network
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit.
CYBERSECURITY: ISSUES AND ISACA S RESPONSE June 2014 BILL S BIO Over 20 years experience in Information Security Management, Risk Management, Third Party Oversight and IT Audit. Vice President Controls
Cybersecurity and internal audit. August 15, 2014
Cybersecurity and internal audit August 15, 2014 arket insights: what we are seeing so far? 60% of organizations see increased risk from using social networking, cloud computing and personal mobile devices
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
The Attacker s Target: The Small Business
Check Point Whitepaper The Attacker s Target: The Small Business Even Small Businesses Need Enterprise-class Security to protect their Network July 2013 Contents Introduction 3 Enterprise-grade Protection
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Enterprise Cybersecurity: Building an Effective Defense
: Building an Effective Defense Chris Williams Scott Donaldson Abdul Aslam 1 About the Presenters Co Authors of Enterprise Cybersecurity: How to Implement a Successful Cyberdefense Program Against Advanced
How To Protect Yourself From A Hacker Attack
Cybersecurity Demystified: Information Technology Security Trends Joe Oleksak, Plante Moran Agenda Data Security Trends Example Attacks Industry Examples An Answer 1 Who Are The Victims? Targets - victims
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
IT Security Risks & Trends
IT Security Risks & Trends Key Threats to All Businesses 1 1 What do the following have in common? Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical contractor Health
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
CYBERSECURITY HOT TOPICS
1 CYBERSECURITY HOT TOPICS Secure Banking Solutions 2 Presenter Chad Knutson VP SBS Institute Senior Information Security Consultant Masters in Information Assurance CISSP, CISA, CRISC www.protectmybank.com
SMALL BUSINESS PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department
Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC
Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper Safeguarding data through increased awareness November 2015 1 Contents Executive Summary 3 Introduction 4 Martime Security 5 Perimeters Breached
Building a Business Case:
Building a Business Case: Cloud-Based Security for Small and Medium-Size Businesses table of contents + Key Business Drivers... 3... 4... 6 A TechTarget White Paper brought to you by Investing in IT security
IBM Security Strategy
IBM Security Strategy Intelligence, Integration and Expertise Kate Scarcella CISSP Security Tiger Team Executive M.S. Information Security IBM Security Systems IBM Security: Delivering intelligence, integration
Understanding the Advanced Threat Landscape an MSPs Guide. IT Security: Enabled
Understanding the Advanced Threat Landscape an MSPs Guide IT Security: Enabled 1.0 Cutting through the APT hype to help your clients prevent, detect and mitigate advanced threats Sophisticated cyber-espionage
EY Cyber Security Hacktics Center of Excellence
EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find
Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only
Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors Microsoft Confidential for internal use only Wall Street Journal, JP Morgan, Lockheed, Bushehr nuclear
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3
GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party
SBA Cybersecurity for Small Businesses. 1.1 Introduction. 1.2 Course Objectives. 1.3 Course Topics
SBA Cybersecurity for Small Businesses 1.1 Introduction Welcome to SBA s online training course: Cybersecurity for Small Businesses. SBA s Office of Entrepreneurship Education provides this self-paced
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales
WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales The Cost of Cybercrime Sony $171m PlayStation 3 data breach (April 2011) $3 trillion
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
SMALL BUSINESS PRESENTATION
STOP.THINK.CONNECT NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION ABOUT STOP.THINK.CONNECT. In 2009, President Obama issued the Cyberspace Policy Review, which tasked the Department
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS. ftrsecure.com
AVOIDING ONLINE THREATS CYBER SECURITY MYTHS, FACTS, TIPS ftrsecure.com Can You Separate Myths From Facts? Many Internet myths still persist that could leave you vulnerable to internet crimes. Check out
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Security and Privacy
Security and Privacy Matthew McCormack, CISSP, CSSLP CTO, Global Public Sector, RSA The Security Division of EMC 1 BILLIONS OF USERS MILLIONS/BILLIONS OF APPS 2010 Cloud Big Data Social Mobile Devices
Unknown threats in Sweden. Study publication August 27, 2014
Unknown threats in Sweden Study publication August 27, 2014 Executive summary To many international organisations today, cyber attacks are no longer a matter of if but when. Recent cyber breaches at large
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
That Point of Sale is a PoS
SESSION ID: HTA-W02 That Point of Sale is a PoS Charles Henderson Vice President Managed Security Testing Trustwave @angus_tx David Byrne Senior Security Associate Bishop Fox Agenda POS Architecture Breach
Is Your IT Environment Secure? November 18, 2015. Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting
Is Your IT Environment Secure? November 18, 2015 Sarah Ackerman, Greg Bernard, Brian Matteson Clark Schaefer Consulting Clark Schaefer Consulting Serving elite and emerging companies with practical solutions
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Getting real about cyber threats: where are you headed?
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
New PCI Standards Enhance Security of Cardholder Data
December 2013 New PCI Standards Enhance Security of Cardholder Data By Angela K. Hipsher, CISA, QSA, Jeff A. Palgon, CPA, CISSP, QSA, and Craig D. Sullivan, CPA, CISA, QSA Payment cards a favorite target
Enterprise Cybersecurity: Building an Effective Defense
Enterprise Cybersecurity: Building an Effective Defense Chris Williams Oct 29, 2015 14 Leidos 0224 1135 About the Presenter Chris Williams is an Enterprise Cybersecurity Architect at Leidos, Inc. He has
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group Presented by: Michael Flavin and Stan Stahl Saalex Information Technology Overview Saalex Information
SECURING YOUR SMALL BUSINESS. Principles of information security and risk management
SECURING YOUR SMALL BUSINESS Principles of information security and risk management The challenge Information is one of the most valuable assets of any organization public or private, large or small and
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,
Is the PCI Data Security Standard Enough?
Is the PCI Data Security Standard Enough? By: Christina M. Freeman ICTN 6870 Advanced Network Security Abstract: This paper will present the researched facts on Payment Card Industry Data Security Standard
Anti-exploit tools: The next wave of enterprise security
Anti-exploit tools: The next wave of enterprise security Intro From malware and ransomware to increasingly common state-sponsored attacks, organizations across industries are struggling to stay ahead of
An New Approach to Security. Chris Ellis McAfee Senior System Engineer [email protected]
An New Approach to Security Chris Ellis McAfee Senior System Engineer [email protected] Advanced Targeted Attack Challenges Criminal Theft Sabotage Espionage After the Fact Expensive Public Uncertainty
Designing & Building an Information Security Program. To protect our critical assets
Designing & Building an Information Security Program To protect our critical assets Larry Wilson Version 1.0 March, 2014 Instructor Biography Larry Wilson is responsible for developing, implementing and
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED
The FBI Cyber Program Bauer Advising Symposium October 11, 2012 Today s Agenda What is the threat? Who are the adversaries? How are they attacking you? What can the FBI do to help? What can you do to stop
