Third Annual BitSight Insights Industry Benchmark Report
|
|
|
- Kristina Day
- 10 years ago
- Views:
Transcription
1 Third Annual BitSight Insights Industry Benchmark Report Are Energy and Utilities at Risk of a Major Breach? September 2015
2 Introduction Major breaches have affected companies and organizations across all sectors of the US economy from retail to healthcare, finance and government. As security leaders search for key performance indicators, industry metrics can serve as important benchmarks for understanding the performance of an organization and its portfolio of vendors. Recognizing the growing importance of understanding cyber security posture, BitSight is publishing the Third Annual Industry Benchmarking Report. In this report, BitSight analyzed the security performance of six key industry sectors: Finance, Federal Government, Retail, Energy/Utilities, Healthcare and Education. These industries hold diverse types of data that are sensitive and valuable - especially to attackers. BitSight uses its proprietary Security Ratings algorithm, which takes into account diverse security metrics on events, diligence and user behaviors in order to derive aggregate industry metrics. Risk management leaders and security practitioners can leverage the industry level data provided in this report for various initiatives including: Assessment of vendors in relation to industry averages Benchmarking an organization against industry averages and peers Cyber underwriting decision making Mergers and acquisitions due diligence Portfolio management Security Rating BitSight Security Ratings by Industry Finance Federal Government Retail Energy/Utilities Healthcare Education 500 Aug 2014 Oct 2014 Dec 2014 Feb 2015 Apr 2015 Jun 2015 Aug 2015 Figure 1 1
3 Key Findings 1. Energy and Utilities are performing lower than the Retail sector and in-line with poorly performing Healthcare. The Energy and Utilities industry is performing near the Healthcare industry when it comes to securing their networks against cyber attacks. In last year s industry report titled Will Healthcare Be The Next Retail? BitSight highlighted some troubling trends among healthcare companies such as an increase in the number of infections observed. Over the past year, BitSight researchers have noticed a dip in the performance of Energy and Utility companies from 653 to 652. As this industry connects previously isolated control systems to the internet it becomes increasingly important that a focus on operational technology (OT) does not overshadow the importance of information technology (IT) related threats such as a malware infection that could shut down the power grid. 2. Companies across all industries are still vulnerable to major SSL vulnerabilities 1. Companies in every industry sector are vulnerable to major SSL vulnerabilities such as Heartbleed, POODLE and FREAK. Given the widespread publicity surrounding some of these vulnerabilities, it is surprising that companies have servers running outdated and vulnerable versions of OpenSSL. While companies across all industries have mostly updated their servers to protect against Heartbleed, many companies have failed to act when it comes to POODLE and FREAK. For FREAK, industry vulnerability runs from 30% in Finance to 75% in Education. POODLE results are even more astounding: not one industry has more than 69% of companies protected. These SSL vulnerabilities can provide attackers with the ability to perform man in the middle attacks and extract sensitive information or gain private keys. 3. The Federal Government - currently in the spotlight in the wake of the Office of Personnel Management mega breach - is the second highest performing sector, second only to Finance. In July of this year, the New York Times broke news that a major cyber security breach had affected the Office of Personnel Management (OPM). The OPM breach, purportedly undertaken by Chinese hackers, compromised the records of 25.7 million records of current, former and prospective government employees and contractors 2. Since this time, there have been consistent calls from lawmakers and Washington pundits for the government to get its cyber house in order. Nevertheless, our analysis of 119 different government entities shows that many of these agencies are performing well as a sector when it comes to overall security performance. 4. Finance continues to be the top performing sector and Education the lowest. Finance has consistently been the top performing industry in BitSight s industry benchmarking reports. BitSight attributes this consistent performance with a culture of awareness of cyber security issues, a mature regulatory landscape and adequate resources committed to protecting corporate networks. On the other end of the industry spectrum, educational institutions - and higher education in particular - are trailing other industries when it comes to protecting their networks. While educational institutions have unique network challenges to overcome, they are also becoming prime targets for the important intellectual property that they hold. This fact was recently highlighted by the recent intrusion of the University of Virginia s network by Chinese hackers 3. 2
4 SSL Vulnerabilities by Industry Sector Heartbleed 25 Organizations Running Services Vulnerable to Heartbleed by Industry Industry Percent 20 Finance 2.6% Percent Government 7.6% Retail 5.6% 5 Energy/Utilities 5.2% 0 Figure 2 Finance Federal Government Retail Industry Sector Energy/Utilities Healthcare Education Healthcare 4.4% Education 23.2% FREAK Industry Percent 100 Organizations Running Services Vulnerable to FREAK by Industry Finance 30.4% 80 Government 50.4% Retail 37.1% Percent Energy/Utilities 40.5% 20 Healthcare 43.4% Education 75.6% 0 Figure 3 Finance Federal Government Retail Industry Sector Energy/Utilities Healthcare Education POODLE Percent Organizations Running Services Vulnerable to POODLE by Industry Industry Percent Finance 69% Government 79% Retail 72.2% Energy/Utilities 74.8% Healthcare 73.5% 0 Figure 4 Finance Federal Government Retail Industry Sector Energy/Utilities Healthcare Education Education 90.7% 3
5 Finance Finance remains the top performing industry within our analysis. The industry s Security Rating was 716, which is inline with their rating of 712 a year earlier. When it comes to SSL vulnerabilities, this industry was also the top performer with only 2.6% vulnerable to Heartbleed. Nevertheless, 3 out of every 10 (30%) organizations were still vulnerable to FREAK and 7 out of 10 (69%) were vulnerable to POODLE. While this is better than other industry sectors, it still highlights an area for improvement for the industry. Density of Organizations Figure BitSight Rating BitSight has consistently rated the Finance industry as a top performer. Financial institutions often make substantial investments to combat threats, with PwC noting that banks are planning on spending about $2 billion more in cyber security over the next two years 4. In addition, banks and other financial institutions are faced with multiple regulations relating to cyber security promoting a risk aware culture. Another key to financial services success is a focus on mitigating threats posed by third party vendors. Financial services companies often have mature VRM programs that incorporate continuous monitoring of their vendor ecosystems and consistent audits of vendors 5. In addition, organizations such as the Financial Services Information Sharing and Analysis Center (FS-ISAC), a key information exchange of threats to banks and financial services companies, have begun efforts to implement information exchanges in other industries that are critically important within the financial services vendor ecosystem. FS-ISAC has been instrumental in promoting information sharing through the establishment of a Legal ISAC 6 and a Retail ISAC 7. 4
6 Federal Government While we have always tracked the security performance of government bodies, which include local, state, federal and international entities, we have not pulled out US federal government entities as a specific subsector. Thus, in light of the massive breach affecting the Office of Personnel Management, Bit- Sight decided to include a category within this year s industry benchmarking report. This industry grouping consists of 119 federal government entities which focus on diverse disciplines, including healthcare, education, defense, diplomacy, budget, and more. Since the OPM breach there have been loud cries from legislators, analysts and others that Washington needs to get its cyber defenses in order. A recent report by the Institute for Critical Infrastructure Technology noted that the this breach showed the failings of the ill-equipped personnel, antiquated cyber security infrastructure, and abysmal security practices at the United States Office of Personnel Management. This report goes on to criticize a culture of awarding contracts to the lowest bidder for security work and a lack of vendor oversight - highlighted by the breaches of USIS and Keypoint, two government contractors with access to sensitive information 8. Density of Organizations Figure BitSight Rating Although the OPM breach included massive data loss, BitSight data suggests that many agencies are performing well as a sector in defending, detecting and recovering from network threats. The industry s Security Rating is the second highest at 688. Last year the industry s rating was 684. One area of concern is that they are the second worst industry when it comes to protecting against major SSL vulnerabilities. BitSight analysis shows that many agencies were still vulnerable to Heartbleed (7.6%), Freak (50.4%) and Poodle (79%). 5
7 Retail Many within the information security community dubbed 2014 the year of the retail breach. From Michaels to Neiman Marcus, major American retailers were affected by large scale data breaches affecting millions of customers 9. Studies have indicated that major breaches in the industry have shifted consumer attitudes toward using cash over plastic 10. This is not good for business: consumers tend to spend more money when using debit and credit cards 11. In addition, loyalty programs and business branded credit cards are important sales channels for major retailers and provide important demographic information. Density of Organizations Figure BitSight Rating Responding to these challenges, 56% of retailers are actively investing more in their cyber security efforts according to BDO s Retail Compass Survey of CFOs 12. There has also been an industry-wide push toward the adoption of EMV chip technology in store branded credit cards. Another positive improvement has been the inception of the R-ISC platform. This information sharing platform, supported by FS- ISAC, gives retailers access to information on emerging threats from peers, law enforcement and other reliable sources 13. BitSight s analysis of the retail sector shows the industry s mean Security Rating was 684, putting it slightly below the federal government s rating. The sector saw slight improvement over the course of the year from last year s 674. Although, similar to all industries included in the report, the retail sector needs to ensure that it fully remediates SSL vulnerabilities. Currently, 5.6% of companies are vulnerable to Heartbleed, 37.1% are vulnerable to Freak and 72.2% are vulnerable to Poodle. 6
8 Energy and Utilities There has been growing concern over the cyber security posture of Utility and Energy companies as more control systems are brought online. Various articles point to high stake losses related to a breach against Energy and Utility companies. Large insurer Lloyd s, in conjunction with researchers at the University of Cambridge, estimated potential losses from a cyber crime-induced blackout could hit $1 trillion 14. The government has been diligently tracking attacks against the Energy industry. The government s Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) releases reports on cyber incidents affecting the country s critical infrastructure 15. Interestingly, in 2014, the Energy sector was the most targeted sub-sector of the nation s critical infrastructure with 32% of incidents reported. The ICS-CERT Monitor also noted, Of the total number of incidents reported to ICS-CERT, roughly 55 percent involved advanced persistent threats (APT) or sophisticated actors. Other actor types included hacktivists, insider threats, and criminals. Density of Organizations Figure BitSight Rating While many focus on worst-case scenarios, there are important challenges ahead for Energy and Utility companies. As operational technologies (systems that control the power grid, gas gauges, etc) become internet-enabled, these organizations must understand and anticipate information technology (IT) risks. The Congressional Research Service recently published a report that stated, Modernization of many systems also has resulted in connections to the Internet. While these advances will improve the efficiency and performance of the grid, they will increase its vulnerability to potential cyberattacks 16. So what does this mean for Energy and Utility companies? SANS recently published a report on IT/OT convergence and explained: For example, building automation systems, rife with networked monitoring, control and reporting devices can be interrupted either by attacking the devices individually or disrupting the network itself, and automated pharmaceutical production can be halted by events as simple to implement as buffer overflow or denial of service attacks 17. BitSight data provides empirical evidence to support the notion that there are challenges among Energy and Utility companies when it comes to securing their networks. The industry rating on August 1, 2015 was 652 which is relatively unchanged from last year s 653 but falls well below the retail sector. As we have noted within the other industry sectors, Energy and Utility companies need to shore up their servers to protect against SSL vulnerabilities. Companies in this sector are still vulnerable to Heartbleed (5.2%), Freak (40.5%) and Poodle (74.8%).. 7
9 Healthcare As highlighted in our previous BitSight Insights report, the healthcare sector continues to lag behind other sectors as the second worst industry performer. Within the past year, major breaches have affected healthcare providers and insurers both of which have access to sensitive personally identifiable information (PII). These records are incredibly valuable on the black market. A recent story from NPR found an undisclosed website where a value pack of 10 Medicare numbers was for sale. The price? It costs 22 bitcoin about $4,700 according to today s exchange rate 18. Density of Organizations Figure BitSight Rating While HIPAA regulations attempt to ensure patient privacy and security of medical records, certain studies indicate a rise in incidents. A comprehensive study in the Journal of the American Medical Association analyzed the Department of Health and Human Services database on HIPAA disclosures of the loss of protected health information affecting at least 500 individuals from The study found that there were 949 data breaches during the time period, with 29 million records affected. BitSight has continued to see stagnant performance across the industry as a whole. The Security Rating is practically unchanged at 634 (last year it was 630). The industry had the second lowest percentage of companies vulnerable to Heartbleed at 4.4%. Yet a high percentage of companies remain vulnerable to Freak (43.4%) and Poodle (73.5%). 8
10 Education BitSight continues to see Education as the lowest performing industry sector. This continued lag in performance echoes the sentiments of a previous BitSight Insights report that focused on the security posture of college athletic conferences 20. BitSight found that colleges and universities have challenging network requirements, such as BYOD networks and multiple access points. Interestingly, that report found that universities that made proactive strategic investments in cyber security - such as hiring a dedicated CISO - far outperformed the industry average. Density of Organizations Figure BitSight Rating While universities continue to have unique network requirements and specific challenges to securing their networks, it is important to recognize the high-value information that these institutions hold. America s colleges and universities produce cutting edge research in technology and the sciences that can be leveraged for commercial gain. Within the past year there have been targeted attacks, some of which have been attributed to Chinese hackers, against major research universities such as the University of Connecticut 21 and Penn State 22. The industry s rating as of August 1 was a low 554, compared to 551 as of last year. This is the second year in a row that we have observed a drop in the industry s rating during the months of the school year. While we cannot definitively say why there is a drop during these months, it is likely that as more students and devices enter a university or school s network BitSight observes more infections emanating from that network. When it comes to the remediation of SSL vulnerabilities, the Education sector is also the lowest performing industry with a large percentage of organizations still vulnerable to Heartbleed (23.2%), Freak (75.9%) and Poodle (90.7%). 9
11 Conclusion As businesses invest more time and resources into addressing cyber security concerns, the findings of this report are relevant to the decision making processes. For security practitioners, these metrics can inform security benchmarking initiatives that answer a crucial question: How are we doing compared to industry peers? In addition, vendor risk teams and cyber insurance underwriters can look at third parties or applicants in relation to industry performance metrics. This insight can inform whether a company is willing to share sensitive data with a third party vendor or affect how a cyber insurance underwriter prices the risk of an insurance applicant. Businesses involved in mergers and acquisitions or portfolio management can look at potential and current investments to gauge whether to invest in a company or whether to set performance guidelines. As cyber security enters the boardroom, industry level benchmarks serve as a key talking point and performance indicator for many businesses. Using this data in conjunction with continuous ratings and metrics on the health of a company s security posture --and the posture of its vendors-- allows organizations to build a risk aware security program that mitigates threats as they appear. ABOUT BITSIGHT TECHNOLOGIES BitSight Technologies is a private company based in Cambridge, MA. Founded in 2011, BitSight Technologies provides businesses with daily security ratings that objectively measure a company s security performance to transform the way they manage risk. For more information contact us at: BitSight Technologies 125 CambridgePark Drive Suite 204 Cambridge, MA [email protected] 10
12 Study Overview and Methodology To perform this industry analysis, BitSight sampled the daily mean Security Ratings for each of six industry sectors from August 1, 2014 to August 1, 2015, which includes 9, 708 companies. BitSight also extracted industry level data on specific security metrics that are factored into the rating, such as distribution of ratings and SSL vulnerability data related to Heartbleed, POODLE and FREAK. BitSight Security Ratings range between 250 and 900, with higher ratings indicating better performance. These ratings are calculated using terabytes of data, including nearly 4 years of historical information, on risk vectors using a proprietary algorithm. Risk vectors include security events, which are observed compromises on a company s network, and diligence risk vectors, which show steps a company has taken to prevent attacks. For each risk vector, an overall letter grade (A-F) is assigned, indicating the company s performance relative to others. The grade takes into account factors such as frequency, severity, and duration (for events) as well as record quality, evaluated based on industry-standard criteria (for diligence). Using both automated and hand-curated tools and processes, BitSight creates comprehensive network maps of a company s Internet footprint. These maps allow BitSight to determine the organizational origin of compromised devices belonging to tens of thousands of companies across the globe. 11
13 References and Citations 1. For more information on SSL vulnerabilities: Heartbleed: FREAK: POODLE: 2. Information about OPM Cybersecurity Incidents. (n.d.) Retrieved August 1, Bo Williams, K. (2015, August 21) University of Virginia hack targeted employees with China ties. The Hill. Retrieved from: 4. Huang, D., Glazer, E., & Yadron, D. (2015, November 17). Financial Firms Bolster Cybersecurity Budgets. Wall Street Journal. Retrieved September 1, 2015, from 5. Learn more on the BitSight blog: 6. Simmons, C., & Gluckman, N. (2015, March 4). Law Firms to Form Cybersecurity Alliance. The American Lawyer. Retrieved September 20, 2015, from 7. Retail-ISAC launches Cyber Sharing Portal Supported by FS-ISAC. (2015, March 24). PR Newswire. Retrieved from Handing Over the Keys to the Castle: OPM Demonstrated that Antiquated Security Practices Harm National Security. (2015, July 1). Institute for Critical Infrastructure Technology. 9. Jackson Higgins, K. (2014, November 11). The Year of the Retailer Data Breach. Dark Reading Wilson, T. (2014, July 7). Retail Breaches Change Customer Behavior, Attitudes, Studies Say. Dark Reading Konsko, L. (2014, July 8). Credit Cards Make You Spend More: Study. Nerdwallet Retailers Offer Bright 2015 Outlook Rife with M&A Activity (2015 April) BDO Website. Retrieved from: For more information of R-CISC: Bergen, M. (2015, July 8). Cost of a Potential Blackout From Cyber Crime: $1 Trillion. Re/code ICS-CERT Monitor (September February 2015) Retrieved from (PDF): Campbell, R. (2014 June 10) Cybersecurity Issues for the Bulk Power System. Congressional Research Service. Retrieved from: (PDF) 17. Harp, D. & Gregory-Brown, B. (n.d.) IT/OT Convergence: Bridging the Divide. SANS. Retrieved from: Shahani, A. (2015 February 13) The Black Market For Stolen Health Care Data. NPR All Things Considered. Retrieved from: Liu V, Musen M. & Chou T. (2015 April 14) Data Breaches of Protected Health Information in the United States. Retrieved from (paywall): BitSight published a comprehensive education benchmarking report in August Learn more here: Weizel, R. (2015 July 31) University of Connecticut says hit by hackers from China. Reuters. Retrieved from: Hesseldahl, A. (2015 May 15) Penn State Engineering School Cuts Off Internet After Hacking Attacks. Re/code. Retrieved from: 12
BitSight Insights Global View. Revealing Security Performance Metrics Across Major World Economies
BitSight Insights Global View Revealing Security Performance Metrics Across Major World Economies Introduction There is no denying the global nature of 21st century business. The export and import of goods
Powerhouses and Benchwarmers
Insights Powerhouses and Benchwarmers Assessing the Cyber Security Performance of Collegiate Athletic Conferences BitSight Technologies August 2014 Insights Assessing the Cyber Security Performance of
Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability
A Custom Technology Adoption Profile Commissioned By BitSight Technologies Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability Introduction As concerns around
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS
CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS PREPARING FOR ADVANCED CYBER THREATS Cyber attacks are evolving faster than organizations
Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Utilizing Security Ratings for Enterprise IT Risk Mitigation Date: June 2014 Author: Jon Oltsik, Senior Principal Analyst Abstract: What do large enterprises need in order to address increasingly
Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape
White Paper Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape Financial services organizations have a unique relationship with technology: electronic data and transactions
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
HEALTH CARE AND CYBER SECURITY:
HEALTH CARE AND CYBER SECURITY: Increasing Threats Require Increased Capabilities kpmg.com 1 HEALTH CARE AND CYBER SECURITY EXECUTIVE SUMMARY Four-fifths of executives at healthcare providers and payers
Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats
Cyber4sight TM Threat Intelligence Services Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats Preparing for Advanced Cyber Threats Cyber attacks are evolving faster than organizations
Managing cyber risks with insurance
www.pwc.com.tr/cybersecurity Managing cyber risks with insurance Key factors to consider when evaluating how cyber insurance can enhance your security program June 2014 Managing cyber risks to sensitive
EY Cyber Security Hacktics Center of Excellence
EY Cyber Security Hacktics Center of Excellence The Cyber Crime Underground Page 2 The Darknet Page 3 What can we find there? Hit men Page 4 What can we find there? Drug dealers Page 5 What can we find
www.pwc.com Cybersecurity and Privacy Hot Topics 2015
www.pwc.com Cybersecurity and Privacy Hot Topics 2015 Table of Contents Cybersecurity and Privacy Incidents are on the rise Executives and Boards are focused on Emerging Risks Banking & Capital Markets
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016
CIP Supply Chain Risk Management (RM15 14 000) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016 My name is Jacob Olcott and I am pleased to share some observations on
10 Smart Ideas for. Keeping Data Safe. From Hackers
0100101001001010010001010010101001010101001000000100101001010101010010101010010100 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000 0100101001001010010001010010101001010101001000000100101001010101010010101010010100000
SOLUTION BRIEF. Next Generation APT Defense for Healthcare
SOLUTION BRIEF Next Generation APT Defense for Healthcare Overview Next Generation APT Defense for Healthcare Healthcare records with patients personally identifiable information (PII) combined with their
January IIA / ISACA Joint Meeting Pre-meeting. Cybersecurity Update for Internal Auditors. Matt Wilson, PwC Risk Assurance Director
January IIA / ISACA Joint Meeting Pre-meeting Cybersecurity Update for Internal Auditors Matt Wilson, Risk Assurance Director Introduction and agenda Themes from The Global State of Information Security
RETHINKING CYBER SECURITY Changing the Business Conversation
RETHINKING CYBER SECURITY Changing the Business Conversation October 2015 Introduction: Diane Smith Michigan Delegate Higher Education Conference Speaker Board Member 2 1 1. Historical Review Agenda 2.
A Case for Managed Security
A Case for Managed Security By Christopher Harper Managing Director, Security Superior Managed IT & Security Services 1. INTRODUCTION Most firms believe security breaches happen because of one key malfunction
CyberArk Privileged Threat Analytics. Solution Brief
CyberArk Privileged Threat Analytics Solution Brief Table of Contents The New Security Battleground: Inside Your Network...3 Privileged Account Security...3 CyberArk Privileged Threat Analytics : Detect
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v8 2-25-14
www.pwc.com The data breach lifecycle: From prevention to response IAPP global privacy summit (4:30-5:30) Draft v8 2-25-14 Common Myths 1. You have not been hacked. 2. Cyber security is about keeping the
Cybersecurity: What CFO s Need to Know
Cybersecurity: What CFO s Need to Know William J. Nowik, CISA, CISSP, QSA PCIP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2014 Wolf & Company, P.C. Today s Agenda Introduction
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
CYBER SECURITY INFORMATION SHARING & COLLABORATION
Corporate Information Security CYBER SECURITY INFORMATION SHARING & COLLABORATION David N. Saul Senior Vice President & Chief Scientist 28 June 2013 Discussion Flow The Evolving Threat Environment Drivers
Statement for the Record. Richard Bejtlich. Chief Security Strategist. FireEye, Inc. Before the. U.S. House of Representatives
Statement for the Record Richard Bejtlich Chief Security Strategist FireEye, Inc. Before the U.S. House of Representatives Committee on Energy and Commerce Subcommittee on Oversight and Investigations
Cyber Risks in the Boardroom
Cyber Risks in the Boardroom Managing Business, Legal and Reputational Risks Perspectives for Directors and Executive Officers Preparing Your Company to Identify, Mitigate and Respond to Risks in a Changing
Incident Response. Proactive Incident Management. Sean Curran Director
Incident Response Proactive Incident Management Sean Curran Director Agenda Incident Response Overview 3 Drivers for Incident Response 5 Incident Response Approach 11 Proactive Incident Response 17 2 2013
Remarks by. Thomas J. Curry. Comptroller of the Currency. Before the. Chicago. November 7, 2014
Remarks by Thomas J. Curry Comptroller of the Currency Before the 10 th Annual Community Bankers Symposium Chicago November 7, 2014 Good morning, it s a pleasure to be here today and to have this opportunity
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Exercising Your Enterprise Cyber Response Crisis Management Capabilities
Exercising Your Enterprise Cyber Response Crisis Management Capabilities Ray Abide, PricewaterhouseCoopers, LLP 2015 PricewaterhouseCoopers LLP, a Delaware limited liability partnership. All rights reserved.
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS
CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS 1 As regulators around the world move to tighten compliance requirements for financial institutions, improvement in cyber security controls will become
Address C-level Cybersecurity issues to enable and secure Digital transformation
Home Overview Challenges Global Resource Growth Impacting Industries Address C-level Cybersecurity issues to enable and secure Digital transformation We support cybersecurity transformations with assessments,
Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3
GLOBAL ADVANCED THREAT LANDSCAPE SURVEY 2014 TABLE OF CONTENTS Executive Summary 3 Snowden and Retail Breaches Influencing Security Strategies 3 Attackers are on the Inside Protect Your Privileges 3 Third-Party
Cyber ROI. A practical approach to quantifying the financial benefits of cybersecurity
Cyber ROI A practical approach to quantifying the financial benefits of cybersecurity Cyber Investment Challenges In 2015, global cybersecurity spending is expected to reach an all-time high of $76.9
RETHINKING ORC: NRF S CYBER SECURITY EFFORTS. OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015
RETHINKING ORC: NRF S CYBER SECURITY EFFORTS OMG Cross Domain Threat & Risk Information Exchange Day, March 23, 2015 No Organization is Secure Source: http://www.informationisbeautiful.net An Average
NIST Cybersecurity Framework What It Means for Energy Companies
Daniel E. Frank J.J. Herbert Mark Thibodeaux NIST Cybersecurity Framework What It Means for Energy Companies November 14, 2013 Your Panelists Dan Frank J.J. Herbert Mark Thibodeaux 2 Overview The Cyber
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
The Impact of Cybercrime on Business
The Impact of Cybercrime on Business Studies of IT practitioners in the United States, United Kingdom, Germany, Hong Kong and Brazil Sponsored by Check Point Software Technologies Independently conducted
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.
Cyber Security Presentation Ontario Energy Board Smart Grid Advisory Committee Doug Westlund CEO, N-Dimension Solutions Inc. October 1, 2013 Cyber Security Protection for Critical Infrastructure Assets
Reducing Cyber Risk in Your Organization
Reducing Cyber Risk in Your Organization White Paper 2016 The First Step to Reducing Cyber Risk Understanding Your Cyber Assets With nearly 80,000 cyber security incidents worldwide in 2014 and more than
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks
Cyber Threat Intelligence and Incident Coordination Center (C 3 ) Protecting the Healthcare Industry from Cyber Attacks July 2014 Cyber Threat Intelligence and Incident Coordination Center: Protecting
Middle Class Economics: Cybersecurity Updated August 7, 2015
Middle Class Economics: Cybersecurity Updated August 7, 2015 The President's 2016 Budget is designed to bring middle class economics into the 21st Century. This Budget shows what we can do if we invest
Top 5 Global Bank Selects Resolution1 for Cyber Incident Response.
MAJOR FINANCIAL SERVICES LEADER Top 5 Global Bank Selects Resolution1 for Cyber Incident Response. Automation and remote endpoint remediation reduce incident response (IR) times from 10 days to 5 hours.
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
Cybercrime: risks, penalties and prevention
Cybercrime: risks, penalties and prevention Cyber attacks have been appearing in the news with increased frequency and recent victims of cybercrime have included well-known companies such as Sony, LinkedIn,
Vendor Risk Management Financial Organizations
Webinar Series Vendor Risk Management Financial Organizations Bob Justus Chief Security Officer Allgress Randy Potts Managing Consultant FishNet Security Bob Justus Chief Security Officer, Allgress Current
Answering your cybersecurity questions The need for continued action
www.pwc.com/cybersecurity Answering your cybersecurity questions The need for continued action January 2014 Boards and executives keeping a sustained focus on cybersecurity do more than protect the business:
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT
CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT How advancements in automated security testing software empower organizations to continuously measure information
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement
Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement Copyright Elevate Consult LLC. All Rights Reserved 1 Presenter Ray Guzman MBA, CISSP, CGEIT, CRISC, CISA Over 25
Cybersecurity and Hospitals. What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response
Cybersecurity and Hospitals What Hospital Trustees Need to Know About Managing Cybersecurity Risk and Response This resources was prepared exclusively for American Hospital Association members by Mary
Testimony of PETER J. BESHAR. Executive Vice President and General Counsel. Marsh & McLennan Companies
Marsh & McLennan Companies, Inc. 1166 Avenue of the Americas New York, NY 10036 +1 212 345 5000 Fax +1 212 345 4808 Testimony of PETER J. BESHAR Executive Vice President and General Counsel Marsh & McLennan
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
Energy Cybersecurity Regulatory Brief
Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider
Data Breach Response Planning: Laying the Right Foundation
Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA
GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY
Penetration Testing: What You Need to Know Now GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY PENETRATION TESTING: GUIDE TO IMPROVING INFORMATION SECURITY Contact
67% 61% STATE OF CLOUD SECURITY BULLETIN. Information Security in the Energy Sector. Summer 2013 FROM APR SEP 2012
STATE OF CLOUD SECURITY BULLETIN Information Security in the Energy Sector Summer 2013 FROM APR SEP 2012 67% of Alert Logic customers in the energy industry experienced BRUTE FORCE ATTACKS 61% of Alert
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048
Cybersecurity Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP 214.758.1048 Setting expectations Are you susceptible to a data breach? October 7, 2014 Setting expectations Victim Perpetrator
Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges
Accenture Intelligent Security for the Digital Enterprise Archer s important role in solving today's pressing security challenges The opportunity to improve cyber security has never been greater 229 2,287
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Access is power. Access management may be an untapped element in a hospital s cybersecurity plan. January 2016. kpmg.com
Access is power Access management may be an untapped element in a hospital s cybersecurity plan January 2016 kpmg.com Introduction Patient data is a valuable asset. Having timely access is critical for
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015
Cyber Threats Insights from history and current operations Prepared by Cognitio May 5, 2015 About Cognitio Cognitio is a strategic consulting and engineering firm led by a team of former senior technology
Defending yesterday. Financial Services. Key findings from The Global State of Information Security Survey 2014
www.pwc.com/security Defending yesterday While organizations have made significant security improvements, they have not kept pace with today s determined adversaries. As a result, many rely on yesterday
Eight Essential Elements for Effective Threat Intelligence Management May 2015
INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re
Cyber Risk: Global Warning? by Cinzia Altomare, Gen Re Global Warning It is a matter of time before there is a major cyber attackon the global financial system and the public needs to invest heavily in
Impact of Data Breaches
Research Note Impact of Data Breaches By: Divya Yadav Copyright 2014, ASA Institute for Risk & Innovation Applicable Sectors: IT, Retail Keywords: Hacking, Cyber security, Data breach, Malware Abstract:
2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP
2015 CEO & Board University Cybersecurity on the Rise Matthew J. Putvinski, CPA, CISA, CISSP MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2011 Wolf & Company, P.C. About Wolf
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management
PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management INTRODUCTION Traditional perimeter defense solutions fail against sophisticated adversaries who target their
OCIE Technology Controls Program
OCIE Technology Controls Program Cybersecurity Update Chris Hetner Cybersecurity Lead, OCIE/TCP 212-336-5546 Introduction (Role, Disclaimer, Background and Speech Topics) SEC Cybersecurity Program Overview
Ed McMurray, CISA, CISSP, CTGA CoNetrix
Ed McMurray, CISA, CISSP, CTGA CoNetrix AGENDA Introduction Cybersecurity Recent News Regulatory Statements NIST Cybersecurity Framework FFIEC Cybersecurity Assessment Questions Information Security Stats
Cyber Security Risks for Banking Institutions.
Cyber Security Risks for Banking Institutions. September 8, 2014 1 Administrative CPE regulations require that online participants take part in online questions Must respond to a minimum of four questions
Combating a new generation of cybercriminal with in-depth security monitoring
Cybersecurity Services Combating a new generation of cybercriminal with in-depth security monitoring 1 st Advanced Data Analysis Security Operation Center The Challenge Don t leave your systems unmonitored.
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
