THE HUMAN FACTOR AS A NECESSARY PART OF
|
|
|
- Joanna Carter
- 10 years ago
- Views:
Transcription
1 Feature Roberto Puricelli, CISM, is a senior information and communications technology (ICT) security consultant at CEFRIEL, an innovation company of Politecnico di Milano. He has experience in various domains of information security, including vulnerability assessment, penetration testing, web application and mobile security, and risk analysis. He is involved in research on new generation threats, with a particular focus on social engineering attacks. As such, he contributed in developing a specific methodology aimed at measuring the related risk. Do you have something to say about this article? Visit the Journal pages of the ISACA web site ( org/journal), find the article and choose the Comments tab to share your thoughts. Go directly to the article: The Underestimated Social Engineering Threat in IT Security Governance and Management The cybercrime ecosystem is radically changing. The evolution of some key technologies and the increased availability of powerful malware enable a business-oriented mind-set among cybercriminals. In recent years, numerous cases of advanced persistent threats (APTs) and data breaches have been seen, with those involving the largest, most high-profile enterprises garnering the most media attention. These scenarios represent only the known cybercrime issues, while, most likely, many attacks have not yet been detected or disclosed to the public. From this point of view, 2014 was a critical year: Large enterprises such as Sony, JP Morgan Chase, Target and many others suffered cyberattacks with serious consequences for the companies and their customers. From the analysis of new attack strategies, it becomes evident that, more frequently, cyberattackers are seeking to gain a foothold into a corporate network by leveraging vulnerabilities and, from there, moving laterally to extend the compromised perimeter and take control of other systems within the target company in order to gain access to critical information. Moreover, the first phase in the attack frequently involves employee behaviors manipulated through social engineering techniques. THE HUMAN FACTOR AS A NECESSARY PART OF INFORMATION SECURITY Historically, employees have been the source of most security issues in organizations. The first aspect is related to the insider threat, meaning any disgruntled, mischievous or deviant employee (as well as former employee, consultant or business partner) who could take advantage of information or systems internal knowledge to damage the company. In addition to the traditional role of the insider, the oblivious employee must be considered as well and will be the focus of this article. This individual, driven by a social engineering attack, may put corporate information at risk by performing a malicious action without realizing it. Cybercriminals Também disponível em português understand that social engineering techniques can be used to manipulate their victims to obtain sensitive information and convince them to perform certain operations, thus increasing the success rate of attacks. As a matter of fact, some of the most recent data breaches can be considered examples of this scenario. The ICANN data breach originated from spear phishing, which allowed attackers to gain access to users information on the centralized zone data system. 1 According to the investigations performed on the Carabank attack, which involved several banks across different countries, employees were targeted by social engineering attacks that allowed for the delivery of malware. 2 Research confirms that the human factor is a weak point in the IT security chain. For example, it has been demonstrated that offering a reward of US $1 is enough to convince a large percentage of users to download and run a potentially malicious software, ignoring the typical security warning. 3 Human error or misbehavior is often related to a lack of risk perception associated with nonrational factors, such as personal experience and psychological attitude, especially in cases of poor or missing awareness. A confirmation of this fact comes from the practice of phishing, which remains one of the most effective weapons for social engineering, even in a context where cyberattacks are constantly evolving and becoming more sophisticated. 4 For all these reasons, it is no longer possible to limit the governance and management of enterprise IT (GEIT) to technological matters only. In the past, following the best guidelines when acquiring new appliances and configuring systems was enough to maintain an adequate level of security. Data breaches and other threats were just a remote thought for enterprises. 1 ISACA JOURNAL VOLUME 3, 2015
2 Unfortunately, this is not the present reality. The point is not whether IT security professionals of targeted companies deployed the best technology, processes and solutions (to be fully compliant with industry practices and standards). Rather, the relevant fact is that those security measures are no longer enough. Security attacks increasingly rely on human vulnerabilities; hence, it is fundamental to extend IT security governance to include the human factor into corporate risk analysis and assessment. To do this in an effective way, it is critical to understand and measure the actual risk and to propose effective and tailored countermeasures to mitigate it. HOW TO ASSESS THE HUMAN FACTOR Current approaches to IT security and risk management tend to underestimate or even ignore the human factor in the assessment models, tools, processes and legal structure. Since involving employees inside an assessment is a relatively innovative approach and is considered risky, planning the assessment in a proper way assumes an important role. First of all, IT and security departments are not the sole actors to define the assessment, because people are the targets. Therefore, it is necessary to involve all the relevant stakeholders, such as human resources (HR), legal and communications departments, in order to explain the threats, share the objectives, define the scope of the assessment and obtain commitment. Moreover, there are several ethical concerns and requirements that need to be considered when performing an assessment on the human factor. 5 Social engineering attacks mean that an employee is deceived into violating a policy. Despite the fact that unscrupulous cybercriminals will make these attempts, enterprises must observe serious ethical and legal limitations, in particular, guaranteeing the respect of the trust relationship between employer and employee and avoiding invasion of an employee s personal sphere. Furthermore, it is necessary to consider the labor legal frameworks, which are radically different between the US and Europe, where employees are protected from any interference from the employer. For example, in Italy, the law prohibits an employer from monitoring the behavior of employees; hence, in an assessment, it is not possible to reveal the details of single users who may be involved in an attack. Despite the limitations and the presence of some legal and ethical risk, interest in this topic is increasing, even in Europe. Learn more about, discuss and collaborate on governance of enterprise IT (GEIT), risk management and risk assessment in the Knowledge Center. Since 2010, the assessment of several large European enterprises trying to overcome the difficulties related to this kind of activity has resulted in the development of the Socialdriven Vulnerability Assessment methodology. 6 The aim of this assessment is to test human behavior against a spearphishing attack simulation, in which an attacker attempts to trick users (i.e., company personnel) into performing actions that could put company assets at risk, for example: 1. Getting the employee to click on a link inside the , visiting a possible malicious web site and, thus, exposing the organization to a drive-by-infection attack 2. Getting the employee to insert certain requested information into a web site form, thus providing critical information such as enterprise credentials By using a controlled web site and tracking the users behavior, it is possible to measure the inclination of employees to fall victim to such an attack, and it is also possible to estimate the level of exposure of the enterprise to technological follow-up attacks from the simulated phishing campaign (e.g., identifying unpatched services that can be exploited through a system fingerprinting). WHAT IS THE ACTUAL RISK? A significant number of assessments using the Social-driven Vulnerability Assessment methodology were performed in large enterprises (more than 12,000 employees) to try to gain an understanding of (or at least to have an idea about) the level of risk. In most of these assessments, a spear-phishing campaign that relied on generic hooks (i.e., related to general topics that may be attractive for users, such as special offers or discounts for employees) was performed. Most of the attacks were just slightly contextualized to the specific company (through colors, logos, templates and proper styles of communication). In some cases, a reference to a specific company (based on publicly available information) was used. This did not significantly influence the results. ISACA JOURNAL VOLUME 3,
3 Figure 1 shows a comparison of the results of the assessments, plotting the success rate of each of the two steps described previously for the sample involved in the test: percentage of employees who clicked on a link inside the on the x-axis and percentage of those who inserted the company credentials on the y-axis. Each circle represents an assessment performed in a company, its radius represents the size of the company itself and the color represents the industry sector. The average results are quite impressive and confirm that spearphishing attacks actually work quite well. In these assessments, one employee out of three (34 percent) followed the link contained in a phishing , and one out of five (21 percent) also inserted company credentials in the web site form. These results are even more impressive when correlated to the temporal factor. According to these results, a phishing campaign is characterized by an impulsive behavior of the employee that causes a rapid growth of the success rate in the early phases, reaching a 50 percent effective rate in only 20 minutes. That means that the available time frame for an effective reaction from the information and communications technology (ICT) security function is quite short. Especially in big enterprises, there seems to be a lack of formalized processes that allow enabling countermeasures based on users reports and, frequently, a poor level of employee knowledge with regard to how to report a security incident. Another interesting point is that all employees are subject to this threat. There does not seem to be any particular difference when analyzing the results according to age, location, department or role. Even management and executives are often quite vulnerable. In general, it has been observed that the higher the role in the company, the lower the exposure, but the percentage of deceived managers is not marginal, posing some problems that should be considered from a risk management perspective. Finally, through fingerprinting techniques, information was gathered on the security posture of the devices used to browse web sites (the users workstations), and vulnerabilities were found that introduce a high level of exposure to Figure 1 Comparison of the Results of Social-driven Vulnerability Assessments 50% Credential insertion (% of sample) 40% 30% 20% 10% 0% 0% 10% 20% 30% 40% 50% 60% 70% Click on link (% of sample) Banking/Finance/Insurance Energy/Multiutility Public Administration Manufacturing Enterprise Size (qualitative) Source: CEFRIEL. Reprinted with permission. 3 ISACA JOURNAL VOLUME 3, 2015
4 technological attacks. This means that using a combination of slapdash exploits, malware code and customized (yet simple) obfuscation techniques, it is possible to bypass the technological countermeasures inside a company and obtain a privileged access to the internal network, exactly the main goal of modern cyberattackers. HOW TO MITIGATE THE RISK From an information security governance point of view, the end goal of including the human factor into vulnerability assessment activities should be to identify suitable mitigation. The most effective countermeasures against the The end goal of including the human factor into vulnerability assessment activities should be to identify suitable mitigation. highlighted risk are awareness and training, which help improve the security culture of employees. Unfortunately, traditional awareness programs are not always effective, 7 based on the fact that some of these tests were performed just after an awareness program was put in place. No significant variations from the average results were seen in these cases. Or, at least, effectiveness of awareness programs is not usually measured. Cybercrime enabled by social engineering is a threat that can be easily understood by nontechnical people, and having a quantitative indication of the risk could enable a better commitment and budget for corrective remediation. An objective measurement also enables the prioritization of targets for training. Furthermore, repetition of the assessment before and after training programs may help in evaluating the effectiveness of awareness programs. The real issue is how to create long-lasting training programs that could effectively increase the security level of the company and how to then maintain this increased level of security. 8, 9 Traditional awareness programs sometimes fail because users may lack motivation to learn and to make paying attention to different signals of fake communications part of their daily habits. Finding the right way to raise awareness is a key factor. The most promising attempts are related to using visual elements, such as video, infographics or info pills to stimulate people. Moreover, gamification is one of the most promising trends. Rewards, social engagement and direct feedback during everyday working life can help, even if the right strategy depends on different factors that must be carefully explored. THE SOCIAL ENGINEERING RISK MANAGEMENT STRATEGY The human factor, in particular the social engineering aspect, is a relevant vulnerability of enterprises systems. This particular risk area is often underestimated and hard to manage. Employees may be the victims of attacks based on social engineering because they do not have the necessary training about these threats or the ability to recognize which kind of web sites or file attachments are safe to open. It is critical to conceive a strategy for including this specific human-factor-related risk in the security IT governance processes. COBIT 5 also considers human factors and behavior as key enablers (albeit often underestimated) for designing a holistic approach for GEIT. 10 Assessments targeting the human factor add an effective metric to measure the level of achievement of the information security goal. It is essential to establish good practices with the purpose of correcting, encouraging and maintaining the security culture throughout the enterprise. In particular, communication and security awareness and training are activities that must be performed in a proper way to increase their effectiveness. The application of a holistic approach in this sense may be difficult. A solution should include increased internal collaboration among the stakeholders of the departments involved. This can be achieved by transferring, in a simple way with objective results and measurable figures, the perception of the actual risk to nontechnological functions, such as the communications or HR departments. This collaboration may also be valuable to redefine investment planning to contrast the highlighted risk and introduce shared budgets (not just from IT) on human-factor, security-related activities, because the actions shift from the technological to the HR field. Collaboration among departments can support enterprises and help them to define and implement programs that effectively allow for improving the governance of information security. ISACA JOURNAL VOLUME 3,
5 CONCLUSION Nowadays, it is not possible to reach an adequate ICT security level with only technological countermeasures, because modern cyberattacks could bypass all the defense layers, exploiting the human factor through social engineering techniques. The results discussed in this article confirm the fact that employees can be deceived to perform dangerous actions that may put the company at risk. Hence, in order to mitigate this Companies must develop a strategy aimed at understanding the actual extent of the problem and promoting effective actions. risk, companies must develop a strategy aimed at understanding the actual extent of the problem and promoting effective actions. To identify the actual level of risk, the claim that companies need to assess their employees is spreading. Due to the criticality of this step, from both ethical and normative perspectives, companies must rely on a specific and tailored methodology that can measure the potential effectiveness of a social engineering attack. Effectively applying such a specific methodology, the achieved results have proved to be useful to obtain commitment from senior management in order to implement mitigation actions, mainly related to employees education. In fact, to raise awareness in order to mitigate the risk, potential investments should not be focused only toward traditional education but also toward experimentation of innovative ways of awareness. This could be quite useful in effectively changing the company culture and contributing to elevation of its overall security level. ENDNOTES 1 ICANN, ICANN Targeted in Spear Phishing Attack. Enhanced Security Measures Implemented, 16 December 2014, 2 Kaspersky Lab, The Great Bank Robbery: The Carbanak, Securelist, 16 February 2015, APT, securelist.com/blog/research/68732/the-great-bankrobbery-the-carbanak-apt/ 3 Guanotronic, It s All About The Benjamins: An Empirical Study on Incentivizing Users to Ignore Security Advice, 4 Dhamija, R.; et al.; Why Phishing Works, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 2006, Phishing/why_phishing_works.pdf 5 Mouton, F.; et al.; Social Engineering From a Normative Ethics Perspective, Information Security for South Africa (ISSA), Johannesburg, South Africa, 2013, cs.up.ac.za/issa/2013/proceedings/full/77/77_paper.pdf 6 Brenna, R.; et al.; CEFRIEL, Social Driven Vulnerability, Technology, February 2014, CEFRIEL/social-driven-vulnerability-english-version 7 Kumaraguru, P; et al.; Teaching Johnny Not to Fall for Phish, Journal ACM Transactions on Internet Technology, Kumaraguru, P.: et al.; Lessons From a Real World Evaluation of Anti-phishing Training, APWG ecrime Researcher s Summit, January Caputo, D.; et al.; Going Spear Phishing: Exploring Embedded Training and Awareness, Security and Privacy, IEEE, vol. 12, iss. 1, 23 August ISACA, COBIT 5, USA, 2012, 5 ISACA JOURNAL VOLUME 3, 2015
An innovative and comprehensive framework for Social Driven Vulnerability Assessment. 20 November 2014
An innovative and comprehensive framework for Social Driven Vulnerability Assessment 20 November 2014 Who are we? Enrico Frumento (twitter: enricoff) ICT Security Specialist @ CEFRIEL Main Activities:
Enrico Frumento. (twitter: enricoff) ICT Security Specialist @ CEFRIEL. Social Engineering and SE 2.0 29 February 2016
Enrico Frumento (twitter: enricoff) ICT Security Specialist @ CEFRIEL Social Engineering and SE 2.0 29 February 2016 LOW HIGH Who is cefriel What is CEFRIEL? Bridging the gap between company and academia
Shield Your Business - Combat Phishing Attacks. A Phishnix White Paper
A Phishnix White Paper Shield Your Business - Combat Phishing Attacks Aujas Information Risk Services 19925 Steven s Creek Blvd, Suite 100, Cupertino, CA 95014-2358 Phone: 1.855.PHISHNX Fax : +1 408 973
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
IBM Security re-defines enterprise endpoint protection against advanced malware
IBM Security re-defines enterprise endpoint protection against advanced malware Break the cyber attack chain to stop advanced persistent threats and targeted attacks Highlights IBM Security Trusteer Apex
Attack Intelligence: Why It Matters
Attack Intelligence: Why It Matters WHITE PAPER Core Security +1 617.399-6980 [email protected] www.coresecurity.com A Proactive Strategy Attacks against your organization are more prevalent than ever,
Technical Testing. Network Testing DATA SHEET
DATA SHEET Technical Testing Network Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance your security posture, reduce
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY. Mark Villinski @markvillinski
TOP 10 TIPS FOR EDUCATING EMPLOYEES ABOUT CYBERSECURITY Mark Villinski @markvillinski Why do we have to educate employees about cybersecurity? 2014 Corporate Threats Survey 94% of business s suffered one
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES
FINANCIAL FRAUD: THE IMPACT ON CORPORATE SPEND IT SECURITY RISKS SPECIAL REPORT SERIES Kaspersky Lab 2 Corporate IT Security Risks Survey details: More than 5,500 companies in 26 countries around the world
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC
: INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS 1 FIVE KEY RECOMMENDATIONS During 2014, NTT Group supported response efforts for a variety of incidents. Review of these engagements revealed some observations
APT Advanced Persistent Threat Time to rethink?
APT Advanced Persistent Threat Time to rethink? 23 November 2012 Gergely Tóth Senior Manager, Security & Privacy Agenda APT examples How to get inside? Remote control Once we are inside Conclusion 2 APT
Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime sponsored by Introduction
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
PENETRATION TESTING GUIDE. www.tbgsecurity.com 1
PENETRATION TESTING GUIDE www.tbgsecurity.com 1 Table of Contents What is a... 3 What is the difference between Ethical Hacking and other types of hackers and testing I ve heard about?... 3 How does a
Cybersecurity Kill Chain. William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015
Cybersecurity Kill Chain William F. Crowe, CISA, CISM, CRISC, CRMA September 2015 ISACA Jacksonville Chapter Meeting August 13, 2015 Who Am I? Over 20 years experience with 17 years in the financial industry
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Microsoft Services Premier Support. Security Services Catalogue
Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated
Collateral Effects of Cyberwar
Your texte here. Collateral Effects of Cyberwar by Ilia Kolochenko for Geneva Information Security Day 9 th of October 2015 Quick Facts and Numbers About Cybersecurity In 2014 the annual cost of global
Global Corporate IT Security Risks: 2013
Global Corporate IT Security Risks: 2013 May 2013 For Kaspersky Lab, the world s largest private developer of advanced security solutions for home users and corporate IT infrastructures, meeting the needs
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
I D C A N A L Y S T C O N N E C T I O N
I D C A N A L Y S T C O N N E C T I O N Robert Westervelt Research Manager, Security Products T h e R o l e a nd Value of Continuous Security M o nitoring August 2015 Continuous security monitoring (CSM)
Cyber Security Management
Cyber Security Management Focusing on managing your IT Security effectively. By Anthony Goodeill With the news cycles regularly announcing a recurrently theme of targets of hacker attacks and companies
Technical Testing. Application, Network and Red Team Testing DATA SHEET. Test your security defenses. Expert Testing, Analysis and Assessments
DATA SHEET Technical Testing Application, Network and Red Team Testing The Dell SecureWorks Technical Testing services deliver the independent expertise, experience and perspective you need to enhance
How To Protect Your Organisation From A Phishing Attack
PRESENTED BY Ray Dalgarno Empowering the Human Element within the Security Eco-system Agenda Phishing General Background Why Phish5 Phish5 Service - Features & Functionalities Q&A Live demonstration (post
1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.
Employee Security Awareness Survey Trenton Bond [email protected] Admin - Version 1.3 Security Awareness One of the most significant security risks that organizations and corporations face today is
QRadar SIEM and FireEye MPS Integration
QRadar SIEM and FireEye MPS Integration March 2014 1 IBM QRadar Security Intelligence Platform Providing actionable intelligence INTELLIGENT Correlation, analysis and massive data reduction AUTOMATED Driving
Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks
Anti-Phishing Training Modules Teach employees to recognize and avoid phishing and spear phishing attacks Improve Phishing Knowledge and Reduce Susceptibility to Attack Do you already have some form of
Marble & MobileIron Mobile App Risk Mitigation
Marble & MobileIron Mobile App Risk Mitigation SOLUTION GUIDE Enterprise users routinely expose their employers data and threaten network security by unknowingly installing malicious mobile apps onto their
Targeted attacks: Tools and techniques
Targeted attacks: Tools and techniques Performing «red-team» penetration tests Lessons learned Presented on 17/03/2014 For JSSI OSSIR 2014 By Renaud Feil Agenda Objective: Present tools techniques that
THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY
THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY BY DR. BRIAN MCELYEA AND DR. EMILY DARRAJ Approved for Public Release: Case # 16-0276 NORTHROP GRUMMAN WHITE PAPER 2016 Northrop Grumman
Security Intelligence Services. Cybersecurity training. www.kaspersky.com
Kaspersky Security Intelligence Services. Cybersecurity training www.kaspersky.com CYBERSECURITY TRAINING Leverage Kaspersky Lab s cybersecurity knowledge, experience and intelligence through these innovative
Developing a Successful Security Awareness Training Program. Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc.
Developing a Successful Security Awareness Training Program Shea Garber, Sr. Account Executive Wombat Security Technologies, Inc. Agenda The human element of cyber security Building your case Building
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
CYBER SECURITY, A GROWING CIO PRIORITY
www.wipro.com CYBER SECURITY, A GROWING CIO PRIORITY Bivin John Verghese, Practitioner - Managed Security Services, Wipro Ltd. Contents 03 ------------------------------------- Abstract 03 -------------------------------------
Combatting the Biggest Cyber Threats to the Financial Services Industry. A White Paper Presented by: Lockheed Martin Corporation
Combatting the Biggest Cyber Threats to the Financial Services Industry A White Paper Presented by: Lockheed Martin Corporation Combatting the Biggest Cyber Threats to the Financial Services Industry Combatting
Zak Khan Director, Advanced Cyber Defence
Securing your data, intellectual property and intangible assets from cybercrime Zak Khan Director, Advanced Cyber Defence Agenda (16 + optional video) Introduction (2) Context Global Trends Strategic Impacts
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT
BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT FireEye Supply Chain Risk Management INTERVIEWS Craig Martin SVP Hardware Development and Manufacturing Operations Kip Shepard Senior Manager of Global
Optimizing Network Vulnerability
SOLUTION BRIEF Adding Real-World Exposure Awareness to Vulnerability and Risk Management Optimizing Network Vulnerability Management Using RedSeal november 2011 WHITE PAPER RedSeal Networks, Inc. 3965
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness
SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper Safeguarding data through increased awareness November 2015 1 Contents Executive Summary 3 Introduction 4 Martime Security 5 Perimeters Breached
PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013
2013 PASTA Abstract Process for Attack S imulation & Threat Assessment Abstract VerSprite, LLC Copyright 2013 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
ENABLING FAST RESPONSES THREAT MONITORING
ENABLING FAST RESPONSES TO Security INCIDENTS WITH THREAT MONITORING Executive Summary As threats evolve and the effectiveness of signaturebased web security declines, IT departments need to play a bigger,
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
WRITTEN TESTIMONY OF
WRITTEN TESTIMONY OF KEVIN MANDIA CHIEF EXECUTIVE OFFICER MANDIANT CORPORATION BEFORE THE SUBCOMMITTEE ON CRIME AND TERRORISM JUDICIARY COMMITTEE UNITED STATES SENATE May 8, 2013 Introduction Thank you
Information Technology Risk Management
Find What Matters Information Technology Risk Management Control What Counts The Cyber-Security Discussion Series for Federal Government security experts... by Carson Associates your bridge to better IT
Can Your Organization Brave The New World of Advanced Cyber Attacks?
Can Your Organization Brave The New World of Advanced Cyber Attacks? www.websense.com/apx Overview: When it comes to defending against cyber attacks, the global business community faces a dangerous new
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Training Employees to Recognise & Avoid Advanced Threats
Training Employees to Recognise & Avoid Advanced Threats Joe Ferrara, President & CEO, Wombat Security Technologies Rashmi Knowles, Chief Security Architect EMEA, RSA The Security Division of EMC Session
Security Intelligence Services. www.kaspersky.com
Kaspersky Security Intelligence Services. Threat Intelligence Services www.kaspersky.com THREAT INTELLIGENCE SERVICES Tracking, analyzing, interpreting and mitigating constantly evolving IT security threats
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
How to Spot and Combat a Phishing Attack Webinar
How to Spot and Combat a Phishing Attack Webinar October 20 th, 2015 Kevin Patel Sr Director of Information Security, Compliance & IT Risk Mgmt [email protected] Agenda 1) National Cyber Security
Threat Intelligence: The More You Know the Less Damage They Can Do. Charles Kolodgy Research VP, Security Products
Threat Intelligence: The More You Know the Less Damage They Can Do Charles Kolodgy Research VP, Security Products IDC Visit us at IDC.com and follow us on Twitter: @IDC 2 Agenda Evolving Threat Environment
CORE Security and GLBA
CORE Security and GLBA Addressing the Graham-Leach-Bliley Act with Predictive Security Intelligence Solutions from CORE Security CORE Security +1 617.399-6980 [email protected] www.coresecurity.com
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
WHITEPAPER. How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware
WHITEPAPER How a DNS Firewall Helps in the Battle against Advanced Persistent Threat and Similar Malware How a DNS Firewall Helps in the Battle against Advanced As more and more information becomes available
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions
Preempting Business Risk with RSA SIEM and CORE Security Predictive Security Intelligence Solutions CORE Security +1 617.399-6980 [email protected] www.coresecurity.com blog.coresecurity.com Preempting
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking
Kaspersky Fraud Prevention: a Comprehensive Protection Solution for Online and Mobile Banking Today s bank customers can perform most of their financial activities online. According to a global survey
The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015
The Cost of Phishing Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015 Executive Summary.... 3 The Costs... 4 How To Estimate the Cost of an Attack.... 5 Table
Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec
Introduction Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia [email protected] Twitter: @ethical_infosec More than 20 years of experience in cybersecurity specializing
Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
Common Cyber Threats. Common cyber threats include:
Common Cyber Threats: and Common Cyber Threats... 2 Phishing and Spear Phishing... 3... 3... 4 Malicious Code... 5... 5... 5 Weak and Default Passwords... 6... 6... 6 Unpatched or Outdated Software Vulnerabilities...
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
Continuous Network Monitoring
Continuous Network Monitoring Eliminate periodic assessment processes that expose security and compliance programs to failure Continuous Network Monitoring Continuous network monitoring and assessment
CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility
CYBER SECURITY AND RISK MANAGEMENT An Executive level responsibility Cyberspace poses risks as well as opportunities Cyber security risks are a constantly evolving threat to an organisation s ability to
The evolution of virtual endpoint security. Comparing vsentry with traditional endpoint virtualization security solutions
The evolution of virtual endpoint security Comparing vsentry with traditional endpoint virtualization security solutions Executive Summary First generation endpoint virtualization based security solutions
IBM Security QRadar Vulnerability Manager
IBM Security QRadar Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution Highlights Help prevent security breaches by discovering and highlighting high-risk
ENDPOINT SECURITY WHITE PAPER. Endpoint Security and Advanced Persistent Threats WWW.COMODO.COM
WHITE PAPER Endpoint Security and Advanced Persistent Threats The Invisible Threat They re out there waiting. Sitting at their computers hoping for you to make a mistake. And you will. Because no one is
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
Extreme Networks Security Analytics G2 Vulnerability Manager
DATA SHEET Extreme Networks Security Analytics G2 Vulnerability Manager Improve security and compliance by prioritizing security gaps for resolution HIGHLIGHTS Help prevent security breaches by discovering
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
Defending Against Cyber Attacks with SessionLevel Network Security
Defending Against Cyber Attacks with SessionLevel Network Security May 2010 PAGE 1 PAGE 1 Executive Summary Threat actors are determinedly focused on the theft / exfiltration of protected or sensitive
The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.
1 Cyber-attacks frequently take advantage of software weaknesses unintentionally created during development. This presentation discusses some ways that improved acquisition practices can reduce the likelihood
Protecting Against Online Fraud with F5
Protecting Against Online Fraud with F5 Fraud is a relentless threat to financial services organizations that offer online banking. The F5 Web Fraud Protection solution defends against malware, phishing
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
CYBERCRIME AND THE INTERNET OF THREATS. www.juniperresearch.com
CYBERCRIME AND THE INTERNET OF THREATS www.juniperresearch.com 1 1.1 Introduction As more and more business infrastructure moves online, so do those wishing to destroy or defraud that infrastructure. Cybercrime
Managing IT Security with Penetration Testing
Managing IT Security with Penetration Testing Introduction Adequately protecting an organization s information assets is a business imperative one that requires a comprehensive, structured approach to
A New Approach to Assessing Advanced Threat Solutions
A New Approach to Assessing Advanced Threat Solutions December 4, 2014 A New Approach to Assessing Advanced Threat Solutions How Well Does Your Advanced Threat Solution Work? The cyber threats facing enterprises
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Cyber attack on Twitter, 250,000 accounts hacked
HEADLINES Impact and Cost At least 19 states have introduced or are considering security breach legislation in 2014. Most of the bills would amend existing security breach laws. According to the Ponemon
