Incident Response & Handling
|
|
|
- Joleen Rose
- 10 years ago
- Views:
Transcription
1 Incident Response & Handling BDNOG Workshop May 2014 Adli Wahid Security Specialist, APNIC
2 About Me Adli Wahid Current Role Security Specialist, APNIC Previous Roles Cyber Security Manager, Bank of Tokyo- Mitsubishi UFJ VP Cyber Security Response Services, CyberSecurity Malaysia & Head of Malaysia CERT (MYCERT) Lecturer, InternaYonal Islamic University Malaysia Follow me on Twi\er! adliwahid
3 Agenda Plan For Today 1. Cyber Security The Bigger Picture 2. Incident Response & Handling 3. Se_ng Up CSIRT
4 Outcomes 1. Understand the importance of responding and handling security incidents 2. Familiar with the requirements for se_ng up a CERT / CSIRT 3. IdenYfy organisayons to connect with for collaborayon & cooperayon
5 So you do Security?
6
7 CYBERSECURITY FRAMEWORK THINKING ABOUT CYBERSECURITY
8 Cyber Security Frame Work How do we think about security CollecYon of acyviyes to address Risk Risk = Threats x VulnerabiliYes Dealing with the Known & and Unknown People, Process, Technology Dynamic & ConYnuous Approach Including Learning from Incidents Applying Best Current PracYces
9 NIST Cyber Security Framework
10
11 Incidents Happens! Despite your best efforts keep the internet safe, secure and reliable things happens What we have seen Malware, Botnets, Exploit Kits, Ramsomware, DDoS A\acks, Anonymous, 0- days, Web Defacement Data Breaches and Disclosures And Many more! What is the worst that can happen to you?
12
13 5 out of 42 AVs Detect This
14 Incident Happens! (2) Incident may affect Your OrganisaYon Your Customers Must be managed in order to Limit Damage Recover (Fix/Patch) Prevent recurrence Prevent Further Abuse
15 Exercise- 1 You might have an incident already Visit h.com/archive Enable filters Insert domain Let s Discuss What can we learn from this? What is the risk for publicayon of defaced websites? Going back to our formula: Risk = Threats + VulnerabiliYes
16 Exercise- 1 Discussion DetecYon How do I know about incidents affecyng me Analysis How bad is the situayon Google for ZeusTracker, MalwareDomainList Recover How do I fix this Lessons Learned How can we prevent this happening in the future Think PPT! Can series of acyon be co- ordinated?
17 INCIDENT HANDLING & RESPONSE FRAMEWORK
18 What is incident? ITIL terminology defines an incident as: Any event which is not part of the standard operayon of a service and which causes, or may cause, an interrupyon to, or a reducyon in, the quality of that service ISO27001 defines an incident as: any event which is not part of the standard operayon of a service and which causes or may cause an interrupyon to, or a reducyon in, the quality of that service.
19 Incident Response vs. Incident Handling? Incident Response is all of the technical components required in order to analyze and contain an incident. Skills: requires strong networking, log analysis, and forensics skills. Incident Handling is the logisfcs, communicafons, coordinafon, and planning funcfons needed in order to resolve an incident in a calm and efficient manner. [isc.sans.org]
20 What is Event? An event is any observable occurrence in a system and/or network Not all events are incidents but all incidents are events
21 ObjecYve of Incident Response To miygate or reduce risks associated to an incident To respond to all incidents and suspected incidents based on pre- determined process Provide unbiased invesygayons on all incidents Establish a 24x7 hotline/contact to enable effecyve reporyng of incidents. Control and contain an incident Affected systems return to normal operayon Recommend soluyons short term and long term soluyons
22 Dealing with Incidents Bo\om Line What happens if you don t deal with incidents? Become Tomorrow s Headline (Image) I or Domain Blacklisted (Availability & Financial Loss) Linked to Criminals The World needs you! Trusted point of contact (informayon on infected or compromised hosts Doing your bit to keep the Internet a safe and secure place for everyone! 22
23 The CSIRT OrganisaYon Defining the CSIRT OrganisaYon Mission Statement High level definiyon of what the team will do ConsYtuency Whose incidents are we going to be handling or responsible for And to what extent CSIRT posiyon / locayon in the OrganisaYon RelaYon to other teams (or organisayons)
24 Possible AcYviYes of CSIRTs Incident Handling Alerts & Warnings Vulnerability Handling Artefact Handling Announcements Technology Watch Audits/Assessments Configure and Maintain Tools/ Applications/Infrastructure Security Tool Development Intrusion Detection Information Dissemination Risk Analysis Business Continuity Planning Security Consulting Awareness Building Education/Training Product Evaluation List from CERT-CC (
25 OperaYons & Availability Incidents don t happen on a parycular day or Yme How to ensure 24 x7 reachability? IRT Object In WhoIS Database (Mailing List) Phone, SMSes InformaYon on the Website RelaYonship with NaYonal CSIRTs and Others ISPS, Vendors, Law Enforcement Agencies
26 Different kinds of CSIRTs The type of acyviyes, focus and capabiliyes may be different Some examples NaYonal CSIRTs Vendor CSIRTs (Network & Content) Providers
27 Resources ConsideraYon (1) People, Process and Technology Requirements People Resources for: Handling Incidents Reports (Dedicated?) Technical Analysis & InvesYgaYon What kinds of skills are required? Familiarity with technology Familiarity with different types of security incidents Non Technical skills CommunicaYon, WriYng Trustworthiness
28 Resources Requirements (2) Process & Procedures Generally from the beginning of incident Yll when we resolve the incident Including lessons learned & improvement of current policies or procedures Must be clear so that people know what do to Importance Specific Procedures for Handling Specific types of Incidents Malware Related DDoS Web Defacement Fraud Data Breach
29 Incident Response/Handling Source: Special Publication * Computer Security Incident Handling Guide page 3-1 *
30 Applying the Framework - Responding to a DDOS Incident 1. PreparaYon 2. IdenYficaYon 3. Containment 4. RemediaYon 5. Recovery 6. Awermath/Lessons Learned Reference: cert.societegenerale.com/resources/files/irm-4-ddos.pdf
31 Example Team Structure First Level Helpdesk, Triage 2 nd Level Specialists Network Forensics Malware Forensics Etc Overall Co- ordinayon
32 Understanding Role of Others in the OrganisaYon Different tasks in the organisation CEO: to maximise shareholder value PR officer: to present a good image to the press Corporate Risk: to care about liabilities, good accounting, etc. CSIRT: to prevent and resolve incidents Don t assume these interests automatically coincide - but with your help, they can!
33 Incident Response/Handling Skills / AcYviYes Overview Log Analysis Logistics Forensics Technical Non- Technical Coordination Network Communication Reversing Planning
34 Resources Requirements (3) Technology / Tools EssenYally 2 parts For handling Incidents & Incidents Related ArYfacts Managing Yckets, secure communicayons, etc RTIR, OTRS, AIRT are some good examples Tools & Resources for Analysis & InvesYgaYon Depending on the type of work that is required For performing: Hosts Analysis, Log Analysis, Traffic Analysis, Network Monitoring, Forensics, Malware Analysis Tools that support standards for exchanging Threat Intels with other teams (STIX & TAXII)
35 Incident ReporYng Channels IntegraYon with OTRS Fax server etc OTRS IDS alerts Phone Web form SMS
36 Exercise 2 Let s discuss how will you handle these types of incidents Data Breach (Password of your users published on Scribd) Phishing Website Hacker Group announced that they will hacked all of YOURDOMAIN on July 1 st 2014 A\acker send sent you and and Threatened to launch DDoS a\ack if you don t pay Money Receive an from ShadowServer.ORG about hosts on your network that are running Open Recursive DNS
37 Exercise- 2 The Phish! 1 2 Dear Intelligent User, We have introduced a new security feature on our website. Please reactivate your account here: p.s This is NOT a Phish <? $mailto= [email protected] ; mail($mailto,$subject,$message);?> 4 Login Password din: joey:cherry2148 boss:abcdefgh123 finance:wky8767 admin:tes\est123 3
38 Phish Response Checklist 1. Analyse / Report of Spam 2. Phishing Site Take Down Removal / Suspension Browser NoYficaYon 3. Phishing Site Analysis Phishkits? 4. CredenYals Stolen NoYfy Users 5. Report / EscalaYon 6. Lessons Learned
39 Exercise 2 From.RU (or somewhere) with Love Date: Day, Month 2011 Subject: Partnership From: A\acker To: VicYm Your site does not work because We a\ack your site. When your company will pay to us we will stop a\ack. Contact the director. Do not lose clients.
40 Dear Admin, > > Please check this web are already being hack and please info their > admin about the deface. Seem their box already have backdoor to cover up their xtvt. > h\p:// > want to login type password below!!! The password : blablabla > They use scripyng that SA will never look and put like this php are > needed thought the keep this file without noyced them... Please come > on if the not qualified to do this job give to others that qualified > to do the job. I being noyced this since 2008 nothing happen also the > SA or vendor doesn't care of their web is being web or not or they do > not know how to trace their website have vulnerability that can > interact many hacker around the world to hack Malaysia Web site > especially goverment website because it easy or suppose to be easy to > them. Please if cybersecurity do their job and very efficient way... > and there will noyce 1st and scan all gov website for anything that > have vulnerable and can exploit any Yme. Dont make other outsider do > it 1st and we can see many flag around the world are in Malaysia > Government Website. shame shame!!!
41 Advisories and Alerts Scenarios that potenyally require Advisory or Alert Incident that could potenyal have a wide- scale impact Examples DeclaraYon by a\acker to launch a\ack CriYcal vulnerability of popular sowware Some types of Incidents Require acyon by those in your consituencies They have to apply the patch themselves Their network or systems are not reachable to you They must perform addiyonal risk assessment Perform check so that to ensure that they are not vulnerable
42 Advisories and Alerts (2) Content Should be clear & concise What is impacted If fix available or workaround Shouldn t be confusing Guide on how to determine or apply fix could be useful DistribuYon of advisory and alerts PreparaYon of targeted list based on industry, common systems, groups Using suitable pla orms to reach out (including media) Goal is to reach out as quick as possible the right Special Programs with Vendors Early alert i.e. Microsow
43 Working with Law Enforcement Agencies & Judiciary Some incidents have elements of crime Cyber or non- cyber laws Regulatory framework ImplicaYon Must work with Law Enforcement Agency (must noyfy) PreservaYon of digital evidence (logs, images, etc) Proper configurayon of systems, Yme etc Working together with LEAs to invesygate Monitoring, recording and tracking Responding to requests Explaining / Training them on how things work
44 CollaboraYon & InformaYon Sharing Bad guys work together, Good guys should too! Make yourself known, collaborate with others AssociaYon of CSIRTS NaYonal CSIRTs groups (in some countries) Regional APCERT, OIC- CERT, TF- CSIRT Global FIRST.org Closed & Trusted Security Groups NSP- SEC OPS- TRUST Ge_ng Free Feeds about your consytuencies (and sharing with them) ShadowServer FoundaYon Team Cymru Honeynet Project
45 Ge_ng Involved Global Take Downs / Co- ordinated Response DNSChanger Working Group Conficker Working Group Cyber Security Exercises MulYple Teams & MulYple Scenarios acyviyes Ge_ng to know your peers and improving internal processes as capabiliyes Example: APCERT Drill, ASEAN Drill, etc Helping Promote Best PracYces & Awareness Source Address ValidaYon (BCP 38) APWG Stop Think Connect (APWG.org)
46 Cyber Security Exercises - Targeted A\acks Scenario Website CEO s Laptop Command and Control
47 Exercises 3 Check out some of the security organisayons menyoned earlier APCERT h\p:// FIRST h\p:// ShadowServer FoundaYon h\p:// Honeynet Project h\p://
48 Managing CSIRT Having sufficient resources ($) is criycal to maintain cert / csirt operayon Consider having funds for traveling to parycipate in workshops, training and meeyngs
49 Recap We covered The bigger picture Managing Risks The need to respond to incidents Se_ng up Security Response Teams Resources required Ge_ng your team up and running
50 QuesYons? Keep in touch! Adli Wahid Check out: h\p://training.apnic.net
Open Source Incident Management Tool for CSIRTs
An Agency Under MOSTI Open Source Incident Management Tool for CSIRTs Adli Wahid Head, Malaysia CERT (MyCERT) CyberSecurity Malaysia Copyright 2008 CyberSecurity Malaysia Agenda About MyCERT Where do incidents
Cyber Security & Role of CERT-In. Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected]
Cyber Security & Role of CERT-In Dr. Gulshan Rai Director General, CERT-IN Govt. of India [email protected] Web Evolution Web Sites (WWW) 1993 Web Invented and implemented 130 Nos. web sites 1994 2738 Nos.
What legal aspects are needed to address specific ICT related issues?
What legal aspects are needed to address specific ICT related issues? Belhassen ZOUARI CEO, National Agency for Computer Security, Tunisia Head of the Tunisian Cert (tuncert), E-mail : [email protected]
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia
Country Case Study on Incident Management Capabilities CERT-TCC, Tunisia Helmi Rais CERT-TCC Team Manager National Agency for Computer Security, Tunisia [email protected] [email protected] Framework
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010)
Indian Computer Emergency Response Team (CERT-In) Annual Report (2010) Indian Computer Emergency Response Team (CERT-In) Department of Information Technology Ministry of Communications & Information Technology
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Cyber Security and Critical Information Infrastructure
Cyber Security and Critical Information Infrastructure Dr. Gulshan Rai Director General Indian Computer Emergency Response Team (CERT- In) grai [at] cert-in.org.in The Complexity of Today s Network Changes
Information Security Threat Trends
Talk @ Microsoft Security Day Sep 2005 Information Security Threat Trends Mr. S.C. Leung 梁 兆 昌 Senior Consultant 高 級 顧 問 CISSP CISA CBCP M@PISA Email: [email protected] 香 港 電 腦 保 安 事 故 協 調 中 心 Introducing
Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.
Belmont Savings Bank Are there Hackers at the gate? 2013 Wolf & Company, P.C. MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2013 Wolf & Company, P.C. About Wolf & Company, P.C.
Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist, CISSP @TheGrantBrown
Cyber Resilience Implementing the Right Strategy Grant Brown specialist, CISSP @TheGrantBrown 1 2 Network + Technology + Customers = $$ 3 Perfect Storm? 1) Increase in Bandwidth (extended reach) 2) Available
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Cybersecurity and Incident Response Initiatives: Brazil and Americas
Cybersecurity and Incident Response Initiatives: Brazil and Americas Cristine Hoepers [email protected] Computer Emergency Response Team Brazil CERT.br http://www.cert.br/ Brazilian Internet Steering Committee
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
Can We Become Resilient to Cyber Attacks?
Can We Become Resilient to Cyber Attacks? Nick Coleman, Global Head Cyber Security Intelligence Services December 2014 Can we become resilient National Security, Economic Espionage Nation-state actors,
Current Threat Scenario and Recent Attack Trends
Current Threat Scenario and Recent Attack Trends Anil Sagar Additional Director Indian Computer Emergency Response Team (CERT-In) Objectives Current Cyber space Nature of cyberspace and associated risks
Tunisia s experience in building an ISAC. Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc
Tunisia s experience in building an ISAC Haythem EL MIR Technical Manager NACS Head of the Incident Response Team cert-tcc 1 Agenda Introduction ISAC objectives and benefits Tunisian approach SAHER system
O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y
Automate Response Congratulations on selecting IncidentResponse.com to retrieve your custom incident response workflow guide. This guide has been created especially for you for use in within your security
How To Perform A Large Scale Attack On A Large Network
95 95 9. Exercise: Large Scale Incident Handling Main Objective Targeted Audience Total Duration Time Schedule The main objective of the exercise is to teach incident handlers the key information and actions
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
NATIONAL CYBER SECURITY AWARENESS MONTH
NATIONAL CYBER SECURITY AWARENESS MONTH Tip 1: Security is everyone s responsibility. Develop an awareness framework that challenges, educates and empowers your customers and employees to be part of the
Cybersecurity. Are you prepared?
Cybersecurity Are you prepared? First Cash, then your customer, now YOU! What is Cybersecurity? The body of technologies, processes, practices designed to protect networks, computers, programs, and data
Data Breach Response Planning: Laying the Right Foundation
Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
CERT/CSIRT Operation Operation. ADLI WAHID [email protected]
CERT/CSIRT Operation Operation ADLI WAHID [email protected] What This Course Is About Welcome as we gather together to improve the future of security and share our ideas, projects, and successes! During the
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
What Directors need to know about Cybersecurity?
What Directors need to know about Cybersecurity? W HAT I S C YBERSECURITY? PRESENTED BY: UTAH BANKERS ASSOCIATION AND JON WALDMAN PARTNER, SENIOR IS CONSULTANT - SBS 1 Contact Information Jon Waldman Partner,
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown
Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown 1 Protected networks are continuously being successfully attacked
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
Cyber Security Metrics Dashboards & Analytics
Cyber Security Metrics Dashboards & Analytics Feb, 2014 Robert J. Michalsky Principal, Cyber Security NJVC, LLC Proprietary Data UNCLASSIFIED Agenda Healthcare Sector Threats Recent History Security Metrics
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012. Co-Chair s Summary Report
ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September 2012 Co-Chair s Summary Report 1. Pursuant to the 18 th ASEAN Regional Forum (ARF) Ministerial meeting in Bali,
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY. Sazali Sukardi Vice President Research CyberSecurity Malaysia
CAPACITY BUILDING TO STRENGTHEN CYBERSECURITY by Sazali Sukardi Vice President Research CyberSecurity Malaysia SCOPE INTRODUCTION CYBER SECURITY INCIDENTS IN MALAYSIA CAPACITY BUILDING The Council For
Emerging Security Technological Threats
Emerging Security Technological Threats Jamie Gillespie Training and Education Team Leader, AusCERT About AusCERT Australia s national CERT Collect, monitor, advise on threats and vulnerabilities Incident
Cybersecurity y Managing g the Risks
Cybersecurity y Managing g the Risks Presented by: Steven L. Caponi Jennifer Daniels Gregory F. Linsin 99 Cybersecurity The Risks Are Real Perpetrators are as varied as their goals Organized Crime: seeking
Presented by Evan Sylvester, CISSP
Presented by Evan Sylvester, CISSP Who Am I? Evan Sylvester FAST Information Security Officer MBA, Texas State University BBA in Management Information Systems at the University of Texas Certified Information
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
Why The Security You Bought Yesterday, Won t Save You Today
9th Annual Courts and Local Government Technology Conference Why The Security You Bought Yesterday, Won t Save You Today Ian Robertson Director of Information Security Michael Gough Sr. Risk Analyst About
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Security A to Z the most important terms
Security A to Z the most important terms Part 1: A to D UNDERSTAND THE OFFICIAL TERMINOLOGY. This is F-Secure Labs. Learn more about the most important security terms with our official explanations from
Fighting Cyber Crime in the Telecommunications Industry. Sachi Chakrabarty
Fighting Cyber Crime in the Telecommunications Industry Sachi Chakrabarty Agenda Cyber Crime What s all the fuss about CyberCrime? DoS Attacks Telco Solutions Cybercrime? Cybercrime Definition All criminal
Practical Steps To Securing Process Control Networks
Practical Steps To Securing Process Control Networks Villanova University Seminar Rich Mahler Director, Commercial Cyber Solutions Lockheed Martin Lockheed Martin Corporation 2014. All Rights Reserved.
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014
Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014 Lisa D. Traina, CPA, CITP, CGMA Lisa Traina utilizes her 30+ years of experience as a CPA, CITP and CGMA
The trend of the Cyber Security and the efforts of NEC. December 9 th, 2015 NEC Corporation
The trend of the Cyber Security and the efforts of NEC December 9 th, 2015 NEC Corporation Agenda 1. NEC Corporate Profile 2. NEC s Activity for Safer-City 3. NEC Cyber Security Solution 3.1 Security Operation
Security workshop Protection against botnets. Belnet Aris Adamantiadis Brussels 18 th April 2013
Security workshop Belnet Aris Adamantiadis Brussels 18 th April 2013 Agenda What is a botnet? Symptoms How does it work? Life cycle How to fight against botnets? Proactive and reactive NIDS 2 What is a
Cyber Security ( Lao PDR )
ITU Cyber security Forum and Cyber Drill 9-11 December 2013,Lao Plaza Hotel, Vientiane, Lao PDR Country updates on Cyber Security ( Lao PDR ) By Khamla Sounnalat Deputy head of LaoCERT Ministry of Posts
CSIRT Introduction to Security Incident Handling
CSIRT Introduction to Security Incident Handling P. Jacques Houngbo AIS 2013Technical Workshops Lusaka, Zambia, June 2013 If you think technology can solve your security problems, then you don t understand
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Protecting critical infrastructure from Cyber-attack
Protecting critical infrastructure from Cyber-attack ACI-NA BIT Workshop, Session 6 (Cybersecurity) Long Beach, California October 4, 2015 Ben Trethowan Aviation Systems & Security Architect The scale
Incident Response Plan for PCI-DSS Compliance
Incident Response Plan for PCI-DSS Compliance City of Monroe, Georgia Information Technology Division Finance Department I. Policy The City of Monroe Information Technology Administrator is responsible
Software that provides secure access to technology, everywhere.
Software that provides secure access to technology, everywhere. Joseph Patrick Schorr @JoeSchorr October, 2015 2015 BOMGAR CORPORATION ALL RIGHTS RESERVED WORLDWIDE 1 Agenda What are we dealing with? How
A BRAINSTORMING ON SECURITY FIRE DRILLS
A BRAINSTORMING ON SECURITY FIRE DRILLS Classification, Feasibility, Usefulness and Implications Maurizio Molina, DANTE Nino Jogun, CARNET on behalf of GÉANT3 project, SA2/T4 TF-CSIRT, Tallin, 25 th Sep.
Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley
Cyber Security & Cyber Criminality: ~ The Facts ~ - Sgt Phil Cobley Firstly, an apology + + = What shall we discuss What is Cyber Crime? What are the current threats? What is the capability of local and
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
Report on CAP Cybersecurity November 5, 2015
Agenda Number 7. Report on CAP Cybersecurity November 5, 2015 Phil Cook CISSP, CISM Manager, Information Technologies Risk #1 External Attacks PR 81 Protect and secure CAP's Information Technology assets
U. S. Attorney Office Northern District of Texas March 2013
U. S. Attorney Office Northern District of Texas March 2013 What Is Cybercrime? Hacking DDOS attacks Domain name hijacking Malware Other computer related offenses, i.e. computer and internet used to facilitate
Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM
Internet Security Protecting Your Business Hayden Johnston & Rik Perry WYSCOM Introduction Protecting Your Network Securing Your Information Standards & Best Practices Tools & Options Into The Future Creating
Top tips for improved network security
Top tips for improved network security Network security is beleaguered by malware, spam and security breaches. Some criminal, some malicious, some just annoying but all impeding the smooth running of a
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
ReadySpace Limited Unit J, 16/F Reason Group Tower, 403-413 Castle PeakRoad, Kwai Chung, N.T.
Reputation and Blacklist Monitoring Basic Professional Business Enterprise Reputation Monitoring Blacklist Monitoring Standard Malware Detection Scan for known Malware Scan for known viruses All pages
Incident Reporting Guidelines for Constituents (Public)
Incident Reporting Guidelines for Constituents (Public) Version 3.0-2016.01.19 (Final) Procedure (PRO 301) Department: GOVCERT.LU Classification: PUBLIC Contents 1 Introduction 3 1.1 Overview.................................................
RSA Security Anatomy of an Attack Lessons learned
RSA Security Anatomy of an Attack Lessons learned Malcolm Dundas Account Executive John Hurley Senior Technology Consultant 1 Agenda Advanced Enterprise/ Threats The RSA Breach A chronology of the attack
Eight Essential Elements for Effective Threat Intelligence Management May 2015
INTRODUCTION The most disruptive change to the IT security industry was ignited February 18, 2013 when a breach response company published the first research that pinned responsibility for Advanced Persistent
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model
Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model Stéphane Hurtaud Partner Governance Risk & Compliance Deloitte Laurent De La Vaissière Director Governance Risk & Compliance
Cybersecurity Awareness. Part 1
Part 1 Objectives Discuss the Evolution of Data Security Define and Discuss Cybersecurity Review Threat Environment Part 1 Discuss Information Security Programs s Enhancements for Cybersecurity Risks Threat
UNCLASSIFIED. http://www.govcertuk.gov.uk. General Enquiries. Incidents [email protected] Incidents [email protected].
Version 1.2 19-June-2013 GUIDELINES Incident Response Guidelines Executive Summary Government Departments have a responsibility to report computer incidents under the terms laid out in the SPF, issued
Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015
Cybersecurity: A Growing Concern for All Businesses RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015 RLI Design Professionals is a Registered Provider with The American
Threat Intelligence: An Essential Component of Cyber Incident Response. Jeanie M Larson, CISSP-ISSMP, CISM, CRISC
Threat Intelligence: An Essential Component of Cyber Incident Response Jeanie M Larson, CISSP-ISSMP, CISM, CRISC What are we going to cover? Setting the Stage Why is Incident Response Critical? Cyber Threat
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES
CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES The information provided in this document is presented as a courtesy to be used for informational purposes only. This information
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
FBI CHALLENGES IN A CYBER-BASED WORLD
FBI CHALLENGES IN A CYBER-BASED WORLD Federal Bureau of Investigation Assistant General Counsel Robert Bergida 202-651-3209 Overview Cyber Threats FBI Mission FBI Response Terrorism remains the FBI s top
US-CERT Overview & Cyber Threats
US-CERT Overview & Cyber Threats National Cyber Security Division United States Computer Emergency Readiness Team June 2006 Agenda Introduction to US-CERT Overview of why we depend on a secure cyberspace
Fraud and Abuse Policy
Fraud and Abuse Policy 2015 FRAUD AND ABUSE POLICY 2015 1 Contents 4. Introduction 6. Policy Goal 7. Combatting Customer Fraud and Abuse 8. Reporting Breaches 9. How Alleged Breaches Will Be Investigated
Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC
Cyber Security CHAD KNUTSON SECURE BANKING SOLUTIONS 2014 SECURE BANKING SOLUTIONS, LLC Presenter Chad Knutson Senior Information Security Consultant Masters in Information Assurance CISSP (Certified Information
Information Security and Risk Management
Information Security and Risk Management COSO and COBIT Standards and Requirements Page 1 Topics Information Security Industry Standards and COBIT Framework Relation to COSO Internal Control Risk Management
The anatomy of an online banking fraud
The anatomy of an online banking fraud or: Harvesting bank account data By Valentin Höbel. Mail to [email protected] (March2010) I. What this document is about II. Introduction III. The anatomy of an
Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow
Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned
Identifying Cyber Risks and How they Impact Your Business
10 December, 2014 Identifying Cyber Risks and How they Impact Your Business David Bateman, Partner, K&L Gates, Seattle Sasi-Kanth Mallela, Special Counsel, K&L Gates, London Copyright 2013 by K&L Gates
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
Microsoft s cybersecurity commitment
Microsoft s cybersecurity commitment Published January 2015 At Microsoft, we take the security and privacy of our customers data seriously. This focus has been core to our culture for more than a decade
Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP
Session 334 Incident Management Jeff Roth, CISA, CGEIT, CISSP SPEAKER BIOGRAPHY Jeff Roth, CISA, CGEIT Jeff Roth has over 25 years experience in IT audit, security, risk management and IT Governance experience
Cybersecurity The role of Internal Audit
Cybersecurity The role of Internal Audit Cyber risk High on the agenda Audit committees and board members are seeing cybersecurity as a top risk, underscored by recent headlines and increased government
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
How To Integrate Intelligence Based Security Into Your Organisation
Threat Intelligence Pty Ltd [email protected] 1300 809 437 Threat Intelligence Managed Intelligence Service Did you know that the faster you detect a security breach, the lesser the impact to
