DBIR SNAPSHOT: INTELLECTUAL PROPERTY THEFT
|
|
|
- Hannah Burns
- 10 years ago
- Views:
Transcription
1 DBIR SNAPSHOT: INTELLECTUAL PROPERTY THEFT A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-crime Unit, and United States Secret Service.
2 DATA BREACH INVESTIGATIONS REPORT A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information Security Service, Police Central e-crime Unit, and United States Secret Service.
3 Verizon s annual Data Breach Investigations Report (DBIR) 1 analyzes forensic evidence to uncover how sensitive data is stolen from organizations, who s stealing it, why they re doing it, how the victims responded, and what might have been done to prevent it. This Snapshot draws information from the DBIR data set, but gives highlights focused exclusively on 85 confirmed data breaches over the last two years resulting in the theft of intellectual property (IP) 2. As with the annual DBIRs, the findings in this Snapshot are arranged using the Vocabulary for Event Recording and Incident Sharing (VERIS) 3 framework and based on breaches investigated by Verizon s RISK Team or one of our partner organizations, which include the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting and Information Security Service, Police Central e-crime Unit, and United States Secret Service. Also like the DBIRs, all incidents in this snapshot involved confirmed unauthorized access and exfiltration of non-public information rather than potential exposures and other data-at-risk events. DBIR SNAPSHOT: INTELLECTUAL PROPERTY THEFT SUMMARY OF FINDINGS During presentations and discussions on the DBIR, we re often asked about targeted attacks, state-sponsored campaigns, industrial espionage, insider abuse, and other genres of breaches tied closely to intellectual property (IP) theft. This is understandable, since the issue is close to the heart of several industries such as manufacturing, government, financial and technology services, etc. Many hold that these incidents differ in various ways from those involving payment cards, personal information, and other fraud-driven attacks, and our data set appears to support this position. In almost all other areas we analyze, the target is nearly always one of opportunity. This is overwhelmingly the case with regard to verticals such as Retail or Accommodation and Food Services, but also mostly true of the Finance and Insurance industry and the Healthcare sector as well. However, when it comes to IP theft, the targeted nature of the attacks considerably changes how they are conceived and carried out. The fact that it is usually a different kind of threat agent those looking for highly sensitive information to be used for a specific purpose, as opposed to those only looking for a quick cash out also changes the game. In fact, their highly targeted nature makes these types of attacks more closely akin to each other than if we were to do an industry-specific slant. When it comes to IP theft, the targeted nature of the attacks considerably changes how they are conceived and carried out. 1 To learn more about the DBIR series, visit verizon.com/enterprise/dbir. 2 For the purposes of this report, Intellectual Property includes the following data varieties in VERIS: trade secrets, classified data, and copyrighted/trademarked material. 3 For more information on VERIS or any of the classifications used in this report, see veriscommunity.net. 1
4 VICTIM DEMOGRAPHICS Since organizations of all types produce and use IP, one might assume that IP theft would stretch across industry lines. And one would be correct; our investigations encompassed a wide range of victims suffering such losses. The financial services and public administration verticals account for two-thirds of the breaches in this dataset, while information/technology services and manufacturing split the remainder. The majority of these organizations were based in North America, but Asian and European victims are represented as well. All in all, these findings support the notion that adversaries target IP as a shortcut to attaining some manner of strategic, financial, technological, or related advantage. Table 1. Organizational size (number of employees) by number of breaches involving Intellectual Property theft Adversaries target IP as a shortcut to attaining some manner of strategic, financial, technological, or related advantage. 1 to to to 1, ,001 to 10, ,001 to 100, Over 100, In a departure from industry-centric subsets of our caseload, victim size tilts noticeably toward the upper end of the scale. Since larger organizations tend to have more (and/or more well-known) IP, this reflects their status as a prime target. At the same time, they typically have more resources to commit to a stronger security posture, so stealing their prized possessions often requires a different strategy. The following sections highlight some of the important aspects of that strategy. THREAT AGENTS Entities that cause or contribute to an incident are referred to as threat agents. VERIS recognizes three main categories of agents: those originating outside the victim organization (external), those inside the victim organization (internal), and those involving any third party sharing a business relationship with the victim (partner). However you slice it, the DBIR data set consistently shows that most breaches are the work of external threat agents. Whittling it down to IP theft doesn t change this, but it does take a dramatically different shape. Adding the percentages in Figure 1 yields an important distinction of IP-related breaches in our data set both outsiders and insiders are often involved. Clearly, there is a great deal of collusion, which accounts for these ratios topping 100 percent. Figure 1. Threat agents by percent of breaches involving Intellectual Property theft 87% We ll start with a look at the external agents. They often acted directly and maliciously, but also regularly solicited and/or aided others 46% (insiders) to do their bidding. It s difficult to characterize the external agents involved (and clients often didn t seek attribution), but professional criminal rings, activist groups, competitors, and statesponsored actors were identified or suspected. Those targeting IP are 1% typically in a different class (in resources, skills, and determination) External Internal Partner than the mainline fraudsters and script kiddies who perpetrate the bulk of cybercriminal activities across the Internet. While it is challenging to determine the true location of external adversaries (especially those with higher resources and capabilities), it s worth noting that over half of all intrusions originated from North America, about one-quarter from Asia, and 15% from Europe. Quite a few were unknown, and we ll leave the reader to make of these results what they will. 2
5 IP tends to reside deeper inside the organization under several layers of security, but insiders certainly know where it is and how to access it. For outsiders wishing to get at it with minimal risk and effort, recruiting insiders to participate often makes a good deal of sense. Regarding the types of insiders contributing to IP theft, regular IP tends to reside deeper inside the organization under several layers of security, but insiders certainly know where it is and how to access it. employees (end users) accounted for the largest percentage (roughly two-thirds). They were followed closely by financial staff and executives, and (since we know you re wondering) system/network admins brought up the rear. The take-home message here is that protecting IP from them is an incomplete and inadequate strategy. Understanding that we are sometimes our own enemy and sometimes the enemy targets its own is important to building good policy and practice for defending the crown jewels. THREAT ACTIONS Threat actions describe what the threat agent did to cause or to contribute to the breach. And when it comes to thieving IP, they re apparently willing to do quite a lot. Figure 2 and Table 2 illustrate well the diversity of methods employed to compromise this type of information. Figure 2. Threat action categories by percent of breaches involving Intellectual Property theft Malware 29% Hacking 47% Social 41% Misuse 51% Physical 7% Error 7% Whereas certain industries, such as Accommodation and Food Services 4, exhibit threat distributions that are heavily weighted toward hacking and malware, Figure 2 is remarkably more balanced. The de facto smash and grab scenario used to quickly exploit the payment processing infrastructure of many retailers and restaurants doesn t have a prayer of nabbing IP stored deep within the network. When simple automated attacks fail, determined adversaries will mix and match their methods until they find a successful combination. That may involve more advanced forms of hacking and malware and/or some good old-fashioned social engineering. Perhaps the services of an insider will be enlisted as well. The scenario originally discussed on pages 7 and 8 of the 2012 DBIR and republished here (Figure 3) is a fitting example of these multi-phased and multifaceted attacks. All of this results in a more diverse threat landscape, and, consequentially, the need for a more diverse control landscape. When simple automated attacks fail, determined adversaries will mix and match their methods until they find a successful combination. 4 The DBIR snapshot for the Accommodation and Food Services industry can be found at verizon.com/enterprise/travel. 3
6 Figure 3. Sample VERIS incident scenario E1 E2 E3 CE1 E4 External agent sends a phishing that successfully lures an executive to open the attachment. Malware infects the exec s laptop, creating a backdoor. External agent accesses the exec s laptop via the backdoor, viewing and other sensitive data. System administrator misconfigures access controls when building a new file server. External agent accesses a mapped file server from the exec s laptop and steals intellectual property. TE#280 External Social People Integrity TE#148 External Malware User Devices Integrity TE#130 External Hacking User Devices Confidentiality TE# 38 Internal Error Integrity TE#4 External Hacking Confidentiality E = Event CE = Conditional Event TE# = Threat Event Number Table 2 provides a more detailed list of common threat actions used to steal IP, and further underscores the diversity theme discussed above. Insiders abusing the system privileges granted to them to perform job duties take the top spot, and other forms of embezzlement and fraud make the list as well. In terms of external breaches, the reader will find no mention of default or easily guessable credentials among the top ten. Instead, intrusions leverage stolen credentials to access internal systems while appearing legitimate to anyone who might be monitoring network activity. Keyloggers are often the means of capturing those credentials, while backdoors afford a stealthy mechanism for retaining access over the long term (and as will be shown later, it can be a very long term). System and network utilities, created for valid use by administrators, can also be used maliciously in the wrong hands. Squeezing into the top ten, SQL injection was used to pull records and upload malware as part of the chain of events leading to the compromise. Table 2. Threat action varieties by percent of breaches involving Intellectual Property theft Rank Variety Category Breaches 1 Abuse of system access/privileges Misuse 45% 2 Use of stolen login credentials Hacking 34% 3 Pretexting (classic Social Engineering) Social 32% 4 Solicitation/Bribery Social 28% 5 Embezzlement, skimming, and related fraud Misuse 28% 6 Exploitation of backdoor or command and control channel Hacking 25% 7 Backdoor (allows remote access / control) Hacking 24% 8 Keylogger/Form-grabber/Spyware (capture data from user activity) Malware 22% 9 Send data to external site/entity Malware 22% 10 System/network utilities (PsTools, Netcat) Malware 22% 11 Brute force and dictionary attacks Hacking 20% 12 SQL Injection Hacking 20% 4
7 Demonstrating that networks and applications aren t the only vectors of attack, social tactics exploiting the human vector factored prominently as well. Pretexting (the use of invented scenarios to deceive and/or manipulate) and solicitation contributed to the success of many incidents. This reinforces the importance of protecting the carbon layer, which is a notoriously vulnerable and unpredictable component of the security model. COMPROMISED ASSETS To get a sense for what threat agents are targeting, and thus what s most in need of protecting, it s important to analyze the types of information assets affected by data breaches. Figure 4 records this information for incidents involving IP loss in our data set. In another interesting yet intuitive departure from run-of-the-mill cybercrimes, databases and file servers are the most often compromised. This is, quite simply, where most organizations store internal data and knowledge. Another popular form of long-term data storage, paper documents, also makes the list. This serves as a reminder that when we lock down file servers storing IP, we can t neglect to lock file drawers too. Figure 4. Compromised assets by percent of breaches involving Intellectual Property theft* Type Database server Category 48% File server Finance/Accounting staff Human resources staff Documents Regular employee/end-user Web/application server People People Offline Data People 32% 29% 29% 28% 28% 25% Mail server 12% Directory server (LDAP, AD) Executive/Upper Management Desktop/Workstation People User Devices 6% 6% 5% *Assets involved in less than 1% of breaches are not shown There s an old adage that says two people can keep a secret if one of them is dead, and looking at Figure 4, it s hard to argue with that bit of wisdom. Employees from the rank-and-file to upper-level executives were exploited in the process of obtaining organizational secrets. Some will find it odd that we treat people as assets, but in terms of processing, storing, and distributing information, they work similar to any other piece of hardware and software in the list. Plus, including people is yet another reminder that wetware is an asset that must be protected like any other. Employees from the rank-and-file to upper-level executives were exploited in the process of obtaining organizational secrets. 5
8 TIMELINE OF EVENTS Response time is a good indicator of the maturity of an organization s security program. No one wants to be the victim of a breach, but if that unfortunate event arises, it s certainly better to know sooner rather than later, to limit exposure and take proper corrective measures. Among the major phases we consider in an event scenario are: Initial Attack to Initial Compromise. The time spanning from the first malicious action taken against the victim until an information asset is negatively affected. Initial Compromise to Discovery. The time spanning from when the first asset is negatively affected until the victim learns of the incident. Discovery to Containment/Restoration. The time spanning from when the victim learns of the incident until data is no longer actively exposed. For a more complete accounting of incident scenario phases, please refer to the DBIR. Figure 5. Timespan of events by percent of breaches involving Intellectual Property theft Seconds Minutes Hours Days Weeks Months Years Initial Attack to Initial Compromise 7% 16% 54% 10% 10% 2% 2% Initial Compromise to Discovery 0% 0% 15% 19% 20% 17% 31% Discovery to Containment/Restoration 0% 0% 5% 22% 12% 53% 8% We debated whether or not to present statistics for the initial attack to initial compromise phase in Figure 5 due to a high amount of unknowns. Instead of omitting potentially useful information, however, we ll just caveat it. In many cases, it was difficult to pinpoint a precise time when the attack began especially since so many of these used human vectors, which don t record a timestamp in a log. Reviewing the numbers at face value shows a distribution clustered around hours, and the tail to the right suggests IP thieves are willing to expend significant time and effort to gain that initial foothold into the victim. Whereas our historical findings consistently show breach discovery timeframes in the months category, IP theft frequently takes years to discover. 6
9 The second row is simply fascinating. Whereas our historical findings consistently show breach discovery timeframes in the months category, IP theft frequently takes years to discover. Reasons for this are numerous, but the biggest among them is that the criminal usually dictates both the timeframe and method of discovery. When they begin using stolen data for fraud, the victim will then be notified of the breach by the payment card brands. Since IP is not used for post-breach fraud, this mechanism of discovery does not come into play. Instead, you look up a couple years later and wonder at the surprising similarity between your gizmo and the enhanced version your competitor just launched. The ironic truth is that without the help of the credit card companies and their comparatively mature and effective fraud detection mechanisms, we re left to our own devices. And the track record on that is not good. To add insult to injury, it often takes quite a while before the breach is successfully contained. Once organizations realize that they ve been victimized, it s crucial they mount a swift and competent response. But due to the complexity and longevity of many IP-related breaches, identifying all systems involved can be a real challenge. After remediating all (known) systems in scope, it s quite common that backdoors and other various hooks into the environment still exist. Thus, containment can become a drawn-out game of plugging holes and waiting for leaks to spring up elsewhere. RECOMMENDATIONS FOR PREVENTING INTELLECTUAL PROPERTY THEFT Because our dataset and, therefore our findings, evolve over time and encompass victims of different types, sizes and geographic locations, creating a single list of recommendations that work equally and effectively for all organizations is unrealistic. Our basic advice beyond covering the security essentials is to adopt a common sense, evidence-based approach to managing security. Learn what threats and failures most often affect organizations like yours, and then make sure your security posture puts you in a position to thwart them. There is no silver bullet that can guarantee protection against IP theft. The diversity, complexity, and ingenuity of tactics preclude a one-size-fits-all solution. As our findings have shown, however, there are several common factors across successful attacks that warrant attention. Insider abuse whether premeditated or requisitioned through trickery is a favored method of filching IP. And if an insider won t cooperate, stealing their credentials will work almost as well. Short of that, brute-forcing or using SQL injection against web applications stands a good chance of success. However unauthorized access is accomplished, attackers will always want to expand and retain it, and that s where system utilities and backdoors come into play. Given all that, a few recommendations are provided below. The diversity, complexity, and ingenuity of tactics preclude a one-size-fits-all solution. Privileged Users Trust but verify. Use pre-employment screening to eliminate the problem before it starts. Don t give users more privileges than they need (this is a biggie) and use separation of duties. Make sure they have direction (they know policies and expectations) and supervision (to make sure they adhere to them). Privileged use should be logged and generate messages to management. Unplanned privileged use should generate alarms and be investigated. Training and Awareness Increase awareness of social engineering: educate employees about different methods of social engineering and the vectors from which these attacks could arise. In many of our cases, we see users clicking on links they shouldn t and opening attachments received from unidentified persons. Reward users for reporting suspicious people, interactions, , or websites and create the incentives necessary for vigilance. 7
10 Stolen Credentials Keeping credential-capturing malware off systems is priority number one. Consider two-factor authentication where appropriate. If possible, implement time-of-use rules, IP blacklisting (consider blocking large address blocks/regions if they have no legitimate business purpose), and restricting administrative connections (i.e., only from specific internal sources). Employing a last logon banner and training users to report/change passwords upon suspicion of theft also have promise. Secure Development Focus on application testing and code review. While SQL injection attacks are the most common, cross-site scripting, authentication bypass, and exploitation of session variables contributed to many of the network-based attacks. As with everything else, put out the fires first: even lightweight web application scanning and testing would have found many of the problems that led to the breaches we ve analyzed. Next, include regular reviews of architecture, privileges, and source code. Incorporating a Security Development Life-Cycle (SDLC) approach for application development is recommended as well. Finally, help your developers learn to appreciate and write more secure code. Log Monitoring and Analysis Monitor and filter network egress traffic. At some point during the sequence of events in many breaches, something (data, communications, connections) goes out that, if prevented, could break the chain and stop the breach. By monitoring, understanding, and controlling outbound traffic, an organization will greatly increase its chances of mitigating malicious activity. Enable application and network logs and monitor them. All too often, evidence of events leading to breaches was available to the victim but this information was neither noticed nor acted upon. Processes that provide sensible, efficient, and effective monitoring and response are critical to protecting data. However, don t just focus your logging efforts on network, operating system, IDS, and firewall logs but neglect remote access services, web applications, databases, and other critical applications. These can be a rich data set for detecting, preventing, and investigating breaches. All too often, evidence of events leading to breaches was available to the victim but was neither noticed nor acted upon. Define suspicious and anomalous (then look for whatever it is). This is admittedly vague, but in truth generalizing what this entails in order to prescribe something for everyone would counteract the point. Discover what is critical, identify what constitutes normal behavior, and then set focused mechanisms in place to look for it and sound the alert upon deviations from normality. Change your approach to event monitoring and log analysis. Based on the timeline of many attacks, we believe that organizations would be better served to focus less on the real-time methods of detection, and more on this-day or this-week methods. Focus on the obvious things rather than the minutia. This need not be expensive; a simple script to count log lines/length and send an alert if out of tolerance can be quite effective. We re confident that this approach will reap benefits and save time, effort, and money. 8
11 To learn more about these findings or solutions to help your organization address similar concerns in your enterprise, contact your account manager or visit verizon.com/enterprise/security.
12 10
13 verizon.com/enterprise 2012 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon s products and services are trademarks and service marks or registered trademarks and service marks of Verizon Trademark Services LLC or its affiliates in the United States and/or other countries. All other trademarks and service marks are the property of their respective owners. MC /12.
DBIR INDUSTRY SNAPSHOT: FINANCE AND INSURANCE
DBIR INDUSTRY SNAPSHOT: FINANCE AND INSURANCE A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information
2012 Data Breach Investigations Report
2012 Data Breach Investigations Report A study conducted by the Verizon RISK Team with cooperation from the Australian Federal Police, Dutch National High Tech Crime Unit, Irish Reporting & Information
Defending Against Attacks by Modeling Threat Behaviors
Defending Against Attacks by Modeling Threat Behaviors John Benninghoff Transvasive Security Transparent and Pervasive Security 2013 Verizon DBIR Recommendations What can we do about it? Collect, analyze
2010 Data Breach Investigations Report
2010 Data Breach Investigations Report Matthijs van de Wel Managing Principal Forensics EMEA 2010 Verizon. All Rights Reserved. PTE14626 07/10 PROPRIETARY STATEMENT This document and any attached materials
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
INVESTIGATIONS REPORT
2014 DATA BREACH INVESTIGATIONS REPORT Executive Summary INSIDER MISUSE DOS ATTACKS MISCELLANEOUS ERRORS PHYSICAL THEFT AND LOSS CYBER-ESPIONAGE CRIMEWARE PAYMENT CARD SKIMMERS WEB APP ATTACKS 92 % THE
defending against advanced persistent threats: strategies for a new era of attacks agility made possible
defending against advanced persistent threats: strategies for a new era of attacks agility made possible security threats as we know them are changing The traditional dangers IT security teams have been
Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte
Cyber security Time for a new paradigm Stéphane Hurtaud Partner Information & Technology Risk Deloitte 90 More than ever, cyberspace is a land of opportunity but also a dangerous world. As public and private
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.
What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY
SMALL BUSINESSES WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY ONE CLICK CAN CHANGE EVERYTHING SMALL BUSINESSES My reputation was ruined by malicious emails ONE CLICK CAN CHANGE EVERYTHING Cybercrime comes
7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com
7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information
Advanced Threat Protection with Dell SecureWorks Security Services
Advanced Threat Protection with Dell SecureWorks Security Services Table of Contents Summary... 2 What are Advanced Threats?... 3 How do advanced threat actors operate?... 3 Addressing the Threat... 5
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen. 14th Annual Risk Management Convention
Cyber/IT Risk: Threat Intelligence Countering Advanced Adversaries Jeff Lunglhofer, Principal, Booz Allen 14th Annual Risk Management Convention New York, New York March 13, 2013 Today s Presentation 1)
Streamlining Web and Email Security
How to Protect Your Business from Malware, Phishing, and Cybercrime The SMB Security Series Streamlining Web and Email Security sponsored by Introduction to Realtime Publishers by Don Jones, Series Editor
Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge
Targeted Intrusion Remediation: Lessons From The Front Lines Jim Aldridge All information is derived from MANDIANT observations in non-classified environments. Information has beensanitized where necessary
Network and Host-based Vulnerability Assessment
Network and Host-based Vulnerability Assessment A guide for information systems and network security professionals 6600 Peachtree-Dunwoody Road 300 Embassy Row Atlanta, GA 30348 Tel: 678.443.6000 Toll-free:
A Database Security Management White Paper: Securing the Information Business Relies On. November 2004
A Database Security Management White Paper: Securing the Information Business Relies On November 2004 IPLocks, Inc. 441-A W. Trimble Road, San Jose, CA 95131 USA A Database Security Management White Paper:
Spear Phishing Attacks Why They are Successful and How to Stop Them
White Paper Spear Phishing Attacks Why They are Successful and How to Stop Them Combating the Attack of Choice for Cybercriminals White Paper Contents Executive Summary 3 Introduction: The Rise of Spear
September 20, 2013 Senior IT Examiner Gene Lilienthal
Cyber Crime September 20, 2013 Senior IT Examiner Gene Lilienthal The following presentation are views and opinions of the speaker and does not necessarily reflect the views of the Federal Reserve Bank
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
Web Security. Discovering, Analyzing and Mitigating Web Security Threats
Web Security Discovering, Analyzing and Mitigating Web Security Threats Expectations and Outcomes Mitigation strategies from an infrastructure, architecture, and coding perspective Real-world implementations
THE 2014 THREAT DETECTION CHECKLIST. Six ways to tell a criminal from a customer.
THE 2014 THREAT DETECTION CHECKLIST Six ways to tell a criminal from a customer. Telling criminals from customers online isn t getting any easier. Attackers target the entire online user lifecycle from
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security
Analyzing Security for Retailers An analysis of what retailers can do to improve their network security Clone Systems Business Security Intelligence Properly Secure Every Business Network Executive Summary
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012
2012 雲 端 資 安 報 告 黃 建 榮 資 深 顧 問 - Verizon Taiwan August 2012 1 It s All About Security Protecting assets from threats that could impact the business Protecting Assets... Stationary data Data in transit
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Best Practices: Reducing the Risks of Corporate Account Takeovers
Best Practices: Reducing the Risks of Corporate Account Takeovers California Department of Financial Institutions September 2012 INTRODUCTION A state led cooperative effort, including the United States
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
Incident Response. Six Best Practices for Managing Cyber Breaches. www.encase.com
Incident Response Six Best Practices for Managing Cyber Breaches www.encase.com What We ll Cover Your Challenges in Incident Response Six Best Practices for Managing a Cyber Breach In Depth: Best Practices
Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth
Modern Cyber Threats how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure Axel Wirth Healthcare Solutions Architect Distinguished Systems Engineer AAMI 2013 Conference
10 Quick Tips to Mobile Security
10 Quick Tips to Mobile Security 10 Quick Tips to Mobile Security contents 03 Introduction 05 Mobile Threats and Consequences 06 Important Mobile Statistics 07 Top 10 Mobile Safety Tips 19 Resources 22
After the Attack. The Transformation of EMC Security Operations
After the Attack The Transformation of EMC Security Operations Thomas Wood Senior Systems Engineer, GSNA CISSP RSA, The Security Division of EMC [email protected] 1 Agenda Review 2011 Attack on RSA
Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst
ESG Brief Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst Abstract: APTs first came on the scene in 2010, creating a wave
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal
WHITE PAPER SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM Why Automated Analysis Tools are not Created Equal SECURITY REIMAGINED CONTENTS Executive Summary...3 Introduction: The Rise
ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001
001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110
Application Security in the Software Development Lifecycle
Application Security in the Software Development Lifecycle Issues, Challenges and Solutions www.quotium.com 1/15 Table of Contents EXECUTIVE SUMMARY... 3 INTRODUCTION... 4 IMPACT OF SECURITY BREACHES TO
WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR
KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST Protecting Identities. Enhancing Reputations. IDT911 1 DATA BREACHES AND SUBSEQUENT IDENTITY THEFT AND FRAUD THREATEN YOUR ORGANIZATION
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES. By James Christiansen, VP, Information Risk Management
White Paper THE FOUR ATTACK VECTORS TO PREVENT OR DETECT RETAILER BREACHES By James Christiansen, VP, Information Risk Management Executive Summary Security breaches in the retail sector are becoming more
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
Compliance Guide ISO 27002. Compliance Guide. September 2015. Contents. Introduction 1. Detailed Controls Mapping 2.
ISO 27002 Compliance Guide September 2015 Contents Compliance Guide 01 02 03 Introduction 1 Detailed Controls Mapping 2 About Rapid7 7 01 INTRODUCTION If you re looking for a comprehensive, global framework
Data Loss Prevention Program
Data Loss Prevention Program Safeguarding Intellectual Property Author: Powell Hamilton Senior Managing Consultant Foundstone Professional Services One of the major challenges for today s IT security professional
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
ICTN 4040. Enterprise Database Security Issues and Solutions
Huff 1 ICTN 4040 Section 001 Enterprise Information Security Enterprise Database Security Issues and Solutions Roger Brenton Huff East Carolina University Huff 2 Abstract This paper will review some of
How To Create Situational Awareness
SIEM: The Integralis Difference January, 2013 Avoid the SIEM Pitfalls Get it right the first time Common SIEM challenges Maintaining staffing levels 24/7 Blended skills set, continuous building of rules
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
Getting real about cyber threats: where are you headed?
Getting real about cyber threats: where are you headed? Energy, utilities and power generation companies that understand today s cyber threats will be in the best position to defeat them June 2011 At a
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES
ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES Leonard Levy PricewaterhouseCoopers LLP Session ID: SEC-W03 Session Classification: Intermediate Agenda The opportunity Assuming
Perspectives on Cybersecurity in Healthcare June 2015
SPONSORED BY Perspectives on Cybersecurity in Healthcare June 2015 Workgroup for Electronic Data Interchange 1984 Isaac Newton Square, Suite 304, Reston, VA. 20190 T: 202-618-8792/F: 202-684-7794 Copyright
Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk
Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk John Hawley VP, Security CA Technologies September 2015 Today s Theme: Preparing for the Adversary How to Prepare Your Organization
Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services
Real World Healthcare Security Exposures Brian Selfridge, Partner, Meditology Services 2 Agenda Introduction Background and Industry Context Anatomy of a Pen Test Top 10 Healthcare Security Exposures Lessons
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER
DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND Introduction > New security threats are emerging all the time, from new forms of malware and web application exploits that target
LASTLINE WHITEPAPER. Using Passive DNS Analysis to Automatically Detect Malicious Domains
LASTLINE WHITEPAPER Using Passive DNS Analysis to Automatically Detect Malicious Domains Abstract The domain name service (DNS) plays an important role in the operation of the Internet, providing a two-way
Breaking the Cyber Attack Lifecycle
Breaking the Cyber Attack Lifecycle Palo Alto Networks: Reinventing Enterprise Operations and Defense March 2015 Palo Alto Networks 4301 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com
Into the cybersecurity breach
Into the cybersecurity breach Tim Sanouvong State Sector Cyber Risk Services Deloitte & Touche LLP April 3, 2015 Agenda Setting the stage Cyber risks in state governments Cyber attack vectors Preparing
INDUSTRY OVERVIEW: FINANCIAL
ii IBM MSS INDUSTRY OVERVIEW: FINANCIAL RESEARCH AND INTELLIGENCE REPORT RELEASE DATE: NOVEMBER 5, 2014 BY: JOHN KUHN, SENIOR THREAT RESEARCHER iii TABLE OF CONTENTS EXECUTIVE OVERVIEW... 1 MAJOR FINANCIAL
AB 1149 Compliance: Data Security Best Practices
AB 1149 Compliance: Data Security Best Practices 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: AB 1149 is a new California
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams. May 2014. TrustInAds.org. Keeping people safe from bad online ads
Bad Ads Trend Alert: Shining a Light on Tech Support Advertising Scams May 2014 TrustInAds.org Keeping people safe from bad online ads OVERVIEW Today, even the most tech savvy individuals can find themselves
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.
Retail Security: Enabling Retail Business Innovation with Threat-Centric Security. 2015 Cisco and/or its affiliates. All rights reserved. This document is Cisco public information. (1110R) 1 In the past
Presented by: Mike Morris and Jim Rumph
Presented by: Mike Morris and Jim Rumph Introduction MICHAEL MORRIS, CISA Systems Partner JIM RUMPH, CISA Systems Manager Objectives To understand how layered security assists in securing your network
Effective Software Security Management
Effective Software Security Management choosing the right drivers for applying application security Author: Dharmesh M Mehta [email protected] / [email protected] Table of Contents Abstract... 1
V ISA SECURITY ALERT 13 November 2015
V ISA SECURITY ALERT 13 November 2015 U P DATE - CYBERCRIMINALS TARGE TING POINT OF SALE INTEGRATORS Distribution: Value-Added POS Resellers, Merchant Service Providers, Point of Sale Providers, Acquirers,
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Cyber Security. An Executive Imperative for Business Owners. 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799
Cyber Security An Executive Imperative for Business Owners SSE Network Services www.ssenetwork.com 77 Westport Plaza, St. Louis, MO 63416 p 314.439.4700 f 314.439.4799 Pretecht SM by SSE predicts and remedies
Intro. Tod Ferran, CISSP, QSA. SecurityMetrics. 2 years PCI and HIPAA security consulting, performing entity compliance audits
HIPAA Security Rule & Live Hack Tod Ferran, CISSP, QSA Intro Tod Ferran, CISSP, QSA 25 years working with IT and physical security 2 years PCI and HIPAA security consulting, performing entity compliance
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT
TOP REASONS WHY SIEM CAN T PROTECT YOUR DATA FROM INSIDER THREAT Would you rather know the presumed status of the henhouse or have in-the-moment snapshots of the fox? If you prefer to use a traditional
Teradata and Protegrity High-Value Protection for High-Value Data
Teradata and Protegrity High-Value Protection for High-Value Data 03.16 EB7178 DATA SECURITY Table of Contents 2 Data-Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:
Information Security Incident Management Guidelines
Information Security Incident Management Guidelines INFORMATION TECHNOLOGY SECURITY SERVICES http://safecomputing.umich.edu Version #1.0, June 21, 2006 Copyright 2006 by The Regents of The University of
Web Application Security
Chapter 1 Web Application Security In this chapter: OWASP Top 10..........................................................2 General Principles to Live By.............................................. 4
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
HIGH-RISK USER MONITORING
HIGH-RISK USER MONITORING Using ArcSight IdentityView to Combat Insider Threats HP Enterprise Security Business Whitepaper Overview Security professionals once defended their networks against bots and
Comprehensive Advanced Threat Defense
1 Comprehensive Advanced Threat Defense June 2014 PAGE 1 PAGE 1 1 INTRODUCTION The hot topic in the information security industry these days is Advanced Threat Defense (ATD). There are many definitions,
