Fraud and Data Exfiltration: Defending Against the Mobile Explosion
|
|
|
- Marion Barker
- 10 years ago
- Views:
Transcription
1 Fraud and Data Exfiltration: Defending Against the Mobile Explosion Aaron Turner N4STRUCT Randy V. Sabett ZwillGen PLLC Session ID: LAW-401 Session Classification: Intermediate
2 Introductions Aaron Turner Partner at newly-formed Security Consultancy Randy V. Sabett, J.D., CISSP Counsel at the Boutique Law Firm 2
3 Disclaimer (you HAD to be expecting this ) Nothing we discuss today constitutes legal advice. For any specific questions, seek the independent advice of your attorney. 3
4 Premise & Format Aaron will play the role of a Fortune 500 CIO ~10,000 employees spread across 12 countries Randy will play the role of outside counsel Will say it depends a lot Role play will revolve around two issues: Company is facing increased costs associated with SMS fraud on company-liable mobile service subscriptions Anecdotal evidence that increasing amounts of corporate data are flowing through mobile networks cross-connected to the corporate network 4
5 Specific Case 1 Internal audit controls flagged last quarter s payments to mobile service providers as 130% of planned expenditures Audit team informed technology procurement Technology procurement team manually reviewed billing statements Review resulted in finding 1000 s of premium international SMS messages sent from company-liable accounts 5
6 Specific Case 2 4G WiFi router observed in Guangdon, China offices WiFi monitoring equipment detected presence of WPA-protected signal in/near company office space with the SSID of CARRIER-4G-0254 Despite multiple physical search attempts, device has not been located 6
7 Specific Case 3 Abnormal 2G reception reported by users at US Headquarters offices Previously, GSM phone users had seen excellent 3G coverage Beginning about 90 days ago, users started noticing 2G coverage throughout the building Significant data synchronization errors noticed at Mobile Synchronization Gateway for users with mobile devices at US HQ 7
8 Case 1: International Service Fraud 8
9 Monitoring International Service Fraud Requires some sort of audit function on company-liable lines of service Usually manifests itself as a premium service charge on the monthly statement How it happens User gets a TXT that says You ve been selected as a candidate to get a special incentive from <COMPANY> - reply to this message for more details Reply-to SMS # is formatted as something like (if HQ is in Dallas for example) Financial impact Some Premium-rate SMS responses can charge up to $10 per message depending on Carrier controls/agreements 9
10 CIO Gets the Bill Potential for Claw-back? Over the last 90 days CIO gets report of $12,500 in international premium service charges Initial investigation appears to have uncovered a targeted SMiShing campaign asking users to register for a corporate pilot program : Reply now to be eligible for COMPANY s ipad2 pilot program 1000 s of users affected, but difficult to quantify precisely how many targeted beyond BES-connected users Perpetrators appear to have a comprehensive list of companyassociated mobile # s (copy of the GAL?) What potential for Claw-back is there for Company with Carriers? 10
11 Attorney lays out the SMiShing options No laws covering this type of attack (yet) Even if there were, would mostly focus on consumer In a commercial setting, most recourse questions will come down to the contract Does the K address fraudulent use of carrier network? What about the SLA? Can company report SMiShing? If so, any recourse? Think about all of these PRIOR to provisioning!! Also, don t forget about putting SMiShing in your training program 11
12 Case 2: Rogue 4G WiFi Hotspot 12
13 State of 4G/WiFi monitoring Fairly mature technologies available for WiFi monitoring Very few organizations that are enforcing WiFi security policies VERY immature technologies available for enterprise 4G monitoring Explosion of low-cost, high-speed personal WiFi devices with 4G capabilities For the price of a monthly home high-speed internet connection, people can take their internet with them wherever they go Real-world Impact In 5 Fortune 500 firms last year, 100 s of 4G devices detected all over the world 13
14 CIO gets an incident report Business group has been informed that much of their intellectual property has been found on opensource sites Root cause analysis of network flows traced significant data flows to 3 individuals in the group Additional investigation from HR reveals that those 3 are all leaving the company for various reasons WiFi monitor logs show MiFi-esque SSID in the area of the 3 employees Employment-law action underway Are there technology options to monitor for this in the future? 14
15 4G MiFi detection options WiFi detection is very mature Detailed reporting options Most organizations do not have the maturity/culture to take automated action upon detection MiFi s can be tethered, thereby avoiding the WiFi detectors What do you do to find a tethered 4G device? USB device policies? Bluetooth restrictions? The root cause is 4G We have not seen enterprises with 4G detection capabilities deployed for real-time reporting Monitoring technology exists, but vendors are anxious at letting it loose to enterprises 15
16 Attorney lays out the 4G options Aaron called it for this one I m going to use the ol fallback of it depends There s that pesky 18 U.S.C (ECPA) that prevents eavesdropping, BUT there are exceptions (some of which depend on the role): Consent most important one in an enterprise setting Safety activity which is a necessary incident to the rendition of [the] service or to the protection of the rights or property of the provider of that service Hate to say it, but again back to the contract (in this case the original employment contract) 16
17 Case 3: 2G Service Anomalies 17
18 Mobile service anomalies at US HQ For the last 90 days, users have seen significant service degradation Poor data service and many dropped calls Mobile device synchronization logs show many failed sync attempts 2G service degradation integrity indicator? 3G is hard to crack, so all mobile service hackers force a service downgrade to 2G and then intercept the traffic Most hackers-for-hire do not have the equipment necessary to handle all of the TCP/IP that is flowing through, resulting in significant GPRS/EDGE protocol errors which then cause strange TCP/IP traffic Information Security impact Most 2G security incidents are voice/sms driven 18
19 Can a CIO even monitor voice/sms integrity? Technology is available to monitor cellular integrity, but has not been deployed by enterprises Can an enterprise monitor licensed radio spectrum? What new paradigms will emerge based on mobile communications integrity challenges? Can an enterprise own the spectrum within their building? On their property? 19
20 Attorney lays out the 2G integrity options Similar to 4G use case ECPA generally prevents monitoring of these kinds of signals but can look to exceptions Consent Safety Ownership of spectrum a remote possibility but few companies likely can pursue this under the current procedures 20
21 BUT WAIT A MINUTE!?!? 21
22 What to do now 22
23 Immediate action items Initiate a mobile service audit Invest in a mobile service billing platform Negotiate premium rate service controls with carriers Make employees aware of SMiShing risks Design a MiFi controls plan WiFi controls Tethering controls Engage legal to do a contracts audit 4G/2G controls Stay tuned lots happening in the next months 23
24 Contact info Aaron Turner Randy Sabett blog.zwillgen.com 24
Tracking Employees Via Mobile Devices: Legal or Not?
Tracking Employees Via Mobile Devices: Legal or Not? Aaron Turner President, IntegriCell Randy Sabett Counsel, ZwillGen PLLC Session ID: LAW W23 Session Classification: Intermediate This presentation is
Wireless Local Area Network Deployment and Security Practices
HIGHLIGHTS AUDIT REPORT Wireless Local Area Network Deployment and April 24, 2014 Report Number HIGHLIGHTS BACKGROUND: The U.S. Postal Service is committed to providing a high quality, secure, and cost-effective
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks
Designing, Securing and Monitoring 802.11a/b/g/n Wireless Networks The importance of Wireless today Increasingly in the Corporate Environment, Wireless is becoming an enabling technology to facilitate
Ecom Infotech. Page 1 of 6
Ecom Infotech Page 1 of 6 Page 2 of 6 IBM Q Radar SIEM Intelligence 1. Security Intelligence and Compliance Analytics Organizations are exposed to a greater volume and variety of threats and compliance
How To Use Icem
DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, operators
Nine Use Cases for Endace Systems in a Modern Trading Environment
FINANCIAL SERVICES OVERVIEW Nine Use Cases for Endace Systems in a Modern Trading Environment Introduction High-frequency trading (HFT) accounts for as much as 75% of equity trades in the US. As capital
Wireless Networking for Small Businesses, Branches and Home Offices
Wireless Networking for Small Businesses, Branches and Home Offices Whether one believes in the Internet revolution or not, it is true that the Internet today has become an essential element in running
DataSheet. A complete view of the customer. What is Accanto s icem?
DataSheet icem: A complete view of the customer To overcome the challenges of decreasing margins from voice services, whilst catering for high cost network investments due to high data consumption, Operators
8x8 Virtual Office Mobile User Guide for ios
8x8 User Guide for ios Works with iphone, ipad and ipod Touch Version 3.0, August 2012 The Champion For Business Communications Table of Contents Introduction...3 Features...3 Technical Requirements...4
Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access
Cisco Outdoor Wireless Mesh Enables Alternative Broadband Access Cisco ServiceMesh defines a network design for service providers delivering valueadded municipal wireless services over a mesh network.
1 Purpose... 2. 2 Scope... 2. 3 Roles and Responsibilities... 2. 4 Physical & Environmental Security... 3. 5 Access Control to the Network...
Contents 1 Purpose... 2 2 Scope... 2 3 Roles and Responsibilities... 2 4 Physical & Environmental Security... 3 5 Access Control to the Network... 3 6 Firewall Standards... 4 7 Wired network... 5 8 Wireless
How To Secure Your Store Data With Fortinet
Securing Wireless Networks for PCI Compliance Using Fortinet s Secure WLAN Solution to Meet Regulatory Requirements Introduction In the wake of many well-documented data breaches, standards such as the
Case Study: Smart Phone Deleted Data Recovery
Case Study: Smart Phone Deleted Data Recovery Company profile McCann Investigations is a full service private investigations firm providing complete case solutions by employing cutting-edge computer forensics
Accelerated Cellular Extender: Model 6200-FX Accelerated View Remote Management
Accelerated Cellular Extender: Model 6200-FX Accelerated View Remote Management Jason Dorough VP of Sales [email protected] +1-813-699-3104 1 Accelerated 6200-FX Solution Overview Accelerated
Best Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
Wireless LANs vs. Wireless WANs
White Paper Wireless LANs vs. Wireless WANs White Paper 2130273 Revision 1.0 Date 2002 November 18 Subject Supported Products Comparing Wireless LANs and Wireless WANs Wireless data cards and modules,
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention
Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention Your Security Challenges Defending the Dynamic Network! Dynamic threats 䕬 䕬 䕬 䕬 Many threats
Federal Bureau of Investigation. Los Angeles Field Office Computer Crime Squad
Federal Bureau of Investigation Los Angeles Field Office Computer Crime Squad Overview FBI and Infrastructure Protection Cyber Crime Cases Cyber Law What to do Infrastructure Protection: Traditional Threat
FIGHTING FRAUD ON 4G. Neutralising threats in the LTE ecosystem
FIGHTING FRAUD ON 4G Neutralising threats in the LTE ecosystem TABLE OF CONTENTS Introduction...3 New and Old Vulnerabilities...4 Identity Management...5 A Unified Response...6 Data Mining...7 An Evolving
Wireless Tools. Training materials for wireless trainers
Wireless Tools Training materials for wireless trainers This talk covers tools that will show you a great deal of information about wireless networks, including network discovery, data logging, security
MAKING THE RIGHT CONNECTIONS
MAKING THE RIGHT CONNECTIONS The risks of using public Wi-Fi for business The Connected Workplace Series The Rise of Mobile Devices in the Workplace Laptop shipments have surpassed desktop shipments, smartphone
Smart VoIP Enabling Mobile Operators to Deliver OTT VoIP
Enabling Mobile Operators to Deliver OTT Kineto Wireless, Inc. 1601 McCarthy Blvd. Milpitas, CA 95035 Tel: +1 408 546 0660 2012 Kineto Wireless, Inc. All rights reserved. www.kineto.com Introduction Today
WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance
WHITE PAPER Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance The objective of this white paper is to
WiFi Anywhere. Multi Carrier 3G/4G WiFi Router. IntraTec Solutions Ltd www.intratec-uk.com
WiFi Anywhere Multi Carrier 3G/4G WiFi Router Contents Packing List... 3 Introduction... 3 Supported USB Modems... 3 Connecting USB Devices... 3 Accessing the Web Interface... 4 Interfaces... 4 Configuring
Bring Your Own Device. Individual Liable User Policy Considerations
Bring Your Own Device Individual Liable User Contents Introduction 3 Policy Document Objectives & Legal Disclaimer 3 Eligibility Considerations 4 Reimbursement Considerations 4 Security Considerations
BlackBerry Enterprise Server Express. Why upgrade from your current BlackBerry experience?
BlackBerry Enterprise Server Express Why upgrade from your current BlackBerry experience? Introducing BlackBerry Enterprise Server Express BlackBerry software transforms your smartphone into a productivity
Strategically Detecting And Mitigating Employee Fraud
A Custom Technology Adoption Profile Commissioned By SAP and Deloitte March 2014 Strategically Detecting And Mitigating Employee Fraud Executive Summary Employee fraud is a universal concern, with detection
8x8 Virtual Office Mobile User Guide for Android
8x8 User Guide for Android May 2012 The Champion For Business Communications Table of Contents Introduction... 3 Verify Your Android Version...4 Getting Started.... 5 Installation......................................
Connecting your Aiki phone to a network
Connecting your Aiki phone to a network Connect to mobile networks Depending on your carrier and service plan, your phone may connect automatically to your carrier s fastest available data network. Or
Small and Midsize Business Protection Guide
P r o t e c t i o n G u i d e : C l o s e t h e P r o t e c t i o n G a p Small and Midsize Business Protection Guide Close the protection gap and safeguard your business future Confidence in a connected
End-user Security Analytics Strengthens Protection with ArcSight
Case Study for XY Bank End-user Security Analytics Strengthens Protection with ArcSight INTRODUCTION Detect and respond to advanced persistent threats (APT) in real-time with Nexthink End-user Security
Why MVNOs and Carriers Aren t Right for Your M2M Application
Why MVNOs and Carriers Aren t Right for Your M2M Application Introduction No matter your industry, deploying a machine-to-machine (M2M) application is a complex endeavor. Based on your business requirements,
Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere
Solution Overview BYOD Smart Solution Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere 2012 Cisco and/or its affiliates. All rights reserved. This document
Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy
Using AirWave RAPIDS Rogue Detection to Implement Your Wireless Security and PCI Compliance Strategy Table of Contents Introduction 3 Using AirWave RAPIDS to detect all rogues on your network 4 Rogue device
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP
Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP Principal Systems Engineer Symantec LAMC Agenda 1 What DLP is and its purpose 2 Challenges
Professional Services Overview
Professional Services Overview INFORMATION SECURITY ASSESSMENT AND ADVISORY NETWORK APPLICATION MOBILE CLOUD IOT Praetorian Company Overview HISTORY Founded in 2010 Headquartered in Austin, TX Self-funded
Contact: Henry Torres, (870) 972-3033
Information & Technology Services Management & Security Principles & Procedures Executive Summary Contact: Henry Torres, (870) 972-3033 Background: The Security Task Force began a review of all procedures
VOIP Attacks On The Rise
VOIP Attacks On The Rise Voice over IP (VoIP) infrastructure has become more susceptible to cyber-attack due to the proliferation of both its use and the tools that can be used for malicious purposes.
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
QTEL MOBILE EMAIL CORPORATE EDITION
QTEL MOBILE EMAIL CORPORATE EDITION Overview With Qtel Mobile Email Corporate Edition, you ve got a secure, easy mobile email solution you can deploy across your entire organization, keeping your employees
The Key to Successful Monitoring for Detection of Insider Attacks
The Key to Successful Monitoring for Detection of Insider Attacks Dawn M. Cappelli Randall F. Trzeciak Robert Floodeen Software Engineering Institute CERT Program Session ID: GRC-302 Session Classification:
CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:
1. Do you implement virus controls and filtering on all systems? Anti-Virus anti-virus software packages look for patterns in files or memory that indicate the possible presence of a known virus. Anti-virus
Flexy-ble M2M router for remote access and data services. Industrial M2M Router. www.ewon.biz
-ble M2M router for remote access and data services Industrial M2M Router www.ewon.biz -ble Industrial M2M Router FLEXY PRICE SAVE INVESTMENT 2 product families 3 base modules 20x, the M2M Router The 20x
Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree
Cyber Security: Potential Threats Impacting Organizations January 10, 2015 Scott Petree Agenda 2 Data Security Trends Root Causes of Cyber Attacks How Can We Fix This? Secure Infrastructure User Awareness
Adaptive IPS Security in a changing world. Dave Venman Security Engineer, UK & Ireland
Adaptive IPS Security in a changing world Dave Venman Security Engineer, UK & Ireland 2 Who Is Sourcefire? Mission: To help customers manage increasing risks and regulations by providing the most effective,
Cyber Threats in Physical Security Understanding and Mitigating the Risk
Cyber Threats in Physical Security Understanding and Mitigating the Risk Synopsis Over the last few years, many industrial control systems, including security solutions, have adopted digital technology.
Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media
Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks
Business aware traffic steering
Nokia Networks Business aware traffic steering Nokia Networks white paper Business aware traffic steering Contents 1. Executive Summary 3 2. Static load or QoS-based traffic steering alone is no longer
Enterprise-grade Mobile Application Quality across your Application Life cycle THE MOBILECLOUD PLATFORM. 2012 Perfecto Mobile. All rights reserved.
2013 Enterprise-grade Mobile Application Quality across your Application Life cycle THE MOBILECLOUD PLATFORM 2012 Perfecto Mobile. All rights reserved. CONTENTS Enabling Enterprise Mobility Quality...
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group
10 Best Practices to Protect Your Network presented by Saalex Information Technology and Citadel Group Presented by: Michael Flavin and Stan Stahl Saalex Information Technology Overview Saalex Information
[Asterisk IP Telephony Solutions]
2016 [Asterisk IP Telephony Solutions] Azim U. Hoque President University IT Forum Bangladesh 1/30/2016 Workshop on Asterisk IP Telephony Solutions Over the existing Wi-Fi, LAN/MAN/WAN/ EPN/VPN, 3G and
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
TELECOMS Expense management. Considerations for Large Enterprises Operating in South Africa
TELECOMS Expense Considerations for Large Enterprises Operating in South Africa JANUARY 2013 CONTACT NEBULA SOUTH AFRICA WESTERN CAPE Tel: +27 (0)21 555 3227 Fax: +27 (0)21 551 0676 Address: 1 Ceres Road
Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc.
Volume 12 Issue 4 Version 1.0 Fabruary 2012 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN: & Print ISSN: Voice Calls between Wireless
FIVE PRACTICAL STEPS
WHITEPAPER FIVE PRACTICAL STEPS To Protecting Your Organization Against Breach How Security Intelligence & Reducing Information Risk Play Strategic Roles in Driving Your Business CEOs, CIOs, CTOs, AND
Mobile phone security. Prof. Do van Thanh
Mobile phone security Prof. Do van Thanh Introduction Why do we need mobile phone security? Is the mobile phone a secure device? The answer is: Yes, but only until recently Indeed malware starts to appear
Italy. EY s Global Information Security Survey 2013
Italy EY s Global Information Security Survey 2013 EY s Global Information Security Survey 2013 This year s survey our 16th edition captures the responses of 1,909 C-suite and senior level IT and information
Wi-Fi Calling (and Texting) For Mobile Operators
Wi-Fi Calling (and Texting) For Mobile Operators How Operators Can Leverage Existing Wi-Fi Networks to Solve Voice Coverage Challenges within the Home Kineto Wireless, Inc. Worldwide Headquarters 670 N.
WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
Cyber Watch. Written by Peter Buxbaum
Cyber Watch Written by Peter Buxbaum Security is a challenge for every agency, said Stanley Tyliszczak, vice president for technology integration at General Dynamics Information Technology. There needs
Implementing Transparent Security for Desktop Encryption Users
Implementing Transparent Security for Desktop Encryption Users Solutions to automate email encryption with external parties Get this White Paper Entrust Inc. All All Rights Reserved. 1 1 Contents Introduction...
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Privacy and Security in Healthcare
5 th 5 th th National HIPAA Summit National Strategy to Secure Cyberspace Privacy and Security in Healthcare October 31, 2002 Andy Purdy Senior Advisor, IT Security and Privacy The President s Critical
The Hidden Dangers of Public WiFi
WHITEPAPER: OCTOBER 2014 The Hidden Dangers of Public WiFi 2 EXECUTIVE SUMMARY 4 MARKET DYNAMICS 4 The Promise of Public WiFi 5 The Problem with Public WiFi 6 MARKET BEHAVIOR 6 Most People Do Not Protect
Data Challenges of Telcos and Service Providers. HawkEye AP Delivers Impressive Results
Data Challenges of Telcos and Service Providers HawkEye AP Delivers Impressive Results October 2014 Proven Deployment In a recent deployment at a mobile Service Provider, Hexis delivered impressive results:
Security for NG9-1-1 SYSTEMS
The Next Generation of Security for NG9-1-1 SYSTEMS The Challenge of Securing Public Safety Agencies A white paper from L.R. Kimball JANUARY 2010 866.375.6812 www.lrkimball.com/cybersecurity L.R. Kimball
ISO 27001 Controls and Objectives
ISO 27001 s and Objectives A.5 Security policy A.5.1 Information security policy Objective: To provide management direction and support for information security in accordance with business requirements
Business Email Compromise Scam
Business Email Compromise Scam The FBI has issued a warning about a significant spike in victims and dollar losses stemming from an increasingly common scam in which crooks spoof communications from executives
Cisco SAFE: A Security Reference Architecture
Cisco SAFE: A Security Reference Architecture The Changing Network and Security Landscape The past several years have seen tremendous changes in the network, both in the kinds of devices being deployed
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Cognizant Mobility Testing Lab A state of the art Integrated platform for Mobility QA
Solutions Overview Cognizant Mobility Testing Lab A state of the art Integrated platform for Mobility QA Mobile App QA Reinvented: With the astounding proliferation of mobile devices, smartphones and tablets
Online Payment Fraud. IP Intelligence is one of the top five techniques used to detect and prevent online fraud
Online Payment Fraud IP Intelligence is one of the top five techniques used to detect and prevent online fraud Online Payment Fraud 2 Contents IP Intelligence is one of the top five fraud tools 3 Not all
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
NIST ITL July 2012 CA Compromise
NIST ITL July 2012 CA Compromise Prepared for: Intelligent People [email protected] 1 NIST ITL Bulletin on CA Compromise http://csrc.nist.gov/publications/nistbul/july-2012_itl-bulletin.pdf These
The Power of Risk, Compliance & Security Management in SAP S/4HANA
The Power of Risk, Compliance & Security Management in SAP S/4HANA OUR AGENDA Key Learnings Observations on Risk & Compliance Management Current State Current Challenges The SAP GRC and Security Solution
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Security Information Management (SIM)
1. A few general security slides 2. What is a SIM and why is it needed 3. What are the features and functions of a SIM 4. SIM evaluation criteria 5. First Q&A 6. SIM Case Studies 7. Final Q&A Brian T.
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
Intel Enhanced Data Security Assessment Form
Intel Enhanced Data Security Assessment Form Supplier Name: Address: Respondent Name & Role: Signature of responsible party: Role: By placing my name in the box above I am acknowledging that I am authorized
Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management
Introductions KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management Agenda 1. Introduction 2. What is Cloud Computing? 3. The Identity Management
