Cybersecurity Threats, Responses & Best Practices Claudia Rast Butzel Long [email protected] Scott Bailey N1 Discovery scott.bailey@n1discovery.
|
|
|
- Isaac Copeland
- 10 years ago
- Views:
Transcription
1 Cybersecurity Threats, Responses & Best Practices Claudia Rast Butzel Long Scott Bailey N1 Discovery Stewart Nelson Kapnick Insurance Group
2 Managing Cyber Liability FORENSICS, LEGAL LIABILITIES, INSURANCE, AND BEST PRACTICES
3 FORENSICS
4 What Are the Threats? From USCyberlabs.com
5
6 Who Are the Threat Agents? Corporations Cybercriminals (Mafia: Russia, Brazil, Mexico ) Insiders/Employees (Ed Snowden) Hacktivists (Anonymous, WikiLeaks) Nation-States (China, Russia, N. Korea) Terrorists (Al-Qaeda, ISIL)
7 CERT Insider Threat Profile >30% of Insider Saboteurs had prior arrest history (2011 study showed 30% of U.S. adults arrested by age 23) Behavior Issues: bragging about the damage they could do if they wanted (trigger: passed over for promotion) Using Company resources for side business or talking about competing business Coercing coworkers to get credentials Warning: >70% IP theft occurs w/in 30 days of announcing departure >50% Insider Saboteurs were former employee with access via backdoors or credentials that were never disabled from Carnegie Mellon s Common Sense Guide to Mitigation Insider Threats, 4 th Ed. Dec. 2012
8 More on Insider Threats Typically Three Main Categories Sabotage (24% Fraud (44%) Theft of IP (16%) Most Often An Employee of Target Entity (85%) Most Activity Occurred During Work (72%) and at Work Site (70%) from Carnegie Mellon s Insider Threat Blog, Oct. 17, 2013
9 What Do They Want? Money Information Mayhem
10 How Do They Get In? Poor Access Controls Improper/Weak Authentication Insufficiently Protected Credentials Poor Patch Management; Weak Testing No Defined Security Perimeter; Lack of Network Segmentation Improper Device Configuration; Poor Monitoring Lack of Security Audits, Logging Practices Weak Enforcement of Remote Login Policies
11 Once In, What Can They Do? Create/modify/delete/execute programs Upload/download files Create/delete/directories List/start/stop processes Modify system registry Take screenshots of user s desktop Capture keystrokes Capture mouse movements Start interactive command shell Create a remote desktop interface Harvest passwords Enumerate users Enumerate other systems on the network Set system to sleep (go inactive) Log off the current user Shut down the system
12 Trends / Predictions Hacking as a service. Ransomware (data encryption-extortion). Smartphone kidnapping. Increase in social engineering attacks. Increase in music and movies to install malware. Hackers will continue to use and abuse cloud services. Mobile threats and more mobile threats.
13 LEGAL LIABILITIES
14 Legal Liabilities Defining the Breach/Security Incident When the Breach/Security Incident Happens Liability for Breach/Security Incident : What Laws? Recent Headlines The Costs of Breach Current Legislative Activities
15 Defining the Breach First: What is a Breach/Security Incident? A violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices An imminent threat of violation a situation when entity has a factual basis for believing that a specific incident is about to occur, e.g., notice from a software vendor warning of new malware that is rapidly spreading across the Internet An attacker commands a botnet to send high volumes of connection requests to a web server, causing it to crash Users are tricked into opening a quarterly report sent via that is actually malware; running the tool infects entity s computers and established connections with an external host An attacker obtains sensitive data and threatens to publish details if the organization does not pay a designated sum of money See Federal Incident Reporting Guidelines at: Second: What was Disclosed, Published, Stolen, Accessed without Authority, Not Properly Secured
16 Liability for Breach What Laws? Criminal Code Title 18 Computer Fraud & Abuse Act, 18 U.S.C Wiretap Act, 18 U.S.C Stored Communications Act (unlawful access), 18 U.S.C Identity Theft, 18 U.S.C. 1028(a)(7) & 1028A Electronic Communications Privacy Act, 18 U.S.C Economic Espionage Act, 18 U.S.C Administrative Statutes Title 16 Electric Reliability Provision of Federal Power Act 16 U.S.C. 824o(b) (2006) Gave FERC authority to enforce compliance with reliability standards for bulk power system, including protection from cybersecurity incidents Other Federal Law & Regulations: HIPAA/HITECH (Healthcare), FTC Act (Online Commerce), GLB & OCC (Financial) State Data Breach Laws; Payment Card Industry PCI Industry-Enforced Executive Order 13636: Improving Critical Infrastructure Cybersecurity Feb 2014 (Cybersecurity Framework (NIST Standard) Feb 2014)
17 Recent Headlines: Sony & Morgan Stanley Sony FBI confirms (with saying too much) that N. Korea was behind the Sony Hack Turns out the US has been inside N. Korea s network since 2010 Sony was target of Spearphishing attack beginning in September 2014 that was implemented system-wide in November 2014 Morgan Stanley Unwitting and too curious financial advisor finds way to access 350,000 records (out of 3.5 Million total records) from wealth management system On Dec. 27 th, records of 900 wealthiest clients were posted on online bulletin board Pastebin Promised more information in exchange for 78,000 speedcoins (worth about $2.95) Morgan Stanley s data loss prevention system caught employee s breach within 8 hours
18 Breach Costs & Risk Protection Average cost per compromised record in 2014: $201 For malicious attacks: $246/record Compare: Average cost per compromised record in 2010: $210 Average cost per compromised record in 2006: $138 Companies with Incident Response Plan in place Paid $17 less per compromised record Companies who alerted customers too soon Paid $15 more per compromised record Building the Effective Cyber Risk Culture (DHS May 2013) engaged executive leadership targeted cyber risk management and awareness cost-effective technology investments tailored to organizational needs relevant cyber risk information sharing
19 Current Federal Activities FTC is increasingly more aggressive in targeting companies who profess security, but don t deliver: e.g., SnapChat, Wyndham (misrepresenting security measures) House version of Cybersecurity Information Sharing Act of 2014 reintroduced January 2015 President Obama drafted similar proposed legislation and signed Executive Order Feb 13, 2015, promoting private sector information sharing Hurdles for any legislation: Defining adequate consumer protection Information sharing liability protection Antitrust protection
20 Cybersecurity Framework: Core Functions
21 Sources, Targets & Risks: It s Us! Source Mobile Computing (controlling BYOD) Social Media (online & customer service) Big Data Target Critical Infrastructures (electric, oil, gas, water, traffic, ports, chemical) Trust Infrastructures (finance, insurance, accounting, legal) The Cloud (who owns, who controls, where located) Risks Communication Breach: Data Center Board Room Target Breach: Auto Breach Detection turned Off by IT
22 INSURANCE
23 7 Components of Cyber Liability Policies 1. Data Breach: Failure to protect an individual s privacy 1 st Party Costs, Notification, Forensics, Legal Assistance, Credit Monitoring, PR Firms. 2. Data Breach: Failure to protect an individual s privacy 3 rd Party Costs, Defense Costs & Settlements 3. Network Security: Loss or damage to a network & data, 1 st & 3 rd Party (may include lost income) 4. Media Liability: Web content (Libel, Defamation) 5. Fines & Penalties (HIPAA, PCI) 6. evandalism & Extortion 7. Property loss from Cyber Perils (Internet of Things)
24 1. Data Breach: 1 st Party (Insured s) Expenses May Cover Legal services Forensic reviews Notification to third parties Credit monitoring Credit freezes Call centers Public relations Reimbursement or Captive services Trigger is Potential Loss of Information Sometimes sub-limited
25 2. Data Breach: 3 rd Party Protection Civil Suits: 3 rd Party Claims for Privacy Claims Court & defense costs, settlements, appeals, expert witnesses etc. May include 3 rd Party Business Income.) Arbitration, Administrative Hearings & Investigations Violation of Federal (Domestic or Foreign) or State regulations Trigger is Wrongful Act or Personal Injury
26 3. Network Security: Data & Hardware Restoration Loss of or damage to insured s or other s network or data Reasonable & necessary expenses that are required to restore the network and/or data May include 1 st and 3 rd Party Business Income
27 4. Media Liability (Web Content) Copyright, slogan, trademark, trade or service name Emotional distress Libel, slander/defamation, product disparagement Invasion of privacy Plagiarism, failure to attribute Misstatement or misleading statement Failure to follow published privacy policy Wrongful entry or eviction Contextual errors and Omissions
28 5. Fines & Penalties: Sometimes called Regulatory HIPPA-HITECH Payment Card Industry, PCI (Credit cards) Usually sub-limited
29 6. evandalism & Cyber Extortion Loss - Money paid to terminate threat Cost to investigate Travel expenses Trigger is the threat Loss
30 7. Property Damage from Cyber Perils New Coverage Forms just Released Can include Bodily Injury Kinetic Injury Covers Internet of Things Virus damages your refrigerator Malware in your heart-lung machine Hackers attack your driverless car
31 BEST PRACTICES
32 Best Practices for Management Perform Risk Assessment (Physical Plant, Information Systems & Workforce) Segregate & Secure High Risk Information, Operations & Workers Encrypt Sensitive Data/Implement Robust Password Policy Implement Company-wide Training (Ongoing) Incorporate Security By Design (i.e., from the beginning) Acquire Cyber Liability Insurance Enable Network Security Monitoring & Review of Log Files (Lesson Learned from Target) Demand Compliance from Contractors & Suppliers (Another Lesson from Target) Conduct Table-Top Drills Have Experts at the Ready If/When an Attack Occurs
33 Best Practices for Companies Restrict Remote Access Enforce Password Policies Restrict Activities on POS Systems to Sales Deploy Anti-Virus Systems on POS For Large, Multi-Store Companies Segment POS Network from Corporate Network Monitor Network Traffic from POS to Network Use Two-Factor Authentication
34 Best Practices for IT Departments Eliminate Unnecessary Data Conduct Ongoing & Active Risk Analysis Collect, Analyze & Share Incident Data Collect, Analyze & Share Tactical Threat Intelligence, Especially Indicators of Compromise Focus on Better & Faster Detection Establish Metrics: Number of Compromised Systems & Mean Time To Detection in Networks; Use Metrics to Drive Security Evaluate Threat Landscape to Prioritize Treatment Strategy (It s not a One-Size Fits All World) Track Workforce: Who s Who, What they Do & When they Go
35 Questions Claudia Rast Scott Bailey Stew Nelson Butzel Long N1 Discovery Kapnick Insurance Group
CYBER LIABILITY INSURANCE
CYBER LIABILITY INSURANCE CONTINUING EDUCATION CLASS MARCH 6, 2013 PRESENTED BY COUSINO HARRIS STEWART V. NELSON, Senior Risk Advisor [email protected] 734 929 6057 Class Objectives Understand
Franchise Data Compromise Trends and Cardholder. December, 2010
Franchise Data Compromise Trends and Cardholder Security Best Practices December, 2010 Franchise Data Security Agenda Cardholder Data Compromise Overview Breach Commonalities Hacking Techniques Franchisee
Cyber-Crime Protection
Cyber-Crime Protection A program of cyber-crime prevention, data breach remedies and data risk liability insurance for houses of worship, camps, schools, denominational/association offices and senior living
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION
RISKY BUSINESS SEMINAR CYBER LIABILITY DISCUSSION October 23, 2015 THREAT ENVIRONMENT Growing incentive for insiders to abuse access to sensitive data for financial gain Disgruntled current and former
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014
Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014 Nikos Georgopoulos Privacy Liability & Data Breach Management wwww.privacyrisksadvisors.com October 2014
Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder
Ten Questions Your Board Should be asking about Cyber Security Eric M. Wright, Shareholder Eric Wright, CPA, CITP Started my career with Schneider Downs in 1983. Responsible for all IT audit and system
Data Breach and Senior Living Communities May 29, 2015
Data Breach and Senior Living Communities May 29, 2015 Todays Objectives: 1. Discuss Current Data Breach Trends & Issues 2. Understanding Why The Senior Living Industry May Be A Target 3. Data Breach Costs
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements
Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements Greater New York Chapter Association of Corporate Counsel November 19, 2015 Stephen D. Becker, Executive Vice President
Data Breach Response Planning: Laying the Right Foundation
Data Breach Response Planning: Laying the Right Foundation September 16, 2015 Presented by Paige M. Boshell and Amy S. Leopard babc.com ALABAMA I DISTRICT OF COLUMBIA I FLORIDA I MISSISSIPPI I NORTH CAROLINA
Logging In: Auditing Cybersecurity in an Unsecure World
About This Course Logging In: Auditing Cybersecurity in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that
TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures
TODAY S AGENDA Trends/Victimology Incident Response Remediation Disclosures Trends/Victimology ADVERSARY CLASSIFICATIONS SOCIAL ENGINEERING DATA SOURCES COVERT INDICATORS - METADATA METADATA data providing
Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow
Anatomy of a Breach: A case study in how to protect your organization Presented By Greg Sparrow Agenda Background & Threat landscape Breach: A Case Study Incident Response Best Practices Lessons Learned
Zurich Security And Privacy Protection Policy Application
Zurich Security And Privacy Protection Policy Application COVERAGE A. AND COVERAGE F. OF THE POLICY FOR WHICH YOU ARE APPLYING IS WRITTEN ON A CLAIMS FIRST MADE AND REPORTED BASIS. ONLY CLAIMS FIRST MADE
Who s Doing the Hacking?
Who s Doing the Hacking? 1 HACKTIVISTS Although the term hacktivist refers to cyber attacks conducted in the name of political activism, this segment of the cyber threat spectrum covers everything from
Cybersecurity: Protecting Your Business. March 11, 2015
Cybersecurity: Protecting Your Business March 11, 2015 Grant Thornton. All LLP. rights All reserved. rights reserved. Agenda Introductions Presenters Cybersecurity Cybersecurity Trends Cybersecurity Attacks
What Data? I m A Trucking Company!
What Data? I m A Trucking Company! Presented by: Marc C. Tucker 434 Fayetteville Street, Suite 2800 Raleigh, NC, 27601 919.755.8713 [email protected] Presented by: Rob D. Moseley, Jr. 2 West
Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature
Demystifying Cyber Insurance Jamie Monck-Mason & Andrew Hill Introduction What is cyber? Nomenclature 1 What specific risks does cyber insurance cover? First party risks - losses arising from a data breach
Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler
Internet Gaming: The New Face of Cyber Liability Presented by John M. Link, CPCU Cottingham & Butler 1 Presenter John M. Link, Vice President [email protected] 2 What s at Risk? $300 billion in
DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET
DATA BREACH BREAK DOWN LESSONS LEARNED FROM TARGET 2014 NSGA Management Conference John Webb Jr., CIC Emery & Webb, Inc. Inga Goddijn, CIPP/US Risk Based Security, Inc. Not just a big business problem
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION. Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131
CYBERSECURITY: THREATS, SOLUTIONS AND PROTECTION Robert N. Young, Director Carruthers & Roth, P.A. Email: [email protected] Phone: (336) 478-1131 TOPICS 1. Threats to your business s data 2. Legal obligations
How-To Guide: Cyber Security. Content Provided by
How-To Guide: Cyber Security Content Provided by Who needs cyber security? Businesses that have, use, or support computers, smartphones, email, websites, social media, or cloudbased services. Businesses
Understanding the Business Risk
AAPA Cybersecurity Seminar Andaz Savannah Hotel March 11, 2015 10:30 am Noon Understanding the Business Risk Presenter: Joshua Gold, Esq. (212) 278-1886 [email protected] Disclaimer The views expressed
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望
Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望 Agenda Information Security Trends Year 2014 in Review Outlook for 2015 Advice to the Public Hong Kong Computer Emergency Response Team Coordination
Cyber Insurance: How to Investigate the Right Coverage for Your Company
6-11-2015 Cyber Insurance: How to Investigate the Right Coverage for Your Company Presented by: Faith M. Heikkila, Ph.D., CISM, CIPM, CIPP-US, ABCP Greenleaf Trust Chief Information Security Officer (CISO)
Cyber - Security and Investigations. Ingrid Beierly August 18, 2008
Cyber - Security and Investigations Ingrid Beierly August 18, 2008 Agenda Visa Cyber - Security and Investigations Today s Targets Recent Attack Patterns Hacking Statistics (removed) Top Merchant Vulnerabilities
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
Network Security & Privacy Landscape
Network Security & Privacy Landscape Presented By: Greg Garijanian Senior Underwriter Professional Liability 1 Agenda Network Security Overview -Latest Threats - Exposure Trends - Regulations Case Studies
New York State Energy Planning Board. Cyber Security and the Energy Infrastructure
New York State Energy Planning Board Cyber Security and the Energy Infrastructure New York State Division of Homeland Security and Emergency Services Office of Cyber Security Office of Cyber Security Overview
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ
APIP - Cyber Liability Insurance Coverages, Limits, and FAQ The state of Washington purchases property insurance from Alliant Insurance Services through the Alliant Property Insurance Program (APIP). APIP
Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.
Payment Card Industry Data Security Standard Training Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc. March 27, 2012 Agenda Check-In 9:00-9:30 PCI Intro and History
CYBER RISK SECURITY, NETWORK & PRIVACY
CYBER RISK SECURITY, NETWORK & PRIVACY CYBER SECURITY, NETWORK & PRIVACY In the ever-evolving technological landscape in which we live, our lives are dominated by technology. The development and widespread
What is Cyber Liability
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
Privilege Gone Wild: The State of Privileged Account Management in 2015
Privilege Gone Wild: The State of Privileged Account Management in 2015 March 2015 1 Table of Contents... 4 Survey Results... 5 1. Risk is Recognized, and Control is Viewed as a Cross-Functional Need...
Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd
Data breach, cyber and privacy risks Brian Wright Lloyd Wright Consultants Ltd Contents Data definitions and facts Understanding how a breach occurs How insurance can help to manage potential exposures
Fostering Incident Response and Digital Forensics Research
Fostering Incident Response and Digital Forensics Research Bruce J. Nikkel [email protected] September 8, 2014 Abstract This article highlights different incident response topics with a focus on digital
2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage
2015 PIAA Corporate Counsel Workshop October 22 23, 2015 Considerations in Cyber Liability Coverage Chris Reese Vice President, Director of Underwriting Connie Rivas Asst. Vice President, Contracts and
How To Protect Yourself From Cyber Threats
Cyber Security for Non- Profit Organizations Scott Lawler CISSP- ISSAP, ISSMP, HCISPP Copyright 2015 LP3 May 2015 Agenda IT Security Basics e- Discovery Compliance Legal Risk Disaster Plans Non- Profit
Cybersecurity Workshop
Cybersecurity Workshop February 10, 2015 E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. E. Andrew Keeney, Esq. Kaufman & Canoles, P.C. 150 West Main Street, Suite 2100 Norfolk, VA 23510 (757) 624-3153
Big Data, Big Risk, Big Rewards. Hussein Syed
Big Data, Big Risk, Big Rewards Hussein Syed Discussion Topics Information Security in healthcare Cyber Security Big Data Security Security and Privacy concerns Security and Privacy Governance Big Data
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015
Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence AIBA Quarterly Meeting September 10, 2015 The Answer 2 Everyone The relationship between the board, C-suite, IT, and compliance leaders
RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief
RSA SecurID Authentication in Action: Securing Privileged User Access RSA SecurID solutions not only protect enterprises against access by outsiders, but also secure resources from internal threats The
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT
NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT OVERVIEW The National Institute of Standards of Technology Framework for Improving Critical Infrastructure Cybersecurity (The NIST Framework) is a
Cyber Risks Management. Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor
Cyber Risks Management Nikos Georgopoulos, MBA, cyrm Cyber Risks Advisor 1 Contents Corporate Assets Data Breach Costs Time from Earliest Evidence of Compromise to Discovery of Compromise The Data Protection
The Onslaught of Cyber Security Threats and What that Means to You
The Onslaught of Cyber Security Threats and What that Means to You No End in Sight for Cyber Crime Growth Number of mobile devices affected IBM Number of accounts hacked CNN Money Number of malware samples
THE ANATOMY OF A CYBER POLICY. Jamie Monck-Mason & Andrew Hill
THE ANATOMY OF A CYBER POLICY Jamie Monck-Mason & Andrew Hill What s in a name? Lack of uniformity in policies: Cyber Cyber liability Data protection Tech PI The scope of cyber insurance First party coverage
October 24, 2014. Mitigating Legal and Business Risks of Cyber Breaches
October 24, 2014 Mitigating Legal and Business Risks of Cyber Breaches AGENDA Introductions Cyber Threat Landscape Cyber Risk Mitigation Strategies 1 Introductions 2 Introductions To Be Confirmed Title
Discussion on Network Security & Privacy Liability Exposures and Insurance
Discussion on Network Security & Privacy Liability Exposures and Insurance Presented By: Kevin Violette Errors & Omissions Senior Broker, R.T. Specialty, LLC February, 25 2014 HFMA Washington-Alaska Chapter
Security & Compliance, Sikich LLP
Mark Shelhart, CFI, CISSP, QSA Security & Compliance, Sikich LLP 1. Credit card breaches 2. Disgruntled IT, bad leaver 3. Personal records breach 4. Vendor network connections (and contracts) 5. Everything
Working with the FBI
Working with the FBI WMACCA Data Privacy & Security Conference September 17, 2014 Individuals Organized Crime Syndicates Hacktivist Groups Nation States Nation-States Individuals Industry Law Enforcement
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS
Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS CONTENTS PAGE RECONNAISSANCE STAGE 4 INCURSION STAGE 5 DISCOVERY STAGE 6 CAPTURE STAGE 7 EXFILTRATION STAGE
Managing Cyber Risk through Insurance
Managing Cyber Risk through Insurance Eric Lowenstein Aon Risk Solutions This presentation has been prepared for the Actuaries Institute 2015 ASTIN and AFIR/ERM Colloquium. The Institute Council wishes
I N T E L L I G E N C E A S S E S S M E N T
I N T E L L I G E N C E A S S E S S M E N T (U//FOUO) Malicious Cyber Actors Target US Universities and Colleges 16 January 2015 Office of Intelligence and Analysis IA-0090-15 (U) Warning: This document
I ve been breached! Now what?
I ve been breached! Now what? THE AFTERMATH OF A BREACH & STEPS TO REDUCE RISK The number of data breaches in the United States in 2014 hit a record high. And 2015 is not looking any better. There have
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Summary of CIP Version 5 Standards
Summary of CIP Version 5 Standards In Version 5 of the Critical Infrastructure Protection ( CIP ) Reliability Standards ( CIP Version 5 Standards ), the existing versions of CIP-002 through CIP-009 have
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Privacy Rights Clearing House
10/13/15 Cybersecurity in Education What you face as educational organizations How to Identify, Monitor and Protect Presented by Jamie Gershon Sr. Vice President Education Practice Group 1 Privacy Rights
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Jefferson Glassie, FASAE Whiteford, Taylor & Preston
Jefferson Glassie, FASAE Whiteford, Taylor & Preston 2 * 3 PII = An individuals first name and last name or first initial and last name in combination with any one or more of the following data elements
Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015
Cybersecurity: Considerations for Internal Audit IIA Atlanta Chapter Meeting January 9, 2015 Agenda Key Risks Incorporating Internal Audit Resources for Internal Auditors Questions 2 Key Risks 3 4 Key
Information Security: A Perspective for Higher Education
Information Security: A Perspective for Higher Education A By Introduction On a well-known hacker website, individuals charged students $2,100 to hack into university and college computers for the purpose
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY
THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY DISCLAIMER Views expressed in this presentation are not necessarily those of our respective Departments Any answers to questions are our own opinions
Cyber Threats: Exposures and Breach Costs
Issue No. 2 THREAT LANDSCAPE Technological developments do not only enhance capabilities for legitimate business they are also tools that may be utilized by those with malicious intent. Cyber-criminals
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS
MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS RRD Donnelley SEC Hot Topics Institute May 21, 2014 1 MANAGING CYBERSECURITY RISK AND DISCLOSURE OBLIGATIONS Patrick J. Schultheis Partner Wilson
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
Privacy / Network Security Liability Insurance Discussion. January 30, 2013. Kevin Violette RT ProExec
Privacy / Network Security Liability Insurance Discussion January 30, 2013 Kevin Violette RT ProExec 1 Irrefutable Laws of Information Security 1) Information wants to be free People want to talk, post,
IT TRENDS AND FUTURE CONSIDERATIONS. Paul Rainbow CPA, CISA, CIA, CISSP, CTGA
IT TRENDS AND FUTURE CONSIDERATIONS Paul Rainbow CPA, CISA, CIA, CISSP, CTGA AGENDA BYOD Cloud Computing PCI Fraud Internet Banking Questions The Mobile Explosion Mobile traffic data in 2011 was nearly
Cyber-insurance: Understanding Your Risks
Cyber-insurance: Understanding Your Risks Cyber-insurance represents a complete paradigm shift. The assessment of real risks becomes a critical part of the analysis. This article will seek to provide some
By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015
Community Bank Auditors Group Cybersecurity What you need to do now June 9, 2015 By: Gerald Gagne MEMBER OF PKF NORTH AMERICA, AN ASSOCIATION OF LEGALLY INDEPENDENT FIRMS 2015 Wolf & Company, P.C. Cybersecurity
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC
Data breach! cyber and privacy risks Brian Wright Michael Guidry Lloyd Guidry LLC Collaborative approach Objective: To develop your understanding of a data breach, and risk transfer options to help you
Stay ahead of insiderthreats with predictive,intelligent security
Stay ahead of insiderthreats with predictive,intelligent security Sarah Cucuz [email protected] IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive, intelligent
Mitigating and managing cyber risk: ten issues to consider
Mitigating and managing cyber risk: ten issues to consider The board of directors is responsible for managing and mitigating risk exposure. A recent study conducted by the Ponemon Institute 1 revealed
NZI LIABILITY CYBER. Are you protected?
NZI LIABILITY CYBER Are you protected? Any business that operates online is vulnerable to cyber attacks and data breaches. From viruses and hackers to employee error and system damage, your business is
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
Attachment A. Identification of Risks/Cybersecurity Governance
Attachment A Identification of Risks/Cybersecurity Governance 1. For each of the following practices employed by the Firm for management of information security assets, please provide the month and year
CKAHU Symposium Cyber-Security
CKAHU Symposium Cyber-Security Scott Logan Technical Director of Security Position: Technical Director of Security Employment: NetGain Technologies (6+ years) NetGain is a Regional partner with 7 locations
7 VITAL FACTS ABOUT HEALTHCARE BREACHES. www.eset.com
7 VITAL FACTS ABOUT HEALTHCARE BREACHES www.eset.com 7 vital facts about healthcare breaches Essential information for protecting your business and your patients Large breaches of Personal Health Information
Brief. The BakerHostetler Data Security Incident Response Report 2015
Brief The BakerHostetler Data Security Incident Response Report 2015 The rate of disclosures of security incidents in 2015 continues at a pace that caused many to call 2013 and then 2014 the year of the
KEY STEPS FOLLOWING A DATA BREACH
KEY STEPS FOLLOWING A DATA BREACH Introduction This document provides key recommended steps to be taken following the discovery of a data breach. The document does not constitute an exhaustive guideline,
THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK
THE HARTFORD ASSET MANAGEMENT CHOICE sm POLICY NETWORK SECURITY AND THEFT OF DATA COVERAGE APPLICATION Name of Insurance Company to which application is made NOTICE: THIS POLICY PROVIDES CLAIMS MADE COVERAGE.
