Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Similar documents
I ve been breached! Now what?

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

How To Protect Yourself From A Hacker Attack


Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Taking a Data-Centric Approach to Security in the Cloud

Addressing Information Protection, Privacy & Sovereignty Concerns in Cloud Applications

CONSIDERATIONS BEFORE MOVING TO THE CLOUD

Compromises in Healthcare Privacy due to Data Breaches

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH

WHITE PAPER. PCI Basics: What it Takes to Be Compliant

How To Protect Your Data From Theft

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Cyber Exploits: Improving Defenses Against Penetration Attempts

Security for the Cloud of Clouds

Insulate Your Company from a Cyber Breach: Proactive Steps to Minimize Breach Risks & Impact. February 10, 2015

Data breach! cyber and privacy risks. Brian Wright Michael Guidry Lloyd Guidry LLC

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Need for Database Security. Whitepaper

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Data Breach and Senior Living Communities May 29, 2015

FERPA: Data & Transport Security Best Practices

Network Security & Privacy Landscape

Mitigating and managing cyber risk: ten issues to consider

Making Database Security an IT Security Priority

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Comprehensive Approach to Database Security

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

Cloud Security Strategies. Fabio Gianotti, Head of Cyber Security and Enterprise Security Systems

Security Risk Management Strategy in a Mobile and Consumerised World

Data Loss Prevention. Keeping sensitive data out of the wrong hands*

Can Cloud Providers Guarantee Data Privacy & Sovereignty?

10 Smart Ideas for. Keeping Data Safe. From Hackers

Information Security Addressing Your Advanced Threats

Don t Be a Victim to Data Breach Risks Protecting Your Organization From Data Breach and Privacy Risks

IT Security Risks & Trends

SINGAPORE HEALTHCARE ENTERPRISE RISK MANAGEMENT CONGRESS Data Breach : The Emerging Threat to Healthcare Industry

DATA SECURITY: A CRUCIAL TOPIC FOR CORPORATE COUNSEL AND MANAGEMENT

Exploring the Landscape of Philippine Cybersecurity

The Age of Data Breaches:

How To Protect Yourself From Cyber Threats

Lessons Learned from Recent HIPAA and Big Data Breaches. Briar Andresen Katie Ilten Ann Ladd

Franchise Data Compromise Trends and Cardholder. December, 2010

How-To Guide: Cyber Security. Content Provided by

THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident.

INFORMATION SECURITY FOR YOUR AGENCY

Cyber Exposure for Credit Unions

Data Security - Trends and Remedies

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Internet threats: steps to security for your small business

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Cyber Insurance: How to Investigate the Right Coverage for Your Company

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Defending Against Data Beaches: Internal Controls for Cybersecurity

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

plantemoran.com What School Personnel Administrators Need to know

Data breach, cyber and privacy risks. Brian Wright Lloyd Wright Consultants Ltd

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Data Privacy & Security: Essential Questions Every Business Must Ask

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Anatomy of a Privacy and Data Breach

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

How to Practice Safely in an era of Cybercrime and Privacy Fears

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Thick Client Application Security

Cybercrime: Protecting Your Digital Assets in Today's Threat Landscape

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Top Signs You re Prime for a Data Breach in 2014

HIPAA Compliance Evaluation Report

Cybersecurity: Protecting Your Business. March 11, 2015

INDUSTRY OVERVIEW: HEALTHCARE

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Information Security

AVOIDING THE BREACH 5 Common Ways Technology Vendors Put Their Healthcare Customer's PHI at Risk

Identity Theft Security and Compliance: Issues for Business

How To Buy Cyber Insurance

cyber invasions cyber risk insurance AFP Exchange

CYBERSECURITY FRAUD LOSS ISSUES & HOW TO ADDRESS RISKS IN TODAY'S INSURANCE MARKETPLACE 12/16/2015. December 17, 2015

Information Security

Formulate A Database Security Strategy To Ensure Investments Will Actually Prevent Data Breaches And Satisfy Regulatory Requirements

Managing data security and privacy risk of third-party vendors

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Application Intrusion Detection

Presented By: Bryan Miller CCIE, CISSP

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

The Top Web Application Attacks: Are you vulnerable?

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

Copyright 2013, Oracle and/or its affiliates. All rights reserved.

Viva la Cloud IAPP Privacy Academy 2013

Defending the Database Techniques and best practices

Computer Security at Columbia College. Barak Zahavy April 2010

What s Lurking in Your Network & The Business Impact of Data Breaches. Colby Clark Director of Incident Management FishNet Security

The Data Breach: How to stay defensible before, during and after the incident. Alex Ricardo, CIPP/US Breach Response Services

Transcription:

Presentation for : The New England Board of Higher Education Hot Topics in IT Security and Data Privacy October 22, 2010 Rocco Grillo, CISSP Managing Director Protiviti Inc.

Quote of the Day "It takes 20 years to build a reputation and five minutes to ruin it. If you think about that, you'll do things differently." - Warren Buffett 1

Today s Agenda Higher Education Risks Recent Protiviti Investigations Risk Impact Risk Trends What is the Response Institution Response New Legislation What You Should Do 2

Ripped from the headlines 3

Recent Breach Disclosure Reported Breach Professional hacking for profit. UBN sold e-mail lists and user-id passwords for at least $100,000. Backdoors and admin passwords sold at the best price. FBI is trying to shutdown this ring. Hacker used a SQL Injection on the Canada Web-Server SQL command line and guessed a password with admin access Added local Admin user Downloaded and decrypted passwords Download database and upload backdoors Hacker Attack Step SQL Injection Command prompt Guess Admin User-Id Add local admin user Crack passwords for two domain accounts Upload Backdoors Download data Control Which Broke Down Application Input validation Vulnerability detection and correction Penetration Testing SQL User least privilege Logging and Monitoring Password = User-Id Privileged User Logging & Monitoring Needed strong encryption not the LanMan Password Hashing Algorithm Privileged User Activity Logs No Anti-Virus on Servers Data Leakage Detection Database Logs 4

Recent Experience Reported Breach Attackers may have focused efforts on a clients external hiring application (maintained by a 3 rd Party) and escalated their privileges to administrator based on the externally facing applications functionality. Hacker accesses the Web system as a normal user. Hacker forcefully browses administrative pages. As Admin, Added/Modified additional application administrator accounts. Initiated reports displaying passwords and PII. Downloaded reports. Hacker Attack Step Forcefully browse administrative pages without credentials Create Modify Accounts Harvest Accounts Run Reports Containing PII Download data Control Which Broke Down Access controls not enforced on the administrative pages. IIS logs were not configured to detect forceful browsing attempts. System not configured to log account creation or modification events. Passwords were not hashed within the database, and they were displayed to the attacker in clear text. PII such as SSN s were not masked to the administrator. Data Leakage Detection Database Logs 5

What are the risks? The risks are more than just immediate monetary impact: Litigation Reputation Loss Loss of System Availability Lost Productivity Loss of Intellectual Property Regulatory Fines 6

Is education in trouble? Verizon Data Breach Report 2010 7

Threats Summary of Threat Agents (Verizon Data Breach Report 2010) Lost Laptop (35%) System Failure (33%) Other Data Bearing Device (14%) Paper Spill (7%) Lost Media Backup (5%) Cybercrime or Hack (5%) Social Engineering (2%) 8 0 10 20 30 40 Ponemon 2010 Annual Study: Cost of a Data Breach

The Risk Continues to Grow More than 500 million personally-identifiable, customer records have been breached in the US over the past five years. Most of these breaches occurred at companies that are household names. As a result, boards and top executives are demanding reports from their IT and security staff on the effectiveness of security controls within their organizations. Privacy Rights.org Throughout hundreds of investigations over the last four years, one theme emerges as perhaps the most consistent and widespread trend of our entire caseload. Nine out of 10 data breaches involved one of the following: A system unknown to the organization (or business group affected) A system storing data that the organization did not know existed on that system A system that had unknown network connections or accessibility A system that had unknown accounts or privileges We refer to these recurring situations as unknown unknowns and they appear to be the Achilles heel in the data protection efforts of every organization regardless of industry, size, location, or overall security posture. Verizon 2010 Data Breach Investigation Report 9

Who is to Blame? Final Edition Source: Information Week, October 2007 Headline News Theft Of Gap Laptop Puts 800,000 Job Applicants At Risk What really happened The laptop was stolen from one of the retailer's third-party vendors that manages information on job applicants. Ponemon 2009 Annual Study: Cost of a Data Breach 10

Human Factor 11

Mitigation Trends After a data breach, organizations are relying on a combination of people-centric and technology-centric based steps. Ponemon 2009 Annual Study: Cost of a Data Breach 12

The Global Privacy Landscape US Federal: HIPAA 1996, COPPA 1998, Patriot Act 2001, CIPA 2001, GLBA 1999 Canada: PIPEDA European Union: EU Data Protection Directive and Member States Data Protection Laws, Safe Harbor Principles Japan: Guidelines for the Protection of Computer Processed Personal Data UK: Data Protection Act Hong Kong: California: Personal Data Privacy Ordinance SB1, SB1386 Brazil: Argentina: Article 5 of the 1988 Constitution Personal Data Protection Law, Confidentiality of Information Law South Africa: Electronic Communications and Transactions Act Australia: Federal Privacy Amendment Bill 13

A look closer at home 46 states have enacted a breach disclosure law, require notice to customers, employees, and other affected individuals Each state law specifies: Notification guidelines Penalties for failure to disclose Private right of action Exemptions Have established disclosure laws Have NOT established disclosure laws Organizations may not be required to notify individuals when: The breached data is protected by at least 128-bit encryption The breached data elements are not considered protected The breach was stopped before information was wrongfully acquired Other special circumstances (such as national security or law enforcement investigations) exist 14

Next Steps Most breaches occur because of a lack of or deficient controls. For example, encryption of laptops reduces risk significantly Vendor defaults and weak passwords for privileged accounts need to be corrected SQL injection can be detected from vulnerability and penetration testing System patching and configuration management can resolve 90% of vulnerabilities Focus on fundamentals of information security. Data Leakage Prevention Vulnerability Management Detective controls Log Monitoring and IDS Vendor Assessments ( > 30% of data loss involved vendors) Defense in depth (control layers) Logging is required because it is critical while investigating an incident. 15

Contact Information Rocco Grillo, CISSP Managing Director Protiviti Inc. Rocco.Grillo@protiviti.com 212.603.8381