Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir.

Similar documents
Nerds and Geeks Re-United: Towards a Practical Approach to Health Privacy Breaches. Gerard M. Stegmaier gstegmaier@wsgr.

KEY STEPS FOLLOWING A DATA BREACH

OCR s Anatomy: HIPAA Breaches, Investigations, and Enforcement

Incident Response. Proactive Incident Management. Sean Curran Director

Session 334 Incident Management. Jeff Roth, CISA, CGEIT, CISSP

Data Security Incident Response Plan. [Insert Organization Name]

Network Security & Privacy Landscape

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

PROPOSED PROCEDURES FOR AN IDENTITY THEFT PROTECTION PROGRAM Setoff Debt Collection and GEAR Collection Programs

Data Breach and Senior Living Communities May 29, 2015

Iowa Health Information Network (IHIN) Security Incident Response Plan

Information Security Incident Management Guidelines

Utica College. Information Security Plan

INCIDENT RESPONSE CHECKLIST

Cyber Self Assessment

PwC Cybercrime US Center of Excellence

plantemoran.com What School Personnel Administrators Need to know

Enforcement of Health Information Privacy & Security Standards Federal Enforcement Through Recent Cases and Tools to Measure Regulatory Compliance

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What Data? I m A Trucking Company!

Incident Response. Six Best Practices for Managing Cyber Breaches.

Data Breach Response Planning: Laying the Right Foundation

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Health Care Data Breach Discovery Strategies for Immediate Response

ICTN Enterprise Database Security Issues and Solutions

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Privacy Rights Clearing House

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Healthcare in the Crosshairs for Data Breaches. April 22, Deborah Hiser (512)

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

The Key to Secure Online Financial Transactions

Standard: Information Security Incident Management

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at

PII Compliance Guidelines

Cybersecurity: Protecting Your Business. March 11, 2015

California State University, Sacramento INFORMATION SECURITY PROGRAM

Data Privacy: What your nonprofit needs to know. Donna Balaguer and Ed Lavergne Washington, D.C. February 5, 2015

Presented by: Mike Morris and Jim Rumph

How To Protect Yourself From Cyber Threats

Cybersecurity and internal audit. August 15, 2014

Franchise Data Compromise Trends and Cardholder. December, 2010

Into the cybersecurity breach

Privacy and Security Incident Management Protocol

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Jort Kollerie SonicWALL

How-To Guide: Cyber Security. Content Provided by

Mitigating and managing cyber risk: ten issues to consider

This presentation focuses on the Healthcare Breach Notification Rule. First published in 2009, the final breach notification rule was finalized in

Data Breaches and Cyber Risks

Common Data Breach Threats Facing Financial Institutions

Data Management & Protection: Common Definitions

Security and Privacy

Information Security & Data Breach Report November 2013 Update

Oracle Database Security

Computer Security at Columbia College. Barak Zahavy April 2010

DATA SECURITY BREACH: THE NEW THIRD CERTAINTY OF LIFE

Presented by Evan Sylvester, CISSP

THE DATA BREACH: How to stay defensible before, during and after the incident. after the incident.

2012 NCSA / Symantec. National Small Business Study

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

How To Protect Your Data From Theft

Are you prepared for a Data Breach

Transcription:

Data Breach Strikes - Nerds & Geeks Unite: Effective Cooperation Between Privacy and Technical Experts Presented by: Paul H. Luehr, Managing Dir. Stroz Friedberg Gerard M. Stegmaier, Esq. Wilson Sonsini Goodrich & Rosati

Data Breach Trends 2011 Average Loss to Organization = $5.5 million Down from $7.2 million in 2010 Not including organizations in excess of 100,000 Low of $566K, High of $20.9 million 2011 Average Loss per Victim = $194 Cost per Malicious Attack = $222 Cost per Negligent Employee = $174 2011 Malicious Attacks, up over 3x Up from 12% to 24% to 31% to 37% (2008-2011) Source: Ponemon Institute/Symantec, 2011 U.S. Cost of a Data Breach Study (49 organizations across 14 sectors)

Data Breach Trends Source: Ponemon Institute/Symantec, 2011 U.S. Cost of a Data Breach Study

Data Breach Trends Source: Ponemon Institute/Symantec, 2011 U.S. Cost of a Data Breach Study

Data Breach Trends Health Care 96% of Health Companies Surveyed had a Breach Average of 4 over past 2 years 46% had more than 5 in past 2 years $2.2 million = Average Financial Impact Up 10% from 2010 Discovered through: Employees (55%), Audit (45%), Patients (35%) Source: Ponemon Institute/ID Experts, 2 nd Annual Benchmark Study on Patient Privacy and Data Security (2011)(72 organizations surveyed)

Responding to Data Breaches PREPARE Responding to Data Breaches: PRESERVE SEARCH ASSESS COMMUNICATE

PREPARE for Disaster Develop a Response Plan Organize your Network Data Build Your Team

PREPARE: Develop a Plan Management endorsement Contact Lists Legal Analysis and Timeline Categories of adverse events First steps checklist Facilities and equipment lists Outreach plan Develop a Response Plan Organize your Network Data Build Your Team

PREPARE: Organize your Data Map your critical assets Record backup schedules and inventories Update user lists Centralize logging functions Synchronize network times Develop a Response Plan Organize your Network Data Build Your Team

PREPARE: Build your Team Outside Counsel In-House Counsel Outside Incident Response Experts Client and Media Relations In-House IT Incident Response Human Resources CPO, CSO Compliance Business Unit Develop a Response Plan Organize your Network Data Build Your Team

Data Breach Types Examples: Hacking Phishing/spear phishing Brute force attack SQL injection Advanced Persistent Threat (APT) Data theft or loss Media stolen (e.g. laptops, thumb drives, tapes) Data stolen (e.g. by current or former employee) Data lost (e.g. in taxi or during data migration) Data leakage Exposure to public (e.g. via web site) Exposure to unauthorized person (e.g. wrong employee) Sensitive data sent via unencrypted channel

Data Breach Vectors External Internal 12

Response Team (Internal Threat) Counsel IR Team Lead CPO/CSO Lead Evidence Team Lead Forensic Analysis Team Lead Physical Investigation Team Leader Hard drive, devices, volatile data preservation Log file & backup acquisition Media analysis Network log analysis Interviews & video/keycard/ fingerprint collection Law enforcement liaison

Response Team (External Threat) Counsel IR Team Lead CPO/CSO Lead Evidence Team Lead Forensic Analysis Team Lead Malware Analysis Team Lead Hard drive, devices, volatile data preservation Log file & backup acquisition Media analysis Network log analysis Static & dynamic analysis Reverse engineering & antidote

PRESERVE the Data Unhook infected machines (leave power on). Do NOT poke around. Insert clean and patched machines. Call forensic experts to image infected machines. Save off log files (e.g. web, firewall, IDS). Pull needed backup(s) out of rotation. Save keycard data and surveillance tapes. Start real-time packet capture. Force password change.

PRESERVE - Challenges Coordinating IT and Forensic Activity IT needs to secure data environment Pull network connection, save backups and logs, prepare clean builds, force password change, update antivirus Forensic needs to review active/latent data Image servers and report findings Business Continuity Migrate data after forensic imaging

SEARCH and ASSESS Internal Threats 17

SEARCH and ASSESS Internal Threats Banking activity Internet Activity Employment activity Internal server access Web access (email, social media, cloud) Travel Data deletions 18

SEARCH and ASSESS Internal Threats CD/DVD Burning 19

SEARCH and ASSESS Internal Threats Removable Devices 20

SEARCH and ASSESS Internal Threats Link File Analysis A Link file shows this document was accessed On a particular date and time And where the file was located when accessed. 21

SEARCH and ASSESS Internal Threats Deletion and Wiping Activity

SEARCH and ASSESS External Threats 23

SEARCH and ASSESS External Threats Spear Phishing

SEARCH and ASSESS External Threat Analyze log files. Review memory/virtual memory. Analyze hard drives. Analyze and reverse malware code. Review live traffic captures. Run behavioral profiling.

SEARCH and ASSESS External Threat Deleted Files: Hacker s Toolkit

SEARCH and ASSESS External Threat Volatile Data Capture Capturing physical memory may reveal processes not normally seen by user or IT.

SEARCH and ASSESS External Threat Malware Review

SEARCH and ASSESS Challenges Timing Estimate per Server Initial Breach Analysis = 7 to 10 days Identification of PII or PHI = 2 to 30 days (structured DB v. unstructured xls, doc, pdf, txt, jpg) Desire for Certainty Regulators Consumers Company Officers/Managers

SEARCH and ASSESS Challenges Investigation Paradox More careful analysis takes time More careful analysis increases certainty Can locate lost/stolen data Can account for malware changes, attacking IP s Can run scans across entire network Can better account for PII and PHI sources More careful analysis reduces cost 2010 Ponemon Findings: Quick Responder* Cost = $268 per record Later Responder Cost = $174 per record *notification within 30 days

SEARCH and ASSESS Challenges PII, PHI Variations: Social security number: === - == - ====, === == ====, ========, SSN, Social Security Number, socsec, etc. Account number: 5411222233334444 = 5.41122E+15 in scientific notation Unsearchables: SSN 000-00-1234 SSN 000-00-5678

Breach Response a Dynamic Process Source: NIST - Computer Security Incident Handling Guide (Jan. 2012 Draft)

SEARCH and ASSESS Challenges BREACH DEFINITIONS Did an unauthorized party: Access* Acquire Misuse Disclose PII/PHI Does investigation show: Material compromise Actual loss or injury to consumer Material risk of ID theft or fraud Significant risk of financial, reputational, other harm*

COMMUNICATE Internal Stakeholders Team Members Counsel, Compliance, HR, IT, Business Managers, Public Affairs, Experts Board/CEO, Executives Employees Shareholders Customers

COMMUNICATE Challenges Notification Clock When did earliest/original breach occur? What is the notification due date? When will we know whether we need to notify? Reporting Formats What are the needs of the response team? What does IT, Board, counsel need to know? Should reports be oral or written? What is covered by privilege?

COMMUNICATE Best Practices Assemble response team immediately Discourage blame, data hoarding, and avoidance Communicate often, but not constantly Coordinate investigative findings across teams Limit strategic discussions to key managers & counsel

RESOURCES HHS Health Information Privacy - ww.hhs.gov/ocr/privacy NIST Computer Security Resource Ctr csrc.nist.gov State Data Breach Laws www.ncsl.org FTC Privacy Actions www.ftc.gov/privacy Privacy Rights www.privacyrights.org Open Security Foundation, Data Loss DB datalossdb.org

QUESTIONS? Paul H. Luehr Managing Director, CPO Stroz Friedberg Gerard M. Stegmaier, Esq. Wilson Sonsini Goodrich & Rosati, P.C. 720 Northstar Center West 625 Marquette Ave South Minneapolis, MN 55402 1700 K Street, NW Fifth Floor Washington, DC 20006-3817 612.605-3007 direct pluehr@strozfriedberg.com 202-973-8809 direct gstegmaier@wsgr.com