Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response



Similar documents
Logging In: Auditing Cybersecurity in an Unsecure World

IBM Security Strategy

Critical Controls for Cyber Security.

Evolution Of Cyber Threats & Defense Approaches

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Can We Become Resilient to Cyber Attacks?

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

The Role of Security Monitoring & SIEM in Risk Management

Average annual cost of security incidents

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Software that provides secure access to technology, everywhere.

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

State of Security Survey GLOBAL FINDINGS

Data Access Request Service

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

NATIONAL CYBER SECURITY AWARENESS MONTH

Security and Privacy

F G F O A A N N U A L C O N F E R E N C E

Information Technology Policy

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Content Security: Protect Your Network with Five Must-Haves

Incident Response. Six Best Practices for Managing Cyber Breaches.

Security Management. Keeping the IT Security Administrator Busy

Modern Approach to Incident Response: Automated Response Architecture

How To Manage Security On A Networked Computer System

SecurityMetrics Vision whitepaper

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance

PCI Compliance for Healthcare

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

BSHSI Security Awareness Training

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

A practical guide to IT security

ITAR Compliance Best Practices Guide

INCIDENT RESPONSE CHECKLIST

Intelligence Driven Security

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Information Security Services. Achieving PCI compliance with Dell SecureWorks security services

SANS Top 20 Critical Controls for Effective Cyber Defense

The Incident Response Playbook for Android and ios

Italy. EY s Global Information Security Survey 2013

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

PCI Compliance for Cloud Applications

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Computer Security at Columbia College. Barak Zahavy April 2010

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Modular Network Security. Tyler Carter, McAfee Network Security

Securely Yours LLC Top Security Topics for Sajay Rai, CPA, CISSP, CISM

External Supplier Control Requirements

Internet threats: steps to security for your small business

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Presented by Evan Sylvester, CISSP

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

I ve been breached! Now what?

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Bottom line you must be compliant. It s the law. If you aren t compliant, you are leaving yourself open to fines, lawsuits and potentially closure.

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

Security Monitoring and Alerting: Managed Security Service Providers (MSSP) vs. Security Incident & Event Management (SIEM)

CORE INSIGHT ENTERPRISE: CSO USE CASES FOR ENTERPRISE SECURITY TESTING AND MEASUREMENT

2012 NCSA / Symantec. National Small Business Study

The SMB Cyber Security Survival Guide

Nine Steps to Smart Security for Small Businesses

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Managed Security Services

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Security Controls What Works. Southside Virginia Community College: Security Awareness

Defending against Cyber Attacks

Ibrahim Yusuf Presales Engineer at Sophos Smartphones and BYOD: what are the risks and how do you manage them?

AB 1149 Compliance: Data Security Best Practices

Security Services. 30 years of experience in IT business

Cyber Security. Securing Your Mobile and Online Banking Transactions

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Critical Security Controls

Member Municipality Security Awareness Training. End- User Informa/on Security Awareness Training

EndUser Protection. Peter Skondro. Sophos

Transcription:

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

Incident Response What is the most importance component of an Incident Response Program? Tools? Processes? Governance? Policy? Experience?

Risks to the Organization Poor user prac2ces (phishing and insecure data storage) Inconsistent security prac2ces (adherence to policy ie., excep2ons, patching) Failure to detect agacks (ineffec2ve tools, lack of experience) Sprawl and amount of data (mobile, remote users, cloud services)

Risks lead to Incidents

Our attack surface is increasing! We re loosing visibility! My controls aren t working!! A Breach is imminent!

World s Largest Data Breaches Breach by data sensi2vity Breach by number of records stolen hgp://www.informa2onisbeau2ful.net/visualiza2ons/worlds- biggest- data- breaches- hacks/

Identity Theft Resource Center 2015 Data Breach Category Summary Report Date: 6/2/2015 hgp://www.idthepcenter.org/images/breach/databreachreports_2015.pdf

Ponemon 2015 Benchmark Study on Privacy & Security of Healthcare Data 90% of Healthcare organizations in the study experienced a breach 40% had 5 or more data breaches over 2 years Estimated average cost of healthcare breach over $2.1 million Criminal attacks are the #1 cause of data breaches in Healthcare Attacks are up 125% compared to 5 years ago

Threats What can we do? We re under attack right now! Attackers are winning! It s getting worse! Dark Reading, Posted June 8, 2015

What is our current focus? Compromised Accounts Log Analysis with Splunk Vulnerable Systems Vulnerability scanning and remedia2on Compromised Systems Log analysis and network data Sensi2ve Data Data loss preven2on technologies and policy SourceFire IPS Firewall Firewall

Scaling the Response? Incident Response Program needs to be 24/7 Automation only works on known quantities How do we make the argument for better tools or more resources?

Who Provides the Response? Organizational CSIRT Costs to own and maintain equipment Salary & Benefits Training Localized, Site specific Pros Understanding of network environment Reports are unique to situation Outside Security Service Equipment provided and maintained by third party Data and Intelligence aggregation across multiple customers Identifies Priority events Cons: Canned Responses Intel provided may not be site specific

Cisco MTD Duke Medicine staasacs 03/08 03/31 03/08-03/14 97,539 Security Events 03/15-03/21 135,515 Security Events CPE Events SIO Events Total Unique Events High Fidelity Events Inves2gated Post- Inves2ga2on Tickets Created

Oh No! My email account will be deleted unless I I don t validate my see why I account now! need MFA. You ve got Mail! A virus encrypted my files and I don t have a backup! My paycheck was p de osited where!? CryptoWall??? I guess that s one way to get user s to comply with data encryption policies!

Email Attacks Systems processed > 4.7M emails per day at peak; 4.5M malicious emails were deleted each day (>3000/minute) Of 146M emails received in January only about 13% were legi2mate (5% were spam, 82% were viruses, phishing, and other malware)

The Phish November, 2013: Phishing email sent to 380 users with the subject Duke Alert asking them to confirm login details. Link lead to Fake Duke Login Page: December, 2013: Employees who had fell for the Phish no2ced their paychecks were not deposited on payday two days before Christmas. Inves2ga2on found that direct deposits for these employees had been routed to a foreign banking ins2tu2on in Mauri2us.

Who bears the loss? The organiza2on who owns the applica2on that was accessed? The user who provided their creden2als to the criminal. Employees are paid monthly. If an employee makes 60K/year, that is $5,000 taxes & insurance. If take home pay is $4000 x 6 employees the loss is minimal at $24000. But what if 100 employees had been affected? 1000?

Phishing Attack Internet Duke Security Controls Internet Router Internet Router Fake NetID ProtecAve Measures: Roll- out of MFA Auto- lock compromised accounts Any compromised account is required to enroll in MFA User Awareness & Training Free SoPware made available (Endpoint Protec2on, Lastpass, MFA) DetecAve Measures: Monitor user logins from mul2ple loca2ons Monitor mul2ple logins from a single external source Seed Phishing site with fake UserID, monitor for intel Core Router Core Router Firewall Protected Network SourceFire IDS Doctors, Researchers, Staff, Guests

Did it Work?

The message went to 617 people. 9 people fell for the message

Weighing the Costs Before the Incident IR Tools Trained, experienced staff Regular Risk Assessment and Audits After the Incident Third-party Consultants and Investigative Teams Technical & Awareness Training Recovery/Replacement of damaged assets

Indirect Costs Intangible Costs Damage to Corporate Brand or reputation Loss of future customers/ clients/investors Tangible Costs Regulatory fines Loss of Revenue (Sales, productivity, etc.) Legal fees Identity Protection Services

Security Focus Areas Network Security System Security End User & Account Protection Logging & Analysis Risk & Governance

Security Defenses and Techniques: NGFW VRF Technology IPS/IDS utilizing CIF Managed Security Services & Threat Defense Network Security

Security Defenses and Techniques: Systems Security Automated Patching (IEM) Data Loss Prevention (DLP) Mobile Device Management Web Application Security Reduced Administrative Rights

Security Defenses and Techniques: End User and Account Protection Whole Disk Encryption Spam Filtering Endpoint Protection it s not just Anti-virus anymore Identity and Access Mgt (IAM) Secure Sign On Service Multifactor authentication (MFA) Password Escrow

Security Defenses and Techniques: The Incident Response Toolbag Security Information & Event Management (SIEM) Threat & Intel Feeds NetFlow Analysis Log Correlation and Analysis Forensics Open Source Toolkits

Security Defenses and Techniques: Risk & Governance Risk assessments, vulnerability scanning & penetration testing Compliance audits Policy updates Awareness, training and outreach