WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.



Similar documents
Protecting Your Data, Intellectual Property, and Brand from Cyber Attacks

Cybersecurity Strategies for Small to Medium-sized Businesses

Protecting What Matters Most. Terry Ray Chief Product Strategist Trending Technologies Session 11

Internet threats: steps to security for your small business

White Paper. Why Next-Generation Firewalls Don t Stop Advanced Malware and Targeted APT Attacks

PCI Compliance: Protection Against Data Breaches

Getting real about cyber threats: where are you headed?

How To Protect Yourself From Cyber Threats

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

SECURITY REIMAGINED SPEAR PHISHING ATTACKS WHY THEY ARE SUCCESSFUL AND HOW TO STOP THEM. Why Automated Analysis Tools are not Created Equal

Solution Path: Threats and Vulnerabilities

Are You A Sitting Duck?

Advanced Threats: The New World Order

Cybercrime: risks, penalties and prevention

Information Security Addressing Your Advanced Threats

File Integrity Monitoring: A Critical Piece in the Security Puzzle. Challenges and Solutions

Data Breach Lessons Learned. June 11, 2015

I ve been breached! Now what?

2012 雲 端 資 安 報 告. 黃 建 榮 資 深 顧 問 - Verizon Taiwan. August 2012

Information Security for the Rest of Us

Spear Phishing Attacks Why They are Successful and How to Stop Them

Big Threats for Small Businesses

THE PERFECT STORM WEATHERING CYBER THREATS IN THE HEALTHCARE INDUSTRY

Next Generation Security Strategies. Marc Sarrias Regional Sales Manager

IBM Security re-defines enterprise endpoint protection against advanced malware

Top Five Ways to Protect Your Network. A MainNerve Whitepaper

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Are You Ready for PCI 3.1?

What SMBs Don t Know Can Hurt Them Perceptions vs. Reality in the New Cyber Threat Landscape

The Onslaught of Cyber Security Threats and What that Means to You

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH

The Custom Defense Against Targeted Attacks. A Trend Micro White Paper

Threat Intelligence: What is it, and How Can it Protect You from Today s Advanced Cyber-Attacks A Webroot publication featuring analyst research

National Cybersecurity Awareness Campaign

Cyber Threats Insights from history and current operations. Prepared by Cognitio May 5, 2015

APT Protection Via Data-Centric Security. Alan Kessler President and CEO Vormetric

How To Handle A Threat From A Corporate Computer System

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Security strategies to stay off the Børsen front page

PCI Compliance for Healthcare

90% of health insurers surveyed have had a data breach 3. 72% increase in cyberattacks against healthcare companies occurred between 2013 and

TECH GUYS. Protect Your Practice with a Security Risk Assessment. HCTechGuys.com. HCTechGuys.com TECH GUYS

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Surviving the Ever Changing Threat Landscape

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

ITAR Compliance Best Practices Guide

Your Customers Want Secure Access

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

Defending Against Cyber Attacks with SessionLevel Network Security

THE DIGITAL AGE THE DEFINITIVE CYBERSECURITY GUIDE FOR DIRECTORS AND OFFICERS

10 Smart Ideas for. Keeping Data Safe. From Hackers

How To Cover A Data Breach In The European Market

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Modern Cyber Threats. how yesterday s mind set gets in the way of securing tomorrow s critical infrastructure. Axel Wirth

The Leading Provider of Endpoint Security Solutions

Malware, Phishing, and Cybercrime Dangerous Threats Facing the SMB State of Cybercrime

Developing Secure Software in the Age of Advanced Persistent Threats

AB 1149 Compliance: Data Security Best Practices

The Advanced Cyber Attack Landscape

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

End-user Security Analytics Strengthens Protection with ArcSight

CYBER SECURITY INFORMATION SHARING & COLLABORATION

WRITTEN TESTIMONY OF

Big Data Analytics in Network Security: Computational Automation of Security Professionals

Reduce Your Breach Risk: File Integrity Monitoring for PCI DSS Compliance and Data Security

Average annual cost of security incidents

A Case for Managed Security

Who s Doing the Hacking?

The Top Ten of Information Security - For 2015

Malware. Stopping cyberattacks. Sponsored by

Privilege Gone Wild: The State of Privileged Account Management in 2015

Are you prepared to be next? Invensys Cyber Security

Cybersecurity: What CFO s Need to Know

Incident Response. Proactive Incident Management. Sean Curran Director

Cybersecurity and Privacy Hot Topics 2015

Securing Cloud-Based

Cybersecurity: Protecting Your Business. March 11, 2015

Windows XP End-of-Life Handbook for Upgrade Latecomers

CYBERSECURITY IN HEALTHCARE: A TIME TO ACT

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

Financial Implications of Cybercrime Meeting the Information Security Management Challenge in the Cyber-Age

Security and Privacy

Protecting What Matters Most. Bartosz Kryński Senior Consultant, Clico

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

The Mile High Denver Chapter of ARMA welcomes you to our virtual meeting!

Cyber Security Incident Response Program. Dr. Michael C. Redmond, PhD MBCP,FBCI,CEM,PMP,MBA

Meeting the Information Security Management Challenge in the Cyber-Age

Defending Against Data Beaches: Internal Controls for Cybersecurity

State of Security Survey GLOBAL FINDINGS

Cyber Security Threats: What s Next and How Do We Reduce the Risks?

White. Paper. Rethinking Endpoint Security. February 2015

CYBER SECURITY THREAT REPORT Q1

Breaking the Cyber Attack Lifecycle

How to Protect Sensitive Corporate Data against Security Vulnerabilities of Your Vendors

$22k. Payment Card Data Breaches: What You Need to Know About Your Risk and Liability. First Data Market Insight

Security Awareness Campaigns Deliver Major, Ongoing ROI

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

SecurityMetrics Introduction to PCI Compliance

Cybersecurity Governance Update on New FFIEC Requirements

Transcription:

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY. A guide for IT security from BIOS The Problem SME s, Enterprises and government agencies are under virtually constant attack today. There have been significant breaches at RSA, Global Payments, ADP, Symantec, International Monetary Fund, and most notably Sony. Undoubtedly thousands more have occurred that we haven t even heard about. Flame, Stuxnet, and a number of other cyber attacks have been uncovered that set an entirely new standard for complexity and sophistication. Fundamentally, these developments make clear that the cybercriminals, nation-states, and hacker activists waging these attacks are growing increasingly sophisticated and more effective in their efforts to steal and sabotage. Leveraging dynamic malware, targeted spear phishing emails, elaborate Web attacks and a host of other tactics, these criminals know how to bypass traditional security mechanisms like firewalls and next-generation firewalls, IPS, anti-virus (AV), and gateways. Think your organization is immune? If so, it s in the vast minority: ninety five percent of organizations are routinely compromised, with the theft of intellectual property, customer records, and other sensitive data increasingly common. Here s how a 2012 Gartner report put it: There is widespread agreement that advanced attacks are bypassing our traditional signature-based security controls and persisting undetected on our systems for extended periods of time. The threat is real. You are compromised; you just don t know it. Below shows the changing agendas of Cyber Attacks over time: Between 2003 and 2013 Verizon looked into 92,000 security breaches. 01

Number of breaches per threat action category over time As you can see, Hacking has grown exponentially. In addition much of the Malware and Social attacks were simply the first phase in a hack. The growth of hacking can be attributed to the monetization of cyber-crime. The graph to the right from the same study shows the motivation behind these attacks. Number of breaches per threat actor active over time As you can see the overriding motivation is financial. In this case information is either stolen and sold or held for ransom. A second motivation is espionage, a famous example being Sony pictures. 02

WHY YOU SHOULD CARE If your organization is like most you are spending a lot of money, perhaps 10-20% of your annual IT budget, on security but it s not working against the new breed of advanced cyber attacks. If that s not enough to concern you consider how losing the security battle can hurt your business: Loss of competitiveness. When cybercriminals can circumvent your defenses, trade secrets, patents, customer records, and M&A activities can all be exposed and significantly weaken your competitive position. Compliance breaches If you are not protected from breaches, your organization s compliance with relevant policies and mandates is in serious jeopardy. Whether you are a financial institution that needs to safeguard credit card data and stay compliant with PCI DSS, or your business is tasked with compliance with HIPAA, NERC, FISMA, privacy rules, or any of the other policies in effect around the world, data breaches can lead to fines, lost business, and a host of other penalties. Damaged reputation Customer trust and market share are precious commodities. All it takes is a significant breach to hit the headlines, and those hard-earned assets can erode quickly. Estimates from companies that have been breached have ranged in the several millions of dollars up to 200 million dollars. Lost productivity If your security team is finding out about breaches after the fact, they are going to be scrambling to handle forensics, shore up the vulnerability, assess where other similar gaps may be, rebuild corrupted systems, and so on. The time spent on these efforts is time your business doesn t get back and that can t be focused on more strategic efforts. WHY ARE TODAY S SECURITY DEFENSES FAILING? In this battle, IT & IT Security teams are using an outdated arsenal: legacy security platforms based on technology that originated many years ago using signatures. These tools are good at blocking basic malware that is known and documented, such as viruses, but they are incapable of identifying today s dynamic, multi-pronged cyber-attacks, which are often called advanced malware or advanced persistent threats (APTs). Companies with more advanced Security are using behavioral tools designed to prevent zero day attacks which is more effective then legacy security platforms. However all these security devices, old or new fail to provide IT and Security teams with two vital pieces of information? 03

Firstly: what can the hackers see? Humans make mistakes. Yet in almost all companies we deal with non-have ever externally scanned their environment to quality check the configuration, architecture or software level of their externally facing infrastructure. One mistake, firewall that isn t updated or unpatched server could undo the whole effort. The diagram below shows the origin of security breaches. As you can see more then 90% are from external threats. Number of breaches per threat actor category over time Secondly, IT & Security Teams need to know when a breach occurs! In the case of the Sony Pictures, hackers gained entry months before they announced to the Sony staff that they had been hacked. After gaining initial entry they moved horizontally through the network capturing Administrator and User credentials without detection. Over a period of many months they extracted TB s of data from Sony including all their emails, Staff Salary information and unreleased movies. They then destroyed all Sony s backups and then erased all their data leaving only a skull and cross bow on each staff members PC Finally they published all the companies secrets online leading to the resignation of the CEO and other C level staff. The fact that Sony had no idea they had been hacked for months is what made this hack so damaging. Had they been hacked and been able to identify the breach within hours or days, they would not have suffered such horrendous damage to their brand and their company. TB s of data were extracted over many months. At no point was the Sony IT team aware. 04

WHAT CAN YOU AS A C LEVEL EXEC DO? Firstly, allow your team to see what hackers can see: Undertake an external vulnerability assessment from BIOS so we can show your teams what the hackers can see. Once fixes and patches and changes are applied to close the gaps take a Internal and External Continuous Vulnerability Scanning from BIOS. This will allow your team to know what patches are needed on an ongoing bases, allow them to be aware of any configuration mistakes and provide them with up to date intelligence. Your team will also have access to our Security team and monthly in-depth and management reporting. All for a low fixed monthly cost. Secondly, give your team the service to know if a breach occurs: Take a SIEM (Security Incident Event Management) Service from BIOS. This will allow us to alert your team should any incents occur. Our Security Operation Center operates 24x7 and will work diligently with your team off and on site to address any security concerns. To see if your company qualifies for a free one off Vulnerability Assessment contact us today on 800 BIOSME or visit www.biosme.com 05