Defensible Strategy To. Cyber Incident Response



Similar documents
Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

IT Security Incident Management Policies and Practices

Incident Response Plan for PCI-DSS Compliance

How-To Guide: Cyber Security. Content Provided by

Insurance Considerations Related to Data Security and Breach in Outsourcing Agreements

Information Security and Risk Management

Data Security Incident Response Plan. [Insert Organization Name]

Information Technology Policy

Top five strategies for combating modern threats Is anti-virus dead?

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Things To Do After You ve Been Hacked

Working with the FBI

2010 Data Breach Investigations Report

Presented by Evan Sylvester, CISSP

Keynote: FBI Wednesday, February 4 noon 1:10 p.m.

Cybersecurity Awareness. Part 1

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Information Security Incident Management Guidelines

CYBERSECURITY BEST PRACTICES FOR SMALL AND MEDIUM PENNSYLVANIA UTILITIES

Standard: Information Security Incident Management

GEARS Cyber-Security Services

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Cyber Threats: Exposures and Breach Costs

AB 1149 Compliance: Data Security Best Practices

Computer Security: Principles and Practice

How To Audit The Mint'S Information Technology

Anthony J. Keane, MSc, PhD and Jason Flood, MSc Information Security & Digital Forensics Research Group Institute of Technology Blanchardstown

Internet Gaming: The New Face of Cyber Liability. Presented by John M. Link, CPCU Cottingham & Butler

N-Dimension Solutions Cyber Security for Utilities

Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem

Cybercrime: risks, penalties and prevention

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Demystifying Cyber Insurance. Jamie Monck-Mason & Andrew Hill. Introduction. What is cyber? Nomenclature

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

External Supplier Control Requirements

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

GALLAGHER CYBER LIABILITY PRACTICE. Tailored Solutions for Cyber Liability and Professional Liability

Security on Embedded Systems

ABB s approach concerning IS Security for Automation Systems

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

Cyber security Time for a new paradigm. Stéphane Hurtaud Partner Information & Technology Risk Deloitte

NEW JERSEY STATE POLICE EXAMPLES OF CRIMINAL INTENT

Internet Safety and Security: Strategies for Building an Internet Safety Wall

DATA BREACH COVERAGE

State of Vermont. Intrusion Detection and Prevention Policy. Date: Approved by: Tom Pelham Policy Number:

ITAR Compliance Best Practices Guide

CyberNEXS Global Services

Policy Title: HIPAA Security Awareness and Training

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

Collateral Effects of Cyberwar

Cyber Security: Cyber Incident Response Guide. A Non-Technical Guide. Essential for Business Managers Office Managers Operations Managers.

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

Don t Fall Victim to Cybercrime:

Cyber Security Management

10 Smart Ideas for. Keeping Data Safe. From Hackers

Guidelines 1 on Information Technology Security

Iowa Health Information Network (IHIN) Security Incident Response Plan

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Cybersecurity Workshop

Brief. The BakerHostetler Data Security Incident Response Report 2015

Better secure IT equipment and systems

Foundstone ERS remediation System

Healthcare and IT Working Together KY HFMA Spring Institute

A PROVEN THREAT A TRUSTED SOLUTION MCCANN CYBER SECURITY SOLUTIONS

Countering Insider Threats Jeremy Ho

The Cyber Threat Profiler

Network/Cyber Security

Data Management Policies. Sage ERP Online

CONSULTING IMAGE PLACEHOLDER

Internet threats: steps to security for your small business

THE CYBER SECURITY PLAYBOOK WHAT EVERY BOARD OF DIRECTORS SHOULD KNOW BEFORE, DURING, AND AFTER AN ATTACK SECURITY REIMAGINED

Attachment A. Identification of Risks/Cybersecurity Governance

1. (a) Full name of proposer including trading names if any (if not a limited company include full names of partners) Date established

Incident Response. Proactive Incident Management. Sean Curran Director

Seven Things To Consider When Evaluating Privileged Account Security Solutions

ITS425: Ethical Hacking and Penetration Testing

Transcription:

Cyber Incident Response Defensible Strategy To Cyber Incident Response

Cyber Incident Response Plans Every company should develop a written plan (cyber incident response plan) that identifies cyber attack scenarios and sets out appropriate responses. The plan should usually address the following basic parts: Response team. Reporting. Initial response. Investigation. Recovery and follow-up. Public relations. Law enforcement.

Cyber Incident Response Team Specifically, the response team should: Identify and classify cyber attack scenarios. Determine the tools and technology used to detect and prevent attacks. Secure the company's computer network. Develop a checklist for handling initial investigations of cyber attacks. Determine the scope of an internal investigation once an attack has occurred. Conduct any investigations within the determined scope. Address data breach issues, including notification requirements. Conduct follow up reviews on the effectiveness of the company's response to an actual attack.

Discovery and Reporting of Cyber Incidents The cyber incident response plan should address procedures to take on discovery and reporting of cyber attack incidents, including: Designating response team members to monitor industry practices to ensure that the: company's information systems are appropriately updated; and company installs the latest software security patches to allow for early discovery of attacks. Continuously monitoring the company's computer logs to discover any incidents. Creating a database to track all reported incidents. Creating a risk rating to classify all reported incidents as low, medium or high risk to facilitate an appropriate response.

Initial Response to a Cyber Attack If a potential attack is reported, the designated response team member should conduct a preliminary investigation to determine whether a cyber attack has occurred. If a cyber attack has occurred, the response team should follow the investigation checklist set out in the cyber incident response plan to conduct the initial investigation. The initial response varies depending on the type of attack and level of seriousness. However, the response team should aim to: Stop the cyber intrusions from spreading further into the company's computer systems. Appropriately document the investigation.

Investigating a Cyber Attack Following the initial response assessment, the company may decide to undertake a formal internal investigation depending on the level of intrusion and its impact on critical business functions. An internal investigation allows the company to: Gain a fuller understanding of the computer intrusion. Increase its chances of identifying the attacker. Detect previously-unknown security vulnerabilities. Identify required improvements to computer systems. If the company's response team or IT department lacks the capacity or expertise to conduct an internal investigation the company may wish to retain: Legal counsel. A cyber security consultant.

Common Cyber Attack Scenarios Cyber attacks often fall into one or more common scenarios. Effective cyber incident response plans anticipate and prepare for these common scenarios in advance and provide preliminary investigatory questions for each scenario. btaining fast and accurate answers to these questions helps shape and expedite the investigation.

Social Engineering When social engineering is suspected, companies should immediately ask: What information was potentially disclosed or breached? What system at the company was targeted? How was the attack discovered? Is there a reporting process in place for social engineering attacks? Are complete phone logs available? What company or system weakness allowed the attack to succeed?

Exploitation Malware Viruses and malware that exploit vulnerabilities in a company's computer systems are prevalent. For example, hackers may introduce them to computer systems by tricking employees into opening infected e-mails. Some malware is designed to steal confidential information such as social security numbers, credit card numbers and bank account log in numbers.

Extortion and Blackmail A company may receive threats from individuals claiming to have hacked its website or computer systems offering to return stolen confidential information in exchange for money or property. These extortionists frequently target small businesses because of their perceived inability to fight back. In this case, the company must conduct an immediate threat assessment to determine whether its computer systems have been attacked and, if so, how it was accomplished.

Recovery and Follow-Up After a Cyber Attack The cyber incident response plan should address the recovery of the company's computer systems by both: Eliminating the vulnerabilities exploited by the attacker and any other identified vulnerabilities. Bringing the repaired systems back online. nce systems are restored, the response team should: Determine what cyber security management improvements are needed to prevent similar incidents from reoccurring. Evaluate how the response team executed the response plan.

Citation: PLC. QUESTINS