IT Security Recent Data Breaches, Lessons Learned and Best Practices



Similar documents
IT Security Risks & Trends

Cybersecurity: Protecting Your Business. March 11, 2015

Defending Against Data Beaches: Internal Controls for Cybersecurity

Data Breach Response Planning: Laying the Right Foundation

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

10 Smart Ideas for. Keeping Data Safe. From Hackers

Information Security and Risk Management

Incident Response. Proactive Incident Management. Sean Curran Director

I ve been breached! Now what?

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Proactive Credential Monitoring as a Method of Fraud Prevention and Risk Mitigation. By Marc Ostryniec, vice president, CSID

September 20, 2013 Senior IT Examiner Gene Lilienthal

Presented by Evan Sylvester, CISSP

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Cybersecurity Issues for Community Banks

An New Approach to Security. Chris Ellis McAfee Senior System Engineer

Dissecting the Recent Cyber Security Breaches. Yu Cai School of Technology Michigan Technological University

2012 Data Breach Investigations Report

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Perspectives on Cybersecurity in Healthcare June 2015

Document Imaging Solutions. The secure exchange of protected health information.

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

How To Stop A Cybercriminal From Stealing A Credit Card Data From A Business Network

2012 NCSA / Symantec. National Small Business Study

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

INVESTIGATIONS REPORT

InfoGard Healthcare Services InfoGard Laboratories Inc.

WHITE PAPER KEEPING CLIENT AND EMPLOYEE DATA SECURE DRIVES REVENUE AND BUILDS TRUST PROTECTING THE PROTECTOR

Security Management. Keeping the IT Security Administrator Busy

Retail Security: Enabling Retail Business Innovation with Threat-Centric Security.

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

INDUSTRY OVERVIEW: RETAIL

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

Internet threats: steps to security for your small business

COMMITTEE ON COMMERCE, SCIENCE, AND TRANSPORTATION. A Kill Chain Analysis of the 2013 Target Data Breach

Franchise Data Compromise Trends and Cardholder. December, 2010

Common Data Breach Threats Facing Financial Institutions

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Network Security & Privacy Landscape

GUIDE TO IMPROVING INFORMATION SECURITY IDENTIFYING WEAKNESSES & STRENGTHENING SECURITY

Impact of Data Breaches

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

KEY STEPS FOLLOWING A DATA BREACH

Cyber Essentials KAMI VANIEA 2

Seven Strategies to Defend ICSs

INDUSTRY OVERVIEW: FINANCIAL

The Onslaught of Cyber Security Threats and What that Means to You

Cyber Security Management

Current Trends in Cyber Crime & Payments Fraud cliftonlarsonallen.com

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

CYBERSECURITY HOT TOPICS

Outline. Outline. What is HIPAA? I. HIPAA Compliance II. Why Should You Care? III. What Should You Do Now?

Data Breaches and Cyber Risks

Network/Cyber Security

Nine Network Considerations in the New HIPAA Landscape

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

SECURITY TERMS: Advisory Backdoor - Blended Threat Blind Worm Bootstrapped Worm Bot Coordinated Scanning

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Data Security for the Hospitality

Presented by: Mike Morris and Jim Rumph

Don t Fall Victim to Cybercrime:

External Supplier Control Requirements

Security & Compliance, Sikich LLP

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Top Fraud Trends Facing Financial Institutions

Practical Steps To Securing Process Control Networks

Cybercrime: risks, penalties and prevention

Transcription:

2014 CliftonLarsonAllen LLP IT Security Recent Data Breaches, Lessons Learned and Best Practices CLAconnect.com

Goals Review recent data breaches Highlight lessons learned 9 patterns of attacks Best practices

Recent Data Breaches 2014 CliftonLarsonAllen LLP

Recent Data Breaches Target 40 million debit and credit cards undetected for 3 weeks Home Depot possibly ~60 million debit and credit cards undetected for 5 months Community Health Systems - ~4.5 million patients data JP Morgan - 76 million households and 7 million small businesses Easy to share large volumes of data!

Recent Data Breaches Healthcare Aventura Hospital and Medical Center an employee improperly accessed 82,601 patient records Central Utah Clinic notifying 30,000+ patients of a potential data breach after discovering hacker s had accessed on of the clinic s servers Duke University Health System notified patients due to a stolen thumb drive that contained unencrypted patient names and physician names Memorial Hermann Health Systems notifying 10,000+ of a security breach due to an employee accessing unauthorized patient information St. Elizabeth s Medical Center notified patients of a potential data breach after a laptop and thumb drive were stolen from a physician s home Cedars-Sinai Medical Center in Los Angeles notified 500+ patients that their protected health information may have been compromised due to an unencrypted laptop being stolen from an employees home Beth Israel Deaconess Medical Center to pay $100K to settle data breach Beckers Health IT & CIO Report - Sept. 19, 2014

Recent Data Breaches Healthcare Notes 29.3 million - the number of patient health records compromised in a HIPAA data breach since 2009 Out of the 90,000+ HIPAA breach cases OCR has received since 2003 17% have resulted in fines HHS Office for Civil Rights Director indicates that most HIPAA-covered entities fail to perform a comprehensive, thorough risk analysis and fail to apply the results of that analysis Healthcare IT News February 6, 2014 article HIPAA data breaches climb 138 percent

Recent Data Breaches General Costs 2014 Ponemon Institute Research Report Total Average Cost paid by organizations increased from $5.4M to $5.9M Average # of breached records is 29,087 Per Norton/Symantec Corp Cost of global cybercrime: $388 billion; Global black market in marijuana, cocaine and heroin: $288 billion Lost customers costs $$ to replace Lost reputation costs $$ to re-build brand 2014 Cost of Breach Studies: United States - Ponemon Research Institute: Norton Symantec Corp

Recent Data Breaches OCR Penalties New York and Presbyterian Hospital agreed to pay OCR $3,300,000 to settle potential violations by failing to secure thousands of patient s electronic protected health information (ephi) held on their network. Columbia University paid $1,500,000 for their part in the joint breach Parkview Health System has agreed to pay $800,000 and adopt a corrective action plan to correct deficiencies in its HIPAA compliance program in medical records dumping case Concentra Health Services agreed to pay $1,725,220 to settle potential violations after unencrypted laptop was stolen from one of its facilities. Concentra had taken steps to begin encryption but the efforts were incomplete and inconsistent over time 2014 HIPAA Enforcement Case Examples www.hhs.gov/ocr/prvacy/hipaa/enforcement/examples/

Recent Data Breaches Health Hazards ECRI 2015 Top 10 Health Technology Hazards 2. Data integrity: Incorrect or missing data in electronic health records and other health IT systems 9. Cybersecurity: Insufficient protections for medical devices and systems ECRI Institute web-site press release - https://www.ecri.org/press/pages/ecri-institute-announces-top-10-health- Technology-Hazards-for-2015.aspx

Recent Data Breaches - Target Target On December 19, 2013, Target publicly confirmed that 40 million credit and debit card accounts were exposed in a breach of its network Thieves were able to sell information from these cards via online black market forums known as card shops. These websites list card information including the card type, expiration date, track data (account information stored on a card s magnetic stripe), country of origin, issuing bank, and successful use rate for card batches over time COMMITTEE ON SCIENCE, COMMERCE AND TRANSPORTATION, MAJORITY STAFF REPORT FOR CHAIRMAN ROCKEFELLER, MARCH 26, 2014

Recent Data Breaches - Target Target Malware new variant of BlackPOS (a.k.a. Kaptoxa ), a malware strain designed to siphon data from cards when they are swiped at infected point-of-sale systems running Microsoft Windows KrebsonSecurity September 18, 2014

Recent Data Breaches - Target COMMITTEE ON SCIENCE, COMMERCE AND TRANSPORTATION, MAJORITY STAFF REPORT FOR CHAIRMAN ROCKEFELLER, MARCH 26, 2014 ; Krebs on Security Article Feb. 2014

Recent Data Breaches - Sony Day 1 - Nov 24 th All Sony computers receive a picture with an image of a skeleton with stylized long fingers and a message that indicates that the hackers have obtained all of their data and issues demands. Sony announces hack, global electronic operations are shut down. Hacker s have obtained 100 terabytes of Sony data Day 4 - Nov 27 th - Five Sony films, including four that had yet to be released, are dumped onto online file-sharing hubs. One was downloaded a million times Day 8 Dec 1 st Pre-bonus salaries of the top 17 Sony executives are leaked and 6000 current and former Sony employees are leaked Day 12 Dec 5 th Hackers threaten Sony employees Sign objection or you and your family will be in danger Day 22 Dec 16 Cyberterrorists threaten to attack movie theaters that show The Interview Deadline web-site -December 22,2014 article

Recent Data Breaches Physical Impact Cyber Attack Caused Damage at German Steel Mill (January 8, 2015) A report released in mid-december disclosed that a cyber attack on a German steel mill caused damage to the facility. The attackers disrupted the plant's control system to make it impossible to shut down a blast furnace properly. The damage was described as "massive," but no details were provided. This is the second documented case of a cyber attack causing physical damage - the first was Stuxnet. The report said that the attackers gained initial foothold in the system through the corporate network and worked their way from there to the production systems Wired Magazine Jan. 8 article A Cyber Attack has caused confirmed physical damage for the Second Time Ever by Kim Zetter via Jan. 13 SANS Institute NewsBite

Lessons Learned 2014 CliftonLarsonAllen LLP

How do hackers and fraudsters break in? Healthcare Social Engineering Email Phishing Spear Phishing Verizon Threat Landscape Healthcare Research Report4

How do hackers and fraudsters break in? Social Engineering Email Phishing Spear Phishing

The Fine Art of People Hacking Social Engineering uses non-technical attacks to gain information or access to technical systems: Pre-text telephone calls Hi, this is Randy from Comcast. I am working with Mike, and I need your help Building penetration Seeding Email attacks

Physical (Facility) Security Compromise the site: Hi, Joe said he would let you know I was coming to fix the printers Plant devices: Keystroke loggers Wireless access point Thumb drives ( Switch Blade ) Examples -Sumitomo Bank (2005) -http://www.networkworld.com/news/2009/012209-clerical-error-foiled-sumitomo-bank.html -Barclays Bank (2013) -http://www.telegraph.co.uk/news/uknews/crime/10322536/barclays-hacking-attack-gang-stole-1.3-million-policesay.html

Phishing attacks Phishing mostly used in espionage attacks targeting executives inevitability of the click 3 e-mails to get a click!! Ands User needs to take action and Need a vulnerability and Software needs to be quietly installed and Needs a communication path back to attacker Verizon Data Breach Investigations Report (DBIR) 2013

Spear Phishing Second Generation phishing Goal is to root the network Install malware Log system activity to harvest passwords Use automated tools to execute fraudulent payments Trick users into supplying credentials (passwords)

3 Primary Motives for Attacks Financial Gain Organized-crime/worldwide Espionage/Intellectual Property (IP) China Hacktivism/activism Verizon Data Breach Investigation Report (DBIR) 2013

TrustWave Intrusion Analysis Report Top Methods of Entry Included: Top Methods of Entry Included: Remote Access Applications [45%] Default vendor supplied or weak passwords [90%] 3 rd Party Connections [42%] MPLS, ATM, frame relay SQL Injection [6%] Web application compromises [90%] Exposed Services [4%]

Attackers learning faster than Defenders In most cases, attackers needs hours to compromise (more then 75% of the cases) where the defenders rarely discover the compromise in less then months (only about 25% of the breaches are detected in days or less) More importantly, the attackers are getting better faster than the defenders are improving their skills and capabilities Verizon Data Breach Investigations Report (DBIR) 2014

NIST Authentication Factors Single-Factor Authentication something you know - - password Two-Factor Authentication something you physically have (i.e., a secure ID token or cell phone for Phone Factor authentication) Three-Factor Authentication something you are biometric authentication (retina, palm veins) 2 Factor is any 2 of the above NIST Special Special Publication 800-51-1 Electronic Authentication December 2011

9 Key Patterns of Attacks Point-of-sale (POS) Intrusions Web App Attacks Insider Misuse Physical Theft/Loss Miscellaneous Errors Crimeware Card Skimmers DoS Attacks Cyber-espionage Verizon Data Breach Investigations Report (DBIR) 2014

9 Key Patterns of Attacks Physical Theft/Loss and Insider Misuse 46% of healthcare industry incidents are due to theft/loss 15% insider misuse 12% miscellaneous errors Verizon Data Breach Investigations Report (DBIR) 2014

9 Key Patterns of Attacks Point-of-sale (POS) Intrusions Brute force, 53% industry-wide; 9% healthcare Use of stolen vendor credentials, 38% Organized crime - Eastern Europe Verizon Data Breach Investigations Report (DBIR) 2014

Lessons Learned Boston Children s Hospital In reflecting on the Anonymous attack, the BCH CIO noted: Distributed Denial of Service (DDoS) countermeasures are crucial. BCH shut down all web-sites and e-mail. Staff communicated using a secure text messaging application the hospital had recently deployed. Know which systems depend on external Internet access. In BCH s event, the EHR system was spared, but the e-prescribing system wasn't Make no excuses when pushing security initiatives. Children's had to shut down email, e-prescribing and external-facing websites quickly. Secure your teleconferences. Send your conference passcode securely, not in the body of your calendar invite. Separate signals from noise. CIO.com article Sep. 14,2014 How Boston Children s Hospital Hit Back at Anonymous

Lessons Learned Organizations need to increase their visibility into what's happening in their enterprises and focus on eliminating those cybersecurity blind spots," says Jason Mical, vice president of cybersecurity for AccessData. Many organizations simply don't have enough tech and security staff to notice these breaches when they occur Information Week Dark Reading Blog June 30, 2014

Risk Mitigation Best Practices 2014 CliftonLarsonAllen LLP

Overall Approach - TK 2 Train your people - Users and Executives who are knowledgeable and savvy Know your network Make your networks resistant to malware Segment your network Make it visible to Executive management Know your data - data first approach minimum necessary access are you a target

Kill Chain Method of Defense For Targeted Attacks Instead of installing static defense tools and waiting for the next attack, network defenders should continuously monitor their systems for evidence that attackers are trying to gain access to their systems. Defenders can use the intelligence they gather about an attacker s playbook to anticipate and mitigate future intrusions based on knowledge of the threat. When a defender analyzes the actions of attackers, finds patterns, and musters resources to address capability gaps, it raises the costs an adversary must expend to achieve their objectives... [and] such aggressors have no inherent advantage over defenders. Eric M. Hutchins, Michael J. Cloppert, Rohan M. Amin, Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains, Lockheed Martin (2011) (online at http://www.lockheedmartin.com/content/dam/lockheed/data/corporate/documents/lm-white- Paper-Intel-Driven-Defense.pdf)

Ten Keys to Mitigate Risks 1. Strong policies and training e-mail use, strong password requirements 2. Defined user roles and permissions minimum necessary 3. Hardened internal systems change default passwords, media limitations (CD, USB devices), disallow local admin rights on workstations

Ten Keys to Mitigate Risks 4. Encryption strategy mobile 5. Vulnerability management process patch and test 6. Well defined perimeter security layers: Know Your Network

Ten Keys to Mitigate Risks 7. Data classification strategies Know Your Data 8. Defined incident response plan and procedures 9. Centralized audit logging, analysis, and automated alerting capabilities 10. Test, Test, Test

Questions? Hang on, it s going to be a wild ride!! Kyle Conn, Manager Information Security Services Group kyle.conn@claconnect.com *** (704) 998-5213