CYBERSECURITY INVESTIGATIONS



Similar documents
THE EVOLUTION OF CYBERSECURITY

Click to edit Master title style

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Cybersecurity: Protecting Your Business. March 11, 2015

Cybersecurity Issues for Community Banks

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Cybersecurity Awareness. Part 2

Cybersecurity The role of Internal Audit

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cybersecurity Workshop

Into the cybersecurity breach

Best Practices: Reducing the Risks of Corporate Account Takeovers

Cybersecurity: What CFO s Need to Know

SECURITY. Risk & Compliance Services

Who s Doing the Hacking?

Cybersecurity Awareness

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

Cybersecurity. Are you prepared?

Data Breach Response Planning: Laying the Right Foundation

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

GEARS Cyber-Security Services

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

Cybersecurity y Managing g the Risks

OCIE Technology Controls Program

Data Security Incident Response Plan. [Insert Organization Name]

Cybersecurity and Privacy Hot Topics 2015

NIST Cybersecurity Framework & A Tale of Two Criticalities

Cyber Security and your Financial Institution: Are you ready for the increased scrutiny related to cyber risks?

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

INFORMATION SECURITY FOR YOUR AGENCY

Managing cyber risks with insurance

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Best practices and insight to protect your firm today against tomorrow s cybersecurity breach

CYBERSECURITY HOT TOPICS

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

Reducing Cyber Risk in Your Organization

08/10/2013. Data protection and compliance. Agenda. Data protection life cycle and goals. Introduction. Data protection overview

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Cybersecurity Awareness. Part 1

DUUS Information Technology (IT) Incident Management Standard

RLI PROFESSIONAL SERVICES GROUP PROFESSIONAL LEARNING EVENT PSGLE 123. Cybersecurity: A Growing Concern for Small Businesses

Network Security & Privacy Landscape

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

What Directors need to know about Cybersecurity?

THE NEW REALITY OF RISK CYBER RISK: TRENDS AND SOLUTIONS

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

Italy. EY s Global Information Security Survey 2013

CYBER & PRIVACY INSURANCE FOR FINANCIAL INSTITUTIONS

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

Cybersecurity: A Growing Concern for All Businesses. RLI Design Professionals Design Professionals Learning Event DPLE 160 October 7, 2015

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Information Security Services

A Case for Managed Security

Guide to Vulnerability Management for Small Companies

NATIONAL CYBER SECURITY AWARENESS MONTH

Mitigating and managing cyber risk: ten issues to consider

Cyber-Security Risk- IP Theft and Data Breaches Protecting your Crown Jewels Internally and with Your Key Third Parties

Logging In: Auditing Cybersecurity in an Unsecure World

The NIST Cybersecurity Framework (CSF) Unlocking CSF - An Educational Session

Where insights lead Cybersecurity and the role of internal audit: An urgent call to action

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Cybersecurity Health Check At A Glance

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

The Onslaught of Cyber Security Threats and What that Means to You

Cyber Security and Information Assurance Controls Prevention and Reaction NOVEMBER 2013

Case Study: Hiring a licensed Security Provider

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Top Ten Technology Risks Facing Colleges and Universities

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

Cybersecurity Awareness

Transcription:

CYBERSECURITY INVESTIGATIONS Planning & Best Practices May 4, 2016 Lanny Morrow, EnCE Managing Consultant lmorrow@bkd.com Cy Sturdivant, CISA Managing Consultant csturdivant@bkd.com Michal Ploskonka, CPA Senior Managing Consultant mploskonka@bkd.com 1

TO RECEIVE CPE CREDIT Participate in entire webinar Answer polls when they are provided If you are viewing this webinar in a group Complete group attendance form with Title & date of live webinar Your company name Your printed name, signature & email address All group attendance sheets must be submitted to training@bkd.com within 24 hours of live webinar Answer polls when they are provided If all eligibility requirements are met, each participant will be emailed their CPE certificates within 15 business days of live webinar AGENDA Historical perspective on cyber threats 2016 cyber threat landscape Types of data & industries at risk Current regulatory environment Best practices in cybersecurity preparedness & monitoring Incident response strategies 2

HISTORICAL PERSPECTIVE Actors Thrill seekers Pioneers Teenagers Organized crime rings State sponsored 3

CHARACTERISTICS OF CYBERCRIMINALS Skilled Persistent Sophisticated Tactical Well funded Difficult to detect Evolving Technical attacks not needed Can use deceivingly simple methods (K.I.S.S) Use of social engineering e.g., Business Email Compromise EVOLUTION OF CYBER THREATS Approach Viruses Trojans Email account hijacking Social engineering End Result Disruption Identity theft Loss of public trust Loss of proprietary information Monetary gain/loss 4

2016 CYBER THREAT LANDSCAPE CYBER THREAT LANDSCAPE The United States is extremely well connected 87% of the population use the internet The country ranks 2 nd globally for online business-to-consumer transactions Cyberattack is ranked as the # 1 risk for doing business in the U.S., followed by data fraud or theft. Constantly evolving technology Rapid increase in the number of connected devices Rapid increase in the volume of stored data Especially unstructured data Source: the Global Risks Report 2016, published by the World Economic Forum 5

There are only two types of companies: those that have been hacked, and those that will be. Even that is merging into one category: those that have been hacked and will be again. Robert Mueller, FBI Director on Cyber Threat Landscape TOP FIVE CYBERCRIMES 1. Tax-Refund Fraud 2. Corporate Account Takeover 3. Identity Theft 4. Theft of Sensitive Data 5. Theft of Intellectual Property Source: American Institute of CPAs October 2013 study 6

RECENT DEVELOPMENTS Notable data breaches 2013 Target ($252 M in initial costs) 2014 Home Depot ( $43 M by end of 2014) 2015 U.S. Office of Personnel Management, Anthem, IRS, Experian (T-Mobile Customers), Ashley Madison 2016 Hyatt Hotels, Trump Hotel Collection, FDIC, Mossack Fonseca (Panama Papers) Business email compromise Wire/ACH losses W-2 information Ransomware BUSINESS EMAIL COMPROMISE Banks are not the focus of the simpler schemes From October 2013 to December 2014, nonbank businesses lost $215 M through compromised email attacks From January 2015 to August 2015, business losses due to business email compromise increased to $800 M (of which $747 M in the U.S.) Combined worldwide losses due to BEC exceed $2.3 B as of April 2016 Source: Internet Crime Complaint Center (FBI) - Public Service Announcements: https://www.ic3.gov/media/2015/150122.aspx, http://www.ic3.gov/media/2015/150827-1.aspx 7

TYPES OF DATA & INDUSTRIES AT RISK DATA AT RISK Credit/debit card information via POS systems Potential Protected Health Information (PHI) Employee data (PII) Social Security numbers Connectivity to health provider networks via pharmacies User names & passwords Intellectual property Blueprints Business plans Trade secrets, etc. 8

INDUSTRIES AT RISK Targets Businesses Financial institutions/banks Insurance companies Retailers Health care providers Manufacturers Critical industries Governments Law firms Individuals Everyone Key executives & decision makers Accounting & finance Privileged users CURRENT REGULATORY ENVIRONMENT 9

REGULATORY ENVIRONMENT Computer Fraud and Abuse Act (18 U.S.C 1030) of 1986 Many cyber crimes prosecuted under traditional statutes States provide penalties for crimes perpetrated by use of computers or perpetrated against computers State security breach notification laws REGULATORY ENVIRONMENT Regulatory requirements may vary by industry FTC Section 5(a) provides consumer protection Health Insurance Portability and Accountability Act (HIPAA) Federal Financial Institutions Examination Council (FFIEC) SEC Division of Investment Management Guidance No. 2015-02 10

BEST PRACTICES IN CYBERSECURITY PREPAREDNESS & MONITORING CYBERSECURITY PREPAREDNESS UTILIZING THE NIST FRAMEWORK NIST Framework Helps identify & prioritize actions for reducing cybersecurity risk Tool for aligning policy, business & technological approaches to managing that risk Enables organizations to apply principles & best practices of risk management to improve cybersecurity & secure critical infrastructure 11

NIST FRAMEWORK CORE FUNCTIONS NIST Core Functions Standard cybersecurity controls Five functions 22 categories or subdivisions 98 subcategories Form operational culture that addresses cybersecurity risks NIST FRAMEWORK OVERVIEW http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf 12

IDENTIFY Identify Functions are foundational. These controls help an organization understand how to manage cybersecurity risk to systems, assets, data & capabilities. Relating these to a business context is critical for prioritizing efforts Categories Asset Management Business Environment Governance Risk Assessment Risk Management Strategy PROTECT Protect Functions are the safeguards that ensure delivery of critical infrastructure services. In terms of ensuring resilience, these safeguards help to limit or contain the impact of a cybersecurity event. Categories: Access Control Awareness & Training Data Security Information Protection Processes & Procedures Maintenance Protective Technology 13

DETECT Detect Functions identify the occurrence of a cybersecurity event Categories Anomalies & Events Security Continuous Monitoring Detection Processes RESPOND Respond Functions allow an organization to take action on a detected cybersecurity event. The goal of Respond Functions is to contain the impact of a cybersecurity event & remediate vulnerabilities Categories Response Planning Communications Analysis Mitigation Improvements 14

RECOVER Recover Functions are for resilience planning particularly the restoration of capabilities or services impaired by a cybersecurity event Categories Recovery Planning Improvements Communications CYBERSECURITY PREPAREDNESS EFFORTS Discuss cybersecurity issues with the Board & Senior Management on a regular basis, at least quarterly Evaluate evolving cyber threats & vulnerabilities in the risk assessment process for the technologies you use & the products & services you offer Ensure accountability is assigned to those who make business decisions that may introduce new cyber risks Ensure ongoing employee awareness training is kept up to date & provided on a routine basis 15

DEVELOP A CYBERSECURITY PROGRAM A cybersecurity program should integrate all aspects of an institutions existing programs. Be sure to utilize what you already have Overall Information Security Program Business Continuity & Disaster Recovery, including capacity & performance planning Incident Response & Crisis Management Plans Third-Party Risk Management CYBERSECURITY BEST PRACTICES Board & Senior Management Responsibilities, Duties & Best Practices Ensure adequate strategic plans & budgetary resources are provided Ensure the information security officer has adequate authority, resources & independence Ensure threat intelligence & collaboration is timely, ongoing, risk focused, reported & actionable Develop attainable, measurable & repeatable processes to mitigate risks Incorporate cybersecurity into the risk-based audit plan Maintain accurate asset inventories & be aware of ports of entry (you can t protect what you don t know exists) Ensure enterprisewide awareness training is performed (educate & motivate) Ensure BIA, BCP/DR, information security & incident response policies & procedures address cybersecurity Include cyber elements in annual disaster recovery tests 16

CYBERSECURITY BEST PRACTICES Use e-mail filters, Internet Protocol (IP) filtering & data file integrity checks Use encryption to protect confidential data Implement data loss prevention controls (USB ports, email, etc.) Do not use default or weak passwords (12 alphanumeric & complex) Track, report, independently test & update security patches based on a risk priority schedule (Microsoft & non-microsoft patches) Rename network admin accounts, separate production & admin login privileges & do not share network admin login credentials Control executable file authorities (least privileged access) Conduct internal & external vulnerability scans to ensure systems are hardened Update anomaly detection tools regularly & understand configurations Use log analyzers (Security Information & Event Management SIEM tools) to wade through the false positives & assign responsibility for log review INCIDENT RESPONSE STRATEGIES 17

BREACH RESPONSE STRATEGIES Identify Crown Jewels Plan before something bad happens Set a response protocol Establish an internal response team Identify your external resources in advance Legal counsel (notification requirements) IT security experts Digital forensics Public Relations CANDIDATES FOR DREAM TEAM IT & risk management Operations management External counsel Internal counsel Law enforcement Insurance company Data center Outside Consultants: -Incident response -Digital forensics -Forensic investigations 18

Assemble team & designate leader Classify/ declare the incident Determine notification requirements Investigate & document Contain damage RESPONSE PROTOCOL Recover & build on experience PRESERVATION DURING AN INCIDENT Locking down systems is first priority Second priority is to forensically preserve affected systems Phishing schemes for ransomware, wire transfers or information harvesting Very low likelihood of tracing to offender Inside job or collusion More likely to be traced Forensic preservation involves creating full image copies of affected systems Insurance companies often require some level of investigation & expert opinion Forensic documentation is key Interviews by experienced professionals to ascertain chain of events & identify potential inside issues 19

INVESTIGATION PHASE Investigate & document Collect, analyze, protect & preserve evidence Chain of custody rules Inventory compromised systems & information Document date, time, system, detailed event description, contact information, identification of the asset, etc. Identify & document threat actor tactics, techniques & procedures Report all findings to the incident response team This information may be valuable to law enforcement NEVER TOO PREPARED Need backups for each team member Perpetually updated contact information Review vendors (contracts, policies, contacts, bonding, security) Fire drill Unexpected test incident to test systems. Superior to other forms of testing Unique tests dumpster diving the trash, after-hours workstation checks, periodic fake phishing emails, installed software, internet history, USBs, etc. Education & culturalization of diligence 20

SPECIAL TOPICS IN CYBERSECURITY RANSOMWARE Best Practices Entry point often phishing Education is key to preventing the fatal click In lieu of payment, restore from backups Backup policy should include special class of essential operating items. These should be backed up daily Restoring from a smaller set of essential files saves lots of time & money, reduces down time Notify local law enforcement, this is particular focus right now Paying the ransom will only encourage future attempts 21

THEFT OF TRADE SECRETS Not necessarily a cybersecurity attack but same consequences Employee(s) compromise sensitive, proprietary or intellectual property-type information Motivation is often to open a competing business, join with a competitor, damage reputation or to sell information to others Common methods include (1) removable device, (2) email or (3) upload to cloud storage Monitoring systems should accommodate internet & email activity involving file uploads or transfers Periodic email review or flagging particular keywords recommended Whitelisting USB devices recommended More common than DoS attacks & other types of threats, but far less understood or planned for CYBER INSURANCE Policies relatively new Everyone needs one (backstop essential) Consider types of losses Business interruption Additional expenses Your financial losses Losses to third parties Negotiate coverages 22

RESOURCES National Institute of Standards & Technology s Framework for Improving Critical Infrastructure Cybersecurity FTC s Start with Security Guide Best Practices for Victim Response & Reporting of Cyber Incidents drafted by the Cybersecurity Unit of the U.S. Department of Justice (Computer Crime & Intellectual Property Section) Internet Crime Complaint Center Secret Service Electronic Crimes Task Force QUESTIONS? 23

CONTINUING PROFESSIONAL EDUCATION (CPE) CREDITS BKD, LLP is registered with the National Association of State Boards of Accountancy (NASBA) as a sponsor of continuing professional education on the National Registry of CPE Sponsors. State boards of accountancy have final authority on the acceptance of individual courses for CPE credit. Complaints regarding registered sponsors may be submitted to the National Registry of CPE Sponsors through its website: www.learningmarket.org. The information in BKD webinars is presented by BKD professionals, but applying specific information to your situation requires careful consideration of facts & circumstances. Consult your BKD advisor before acting on any matters covered in these webinars. CPE CREDIT CPE credit may be awarded upon verification of participant attendance For questions, concerns or comments regarding CPE credit, please email the BKD Learning & Development Department at training@bkd.com 24

THANK YOU! FOR MORE INFORMATION Lanny Morrow 816.221.6380 lmorrow@bkd.com Cy Sturdivant 615.988.3600 csturdivant@bkd.com Michal Ploskonka 630.282.9495 mploskonka@bkd.com 25