Agenda. 1. Do You Need to Be Concerned? 2. What organizations can do to better protect. 3. What you can do personally to better protect. 4.

Similar documents
Information Security Services

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Information Security for the Rest of Us

Bad Romance: Three Reasons Hackers <3 Your Web Apps & How to Break Them Up

Network and Security Controls

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

Teradata and Protegrity High-Value Protection for High-Value Data

IT Security Risks & Trends

Defending Against Data Beaches: Internal Controls for Cybersecurity

NATIONAL CYBER SECURITY AWARENESS MONTH

defending against advanced persistent threats: strategies for a new era of attacks agility made possible

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Smarter Security for Smarter Local Government. Craig Sargent, Solutions Specialist

End-user Security Analytics Strengthens Protection with ArcSight

A Decision Maker s Guide to Securing an IT Infrastructure

Loophole+ with Ethical Hacking and Penetration Testing

SecurityMetrics Vision whitepaper

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Enterprise Computing Solutions

PENETRATION TESTING GUIDE. 1

Data Security Best Practices & Reasonable Methods

Defending the Database Techniques and best practices

Information Security Addressing Your Advanced Threats

SANS Top 20 Critical Controls for Effective Cyber Defense

FERPA: Data & Transport Security Best Practices

Barracuda Web Site Firewall Ensures PCI DSS Compliance

FORBIDDEN - Ethical Hacking Workshop Duration

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Simplifying Security & Compliance Innovating IT Managed Services. Data Security Threat Landscape and IT General Controls

Threat landscape how are you getting attacked and what can you do better protect yourself and your e-commerce platform

Cyber Exploits: Improving Defenses Against Penetration Attempts

Protecting Sensitive Data Reducing Risk with Oracle Database Security

Sygate Secure Enterprise and Alcatel

Incident Response. Proactive Incident Management. Sean Curran Director

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Protecting Your Organisation from Targeted Cyber Intrusion

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

CORE IMPACT AND THE CONSENSUS AUDIT GUIDELINES (CAG)

Business Risk Assessment - A Primer

2012 Data Breach Investigations Report

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

locuz.com Professional Services Security Audit Services

Security and Privacy

Evolution Of Cyber Threats & Defense Approaches

Why The Security You Bought Yesterday, Won t Save You Today

Course Descriptions November 2014

INCIDENT RESPONSE CHECKLIST

How to Secure Your Environment

September 20, 2013 Senior IT Examiner Gene Lilienthal

PROTECT YOUR COMPUTER AND YOUR PRIVACY!

White Paper. Information Security -- Network Assessment

CKAHU Symposium Cyber-Security

Your company protected against cybercrime

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

Secure Your Mobile Workplace

Commercial Practices in IA Testing Panel

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Security and Vulnerability Testing How critical it is?

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Information Security Engineering

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

Secure Web Applications. The front line defense

Student Tech Security Training. ITS Security Office

Rational AppScan & Ounce Products

How To Perform An External Security Vulnerability Assessment Of An External Computer System

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

CYBER-ATTACKS & SAP SYSTEMS Is our business-critical infrastructure exposed?

Identity Theft Prevention Committee Updates and Discussions: 3/15. Team,

The Business Case for Security Information Management

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Tips for Banking Online Safely

The Evolving Threat Landscape: Protecting Your Mobile and Virtual Environment from Emerging Security Threats

Unified Threat Management, Managed Security, and the Cloud Services Model

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

How-To Guide: Cyber Security. Content Provided by

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Security It s an ecosystem thing

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

Goals. Understanding security testing

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

I ve been breached! Now what?

Protecting Your Data From The Inside Out UBA, Insider Threats and Least Privilege in only 10 minutes!

Information Security Policy

Top 10 Tips to Keep Your Small Business Safe

Office of Inspector General

Presented by Evan Sylvester, CISSP

Developing Secure Software in the Age of Advanced Persistent Threats

Best Practices Guide to Electronic Banking

Top 20 Critical Security Controls

Pentests more than just using the proper tools

Transcription:

Agenda 1. Do You Need to Be Concerned? 2. What organizations can do to better protect 3. What you can do personally to better protect 4. Questions 1

Do You Need to Be Concerned?

Video Data from September 2009 3

Understanding the threat landscape ALL COMPANIES ARE ALL AT RISK. NO MATTER THE SIZE OR INDUSTRY. Attacker gained access to 250,000 user records and passwords Chinese attackers took control of 53 User workstations and stole data 40 Million credit cards & 70 Million customer records stolen. CIO and CISO resigned Hackers captured user accounts, email addresses, phone numbers of 145 million users 80 Million Customer Data from September 2009 Records Stolen 53 Million email addresses stolen. Stolen account information obtained by a third-party to gain access 4

Understanding the threat landscape 15% INCREASE IN THREAT ACTIVITY IN THE FINANCIAL SERVICES INDUSTRY 33% OF BREACHES WERE DISCOVERED INTERNALLY DOWN FROM 37% IN 2012 9 MILLION+ PEOPLE EXPERIENCE IDENTITY THEFT EVERY YEAR 2.5 BILLION RECORDS COMPROMISED OVER THE PAST FIVE YEARS 8 MONTHS Data from September 2009 IS THE AVERAGE TIME AN ADVANCED THREAT GOES UNDETECTED ON A VICTIM S NETWORK 1IN 5 ORGANIZATIONS HAVE BEEN ATTACKED 62% INCREASE IN BREACHES 5

Understanding the threat landscape Organized Crime, Hactivists, Nation State, Industrial Espionage, Insider Threat, Careless Employees all pose Threats to the Financial Services sector Introduction to new technologies such as Mobile, Cloud Computing, Data Analytics are introducing new security challenges The Threat is Intensifying Technology Landscape is Changing Fast There are expanding methods and portals where weaknesses are exposed including, E-Mail / Web, Web User Interface, Identity Compromise, Physical Access & Social Engineering Vulnerabilities and Attack Vectors are Expanding Business Partners and Customers Expect Security & Trust Data from September 2009 Participants and Customers are asking for this functionality to better protect their information 6

What organizations can do to better protect?

A Risk Management Framework Aspects of the Risk Management Cycle & Components 8

Security Management New System Developme nt Legacy Systems Highly Regulated Systems (SEC, FINRA, etc) Test Systems with Confidentia l Data Shadow IT Systems Mainframe, Mini, Workstatio n Systems Internet Systems Will Look for Vulnerabilities and Weakness at each Layer Human & Process Layer Application Layer Database Layer Platform Layer (Operating system) Network Layer Data from September 2009 Physical Layer Data (Confidential Information) 9

Defense in Depth (Area s for Preventative Care) Physical Layer - Locked Computer Rooms / Data Center, Building Security, Unsecure Laptops, Closets, etc. Network Layer - Network Architecture, Firewall, DMZ s, Router Configurations, Filters, etc. Platform Layer - O/S Patches, Templates, Configuration, etc. Database Layer (e.g., Oracle, SQL) - Patches, Templates, Configuration, etc. Application Layer - Authentication and Authorization Engines/Architecture, Secure Coding Practices, OWASP Top 10 (SQL Injection, Cross Site Scripting, Secure email, Optium etc.) Process - Social Engineering, Phishing, Provisioning Processes, Account Management, Generic ID Management, Education & Awareness, Policy Management, Change Management, Segregation of Duties)

Detection (Area s for Detective Care) Physical Layer - Audits, Interview, Visual Observations Network Layer Vulnerability Scanning Tools (nessus), Attack and Penetration Testing's, Intrusion Detection, Intrusion Prevention Platform Layer Vulnerability Scanning Tools Database Layer Vulnerability Scanning Tools, Database security tools; Inspection s Application Layer Vulnerability Scanning Tools, Password Crackers, etc. Process Access Review Tools, Social Engineering Testing, Audits, Open Risk & Issue Management Across Multiple Layers Data Loss Prevention (DLP), Forensic Capabilities (e.g., outsourcing), Anti-Virus, Advance Persistent Threat detection

It should be Everyone s Job Baking Security into the Practitioners Role - Notes Define the What and the How.. Re-use/leverage existing awareness and education documentation Conduct More Education and Awareness (E&A) Establish targeted E&A to by role specific Establish Roles & Responsibilities document (by role) Establish Decision Rights Establish Consequences for non-compliance Establish a checklist of controls for Asset Owners Establish Self audit process (including validation) Establish process to revisit based on risk Handbook for the Role of the asset owner

What Can You Do to Better Protect Yourself and Your Sensitive Data?

Over Sharing and Social Media Tips ü Consider what you post ü Control visibility and privacy ü Routinely check your settings ü Respond to a breach 14

Ways to Protect ü Turn on WPA2 ü Make passwords long and strong ü Unique account, unique password ü Keep a clean machine ü Automate software updates ü Admin user account only to complete a specific task ü Consider the information you post on social sites ü Enable a firewall (Personal Firewall) ü Limit use of administrator accounts ü Protect your $$ ü Don t be tricked into opening an attachment or providing confidential information about yourself ü Never provide your user ID & password via a clicked-on link from an email or text ü When in doubt, throw it out 15

Recognize & Avoid Phishing Red Flags ü Check the sender ü Dear Customer ü Bad spelling and grammar ü Urgent requests ü Be careful with website links ü Be suspicious of attachments ü Requests for sensitive information ü Sound too good to be true? 16

Questions M. Travis Michalak Associate Vice President Nationwide Financial Information Risk Management michalm@nationwide.com 614-677-6809 1 Nationwide Plaza 3-17-202 Columbus OH 43215 Thank You! 17