Cyber attack on Twitter, 250,000 accounts hacked



Similar documents
How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Microsoft Services Premier Support. Security Services Catalogue

Defending against modern threats Kruger National Park ICCWS 2015

Standard 1 Standard 2 Support Acct. Management Support Assistance Hours Problem Resolution Support

The Value of Vulnerability Management*

Protecting Your Organisation from Targeted Cyber Intrusion

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

OCIE CYBERSECURITY INITIATIVE

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Data Breaches Put a Dent in Colleges Finances as Well as Reputations - Technology - The Chronicle of Hi...

Advanced Threats: The New World Order

Attachment A. Identification of Risks/Cybersecurity Governance

Advanced Threat Protection with Dell SecureWorks Security Services

IBM Security re-defines enterprise endpoint protection against advanced malware

2014 Entry Form (Complete one for each entry.) Fill out the entry name exactly as you want it listed in the program.

Seven Strategies to Defend ICSs

SECURITY. Risk & Compliance Services

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Combating a new generation of cybercriminal with in-depth security monitoring

Perspectives on Cybersecurity in Healthcare June 2015

Cybersecurity. Are you prepared?

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CYBER4SIGHT TM THREAT INTELLIGENCE SERVICES ANTICIPATORY AND ACTIONABLE INTELLIGENCE TO FIGHT ADVANCED CYBER THREATS

Cisco Advanced Services for Network Security

A COMPLETE APPROACH TO SECURITY

Cyber4sight TM Threat. Anticipatory and Actionable Intelligence to Fight Advanced Cyber Threats

Accenture Intelligent Security for the Digital Enterprise. Archer s important role in solving today's pressing security challenges

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

O N L I N E I N C I D E N T R E S P O N S E C O M M U N I T Y

Cybersecurity and internal audit. August 15, 2014

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Vulnerability Management

KEY STEPS FOLLOWING A DATA BREACH

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

Critical Security Controls

developing your potential Cyber Security Training

Cisco Advanced Malware Protection

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

External Supplier Control Requirements

IBM Security QRadar Vulnerability Manager

CYBER SECURITY THREAT REPORT Q1

STATEMENT OF WORK (SOW) for CYBER VULNERABILITY ASSESSMENT

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

Collateral Effects of Cyberwar

CDM Vulnerability Management (VUL) Capability

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

INSIGHTS AND RESOURCES FOR THE CYBERSECURITY PROFESSIONAL

Cyber Security Management

2016 Trends in Cybersecurity: A Quick Guide to the Most Important Insights in Security

Symantec Cyber Threat Analysis Program Program Overview. Symantec Cyber Threat Analysis Program Team

State of Oregon. State of Oregon 1

Department of Management Services. Request for Information

Top 20 Critical Security Controls

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Cyber Security Incident Handling Policy. Information Technology Services Center (ITSC) of The Hong Kong University of Science and Technology

Internet threats: steps to security for your small business

Cybersecurity The role of Internal Audit

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cyber Essentials Scheme. Protect your business from cyber threats and gain valuable certification

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

BT Assure Threat Intelligence

Logging In: Auditing Cybersecurity in an Unsecure World

All Information is derived from Mandiant consulting in a non-classified environment.

Stop advanced targeted attacks, identify high risk users and control Insider Threats

Cybersecurity Enhancement Account. FY 2017 President s Budget

Into the cybersecurity breach

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

GEARS Cyber-Security Services

Technical Testing. Network Testing DATA SHEET

Is security awareness a waste of time?

NYS LOCAL GOVERNMENT VULNERABILITY SCANNING PROJECT September 22, 2011

About This Document. Response to Questions. Security Sytems Assessment RFQ

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Jumpstarting Your Security Awareness Program

i Network, Inc Technology Solutions, Products & Services Providing the right information, to the right customer, at the right time.

Cyber Security for your Connected Health Device

Avoiding the Top 5 Vulnerability Management Mistakes

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Protecting against cyber threats and security breaches

Accenture Cyber Security Transformation. October 2015

Understanding the Advanced Threat Landscape an MSPs Guide. IT Security: Enabled

2015 CEO & Board University Cybersecurity on the Rise. Matthew J. Putvinski, CPA, CISA, CISSP

Cisco Security Optimization Service

Five keys to a more secure data environment

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Transcription:

HEADLINES Impact and Cost At least 19 states have introduced or are considering security breach legislation in 2014. Most of the bills would amend existing security breach laws. According to the Ponemon Institute s most recent "Annual Study: U.S. Cost of a Data Breach" (March 2012), the findings showed that the average cost in the education vertical [was] $142 per record. the University of Nebraska data breach could cost the university over $92 million Data Breaches Put a Dent in Colleges Finances as Well as Reputations The Chronical of Higher Education: At Indiana U. s data center, in Bloomington, staff members were aghast to learn that the university was among several in recent weeks to come upon security breaches in their information-technology operations. The costs of a cyber attack on the University of Maryland that was made public last month will run into the millions of dollars Costs related to datasecurity lapses dating to 2011 at the Maricopa County Community College District, in Arizona, could climb to $17.1-million, says Tom Gariepy, a district spokesman. CHE Cyber attack on Twitter, 250,000 accounts hacked AP

! Malware is becoming more complex and short-lived

250 million 700 million 40 billion Millions Billions 18+ billion 420 million 35 billion messages/month Millions Enterprise Risk Mitigation System

What if I have a Cybersecurity Incident? For Incident Response, use your existing Microsoft Premier Services agreement! Premier Support 24x7 Call - 800-936-3100 and mention that you are experiencing a potential cyber security incident. Any staff member who has been authorized with access to open Premier Support cases should do so with a Severity A classification for Cyber incidents. Or you can reach out to your GBS Security Deep Remote Technical Support GBS Incident Responder Global Onsite Support within 24-hours or less Cybersecurity Team Onsite Security Incident Response Team

Protect Protect your most valuable assets to help prevent compromise from cyberattacks Microsoft Security Risk Assessment Security Development Lifecycle Workshops* RAP as a Service for MS Security Active Directory Security Offerings* Persistent Adversary Detection Service Enhanced Mitigation Experience Toolkit Offerings * Detect Monitor your network for attacks, vulnerabilities, and persistent threats Microsoft Threat Detection Service Incident Response Respond Investigate and disrupt suspicious events to provide a diagnosis and potential mitigations Tactical Recovery Strategic Recovery

Offline Assessment for AD Security (OAADS) Active Directory Security Assessment (ADSA) Proactive service that collects information on key security technology, people and process areas for your environment and analyzes this information against best practices and currently relevant security threats against your identity store. Review of customer s Active Directory providing the customer with a comprehensive, holistic assessment of the overall security of the Active Directory implementation. 4 Days Fixed Price Offering/Premier 1 Forest; < 100 Domain Controllers (DC) Approx. 4 weeks Onsite (duration varies) 2-3 Forests; >100 DC s Questionnaire + Tools Delivered through Premier or MCS Interviews + Tools + Visual inspection POP - Security Lateral Account Movement (SLAM) Enhanced Security Administrative Provides education on credential theft as well as real world tested sample capabilities. Helps customers begin compartmentalizing local Administrator credentials through password randomization. Designed to help thwart credential theft attacks by limiting exposure of domain administrative credentials. Implements new secure domain 3 days Fixed Price Offering/Premier AD lab environment. Minimum: 1 Domain Controller, 1 system for each member operating system Approx. 25 weeks; Onsite (duration varies) Implements New Secure Domain Education + Planning + Strategy Delivered through MCS

ABOUT SOLUTION Designed to develop and/or adapt your security strategy to help reduce cyber risks across the enterprise. Provides a proactive approach to security that identifies breakdowns in people, processes, and technologies before they affect operations. Using on-site, in-person interviews and technical examination, MSRA results in the creation of a roadmap customized for your business. Remediation roadmap prioritizes findings into tactical and systemic recommendations that can be acted upon in a timeframe methodology ABOUT DELIVERY Two-week engagement with two consultants onsite with your team to gather and validate information through a series of interviews with key personnel, a risk management session and technical inquiry. Specifically, the service involves: ü Risk Management Workshop ü Qualitative Interviews ü Roadmap Presentation

Enhanced Mitigation Experience Toolkit (EMET) Freely downloadable technology that protects against security vulnerability exploitation. Enhances existing protections in the Windows OS and adds new protections that help stop exploitation of unknown or unpatched security vulnerabilities Free-Download EMET- Proactive Operations Program (POP) EMET POP includes an Educational workshop on EMET and EMET deployment, as well as assistance with pilot in non-production lab environment 2-3 Days/Onsite Fixed Price Offering through Premier EMET- Deployment and Reporting Assist you with in-depth education and preparation for an EMET pilot, with conducting a full EMET production pilot, and with deploying an EMET ERS to monitor EMET events and configurations. EMET Production Pilot (3 weeks) - Delivered through MCS ERS Production and Deployment (5 weeks) Through MCS EMET + ERS Production Deployment (8 weeks)- Through MCS