A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014



Similar documents
Top PCI 3.0 Challenges for Chain Merchants. March 11, 2015

Payment Security Update

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

Important Info for Youth Sports Associations

PCI-DSS: A Step-by-Step Payment Card Security Approach. Amy Mushahwar & Mason Weisz

MasterCard PCI & Site Data Protection (SDP) Program Update. Academy of Risk Management Innovate. Collaborate. Educate.

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

Global ediscovery Client Data Security. Managed technology for the global legal profession

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Cybersecurity. Shamoil T. Shipchandler Partner, Bracewell & Giuliani LLP

How To Protect Yourself From A Hacker Attack

Overcoming PCI Compliance Challenges

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

Franchise Data Compromise Trends and Cardholder. December, 2010

What Data? I m A Trucking Company!

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Cybersecurity The role of Internal Audit

Is the PCI Data Security Standard Enough?

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Creating, Developing and Instituting an Effective Incident Response Plan. Webinar. 15 April 2015

Cybersecurity: Protecting Your Business. March 11, 2015

Brief. The BakerHostetler Data Security Incident Response Report 2015

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

DATA BREACHES: WHEN COMPLIANCE IS NOT ENOUGH

PCI Requirements Coverage Summary Table

Target Security Breach

University of Pittsburgh Security Assessment Questionnaire (v1.5)

Josiah Wilkinson Internal Security Assessor. Nationwide

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

SECURING YOUR REMOTE DESKTOP CONNECTION

AlienVault for Regulatory Compliance

10 Smart Ideas for. Keeping Data Safe. From Hackers

OCIE CYBERSECURITY INITIATIVE

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Cyber Risks in the Boardroom

Current Developments Concerning Cybersecurity. ICI General Membership Meeting Legal Forum Jillian Bosmann and Nancy O Hara Thursday, May 19, 2016

Defending Against Data Beaches: Internal Controls for Cybersecurity

Data Breach Response Planning: Laying the Right Foundation

How to Protect Sensitive Corporate Data against Security Vulnerabilities of Your Vendors

PCI DSS Overview. By Kishor Vaswani CEO, ControlCase

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

White Paper September 2013 By Peer1 and CompliancePoint PCI DSS Compliance Clarity Out of Complexity

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Big Data, Big Risk, Big Rewards. Hussein Syed

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

External Supplier Control Requirements

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

Attachment A. Identification of Risks/Cybersecurity Governance

Nine recommendations for alternative funds battling cyber crime. kpmg.ca/cybersecurity

Trend Micro VMware Solution Guide Summary for Payment Card Industry Data Security Standard

The True Story of Data-At-Rest Encryption & the Cloud

CYBERSECURITY: Is Your Business Ready?

Cyber Risk, Legal And Regulatory Issues, And Insurance Mitigation ISACA Pittsburgh Information Security Awareness Day

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

Cyber Security. John Leek Chief Strategist

Continuous Network Monitoring

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

Cybersecurity and internal audit. August 15, 2014

HOW DID NETWORK SECURITY AND PRIVACY ISSUES BECOME D&O EXPOSURES?

New PCI Standards Enhance Security of Cardholder Data

Payment Card Industry Data Security Standard

Encryption and Tokenization: Protecting Customer Data. Your Payments Universally Amplified. Tia D. Ilori Sue Zloth September 18, 2013

Cybersecurity and the Threat to Your Company

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Risky Business. Is Your Cybersecurity in Cruise Control? ISACA Austin Chapter Meeting May 5, 2015

IAPP Global Privacy Summit 2014 The SEC and Cybersecurity: What Every Publicly Traded Company Must Know

Cyber Exploits: Improving Defenses Against Penetration Attempts

The Cyber Attack and Hacking Epidemic A Legal and Business Survival Guide

VENDOR MANAGEMENT. General Overview

Mitigating and managing cyber risk: ten issues to consider

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

MANAGING Cybersecurity Risk AND DISCLOSURE OBLIGATIONS

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

TODAY S AGENDA. Trends/Victimology. Incident Response. Remediation. Disclosures

Logging In: Auditing Cybersecurity in an Unsecure World

Breach Findings for Large Merchants. 28 January 2015 Glen Jones Cyber Intelligence and Investigation Lester Chan Payment System Security

New York State Department of Financial Services. Report on Cyber Security in the Insurance Sector

Cybersecurity and Other IT Related Focus Areas. Francis Tam, Partner

Introduction to PCI DSS Compliance. May 18, :15 p.m. 2:15 p.m.

SAP Cybersecurity Solution Brief. Objectives Solution Benefits Quick Facts

Data Security Basics for Small Merchants

Overview of Topics Covered

Plan of Attack 5 Step Plan

Designing & Building an Information Security Program. To protect our critical assets

WHAT EVERY CEO, CIO AND CFO NEEDS TO KNOW ABOUT CYBER SECURITY.

PCI Compliance in Multi-Site Retail Environments

How To Protect Your Credit Card Information From Being Stolen

Cyber-Security Risk in the Global Organization:

What You Need to Know About PCI SSC Guiding open standards for global payment card security

How to Lead the People in a Program Based Environment

Cyber Security Pr o t e c t i n g y o u r b a n k a g a i n s t d a t a b r e a c h e s

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

PCI Compliance Top 10 Questions and Answers

Transcription:

A Wake-Up Call? Fight Back Against Cybercrime Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014 1

Coalfire Background Leading Information Security Consulting Firm Offices: Atlanta, Dallas, Denver, New York, San Diego, San Francisco, Seattle, Washington DC, London Customers Served 10,000+ Engagements: 3PAO, FISMA, DIACAP, ICD 503, GLBA, SSAE 16, PCI, HIPAA, HITRUST, more Sample Clients 2

Agenda A Wake-Up Call What Went Wrong? Enough is Enough Cyber Risk is Nothing New Compliance Does Not Equal Security Trusted Assessments and Independence Beyond Compliance A Justified Response Questions 3

A Wake-Up Call The Cyber Threat is Increasing Recent cyber attacks» Target, Michaels, Sally Beauty, and Neiman Marcus» Sophisticated malware» Security programs were compliant; however, not effective Law enforcement warnings» Threats increasing on Point of Sales (POS) platforms» Malware increasingly available at a price to make cybercrime affordable» Recent attacks are part of a larger scheme to defraud POS systems 4

A Wake-Up Call The Cyber Threat is Increasing Coalfire Daily Media Report 3/21/14 Companies Turn to Cyber Insurance as Hacker Threats Mount Outlet: Fox Business Snippet: Investors cringe when a company they own, such as Target or Las Vegas Sands, suffers a cyber breach that results in the loss of customer or employee data. Coalfire Daily Media Report 3/25/14 U.S. Notified 3,000 Companies in 2013 About Cyberattacks Outlet: The Washington Post Snippet: Federal agents notified more than 3,000 U.S. companies last year that their computer systems had been hacked, White House officials have told industry executives... 5

A Wake-Up Call The Cyber Threat is Increasing Coalfire Daily Media Report 5/13/14 Cybersecurity in the Private Sector-Playing Catch-Up Outlet: The Hill Snippet: U.S. private sector may lead the world in many regards, but when it comes to insulating itself from cyber attacks, its performance has been weak. Coalfire Daily Media Report 5/13/14 Cyber Experts Warn Iranian Hackers Becoming More Aggressive Outlet: Reuters Snippet: Iranian hackers have become increasingly aggressive and sophisticated, moving from disrupting and defacing U.S. websites to... 6

What Went Wrong? Security operations excellence matters Computer anti-virus protection was not working or ineffective Egress filtering was not set to limit exfiltration of stolen data Lack of two-factor administrative access authentication No file integrity monitoring or application white listing to prevent malware installation Ineffective security monitoring and alerting 7

Enough is Enough Time for fresh ideas and decisive action Comprehensive risk management» Expanded Risk Assessment Personally Identifiable Information (PII) Intellectual Property Operational Data» Justified Response Understand inherent risk Mitigate risk to a justified level Risk Management Security Compliance 8

Cyber Risk is Nothing New Past data breaches are now an everyday occurrence What about SEC guidance Focus has escalated; consumers demand action More regulations Another difficult decision 9

SEC s Cybersecurity Guidance The SEC Cybersecurity Guidance (October 2011) identifies six areas where cybersecurity disclosures may be necessary. 1. Risk Factors 2. Management's Discussion and Analysis of Financial Condition and Results of Operation (See Next Slide) 3. Description of Business 4. Legal Proceedings 5. Financial Statement Disclosures 6. Disclosure Controls and Procedures 1010

SEC Management Discussion & Analysis Business Description Inherent risk material impact on clients, partners and industry Competitive position Viability of current or future products Legal Proceedings Identification of ongoing or potential litigation with material impact Description of impact or relief being requested Financial Statement Disclosure Remediation, investigation and recovery costs Security program enhancements Litigation costs and fines Reputation damage or impairment of future earnings Disclosure Controls and Procedures Impact on future reporting for the registrant 1111

Compliance Does Not Equal Security The focus on card security and Payment Card Industry (PCI) compliance There is NO guaranteed protection Ensure you use Two-Factor Authentication:» Assigning Unique User IDs and one of the following: Something you know, such as a password or passphrase Something you have, such as a token device or smart card Something you are, such as a biometric Compliance is an outcome of an effective security program 12

Compliance is Just a Baseline A good start; however, much more is Training needed Reactive used as a defense Quality mechanism Security Arch. Design Another factor is applicable IDS Federal Firewalland Hosting Security Policy Certified Anti-Money Laundering Code Penetration Specialist (CAMS) Investigations Review Testing always find the merchant not compliant with the PCI Data Security NIDS/HIDS Standards State consumer data privacy laws 13

Multiple Control Models and Controls SSAE 16 SOC 1/2 Training Quality Security Policy ISO-27001/2 Privacy Laws Texas Medical Privacy Act of 2012 IT Security Controls Security Arch. Design Code Review NIDS/HIDS IDS Hosting 1414 Penetration Testing Firewall

Where did the Firewall Go? Cloud Environment 1515

Orgs Tend to Over-Estimate Their Compliance 16

Trusted Assessments Require Independence Over 50% of all PCI compliance assessments are conducted by companies with direct conflicts Transparency of control effectiveness is not always provided Trust is required to spur a justified response 17

Beyond Compliance Defense in Depth Physical and logical access controls Sufficient network segmentation File Integrity Monitoring (FIM) solution Security Event and Incident Management (SEIM) solution Encryption and/or tokenization Risk Management Identify all critical assets Prioritize criticality Select controls Establish effective oversight and governance 18

Technology There are No Silver Bullets Technology is great; however, beware Europe Mastercard Visa/Chip & PIN costly and not enough Point-2-Point Encryption (P2PE) can be used as a risk reduction process The cloud provides a path to outsource functions; however, not the risk 19

A New Generation of Risk Management is Justified Short-term actions Am I already hacked?» Conduct a forensic analysis» Take a second look at the top 5 critical controls in payment systems Payment Application Data Security Standards validation and implementation Network segmentation Secure configuration management Physical security Logging, monitoring and alerting Long-term actions How do I stay off the front page of the Wall Street Journal?» Make IT GRC a top priority» Explore risk-reducing technologies at the point of interaction 20

Summary The Data Security Risk is Significant & Therefore Requires Appropriate Controls The threat of data compromise is global in scope (Web) Many parties are involved in maintaining data security The impact of data compromise is widespread financially, legally, and in goodwill exposures Data security is a primary risk concern for companies, service providers, vendor, consumers, and regulators Data security has evolved from an operational problem and financial threat to a significant reputation risk The Time For Action is Now Customers Want Data Protection Shareholders Want a Healthy Organization 21

Questions Ricky Link Toll Free 877-224-8077 x8011 Dallas Office 972-763-8011 Ricky.Link@coalfire.com 22