IT Security Risks & Trends



Similar documents
2012 CliftonLarsonAllen LLP. Ensuring Internal Controls in an Electronic Age

Cybersecurity Governance Update: New FFIEC Requirements cliftonlarsonallen.com

Current Trends in Cyber Crime & Payments Fraud cliftonlarsonallen.com

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Presented by: Mike Morris and Jim Rumph

Network/Cyber Security

Questions You Should be Asking NOW to Protect Your Business!

Corporate Account Take Over (CATO) Guide

FFIEC CONSUMER GUIDANCE

IT Security Recent Data Breaches, Lessons Learned and Best Practices

Passing PCI Compliance How to Address the Application Security Mandates

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

ONLINE BANKING SECURITY TIPS FOR OUR BUSINESS CLIENTS

September 20, 2013 Senior IT Examiner Gene Lilienthal

Cyber Security Breakout Session. Ed Rosenberg, Vice President & Chief Security Officer, BMO Financial Group Legal, Corporate & Compliance Group

Remote Deposit Quick Start Guide

Protecting Your Organisation from Targeted Cyber Intrusion

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Don t Fall Victim to Cybercrime:

2012 Data Breach Investigations Report

Electronic Fraud Awareness Advisory

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Why The Security You Bought Yesterday, Won t Save You Today

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

Network and Security Controls

Payment Fraud and Risk Management

Defending Against Data Beaches: Internal Controls for Cybersecurity

Franchise Data Compromise Trends and Cardholder. December, 2010

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Real World Healthcare Security Exposures. Brian Selfridge, Partner, Meditology Services

The Protection Mission a constant endeavor

Global Partner Management Notice

APT Advanced Persistent Threat Time to rethink?

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Your security is our priority

Practice Good Enterprise Security Management. Presented by Laurence CHAN, MTR Corporation Limited

Data Breaches and Cyber Risks

Jort Kollerie SonicWALL

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Risks and Trends in Network Security. Credit Unions

SANS Top 20 Critical Controls for Effective Cyber Defense

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

Information Security Services

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

13 Ways Through A Firewall

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

ACI Response to FFIEC Guidance

MatriXay WEB Application Vulnerability Scanner V Overview. (DAS- WEBScan ) The best WEB application assessment tool

How To Protect Yourself From A Hacker Attack

PCI Compliance for Healthcare

The Cloud App Visibility Blindspot

Top tips for improved network security

A practical guide to IT security

8/17/2010. Over 90% of all compromised merchants are PCI level 4 (small) merchants or merchants with less than 1 million transactions per year

Cyber Self Assessment

Best Practices for DanPac Express Cyber Security

Enterprise Cybersecurity: Building an Effective Defense

PCI Requirements Coverage Summary Table

CYBERSECURITY HOT TOPICS

Security Management. Keeping the IT Security Administrator Busy

Where every interaction matters.

Multi-Factor Authentication (FMA) A new security feature for Home Banking. Frequently Asked Questions 8/17/2006

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

PCI Requirements Coverage Summary Table

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

FERPA: Data & Transport Security Best Practices

DATA SECURITY HACKS, HIPAA AND HUMAN RISKS

INCIDENT RESPONSE CHECKLIST

Presented by Evan Sylvester, CISSP

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

13 Ways Through A Firewall What you don t know will hurt you

External Supplier Control Requirements

PCI Compliance. How to Meet Payment Card Industry Compliance Standards. June 5, CliftonLarsonAllen LLP

Cyber Security 2014 SECURE BANKING SOLUTIONS, LLC

PwC Cybercrime US Center of Excellence

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Security Bank of California Internet Banking Security Awareness

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Data Security for the Hospitality

FSOEP Web Banking & Fraud: Corporate Treasury Attacks

Belmont Savings Bank. Are there Hackers at the gate? 2013 Wolf & Company, P.C.

Transcription:

IT Security Risks & Trends Key Threats to All Businesses 1 1

What do the following have in common? Catholic church parish Hospice Collection agency Main Street newspaper stand Electrical contractor Health care trade association Rural hospital Mining company On and on and on and on.. 2

Three Reasons Why We Should Care Organized Crime Wholesale theft of personal financial information Payment Fraud Corporate Account Takeover Use of online credentials for ACH, CC and wire fraud Hackers are targeting you! WSJ front page: Hackers Turn to Small Business 3

The Cost? Norton/Symantec Corp: Cost of global cybercrime: $388 billion Global black market in marijuana, cocaine and heroin combined: $288 billion Hackers are lazy - go for the easy money Bank customers are much easier targets than the banks themselves 4

Banks vs. Customers In the Courts Bank Sues Customer $800,000 fraudulent ACH transfer - Bank retrieves $600,000 = $200,000 lost Both bank and customer have responsibilities, who is at fault? Customer Sues Bank $560,000 fraudulent ACH transfer Funds wired to accounts in Russia, Estonia, Scotland, Finland, China and the US and were withdrawn soon after deposits were made. Multiple wires = unusual activity so bank notifies client, but how quickly and what actions were taken to prevent additional fraud? What are the bank s obligations versus the client s? Updated regulatory guidance should improve consistency of controls. Court Cases Will Eventually Set Standard - Both parties accountable for risks 5

Two Security Threat Reports Intrusion Analysis: TrustWave January 2011 and April 2012 https://www.trustwave.com/gsr Intrusion Analysis: Verizon Business Services July 2011 and April 2012 http://securityblog.verizonbusiness.com/2011/04/19/201 1-data-breach-investigations-report-released/ 6

TrustWave Intrusion Analysis Report Top Methods of Entry Included: Top Methods of Entry Included: Remote Access Applications [45%] Default vendor supplied or weak passwords [90%] 3 rd Party Connections [42%] MPLS, ATM, frame relay SQL Injection [6%] Web application compromises [90%] Exposed Services [4%] 7

Verizon Data Breach Analysis 8

Hackers, Fraudsters, and Victims Opportunistic Attacks Targeted Attacks 9

Network Security Trends & Implications Statistics on Data Breaches: 73% resulted from external sources 18% were caused by insiders - - - - 39% implicated business partners 30% involved multiple parties - 2008 Data Breach Investigations Report conducted by The Verizon Business Risk Team 10

Insider Threats and Risks While attacks and breach attempts as a percentage of attempts are trending towards external factors, the depth of attacks from insiders are generally of greater impact: Median Number of Records Compromised -2008 Data Breach Investigations Report conducted by -The Verizon Business Risk Team 11

How do hackers and fraudsters break in? The common internal sources of IT Fraud: -2008 Data Breach Investigations Report conducted by -The Verizon Business Risk Team 12

How do hackers and fraudsters break in? Social Engineering Email Phishing Spear Phishing On-line banking trojans http://krebsonsecurity.com/2014 /02/email-attack-on-vendor-setup-breach-at-target/ 13

The Fine Art of People Hacking Amateurs hack systems, professionals hack people. Bruce Schneier Social Engineering uses non-technical attacks to gain information or access to technical systems Pre-text telephone calls Building penetration Seeding Email attacks 14

Pre-text Phone Calls Hi, this is Randy from Comcast. I am working with Mike, and I need your help Name dropping Establish a rapport Ask for help Inject some techno-babble People want to avoid inconvenience Timing, timing, timing 15

Physical (Facility) Security Compromise the site: Hi, Joe said he would let you know I was coming to fix the printers Plant devices: Keystroke loggers Wireless access point Thumb drives ( Switch Blade ) Examples Steal hardware (laptops) http://www.sptimes.com/2007/10/28/business/here_s_how_a_slick_la.sh tml http://www.privacyrights.org/ar/chrondatabreaches.htm 16

10 Key Defensive Measures Training Your Employees is Critical (but not easy) 17 17

Multi-Factor Authentication Solutions MFA is critical Silver bullet? 18

Ten Keys to Mitigate Risk 1. Strong Policies - Email use Website links Removable media Users vs Admin Insurance 19

Ten Keys to Mitigate Risk 2. Defined user access roles and permissions Principal of minimum access and least privilege Users should NOT have system administrator rights Local Admin in Windows should be removed (if practical) 20

Ten Keys to Mitigate Risk 3. Hardened internal systems (end points) Hardening checklists Turn off unneeded services Change default password Use Strong Passwords (see tip next slide) 4. Encryption strategy data centered Email Laptops and desktops Thumb drives Email enabled cell phones Mobile media 21

Tip: Build a password from a phrase. I like to eat Oreo cookies at night. ilteocan or, even better: Il2eOc@n 22

Ten Keys to Mitigate Risk 5. Vulnerability management process Operating system patches Application patches Testing to validate effectiveness belt and suspenders 23

Ten Keys to Mitigate Risk 6. Well defined perimeter security layers: Network segments Email gateway/filter Firewall Proxy integration for traffic in AND out Intrusion Detection/Prevention for network traffic, Internet facing hosts, AND workstations (end points) 7. Centralized audit logging, analysis, and automated alerting capabilities Routing infrastructure Network authentication Servers Applications 24

Ten Keys to Mitigate Risk 8. Defined incident response plan and procedures Be prepared Including data leakage prevention and monitoring Forensic preparedness 25

Ten Keys to Mitigate Risk 9. Know / use Bank Tools Multi-factor authentication Dual control / verification Out of band verification / call back thresholds ACH positive pay ACH blocks and filters Review bank contracts relative to all these Monitor account activity daily Isolate the PC used for wires/ach 26

Ten Keys to Mitigate Risk 10. Test, Test, Test Belt and suspenders approach Penetration testing Internal and external Social engineering testing Simulate spear phishing Application testing Test the tools with your bank Test internal processes 27

Questions? Hang on, it s going to be a wild ride!! Jim Kreiser, Principal Business Risk Services james.kreiser@claconnect.co m (717) 558-0860 *** 28