How To Protect Yourself From A Hacker Attack



Similar documents
F G F O A A N N U A L C O N F E R E N C E

Agenda. Cyber Security: Potential Threats Impacting Organizations 1/6/2015. January 10, 2015 Scott Petree

Security Controls What Works. Southside Virginia Community College: Security Awareness

Cloud Security and Managing Use Risks

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Presentation for : The New England Board of Higher Education. Hot Topics in IT Security and Data Privacy

Cybersecurity: Protecting Your Business. March 11, 2015

Clavister InSight TM. Protecting Values

Logging In: Auditing Cybersecurity in an Unsecure World

Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow

Five keys to a more secure data environment

Information Blue Valley Schools FEBRUARY 2015

University of Pittsburgh Security Assessment Questionnaire (v1.5)

BMC s Security Strategy for ITSM in the SaaS Environment

Client Security Risk Assessment Questionnaire

Information Security Services

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

SHARING BEST PRACTICES IN INFORMATION SECURITY PREVENTION TIPS & RESPONSE TECHNIQUES

Cyber Security, Fraud and Corporate Account Takeovers LBA Bank Counsel Conference December 2014

3rd Party Assurance & Information Governance outlook IIA Ireland Annual Conference Straightforward Security and Compliance

SECURITY CONSIDERATIONS FOR LAW FIRMS

SecurityMetrics. PCI Starter Kit

10 Smart Ideas for. Keeping Data Safe. From Hackers

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

INFORMATION SECURITY FOR YOUR AGENCY

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

Cybersecurity: What CFO s Need to Know

IT Cloud / Data Security Vendor Risk Management Associated with Data Security. September 9, 2014

Fortinet Solutions for Compliance Requirements

Small Business IT Risk Assessment

It Won t Happen To Me! A Network and PCI Security Webinar Presented By FMS and VendorSafe

I ve been breached! Now what?

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Presented by Evan Sylvester, CISSP

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

{Are you protected?} Overview of Cybersecurity Services

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Internet threats: steps to security for your small business

NATIONAL CYBER SECURITY AWARENESS MONTH

Developing National Frameworks & Engaging the Private Sector

Information Security for the Rest of Us

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

FINRA Publishes its 2015 Report on Cybersecurity Practices

A Practical Approach to Network Vulnerability Assessment AN AUDITOR S PERSPECTIVE BRYAN MILLER, IT DIRECTOR JOHN KEILLOR, CPA, AUDIT PARTNER

Altius IT Policy Collection Compliance and Standards Matrix

SECURITY. Risk & Compliance Services

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

Security & Compliance, Sikich LLP

PCI DSS 3.0 : THE CHANGES AND HOW THEY WILL EFFECT YOUR BUSINESS

plantemoran.com What School Personnel Administrators Need to know

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

VENDOR MANAGEMENT. General Overview

Universities and Schools Under Cyber-Attack: How to Protect Your Institution of Excellence

White Paper September 2013 By Peer1 and CompliancePoint PCI DSS Compliance Clarity Out of Complexity

Data Breaches and Cyber Risks

Conquering PCI DSS Compliance

How To Protect Your Data From Being Stolen

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Jefferson Glassie, FASAE Whiteford, Taylor & Preston

Security Breaches and Vulnerability Experiences Overview of PCI DSS Initiative and CISP Payment Application Best Practices Questions and Comments

Enterprise Computing Solutions

How To Protect Yourself From Cyber Threats

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

Teradata and Protegrity High-Value Protection for High-Value Data

PCI Requirements Coverage Summary Table

IT Security Risks & Trends

Securing the Service Desk in the Cloud

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

THE BLUENOSE SECURITY FRAMEWORK

External Supplier Control Requirements

Payment Card Industry Data Security Standard Training. Chris Harper Vice President of Technical Services Secure Enterprise Computing, Inc.

05.0 Application Development

Cloud Computing: Risks and Auditing

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Critical Controls for Cyber Security.

Vendor Risk Management Financial Organizations

Information Security: A Perspective for Higher Education

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

PCI Compliance: How to ensure customer cardholder data is handled with care

HIPAA Compliance Evaluation Report

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

Written Information Security Programs: Compliance with the Massachusetts Data Security Regulation

N-Dimension Solutions Cyber Security for Utilities

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Transcription:

Cybersecurity Demystified: Information Technology Security Trends Joe Oleksak, Plante Moran

Agenda Data Security Trends Example Attacks Industry Examples An Answer 1

Who Are The Victims? Targets - victims of opportunity: Some will be a target regardless of what they do, but most become a target because of what they don t do related to security. Verizon Data Breach Investigations Report 2

Could This Be Prevented? Breaches not rocket science: Most victims weren t overpowered by unknowable and unstoppable attacks. we know them well enough and we also know how to stop them. 3

How Are They Hacking? Most Common Attack - Social: Most attacks began socially. Employees are your greatest asset, but often your weakest link to security. Hackers know this, and have Annual Launched Phishing Attacks developed social scams by the thousands, hoping but one will fall victim. 4

Why Can t We Stop Them? Breaches in 2014 went unnoticed: Prevention is crucial, but we must accept the fact that no barrier is Detection/response impenetrable. an extremely critical represents Breach Undiscovered for 1 Month or More line of defense. Ignorance is NOT bliss what you don t know can hurt you! 5

97% of Breaches Were Avoidable Most victims aren t overpowered by unknowable and unstoppable attacks. For the most part, we know them well enough and we also know how to stop them. Verizon Data Breach Investigations Report Weak Infrastructure Weak design (firewalls, wireless routers) Weak user authentication (users, passwords) Encryption (VPN, secure portals) Out-dated (patch management / anti-virus) Lack of periodic testing User Ignorance Weak user passwords Poor judgment Social media Phishing attacks Third Party Vendors Weak due diligence Breach notification Annual breach confirmation Technology Advances Mobile devices Cloud computing / public portals 6

9 7 % o f B r e a c h e s W e r e Av o i d a b l e Most victims aren t overpowered by unknowable and unstoppable attacks. For the most part, we know them well enough and we also know how to stop them. Verizon Data Breach Investigations Report 7

Example Attack: Victim 8

Example Attack: Attacker 9

Can Anything Prevent This? HIPAA GLBA Sarbanes Oxley 95/46/ EU DPD State Privacy FISMA FERPA PCI NIST Canada - PIPEDA 21 CRF Part 11 ISO 2700x 10

Industry Breaches 11

Not Always Hackers! 12

But Often Times Hackers 13

What Might it Cost? 14

Start with a Framework. Different organizations view information security differently. Some of the differences are related to varied risk and threat profiles impacting an organization based on factors such as industry, location, products/services, etc. Other differences are related to management s view of security based on their experience with prior security incidents. 15

Assess Risk. 16

Secure the Network. 1. Data Classification Public and Confidential (Sensitive/Private) 2. Perimeter Security - Firewalls, IDS/IPS 3. Wireless Security SSID, Encryption, Default Password 4. Authentication Users & Passwords 5. Encryption - Connectivity & Storage 6. Anti-virus 7. Patch Management 8. Remote Access 9. Network Monitoring 10. Annual Testing External & Internal Penetration Testing 17

Secure the User. Full-time employees Part-time employees and contractors Consultants and vendors Customers Visitors Ad hoc vs. formal repeatable process Single sign-on User IDs/passwords Use of technology (tokens, firewalls, access points, encryption, etc.) Need to know basis/able to perform job responsibilities Segregation of duties Administrative access Super-user access Internet vs. corporate system access Only when an issue is noted User access logs Annual review of access Proactive review of user activity Real-time monitoring of unauthorized access or use of information systems 18

Teach the User. 19

Passwords Died in the 90s. 20

Secure the Vendor. Due Diligence Existence and corporate history, strategy, and reputation References, qualifications, backgrounds, and reputations of company principals, including criminal background checks Financial status, including reviews of audited financial statements Internal controls environment, security history, and audit coverage (SOC Reports) Policies vs. procedures Legal complaints, litigation, or regulatory actions Insurance coverage Ability to meet disaster recovery and business continuity requirements 21

Secure the Vendor. Remote Access Deploy a single central remote access solution for employees and vendors to remotely access your network Company should manage remote access tool and not the third-party vendor Block access from any unapproved remote access tools used by third-party vendors Require each third-party vendor to use unique credentials to access your network Log and review third-party activities on your network Breach Notification Contract language should include breach notification requirement Annual confirmation of breaches by CEO or other C-level executive at the vendor 22

In Summary It s Complicated. 23

In Summary Simplified. 24

Thank you! Information Technology Security Trends Joe Oleksak CISSP, QSA, CRISC, Partner 847.628.8860 25