Forensics & E-Discovery. Presented by the ASIS Information Technology Security Council



Similar documents
BDO CONSULTING FORENSIC TECHNOLOGY SERVICES

Key Considerations of Regulatory Compliance in the Public Cloud

Cyber Security Consultancy Standard. Version 0.2 Crown Copyright 2015 All Rights Reserved. Page 1 of 13

Real World Strategies for Migrating and Decommissioning Legacy Applications

How To Manage Cloud Data Safely

Add the compliance and discovery benefits of records management to your business solutions. IBM Information Management software

Director, Value Engineering

Report on CAP Cybersecurity November 5, 2015

CORPORATE RECORD RETENTION IN AN ELECTRONIC AGE (Outline)

Information Governance Challenges and Solutions

e-discovery Forensics Incident Response

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

DOCUMENT RETENTION STRATEGIES FOR HEALTHCARE ORGANIZATIONS

10 Steps to Establishing an Effective Retention Policy

Breaking Down the Silos: A 21st Century Approach to Information Governance. May 2015

Management Trends, Troubles, and Solutions

Facilitated By: Ken M. Shaurette, CISSP, CISA, CISM, CRISC FIPCO Director IT Services

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

The Next Generation of Security Leaders

Information Technology: This Year s Hot Issue - Cloud Computing

Payment Card Industry Data Security Standard

Stepping Through the Info Security Program. Jennifer Bayuk, CISA, CISM

Reduce Cost, Time, and Risk ediscovery and Records Management in SharePoint

SECURITY CONSIDERATIONS FOR LAW FIRMS

Managing Cloud Computing Risk

Understanding ediscovery and Electronically Stored Information (ESI)

Securing The Cloud With Confidence. Opinion Piece

OCCUPATIONAL GROUP: Information Technology. CLASS FAMILY: Security CLASS FAMILY DESCRIPTION:

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

How To Prepare For A Disaster

Privacy Recommendations for the Use of Cloud Computing by Federal Departments and Agencies. Privacy Committee Web 2.0/Cloud Computing Subcommittee

3 "C" Words You Need to Know: Custody - Control - Cloud

Insights into Cloud Computing

Security Transcends Technology

Mike Smart Cyber Strategist & Enterprise Security Solutions, EMEA. Cyber: The Catalyst to Transform the Security Program

COBIT 5 for Risk. CS 3-7: Monday, July 6 4:00-5:00. Presented by: Nelson Gibbs CIA, CRMA, CISA, CISM, CGEIT, CRISC, CISSP ngibbs@pacbell.

Archiving and The Federal Rules of Civil Procedure: Understanding the Issues

In ediscovery and Litigation Support Repositories MPeterson, June 2009

Information Security Program Management Standard

IBM ediscovery Identification and Collection

Domain 1 The Process of Auditing Information Systems

Cybersecurity The role of Internal Audit

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

M E M O R A N D U M. Definitions

Integrating Pandemic Readiness into Your Organization's Resiliency Model.

Information Governance 2.0 A DOCULABS WHITE PAPER

Cyber Security and Privacy Services. Working in partnership with you to protect your organisation from cyber security threats and data theft

Legislative Language

plantemoran.com What School Personnel Administrators Need to know

Information Governance Manage in Place Use Cases Workshop

Long Term Record Retention and XAM

Strategy, COBIT and Vision: HOW DO THEY RELATE? Ken Vander Wal, CISA, CPA, Past President, ISACA

Managing Cyber Threats Risk Management & Insurance Solutions. Presented by: Douglas R. Jones, CPCU, ARM Senior Vice President & Principal

The Changing IT Risk Landscape Understanding and managing existing and emerging risks

CLOUD STORAGE SECURITY INTRODUCTION. Gordon Arnold, IBM

Into the cybersecurity breach

From Information Management to Information Governance: The New Paradigm

TUSKEGEE CYBER SECURITY PATH FORWARD

ARMA: Information Governance: A Revenue Source Potential

Assessing the strength of your security operating model

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

The evolution of data archiving

Best Practices in Incident Response. SF ISACA April 1 st Kieran Norton, Senior Manager Deloitte & Touch LLP

DOCSVAULT WhitePaper. Concise Guide to E-discovery. Contents

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

SPSP Phase III Recruiting, Selecting, and Developing Secure Power Systems Professionals: Job Profiles

Computer Forensics US-CERT

Document Type Doc ID Status Version Page/Pages. Policy LDMS_001_ Effective of 7 Title: Corporate Information Technology Usage Policy

IT Privacy Certification Outline of the Body of Knowledge (BOK) for the Certified Information Privacy Technologist (CIPT)

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

The cyber security imperative. Protect your organization from cyber threats

Statement of Qualifications Cybercrime & data breach

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Information Security Specialist Training on the Basis of ISO/IEC 27002

Records Management and SharePoint 2013

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Transcription:

Forensics & E-Discovery Presented by the ASIS Information Technology Security Council 1

The Information Technology Security Council and its partners deliver a forum to enhance effectiveness and productivity of security practitioners through the development and delivery of educational material that addresses Information Technology security and risk topics. Outreach Research Education Page 2

Monday 11am (Session 2110): Cloud Computing for the Security Practitioner Monday 1:45PM (Session 2206): Current Trends in Identity & Access Management Monday 4:30pm (Session 2306): Forensics and e-discovery Tuesday 11am (Session 3112): Cyber Security Tuesday 1:45 (Session 3208): Utility & Smart Grid Security Tuesday 4:30pm (Session 3306): Federal Information Security Wednesday 11am (Session 4111/4184): Legal & Compliance Aspects of IT Page 3

Forensics & E-Discovery Research Team Andrew Neal, CISM,CRISC, CIFI, LPI Southwest Digital Laboratory Eric Sifford, CISSP United States Army KJ Kuchta, CPP, CFE Forensic Consulting Solutions Ben Greer, CISSP Cyber Security SME David Melnick, CIPP, CISSP, CISA Deloitte & Touche, LLP Jim Emerson Internet Crimes Group, Inc. Page 4

What is an ESD/ESI Incident? The differences between recovery, forensics and discovery. Basic steps & best practices for incident response. How organizations prepare for ESD/ESI incidents. What security practitioners need to know about ESD/ESI incident response. Ways incident response efforts can be countered or attacked. Future trends and problems for incident response. Page 5

Three Basic Flavors Data Recovery Digital Forensics E-Discovery (and composites) Page 6

Forensics & e-discovery Agenda Digital forensics considerations Jim Emerson for the private sector Internet Crimes Group, Inc Electronic Discovery Reference KJ Kuchta, CPP, CFE Model (edrm) Primer Forensic Consulting Solutions Organizational readiness David Melnick, CIPP,CISSP,CISA for e-discovery activity. Deloitte & Touche, LLP Evolution from the past: Andrew Neal, CISM, CRISC, LPI Future trends and problems. Southwest Digital Laboratory Page 7

for Private Sector Practitioners Jim Emerson Internet Crimes Group, Inc. Page 8

Maintaining Competent Digital Forensic Resources Maintaining Practical Digital Forensic Capabilities Digital Forensic Considerations for Emerging Technologies Page 9

Variety of Certification Standards? State Licensing Requirements? Accreditation of Diverse Tools and Infrastructure? Accreditation of Facility and Process? Examiner Experience with Diverse and Changing Technology? Page 10

Business, Legal, and Investigative Focused Process? Host, Appliance, and Network based Forensic Capabilities? Triage, Mass Storage, and Automated Examination Support? Remote Enterprise Solutions? Integration of Investigation and simple Data Recovery with ediscovery? Page 11

Cloud Computing and Virtualization SaaS, Social Networks and Business Integration of Public 3 rd Party Systems Increasingly Capable Wireless Devices and Appliances Smart Digital Systems and Vehicles Page 12

Is more or less Technical Competence required? Is more or less Investigative Competence required? Is more or less Ethical Integrity required? Page 13

KJ Kuchta, CPP, CFE Forensic Consulting Solutions Page 14

New and improved edrm FCS view of the edrm. IntraPrise & Extraprise Considerations for ediscovery & Informaton Governance. It costs about 20 cents to buy 1GB of storage; however, it costs around $3500 to review 1 GB of storage. AIIM International Email Management ROI Calculator Page 15

Data Data Data Data Data Data Data Data Custodian Source 1 2 3 Page 16

Information Governance Search & Retrieval Production Identification Preservation & Collection Presentation Preprocessing & Analysis Processing Review Post Review Analysis

Identify a specific list of custodians that may have relevant information. Start with the most important and conduct sampling if there are many custodians. Preserve broadly, process and review narrowly. Just because you preserve does not mean you need to process. Determine whether you need bit-by-bit or logical acquisitions. Page 18

Must be tailored to the facts of the case. Should include at minimum: Name of the matter or individual involved; Warning of the importance of the hold and the consequences for not complying with it; Direction not to alter or destroy information/documents; Reason for the hold e.g., legal action; Reason the recipient is getting the hold notice; Types of information included in the hold and the applicable time period. Instructions for preserving information/documents; Suspension of any routine document retention/destruction policy The notice should be issued to any employees likely to have relevant information and copied to the employer IT department for them to implement on the backend. Page 19

Employers have a duty to preserve electronically stored information and paper documents that they know or should know would be relevant to a current or threatened legal action. Events which might trigger this duty could include: Any notice that the employer is a party to an administrative or a legal proceeding. An email or letter threatening a claim on behalf of an applicant or current or former employee or client. A verbal threat or demand from an applicant or current or former employee or client relating to a legal claim. Anything that might realistically indicate an employee or client intends to pursue legal action. Page 20

Improper application of legal holds or simply not implementing legal holds can result in costly financial sanctions or the loss of a lawsuit for employers(millions of dollars). Smaller employers are not exempt due to size of company. Loss of data due to improper legal hold could lose the pertinent data that would have protected the employer in the lawsuit. Page 21

David Melnick, CIPP, CISSP, CISA Deloitte & Touche, LLP Page 22

Information Overload Security and Privacy Concerns Regulatory Trends Legal and Compliance Information Management Challenges High Operational Costs Risks of Noncompliance Page 23

Page 24

Developing an enterprise Information Management Program can help maximize the amount of value you achieve from different initiatives Each one of these areas reinforces the other, for example: Improved data classification can make ediscovery collection and processing processes faster Improved data protection can reinforce records management policies and processes Appropriate retention policies can reduce the volume of documents that can be presented for ediscovery A programmatic approach is required to ensure policies and processes in each area are mutually reinforcing to provide the greatest integration value to the company. Page 25

Page 26

Data Management addresses how an organization manages its data. It is a comprehensive set of capabilities that properly manages the data lifecycle requirements of an enterprise via the development and execution of policies, procedures, architectures, and use of technologies. Page 27

A disconnect between corporate policies, actual operational practices, and technology infrastructure reduces ability to implement changes into the business environment. Examples of activities related to privacy and data protection that led to enforcement actions, law suits, or monetary fines are as follows: Misrepresenting the purpose for collecting PII Failure to disclose the means used to collect PII (i.e., the use and/or duration of cookies, Web bugs, spyware, tracking technologies) Failure to adequately train personnel on privacy representations Disclosing, sharing, or selling PII to third parties contrary to the organization s privacy policy Exporting PII contrary to the privacy laws of the originating country Misrepresenting the security protection of PII Page 28

INFORMATION MANAGEMENT PROGRAM TOP DOWN BOTTOM UP PLANNING AND SCOPING INFORMATION GOVERNANCE STRUCTURE INFORMATION MANAGEMENT POLICY FRAMEWORK Data WAREHOUSING AND ELECTRONIC INFORMATION MANAGEMENT PRIVACY, SECURITY, IMPLEMENTATION AND TRAINING AND COMMUNICATION DISCOVERY/LITIGATION READINESS RECORD RETENTION SCHEDULES APPLICATION OF RECORD RETENTION SCHEDULES PROCESSES AND PROCEDURES RIM Department Headquarters Offices APPROACH FOR THE DISPOSITION OF HISTORICAL INFORMATION Hard Copy/Electronic Organizations must leverage a robust Information Management framework to organize its priorities and approaches around the components of the Information Life Cycle. Approaches may vary (either topdown or bottom-up) based upon the maturity of the component and the strategic value it represents to the organization. Page 29

Andrew Neal CISM, CRISC, CIFI, LPI Southwest Digital Laboratory Page 30

Watergate Enron Katrina BTK War on drugs Osama s myspace Page 31

Increase in areal density. New storage devices and media. Tools independent of data structure. Cloud integration into storage architecture. Issues created when physically recovering a drive from a large multi-tenant array. Regulatory and certification issues. Page 32

More & different target devices. Evolving licensing and regulation. Development of standards and frameworks. Reduced disruption during acquisition. Counter-Forensics and Anti-Forensics. Tool validation. Risk management for the forensic process. Page 33

More discoverable sources: Social media Portable devices Exponential growth in data storage. Evolving rules of evidence. Education of the judiciary. Development of smart tools for collection and processing. Professional training and standards. Page 34

Not a settled science or profession. Rapidly increasing crossover between technical and operational areas. Best results achieved with Established policy Prior planning Education of incident responders Established vendor relationships Page 35

Forensics & e-discovery Questions? KJ Kuchta, CPP, CFE Forensic Consulting Solutions kkuchta@forensicsconsulting.com David Melnick, CIPP,CISSP,CISA Deloitte & Touche, LLP dmelnick@deloitte.com Jim Emerson Internet Crimes Group, Inc jje@icginc.com Andrew Neal, CISM, CRISC, LPI Southwest Digital Laboratory aneal@southwestdigitallab.com Page 36