code red: protecting your enterprise and securing your data

33

Upload: argentum

Post on 12-Mar-2016

226 views

Category:

Documents


6 download

DESCRIPTION

Do you remember what you were doing 416 days ago? According to a recent security report from Mandiant, it takes more than a year before the average company realizes it has been a cybercrime target. Cybercrime expert Theresa Payton provides an overview of emerging security threats facing U.S. businesses as well as the latest developments in how companies can safeguard their brand, assets, information, intellectual property, and finances to prevent the worst-case scenario from happening. Payton also shares actionable and strategic solutions to stop hackers, saboteurs, fraudsters, and cybercriminals in their tracks, while describing ways businesses can combat “homegrown” insider threats. >> Faculty: Theresa Payton, Founder, Fortalice

TRANSCRIPT

Page 1: Code Red: Protecting Your Enterprise and Securing Your Data
Page 2: Code Red: Protecting Your Enterprise and Securing Your Data

Video | What Happened •  Directions to the A/V team - Please play from the

beginning and cut it at 1:25…..

•  Video – http://www.youtube.com/watch?v=3FelJwb4NCM

Theresa  Payton  ©  2013  All  Rights  Reserved    

Page 3: Code Red: Protecting Your Enterprise and Securing Your Data
Page 4: Code Red: Protecting Your Enterprise and Securing Your Data

Uber Connected?| What to Watch? 6 Billion people

have mobile phones

The number of networked devices = the globe’s population

Internet connectivity ubiquitous!

Page 5: Code Red: Protecting Your Enterprise and Securing Your Data

Uber Connected?| What to Watch? 1 Minute just went by…what happened? 639,800

GB was transferred…

135  Botnet  Infec>ons  

1,300  new  mobile  users  

Intel:    What  Happens  in  an  Internet  Minute?    Posted  By  Krystal  Temple  March  13,  2012.  

204  million  emails  sent  

20  New  vic>ms  of  iden>ty  theF  

100+  LinkedIn  accounts    added  

20  million  photo    views  30  hours  of  video    uploaded  (+1.3M  views)  

   

100,000  new  tweets  277,000  Facebook  logins  

Page 6: Code Red: Protecting Your Enterprise and Securing Your Data

Memory Check| Current State of Affairs

What were you doing 243 days ago?

Page 7: Code Red: Protecting Your Enterprise and Securing Your Data

Current State of Affairs| Incoming!

Something is discovered every 90 seconds.

What is it?

Page 8: Code Red: Protecting Your Enterprise and Securing Your Data

Breach Discovery| Bold New Approach Needed

M-­‐Trends  2013,  Mandiant  

37%  

63%  

Page 9: Code Red: Protecting Your Enterprise and Securing Your Data

  Booming Economy? Where? Russia’s Cyber Crime…but it’s other places too.

  Latest estimated value of the country's cyber crime market is now $2.3 billion   almost double from the prior

year’s $1.2B

Current State of Affairs

9  

  $1.8 billion of that is from what?   You guessed it…Online fraud via banking malware,

phishing, and spam

Source: State and Trends of the Russian Digital Crime Market Released April 2012

Page 10: Code Red: Protecting Your Enterprise and Securing Your Data

Current State of Affairs| Assumptions

For IT risk and security, staffing levels should be between 5% and 12% of your total staff but many organizations have < 3%.  

Chris  Byrne,  Gartner  Security  and  Risk  Summit,  2012  

Page 11: Code Red: Protecting Your Enterprise and Securing Your Data

Current State of Affairs| Industry Challenges

What  Keeps  Me  Up  At  Night?    Businesses  in  a  recent  survey  indicated:  

 50%+  :    $/time  not  justified  by  the  threat.  

 75%  :    less  than  3  hours  per  year  and  almost  half  offer  zero    

 47%  -­‐    Recovery  Plans  are  Dilbert  Style!  

 6  out  of  10  –  go  ahead  and  talk  to  strangers  (unsecured  WiFi)  National  Cyber  Security  Alliance  and  Visa  poll:    business’  cyber  security  practices  &  attitudes  

Page 12: Code Red: Protecting Your Enterprise and Securing Your Data

Black Swan | Risk Management Convincing others to prepare to invest in an event that will “never” happen

•  “Zero Risk” does not exist but “Managed Risk” does •  Making security the business enabler vs. productivity roadblock

Page 13: Code Red: Protecting Your Enterprise and Securing Your Data

Black Swan | Risk Management “Senior living providers are

at particular risk because of the nature of the information they store on residents”

John Atkinson, Managing Partner at The

Willis Group Holdings

Page 14: Code Red: Protecting Your Enterprise and Securing Your Data

Black Swan | Risk Management “Over the weekend of November 17-18,

2012, five laptops were stolen from Riderwood’s physical therapy offices.”

On the hard drive? Unencrypted patient names, visits, addresses and policy numbers Lessons Learned: Data storage on hard drives Encrypting files

Page 15: Code Red: Protecting Your Enterprise and Securing Your Data

Black Swan | Risk Management

HHS  reason  for  heFy  fine?  Unencrypted  data,  did  not  do  regular  risk  assessments  

January 2013 “…the Hospice of North Idaho became HHS’s first facility with fewer

than 500 residents to be fined for a patient information data breach, saddling the hospice a whopping $50,000 bill.”

Stolen? Laptop (in 2010) Lessons Learned: Data storage on hard drives Delete files you do not need anymore Schedule periodic risk assessments Encrypting files

Page 16: Code Red: Protecting Your Enterprise and Securing Your Data

Black Swan | Risk Management HITECH Act requirement Organizations that have personal

health information (PHI) must have a plan of action in the event they did experience a security breach

And…Regulated by HIPAA? Breach reports to multiple outlets: Department of Health and Human Services

the media affected individuals.

Page 17: Code Red: Protecting Your Enterprise and Securing Your Data

Does Spending=Secure?| Invalid Assumptions

Case  Study:  Target  Corp.  and  Oracle  Corp.  

Hacking  contest  for  large  companies  

Target  spends  about  1/2  as  much  on  security  annually  as  Oracle  

Results?    

Target  was  more  difficult  to  hack  

Yurcan, Bryan. Panel Discussion: The Role of the Bank CIO. Bank Systems & Technology: October 20, 2011 Kapner, Suzanne. Hackers Press the ‘Schmooze’ Button. WSJ: October 31, 2011

Page 18: Code Red: Protecting Your Enterprise and Securing Your Data

Current State of Affairs| Innovation

How A Happy Meal = Better Security!

A case study in innovation.

Page 19: Code Red: Protecting Your Enterprise and Securing Your Data

5 Tech Trends | Enormous Implications

 BYOD –without CYA creates BYOB  The new 4 letter word is SMIT  Who knew cybercriminals were so

“socially minded”?  Malware morphs beyond

detection awareness  Why the Cloud could be your

“Father’s Oldsmobile” and when will we get Big Data analytics ?

BYOD

SMIT

SO SOCIAL!

MORPH TO THE MAX PO

RSC

HE

WR

APPER

DAT

A M

APS

DIGITAL ASSETS

Page 20: Code Red: Protecting Your Enterprise and Securing Your Data

Top Digital Assets?| Actions

Security and Privacy Settings

BYOD access…hmmm

Cloud?

Free Wi-Fi at Your Peril

What protections do you have for the “POTUS and VP” assets?

Page 21: Code Red: Protecting Your Enterprise and Securing Your Data

Plan of Attack| 5 Step Plan

Training  

Policies  and  Procedures  

Prac4cing  Digital  Doomsday  

Technology  Tuning  

Security  in  the  Supply  Chain  

 

Page 22: Code Red: Protecting Your Enterprise and Securing Your Data

80/20 Rule| 2 Steps = Biggest Impact

Best Practices & Improved Security Policies

Informed, Aware & Engaged Employees

Technology Improvements

Gov’t Regulation & Law Enforcement

58% 20% 18% 4%

2012  Bit9  Cyber  Security  Research  Report  

Page 23: Code Red: Protecting Your Enterprise and Securing Your Data

Back at the Office| Actions Basics Top Digital Assets – Who are they? Training Policies and Procedures Patches Configurations Hardening Encryption of PHI emails Encryption of data

Page 24: Code Red: Protecting Your Enterprise and Securing Your Data

Back at the Office| Actions

Password  protect  

Never  loan  devices  or  WiFi  

Treat  old  devices  and  back  up  informa>on  like  gold  

Timeout  feature  

4  TIPS  TO  REMEMBER  

Page 25: Code Red: Protecting Your Enterprise and Securing Your Data

Back at the Office| Actions Next Phase Incident Management Disaster Recovery Digital Disaster Technology Tuning Supply Chain Review

Page 26: Code Red: Protecting Your Enterprise and Securing Your Data

Back at the Office| Actions

• Check the box! DANGER! Trap: Focusing on

regulatory compliance instead of comprehensive

security.

• Looks good but is it safe? A lack of security features

consistently built into elderly care and health care

systems.

• 411 Breakdown: Capability gap for sharing

information on cybersecurity and other issues.

• No Measurements: Lack of metrics for evaluating

cybersecurity.

Page 27: Code Red: Protecting Your Enterprise and Securing Your Data

Next Steps | Let’s Get to Work!

5 Things… •  Training – just say NO to CBT only •  Document IT AND End User policies and procedures •  Where will your team get stuck during the digital

doomsday exercise? •  90% of our clients last year had the core technology they

needed but… •  You are the weakest link? No!

Page 28: Code Red: Protecting Your Enterprise and Securing Your Data

Next Steps | Practice Makes Perfect Here’s your next staff meeting agenda Current State Assessment – Spend Dedicated Time Discussing: What security measures are in place? What do they protect? How vulnerable are you? How vulnerable are your clients? What client communication and response plans exist? Do you test incident management plans using plausible scenarios? Options Analysis What could be done within the next 90 days to improve security? How would your company respond to losing intellectual property,

internal emails posted on a public website, or worse? How can each security layer be enhanced, at what cost and at what

impact to productivity?

Page 29: Code Red: Protecting Your Enterprise and Securing Your Data

Next Steps | Practice Makes Perfect

Staff Meeting - Practice the Disaster Name Your Worst Digital Nightmare: Digital death, what happened? Go around the room and ask the team to tell you the

escalation plan and their list of actions. Do you know who to call? Do you know what to do? How do you stop the bad guys from taking more? Do you need outside help? Time yourself…how long does it take before you create a

plan of action?

Page 30: Code Red: Protecting Your Enterprise and Securing Your Data

Next Steps | Practice Makes Perfect

Supply Chain Security – 8 Vendor Checkpoints Information Security Identity Management Endpoint and Server Security Gateway and Network Security Web and Application Security Physical and Personnel Security Security Management Intellectual Property, Customer Information, and Financial

Transaction Security

Page 31: Code Red: Protecting Your Enterprise and Securing Your Data

Next Steps | Practice Makes Perfect

Supply Chain Security –Vendor Must Answer: Chain of Custody Least Privilege Access Separation of Duties Tamper Resistance and Evidence Persistent Compliance Management Code Testing and Verification Trusted and Vetted Staff

Page 32: Code Red: Protecting Your Enterprise and Securing Your Data

Next Steps | Cloud in your future?

Draw up the Pre-Nup First! When you “break up” what are their sanitization policies so

you get your data back and they don’t have your digital footprints?

Need a “Go to guide”? Try NIST: NIST Cloud Computing Reference Architecture SP 500-292

Page 33: Code Red: Protecting Your Enterprise and Securing Your Data

Questions?                [email protected]  

 @FortaliceLLC  

 Fortalice-­‐LLC  

 fortalicesolutions.blogspot.com