CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY |...

Preview:

Citation preview

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICSCYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS

Agenda

• Overview of Breaches– Current Breach Statistics– Examples of Breaches

• Detecting Breaches– Symptoms– Log Analysis and Tools– Breach Assessment– Breach Investigation

• Prevent , Detect, and Mitigate Breaches

a gap in a wall, barrier, or defense, especially one made by an attacking army Hacker.

BreachbrēCH/

noun

http://www.idtheftcenter.org

0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

30.00%

35.00%

40.00%

2010 2011 2012 2014 2015

Causes/Type of Breaches (2010 – 2015)

Insider Theft Hacking Data on the MoveAccidental Exposure Subcontractor Employee Negligence

© 2016 Enterprise Risk Management, Inc.

http://www.idtheftcenter.org

0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

30.00%

35.00%

40.00%

2010 2011 2012 2014 2015

Causes/Type of Breaches (2010 – 2015)

Insider Theft Hacking Data on the MoveAccidental Exposure Subcontractor Employee Negligence

© 2016 Enterprise Risk Management, Inc.

the average data breach cost per victim, it is nearly

$206 per compromised record© 2016 Enterprise Risk Management, Inc. http://securityaffairs.co/wordpress/24717/security/ponemon-data-breach-study.html

1x Compromised Server

10,000x Stolen Records

Cost Per record

$2,060,000

So you’re telling me that….

© 2016 Enterprise Risk Management, Inc. http://securityaffairs.co/wordpress/24717/security/ponemon-data-breach-study.html

Breaches Handled by ERM

Security Breach Investigations

Detecting Breaches

Symptoms

Log Analysis and Tools

Breach Assessment

Breach Investigation

Prevent , Detect, and Mitigate Breaches

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS

Its your responsibility to make sure its correctly deployed, implemented and enforced.

Security is critical

© 2016 Enterprise Risk Management, Inc.

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICSIf not….XXX

XXX

Might as well plan onFAILING

© 2016 Enterprise Risk Management, Inc.

Security is critical

Security Tips•Logical Security•Physical Security•Administrative Security•Logging and Monitoring•Security Assessments•Awareness Training•Vendors /Contractors•Incident Response Plan

1 Have you ever performed a data breach assessment of your business?

1

2

Have you ever performed a data breach assessment of your business?

Can you say with confidence that your business is safe from cyber attacks?

1

2

3

Have you ever performed a data breach assessment of your business?

Can you say with confidence that your business is safe from cyber attacks?

Do you know precisely what you need to do if your business is faced with cyber attack?

What if you have been hackedbut just don’t know it yet?

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS

Your go to advisorsfor all matters in information security.

www.emrisk.com

800 S Douglas Road #940Coral Gables, FL 33134 USA

Phone: 305-447-6750Email: info@emrisk.com

Silka M. GonzalezPresident

+1 (305) 335-7610sgonzalez@emrisk.com

Recommended