23
CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS

Page 2: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICSCYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS

Agenda

• Overview of Breaches– Current Breach Statistics– Examples of Breaches

• Detecting Breaches– Symptoms– Log Analysis and Tools– Breach Assessment– Breach Investigation

• Prevent , Detect, and Mitigate Breaches

Page 3: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

a gap in a wall, barrier, or defense, especially one made by an attacking army Hacker.

BreachbrēCH/

noun

Page 4: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

http://www.idtheftcenter.org

0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

30.00%

35.00%

40.00%

2010 2011 2012 2014 2015

Causes/Type of Breaches (2010 – 2015)

Insider Theft Hacking Data on the MoveAccidental Exposure Subcontractor Employee Negligence

© 2016 Enterprise Risk Management, Inc.

Page 5: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

http://www.idtheftcenter.org

0.00%

5.00%

10.00%

15.00%

20.00%

25.00%

30.00%

35.00%

40.00%

2010 2011 2012 2014 2015

Causes/Type of Breaches (2010 – 2015)

Insider Theft Hacking Data on the MoveAccidental Exposure Subcontractor Employee Negligence

© 2016 Enterprise Risk Management, Inc.

Page 6: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

the average data breach cost per victim, it is nearly

$206 per compromised record© 2016 Enterprise Risk Management, Inc. http://securityaffairs.co/wordpress/24717/security/ponemon-data-breach-study.html

Page 7: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

1x Compromised Server

10,000x Stolen Records

Cost Per record

$2,060,000

So you’re telling me that….

© 2016 Enterprise Risk Management, Inc. http://securityaffairs.co/wordpress/24717/security/ponemon-data-breach-study.html

Page 8: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

Breaches Handled by ERM

Page 9: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

Security Breach Investigations

Page 10: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

Detecting Breaches

Page 11: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

Symptoms

Page 12: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

Log Analysis and Tools

Page 13: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

Breach Assessment

Page 14: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

Breach Investigation

Page 15: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

Prevent , Detect, and Mitigate Breaches

Page 16: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS

Its your responsibility to make sure its correctly deployed, implemented and enforced.

Security is critical

© 2016 Enterprise Risk Management, Inc.

Page 17: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICSIf not….XXX

XXX

Might as well plan onFAILING

© 2016 Enterprise Risk Management, Inc.

Security is critical

Page 18: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

Security Tips•Logical Security•Physical Security•Administrative Security•Logging and Monitoring•Security Assessments•Awareness Training•Vendors /Contractors•Incident Response Plan

Page 19: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

1 Have you ever performed a data breach assessment of your business?

Page 20: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

1

2

Have you ever performed a data breach assessment of your business?

Can you say with confidence that your business is safe from cyber attacks?

Page 21: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

1

2

3

Have you ever performed a data breach assessment of your business?

Can you say with confidence that your business is safe from cyber attacks?

Do you know precisely what you need to do if your business is faced with cyber attack?

Page 22: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

What if you have been hackedbut just don’t know it yet?

Page 23: CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Investigation... · CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS Agenda • Overview of Breaches – Current

CYBER SECURITY | REGULATORY COMPLIANCE | DIGITAL FORENSICS

Your go to advisorsfor all matters in information security.

www.emrisk.com

800 S Douglas Road #940Coral Gables, FL 33134 USA

Phone: 305-447-6750Email: [email protected]

Silka M. GonzalezPresident

+1 (305) [email protected]