46
Presented by: Doug Jambor Turner and Associates

Douglas Jambor Sageworks Cybersecurity Presentation

Embed Size (px)

Citation preview

Page 1: Douglas Jambor Sageworks Cybersecurity Presentation

Presented by: Doug Jambor

Turner and Associates

Page 2: Douglas Jambor Sageworks Cybersecurity Presentation

Financial information company that provides credit and risk management solutions to financial institutions

Data and applications used by thousands of financial institutions and accounting firms across North America

Awards ◦ Named to Inc. 500 lit of fastest growing privately

held companies in the U.S.

◦ Named to Deloitte Technology Fast 500

Page 3: Douglas Jambor Sageworks Cybersecurity Presentation

Turner and Associates, Inc., was formed in 1994 in Columbus, Ohio to address the financial needs of small businesses and the lending functions of Banks.

Page 4: Douglas Jambor Sageworks Cybersecurity Presentation

Data Breaches ◦ Lessons Learned

◦ Key Takeaways

Page 5: Douglas Jambor Sageworks Cybersecurity Presentation

So, what are data breaches?

◦ Unintended disclosure of sensitive information

◦ Cyber Attacks

◦ Payment card fraud

Page 6: Douglas Jambor Sageworks Cybersecurity Presentation

Data breaches are also caused by:

◦ Malicious insiders

◦ Physical data loss

◦ Portable device loss

Page 7: Douglas Jambor Sageworks Cybersecurity Presentation

Lastly, data breaches could be caused by:

◦ Hardware loss

◦ Unknown data loss

Page 8: Douglas Jambor Sageworks Cybersecurity Presentation

History of the 10 largest data breaches:

1. Shanghai Roadway (March, 2012) 150 Million records

2. Heartland Payment Systems (January, 2009) 130 Million records

3. T.J. Maxx (January 2007) 94 Million Records

Page 9: Douglas Jambor Sageworks Cybersecurity Presentation

History of the 10 largest data breaches:

4. TRW / Sears Roebuck (June,1984) 90 Million records

5. Sony Corporation (April, 2011) 77 Million records

6. Unknown Company (August, 2008) 50 Million Records

Page 10: Douglas Jambor Sageworks Cybersecurity Presentation

History of the 10 largest data breaches:

7. Card Systems (June, 2005) 40 Million records

8. Tianya (December, 2011) 40 Million records

9. Steam On-line Gaming (November, 2011) 35 Million Records

Page 11: Douglas Jambor Sageworks Cybersecurity Presentation

History of the 10 largest data breaches:

10. SK Communications (July, 2011) 35 Million records

Page 12: Douglas Jambor Sageworks Cybersecurity Presentation

2011 was a game changer

◦ Four of the top

10 biggest data

breaches happened

this year

Page 13: Douglas Jambor Sageworks Cybersecurity Presentation

2011 was a game changer

◦ Hackivism come

through the doors

Page 14: Douglas Jambor Sageworks Cybersecurity Presentation
Page 15: Douglas Jambor Sageworks Cybersecurity Presentation

Larry Ponemon

2012 RSA

Conference in

San Francisco

Page 16: Douglas Jambor Sageworks Cybersecurity Presentation
Page 17: Douglas Jambor Sageworks Cybersecurity Presentation

Can we stop data breaches? ◦ No

Page 18: Douglas Jambor Sageworks Cybersecurity Presentation

What are the primary motives behind data breaches? ◦ Criminal element & $$$

◦ Verizon 2012 DBIR:

Page 19: Douglas Jambor Sageworks Cybersecurity Presentation

Who is behind data breaches? ◦ Verizon 2012

DBIR:

Page 20: Douglas Jambor Sageworks Cybersecurity Presentation

How do data breaches occur? ◦ Verizon 2012

DBIR:

Page 21: Douglas Jambor Sageworks Cybersecurity Presentation

What commonalities exist between data

breaches? ◦ Verizon 2012 DBIR:

Page 22: Douglas Jambor Sageworks Cybersecurity Presentation

Industry groups represented by percent of breaches ◦ Verizon 2012 DBIR:

Page 23: Douglas Jambor Sageworks Cybersecurity Presentation

Industry groups represented by percent of breaches ◦ Verizon 2012 DBIR:

Page 24: Douglas Jambor Sageworks Cybersecurity Presentation

Threat agents over time by percent of breaches ◦ Verizon

2012 DBIR:

Page 25: Douglas Jambor Sageworks Cybersecurity Presentation

Compromised assets by percent of breaches and records ◦ Verizon

2012 DBIR:

Page 26: Douglas Jambor Sageworks Cybersecurity Presentation

Timespan of events by percent of breaches ◦ Verizon

2012 DBIR:

Page 27: Douglas Jambor Sageworks Cybersecurity Presentation

So why are data breaches so damaging?

◦ They impact your organization’s bottom line

◦ Average cost is almost $18K per day

◦ All industries are susceptible data breaches

Page 28: Douglas Jambor Sageworks Cybersecurity Presentation

Average annualized cyber crime cost weighted by attack frequency ◦ Ponemon:

Page 29: Douglas Jambor Sageworks Cybersecurity Presentation

Percentage cost for external consequences ◦ Ponemon:

Page 30: Douglas Jambor Sageworks Cybersecurity Presentation

Responding to a data breach - percentage cost by internal activity centers ◦ Ponemon:

Page 31: Douglas Jambor Sageworks Cybersecurity Presentation

What should we consider prior to a data breach? ◦ Ensure you have developed and tested an Incident

Response Plan

Page 32: Douglas Jambor Sageworks Cybersecurity Presentation

Incident Response Plan

Step one ◦ Build a response team

Page 33: Douglas Jambor Sageworks Cybersecurity Presentation

Incident Response Plan

Step two ◦ Assign a lead/liaison

Page 34: Douglas Jambor Sageworks Cybersecurity Presentation

Incident Response Plan

Step three ◦ Ensure everyone knows their job tasks

Page 35: Douglas Jambor Sageworks Cybersecurity Presentation

Incident Response Plan

Step four ◦ Create the contact list

Page 36: Douglas Jambor Sageworks Cybersecurity Presentation

Incident Response Plan

Step five ◦ Create a checklist

Page 37: Douglas Jambor Sageworks Cybersecurity Presentation

Incident Response Plan

Step six ◦ Document the entire process

Page 38: Douglas Jambor Sageworks Cybersecurity Presentation

Incident Response Plan

Step seven ◦ Notify customers

Page 39: Douglas Jambor Sageworks Cybersecurity Presentation

How do you limit your exposure to a data breach? ◦ Perform due diligence on pen testers, internal

auditors, and critical vendors

Page 40: Douglas Jambor Sageworks Cybersecurity Presentation

How do you limit your exposure to a data breach? ◦ Read penetration test EL

Page 41: Douglas Jambor Sageworks Cybersecurity Presentation

How do you limit your exposure to a data breach? ◦ Smaller institutions

Page 42: Douglas Jambor Sageworks Cybersecurity Presentation

How do you limit your exposure to a data breach? ◦ Perform gap analysis of the SANS 20 Critical

Security Controls

Page 43: Douglas Jambor Sageworks Cybersecurity Presentation

How do you limit your exposure to a data breach? ◦ If you see bad behavior, call it out

Page 44: Douglas Jambor Sageworks Cybersecurity Presentation

How do you limit your exposure to a data breach? ◦ Invest in security

Page 45: Douglas Jambor Sageworks Cybersecurity Presentation

Data breaches described in today’s webinar have been publicly reported and easily available over the Internet.

Major Sources include: ◦ http://www.ponemon.org

◦ http://datalossdb.org/

◦ https://www.privacyrights.org/

◦ http://www.databreaches.net/

◦ http://www.ftc.gov/

◦ Verizon 2012 Data Breach Investigations Report

Page 46: Douglas Jambor Sageworks Cybersecurity Presentation

Website: www.sageworksinc.com

Phone: (919)-851-7474 ext. 693

Helpful links and resources: ◦ www.sageworksanalyst.com/resources.aspx

◦ web.sageworksinc.com/bank-webinars/

Find us on twitter: sageworksdata