5
9/2/2015 1 The Great Data Robbery Combatting cyber fraud in the 21 st century. DFW Public Sector CPE Event|Sept 3, 2015 What We’ll Cover Current threat landscape Common security measures Why this isn’t enough (case studies) What organizations should be doing Presenters Brian Thomas Weaver Partner, IT Advisory Services Jarrett Kolthoff SpearTip President Weaver IT Advisory Services 5 Outmaneuver Your Adversary Utilizing cyber counterintelligence strategies, SpearTip partners with our clients to protect shareholder value, shield corporate reputations, and enhance long-term profits. 6 Current Landscape

Great Data Robbery - Weaver DFW CPE Event 090315 Data... · 2019. 12. 19. · 9/2/2015 1 The Great Data Robbery Combatting cyber fraud in the 21st century. DFW Public Sector CPE Event|Sept

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Great Data Robbery - Weaver DFW CPE Event 090315 Data... · 2019. 12. 19. · 9/2/2015 1 The Great Data Robbery Combatting cyber fraud in the 21st century. DFW Public Sector CPE Event|Sept

9/2/2015

1

The Great Data RobberyCombatting cyber fraud in the 21st century.

DFW Public Sector CPE Event|Sept 3, 2015

What We’ll Cover

• Current threat landscape

• Common security measures

• Why this isn’t enough (case studies)

• What organizations should be doing

Presenters

Brian ThomasWeaverPartner, IT Advisory Services

Jarrett KolthoffSpearTip

President

Weaver

IT Advisory Services

5

Outmaneuver Your Adversary

Utilizing cyber counterintelligence strategies, SpearTip partners with our clients to protect shareholder value, shield corporate reputations, and enhance long-term profits.

6

Current Landscape

Page 2: Great Data Robbery - Weaver DFW CPE Event 090315 Data... · 2019. 12. 19. · 9/2/2015 1 The Great Data Robbery Combatting cyber fraud in the 21st century. DFW Public Sector CPE Event|Sept

9/2/2015

2

Background

Two kinds of organizations:

those that have been breached

those that know that they’ve been breached

What’s going on

• Zero day malware via phishing and websites

• Gets past typical controls• Impact:

– Data / system hijacking & ransom– Data exfiltration (credentials, account

info, card info)– Fraudulent transactions, credit card fraud,

identity theft, fraudulent wires, account takeover

What’s going on What are they after?

11

`

Common Measures

What are we doing today?

• Anti-virus, anti-malware• Patching updating• Employee and customer

training• Perimeter security• Scanning, vulnerability

assessment, and penetration testing

• Social engineering assessments• Some risk assessment & vendor

management

Page 3: Great Data Robbery - Weaver DFW CPE Event 090315 Data... · 2019. 12. 19. · 9/2/2015 1 The Great Data Robbery Combatting cyber fraud in the 21st century. DFW Public Sector CPE Event|Sept

9/2/2015

3

What is accomplished?

• Identifying / fixing known issues• Making it harder to attack us• Educating our employees

What’s NOT accomplished?

• Progress against zero day malware• Getting hands around the cyber risk• Ability to detect issues quickly• Resiliency, preparedness for when

something happens

14

15

“Prevention is ideal, detection is a must!”

16

Examples & Case Studies

Example malware issue

18

Steps to Take

Page 4: Great Data Robbery - Weaver DFW CPE Event 090315 Data... · 2019. 12. 19. · 9/2/2015 1 The Great Data Robbery Combatting cyber fraud in the 21st century. DFW Public Sector CPE Event|Sept

9/2/2015

4

Day at the TIP

Chinese Wire Fraud

Day at the TIP

GROWING RISKS

+ New consumer protection laws hold officers accountable

for cyber breaches.+ State attorneys general now target businesses for non-

disclosure of cyber breaches.+ Improperly handled cyber attacks are now considered

breaches of fiduciary duty.

YOU PERSONALLY FACE GROWING LIABILITYFOR PROTECTING COMPANY ASSETS

Executives and Directors are no longer viewed as innocent victims in the event of a cyber breach.

Liability

POTENTIAL HARM

+ Lawsuits resulting from a breach can cost millions.

+ Incident response and remediation can result in

significant expense.+ Loss of public trust can permanently damage share price

and growth.

A SINGLE BREACH COULD RESULT IN PERMANENT COMPANY DEVALUATION

Cyber criminals now target trade secrets, intellectual property, and financials, as well as personal data.

Business Impact

FACTS

+ Continuous monitoring of cyber threats is now an essential practice.

+ Tools such as mobile devices open doors for cyber breaches.

+ Cyber crime methods and technology change and escalate daily.

+ Audits and Vulnerability Assessments are NOT enough

YOUR CURRENT TACTICS FOR CYBER SECURITY ARE NOT ENOUGH

Misconceptions and misinformation can leave you vulnerable and at risk.

Call to Action

Preparing for BattleLeveraging Cyber Threat Intelligence Proactively

+ Can you Respond to an incident

+ Is there Zero-Day malware within

our environment now

+ What do the hackers currently have

of mine

21st Century Tactics

Page 5: Great Data Robbery - Weaver DFW CPE Event 090315 Data... · 2019. 12. 19. · 9/2/2015 1 The Great Data Robbery Combatting cyber fraud in the 21st century. DFW Public Sector CPE Event|Sept

9/2/2015

5

Homeland Security says, “PPD‐21 defines resilience as the ability to prepare for and adapt to changing conditions, and withstand and recover rapidly from disruptions. Resilience includes the ability to withstand and recover from deliberate attacks, accidents, or naturally occurring threats or incidents.”

Cyber Resiliency Cyber Resiliency (cont.)

1. Asset Management2. Controls Management3. Configuration and Change 

Management4. Vulnerability Management5. Incident Management6. Service Continuity Management7. Risk Management8. External Dependency 

Management9. Training and Awareness10.Situational Awareness https://www.us‐cert.gov/ccubedvp/self‐service‐crr

Cyber Resiliency Resources

https://www.us‐cert.gov/ccubedvp/self‐service‐crr#

Questions & Discussion

Jarrett KolthoffPresident & CEOTel: 800.236.6550Email: [email protected]

Brian J. Thomas, CISA, CISSP, QSAPartner, Advisory ServicesTel: 713.800.1050Email: [email protected]

: @IT_Risk