SlideShare ist ein Scribd-Unternehmen logo
1 von 11
Data Breach Lessons from 2013
CodeMash 2014

January 9, 2014
Eric A. Vanderburg, MBA, CISSP
Director, Information Systems and Security
Computer Forensic and Investigation Services

© 2014 Property of JurInnov Ltd. All Rights Reserved
Facts and Figures


Average breach costs $194 per record -Ponemon
Institute



Financial impact of cybercrime expected to grow
10% per year through 2016
-Gartner



10% of companies experienced a data breach
Hiscox small business research

© 2014 Property of JurInnov Ltd. All Rights Reserved

-
Types of breaches
• Insider
– Accidental
– Intentional

• Social Engineering
• Malware
• Hacking

© 2014 Property of JurInnov Ltd. All Rights Reserved
2013 Breaches
• Living Social
– Breach overview
– Impact
– Lessons learned

• Virginia Polytechnic Institute and State
University
– Breach overview
– Impact
– Lessons learned

© 2014 Property of JurInnov Ltd. All Rights Reserved
2013 Breaches
• University of Delaware
– Breach overview
– Impact
– Lessons learned

• Northrop Grumman
– Breach overview
– Impact
– Lessons learned

© 2014 Property of JurInnov Ltd. All Rights Reserved
2013 Breaches
• Internal Revenue Service
– Breach overview
– Impact
– Lessons learned

• St. Mary’s Bank
– Breach overview
– Impact
– Lessons learned

© 2014 Property of JurInnov Ltd. All Rights Reserved
2013 Breaches
• U.S. Department of Energy
– Breach overview
– Impact
– Lessons learned

• Michigan Department of Community Health
– Breach overview
– Impact
– Lessons learned

© 2014 Property of JurInnov Ltd. All Rights Reserved
2013 Breaches
• Evernote
– Breach overview
– Impact
– Lessons learned

• Drupal
– Breach overview
– Impact
– Lessons learned

© 2014 Property of JurInnov Ltd. All Rights Reserved
2013 Breaches
• Cogent Healthcare
– Breach overview
– Impact
– Lessons learned

• New York Office of the Medicaid Inspector
General
– Breach overview
– Impact
– Lessons learned

© 2014 Property of JurInnov Ltd. All Rights Reserved
2013 Breaches
• Republic Services
– Breach overview
– Impact
– Lessons learned

• Federal Reserve
– Breach overview
– Impact
– Lessons learned

© 2014 Property of JurInnov Ltd. All Rights Reserved
For assistance or additional information

Enjoy CodeMash!
•
•
•
•
•
•
•

Phone:
Web:
Email:
Twitter:
Facebook:
Linkedin:
Youtube:

216-664-1100
www.jurinnov.com
eric.vanderburg@jurinnov.com
@evanderburg
www.facebook.com/VanderburgE
www.linkedin.com/in/evanderburg
www.youtube.com/user/evanderburg
JurInnov Ltd.
The Idea Center
1375 Euclid Avenue, Suite 400
Cleveland, Ohio 44115

© 2014 Property of JurInnov Ltd. All Rights Reserved

Weitere ähnliche Inhalte

Andere mochten auch (7)

μέθοδος εκμάθησης των αρχαίων ελληνικών για μαθητές α΄, β΄, γ΄ ενιαίου λυκείου
μέθοδος εκμάθησης των αρχαίων ελληνικών για μαθητές α΄, β΄, γ΄ ενιαίου λυκείουμέθοδος εκμάθησης των αρχαίων ελληνικών για μαθητές α΄, β΄, γ΄ ενιαίου λυκείου
μέθοδος εκμάθησης των αρχαίων ελληνικών για μαθητές α΄, β΄, γ΄ ενιαίου λυκείου
 
Ego Rigere
Ego RigereEgo Rigere
Ego Rigere
 
2016 OCB Pine Tree State Registration Form
2016 OCB Pine Tree State Registration Form2016 OCB Pine Tree State Registration Form
2016 OCB Pine Tree State Registration Form
 
Venid y vamos todos
Venid y vamos todosVenid y vamos todos
Venid y vamos todos
 
Op amp
Op ampOp amp
Op amp
 
Viva maría
Viva maríaViva maría
Viva maría
 
Movimentos da terra rotação
Movimentos da terra rotaçãoMovimentos da terra rotação
Movimentos da terra rotação
 

Ähnlich wie Data Breach Lessons from 2013 - Eric Vanderburg - CodeMash 2014

Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)e
NetSPI
 
2014 Mid Mo AGA Presentation - Risk Management for Government
2014 Mid Mo AGA Presentation - Risk Management for Government2014 Mid Mo AGA Presentation - Risk Management for Government
2014 Mid Mo AGA Presentation - Risk Management for Government
Ron Steinkamp
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
SophiaPalmira1
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
James Fisher
 

Ähnlich wie Data Breach Lessons from 2013 - Eric Vanderburg - CodeMash 2014 (20)

Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
Preventing Fraud from Top to Bottom - Vanderburg, Gaddamanugu - Information S...
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
Ivan dragas get ahead of cybercrime
Ivan dragas   get ahead of cybercrimeIvan dragas   get ahead of cybercrime
Ivan dragas get ahead of cybercrime
 
2014 mala powerpoint
2014 mala powerpoint2014 mala powerpoint
2014 mala powerpoint
 
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
Cyber Readiness in the Securities and Brokerage Industries Featuring Armstron...
 
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
Security Awareness: 360 empowerment for cyber defense - JurInnov - Eric Vande...
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
Declaration of Mal(WAR)e
Declaration of Mal(WAR)eDeclaration of Mal(WAR)e
Declaration of Mal(WAR)e
 
2014 Mid Mo AGA Presentation - Risk Management for Government
2014 Mid Mo AGA Presentation - Risk Management for Government2014 Mid Mo AGA Presentation - Risk Management for Government
2014 Mid Mo AGA Presentation - Risk Management for Government
 
Corporate Cyber Attacks: Managing Risk to Avoid Reputation Harm
Corporate Cyber Attacks: Managing Risk to Avoid Reputation HarmCorporate Cyber Attacks: Managing Risk to Avoid Reputation Harm
Corporate Cyber Attacks: Managing Risk to Avoid Reputation Harm
 
Stop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraudStop occupational fraud - Three simple steps to help stop fraud
Stop occupational fraud - Three simple steps to help stop fraud
 
CTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptxCTEK Cyber Briefing - April 2022.pptx
CTEK Cyber Briefing - April 2022.pptx
 
CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022CynergisTek Cyber Briefing April 2022
CynergisTek Cyber Briefing April 2022
 
Cyber security mis
Cyber security  misCyber security  mis
Cyber security mis
 
Cyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education CourseCyber Security - NAHU Continuing Education Course
Cyber Security - NAHU Continuing Education Course
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016BIFM Risk Management Event 8th September 2016
BIFM Risk Management Event 8th September 2016
 
Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
protectingyourbusinessfromcyberrisks-pptforseminarnov122014-141120120959-conv...
 
Kaseya Kaspersky Breaches
Kaseya Kaspersky BreachesKaseya Kaspersky Breaches
Kaseya Kaspersky Breaches
 

Mehr von Eric Vanderburg

Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
 

Mehr von Eric Vanderburg (20)

GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT SymposiumGDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
 
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should HaveModern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
 
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric VanderburgCybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
 
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
 
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware ThreatRansomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
 
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s PositionEmerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
 
Principles of technology management
Principles of technology managementPrinciples of technology management
Principles of technology management
 
Japanese railway technology
Japanese railway technologyJapanese railway technology
Japanese railway technology
 
Evaluating japanese technological competitiveness
Evaluating japanese technological competitivenessEvaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
 
Japanese current and future technology management challenges
Japanese current and future technology management challengesJapanese current and future technology management challenges
Japanese current and future technology management challenges
 
Technology management in Japan: Robotics
Technology management in Japan: RoboticsTechnology management in Japan: Robotics
Technology management in Japan: Robotics
 
Incident response table top exercises
Incident response table top exercisesIncident response table top exercises
Incident response table top exercises
 
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware ProblemThe Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
 
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance ChallengesCloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
 
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and ThreatsHacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
 
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric VanderburgCorrect the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
 
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric VanderburgDeconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
 
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric VanderburgCountering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
 

Kürzlich hochgeladen

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Kürzlich hochgeladen (20)

AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 

Data Breach Lessons from 2013 - Eric Vanderburg - CodeMash 2014

  • 1. Data Breach Lessons from 2013 CodeMash 2014 January 9, 2014 Eric A. Vanderburg, MBA, CISSP Director, Information Systems and Security Computer Forensic and Investigation Services © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 2. Facts and Figures  Average breach costs $194 per record -Ponemon Institute  Financial impact of cybercrime expected to grow 10% per year through 2016 -Gartner  10% of companies experienced a data breach Hiscox small business research © 2014 Property of JurInnov Ltd. All Rights Reserved -
  • 3. Types of breaches • Insider – Accidental – Intentional • Social Engineering • Malware • Hacking © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 4. 2013 Breaches • Living Social – Breach overview – Impact – Lessons learned • Virginia Polytechnic Institute and State University – Breach overview – Impact – Lessons learned © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 5. 2013 Breaches • University of Delaware – Breach overview – Impact – Lessons learned • Northrop Grumman – Breach overview – Impact – Lessons learned © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 6. 2013 Breaches • Internal Revenue Service – Breach overview – Impact – Lessons learned • St. Mary’s Bank – Breach overview – Impact – Lessons learned © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 7. 2013 Breaches • U.S. Department of Energy – Breach overview – Impact – Lessons learned • Michigan Department of Community Health – Breach overview – Impact – Lessons learned © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 8. 2013 Breaches • Evernote – Breach overview – Impact – Lessons learned • Drupal – Breach overview – Impact – Lessons learned © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 9. 2013 Breaches • Cogent Healthcare – Breach overview – Impact – Lessons learned • New York Office of the Medicaid Inspector General – Breach overview – Impact – Lessons learned © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 10. 2013 Breaches • Republic Services – Breach overview – Impact – Lessons learned • Federal Reserve – Breach overview – Impact – Lessons learned © 2014 Property of JurInnov Ltd. All Rights Reserved
  • 11. For assistance or additional information Enjoy CodeMash! • • • • • • • Phone: Web: Email: Twitter: Facebook: Linkedin: Youtube: 216-664-1100 www.jurinnov.com eric.vanderburg@jurinnov.com @evanderburg www.facebook.com/VanderburgE www.linkedin.com/in/evanderburg www.youtube.com/user/evanderburg JurInnov Ltd. The Idea Center 1375 Euclid Avenue, Suite 400 Cleveland, Ohio 44115 © 2014 Property of JurInnov Ltd. All Rights Reserved

Hinweis der Redaktion

  1. Risk and compliance budget: 2011 Risk and Compliance Outlook report from McAfee 65% stat from Fierce CIO. http://www.fiercecio.com/story/security-business-decision/2008-01-24Government cyber security budget: http://www.computerworld.com/s/article/9209461/Obama_seeks_big_boost_in_cybersecurity_spending?taxonomyId=82