3. • Technology Trends
• Still Talking about Social Media…………. Why?
• Risk & Awareness
• Security Services – 5 steps to Reduce Risk
TOPICS
Intro - Topics
4. WHERE ARE WE HEADED
• It is estimated that 90 % of the worlds data has been created in the last two
years (starting point January 2013)
• IOT (Internet of Things) – (Medical / Lab Refrigerator) new end point to
protect
• Big Data – Predictive Analysis – mining data based on key algorithm factors
(step a + step b + step c = potential customer)
• Scalable predictive computing – from 7:42AM till 6:03PM spin up x amount of
servers
Source: http://e27.co/worlds-data-volume-to-grow-40-per-year-50-times-by-2020-aureus-20150115-2/
Technology Trends
5. SO WHAT?!?!
• Snapshot for Driving??
• Snapshot for Healthcare Insurance? IOT –
wearables- habits – Dr. can check your progress
By 2017, more than 20% of customer-facing analytic deployments will provide
product tracking information leveraging the IoT.
Fueled by the Nexus of Forces (mobile, social, cloud and information), customers
now demand a lot more information from their vendors. The rapid dissemination of
the IoT will create a new style of customer-facing analytics — product tracking —
where increasingly less expensive sensors will be embedded into all types of
products.
These sensors not only provide geospatial information (where the product is right
now) but also performance information (how well the product is functioning). My
new SUV is en route and currently in Arizona, or my new SUV is ready for its first oil
change. This creates an opportunity to improve transparency and strengthen
customer and partner relationships. It can become a key differentiator and a key
part of your business model.
Access the Global Pool of Information
The ability to transform the business to compete in an emerging digital economy
will be contingent on the organization’s ability to curate, manage and leverage
big data, IoT content, social media, local and federal government data, data
from partners, suppliers and customers, and other exogenous data sources that
are materializing.Source: http://www.forbes.com/sites/gartnergroup/2015/02/12/gartner-predicts-three-big-data-trends-for-business-
intelligence/2/
Technology Trends
7. IOT REAL WORLD
EXAMPLE
• Used 0 Day Threat to exploit Car
Software
• Cut engine power using diagnostic
software
• View current GPS Data as well as
old Data Points
• Smart Home Take Over – new opportunity
• Smart Insulin Pumps / Pacemakers –
new opportunity
• Source: http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
• Source: http://www.wired.com/2015/11/medical-devices-that-are-vulnerable-
to-life-threatening-hacks/#slide-1
I WAS DRIVING 70 mph on the edge of downtown St. Louis when the exploit began to
take hold.
Though I hadn’t touched the dashboard, the vents in the Jeep Cherokee started
blasting cold air at the maximum setting, chilling the sweat on my back through the in-
seat climate control system. Next the radio switched to the local hip hop station and
began blaring Skee-lo at full volume. I spun the control knob left and hit the power
button, to no avail. Then the windshield wipers turned on, and wiper fluid blurred the
glass.
The result of their work was a hacking technique—what the security industry
calls a zero-day exploit—that can target Jeep Cherokees and give the attacker
wireless control, via the Internet, to any of thousands of vehicles. Their code is an
automaker’s nightmare: software that lets hackers send commands through the Jeep’s
entertainment system to its dashboard functions, steering, brakes, and transmission, all
from a laptop that may be across the country.
To better simulate the experience of driving a vehicle while it’s being hijacked by an
invisible, virtual force, Miller and Valasek refused to tell me ahead of time what kinds of
attacks they planned to launch from Miller’s laptop in his house 10 miles west. Instead,
they merely assured me that they wouldn’t do anything life-threatening. Then they told
me to drive the Jeep onto the highway. “Remember, Andy,” Miller had said through my
iPhone’s speaker just before I pulled onto the Interstate 64 on-ramp, “no matter what
happens, don’t panic.”1
Technology Trends
9. TOP 5 BUSINESS IMPACTS OF
SOCIAL MEDIA
• 1) Reaching Different Generational Demographics Early and Often
• 2) Market and Upsell Services and Products
• 3) Community Outreach and Recognition
• 4)Drive Organic Growth
• 5) Customer Service Outlet and Business Branding Opportunity (pros & cons)
Still…..Talking Social Media
10. STILL TALKING
SECURITY RIGHT?
• Ad Injection Economy
• Securing your Unique Identifiers
• Daisy chaining accounts
• Targeting your Ads – Hackers
• Dual Factor Authentication
Source: https://googleonlinesecurity.blogspot.com/2015/05/new-research-ad-injection-economy.html http://www.wired.com/2012/08/apple-amazon-mat-honan-hacking/
Setup ad to appear when google search =
“virus removal” “anti-virus software” and or “IT
help”
Crypto-Wall
Still…..Talking Social Media
11. REAL WORLD EXAMPLE
• How Apple and Amazon Security Flaws Led
to My Epic Hack
• By Mat Honan – Wired.com
• But what happened to me exposes vital security flaws in several customer
service systems, most notably Apple’s and Amazon’s. Apple tech support gave
the hackers access to my iCloud account. Amazon tech support gave them the
ability to see a piece of information — a partial credit card number — that Apple
used to release information. In short, the very four digits that Amazon considers
unimportant enough to display in the clear on the web are precisely the same
ones that Apple considers secure enough to perform identity verification. The
disconnect exposes flaws in data management policies endemic to the entire
technology industry, and points to a looming nightmare as we enter the era of
cloud computing and connected devices.
• In many ways, this was all my fault. My accounts were daisy-chained
together. Getting into Amazon let my hackers get into my Apple ID
account, which helped them get into Gmail, which gave them access to
Twitter. Had I used two-factor authentication for my Google account, it’s
possible that none of this would have happened, because their ultimate
goal was always to take over my Twitter account and wreak havoc.
Still…..Talking Social Media
12. RISK & AWARENESS
• What is Cybersecurity?
• What are ISAC Groups ? Information Sharing and Analysis Center
• The two targeted industries with the highest risk?
1) ______________ 2)________________
Risk & Awareness – Education & Risk Awareness Resources
13. CYBERSECURITY
• Cybersecurity is the body of technologies, processes and practices
designed to protect networks, computers, programs and data from attack,
damage or unauthorized access. In a computing context, the term security
implies cybersecurity.
• According to a December 2010 analysis of U.S. spending plans, the federal
government has allotted over $13 billion annually to cybersecurity over the
next five years.
Source: http://whatis.techtarget.com/definition/cybersecurity Risk & Awareness – Education & Risk Awareness Resources
14. ISAC GROUPS
Real estate – Higher Education – State Sharing – water – electricity – oil & natural gas –
Retail - more….
Risk & Awareness – Education & Risk Awareness Resources
15. FS-ISAC & FFIEC
• Federal Financial Institutions
Examination Council (FFIEC)
• FFIEC Self assessment tool
released to educate financial
institutions of cybersecurity risks
• Voluntary Mandatory
Cooperation
• Financial Services
Information Sharing and Analysis
Center (FS-ISAC) Awareness
• Information shared based on
critical security threats and
industry best practices
Source: http://www.fsisac.com/about https://www.ffiec.gov/about.htm
Risk
Awareness
Risk & Awareness – Education & Risk Awareness Resources
16. PREPARING TODAY FOR TOMORROWS ATTACK?
• What solutions are there to help mitigate risk?
• How do I know if my organization is prepared?
• Identify – Protect – Detect – Respond – Recover
Security Services – 5 steps to reduce Risk
• Source: Excerpt from CSBS Cyber Security 101 “A resource guide for Bank Executives”
17. 1) IDENTIFY
• Study industry best practices
• Join ISAC Group or related peer sharing group related to cybersecurity
• Someone from inside the organization should fill out assessment tools if available
and reach out to appropriate 3rd party for answers they are unsure of.
• Findings should be shared with IT committee / Board of directors
• Examine what is critical data and where it resides and understand security
around data
• Request vendor packets from all 3rd party vendors hosting or with access to
critical data
• Make sure their security meets or exceeds the standard you are required to
implement
Security Services – 5 steps to reduce Risk
18. • Source: Excerpt from FFIEC Self Assessment Tool
Security Services – 5 steps to reduce Risk
20. 1) I have educated myself and staff to the best of our ability and identified our critical data
and possible threats against it. What’s Next?
Security Services – 5 steps to reduce Risk
21. 2) PROTECT
• Layered Security / Network Hygiene
• Layer 1 – Perimeter Security – Firewall, DLP, IDS/IPS, DMZ, Content Filtering…….
• Layer 2 – End Point Security – Anti-Virus, Patch Management, Log Review Monitoring
• Layer 3 – Policy Security – Permissions, GPO, Vulnerability Assessments,
• Internal understanding of risk / regulations and impact to business and customers
Source: Excerpt from FFIEC Self Assessment Tool
Security Services – 5 steps to reduce Risk
22. WHAT WOULD THAT LOOK LIKE?
Source: http://www.antiexecutable.com.au/LayeredSecurityDiagram.jpg http://www.northropgrumman.com/AboutUs/Contracts/ManagedServices/PublishingImages/Security_Services_lg.jpg
Security Services – 5 steps to reduce Risk
23. 1) I have educated myself and staff to the best of our ability and identified our
critical data and possible threats against it.
2) I have implemented security solutions to protect our organization and we
have a conceptual understanding of how they work. What’s Next?
Security Services – 5 steps to reduce Risk
24. 3) DETECT
• Layered Security / Monitored Solutions
• Review of Security Logs
• 24X7 Firewall Monitoring
• Log retention and reporting
• Anomaly and pattern investigation
• Automatization of reoccurring events
• Real-time updates for security solutions
• Understand 3rd party SLA’s and Response Times
• Manage – Monitor – Maintain
Source: http://ipfrontline.com/2015/09/dhs-st-announces-licensing-of-cyber-security-network-anomaly-detection-technology/
Security Services – 5 steps to reduce Risk
25. 1) I have educated myself and staff to the best of our ability and identified our
critical data and possible threats against it.
2) I have implemented security solutions to protect our organization and we
have a conceptual understanding of how they work.
3) Solutions in place have been configured to detect system intrusions, data
breaches and unauthorized access and notify the appropriate resources.
What's next?
Security Services – 5 steps to reduce Risk
26. 4) RESPOND
• Incident Response Plan
• No two organizations incident response plans
will be the same
• They should have clear steps outlining each step
and who is in charge of each step
• Sample Steps
• Employee Notices Network is slow and notifies IT
Personnel
• IT Personnel
• A) Examines source of issue – Log Review –
Detection – Analysis
• B) Notifies appropriate resource
• C) Involved Parties delegate responsibilities for
containment, eradication, and recovery
• D) Post Incident report with plan to improve
security if possible
Security Services – 5 steps to reduce Risk
27. 1) I have educated myself and staff to the best of our ability and identified our critical data
and possible threats against it.
2) I have implemented security solutions to protect our organization and we have a
conceptual understanding of how they work.
3) Solutions in place have been configured to detect system intrusions, data breaches and
unauthorized access and notify the appropriate resources. What's Next?
4) I have setup a response plan that outlines how we will respond if there is a cybersecurity
incident. Bring it on! What’s next?
Security Services – 5 steps to reduce Risk
28. 5) RECOVER
• Incident Response Plan / Change Controls
• Prepare post-incident response report and activities
• Outline in report how security solutions and or detection process will be
improved
• Improve response plan based upon success and failures of plan
Security Services – 5 steps to reduce Risk
29. 1) I have educated myself and staff to the best of our ability and identified our critical data
and possible threats against it.
2) I have implemented security solutions to protect our organization and we have a
conceptual understanding of how they work.
3) Solutions in place have been configured to detect system intrusions, data breaches and
unauthorized access and notify the appropriate resources. What's Next?
4) I have setup a response plan that outlines how we will respond if there is a cybersecurity
incident. Bring it on!
5) I know how we will recover from an incident and the process involved afterwards
Security Services – 5 steps to reduce Risk
30. IMPROVE / NETWORK HYGIENE
• High risk scenarios are discussed and
even practiced. Steps 1-5 are tested.
• Test breach / spearfish attack / social
engineering attacks / data loss
prevention test
• Simple learning exercise – breach
happened, activate incident response
plan, when we were attacked, how do
we know we were attacked, what data
was targeted, how to stop breach,
what did we learn
• If you fall into the Baseline level try to
make jump to evolving or intermediate
Security Services – 5 steps to reduce Risk