SlideShare ist ein Scribd-Unternehmen logo
1 von 34
Downloaden Sie, um offline zu lesen
David Roath / Partner
New York, NY
203.707.9788
droath@citrincooperman.com
Kevin Ricci / Principal
Providence, RI
401.421.4800
kricci@citrincooperman.com
CITRIN COOPERMAN’S TRAC PRACTICE
OCTOBER 14, 2020
A HACKER’S PLAYGROUND
CYBER RISKS DURING COVID-19
UNDERSTANDING YOUR RISKS DURING
UNCERTAIN TIMES
citrincooperman.com2
MEETING OBJECTIVE / AGENDA
SECTION 1
SECTION 2
SECTION 3
A LOOK AT THE FACTS
HACKING DEMOS
WHERE DO WE GO FROM
HERE?
INTRO AGENDA / ABOUT US
Q&A QUESTIONS FROM THE
AUDIENCE
citrincooperman.com3
PRESENTERS
Michael Camacho, CPA, CIA
Partner, Citrin Cooperman
TRAC Practice
mcamacho@Citrincooperman.com
401.567.2126
Matt Wagenknecht, CISSP, CEH, CREA
Director, Citrin Cooperman
TRAC Practice
mattw@Citrincooperman.com
401.421.4800
citrincooperman.com4
ABOUT CITRIN COOPERMAN
We are a top-25 nationally
recognized full-service assurance,
tax, and advisory firm with offices
conveniently located throughout the
United States, in addition to
locations in the United Kingdom,
India, and the Cayman Islands. Since
1979, we have steadily built our
business by helping companies and
high net worth individuals find smart
solutions. Whether your operations
and assets are located around the
corner or across the globe, we can
provide new perspectives on
strategies that will help you achieve
your short- and long-term goals.
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
citrincooperman.com5
ABOUT OUR TRAC PRACTICE
TRAC Overview
In today’s environment, companies are exposed to mounting
risks associated with increased business complexity, technology
challenges, the growing regulatory environment, and
cybersecurity threats and breaches.
Business walks a fine line between risk and reward. Citrin
Cooperman’s Technology, Risk Advisory, and Cybersecurity
Practice (TRAC) offers integrated services in the areas of:
• IT Risk
• Risk Advisory including internal audits, SOX, and compliance
• Cybersecurity and privacy
We help focus on risk, so you can focus on what counts – your
business. Let us help you stay OnTRAC!
TECHNOLOGY, RISK ADVISORY, AND CYBERSECURITY (TRAC)
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
TRACOn Business walks a fine line between risk and reward
Let us help you stay OnTRAC
OnTRACBusiness walks a fine line between risk and reward
Let us help you stay OnTRAC
A LOOK AT THE FACTS
UNDERSTANDING
THE CYBERSECURITY
AND PRIVACY
LANDSCAPE
citrincooperman.com7
2020 – A Hacker’s Playground
The First Three Months of 2020
➢ Disruption, innovation, and change were common cybersecurity and privacy themes
➢ Cyber risk awareness was on the rise
Enter COVID-19
➢ Focus switched to remote workforce and ensuring connectivity and sustained operations
• VPN networks set-up recently “in a rush” to allow employees to work from home
• Vulnerabilities from the usage of unsecured personal computers and home networks
• A remote workforce can make it more difficult for IT staff to monitor and contain threats
➢ Social Engineering on the rise
• Attacks are up over 600% since February 2020
• Potential distractions increase likelihood of successful spear-phishing and malware attacks
➢ Other Risks
• Workforce reductions could lead to disgruntled employees
• Privacy concerns (e.g., Family, Amazon Echo, Unsecured video conferencing, Ad hoc remote access)
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
citrincooperman.com8
THE STATISTICS - CYBER THREAT LANDSCAPE
Global Average Cost per Breach:
$3.86M
Average Cost per Record
Compromised: $146
• Detection & Escalation: 28.8%
• Notification: 6.2%
• Ex-post Response: 25.6%
• Lost business cost: 39.4%
15.1 Billion Records Were Lost,
Stolen, or Exposed In 2019
Increase In the Number of Breaches
in 2019 vs 2018: 284%
Average Cost of a Breach Is 39.5%
Higher When Unprepared
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
Sources: Ponemon Institute/IBM Cost of a Data Breach Report -2020 & Verizon2020 Data Breach InvestigationReport
citrincooperman.com9
THE STATISTICS - CYBER THREAT LANDSCAPE (continued)
There Is a Cyber Attack Every 39
Seconds
43% of Cyber Attacks Target Small
Businesses
91% of Breaches Are the Result of
Phishing Attacks
Average Days to Detect a Breach:
207
Average Days to Contain a Breach:
73
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
Sources: Ponemon institute/IBM Cost of a Data Breach Report -2020 & Verizon2020 Data Breach Investigation Report
citrincooperman.com10
2019
THE FACTS - CYBER THREAT LANDSCAPE
➢ Hackers are industry agnostic
➢ COVID increases the likelihood of a data
breach at a time when companies are ill-
equipped to deal with the repercussions
➢ WFH distractions combined with
18,000,000 spear-phishing emails per day
is creating a perfect storm
➢ The recession created by COVID makes it
more difficult for companies to recover
from an attack
2016
2017
2008
2009
2010
2011
2012
2013
2014
2007
2015
HackingTeam
2018
2020
citrincooperman.com11
TRAC EXPERIENCE- CYBER THREAT LANDSCAPE
Incidents/Breaches TRAC has been involved with by year:
➢ Compared to 3 in 2017 and 2018 combined
➢ 17 in 2019
➢ 15 in 2020 (through October 10th)
Breaches are more sophisticated, on a large scale, and have greater impact
Average business downtime during a breach:
➢ One to two weeks (longest just over a month)
Average cost of breach response:
➢ Incident/breach response for small business range from $10,000 - $100,000+
➢ Exponentially higher for downtime, legal fees, tech expenditures, etc.
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
citrincooperman.com12
WHO ARE THE PLAYERS
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
citrincooperman.com13
WHAT DO THEY WANT
Defense, National
Security, Critical
Infrastructure
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
citrincooperman.com14
2020 – A Hacker’s Playground
The Path Forward
➢ Preparation, planning, and strong leadership is crucial to address the new cybersecurity and privacy
landscape
➢ Developing a comprehensive playbook to navigate change will be necessary
It all starts with understanding your risk!
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
TRACOn Business walks a fine line between risk and reward
Let us help you stay OnTRAC
TRACOn Business walks a fine line between risk and reward
Let us help you stay OnTRAC
A HACKER’S PLAYGROUND
HACKING DEMOS
citrincooperman.com16
HACKING IN THE COVID ERA
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
citrincooperman.com17
PHISHING IN THE COVID ERA
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
citrincooperman.com18
PHISHING IN THE COVID ERA
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
citrincooperman.com19
PHISHING IN THE COVID ERA
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
DEMO #1
PASSWORD HACKING DEMO
citrincooperman.com20
How password hashing works
Business walks a fine line between riskand reward. This set of services helps you manage uncertainty around IT Risk, Cybersecurity & Privacy,so you can focus on what
counts – your business. Let us help you stay OnTRAC!
Shared drive
Ub3rc00lPa$svvord1
186bf85b2b979e777628edabb5869929
Employee using a
shared drive
Hash algorithm
Can I have
access?
Yes!
citrincooperman.com21
How password stealing works
Business walks a fine line between riskand reward. This set of services helps you manage uncertainty around IT Risk, Cybersecurity & Privacy,so you can focus on what
counts – your business. Let us help you stay OnTRAC!
Shared drive
Ub3rc00lPa$svvord1
186bf85b2b979e777628edabb5869929
Employee using a
shared drive
Hash algorithm
Can I have
access?
Yes!
186bf85b2b979e777628edabb5869929
Yes, also!
citrincooperman.com22
PHISHING IN THE COVID ERA
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
DEMO #2
RANSOMWARE DEMO
citrincooperman.com23
PARTING TIPS FROM THE HACKER
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
➢ Rapidly deployed solutions are rarely secure solutions
➢ Solutions that were good a year ago may no longer viable
➢ Daily monitoring of activity logs is required to detect initial malicious activity
➢ Your security is only as strong as your third-party service providers security
TRACOn Business walks a fine line between risk and reward
Let us help you stay OnTRAC
TRACOn Business walks a fine line between risk and reward
Let us help you stay OnTRAC
CLOSING REMARKS
WHERE DO WE GO
FROM HERE?
citrincooperman.com25
WHERE DO I START?
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
➢ UNDERSTAND your cyber-risk profile
citrincooperman.com29
WHERE DO I START?
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
➢ UNDERSTAND your cyber-risk profile
➢ Be PROACTIVE in your approach to data security
6
Vulnerability Management Services
• Simulated “Bad-guy”
• Test your network and system controls before the
Hackers do
• Search for vulnerabilities which can allow for
potential attack vectors (penetration testing and
vulnerability assessments)
• Average rate per hour: $150 - $300
• Incident or breach response:
▪ Detection, forensics and analysis
▪ Containment, eradication and recovery
▪ Post incident remediation
▪ Average rate per hour: $350 - $500+
citrincooperman.com31
WHERE DO I START?
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
➢ UNDERSTAND your cyber-risk profile
➢ Be PROACTIVE in your approach to data security
➢ Trust, but VERIFY
➢ Don’t forget COMPLIANCE
➢ EDUCATE your employees and clients
citrincooperman.com32
Q&A
QUESTIONS?
Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
citrincooperman.com33
IT RISK, CYBERSECURITY & PRIVACY SERVICES
IT Risk and Cybersecurity Programs
• Virtual Chief Information Security Officer
(vCISO)
• IT Policy and Procedure Development
• Third-Party Risk Management
• Disaster Recovery / BCP
• IT / Cybersecurity Due Diligence
Cybersecurity & Privacy Business Risk and
Maturity Assessment
• SCORE Report
• Cybersecurity & Privacy Business Risk and
Maturity Assessment
• IT Risk Assessment
Threat and Vulnerability Management
• External and InternalNetwork Attack and
PenetrationTesting
• Spear-Phishing Campaign
• PhysicalSecurity Assessment
• Wireless Network Security Assessment
• Server Security Assessment
• Web ApplicationSecurity Assessment
• Network Device ConfigurationReviews
Incident Breach Preparedness and Response
• Incident Response Preparedness
• CyberSecure Incident Response and Forensics
Business walks a fine line between riskand reward. This set of services helps you manage uncertainty around IT risk, cybersecurity,and privacy, so you can focus on what
counts – your business. Let us help you stay OnTRAC!
Compliance and Frameworks
• Cyber ComplianceServices
▪ PCI, HIPAA, GDPR, NIST, GLBA, CMMC
• Third-Party Assurance
▪ SSAE18 (SOC 1, 2, 3, Cybersecurity)
Data Mapping and Other Data Services
• Data Mapping
• DatabaseCreation and Other Data Services
• Data Analytics
citrincooperman.com34
CONTACT US
Michael Camacho, CPA, CIA
Partner, Citrin Cooperman
TRAC Practice
mcamacho@Citrincooperman.com
401.567.2126
Matt Wagenknecht, CISSP, CEH, CREA
Director, Citrin Cooperman
TRAC Practice
mattw@Citrincooperman.com
401.421.4800
WOULD YOU LIKE ADDITIONAL INFORMATION ON HOW CITRIN
COOPERMAN CAN HELP PROTECT THE PEOPLE, DATA, AND TECHNOLOGY
AT YOUR COMPANY?

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
Nathan Desfontaines
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
Paul Ferrillo
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
IBM Security
 

Was ist angesagt? (20)

MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
MasterSnacks: Cybersecurity - Third-Party Crashers: Avoiding Service Provider...
 
Cyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate BoardsCyber-risk Oversight Handbook for Corporate Boards
Cyber-risk Oversight Handbook for Corporate Boards
 
CRI Cyber Board Briefing
CRI Cyber Board Briefing CRI Cyber Board Briefing
CRI Cyber Board Briefing
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
Think You’re Covered? Think Again. Cybersecurity, Data Privacy, Payments Frau...
 
The Board and Cyber Security
The Board and Cyber SecurityThe Board and Cyber Security
The Board and Cyber Security
 
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The BreachFireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
FireEye Cyber Defense Summit 2016 Now What - Before & After The Breach
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
Cyber Security - Things you need to know
Cyber Security - Things you need to knowCyber Security - Things you need to know
Cyber Security - Things you need to know
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
 
The Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber SecurityThe Security Director's Practical Guide to Cyber Security
The Security Director's Practical Guide to Cyber Security
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
Cybersecurity in the Boardroom
Cybersecurity in the BoardroomCybersecurity in the Boardroom
Cybersecurity in the Boardroom
 
Cyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teamsCyber risk tips for boards and executive teams
Cyber risk tips for boards and executive teams
 
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the BoardroomSecuring the C-Suite: Cybersecurity Perspectives from the Boardroom
Securing the C-Suite: Cybersecurity Perspectives from the Boardroom
 
When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?When a Data Breach Happens, What's Your Plan?
When a Data Breach Happens, What's Your Plan?
 
A Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 PredictionsA Breach Carol: 2013 Review, 2014 Predictions
A Breach Carol: 2013 Review, 2014 Predictions
 
PA SB DC Cyber Brief
PA SB DC Cyber Brief PA SB DC Cyber Brief
PA SB DC Cyber Brief
 
2019 10-22 axio - taking control of cyber risk - grid-seccon
2019 10-22 axio - taking control of cyber risk - grid-seccon2019 10-22 axio - taking control of cyber risk - grid-seccon
2019 10-22 axio - taking control of cyber risk - grid-seccon
 

Ähnlich wie A Hacker's Playground - Cyber Risks During COVID-19

CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
Krishna N
 

Ähnlich wie A Hacker's Playground - Cyber Risks During COVID-19 (20)

Cybersecurity During the COVID Era
Cybersecurity During the COVID EraCybersecurity During the COVID Era
Cybersecurity During the COVID Era
 
Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016Must Know Cyber Security Stats of 2016
Must Know Cyber Security Stats of 2016
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf2020-trustwave-global-security-report.pdf
2020-trustwave-global-security-report.pdf
 
b-ciodigest_apr13.en-us
b-ciodigest_apr13.en-usb-ciodigest_apr13.en-us
b-ciodigest_apr13.en-us
 
Trend Micro Solutions Overview
Trend Micro Solutions OverviewTrend Micro Solutions Overview
Trend Micro Solutions Overview
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017The 10 Fastest Growing Cyber Security Companies of 2017
The 10 Fastest Growing Cyber Security Companies of 2017
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
Cyber Risk for Construction Industry
Cyber Risk for Construction Industry Cyber Risk for Construction Industry
Cyber Risk for Construction Industry
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
On the Bleeding Edge: 8 Predictions for the Internet in 2018
On the Bleeding Edge: 8 Predictions for the Internet in 2018On the Bleeding Edge: 8 Predictions for the Internet in 2018
On the Bleeding Edge: 8 Predictions for the Internet in 2018
 
Achieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awarenessAchieving 360° view of security for complete situational awareness
Achieving 360° view of security for complete situational awareness
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Cybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industryCybercrime: A threat to Financial industry
Cybercrime: A threat to Financial industry
 
Ransomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and MitigationRansomware: Attack, Human Impact and Mitigation
Ransomware: Attack, Human Impact and Mitigation
 
CYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdfCYBER-THREAT-LANDSCAPE-2021.pdf
CYBER-THREAT-LANDSCAPE-2021.pdf
 
Cyber security master class 2018
Cyber security master class 2018Cyber security master class 2018
Cyber security master class 2018
 
Cyber threat forecast 2018..
Cyber threat forecast 2018..Cyber threat forecast 2018..
Cyber threat forecast 2018..
 

Mehr von Citrin Cooperman

Mehr von Citrin Cooperman (20)

How About Provider Relief Funds: Deadlines, Reporting, and Auditing Nuances
How About Provider Relief Funds: Deadlines, Reporting, and Auditing NuancesHow About Provider Relief Funds: Deadlines, Reporting, and Auditing Nuances
How About Provider Relief Funds: Deadlines, Reporting, and Auditing Nuances
 
C-Suite Snacks Webinar Series: Modern Decision Support
C-Suite Snacks Webinar Series: Modern Decision SupportC-Suite Snacks Webinar Series: Modern Decision Support
C-Suite Snacks Webinar Series: Modern Decision Support
 
C-Suite Snacks Webinar Series: Building an Advisory Board
C-Suite Snacks Webinar Series: Building an Advisory BoardC-Suite Snacks Webinar Series: Building an Advisory Board
C-Suite Snacks Webinar Series: Building an Advisory Board
 
C-Suite Snacks Webinar Series: Prepping Your Company's Financials for Sale
C-Suite Snacks Webinar Series: Prepping Your Company's Financials for SaleC-Suite Snacks Webinar Series: Prepping Your Company's Financials for Sale
C-Suite Snacks Webinar Series: Prepping Your Company's Financials for Sale
 
Preparing for the New Lease Accounting Standard
Preparing for the New Lease Accounting StandardPreparing for the New Lease Accounting Standard
Preparing for the New Lease Accounting Standard
 
Lease Accounting: Preparing Your Business for 2022
Lease Accounting: Preparing Your Business for 2022Lease Accounting: Preparing Your Business for 2022
Lease Accounting: Preparing Your Business for 2022
 
High Net Worth Webinar Series - Tax Planning and Update for 2022
High Net Worth Webinar Series - Tax Planning and Update for 2022High Net Worth Webinar Series - Tax Planning and Update for 2022
High Net Worth Webinar Series - Tax Planning and Update for 2022
 
C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...
C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...
C-Suite Snacks Webinar Series: The Talent Wars - Can Benefits Be Your Secret ...
 
High Net Worth Webinar Series - The Business of Digital Assets​ & Blockchain
High Net Worth Webinar Series - The Business of Digital Assets​ & BlockchainHigh Net Worth Webinar Series - The Business of Digital Assets​ & Blockchain
High Net Worth Webinar Series - The Business of Digital Assets​ & Blockchain
 
High Net Worth Webinar Series - Estate Planning Strategies and Updates
High Net Worth Webinar Series - Estate Planning Strategies and UpdatesHigh Net Worth Webinar Series - Estate Planning Strategies and Updates
High Net Worth Webinar Series - Estate Planning Strategies and Updates
 
Showtime for Shuttered Venue Operators Grant (SVOG) Recipients
Showtime for Shuttered Venue Operators Grant (SVOG) RecipientsShowtime for Shuttered Venue Operators Grant (SVOG) Recipients
Showtime for Shuttered Venue Operators Grant (SVOG) Recipients
 
C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...
C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...
C-Suite Snacks Webinar Series: A Year Like No Other - Manufacturing and Distr...
 
Manufacturing & Distribution Update: The Economic Impact on the Industry
Manufacturing & Distribution Update: The Economic Impact on the IndustryManufacturing & Distribution Update: The Economic Impact on the Industry
Manufacturing & Distribution Update: The Economic Impact on the Industry
 
High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...
High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...
High Net Worth Webinar Series: SALT Thoughts - Pass-Through Entity Taxes & Re...
 
The New Rage in SALT: State Pass-Through Entity Tax
The New Rage in SALT: State Pass-Through Entity TaxThe New Rage in SALT: State Pass-Through Entity Tax
The New Rage in SALT: State Pass-Through Entity Tax
 
C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...
C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...
C-Suite Snacks Webinar Series: What's Your IP Worth? Discovering the Value of...
 
C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...
C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...
C-Suite Snacks Webinar Series: Best-In-Class Finance and Accounting: Should Y...
 
C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...
C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...
C-Suite Snacks Webinar Series: Not Sold on Selling Your Business? Why Now is ...
 
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
MasterSnacks: Cybersecurity - Playing Offense: A Proactive Approach to Cybers...
 
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
MasterSnacks: Cybersecurity - Disaster Recovery: Hoping for the Best but Plan...
 

Kürzlich hochgeladen

Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
amitlee9823
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
lizamodels9
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
Abortion pills in Kuwait Cytotec pills in Kuwait
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Abortion pills in Kuwait Cytotec pills in Kuwait
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
dollysharma2066
 

Kürzlich hochgeladen (20)

B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
HONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael HawkinsHONOR Veterans Event Keynote by Michael Hawkins
HONOR Veterans Event Keynote by Michael Hawkins
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdfDr. Admir Softic_ presentation_Green Club_ENG.pdf
Dr. Admir Softic_ presentation_Green Club_ENG.pdf
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
Russian Call Girls In Gurgaon ❤️8448577510 ⊹Best Escorts Service In 24/7 Delh...
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pillsMifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
Mifty kit IN Salmiya (+918133066128) Abortion pills IN Salmiyah Cytotec pills
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 

A Hacker's Playground - Cyber Risks During COVID-19

  • 1. David Roath / Partner New York, NY 203.707.9788 droath@citrincooperman.com Kevin Ricci / Principal Providence, RI 401.421.4800 kricci@citrincooperman.com CITRIN COOPERMAN’S TRAC PRACTICE OCTOBER 14, 2020 A HACKER’S PLAYGROUND CYBER RISKS DURING COVID-19 UNDERSTANDING YOUR RISKS DURING UNCERTAIN TIMES
  • 2. citrincooperman.com2 MEETING OBJECTIVE / AGENDA SECTION 1 SECTION 2 SECTION 3 A LOOK AT THE FACTS HACKING DEMOS WHERE DO WE GO FROM HERE? INTRO AGENDA / ABOUT US Q&A QUESTIONS FROM THE AUDIENCE
  • 3. citrincooperman.com3 PRESENTERS Michael Camacho, CPA, CIA Partner, Citrin Cooperman TRAC Practice mcamacho@Citrincooperman.com 401.567.2126 Matt Wagenknecht, CISSP, CEH, CREA Director, Citrin Cooperman TRAC Practice mattw@Citrincooperman.com 401.421.4800
  • 4. citrincooperman.com4 ABOUT CITRIN COOPERMAN We are a top-25 nationally recognized full-service assurance, tax, and advisory firm with offices conveniently located throughout the United States, in addition to locations in the United Kingdom, India, and the Cayman Islands. Since 1979, we have steadily built our business by helping companies and high net worth individuals find smart solutions. Whether your operations and assets are located around the corner or across the globe, we can provide new perspectives on strategies that will help you achieve your short- and long-term goals. Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
  • 5. citrincooperman.com5 ABOUT OUR TRAC PRACTICE TRAC Overview In today’s environment, companies are exposed to mounting risks associated with increased business complexity, technology challenges, the growing regulatory environment, and cybersecurity threats and breaches. Business walks a fine line between risk and reward. Citrin Cooperman’s Technology, Risk Advisory, and Cybersecurity Practice (TRAC) offers integrated services in the areas of: • IT Risk • Risk Advisory including internal audits, SOX, and compliance • Cybersecurity and privacy We help focus on risk, so you can focus on what counts – your business. Let us help you stay OnTRAC! TECHNOLOGY, RISK ADVISORY, AND CYBERSECURITY (TRAC) Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
  • 6. TRACOn Business walks a fine line between risk and reward Let us help you stay OnTRAC OnTRACBusiness walks a fine line between risk and reward Let us help you stay OnTRAC A LOOK AT THE FACTS UNDERSTANDING THE CYBERSECURITY AND PRIVACY LANDSCAPE
  • 7. citrincooperman.com7 2020 – A Hacker’s Playground The First Three Months of 2020 ➢ Disruption, innovation, and change were common cybersecurity and privacy themes ➢ Cyber risk awareness was on the rise Enter COVID-19 ➢ Focus switched to remote workforce and ensuring connectivity and sustained operations • VPN networks set-up recently “in a rush” to allow employees to work from home • Vulnerabilities from the usage of unsecured personal computers and home networks • A remote workforce can make it more difficult for IT staff to monitor and contain threats ➢ Social Engineering on the rise • Attacks are up over 600% since February 2020 • Potential distractions increase likelihood of successful spear-phishing and malware attacks ➢ Other Risks • Workforce reductions could lead to disgruntled employees • Privacy concerns (e.g., Family, Amazon Echo, Unsecured video conferencing, Ad hoc remote access) Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
  • 8. citrincooperman.com8 THE STATISTICS - CYBER THREAT LANDSCAPE Global Average Cost per Breach: $3.86M Average Cost per Record Compromised: $146 • Detection & Escalation: 28.8% • Notification: 6.2% • Ex-post Response: 25.6% • Lost business cost: 39.4% 15.1 Billion Records Were Lost, Stolen, or Exposed In 2019 Increase In the Number of Breaches in 2019 vs 2018: 284% Average Cost of a Breach Is 39.5% Higher When Unprepared Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com) Sources: Ponemon Institute/IBM Cost of a Data Breach Report -2020 & Verizon2020 Data Breach InvestigationReport
  • 9. citrincooperman.com9 THE STATISTICS - CYBER THREAT LANDSCAPE (continued) There Is a Cyber Attack Every 39 Seconds 43% of Cyber Attacks Target Small Businesses 91% of Breaches Are the Result of Phishing Attacks Average Days to Detect a Breach: 207 Average Days to Contain a Breach: 73 Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com) Sources: Ponemon institute/IBM Cost of a Data Breach Report -2020 & Verizon2020 Data Breach Investigation Report
  • 10. citrincooperman.com10 2019 THE FACTS - CYBER THREAT LANDSCAPE ➢ Hackers are industry agnostic ➢ COVID increases the likelihood of a data breach at a time when companies are ill- equipped to deal with the repercussions ➢ WFH distractions combined with 18,000,000 spear-phishing emails per day is creating a perfect storm ➢ The recession created by COVID makes it more difficult for companies to recover from an attack 2016 2017 2008 2009 2010 2011 2012 2013 2014 2007 2015 HackingTeam 2018 2020
  • 11. citrincooperman.com11 TRAC EXPERIENCE- CYBER THREAT LANDSCAPE Incidents/Breaches TRAC has been involved with by year: ➢ Compared to 3 in 2017 and 2018 combined ➢ 17 in 2019 ➢ 15 in 2020 (through October 10th) Breaches are more sophisticated, on a large scale, and have greater impact Average business downtime during a breach: ➢ One to two weeks (longest just over a month) Average cost of breach response: ➢ Incident/breach response for small business range from $10,000 - $100,000+ ➢ Exponentially higher for downtime, legal fees, tech expenditures, etc. Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
  • 12. citrincooperman.com12 WHO ARE THE PLAYERS Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
  • 13. citrincooperman.com13 WHAT DO THEY WANT Defense, National Security, Critical Infrastructure Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
  • 14. citrincooperman.com14 2020 – A Hacker’s Playground The Path Forward ➢ Preparation, planning, and strong leadership is crucial to address the new cybersecurity and privacy landscape ➢ Developing a comprehensive playbook to navigate change will be necessary It all starts with understanding your risk! Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
  • 15. TRACOn Business walks a fine line between risk and reward Let us help you stay OnTRAC TRACOn Business walks a fine line between risk and reward Let us help you stay OnTRAC A HACKER’S PLAYGROUND HACKING DEMOS
  • 16. citrincooperman.com16 HACKING IN THE COVID ERA Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
  • 17. citrincooperman.com17 PHISHING IN THE COVID ERA Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
  • 18. citrincooperman.com18 PHISHING IN THE COVID ERA Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com)
  • 19. citrincooperman.com19 PHISHING IN THE COVID ERA Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com) DEMO #1 PASSWORD HACKING DEMO
  • 20. citrincooperman.com20 How password hashing works Business walks a fine line between riskand reward. This set of services helps you manage uncertainty around IT Risk, Cybersecurity & Privacy,so you can focus on what counts – your business. Let us help you stay OnTRAC! Shared drive Ub3rc00lPa$svvord1 186bf85b2b979e777628edabb5869929 Employee using a shared drive Hash algorithm Can I have access? Yes!
  • 21. citrincooperman.com21 How password stealing works Business walks a fine line between riskand reward. This set of services helps you manage uncertainty around IT Risk, Cybersecurity & Privacy,so you can focus on what counts – your business. Let us help you stay OnTRAC! Shared drive Ub3rc00lPa$svvord1 186bf85b2b979e777628edabb5869929 Employee using a shared drive Hash algorithm Can I have access? Yes! 186bf85b2b979e777628edabb5869929 Yes, also!
  • 22. citrincooperman.com22 PHISHING IN THE COVID ERA Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com) DEMO #2 RANSOMWARE DEMO
  • 23. citrincooperman.com23 PARTING TIPS FROM THE HACKER Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com) ➢ Rapidly deployed solutions are rarely secure solutions ➢ Solutions that were good a year ago may no longer viable ➢ Daily monitoring of activity logs is required to detect initial malicious activity ➢ Your security is only as strong as your third-party service providers security
  • 24. TRACOn Business walks a fine line between risk and reward Let us help you stay OnTRAC TRACOn Business walks a fine line between risk and reward Let us help you stay OnTRAC CLOSING REMARKS WHERE DO WE GO FROM HERE?
  • 25. citrincooperman.com25 WHERE DO I START? Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com) ➢ UNDERSTAND your cyber-risk profile
  • 26.
  • 27.
  • 28.
  • 29. citrincooperman.com29 WHERE DO I START? Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com) ➢ UNDERSTAND your cyber-risk profile ➢ Be PROACTIVE in your approach to data security
  • 30. 6 Vulnerability Management Services • Simulated “Bad-guy” • Test your network and system controls before the Hackers do • Search for vulnerabilities which can allow for potential attack vectors (penetration testing and vulnerability assessments) • Average rate per hour: $150 - $300 • Incident or breach response: ▪ Detection, forensics and analysis ▪ Containment, eradication and recovery ▪ Post incident remediation ▪ Average rate per hour: $350 - $500+
  • 31. citrincooperman.com31 WHERE DO I START? Michael Camacho (mcamacho@citrincooperman.com)● Matt Wagenknecht (mattw@citrincooperman.com) ➢ UNDERSTAND your cyber-risk profile ➢ Be PROACTIVE in your approach to data security ➢ Trust, but VERIFY ➢ Don’t forget COMPLIANCE ➢ EDUCATE your employees and clients
  • 33. citrincooperman.com33 IT RISK, CYBERSECURITY & PRIVACY SERVICES IT Risk and Cybersecurity Programs • Virtual Chief Information Security Officer (vCISO) • IT Policy and Procedure Development • Third-Party Risk Management • Disaster Recovery / BCP • IT / Cybersecurity Due Diligence Cybersecurity & Privacy Business Risk and Maturity Assessment • SCORE Report • Cybersecurity & Privacy Business Risk and Maturity Assessment • IT Risk Assessment Threat and Vulnerability Management • External and InternalNetwork Attack and PenetrationTesting • Spear-Phishing Campaign • PhysicalSecurity Assessment • Wireless Network Security Assessment • Server Security Assessment • Web ApplicationSecurity Assessment • Network Device ConfigurationReviews Incident Breach Preparedness and Response • Incident Response Preparedness • CyberSecure Incident Response and Forensics Business walks a fine line between riskand reward. This set of services helps you manage uncertainty around IT risk, cybersecurity,and privacy, so you can focus on what counts – your business. Let us help you stay OnTRAC! Compliance and Frameworks • Cyber ComplianceServices ▪ PCI, HIPAA, GDPR, NIST, GLBA, CMMC • Third-Party Assurance ▪ SSAE18 (SOC 1, 2, 3, Cybersecurity) Data Mapping and Other Data Services • Data Mapping • DatabaseCreation and Other Data Services • Data Analytics
  • 34. citrincooperman.com34 CONTACT US Michael Camacho, CPA, CIA Partner, Citrin Cooperman TRAC Practice mcamacho@Citrincooperman.com 401.567.2126 Matt Wagenknecht, CISSP, CEH, CREA Director, Citrin Cooperman TRAC Practice mattw@Citrincooperman.com 401.421.4800 WOULD YOU LIKE ADDITIONAL INFORMATION ON HOW CITRIN COOPERMAN CAN HELP PROTECT THE PEOPLE, DATA, AND TECHNOLOGY AT YOUR COMPANY?