SlideShare a Scribd company logo
1 of 49
1
IT advisory
Cyber Security – Why I Should
(or Shouldn’t) be Worried
Rodney Murray
Douglas Jambor
2
IT advisory
Agenda
 Brief Look at Current Data Breach Trends
 Security Incidents – What are we seeing?
 Common Scenarios
 Benefits of a Security Assessment
3
IT advisory
Firm Overview
4
IT advisory
Data Breach Trends
5
IT advisory
Recent Statistics
728
829
1099
1662
1531
1264
0
200
400
600
800
1000
1200
1400
1600
1800
2009 2010 2011 2012 2013 2014
Source: http://datalossdb.org/statistics
6
IT advisory
Recent Statistics
6%
8%
10%
11%
37%
Financial
Govt. & Public Sector
Education
Retail
Healthcare
Top 5 Sectors Breached by Number of
Incidents
Source: 2015 Symantec Internet Threat Report
7
IT advisory
Recent Statistics
$155
$165
$179
$215
$220
$300
$363
Industrial
Retail
Communications
Financial
Pharmaceuticals
Education
Health
Breach Cost Per Capita 2014
Source: Ponemon Institute 2015 Cost of Data
Breach Study
8
IT advisory
Recent Statistics
Average Time to Identify
a Breach
206 days
Source: 2015 Verizon Data Breach Report
Ransomware
113%
9
IT advisory
Recent Statistics
Breach Root Causes 2015
Malicious or Criminal Attack
System Glitch
Human Error
Source: Ponemon Institute 2015 Cost of Data Breach Study
47%
25%
29%
10
IT advisory
Recent Statistics
Source: Hackmageddon.com
Cyber
Espionage
11%
Hacktivisim
22%
Cyber Crime
67%
11
IT advisory
Recent Statistics
Source: Health and Human Services
Improper Disposal
5%
Hacking/IT
Incident
7%
Loss
14%
Theft
51%
Unknown
3%
Unauthorized
Access
20%
Types of Breaches 500+
12
IT advisory
Recent Statistics
Source: http://datalossdb.org/statistics
13
IT advisory
Recent Statistics
Source: http://datalossdb.org/statistics
14
IT advisory
Recent Statistics
Source: http://datalossdb.org/statistics
15
IT advisory
Recent Known Breaches
Target Michaels
Neiman Marcus AOL
Experian PF Chang’s
Humana – Atlanta JP Morgan Chase
Home Depot Jimmy John’s
Anthem Federal Gov’t
SC Department of Revenue
NC Department of Transportation
16
IT advisory
Additional Breach Examples
www.privacyrights.org
Insurance Vendor inadvertent file access Unknown
Capital Management Undetected hack accessed databases 800
Insurance Forms sent to DOL posted to public site Unknown
Credit Union File published on website 39,000
Investment
Management
COBRA database accessed Unknown
NASDAQ Malware installed between 11/08 &
10/10
Unknown
Bank Malware on employees computer 115,775
Bank Data not redacted for court records 146,000
Bank Backup tapes missing during transport Unknown
17
IT advisory
Data Mobility
 2 of 5 employees download work files to
personal devices
 2 of 5 employees plan to use old company data
in new jobs
 56% of employees do not believe it is a crime to
use a competitor’s trade secrets
 68% say their company does not take steps to
deter data leakage
- Symantec study
18
IT advisory
Increasing Compliance Demands
Financial Institutions / Public Companies
Gramm-Leach-Bliley
PCI – Credit and debit card data
HIPAA – healthcare / patient data
FISMA - Federal Government Contractors
Large / public customer requirements
Service Organization Controls Reporting
Individual state requirements
19
IT advisory
What can I do?
Question – If someone was trying to breach
your systems today …
WHO WOULD BE THE FIRST TO NOTICE IT?
Determined by People, Process, Technology in place
Reducing risk will require investment …
 Skillsets / resources
 Software / hardware solutions
 Third party relationships for monitoring
20
IT advisory
Unanticipated Costs
 Investigation Costs
 Regulatory / Industry Fines or Penalties
 Remediation / Infrastructure Change
Costs
 Brand Damage
21
IT advisory
Security Incidents
What are we seeing?
22
IT advisory
 76% of network intrusions exploited weak
or stolen credentials
 40% incorporated malware
 35% involved physical attacks
 29% leveraged social tactics
 13% resulted from privilege misuse and
abuse
- Symantec study
Cybercrime Lifecycle
23
IT advisory
Greed
Cybercrime Lifecycle
24
IT advisory
Victim Identification
 Sea of opportunity = 1 out of every 7 people
have data worth targeting
 1 Billion targets worldwide
Infiltration
 Using the low hanging fruit exploit methods
 Not burning Zero-days exploits
Cybercrime Lifecycle
25
IT advisory
Propagation
 In the past, we saw hackers grabbing the
databases or flat files and leaving
 Now, we see hackers latching on data
sources and persisting
Aggregation
 Exploit a server or workstation in a
Business’ internal network
 This device become an aggregation point for
data collection
Cybercrime Lifecycle
26
IT advisory
Data Exfiltration
 Using advance techniques to exfiltrate data
 Encryption
Buyer Identification
 Web forums
 Sometimes up 10,000 users
 Liquidate the data and collect the cash
Cybercrime Lifecycle
27
IT advisory
Recycling
 The organization reinvests their $$$
 Recycle tools and techniques learned
 Re-implement these tools, techniques and
lessons learned against the next victim
Cybercrime Lifecycle
28
IT advisory
Data Exfiltration Complete
29
IT advisory
Hackers View of Your Network
30
IT advisory
Hackers View of Your Network
31
IT advisory
Hackers View of Your Network
32
IT advisory
Hackers View of Your Network
33
IT advisory
Hackers View of Your Network
34
IT advisory
Hackers View of Your Network
35
IT advisory
Hackers View of Your Network
36
IT advisory
Hackers View of Your Network
37
IT advisory
Hackers View of Your Network
38
IT advisory
Game, Set, Match
39
IT advisory
Common Scenarios
40
IT advisory
Common Scenario
 Sluggish Internet
 Strange messages / prompts
 Minor file / folder changes and additions
 User / system ID changes and additions
 Notification from employees’ banks of
suspicious Web logon attempts
41
IT advisory
Common Scenario
 Multiple file transfer / receipt methods
 Weak remote access controls
 Limited / part-time internal IT resources
 No proactive monitoring – relying on
standard Malware/AV products
42
IT advisory
Common Scenario
 Use of small third party company for IT
support – NO SECURITY FOCUS!
 Outdated software patches / virus
signatures
 Low level of employee / customer
awareness
43
IT advisory
Common Scenario
 Visitors / non-employees not challenged
when onsite
 Data on printers?
 Workstations?
 Other common vulnerabilities?
44
IT advisory
Common Results
 Nuisance viruses
 Key logger on individual machines
 Botnet sending data outside of the network
 Malware
 Ransomware
45
IT advisory
Benefits of a Security
Assessment
46
IT advisory
Information Protection Life Cycle
47
IT advisory
Data Security and Privacy
48
IT advisory
Questions
49
IT advisory
For More Information / Assistance:
Rodney Murray
rodney.murray@dhgllp.com
Douglas Jambor
douglas.jambor@dhgllp.com

More Related Content

What's hot

Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOnRamp
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Universidad Cenfotec
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudSymantec
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportJames Konderla
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-IT Strategy Group
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incDruva
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Tracey Ong
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckNetIQ
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case studyAbhilash vijayan
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentationEthan S. Burger
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industrySOCRadar Inc
 
HIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsHIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsPYA, P.C.
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterPatricia M Watson
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data securityUlf Mattsson
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksThis account is closed
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryEMC
 
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Compliancy Group
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapEnterprise Management Associates
 

What's hot (20)

Overcoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security ModelOvercoming Hidden Risks in a Shared Security Model
Overcoming Hidden Risks in a Shared Security Model
 
Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.Material de apoyo Un replanteamiento masivo de la seguridad.
Material de apoyo Un replanteamiento masivo de la seguridad.
 
Protecting Corporate Information in the Cloud
Protecting Corporate Information in the CloudProtecting Corporate Information in the Cloud
Protecting Corporate Information in the Cloud
 
Operational CyberSecurity Final Case Report
Operational CyberSecurity Final Case ReportOperational CyberSecurity Final Case Report
Operational CyberSecurity Final Case Report
 
BEA Presentation
BEA PresentationBEA Presentation
BEA Presentation
 
Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-Defensible cybersecurity-jan-25th-
Defensible cybersecurity-jan-25th-
 
Where in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva incWhere in the world is your PII and other sensitive data? by @druva inc
Where in the world is your PII and other sensitive data? by @druva inc
 
Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]Scalar security study2017_slideshare_rev[1]
Scalar security study2017_slideshare_rev[1]
 
Proven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS DeckProven Practices to Protect Critical Data - DarkReading VTS Deck
Proven Practices to Protect Critical Data - DarkReading VTS Deck
 
Target data breach case study
Target data breach case studyTarget data breach case study
Target data breach case study
 
Verizon DBIR 2021
Verizon DBIR 2021Verizon DBIR 2021
Verizon DBIR 2021
 
Ci2 cyber insurance presentation
Ci2 cyber insurance presentationCi2 cyber insurance presentation
Ci2 cyber insurance presentation
 
Verizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industryVerizon's DBIR-A look into each industry
Verizon's DBIR-A look into each industry
 
HIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future ExpectationsHIPAA Security Trends and Future Expectations
HIPAA Security Trends and Future Expectations
 
Cyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise ChapterCyber Security Threats | IIA Boise Chapter
Cyber Security Threats | IIA Boise Chapter
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
Cybercrime and the Healthcare Industry
Cybercrime and the Healthcare IndustryCybercrime and the Healthcare Industry
Cybercrime and the Healthcare Industry
 
Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...Where security and privacy meet partnering tips for CSOs and privacy/complian...
Where security and privacy meet partnering tips for CSOs and privacy/complian...
 
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills GapHow Automation and Orchestration Can Help Bridge the IT Security Skills Gap
How Automation and Orchestration Can Help Bridge the IT Security Skills Gap
 

Similar to Cybersecurity Presentation 6-11-15

IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls PresentationBill Lisse
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threatillustro
 
Comply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsComply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsThycotic
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentationShariyaz Abdeen
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Ulf Mattsson
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?Lumension
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksBlancco
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyDonny Shimamoto
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityJessica Santamaria
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItMarc Crudgington, MBA
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselCasey Ellis
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counselbugcrowd
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...Casey Ellis
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...Symantec
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastLogikcull.com
 

Similar to Cybersecurity Presentation 6-11-15 (20)

Spo2 t17
Spo2 t17Spo2 t17
Spo2 t17
 
IT Controls Presentation
IT Controls PresentationIT Controls Presentation
IT Controls Presentation
 
The Insider Threat
The Insider ThreatThe Insider Threat
The Insider Threat
 
Comply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed AuditsComply or Die: Learn How to Avoid Failed Audits
Comply or Die: Learn How to Avoid Failed Audits
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
Cyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counselCyber Threat Overview for Euro IT counsel
Cyber Threat Overview for Euro IT counsel
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...Data centric security key to digital business success - ulf mattsson - bright...
Data centric security key to digital business success - ulf mattsson - bright...
 
2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?2013 Data Protection Maturity Trends: How Do You Compare?
2013 Data Protection Maturity Trends: How Do You Compare?
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
Leading Practices in Information Security & Privacy
Leading Practices in Information Security & PrivacyLeading Practices in Information Security & Privacy
Leading Practices in Information Security & Privacy
 
Emerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and SecurityEmerging Trends in Information Privacy and Security
Emerging Trends in Information Privacy and Security
 
Synack cirtical infrasructure webinar
Synack cirtical infrasructure webinarSynack cirtical infrasructure webinar
Synack cirtical infrasructure webinar
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
The Stand Against Cyber Criminals Lawyers, Take The Stand Against Cyber Crimi...
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
ACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity WebcastACEDS-ACFCS Cybersecurity Webcast
ACEDS-ACFCS Cybersecurity Webcast
 

Cybersecurity Presentation 6-11-15