SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Slide 1 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 1
When a Data Breach
Happens,
What’s Your Plan ?
Edge Pereira
ES2 Solutions Architect
edge@es2.com.au
Twitter: @superedge
Stuart Mills
ES2 Director
stuart@es2.com.au
2015
Slide 2 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 2
Our Plan for Today
• Making Sense of Threats
• Cloud Breaching Incident Plan
• What to do After the Incident?
• Recommendations
• Q & A
Slide 3 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 3
Making Sense of Threats
Outsider
End User
Insider
Secure Design
Secure Code
Protections against attacks
Assume Breach
Contain Attackers
Detect Attackers
Remediate Attacks
Built controls
DLP, Encryption, etc.
Auditing
Slide 4 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 4
Internet cafes in
vacation spots
Every time you connect to the internet
Wonderful Internet
Services
Ideological
Movements
Organized
Crime
Nation
States
Slide 5 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 5
Hacking in the Good Old Days
Slide 6 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 6
Data Breaches
Source: Liam Clearly BRK2142 Microsoft Ignite
Slide 7 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 7
Numerous, Active, and Evolving Threats…
Slide 8 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 8
…Very Active Threats
Social media giants Facebook, LinkedIn, among others, get hacked… repeatedly.
Slide 9 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 9
“The personal details of world leaders – including David Cameron, Barack Obama and Vladimir Putin –
have been accidentally revealed in an embarrassing privacy breach.”
It has been discovered that an employee at the Australian immigration department mistakenly sent personal information of
all world leaders attending the G20 Summit to organisers of the Asian Cup football tournament.
And the heads of government were kept in the dark about the employee’s blunder.
The passport numbers and visa details of United States president, Barack Obama, the Russian president, Vladimir Putin,
the German chancellor, Angela Merkel, the Chinese president, Xi Jinping, the Indian prime minister, Narendra Modi, the
Japanese prime minister, Shinzo Abe, the Indonesian president, Joko Widodo, and the British prime minister, David
Cameron, were all exposed.
Source: http://www.independent.co.uk/news/world/personal-details-of-obama-putin-cameron-and-merkel-sent-to-wrong-email-address-by-g20-summit-organiser-10142539.html
Leaks and Training
Slide 10 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 10
Source: http://www.canberratimes.com.au/national/public-service/federal-privacy-authorities-called-in-over-centrelink-breach-20140818-105hjw
Leaks and Training
Slide 11 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 11
The Evolution of Attacks
Targeting
Sophistication
Volume and impact
Script kiddies
BLASTER, SLAMMER
Motive: mischief
2003–2004
Slide 12 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 12
The Evolution of Attacks
2005–PRESENT
Organized crime
RANSOMWARE,
CLICK-FRAUD,
IDENTITY THEFT
Motive: profit
Sophistication
Targeting
Slide 13 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 13
The Evolution of Attacks
Organized crime
RANSOMWARE,
CLICK-FRAUD,
IDENTITY THEFT
Motive: profit
2012–BEYOND
Nation states,
activists,
terror groups
BRAZEN,
COMPLEX,
PERSISTENT
Motives:
IP theft,
damage,
disruption
Sophistication
Targeting
Slide 14 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 14
Defining Risk
Vulnerability Threat Consequence
Risk
The U .S. Department of Homeland Security (DHS) defines risk as
a vulnerability coupled with a threat that creates a consequence
Slide 15 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 15
Writing a Cloud Breach Incident Plan
• What is the problem you are solving?
• No executive sponsor? No worries
• Advisory committee
• Know your audience
Slide 16 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 16
Sample Plan
• Foreword
• Objective
• Scope
• Assumptions
• Ownership
• Execution command topologies
• Plan structure
Slide 17 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 17
Plan Structure
17
Preparation
Detection
& analysis
Declaration
&
mobilization
Technical
actions
Supporting
actions
Incident
containment
Post
incident
Plan
Maintenance
Slide 18 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 18
Incident Preparation
• Crystal ball exercise
• What kind of information could you share with 3rd party or law
enforcement?
• If you loose PCI or PII data, how would you notify them? Who in the
community can help you?
• For credit monitoring, what would be the services, costs involved, and
to whom?
• Compile these into one or more documents. Label it crisis response.
Slide 19 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 19
Incident Detection and Analysis
• Sources of information
• Define what is an “incident”, “alert”, “suspicious events”
• Define severities
• Peer-review with IT, InfoSec and Legal
Slide 20 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 20
Incident Response
• “Who does what when”
• Tiger team and decision making structure
• Battle rhythm. Everyone needs to know what to do and not wait.
• Time to make decisions not longer than executing
• Declaration of end of incident
Slide 21 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 21
Incident Response - Tiger Team
Team Leader
•Oversee all team
work
•Keep team focused
on damage
containment
Lead
Investigator
•Collect & Analyzes
evidence
•Root cause
•Manages the
business continuity
plan
Comms Lead
•Messaging for all
audiences
•Inside and outside
the company
Documentation
and Timeline
Leader
•Investigations
•Discovery and
recovery
•Documents
timeline events
HR/Legal
Leader
•Criminal charges
developments
Slide 22 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 22
Plan Post-Incident
• Lessons learned
• Recommendation #1: test the plan once an year
Slide 23 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 23
Recommendations
• Expand the use of Encryption
• Workforce training and awareness programs
• Strengthening of perimeter controls
• Implement identity and access management solutions (privileged access first)
• Strong endpoint security solutions
• Implement data loss prevention solutions
• Get a security certification or independent audit
How to Mitigate the Risk and Consequences of a Data
Breach
Slide 24 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 24
Q & A
Slide 25 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 25
Recap
• Making Sense of Threats
• Cloud Breaching Incident Plan
• What to do After the Incident?
• Recommendations
• Q & A
Slide 26 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 26
Learn More
• Office 365 Trust Portal
• ES2 website www.es2.com.au
• Computer Incident Response, NK McCarthy
• BRK2159 Office 365 today and beyond, TechEd NA
• www.superedge.net
Useful Material and Links
Slide 27 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 27
Hour of Code - https://code.org/learn
Slide 28 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 28
Thank You
Perth Head Office
“The Factory” 69 King Street
Perth, WA 6000
Perth Business Centre
Level 27, 44 St Georges Terrace
Perth, WA 6000
Brisbane Business Centre
Level 18, 123 Eagle Street,
Brisbane, QLD, 4000
Sydney Business Centre
Level 12, 95 Pitt Street,
Sydney NSW, 2000
Paris Business Centre
4 rue Neuve de la Chardonnière, 75018,
Paris, FRANCE
www.es2.com.au
Slide 30 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 30
Additional Slides
Slide 31 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 31
Common Myths About the Cloud
Myths
• On-premises is more secure
• Data is used for mining (i.e.. Advertising)
• It’s not compliant with industry regulations
• Control of data in the cloud is lost
Office 365
• Built to provide a level of security that exceeds most
customers on infrastructure and scale
• The first to comply with ISO/IEC 27018. Prohibits use of
PII for ads and marketing
• Compliant with HIPAA, FISMA, MPAA etc (industries and
governments)
• Designed for complete customer data control.
• You own the data, MS manages it for you.
Slide 32 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 32
Government Access to Cloud Data
Microsoft will not…
• Provide any government with direct or unfettered
access to customer data
• Assist any government’s efforts to break cloud
encryption
• Provide any government with encryption keys
• Engineer back doors into the cloud products (MS will
take steps to ensure governments can independently verify this)
• If governments are engaging in broader
surveillance of communications, MS is not involved
and it is taking steps to enhance the security of
customer’s data
Microsoft will…
http://www.microsoft.com/about/corporatecitizenship/en-us/transparencyhub/
• Disclose enterprise customer data only by a
valid legal order and only for the data required
• Publish a law enforcement request report every
six months
20.8%
7.84%
71.36%
Disclosed content
Only subscriber/transactional data
No data found
Rejected
Australia
Slide 33 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 33
Security Innovation
• Continuous investigation
• Advanced tactics
• “Penetration games”
• World-class security experts
Slide 34 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 34
Encryption at Rest and In-Transit
• Data Loss Prevention
• Search
• Insights
• Content analysis
Slide 35 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 35
Controls Implemented After a Data Breach
35
48
46
40
35
27 26 25
23
21
18
48
41
43
26
22 23
30
19 18
21
52
35
42
23
19 20
32
34
14 15
0
10
20
30
40
50
60
Use of encryption Additional manual
procedures and
controls
Training and
awareness programs
Strenghtening
perimeter controls
Identity and access
management solutions
Other system control
practices
Endpoint security
solutions
Security intelligence
solutions
Data loss prevention
solutions
Security certification or
audit
2013 2014 2015
38

Weitere ähnliche Inhalte

Was ist angesagt?

CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR
 
2019 10-22 axio - taking control of cyber risk - grid-seccon
2019 10-22 axio - taking control of cyber risk - grid-seccon2019 10-22 axio - taking control of cyber risk - grid-seccon
2019 10-22 axio - taking control of cyber risk - grid-secconAxio
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryWilliam McBorrough
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The BoardPaul Melson
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsEnterprise Management Associates
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemIBM Security
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentationBradford Bach
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Shawn Tuma
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityIT Governance Ltd
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021Management Events
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowRoger Hagedorn
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsAbdul-Hakeem Ajijola
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crimeNathan Desfontaines
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2David Dubree
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clintonCIONET
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015Paul Ferrillo
 

Was ist angesagt? (20)

OS17 Brochure
OS17 BrochureOS17 Brochure
OS17 Brochure
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
2019 10-22 axio - taking control of cyber risk - grid-seccon
2019 10-22 axio - taking control of cyber risk - grid-seccon2019 10-22 axio - taking control of cyber risk - grid-seccon
2019 10-22 axio - taking control of cyber risk - grid-seccon
 
Cyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial IndustryCyber Crime Threat Landscape - A Focus on the Financial Industry
Cyber Crime Threat Landscape - A Focus on the Financial Industry
 
Cybersecurity and The Board
Cybersecurity and The BoardCybersecurity and The Board
Cybersecurity and The Board
 
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat ThreatsUsing Digital Threat Intelligence Management (DTIM) to Combat Threats
Using Digital Threat Intelligence Management (DTIM) to Combat Threats
 
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune SystemCybersecurity in the Cognitive Era: Priming Your Digital Immune System
Cybersecurity in the Cognitive Era: Priming Your Digital Immune System
 
Digital Resilience flipbook
Digital Resilience flipbookDigital Resilience flipbook
Digital Resilience flipbook
 
Data Breach Guide 2013
Data Breach Guide 2013Data Breach Guide 2013
Data Breach Guide 2013
 
Mind the gap
Mind the gapMind the gap
Mind the gap
 
Data breach presentation
Data breach presentationData breach presentation
Data breach presentation
 
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
Cybersecurity and Privacy for In-House Counsel: How the New Regulations and G...
 
Using international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber securityUsing international standards to improve Asia-Pacific cyber security
Using international standards to improve Asia-Pacific cyber security
 
Cyber security investments 2021
Cyber security investments 2021Cyber security investments 2021
Cyber security investments 2021
 
Data Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to KnowData Security: What Every Leader Needs to Know
Data Security: What Every Leader Needs to Know
 
Cybersecurity & the Board of Directors
Cybersecurity & the Board of DirectorsCybersecurity & the Board of Directors
Cybersecurity & the Board of Directors
 
The ever increasing threat of cyber crime
The ever increasing threat of cyber crimeThe ever increasing threat of cyber crime
The ever increasing threat of cyber crime
 
Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2Forthright Security Lunch and Learn - Ransomware Focus 2
Forthright Security Lunch and Learn - Ransomware Focus 2
 
20101012 isa larry_clinton
20101012 isa larry_clinton20101012 isa larry_clinton
20101012 isa larry_clinton
 
cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015cybersecurity_alert_feb_12_2015
cybersecurity_alert_feb_12_2015
 

Andere mochten auch

12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotatedwdsnead
 
Sense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise securitySense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise securityJason Edelstein
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breachBaltimax
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threatsdnomura
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security BreachAlienVault
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security BreachSeculert
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)Rohana K Amarakoon
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessEversheds Sutherland
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data BreachDavid Hunt
 
Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack PresentationCreditCardFinder
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachJim Brashear
 

Andere mochten auch (14)

12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated12 02-14 information security managers - unannotated
12 02-14 information security managers - unannotated
 
Sense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise securitySense of Security Best practice strategies to improve your enterprise security
Sense of Security Best practice strategies to improve your enterprise security
 
How to safe your company from having a security breach
How to safe your company from having a security breachHow to safe your company from having a security breach
How to safe your company from having a security breach
 
Current Emerging Threats
Current Emerging ThreatsCurrent Emerging Threats
Current Emerging Threats
 
Preparing for a Security Breach
Preparing for a Security BreachPreparing for a Security Breach
Preparing for a Security Breach
 
Security Breach Laws
Security Breach LawsSecurity Breach Laws
Security Breach Laws
 
Vlvj corp ppt
Vlvj corp pptVlvj corp ppt
Vlvj corp ppt
 
5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach5 Critical Steps to Handling a Security Breach
5 Critical Steps to Handling a Security Breach
 
security in it (data and cyber security)
security in it (data and cyber security)security in it (data and cyber security)
security in it (data and cyber security)
 
Data Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your businessData Security Breach – knowing the risks and protecting your business
Data Security Breach – knowing the risks and protecting your business
 
Data Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples StoryData Security Breach: The Sony & Staples Story
Data Security Breach: The Sony & Staples Story
 
The Anatomy of a Data Breach
The Anatomy of a Data BreachThe Anatomy of a Data Breach
The Anatomy of a Data Breach
 
Sony Playstation Hack Presentation
Sony Playstation Hack PresentationSony Playstation Hack Presentation
Sony Playstation Hack Presentation
 
A Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data BreachA Brave New World of Cyber Security and Data Breach
A Brave New World of Cyber Security and Data Breach
 

Ähnlich wie When a Data Breach Happens, What's Your Plan?

Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in ManufacturingCentraComm
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaUlf Mattsson
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsIBM Security
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloudUlf Mattsson
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...IBM Security
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSACipherCloud
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small BusinessValiant Technology
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksBlancco
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceNISIInstituut
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017Craig Devlin
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMwareVMUG IT
 
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the OpportunityDean Iacovelli
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)Sarah Jarvis
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsOmar Khawaja
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Don Grauel
 

Ähnlich wie When a Data Breach Happens, What's Your Plan? (20)

Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9Symantec Data Loss Prevention 9
Symantec Data Loss Prevention 9
 
Information security for small business
Information security for small businessInformation security for small business
Information security for small business
 
Cyber Security in Manufacturing
Cyber Security in ManufacturingCyber Security in Manufacturing
Cyber Security in Manufacturing
 
Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
A practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpaA practical data privacy and security approach to ffiec, gdpr and ccpa
A practical data privacy and security approach to ffiec, gdpr and ccpa
 
Breaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gapsBreaking down the cyber security framework closing critical it security gaps
Breaking down the cyber security framework closing critical it security gaps
 
Information Security For Small Business
Information Security For Small BusinessInformation Security For Small Business
Information Security For Small Business
 
Practical risk management for the multi cloud
Practical risk management for the multi cloudPractical risk management for the multi cloud
Practical risk management for the multi cloud
 
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
 
Cyber Security Lessons from the NSA
Cyber Security Lessons from the NSACyber Security Lessons from the NSA
Cyber Security Lessons from the NSA
 
Security Best Practices for Small Business
Security Best Practices for Small BusinessSecurity Best Practices for Small Business
Security Best Practices for Small Business
 
Data erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacksData erasure's role in limiting cyber attacks
Data erasure's role in limiting cyber attacks
 
Cybersecurity and continuous intelligence
Cybersecurity and continuous intelligenceCybersecurity and continuous intelligence
Cybersecurity and continuous intelligence
 
Spotlight on Technology 2017
Spotlight on Technology 2017Spotlight on Technology 2017
Spotlight on Technology 2017
 
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
06 - VMUGIT - Lecce 2018 - Rodolfo Rotondo, VMware
 
"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity"Evolving cybersecurity strategies" - Seizing the Opportunity
"Evolving cybersecurity strategies" - Seizing the Opportunity
 
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
SYMANTEC_DELOITTE_PARTNERSHIP-UK (3)
 
Cloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 StepsCloud Security: A Business-Centric Approach in 12 Steps
Cloud Security: A Business-Centric Approach in 12 Steps
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012Clinton- Cyber IRT Balto 10_2012
Clinton- Cyber IRT Balto 10_2012
 

Mehr von Edge Pereira

From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...Edge Pereira
 
2017 Collab365 - How the Jedi Use Project Online to Manage Projects
2017 Collab365 - How the Jedi Use Project Online to Manage Projects2017 Collab365 - How the Jedi Use Project Online to Manage Projects
2017 Collab365 - How the Jedi Use Project Online to Manage ProjectsEdge Pereira
 
2017 Collab365 Conference - 10 myths about moving your project management to ...
2017 Collab365 Conference - 10 myths about moving your project management to ...2017 Collab365 Conference - 10 myths about moving your project management to ...
2017 Collab365 Conference - 10 myths about moving your project management to ...Edge Pereira
 
The Future of InfoPath - Edge Pereira
The Future of InfoPath - Edge PereiraThe Future of InfoPath - Edge Pereira
The Future of InfoPath - Edge PereiraEdge Pereira
 
Project portfolio management in the cloud
Project portfolio management in the cloudProject portfolio management in the cloud
Project portfolio management in the cloudEdge Pereira
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Edge Pereira
 
Office 365 Canberra - eDiscovery and Privacy: All your data are belong to us
Office 365 Canberra - eDiscovery and Privacy: All your data are belong to usOffice 365 Canberra - eDiscovery and Privacy: All your data are belong to us
Office 365 Canberra - eDiscovery and Privacy: All your data are belong to usEdge Pereira
 
Office 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainOffice 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainEdge Pereira
 
Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Edge Pereira
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge Pereira
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Edge Pereira
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsEdge Pereira
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Edge Pereira
 

Mehr von Edge Pereira (13)

From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
From Ashley madison to_panama_papers - Office 365 bringing sexy back to eDisc...
 
2017 Collab365 - How the Jedi Use Project Online to Manage Projects
2017 Collab365 - How the Jedi Use Project Online to Manage Projects2017 Collab365 - How the Jedi Use Project Online to Manage Projects
2017 Collab365 - How the Jedi Use Project Online to Manage Projects
 
2017 Collab365 Conference - 10 myths about moving your project management to ...
2017 Collab365 Conference - 10 myths about moving your project management to ...2017 Collab365 Conference - 10 myths about moving your project management to ...
2017 Collab365 Conference - 10 myths about moving your project management to ...
 
The Future of InfoPath - Edge Pereira
The Future of InfoPath - Edge PereiraThe Future of InfoPath - Edge Pereira
The Future of InfoPath - Edge Pereira
 
Project portfolio management in the cloud
Project portfolio management in the cloudProject portfolio management in the cloud
Project portfolio management in the cloud
 
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
Microsoft EMS - Everybody Together Now - Edge Pereira - Microsoft Office 365 ...
 
Office 365 Canberra - eDiscovery and Privacy: All your data are belong to us
Office 365 Canberra - eDiscovery and Privacy: All your data are belong to usOffice 365 Canberra - eDiscovery and Privacy: All your data are belong to us
Office 365 Canberra - eDiscovery and Privacy: All your data are belong to us
 
Office 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool AgainOffice 365 Makes Data Protection Cool Again
Office 365 Makes Data Protection Cool Again
 
Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!Office 365 DLP Makes Data Protection Cool Again!
Office 365 DLP Makes Data Protection Cool Again!
 
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
Edge pereira oss304 tech ed australia regulatory compliance and microsoft off...
 
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...Office 365  Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
Office 365 Data Leakage Protection, DLP, Data Loss Prevention, Privacy, Comp...
 
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulationsC01 office 365, DLP data loss preventions, privacy, compliance, regulations
C01 office 365, DLP data loss preventions, privacy, compliance, regulations
 
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...Office 365 : Data leakage control, privacy, compliance and regulations in the...
Office 365 : Data leakage control, privacy, compliance and regulations in the...
 

Kürzlich hochgeladen

Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftAanSulistiyo
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsMonica Sydney
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrHenryBriggs2
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.krishnachandrapal52
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdfMatthew Sinclair
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxgalaxypingy
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasDigicorns Technologies
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfJOHNBEBONYAP1
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsMonica Sydney
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...kajalverma014
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查ydyuyu
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtrahman018755
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirtrahman018755
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制pxcywzqs
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"growthgrids
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样ayvbos
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsMonica Sydney
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdfMatthew Sinclair
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptxAsmae Rabhi
 

Kürzlich hochgeladen (20)

Microsoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck MicrosoftMicrosoft Azure Arc Customer Deck Microsoft
Microsoft Azure Arc Customer Deck Microsoft
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
Best SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency DallasBest SEO Services Company in Dallas | Best SEO Agency Dallas
Best SEO Services Company in Dallas | Best SEO Agency Dallas
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx75539-Cyber Security Challenges PPT.pptx
75539-Cyber Security Challenges PPT.pptx
 

When a Data Breach Happens, What's Your Plan?

  • 1. Slide 1 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 1 When a Data Breach Happens, What’s Your Plan ? Edge Pereira ES2 Solutions Architect edge@es2.com.au Twitter: @superedge Stuart Mills ES2 Director stuart@es2.com.au 2015
  • 2. Slide 2 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 2 Our Plan for Today • Making Sense of Threats • Cloud Breaching Incident Plan • What to do After the Incident? • Recommendations • Q & A
  • 3. Slide 3 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 3 Making Sense of Threats Outsider End User Insider Secure Design Secure Code Protections against attacks Assume Breach Contain Attackers Detect Attackers Remediate Attacks Built controls DLP, Encryption, etc. Auditing
  • 4. Slide 4 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 4 Internet cafes in vacation spots Every time you connect to the internet Wonderful Internet Services Ideological Movements Organized Crime Nation States
  • 5. Slide 5 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 5 Hacking in the Good Old Days
  • 6. Slide 6 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 6 Data Breaches Source: Liam Clearly BRK2142 Microsoft Ignite
  • 7. Slide 7 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 7 Numerous, Active, and Evolving Threats…
  • 8. Slide 8 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 8 …Very Active Threats Social media giants Facebook, LinkedIn, among others, get hacked… repeatedly.
  • 9. Slide 9 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 9 “The personal details of world leaders – including David Cameron, Barack Obama and Vladimir Putin – have been accidentally revealed in an embarrassing privacy breach.” It has been discovered that an employee at the Australian immigration department mistakenly sent personal information of all world leaders attending the G20 Summit to organisers of the Asian Cup football tournament. And the heads of government were kept in the dark about the employee’s blunder. The passport numbers and visa details of United States president, Barack Obama, the Russian president, Vladimir Putin, the German chancellor, Angela Merkel, the Chinese president, Xi Jinping, the Indian prime minister, Narendra Modi, the Japanese prime minister, Shinzo Abe, the Indonesian president, Joko Widodo, and the British prime minister, David Cameron, were all exposed. Source: http://www.independent.co.uk/news/world/personal-details-of-obama-putin-cameron-and-merkel-sent-to-wrong-email-address-by-g20-summit-organiser-10142539.html Leaks and Training
  • 10. Slide 10 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 10 Source: http://www.canberratimes.com.au/national/public-service/federal-privacy-authorities-called-in-over-centrelink-breach-20140818-105hjw Leaks and Training
  • 11. Slide 11 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 11 The Evolution of Attacks Targeting Sophistication Volume and impact Script kiddies BLASTER, SLAMMER Motive: mischief 2003–2004
  • 12. Slide 12 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 12 The Evolution of Attacks 2005–PRESENT Organized crime RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: profit Sophistication Targeting
  • 13. Slide 13 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 13 The Evolution of Attacks Organized crime RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: profit 2012–BEYOND Nation states, activists, terror groups BRAZEN, COMPLEX, PERSISTENT Motives: IP theft, damage, disruption Sophistication Targeting
  • 14. Slide 14 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 14 Defining Risk Vulnerability Threat Consequence Risk The U .S. Department of Homeland Security (DHS) defines risk as a vulnerability coupled with a threat that creates a consequence
  • 15. Slide 15 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 15 Writing a Cloud Breach Incident Plan • What is the problem you are solving? • No executive sponsor? No worries • Advisory committee • Know your audience
  • 16. Slide 16 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 16 Sample Plan • Foreword • Objective • Scope • Assumptions • Ownership • Execution command topologies • Plan structure
  • 17. Slide 17 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 17 Plan Structure 17 Preparation Detection & analysis Declaration & mobilization Technical actions Supporting actions Incident containment Post incident Plan Maintenance
  • 18. Slide 18 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 18 Incident Preparation • Crystal ball exercise • What kind of information could you share with 3rd party or law enforcement? • If you loose PCI or PII data, how would you notify them? Who in the community can help you? • For credit monitoring, what would be the services, costs involved, and to whom? • Compile these into one or more documents. Label it crisis response.
  • 19. Slide 19 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 19 Incident Detection and Analysis • Sources of information • Define what is an “incident”, “alert”, “suspicious events” • Define severities • Peer-review with IT, InfoSec and Legal
  • 20. Slide 20 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 20 Incident Response • “Who does what when” • Tiger team and decision making structure • Battle rhythm. Everyone needs to know what to do and not wait. • Time to make decisions not longer than executing • Declaration of end of incident
  • 21. Slide 21 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 21 Incident Response - Tiger Team Team Leader •Oversee all team work •Keep team focused on damage containment Lead Investigator •Collect & Analyzes evidence •Root cause •Manages the business continuity plan Comms Lead •Messaging for all audiences •Inside and outside the company Documentation and Timeline Leader •Investigations •Discovery and recovery •Documents timeline events HR/Legal Leader •Criminal charges developments
  • 22. Slide 22 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 22 Plan Post-Incident • Lessons learned • Recommendation #1: test the plan once an year
  • 23. Slide 23 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 23 Recommendations • Expand the use of Encryption • Workforce training and awareness programs • Strengthening of perimeter controls • Implement identity and access management solutions (privileged access first) • Strong endpoint security solutions • Implement data loss prevention solutions • Get a security certification or independent audit How to Mitigate the Risk and Consequences of a Data Breach
  • 24. Slide 24 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 24 Q & A
  • 25. Slide 25 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 25 Recap • Making Sense of Threats • Cloud Breaching Incident Plan • What to do After the Incident? • Recommendations • Q & A
  • 26. Slide 26 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 26 Learn More • Office 365 Trust Portal • ES2 website www.es2.com.au • Computer Incident Response, NK McCarthy • BRK2159 Office 365 today and beyond, TechEd NA • www.superedge.net Useful Material and Links
  • 27. Slide 27 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 27 Hour of Code - https://code.org/learn
  • 28. Slide 28 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 28 Thank You
  • 29. Perth Head Office “The Factory” 69 King Street Perth, WA 6000 Perth Business Centre Level 27, 44 St Georges Terrace Perth, WA 6000 Brisbane Business Centre Level 18, 123 Eagle Street, Brisbane, QLD, 4000 Sydney Business Centre Level 12, 95 Pitt Street, Sydney NSW, 2000 Paris Business Centre 4 rue Neuve de la Chardonnière, 75018, Paris, FRANCE www.es2.com.au
  • 30. Slide 30 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 30 Additional Slides
  • 31. Slide 31 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 31 Common Myths About the Cloud Myths • On-premises is more secure • Data is used for mining (i.e.. Advertising) • It’s not compliant with industry regulations • Control of data in the cloud is lost Office 365 • Built to provide a level of security that exceeds most customers on infrastructure and scale • The first to comply with ISO/IEC 27018. Prohibits use of PII for ads and marketing • Compliant with HIPAA, FISMA, MPAA etc (industries and governments) • Designed for complete customer data control. • You own the data, MS manages it for you.
  • 32. Slide 32 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 32 Government Access to Cloud Data Microsoft will not… • Provide any government with direct or unfettered access to customer data • Assist any government’s efforts to break cloud encryption • Provide any government with encryption keys • Engineer back doors into the cloud products (MS will take steps to ensure governments can independently verify this) • If governments are engaging in broader surveillance of communications, MS is not involved and it is taking steps to enhance the security of customer’s data Microsoft will… http://www.microsoft.com/about/corporatecitizenship/en-us/transparencyhub/ • Disclose enterprise customer data only by a valid legal order and only for the data required • Publish a law enforcement request report every six months 20.8% 7.84% 71.36% Disclosed content Only subscriber/transactional data No data found Rejected Australia
  • 33. Slide 33 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 33 Security Innovation • Continuous investigation • Advanced tactics • “Penetration games” • World-class security experts
  • 34. Slide 34 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 34 Encryption at Rest and In-Transit • Data Loss Prevention • Search • Insights • Content analysis
  • 35. Slide 35 of 11ENTERPRISE SECURITY ENTERPRISE SHAREPOINTSlide 35 Controls Implemented After a Data Breach 35 48 46 40 35 27 26 25 23 21 18 48 41 43 26 22 23 30 19 18 21 52 35 42 23 19 20 32 34 14 15 0 10 20 30 40 50 60 Use of encryption Additional manual procedures and controls Training and awareness programs Strenghtening perimeter controls Identity and access management solutions Other system control practices Endpoint security solutions Security intelligence solutions Data loss prevention solutions Security certification or audit 2013 2014 2015
  • 36.
  • 37.
  • 38. 38