Data Breaches: Is IBM i Really At Risk? All trademarks and registered trademarks are the property of their respective owners.

Similar documents
2017 Results. Revealing the New State of IBM i Security: The Good, the Bad, and the Downright Ugly

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Cyber Security Issues

Ian Speller CISM PCIP MBCS. Head of Corporate Security at Sopra Steria

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

Encrypting PHI for HIPAA Compliance on IBM i. All trademarks and registered trademarks are the property of their respective owners.

Cyber Risks in the Boardroom Conference

Employee Security Awareness Training

The Honest Advantage

A practical guide to IT security

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

PCI Compliance. What is it? Who uses it? Why is it important?

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

Cybersecurity A Regulatory Perspective Sara Nielsen IT Manager Federal Reserve Bank of Kansas City

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

Keys to a more secure data environment

locuz.com SOC Services

Florida Government Finance Officers Association. Staying Secure when Transforming to a Digital Government

THE PROCESS FOR ESTABLISHING DATA CLASSIFICATION. Session #155

INTRODUCTION. We would like to thank HelpSystems for supporting this unique research. We hope you will enjoy the report.

Insider Threat Detection Including review of 2017 SolarWinds Federal Cybersecurity Survey

Juniper Vendor Security Requirements

Building a Complete Program around Data Loss Prevention

IT risks and controls

Are You Avoiding These Top 10 File Transfer Risks?

Cyber fraud and its impact on the NHS: How organisations can manage the risk

Cybersecurity in Higher Ed

Security Policies and Procedures Principles and Practices

HIPAA Compliance Assessment Module

Security and Privacy Breach Notification

Is Your z/os System Secure?

What is ISO ISMS? Business Beam

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA

CYBER SECURITY AND MITIGATING RISKS

Cybersecurity and the Board of Directors

Defense in Depth Security in the Enterprise

Mitigation Controls on. 13-Dec-16 1

Regulation P & GLBA Training

01.0 Policy Responsibilities and Oversight

Virginia State University Policies Manual. Title: Information Security Program Policy: 6110

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

Healthcare HIPAA and Cybersecurity Update

SMALL BUSINESS CYBERSECURITY SURVIVAL GUIDE

The Realities of Data Security and Compliance: Compliance Security

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

ISSP Network Security Plan

CISO View: Top 4 Major Imperatives for Enterprise Defense

Cybersecurity The Evolving Landscape

SECURITY & PRIVACY DOCUMENTATION

The Cost of Phishing. Understanding the True Cost Dynamics Behind Phishing Attacks A CYVEILLANCE WHITE PAPER MAY 2015

Confronting the Threat. Wednesday, August 8, 2006, 2-3:15 PM Debbie Christofferson, CISSP, CISM Sapphire-Security Services LLC

SHELTERMANAGER LTD CUSTOMER DATA PROCESSING AGREEMENT

Effective Strategies for Managing Cybersecurity Risks

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Addressing PCI DSS 3.2

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

Cyber Fraud What can you do about it?

Surprisingly Successful: What Really Works in Cyber Defense. John Pescatore, SANS

External Supplier Control Obligations. Cyber Security

The Role of the Data Protection Officer

Cybersecurity 2016 Survey Summary Report of Survey Results

OWASP CISO Survey Report 2015 Tactical Insights for Managers

HIPAA Faux Pas. Lauren Gluck Physician s Computer Company User s Conference 2016

INSIDE. Integrated Security: Creating the Secure Enterprise. Symantec Enterprise Security

How Breaches Really Happen

Managing SaaS risks for cloud customers

Data Loss Prevention:

Personal Cybersecurity

Hacking and Cyber Espionage

Business White Paper. Healthcare IT In The Cloud: Predicting Threats, Protecting Patient Data

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

DeMystifying Data Breaches and Information Security Compliance

Information Technology General Control Review

Retail Security in a World of Digital Touchpoint Complexity

Cybersecurity Today Avoid Becoming a News Headline

Incident Response. Tony Drewitt Head of Consultancy IT Governance Ltd

mhealth SECURITY: STATS AND SOLUTIONS

From Russia With Love

PONEMON INSTITUTE RESEARCH REPORT 2018 STUDY ON GLOBAL MEGATRENDS IN CYBERSECURITY

security mindfulness dwayne.

Cloud Security Standards and Guidelines

Incident Response: Are You Ready?

(c) Apgar & Associates, LLC

SOLUTION BRIEF HELPING BREACH RESPONSE FOR GDPR WITH RSA SECURITY ADDRESSING THE TICKING CLOCK OF GDPR COMPLIANCE

Going Paperless & Remote File Sharing

Introduction to Ethical Hacking. Chapter 1

Countermeasures and Best Practices Track 1: Large Business Sophisticated IT Security Program

Carbon Black PCI Compliance Mapping Checklist

Question 1: What steps can organizations take to prevent incidents of cybercrime? Answer 1:

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Annual Report on the Status of the Information Security Program

Business continuity management and cyber resiliency

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

GM Information Security Controls

112 th Annual Conference May 6-9, 2018 St. Louis, Missouri

Cybersecurity Fundamentals Paul Jones CIO Clerk & Comptroller Palm Beach County CISSP, ITIL Expert, Security+, Project+

Checklist: Credit Union Information Security and Privacy Policies

Cybersecurity and Hospitals: A Board Perspective

Cyber Security. June 2015

Transcription:

Data Breaches: Is IBM i Really At Risk? HelpSystems LLC. All rights reserved. All trademarks and registered trademarks are the property of their respective owners.

ROBIN TATAM, CBCA CISM PCI-P Global Director of Security Technologies robin.tatam@helpsystems.com

Let s start by defining the term Data Breach

A data breach is a security incident in which sensitive, protected or confidential data is copied, transmitted, viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve financial information such as credit card or bank details, personal health information (PHI), personally identifiable information (PII), trade secrets of corporations, or intellectual property. Source: Wikipedia

A compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected data transmitted, stored, or otherwise processed. Source: International Standards Organization (ISO)

A compromise of security that leads to the accidental or unlawful destruction, loss, alteration, unauthorized disclosure of, or access to protected data transmitted, stored, or otherwise processed. Source: International Standards Organization (ISO)

A data breach may have different origins

Black Hats Typically seeking personal gain Often very skilled Stereotypical hacker Does not notify of vulnerabilities

Organized Crime Typically seeking financial gain Information advantage Often funds Black Hats

National Governments Typically seeking political gain or competitive advantage Often funds Black Hats and spies

Insider Threat Typically seeking personal gain: money, career IT Sabotage Theft of intellectual property Fraud Crimes of opportunity A moving target Often unintentional!

An insider threat is a malicious threat to an organization that comes from people within the organization, such as employees, former employees, contractors, or business associates. These insiders are often staff that have inside information concerning the organization's security practices, data, and computer systems.

Just 17% Of companies surveyed reported an insider threat incident in the last year. But 85% Of companies actually had an insider threat incident. Source: 2014 Cloud Security Alliance Survey of CIOs

Average annualized cyber crime cost weighted by attack frequency Source: Ponemon Institute

Average resolution time attack type Source: Ponemon Institute

Budget or earmarked spending according to six IT security layers Source: Ponemon Institute

Which industry verticals are most At Risk of a data breach?

We aren t publicly traded Although you may not be required to comply with a forced directive, you likely still have: Financials Customer information Personnel information Vendors Product data Sales information And you need to protect it.

How does IBM i factor into this?

Threat vectors depend on how and what your Power Systems server is connected to.

The majority of Power Systems servers live inside the perimeter and are therefore most at risk from Insider Threat.

Secure Securable

IBM i has a reputation as one of the most securable operating systems on the market. But, securable does not imply you simply plug it in and don t have to configure anything!

It s important to recognize the nuances of IBM i. Both the risks and the steps needed to mitigate risks to this server are very different from other server platforms. The same general principles exist, but how they are addressed may vary widely. It is also recommended to throw out any preconceived notions about IBM i security in case they re wrong!

IBM i Windows UNIX UNIX Vulnerabilities/ Patch Patch Mgmt Management Low Concern Major Concern Major Concern Virus/Trojan/W Worms orms Variable Concern* Extreme Concern Moderate Concern Unauthorized Unauthorized Users and/or Access Users and/or Access Extreme Concern Moderate Concern Moderate Concern *Depends on utilization of the Integrated File System (IFS)

PowerTech uses anonymous audit data from a Security Scan tool to compile an annual study of security statistics. This study, available online, provides a picture of what IBM i shops are currently doing with their security controls. Year after year, it shows that there is still room and need for improvement!

System Security Level

85% 15% Auditing is inactive IBM i s audit facility is turned OFF by default. Too many companies do not turn auditing on, or don t use it for security purposes (such as high-availability). Servers that are auditing are often not collecting the necessary events, or are purging data too soon.

IBM i profiles typically wield too much administrative power. Poor control is often due to profile duplication, or migration from old servers when security was not a priority. Command line access can mean impact is very significant.

Control and auditing of TCP interfaces requires exit programs Many companies are not aware that users can upload & download data through these interfaces Several interfaces allow users to run commands independent of their profile s limit capability settings One or More Exit Programs in Place

Security 1 st ; Compliance 2 nd Security is a state of being. Compliance is adherence. Well-secured servers will often meet or exceed best practice or compliance standards. Secure systems have the advantage of being deliberately and concisely configured to protect the information, not just to satisfy an item on an audit checklist.

Sorry, It Takes Some Work Be realistic: you probably didn t become unsecure overnight so don t expect to turn it around in that timeframe. There is no magic potion or silver bullet in security. Commercial tools can (and should) assist, but be leery of anyone who says just set it and forget it.

Nurture vs. Nature Start simple and grow: 1. Management sponsorship is a MUST 2. Determine business goals and challenges 3. Evaluate risk (often via an assessment or audit) 4. Publish/review a Security Policy of baseline settings 5. Make adjustments to OS controls 6. Implement third-party tools as necessary Repeat from step 2 (sometimes step 1)

Empower users and admins to speak up regarding concerns or observations. Build a strong foundation using the OS-provided security controls. Streamline inefficient or lacking processes with thirdparty solutions.

The day before a breach, the ROI is zero. The day after, it is infinite. Dennis Hoffman, RSA

A Call To Action

Start with an Automated Review Ask Questions

Learn More About IBM i Security Free Download: 2016 State of IBM i Security https://www.mc-store.com/products/ibm-i-security-administrationand-compliance-second-edition

Ask Questions helpsystems.com Product Information Data Sheets Demonstration Videos Trial Downloads Customer Success Stories How-To Articles Request a FREE Security Scan

Question and Answer

Ask Questions www.helpsystems.com