From Russia With Love

Similar documents
CYBER SECURITY WORKSHOP NOVEMBER 2, Anurag Sharma [CISA, CISSP, CRISC] Principal Cyber & Information Security Services

Protecting Against Modern Attacks. Protection Against Modern Attack Vectors

Cyber Risks in the Boardroom Conference

Cybersecurity: Considerations for Internal Audit. Gina Gondron Senior Manager Frazier & Deeter Geek Week August 10, 2016

Business continuity management and cyber resiliency

DHG presenter. August 17, Addressing the Evolving Cybersecurity Landscape. DHG Birmingham CPE Seminar 1

First aid toolkit for the management of data breaches. Mary Deligianni Senior Associate 15 February 2018

Cybersecurity The Evolving Landscape

External Supplier Control Obligations. Cyber Security

Cyber Security Incident Response Fighting Fire with Fire

Rethinking Information Security Risk Management CRM002

NERC CIP VERSION 6 BACKGROUND COMPLIANCE HIGHLIGHTS

Sage Data Security Services Directory

Effective Cyber Incident Response in Insurance Companies

Cyber Security and Data Protection: Huge Penalties, Nowhere to Hide

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

Continuous protection to reduce risk and maintain production availability

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

Retail Security in a World of Digital Touchpoint Complexity

What It Takes to be a CISO in 2017

NEW YORK CYBERSECURITY REGULATION COMPLIANCE GUIDE

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

How to Optimize Cyber Defenses through Risk-Based Governance. Steven Minsky CEO of LogicManager & Author of the RIMS Risk Maturity Model

CCISO Blueprint v1. EC-Council

Les joies et les peines de la transformation numérique

The Cyber War on Small Business

Effective Strategies for Managing Cybersecurity Risks

EBOOK 4 TIPS FOR STRENGTHENING THE SECURITY OF YOUR VPN ACCESS

AUDIT REPORT. Network Assessment Audit Audit Opinion: Needs Improvement. Date: December 15, Report Number: 2014-IT-03

Stephanie Zierten Associate Counsel Federal Reserve Bank of Boston

FDIC InTREx What Documentation Are You Expected to Have?

NYDFS Cybersecurity Regulations

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA

10 Cybersecurity Questions for Bank CEOs and the Board of Directors

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Must Have Items for Your Cybersecurity or IT Budget in 2018

Information Security Controls Policy

A company built on security

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Data Theft

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Cyber-Threats and Countermeasures in Financial Sector

Engaging Executives and Boards in Cybersecurity Session 303, Feb 20, 2017 Sanjeev Sah, CISO, Texas Children s Hospital Jimmy Joseph, Senior Manager,

Insider Threat Program: Protecting the Crown Jewels. Monday, March 2, 2:15 pm - 3:15 pm

Cyber Fraud What can you do about it?

Building a Business Case for Cyber Threat Intelligence. 5Reasons Your. Organization Needs a Risk-Based 5Approach to Cybersecurity

Healthcare HIPAA and Cybersecurity Update

Cybersecurity Conference Presentation North Bay Business Journal. September 27, 2016

Cybersecurity Fundamentals Paul Jones CIO Clerk & Comptroller Palm Beach County CISSP, ITIL Expert, Security+, Project+

Building a Complete Program around Data Loss Prevention

10 FOCUS AREAS FOR BREACH PREVENTION

Uncovering the Risk of SAP Cyber Breaches

Ingram Micro Cyber Security Portfolio

Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi

Converged security. Gerben Verstraete, CTO, HP Software Services Colin Henderson, Managing Principal, Enterprise Security Products

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

New Jersey Association of School Business Officials Information Security K-12. June 5, 2014

Onapsis: The CISO Imperative Taking Control of SAP

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

IT Security Training MS-500: Microsoft 365 Security Administration. Upcoming Dates. Course Description. Course Outline $2,

A New Cyber Defense Management Regulation. Ophir Zilbiger, CRISC, CISSP SECOZ CEO

Avanade s Approach to Client Data Protection

Cyber Insurance: What is your bank doing to manage risk? presented by

Performing a Vendor Security Review TCTC 2017 FALL EVENT PRESENTER: KATIE MCINTOSH

NYS DFS Cybersecurity Requirements. Stephen Head Senior Manager Risk Advisory Services

align security instill confidence

Presented by Ingrid Fredeen and Pamela Passman. Copyright 2017NAVEXGlobal,Inc. AllRightsReserved. Page 0

The Honest Advantage

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

The Cost of Denial-of-Services Attacks

The Mobile Risk Management Company. Overview of Fixmo and Mobile Risk Management (MRM) Solutions

The Impact of Cybersecurity, Data Privacy and Social Media

Information Technology General Control Review

Integrating Cyber Security with Business Continuity Management to Build the Resilient Enterprise

Department of Management Services REQUEST FOR INFORMATION

CYBER INSURANCE: MANAGING THE RISK

SOLUTION BRIEF Virtual CISO

Cyber Security. The Question of the Day. Sylint Group, Inc. How did we come up with the company name Sylint and what does it mean?

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

SAC PA Security Frameworks - FISMA and NIST

EFFECTIVELY TARGETING ADVANCED THREATS. Terry Sangha Sales Engineer at Trustwave

Cyber Protections: First Step, Risk Assessment

Cybersecurity Guidance for Small Firms Thursday, November 8 9:00 a.m. 10:00 a.m.

2017 Annual Meeting of Members and Board of Directors Meeting

Putting It All Together:

Ponemon Institute s 2018 Cost of a Data Breach Study

E-guide CISSP Prep: 4 Steps to Achieve Your Certification

ISE North America Leadership Summit and Awards

locuz.com SOC Services

Jeff Wilbur VP Marketing Iconix

Cybersecurity What Companies are Doing & How to Evaluate. Miguel Romero - NAIC David Gunkel & Dan Ford Rook Security

Inverting Risk Management for Ethical Hacking. SecureWorld Expo 09

Reducing Cybersecurity Costs & Risk through Automation Technologies

A GUIDE TO CYBERSECURITY METRICS YOUR VENDORS (AND YOU) SHOULD BE WATCHING

Securing Your Secured Data

INFORMATION SECURITY-SECURITY INCIDENT RESPONSE

NERC Staff Organization Chart Budget 2019

Cybersecurity Panel: Cutting through Cybersecurity Hype with Practical Tips to Protect your Bank

Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.

NYDFS Cybersecurity Regulations: What do they mean? What is their impact?

Transcription:

#ARDAWorld From Russia With Love Is your technology vulnerable to data theft? Do you know your own security protocols? Learn about auditing cyber-security processes and discover how to stay compliant and safe from hacking attempts. Tuesday, May 8 from 1:30-2:45

From Russia With Love - Speakers #ARDAWorld Robert Kobek, RRP, President, CustomerCount Donald Smith President, Cybermedic Anurag Sharma, CISA, Principal, Withum Erich Tines VP, IT Holiday Club Vacations Brian Mullen VP, Infrastructure & Ops HGV

Contents of Readiness Document #ARDAWorld EXECUTIVE SUMMARY: MOBIUS VP, LLC INFORMATION SECURITY PLAN Identification and Assessment of Risks to Customer Information Information Security Plan Coordinator (ISPC) Design and Implementation of Safeguards Program Employee Management and Training Physical Security Information Systems Selection of Appropriate Service Providers Continuing Evaluation and Adjustment Summary of Policies, Standards, and Guidelines MOBIUS VP, LLC POLICIES, STANDARDS, AND GUIDELINES Acceptable Use Policy 1 General Use and Ownership 2 Security and Proprietary Information 3 Unacceptable Use Clean Desk Policy Email Policy Employee Turnover Policy 1 New Employee On-Boarding 2 Employee Transfer 3 Employee Termination Off-Boarding Password Construction Guidelines Remote Access Policy Wireless Communication Standards 1 General Requirements 2 Home Wireless Device Requirements Server Security Policy 1 General Requirements 2 Configuration Requirements 3 Monitoring

#ARDAWorld The Hacker Donald A. Smith CyberMedic Intl. www.cybermedicsec.com (517) 706-8359 A+, MSCE, CCNA, CISSP, CEH

Back Door #ARDAWorld

#ARDAWorld How Hard? How Long? How Much? Lets See A Demo!

#ARDAWorld Who and What is Vulnerable? Open WIFI = All USERS Secured WIFI = All TRAFFIC Wired Network = All DATA Encrypted Network=ZERO USERS TRAFFIC OR DATA!!!!

Anurag Sharma (CISA, CRISC, CISSP) Principal #ARDAWorld

Information is the New Oil! #ARDAWorld Companies are collecting and storing large amounts of data on a regular basis. This data may include information about employees, customers, intellectual property/trade secrets and business operations. This data has value to the companies producing/collecting it, to their competitors and to unknown third parties.

Breach Statistics #ARDAWorld Source: BreachLevelIndex.com

2017: Breaches By Region #ARDAWorld Source: BreachLevelIndex.com

#ARDAWorld How much does a cyber breach cost? Two Answers: It depends. A lot.

#ARDAWorld How much does a cyber breach cost? Investigation (IT, legal, compliance, personnel) Remediation (IT, legal, compliance, personnel) Breach notification To affected customers and employees To regulators and enforcement agencies Remedies to affected individuals Credit monitoring Call center costs Additional consequences Regulatory investigation Enforcement agency action Litigation

Cost of breaches #ARDAWorld

#ARDAWorld Information Security Brian Mullen Hilton Grand Vacations

#ARDAWorld SECURITY IS A COMPANY ISSUE CYBER SECURITY IS A CEO ISSUE. - MCKINSEY $ 4.0M 81% >300K 87% is the average cost of a data breach per incident. of breaches involve weak or stolen passwords. new malware samples are created and spread every day. of senior managers have admitted to accidentally leaking business data. CYBER THREATS ARE A MATERIAL RISK TO OUR BUSINESS Sources: McKinsey, Ponemon Institute, Verizon, Microsoft

#ARDAWorld CYBERSECURITY HAS CHANGED CYBERSECURITY USED TO MEAN BUILDING A BIGGER MOAT AND A BIGGER WALL

#ARDAWorld HGV INFOSEC STRATEGY INFOSEC FOCUS Balancing information protection, device health, identity management, and data telemetry with risk management as a foundation. No silver bullets.

Erich Tines VP Information Technology Holiday Inn Club Vacations #ARDAWorld

#ARDAWorld The Statistics: 81% There is a Cyber Attack every 39 Seconds of hacking-related breaches leveraged either stolen and/or weak passwords. 66% 1 out of every 131 Emails contain Malware 230,000 New Malware samples are produced every day of malware was installed via malicious email attachments. Data breach cost a company an average of $3.8 Million It takes about 197 Days for a breach to be detected 3,927% cost Increase of a data breach by 2020 (Data breach will exceed 150 Million). 83% of financial companies suffer over 50 attacks per month, As do 44% of retail. Sources: 2017 Verizon Data Breach investigations Report 10 th Edition https://www.symantec.com/security-center/threat-report https://www.microsoft.com/en-us/cloud-platform/advanced-threat-analytics https://www.pandasecurity.com/mediacenter/press-releases/all-recorded-malware-appeared-in-2015/ http://www.zdnet.com/article/businesses-take-over-six-months-to-detect-data-breaches/

Dedicated Oversight Bring In expertise to oversee and be dedicated to your program Executive Leadership Participation Initiate experienced partnerships Audit Security Program Sample Process: #ARDAWorld Vulnerability Management Establish Asset Management Deploy Dashboard Tools Institute Patch Management Perform Penetration Test Inject Security into your QA Process Governance Determine a Framework to Follow Establish a Security Board Define the Security Program Shape Security Policies Security Awareness & Training IT Security Plan Vulnerability Management Access Management Identify Your Data Define Roles Automate Provisioning Control Access Audit, Audit, Audit! Risk Assessments Security Awareness & Training Define Methodology Identify Assets Understand Threats and Vulnerabilities Qualify Risk (Prioritize) Mitigate to agreed Level Understand your audience and develop a cohesive program Deliver Training Often Test Effectiveness of Training Track Participation Communicate often

#ARDAWorld Talk, Talk, Talk, QUESTIONS?