SlideShare uma empresa Scribd logo
1 de 59
How to Rebuild the Controls and
Confidence after Data Exfiltration Occurs
Brian Blankenship
Operations Information Security Officer
Heartland Payment Systems
Dump truck racing = InfoSec Career
Topics / Agenda
  Heartland Payment Systems
     – Who is Heartland Payment Systems?
     – What Happened in the Heartland Breach?
     – What Did We Do About It?
     – What Are We Doing Now?
     – Key Risk Mitigations
     – Information Sharing – how it works

  Is your company a target?
      – Some current threats
      – Breach Statistics

  Information Security Perspective
Topics / Agenda
  Heartland Payment Systems
     – Who is Heartland Payment Systems?
     – What Happened in the Heartland Breach?
     – What Did We Do About It?
     – What Are We Doing Now?
     – Key Risk Mitigations
     – Information Sharing – how it works

  Is your company a target?
      – Some current threats
      – Breach Statistics

  Information Security Perspective
Heartland – A Full Service Payments Processor


• Card Processing
   • Credit/debit/prepaid cards:
        • Process over 10 million transactions a day
        • Process over 3.9 billion transactions annually
• Payroll Processing (PlusOne Payroll)
• Check Management (Check 21, ExpressFunds, StopLoss)
• Online Payment Processing
• MicroPayments – Vending, Laundry, Campus Solutions
• Gift Cards and Loyalty Processing
• Heartland Gives Back


                                                     5
Heartland – Our People



• HQ: Princeton, NJ
• IT: Plano, TX
    • 300 employees
• Servicing: Louisville, KY
    • 800 employees

• Heartland Cares
  Foundation
Heartland - 15 Years Ago ... and Today



 1997 (1st Trans 6/15/97)      Today
• 2,350 clients                255,000 clients
• 25 employees                 3000+ employees
• #62 in US                    #5 processor in U.S.
• $0.4 billion portfolio       $68 billion portfolio




                                                       7
Heartland - Financials


         Net Revenue      Net Income           EPS
                                                                       1.08
                                                                       41,840
                                                       0.90          383,708
                                                         35,870
                                       0.71
                                              28,544      294,771
                       0.50
                                       245,652


          0.26          19,093
                         186,486
    137,796

         8,855

         2004          2005            2006             2007        2008
Heartland – EPS in 2009…




           Heartland CEO’s granddaughter
Heartland – The Recovery
• 2009
    • Total Revenues                $1,652 m (up 6.93%*)
    • Net Income                       -52 m (down 224%)
    • EPS                            -1.38   (down 223%)

• 2010
    • Total Revenues                $1,864 m (up 12.8%)
    • Net Income                        35 m (up 167%)
    • EPS                             0.88 (up 163%)

• 2011
    • Total Revenues                $1,996 m (up 7.1%)
    • Net Income                        44 m (up 25.7%)
    • EPS                             1.09 (up 23.9%)

  *All percentages year-over-year                          10
Topics / Agenda
  Heartland Payment Systems
     – Who is Heartland Payment Systems?
     – What Happened in the Heartland Breach?
     – What Did We Do About It?
     – What Are We Doing Now?
     – Key Risk Mitigations
     – Information Sharing – how it works

  Is your company a target?
      – Some current threats
      – Breach Statistics

  Information Security Perspective
The Threat




It’s all about the money ….
What Happened? – The Penetration
   Very Late 2007 – SQL Injection via a customer facing web page in our
    corporate (non-payments) environment. Bad guys were in our corporate
    network.

   Early 2008 – Hired largest approved QSA to perform penetration testing of
    corporate environment

   Spring 2008 – CEO learned of Sniffer Attack on Hannaford’s , Created a
    Dedicated Chief Security Officer Position and filled that position

   April 30, 2008 – Passed 6th Consecutive “Annual Review” by Largest QSA

   Very Late 2007 – Mid-May 2008 – Unknown period but it is possible that
    bad guys were studying the corporate network

   Mid-May 2008 – Penetration of our Payments Network
What Happened?
The Investigation and The Announcement
   Late October 2008 – Informed by a card brand that several issuers
    suspected a potential breach of one or more processors. We received
    sample fraud transactions to help us determine if there was a problem in
    our payments network. Many of these transactions never touched our
    payments network.

   No evidence could be found of an intrusion despite vigorous efforts by HPS
    employees and then two forensics companies to find a problem.

   January 9, 2009 – We were told by QIRA that “no problems were found”
    and that a final report reflecting that opinion would be forthcoming.

   January 12, 2009 – January 20, 2009 – Learned of breach, notified card
    brands, notified law enforcement and made public announcement.
Why I came to Heartland…

 • The way the breach was handled

 • High degree of transparency

 • Knew that security would be #1 priority

 • Heartland was changing the perception of
   breaches, and how they should be handled
Topics / Agenda
  Heartland Payment Systems
     – Who is Heartland Payment Systems?
     – What Happened in the Heartland Breach?
     – What Did We Do About It?
     – What Are We Doing Now?
     – Key Risk Mitigations
     – Information Sharing – how it works

  Is your company a target?
      – Some current threats
      – Breach Statistics

  Information Security Perspective
PANIC
        DENIAL
ANGER
        BARGAINING
DEPRESSION
        ACCEPTANCE
FIX THE PROBLEM
Vectors of Trust

  • After any major incident, there are multiple
    vectors of trust that have to be rebuilt
     –   Trust from your customers
     –   Trust from your investors
     –   Trust from your own employees
     –   Trust from your competitors


  • Heartland has worked hard to rebuild these
The Real Response

   1/20/09 - Call to arms of all Heartland employees to visit clients and talk to
    partners

   HPY share price drops from $15.16 on 1/16 to $8.18 on 1/22

   HPY 4Q08 Earnings Call – HPY drops to $3.43 on March 12; a 77.6% drop
    since the breach announcement

   3/14/09 – Delisted from Visa list of approved vendors

   4/30/09 – Certified PCI compliant by VeriSign and reinstated on Visa list of
    approved vendors

   5/11/12 – HPY Closed at $30.41
Topics / Agenda
  Heartland Payment Systems
     – Who is Heartland Payment Systems?
     – What Happened in the Heartland Breach?
     – What Did We Do About It?
     – What Are We Doing Now?
     – Key Risk Mitigations
     – Information Sharing – how it works

  Is your company a target?
      – Some current threats
      – Breach Statistics

  Information Security Perspective
Industry Security Advancements


  • Chip & PIN (EMV)
     – Helps authenticate the card


  • Tokenization
     – Reduces risk of storing card data


  • Both help, but don’t address data
    in transit
Heartland Approach to E3
                • End to End Encryption
E3 Security     • Continuous protection of the confidentiality and integrity of
  Model           transmitted information by encrypting at the origin and
                  decrypting at the destination.



                    • Build devices that use Tamper Resistant Security Modules
  E3 Device           to encrypt payment data at the point of swipe or data entry.
                    • Collaborate with existing device vendors and encryption
   Strategy           solution providers.



                           • Protect cardholder and merchant data wherever it
     E3 Data                 resides on Heartland’s systems.
                           • Directly influence industry security standards and
     Strategy                practices to strengthen data protection.
Merchant Bill of Rights,
  Sales Professional Bill of Rights, Durbin




http://www.spbor.com/
http://www.merchantbillofrights.org/
http://getyourdurbindollars.com/
Topics / Agenda
  Heartland Payment Systems
     – Who is Heartland Payment Systems?
     – What Happened in the Heartland Breach?
     – What Did We Do About It?
     – What Are We Doing Now?
     – Key Risk Mitigations
     – Information Sharing – how it works

  Is your company a target?
      – Some current threats
      – Breach Statistics

  Information Security Perspective
Key Risk Mitigations


   Data Loss Prevention

   Network and Application Penetration Testing

   Platform Security

   Static and Dynamic Code Analysis
Topics / Agenda
  Heartland Payment Systems
     – Who is Heartland Payment Systems?
     – What Happened in the Heartland Breach?
     – What Did We Do About It?
     – What Are We Doing Now?
     – Key Risk Mitigations
     – Information Sharing – how it works

  Is your company a target?
      – Some current threats
      – Breach Statistics

  Information Security Perspective
The New Paradigm
• During investigation of Heartland breach
   • Found other processors knew of the
      breach indicators
   • Several had seen or know about them
   • No one shared that information

• Started the PPISC (Payment Processors
  Information Sharing Council) in 2009
    • Charter – bring processors to table
      to discuss threat indicators and tactics
    • Avoid any discussion on business related topics to avoid
      anti-trust
    • Everyone brings to table topics that they are seeing through their
      various intel sources (internal and external)


                                                                      27
Intelligence Sharing – PPISC


   Malware signatures currently being shared with input of
    Secret Service and other agencies

   Participation in threat exercises (CAPP – Cyber Attack
    Against Payment Processes)
Changes in Breach Perceptions


 • For Heartland, the impact was immediate and
   very high

 • People have come to understand that any
   company can be breached

 • Acceptance becoming the norm
Topics / Agenda
  Heartland Payment Systems
     – Who is Heartland Payment Systems
     – What Happened in the Heartland Breach
     – What Did We Do About It?
     – What Are We Doing Now?
     – Key Risk Mitigations
     – Information Sharing – how it works

  Is your company a target?
      – Some current threats
      – Breach Statistics

  Information Security Perspective
Targeted Attacks




Is your company a target…?
SpyEye: targets financial institutions


northerntrust.com      treasury.pncbank.com             ssl.selectpayment.com
svbconnect.com         onlinebanking.banksterling.com    texascapitalbank.com
web-access.com         nashvillecitizensbank.com        singlepoint.usbank.com
sso.unionbank.com      commercial.wachovia.com          wellsoffice.wellsfargo.com
mandtbank.com          online.corp.westpac.com          paymentech.com
appliedbank.com        heartlandmerchantcenter.com      reporting.worldpay.us
firstnational.com      merchante-solutions.com          portal.mercurypay.com
1fbusa.com             logon.merrickbank.com            mybmwcard.com
gotomycard.com         cardmemberservices.net           nordstromcard.com
statefarm.com          tnbonlinebanking.com             accountcentralonline.com
chase.com              wellsfargofinancialcards.com     credit.compassbank.com
rcam.target.com        partnercardservices.com          accessmycardonline.com
creditcards.citi.com   commercebank.com                 hsbccreditcard.com
neteller.com           mypremiercreditcard.com          penfed.org
bankofamerica.com      hsbc.com                         huntington.com
usaa.com               citibank.com                     paypal.com
Adversary Attributes
• Advanced
   •   Well funded adversary
   •   Advanced technical capabilities
   •   Ability to identify zero-day exploits
   •   Weaponize exploits
   •   Trained professionals
   •   Backing of nation state or organized crime
• Persistent
   • Sustained presence with target organization
   • Remains undetected
   • Takes time needed reach objective and exfiltrate information
• Threat
   • Covert threat or alteration of sensitive information
      • Political or military advantage
      • Strategic or tactical advantage
      • Economic advantage or financial gain
                                                                    34
Can a system be completely secure?



 “The only secure system is one that is powered
   off, cast in a block of concrete and sealed in a
   lead-lined room with armed guards – and
   even then I have my doubts.”

             Gene Spafford – Purdue University
Getting in can be easy…
The malware code was obfuscated:
Encoded: Zero AV Detection
Decoded: detected by 8 of 43 AV engines
Blackhole Explotation Kit
Social Engineering:


• Manipulating people into performing actions
  or divulging confidential information
• Pretexting: creating an invented story to
  engage a target in a way that makes them
  more likely to divulge the desired information.
• Usually involves: sympathy, intimidation,
  flattery, or fear
• Most companies are vulnerable to SE
Example SE scenario…


 What would you do if…
 • Receive call from your Helpdesk
 • Caller ID shows correct number
 • Said there is suspicious activity coming
   from your computer, need you to run a
   scan by visiting the following URL.
 • http://onlinesecurityscanner.com
Example SE scenario…



 • After the scan runs, you are informed that
   your system checked out fine. Sorry for the
   inconvenience.

 For more info on Social Engineering:
     http://social-engineer.org
Topics / Agenda
  Heartland Payment Systems
     – Who is Heartland Payment Systems?
     – What Happened in the Heartland Breach?
     – What Did We Do About It?
     – What Are We Doing Now?
     – Key Risk Mitigations
     – Information Sharing – how it works

  Is your company a target?
      – Some current threats
      – Breach Statistics

  Information Security Perspective
Are attacks on the rise?


• Increased media coverage over the last year
  – Much like “shark attack” coverage


• New motivations
  – Political
  – Limelight / Ego
  – Embarrassment
  – Retaliation
Are attacks on the rise…???


   The number of incidents reported has
    been increasing

   • 2010 – 800 new compromise incidents

   • 2004-09 - just over 900



source: 2011 Verizon DBIR
Records Compromised


  • The total number of records
    compromised annually has declined

       2011 – 4 million
       2010 – 144 million
       2009 – 361 million




source: 2011 Verizon DBIR
Who is behind data breaches?


                            • 92% - stemmed from
                              external agents
                              (+22%)

                            • 17% - implicated
                              insiders (-31%)

                            • <1% - resulted from
                              business partners
                              (-10%)


source: 2011 Verizon DBIR
How do breaches occur?

   • 50% utilized some form of hacking (+10%)

   • 49% incorporated malware (+11%)

   • 29% involved physical attacks (+14%)

   • 17% resulted from privilege misuse (-31%)

   • 11% employed social tactics (-17%)

source: 2011 Verizon DBIR
How do breaches occur?

 83% of victims were targets of opportunity
 92% of attacks were not highly difficult (+7%)
 76% of all data was compromised from servers
     (-22%)
 86% were discovered by a third party (+25%)
 96% of breaches were avoidable through simple
     or intermediate controls
 89% of victims subject to PCI-DSS had not
     achieved compliance (+10%)


source: 2011 Verizon DBIR
Where should mitigations be focused?

   Eliminate unnecessary data
   Ensure essential controls are met
   Check the above again
   Assess remote access services
   Test and review web applications
   Audit user accounts and monitor privileged
    activity
   Monitor and mine event logs
   Examine ATMs and other payment card input
    devices for tampering
source: 2011 Verizon DBIR
Topics / Agenda
  Heartland Payment Systems
     – Who is Heartland Payment Systems?
     – What Happened in the Heartland Breach?
     – What Did We Do About It?
     – What Are We Doing Now?
     – Key Risk Mitigations
     – Information Sharing – how it works

  Is your company a target?
      – Some current threats
      – Breach Statistics

  Information Security Perspective
Ever work with a security guy like this?
Information Security Balance


   Purpose is to secure assets without
    adversely affecting business functions.


Ultimate                            Needs of a
Security                            Business
Information Security Balance
Security Systems
    Firewalls
    IPS
    FIM
    Software Agents
    Malware Appliances
    Static/Dynamic Code Analyzers
    Vulnerability Scanners
    WAF
    DLP
    SIEM
    Anti-Virus
Security Systems

  • Purchasing a “checklist” of security
    devices is not enough..!

  • You need skilled personnel to manage
    these devices.

  • Most of these technologies require a
    large amount of time to manage
    effectively.
Summary

• Businesses can recover from a major breach
   • HPS has recovered and is growing
   • PCI Security Standards Council Board of Advisors
   • FS-ISAC Board of Directors

• Every company is a target, make yours a hard one
   • Assume you have been compromised
   • Focus on detection, data elimination

• Get involved
   • Information Sharing (FS-ISAC, PPISC, Infragard)
   • Local security chapters
     ISSA, ISACA, OWASP
                                                        58
Thank you!

     Brian.Blankenship@e-hps.com

Mais conteúdo relacionado

Semelhante a How to Rebuild the Controls and Confidence after Data Exfiltration Occurs

02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics
acfesj
 
Income Tax Fraud: Awareness, Preparedness, Prevention and Detection
Income Tax Fraud: Awareness, Preparedness, Prevention and DetectionIncome Tax Fraud: Awareness, Preparedness, Prevention and Detection
Income Tax Fraud: Awareness, Preparedness, Prevention and Detection
Vivastream
 

Semelhante a How to Rebuild the Controls and Confidence after Data Exfiltration Occurs (20)

First Data C-Store
First Data C-Store First Data C-Store
First Data C-Store
 
02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics02/18/2010 Meeting - Data Analytics
02/18/2010 Meeting - Data Analytics
 
Workinvoice - What Matters in Fintech
Workinvoice - What Matters in FintechWorkinvoice - What Matters in Fintech
Workinvoice - What Matters in Fintech
 
Corporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber SecurityCorporate Treasurers Focus on Cyber Security
Corporate Treasurers Focus on Cyber Security
 
Wealth management onboarding webinar jan262011
Wealth management onboarding webinar jan262011Wealth management onboarding webinar jan262011
Wealth management onboarding webinar jan262011
 
Innovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud DetectionInnovation Around Data and AI for Fraud Detection
Innovation Around Data and AI for Fraud Detection
 
Regulatory Hot Topics 2012
Regulatory Hot Topics 2012Regulatory Hot Topics 2012
Regulatory Hot Topics 2012
 
Role of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve HowseRole of The Board In IT Governance & Cyber Security-Steve Howse
Role of The Board In IT Governance & Cyber Security-Steve Howse
 
First Data QSR
First Data QSR First Data QSR
First Data QSR
 
Quantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal DataQuantifying Cyber Risk, Insurance and The Value of Personal Data
Quantifying Cyber Risk, Insurance and The Value of Personal Data
 
Running with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needsRunning with Scissors: Balance between business and InfoSec needs
Running with Scissors: Balance between business and InfoSec needs
 
From Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data ForumFrom Near to Maturity - Presentation to European Data Forum
From Near to Maturity - Presentation to European Data Forum
 
RChain Developer Conference pithia investments 04-2018
RChain Developer Conference   pithia investments 04-2018RChain Developer Conference   pithia investments 04-2018
RChain Developer Conference pithia investments 04-2018
 
Ibm data governance framework
Ibm data governance frameworkIbm data governance framework
Ibm data governance framework
 
Income Tax Fraud: Awareness, Preparedness, Prevention and Detection
Income Tax Fraud: Awareness, Preparedness, Prevention and DetectionIncome Tax Fraud: Awareness, Preparedness, Prevention and Detection
Income Tax Fraud: Awareness, Preparedness, Prevention and Detection
 
The Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card DataThe Easy WAy to Accept & Protect Credit Card Data
The Easy WAy to Accept & Protect Credit Card Data
 
It's Time the Data Center Gets the "Moneyball" Treatment
It's Time the Data Center Gets the "Moneyball" TreatmentIt's Time the Data Center Gets the "Moneyball" Treatment
It's Time the Data Center Gets the "Moneyball" Treatment
 
Can Financial Institutions be the next Digital Masters? Capgemini says YES
Can Financial Institutions be the next Digital Masters? Capgemini says YESCan Financial Institutions be the next Digital Masters? Capgemini says YES
Can Financial Institutions be the next Digital Masters? Capgemini says YES
 
Entrepreneurship 101 - The Market Research Business
Entrepreneurship 101 - The Market Research BusinessEntrepreneurship 101 - The Market Research Business
Entrepreneurship 101 - The Market Research Business
 
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas JamborData Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
Data Breaches - Sageworks, Inc., Webinar Series by Douglas Jambor
 

Mais de InnoTech

Mais de InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 

Último

VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
dipikadinghjn ( Why You Choose Us? ) Escorts
 
Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432
motiram463
 

Último (20)

Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Koregaon Park Call Me 7737669865 Budget Friendly No Advance Booking
 
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
Kharghar Blowjob Housewife Call Girls NUmber-9833754194-CBD Belapur Internati...
 
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Wadgaon Sheri  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Wadgaon Sheri 6297143586 Call Hot Ind...
 
falcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunitiesfalcon-invoice-discounting-unlocking-prime-investment-opportunities
falcon-invoice-discounting-unlocking-prime-investment-opportunities
 
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...
Call Girls Service Pune ₹7.5k Pick Up & Drop With Cash Payment 9352852248 Cal...
 
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
20240419-SMC-submission-Annual-Superannuation-Performance-Test-–-design-optio...
 
7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options7 tips trading Deriv Accumulator Options
7 tips trading Deriv Accumulator Options
 
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
Kopar Khairane Russian Call Girls Number-9833754194-Navi Mumbai Fantastic Unl...
 
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
VIP Independent Call Girls in Taloja 🌹 9920725232 ( Call Me ) Mumbai Escorts ...
 
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
VIP Independent Call Girls in Andheri 🌹 9920725232 ( Call Me ) Mumbai Escorts...
 
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
( Jasmin ) Top VIP Escorts Service Dindigul 💧 7737669865 💧 by Dindigul Call G...
 
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
Vasai-Virar High Profile Model Call Girls📞9833754194-Nalasopara Satisfy Call ...
 
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbaiVasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
Vasai-Virar Fantastic Call Girls-9833754194-Call Girls MUmbai
 
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...Top Rated  Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
Top Rated Pune Call Girls Viman Nagar ⟟ 6297143586 ⟟ Call Me For Genuine Sex...
 
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
VIP Call Girl in Mumbai Central 💧 9920725232 ( Call Me ) Get A New Crush Ever...
 
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
VIP Call Girl Service Andheri West ⚡ 9920725232 What It Takes To Be The Best ...
 
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
VIP Call Girl in Mumbai 💧 9920725232 ( Call Me ) Get A New Crush Everyday Wit...
 
W.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdfW.D. Gann Theory Complete Information.pdf
W.D. Gann Theory Complete Information.pdf
 
Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432Best VIP Call Girls Morni Hills Just Click Me 6367492432
Best VIP Call Girls Morni Hills Just Click Me 6367492432
 
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
Mira Road Awesome 100% Independent Call Girls NUmber-9833754194-Dahisar Inter...
 

How to Rebuild the Controls and Confidence after Data Exfiltration Occurs

  • 1. How to Rebuild the Controls and Confidence after Data Exfiltration Occurs Brian Blankenship Operations Information Security Officer Heartland Payment Systems
  • 2. Dump truck racing = InfoSec Career
  • 3. Topics / Agenda Heartland Payment Systems – Who is Heartland Payment Systems? – What Happened in the Heartland Breach? – What Did We Do About It? – What Are We Doing Now? – Key Risk Mitigations – Information Sharing – how it works Is your company a target? – Some current threats – Breach Statistics Information Security Perspective
  • 4. Topics / Agenda Heartland Payment Systems – Who is Heartland Payment Systems? – What Happened in the Heartland Breach? – What Did We Do About It? – What Are We Doing Now? – Key Risk Mitigations – Information Sharing – how it works Is your company a target? – Some current threats – Breach Statistics Information Security Perspective
  • 5. Heartland – A Full Service Payments Processor • Card Processing • Credit/debit/prepaid cards: • Process over 10 million transactions a day • Process over 3.9 billion transactions annually • Payroll Processing (PlusOne Payroll) • Check Management (Check 21, ExpressFunds, StopLoss) • Online Payment Processing • MicroPayments – Vending, Laundry, Campus Solutions • Gift Cards and Loyalty Processing • Heartland Gives Back 5
  • 6. Heartland – Our People • HQ: Princeton, NJ • IT: Plano, TX • 300 employees • Servicing: Louisville, KY • 800 employees • Heartland Cares Foundation
  • 7. Heartland - 15 Years Ago ... and Today 1997 (1st Trans 6/15/97) Today • 2,350 clients 255,000 clients • 25 employees 3000+ employees • #62 in US #5 processor in U.S. • $0.4 billion portfolio $68 billion portfolio 7
  • 8. Heartland - Financials Net Revenue Net Income EPS 1.08 41,840 0.90 383,708 35,870 0.71 28,544 294,771 0.50 245,652 0.26 19,093 186,486 137,796 8,855 2004 2005 2006 2007 2008
  • 9. Heartland – EPS in 2009… Heartland CEO’s granddaughter
  • 10. Heartland – The Recovery • 2009 • Total Revenues $1,652 m (up 6.93%*) • Net Income -52 m (down 224%) • EPS -1.38 (down 223%) • 2010 • Total Revenues $1,864 m (up 12.8%) • Net Income 35 m (up 167%) • EPS 0.88 (up 163%) • 2011 • Total Revenues $1,996 m (up 7.1%) • Net Income 44 m (up 25.7%) • EPS 1.09 (up 23.9%) *All percentages year-over-year 10
  • 11. Topics / Agenda Heartland Payment Systems – Who is Heartland Payment Systems? – What Happened in the Heartland Breach? – What Did We Do About It? – What Are We Doing Now? – Key Risk Mitigations – Information Sharing – how it works Is your company a target? – Some current threats – Breach Statistics Information Security Perspective
  • 12. The Threat It’s all about the money ….
  • 13. What Happened? – The Penetration  Very Late 2007 – SQL Injection via a customer facing web page in our corporate (non-payments) environment. Bad guys were in our corporate network.  Early 2008 – Hired largest approved QSA to perform penetration testing of corporate environment  Spring 2008 – CEO learned of Sniffer Attack on Hannaford’s , Created a Dedicated Chief Security Officer Position and filled that position  April 30, 2008 – Passed 6th Consecutive “Annual Review” by Largest QSA  Very Late 2007 – Mid-May 2008 – Unknown period but it is possible that bad guys were studying the corporate network  Mid-May 2008 – Penetration of our Payments Network
  • 14. What Happened? The Investigation and The Announcement  Late October 2008 – Informed by a card brand that several issuers suspected a potential breach of one or more processors. We received sample fraud transactions to help us determine if there was a problem in our payments network. Many of these transactions never touched our payments network.  No evidence could be found of an intrusion despite vigorous efforts by HPS employees and then two forensics companies to find a problem.  January 9, 2009 – We were told by QIRA that “no problems were found” and that a final report reflecting that opinion would be forthcoming.  January 12, 2009 – January 20, 2009 – Learned of breach, notified card brands, notified law enforcement and made public announcement.
  • 15. Why I came to Heartland… • The way the breach was handled • High degree of transparency • Knew that security would be #1 priority • Heartland was changing the perception of breaches, and how they should be handled
  • 16. Topics / Agenda Heartland Payment Systems – Who is Heartland Payment Systems? – What Happened in the Heartland Breach? – What Did We Do About It? – What Are We Doing Now? – Key Risk Mitigations – Information Sharing – how it works Is your company a target? – Some current threats – Breach Statistics Information Security Perspective
  • 17. PANIC DENIAL ANGER BARGAINING DEPRESSION ACCEPTANCE FIX THE PROBLEM
  • 18. Vectors of Trust • After any major incident, there are multiple vectors of trust that have to be rebuilt – Trust from your customers – Trust from your investors – Trust from your own employees – Trust from your competitors • Heartland has worked hard to rebuild these
  • 19. The Real Response  1/20/09 - Call to arms of all Heartland employees to visit clients and talk to partners  HPY share price drops from $15.16 on 1/16 to $8.18 on 1/22  HPY 4Q08 Earnings Call – HPY drops to $3.43 on March 12; a 77.6% drop since the breach announcement  3/14/09 – Delisted from Visa list of approved vendors  4/30/09 – Certified PCI compliant by VeriSign and reinstated on Visa list of approved vendors  5/11/12 – HPY Closed at $30.41
  • 20. Topics / Agenda Heartland Payment Systems – Who is Heartland Payment Systems? – What Happened in the Heartland Breach? – What Did We Do About It? – What Are We Doing Now? – Key Risk Mitigations – Information Sharing – how it works Is your company a target? – Some current threats – Breach Statistics Information Security Perspective
  • 21. Industry Security Advancements • Chip & PIN (EMV) – Helps authenticate the card • Tokenization – Reduces risk of storing card data • Both help, but don’t address data in transit
  • 22. Heartland Approach to E3 • End to End Encryption E3 Security • Continuous protection of the confidentiality and integrity of Model transmitted information by encrypting at the origin and decrypting at the destination. • Build devices that use Tamper Resistant Security Modules E3 Device to encrypt payment data at the point of swipe or data entry. • Collaborate with existing device vendors and encryption Strategy solution providers. • Protect cardholder and merchant data wherever it E3 Data resides on Heartland’s systems. • Directly influence industry security standards and Strategy practices to strengthen data protection.
  • 23. Merchant Bill of Rights, Sales Professional Bill of Rights, Durbin http://www.spbor.com/ http://www.merchantbillofrights.org/ http://getyourdurbindollars.com/
  • 24. Topics / Agenda Heartland Payment Systems – Who is Heartland Payment Systems? – What Happened in the Heartland Breach? – What Did We Do About It? – What Are We Doing Now? – Key Risk Mitigations – Information Sharing – how it works Is your company a target? – Some current threats – Breach Statistics Information Security Perspective
  • 25. Key Risk Mitigations  Data Loss Prevention  Network and Application Penetration Testing  Platform Security  Static and Dynamic Code Analysis
  • 26. Topics / Agenda Heartland Payment Systems – Who is Heartland Payment Systems? – What Happened in the Heartland Breach? – What Did We Do About It? – What Are We Doing Now? – Key Risk Mitigations – Information Sharing – how it works Is your company a target? – Some current threats – Breach Statistics Information Security Perspective
  • 27. The New Paradigm • During investigation of Heartland breach • Found other processors knew of the breach indicators • Several had seen or know about them • No one shared that information • Started the PPISC (Payment Processors Information Sharing Council) in 2009 • Charter – bring processors to table to discuss threat indicators and tactics • Avoid any discussion on business related topics to avoid anti-trust • Everyone brings to table topics that they are seeing through their various intel sources (internal and external) 27
  • 28. Intelligence Sharing – PPISC  Malware signatures currently being shared with input of Secret Service and other agencies  Participation in threat exercises (CAPP – Cyber Attack Against Payment Processes)
  • 29. Changes in Breach Perceptions • For Heartland, the impact was immediate and very high • People have come to understand that any company can be breached • Acceptance becoming the norm
  • 30. Topics / Agenda Heartland Payment Systems – Who is Heartland Payment Systems – What Happened in the Heartland Breach – What Did We Do About It? – What Are We Doing Now? – Key Risk Mitigations – Information Sharing – how it works Is your company a target? – Some current threats – Breach Statistics Information Security Perspective
  • 31. Targeted Attacks Is your company a target…?
  • 32.
  • 33. SpyEye: targets financial institutions northerntrust.com treasury.pncbank.com ssl.selectpayment.com svbconnect.com onlinebanking.banksterling.com texascapitalbank.com web-access.com nashvillecitizensbank.com singlepoint.usbank.com sso.unionbank.com commercial.wachovia.com wellsoffice.wellsfargo.com mandtbank.com online.corp.westpac.com paymentech.com appliedbank.com heartlandmerchantcenter.com reporting.worldpay.us firstnational.com merchante-solutions.com portal.mercurypay.com 1fbusa.com logon.merrickbank.com mybmwcard.com gotomycard.com cardmemberservices.net nordstromcard.com statefarm.com tnbonlinebanking.com accountcentralonline.com chase.com wellsfargofinancialcards.com credit.compassbank.com rcam.target.com partnercardservices.com accessmycardonline.com creditcards.citi.com commercebank.com hsbccreditcard.com neteller.com mypremiercreditcard.com penfed.org bankofamerica.com hsbc.com huntington.com usaa.com citibank.com paypal.com
  • 34. Adversary Attributes • Advanced • Well funded adversary • Advanced technical capabilities • Ability to identify zero-day exploits • Weaponize exploits • Trained professionals • Backing of nation state or organized crime • Persistent • Sustained presence with target organization • Remains undetected • Takes time needed reach objective and exfiltrate information • Threat • Covert threat or alteration of sensitive information • Political or military advantage • Strategic or tactical advantage • Economic advantage or financial gain 34
  • 35. Can a system be completely secure? “The only secure system is one that is powered off, cast in a block of concrete and sealed in a lead-lined room with armed guards – and even then I have my doubts.” Gene Spafford – Purdue University
  • 36. Getting in can be easy…
  • 37. The malware code was obfuscated:
  • 38. Encoded: Zero AV Detection
  • 39. Decoded: detected by 8 of 43 AV engines
  • 41. Social Engineering: • Manipulating people into performing actions or divulging confidential information • Pretexting: creating an invented story to engage a target in a way that makes them more likely to divulge the desired information. • Usually involves: sympathy, intimidation, flattery, or fear • Most companies are vulnerable to SE
  • 42. Example SE scenario… What would you do if… • Receive call from your Helpdesk • Caller ID shows correct number • Said there is suspicious activity coming from your computer, need you to run a scan by visiting the following URL. • http://onlinesecurityscanner.com
  • 43. Example SE scenario… • After the scan runs, you are informed that your system checked out fine. Sorry for the inconvenience. For more info on Social Engineering: http://social-engineer.org
  • 44. Topics / Agenda Heartland Payment Systems – Who is Heartland Payment Systems? – What Happened in the Heartland Breach? – What Did We Do About It? – What Are We Doing Now? – Key Risk Mitigations – Information Sharing – how it works Is your company a target? – Some current threats – Breach Statistics Information Security Perspective
  • 45. Are attacks on the rise? • Increased media coverage over the last year – Much like “shark attack” coverage • New motivations – Political – Limelight / Ego – Embarrassment – Retaliation
  • 46. Are attacks on the rise…??? The number of incidents reported has been increasing • 2010 – 800 new compromise incidents • 2004-09 - just over 900 source: 2011 Verizon DBIR
  • 47. Records Compromised • The total number of records compromised annually has declined  2011 – 4 million  2010 – 144 million  2009 – 361 million source: 2011 Verizon DBIR
  • 48. Who is behind data breaches? • 92% - stemmed from external agents (+22%) • 17% - implicated insiders (-31%) • <1% - resulted from business partners (-10%) source: 2011 Verizon DBIR
  • 49. How do breaches occur? • 50% utilized some form of hacking (+10%) • 49% incorporated malware (+11%) • 29% involved physical attacks (+14%) • 17% resulted from privilege misuse (-31%) • 11% employed social tactics (-17%) source: 2011 Verizon DBIR
  • 50. How do breaches occur? 83% of victims were targets of opportunity 92% of attacks were not highly difficult (+7%) 76% of all data was compromised from servers (-22%) 86% were discovered by a third party (+25%) 96% of breaches were avoidable through simple or intermediate controls 89% of victims subject to PCI-DSS had not achieved compliance (+10%) source: 2011 Verizon DBIR
  • 51. Where should mitigations be focused?  Eliminate unnecessary data  Ensure essential controls are met  Check the above again  Assess remote access services  Test and review web applications  Audit user accounts and monitor privileged activity  Monitor and mine event logs  Examine ATMs and other payment card input devices for tampering source: 2011 Verizon DBIR
  • 52. Topics / Agenda Heartland Payment Systems – Who is Heartland Payment Systems? – What Happened in the Heartland Breach? – What Did We Do About It? – What Are We Doing Now? – Key Risk Mitigations – Information Sharing – how it works Is your company a target? – Some current threats – Breach Statistics Information Security Perspective
  • 53. Ever work with a security guy like this?
  • 54. Information Security Balance Purpose is to secure assets without adversely affecting business functions. Ultimate Needs of a Security Business
  • 56. Security Systems  Firewalls  IPS  FIM  Software Agents  Malware Appliances  Static/Dynamic Code Analyzers  Vulnerability Scanners  WAF  DLP  SIEM  Anti-Virus
  • 57. Security Systems • Purchasing a “checklist” of security devices is not enough..! • You need skilled personnel to manage these devices. • Most of these technologies require a large amount of time to manage effectively.
  • 58. Summary • Businesses can recover from a major breach • HPS has recovered and is growing • PCI Security Standards Council Board of Advisors • FS-ISAC Board of Directors • Every company is a target, make yours a hard one • Assume you have been compromised • Focus on detection, data elimination • Get involved • Information Sharing (FS-ISAC, PPISC, Infragard) • Local security chapters ISSA, ISACA, OWASP 58
  • 59. Thank you! Brian.Blankenship@e-hps.com