SlideShare uma empresa Scribd logo
1 de 42
April 26th, 2016
Security Awareness
Security is the degree of resistance to, or protection from, harm.
…if security breaks down, technology breaks down
• Current Security Landscape
• The Impact of Data Breach or Data Loss
• Raise everyone’s overall awareness
• Security risks
• Techniques to reduce risk
• Changes in Strategy
• What we should and can be doing?
Goal for Today
Protecting People, Property and Business Assets
“The AV-TEST Institute registers over 390,000 new
malicious programs every day”
Security is a Growing Concern
https://www.av-test.org
Malware has Changed
Then
• Low Business Impact
• Less Sophisticated
• Targeted PC’s
Now
• High Business Impact
• High Sophistication
• Targets Data
High Visibility Low
ThenOrganizationalRiskNow
Active malware trends
over the last 10 years
Security is a Growing Concern
Malware development trends
over the last 10 years
Security is a Growing Concern
• Businesses ability recover
• Brand damage
• Associated Costs
The Impact of Data
Breach or Data Loss
Cost of
Breaches
32% of organizations have reported cyber-crime
Attackers Evolve, Adapt and Accelerate
• Attackers are nimble, opportunistic,
cooperative, skilled and relentless
• Their motivation, resiliency, and creativity
drives great adaptability
• Acceleration in their methods, tools, and
targets (technology, people, processes)
Attackers Evolve, Adapt and Accelerate
• Dark markets and services grow
• New data breach targets emerge
• Attacks will drive down the technology stack
• Data
• Apps
• Operating Systems
• Firmware
• Hardware
• Ransomware and “CEO email” fraud rises
• 80% of Infections stem from massive e-
mail attacks
• Phishing vs Spear Phishing
• Attackers are aware of 3rd party
relationships between large targets and
smaller service providers
Phishing
Phishing
Phishing
Phishing
Phishing
Services for sale
Need a credit card ?
Another
Scary
Fact
Background
Security goes back
as far a man kind.
The Traditional Approach to Security
Internet
Firewall
Antivirus
Early Defense in Depth
Defense in Depth Example
Internet
Firewall
Antivirus
Antispyware
Intrusion Prevention
Antivirus &
Antimalware
Defense in Depth
The idea behind “Defense in
Depth” is to defend your data
and systems against any
particular attack, using several
independent methods
Perimeter
Internal
Network
Endpoint
•Firewall
•CGSS
•IPS
•Policies
•Access Rights
•Monitoring
•Antivirus
•Anti Malware
•Cloud Security
Why is all this
important?
The United States
is the most
targeted country
in the world.
Fireeye Cyber Threat Map
Who are we trying to
protect from?
• Nation States
• Insiders
• Organized Crime
• Other Companies
• Thrill Seekers
• Notoriety
• Political Activists
How do they do it?
• Poorly configured systems using default passwords
and settings which are weak
• Exploit known vulnerabilities which are easy to find
• Metasploit
• CGE (Cisco Global Exploiter)
• Password cracking tools to break weak passwords
• Social engineering / Email
• Planting infection in web sites
• Real examples
• Train Network Users to have a healthy level of skepticism
• Keep Software up to date
• Least privileged access
• Encrypt Data in transit & on mobile devices
• Segment & Isolate Networks
• Documented and Tested DR Plan
• Regular tests/auditing to ensure measures are effective
• Data Loss Protection tools
Tools and Techniques Summary
• Seek an optimal balance of Risk/Cost for your business
• Understand what we are protecting
• Treat security as on going concern
• Not a set it and forget it
• Ongoing Security Awareness Training
Summary
Will Anyone Out There Take on the Rest of My Risk?
Why Cyber/Privacy Breach Liability
Insurance?
• Both the federal government, and each of the 50 states, impose certain actions upon
persons/entities/businesses/agencies who maintain personal information on systems or
computers in the event of a breach or suspected breach.
• “Certain actions” could include written notice to all impacted individuals, purchase of individual
identification protection for 1 year (“Lifelock”), credit report monitoring for each impacted
individual, and monetary responsibility for financial losses to the impacted individuals.
• There is NO insurance coverage for any of these items absent a cyber/privacy breach liability
policy.
• The existence of statute and the absence of insurance creates an unfunded potential liability.
What Perils Will Cyber/Privacy Breach
Insure For?
• Liability imposed by statute
• Regulatory defense and penalties
• PCI fines and expenses
• Notification of Individuals expenses
• Legal services/crisis management/public relations services.
• Cyber extortion
• Specific coverage parts can be bought “ala carte” or are offered as a
“bundle” depending on specific need.
What Perils will Cyber/Privacy breach
NOT Insure for?
• Failure to perform professional duties in a satisfactory
manner. (Ex: systems designs, software build).
• Loss of digital assets (data).
• Loss of revenue (unless specifically added to the cyber policy).
• First party theft of money/securities.
Premium Drivers
• Revenues/Size of the organization or business.
• # of records/contacts in the possession of the entity.
• Past claim history.
• Industry group (low risk versus high risk).
• Limits of insurance purchased/deductibles taken.
• Specific coverage parts purchased.
• Presence of systems safeguards/professional handling of IT exposures.
Availability of Insurance
• Evolving market…some new entrants, some have left the market.
Some names you will recognize (AIG), some you will not (Beazley).
• Insurance policy, generally, has been adding more coverage in
recent years.
• Insurance pricing, generally, has declined a bit in recent years.
• Application process remains fairly simple: complete a written
application (2 to 10 pages), and provide any requested
documentation.
• If application is denied, carriers will tell you why.
Claim Examples
• Accounting firms: Systems are hacked…private info stolen.
• Ad Agency: Disgruntled employee provides ‘per click’ data to a
competitor of the firm’s client. Client sues for breach of
contract/confidentiality.
• Not For Profit Group: Loss of a donor list.
• Country club/golf course: Credit card transactions are hacked.
Loss of cash and private information.
• Hacking from outside/”inside job”/carelessness.
Cyber/Privacy Breach Insurance Impacts
• In 2011, 35% of all Zurich Ins. Co. survey respondents bought cyber
insurance; by 2015, the figure was 61%.
• Of cyber attacks experienced by 252 sample employers, 99% were
viruses/worms/trojans (high end) with 35% caused by malicious
insiders (low end). (Poneman Institute 2015 Study)
• Average claim cost due to cyber events were $1,388 per capita for
small firms; $431 per capita for large firms. (Poneman Institute 2015 Study)
THANK YOU TO OUR SPONSORS!
Live Hacking Demo

Mais conteĂşdo relacionado

Mais procurados

Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
RickWaldman
 

Mais procurados (20)

Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
Information Security Awareness
Information Security Awareness Information Security Awareness
Information Security Awareness
 
information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
IT Security and Risk Mitigation
IT Security and Risk MitigationIT Security and Risk Mitigation
IT Security and Risk Mitigation
 
Information security for dummies
Information security for dummiesInformation security for dummies
Information security for dummies
 
Executive Information Security Training
Executive Information Security TrainingExecutive Information Security Training
Executive Information Security Training
 
Raising information security awareness
Raising information security awarenessRaising information security awareness
Raising information security awareness
 
Cyber 101 for smb execs v1
Cyber 101 for smb execs v1Cyber 101 for smb execs v1
Cyber 101 for smb execs v1
 
IT Security - Guidelines
IT Security - GuidelinesIT Security - Guidelines
IT Security - Guidelines
 
Information security
Information securityInformation security
Information security
 
Information security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handoutInformation security awareness (sept 2012) bis handout
Information security awareness (sept 2012) bis handout
 
Information Technology Security Basics
Information Technology Security BasicsInformation Technology Security Basics
Information Technology Security Basics
 
Cyber Risks
Cyber RisksCyber Risks
Cyber Risks
 
How to assess and manage cyber risk
How to assess and manage cyber riskHow to assess and manage cyber risk
How to assess and manage cyber risk
 
Cyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutionsCyber Risk: Exposures, prevention, and solutions
Cyber Risk: Exposures, prevention, and solutions
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Social Engineering Audit & Security Awareness
Social Engineering Audit & Security AwarenessSocial Engineering Audit & Security Awareness
Social Engineering Audit & Security Awareness
 

Destaque

BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
Md Abu Syeem Dipu
 

Destaque (20)

Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
internet securityand cyber law Unit2
internet securityand  cyber law Unit2internet securityand  cyber law Unit2
internet securityand cyber law Unit2
 
IT Security Awareness - How to?
IT Security Awareness - How to?IT Security Awareness - How to?
IT Security Awareness - How to?
 
Chapter2 the need to security
Chapter2 the need to securityChapter2 the need to security
Chapter2 the need to security
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen CatheySocial Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
Social Engineering: The Human Element of Sourcing and Recruiting | Glen Cathey
 
Social engineering-Attack of the Human Behavior
Social engineering-Attack of the Human BehaviorSocial engineering-Attack of the Human Behavior
Social engineering-Attack of the Human Behavior
 
Cyber security awareness for students
Cyber security awareness for studentsCyber security awareness for students
Cyber security awareness for students
 
BASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESSBASIC IT AND CYBER SECURITY AWARENESS
BASIC IT AND CYBER SECURITY AWARENESS
 
Social Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case StudiesSocial Engineering - Strategy, Tactics, & Case Studies
Social Engineering - Strategy, Tactics, & Case Studies
 
10 Things to Watch for in 2016
10 Things to Watch for in 201610 Things to Watch for in 2016
10 Things to Watch for in 2016
 
Episode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.comEpisode 5 Justin Somaini of Box.com
Episode 5 Justin Somaini of Box.com
 
Zaptech Solutions - Software Development Company
Zaptech Solutions - Software Development CompanyZaptech Solutions - Software Development Company
Zaptech Solutions - Software Development Company
 
OpenStack 101 Presentation
OpenStack 101 PresentationOpenStack 101 Presentation
OpenStack 101 Presentation
 
Call Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone SystemCall Management Services Should be Part of Every Business Telephone System
Call Management Services Should be Part of Every Business Telephone System
 
Infographic: 10 Jaw-dropping Skype for Business Stats
Infographic: 10 Jaw-dropping Skype for Business StatsInfographic: 10 Jaw-dropping Skype for Business Stats
Infographic: 10 Jaw-dropping Skype for Business Stats
 
Embracing Mobile First
Embracing Mobile FirstEmbracing Mobile First
Embracing Mobile First
 
Optimizing the Monetization of a Connected Universe
Optimizing the Monetization of a Connected UniverseOptimizing the Monetization of a Connected Universe
Optimizing the Monetization of a Connected Universe
 
Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business Serve...
Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business  Serve...Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business  Serve...
Why Your Company MUST Upgrade Windows XP, Office 2003 & Small Business Serve...
 
Product Engineering
Product EngineeringProduct Engineering
Product Engineering
 

Semelhante a IT & Network Security Awareness

Semelhante a IT & Network Security Awareness (20)

Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?Hacking the Human - How Secure Is Your Organization?
Hacking the Human - How Secure Is Your Organization?
 
Protecting Your Business From Cyber Risks
Protecting Your Business From Cyber RisksProtecting Your Business From Cyber Risks
Protecting Your Business From Cyber Risks
 
A Look at Cyber Insurance -- A Corporate Perspective
A Look at Cyber Insurance -- A Corporate  PerspectiveA Look at Cyber Insurance -- A Corporate  Perspective
A Look at Cyber Insurance -- A Corporate Perspective
 
The Basics of Cyber Insurance
The Basics of Cyber InsuranceThe Basics of Cyber Insurance
The Basics of Cyber Insurance
 
Cybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for ExecutivesCybersecurity Roadmap Development for Executives
Cybersecurity Roadmap Development for Executives
 
Protecting Client Data 11.09.11
Protecting Client Data 11.09.11Protecting Client Data 11.09.11
Protecting Client Data 11.09.11
 
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnovProtecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
Protecting Accounting Firms and their Clients - Eric Vanderburg - JurInnov
 
CCIAOR Cyber Security Forum
CCIAOR Cyber Security ForumCCIAOR Cyber Security Forum
CCIAOR Cyber Security Forum
 
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
Discussing Cyber Risk Coverage With Your Commercial Clients by Steve Robinson...
 
Rcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_finalRcs triumfant watchful_webinar_final
Rcs triumfant watchful_webinar_final
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal CounselBug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
Bug Bounties, Ransomware, and Other Cyber Hype for Legal Counsel
 
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
MCCA Global TEC Forum - Bug Bounties, Ransomware, and Other Cyber Hype for Le...
 
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
Challenges in the Business and Law of Cybersecurity, CLEAR Cyber Conference, ...
 
CYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMSCYBER SECURITY FOR LAW FIRMS
CYBER SECURITY FOR LAW FIRMS
 
Netwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital worldNetwealth educational webinar: Peace of mind in a digital world
Netwealth educational webinar: Peace of mind in a digital world
 
Event Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control SystemsEvent Presentation: Cyber Security for Industrial Control Systems
Event Presentation: Cyber Security for Industrial Control Systems
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptxCyber Security – Challenges [Autosaved].pptx
Cyber Security – Challenges [Autosaved].pptx
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 

Último

VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
singhpriety023
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
SUHANI PANDEY
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Call Girls In Delhi Whatsup 9873940964 Enjoy Unlimited Pleasure
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
SUHANI PANDEY
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
nilamkumrai
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
SUHANI PANDEY
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...Russian Call Girls Pune  (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
Russian Call Girls Pune (Adult Only) 8005736733 Escort Service 24x7 Cash Pay...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
Thalassery Escorts Service ☎️ 6378878445 ( Sakshi Sinha ) High Profile Call G...
 
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
Ganeshkhind ! Call Girls Pune - 450+ Call Girl Cash Payment 8005736733 Neha T...
 
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrStory Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
Story Board.pptxrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrrr
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service AvailableCall Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
Call Girls Ludhiana Just Call 98765-12871 Top Class Call Girl Service Available
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
( Pune ) VIP Baner Call Girls 🎗️ 9352988975 Sizzling | Escorts | Girls Are Re...
 
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
Shikrapur - Call Girls in Pune Neha 8005736733 | 100% Gennuine High Class Ind...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Trump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts SweatshirtTrump Diapers Over Dems t shirts Sweatshirt
Trump Diapers Over Dems t shirts Sweatshirt
 
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort ServiceCall Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
Call Girls in Prashant Vihar, Delhi 💯 Call Us 🔝9953056974 🔝 Escort Service
 
20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf20240508 QFM014 Elixir Reading List April 2024.pdf
20240508 QFM014 Elixir Reading List April 2024.pdf
 

IT & Network Security Awareness

  • 1. April 26th, 2016 Security Awareness Security is the degree of resistance to, or protection from, harm. …if security breaks down, technology breaks down
  • 2.
  • 3. • Current Security Landscape • The Impact of Data Breach or Data Loss • Raise everyone’s overall awareness • Security risks • Techniques to reduce risk • Changes in Strategy • What we should and can be doing? Goal for Today Protecting People, Property and Business Assets
  • 4. “The AV-TEST Institute registers over 390,000 new malicious programs every day” Security is a Growing Concern https://www.av-test.org
  • 5. Malware has Changed Then • Low Business Impact • Less Sophisticated • Targeted PC’s Now • High Business Impact • High Sophistication • Targets Data High Visibility Low ThenOrganizationalRiskNow
  • 6. Active malware trends over the last 10 years Security is a Growing Concern
  • 7. Malware development trends over the last 10 years Security is a Growing Concern
  • 8. • Businesses ability recover • Brand damage • Associated Costs The Impact of Data Breach or Data Loss
  • 9. Cost of Breaches 32% of organizations have reported cyber-crime
  • 10. Attackers Evolve, Adapt and Accelerate • Attackers are nimble, opportunistic, cooperative, skilled and relentless • Their motivation, resiliency, and creativity drives great adaptability • Acceleration in their methods, tools, and targets (technology, people, processes)
  • 11. Attackers Evolve, Adapt and Accelerate • Dark markets and services grow • New data breach targets emerge • Attacks will drive down the technology stack • Data • Apps • Operating Systems • Firmware • Hardware • Ransomware and “CEO email” fraud rises
  • 12. • 80% of Infections stem from massive e- mail attacks • Phishing vs Spear Phishing • Attackers are aware of 3rd party relationships between large targets and smaller service providers Phishing
  • 18. Need a credit card ?
  • 19.
  • 21.
  • 23. The Traditional Approach to Security Internet Firewall Antivirus
  • 25. Defense in Depth Example Internet Firewall Antivirus Antispyware Intrusion Prevention Antivirus & Antimalware
  • 26. Defense in Depth The idea behind “Defense in Depth” is to defend your data and systems against any particular attack, using several independent methods Perimeter Internal Network Endpoint •Firewall •CGSS •IPS •Policies •Access Rights •Monitoring •Antivirus •Anti Malware •Cloud Security
  • 27. Why is all this important?
  • 28. The United States is the most targeted country in the world. Fireeye Cyber Threat Map
  • 29. Who are we trying to protect from? • Nation States • Insiders • Organized Crime • Other Companies • Thrill Seekers • Notoriety • Political Activists
  • 30. How do they do it? • Poorly configured systems using default passwords and settings which are weak • Exploit known vulnerabilities which are easy to find • Metasploit • CGE (Cisco Global Exploiter) • Password cracking tools to break weak passwords • Social engineering / Email • Planting infection in web sites • Real examples
  • 31. • Train Network Users to have a healthy level of skepticism • Keep Software up to date • Least privileged access • Encrypt Data in transit & on mobile devices • Segment & Isolate Networks • Documented and Tested DR Plan • Regular tests/auditing to ensure measures are effective • Data Loss Protection tools Tools and Techniques Summary
  • 32. • Seek an optimal balance of Risk/Cost for your business • Understand what we are protecting • Treat security as on going concern • Not a set it and forget it • Ongoing Security Awareness Training Summary
  • 33. Will Anyone Out There Take on the Rest of My Risk?
  • 34. Why Cyber/Privacy Breach Liability Insurance? • Both the federal government, and each of the 50 states, impose certain actions upon persons/entities/businesses/agencies who maintain personal information on systems or computers in the event of a breach or suspected breach. • “Certain actions” could include written notice to all impacted individuals, purchase of individual identification protection for 1 year (“Lifelock”), credit report monitoring for each impacted individual, and monetary responsibility for financial losses to the impacted individuals. • There is NO insurance coverage for any of these items absent a cyber/privacy breach liability policy. • The existence of statute and the absence of insurance creates an unfunded potential liability.
  • 35. What Perils Will Cyber/Privacy Breach Insure For? • Liability imposed by statute • Regulatory defense and penalties • PCI fines and expenses • Notification of Individuals expenses • Legal services/crisis management/public relations services. • Cyber extortion • Specific coverage parts can be bought “ala carte” or are offered as a “bundle” depending on specific need.
  • 36. What Perils will Cyber/Privacy breach NOT Insure for? • Failure to perform professional duties in a satisfactory manner. (Ex: systems designs, software build). • Loss of digital assets (data). • Loss of revenue (unless specifically added to the cyber policy). • First party theft of money/securities.
  • 37. Premium Drivers • Revenues/Size of the organization or business. • # of records/contacts in the possession of the entity. • Past claim history. • Industry group (low risk versus high risk). • Limits of insurance purchased/deductibles taken. • Specific coverage parts purchased. • Presence of systems safeguards/professional handling of IT exposures.
  • 38. Availability of Insurance • Evolving market…some new entrants, some have left the market. Some names you will recognize (AIG), some you will not (Beazley). • Insurance policy, generally, has been adding more coverage in recent years. • Insurance pricing, generally, has declined a bit in recent years. • Application process remains fairly simple: complete a written application (2 to 10 pages), and provide any requested documentation. • If application is denied, carriers will tell you why.
  • 39. Claim Examples • Accounting firms: Systems are hacked…private info stolen. • Ad Agency: Disgruntled employee provides ‘per click’ data to a competitor of the firm’s client. Client sues for breach of contract/confidentiality. • Not For Profit Group: Loss of a donor list. • Country club/golf course: Credit card transactions are hacked. Loss of cash and private information. • Hacking from outside/”inside job”/carelessness.
  • 40. Cyber/Privacy Breach Insurance Impacts • In 2011, 35% of all Zurich Ins. Co. survey respondents bought cyber insurance; by 2015, the figure was 61%. • Of cyber attacks experienced by 252 sample employers, 99% were viruses/worms/trojans (high end) with 35% caused by malicious insiders (low end). (Poneman Institute 2015 Study) • Average claim cost due to cyber events were $1,388 per capita for small firms; $431 per capita for large firms. (Poneman Institute 2015 Study)
  • 41. THANK YOU TO OUR SPONSORS!

Notas do Editor

  1. Jim…
  2. Jim….. Beside making everyone as paranoid as me, my goal here today is to….
  3. Buddy
  4. Buddy
  5. Buddy …. We focus a little more on malware because it can create back doors, exfiltrate data, slow systems down and more
  6. Buddy…..Comparison from 2012 thru today from a strategy standpoint and how we address
  7. Jim …. A data breach is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property etc. Costs of fines Insurance
  8. Jim…. Lots of statistics which vary somewhat but all convey the same message. Companies that experience an outage lasting more the 10 day days will have financial challenges 50% of those companies will be out of business in 5 years The National Cyber Security Alliance indicates 60% of small firms go out of business within 6 months of a breach 25% will never reopen after a major data loss 70% of small firms that experience a major data loss will go out of business in a year 85% of all breaches happen to small businesses In a 2015 study by IBM, they report the average cost for each record of lost or stolen records contain sensitive information and confidential information rose from 145 to $154 per record. The JP Morgan data breach in 2014 affected 76 million households and 7 million small businesses Now JPMorgan never announced the exact cost but they did announce a $250 million dollar a year spend on security. Now the math would indicate that breach cost them over 12.7 Billion dollars.
  9. Buddy
  10. Buddy… Malware for rent Customer support for malware Firmware/Hardware attacks are up in coming – lack of security on IoT devices – updates are required ----Shodan
  11. Buddy
  12. Buddy… Targeted or spear phishing example Automated vs manual
  13. Buddy
  14. Buddy
  15. We know stolen credit cards are a sought after commodity. What if you wanted to buy them? Here is a site that sells the stolen cards. They even guarantee that 80% of them will work!
  16. Here is a hacker for hire that does some messed up stuff:
  17. Jim…. Anybody want to guess the amount a time it took for a company to realize they have been breached… According to the same IBM study a malicious attack on average took 256 before it was discovered and breach….. Before anything was known
  18. Most of the time the detection is provided by a third party, like the FBI,
  19. Jim… Security is nothing new. It dates all the way back to the beginning of man kind when our friendly caveman carried a club to simply protect his cave.
  20. Jim or Buddy
  21. Jim As man developed so did the methods of protection that were required during whatever period we’re talking about. In medieval times there was armor and moots around castles. This may have been considered the beginning of defense in depth. You’d have to get through the armored guard outside the castle and somehow cross the alligator infested waters and then no doubt be met inside with additional resistance or protection before ever getting to the crown jewels. Its really this concept that we try to establish today when architecting IT security. No more is it simply the caveman at the gate. So we have in this example
  22. Jim or Buddy
  23. Jim It adds context to different methods of protecting the crown jewels of organizations
  24. Jim
  25. Jim
  26. Jim Example: recently I was working on a client that was having constant account lockouts and we quickly determined it was coming from outside. I ran a scan from my home and with 1 minute determined the domain name, computer name and I could have easily determined vulnerability and attempted to exploit them… Another example, performed a scan on a internal network and discovered a undocumented device which had port 53 and 80 open and listening. Not being sure what it is, pull up browser and discover it’s a wireless router. So I identify the model, on a hunch go to my friendly google to get the default uid/pwd, and bingo I’m in. Now the SSID did have a “strong” password for WPA2 security, but it didn’t make any difference… again a poorly configured system.. A third recent example, I was performing an assessment and as part of the process I like to interview people. So I asked if there was any sensitive data on the network and if so where. I wanted to check permissions on the folder. The crown jewel folder had full open access to all users and it did contain sensitive data, like w-2’s workers comp data, etc. So what are we to do….
  27. Jim or Buddy Wireless guest access Crypto Passwords vs pass phrases
  28. Jim or Buddy