November 14, 2016 bit.ly/nercomp_defendingyourdata16

Slides:



Advertisements
Similar presentations
Social Network Security Issues: Social Engineering and Phishing Attacks Jeffrey Allen, Leon Gomez, Marlon Green, Phillip Ricciardi, Christian Sanabria.
Advertisements

Security for Internet Every Day Use Standard Security Practices and New Threats.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
What Are Malicious Attacks? Malicious Attacks are any intentional attempts that can compromise the state of your computer. Including but not limited to:
Phishing, Pharming, and Spam Margaret StewartTuesday, Oct. 21, 2006.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
First Community Bank Prevx Safe Online Rollout & Best Practice Presentation.
UNDERSTANDING THE RISKS & CHALLENGES OF Cyber Security DAVID NIMMO InDepth IT Solutions DAVID HIGGINS WatchGuard NEIL PARKER BridgePoint Group A BridgePoint.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
A Growing Threat Debbie Russ 1/28/2015. What is Ransomware? A type of malware which restricts access to the computer system that it infects, and demands.
CCT355H5 F Presentation: Phishing November Jennifer Li.
Topic 5: Basic Security.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
INTRODUCTION & QUESTIONS.
Introduction: Introduction: As technology advances, we have cheaper and easier ways to stay connected to the world around us. We are able to order almost.
Outline of this module By the end of this module, you will be able to: Identify the benefits of using social networking to communicate with family and.
1 1 Advanced Cyber Security Event - Introduction 11 th May 2016 Matt Locker.
Cyber Attack – Not a case of if, but when! Housing Technology 2016 Kevin Doran – Chief Technology Officer Tim Cowland – Principal Consultant.
Zeus Virus By: Chris Foley. Overview  What is Zeus  What Zeus Did  The FBI investigation  The virus for phones  Removal and detection  Conclusion.
CDAC ITS Security Awareness How to help your daily computer activities remain safe and sane.
Cyber Security – Client View Peter Gibbons | Head of Cyber Security, Group Business Services Suppliers’ Summer Conference 15/07/2015.
CURRENT STATUS OF CYBERCRIME  Security is the fastest growing service in IT  Cyber Crime Costs $750 Billion annually  70% of threats arrive via .
October 28, 2015 Cyber Security Awareness Update.
PROTECTING YOUR DATA THREATS TO YOUR DATA SECURITY.
IBM 2015 Cyber Security Intelligence Index 2014, eventful year Major vulnerabilities were found lurking in well- known applications, many of which had.
Are our smart devices really that smart ?
IBM 2015 Cyber Security Intelligence Index
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
International Conflict & Cyber Security
Executive Director and Endowed Chair
CEH vs CISSP Course, Advantage, Career, Salary, Demand!
[Internal Use] for Check Point employees​
2016 Data Breach Investigations Report
And Digital Bait How content theft sites and malware are exploited by cybercriminals to hack into internet users’ computers and personal data.
Information Security.
Cyber Crime What’s all the fuss about?
Cyber Security: State of the Nation
Authentication 2.0: User Generated Security
Some Methods Phishing Database & Password Exploits Social Engineering & Networking Weak Controls Default Accounts & Passwords Dated Software & Patch.
Cyber Security & IT: What’s Next?
That could never happen to me! Think again.
Equipo 1 Tema: Crímenes cibernéticos en 2016 Ana Yansi Mejía Mendoza (Informática) Lucia Arellano García (Derecho) Margarita Núñez Rosales (Lengua extranjera)
Understanding the First Line of Defense in Cyber Security
Presented by Security Management Partners Waltham, MA
Securing Information Systems
Jon Peppler, Menlo Security Channels
Cybersecurity Awareness
Risk of the Internet At Home
Malware, Phishing and Network Policies
Cybersecurity Hygiene
Internet Security Threat Status
KnowBe4 is the world's most popular integrated platform for awareness training combined with simulated phishing attacks.
The Internet of Unsecure Things
Home Internet Vulnerabilities
The vulnerability of the modern society
Data security in iot devices
Anatomy of a Large Scale Attack
Steppa Cyber Security Training Tips Your Business Was Seeking For With Cyber Security Training!
Qiyu chen, Xiaomin Dong, Chenhui Lai, Xinteng Chen, Vittorio DiPentino
Luxury Images copyrighted to:
Information Security – Sep 18
Wireless Spoofing Attacks on Mobile Devices
Marcial Quinones-Cardona
Security Trends and Threats Affecting Innovations in Technology
Communicating in the IT Industry
Threat Landscape Update
October is National Cybersecurity Awareness Month
AIR-T11 What We’ve Learned Building a Cyber Security Operation Center: du Case Study Tamer El Refaey Senior Director, Security Monitoring and Operations.
Defencebyte THE PERFECT SECURITY FOR YOUR COMPUTER.
Presentation transcript:

November 14, 2016 bit.ly/nercomp_defendingyourdata16

Agenda 9:00 -9:15 Agenda and Introductions 9:15 to 9:45        2016 Threat Landscape, Patty Patria 9:45 - 10:30       Practical Advice for Finding Threats on Your Network, Tim LaGrant 10:30 – 10:45 Break 10:45 - 12:00       Digital Forensics & Incident Response, Andy Obuchowski 12:00 - 1:00 Lunch 1:00 - 3:00           Hands on Training, Tim LaGrant and Sherry Horeanopoulous

About the Presenters…. Patty Patria, VP for Information Technology, Becker College; CISSP and PMP Tim LaGrant, Technical Director, Becker College Sherry Horeanopoulos, Information Security Officer, Fitchburg State University; CISA Andy Obuchowski, Director at RSM

About the Day.... Let’s make this interactive! Ask questions as they come up. Share ideas you might have on how you address similar problems. Introduce yourself and what you would like to get from the day.

Session 1 2016 Threat Landscape

2016 Verizon Breach Report Industry Total Small Large Unknown Education 254 16 29 209 Source: 2016 Verizon Data Breach Report

Threat Sources Source: 2016 Verizon Data Breach Report

Threat reasons Source: 2016 Verizon Data Breach Report

Threat Vectors Source: 2016 Verizon Data Breach Report

Threat by device Source: 2016 Verizon Data Breach Report

Amount of time to compromise Source: 2016 Verizon Data Breach Report

Major areas of compromise-CVE Software Vulnerabilities in Adobe and Microsoft are exploited quickly. Source: 2016 Verizon Data Breach Report

Major areas of compromise- Phishing Top Solutions for Phishing: Filter It Continuous Education Layer your most confidential data so even end user malware can’t get to it. Source: 2016 Verizon Data Breach Report

Major areas of compromise- Credential compromise Top Solutions for Credential Compromise: Require strong passwords that change frequently Employ 2-factor authentication Source: 2016 Verizon Data Breach Report

Incidents by type Source: 2016 Verizon Data Breach Report

Affects on higher education Attempts Breaches Source: 2016 Verizon Data Breach Report

Other things to worry about… Monetarization of Malware- malware needs to produce revenue, not just be disruptive. This has led to an increase in ATM-related malware, banking Trojans, and ransomware. ZDNet expects ransomware profits to hit 1 Billion this year.

Other things to worry about…social Social Media is the hacker’s new favorite target. Like-jacking is a new exploit where criminals post fake Facebook “like” buttons which download malware to your device. 1 in 10 social media users said they’ve been a victim of a cyber attack . 600,000 Facebook accounts are com-promised every day.

Other things to worry about…mobile In October, an 18 Year old app developer was arrested for almost bringing down 911 systems via cell phones. He posted a link on the TheHackSpot YouTube channel and Twitter and encouraged followers to click on the link. Authorities said they found evidence it had been clicked 1,849 times. Once users clicked the link, their phones were hijacked and the phones constantly dialed 911 until they were turned off. Source: http://arstechnica.com/security/2016/10/teen-arrested-for-iphone-hack-that-threatened-emergency-911-system/

Other things to worry about…Iot With the Internet of Things (IoT) growing, experts predict large scale DDoS attacks will be the “new normal”. There are currently billions of Internet-connected devices that attackers can hijack and organize into botnets. In October, Netflix, Twitter, Spotify, Reddit, SoundCloud and other major sites went down due to a DDoS attack on Dyn. The Dyn attacked confirmed that tens of millions of IP addresses were utilized as Mirai botnets, many of which were Chinese webcams. Source: http://www.recode.net/2016/10/24/13393922/ddos-attack-denial-service-cybercriminals-hackers

Conclusion….. Attacks are on the rise. They are coming from all venues from known vulnerabilities, to phishing, to social media to IoT. It is impossible to stop every attack. However, if you leverage good risk management and employ current technology, you can try to reduce your risk. Source: http://www.recode.net/2016/10/24/13393922/ddos-attack-denial-service-cybercriminals-hackers

Questions bit.ly/nercomp_security16