Case Study - Target.

Slides:



Advertisements
Similar presentations
Confidential and proprietary materials for authorized Verizon personnel and outside agencies only. Use, disclosure or distribution of this material is.
Advertisements

Managed Security Monitoring. 2 ©2015 EarthLink. All rights reserved. Today’s top IT concerns — sound familiar? Source: IT Security Risks 2014: A Business.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
Peter Brudenall & Caroline Evans- Simmons & Simmons Marsh Technology Conference 2005 Zurich, Switzerland. Managing the Security Landscape – Legal and Risk.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Stephen S. Yau CSE , Fall Security Strategies.
Information Security in Real Business Yuri & The Cheeseheads.
Cybercrime Outlook on African banks Adwo Heintjes Global Head IT Audit & Ops Rabobank.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
Presenter: Nick Cavalancia Auditing Evangelist 3 Ways Auditing Needs to be a Part of Your Security Strategy Brought to You by.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
Thomas Levy. Agenda 1.Aims: Reducing Cyber Risk 2.Information Risk Management 3.Secure Configuration 4.Network Security 5.Managing User Access 6.Education.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Cyber Security Nevada Businesses Overview June, 2014.
INCIDENT RESPONSE IMPLEMENTATION David Basham University of Advancing Technology Professor: Robert Chubbuck NTS435.
Dr. Bill Curtis Director, Consortium for IT Software Quality Standardize Software Quality and Productivity Measurement.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Pro-active Security Measures
Enterprise Cybersecurity Strategy
111 © 2005 EMC Corporation. All rights reserved. Achieving Business Resilience 2005 Business Continuity and Corporate Security Show & Conference Stephen.
A PM’s Guide to Surviving A Data Breach. Compliance: PCI QSA and PCI Gap Analysis FISMA HIPAA SSAE 16 GLBA, Red Flags Response Incident Response and Disaster.
Agency Name Security Program FY 2009 John Q. Public Agency Director/CIO/ISO.
Internal Audit Considerations for Cybersecurity Risks Posed by Vendors October th, 2015 Chicago IIA Chapter’s 2 nd Annual IIA Chicago IT Hacking.
The Internet of Things(IoT) BY CODEY DISNEY. Objectives  What Is the IOT?  How are corporations at risk? What are the security risks and what can happen.
High Assurance Products in IT Security Rayford B. Vaughn, Mississippi State University Presented by: Nithin Premachandran.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
Albany Bank Corporation Security Incident Management Program.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Information Security and Technology Overview Presented By: Enterprise Risk Management (ERM) Division Jill Martucci, CISA, SSCP, Senior Allison Hall, Experienced.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
CyberSecurity What is it?
Michael Wright • Chief Security Officer • Tech Lock
2013 Target Data Breach Team 4
Six Steps to Secure Access for Privileged Insiders and Vendors
Cyber Security for Building Management
Cybersecurity - What’s Next? June 2017
Comprehensive Security and Compliance at an Affordable Price.
Team 1 – Incident Response
Demystifying cybersecurity: Best practices to help strengthen your program Chris Candela Senior Consultant Business Consulting Services Charles Schwab.
Security Standard: “reasonable security”
Team 4 – Mack, Josh, Felicia, Kevin and Walter
Team 2 – understand vulnerabilities
Information Technology Sector
Business At the Speed of Cyber
Six Steps to Secure Access for Privileged Insiders and Vendors
ISO : Specifications for IT Service Management-
Cyber Attacks on Businesses 43% of cyber attacks target small business Only 14% of small business rate their ability to mitigate cyber risk highly.
Joe, Larry, Josh, Susan, Mary, & Ken
Forensics Week 11.
Information Security: Risk Management or Business Enablement?
Transforming IT Management
Data Security Team 1.
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
General Counsel and Chief Privacy Officer
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
National Cyber Security
Securing the Threats of Tomorrow, Today.
Moving from “Bolt-on” to “Build-in” Security Controls
IS4680 Security Auditing for Compliance
Cybersecurity Update Cascade Natural Gas.
Keeping your data, money & reputation safe
Cybersecurity EXERCISE (CE) ATD Scenario questions
Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang
DSC Contract Management Committee Meeting
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
CMGT/431 INFORMATION SYSTEMS SECURITY The Latest Version // uopcourse.com
CMGT 431 CMGT431 cmgt 431 cmgt431 Entire Course // uopstudy.com
Anatomy of a Common Cyber Attack
Presentation transcript:

Case Study - Target

Hacking through an hvac vendor Article summary: Fazio Mechanical (HVAC vendor) had data connections with Target’s network Attackers accessed Target’s network with stolen vendor credentials (user name and password) With network access, malware was uploaded on point of sale systems Article available at http://www.computerworld.com/article/2487425/cybercrime-hacking/target-breach-happened-because-of`-a-basic-network-segmentation-error.html

Case study – target breach

Case study – target breach Breach Costs Numerous firings (Some Board of Directors, CEO, & CIO) Trustwave (PCI Compliance Auditor) – Sued by Target Bank Vendors more than $200 million in costs DoJ Investigations on Target Over 140 lawsuits Profits dropped 46% during 4th quarter of 2013 Customer visits down entire year of 2014 Stock down 15% after incident

Case study – target breach Important Information Target had a static defense and checklists for baseline security Target passed PCI compliance audit before breach discovery Claimed a level of compliance on Critical Security Controls Network access to third party vendors Network integration with vendors

Missed opportunities

Case study – tEams Team 1 is the senior IT acquisition advisors for another major retailer. The team is the responsible for advising the Board of Directors and senior corporate leadership for IT operations. Focus on being proactive. Team 2 is the software development team for the Target Corporation. The team is the responsible for legacy and new development systems. Focus on understanding the vulnerabilities of your system. Team 3 is the senior IT Operations that owns Target’s Security Operation Center (SOC). Focus on Incident Response and Operations. Team 4 is the testing group for Target. The team is the responsible for auditing and testing. Focus on testing and auditing. Team 5 is the senior Corporate Operations group. The team is led by the Target Director of Operations and controls others on your network. Focus on operations of others on your network.

Questions

Team 1 – Being proactive Team 1: Senior Acquisition Team to the Board of Directors and Senior Company Leadership for another major commercial retailer (not Target) How would you describe Target’s situation to your Board of Directors? How could you assure senior leadership that our company is in a better situation? What would do with Target’s information to be proactive? How would you prove that you are secure enough?

Team 2 – understand vulnerabilities Team 2: Target IT Programs – Legacy and New Development How would you assess current vulnerabilities of your current development projects and legacy programs? How would you do manage risk going forward? The Board of Directors and Senior Leadership want to provide assurances that the breach cannot occur again. What assurances can you provide? What would you want different in your testing and audits?

Team 3 – incident response Team 3: Cybersecurity Risk Management of Incident Response How would you describe your current processes for incident response? What do you want change in your incident response plans and processes? What exercises do you want to conduct going forward? How do you plan to work with others to ensure that you can better respond and recover?

Team 4 – testing and auditing Team 4: Senior Testing and Internal Audit How would you describe your current testing and auditing to your Senior Leadership? What would you like to change for testing going forward? How would you test your interactions with vendors and suppliers? What assurances can your testing provide to your leadership?

Team 5 – interfaces and trust Team 5: Senior Corporate Operations Group What is the best way to manage the risk of others interfacing with our network and systems? How should you control others on your network for access and authorization? What should be required of vendors and sub-contractors to work with your systems? How do you ensure proper training and certification of sub-contractors and vendors?