Cybersecurity Preparedness:

Slides:



Advertisements
Similar presentations
COMPUTER CRIMES CREDIT CARD FRAUD “A BILLION DOLLAR PROBLEM”
Advertisements

KDE Employee Training. What IS a Data Breach? Unauthorized release (loss or theft) of Sensitive or Confidential Data, such as PII, PHI, etc. On site or.
Fraud, Scams and ID Theft …oh my! Deb Ramsay ESD 101 Chief Information Officer Technology Division.
Identity Theft: How to Protect Yourself. Identity Theft Identity theft defined:  the crime of obtaining the personal or financial information of another.
Social Engineering Networks Reid Chapman Ciaran Hannigan.
Certificate Authority Security Council (CASC) 2015 Consumer Trust Survey.
MONEY MANAGEMENT II Billing Errors/Disputes & Identity Theft.
Internet safety By Lydia Snowden.
NetService Cardholder Tutorial GE Corporate Payment Services 4246 South Riverboat Road Salt Lake City, Utah Copyright Information.
Identity Theft By: Chelsea Thompson. What is identity theft? The crime of obtaining the personal or financial information of another person for the purpose.
Unit 5 Protecting Your Money Starting on p. 59. What Do You Think? Complete the “What Do You Think?” activity on p. 60.
Online Sales to “Friends and Family” Why send s to Friends and Family? 19% of retail sales last year were from web orders. 26% of all internet orders.
A Step Into The Computer Underground 1 “By Understanding The Enemy We Are Better Prepared To Defend Ourselves”
Enterprise data (decentralized control, data security and privacy) Incident Response: State and Federal Law Rodney Petersen Security Task Force Coordinator.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
2 1.Client protection principles 2.Principle #6 in practice 3.Two components of protecting client data 4.Participant feedback 5.Practitioner lessons and.
STANDARD 5.3 Objective 3 Students will explain and understand the need for confidentiality.
Computer Security By Joey Pawoll. Introduction to computer security Have you been wondering how to be safe online? Well look no further! This powerpoint.
Fashion Pricing BY VANESSA LAWRENCE and KATHY TRUONG SUMAYYAH ANSARI.
 Why is this important to you?  How do digital footprints connect with digital citizenship?  Does everyone have a digital footprint?
. Here is me sending an with an attachment, you click onto the paper clip icon in order to send the attachment.
Making a Logbook Entry. Go to Click on Sign In.
The Problem:  When troubleshooting an IT person needs to reference the user guide that matches the version of hardware or software  A large number of.
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Chapter 12: How Private are Web Interactions?. Why we care? How much of your personal info was released to the Internet each time you view a Web page?
The Problem:  Large number of Purchase Orders (POs)  POs are Printed and Filed  One person manages files (filing and retrieval)  Several minutes to.
October is National CyberSecurity Awareness Month OIT and IT providers across campus are launching an awareness campaign to provide tips and resources.
 Identity theft: When someone steals another identity, usually to obtain credit or other benefits in that person’s name  Phishing: Attempting to acquire.
INTRODUCTION & QUESTIONS.
LESSON 5-2 Protecting Your Computer Lesson Contents Protecting Your Computer Best Practices for Securing Online and Network Transactions Measures for Securing.
Friday 8th November Mr Nicholls
Step 2 – Register a Card To register a UR Card, you can send an to or fill out the registration form at one of our awesome
KIARA MARSHALL SEMESTER PROJECT EIS 3302 Ethical Problems in E- Businesses.
Phishing and Internet Scams. Definitions and recent statistics Why is it dangerous? Phishing techniques and identifiers Examples of phishing and scam.
To understand how to recognise and avoid potential fraudulent situations To appreciate that being a victim of fraud may affect me emotionally as well.
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Protecting Your Assets By Preventing Identity Theft
Online Sales to “Friends and Family”
DATA BREACH SIMULATION TRAINING JANUARY 12, 2017
Freedom Independence Transition
Monthly Compliance Training: Protecting Your Clients’ Privacy
Handling Personal Data
Cyber Insurance – FFs & CHBs
Information is at the heart of any University, and Harvard is no exception. We create it, analyze it, share it, and apply it. As you would imagine, we.
Data Privacy and Breaches
Cyber Issues Facing Medical Practice Managers
18 Consumer Credit 18-1 Credit Fundamentals 18-2 Cost of Credit
Unit 202: Help customers choose products in a retail environment
Consumer Empowerment through Education
Cybersecurity and Personal Finance
Your Digital Footprint
Protecting Yourself from Fraud including Identity Theft
What is Information Security?
Online Sales to “Friends and Family”
Online Sales to “Friends and Family”
Online Sales to “Friends and Family”
Freedom Independence Transition
Cyber Security: What the Head & Board Need to Know
Information Security – Sep 18
Justin Brady Malware Forensics.
3 Do you monitor for unauthorized intrusion activity?
Targeted Data Breach Turn slides
Company Name | Phone Number | Website | Address
Protecting Yourself from Fraud including Identity Theft
Scenario Discussion.
Targeted Data Breach Turn slides
Paying For Your Lawn Care and Landscaping in Lake Charles BY
3 Do you monitor for unauthorized intrusion activity?
Anatomy of a Common Cyber Attack
Founded in 2002, Credit Abuse Resistance Education (CARE) educates high school and college students on the responsible use of credit and other fundamentals.
Presentation transcript:

Cybersecurity Preparedness: A Live Cyberattack Tabletop Exercise

Email Received from KrebsOnSecurity I understand from my sources that you have had a data breach. Later this afternoon, I will be posting a story about it, please let me know if you would like to comment on the following. “Fitness retailer Gr8t has been the victim of a data breach potentially involving thousands of customer credit card records and other types of personal information. The cybercrime shop —Rescator— has put up for sale a batch of credit cards stolen from the retailer, and claims to also have purchase history files and other sensitive information.”

Gr8t Statement Gr8t is investigating a potential unauthorized access to some customer information. We are working around the clock with a leading forensics firm and a leading law firm to aggressively gather facts and investigate the situation. Gr8t takes the protection of our customers’ information extremely seriously. It is always our priority to help ensure that our customers have a shopping experience that is as safe and secure as possible, particularly as we investigate and resolve this matter. Gr8t will provide further updates when we can.

Initial Report Credit Card Information: Taken from about 25,000 users, but it only covers users in about 28 states User names and passwords: Taken from about 50,000 users, covering 15 states Name, address, and what they purchased: Taken from about 200,000 users with some overlap in the first two categories, but in most cases, this is the only information the hackers could access Email address and performance metrics (such as sleep patterns) for about 100,000 users

Email Received by Business Development Taking your customer files was just the beginning. We have accessed your business development files and now own them. If you pay us $250,000 in Bitcoins by noon tomorrow, we will destroy these files. If not, we will release them to the public. Just to show you we are serious, attached is just one file we have. Reply to this email if you are willing to agree to our demands, and instructions will follow.