Equifax Data Breach Analysis

Slides:



Advertisements
Similar presentations
©2014 Bit9. All Rights Reserved Building a Continuous Response Architecture.
Advertisements

Boost your network security with NETASQ Vulnerability Manager.
Global Information Security Issues According to the E&Y Global Survey, Managers Say the Right Thing… –90% of 1400 companies surveyed in 66 countries say.
Morgan Stanley December 7th, 2004 By Adam Freda.
Security Risk Management Marcus Murray, CISSP, MVP (Security) Senior Security Advisor, Truesec
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Your cybersecurity breach will happen! Here’s what to do to mitigate your risk Thursday, 25 September 2014.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
DATE: 3/28/2014 GETTING STARTED WITH THE INTEGRITY EASY PCI PROGRAM Presenter : Integrity Payment Systems Title: Easy PCI Program.
PCI: As complicated as it sounds? Gerry Lawrence CTO
Fraud and Prevention: Lessons from the Fire Service August 24,
PATCH MANAGEMENT: Issues and Practical Solutions Presented by: ISSA Vancouver Chapter March 4, 2004.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Security Awareness Challenges of Securing Information No single simple solution to protecting computers and securing information Different types of attacks.
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Pro-active Security Measures
Tamra Pawloski Jeff Miller. The views, information, and content expressed herein are those of the authors and do not necessarily represent the views of.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
IPv6 security for WLCG sites (preparing for ISGC2016 talk) David Kelsey (STFC-RAL) HEPiX IPv6 WG, CERN 22 Jan 2016.
BUSINESS CLARITY ™ PCI – The Pathway to Compliance.
CYBERSECURITY: RISK AND LIABILITY March 2, 2016 Joshua A. Mooney Co-chair-Cyber Law and Data Protection White and Williams LLP (215)
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
Data Breach ALICAP, the District Insurance Provider, is Now Offering Data Breach Coverage as Part of Our Blanket Coverage Package 1.
THE LARGEST BANKS OF THE US. Plan 1. United States' Largest Banks 2. Bank of America 3. JPMorgan Chase 4. Citigroup Inc.
Cyber Security Phillip Davies Head of Content, Cyber and Investigations.
Cybersecurity as a Business Differentiator
Case Study - Target.
Cloud Firewall.
Data Minimization Framework
Cyber Security Enterprise Risk Management: Key to an Organization’s Resilience Richard A. Spires CEO, Learning Tree International Former CIO, IRS and.
Cisco 2017 Security Annual Report
Security Standard: “reasonable security”
HEALTHSOUTH SCANDAL MIS5121-REAL WORLD CONTROL FAILURE INSTANCE-2003
Compliance with hardening standards
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
MIS 5121: Real World Control Failure - TJX
Wells Fargo Identity theft incident
Agenda Equifax data hack Best Buy stops selling Kaspersky
Cyber Risk Management Through Vendor Contracts
Today’s Risk. Today’s Solutions. Cyber security and
Information Security: Risk Management or Business Enablement?
Data Security Team 1.
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
COMPTIA CAS-003 Dumps VCE
I have many checklists: how do I get started with cyber security?
SAM GDPR Assessment <Insert partner logo here>
Advanced Services Cyber Security 101 © ABB February, | Slide 1.
Cyber Trends and Market Update
Millions of T-Mobile customers exposed in Experian breach
IS4680 Security Auditing for Compliance
Cloud Security for Endpoints
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
By Joseph Carnevale, CIP Partner & Director of Sales
The Financial Impact of Cyber Risk 50 Questions Every CFO Should Ask
AppExchange Security Certification
Cybersecurity Threat Assessment
Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang
Cyber Security: What the Head & Board Need to Know
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
MAZARS’ CONSULTING PRACTICE Helping your Business Venture Further
Colorado “Protections For Consumer Data Privacy” Law
Data Breach of United States Office of Personnel Management
Data Breach of United States Office of Personnel Management
Anatomy of a Common Cyber Attack
Penetration Testing Market Research Report By Forecast to 2023 Industry Survey, Growth, Competitive Landscape and Forecasts to 2023 PREPARED BY Market.
Presentation transcript:

Equifax Data Breach Analysis Linlan Chen Rouying Tang Mustafa Aydin Somayeh Keshtkar Khawlah Alswailem Adam M Joskowicz

Agenda Equifax Background What Happened? How Happened? Impact to the Business Missing Controls Recommendation References

Equifax background and industry Consumer credit reporting agency 800 million individual consumers US$ 3.1 billion in annual revenue 9,000 employees in 14 countries Operates or has investments in 24 countries

Achievements for the company Top 100 American Banker FinTech Forward list (2015-2016) Top Technology Provider on the FinTech 100 list (2004-2016) InformationWeek Elite 100 Winner (2014-2015) Top Workplace by Atlanta Journal Constitution (2013-2017) One of Fortune’s World’s Most Admired Companies (2011-2015) One of Forbes’ World’s 100 Most Innovative Companies (2015-2017)

Information Names Social Security numbers Birth dates, addresses In some instances, driver’s license numbers Credit cards

Company Timeline

What happened? On Sept. 7, 2017, Equifax, discovered the application vulnerability on one of their websites led to a data breach that exposed The breach was discovered on July 29 Equifax suffered the largest data breaches ever that affected about 143 million consumers in the US. UK and Canada was influenced as well 209.000 people’s credit card numbers and 182,000 personal identifying information are stolen

How happened? Tool called Apache Struts Equifax aware the vulnerabilities Took a long time for the vulnerability to be identified and to be patched A month to alert its customers and shareholders about the hack

Root Cause of the Issue Attackers entered Equifax's system in mid-May through a web-application vulnerability that had a patch available in March. The vulnerability that attackers exploited to access Equifax's system was in the Apache Struts web-application software, a widely used enterprise platform. CVE-2017-5638 Apache Struts vulnerability is the root cause behind Equifax data breach.

Root Cause of the Issue

Root Cause of the Issue “Patching can take time, even for large corporations with dedicated security staff, which Equifax presumably had.” The process of patching the flaw isn’t as simple as just downloading. Vulnerability Identification and Patch Acquisition Risk Assessment and Prioritization Patch Testing Patch Deployment and Verification The Equifax data compromise was due to Equifax's failure to install the security updates provided in a timely manner.

Consequences | Impact to the business Impact on Consumers: 143 million US consumers: Social Security Numbers Drivers’ License Numbers Birthdates Addresses Credit Card Numbers Affecting at least 44% of American Population Equifax added that 209,000 credit card numbers were stolen, in addition to "certain dispute documents with PII for approximately 182,000 U.S. consumers. Others in the U.K. and Canada were also impacted, but Equifax hasn't said how many.

Consequences | Impact to the business Financial Loss Estimated: After insurance, costs tied to dealing with crisis could run between $200 million and $300 million. According to attorneys in Chicago: Equifax will pay more than $1 billion Most of the cash going directly to those affected. Offering 12 months free Trusted ID Premier credit monitoring Investors Wall Street has rendered an estimate: $4 billion lost stock market value Equifax shares have dropped over 20% Investors are bracing for lawsuits, lost business, and increased regulation. Three Equifax top executives sold shares in company days after breach was discovered, but not announced...

Consequences | Impact to the business Reputational Loss CFO: John Gamble Jr. Workforce Solutions President: Rodolfo Ploder U.S. Information Solutions President: Joseph Loughran Combined, sold nearly $2 million in shares in the company days after cyber attack Congressional Scrutiny Justice Dept, SEC Holding Open Investigation Multiple Hearings Ex CEO Richard Smith set to testify before four separate congressional committees

Consequences | Impact to the business Reputational Loss (Cont.) Richard Smith In an interview with The Atlanta Business Chronicle on August 1st, two days after breach discovery.. Smith answered the keys to CEO’s building higher level of trust… "Transparency, candor, consistency, and humility. Employees want an appropriate level of transparency about decisions and they expect us to be candid with them. Employees will detect a disconnect in a heartbeat, so we must be consistent in our words, our actions, and appearances. The final ingredient depends on the CEO. We have to remain humble if we’re going to build trust. That means not just listening to people at all levels, but trusting that what they have to say matters. Leaders in particular must build trust by giving trust." Buried in Terms and Service Language barring those who enroll in Equifax credit checker program from participating in any class-action lawsuits that may arise from the incident.

Consequences | Impact to the business Eric Schneiderman NY Attorney General Took action publically and privately One of many public figures that publically criticized Equifax on the weak apology as well as the embedded language.

Missing Controls Patch Management Governance Patch management should be based on an assessment that balances the security and down time risk of a security breach with the cost, disruption and availability risks associated with frequent and rapid deployment of software patches.

Missing Controls 2. Defense in Depth Using a typical web application architecture without enough defense in depth. The web application has full read and write access to the underlying data store. The web application code is the sole arbiter of access.

Missing Controls 3. Inefficiency of applying IDS (Intrusion Detection System) or IPS (Intrusion Prevention System) Executives should give power to risk assessment management [teams] and hire reputable third parties to audit their security policies. Equifax could have patched the vulnerability or received alerts through an IDS (Intrusion Detection System) or IPS (Intrusion Prevention System). Both are built to detect network behavioral changes, so if a company has segmentation in place, they can kill a network connection where needed to avoid losing vital data.

Recommendation “ Effective cybersecurity requires consistent, comprehensive, timely patch management for all of your critical clients, servers, applications, and operating systems.” The first five of these Controls, listed below, can eliminate the vast majority of cybersecurity vulnerabilities. And patch management is essential to maintaining secure hardware and software configurations. Inventory of Authorized and Unauthorized Devices Inventory of Authorized and Unauthorized Software Secure Configurations for Hardware and Software Continuous Vulnerability Assessment and Remediation Controlled Use of Administrative Privileges

CONCLUSION Data breach. We need pay more attention on protecting the confidential information!!!

REFERENCES http://money.cnn.com/2017/09/16/technology/equifax-breach-security-hole/index.html http://www.equifax.com/about-equifax/company-profile/ https://en.wikipedia.org/wiki/Equifax https://www.consumerreports.org/privacy/what-consumers-need-to-know-about-the-equifax-data-breach/ http://eservellc.com/equifax-data-breach-go-wrong https://www.ivanti.com/blog/equifax-breach-patch-management-cybersecurity/ https://rietta.com/blog/2017/09/18/equifax-defense-in-depth/#equifax-announcement https://www.symantec.com/security_response/attacksignatures/detail.jsp?asid=29972 http://money.cnn.com/2017/09/16/technology/equifax-breach-security-hole/index.html

Questions? THANKS!