(Email Compromise).

Slides:



Advertisements
Similar presentations
Copyright © 2012, Big I Advantage®, Inc., and Swiss Re Corporate Solutions. All rights reserved. (Ed. 08/12 -1) E&O RISK MANAGEMENT: MEETING THE CHALLENGE.
Advertisements

Information Security Confidential Two-Factor Authentication Solution Overview Shawn Fulton January 15th, 2015.

Version 2.0 for Office 365. Day 1 Administering Office 365 Day 2 Administering Exchange Online Office 365 Overview & InfrastructureLync Online Administration.
OSP214. SECURITY PRIVACY RELIABILITY & SERVICE CONTINUITY COMPLIANCE.
What’s New in Exchange Online. Disclaimer This presentation contains preliminary information that may be changed substantially prior to final commercial.
Welcome to the Exchange 2013 Webcast Archiving, eDiscovery, & Data Loss Prevention.
Cyber Risk Enhancement Coverage. Cyber security breaches are now a painful reality for virtually every type of organization and at every level of those.
External Threats to Healthcare Data Joshua Spencer, CPHIMS, C | EH.
Commercial eSecurity Training and Awareness. Common Online Threats Most electronic fraud falls into one of three categories:  PHISHING – Fraudulent s.
PHISHING AND SPAM INTRODUCTION There’s a good chance that in the past week you have received at least one that pretends to be from your bank,
PCI COMPLIANCE Compliance is mandatory for all organizations that accept credit cards.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Yair Grindlinger, CEO and Co-Founder Do you know who your employees are sharing their credentials with? Do they?
Strong Security for Your Weak Link: Implementing People-Centric Security Jennifer Cheng, Director of Product Marketing.
Have the Time? Steps to Deal with Cybercrime HFTP Annual Conference Bellevue, Washington October 23, 2015 Presented by: John D. Daum, CPA Scott Perry (Just.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
Basics What is ? is short for electronic mail. is a method for sending messages electronically from one computer.
Visibility. Intelligence. response Information Security: Risk Management or Business Enablement? Mike Childs Vice President Rook Security.
Information Security January What is Information Security?  Information Security is about the physical security of our equipment and networks as.
Data protection—training materials [Name and details of speaker]
Enterprise Mobility Suite: Simplify security, stay productive Protect data and empower workers Unsecured company data can cost millions in lost research,
HOW TO AVOID COMMON DATA BREACH PITFALLS IAPP Privacy Academy 2014.
Information explosion 1.4X 44X Protect communications.
Protect communications Conditions Actions Exceptions Conditions Actions Exceptions.
Intro to the Office 365 Security & Compliance Center
Secure your complete data lifecycle using Azure Information Protection
Do you know who your employees are sharing their credentials with
Accelerate GDPR compliance with Microsoft 365
Journey to Microsoft Secure Cloud
Responding to Intrusions
Reducing Cost and Risk During an Investigation
Protect sensitive information with Office 365 DLP
9/4/2018 6:45 PM Secure your Office 365 environment with best practices recommended for political campaigns Ethan Chumley Campaign Technology Advisor Civic.
How do I handle major objections to Office 365?
Secure your complete data lifecycle using Azure Information Protection
Joe, Larry, Josh, Susan, Mary, & Ken
The utility belt for managing security and compliance in Office 365
Rights Management Services (RMS)
Security for your digital transformation
Chapter 3: IRS and FTC Data Security Rules
Information Security: Risk Management or Business Enablement?
Office 365 Security Assessment Workshop
Company Overview & Strategy
Cyber Issues Facing Medical Practice Managers
Threat Landscape for Data Security
Strong Security for Your Weak Link:
11/15/2018 3:42 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
11/16/2018 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks.
Cyber Trends and Market Update
Top 10 Tips for GDPR Compliance in Office 365
Real World Advanced Threat Protection
Office 365 Security & Compliance: Exchange Online Protection
Information Security Awareness
Microsoft Ignite /18/2019 7:21 AM
Neil Kirton and Zoë Newman
Incident response and intrusion detection
4/9/2019 5:05 AM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS.
Business Compromise and Cyber Threat
Spear Phishing Awareness
Securely run and grow your business
Microsoft Data Insights Summit
Strengthening the GDPR business opportunity with Microsoft 365
Microsoft Data Insights Summit
Corporate Encryption:
Cybersecurity Simplified: Phishing
Sam elkholy Director, systems engineering
Anatomy of a Common Cyber Attack
School of Medicine Orientation Information Security Training
Presentation transcript:

(Email Compromise)

Panelists Luke Emrich, EnCE, CEH, GCFA Director - Security, Privacy, and Risk Services Michael Waters, Esq., CIPP/US Shareholder Lauren Winchester, Esq., CIPP/US Breach Response Services

Overview How and why email compromises occur Best practices for responding to email compromises Response Costs How to prevent email compromises

Email compromises on the rise across industries Data from BBR Services

How and why email compromises occur jdoe@companyx.com From: jsmith@ABC.com To: jdoe@companyx.com Sent: September 10, 9:30 a.m. Subject: Secure Message This is a secured message for you and its confidential with password protection you have access to it with your working email. Jane Smith Director of Finance ABC Company 123 Washington St., Chicago, Illinois 60601 (312) 555-1234

Motivation for Threat Actors - $$ Four common ways to leverage an inbox: Reconnaissance/Targeted spam Wire transfers Payroll redirect Sensitive information in the inbox

Best practices for responding to email compromises Do we know the nature/type of the incident? Do we know the incident timeline? Identify the population of affected accounts Were Phishing/Spam messages sent internally? – purge them! Pull message trace logs for affected accounts Change passwords for affected accounts Check affected accounts for unauthorized rules - forwarding/move

Best practices for responding to email compromises Do compromised creds provide access to additional systems? Change passwords to potentially affected systems Review logs for unauthorized access Review Unified Audit logs for evidence of unauthorized access to affected accounts, including cloud apps like OneDrive and SharePoint. Review Admin Audit logs for evidence of privilege escalation Block any malicious email addresses or domains

Potential Legal Implications Unauthorized Access of Information Statutory data breach notification obligations to individuals, regulators and business partners This may include notification to investors, key customers, unfriendly parties (e.g., litigation adversaries) Contractual obligations to third parties Wire fraud Recent lawsuits in which companies are sued due to wire and other fraud perpetrated from compromised account If someone suffers a monetary loss because your account was compromised, you may be sued

Response Costs Legal Fees Potential for regulatory fines and penalties Forensics Programmatic and manual review of inboxes Third party demands and/or lawsuits Lost funds from fraudulent wire transfers Notification and call center Credit monitoring Lost payroll funds

How to prevent email compromises Harden your Email Environment (some suggestions below are specific to O365) Require multi-factor authentication for all users Limit or disable remote access (OWA) Review Microsoft’s Secure Score and make suggested changes Disable/Manage message forwarding Turn on Unified Audit logging and Mailbox Auditing Enable Advanced Threat Protection Enabling Safe Links and Safe attachments Security and Awareness Training / Social Engineering Testing

Questions?