MAT-SU BOROUGH 2018 Cyber Attack.

Slides:



Advertisements
Similar presentations
Threats to the Aviation Sector
Advertisements

2008 Technology Priorities. 2 Q: Please select the option that best describes your plans for each technology in 2008 Source: CIO Magazine IT Budget and.
RFC6520 defines SSL Heartbeats - What are they? 1. SSL Heartbeats are used to keep a connection alive without the need to constantly renegotiate the SSL.
Cyber crime on the rise. Recent cyber attacks How it happens? Distributed denial of service Whaling Rootkits Keyloggers Trojan horses Botnets Worms Viruses.
Thursday, April 3, 2014MAT 312. Thursday, April 3, 2014MAT 312.
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Tuesday, April 22, 2014MAT 312. Tuesday, April 22, 2014MAT 312.
AGENDA NCSIP Mandate IT Security Threats Specific Action Items Additional Initiatives.
INVESTMENT IN MENTAL HEALTH WELLNESS GRANT PROGRAM INVESTMENT IN MENTAL HEALTH WELLNESS GRANT PROGRAM CALIFORNIA HEALTH FACILITIES FINANCING AUTHORITY.
Using the Cloud to secure your data.. History of Randsomware December 1989 – AIDS Trojan made users male $189 USD to a PO Box in Panama. Fast-forward.
Information Management System Ali Saeed Khan 29 th April, 2016.
How To Remove Flooders?-Get Help Website:
FUSE MAIL. ABOUT FUSE MAIL Fuse mail provides the business around the world to communicate with confidence. Use cloud based services to provide secure.
Proactive Incident Response
for Election Infrastructure
Earth’s Mightiest Heroes: Combating the Evils Lurking in Cyberspace
IBM 2015 Cyber Security Intelligence Index
Cyber-physical systems: a security problem
International Conflict & Cyber Security
Cyber Security – An Existential Threat? (IIC, Singapore)
Why can’t the business be agile too?
Cyber Security for Building Management
Case Study - Target.
2016 Data Breach Investigations Report
Ken Watson 9 Sep 2003 Critical Infrastructure Assurance: Business Case for Public-Private Partnership Ken Watson 9 Sep 2003
Module 3 (Ground Rules and Rules of Engagement)
National Emergency Communications Plan Goal 2
Cyber Security & IT: What’s Next?
Cyber Security Awareness Workshop
LAUSD Responsible Use Policy (RUP)
Adult Protective Services
Joe, Larry, Josh, Susan, Mary, & Ken
Yahoo Zero-Day Vulnerability - Code Point of View
JUYI Joining Up Your Information
Office 365 with confidence: security features for Office 365
Standards for Smart Communities and Innovation for Responders
Election Security Best Practices
Role for Electric Sector in Critical Infrastructure Protection R&D
John M. Felker Director, NCCIC.
Bulk Distribution June 2015.
School Council Election Process.
TBI Waiver Services Information
WannaCry Ransomware Overview
2017/18 Payment Calendar Due Date Cut-off Day 1st of every month
Cybersecurity ATD Scenario conclusion
April May April May June July July June August Sept August
Election Security Best Practices
Federated Environments and Incident Response: The Worst of Both Worlds
Strategic Planning Timeline Overview
State DOT Libraries … A Disappearing act?
Self Phishing Senate Presentation September XX, 2018
Teacher name August phone: Enter text here.
2010 Nov 2011 January February March April May June July
LO1 - Know about aspects of cyber security
Information Security – Sep 18
Information Protection
What to Expect in Semester 2
3 Week A: May 1 – 19 3 Week B: May 22 – June 9
Elections Systems: Designated Critical Infrastructure
Bergen County Radio Amateur Civil Emergency Service
Communicating in the IT Industry
Budget Planning Calendar
Operational Update 1.
Responding to homelessness in Lower Hutt The role of Hutt City Council and partners in preventing homelessness.
American Public Power Association’s Cybersecurity Services Program
Information Protection
Distributed Digital Rights Management
Election Security Presented by: michelle K. tassinari Director and Legal counsel Elections division Office of the secretary of the commonwealth.
Infragard national 2019 Strategic direction & plans
Presentation transcript:

MAT-SU BOROUGH 2018 Cyber Attack

2018 Cyber Attack What Happened Why It Happened The Response Going Forward

The Timeline Victim 210 Zero Day What Happened? Theoretical Exploit Late April eMail phishing Late May heavy activity June dormant July Discovery and Crypto-Locked Zero Day Theoretical Exploit Trojan- Emotet Credential Stealing – Dridex PowerShell Empire Ransom Ware - BitPaymer The Timeline Victim 210

Why it Happened On Our Side What They Wanted Staffing Funding Priorities Complacency Data Gathering Disruption Ransom

Mat-Su Borough Response Public Relations Vendors Volunteers Long hours Emergency funding Incident Response Project Management Minimum Viable Product (MVP) Communication Communication COMMUNICATION Take Care Of Your Users!

Communicate…Communicate…Communicate Going Forward We Can’t Do This Alone Partnering MS-ISAC DHS – US Cert InfraGard CIO Council Smart Community Forum Federal State Local Commercial Communicate…Communicate…Communicate

Security Portfolio

Discussion