Data Breach of United States Office of Personnel Management

Slides:



Advertisements
Similar presentations
INADEQUATE SECURITY POLICIES Each covered entity and business associate must have written polices that cover all the Required and Addressable HIPAA standards.
Advertisements

Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
What is Insider Threat? “Potential damage to the interests of an organization by a person(s) who is regarded, falsely, as loyally working for or on behalf.
Traffic Crash Records and Emerging Security Issues Traffic Records Coordinating Committee (TRCC) Meeting September 7, 2006.
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
David A. Brown Chief Information Security Officer State of Ohio
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
© 2009 IDBI Intech, Inc. All rights reserved.IDBI Intech Confidential 1 Information (Data) Security & Risk Mitigation.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Fraud and Prevention: Lessons from the Fire Service August 24,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Georgia Department of Human Services Division of Aging Services (DAS): Data Breach Presenter:Harold Johnson Acting General Counsel Presentation to: Board.
NAPHSIS REAL ID Overview June 6, 2007 In support of this key requirement,
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
Technology Supervision Branch Interagency Identity Theft Red Flags Regulation Bank Compliance Association of CT Bristol, CT September 3, 2008.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
1Copyright Jordan Lawrence. All rights reserved. U. S. Privacy and Security Laws DELVACCA INAUGURAL INHOUSE COUNSEL CONFERENCE April 1, 2009 Marty.
Data Security at Duke DECEMBER What happened: “At this time, we have no indication that research data or personal data managed by Harvard systems.
Privacy Act United States Army (Managerial Training)
Session 13 Cyber-security and cybercrime. Contents  What’s the issue?  Why should we care?  What are the risks?  How do they do it?  How do we protect.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Financial Times Matheson is ranked in the FT’s top 10 European law firms Matheson has also been commended by the FT for corporate law,
1 AFCOM Data Center World March 15, 2016 Moderator: Donna Jacobs, MBA Panel: Greg Hartley Bill Kiss Adam Ringle, MBA ITM 9.2 The New Security Challenge:
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
USDA 2016 Financial Management Training Transforming Shared Services Cyber Security Presented by Jack Blount.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
POLICIES & PROCEDURES FOR HANDLING CONFIDENTIAL INFORMATION NOVEMBER 5 TH 2015.
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Proactive Incident Response
Law Firm Data Security: What In-house Counsel Need to Know
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Cyber Security – An Existential Threat? (IIC, Singapore)
Team 1 – Incident Response
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Agenda Control systems defined
Managing a Data Breach Prevention-Detection-Mitigation
Managing a Data Breach Prevention-Detection-Mitigation
Forensics Week 11.
Today’s Risk. Today’s Solutions. Cyber security and
Cybersecurity Awareness
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Privacy Breach Response and Reporting
David Axtell Todd Martin Stinson Leonard Street, LLP
SAM GDPR Assessment <Insert partner logo here>
Red Flags Rule An Introduction County College of Morris
Security measures Introducing Risk Assessment in GDPR
Alabama Data Breach Notification Act: What 911 Districts Need to Know
Cybersecurity in Elections Infrastructure: Risks and Mitigations
#ISUCIT.
Identity Theft Prevention Program Training
Alabama Data Breach Notification Act: What County Governments Need to Know Morgan Arrington, General Counsel Association of County Commissions of Alabama.
Clemson University Red Flags Rule Training
MIS 5121: Real World Control Failures: USIS
Incident response and intrusion detection
Risk Mitigation & Incident Response Week 12
Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang
HIPAA Privacy and Security Update - 5 Years After Implementation
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
Data Breach of United States Office of Personnel Management
Anatomy of a Common Cyber Attack
Presentation transcript:

Data Breach of United States Office of Personnel Management Ping Sun Oby Okereke Yingyan Wang Mengting Li Zhixin Wei

Background The United States Office of Personnel Management (OPM) is an independent agency of the United States government that manages the civil service of the federal government. Formed: January 1, 1979 Preceding agency: Civil Service Commission Jurisdiction: Federal Government of the United States Headquarters: 1900 E Street NW, Washington, D.C. Employees: 6,205 (2011) Agency Executive: Kathleen McGettigan

What happened? In June 2015, OPM announced that it had been the target of a data breach targeting the records of as many as 4 million people. Later, FBI Director James Comey put the number at 18 million. The data breach had started in March 2014 or earlier, and was noticed by the OPM in April 2015. It has been described by federal officials as among the largest breaches of government data in the history of the US. On July 9, 2015, the estimate of the number of stolen records had increased to 21.5 million. On August 27, 2017, the FBI arrested a Chinese national suspected of helping to create the malware used in the breach.

What happened? Records Stolen: Information targeted in the breach included personally identifiable information (PII) such as SSN, as well as names, dates and places of birth, and addresses. The hack went deeper than initially believed and likely involved theft of detailed security-clearance-related background information and fingerprint information. Change of personnel: Katherine Archuleta, the Director of the OPM, tendered her resignation on July 10, 2015

Impact to the business (risks) Data breach created a massive threat to U.S. national security that will last for decades and cost billions of dollars to monitor. Greatest damage from OPM breach was the damage to the U.S. government’s reputation The size, scope and sensitivity of the OPM data breach also have major financial implications. OPM could cost the government more than $1 billion in identity management solutions over the next decade.

Root cause of the issue Whether the attack is driven by commercial interests is unclear Lack of IT management best practices. The OPM had been warned multiple times of security vulnerabilities and failings Persistent deficiencies in OPM's information system security program

Gap Analysis of the OPM Data Breach In light of the OPM data breach, new laws “Cybersecurity Information Sharing Act of 2015 (CISA) and the Federal Cybersecurity Workplace Assessment Act of 2015” were introduced. The below listed gaps aided the need to create and have the law signed by the president on December 18, 2015; Lack of information sharing amongst US Federal Government Agencies Lack of clear policies addressing Incident Response Procedures for Data Breaches Lack of collective experience with regard to threat and mitigation efforts Lack of timely reporting which may have thwarted the second data breach as well allowed the relevant agencies and affected employees to take steps to protect their interests much sooner than nearly two years later

What controls were missing and your recommendation Aging systems as the primary obstacle to putting such protections in place for certain systems, despite having the encryption tools on hand. Incomplete security authorization packages, weaknesses in testing of information security controls, and inaccurate Plans of Action and Milestones Recommendation: Building a new architecture, a modern architecture that allows us to implement additional security features The only way to prevent malicious actors from obtaining useful data in this case would have been timely detection of the intrusion.

What We Can Do Steps to help you protect your identity: Spot the identity theft warning signs Be aware of phishing scams Update your passwords regularly

Cited Law Journal Library, OPM DATA BREACH CASE STUDY: MITIGATING PERSONNEL CYBERSECURITY RISK Alan Wehb.

Question?