Data Breach of United States Office of Personnel Management

Slides:



Advertisements
Similar presentations
Red Flags Rule BAS Forum August 18, What is the Red Flags Rule? Requires implementation of a written Identity Theft Prevention Program designed.
Advertisements

Traffic Crash Records and Emerging Security Issues Traffic Records Coordinating Committee (TRCC) Meeting September 7, 2006.
Cyber Security and the Global Business Environment Jeremy Schaar:)
IDENTITY THEFT & THE RED FLAGS RULE Presented by Brady Keith, Assistant General Counsel CREDIT MANAGEMENT SERVICES, INC.
David A. Brown Chief Information Security Officer State of Ohio
Copyright Security-Assessment.com 2006 Protecting The Data Data security, compliance, disclosure requirements and what can happen if you get it wrong Presented.
WHY CHOOSE CEO-PE?  We employ International Association of Privacy Professionals (IAPP) Certified and Health Insurance Portability & Accountability Act.
Trusted Internet Connections. Background Pervasive and sustained cyber attacks against the United States continue to pose a potentially devastating impact.
Office of Personnel Management (OPM) Data Breach A briefing for use by DON commanders and supervisory staff
Obtaining, Storing and Using Confidential Data October 2, 2014 Georgia Department of Audits and Accounts.
** Deckplate training for Navy Sailors **.  On Thursday, 9 July, the Office of Personnel Management (OPM) announced a cyber incident exposed the federal.
CAPPS II: A Case Study of Homeland Security Computer Applications Marcia Hofmann Staff Counsel Electronic Privacy Information Center Computer Freedom &
Fraud and Prevention: Lessons from the Fire Service August 24,
FTC RED FLAG RULE As many as nine million Americans have their identities stolen each year. Identity thieves may drain their accounts, damage their credit,
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Georgia Department of Human Services Division of Aging Services (DAS): Data Breach Presenter:Harold Johnson Acting General Counsel Presentation to: Board.
NAPHSIS REAL ID Overview June 6, 2007 In support of this key requirement,
Managing Data Against Insider Threats Dr. John D. Johnson, CISSP.
Kellie E. Tomeo, Esq Rampart International, LLC. AdvantageChallenge Increase existing security personnel productivity Increase existing facility personnel.
A PRACTICAL GUIDE TO RESPONDING TO A HEALTHCARE DATA SECURITY BREACH May 19, 2011 | State College, PA Matthew H. Meade Stephanie Winer-Schreiber.
PRESENTATION TO THE PORTFOLIO COMMITTEE ON THE FORENSIC AUDIT THAT WAS CONDUCTED DURING May 2006.
Sample only Order at Security Awareness Training A threat awareness briefing. A defensive security briefing. An overview of the.
A Global Approach to Protecting the Global Critical Infrastructure Dr. Stephen D. Bryen.
Friday, October 23, Jacqueline Harris, CPM®, CCIM® Director of Training & Administration Digital Realty Jacqueline Harris, CPM®, CCIM® Director.
Privacy Act United States Army (Managerial Training)
A global nonprofit: Focusing on IP Protection and Anti-Corruption Sharing leading practices based on insights from global companies, academics, organizations.
Government Agency’s Name April  At the end of this course, the learner will be able to: ◦ Define personally identifiable information ◦ List examples.
Legal Jeopardy: Whose Risk Is It?. SPEAKERS Jason Straight Chief Privacy Officer and Senior Vice President Cyber Risk Solutions at UnitedLex Patrick Manzo.
Government Agency’s Name April Identity Theft is when someone steals your personal information and uses it as their own, usually for some financial.
Financial Times Matheson is ranked in the FT’s top 10 European law firms Matheson has also been commended by the FT for corporate law,
WHEN, NOT IF THE CYBER SECURITY CHALLENGES AMONG LOCAL GOVERNMENT UMBC Public Policy Forum Baltimore Maryland April 15, 2016 Gayle B. Guilford CISO Baltimore.
March 23, 2015 Missouri Public Service Commission | Jefferson City, MO.
Overview Briefing Threat and Hazard Identification and Risk Assessment (THIRA) Presidential Policy Directive 8 / PPD-8: National Preparedness May 2012.
DC GOVERNMENT EMPLOYEES NOT YET OFFERED CYBER SECURITY TRAINING.
Law Firm Data Security: What In-house Counsel Need to Know
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Cyber Security – An Existential Threat? (IIC, Singapore)
BEST PRACTICES FOR AN IT SECURITY ASSESSMENT
Agenda Control systems defined
Managing a Data Breach Prevention-Detection-Mitigation
Security Risk Profiles – Tips and Tricks
Microsoft 365 Get help with regulatory compliance
Managing a Data Breach Prevention-Detection-Mitigation
Cyber Security coordination in Europe CERT-EU’s perspective
ESSENTIALS OF A PHYSICAL SECURITY SYSTEMS RISK ASSESSMENT
Today’s Risk. Today’s Solutions. Cyber security and
By: Tekeste Berhan Habtu Chief Executive Officer Venue: African Union
Privacy Breach Response and Reporting
David Axtell Todd Martin Stinson Leonard Street, LLP
NRC Cyber Security Regulatory Overview
Red Flags Rule An Introduction County College of Morris
Security measures Introducing Risk Assessment in GDPR
Alabama Data Breach Notification Act: What 911 Districts Need to Know
Cybersecurity in Elections Infrastructure: Risks and Mitigations
Chapter 7: RISK ASSESSMENT, SECURITY SURVEYS, AND PLANNING
#ISUCIT.
Alabama Data Breach Notification Act: What County Governments Need to Know Morgan Arrington, General Counsel Association of County Commissions of Alabama.
Clemson University Red Flags Rule Training
Chapter 1: Information Security Fundamentals
MIS 5121: Real World Control Failures: USIS
Incident response and intrusion detection
INTRODUCTION For years there have been attacks around the United States for sometimes now, which is unexpected. However; there have not been good restoration.
Risk Mitigation & Incident Response Week 12
Hanqing Zhou|Yijiang Li|Jason M Mays|Karabo Ntokwane|Qianru Yang
Upcoming PIPEDA Changes
Anthem Data Breach Group 2: Jing Jiang, Dongjie Wang, Haitao Huang, Binju Gaire, Parneet Toor.
Data Breach of United States Office of Personnel Management
Anatomy of a Common Cyber Attack
Presentation transcript:

Data Breach of United States Office of Personnel Management Ping Sun Oby Okereke Yingyan Wang Mengting Li Zhixin Wei

Background The United States Office of Personnel Management (OPM) is an independent agency of the United States government that manages the civil service of the federal government. Formed: January 1, 1979 Preceding agency: Civil Service Commission Jurisdiction: Federal Government of the United States Headquarters: 1900 E Street NW, Washington, D.C. Employees: 6,205 (2011) Agency Executive: Kathleen McGettigan

What happened? In June 2015, OPM announced that it had been the target of a data breach targeting the records of as many as 4 million people. Later, FBI Director James Comey put the number at 18 million. The data breach had started in March 2014 or earlier, and was noticed by the OPM in April 2015. It has been described by federal officials as among the largest breaches of government data in the history of the US. On July 9, 2015, the estimate of the number of stolen records had increased to 21.5 million. On August 27, 2017, the FBI arrested a Chinese national suspected of helping to create the malware used in the breach.

What happened? (continued) Records Stolen: Information targeted in the breach included personally identifiable information (PII) such as SSN, as well as names, dates and places of birth, and addresses. The hack went deeper than initially believed and likely involved theft of detailed security-clearance-related background information and fingerprint information. Change of personnel: Katherine Archuleta, the Director of the OPM, tendered her resignation on July 10, 2015

Impact to the business Data breach created a massive threat to U.S. national security that will last for decades Greatest damage from OPM breach was the damage to the U.S. government’s reputation The size, scope and sensitivity of the OPM data breach also have major financial implications. OPM could cost the government more than $1 billion in identity management solutions over the next decade.

Root cause of the issue Whether the attack is driven by commercial interests is unclear Lack of IT management best practices. The OPM had been warned multiple times of security vulnerabilities and failings Persistent deficiencies in OPM's information system security program

Gap Analysis of the OPM Data Breach In light of the OPM data breach, new laws “Cybersecurity Information Sharing Act of 2015 (CISA) and the Federal Cybersecurity Workplace Assessment Act of 2015” were introduced. The below listed gaps aided the need to create and have the law signed by the president on December 18, 2015; Lack of information sharing amongst US Federal Government Agencies Lack of clear policies addressing Incident Response Procedures for Data Breaches Lack of collective experience with regard to threat and mitigation efforts Lack of timely reporting which may have thwarted the second data breach as well allowed the relevant agencies and affected employees to take steps to protect their interests much sooner than nearly two years later

What controls were missing and your recommendation Aging systems as the primary obstacle to putting such protections in place for certain systems, despite having the encryption tools on hand. Incomplete security authorization packages, weaknesses in testing of information security controls, and inaccurate Plans of Action and Milestones Recommendation: Building a new architecture, a modern architecture that allows us to implement additional security features The only way to prevent malicious actors from obtaining useful data in this case would have been timely detection of the intrusion. Data loss prevention (DLP) has been proven to be one of the best tools to mitigate the possibility of a significant breach like we saw with OPM.

Cited Law Journal Library, OPM DATA BREACH CASE STUDY: MITIGATING PERSONNEL CYBERSECURITY RISK Alan Wehb. https://www.symantec.com/connect/blogs/opm-breach-costs-could-exceed- 1-billion https://www.fedscoop.com/opm-losses-a-40-year-problem-for-intelligence- community/

Question?