III Congreso de Prevención del Fraude y Seguridad Cyber Threats to the Financial Service Industry and Response.

Slides:



Advertisements
Similar presentations
Introduction and Overview of Digital Crime and Digital Terrorism
Advertisements

1© Copyright 2011 EMC Corporation. All rights reserved. Anatomy of an Attack.
The Third International Forum on Financial Consumer Protection & Education “Fostering Greater Consumer Protection & Education” Preventing Identity Theft.
2 Issues of the information age Computer _______ and mistakes –Preventing computer related waste & mistakes Computer crime –Computer as tool to commit.
ICT & Crime Data theft, phishing & pharming. Data loss/theft Data is often the most valuable commodity any business has. The cost of creating data again.
© 2014 wheresjenny.com Cyber crime CYBER CRIME. © 2014 wheresjenny.com Cyber crime Vocabulary Defacement : An attack on a website that changes the visual.
David A. Brown Chief Information Security Officer State of Ohio
STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Online Banking Fraud Prevention Recommendations and Best Practices This document provides you with fraud prevention best practices that every employee.
Risk Management a Case Study DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
FIT3105 Security and Identity Management Lecture 1.
Chapter 1 Introduction to Security
CSC101 FINAL PROJECT by Sally Fletcher & Nicole Seguin December 11 th, 2003.
(Geneva, Switzerland, September 2014)
IT Security Readings A summary of Management's Role in Information Security in a Cyber Economy and The Myth of Secure Computing.
Network security policy: best practices
Bank Crime Investigation Techniques by means of Forensic IT
Citadel Security Software Presents Are you Vulnerable? Bill Diamond Senior Security Engineer
Company LOGO Copyright Carrie Kerskie Data Breach & Identity Theft By Carrie Kerskie Kerskie Group, Inc.
Lecture 11 Electronic Business (MGT-485). Recap – Lecture 10 Transaction costs Network Externalities Switching costs Critical mass of customers Pricing.
 Jonathan Trull, Deputy State Auditor, Colorado Office of the State Auditor  Travis Schack, Colorado’s Information Security Officer  Chris Ingram,
Chapter 13: Data Security & Disaster Recovery Database Management Systems.
The Financial Impact of Cyber Security 50 Questions Every CFO Should Ask A publication of the American National Standards Institute and the Internet Security.
1 Deployment of Computer Security in an Organization CE-408 Sir Syed University of Engineering & Technology 99-CE-282, 257 & 260.
Topic: Information Security Risk Management Framework: China Aerospace Systems Engineering Corporation (Case Study) Supervisor: Dr. Raymond Choo Student:
What Keeps You Awake at Night Compliance Corporate Governance Critical Infrastructure Are there regulatory risks? Do employees respect and adhere to internal.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Seán Paul McGurk National Cybersecurity and Communications
BUSINESS B1 Information Security.
Case Study: Department of Revenue Data Breach National Association of State Auditors, Comptrollers and Treasurers March 21, 2013.
Self-Assessment and Formulation of a National Cyber security/ciip Strategy: culture of security.
Copyright © 2013 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill/Irwin Business Plug-In B6 Information Security.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
1 Managed Premises Firewall. 2 Typical Business IT Security Challenges How do I protect all my locations from malicious intruders and malware? How can.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Prepared by Dept. of Information Technology & Telecommunications, November 19, 2015 Application Security Business Risk and Data Protection Gregory Neuhaus.
Cyber Insecurity Under Attack Cyber Security Past, present and future Patricia Titus Chief Information Security Officer Unisys Corporation.
Grants Management Training 200 Cyber Security There are two kinds of people in America today: Those who have experienced a cyber-attack and know it, and.
Financial Sector Cyber Attacks Malware Types & Remediation Best Practices
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Engineering and Management of Secure Computer Networks School of Engineering © Steve Woodhead 2009 Corporate Governance and Information Security (InfoSec)
Reducing data loss by threats detection. InfoWatch Traffic Monitor & Workplace Security. Andrey Sokurenko Business Development Director.
Data Security & Privacy: Fundamental Risk Mitigation Tactics 360° of IT Compliance Anthony Perkins, Shareholder Business Law Practice Group Data Security.
INTRODUCTION & QUESTIONS.
Protecting Your Assets By Preventing Identity Theft 1.
February 2, 2016 | Chicago NFA Cybersecurity Workshop.
Dr. Mark Gaynor, Dr. Feliciano Yu, Bryan Duepner.
Cyber Crime in China: Current Situation and Countermeasures He Xing Cyber Crime Investigation Division Ministry of Public Security, China.
External Threats Internal Threats Nation States Cyber Terrorists Hacktivists Organised criminal networks Independent insider Insider planted by external.
Securing Information Systems
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
Team 1 – Incident Response
Public Facilities and Cyber Security
Data Compromises: A Tax Practitioners “Nightmare”
Tax Identity Theft Presenter Date
Joe, Larry, Josh, Susan, Mary, & Ken
NYBA 2017 Technology, Compliance &
DETAILED Global CYBERSECURITY SURVEY Summary RESULTS
Securing Information Systems
I have many checklists: how do I get started with cyber security?
Red Flags Rule An Introduction County College of Morris
The Financial Impact of Cyber Risk 50 Questions Every CFO Should Ask
Presentation transcript:

III Congreso de Prevención del Fraude y Seguridad Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 2 Director with Forward Discovery, an expert information security company with offices in the United States and UAE Formerly the Director of Corporate Information Security for USAA, a Fortune 200 financial services firm in the United States Previously assistant director of information security for Northrop Grumman Corporation Prior FBI Supervisory Special Agent in the Computer Investigations Unit at FBI Headquarters Former Adjunct Professor at George Washington, Georgetown and Duke Universities on information security and cyber crimes Created information security programs to protect data from external and internal compromise Art Ehuan, CISSP Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 3 The financial services industry faces unprecedented threats in protecting customer data from cyber compromise The threats are from cyber criminals and Organized Crime (OC) groups that use the Internet and technology to commit massive information and monetary theft from financial institutions The cyber threats from these groups will continue to increase for the foreseeable future The monetary losses to the United States financial sector is estimated in the hundreds of millions of US dollars ( The worldwide figure is probably in the billions of US dollarswww.ic3.gov Threats to the Financial Services Industry Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 4 Threats to the Financial Services Industry Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 5 Willie Horton, an infamous American banker robber in the 1920’s was asked “Why he robbed banks”. His reply: “Because that is where the money is” The average bank robbery nets the thief approximately $5,000 The risk is great for a low very gain –Bodily injury or death from security or police –High jail sentence for bank robbery Bank Robbery, Old Crime Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 6 Cyber threats can be classified as internal or external The cyber threat can be known or unknown The external known threat is composed of: –Cyber criminals and Organized Crime (OC) that have efficiently and effectively adapted to bank robbery in the high technology age –Web and application compromise –Account takeover The external unknown threat is composed of: –Nation-States that have the ability to conduct offensive activity against financial institutions –Web and application compromise –Account takeover –Terrorist organizations External Threat Classification Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 7 Cyber threats can be classified as internal or external The cyber threat can be known or unknown The internal known threat is composed of: –Financial sector employees that steal sensitive data for illicit purposes (In 2004, the United States Secret Service, which has concurrent jurisdiction with the FBI to investigate cyber crime, published an insider threat study on illicit cyber activity in the financial sector) –Expanded access devices brought in by employees like iPhones, iPods, USB drives, etc The internal unknown threat is composed of: –Corporate espionage by organizations that are interested in strategic information of competitors –Partner organizations that have network connections to the company –Supply chain via software/hardware that has been compromised and installed in the financial organization Internal Threat Classification Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc % increase in cyber attacks – US Department of Homeland Security statistics show that there were over 37,000 attempted and reported breaches of government and private computer systems in fiscal year ,900,000 personal records that have been stolen since 2005 (Privacy right Clearing House 2008) 10% devaluation – In 2006, the Congressional Research Services estimate that a New York Stock Exchange (NYSE) company suffered shareholder losses of $ million dollars US 9 out of 10 businesses were impacted by cyber crime (FBI statistics 2005) Cyber Threat Statistics Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 9 This type of illicit activity targets the financial sector customer to acquire access to passwords, pins and other identifiable information Financial Sector Account Takeover Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 10 OC and cyber criminals are attacking and stealing customer data from bank databases Financial Sector Organization Attack Cyber Threats to the Financial Service Industry and Response 1. Cyber Compromise of Bank 7. Compromise of Bank HSM by Cyber Criminal PIN Customer Enters Card & Pin Number 3. Encryption of Account Number & Pin Provides Pin Block 4. Pin Block Provided to Hardware Security Module (HSM) 6. Pin Block Provided to Hardware Security Module (HSM) 5. Old Pin Block, Account Number and Pin Generate New Pin Block 8. Old Pin Block, Account Number and Pin Generate New Pin Block 9. New Pin Block is Provided to Customer Bank

© 2008 Forward Discovery, Inc. 11 OC and cyber criminals are stealing customer bank credentials by account takeover and manipulation from Web Browser compromise or Redirection (IFrame) Financial Sector Client Attack 1. Cyber Compromise 2. Customer System Rootkit 4. User ID & PW Stolen 3. Customer Online Login 5. Cyber Criminal Login with Stolen Customer Credentials Cyber Threats to the Financial Service Industry and Response 6. Customer Funds Transferred

© 2008 Forward Discovery, Inc. 12 OC and cyber criminals are stealing customer bank credentials by account takeover and manipulation from Phishing Financial Sector Client Attack 1. Cyber Fraudster Phishing 2.. Victim Receives and Clicks on Link 3. System Rootkit and/or Redirection Cyber Threats to the Financial Service Industry and Response Fake Website 4. Customer Credentials Sent to Fraudster

© 2008 Forward Discovery, Inc. 13 The following strategies will assist financial institutions in protecting their information assets: Develop and implement a CERT and Incident Response capability Extrusion detection of network traffic Create information sharing forums (formal/informal) with other financial institutions Conduct scheduled/unscheduled vulnerability assessments and identify risk to the organization from employees, partners and suppliers Provide regular customer and employee cyber security awareness Prepare for regulatory activity from government agencies Financial Sector Strategies Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 14 Develop and implement a CERT and Incident Response capability Every financial institution requires a centralized capability to manage cyber incidents A Computer Emergency Response Team (CERT) is the primary line of defense when an incident is suspected A CERT must have a formal framework with executive support Maintain dedicated personnel, software, hardware to respond to incidents Identify and track anomalous activity on the network Cyber threat exercises should be conducted to test framework on a regular basis CERT and IR Capability Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 15 Extrusion Detection of External Traffic All financial institutions monitor external network traffic coming in for unauthorized cyber activity Monitoring of anomalous network traffic that is exiting the network is equally as important A baseline should be established that provides information on normal versus abnormal outbound network traffic The cyber criminal will get in and it is critical that monitoring take place to identify network traffic leaving the organization Example of network activity that extrusion detection should identify: non-HTTP traffic over port 80 non-DNS traffic over port 53 non-SSL traffic over port 443 Extrusion Detection Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 16 Create information sharing forums with other financial institutions The sharing of information on cyber threats is critical for financial organizations to respond to new and emerging threats Financial institutions should coordinate information on cyber threats that are observed or identified and make this available to the group The sharing can either be formal or informal without a need for attribution to a particular institution In a formal information sharing model, a database repository can be utilized to capture and share “feeds” from members The United States financial sector information sharing model is the Financial Services Information Sharing and Analysis Center (FS-ISAC) Information Sharing Forum Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 17 Conduct vulnerability assessments to identify risk to the financial services organization from employees, partners and suppliers Vulnerability assessments are crucial for identifying risk for a financial institution A framework should be utilized in conducting a vulnerability assessment like the ISO 27001/27002 Assessments should be conducted on a scheduled and unscheduled basis Develop a framework whereby partners that are connected to the organization are required to conduct assessments to identify threats from partners Follow up and mitigate or eliminate risk that is identified as soon as possible Vulnerability Assessments Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. Interviews Information Requests Asset Inventory Best Practices Process Maps Policies & Procedures Human Resources Security Communications & Operations Business Continuity Planning Access Controls Compliance  Provides qualitative assessment of security posture  Establishes security baseline for use in future assessments  Identifies areas of opportunities  Drives investment decisions Outcome Control Assessment Input Only 6 of the 11 ISO areas depicted DetectionDeterrenceMitigationPrevention Vulnerability Assessment Approach Cyber Threats to the Financial Service Industry and Response 18

© 2008 Forward Discovery, Inc. Business Case Driven RoadmapInformation Security Risk Assessment Data Classification Asset Identification High Level Processes Process Review Level 0 Underlying IT Assets Underlying Assets Asset Asset Usage  Linkages between process, asset and underlying supporting components  Confirmation of owners and custodians  Catalogue of process maps and assets identified Multiple Interviews IT Assets Used by Processes of Consequence Business Owner Interviews Interviews with Business Units Opportunities & Unmitigated Risks Vulnerability Assessment Approach Cyber Threats to the Financial Service Industry and Response19

© 2008 Forward Discovery, Inc. 20 Customer and employee cyber security awareness Provide regularly scheduled information/messages to all employees on cyber threats that have impacted the financial institution Require partners to provide information security training to partner organization employees that will be managing, maintaining, handling, storing sensitive company or customer data Provide cyber security awareness messages to customers to make them aware of cyber threats that may be directed at them, i.e. the fact that a financial institution will never require a customer to provide personnel identifiable information from an Cyber Security Awareness Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 21 Prepare for regulatory activity from government agencies Suspicious Activity Reports (SARs) Money laundering With the increasing incidents of cyber attacks reported by the financial sector, the United States Treasury Department added computer intrusion as a new category of suspicious activity in mid-2000 Banks must now fill out Suspicious Activity Reports (SARs) if they suspect someone has gained access to their computer network to steal funds or customer information, or to disable the institution's computer network Web sites defaced by a hacker banks do not have to report such incidents, because no funds or sensitive information is stolen Regulatory Activity Response Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 22 The Future of Cyber Crime Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 23 The Future of Cyber Crime Cyber Threats to the Financial Service Industry and Response

© 2008 Forward Discovery, Inc. 24Cyber Threats to the Financial Service Industry and Response Forward Discovery Contact Art Ehuan, CISSP, CCNP, EnCE